MeghRaj – A Cloud Environment for e-governance in India
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.759-763, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.759763
Abstract
E-governance uses Information and communication technology for delivery of services to the citizens. Today the Government of India has adopted e-governance and many projects and services are available online for the easy delivery of the facilities to the general citizens. The e-governance has helped in increasing transparency, reducing corruption, better administration and effective interaction with the Government. Cloud computing is a new technology in which the user pays only for the service which they are using. It is economical, scalable and more secure than the current technology. Realizing this Government is making an effort to incorporate cloud computing in e-governance. This paper explains the importance of cloud computing in e-governance and briefly describes the various projects available online which are using the cloud services. Some of such projects are digilocker, online registration services, etc. Although many of these services are not fully functional but efforts are being made to implement them properly. The Government needs to take proper care while implementing cloud services keeping in mind the proper guidelines and policies so that the confidential, personal and sensitive data is safe and secure.
Key-Words / Index Term
e-governance, Cloud computing, GI-cloud, IAAS, Digilocker, NPIP
References
[1] V.Verma, “Cloud Computing for E-Governance - A white paper”, IIIT Hyderabad , January 2010.
[2] CSR Prabhu, “E-Governance: Concepts and Case Studies”, New Delhi, PHI Learning Private Limited 2004.
[3] Dr.Nidhi Srivastava, “Effective e-governance through Cloud Computing” IJIRCCE, Vol. 4 Issue 3, March 2016
[4] R.Kumar, “National e-Governance Plan: Vision, Challenges and the Way Forward” Yojana, September 2012.
[5] M.C.Boro “NeGP and India for E-Governance-A Search for its Utility and Challenges”, IJESC, Vol. 7Issue 11, 2017
[6] D.Chandra, R.Bhadoria, “Cloud Computing Model for National EGovernance Plan (NeGP)”, Proceedings of the Fourth International Conference on Computational Intelligence and Communication Networks (CICN2012) Mathura, pp. 520-524. 2012
[7] ‘Cisco Cloud Computing - Data Center Strategy, Architecture, and Solutions- A white paper’, US Public Sector, 1st Edition, 2009
[8] N.Srivastava, R.Pandey, ‘Educational Institution Intranet Zone: Scalability to Cloud’, IJCA, Vol. 133, No. 5, January 2016.
[9] A.More, P.Kanungo, “ Use of Cloud Computing for Implementation of e-Governance Services”, IJSRCSE, Vol. 5, Issue 3, pp115-118, June 2017
[10] “Government of India’s GI Cloud (Meghraj) Strategic Direction Paper”, Department of Electronics & Information Technology, April 2013
[11] Government of Inida’s GI-Cloud (MeghRaj) Strategic Direction Paper, Department of Electronics & Information Technology, April 2013
[12] MeghRaj Cloud Initiative, National cloud by NIC, Ministry of Electronics & Information Technology, August 2007
[13] M.Gulati, K.Verma, “Digital locker”, JETIR, Volume 3, Issue 6, June 2016
[14] P.P.Arvind, M.P.Vitthalrao, M.M. Joshi, “DIGILOCKER (Digital Locker – Ambitious Aspect of Digital India Programme)”, International Journal of Mnagement Research, Vol 3, Issue 6, June 2015
[15] J.S.Bharati, A.Garg, “How Useful Is Digital Locker? An Empirical Study In Indian Context”, Indian Journal of Commerce & Management Studies, Volume VII Issue 2(1), May 2016
[16] National Prisons Information Portal, A Digital India Initiative by Government of India
[17] http://vikaspedia.in/e-governance/citizen-services/national-prisons-information-portal
[18] Online Registartion System, Ministry of Electronics & Information Technology, Government of Inida
[19] https://economictimes.indiatimes.com/news/politics-and-nation/about-1-5-lakh-aiims-patients-benfited-from-online-registration-system-government/articleshow/51153642.cms
[20] Forest Survey of India, Ministry of Environmemnt, Forest & Climate Change
[21] https://www.mygov.in/#
Citation
Nidhi Srivastava, "MeghRaj – A Cloud Environment for e-governance in India," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.759-763, 2018.
A Novel Approach for Efficient Data Sharing and Revocation with Data Access control
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.764-769, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.764769
Abstract
The novel paradigm of data outsourcing on the cloud is a double-edged sword. On the one hand, it frees data management owners and allows data owners to more easily share their data with targeted users. On the other hand, this poses new challenges in terms of privacy and security. In order to protect the confidentiality of data from the honest but curious cloud service provider, many works have been proposed to support data access control with precise rules. However, so far, no system is able to support both granular access control and the publication of time-sensitive data. In this article, integrating timed cryptography into Cipher text cryptographic encryption (CP-ABE) encryption, we propose a new control of time access and attributes on time-sensitive data for archiving. In the public cloud (called TAFC). Based on the proposed scheme, we also propose an efficient approach to designing policies to access the various access requirements for time-sensitive data. The in-depth analysis of safety and performance shows that the proposed scheme is highly efficient and meets the security requirements for data storage in the public cloud.
Key-Words / Index Term
Cloud storage, Cipher text cryptographic encryption, programmed-release encryption
References
[1] Z. Qin, H. Xiong, S. Wu, and J. Batamuliza, “A surveyof proxy re-encryption for secure data sharing in cloudcomputing,” IEEE Transactions on Services Computing,Avaliable online, 2016.
[2] F. Armknecht, J.-M. Bohli, G. O. Karame, and F. Youssef,“Transparent data deduplication in the cloud,” inProceedings of the 22nd ACM SIGSAC Conference onComputer and Communications Security, pp. 886–900,ACM, 2015.
[3] R. Masood, M. A. Shibli, Y. Ghazi, A. Kanwal, andA. Ali, “Cloud authorization: exploring techniques and approach towards effective access control framework,”Frontiers of Computer Science, vol. 9, no. 2, pp. 297–321, 2015.
[4] K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16,no. 1, pp. 69–73, 2012.
[5] J. Bethencourt, A. Sahai, and B. Waters, “Cipher text policy attribute-based encryption,” in Proceedings of the28th IEEE Symposium on Security and Privacy (S&P’07), pp. 321–334, IEEE, 2007.
[6] Z. Wan, J. Liu, and R. H. Deng, “HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743–754,2012.
[7] K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, “DACMACS: Effective data access control for multi-authority cloud storage systems,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 11, pp. 1790–1801, 2013.
[8] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalableand secure sharing of personal health recordsin cloud computing using attribute-based encryption,”IEEE Transactions on Parallel and Distributed Systems,vol. 24, no. 1, pp. 131–143, 2013.
[9] E. Bertino, P. A. Bonatti, and E. Ferrari, “TRBAC: Atemporal role-based access control model,” ACM Transactionson Information and System Security, vol. 4, no. 3,pp. 191–233, 2001.
[10] I. Ray and M. Toahchoodee, “A spatio-temporal rolebasedaccess control model,” in IFIP Annual Conferenceon Data and Applications Security and Privacy, pp. 211–226, Springer, 2007.
Citation
Narsimha Banothu, P. Dayaker, P. Bhaskara Reddy , "A Novel Approach for Efficient Data Sharing and Revocation with Data Access control," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.764-769, 2018.
Survey on adoption of Sentiment Analysis for studying consumer’s online buying behavior
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.770-776, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.770776
Abstract
Sentiment analysis has emerged as a field that has attracted a significant amount of attention since it has a wide variety of applications that could benefit from its results, such as news analytics, marketing, question answering, knowledge management and so on. This area, however, is still early in its development where urgent improvements are required on many issues, particularly on the performance of sentiment classification. Understanding the thoughts of the people is an essential part of the information-gathering behavior. Opinion-rich resources like online review sites and personal blogs have gained immense popularity as they have become easily accessible and are giving new opportunities and posing new challenges as, now people actively use information technology to search out and understand the opinions of others. The flow of interest in the new systems that directly deals with the opinions as a first-class object has given rise to activities in the area of opinion mining and sentiment analysis that work towards the computational analysis of opinions, sentiments and subjectivity in the text. This paper reviews the sentiment analysis methodology and focuses on the techniques to deal with the challenges of sentiment-aware applications. The purpose of this paper is to describe sentiment analysis in detail and to illustrate the method used for it. This survey consists of approaches that work towards enabling opinion-oriented information seeking systems. The main contribution of this paper includes categorization of a number of articles over the years and the illustrations of the recent trends in research in sentiment analysis and its related areas.
Key-Words / Index Term
Opinion mining; Sentiment analysis; Consumer attitude; Sentiment classification
References
[1].S. Kajal, P. Vandana, “Opinion Mining: Aspect level sentiment analysis using sentiwordNet and Amazon Web Services” , International Journal of Computer Applications, Volume 158-No 6, January 2017.
[2].D. Yajun, Z. Lizhou , J. Peiquan , “Dimension based Sentiment polarity detection for E-Commerce Reviews”, Advanced Science and Technology Letters Vol.45 (CCA 2014), pp.55-59,http://dx.doi.org/10.14257/astl.2014.45.11
[3].J. Jeevanandam, Dr. S. Koteeswaran, “Sentiment Analysis: A Survey of Current Research and Techniques”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 5, May 2015
[4].R. Haseena, “Opinion mining and sentiment analysis- Challenges and application”, International Journal of Application on Innovation in Engineering and Management, 401-403 (2014)
[5].S.J. Ravendra Ratan Singh, “A proposed Novel approach for Sentiment Analysis and opinion Mining”, International Journal of UbiComp (IJU), 5, (.1/2)April 2014 Pp:1-10
[6].D. Yajun, Z. Lizhou , J. Peiquan , “Dimension based Sentiment polarity detection for E-Commerce Reviews”, Advanced Science and Technology Letters Vol.45 (CCA 2014). pp.55-59, http://dx.doi.org/10.14257/ astl.2014.45.11
[7].K. Svetlana, Z. Xiaodan and M. Saif, “Sentiment analysis of short informal texts”, Journal of Artificial Intelligence Research,50:723-762, 2014(b)
[8].B. Pang, L. Lee, “Opinion Mining and Sentiment Analysis”, Foundation and Trends in Information Retrieval. 2(1-2): 1-135.
[9].C. Corinna & V. Vladimir, “Support Vector networks”, Kluwer Academic publisher, Boston, 1995
[10].S.R. Bhanu , J. Uma Pricilda, “A Review on the concept of sentiment analysis and its role in marketing strategies for E-commerce’ ,IIOAB Journal’ 216-224, 2014
[11].B.Pang,L. Lee, and S. Vaithyanathan , “Thumbs up?: sentiment classification using machine learning techniques.”,In Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10, 79–86,2002.
[12].F.Salvetti, S. Lewis & C. Reichenbach, “Automatic opinion polarity classification of movie”, Colorado research in linguistics, 2004.
[13].P. Beinik, T. Hastic, & S.Vaithyananthan, “ The sentimental factor: Improving review classification via human-provided information”, In proceedings of the 12th annual meeting on association for computational linguistics, page 263, association for computational linguistics, 2004.
[14].T.Mullen & N. Collier, “Sentiment analysis using support vector machines with diverse information sources”, in EMNLP, Vol 4, pg 412-41,2004
[15].K. Dave, S. Lawrence , & D. Pennock , “Mining the oeanut gallery: Opinion extraction & semantic classification of product reviews”, In proceedings of the 12th international conference on world wide web, pg 519-528, ACM,2003
[16].S. Matsumoto, H.Takamura, & M. Okumara, “Sentiment Classification using word sub-sequences & dependency sub-trees”, In advances in knowledge discovery & data mining, pages 301-311, Springer,2005
[17].B. Luo, J. Zeng & J. Duan, “Emotion space model for classifying opinions in stock message board”, Expert Systems with Applications, 44 , 138–146 , 2016.
[18].S. M Liu, & J.H. Chen, “A multi-label classification based approach for sentiment classification”, Expert Systems with Applications, 42 (3), 1083–1093, 2015.
[19].T. Niu, S. Zhu, L. Pang & A. El Saddik, “Sentiment analysis on multi-view social data” In Multimedia modelling (pp. 15–27). Springer, 2016.
[20].P. Haiyun, C. Erik, H. Amir, “A Review of sentiment analysis research in Chinese language”, Cognitive Computing (2017) 9: 423. https://doi.org/10.1007/S125590-17-9470-8.
Citation
Bhumika Pahwa, S. Taruna, Neeti Kasliwal, "Survey on adoption of Sentiment Analysis for studying consumer’s online buying behavior," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.770-776, 2018.
Scaling and Testing Refactoring Preconditions in Refactoring Engines
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.777-783, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.777783
Abstract
Demonstrating refactoring sound as for a formal semantics is viewed as a test. Designers compose test cases to check their refactoring implementations. However, it is troublesome and time expending to have a decent test suite since it requires complex sources of info (programs) and a prophet to check whether it is conceivable to apply the transformation. In the event that it is conceivable, the subsequent program must save the perceptible conduct. There are some computerized strategies for testing refactoring motors. In any case, they may have impediments identified with the program generator (comprehensiveness, setup, expressiveness), automation (sorts of prophets, bug classification), time utilization or sorts of refactoring that can be tried. This paper stretches out past system to test refactoring engines. It likewise clarifies the enhancement expressiveness of the program generator for testing more kinds of refactoring`s, such as Extract Function. Moreover, developers simply need to determine the information`s structure in an explanatory dialect. They may likewise set the system to skip some continuous test contributions to enhance performance. This additionally assesses strategy in 18 kinds of refactoring implementations of Java and distinguishes 35 bugs identified with aggregation blunders, behavioral changes, and overly strong conditions. This paper thinks about the effect of the skip on the time utilization and bug detection in this proposed method. By using a skip of 25 in the program generator, it decreases in 96%the times to test the refactoring implementations while missing only 3.9% of the bugs. In almost no time, it finds the principal failure related to aggregation blunder or behavioral change.
Key-Words / Index Term
Refactoring, overly strong preconditions, automated testing, program generation
References
[1] M. Schafer, T. Ekman, and O. de Moor, “Challenge proposal: verification of refactorings,” In PLPV, 2008, pp. 67–72.
[2] G. Soares, M. Mongiovi, and R. Gheyi, "Identifying overly strong conditions in refactoring implementations," in ICSM, 2011, pp. 173–182.
[3] G. Soares, R. Gheyi, and T. Massoni, "Automated behavioral testing of refactoring engines,” IEEE Transactions on Software Engineering, vol. 39, pp. 147–162, 2013.
[4] B. Daniel, D. Dig, K. Garcia, and D. Marinov, “Automated testing of refactoring engines,” in FSE, 2007, pp. 185–194.
[5] M. Gligoric, T. Gvero, V. Jagannath, S. Khurshid, V. Kuncak, and. Marinov, “Test generation through programming in UDITA,” in ICSE,2010, pp. 225–234.
[6] M. Gligoric, F. Behrang, Y. Li, J. Overbey, M. Hafiz, and D. Marinov, on reals"Systematic testing of refactoring engines software projects," inECOOP, 2013, pp. 629–653.
[7] D. Jackson, “Software Abstractions: Logic, Language, and Analysis.Revised edition. “The MIT Press, 2012.
[8] V. Jagannath, Y. Lee, B. Daniel, and D. Marinov, “Reducing the costs of bounded-exhaustive testing,” in FASE, 2009, pp. 171–185.
[9] M. Sch¨afer and O. Moor, “Specifying and implementing refactorings," in OOPSLA, 2010, pp. 286–301.
[10] D. Jackson, I. Schechter, and H. Shlyahter, “Alcoa: the Alloy constraint analyzer,” in ICSE, 2000, pp. 730–733.
[11] M. Mongiovi, R. Gheyi, G. Soares, L. Teixeira, and P. Borba, “Makingrefactoring safer through impact analysis,” SCP, 2014, In press.
[12] G. Soares, R. Gheyi, D. Serey, and T. Massoni, “Making program refactoring safer,” IEEE Software, vol. 27, pp. 52–57, 2010.
[13] W. Mckeeman, “Differential testing for software,” Digital TechnicalJournal, vol. 10, no. 1, pp. 100–107, 1998.
[14] E. Torlak and D. Jackson, “Kodkod: A relational model finder,” inTACAS. Wiley, 2007, pp. 632–647.
[15] G. Soares, R. Gheyi, E. Murphy-Hill, and B. Johnson, “comparing approaches to Analyze Refactoring Activity on Software Repositories, "JSS, pp. 1006–1022, 2013.
[16] W. Opdyke, “Refactoring Object-Oriented frameworks,” Ph.D. dissertation, the University of Illinois at Urbana-Champaign, 1992.
[17] L. Tokuda and D. Batory, “Evolving object-oriented designs with refactorings,” ASE, vol. 8, pp. 89–120, 2001.
[18] A. Garrido and R. Johnson, “Refactoring C with conditional compilation," in ASE, 2003, pp. 323–326.
[19] A. Garrido and R. E. Johnson, “Analyzing multiple configurations of a program,” in ICSM, 2005, pp. 379–388.
[20] F. Steinmann and A. Thies, “From public to private to absent: RefactoringJava programs under constrained accessibility,” in ECOOP, 2009, pp.419–443.
[21] P. Borba, A. Sampaio, A. Cavalcanti, and M. Cornelio, “Algebraic reasoning for Object-Oriented programming,” “SCP, vol. 52, pp. 53–100,2004.
[22] L. Silva, A. Sampaio, and Z. Liu, “Laws of Object-Orientation with reference semantics,” in SEFM, 2008, pp. 217–226.
[23] H. Li and S. Thompson, “Testing ErlangRefactorings withQuickCheck,” in IFL, 2008, pp. 19–36.
[24] M. Vakilian and R. E. Johnson, “Alternate refactoring paths reveal usability problems,” in ICSE, 2014, pp. 1–11.
[25] Melina Mongiovi Member, Rohit Gheyi, Gustavo Soares, Márcio Ribeiro, Paulo Borba, "Detecting overly strong preconditions in refactoring engines" IEEE 2017.
[26] Geeta Bagade, Shashank Joshi “Analysis of Aspect-Oriented Systems: Refactorings using AspectJ” International Journal of Computer Sciences and Engineering,Vol.4, Issue .5, pp.76-80, May-2016
[27] Nagaveni, A. Ananda Rao, P. Radhika Raju, “Testing Refactoring Implementations of Object-Oriented Systems”International Journal of Computer Sciences and Engineering, Vol.6 , Issue.7,pp.530-534, Jul-2018
Citation
Padakanti Divya, Karanam Madhavi, "Scaling and Testing Refactoring Preconditions in Refactoring Engines," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.777-783, 2018.
Lifetime Enhancement in Wireless Sensor Networks: A Theoretical Review
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.784-789, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.784789
Abstract
A Wireless Sensor network (WSN) is defined as network of devices that is used to monitor the physical conditions and gather the information from the complex geological range through wireless link. These networks are powered using batteries which are difficult to recharge. In WSN, energy can be consumed usefully or wastefully and toimprove the efficiency of WSN it is necessary to minimize the wastage of energy thereby improving the lifetime of network. Energy conservation is used to minimize the consumption of energy in several intermediate nodes to enhance the lifetime of network. This paper presents a brief overview of architecture of WSN and highlights the area where energy is consumed wastefully and usefully. Some of the techniques which are used for enhancing the network’s lifetime by reducing energy consumption are analyzed in detailed.
Key-Words / Index Term
WSN (Wireless Sensor Network), Energy conservation, Energy consumption, BS (Base Station), CH (Cluster Head), subsystem, LEACH (Low Energy Adaptive Clustering Hierarchy), Routing, Energy efficiency CSMA (carrier sense multiple access), CSMA/CA (carrier sense multiple access/collision avoidance) etc
References
[1]. Mohamed Elshrkawey, Samiha M. Elsherif, M.ElsayedWahed (2018). An Enhacement Approach for Reducing the Energy Consumption in Wireless Sensor Networks.Journal of King Saud University- Computer and Information Sciences 30 (4) 259-267.
[2]. Deepak, S. (2015). An overview of Wireless Sensor Networks. International Journal of Enhanced Research in Management & Computer Applications, 4 (4), 47-41. ) ISSN: 2319-7471.
[3]. Preeti, B., Deepak, S., & Shamsher, M. (2015). A Review of Routing Protocols in Wireless Sensor Network. International Journal of Enhanced Research in Management & Computer Applications, 4 (5), 34-40. ) ISSN: 2319-7471.
[4]. Rajbir, S., Deepak, S., & Payal. (2017). Performance Evaluation of Routing Protocols in Wireless Sensor Networks. International Journal of Engineering Technology Science and Research, 4 (11), 631-639.
[5]. Sapna, K., Suresh, K., & Deepak, S. (2017). Performance Evaluation of Congestion Control in MANETs using AODV, DSR and ZRP Protocols. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 7 (6), 398-403 ISSN: 2277 128X.
[6]. Kirti, M., Suresh, K., & Deepak, S. (2018). Ad-Hoc Wireless Sensor Network Based on IEEE 802.15.4: Theoretical Review. International Journal of Computer Sciences and Engineering , 6 (3), 219-224ISSN 2347-2693.
[7]. Bolaji Omodundi, O.T. Arilogun, J.O. Emuoyibofarhe (2013). A Review if Energy Conservation IN Wireless Sensor Network. Network of Complex System, 3(5).ISSN 2224-610X.
[8]. Bandana Bhatia (2013). Energy Conservation in Wireless Sensor Networks.IOSR Journal of Computer Engineering (IOSR-JCE15(3) 85-89, ISSN 2278-8727.
[9]. Deepak, S., & Suresh, K. (2015). A Comprehensive Review of Routing Protocols in Heterogeneous Wireless Networks. International Journal of Enhanced Research in Management & Computer Applications, 4 (8), 105-121.) ISSN: 2319-7471.
[10]. Payal, Deepak, S., & Suresh, K. (2018). Performance Evaluation of Reactive Routing Protocols Using IEEE 802.15.4 Application in Designed Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 6 (4), 90-96ISSN 2347-2693.
[11]. Reshma I. Tandel (2016) .Leach Protocol in Wireless Sensor Network. International Journal of Computer Science and Technologies, 4. 1894-1896, ISSN 0975-9646.
[12]. Mohamed Elshrkawey, Samiha M. Elsherif,M. ElsayedWahed (2018). An Enhancement Approach for Reducing the Energy Consumption in Wireless Sensor Networks. Journal of King Saud University – Computer and Information Sciences, 259-267, ISSN 1319-1578.
[13]. Mr. Santosh N. Shelke, MR. Sandip R. Shinde( 2013). Energy Saving Techniques in Wireless Sensor Networks. International Journal of Scientific and Engineering Research, 4(4). ISSN 2229-5518.
[14]. SK. Muruganandham, D, Sobya, S. Nallusamy, et.al (2017). Lifetime Expansion of Wireless Sensor using Moderm Routing Algorithm. International Journal of Emerging Trends and Teachnology in Compouter Science, 6(6).ISSN 2278-68956.
[15]. Shio Kumar Singh, M P Singh, D K Singh (2010). A Survey of Energy- Efficient Hierarchical Cluster-based Routing in Wireless Sensor Networks. International Journal of Advanced Networking and Application, 2(2),570-580.
Citation
K. Dhull, S. Kumar, A. Ahlawat, S. Dahiya, "Lifetime Enhancement in Wireless Sensor Networks: A Theoretical Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.784-789, 2018.
An Innovative Life Measuring Application using IOT Technology
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.790-791, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.790791
Abstract
Breathe is the life source for any being. In our proposed model we take the concept of breathe to gauge the life span of a human being. LMA is an innovative tool which will predict the life span of a human being. This application will use the IoT technology to metric the inhale and exhale of person. Based on the counts of breathe in and breathe out, our system will generate a report which tells us life span of a person from time to time.
Key-Words / Index Term
Breathe, IOT, Automation, Life measuring, Wi-Fi
References
[1] The Science of Meditation by Daniel Golman, published by Penguin house, UK.
[2] https://www.ncbi.nlm.nih.gov
[3] Mastering Internet of things.
[4] Vandan, Tiwari, IoT and Its smart Applications, International Journal of Science, Engineering and Technology Research (IJSETR), Pp-472-476, Volume 5, Issue 2, February 2016
[5] K.V.Misra, et al., An Efficient Multistage Authentication system, International Journal of Computer Science and Engineering (IJCSE), Pp-31-34, Volume 5, Issue 1, June 2017.
Citation
B. V. Subba Rao, J. Sirisha, "An Innovative Life Measuring Application using IOT Technology," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.790-791, 2018.
Mutual city/state weather forecasting by ANN and HMM – Survey
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.792-796, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.792796
Abstract
Weather forecasting is an important apply for in meteorology and has been one of the most scientifically and technologically difficult problems around the world. Weather prediction approaches are challenged by difficult weather phenomena with incomplete explanation and past data. Weather phenomena have many parameters that are impossible to enumerate and measure. Increasing development on statement systems enabled weather forecast expert systems to combine and divide resources and thus hybrid system has emerged. Even though these improvements on weather forecast, these expert systems can’t be fully reliable since weather forecast is main problem. A predictive Neural Network model and Hidden Markov Model was also residential for the weather prediction program and the outcome compared with real weather data for the predicted periods. The results show that given enough case data, Data Mining techniques can be used for weather forecasting and climate change studies. Data mining is a process that uses a variety of data analysis tools to find out patterns and relationships in data that may be used to create applicable prediction. The proposed ANN and HMM evaluates the presentation of the developed models by applying unusual neurons, hidden layers and transfer functions to predict temperature for 365 days of the year. The criteria used for suitable model selection is mean square error (MSE).
Key-Words / Index Term
ANN, HMM, weather predication, regression, training, testing, Numerical Weather Forecasting etc
References
[1] Sivaramakrishnan T R and Meganathan S. (2011) Association Rule Mining and Classifier Approach for Quantitative Spot Rainfall Prediction. Journal of Theoretical and Applied Information Technology. 34(2), 173-177.
[2] S.Meganathan and T. R. Sivaramakrishnan, “Pattern Visualization on Meteorological Data for Rainfall Prediction Model”, Journal of Theoretical and Applied Information Technology, 35(2), 169-174, 2012.
[3] Sivaramakrishnan T R and Meganathan S. (2012) Data mining as a tool for precipitation prediction. Archives Des Sciences. 65(3), 8.
[4] Sivaramakrishnan T R and Meganathan S. (2012) Point rainfall prediction using data mining technique. Res. Journal of App. Sciences, Engineering and Technology. 4(13), 1899-1902.
[5] Sivaramakrishnan T R and Meganathan S. (2013) Association rule mining and classifier approach for 48 – hour rainfall prediction over Cuddalore station of east coast of India. Res. Journal of App. Sciences, Engineering and Technology. 5(14), 3692-3696.
[6] S.Meganathan, M. Poornima and A. Sumathi, “Proximity measures in clustering on patient diagnosis system”, International Journal of Applied Engineering Research, Vol.9(22), 12133-12139, 2014.
[7] S.Meganathan, T.R.Sivaramakrishnan, R.Balakrishnan and N.Rajeshkumar, “Rain Prediction using Environmental Data”, Rasayan Journal of Chemistry, 8(1), 56-58, 2015
[8] S.Meganathan, T.R.Sivaramakrishnan, M. Poornima and A.Sumathi, (2015) “Extraction of Winter Temperature Patterns for Agricultural Operations”, Research Journal of Pharmaceutical Biological and Chemical Sciences, 6(3), 1439-1442, 2015.
[9] Meganathan S, Sivaramakrishnan T R. (2015) A Technique for Spot Forecasting, MAUSAM, 66(1), 33-42.
[10] Kothawale DR, Revadekar JV, Rupa Kumar K, Recent trends in premonsoon daily temperature extremes over India. Journal of Earth System Science, 119(1), 51-65, 2010.
[11] Lahoz D, Miguel MS, Classification temp data with self organizing maps, Monografias del Seminario Matematico Garcia de Galdeano, 31,389-397, 2004.
[12] Sarah N Kohail, Alaa M El-Halees, Implementation of data mining techniques for meteorological data analysis. Int. J of Information Communication, Technology and Research, 1(3),96-100, 2011.
[13] Sarawagi S, Thomas S, Agrawal R. Integrating Association Rule Mining with Databases: Alternatives and Implications. Data Mining and Knowledge Discovery Journal, 4(2), 89-125, 2000.
Citation
Unnati Acharya, G.J.Sahani, "Mutual city/state weather forecasting by ANN and HMM – Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.792-796, 2018.
A Survey based on Machine Learning Approaches for Detection of Human Behavioural Lie using physiological sensors and Face Recognition System
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.797-806, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.797806
Abstract
At present there is a huge need of system which uses both physiological and facial data to detect human behavioral lie, thus this survey is based on getting insight for developing a machine learning based technique using facial and physiological data for detection of human behavior. The purpose of this survey is to identify various physiological sensors and their parameters along with sensing data, also to know whether physiological signals are robust and can be controlled by human being or not. It also reviews about various machine learning techniques for face recognition system and presented the most effective face recognition system in our survey. By getting significant understanding of physiological data and facial data with their classification rate it becomes possible to deduce a machine learning based algorithm using facial and physiological data for detection of human behavioral lie. This survey compiled the work done by various author to provide the precise information about the machine learning techniques, physiological sensors, face recognition system for human behavioral lie.
Key-Words / Index Term
Machine learning techniques, Physiological Sensors, Face Recognition, Emotion Recognition, Lie Detection
References
[1] El Naqa, I., & Murphy, M. J. (2015). What is machine learning?.In Machine Learning in Radiation Oncology (pp. 3-11).Springer, Cham.
[2] http://www.contrib.andrew.cmu.edu/~mndarwis/ML.html
[3] Mukhopadhyay, S. C. (2015). Wearable sensors for human activity monitoring: A review. IEEE sensors journal, 15(3), 1321-1330.
[4] Sharma, N., &Gedeon, T. (2012). Objective measures, sensors and computational techniques for stress recognition and classification: A survey. Computer methods and programs in biomedicine, 108(3), 1287-1301.
[5] Bakker, J., Pechenizkiy, M., &Sidorova, N. (2011, December). What`s your current stress level? Detection of stress patterns from GSR sensor data. In Data Mining Workshops (ICDMW), 2011 IEEE 11th International Conference on (pp. 573-580).IEEE.
[6] Jerritta, S., Murugappan, M., Nagarajan, R., & Wan, K. (2011, March). Physiological signals based human emotion recognition: a review. In Signal Processing and its Applications (CSPA), 2011 IEEE 7th International Colloquium on (pp. 410-415). IEEE.
[7] Poh, M. Z., Swenson, N. C., & Picard, R. W. (2010). A wearable sensor for unobtrusive, long-term assessment of electrodermal activity.IEEE transactions on Biomedical engineering, 57(5), 1243-1252.
[8] Liu, M., Fan, D., Zhang, X., & Gong, X. (2016, November). Human emotion recognition based on galvanic skin response signal feature selection and svm. In Smart City and Systems Engineering (ICSCSE), International Conference on (pp. 157-160).IEEE.
[9] Jabid, T., Kabir, M. H., &Chae, O. (2010, September). Facial expression recognition using local directional pattern (LDP).In Image Processing (ICIP), 2010 17th IEEE International Conference on (pp. 1605-1608).IEEE.
[10] Lu, C. Y., Min, H., Gui, J., Zhu, L., & Lei, Y. K. (2013). Face recognition via weighted sparse representation. Journal of Visual Communication and Image Representation, 24(2), 111-116.
[11] Zhao, X., Shi, X., & Zhang, S. (2015). Facial expression recognition via deep learning.IETE technical review, 32(5), 347-355.
[12] Cao, Z., Yin, Q., Tang, X., & Sun, J. (2010, June). Face recognition with learning-based descriptor. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on (pp. 2707-2714). IEEE.
[13] Mohammed, A. A., Minhas, R., Wu, Q. J., & Sid-Ahmed, M. A. (2011). Human face recognition based on multidimensional PCA and extreme learning machine. Pattern Recognition, 44(10-11), 2588-2597
[14] Wioleta, S. (2013, June). Using physiological signals for emotion recognition. In Human System Interaction (HSI), 2013 The 6th International Conference on (pp. 556-561). IEEE.
[15] Nourbakhsh, N., Wang, Y., Chen, F., &Calvo, R. A. (2012, November). Using galvanic skin response for cognitive load measurement in arithmetic and reading tasks. In Proceedings of the 24th Australian Computer-Human Interaction Conference (pp. 420-423).ACM.
[16] Wagner, J., Kim, J., & André, E. (2005, July). From physiological signals to emotions: Implementing and comparing selected methods for feature extraction and classification. In Multimedia and Expo, 2005.ICME 2005. IEEE International Conference on (pp. 940-943). IEEE.
[17] Koelstra, S., Muhl, C., Soleymani, M., Lee, J. S., Yazdani, A., Ebrahimi, T., ...&Patras, I. (2012). Deap: A database for emotion analysis; using physiological signals. IEEE Transactions on Affective Computing, 3(1), 18-31.
[18] Chaves-González, J. M., Vega-Rodríguez, M. A., Gómez-Pulido, J. A., & Sánchez-Pérez, J. M. (2010). Detecting skin in face recognition systems: A colour spaces study. Digital Signal Processing, 20(3), 806-823.
[19]Guo, G., Li, S. Z., & Chan, K. (2000). Face recognition by support vector machines. In Automatic Face and Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference on (pp. 196-201). IEEE.
[20]Ahonen, T., Hadid, A., &Pietikainen, M. (2006). Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis & Machine Intelligence, (12), 2037-2041.
[21]He, X., Yan, S., Hu, Y., Niyogi, P., & Zhang, H. J. (2005). Face recognition using laplacianfaces. IEEE transactions on pattern analysis and machine intelligence, 27(3), 328-340
[22]Gao, Y., & Leung, M. K. (2002). Face recognition using line edge map. IEEE Transactions on Pattern Analysis & Machine Intelligence, (6), 764-779.
Citation
Bishan Lal Thakur, Divyansh Thakur, Payal Pandey, "A Survey based on Machine Learning Approaches for Detection of Human Behavioural Lie using physiological sensors and Face Recognition System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.797-806, 2018.
Unique Patient Identifier for National Ehealthcare Service Delivery: The Indian Approach
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.807-810, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.807810
Abstract
The main objective of the present day eHealthcare is the integrated, interfaced health information systems or networks that should be able to gather, parse, and ensemble the different parts of the medical record pertained to a patient without involving any risk of linking those of another patient. Identifying the multiple fragmented pieces of a specific individual patient data existing in disparate distributed systems for the purposes of exchange remains a challenge though appears to be easy to reach. Many of the countries adopting HL7 family of standards prescribe the Social Security Number or an equivalent or any demographic data of a patient as the Unique Patient Identifier as a data element in the PID division of the EHR. Tagging the distributed data sets with mere numbering needs additional information to confirm the identity of an individual patient and involves many risks. Aadhaar Number concept proves to be a best fix as the UPI. The present paper discusses the related facets to the concept of UPI and the relevance of the Indian Aadhaar Number.
Key-Words / Index Term
Health Level 7; EHR; Unique Patient Identifier; Master Patient Index; Aadhaar Number
References
[1] Mills, M.E. (2006), Linkage of patient records to support continuity of care: Issues and future directions. Stud Health Technology Inform. 122, pp.320-324.
[2] Brook, Emma L., Rosman, Diana L., and Holman, C. D’Arcy J. (2008), Public good through data linkage: measuring research outputs from the Western Australian Data Linkage System. Aust N Z J Public Health. 32(1), pp.19-23. doi:10.1111/j.1753-6405.2008.00160.x
[3] Smith R. (1996), What clinical information do doctors need? BMJ, 313, pp.1062-1068.
[4] Dunn, H.L. (1946), Record linkage. Am J Public Health 36, pp. 1412-1416
[5] Watcher, Robert. The Digital doctor: Hope, Hype, and Harm at the Dawn of Medicine’s Computer Age. New York: McGraw Hill Education Books, 2015.
[6] Litchenwald, Irv. 2015. Available at https://www.healthcareitnews.com/blog/fhir-will-not-save-us-we-need-national-patient-identifiers accessed on 04-06-2017.
[7] Munro, Dan. Part 3: Is Interoperability A Technical or Business Challenge In Healthcare? Excerpt from Casino Healthcare by Dan Munro. Available at http://healthstandards.com/blog/2015/07/21/interop-technical-or-business-p3/ accessed on 21-03-3017.
[8] Biddle, Matthew, "Maintaining the Master Patient Index: The impact of patient registration processes on data integrity" (2015). Applied Research Projects. 32. https://doi.org/10.21007/chp.hiim.0016 http://dc.uthsc.edu/hiimappliedresearch/32
[9] Recommendations from National Patient Safety Agency (NPSA, UK) alerts that remain relevant to NEs (UK). https://improvement.nhs.uk/documents/ 2267/ Recommendations_from_NPSA _alerts_that_remain_relevant_to_NEs_FINAL.pdf
[10] Randall, Sean M. (2015), Privacy preserving record linkage using homomorphic encryption. Workshop on Population Informatics for Big Data (PopInfo’15), Sydney, 10 August 2015.https://dmm.anu.edu.au/popinfo2015/papers/4-randall 2015popinfo2.pdf
[11] Quantin, C., Binquet, C., Bourquard, K., Pattisina, R., Gouyon-Cornet, B., Ferdynus, C., Gouyon, J.B., and François-André, A. (2004), Which are the best identifiers for record linkage? Med Inform Internet Med 29:(3-4), pp.221-7.
[12] Bender, D., and Sartipi, K.HL7 FHIR: An agile and RESTful approach to healthcare information exchange. In: Proceedings of CBMS 2013–26th IEEE International Symposium on Computer-Based Medical Systems. 2013. p. 326–31.
[13] The Government of India, Ministry of Health and Family Welfare. Annual report 2014-2015. Organization and Infrastructure. New Delhi. Available at http://mohfw.nic.in/ WriteReadData/ l892s /563256988745213546.pdf accessed on 12-10-2017Dec 2016.
[14] Agrawal, Shweta., Banerjee, Subhashis., and Sharma, Subodh. Privacy and Security of Aadhaar: A Computer Science Perspective. Available at www.cse.iitd.ernet.in/~ suban /reports/aadhaar.pdf accessed on 26-11-2018.
[15] UIDAI: Inside the World`s Largest Data Management Project. Available at http://www.forbesindia.com/article/big-bet/uidai-inside-the-worlds-largest-datamanagement project/19632/1 accessed on 29-10-2015.
[16] Aadhaar world`s largest biometric ID system. Available at http://timesofindia. indiatimes.com/india/Aadhaarworlds-largest-biometric-ID-system/articleshow/4706 3516.cms accessed on 24-10-2015.
Citation
P. Palanivelrajan, P. Alli, "Unique Patient Identifier for National Ehealthcare Service Delivery: The Indian Approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.807-810, 2018.
A Comprehensive Review of QAM-OFDM Optical Networks
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.811-817, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.811817
Abstract
Orthogonal Frequency Division Multiplexing (OFDM) is a FDM scheme that has the ability to cope with harsh channel conditions without using complex equalization filters. With the introduction of guard band, OFDM offers better orthogonality for the transmission channels affected by high frequency attenuations in copper wire, frequency selective fading and Narrow-Band (NB) interference due to multipath propagation. Each subcarrier is modulated employing a digital modulation scheme such as Quadrature Amplitude Modulation (QAM) with lower symbol rate in order to achieve higher data rates in comparison to single carrier modulation scheme for the given bandwidth. We have studied QAM-OFDM based optical networks in order to obtain higher data rates with lower Bit Error Rate (BER). Variants of OFDM have also been discussed along with its advantages and limitations to achieve the desired optimum performance in the optical networks. This paper presents a detailed study of M-ary QAM OFDM schemes and methods used to overcome effects of Inter Symbol Interference (ISI) and Inter Carrier Interference (ICI) with optimum utilization of system bandwidth.
Key-Words / Index Term
OFDM, ISI, ICI, QAM, Fast Fourier Transform (FFT), Inverse Fast Fourier Transform (IFFT), Discrete Fourier Transform (DFT), Peak to Average Power Ratio (PAPR), NB, Quality of Service (QoS), BER
References
[1] Rajbir, S., Payal, & Deepak, S. (2018). Performance Evaluation of Different Channels in Optical Communication Systems using Optisystem Simulator. International Journal of Innovations & Advancement in Computer Science, 7 (5), 186-192.
[2] Suresh, K. (2012). Study WDM Technology to Achieve Higher Bandwidth Requirements in Optical Fiber Based Backbone Network in Communication Systems. MERI Journal of Management & IT, 5 (2), 65-69.
[3] Suresh, K., Deepak, S., & Abhimanyu, N. (2017). Evaluation of Sub Carrier Multiplexing based RoF System against Non-Linear Distortions using Different Modulation Techniques. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 7 (6), 454-461 DOI: 10.23956/ijarcsse/V7I6/0191.
[4] Payal, Suresh, K., & Deepak, S. (2017). Performance Analysis of NRZ and RZ Modulation Schemes in Optical Fiber Link Using EDFA. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 7 (8), 161-168. DOI: 10.23956/ijarcsse/V7I8/0102 .
[5] Shadbhawana, Jain &Shailendra, Yadav, (2015). A Survey Paper on Digital Modulation Techniques. International Journal of Computer Sciences and Engineering. 3(12), 107-113
[6] Deepak, S., & Suresh, K. (2017). Design and Evaluation of OFDM Based Optical Communication Network. Journal of Engineering and Applied Sciences, 12 (Special Issue 2), 6227-6233 DOI:10.3923/jeasci.2017.6227.6233
[7] T. Deepa and R. Kumar, (2012). Performance of comparison metrics on M-QAM OFDM systems with high power amplifier.World Congress on Information and Communication Technologies, Trivandrum. 909-914.
[8] Faris Mohammed Ali, Eman Abd Almalik Abd Ali, and MayadaGamilTarbul, (2018). Performance Analysis of Radio over Optical Fiber System with OFDM Using Multiplexing Techniques.International Journal of Applied Engineering Research. 13(12) ,pp. 10831-10844.
[9] Cortes, Ainhoa ,Velez, Igone, Turrillas, M, Sevillano, Juan, (2012). Fast Fourier Transform Processors: Implementing FFT and IFFT Cores for OFDM Communication Systems. DOI: 10.5772/36176, pp. 111-134
[10] Yufeng Shao and Wenzhe Ma, (2017). Research on modified selected mapping technique for PAPR reduction and reception performance improvement in 8QAM-OFDM optical access systems. Shao and Ma Journal of the European Optical Society. 1-6 DOI 10.1186/s41476-017-0064-6.
[11] Aradhana Misra and Kandarpa Kumar Sarma, (2012). TCM-coded OFDM assisted by ANN in Wireless Channels. International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN). 1(3).50-55, ISSN No. 2248-9738.
[12] Nilesh Chide, Shreyas Deshmukh, Prof. P. B. Borole, Prof. Nitin Chore, (2013). An Overview of OFDM Variants and Their Applications. International Journal of Electronics Communication and Computer Engineering. 4, 47-51 ISSN 2249–071X.
[13] Anshul C.Gurve , S.S.Wasnik , A.D.Bijwe, Ashwini S. Yerlekar , Nilesh Chide (2014). Study of OFDM Variants and Implementation of OFDM Using fft / ifft..International Journal of Advanced Research in Computer and Communication Engineering. 3(7), pp.7604-7607.
[14] K. A. S. Al- Khateeb, F. Akhter and M. R. Islam (2010). Impact of fiber optic dispersion on the performance of OFDM-QAM system. International Conference on Computer and Communication Engineering (ICCCE`10), Kuala Lumpur.1-5,doi: 10.1109/ICCCE.2010.5556779.
[15] T. Tang, X. Zou, P. Li, W. Pan, B. Luo and L. Yan (2018). Proposal and Demonstration of Subcarrier Index Modulation OFDM for RoF System With Enhanced Spectral Efficiency. Journal of Lightwave Technology, 36(19), 4501-4506.doi: 10.1109/JLT.2018.2829746.
[16] NimayGiri, Madhusmita Das, Rakesh Behera, Pramit Das (2015). Data transmission and reception in mimo-ofdm system using 16-qam technique. International Journal of Multidisciplinary Research and Development. 2(3), 544-547.
[17] Ying Li, Maode Ma, (2014). Transmission of 16-QAM OFDM Signal with Secure Strategy Technique in DD-OOFDM Systems. Applied Mechanics and Materials Trans Tech Publications, Switzerland. 556-562, 5052-5055. doi:10.4028/www.scientific.net/AMM.556-562.
[18] Fan Li, Xinying Li, Lin Chen, Y. Xia, C. Ge, and Y. Chen, (2014). High-Level QAM OFDM System Using DML for Low-Cost Short Reach Optical Communications. IEEE PHOTONICS TECHNOLOGY LETTERS, 26(9) 941-944,doi: 10.1109/LPT.2014.2309660.
Citation
A. Dhingra, S. Kumar, Payal, D. Sharma, S. Dahiya, "A Comprehensive Review of QAM-OFDM Optical Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.811-817, 2018.