Security Issues in Wireless Body Area Networks - Review
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.814-818, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.814818
Abstract
Recently, Wireless Body Area Sensor Networks (WBANs) becoming more attractive and have revealed a great prospective in real-time monitoring of the human body. WBANs have attracted an extensive variety of monitoring applications such as sport activity, healthcare and psychoanalysis systems. These wearable sensor systems plays significant role since it monitors and controls the patient life. Security Issues in Wireless Body Area Networks – Review reports the overview of WBAN architecture, various security requirements, WBAN routing protocols. Secure WBAN is essential to develop strong security system in order to protect the life critical applications. However providing security and privacy for wireless sensor network and WBAN is a critical and challenging one. Here a common outlook for secured WBAN is given along with the reviews of various protocols using security and privacy issues.
Key-Words / Index Term
Wireless Body Area Network, Security Issues, Security Requirements, WBAN Routing protocols
References
[1] I.A. Sawaneh, I. Sankoh, D.K. Koroma, “A survey on security issues and wearable sensors in wireless body area network for healthcare system”, 14th International Computer Conference on Wavelet Active Media Technology and Information Processing, pp. 304-308, 2017.
[2] K.K. Venkatasubramanian, A.Banerjee, S.K.S. Gupta, “PSKA: Usable and secure key agreement scheme for body area networks”, IEEE Transactions on Information Technology in Biomedicine, Vol.14, Issue.1, pp. 60-68, 2010.
[3] J. Liu, Z. Zhang, X. Chen, K.S. Kwak, “Certificateless remote anonymous authentication schemes for wirelessbody area networks”, IEEE Transactions on Parallel and Distributed Systems, Vol.25, Issue.2, pp.332-342, 2014.
[4] Y.S. Lee, E. Alasaarela, H. Lee, "Secure key management scheme based on ECC algorithm for patient`s medical information in healthcare system", IEEE International Conference on Information Networking, pp. 453-457, 2014.
[5] L. Jingwei, K.S Kwak. "Hybrid security mechanisms for wireless body area networks", Second International Conference on Ubiquitous and Future Networks, pp. 98-103, 2010.
[6] J.Shen, H.Tan, S.Moh, I.Chung, Q. Liu, Q., X. Sun, X. “Enhanced secure sensor association and key management in wireless body area networks, Journal of Communications and Networks, Vol.17, Issue.5, pp.453-462, 2015.
[7] M.R.K. Naik, P. Samundiswary, “Wireless body area network security issues—Survey”, IEEE International Conference on Control, Instrumentation, Communication and Computational Technologies pp. 190-194, 2016.
[8] D.He, S. Zeadally, N. Kumar, J.H. Lee, “Anonymous authentication for wireless body area networks with provable security”, IEEE Systems Journal, 2016.
[9] M.Gowtham, S.S. Ahila, “Privacy enhanced data communication protocol for wireless body area network”, 4th International Conference on Advanced Computing and Communication Systems, pp. 1-5, 2017.
Citation
G. Sridevi Devasena, S. Kanmani, "Security Issues in Wireless Body Area Networks - Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.814-818, 2018.
An Improved Shuffling Approach Towards Skew Mitigation in Mapreduce
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.819-826, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.819826
Abstract
In MapReduce applications, map tasks are generally launched in parallel and are assigned equal sized input splits to work on. Thus map side skews are rare to occur. In contrast, reduce side skews are much more challenging because the shuffling of the intermediate data, partition sizes and partition assignment to worker nodes cannot be determined at early stages. Therefore it is one of the critical problems in MapReduce model which should be thoroughly studied and possible solutions need to framed. This paper studies various causes of skew and common approaches used for skew mitigation in real world applications. Paper presents a novel approach to address reduce side skew where the large volume of intermediate data is preprocessed by intermediate nodes to make the size of intermediate keys smaller. The partial results from intermediate nodes are collected, aggregated and sent to final worker nodes to generate final output. The proposed model is applicable to applications where there is no interdependency between values of similar keys. The approach used by proposed model is contrary to the approach where the data of skewed nodes is repartitioned dynamically into small fragments and assigned to idle nodes in the cluster.
Key-Words / Index Term
MapReduce, Skew Mitigation, Shuffling, Partitioning
References
[1]. J. Dean and S. Ghemawat, “MapReduce: Simplified Data Processing on Large Clusters”, OSDI 2004.
[2]. Y. Kwon et al, “A study of skew in mapreduce applications”, 5th Open Cirrus Summit, 2011.
[3]. Y.Kwon et al, “Skew-resistant parallel processing of feature-extracting scientific user-defined functions”, in Proceedings of ACM Symposium on Cloud Computing, 2010, pp. 75- 86.
[4]. B. Gufler et al, “Handing Data Skew in MapReduce, in Proceedings of 1st International Conference on Cloud Computing and Services Science”, 2011, pp. 574- 583.
[5]. Y. Kwon et al, “SkewTune: Mitigating skew in MapReduce applications”, ACM 2012, SIGMOD 2012 USA.
[6]. J. Lin, “The Curse of Zipf and Limits to Parallelization: A Look at the stragglers problem in Map Reduce”, July 2009, USA.
[7]. J. Rosen and B. Zhao, “Fine Grained Micro Tasks for MapReduce Skew Handling”, 2012.
[8]. M. Hanif and C. Lee, “An efficient key partitioning scheme for heterogeneous MapReduce clusters”, ICACT 2016, ISBN 978-89-968650-7-0.
[9]. S. Ibrahim et al, “Handling partitioning skew in MapReduce using LEEN”, Springer 2013.
[10]. Y. Le et al, “Online Load Balancing for MapReduce with skewed Data Input”, IEEE Transactions, 2014.
[11]. Y. Guo et al, “iShuffle: Improving Hadoop Performance with shuffle-on-write”, 10th International Conference on Autonomic Computing 2013.
[12]. R. Akbarinia et al, “An efficient solution for processing skewed MapReduce Jobs”, Globe`2015: 8th International Conference on Data Management in Cloud, Grid and P2P Systems, Sep 2015, Spain.
[13]. X. Tang et al, “A Reduce Task Scheduler for MapReduce with minimum transmission cost based on sampling evaluation”, IJDTA, Vol 8, No 1 (2015), pp 1-10.
[14]. Qi Chen et al, “LIBRA: Light Weight data skew mitigation in Map Reduce”, IEEE Transactions on Parallel & Distributed Systems, 2015, Vol 26, Issue 9.
[15]. A. Rasmussen et al. “Themis: an i/o-efficient MapReduce”. In Proceedings of the Third ACM Symposium on Cloud Computing, page 13. ACM, 2012.
[16]. S. Ibrahim et al, “Leen: Locality/fairness-aware key partitioning for MapReduce in the cloud”. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, pages 17–24.IEEE, 2010.
[17]. M. Hammoud et al, “Center-of-gravity reduce task scheduling to lower mapreduce network traffic” in 2012 IEEE 5th International Conference on, pages 49–58. IEEE, 2012.
[18]. M. Hammoud and M.F. Sakr, “Locality-aware reduce task scheduling for mapreduce”. in 2011 IEEE Third International Conference on, pages 570–576. IEEE, 2011.
[19]. M. Zaharia et al, “Improving mapreduce performance in heterogeneous environments”. In Proceedings of the 8th USENIX conference on Operating systems design and implementation, pages 29–42, 2008.
[20]. G. Ananthanarayanan et al, “Reining in the outliers in map-reduce clusters using Mantri”. In Proceedings of the 9th USENIX conference, OSDI’10, pages 1–16, Berkeley, CA, USA, 2010. USENIX Association.
[21]. Zaharia et al, “Delay scheduling: A simple technique for achieving locality and fairness in cluster scheduling”. In Proc. of the ACM European Conference on Computer Systems (EuroSys) 2010).
[22]. M.C. Schatz, “Cloudburst: highly sensitive read mapping with MapReduce”. Bioinformatics, 25(11):1363–1369, 2009.
[23]. R. Vernica et al, “Adpative Map Reduce using Situation aware Mappers”, ACM 978-1-4503-0790-1, EDBT March 26-30, 2012.
[24]. R. Vernica et al, “Efficient parallel set-similarity joins using map reduce”, in Proceedings of SIGMOD Conf, pages 495-506, 2010.
[25]. Q. Chen, C. Liu and Z. Xiao, “Improving MapReduce Performance Using Smart Speculative Execution Strategy”, IEEETransactions on Computers (TC)63(4), 2014.
[26]. Y. Kwon et al, “Managing Skew in Hadoop”, IEEE Computer Society Technical Committee on Data Engineering 2013.
[27]. Y. Gao et al, “Handling data skew in MapReduce cluster by using partitioning tuning”, Journal of Health engineering, Volume (2017), 2017.
[28]. Liu et al, “OPTIMA: on-line partitioning skew mitigation for MapReduce with resource adjustment”, Journal of Network and Systems Management, vol. 24, no. 4, pp. 859–883, 2016.
[29]. Apache Software Foundation, “Hadoop Distributed File System: Architecture and Design”, 2007.
[30]. R. Akbarinia et al, “FP-Hadoop: Efficient Processing of Skewed MapReduce jobs”, Information Systems, Elsevier, 2016, 60, pp- 69-84.
[31]. Z.Liu et al, “Dynamic Resource Allocation for MapReduce with Partitioning Skew”, IEEE Transactions on Computers, Issue No. 11 - Nov. (2016 vol. 65)ISSN: 0018-9340, pp: 3304-3317.
[32]. S. R. Ramakrishnan et al, “Balancing reducer skew in MapReduce workloads using progressive sampling”, in Proceedings of the Third ACM Symposium on Cloud Computing, pp. 16–28, ACM 2012.
[33]. J. Berlinska and M. drozdowski, “Mitigating Partitioning Skew in MapReduce Computations”, MISTA 2013.
[34]. J. Dittrich and J.-A. Quian_e-Ruiz. “Efficient Big Data processing in Hadoop MapReduce”. Proceedings of the VLDB Endowment (PVLDB), 5(12):2014{2015, 2012C. Doulkeridis, K. Norvaget, A Survey of Large Analytical Query Processing in Map-Reduce, the VLDB Journal, 2013.
[35]. B. Arputhamary et al, “EDSHA: An Efficient Data Skew Handling Approach for MapReduce Model using Time Series Data”, IJCTA 9(27) 2016, pp 423-430.
[36]. P. Dhawalia et al, “Chisel++: Handling partitioning skew in MapReduce framework using efficient range partitioning technique”, DIDIC 2014, pp 21-28.
[37]. H. Chang et al, “Scheduling in MapReduce-like systems for fast competition time”, In proceedings of IEEE INFOCOM, China, 2011.
[38]. J.Tan et al, “Coupling task progress for MapReduce resource aware scheduling”, in Proceedings of IEEE INFOCOM, 2013.
[39]. F. Chen et al, “Joint scheduling of processing and shuffle phases in MapReduce systems”, in Proceedings of IEEE INFOCOM, 2012.
[40]. Y. Yuan et al, “On interference-aware provisioning for cloud based big data processing”, in Proceedings of ACM/IEEE IWQoS, June 2013.
[41]. S. Rao et al, “Sailfish- A framework for large scale data processing”, ACM Symposium on Cloud computing, SOCC 2012, UA, 2012.
[42]. Y. Liang et al, “Variable sized map and locality aware reduce on public-resource grids”, Future Gen Computing Systems, 27(6) : 843-849, June 2011.
[43]. M. Isard et al, “Dryad: Distributed Data-parallel programs for sequential building blocks”, In proceedings of EuroSys Conf, 2007.
[44]. K. Devine et al, “Partitioning and Load balancing for emerging parallel applications and architectures”, Chapter 6, Parallel Processing for Scientific Computing, 2006.
[45]. T. Y. Chen et al, “LaSA: A locality-aware scheduling algorithm for Hadoop-MapReduce resource assignment”, Collaboration Technologies and Systems (CTS), 2013, pp. 342-346.
[46]. S. Seo et al, “HPMR: Prefetching and pre-shuffling in shared MapReduce computation environment”, IEEE International Conference, New Orleans, LA, pp. 1-8.
[47]. N.K. Seera and S. Taruna, “Analyzing cost parameters affecting Map Reduce application performance”, I. J. Computer Science and Information Technology, 2016, 8, 50-58.
[48]. N. Kaur and S. Taruna, “Efficient data layouts for cost optimized map reduce operations”, IEEEXplore, 2015, 600-604.
[49]. M. Kaur and G. Dhaliwal, “Performance comparison of MapReduce and Apache Spark on Hadoop for Big Data Analysis”, International Journal of Computer Sciences and Engeering, Vol 3 (11), PP- 66 – 69, Nov 2015.
[50]. M. Dhivya et al, “Hadoop MapReduce Online in Big Figure Analytics”, International Journal of Computer Sciences and Engeering, Vol 2 (9), PP- 100 – 104, Sep 2014.
[51]. J. Rajesh Khanna, “An Enormous Inspection of MapReduce”, International Journal of Scientific Research in Computer Science, Engineering and Information technology, Vol 2, Issue 6, IISN 2
[52]. Ouyang, X, Zhou, H, Clement, et al.,”Mitigate Data Skew Caused Stragglers through ImKP Partition in MapReduce”, Proceedings. 36th IEEE International Performance Computing and Communications Conference (IPCCC), 10-12 Dec 2017, San Diego, California, USA. IEEE.
Citation
N. K. Seera, S. Taruna, "An Improved Shuffling Approach Towards Skew Mitigation in Mapreduce," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.819-826, 2018.
A System Automation using Human Eye Motion Based on Active Appearance Model(AAM)
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.827-830, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.827830
Abstract
Eye detection and tracking has been an active area in the field of research in last few years, since it provide convenience in usage of various applications. One of the applications is where handicapped people with several disabilities cannot take advantage of usage of computer. Hence to facilitate those people, controlling technique is required that can control the system through eye movement. This paper presents a vision-based human-computer interface system which detects deliberate eye blinks and elucidates them as control commands. The active appearance model (AAM) is used for eye motion detection and template matching. The test results indicated that the interface is useful in offering an alternative means of communication with computers to disabled people. The interface is based on a desktop equipped with a PS-3 camera and requires no extra light sources.
Key-Words / Index Term
Active Appearance Model, Eye Detection, Human Computer Interface, Eye Blink detection
References
[1] A. George and A. Routray, “Fast and Accurate Algorithm for Eye Localization for Gaze Tracking in Low Resolution Images”, IET Computer Vision, 2016.
[2] R. Valenti and T. Gevers, “Accurate eye center location through invariant iso-centric patterns,” Pattern Analysis and Machine Intelligence, IEEE, Vol. 34, No. 9, PP. 1785–1798, 2012.
[3] S. Alghowinem, R. Goecke, M. Wagner, “Eye movement analysis for depression detection”, IEEE International Conference on Image Processing,2014.
[4] H. T. Rashid, “Face Recognition Technique Based on Active Appearance Model and Support Vector Machine”, International Journal of Computer Science and Mobile Computing, Vol.5 Iss.5, PP. 540-548, 2016.
[5] A. A. Rahayeeh and M. Faezipour, “Eye tracking and head movement detection-A Sate of Art Survey”, IEEE Journal of Translational Engineering in Health and Medicine, Vol. 1, PP. 2168-2372, 2013.
[6] I. Bacivarov, M. Ionita and P. Corcoran, “Statistical model of appearance for eye tracking and eye blink detection and measurement”‖, IEEE Transactions on Consumer Electronics, Vol. 54, No. 3, PP. 1312 – 1320, 2008.
[7] A. Gupta, A. Rathi and Y. Radhika, “Hands-free PC control‖ Controlling of mouse cursor using eye movements”, International Journal of Scientific and Research Publications, Vol. 2, Iss. 4, PP. 2250- 3153, 2012.
[8] S. Dongre and S. Patil, “Proposed - Simulation of mouse using human face(HCI)”, International Journal of Advanced Research in Computer Engineering & Technology ,Vol. 4 Iss. 7, 2015.
[9] D. W. Hansen, J. P. Hansen, M. Nielsen and A. S. Johansen, “Eye Typing using Markov and Active Appearance Models”, online Available: https://pdfs.semanticscholar.org/e428/ae898ffb414bfea3d23a08609da018daf85b.pdf
[10] S. Baker, I. Matthews and T. Kanade, “Passive Driver Gaze Tracking With Active Appearance Models”, online Available: https://www.ri.cmu.edu/pub_files/pub4/ishikawa_takahiro_2004_2/ishikawa_takahiro_2004_2.pdf
[11] J. A. Medina, B. Qu and S. Zafeiriou, “Statistically Learned Deformable Eye Models”, online Available: https://pdfs.semanticscholar.org/d140/c5add2cddd4a572f07358d666fe00e8f4fe1.pdf
[12] X. Gao, Y. Su, X. Li, “A Review of Active Appearance Models”, IEEE Transactions on Systems, Man, and Cybernetics, Vol. 40, Iss. 2, PP. 145-158, 2010.
Citation
A. Varshney, S. Gupta, L.M. Mohanty, "A System Automation using Human Eye Motion Based on Active Appearance Model(AAM)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.827-830, 2018.
Comparative Study of Integrity Constraints, Storage and Profile Management of Relational and Non-Relational Database using MongoDB and Oracle
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.831-837, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.831837
Abstract
In the last decade, there is a rapid development in web technologies, social media applications and mobile applications which generates unstructured data. The way these applications deal with data has been changed extensively over the last decade. These applications collect more data and more users are accessing these data concurrently than ever before. Thus it is a big challenge for relational databases in terms of scalability and performance to handle these data which has given boost to the initiation of various NoSQL databases. Among the several NoSQL databases, MongoDB is the most popular document store database because of its sharding and aggregation framework coupled with document validations and efficient data manipulation, fine-grained locking, replication facility, administration capabilities and so on. In this paper, we have studied how integrity constraints, contents and resources are managed by MongoDB and also studied various features provided by MongoDB and compared them with the widely used Oracle database.
Key-Words / Index Term
Relational databases, Non-Relational Databases, Integrity Constraints, Relationships, Resources, Profile
References
[1] P. Colombo, E. Ferrari, “Enhancing MongoDB with Purpose-Based Access Control”, IEEE Transactions on Dependable and Secure Computing, Vol. 14, Issue. 6, pp. 591 – 604, 2015.
[2] A MongoDB White Paper, “MongoDB Architecture Guide”, MongoDB 3.2.
[3] An Oracle White Paper, “Effective Resource Management Using Oracle Database Resource Manager”, 2011.
[4] A. Boicea, F. Radulescu, L. Gapin,“MongoDB vs Oracle -- Database Comparison”, Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), 2012, doi: 10.1109/EIDWT.2012.32.
[5] K. Georgiev, “Referential Integrity and Dependencies between Documents in a Document Oriented Database”, GSTF Journal on Computing (JoC), Vol. 2, No. 4, pp. 24-28, 2013.
[6] H. Raja, ”Referential Integrity in Cloud NoSQL Databases”, A thesis submitted to the Victoria University of Wellington, 2012.
[7] V. J. Dindoliwala, R. D. Morena, ”Survey on Security Mechanisms In NoSQL Databases”, International Journal of Advanced Research in Computer Science, Vol. 8, No. 5, pp. 333-338, 2017, ISSN No. 0976-5697.
[8] S. Agrawal, J. Verma, B. Mahidhariya, N. Patel, A. Patel, “Survey on MongoDB: An Open-Source Document Database”, International Journal of Advanced Research in Engineering and Technology, Vol. 6, Issue. 12, pp. 01-11, 2015, ISSN Print: 0976-6480.
[9] Z. Parker, S. Poe, S. Vrbsky, “Comparing nosql Mongodb to an sql db”, proceeding of the 51th ACM Southest Conference, Article No. 5, 2013, ISBN: 978-1-4503-1901-0.
[10] Chaitanya. P, Ranjan H. P, Kiran T. S, Anitha. K, “Implementation of an Efficient MongoDB NoSQL Explorer for Big Data Visualization”, International Journal of Advanced Networking & Applications (IJANA), pp. 444 – 447, ISSN: 0975-0282.
[11] A MongoDB White Paper, “RDBMS to MongoDB Migration Guide”, Considerations and Best Practices, 2018.
[12] K. Bhamra, “A Comparative Analysis of MongoDB and Cassandra”, A thesis presented for the degree of Master of Science, Department of Informatics, University of Bergen, 2017.
[13] Swathi N, “Making your Application Highly Available and Highly Scalable using NoSQL Database (MONGODB)”, International Journal of Advanced Computational Engineering and Networking, Vol. 1, Issue. 7, pp. 40 – 43, 2013, ISSN: 2320-2106.
[14] L. Bonnet, A. Laurent, M. Sala, B. Laurent, N. Sicard, “Reduce, You Say: What NoSQL can do for Data Aggregation and BI in Large Repositories”, 22nd International Workshop on Database and Expert Systems Applications, pp. 483-488, 2011, doi: 10.1109/DEXA.2011.71,
[15] A. Nayak, A. Poriya, D. Poojary, ”Type of NoSQL Databases and its Comparison with Relational Databases”, International Journal of Applied Information Systems (IJAIS), Vol. 5, No. 4, pp. 16-19, 2013, ISSN : 2249-0868.
[16] N. Jatana, S. Puri, M. Ahuja, I. Kathuria, D. Gosain, “A Survey and Comparison of Relational and Non-Relational Database”, International Journal of Engineering Research & Technology, Vol. 1, Issue. 6, pp. 1-5, 2012, ISSN: 2278-0181.
[17] Y. Li, S. Manoharan, “A performance comparison of SQL and NoSQL databases”, IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), pp. 15-19, 2013, Electronic ISBN: 978-1-4799-1501-9.
[18] K. Chodorow, “MongoDB: The Definitive Guide”, 2nd edition, O’Reilly, 2013, ISBN: 978-1-449-34468-9.
[19] B. Jose, S. Abraham, Praveen Kumar V. S., ”Query Performance Analysis in NoSQL and Relational Databases: MongoDB Vs MySQL”, International Journal of Computer Sciences and Engineering, Vol. 6, Special Issue. 4, pp. 179-182, 2018.
Citation
V.J. Dindoliwala, R.D. Morena, "Comparative Study of Integrity Constraints, Storage and Profile Management of Relational and Non-Relational Database using MongoDB and Oracle," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.831-837, 2018.
Tea Algorithm Based Industrial Automation System Using Xbee`s
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.838-845, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.838845
Abstract
Industrial Automation is a field that requires a vast involvement in the safety and the security aspects. The intensity towards this concept may vary according to the nature of the industry. The security feature must be more intense as compared to less complicated industrial plants [1]. Here we are proposing an idea that well suits the kind of industries formerly mentioned. The system is designed to handling the electronic devices (230V AC to 500v AC) and monitor two very important parameters – the fire detection and gas leakage detection. For this we are using basic Xbee module, Pic16f877 Microcontroller (MC), 1pole relays, gas leaking and fire detecting sensors. The Xbee modules provide the communication mechanism between the user module and server module by means if messages. xbee modules provides wireless communication so we have to provide security to the messages by using two mechanism’s. One mechanism is encrypt the messages by using TEA Algorithm, another mechanism is changing the baud rate. Micro Controller will be responsible for handling the electronic devices and sending messages to the Xbee modules and EMBEDDED C programming to handle Micro Controller. The behavior of the system can examined experimentally.
Key-Words / Index Term
Industrial automation, xbee, pic microcontroller, tea algorithm, fire detector, gas detector
References
[1] Archana R. Raut, Dr. L. G. MalikG. H. Raisoni College of Engineering, Nagpur, India.“ ZigBee: The Emerging Technology in Building Automation” International Journal on Computer Science and Engineering (IJCSE) ,2011
[2] D. J. Wheeler and R. M. Needham, “TEA, a tiny encryption algorithm” in Fast Software Encryption: Second International Workshop, B. Preneel,Ed. Springer-Verlag, 1994, pp. 363–366.
[3] William Stalling, “Cryptography and Network Security Principle and Practices”,Fourth Edition, Prentice Hall, 2005.
[4] Clendenin, M. ZigBee`s improved spec in compatible with v1.0, EE Times Europe,[online].Available:
http://eetimes.eu/showArticle.jhtml?articleID=193006080
[5] Walko, J. ZigBeePRO standard gets the all clear, EE Times Europe, [online]. Available:
http://eetimes.eu/showArticle.jhtml?articleID=202401851
[6]ZigBee Alliance Official Site, [online].Available: www.zigbee.org
[7] Sid Katzen, The Quintessential PIC Microcontroller,
Engineering – Monograph (English), 2000,Springer Verlag,
[8] Microcontroller Programming The Micro-chip PIC, Julio Sanchez, Maria P. Canton, CRC Press, Boca Raton London New York, 2007.
[9] PIC micro MCU C® An introduction to programming The Microchip PIC in C By Nigel Gardner, Copyright® Bluebird Electronics 2002, USA
[10] Issa Batarseh," Power Electronic Circuits", Jone Wiley and Sons, Inc © 2004.
[11]Jacob Fraden “ Handbook of modern sensors: physics, designs, and applications”4th Edition.
[12] Thomas Petruzzellis “The alarm, sensor & security circuit cookbook ”
Citation
V.Jagadish Kumar, Bagadhi.Sateesh, R.Kanaka Raju, K.Krishna Kumar, "Tea Algorithm Based Industrial Automation System Using Xbee`s," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.838-845, 2018.
Systematic Review of Broadcast Routing Protocols for VANETs
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.846-849, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.846849
Abstract
Vehicular Ad-hoc Networks routing protocols play an important role for communication between vehicles and road side units. We can’t use protocols of MANETs for VANETs because of different characteristics of VANETs like speed of movement of nodes, direction of movement and dynamic topology etc. Similarly VANETs routing protocols for highway network may not work well for urban areas because of different characteristics of highway network and urban area network. An efficient VANETs routing protocol should be able to send message to accurate destination with minimum delay and minimum overhead. Some routing protocols for VANET uses multicast approach and some uses broadcast approach. In this paper we will study various VANET broadcast routing protocols and will study their performance by comparing various parameters network reachability, received distance, transmission overhead and reception overhead.
Key-Words / Index Term
Routing protocols, wireless networks, connectivity
References
[1] Amit Dua, Neeraj Kumar and Seema Bawa, “Systematic review of vanet routing protocols” Elsevier vehicular communications pages 33-52, 2014.
[2] WantaneeViriyasitavat, Fan Bai, and Ozan K. Tonguz, “UV-CAST: An Urban Vehicular Broadcast Protocol”2010 IEEE Vehicular Networking Conference (VNC).
[3] Romeu Monteiro, Susana Sargento, “Improving VANET Protocols via Network Science” 2012 IEEE Vehicular Networking Conference (VNC).
[4] Romeu Monteiro, WantaneeViriyasitavat, Susana Sargento, Ozan K. Tonguz, “A graph structure approach to improving message disseminationin vehicular networks”,Springer Science+Business Media New York 2016
[5] B. Paul, M. Ibrahim, M. Bikas, and A. Naser, “Vanet routing protocols: Pros andcons," arXiv preprint arXiv:1204.1201, 2012.
[6] Y.MohanSharma and S. Mukherjee, “A contemporary proportional exploration of
numerous routing protocols in vanet," International Journal of Computer Applications, vol. 50, no. 21, pp. 14{21, 2012.
[7] M. Slavik and I. Mahgoub, “Spatial distribution and channel quality adaptive proto-
col for multihop wireless broadcast routing in vanet," IEEE Transactions on Mobile
Computing, vol. 12, no. 4, pp. 722-734, 2013.
[8] E. Spaho, L. Barolli, G. Mino, F. Xhafa, and V. Kolici, “Vanet simulators: Asurvey on mobility and routing protocols," in Broadband and Wireless Computing,Communication and Applications (BWCCA), 2011 International Conference on.
IEEE, 2011, pp. 1-10.
[9] K. C. Lee, U. Lee, and M. Gerla, “Survey of routing protocols in vehicular ad hoc networks," Advances in vehicular ad-hoc networks: Developments and challenges,
pp. 149-170, 2010.
[10]R. A. A. Baraa T. Sharef, Mahamod Ismail and Sardar Muhammad Bilal, "A Comparison of Various Vehicular ad hocRouting Protocols Based on Communication Environments," The 7th International Conference on UbiquitousInformation Management and Communication, pp. Kota Kinabalu, Malaysia 17-19 January 2013.
[11]M. Durresi, A. Durresi, and L. Barolli, "Emergency broadcast protocol for inter-vehicle communications," in Paralleland Distributed Systems, 2005 Proceedings. 11th International Conference on, 2005, pp. 402-406.
[12] N. Garg, S.Singla and S.Jangra, “Challenges and Techniques for Testing of Big” published in the Journal, “Procedia Computer Science (Elsevier)”, 85 (2016), Pg. 940-948, DOI: 10.1016/j.procs.2016.05.285, ISSN: 1877-0509.
[13] Ritesh Gupta and Parimal Patel, “An Improved Performance of Greedy Perimeter Stateless Routing protocol of Vehicular Adhoc Network in Urban Realistic Scenarios” published inInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology Volume 1, Issue 1,ISSN : 2456-3307, 2016.
[14] Lubdha M. Bendale, Roshani. L. Jain and Gayatri D. Patil, “Study of Various Routing Protocols in Mobile Ad-Hoc Networks” published in International Journal of Scientific Research in Network Security and Communication Vol.06 , Special Issue.01 , pp.1-5, Jan-2018.
Citation
Jagtar Singh, Sanjay Singla, Surender Jangra, "Systematic Review of Broadcast Routing Protocols for VANETs," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.846-849, 2018.
Concentric Study on Intrusion Detection System Types Tools & Techniques
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.850-855, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.850855
Abstract
It has become clear that increasing the diversity of types of network networks is becoming a major challenge. This leads to the need to expand the data and exchange more and more information. Intrusion Detection Systems (IDS) are designed to try to eliminate the unauthorized use of this method to detect abuse and misuse of computer systems. In response to the growing use and development of IDS, this would be the most important aspect. In this article, we identify a number of general technical optimizations of the IDS. This article provides methodological details, including intrusion strategies. This article also contains general information about IDS intruders and our work on motivation. This article mainly deals with different methods of optimization and classification. Here, different approaches are mentioned regarding intrusion detection systems.
Key-Words / Index Term
It has become clear that increasing the diversity of types of network networks is becoming a major challenge. This leads to the need to expand the data and exchange more and more information. Intrusion Detection Systems (IDS) are designed to try to eliminate the unauthorized use of this method to detect abuse and misuse of computer systems. In resp
References
[1] A.M. Riyad, M.S. Irfan Ahmed and R.L. Raheemaa Khan “Multi agent based intrusion detection architecture for the IDS adaptation over time”, Second International Conference on Electrical, Computer and Communication Technologies (ICECCT),IEEE,2017
[2] Sara Chadli,Mohamed Emharraf and Mohammed Saber "The design of an IDS architecture for MANET based on multi-agent" International Colloquium on Information Science and Technology (CiSt),IEEE,2014
[3] Okan Can "Mobile agent based intrusion detection system”, 22nd Signal Processing and Communications Applications Conference (SIU), 2014
[4] Wang Yu, Cheng, Xiaohui and Wang Sheng ,“Anomaly Network Detection Model Based on Mobile Agent”, IEEE,Third International Conference on Measuring Technology and Mechatronics Automation, 2011
[5] Jaydip Sen “An Agent-Based Intrusion Detection System for Local Area Networks” published in International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2, No. 2, August 2010 PP 128-140
[6] Mr. Suryawanshi G.R, Prof. Vanjale S.B “Mobile Agent for Distributed Intrusion detection System in Distributed System” Publication in" International Journal of Artificial Intelligence and Computational Research (IJAICR.) ", Jan-June 2010 . ISSN-0975-3974. PP 1-8.
[7] Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee*, Ronald A. Olsson, “A Methodology for Testing Intrusion Detection Systems”
[8] Ionita, I.; Ionita, L. “An agent-based approach for building an intrusion detection system” Published in Networking in Education and Research, 2013 RoEduNet International Conference 12th Edition 26-28 Sept. 2013
[9] Faizal, M.A., Mohd Zaki M., Shahrin Sahib, Robiah, Y., Siti Rahayu, S., and Asrul Hadi, Y. “Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System”, Second International Conference on Network Applications, Protocols and Services, IEEE, 2010.
[10] Jitendra S Rathore, Praneet Saurabh, Bhupendra Verma “AgentOuro: A Novelty Based Intrusion Detection and Prevention System” Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on 3-5 Nov. 2012
[11] Cuppen, F. & Miege, A. (2002). Alert Correlation in a Cooperative Intrusion Detection Framewok. In Proceeding of the 2002 IEEE Symposium on Security and Privacy. IEEE, 2002
[12] Cabrera, J.B.D., Ravichandran, B & Mehra R.K. (2000). Statistical Traffic Modelling for Network Intrusion Detection. In Proceeding of the IEEE Conference.
[13] Yeophantong, T, Pakdeepinit, P., Moemeng, P & Daengdej, J.,.Network Traffic Classification Using Dynamic State Classifier. In Proceeding of IEEE Conference, 2005
[14] Farah J., Mantaceur Z. & Mohamed BA. (2007). A Framework for an Adaptive Intrusion Detection System using Bayesion Network. Proceeding of the Intelligence and Security Informatics, IEEE, 2007
[15] Cabrera, J.B.D., Ravichandran, B & Mehra R.K. (2000). Statistical Traffic Modelling for Network Intrusion Detection. In Proceeding of the IEEE Conference.
[16] Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H. & Zhou, S. (2002). Spesification-based Anomaly Detection: A New Approach for Detecting Network Intrusions. In Proceeding of CCS ACM Conference.
[17] Xiao-Yuan Yang , Xuan-Wu Zhou , Ping Wei and Li-Xian Wei"Hybrid NIDS based on biological immunology", Proceedings of 2004 International Conference on Machine Learning and Cybernetics,2004
[18] Qiang Xue , Lin-Lin Guo and Ji-Zhou Sun"The design of a distributed network intrusion detection system IA-NIDS", Proceedings of the 2003 International Conference on Machine Learning and Cybernetics,2003
[19] Karl Levitt. (2002). Intrusion Detection: Current Capabilities and Future Direction. Proceeding of IEEE Conference of the 18th Annual Computer Security Application, IEEE, 2002.
[20] Anderson, J.P., 1980. Computer Security and Threat Monitoring Surveillance. Technical report at Co. Fort Washington Pennsylvania.
[21] David Geer, Behavior-Based Network Security Goes Mainstream, IEEE,14-17, march 2006
[22] Tiwari Nitin, S. R. Singh and P. G. Singh, Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS), International Science Congress Association , 51-56, July (2012).
[23] Karen Scarfone, Peter Mell, Guide to Intrusion detection and prevention systems (IDPS), NIST, 1 to 127, 2007.
[24] B. Santos Kumar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, 77 – 82, “Intrusion Detection System- Types and Prevention”.
[25] Volume 2, Issue 8, August 2012, “ An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols”.
[26] Giovanni Vigna William Robertson Vishal Kher Richard A. Kemmerer, “A Stateful Intrusion Detection System for World-Wide Web Servers”.
[27] C. Krügel, T. Toth, Applying Mobile Agent Technology to Intrusion Detection, ICSE Workshop on Software Engineering and Mobility, 2001
[28] Mukesh Sharma,Akhil Kaushik, Amit Sangwan Performance Analysis of Real Time Intrusion Detection and Prevention System using Snort.,IJERT, July – 2012
[29] Vaishali T.Deshmukh, Shubhangi Vaikole, Layered Crf A Model To Build More Accurate Intrusion Detection System, IJERT, 2012
[30] Bin Zeng , Lu Yao and ZhiChen Chen"A network intrusion detection system with the snooping agents",International Conference on Computer Application and System Modeling, 2010
Citation
S. K. Tiwari, D. S. Pandey, V. Namdeo, "Concentric Study on Intrusion Detection System Types Tools & Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.850-855, 2018.
Named Entity Recognition (NER) for Hindi
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.856-859, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.856859
Abstract
In this paper, we present the issues and technique for recognition of named entities present in Hindi language text. Here, we discussed the categorization of Unknown word as named entity. Name entities includes person names, city names, email, web addresses etc. The main problem while identifying these words is that its meaning is not present in the dictionary. Our focus revolve around a hybrid approach consists of two sub-approaches such as corpus based and rule based hybrid approach. Experimental results have been shown to measure the accuracy of the system.
Key-Words / Index Term
Named Entity Recognition, Unknown Words, Annotated Corpus, Tokenization
References
[1]. Deepti Chopra, Sudha Morwal, “Named Entity Recognition in Punjabi using Hidden Markov Model”, International Journal of Computer Science & Engineering Technology, Vol. 3,issue 12,pp 616-620 ,2012
[2]. Hinal Shah, Prachi Bhandari, Krunal Mistry, Shivani Thakor, Mishika Patel and Kamini Ahir “Study Of Named Entity Recognition For Indian Languages” International Journal of Information Sciences and Techniques vol 6, issue 1/2, pp.11-25,2016.
[3]. Kamaldeep Kaur , Vishal Gupta, “Name Entity Recognition for Punjabi Language”, International Journal of Computer Science and Information Technology & Security, Vol. 2, No.3, pp 16051-16055, 2012.
[4]. L. Jimmy, Darvinder Kaur, “Named Entity Recognition in Manipuri: A Hybrid Approach”, Springer International Publishing AG, Part of Springer Science Business Media, Vol. 8105, pp 104- 110.
[5]. Murali Nandi, Ramasree R.J. “ Rule-based Extraction of Multi-Word Expressions for Elementary Sanskrit Texts” International Journal of Advanced Research in Computer Science and Software Engineering, vol 3, issue 11, pp.661-667, 2013.
[6]. Navneet Kaur Aulakh, Yadwinder Kaur, “Optimized name entity recognition of machine translation”, International Journal for Research In applied science and Engineering Technolo gy, Vol. 2, issue 6, pp24-30,2014.
[7]. Prakash Hiremath, Shambhavi B. R “Approaches to Named Entity Recognition in Indian Languages: A Study” International Journal of Engineering and Advanced Technology, vol 3, issue 6, pp.191-194, 2014.
[8]. Rakhi Joon, Archana Singhal “Analysis Of MWE In Hindi Text Using Nltk” International Journal on Natural Language Computing, vol 6, issue 1, pp.13-22,2017.
[9]. Shachi Mall, Umesh Chandra Jaiswal “ Survey: Machine Translation for Indian Language” International Journal of Applied Engineering Research, vol 13, issue 1, pp.202-209,2018
[10]. Shilpi Srivastava, Mukund Sanglikar, D.C Kothari “Named Entity Recognition System for Hindi Language: A Hybrid Approach” International Journal of Computational Linguistics vol 2, issue 1, pp.10-23, 2011.
[11]. Vivek Dubey , Pankaj Raghuwanshi , Sapna Vyas “Impact of Multiword Expression in English Hindi Language” International Journal of Emerging Trends & Technology in Computer Science, vol 4, issue 3, pp.101-105,2015
[12]. Yavrajdeep Kaur, Rishamjot Kaur “Named Entity Recognition (NER) system for Hindi Language Using combination of Rule Based Approach and List Look up Approach” International journal of scientific research and management, vol 3, issue 3, pp.2300-2306,2015.
[13]. Amit Goyal “Named Entity Recognition for South Asian Languages” Proceedings of the IJCNLP-08 Workshop on NER for South and South East Asian Languages pp.89-96, 2008.
[14]. Anil Kumar Singh” Extraction and Translation of Multi Word Number Expressions” Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007
[15]. Janine Toole “Categorizing unknown words: using decision tree to identify Names and Misspellings” Annual conference of North America,2000
[16]. Liling Tan, Santanu Pal” Manawi: Using Multi-Word Expressions and Named Entities to Improve Machine Translation” Proceedings of the Ninth Workshop on Statistical Machine Translation pp.201-206, 2014.
[17]. Rai Mahesh Kumar Sinha, "Stepwise Mining of Multi-Word Expressions in Hindi" Proceedings of the Workshop on Multiword Expressions: from Parsing and Generation to the Real World (MWE 2011), pp 110–115, 2011.
[18]. Rajesh Sharma & Vishal Goyal, “Name Entity Recognition Systems for Hindi using CRF approach”, International Conference on Information Systems for Indian Languages , pp 31-35 2011.
Citation
Prince Rana, Sunil Kumar Gupta, Kamlesh Dutta, "Named Entity Recognition (NER) for Hindi," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.856-859, 2018.
Phishing URL Detection using Neural Network Optimized by Cultural Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.860-863, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.860863
Abstract
Internet scams are numerous and varied. Anyone is likely to be the target of an attack while browsing the net. More and more crooks do not hesitate to use Social Engineering as a lever to acquire sensitive data unfairly by exploiting human flaws. Phishing is a Social Engineering technique used by these hackers. It is used to steal personal information in order to commit an identity theft without the knowledge of their victims. The persuasion power of these crooks is the keystone of a successful attack. This work aims to collect, map and model elements that will lead to the finding of phishing URL automatically, for this purpose data mining is used as basic tools, in this sense, it is considered that the existing patterns in a URL make it possible to distinguish the legitimate link for pages, the identification of these patterns will serve to model a successful classification method, for this purpose, the attributes found in the database "phishing web" that correspond to patterns of phishing pages will be validated, at the same time will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered which consists of cultural algorithm optimized neural network classifier.
Key-Words / Index Term
Cultural Algorithm, Neural Network, Phishing URL
References
[1] C. Whittaker, B. Ryner and M. Nazif, “Large-scale automatic classification of phishing pages,” in In: Proc. 17th Annual Network and Distributed System Security Symposium, NDSS‟10, San Diego, CA, USA, 2010.
[2] Basnet, Ram B., Andrew H. Sung and Quingzhong Liu, ““Learning to detect phishing URLs,” IJRET: International Journal of Research in Engineering and Technology, vol. 6, pp. 11-24, 2014.
[3] Xiang G., Hong J., Rose C. P. and Cranor L. , “CANTINA+: A feature-rich machine learning framework for detecting phishing Web sites,” ACM Trans. Inf. Syst. Secur. 14, 2, Article 21, p. 28, September 2011.
[4] Christos Stergiou and Dimitrios Siganos, “Neural Networks”, Report available at: http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/cs11/report.html
[5] Reynolds, Robert G. "An introduction to cultural algorithms." In Proceedings of the third annual conference on evolutionary programming, pp. 131-139. Singapore, 1994.
Citation
A. Haider, R. Singh, "Phishing URL Detection using Neural Network Optimized by Cultural Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.860-863, 2018.
Handwritten Digit Recognition Using Convolution Neural Network
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.864-868, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.864868
Abstract
This survey aims to present Handwritten digit recognition technique. The handwritten digit recognition technique is extremely nonlinear problem. Recognition of handwritten numerals plays an active role in day to day life now days. Office automation, e-governors and many other areas are reading printed or handwritten documents and convert them to digital media is very crucial and time consuming task. So the system should be designed in such a way that it should be capable of reading handwritten numerals and provide appropriate response as humans do. However, handwritten digits are varying from person to person because each one has their own style of writing, means the same digit or character/word written by a different writer will be different even in different languages. This paper presents a survey on handwritten digit recognition systems with recent techniques, with three well known classifiers namely MLP, SVM and can used for classification. This paper presents a comparative analysis that describes recent methods and helps to find future scope.
Key-Words / Index Term
This paper presents a comparative analysis that describes recent methods and helps to find future scope.
References
[1] Vineet Singh, sunil Pranit Lal(2014). Digit Recognition Using Single Layer Neural Network with Principal Component Analysis(online),available: https://ieeexplore.ieee.org/abstract/document/7053842/
[2] S.Espana-boquera, M.J.Castro-Bleda, J. Gorge-Moya(2011) Improving offline handwritten text recognition with Hybrid HMM/ANN models.
[3] D.Claudia Ciresan and Veli Meier, L.Maria and J. Schmidhuber (2011) Convolution Neural Network Committes for handwritten Character Classification.
[4] O.awadele and O.Jegeda(2009). Neural Network and Its Application In Engineering.(IJRE)Inaugural Issue,ISSN 1043-7134.
[5] Lorigo, L. M. &Venu, G., (2006). “Off-line Arabic handwritten recognition” IEEE, vol . 28, Pages:40,1-40.
[6] Al-Rashaideh H. (2006).Preprocessing phase for Arabic word handwritten recognition. Том 6, № 1, 2006, стр. 11-19
[7] Teredesai, A. Ratzlaff, E. Subrahmonia J. &Govindaraju V. (2002). On-Line digit recognition using off-line features”.vol.6.No.1,pp.11-19 ICVGIP 2002, Proceedings of the Third Indian Conference on Computer Vision, Graphics Image Processing, Ahmadabad, India. (Online), available: http://www.ee.iitb.ac.in/~icvgip/PAPERS/321.pdf.
[8] Klassen, T. (2001). Towards neural network recognition of handwritten Arabic letters.(1989)vol19,no.1,pp.1-12 (Online), available: http://users.cs.dal.ca/~mheywood/Reports/TKlassen.pdf
[9] Mashor, M. Y., Sulaiman, S. N., (2001). Recognition of Noisy Numerals using Neural Network. International Journal of the Computer, the Internet and Management, vol. 9(3), 45-52
[10] Al-Imo˘glu, F. &Alpaydin, E., (2001). Combining multiple representations for penbased handwritten digit recognition. Turk J Elec Engin, vol.9, no.1, Istanbul-Turkey.
[11] Jain, A. K. &Zongker D. (1997). Representation and recognition of handwritten digits using deformable templates. IEEE transactions on pattern analysis and machine intelligence, vol. 19, no. 12 pp. 1386-1390.
[12] S. N. Srihari, E. Cohen, J. J. Hull and L. Kuan, A system to locate and recognize ZIP codes in hand- written addresses, IJRE 1, 37-45 (1989).
[13] L. Lam and C. Y. Suen, Structural classification and relaxation matching of totally unconstrained hand- written Zip-code numbers, Pattern Recognition 21, 19- 31 (1988).
[14] M. Shridhar and A. Badreldin, Recognition of isolated and simply connected handwritten numerals, Pattern Recognition 19, 1-12 (1986).
[15] M. Shridhar and A. Badreldin, A high-accuracy syn- tactic recognition algorithm for handwritten numerals,IEEE Trans. Syst. Man Cybern. 15, 152-158 (1985).
Citation
Jayprakash Solanki, Shikha Agrawal, Rajeev Pandey, "Handwritten Digit Recognition Using Convolution Neural Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.864-868, 2018.