Improved Hybrid Approach for Load Balancing In Virtual Machine
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.730-733, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.730733
Abstract
Cloud computing is a term generally used for the delivery of hosted services over the internet. In simple terms can be stated as “PAY-AND-USE Online Software resources”. Cloud computing makes to use the computing resource online. Balancing the load in the cloud is one of the important parameter which is to be focused. Hybrid Approach to Load balancing in Cloud Environment is a combination of two or more algorithms to achieve the betterment in the Cloud Service to the clients. With the observations it looks that RT Hybrid Algorithm would make the improvement for the better implementation.
Key-Words / Index Term
Cloud computing, Servers, Virtual machine, Data centers, Load balancing, Hybrid approach
References
[1] E. Panagos, A. Biliris, Synchronization and recovery in a client-server storage system, Springer,The VLDB Journal (1997) 6: 209–223,May 1996
[2] Maragoni Mahendar, Malipatel Anusha,"Privacy-Preserving Public Auditing for Secure Cloud Storage", International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3 , Issue 1, PP 242-246
[3] Mr. Arabolu Chandra Sekhar, Dr. R. Praveen Sam, A WALK THROUGH OF AMAZON WEB SERVICES,International Research Journal of Engineering and Technology (IRJET),Volume: 02 Issue: 03 June-2015
[4] Aman Jagga,Amazon Elastic Cloud-The Complete Reference,Amazon Elastic Cloud-The Complete Reference,INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 1, ISSUE 1 1,ISSN 2347-4289
[5] Yaser Ahangari Nanehkaran, An Introduction To Electronic Commerce ,INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 2, ISSUE 4, APRIL 2013 ISSN 2277-8616,
[6] Kusum Lata, Sugandha Sharma, "A Survey on Cloud Computing " ,International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2 , Issue 5 PP 121-125
[7] R. Sood, R. Sharma, "Cloud Security Threats and Issues-A Review ", International Journal of Computer Science, Engineering and Information Technology(IJCSE),ISSN : 2347-2693, Volume 5 , Issue 4, PP 115-119
[8] Susan P. Williams & Petra Schubert, Benefits of Enterprise Systems Use ,IEEE, Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010
[9] Santosh Kumar and R. H. Goudar,Cloud Computing – Research Issues, Challenges,Architecture, Platforms and Applications: A Survey ,International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012
[10] Chetan M Bulla, Satish S Bhojannavar,and Vishal M Danawade ,Cloud Computing: Research Activities and Challenges, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 5, September – October 2013
[11] Yao Lu, John Panneerselvam, Lu Liu,1,2 and Yan Wu1, RVLBPNN: A Workload Forecasting Model for Smart Cloud Computing , Hindawi Publishing Corporation , Scientific Programming ,Volume 2016, Article ID 5635673, 9 pages
[12] Ajeet Mishra, Prof. Umesh Kumar Lilhore, Prof. Nitesh Gupta," Review of Various Data Storage and Retrieval Method for Cloud Computing ",International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307,Volume 2 , Issue 5, PP 584-588
Citation
G.Srinivasa Rao , T. Anuradha, "Improved Hybrid Approach for Load Balancing In Virtual Machine," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.730-733, 2018.
Hybrid Metaheuristic for Virtual Machine Scheduling in Cloud Computing
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.734-740, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.734740
Abstract
Cloud Computing is expanding as the next generation platform which would ease the user on pay as you use mode as per requirement. Cloud incorporates a set of virtual machine which comprises equally storage and computational facility. Due to speedy increase in use of Cloud Computing, moving of more and more application on cloud and demand of customers for more services and enhanced results. The fundamental goal of cloud computing is to offer successful access to isolated and geographically circulated resources. Cloud is growing every day and experience many problems such as scheduling. Scheduling means a group of policies to regulate the order of task to be executed by a computer system.VM Scheduling is necessary for efficient operations in distributed environment. This paper combines ant colony optimization and BAT to solve the VM scheduling problem. We discuss and evaluate these techniques in regard of various performance matrices to give an overview of the latest approaches in the field.
Key-Words / Index Term
CloudComputing,Scheduling,BAT,AntColonyOptimization
References
[1] S. Willium, “Network Security and Communication”, IEEE Transaction, Vol.31, Issue.4, pp.123-141, 2012.
[2] Agarwal, A., Siddharth, S., & Bansal, P. “Evolution of cloud computing and related security concerns.”Symposium on Colossal Data Analysis and Networking (CDAN), 2016
[3] Jing Liu, Liang-Jie Zhang, Bo Hu, and Keqing He “CCRA: Cloud Computing Reference Architecture”, IEEE Ninth International Conference on Services Computing,2012
[4] Hoffa C, Mehta G, Freeman T, Deelman E, Keahey K, Berriman B, Good J, “ On the use of cloud computing for scientific workflows”, IEEE Fourth International Conference ,pp. 640-645, 2008.
[5] Er-Dun, Z., Yong-Qiang, Q., Xing-Xing, X., & Yi, C, “ A Data Placement Strategy Based on Genetic Algorithm for Scientific Workflows”,Eighth International Conference on Computational Intelligence and Security,2012.
[6] Wan, C., Wang, C., & Pei, J, “ A QoS-awared scientific workflow scheduling schema in cloud computing”,IEEE International Conference on Information Science and Technology, 2012.
[7] Amal Ganesh, Dr. M.Sandhya, Dr. Sharmila Shankar, “ A Study on Fault Tolerance methods In Cloud Computing”,IEEE International Advance Computing Conference (IACC), 844-849,2014.
[8] Poola D, Garg SK, Buyya R, Yang Y, Ramamohanarao K. “Robust scheduling of scientific workflows with deadline and budget constraints in clouds”, In Advanced Information Networking and Applications (AINA), IEEE 28th International Conference ,pp. 858-865,2014.
[9] Cho, K.-M., Tsai, P.-W., Tsai, C.-W., & Yang, C.-S. “ A hybrid meta-heuristic algorithm for VM scheduling with load balancing in cloud computing”, Neural Computing and Applications, 1297–1309,2014.
[10] Puya Ghazizadeh, Ravi Mukkamala, Reza Fathi, “ Modeling and Predicting Fault Tolerance in Vehicular Cloud Computing”, Intl. Conference on Computing and Network Communications , 395-400,2015.
[11] Ding, J., Zhang, Z., T. B. Ma, R., & Yang, Y. “Auction-based cloud service differentiation with service level objectives”, Computer Networks, 231–249, 2015.
[12] Mohammed, B., Kiran, M., Awan, I.-U., & Maiyama, K. M. “An Integrated Virtualized Strategy for Fault Tolerance in Cloud Computing Environment” Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress ,2016.
[13] Chou, L.-D., Chen, H.-F., Tseng, F.-H., Chao, H.-C., & Chang, Y.-J. “ DPRA: Dynamic Power-Saving Resource Allocation for Cloud Data Center Using Particle Swarm Optimization”, IEEE Systems Journal, 1554–1565,2016.
[14] Srimoyee Bhattacherjee1(B), Uttiya Sarkar2, Sunirmal Khatua2,and Sarbani Roy1, “ PMM: A Novel Prediction Based VM Migration Scheme in Cloud Computing”, Springer International Publishing , pp. 107–117, 2017.
[15] Medhat Tawfeek, Ashraf El-Sisi, Arabi Keshk and Fawzy Torkey, “Cloud Task Scheduling Based on Ant Colony Optimization”, The International Arab Journal of Information Technology, Vol. 12, No. 2, March 2015.
[16] X.-S. Yang, “ A New Metaheuristic Bat-Inspired Algorithm”, Nature Inspired Coop-erative Strategies for Optimization (NISCO 2010),Studies in Computational Intelligence, Springer Berlin, 284, Springer, 65-74 ,2010.
Citation
Ritu Sharma, Palvinder Singh Mann, "Hybrid Metaheuristic for Virtual Machine Scheduling in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.734-740, 2018.
Urban Heat Island and its effect on Dweller of Kolkata Metropolitan area using Geospatial Techniques
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.741-753, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.741753
Abstract
The significance of Urban heat island (UHI) is to space heater than the urban adjacent area. This heat energy creates by urban people, house, shops, cars, buses, trains, industrial zone, etc. The UHI be an vital occurrence of urban environment in addition to gives direct and circumlocutory effect lying on urban population. In UHI calculating using landsat thermal band, Landsat TM, ETM+ and OLI satellite image (2000, 2008, 2017 Year) data processed to obtain a atmoshphire window method use to retrieve the land surface temperature (LST) using specifically band-6 (TM, ETM+) and band 10 (OLI) for data procurement and investigation. UHI consequence related with rising impermeable surface both spatially and temporally. This study aims to analyze the changes in LST with advent of the Kolkata Metropolitan Area (KMA). The result found that the (LST) is increasing sharply. The mean temperature of the area was 22.33°C in 2000 which became 23.68°C in 2008 and 23.79°C in 2017. The relation of built-up (NDBI) and LST is found positively correlated with a r value of 0.96 in 2000 and 0.78in 2017 and the relation with vegetation (NDVI) is negatively related and the r value is -0.98 in the years of 2000 and the r value is -0.97 in 2017, several heat zones are highlight and have been identified on the map of the KMA area. The addition of Geospatial technology be set up in the direction of valuable in monitor and analyze urban expansion pattern and in evaluation urbanization collision on surface temperature. Finally, the study suggests considering the possible micro-climatic changes in Kolkata metropolitan area and planning for the sustainable improvement.
Key-Words / Index Term
Urban Heat Island (UHI), land surface temperature (LST), Normalized differential build up index (NDBI), Normalized differential vegetation index (NDVI).
References
[1]. T. V. Ramachandra & Bharath H. Aithal & M. V. Sowmyashree (2014). Urban structure in Kolkata: metrics and modelling through geo-informatics, Appl Geomat DOI 10.1007/s12518-014-0135-y, # Società Italiana di Fotogrammetria e Topografia (SIFET), pp.1-15.
[2]. Chakraborty, K. R. (1991). “Urbanisation Trend in the Calcutta Metroplitan District”, in Dasgupta, B. et al. (eds.) “Calcutta`s Urban Future- Agonies From The Past and Prospects”, Government of West Bengal, Calcutta, pp. 114.
[3]. Mallick J, Kant Y, Bharath B. 2008. Estimation of land surface temperature over Delhi using Landsat-7 ETM+. J Indian Geophys Union. 12:131–140.
[4]. Ambinakudige S. 2011. Remote sensing of land cover’s effect on surface temperatures: a case study of the urban heat island in Bangalore, India. Appl GIS. 7:1–12.
[5]. Bajaja, DN, Inamdarb, AB, Vaibhava, V. 2012. Temporal variation of urban heat island using Landsat data: a case study of Ahmadabad, India, in: Aiming Smart Space Sensing. Presented at the 33rd Asian Conference on Remote Sensing; Thailand
[6]. Borthakur M, Nath BK. 2012. A study of changing urban landscape and heat island phenomenon in guwahati metropolitan area. Int J Sci Res. 2:1–6
[7]. Kumar KS, Bhaskar PU, Padmakumari K. 2012. Estimation of land surface temperature to study urban heat island effect using Landsat ETM+ image. Int J Eng Sci. 4:771–778
[8]. Sharma R, Ghosh A, Joshi PK. 2013. Spatio-temporal footprints of urbanisation in Surat, the diamond city of India (1990–2009). Environ Monit Assess. 185:3313–3325.
[9]. Hung T, Uchihama D, Ochi S, Yasuoka Y. 2006. Assessment with satellite data of the urban heat island effects in Asian mega cities. Int J Appl Earth Obs Geoinf. 8:34–48.
[10]. Pongracz R, Bartholy J, Dezso Z. 2006. Remotely sensed thermal information applied to urban climate analysis. Adv Space Res. 37:2191–2196.
[11]. Tran H, Uchihama D, Ochi S, Yasuoka Y. 2006. Assessment with satellite data of the urban heat island effects in Asian mega cities. Int J Appl Earth Obs Geoinf. 8:34–48.
[12]. Imhoff ML, Zhang P, Wolfe RE, Bounoua L. 2010. Remote sensing of the urban heat island effect across biomes in the continental USA. Remote Sens Environ. 114:504–513.
[13]. Peng S, Piao S, Ciais P, Friedlingstein P, Ottle C, Bréon FM, Myneni RB. 2011. Surface urban heat island across 419 global big cities. Environ Sci Technol. 46:696–703.
[14]. Guo Z, Wang SD, Cheng MM, Shu Y. 2012. Assess the effect of different degrees of urbanization on land surface temperature using remote sensing images. Procedia Environ Sci. 13:935–942.
[15]. Mohan M, Kikegawa Y, Gurjar B, Bhati S, Kandya A, Ogawa K. 2012. Urban heat island assessment for a tropical urban airshed in India. Atmos Clim Sci. 2:127–138
[16]. Pandey P, Kumar D, Prakash A, Masih J, Singh M, Kumar S, Jain VK, Kumar K. 2012. A study of urban heat island and its association with particulate matter during winter months over Delhi. Sci Total Environ. 414:494–507.
[17]. Pichierri M, Bonafoni S, Biondi R. 2012. Satellite air temperature estimation for monitoring the canopy layer heat island of Milan. Remote Sens Environ. 127:130–138.
[18]. Nichol J. 2009. An emissivity modulation method for spatial enhancement of thermal satellite images in urban heat island analysis. Photogramm Eng Remote Sens. 75:547–556.
[19]. Mallick J, Rahman A, Singh CK. 2013. Modeling urban heat islands in heterogeneous land surface and its correlation with impervious surface area by using night-time ASTER satellite data in highly urbanizing city, Delhi-India. Adv Space Res. 52:639–655
[20]. Stathopoulou M, Cartalis C. 2009. Downscaling AVHRR land surface temperatures for improved surface urban heat island intensity estimation. Remote Sens Environ. 113:2592–2605.
[21]. Badarinath K, Chand TK, Madhavilatha K, Raghavaswamy V. 2005. Studies on urban heat islands using envisat AATSR data. J Indian Soc Remote Sens. 33:495–501.
[22]. Xu H. 2008. A new index for delineating built‐up land features in satellite imagery. Int J Remote Sens. 29(14):4269–4276. DOI:10.1080/01431160802039957.
[23]. Wang Z, Gang C, Li X, Chen Y, Li J. 2015. Application of a normalized difference impervious index (NDII) to extract urban impervious surface features based on Landsat TM images. Int J Remote Sens. 36(4):1055–1069.
[24]. Khan A, Chatterjee S, Akbari H, Bhatti SS, Dinda A, Mitra C, Hong H & Doan QV (2017): Step-wise Landclass Elimination Approach for extracting mixed-type built-up areas of Kolkata megacity, Geocarto International, DOI: 10.1080/10106049.2017.1408704.
[25]. Guindon B, Zhang Y, Dillabaugh C. 2004. Landsat urban mapping based on a combined spectral–spatial methodology. Remote Sens Environ. 92(2):218–232. DOI: 10.1016/j.rse.2004.06.015.
[26]. Bhatta B. 2009. Analysis of urban growth pattern using remote sensing and GIS: a case study of Kolkata, India. Int J Remote Sens. 30(18):4733–4746.
[27]. Griffiths P, Hostert P, Gruebner O, Sebastian VDL. 2010. Mapping megacity growth with multi-sensor data. Remote Sens Environ. 114(2):426–439. DOI: 10.1016/j.rse.2009.09.012.
[28]. Bouzekri S, Lasbet AA, Lachehab A. 2015. A new spectral index for extraction of built-up area using Landsat-8 data. J Indian Soc Remote Sens. 43(4):867–873.
[29]. Qian J, Zhou Q, Hou Q. 2007. Comparison of pixel-based and object-oriented classification methods for extracting built-up areas in Aridzone. In: ISPRS Workshop on Updating Geo-spatial Databases with Imagery & The 5th ISPRS Workshop on DMGISs; pp. 163–171).
[30]. Cleve C, Kelly M, Kearns FR, Moritz M. 2008. Classification of the wildland–urban interface: a comparison of pixel- and object-based classifications using high-resolution aerial photography. Comput Environ Urban Syst. 32(4):317–326. DOI: 10.1016/j.compenvurbsys.2007.10.001.
[31]. Zha Y, Gao J, Ni S. 2003. Use of normalized difference built-up index in automatically mapping urban areas from TM imagery. Int J Remote Sens. 24(3):583–594. DOI:10.1080/01431160304987.
[32]. Zhang Q, Pavlic G, Chen W, Fraser R, Leblanc S, Cihlar J. 2005. A semi-automatic segmentation procedure for feature extraction in remotely sensed imagery. Comput Geosci. 31(3):289–296. DOI: 10.1016/j.cageo.2004.10.003.
[33]. He C, Shi P, Xie D, Zhao Y. 2010. Improving the normalized difference built-up index to map urban built-up areas using a semiautomatic segmentation approach. Remote Sens Lett. 1(4):213–221. DOI:10.1080/01431161.2010.481681.
[34]. Bhatti SS, Tripathi NK. 2014. Built-up area extraction using Landsat 8 OLI imagery. GISci Remote Sens. 51(4):445–467. DOI:10.1080/15481603.2014.939539.
[35]. Lu N, Hernandez AJ, Ramsey RD. 2015. Land cover dynamics monitoring with Landsat data in Kunming, China: a cost-effective sampling and modelling scheme using Google Earth imagery and random forests. Geocarto Int. 30(2):186–201.
[36]. Ke Y, Im J, Lee J, Gong H, Ryu Y. 2015. Characteristics of Landsat 8 OLI-derived NDVI by comparison with multiple satellite sensors and in-situ observations. Remote Sens Environ. 164:298–313.
[37]. Piyoosh AK, Ghosh SK. 2017. Development of a modified bare soil and urban index for Landsat 8 satellite data. Geocarto Int: 1–20.
[38]. Ahamed B, 2013. “Simulating Land Cover Changes and Their Impacts on Land Surface Temperature in Dhaka, Bangladesh” www.mdpi.com/journal/remotesensing.
[39]. Bhattacharjee D, Hazra S 2014. Distribution of Land Surface Temperature over Built-up Area by Web-GIS Techniques, Indian Journal of Spatial Science Vol - 5.0 No. 2 Winter Issue 2014 pp. 70 – 76.
[40]. Nath SK, Adhikari MD, Devaraj N, Maiti SK. 2015. Seismic vulnerability and risk assessment of Kolkata City, India. Nat Hazards Earth Sys Sci. 15(6):1103–1121.
[41]. Chander, G., Markham, B.L., Helder, D.L. (2009). Summary of Current Radiometric Calibration Coefficients for Landsat MSS, TM, ETM+, and EO-1 ALI Sensors. (In Press, Remote Sensing of Environment, Manuscript Number: RSE-D-08-00684)https://ntrs.nasa.gov/search.jsp?R=20090027884 2018-05-09T11:26:42+00:00Z.
[42]. Voogt JA, Oke TR, 2003. Thermal remote sensing of urban climates, Remote Sensing of Environment, Volume 86, Issue 3, 15 August 2003, Pages 370 384.
[43]. Lin liu and Yuanzhi Zhang e, Urban Heat Island Analysis Using the Landsat TM Data and ASTER Data: A Case Study in Hong Kong, Remote Sensing, 2011, 3, pp1535-1552.
[44]. Wang Z, Gang C, Li X, Chen Y, Li J. 2015. Application of a normalized difference impervious index (NDII) to extract urban impervious surface features based on Landsat TM images. Int J Remote Sens. 36(4):1055–1069.
Citation
Md Amir Ali Gazi, Ismail Mondal, "Urban Heat Island and its effect on Dweller of Kolkata Metropolitan area using Geospatial Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.741-753, 2018.
A Survey on Robust Intrusion Detection System Methodology and Features
Survey Paper | Journal Paper
Vol.6 , Issue.10 , pp.754-760, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.754760
Abstract
To enhance organize security diverse advances has been taken as size and significance of the system has builds step by step. Keeping in mind the end goal to discover interruption in the system Intrusion recognition frameworks were developed which were comprehensively arrange into two category first was misused based and other was anomaly based. In this paper review was done on the different methods of intrusion recognition framework where some of administered and unsupervised interruption location procedures were informed in detail. Here technique of different researcher are clarified with there ventures of working. Diverse kinds of attacks done by the interlopers were additionally surveyed.
Key-Words / Index Term
Anomaly Detection, ANN, Clustering, Genetic Algorithm, Intrusion Detection
References
[1]. Shaohua Teng, Naiqi Wu, Senior, Haibin Zhu, Senior, Luyao Teng, And Wei Zhang. “SVM-DT-Based Adaptive And Collaborative Intrusion Detection”. IEEE/CAA JOURNAL OF AUTOMATICA SINICA, VOL. 5, NO. 1, JANUARY 2018.
[2]. Aljurayban, N.S Emam, A. (21-23 March 2015). Framework For Cloud Intrusion Detection System Service. Web Applications And Networking (WSWAN), 2015 2nd World Symposium On, P1-5
[3]. Mr Mohit Tiwari,Raj Kumar, Akash Bharti, Jai Kishan. “Intrusion Detection System”. International Journal Of Technical Research And Applications E-ISSN: 2320-8163, Volume 5, Issue 2 (March - April 2017), PP. 38-44.
[4]. YU-XIN MENG,” The Practice On Using Machine Learning For Network Anomaly Intrusion Detection” Department Of Computer Science, City University Of Hong Kong, Kowloon, Hong Kong, 978-1-4577-0308-9/11/$26.00 ©2011 IEEE
[5]. Kai Peng, Victor C.M. Leung, Qingjia Huang. “Clustering Approach Based On Mini Batch Kmeans For Intrusion Detection System Over Big Data”. IEEE Transaction 2169-3536 © 2017. .
[6]. Chuanlong Yin , Yuefei Zhu, Jinlong Fei, And Xinzheng He. “A Deep Learning Approach For Intrusion Detection Using Recurrent Neural Networks” Current Version November 7, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2762418.
[7]. Mohammadreza Ektefa, Sara Memar, Fatimah Sidi, Lilly Suriani Affendey “Intrusion Detection Using Data Mining Techniques”, 978-1-4244-5651-2/10/$26.00 ©2010 IEEE
[8]. Premansu Sekhara Rath, 2manisha Mohanty, 3silva Acharya, 4monica Aich “Optimization Of Ids Algorithms Using Data Mining Technique” International Journal Of Industrial Electronics And Electrical Engineering, ISSN: 2347-6982 Volume-4, Issue-3, Mar.-2016
[9]. Liu Hui, CAO Yonghui “Research Intrusion Detection Techniques From The Perspective Ofmachine Learning” 2010 Second International Conference On Multimedia And Information Technology 978-0-7695-4008-5/10 $26.00 © 2010 IEEE
[10]. Barolli Leonard, Elmazi, Donald; Ishitaki, Oda, Tetsuya; Taro; Yi Liu, Uchida, Kazunori. (24-27 March 2015). Application Of Neural Networks For Intrusion Detection In Tor Networks. Advanced Information Networking And Applications Workshops (WAINA), 2015 IEEE 29th International Conference On, P67-72.
[11]. Zhiyuan Tan, Aruna Jamdagni, Xiangjian, Priyadarsi Nanda, Ren Ping Liu, “A System For Denial-Of-Service Attack Detection Based On Multi- Variate Correlation Analysis”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL:25 NO:2 YEAR 2014.
[12]. Mario Guimaraes, Meg Murray. Overview Of Intrusion Detection And Intrusion Prevention, Information Security Curriculum Development Conference By ACM (2008).
[13]. Koushal Kumar, Jaspreet Singh Batth “Network Intrusion Detection With Feature Selection Techniques Using Machine-Learning Algorithms” International Journal Of Computer Applications (0975 – 8887) Volume 150 – No.12, September 2016.
[14]. Muhammad Awais Shibli, Sead Muftic. Intrusion Detection And Prevention System Using Secure Mobile Agents, IEEE International Conference On Security & Cryptography (2008).
[15]. David Wagner, Paolo Soto. Mimicry Attacks On Host Based Intrusion Detection Systems, 9th ACM Conference On Computer And Communications Security (2002).
[16]. Harley Kozushko. Intrusion Detection: Host-Based And Network-Based Intrusion Detection Systems, (2003).
[17]. Lin Tan, Timothy Sherwood. A High Throughput String Matching Architecture For Intrusion Detection And Prevention, Proceedings Of The 32nd Annual International Symposium On Computer Architecture (ISCA 2005).
[18]. Nouf Saleh Aljurayban, Ahmed Emam “Framework For Cloud Intrusion Detection System Service”. DOI: 10.1109/ WSWAN.2015. 7210298, IEEE, 20 August 2015.
Citation
Jhalak Jain, Chetan Agarwal, Himanshu Yadav, "A Survey on Robust Intrusion Detection System Methodology and Features," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.754-760, 2018.
Internet of Things Architecture and Applications : A Overview
Review Paper | Journal Paper
Vol.6 , Issue.10 , pp.761-766, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.761766
Abstract
Internet of Things (IoT) refers to objects that have unique identities and are connected to the internet. While many existing devices, such as networked computers or 4G-enabled mobile phones, already have some form of unique identities and are also connected to internet. Internet of Things is a new revolution of the internet that is rapidly gathering momentum driven by the advancement in sensor networks, mobile devices, wireless communications, networking and cloud technologies. Experts forecast that in future there will be all devices/ things connected to internet. The aim of the Internet of Things (IoT) is to enable things to be connected anytime, anyplace with anything. The IoT is comprised of smart machines interacting and communicating with other machines, environments and infrastructures. As a result, huge volumes of data are being generated, and that data is being processed into useful actions that can make our lives much easier and safer and to reduce our impact on the environment. Internet of Things architecture is capable enough to improve the understanding of related tool, technology, and methodology to facilitate developer’s requirements. Various applications of IoT have been developed and researchers of IoT identified the opportunities and challenges used in IoT such as sensors, actuators, mobile phones. In this paper we discussed IoT, its architecture, and applications of IoT. The creativity of this new era is unlimited, with amazing potential to improve our lives. The following paper is an extensive reference to the utility, applications and an evolution of the Internet of Things.
Key-Words / Index Term
Internet of Things (IoT), Layered Architecture, Sensors & Actuators
References
[1]. Luigi Atzori AI, Giacomo Morabito. “The Internet of Things: A Survey. Comput. Netw.” 2010; 54(15);2787−805.
[2]. Coetzee LE. “The Internet of Things - Promise for the Future? An Introduction” , IST-Africa Conference Proceedings, 2011.
[3]. Sarita Agrawal MLD. “ Internet of Things – A Paradigm Shift of Future Internet Applications” , International Conference on Current Trends in Technology, 2 Nuicone, 2011.
[4]. Al-Fuqaha AG, Mohammadi M. Aledhari M, Ayyash M. ”Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, Communications Surveys and Tutorials” , IEEE, 2015; 17(4):2347−76.
[5]. Gubbi J, et.al. “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions, Future Generation Computer Systems”. 2013; 29(7):1645−60.
[6]. Jason Healey NP, Beau Woods. “ The Healthcare Internet of Things -Rewards and Risks”, Intel Security, 2015.
[7]. Shivayogi Hiremath, Geng Yang, Kunal Mankodiya. “Wearable Internet of Things”, in International Conference on Wireless Mobile Communication and Healthcare. 2014.
[8]. Gigli MK, Simon. “Internet of Things: Services and Applications Categorization”, Advances in Internet of Things. 2011; 1(02):27.
[9]. Da Xu L, He W, Li S. “Internet of Things in Industries: A Survey”, Industrial Informatics, IEEE Transactions. 2014; 10(4):2233−43.
[10] Gurpreet Kaur1 , Manreet Sohal , “IOT Survey: The Phase Changer in Healthcare Industry “: IJSRNSC Volume-6, Issue-2, April 2018 ISSN: 2321-3256
[12] Mantripatjit Kaur1 , Anjum Mohd Aslam , “Big Data Analytics on IOT: Challenges, Open Research Issues and Tools”: International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.3, pp.81-85 , June (2018) E-ISSN: 2320-7639
Citation
Kiran M. Pradhan, Suchitra K. Kasbe, Vaishnavi M. Pradhan, "Internet of Things Architecture and Applications : A Overview," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.761-766, 2018.
A study of Concurrent transaction execution and their problems in Distributed Database System
Review Paper | Journal Paper
Vol.6 , Issue.10 , pp.767-769, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.767769
Abstract
More than one transactions are executing simultaneously is known as concurrent executions. It implies interleaving execution of operations of a transaction. In this paper we will study the benefits of concurrent transactions and problems with concurrent transactions. We will study above with the help of the suitable examples. This paper will help to students and research scholars to understand the concurrent transactions executions.
Key-Words / Index Term
Concurrent Transaction, throughput, response time, concurrency
References
[1]. Kaspi Samuel and Sitalakshmi Venkatraman, “Performance Analysis of Concurrency Control Mechanisms for OLTP Databases”, International Journal of Information and Education Technology, Vol. 4, No. 4, p.p. 313-318, August 2014
[2]. http://www.exploredatabase.com/2016/04/ advantages-of-concurrent-execution-of-transactions-in-database.html
[3]. Karami Ali and Ahmad Baraani-Dastjerdi, “A Concurrency Control Method Based On Commitment Ordering in Mobile Databases”, International Journal of Database Management Systems (IJDMS) Vol.3, No.4, p.p. 39-53 November 2011
[4]. Laiho Martti, et. al., “SQL Transactions – Theory and Hands-on Exercises”, Version 1.4 of the first edition 2013, pp 16, ISBN 978-952-93-2421-7
[5]. https://tutorialink.com/dbms/concurrency--control.dbms
[6]. Jitendra Sheetlani and Gupta V.K., “Concurrency Issues of Distributed Advance Transaction Process”, Research Journal of Recent Sciences, Vol. 1 (ISC-2011), p.p., 426-429, (2012), ISSN 2277-2502
Citation
Anil Kumar Singh, "A study of Concurrent transaction execution and their problems in Distributed Database System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.767-769, 2018.
Content Based Alternate Medicine Recommendation By Using Random Forest Algorithm: A Review
Review Paper | Journal Paper
Vol.6 , Issue.10 , pp.770-775, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.770775
Abstract
This paper gives the review of different prediction and recommendation system associated with health related problems. Increasing cost of medicine which is not affordable to generalized people and they are always looking for low cost medicine with same content and its effect is the main motivation behind this work. Alternate Medicine System solves this problem by searching through large volume of dynamically generated information to provide users with personalized content and services. This work gives the use of Random Forest Algorithm for content based alternate medicine recommendation system in order to serve as a useful tool for everyone who is associated with the medicine. This paper includes the different classification technique which recommends the different alternative solution. This work explores the different methods and technique used for prediction and recommendation of different issues regarding illness by using different classification techniques in recommendation systems. This study reveals the use of Random Forest Algorithm in the recommendation system. This is gives fast response and fast to build. It is even faster to predict and requiring cross-validation alone for model selection.
Key-Words / Index Term
Alternate Medicine, Content Based Recommendation, Random Forest, Algorithm, Healthcare
References
[1] Naoki Shino, Ryosuke Yamanishi, Junichi Fukmoto, “Recommendation System For Alternative-ingredients Based On Co-occurrence Relation On Recipe Database And The Ingredient Category”, 5th International Congress On Advanced Applied Informatics, IEEE, 2016.
[2] Weiwei Lin, Ziming Wu, Longxin Lin, Angzhan Wen, And Jin Li, “An Ensemble Random Forest Algorithm For Insurance Big Data Analysis”, Recent Advances In Computational Intelligence Paradigms For Security And Privacy For Fog And Mobile Edge Computing, IEEE, 5th July 2017.
[3] Leslie Wilson, Fatema A. Turkistani, Wei Huang, Dang M. Tran, Tracy Kuo Lin, “The Impact Of Alternative Pricing Methods For Drugs In California Workers’ Compensation System: Fee-schedule Pricing”, May 2018.
[4] Torgyn Shaikhinaa, Dave Loweb, Sunil Dagad, David Briggsc, Robert Higginse, Natasha Khovanovaa, “Decision Tree And Random Forest Models For Outcome Prediction Inantibody Incompatible Kidney Transplantation”, Biomedical Signal Processing and Control, Elsevier, 2017.
[5] Shyong (Tony) K. Lam John Riedl. “Shilling Recommender Systems for Fun and Profit”, Group Lens Research Computer Science and Engineering University of Minnesota Minneapolis, 2004.
[6] Bradley N. Miller, “Toward a Personal Recommender System”, Workshop: Beyond Personalization 2005 IUI’05, San Diego, California, USA, 9th January, 2005.
[7] Deepti Sisodiaa, Dilip Singh Sisodiab, “Prediction of Diabetes using Classification Algorithms” Procedia Computer Science, Published by Elsevier, Vol. 132 pp.1578-1585, 2018.
[8] Braun L, Tiralongo E, Wilkinson J, Spitzer O, Bailey M, Poole S, Dooley M., “Perceptions, use and attitudes of pharmacy customers on complementary medicines and pharmacy practice"e”. BMC Complement Alternate Medicine 2010.
[9] MacLennan A., Myers S., Taylor A., “The continuing use of complementary and alternative medicine in South Australia: costs and beliefs in 2004”, Med J Aust., Vol.184:5, 2006.
[10] Xue CCL, Zhang AL, Lin V., Da Costa C., Story DF, “Complementary and alternative medicine use in Australia: a national population-based survey”. Journal of Alternate Complement Med. 13: pp. 643-650, 2007.
[11] Braun L “Integrative Pharmacy: threat or fantasy”, J Compl Med., 8: pp. 41-42, 2009.
[12] Semple S. J., Hotham E., Rao D., Martin K., Smith C. A., Bloustien G. F. “Community pharmacists in Australia: barriers to information provision on complementary and alternative medicines”. Pharm World Sci. 28: pp. 366-373, 2006.
[13] J. Pradeep Kandhasamy, S. Balamurali, “Performance Analysis of Classifier Models to Predict Diabetes Mellitus”, Procedia Computer Science, Published by Elsevier, pp. 45-51, 2015.
[14] Soudabeh Khodambashi, Alexander Perry, Oystein Nytro, “Comparing User Experiences on the Search-based and Content-based Recommendation Ranking on Stroke Clinical Guidelines - A Case Study” Procedia Computer Science, Published by Elsevier, pp. 260-267, 2015.
[15] Kourosh Modarresi, “Recommendation System Based on Complete Personalization” Procedia Computer Science, Published by Elsevier, Vol. 80, pp. 2190-2204, 2016.
[16] Rubal, Dinesh Kumar, “Evolving Differential evolution method with random forest for prediction of Air Pollution” ” Procedia Computer Science, Published by Elsevier, Vol. 132, pp. 824–833, 2018.
[17] Mo Hai, You Zhangc, Yuejin Zhanga “A Performance Evaluation of Classification Algorithms for Big Data” Procedia Computer Science, Published by Elsevier Vol.122 pp. 1100-1107, 2017.
[18] Charu Kathuria, Deepti Mehrotra, Navnit Kumar Misra, “Predicting the protein structure using random forest approach” Procedia Computer Science, Published by Elsevier Vol.132, pp. 1654–1662, 2018.
[19] Meenu Shukla, Sanjiv Sharma “Analysis of Efficient Classification Algorithm for Detection of Phishing Site” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.136-141, June 2017.
[20] J.V.N. Lakshmi, Ananthi Sheshasaayee “A Big Data Analytical Approach for Analyzing Temperature Dataset using Machine Learning Techniques” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.92-97, June 2017.
Citation
Ankita D. Rewade, Sudhir W. Mohod, "Content Based Alternate Medicine Recommendation By Using Random Forest Algorithm: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.770-775, 2018.
A SURVEY ON BRAIN TUMOR DETECTION AND SEGMENTATION FROM MRI IMAGES
Survey Paper | Journal Paper
Vol.6 , Issue.10 , pp.776-778, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.776778
Abstract
A tumor is a clot or growth of tissues in a brain, which is not normal and causes harm to the tissues. The identification of tumor in brain is a challenging task. MRI (Magnetic resonance image) is a strong radio waves and magnetic field is a type of scan used by MRI to produce diagnosed image of body. The biomedical image processing uses the method of segmentation to explore the useful segmentation. The segmentation method is used to identify the tumor in brain by using different methods such K-mean, Wavelet Statistically Textures Features, Fuzzy C means, Spatial FCM, Proximal Support Vector Machine. This paper gives the overview of the techniques for detection of tumor from MRI images. In this paper, different step are carried firstly preprocessing is used to remove noise from MRI image then Skull of the brain is detect and segmentation method are applied for identification of tumor from MRI image. By using median filter noise are removed from MRI image. The Classification of normal or abnormal brain tumor is carried out by using SVM classifier.
Key-Words / Index Term
MRI images, Brain Tumor, Brain, and Segmentation, SVM, K-mean
References
[1] A. Padma & Dr. R. Sukanesh “A Wavelet Based Automatic Segmentation of Brain Tumor in CT Images Using Optimal Statistical Texture Features”, International Journal of Image Processing (IJIP), Vol. 5, Issue 5, pp. 553-563, 2011.
[2] Payal Mistry, Shagun Akhauri, Sayali Patil, S. p. Tondare, “Segmentation of brain tumors and its area calculation in brain MR images using k-mean Clustering and fuzzy c- mean algorithm”, International Journal of Electrical, Electronics and Data communication, ISSN: 2320-2084 Vol. 2, Issue-3, pp. 38-41, 2014,.
[3] Purnita Majumder, V. P. Kshirsagar “Brain Tumor Segmentation and Stage Detection in Brain MR Images with 3D Assessment”, International Journal of Computer Applications, Vol. 4, Issue-15, pp. 16-19, 2013.
[4] E. Mallikarjuna, “Brain tumor detection using segmentation based object labeling algorithm”, Journal of Computation in Biosciences and Engineering, ISSN: 2348 – 7321, Vol. 3, Issue 2, pp. 1-5.
[5] Pranita balaji kanade, prof. P.p. gumaste “Brain tumor detection using MRI images”, International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering Vol. 3, Issue 2, pp. 146-150, 2015.
[6] Urmila ravindra patil, prof. R. T. Patil “Computer aided diagnostic system for brain tumor detection using k-means clustering”, International Journal of Innovations in Engineering Research and Technology [ijiert], ISSN: 2394-3696 , Vol. 3, Issue 5, pp. 71-81, 2016.
[7] S.g.hate, a.d.vidhate “Advancement of brain tumor detection using Some-clustering and proximal support Vector machine”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 6, Issue 7, pp. 5552-5558, 2017.
[8] Jahanavi M S, Sree Priya Kurup “Hybrid Technique to Detect Brain Tumour Using SVM Classifier”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, An ISO 3297: 2007 Certified Organization, Vol. 5, Issue 6, pp.48-52, July 2016.
[9] Sruthy m k, sajitha as “A new topology for tumor and edema segmentation using artificial neural network”, International Research Journal of Engineering and Technology (irjet), E-ISSN: 2395 -0056 Vol. 03, Issue 04, pp. 509-512, 2016.
[10] Subhranil Koley and Aurpan Majumder “Brain MRI Segmentation for Tumor Detection using Cohesion based Self Merging Algorithm”, pp. 81-85.
[11] V. Vani and M. Kalaiselvi Geetha “Automatic Tumor Classification of Brain MRI Images”, E-ISSN: 2347-2693, Vol. 4, Issue-10, pp. 144-151.
[12] D. N. Lohare, R. Telgade, R. R. Manza “Review Brain Tumor Detection using Image Processing Techniques” , E-ISSN: 2347-2693, vol. 6, Issues 5, pp. 735-740, 2018.
Citation
Shruti Reshmi, Rajashekhar D. Salagar, Shriharsha S. Veni, "A SURVEY ON BRAIN TUMOR DETECTION AND SEGMENTATION FROM MRI IMAGES," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.776-778, 2018.
Rural Development with the Help of Artificial Intelligence
Review Paper | Journal Paper
Vol.6 , Issue.10 , pp.779-780, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.779780
Abstract
About seventy percent of the Indian population lives in villages or in rural areas. Even after more than seventy years of Independence the rural India is lagging behind on the developmental index. So for the true of development of India the villages cannot be neglected rather the villages should be given special care. The Government of India is highly concerned for the development of rural India. Now a days technology is playing very important role in almost every walk of life. Accordingly the technology can be the real game changer for the development of rural India. Artificial Intelligence or AI in short, is the future of the modern world and accordingly it has a lot for the development of rural India. This paper deals with the potential of the Artificial Intelligence in the development of rural India.
Key-Words / Index Term
the Indian population, rural India and development
References
[1] Definition of AI as the study of intelligent agents:Poole, Mackworth & Goebel 1998, p. 1, which provides the version that is used in this article. Note that they use the term "computational intelligence" as a synonym for artificial intelligence. Russell & Norvig (2003) (who prefer the term "rational agent") and write "The whole-agent view is now widely accepted in the field" (Russell & Norvig 2003, p. 55).
[2] Russell & Norvig 2009, p. 2.
[3] Ward, Neil; Brown, David L. (1 December 2009). "Placing the Rural in Regional Development". Regional Studies. 43 (10): 1237–1244. doi:10.1080/00343400903234696.
[4] Rural development research: a foundation for policy (1. publ. ed.). Westport, Conn. [u.a.]: Greenwood Press. 1996. ISBN 0-313-29726-6
[5] https://www.mindtree.com/sites/default/files/2018-04/Artificial%20Intelligence%20in%20Agriculture.pdf
[6] https://www.teachthought.com/the-future-of-learning/10-roles-for-artificial-intelligence-in-education/
[7] Coiera, E. (1997). Guide to medical informatics, the Internet and telemedicine. Chapman & Hall, Ltd..
Citation
Adarsh Singh Punjeta, "Rural Development with the Help of Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.779-780, 2018.
A Critical Performance Based Survey of Tools, Research Techniques and Perspectives of Intelligent Traffic Archive models
Survey Paper | Journal Paper
Vol.6 , Issue.10 , pp.781-788, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.781788
Abstract
When adding capacity is not the option due to financial constraints or due to various other reasons, operating transportation systems efficiently is the only available option, in combating congestion. More and more transportation systems are concentrating on improving efficiency of these; and Traffic Archive Modelling and ITS –use of computer and communication technology is at fore-front to achieve the above said objective. For the last two decades, intelligent transportation systems (ITS) have emerged as an efficient way of improving the performance of transportation systems. A significant change in ITS in recent years is that much more data are collected from a variety of sources. The availability of a large amount of data can potentially lead to a revolution in ITS development, changing an ITS from a conventional technology-driven system into a more powerful multifunctional data-driven intelligent transportation system. In this paper, we provide a critical performance based survey on the development of intelligent transportation systems, discussing the functionality of its key components and some deployment issues associated with it. Future research directions and a roadmap to future is also presented.
Key-Words / Index Term
Data Mining, data-driven intelligent transportation systems machine learning, Hierarchical clustering, GPS, mobility, Traffic Density
References
[1] Junping Zhang, Member, IEEE, Fei-Yue Wang, Fellow, IEEE, Kunfeng Wang, Wei-Hua Lin, Xin Xu, and Cheng Chen – “Data-Driven Intelligent Transportation Systems” IEEE transactions on intelligent transportation systems, vol. 12, no. 4, December 2011
[2] D. Filev, J. Lu, and D. Hrovat, “Future mobility: Integrating vehicle control with cloud computing,” ASME Dynamic System and Control Magazine, vol. 1, pp. 18–24, March 2013.
[3] J. W. C. van Lint, “Online learning solutions for freeway travel time prediction,” IEEE Trans. Intell. Transp. Syst., vol. 9, no. 1, pp. 38–47, Mar. 2008.
[4] M. Balcilar and A. C. Sonmez, “Extracting vehicle density from background estimation using Kalman filter,” in Proc. 23rd Int. Symp. Comput. Inf. Sci., 2008, pp. 1–5.
[5] Jithin Raja, Hareesh Bahuleyana, Lelitha Devi Vanajakshi ,”application of data mining techniques for traffic density estimation and prediction”, 11th Transportation Planning and Implementation Methodologies for Developing Countries, TPMDC 2014, 10-12 December 2014, Mumbai, India
[6] V. Kastrinaki, M. Zervakis, and K. Kalaitzakis, “A survey of video processing techniques for traffic applications,” Image Vis. Comput., vol. 21, no. 4, pp. 359–381, Apr. 2003.
[7] C.-C. R. Wang and J.-J. J. Lien, “Automatic vehicle detection using local features—A statistical approach,” IEEE Trans. Intell. Transp. Syst., vol. 9, no. 1, pp. 83–96, Mar. 2008.
[8] B. T. Morris and M. M. Trivedi, “Learning, modeling, and classication of vehicle track patterns from live video,” IEEE Trans. Intell. Transp. Syst., vol. 9, no. 3, pp. 425–437, Sep. 2008.
[9] S. Munder, C. Schnörr, and D. M. Gavrila, “Pedestrian detection and tracking using a mixture of view-based shape–texture models,” IEEE Trans. Intell. Transp. Syst., vol. 9, no. 2, pp. 333–343, Jun. 2008.
[10] Silwattananusarn, T., Tuamusk, K., 2012. Data Mining and Its Applications for Knowledge Management: A Literature Review from 2007 to 2012. International Journal of Data Mining & Knowledge Management Process (IJDKP),
[11]J. W. C. van Lint, S. P. Hoogendoorn, and H. J. van Zuylen, “Accurate travel time prediction with state-space neural networks under missing data,” Transp. Res. C, Emerg. Technol., vol. 13, no. 5/6, pp. 347–369, Oct.–Dec. 2005.
[12]J.W. C. van Lint, “A reliable real-time framework for short-term freeway travel time prediction,” J. Transp. ASCE, vol. 132, no. 12, pp. 921–932, Dec. 2006.
[13]Z. Sun, G. Bebis, and R. Miller, “On-road vehicle detection: A review,”IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 5, pp. 694–711, May 2006.
[14] S. Sivaraman and M. M. Trivedi, “A general active-learning framework for on-road vehicle recognition and tracking,” IEEE Trans. Intell. Transp. Syst., vol. 11, no. 2, pp. 267–276, Jun. 2010.
[15]D. Gerónimo, A. M. López, A. D. Sappa, and T. Graf, “Survey of pedestrian detection for advanced driver assistance systems,” IEEE
Trans. Pattern Anal. Mach. Intell., vol. 32, no. 7, pp. 1239–1258, Jul. 2010.
[16] X. Gong and X. Liu, “A data-mining-based algorithm for traffic network flow forecasting,” in Proc. Int. Conf. Integr. Knowl. Intensive Multiagent Syst., 2003, pp. 243–248.
[17] W. Hui, A framework for developing road risk indices using quantile regression based crash prediction model. PhD thesis, The University of Texas at Austin, 2011.
[18] J. Kianfar and P. Edara, “Optimizing freeway traffic sensor locations by clustering Global-Positioning-System-derived speed patterns,” IEEE Trans. Intell. Transp. Syst., vol. 11, no. 3, pp. 738–747, Sep. 2010.
[19] Zhang, L., Liu, Q., Yang, W., Wei, N., Dong, D., 2013. An Improved K-nearest Neighbor Model for Short-term Traffic Flow Prediction.Procedia Social and Behavioural Sciences, 96, 653-662.
[20] Padiath, A., Vanajakshi, L., Subramanian, S.,Manda, H. 2009. Prediction of Traffic Density for Congestion Analysis under Indian Traffic Conditions. 12th International IEEE Conference on Intelligent Transportation System.
[21] J. M. Sussman, Perspectives on Intelligent Transportation Systems (ITS).New York: Springer-Verlag, 2005.
[22] S. K. Barai, “Data mining applications in transportation engineering,” Transport, vol. 18, no. 5, pp. 216–223, 2003.
[23] X. Wu and X. Zhu, “Mining with noise knowledge: Error-aware data mining,” IEEE Trans. Syst., Man, Cybern. A: Syst., Humans, vol. 38, no. 4, pp. 917–932, Jul. 2008.
[24] J. B. Tenenbaum, V. D. Silva, and J. C. Lanford, “A global geometric framework for nonlinear dimensionality reduction,” Science, vol. 290, no. 5500, pp. 2319–2323, Dec. 2000.
[25] D. D. Lee and H. S. Seung, “Learning the parts of objects by nonnegative matrix factorization,” Nature, vol. 401, no. 6755, pp. 788–791, Oct. 1999.
[26] K. Fukumizu, F. R. Bach, and M. I. Jordan, “Kernel dimension reduction in regression,” Ann. Statist., vol. 37, no. 4, pp. 1871–1905, 2009.
[27] J. Zhang, B. Tan, F. Sha, and L. He, “Predicting pedestrian counts in crowded scenes with rich and high-dimension al features,” IEEE Trans. Intell. Transp. Syst., vol. 12, no. 4, pp. 1037–1046, Dec. 2011.
[28] K. Fukumizu, F. R. Bach, and A. Gretton, “Statistical consistency of kernel canonical correlation analysis,” J. Mach. Learn. Res., vol. 8, pp. 361–383, Dec. 2007.
[29] C. Wang and S. Mahadevan, “Manifold alignment using Procrustes analysis,” in Proc. Int. Conf. Mach. Learn., 2008, pp. 1120–1127.
[30] S. J. Pan and Q. Yang, “A survey on transfer learning,” IEEE Trans. Knowledge Data Eng., vol. 20, no. 10, pp. 1345–1359, Oct. 2010.
Citation
Shailaja B. Jadhav, "A Critical Performance Based Survey of Tools, Research Techniques and Perspectives of Intelligent Traffic Archive models," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.781-788, 2018.