A Distinctive Approach on Safe Driving through Interactive and Behavioral Analysis
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.710-714, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.710714
Abstract
As the automobile industry is growing rapidly, every individual has an urge to own the luxurious cars either for comfort or the number of safety features it may provide say the Advanced Driver Assistance System. However, due to the devices, sensors and monitoring systems, it includes such safety features limited to the higher classes of the society. But, safe driving is a requirement for the society as a whole in a holistic understanding. With the growing need for transportation, the life style of human race has transformed a lot. People focus on reaching their destination in minimal time ignoring the safety measures in many instances. This paper elucidates about a mobile application which helps the user in safe driving on different parameters by using smartphone sensors like the Accelerometer and its related technology.
Key-Words / Index Term
Safe Driving, Accelerometer, SmartPhone, Mobile Applications
References
[1] Kianfar, R., Falcone, P., & Fredriksson, J. (2013). Safety verification of automated driving systems. Intelligent Transportation Systems Magazine, IEEE, 5(4), 73-86.
[2] Alonso-Mora, J., Gohl, P., Watson, S., Siegwart, R., & Beardsley, P. (2014, May). Shared control of autonomous vehicles based on velocity space optimization. In Robotics and Automation (ICRA), 2014 IEEE International Conference on (pp. 1639-1645). IEEE.
[3] Higaki, H. (2014, March). Virtual Traffic Signals by Cooperation among Vehicle-Mounted Mobile Computers. In New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on (pp. 1-6). IEEE.
[4] Mondal, A., Sharma, A., Yadav, K., Tripathi, A., Singh, A., & Piratla, N. (2014, July). RoadEye: A System for Personalized Retrieval of Dynamic Road Conditions. In Mobile Data Management (MDM), 2014 IEEE 15th International Conference on (Vol. 1, pp. 297-304). IEEE.
[5] Hata, A. Y., Osorio, F. S., & Wolf, D. F. (2014, June). Robust curb detection and vehicle localization in urban environments. In Intelligent Vehicles Symposium Proceedings, 2014 IEEE (pp. 1257-1262). IEEE.
[6] Chou, W. Y. (2013, November). An adaptive driving assistance system for electric vehicle. In ITS Telecommunications (ITST), 2013 13th International Conference on (pp. 222-225). IEEE.
[7] Chowdhury, P., Kibria Shakim, S. S., Karim, M., & Rhaman, M. (2014, May). Cognitive efficiency in robot control by Emotiv EPOC. In Informatics, Electronics & Vision (ICIEV), 2014 International Conference on (pp. 1-6). IEEE.
[8] Bouraoui, L., Petti, S., Laouiti, A., Fraichard, T., & Parent, M. (2006, September). Cybercar cooperation for safe intersections. In Intelligent Transportation Systems Conference, 2006. ITSC`06. IEEE (pp. 456-461). IEEE.
[9] Sun, Y., Wu, N., Tateno, S., & Ogai, H. (2012, October). Development of driving support system for electric vehicle by using image processing technology. In Control, Automation and Systems (ICCAS), 2012 12th International Conference on (pp. 1965-1968). IEEE.
[10] Akhtar, N., Pandey, K., & Gupta, S. (2014, April). Mobile Application for Safe Driving. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 212-216). IEEE.
[11] Fazeen, M., Gozick, B., Dantu, R., Bhukhiya, M., & González, M. C. (2012). Safe driving using mobile phones. Intelligent Transportation Systems, IEEE Transactions on, 13(3), 1462-1468.
[12] Holovaty, Adrian, and Jacob Kaplan-Moss. The definitive guide to Django: Web development done right. Apress, 2009.
[13] Middleton, Neil, and Richard Schneeman. Heroku: Up and Running: Effortless Application Deployment and Scaling. " O`Reilly Media, Inc.", 2013.
[14] Pedregosa, Fabian, et al. "Scikit-learn: Machine learning in Python." Journal of machine learning research 12.Oct (2011): 2825-2830.
[15] Larman, Craig. Applying UML and patterns: an introduction to object oriented analysis and design and interative development. Pearson Education India, 2012.
[16] McCarthy, Kevin C., Eugenie V. Uhlmann, and Niall R. Lynam. "Complete mirror-based global-positioning system (GPS) navigation solution." U.S. Patent No. 6,477,464. 5 Nov. 2002.
[17] Misra, Pratap, and Per Enge. "Global Positioning System: signals, measurements and performance second edition." Massachusetts: Ganga-Jamuna Press (2006).
[18] Booch, Grady. Object oriented analysis & design with application. Pearson Education India, 2006.
[19] Anandi Mahajan, Pankaj Sharma, "Object Oriented Requirement management Tools for maintaining of status of requirements", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.6, pp.27-30, 2018
[20] N.Sujatha, K. Prakash, "An Efficient and Scalable Auto Recommender System Based on Users Behavior", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.6, pp.35-40, 2018.
[21] A. Jenita Jebamalar, "Efficiency of Data Mining Algorithms Used In Agnostic Data Analytics Insight Tools", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.6, pp.14-18, 2018.
Citation
Kukatlapalli Pradeep Kumar, Thandassery Sugathan Suraj, Vandana Lalit Pandya, Abin Joseph, "A Distinctive Approach on Safe Driving through Interactive and Behavioral Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.710-714, 2019.
A Study on Physical Parameters of Pb-Se-Te-Bi System for Optical Memory Devices
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.715-719, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.715719
Abstract
The Chalcogenide glasses, in last couple of decades, have got a lot of attention because of their promising potential in studies of phase change optical storage media as well as due to interesting structural, physical, electrical, optical and thermal parameters. However, there is a general trend of using some amorphous materials instead of even very carefully prepared crystalline materials, in much needed investigation of such useful chalcogenide based materials. In the present study, the impact of bismuth (Bi) concentration variation on some important physical properties of Pb10Se80-xTe10Bix (x=2, 4, 6, 8, 10, 12, 14, 16 at. %) glassy alloys has been investigated theoretically. Almost all the parameters, studied here, have been found to vary linearly with increase in Bi concentration, thus making this suitable for phase change optical recording and find applications in rewritable optical recording storage media.
Key-Words / Index Term
Chalcogenide Glasses, Average Coordination Number, Lone pair, Mean Bond Energy, Glass Transition Temperature
References
[1] P.K. Singh and D.K. Dwivedi, “Chalcogenide glass: Fabrication techniques, properties and applications”, Ferroelectrics, Vol. 520, Issue 1, pp. 256–273, 2017.
[2] K. J. Rao, Structural Chemistry of Glasses, Elsevier Science & Technology, 2002.
[3] M. K. Agarwal, M. Saxena and S. Gupta, “A Study on Optical Parameters of Ge-Se-Te Thin Film for Optical Storage Devices”, Int. J Comp. Sci. and Engg., Vol.6 , Issue.12 , pp.943-947,2018
[4] S. R. Ovshinsky, “Reversible Electrical Switching Phenomena in Disordered Structures”, Phys. Rev. Lett., Vol. 21, Issue 20, pp. 1450, 1968.
[5] S. Gupta and M. Saxena, “A Study of Physical Parameters of Ge10BixSe80-xSn10 Glasses”, Int. J Pure and Applied Physics, Vol. 14, Issue 2, pp. 131-135, 2018.
[6] L. Heireche, M.M. Heireche. and M. Belhadji, “The Study Of Physical Parameters of SeZnSb Chalcogenide Glasses”, J Non-Oxide Glasses. Vol. 10, Issue 3, pp. 83 – 90, 2018.
[7] A. Kaistha , V.S. Rangra and P. Sharma, “Assessment of physical parameters for quaternary antimony substituted Ge-Se-Te alloys”, Glass Physics and Chemistry, Vol 41, Issue 2, pp. 175-179, 2015.
[8] J.C. Phillips, “Topology of covalent non-crystalline solids, 1. Short-range order in chalcogenide alloys and a-Si (Ge)”, J. Non Cryst. Solids, Vol. 34, pp. 153, 1979.
[9] M.F. Thorpe, “Continuous Deformations in Random Networks”, J Non-Crystalline Solids, Vol. 57, Issue 3, pp. 355-370, 1983.
[10] J. C. Phillips and M. F. Thorpe, “Constraint Theory, Vector Percolation and Glass Formation,” Solid State Comm,Vol. 53, Issue 8, pp. 699-702, 1985.
[11] K. Tanaka, “Structural phase transitions in chalcogenide glasses”, Phys. Rev. B, Vol. 39, Issue 2, pp. 1270-1279,1989.
[12] G. Lucovsky, R.H. Geils, R.C. Keezer, in The Structure of Non-Crystalline Materials, Edited by P. H. Taylor and Francis, London, 1977, 127.
[13] G. Saffarini, “Atomic Density versus Average Coordination Number in Ge–In–Se Glasses”, Vol. 213, Issue 2, pp. 261-265, 1999.
[14] M.F.Thorpe,” Continuous deformations in random networks”, J Non-Crystalline Solids, Vol. 57, Issue 3, pp. 355-370, 1983,
[15] M. Saxena, A. Kukreti, S. Gupta and M.K. Agarwal, “Effect of compositional variations on physical properties of Ge-Se-In glassy semiconductors”, MIT Int. J. Elect. & Comm. Engg., Vol. 3, Issue 1, pp. 29-35, 2013.
[16] M. Saxena, M.K. Agarwal, A. Kukreti, and S. Gupta,” The Influence of Ge concentration on Physical Parameters of GexSb35-xTe65 Glass System”, Adv. in Appl. Sci. Research, Vol. 3, Issue 6, pp. 4010 -4015 , 2012.
[17] L. Pauling, The Nature of Chemical Bonds, Cornell University Press, New York, 1960.
[18] L. Zhenhua, “Chemical bond approach to the chalcogenide glass forming tendency”, J Non-Crystalline Solids, Vol. 127, Issue 3, pp. 298, 1991.
[19] A. K. Kukreti, M. Saxena and N. Rastogi, “Optical, Thermal and Topological Characterization of Quaternary Se65Ge15Te20-aSba Chalcogenide Glasses”, Int. J Adv. Engg. Res. and Sci. Vol-3, Issue 10, pp. 89 – 95, 2016
[20] L, Tichy H.,Ticha, “On the Chemical Threshold in Chalcogenide Glasses”, Materials Letters, Vol.21. Issue 3-4, pp. 313-319. 1994.
[21] L. Tichy and H. Ticha, “Covalent Bond Approach to the Glass-Transition Temperature of Chalcogenide Glasses”, J Non-Cryst Solids, Vol. 189, Issue 1-2, pp. 141-146, 1995.
Citation
Shilpa Gupta, Manuj Kumar Agarwal, Manish Saxena, "A Study on Physical Parameters of Pb-Se-Te-Bi System for Optical Memory Devices," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.715-719, 2019.
A Block Based Scheme using Tuned Tri-threshold Fuzzy Intensification Operators for Underwater Images
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.720-723, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.720723
Abstract
Basically, the contrast and sharpness of the images captured in underwater will be significantly deteriorated and diminished caused by the less perceptibility of the image which is due to the water medium’s physical properties. In this work, improved version of a block based scheme using tuned tri-threshold fuzzy intensification operator for underwater images is proposed. First of all, background image in underwater images are detected by DCT scaling. Later then image enhancement is done by using tuned tri-threshold fuzzy intensification operator and weber’s law. Propoposed algorithm is tested on various underwater images, collected from internet and compared with original block based scheme. Experimental results show that proposed scheme is better than original block based scheme
Key-Words / Index Term
Underwater image, Fuzzy Intensification Operator, PSNR, Entropy, MSE
References
[1] Angélica R. Jiménez-Sánchez et.al. “Morphological Background Detection and Enhancement of Images With Poor Lighting” IEEE transaction on Image Processing vol. 18, no. 3, March 2009.
[2] I. R. Terol-Villalobos, “Morphological image enhancement and segmentation,” in Advances in Imaging and Electron Physics, P. W. Hawkes, Ed. New York: Academic, 2001, pp. 207–273.
[3] I. R. Terol-Villalobos, “Morphological connected contrast mappings based on top-hat criteria: A multiscale contrast approach,” Opt. Eng., vol. 43, no. 7, pp. 1577–1595, 2004.
[4] J. D. Mendiola-Santibañez and I. R. Terol-Villalobos, “Morphological contrast mappings based on the flat zone notion,” Computación y Sistemas vol. 6, pp. 25–37, 2002.
[5] L. Vincent and E. R. Dougherty, “Morphological segmentation for textures and particles,” in Digital Image Processing Methods, E. R. Dougherty, Ed. New York: Marcel Dekker, 1994, pp. 43–102.
[6] Jayanta Mukherjee, Senior Member, IEEE, and Sanjit K. Mitra, Life Fellow, IEEE “Enhancement of Color Images by Scaling the DCT Coefficients” Ieee Transactions On Image Processing, Vol. 17, No. 10, October 2008.
[7] Y. Luo and R. K. Wars, “Removing the blocking artifacts of block based DCT compressed images,” IEEE Trans. Image Process., vol. 12, no. 7, pp. 838–842, Jul. 2003.
[8] J. Jiang and G. Feng, “The spatial relationships of DCT coefficients between a block and its subblocks,” IEEE Trans. Signal Process., vol. 50, no. 5, pp. 1160–1169, May 2002.
[9] Zohair Al-Ameen,” Visibility Enhancement for Images Captured in Dusty Weather via Tuned Tri-threshold Fuzzy Intensification Operators”, I.J. Intelligent Systems and Applications, 2016, 8, 10-17.
[10] A. Saradha Devi et. al.,” A Block Based Scheme For Enhancing Low Luminated Images” The International journal of Multimedia & Its Applications (IJMA) Vol.2, No.3, August 2010.
[11]R. Schettini and S. Corchs, “Underwater image processing: state of the art of restoration and image enhancement methods,” EURASIP J. Adv.Signal Process., 746052, 2010.
Citation
D. Bhadoriya, R. Gupta, M. Gupta, "A Block Based Scheme using Tuned Tri-threshold Fuzzy Intensification Operators for Underwater Images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.720-723, 2019.
An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.724-730, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.724730
Abstract
Generally, Wireless Sensor Networks (WSNs) refers to a spatially distributed autonomous network which consists of several sensor nodes. These nodes sense and transport the data to the sink node through adjacent nodes. Contextual privacy is the main challenging issue in WSN. The attacker node gathers information from traffic patterns between source and sink. The protection of source and sink location is very essential to prevent the attacker from gathering information. An all-direction random routing algorithm (ARR) was proposed to protect source-location from attacker node. This algorithm utilized agent nodes to establish a path between sources and sink nodes using only local decisions. ARR is efficiently protecting source location but it exposes direction information of sink. So in this paper, ARR is improved by injecting fake packets and random walk of real packets to hide direction information. Additionally, the anonymity of source and sink location is improved by Two-fold location privacy protection scheme where anonymity is constructed around the source and sink node based on geographic information to hide actual location. In anonymity region, packets are sent from a fake source node and received by fake sink node. The number of fake source and sink is selected based on traffic flow.
Key-Words / Index Term
Wireless Sensor Network, Contextual privacy, All-direction Random Routing algorithm, Improved All-direction Random Routing algorithm, Two-fold location privacy protecting
References
[1] X. Yi, A. Bouguettaya, D. Georgakopoulos, A. Song, J. Willemson, “Privacy protection for wireless medical sensor data”, IEEE transactions on dependable and secure computing, Vol.13, Issue.3, pp.369-380, 2016.
[2] K. Ravikumar, V. Manikandan, “Detection of Node Capture Attack in Wireless Sensor Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.4, pp.56-61, 2018.
[3] M. Poonam, Mahajan, "WSN: Infrastructure and Applications", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.6-10, 2018.
[4] C. Gentili, G. Valenza, M. Nardelli, A. Lanatà, G. Bertschy, L. Weiner, P. Pietrini, “Longitudinal monitoring of heartbeat dynamics predicts mood changes in bipolar patients: a pilot study”, Journal of affective disorders, Vol.209, pp.30-38, 2017.
[5] L. Ranganath, K.S. Kavya, B.M. Priyanka, A.M. Shruthi, C. VidyaRaj, “Security for Source Node Privacy in Wireless Sensor Networks”, International Research Journal of Engineering and Technology, Vol.4, Issue.4, pp.1307-1309, 2017.
[6] N. Wang, J. Zeng, “All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks”, Sensors, Vol.17, Issue.3, pp.1-18, 2017.
[7] R. Di Pietro, A. Viejo, “Location privacy and resilience in wireless sensor networks querying”, Computer Communications, Vol.34, Issue.3, pp.515-523, 2011.
[8] B. Chakraborty, S. Verma, K.P. Singh, “Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks”, Computers & Security, Vol.77, pp.36-48, 2018.
[9] M. Bradbury, A. Jhumka, M. Leeke, “Hybrid online protocols for source location privacy in wireless sensor networks”, Journal of Parallel and Distributed Computing, Vol.115, pp.67-81, 2018.
[10] M. Raj, N. Li, D. Liu, M. Wright, S.K. Das, “Using data mules to preserve source location privacy in wireless sensor networks”, Pervasive and Mobile Computing, Vol.11, pp.244-260, 2014.
[11] P.K. Roy, J.P. Singh, P. Kumar, M.P. Singh, “Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks”, Procedia Computer Science, Vol.57, pp.936-941, 2015.
[12] J. Deng, R. Han, S. Mishra, “Countermeasures against traffic analysis attacks in wireless sensor networks”, In 2005. SecureComm 2005. IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.113-126, 2005.
Citation
R. Jayanthi, M. Mohanraj, "An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.724-730, 2019.
Secure Voting Using Bio-metric Authentication
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.731-735, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.731735
Abstract
In this era of technology and advancement, everything is getting online. Today people want to be part of everything but didn`t want to spare time for it. So when it comes to voting or polling, giving it time feels a very painful task, so why it should not be online? Online voting system as the name suggests is the concept of getting voting and polling done online, simply termed as ‘Internet Voting`. And to ensure security and authenticity of the vote, biometric authentication is done. This method is smart, quick, reliable, and secure. The earlier voting system was very time consuming and also were not so reliable. In the present day, the commonly used voting machine is EVM (Electronic Voting Machine), which have no mechanisms to verify the voter while casting vote and thus fake votes can be cast. But in the online voting system, Biometric authentication using fingerprint and unique voter identification number (here registration number provided during registration of voter) make it the most secure way of voting. This model covers all the limitation of present time in the voting system and is the most advanced of its time.
Key-Words / Index Term
EVM, BA, TGS, UIDAI
References
[1] S. P. Everett, M. D. Byrne, and K. K. Greene, "Measuring the usability of paper ballots: Efficiency, effectiveness, and satisfaction", Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting, (2006) October 16-20; Santa Monica, USA
[2] S. P. Everett, K. K. Greene, M. D. Byrne, D. S. Wallach, K. Derr, D. Sandler, and T. Torous, "Electronic Voting Machines versus Traditional Methods: Improved Preference, Similar Performance", CHI Proceedings: Measuring, Business, and Voting, (2008) April 5-10; Florence, Italy.
[3] M. Patil, V. Pimplodkar, A. R. Zade, V. Vibhute and R. Ghadge, “A Survey on Voting System Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 1, (2013).
[4] Douglas W. Jones, Early Requirements for Mechanical Voting Systems, First International Workshop on Requirements Engineering for E-voting Systems, Aug. 31, 2009, Atlanta.
[5] Voting methods in Estonia: Statistics about Internet Voting in Estonia VVK
[6] Database: https://uidai.gov.in/
[7] Kerberos Overview- An Authentication Service for Open Network Systems, Document ID:16087
Citation
Lalit Kumar Gupta, Utkarsh Tiwari, Manoj Kumar Chaudhary, Kuldeep Kasaudhan, "Secure Voting Using Bio-metric Authentication," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.731-735, 2019.
Extracting top-k Competitors from Unorganized Data
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.736-742, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.736742
Abstract
Data mining is the dominant area of consideration which makes simpler the profitable expansion evolution such as mining user preferred, mining web material ’s to get boldness about the formation or facilities and mining the competitors of an exact professional. In the fresh competitive vocation expansion, there is a necessity to analyse the competitive constructions and inspirations of an item that ultimate scratch its competitiveness. The guesstimate of competitiveness unceasingly sequences the procurer thoughts in terms of analyses, marks and a generous basis of suggestions from the net and other centers. In this technique, we extend the proper description of the competitiveness among two items, centered on the bazaar sections that they can both cover. A C-Miner++ procedure is planned that speeches the unruly of discovery the top-k competitors of an item in any given market by figuring all the sections in a given market based on excavating huge review datasets and it arises meaning of competitiveness. And also used C-Miner++ with feedback algorithm. Finally, we appraise the excellence of our outcomes and the scalability of our method using numerous datasets from dissimilar fields.
Key-Words / Index Term
C-Miner++ algorithm, Feature extraction, Mining competitors, Score calculation
References
[1] Sk. Wasim Akram, G. Manoj Babu, D. Pratap Roy, G. Lakshmi Narayana Reddy, “A Comprehensive way of finding Top-K Competitors using C-Miner Algorithm”. International Research Journal of Engineering and Technology (IRJET) Volume: 05 Issue: 03 | Mar-2018 www.irjet.net
[2] Gokkul V, Angel Pemala G, “Augmented Competitor Mining With C-Miner Algorithm Based On Product Reviews ”. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 25 Issue 4 – APRIL 2018
[3] George Valkanas, Theodoros Lappas, and Dimitrios Gunopulos, “Mining Competitors from Large Unstructured Datasets”. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TKDE.2017.2705101, IEEE Transactions on Knowledge and Data Engineering
[4] Theodoros Lappas, George Valkanas, Dimitrios Gunopulos, ”Efficient and Domain-Invariant Competitor Mining”,2012.
[5] Mark Bergen, Margaret A. Peteraf, “Competitor Identification and Competitor Analysis: A Broad-Based Managerial Approach”. MANAGERIAL AND DECISION ECONOMICS Manage. Decis. Econ. 23: 157–169 (2002) DOI: 10.1002/mde.1059 .
[6] C. W.-K. Leung, S. C.-F. Chan, F.-L. Chung, and G. Ngai, “A probabilistic rating inference framework for mining user preferences from reviews,”World Wide Web, vol. 14, no. 2, pp. 187–215, 2011
[7] Z. Ma, G. Pant, and O. R. L. Sheng, “Mining competitor relationships from online news: A network-based approach,” Electronic Commerce Research and Applications, 2011.
[8] E. Marrese-Taylor, J. D. Velasquez, F. Bravo- Marquez, and Y. Mat- ´suo, “Identifying customer preferences about tourism products using an aspect-based opinion mining approach,” Procedia Computer Science, vol. 22, pp. 182–191, 2013.
[9] Y.-L. Wu, D. Agrawal, and A. El Abbadi, “Using wavelet decomposition to support progressive and approximate range-sum queries over data cubes,” in CIKM, ser. CIKM ’00, 2000, pp. 414–421.
[10] D. Gunopulos, G. Kollios, V. J. Tsotras, and C. Domeniconi, “Approximating multi-dimensional aggregate range queries over real attributes,” in SIGMOD, 2000, pp. 463–474.
Citation
N. Sathya, R.P. Sathya Prabha, V. Shashvitha, G. Kiruthika, M. Mukesh Patel, "Extracting top-k Competitors from Unorganized Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.736-742, 2019.
A Survey on HealthBot using Machine Learning Algorithms
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.743-749, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.743749
Abstract
Nowadays, People care a lot about their health. Similarly, they have a pocket rocket technical object, which depicts the technological updating of the well beings. There is an application called HealthBot. HealthBot is a computer program planned to re-enact discussion with human clients to procure information approximately his wellbeing status, especially over the Internet. The Wellbeing Bot Benefit could be a SaaS arrangement that engages its accomplices to construct and send compliant, AI-powered wellbeing operators, permitting them to offer their clients brilliantly, personalized get to health-related data and intuitive through a normal discussion encounter. So, on considering the people’s priority list, an application that takes care of one’s health with the help of that technology was considered into account. As an account of such consideration, Rovi 1.0 is born from the three Budding Software engineers. At present, we have such things but this rovi will stand out in many aspects. The main scope & objective of this is to act like a packet nurse. To suggest the medicine for the diseases. It includes the most efficient way of maintaining the report that is useful in any situation. It includes the main supervised learning process that is more efficient. Prevention is better than cure. Systems are needed for dynamic interaction with people to gather Information, Monitor health condition and provide support, especially after hospital discharge or at-home settings. This can be possible by using the healthbot technique. This paper highlights different Information Mining strategies such as classification, clustering, affiliation conjointly highlights related work to dissect and foresee human illness.
Key-Words / Index Term
Random forest algorithm, classification algorithm, clustering algorithm, K-mean, support vector machine
References
[1] Sheetal L. Patil, “Survey Of Data Mining Techniques In Healthcare”, International Research Journal of Innovative Engineering, Volume: 01 Issue: 09, September-2015.
[2] “Classification of large datasets using Random Forest Algorithm in various applications: Survey” ,Mohammed Zakariah Researcher, King Saud University College of Computer and Information Sciences, Riyadh, Kingdom of Saudi Arabia
[3] International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 11, May 2014 “Effective Learning and Classification using Random Forest Algorithm”, 1Vrushali Y Kulkarni, 2 Pradeep K Sinha
[4] “Survey on Comparison of Supervised Learning Classification Algorithms In-depth Study of various Factors that Affect the Speed, Accuracy and Precision of Supervised Learning Algorithms”,1Umair Ahmed and 2T. Manoranjitham.
[5] “Chatbot Using a Knowledge in Database: Human-to-Machine Conversation Modelling”.BayuSetiaji; Ferry Wahyu Wibowo.
[6] “Paging Dr. Bot” – The Emergence of AI and Machine Learning in Healthcare. Michael Woolf, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC, Nashville, TN.
[7] C. A. Caligtan, P. C. Dykes, "Electronic health records and personal health records", Semin Oncol Nurs, vol. 27, pp. 218-228, 2011.
[8] C.M. Bishop, “Pattern recognition and machine learning”, New York: Springer, 2006.
[9] “A survey of machine learning algorithms for big data analytics”.S. Athmaja; M. Hanumanthappa; Vasantha Kavitha
[10] International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016doi: 10.5121/Ijist.2016.6206 53. “Survey Of Data Mini Ng Techniques Used In Healthcare Domain Sheenal Patel and Hardik Patel”
[11] Basic And Weighted K-NN, Innovations in Intelligent Systems and Applications (INISTA),2012. Dhanya P Varghese &Tintu P B, “A Survey On Health Data Using Data Mining Techniques”, International Research Journal of Engineering and Technology (IRJET), Volume:02 Issue: 07, Oct-2015.
[12] “Ensemble Methods for Classification Of Patients For Personalized Medicine With High-Dimensional Data”. Artificial Intelligence in Medicine 41:197–207,2007. related work
Citation
N. Sathya, S. Jayendren, S. Prasanth, S. Sharmila, "A Survey on HealthBot using Machine Learning Algorithms," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.743-749, 2019.
Radar Image Enhancement Model Using Adaptive Kalman Filter
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.750-759, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.750759
Abstract
Echo and noise is one of the critical disturbances that alter the quality of radar images. To reduce the echo and noise in radar images we used adaptive Kalman filter. For radar image enhancement, denoising and echo cancellation are need of the system. In this paper an adaptive Kalman filter based model is proposed to reduce the echo and noise in radar images. The Kalman filter is compared with different parameters. Form experimental results the new proposed adaptive Kalman filter based model gives promising results for echo cancellation and denoising of radar images.
Key-Words / Index Term
Adaptive Kalman filter, echo cancellation, denoising, deblurring, radar images
References
[1]. Mohamed Amine ATTALAH, Toufik LAROUSSI, Aladdine AOUANE, Ali MEHANAOUI“Adaptive Filters for Direct Path and Multipath Interference Cancellation: Application to FM- RTL-SDR Based Passive Bistatic Radar” 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT) 2016, pp 461- 465.
[2]. Paul Zarchan; Howard Musoff (2000). Fundamentals of Kalman Filtering: A Practical Approach. American Institute of Aeronautics and Astronautics, Incorporated. ISBN 978-1-56347- 455-2.
[3]. Kalman, R. E. (1960). "A New Approach to Linear Filtering and Prediction Problems". Journal of Basic Engineering. 82: 35. Doi:10.1115/1.3662552.
[4]. Kelly, Alonzo (1994). "A 3D state space formulation of a navigation Kalman filter for autonomous vehicles" (PDF). DTIC Document: 13. 2006 Corrected Version
[5]. Reid, Ian; Term, Hilary. "Estimation II" (PDF). www.robots.ox.ac.uk. Oxford University. Retrieved 6 August 2014.
[6]. Fakhrul Razi Ahmad, Zakuan; et al. (2018). "Performance Assessment of an Integrated Radar Architecture for Multi-Types Frontal Object Detection for Autonomous Vehicle". 2018 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS). Retrieved 9 January 2019.
[7]. Ahi, Kiarash (26 May 2016). "Modeling of terahertz images based on x-ray images: a novel approach for verification of terahertz images and identification of objects with fine details beyond terahertz resolution". Proc. SPIE 9856, Terahertz Physics, Devices, and Systems X: Advanced Applications in Industry and Defense, 985610. doi:10.1117/12.2228685. Retrieved 26 May2016.
[8]. Chen, Yangkang; Fomel sergey (November-December 2015). “Random noise attenuation using local signal-and-noise orthogonalization”. Geophysics. 80 (6): WD1- WD9_doi:10.1190/GEO2014-0227.1.
[9]. Federico Garc´ıa-Rial, Luis Ubeda-Medina, Jesus´ Graja “Real- time GPU-based image processing for 3-D THz radar” DOI 10.1109/TPDS.2017.2687927, IEEE Transactions on Parallel and Distributed Systems 2017, vol. 28, issue 10, pp 1-13, oct
2017.
[10]. Xianru Liu and Zixing “Advanced Obstacles Detection and
Tracking by Fusing Millimeter Wave Radar and Image Sensor Data” International Conference on Control, Automation and Systems 2010 Oct. 27-30, 2010. [4] B. B. Mohapatra, Vishal Mahajan, Abid Hussain VALRDE, DRDO Bangalore, India, “Post Processing Techniques for Inverse. Synthetic Aperture Radar Imaging” IEEE 2016, Volume: 3. pp 1115-1120.
[11]. B.B Mohapatra, vishal Mahajan, Abid Hussain VA “Post Processing Techniques for Inverse Synthetic Aperture Radar Imaging” 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).
[12]. Qian Bao 1, Yun Lin 1, Wen Hong 1,Bingchen Zhang1
“Multi-circular synthetic aperture radar imaging processing
procedure based on compressive sensing” 4th Int. Workshop on Compressed Sensing on Radar, Sonar, and Remote Sensing 2016, pp 47-50.
[13].Thomas Wagner “Radar Signal Processing for Jointly Estimating Tracks and Micro-Doppler Signatures” Graduate Student Member, IEEE, Reinhard Feger, Member, IEEE and Andreas Stelzer, Member, IEEE 2017, Volume: 5, pp-1220- 1238.
Citation
Pratibha Tiwari, Agya Mishra, "Radar Image Enhancement Model Using Adaptive Kalman Filter," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.750-759, 2019.
To Control Mobile Web Services Access Using Fuzzy Logic
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.760-764, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.760764
Abstract
Now a day’s mobile computing is becoming very popular and web services are new forms of software platform having standard protocols. Web services can be universally deployed and invoked using specified protocols. Implementing web service on Smartphone’s is a tedious process because of several physical restrictions in Smartphone’s. Smartphone’s are physically constrained devices with different operating systems like Android, iOS, blackberry, Symbian and many others. Physical constraints in Smartphone’s are limited memory, low processing power, intermitted wireless connection and limited battery. This factor needs to be considered while implementing web services for mobile devices. In this paper, we evaluate the RESTful web service for Smartphone’s. When picking a service to execute business logic transactions efficiently, we need to consider availability, accessibility, response time, and scalability as quality attributes. While taking into consideration of physical constraints of mobile devices we implement a controlled web service using fuzzy logic.
Key-Words / Index Term
Smartphones, web service, business logic, iOS, Android, Symbian, blackberry, RESTful, fuzzy logic
References
[1] S. Srirama, M. Jarke and W. Prinz, “Mobile Web Service Provisioning”, In the Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), pp. 120-128, Guadeloupe, French Caribbean, February 2006.
[2] R. Fielding, “Architectural styles and the design of network-based software architectures,” Ph.D. dissertation, 2000.
[3] Aijaz, F.; Ali, S.Z.; Chaudhary, M.A.; Walke, B., "Enabling High Performance Mobile Web Services Provisioning," Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th , vol., no., pp.1-6, 20-23 Sept. 2009.
[4] AlShahwan, F., Moessner, K., “Providing SOAP Web Services and RESTful Web Services from Mobile Hosts”, Internet and Web Applications and Services (ICIW), 2010 Fifth, PP. 174-179.
[5] Muhammad Asif, Shikharesh Majumdar, “Partitioning Frameworks for Mobile Web Services Provisioning,” International Journal of Parallel Emergent and Distributed Systems, Volume 26, Issue 6, pp.519-544, 2011.
[6] Wagh K., Thool R., “A Comparative Study of SOAP VS REST Web Services Provisioning Techniques for Mobile Host,” Journal of Information Engineering and Applications, Vol. 2, No. 5, pp.12-16, 2012.
[7] AlShahwan, F., Moessner K., And Carrez F., “Providing and Evaluating the Mobile Web Service Distribution Mechanisms Using Fuzzy Logic,” Journal of Software, vol. 7, no. 7, pp. 1473-1487, 2012.
[8] Van der Westhuizen, C.; Coetzee, M., "A framework for provisioning restful services on mobile devices," Adaptive Science and Technology (ICAST), pp.1,7, 25-27 Nov. 2013
[9] Kishor S. Wagh, R. C. Thool, “Web Service Provisioning on Android Mobile Host,” International Journal of Computer Application, vol. 81, No. 14, pp. 5-11, November 2013.
[10] Chatti Subbalakshmi , Rishi Sayal , H. S. Saini, “S-REST: A design of Secured Protocol for Implementation of RESTful Webservices”, International Journal of Computer Sciences and Engineering, Vol.7, Issue no 1, pp. 665-669, 2019.
[11] Tusha Agarwal, Abhishek Saxena, “A Review on Load Balancing Algorithm in Cloud Computing Using Restful Web Services”, International Journal of Computer Sciences and Engineering, Vol.6, Issue no 7, pp. 704-707, 2018.
Citation
K. S. Wagh, "To Control Mobile Web Services Access Using Fuzzy Logic," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.760-764, 2019.
K-means Clustering Algorithm for Dengue Disease Detection using Tanagra Tool
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.765-768, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.765768
Abstract
Dengue disease caused over the tropical and sub-tropical area which spread by Aedes mosquitoes. Dengue has to turn into a severe healthiness problem occurs frequently in the humid and sub-tropical region. The scientists use the data mining algorithm for preventing and protecting different diseases like Dengue disease. This analysis of the attack of Dengue fever in different districts mainly Puducherry, Tamil Nadu. This paper helps to apply the algorithm for clustering of Dengue fever. After that, the construction of the clustering algorithm depends on the graph-based dataset. The K-Means clustering algorithm is applied to detect Dengue fever.
Key-Words / Index Term
Dengue, Clustering, K-Means
References
[1] P.Manivannan, P. Isakki @ Devi., “Dengue fever prediction using K-Medoid clustering Algorithm”, International Journal of Innovative Research in Computer and Communication Engineering, volume.5, Special Issue.1, March 2017.
[2] Sahanaa C.*, Amit Kumar Mishra, Joy Bazroy., “Trend of Morbidity and Mortality of
Dengue in Tamil Nadu and Puducherry, South India”, International Journal of Community Medicine and Public Health, volume.5, Special Issue.1, January 2018.
[3] Kamran Shaukat et al., “Dengue Fever in Perspective of Clustering Algorithms”, International Journal of Data Mining in Genomics and Proteomics, volume.6, Special Issue.3, 2015.
[4] P.Sathya, Mrs.A.Sumathi.,” Predicting Dengue Fever Using Data Mining techniques”, International Journal of Computer Science and Technology, volume.6, Special Issue.2, March-April 2018.
[5] S.Muthukumaran, E.Ramaraj., “A Multilayered Backpropagation Algorithm to Predict Significant Attributes of UG Pursuing Students Absenteeism at Rural Educational Institution”, International Journal of Computer Science and Engineering, volume.6, Issue.3, December 2018.
[6] P.Manivannan, P.Isakki Devi., “Dengue Fever Prediction using K-Means Clustering Algorithm”, International Conference Techniques in Control, Optimization and Signal Processing, volume.5, Special Issue.1, March 2017.
[7] KR.Sivabalan, E.Ramaraj., “Remote Sensing Satellites and its agricultural development technical aspects”, International Journal of Computer Science and Engineering, volume.6, Special Issue.9, September 2018.
[8] Mohammed Shahadat Hossain, Ishrat Binteh Habib, Karl Andersson, “A Belief Rule-Based Expert System to Diagnose Dengue Fever under Uncertainty”, IEEE Computing Conference, volume.1, Special Issue.5, July 2017.
[9] Shamimul Hasan, Sami Faisal Jamdar et al., “Dengue Virus: A global human threat: Review of Literature”, Journal of International Society of Preventive and Community Dentistry, volume.6, Special Issue.1, Jan-Feb 2016.
Citation
P.Yogapriya, P.Geetha, "K-means Clustering Algorithm for Dengue Disease Detection using Tanagra Tool," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.765-768, 2019.