A Review Technique of Data Mining in the Agronomy field
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.788-791, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.788791
Abstract
Agriculture is the main source of income in India. India produces various crops such as jute, wheat, rice, sugarcane, cotton, mustard, pulses and many more. Today India acquires 2nd rank worldwide in farming production. In 16 century, 99% of world crop productions are produced by India, Now, it is only produces 23% of agriculture products. However, there are some critical factors that influence the agriculture such as in efficient use of fertilizers, Chemicals, Heavy Rainfall, Degradation/Increment in temperature, PH value, less components value present in soil. This paper provides a systematic analysis by employing data mining techniques. This paper includes some techniques of Supervised and Unsupervised learning methods. In Agriculture domain, multiple linear regressions (MLR), Support vector machine (SVM), K nearest neighbor (KNN), Density-based spatial clustering applications with noise (DBSCAN) are the most widely used data mining algorithm which aimed to solve the issues of the agriculture up to some extent.
Key-Words / Index Term
Agriculture, Yield prediction, Data Mining, MLR, KNN, DBSCAN, SVM, Clustering and Classification
References
[1] D Ramesh, B Vishnu Vardhan, “Analysis of Crop Yield Prediction Using Data Mining Techniques”, International Journal of Advanced Research in Engineering and Technology.
[2] Nikita Gandhi, Leisa Armstrong, “Applying Data Mining Techniques to Predict Yield of Rice in Humid Subtropical Climatic Zone of India”.
[3] Monali Paul, Santosh K. Vishwakarma and Ashok Verma, “Analysis of Soil Behaviour and Prediction of Crop Yield using Data Mining Approach”, IEEE.
[4] Dr. S. Hari Ganesh, Mrs. Jayasudha, “Data Mining Technique to Predict Accuracy of the Soil Fertility”,International Journal of Computer Science and Mobile Computing.
[5] Nikita Gandhi, Leisa Armstrong, “Rice Crop Yield Forecasting of Tropical Wet and Dry Climatic Zone of India Using Data Mining Techniques", 2016 3rd International Conference, Computing for Sustainable Global Development, Pg: 357-363.
[6] Anitha, “A Predictive Modeling Approach for Improving Paddy Crop Productivity using Data Mining Techniques”, Turkish Journal of Electrical Engineering and Computer Science 2017, Pg: 4777-4787.
[7] G.Nasrin Fathima, R.Geetha, “Agriculture Crop Pattern Using Data Mining Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Issue 5,May 2014, Pg: 781-786
[8] Vinayak A. Bhardi, Prachi P. Abhyankar, Ravina S.Patil, Sonal S. Patade, Tejaswani U.Nate, Anaya M.Joshi, “Analysis and Prediction in Agricultural Data using Data Mining Techniques” IJRISE.
[9] Jharna Majumdar, Sneha Naraseeyappa and Shilpa Ankalaki, “Analysis of Agriculture Data using Data Mining Techniques”, Journal of Big data, Springer Open 2017, Pg: 3-15.
[10] Sally Jo Cunningham, Geoffrey Holmes, “Developing Innovative in Agriculture Using Data Mining Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering.
[11] Umid Kumar Dey, Abdullah Hasan Masud, Mohammed Nazim Uddin, “Rice Yield Prediction Model Using Data Mining Techniques”, International Conference on Electrical, Computer and Communication Engineering, February 16-18, 2017, Pg: 321-326.
[12] S. Pudumalar, E.Ramanujam, R. Harine Rajashree, C. Kavya, T. Kiruthika, J. Nisha, “Crop Recommendation System for Precision Agriculture”, 2016 IEEE EIGHT International Conference on Advanced Computing, Pg: 32-36. [13] Neetu Chahal, Anuradha, “A Study on Agricultural Image Processing along with Classification Model”, 2015 IEEE International Advance Computing Conference, , Pg: 942-947.
[14] Pallavi V. Jirapure, Prarthana A. Deshkar, “Qualitative Data Analysis Using Regression Method for Agricultural Data”, 2016 IEEE.
[15] Nikhil Sethi, Dr. Kanwal Garg, “Exploiting Data Mining Technique for Rainfall Prediction”, International Journal of Computer Science and Information Technologies, Vol. 5(3), 2014, Pg: 3982-3984.
[16] Pooja G. Mate, Kavita R. Singh, Anand Khobragade, “Feature Extraction Algorithm for Estimation of Agriculture Acreage from Remote Sensing Images”, 2016 IEEE, Pg: 1-5.
[17] Chowdari K.K, Dr. Girisha R, Dr. K C Gouda, “A Study of Rainfall Over India Using Data Mining”, 2015 IEEE Sponsored International Conference on Emerging Research in Electronics, Computer Science and Technology, Pg: 44-47.
[18] Kuljit Kaur, Kanwakpreet Singh Atwal, “Effect of Temperature and Rainfall on Paddy Yield using Data Mining”, 2017 Seventh International Conference on Cloud Computing, Data Science and Engineering, Pg: 508-511.
[19] Raorane A. A., Kulkarni R. V., “Data Mining: An Effective Tool for Yield Estimation in the Agriculture Sector”, International Journal of Emerging Trends and Technology in Computer Science, July- August 2012, pg.75-79.
[20] P. Hariharan, K.Arulanandham, “Design an Disease Predication Application Using Data Mining Techniques for Effective Query Processing Results”, Advances in Computational Sciences and Technology.
[21] N. Gandhi ,L.Armstrong, O.Petkar and A. Tripathy, “Rice Crop Yield Prediction in India Using Support Vector Machine”, In IEEE, 2016.
[22] T. Ranjeet and L. Armstrong, “An Artificial Neural Network for Predicting Crop Yield in Nepal”, Ninth Conference for Information Technology in Agriculture” ICT’s for future Economic and Sustainable Agricultural Systems”, Perth, Australia.
[23] S. Jabjone and S. Wannasang, “Decision Support System Using Aritifical Neural Network to Predict Rice Production in Phimai Thailand”, IJSCM.
[24] Mehmed Kantardzic, “Data-Mining Concepts”, Edition:1, Copyright year: 2011.
[25] Mrs. Bharati, M. Ramageri “Data Mining Techniques and Applications”, IJCSE
[26] Fuzail Misarwala, KausarMukadam, and Kiran Bhowmick, “Applications of Data Mining in Fraud Detection”, IJCSE.
Citation
U. Singh, K. Garg, "A Review Technique of Data Mining in the Agronomy field," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.788-791, 2018.
Hpnna Based Fss Designing: A Case Study
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.792-796, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.792796
Abstract
Soft computing exploits the biological processes to simplify scientific and technical problems. Correspondingly, soft computing is employed in Frequency Selective Surface designing. In this particular endeavor a Back Propagation Algorithm trained Artificial Neural Network is reported for the designing of single layer Frequency Selective Surface. The prime aspiration was to ascertain the Resonant Frequency and the Band Width of a crossed dipole Frequency Selective Surface. In due course of action and to attain maximized throughput latterly a hybrid Particle Swarm Optimization trained Artificial Neural Network Algorithm is formulated. The empirical study confirmed that Hybrid Particle Swarm Optimization trained Artificial Neural Network is amply efficient and effective for global and fast local searching procedures. Afterward a comparative analysis of Hybrid Particle Swarm Optimization and Back Propagation Algorithm is contemplated.
Key-Words / Index Term
ANN, FSS, BPA, HPNNA, PSO
References
[1]. B Munk , “Frequency Selective Surfaces: Theory and Design “(NewYork: John Wiley & Sons Inc.),2000.
[2]. N. Guerin ; C. Hafner ; X. Cui ; R. Vahldieck, “Compact directive antennas using frequency-selective surfaces (FSS)”,Microwave Conference Proceedings, APMC 2005. Asia-Pacific Conference Proceedings, 2005.
[3]. Ortiz, J. D., Baena, J. D., Marques, R., et al., “A band-pass/stop filter made of srrs and c-srrs" in Antennas and Propagation (APSURSI), 2011 IEEE International Symposium on , 2011.
[4]. Ghaffer I. Kiani and Rabah W. Aldhaheri, “Wide Band FSS for Increased Thermal and Communication Efficiency in Smart Buildings”, IEEE, 2014.
[5]. Woo Cheol Choi, Ki Joon Kim, Young Joong Yoon, “Design of FSS Unit-cell Integrated in Water Bolus for Microwave Biomedical Application” Proceedings of iWEM2014, Sapporo, Japan, 2014.
[6]. Chakravarty, S., Mittra, R. and Williams, N. R., “Application of a microgenetic algorithm (mga) to the design of broadband microwave absorbers using multiple frequency selective surface screens buried in dielectrics”, Antennas and Propagation, IEEE Transactions on, Vol. 50no3), pp. 284-296, 2002.
[7]. Asim EgemenYILMAZ , Mustafa KUZUOGLU, “Design of the Square Loop Frequency Selective Surfaces with Particle Swarm Optimization via the Equivalent Circuit Model”, RADIO ENGINEERING, vol. 18no2, pp95-101,2009.
[8]. M Panda, S Nandi and P P Sarkar, “A comparative study of performance of different back-propagation neural network methods for prediction of resonant frequency of a slot-loaded double-layer frequency-selective surface”, Indian Journal of Physics, 2015.
[9]. Mahuya Panda and Partha Pratim Sarkar, “Prediction Of Periodicity Of FSS Structure Using Particle Swarm Optimization”, I-manager’s Journal on Electronics Engineering, vol. 7 no. 3 ,pp25-31, 2017.
[10]. Kennedy, J., and Eberhart, R., “Particle Swarm Optimization. IEEE International Conference on Neural Networks; Piscataway pp 1942-1948, 1995.
[11]. S Haykin, “Neural Networks, A Comprehensive Foundation” (Englewood Cliffs: Prentice Hall) 2nd edn, 1999.
[12]. Jing-Ru Zhang , Jun Zhang, Tat-Ming Lok , Michael R. Lyu, “ A hybrid particle swarm optimization–back-propagation algorithm for Feed forward neural network training”, Applied Mathematics and Computation , Vol. 185,pp1026–1037, 2007
Citation
Mahuya Panda, Partha Pratim Sarkar, "Hpnna Based Fss Designing: A Case Study," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.792-796, 2018.
Software Related To Rough Set Theory
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.797-799, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.797799
Abstract
The Rough Set Theory is used for incomplete or imperfect knowledge by using the lower and upper approximation. To perusal the data set using Rough Set Theory, many softwares are available. The present paper deals about the softwares which are predominantly utilized for Rough Set Theory in exploring the information system.
Key-Words / Index Term
Rose2, Rosetta, Rough Set Exploration System, Weka, Rough Sets
References
[1]. Z. Pawlak, Rough Sets, Institute of Theoretical and Applied Polish Academy of Sciences.
[2]. R. Silvia and L.-T. Germano, “Rough Set Theory – Fundamental Concepts, Principals, Data Extraction, and Applications”.
[3]. ROSE- Software Implementation of the Rough Set Theory: B. Predki, S R. lowinski, J. Stefanowski, Springer- verlag Berlin Heideberg, 1998.
[4]. IDSS: Laboratory of Intelligent Decision Support System, R. Słowiński, Poznań University of Technology.
[5]. Komorowski`s BioInformatics Lab, Komorowski
[6]. The Rosetta Software System: Ohrn S., Komorowski J., Skowron A., Synak P.
[7]. RoughSets: Data Analysis Using Rough Set and Fuzzy Rough Set Theories, by L. S.Riza, A. Janusz, D. Slezak, C. Cornells, F. Herrera, J.M. Benitez, C. Bergmeir and S. Stawicki.
[8]. A New Version of Rough Set Exploration System: Bazan J. G., Szczuka M. S., Wroblewski J., Spriinger- verlag Berlin Heideberg, 2002.
[9]. Group of Logic, Institute of Mathematics, Warsaw University and the Group of Computer Science, Institute of Mathematics , University of Rzeszów, Poland.
[10]. WEKA: The Wailato Environment for Knowledge Anlysis: S.R. Garnar, Department of computer Science, University of Wailato.
[11]. A survey of Software packages Used for rough set Analysis, Z. Abbas, S.M. A. Burner, Journal of Computer and Communication, 2016, 4, 10 – 18.
Citation
P. Mehta, P. Jain, "Software Related To Rough Set Theory," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.797-799, 2018.
Integrated Automated Agricultural Operations Using Multiple Technologies
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.800-803, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.800803
Abstract
This is a kind of technology is applicable to all type of farm land cultivation. This technology observe actual status of the land and its environment. Based on the observed data it enrich or improve the farmland cultivation. In this system its a combinations of IOT, Big data analytics, wireless sensor network technologies. In Indian scenario all the fertile land are cultivated into an manual farm. So, the yield of the land should be improved because all data`s are observed from sensor as well as traditional knowledge. The proposed system observe the data from environment, soil, water and fertilizer. After the collection of information it will be analyzed. Based on the analysis we take a decision for cultivating the crop. It also take the traditional knowledge for analyzing the cultivation. The proposed system is working in the form of integrated environment. It work like an automated system. In the proposed system consist of the various sensor which are fixed into the fertile land. So, this sensor give the nature of the farmland. The proposed system improve the agriculture cultivation. We can apply this system into an all type of farmland. Whether the land is arid or water rich environment, it can be possible to give the good result.
Key-Words / Index Term
IOT, Sensor, Cloud Computing, Wireless Sensor Network
References
[1]. Indian Government Population Census Report 2011.
[2]. Annual Report 2017-2018 by Department of agriculture cooperation and Farmers welfare,India.
[3]. S.R.Prathiba,Anupama Hongal,M.P.Jyothi “IOT Based Monitoring System in Smart Agriculture”.
[4]. In the Proceedings of the 2017 International Conference on Computer Science and Engineering, India. Published by IEEE,p-81-84.
[5]. 4.Ministry of Environment,forest and Climate change Annual report.
[6]. Annual Report 2017-2018 by Ministry of Environment, Forest and Climate Change.
Citation
B. Anandakumar, "Integrated Automated Agricultural Operations Using Multiple Technologies," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.800-803, 2018.
NOSQL Database: Opportunities and Applications
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.804-807, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.804807
Abstract
In Today’s digital generation the growth of IT industries gradually increase with the volume of data which is generated by the most of applications. To handle such a large amount of data Relational Database are not sufficient. No SQL database is an emerging alternative to the relational database which provides high scalability, performance and high availability. The paper, discuss about different types of NoSQL database with its opportunities and applications.
Key-Words / Index Term
NoSQL Database , Relational Database
References
[1] Leavitt, N.,"WillNoSQL Databases Live Up to Their Promise?"Computer, vol.43, no.2, pp.12-14, Feb. 2010
[2] Comparison of SQL, NOSQL and NEW SQL Database In Light of Internet of Things International Journal of Advances in Electronics and Computer Science, ISSN: 2393-2835
[3] Li, Yishan, and SathiamoorthyManoharan. "A performance comparison of sql and nosql databases." Communications, Computers and Signal Processing (PACRIM), 2013 IEEE Pacific Rim Conference on. IEEE, 2013
[4] Beyer, Mark A., and Douglas Laney. "The importance of ‘big data’: a definition." Stamford, CT: Gartner (2012).
[5] PankajSareen et al, International Journal of Computer Science & Communication Networks,Vol5(5),293-298
[6] Hammed , D., Medero , H., & Mitchell , H. (2014). Comparison of NoSQL and SQL Databases in the Cloud .Proceedings of the Southern Association for InformationSystems Conference (pp. 1-8). Macon, GA: Southern Association for Information Systems Conference.
[7] H. M. L. Dharmasiri , M. D. J. S. Goonetillake,,A Federated Approach on Heterogeneous NoSQL Data Stores, Interna tional Conference on Advances in ICT for Emerging Regions (ICTer): IEEE Computer Society 234 – 239 , 2013
[8] NOSQL: Your Ultimate Guide to the Non-Relational Universe! [online] Available at http://nosql-database.org/
[9] http://bigdata-madesimple.com/top-five-advantages-and-disadvantages-of-nosql/
Citation
Jyoti Kharade, Anil Rama Kale, Dhanaji S. Kharade, "NOSQL Database: Opportunities and Applications," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.804-807, 2018.
B-Frames: Efficiency Analysis for Digital Video Tampering Detection in Videos with Variable GOP Structure
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.808-815, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.808815
Abstract
Digital video tampering is an act of malicious modification of video content. This could be done to hide or cover an object or to alter the meaning conveyed by the digital video. The research performed is summarized in this paper by analyzing various inter frame forgery detection approaches for digital video, proposed so far, highlighting the strengths and weaknesses of each approach discussed. All approaches proposed so far are making use of P-frames for forgery detection. Comparison of P-frames and B-frames has been performed in terms of complexity and accuracy of algorithms developed using each of them. All the way through the research performed, authors tried to access the worth of B-frames in digital video forgery detection.
Key-Words / Index Term
Video Forgery Detection, Group of Pictures (GOP), B-frames, Video tampering, Intra Frame, Predicted Frame, Bi-directional frames, High efficiency video coding
References
[1]. B.G. Haskell and A. Puri: MPEG Video Compression Basics, Chapter 2. In:L. Chiariglione (ed.), The MPEG Representation of Digital Media, DOI 10.1007/978-1-4419-6184-6_2, © Springer Science+Business Media, LLC 2012.
[2]. I. Amerini, R. Becarelli, R. Caldelli, and M. Casini. A feature-based forensic procedure for splicing forgeries. Mathematical problems in Engineering, 2015
[3]. W. Wong and H. Farid “Exposing Digital Forgeries in video by detecting double quantization” Proceeding of MM& SEC 2009, ACM 978-1-59593-857-2/07/0009
[4]. Salam A.Thajeel and Ghazali Bin Sulong:State of the art of copy-move forgery detection techniques: a review. In: IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 6, No 2, November 2013.
[5]. Sowmya K.N., H.R. Chennamma: A survey on video forgery detection. In: International Journal of Computer Engineering and Applications, Volume IX, Issue II, February 2015.
[6]. C. Cruz-Ramos, R. Reyes-Reyes, M. Nakano-Miyatake, H. Perez-Meana: A Blind Video Watermarking Scheme Robust to Frame Attacks Combined with MPEG2 Compression. In: Journal of Applied Research and Technology, Vol. 8, No. 3, December 2010.
[7]. Staffy Kingra, Naveen Aggarwal and Raahat Devender Singh: Video Inter-frame Forgery Detection: A Survey. In: Indian Journal of Scienceand Technology, Vol 9(44), DOI: 10.17485/ijst/2016/v9i44/105142, November 2016.
[8]. Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd Yamani Idna Idris, Suleman Khan and Zaidi Razak: Passive Video Forgery Detection Techniques: A Survey. In: 2014 International Conference on Information Assurance and Security (IAS).
[9]. Tanzeela Qazi, Khizar Hayat, Samee U. Khan, Sajjad A. Madani, Imran A. Khan,Joanna Kołodziej, Hongxiang Li, Weiyao Lin, Kin Choong Yow and Cheng-Zhong Xu: Survey on blind image forgery detection. In: in IET Image Processing, Accepted on 19th February 2013 doi:10.1049/iet-ipr.2012.0388.
[10]. D. Labartino, T.Bianchi, A. De Rosa, M. Fontani, D. V´azquez-Pad,A. Piva, M. Barni, “Localization of Forgeries in MPEG-2 Videothrough GOP Size and DQ Analysis” MMSP’13, Sept. 30 - Oct. 2, 2013, Pula (Sardinia), Italy.
[11]. Umesh Kumar Singh, Chanchala Joshi, Suyash Kumar Singh, "Zero day Attacks Defense Technique for Protecting System against Unknown Vulnerabilities", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.13-18, 2017Su, Y., Zhang, J., Liu, J.: Exposing digital video forgery by detecting motion-compensated edge artifact. In: Proceedings of International Conference on Computational Intelligence and Software Engineering, Wuhan, China. Vol. 1, no. 4, pp. 11–13 (2009).
[12]. Qiong Dong, Gaobo Yang, Ningbo Zhu: A MCEA based passive forensics scheme for detecting frame-based video tampering. In: Digital Investigation, November 2012, DOI:0.1016/j.diin.2012.07.002
[13]. Raahat Devender Singh and Naveen Aggarwal: Video content authentication techniques: a comprehensive survey. In: 19 January 2017 © Springer-Verlag Berlin Heidelberg 2017.
[14]. Huang, Xinyi, and Jianying Zhou, eds. Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings. Vol. 8434. Springer, 2014.
[15]. Javad Abbasi Aghamaleki& Alireza Behrad: Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects. In: Springer Science+Business Media New York 2016, Accepted: 23 September 2016.
[16]. Jingxian Liu and Xiangui Kang: Exposing Heterogeneous Chain of Video Recompression. In: Guangdong Key Lab of Information Security, School of Data and Computer Science, Sun Yat-Sen University, Guangzhou 510006, China.
[17]. Vázquez-Padín, D., Fontani, M., Bianchi, T., Comesana, P., Piva, A. Barni, M.: Detection of video double encoding with GOP size estimation. In: Proceedings on IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 151 (2012)
[18]. Hee-Meng, Ho: ‘Digital Video Forensics: Detecting MPEG-2 Video Tampering through Motion Errors’. In: MSc. Information Security 2011/12, Royal Holloway University of London.
[19]. A. Gironi, M. Fontani, T. Bianchi, A. Piva, M. Barni (2014). A video forensic technique for detecting frame deletion and insertion. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Firenze, May 2014. pp. 6226-6230.
[20]. Xin-Wei Yao, Yue-Feng Cen, Wan-Liang Wang, Xiao-Min Yao, Shuang-Hua Yang and Tie-Qiang Pan: IPB-frame Adaptive Mapping Mechanism for Video Transmission over IEEE 802.11e WLAN. In: ACM SIGCOMM Computer Communication Review, Volume 44, Number 2, April 2014.
[21]. Jianmei Yang & Tianqiang Huang & Lichao Su: Using similarity analysis to detect frame duplication forgery in videos.In: Published online-20 November 2014, Springer Science+Business Media New York 2014.
[22]. A.V. Subramanyam and Sabu Emmanuel: Pixel Estimation Based Video Forgery Detection. In:Acoustics, Speech and Signal Processing, 1988. ICASSP-88., 1988InternationalConference on October 2013.
[23]. Lichao Su & Tianqiang Huang & Jianmei Yang: Avideo forgery detection algorithm based on compressive sensing. In: Springer Science+Business Media New York 2014, 2 March 2014.
[24]. Jianmei Yang & Tianqiang Huang & Lichao Su: Using similarity analysis to detect frame duplication forgery in videos. In: Springer Science+Business Media New York 2014, Published online: 20 November 2014.
[25]. Liyang Yu•Qi Han•Xiamu Niu: Feature point-based copy-move forgery detection: covering the non-textured areas. In: Published online: 4 December 2014 at Springer Science+Business Media New York 2014.
[26]. Mohammad Jafari, Neda Abdollahi, Ali Amiri, Mahmood Fathy, "Generalization of Determinant Kernels for Non-Square Matrix and its Application in Video Retrieval", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.4, pp.1-6, 2015
[27]. Ashish Kumar Kushwaha and Avinash Wadhe: Design and Implementation of Forensic Framework for Video Forensics. In: International Journal of Current Engineering and Technology, Accepted 02 April 2015, Available online 07 April 2015, Vol.5, No.2 (April 2015).
[28]. D. V´azquez-Pad´ın, M. Fontani, T. Bianchi, P. Comesa˜na, A. Piva, M. Barni: Detection of video double encoding with GOP size estimation. In: WIFS‘2012, December, 2-5, 2012, Tenerife, Spain. 978-14244-9080-6/10/$26.00 copyrights-2012 IEEE.
[29]. Markus Flierland Bernd Girod: Generalized B Pictures and the Draft H.264/AVC Video Compression Standard. In: IEEE Transactions on circuits and systems for video technology.
[30]. Bruno Zatt, Marcelo Porto, Jacob Scharcanski, Sergio Bampi: GOP structure adaptive to the video content for efficient H.264/AVC encoding. In Proceedings of ICIP International Conference on Image Processing, September2010.
[31]. Nikhilkumar P. Joglekar1, Dr. P.N. Chatur: A Compressive Survey on Active and Passive Methods for Image Forgery Detection. In: International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 10187-10190.
[32]. Harmanpreet Kaur and Manpreet Kaur: Inter frame Video Duplication Forgery Detection: A Review. In: International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 8 Aug 2015, Page No. 13806-13809.
[33]. Aldrina Christian, Ravi Sheth: Digital Video Forgery Detection and Authentication Technique - A Review. In: 2016 IJSRST | Volume 2 | Issue 6 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X.
Citation
V.Joshi, S. Jain, C. Bansal, "B-Frames: Efficiency Analysis for Digital Video Tampering Detection in Videos with Variable GOP Structure," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.808-815, 2018.
Recommending Based on Analysis of User`s Behaviour in An E-Commerce Website
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.816-820, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.816820
Abstract
The web mining is a process which plays a important role in analyzing the web users behaviour. The web usage mining is a part of web mining has a major influence on web personalization. The aim of this study is the taking out necessary information from web access log files and applying data mining technique for analyzing the shopping behaviour of the customers through online.
Key-Words / Index Term
Data Mining , E-Commerce , WebLog Analysis, Behavioural Patterns
References
[1]. Analysis of users’ behavior in structured e-commerce websites http://ieeexplore.ieee.org/document/7933069/
[2]. Title-Sequential pattern mining from web log data http://www.ijesat.org/Volumes/2012_Vol_02_Iss_02/IJESAT_2012_02_02_10.pdf .
[3]. Cooley, R., Mobasher, B., and Srivastava, J, “Web mining: information and pattern discovery on the World Wide Web”, International Conference on Tools with Artificial Intelligence, Newport Beach, IEEE,1997, pp. 558-567.
[4]. Robert Cooley, Bamshad Mobasher, and Jaideep Srivastava,” Data preparation for mining World Wide Web browsing patterns”, Journal of Knowledge and Information System,1999,pp. 1-27.
[5]. Etzioni, The world-wide Web: quagmire or gold mine? Communications of the ACM 39 (11) (1996) 65–68.
[6]. Chen Hu, Xuli Zong, Chung-wei Lee and Jyh-haw Yeh, “World Wide Web Usage Mining Systems and Technologies”, Systemic, Cybernetics and Informatics Vol. 1 – Number 4.
[7]. Velayathan, Ganesan; Yamada, Seiji (2006). Behavior based web page evaluation. Proceedings of the 16th international conference on World Wide Web, 1317 – 1318. Retrieved May 13, 2010, from ACM Digital Library,http://www.acm.org/dl.
[8]. Dilip Singh Sisodia and S.Verma “Application of Weblogs to Construct Smart Web servers to handle user Traffic efficiently’ International Journal of Advanced Computer Eng ineering and Architecture (IJACEA).
[9]. J. Nielsen, “ Designing Web usability: the practice of simplicity. Indianapolis “ IN: New Riders Press, 2000
[10]. A. Cooper, “The inmates are running the asylum. Indianapolis”, IN: SAMS, 1999.
[11]. J. Preece, Y. Rogers and H. Sharp, “Interaction design”, New York, NY: John Wiley and Sons, Inc, 2002.
[12]. M. Graff, “Individual differences in hypertext browsing strategies”, Behaviour and Information Technology, Vol. 24, no. 2, 2005.
[13]. P. Pirolli, and S. Card, “Information foraging. Psychological Review”, Vol. 106, no. 4, 1999.
[14]. L.D. Catledge, and J.E. Pitkow, “Characterizing browsing strategies in the World-Wide Web”, Computer Networks and ISDN Systems, Vol. 27, no.6, 1995.
[15]. J. Holsanova, “ Tracking multimodal interaction with new media”, Paper presented at the workshop on The Citizen`s Use and Comprehension of Information on the Internet, Uppsala, 2004..
[16]. M.J. Bates, “The design of browsing and berrypicking techniques for the online search interface”, Online Review, Vol. 13, no. 5, 1989
[17]. T. Bray, C.M. Sperberg-McQueen, “ Extensible markup language (XML) 1.0–W3C recommendation”, Technical Report REC-xml-19980210, World Wide Web Consortium, 1998.
[18]. J.R. Punin, M.S. Krishnamoorthy, M.J. Zaki, “Web usage mining–languages and algorithms”, Technical Report, Rensselaer Polytechnic Institute, 2001.
[19]. R. Gobinath and M. Hemalatha, “Optimized Feature Extraction for Identifying user Behavior in Web Mining ”, European Journal of Scientific Research, Vol. 105, no. 3, 2012.
[20]. R. Gobinath and M. Hemalatha, “Improved Preprocessing Techniques for Analyzing Patterns in Web Personalization Process”, International Journal of Computer Application, Vol. 58, no. 3, 2013.
Citation
Siva Jyothi Barla, G.V. Gayathri, "Recommending Based on Analysis of User`s Behaviour in An E-Commerce Website," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.816-820, 2018.
Improving Mediterm Classification in Medical Subject Headings (MeSH)
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.821-825, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.821825
Abstract
A standout amongst the most difficult activities in data frameworks is separating data from unstructured writings, including medical archive classification. A classification calculation that arranges a medical record by examining its substance and classifying it under predefined themes from the Medical Subject Headings (MeSH). It gathered a corpus of 50 full-content diary articles (N=50) from MEDLINE, which were at that point ordered by specialists in light of MeSH. Utilizing natural language processing (NLP), the calculation orders the gathered articles under MeSH subject headings. It assessed the calculation`s result by estimating its accuracy and review of coming about subject headings from the calculation, contrasting outcomes with the real archives` subject headings. The calculation ordered the articles effectively under 45% to 60% of the genuine subject headings and got 40% to 53% of the aggregate subject headings rectify. This holds promising answers for the worldwide wellbeing field to file and arrange medical archives quickly.
Key-Words / Index Term
MeSH, Natural Language Processing, MEDLINE, Classification
References
[1] G. Fabian, T. Wachter, and M. Schroeder, “Extending ontologies by finding siblings using set expansion techniques,” Bioinformatics, vol. 28, no. 12, pp. I292–I300, 2012.
[2] O. Bodenreider, T. C. Rindflesch, and A. Burgun, “Unsupervised, corpus-based method for extending a biomedical terminology,” in Proc. ACL-02 Workshop Natural Language Process. Biomed. Domain, Phildadelphia, PA, USA, 2002, vol. 3, pp. 53–60.
[3] Illhoi Yoo, Xiaohua Hu, “Biomedical Ontology MeSH Improves Document Clustering Qualify on MEDLINE Articles: A Comparison Study”, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS`06), pp. 577 – 582, 2006.
[4] A.Kogilavani, B. Dr.P.Balasubramanie, “Ontology Enhanced Clustering Based Summarization of Medical Documents”, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009.
[5] H. a. N. Al-Mubaid, A., "Measuring semantic similarity between biomedical concepts within multiple ontologies," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 39, pp. 389–398, 2009.
[6] Shengwen Peng, Ronghui You, Hongning Wang, Chengxiang Zhai, Hiroshi Mamitsuka, Shanfeng Zhu, DeepMeSH: deep semantic representation for improving large-scale MeSH
[7] O. Bodenreider and R. Stevens, “Bio-ontologies: Current trends and future directions,” Brief. Bioinform., vol. 7, no. 3, pp. 256–74, 2006.
[8] H. Al-Mubaid and H. A. Nguyen, “A cluster-based approach for semantic similarity in the biomedical domain,” in Conf. Proc. IEEE Eng. Med. Biol. Soc., 2006, vol. 1, pp. 2713–7.
[9] Yu-Wen Guo, Yi-Tsung Tang, Hung-Yu Kao, “Genealogical-Based Method for Multiple Ontology Self-Extension in MeSH”, IEEE Transactions on NanoBioscience, Vol. 13, No. 2, pp. 124 – 130, 2014
[10] Ahmed Al-Saadi, Rossitza Setchi, Yulia Hicks, “Semantic Reasoning in Cognitive Networks for Heterogeneous Wireless Mesh Systems”, IEEE Transactions on Cognitive Communications and Networking, Vol. 3, No. 3, pp. 374 – 389, 2017.
[11] Pandey, Hari, “Review on Web Content Mining Techniques”, International Journal of Computer Applications. Vol. 118. 33-36. 10.5120/20848-3536.
[12] H.A, "Semantic similarity measures in the MESH ontology and their application to information retrieval on medline," Diploma Thesis, Dept. of Electronic and Computer Engineering, Technical Univ. of Crete (TUC), Crete, Greece, 2005.
[13] Xin Li, José-Fernán Martínez, Gregorio Rubio, “A New Fuzzy Ontology Development Methodology (FODM) Proposal”, IEEE Access, Vol. 4, pp. 7111 – 7124, 2016.
[14] Joseph, Sethunya & Sedimo, Kutlwano & Kaniwa, Freeson & Hlomani, Hlomani & Letsholo, Keletso. (2016). Natural Language Processing: A Review. Natural Language Processing: A Review. 6. 207-210.
[15] Morota G, Beissinger TM, Peñagaricano F. MeSH-Informed Enrichment Analysis and MeSH-Guided Semantic Similarity Among Functional Terms and Gene Products in Chicken. G3: Genes|Genomes|Genetics. 2016, 6(8):2447-2453. doi:10.1534/g3.116.031096.
[16] T. C. Rindflesch, J. V. Rajan, and L. Hunter, “Extracting molecular binding relationships from biomedical text,” in Proc. 6th Appl. Natural Language Process. Conf./1st Meet. North Amer. Chapter Assoc. Comput. Linguistics, Proc. Conf. and Proc. Anlp-Naacl 2000 Student Res. Workshop, 2000, pp. 188–195.
[17] D. Sanchez and M. Batet, “Semantic similarity estimation in the biomedical domain: An ontology-based information-theoretic perspective,” J. Biomed. Inform., vol. 44, no. 5, pp. 749–759, 2011.
Citation
R. Aravazhi, M. Chidambaram, "Improving Mediterm Classification in Medical Subject Headings (MeSH)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.821-825, 2018.
Application of A Video And Image Watermarking Based On Histogram Shape
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.826-827, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.826827
Abstract
Digital watermarking is a powerfull tool to protect digital multimedia content from illegal distribution and unatherised acces.Thus it can be used in multimedia applications for videos and images.Here we are proposing a new watermarking scheme which is Histogram based and it can be used to provide high security, robustness.This watermarking is aimed for images and videos also. The shape of histogram of image is manipulated to for the efficient insertion of digital watermarks to the images.The movement of pixels from one region to other will remove the side effect of Gaussian filtering. The proposed system is highly robust as it makes changes to the histogram of the image. The use of secret key improves the security of the proposed system. Also the imperceptiblity of watermarking makes the scheme perfect.Here the three step scenario for watermarking makes a good protection system for digital contents.In video watermarking the video frames are seperated before inserting the watermarks.The digital watermarking can be used in applications like identifying content owners, Protection of video contents,filtering of digital contents,ownership communication,..etc
Key-Words / Index Term
Digital watermarking,Histogram,Content owners
References
[1] S. Xiang, H. J. Kim, and J. Huang, Invariant image watermarking based on statistical features in the low-frequency domain, IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 6, pp. 777790, Jun. 2008.
[2] P. Dong, J. G. Brankov, N. P. Galatsanos, Y. Yang, and F. Davoine, Digital watermarking robust to geometric distortions, IEEE Trans. Image Process., vol. 14, no.12, pp. 21402150, Dec. 2005.
Citation
P. Afeefa, Ihsana Muhammed, "Application of A Video And Image Watermarking Based On Histogram Shape," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.826-827, 2018.
Big Data and its Security Issues
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.828-831, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.828831
Abstract
Big data, as the term implies is a collection of huge amount of data. This can be valuable information to any organization. This huge amount of data requires emerging new technologies and design that makes it easier to take out information. As today world is connected virtually through internet so daily data generated is very high like in the form of zettabytes. As complexity of data has increased, there is a difficulty in managing such data by using traditional computing resources. It’s necessary to secure big data environments from the infringement of confidential data. This paper presents introduction of big data and various security issues in this area.
Key-Words / Index Term
Big data, Security, Privacy
References
[1] https://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-data
[2] BigDataWorkingGroup, “Expanded Top Ten Big Data Security and Privacy Challenges,” 2013. [Online].Available:https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Expanded_Top_Ten_Big_Data_Security_and_Privacy_Challenges.pdf.
[3] Bertino, E. (2015, June). Big data-security and privacy. In Big Data (BigData Congress), 2015 IEEE International Congress on (pp. 757-761). IEEE.
[4] Katal, A., Wazid, M., &Goudar, R. H. (2013, August). Big data: issues, challenges, tools and good practices. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 404-409). IEEE.
[5] Praveena, M. A., &Bharathi, B. (2017, February). A survey paper on big data analytics. In Information Communication and Embedded Systems (ICICES), 2017 International Conference on (pp. 1-9). IEEE.
[6] Chandra, S., Ray, S., &Goswami, R. T. (2017, January). Big Data Security: Survey on Frameworks and Algorithms. In Advance Computing Conference (IACC), 2017 IEEE 7th International (pp. 48-54). IEEE.
[7] Xu, L., & Shi, W. (2016). Security Theories and Practices for Big Data. In Big Data Concepts, Theories, and Applications(pp. 157-192). Springer, Cham.
[8] Sudarsan, S. D., Jetley, R. P., &Ramaswamy, S. (2015). Security and Privacy of Big Data. In Big Data (pp. 121-136). Springer, New Delhi.
[9] Jeong, Y. S., & Shin, S. S. (2016). An efficient authentication scheme to protect user privacy in seamless big data services. Wireless Personal Communications, 86(1), 7-19.
[10] Yang, K., Han, Q., Li, H., Zheng, K., Su, Z., &Shen, X. (2017). An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet of Things Journal, 4(2), 563-571.
[11] Azmi, Z. (2015). Opportunities and Security Challenges of Big Data. In Current and Emerging Trends in Cyber Operations(pp. 181-197). Palgrave Macmillan, London.
[12] Gao, Y., Fu, X., Luo, B., Du, X., &Guizani, M. (2015, December). Haddle: a framework for investigating data leakage attacks in Hadoop. In Global Communications Conference (GLOBECOM), 2015 IEEE (pp. 1-6). IEEE.
[13] "SANS Institute InfoSec Reading Room", Sans.org, 2017. [Online].Available: https://www.sans.org/reading room/whitepapers/dlp/dataloss-prevention-32883.
[14] Jeong, Y. S., & Shin, S. S. (2016). An efficient authentication scheme to protect user privacy in seamless big data services. Wireless Personal Communications, 86(1), 7-19.
[15] Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015, November). A dynamic key length based approach for real-time security verification of big sensing data stream. In International Conference on Web Information Systems Engineering (pp. 93-108). Springer, Cham.
[16] Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., & Chen, J. (2015). MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Transactions on Computers, 64(9), 2609-2622.
[17] Rahman, F., Ahamed, S. I., Yang, J. J., & Wang, Q. (2013, June). PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud. In International Conference on Smart Homes and Health Telematics (pp. 77-85). Springer, Berlin, Heidelberg.
[18] "Types of Network Attacks against Confidentiality, Integrity and Avilability", Omnisecu.com, 2017. [Online].Available:http://www.omnisecu.com/ccna-security/types-of-network attacks.php.
Citation
B. Duhan, D. Singh, "Big Data and its Security Issues," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.828-831, 2018.