Execution Time of Quick Sort on Different C Compilers: A Benchmark
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.786-788, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.786788
Abstract
Sorting is a process of arranging the elements in specific order. Computer systems use many sorting algorithms to arrange the numbers in ascending or descending order and ‘quicksort’ is one of the better performing algorithms. This algorithm follows divide-and-conquer approach by compiling the large data set to partition the list of elements and then exchange the numbers after scanning the list. In today’s ever expanding world of technology, users find themselves in a situation where they have so many choices in selecting the best compilers. However, most of the time, technically the users are not able to identifying which translator is the best one for the completion of a particular assignment. The main aim of this paper is to find out the best compiler for ‘quick sort’ to reduce the execution time and automation through analyzing the performance of different compilers.
Key-Words / Index Term
Borland, Digital Mars, Tiny C, Bloodshed, CC386
References
[1] Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks”, in Mobile Computing and Networking, 2000, pp. 243–254.
[2] https://en.wikipedia.org/wiki/List_of_compilers
[3] https://en.wikipedia.org/wiki/Tiny_C_Compiler
[4] http://ladsoft.tripod.com/cc386_compiler.html
Citation
Mehzabeen Kaur, Surender Jangra, "Execution Time of Quick Sort on Different C Compilers: A Benchmark," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.786-788, 2018.
Throughput Analysis of Multicast Scheduling Algorithms by Varying NxN IQ Switch
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.789-792, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.789792
Abstract
Incredible measures of exertion have gone into investigate on multicast switch texture outline and calculations. Switch measure is one of the primary factor which impacts the execution of throughput and deferral. In this work, execution of switch has been investigated by applying the progressed multicast planning calculation OQSMS (Optimal Queue Selection Based Multicast Scheduling Algorithm), due date based round-robin booking calculation MDDR(Multicast Due Date Round Robin) and double round-robin based multicast planning calculation MDRR(Multicast Dual Round Robin). Recreation results demonstrate that OQSMS accomplishes preferred exchanging execution over different calculations under the allowable movement conditions on the grounds that if the switch measure builds, OQSMS will gauge ideal line determination in view of more line mixes so it accomplishes greatest conceivable throughput.
Key-Words / Index Term
Multicast, Throughout, MDRR, MDDR, OQSMS
References
[1] N. McKeown, “The iSLIP scheduling algorithm for input-queued switches,” IEEE/ACM Trans. Netw., vol. 7, no. 2, pp. 188–201, Apr. 1999.
[2] N. McKeown and B. Prabhakar, “Scheduling multicast cells in an input queued switch,” in Proc. 1996 IEEE INFOCOM, vol. 1, pp. 271–278.
[3] B. Prabhakar, N. McKeown, and R. Ahuja, “Multicast scheduling for input-queued switches,” IEEE J. Sel. Areas Commun., vol. 15, no. 5, pp. 855–866, June 1997.
[4] A. Bianco and A. Scicchitano, “Multicast support in multi-chip centralized schedulers in input queued switches,” Computer Networks, vol. 53, no. 7, pp. 1040–1049, May 2009.
[5] S. Gupta and A. Aziz, “Multicast scheduling for switches with multiple input-queues,” in Proc. 2002 Symposium on High Performance Interconnects, pp. 28–33.
[6] M. Song and W. Zhu, “Throughput analysis for multicast switches with multiple input queues,” IEEE Commun. Lett., vol. 8, no. 7, pp. 479–481, July 2004.
[7] W. Zhu and M. Song, “Performance analysis of large multicast packet switches with multiple input queues and gathered traffic,” Computer Commun., vol. 33, no. 7, pp. 803–815, May 2010.
[8] B. Prabhakar, N. McKeown, and R. Ahuja, “Multicast scheduling for input-queued switches,” IEEE Journal on Selected Areas in Communications, vol. 15, no. 5, pp. 855–866, 1997.
[9] W. Zhu and M. Song, “Integration of unicast and multicast scheduling in input-queued packet switches,” Computer Networks, vol. 50, pp. 667– 687, April 2006.
[10] Yongbo Jiang, Zhiliang Qiu, Ya Gao, and Jun Li, “Multicast Support in Input Queued Switches with Low Matching Overhead” in IEEE COMMUNICATIONS LETTERS, VOL. 16, NO. 12, DECEMBER 2012.
[11] F.A. Tobagi, “Fast Packet Switch Architectures For Broadband Integrated Service Digital Networks”, Proceedings of the IEEE, Vol.78, No.1, p.p. 90-167, January, 1990
[12] K. Navaz “OQSMS: Optimal Queue Selection Based Multicast Scheduling Algorithm for Input-Queued Switches” on Australian Journal of Basic and Applied Sciences, 9(27) August 2015, Pages: 373-378.
[13] K. Navaz “Multicast Due Date Round-Robin Scheduling Algorithm for Input-Queued Switches” on International Journal of Computer Network and Information Security, 2016, 2, 56-63
Citation
Shaik Jumlesha, K. Navaz, S. Athinarayanan, "Throughput Analysis of Multicast Scheduling Algorithms by Varying NxN IQ Switch," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.789-792, 2018.
Feedback Rate Based User Order Predication (FR-UOP) Model for Sentiment Analysis in Data Mining
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.793-797, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.793797
Abstract
Sentiment analysis is an examination philosophy for estimating the behavior of users through the investigation of past Opinion information. Behavioral financial aspects and quantitative examination utilize a large number of similar instruments of specialized study, which being a part of dynamic management. The capability of both dedicated and principal investigation is examined by the useful opinion mining which expresses that securities exchange logs are feedback. Sentiment analysis entirely relies on user enthusiasm and also user relationship about the feedback. Opinion mining is a way to deal with services connection with present and potential users. It utilizes information investigation about user history with a gathering to enhance services relationships with users, mainly concentrating on user maintenance and at last driving deals development. The issue of user premium expectation has been examined in the other circumstance, and there are a few strategies has been explored before. The effect of sentiment analysis in opinion mining could be adjusted for different issues like user seek, item inspiration, etc. To enhance the execution of user logs in opinion mining, a novel Feedback Rate based User Order Predication (FR-UOP) model for sentiment analysis scheme has been examined in this paper. The FR-UOP calculation first preprocesses the user log information to part them into the time-space. At that point, the strategy differentiates the rundown of user curiosity of the feedback rate in particular concern of the user and enhances the execution of user relationship in data mining.
Key-Words / Index Term
Sentiment Analysis, opinion model, user log, feedback rate, data mining
References
[1]. Song, H., Chen, C., & Yu, Q. “Research on Kano model based on online comment data mining”. 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA), 2018.
[2]. Angelo, T. N., de Faissol Attux, R. R., & Pagan, C. J. B. “DEMOS Project: a Proposal for Construction of the Deliberative Democracy from the Knowledge of Public Opinion”. 2018 International Conference on eDemocracy & eGovernment (ICEDEG), 2017.
[3]. Zvarevashe, Olugbara, “A framework for sentiment analysis with opinion mining of hotel reviews”. ICTAS, 2018.
[4]. Cambria,Schuller, “New Avenues in Opinion Mining and Sentiment Analysis”. IEEE Intelligent Systems, 28(2) 2013.
[5]. Balazs, Velásquez, “Opinion Mining and Information Fusion: A survey. Information Fusion”, 27, 95–110, 2016.
[6]. Dhanalakshmi, Saravanan, “Opinion mining from student feedback data using supervised learning algorithms”. ICBDSC, 2016.
[7]. Morency, Mihalcea, “Towards multimodal sentiment analysis”. ICMI 11, 2011.
[8]. Fanelli, Torsello, “Mining usage profiles from access data using fuzzy clustering”, WSEAS International Conference on Simulation, 2006.
[9]. Cambria, E., Song, Y., Wang, H., & Howard, N. “Semantic Multidimensional Scaling for Open-Domain Sentiment Analysis”. IEEE Intelligent Systems, 29(2), 44–51, 2014.
[10]. Tempelaar, Rienties, Giesbers, “In the search for the most informative data for feedback generation: Learning analytics in a data-rich context”. Computers in Human Behavior, 47, 157–167, 2015.
[11]. Jaehong Park, Ravi Sandhu, Yuan Cheng, “User-Activity-Centric Framework for Access Control in Online Social Networks”, IEEE Internet Computing, 28 Feb. 2011.
[12]. Doina Caragea, Rohit Parimi, , “Predicting Friendship Links in Social Networks Using a Topic Modeling Approach”, Springer, Volume 6635, 2011, pp 75-86
[13]. H. Liu, Tang, “Scalable Learning of Collective Behavior Based on Sparse Social Dimensions”, CIKM , pp. 1107-1116, 2009.
[14]. Nesar Ahmad, Sufyan Beg, “Web search enhancement by mining user actions”, Journal of Information Sciences Vol-177 PP-5203-5218, 2007.
[15]. Lucchese, Orlando, “Detecting Task-based Query Sessions Using Collaborative Knowledge”, IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology 2010.
Citation
A. Suriya, M. Prabakaran, "Feedback Rate Based User Order Predication (FR-UOP) Model for Sentiment Analysis in Data Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.793-797, 2018.
Heavy Metals in Soil Samples of Guntur Auto Nagar, Andhra Pradesh
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.798-802, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.798802
Abstract
The heavy metals in soil samples of Guntur auto nagar, Andhra Prdesh were analyzed using standard methodologies of soil analysis WHO and BIS, three sampling stations are studied in six months duration from February to July in the study area. The following metals were detected, Iron (Fe), Zinc (Zn), Chromium (Cr), Copper (Cu), Cadmium (Cd), Lead (Pb) and Nickel (Ni). Their minimum, maximum, average values (mg/kg-1) and standard deviation of three sampling stations were observed and the maximum values are recorded as follow Fe-131.05 mg/kg-1, Cr-1.91 mg/kg-1, Zn-98.37 mg/kg-1, Cu-69.9 mg/kg-1, Cd-9.31 mg/kg-1, Ni-14.32 mg/kg-1, according to the standard values in three sampling stations of soil samples exceeded due to improper sanitation and lack of rainfall the heavy metals are stored in soils.
Key-Words / Index Term
Analyses, Heavy Metals, soil, Auto nagar, Industrial Area
References
[1] Ukpong, E. C, Antigha, R. E, Moses, E. O, Assessment of Heavy Metals Content In Soils And Plants Around Waste Dumpsites In Uyo Metropolis, Akwa Ibom State, International Journal of Engineering and Science, Vol 2,(7), pp7586, 2013.
[2] Mittisila Jyothi, Srinivasa Rao, D., Brahmaji Rao, P, and Sudhakar, G, “Assessment of heavy metals content in Para grass (Urochola mutica) from waste discharge of Guntur, Andhra Pradesh, India’, International Journal of Current Research, 7, (11), 2299422997, 2015.
[3] P. K. Lee, J.C.Touray, “Characteristics of a Polluted Artificial Soil Located Along a Motorway and Effects of Acidification on the Leaching Behavior of Heavy Metals”. Water Research, 32, 3425-3435, 1998.
[4] Plesniˇ Car,N.Zupanˇ Ci´ C, Heavy Metal Contamination of Roadside Soil Along Ljubljana – Obreˇ zjeHighway.RMZ – Materials and Geo environment, 52, 403-418, 2005
[5] S. Shakeri, F.Moore, .Modabberi, “Heavy Metal Contamination and Distribution in the Shiraz Industrial Complex Zone Soil, South Shiraz, Iran”. World Applied Sciences Journal, 6, 413-425, 2009.
[6] Dijana Grd, Jasminka Dobsa, Vesna Simunic-Meznaric and Teuta Tompic, “Analysis of Heavy Metals Concentration in Wastewater along Highways in Croatia”, Journal of Computing and Information Technology - CIT 20, 2012, 3, 209–215, 2012.
[7] Mtunzi, F.M., Dikio, E.D and Moja, S.J, “Evaluation of heavy metal Pollution on soil in Vaderbijlpark, South Africa”. International Journal of Environmental Monitoring and analysis, 3(2): 44-49, 2015.
[8] Qasem, M.J. and Kamal, A.M,“Contamination of roadside soil, plants and air with heavy metal sin Jordan a comparative study”. Turkish Journal of Chemistry 23, 209-220, 1999.
[9] Onianwa, P.C. and Fakayode, S.O,”Lead contamination of topsoil and vegetation in the vicinity of a battery factory in Ibadan”. Environmental Geochemistry and Health 22: 211-218, 2000.
[10] Adriano, D.C. “Trace Elements in Terrestrial Environment” (2 nd edition) springer-Verlay company, New York, 2001.Book
[11] Iwegbue, C.M.A., Isirimah, N.O., Igwe, C. and Williams, E.S, “Characteristic level of heavy metals in soil profiles of automobile mechanic waste dumps in Nigeria”. Environmentalist, 26: 131-137. 2006 b.
[12] Iwegbue, C.M.A., Williams, E.S, and Isirimah, N.O. “Study of heavy metals distribution in soils impacted with crude oil in southern Nigeria”. Soil and Sediment Contamination, 18:136-143.2009 b.
[13] Osakwe, S.A and Egharevba, F,” Sequential fractionation of cadmium, copper, lead and chromium in soils around municipal solid waste dumps in Agbor, Nigeria”. Journal of Chemical Society of Nigeria, 33(2): 139-147, 2008.
[14] APHA, “Standard Method for the Examination of Water and Wastewater” (21st edition), New York. 2005.
[15] Sheppard, D.S., Claridge, G.G.C. and Campbell, I.B, “Metal contribution of soil at Scott urban-rural land use gradients”. Applied Geochemistry, 15: 513-530, 2000
[16] El-Hassan, T., Batarseh, M., Al-Omari, H., Ziadat, H., El-Alali, A., Al-Naser, F., Berdainer, B.W, and Jiries, A, “The distribution of heavy metals in urban street dust of Karak city”, Jordan Soil and Sediment Contamination, 15: 357-365, 2006
[17] Aina, G.R.E. and Sridhar, M.K.C, “Soil quality near a fertiliser industry at Port Harcourt, Nigeria”. AJEAM – RAGEE 8:19-26, 2004.
[18] Gungshik, J, R. and Mohammed, J.D, “Impact of mining on trace metal contents of soil”. African Journal of Natural Sciences 10: 21-24, 2007.
[19] Oviasogie, P.O. and Omoruyi, E, “Levels of heavy metals and physicochemical properties of soil in a foam manufacturing industry”. Journal of Chemical Society of Nigeria, 32(1): 102-106, 2007.
[20] Machender, G., Dhakate, R., Prasanna, L. and Govil, P.K. “Assessment of heavy metals contamination in soils around Balanagor industrial area, Hyderabad, India”. Environmental Earth Science, 63(5): 945-953, 2010.
[21] Jaradat, Q.M, and Momami, K.A, “Contamination of roadside soils, plants and air with heavy metals in Jordan: a comparative study”. Turkish Journal of Chemistry, 23: 209-220, 1999.
[22] C.M.A. Iwegbue, F.I. Bassey, G.O. Tesi, G.E Nwajei and A.I. Tsafe, “Assessment of Heavy Metal Contamination in Soils around Cassava Processing Mills in Sub Urban Areas of Delta State, Southern Nigeria”, Nigerian Journal of Basic and Applied Science, 21(2): 96-104, 2013.
[23] Iwegbue, C.M.A., Nwajei, G.E., Egauvoen, I.O and Ogala, J.E, “Chemical fractions of some heavy metals in soil profiles in the vicinity of scrap dumps in Warri, Nigeria”. Chemical Speciation and Bioavailability, 21(2): 99-110, 2009a.
[24] Nwajei, G.E. and Iwegbue, C.M.A, “Trace metal concentrations in the vicinity of Uwelu motor spare parts market, Benin City, Nigeria”. Journal of chemical society of Nigeria 32 (2): 283-286, 2007.
[25] Iwegbue, C.M.A., Egobueze, F.E. and Opuene, K, “Preliminary assessment of heavy metals in soils of an oil field in the Niger Delta, Nigeria”. International Journal of Environmental Science and Technology, 3(2): 167-172, 2006a.
[26] Oviasogie, P.O and Ofomaja, A, “Available Mn, Fe, Pb and physicochemical changes associated with soil receiving cassava mill effluent”, Journal of Chemical Society of Nigeria,32 (1): 69-73, 2007.
[27] Ademoroti, C.M.A, “Environmental Chemistry and Toxicology”. Foludex Press Ltd Ibadan, 150-188. 1996
[28] Aluko, O.O. and Oluwande, P.A, “ Characterization of leachates from a municipal solid waste landfill site in Ibadan, Nigeria”. Journal of Environmental Health Research, 2: 83-84, 2003.
[29] Zakir, H.M., Sultana, N, and Akter, M, “Heavy Metal contamination in Roadside soils and Grasses: A case study from Ahaka City, Bangladesh”. Journal of Chemical, Biological and Physical Sciences. 4(2) 1661-1673, 2014.
[30] El- Gamal, I.M, “Distribution pattern of some heavy metals in soil and plants along Moukattam highway”, Egypt, ICEHM: 518-524, 2000.
[31] Akbar, N.F., Hale, W.H.G., Headley, A.D. and Athar, M, “Heavy metal contamination of roadside soils”, Soil and Water Research 1(4), 158-163, 2000.
[32] Manno, E., Varrica, D. Dongarra, G, ”Metal Distribution in Road dust amples collected in an urban area close to a petrochemical plant at Gela, Sicily”. Atmosphere Environment, 40:5929-5941, 2006.
[34] Matthews Amune, O.C and Kakulu, S, “Investigation of heavy metal levels in road-side agricultural soil and plant samples in Adogo, Nigeria”, Academic Journal of Environmental Sciences 1 (2) 31-35, 2013.
[35] Elike, A, “Heavy Metal accumulation in street dust samples in Sivas”, Communication, in soil Science and plant analysis, 34, 145-156, 2003.
[34] Saeedi, M, Hosseinzadeh, M., Jamshidi, A, and Pajooheshfar, S.P., “Assessment of heavy metals contamination and leaching characteristics in high way side soils”, Iran Environmental Monitoring Assessment 151 (1/4), 231-241, 2009.
[35] Bamgbose O., Odukoya, O, and Arowolo, T.O.A, “Earthworm as bioindicator of heavy metal pollution in dumpsite of Abeokuta city, Nigeria”. Revista de Biologia Tropical, 48(1): 229-234, 2000.
[36] Inuwa, M., Abdulrahman, F.W., Birnin Yauri, U.A. and Ibrahim, S., “Analytical assessment of some traces metals in soils around a major industrial area in North western Nigeria”. Trends in Applied Science Research, 2(26): 515-521, 2007.
[37] Kashem, M.A., Singh, B.R., Kondo, T., Imame Huq, S.M. and Kawai, S, “Comparison of extractability of Cd, Cu, Pb and Zn with sequential extraction in contaminated and non-contaminated soils”, International Journal of Environmental Science and Technology, 4(2): 169-176, 2007.
Citation
Jyothi. M, G. Sudhakar, P. Brahmajirao, "Heavy Metals in Soil Samples of Guntur Auto Nagar, Andhra Pradesh," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.798-802, 2018.
Procedural Content Generation in Games towards Semantic Web
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.803-812, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.803812
Abstract
Procedural Content Generation (PCG) : A significant research area in the domain of digital games, which provides techniques to automatically generate game content such as levels, narratives, landscape, game rules and mechanics, etc. without or with least human effort. In these days, video games are usually backed by web services in order to fetch game content directly from game servers rather than storing everything at client side, for better controllability over the game content. Semantic Web technologies play an important role in World Wide Web (WWW) with the objectives to ¬create and maintain structured Web of Data to make it more machine understandable. Potentially, Semantic Web may contribute to PCG by enhancing its capabilities in terms of computational creativity, better algorithmic efficiency, scalability, interoperability etc. In this paper, first, the role of PCG and Semantic Web in games has been explored. Second, a Semantic Based PCG Framework has been proposed, which combines strength of both the fields and exploit the content of existing knowledge repositories such as DBPedia, WordNet, Freebase, etc. to generate interesting puzzles. Third, proposed framework has been supported by taking the case study of a popular word game Hangman. Finally, emphasis on exploring various concerns is made towards the role of Semantic Web in procedural content generation in games.
Key-Words / Index Term
Semantic Web, Procedural Content Generation in Games, Quiz Games, Educational Games, DBPedia
References
[1] T. Berners-Lee, J. Hendler, and O. Lassila, “The semantic web”, Scientific American, Vol. 284, Issue 5, pp. 28-37, 2001.
[2] N. Shadbolt, T. Berners-Lee & W. Hall, “The semantic web revisited”. IEEE intelligent systems, Vol 21(3), pp 96-101, 2006
[3] V. Vashistha, “Solving Content Generation Problem in Hangman using Search Based Strategy”, In Proceedings of the 12th INDIACom; INDIACom-2018; IEEE 5th International Conference on “Computing for Sustainable Global Development", India, 2018
[4] R. Benjamins, J. Contreras, O. Corcho, & A. Gomez-Perez. “The six challenges of the Semantic Web”, 2002
[5] C. Pedersen, J. Togelius, & G. N. Yannakakis, “Modeling player experience for content creation”. IEEE Transactions on Computational Intelligence and AI in Games, Vol 2(1), pp 54-67, 2010
[6] C. B. Browne, E. Powley, D. Whitehouse, S. M. Lucas, P. I. Cowling, P. Rohlfshagen, ... & S. Colton. “A survey of monte carlo tree search methods”. IEEE Transactions on Computational Intelligence and AI in games, Vol 4(1), pp 1-43. 2012.
[7] M. Cook, & S. Colton, “Multi-faceted evolution of simple arcade games”. In Computational Intelligence and Games (CIG), 2011 IEEE Conference on, pp. 289-296, 2011
[8] J. Mmynarz, & V. Zeman. “DB-quiz: a DBpedia-backed knowledge game”. In Proceedings of the 12th International Conference on Semantic Systems, ACM, pp. 121-124, 2016
[9] O. Sacco, A. Liapis, & G. N. Yannakakis, “A holistic approach for semantic-based game generation.” In Computational Intelligence and Games (CIG), IEEE Conference on, IEEE pp. 1-8, 2016
[10] G. A. Barros, A. Liapis, & J. Togelius, “Murder mystery generation from open data”. In Proceedings of the Seventh International Conference on Computational Creativity, 2016
[11] G. Vega-Gorgojo. Clover Quiz: a trivia game powered by Dbpedia.
[12] H. Liang, S. Deng, J. Chang, J. J. Zhang, C. Chen & R. Tong, “Semantic framework for interactive animation generation and its application in virtual shadow play performance.” Virtual Reality, pp 1-17, 2018
[13] O. Sacco, M. Dabrowski, & J. G. Breslin, “Linking in-game events and entities to social data on the web”. In Games Innovation Conference (IGIC), 2012 IEEE International, IEEE, pp. 1-4. IEEE, 2012
[14] G. A. Barros, A. Liapis & J. Togelius, “Playing with Data: Procedural Generation of Adventures from Open Data”. In DiGRA/FDG, 2016
[15] B. O. Duric & M. Konecki, “Specific owl-based rpg ontology”. In Central European Conference on Information and Intelligent Systems, pp 185, 2015
[16] C. Sarasua, E. Simperl & N. F. Noy, “Crowdmap: Crowdsourcing ontology alignment with microtasks”. In International Semantic Web Conference, Springer, Berlin, Heidelberg., pp. 525-541, 2012
[17] C. B. Browne ”Automatic generation and evaluation of recombination games”, Doctoral dissertation, Queensland University of Technology, 2008.
[18] T. Markotschi & J. Volker “GuessWhat?!{Human intelligence for mining linked data”, 2010.
[19] J. Togelius, A. J. Champandard, P. L. Lanzi, M. Mateas, A. Paiva, M. Preuss & K. O. Stanley. “Procedural content generation: Goals, challenges and actionable steps”. In Dagstuhl Follow-Ups. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Vol 6, 2013
[20] J. Parkkila, F. Radulovic, D. Garijo, M. Poveda-Villalón, J. Ikonen, J. Porras, J & A. Gómez-Pérez, “An ontology for videogame interoperability”. Multimedia Tools and Applications, Vol 76(4), pp 4981-5000, 2017
[21] C. Lin, D. Liu, W. Pang, & Z. Wang. “Sherlock: a semi-automatic framework for quiz generation using a hybrid semantic similarity measure”. Cognitive computation, Vol 7(6), pp 667-679, 2015
[22] J. T. Chan & W. Y. Yuen. “Digital game ontology: Semantic web approach on enhancing game studies”. In Computer-Aided Industrial Design and Conceptual Design, 2008. CAID/CD 2008. 9th International Conference on (pp. 425-429). IEEE, 2008
[23] J. P. Zagal & A. Bruckman, “The game ontology project: Supporting learning while contributing authentically to game studies”. In Proceedings of the 8th international conference on International conference for the learning sciences. International Society of the Learning Sciences. Vol. 2 , pp. 499-506, , 2008
[24] R. Van Meteren & M. Van Someren, “Using content-based filtering for recommendation”. In Proceedings of the Machine Learning in the New Information Age: MLnet/ECML2000 Workshop, pp. 47-56, 2000
[25] K. Siorpaes & M. Hepp. “Games with a Purpose for the Semantic Web”. IEEE Intelligent Systems, Vol 23(3), 2008
[26] O. Sacco, A. Liapis, & G. N. Yannakakis, “Game Character Ontology (GCO) A Vocabulary for Extracting and Describing Game Character Information from Web Content”. In Proceedings of the 13th International Conference on Semantic Systems, ACM. pp. 9-16., 2017
[27] N. Shaker, J. Togelius & M. J. Nelson. Procedural content generation in games. Springer International Publishing, 2016
[28] G. N. Yannakakis, J. Togelius. Artificial Intelligence and Games. Springer, 2017
[29] D. Winer, “Review of Ontology Based Storytelling Devices”. In: Dershowitz N., Nissan E. (eds) Language, Culture, Computation. Computing of the Humanities, Law, and Narratives. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, vol 8002. 2014
[30] S. Göbel, F. Mehm, S. Radke, & R. Steinmetz, “80days: Adaptive digital storytelling for digital educational games”. In Proceedings of the 2nd international workshop on Story-Telling and Educational Games (STEG`09), Vol. 498, No. 498, 2009
[31] X. Su, & T. M. Khoshgoftaar ”A survey of collaborative filtering techniques”. Advances in artificial intelligence, 2009.
[32] R. Gil, J. Virgili-Gomá, R. García, & C. Mason, “Emotions ontology for collaborative modelling and learning of emotional responses”. Computers in Human Behavior, Vol. 51, pp 610-617, 2015
[33] R. Abaalkhail, B. Guthier, R. Alharthi & A. El Saddik, “Survey on ontologies for affective states and their influences”. Semantic web, (Preprint), pp 1-18, 2017
[34] S. Fraihat & Q. Shambour. “A framework of semantic recommender system for e-learning”. Journal of Software, Vol. 10(3), pp 317-330, 2015
[35] R. W. White & R. A. Roth, “Exploratory search: Beyond the query-response paradigm”. Synthesis lectures on information concepts, retrieval, and services, Vol. 1(1), pp 1-98, 2009
[36] G. N. Yannakakis & J. Togelius “A panorama of artificial and computational intelligence in games”. IEEE Transactions on Computational Intelligence and AI in Games, Vol. 7(4), pp 317-335, 2015
[37] J. Togelius, G. N. Yannakakis, K. O. Stanley & C. Browne. “Search-based procedural content generation: A taxonomy and survey”. IEEE Transactions on Computational Intelligence and AI in Games, Vol. 3(3), pp 172-186, 2011
[38] Visualization, I. D. (2014). Speedtree.
[39] D. Plans, & D. Morelli, “Experience-driven procedural music generation for games”. IEEE Transactions on Computational Intelligence and AI in Games, Vol. 4(3), pp 192-198., 2012
[40] T. Tutenel, R. M. Smelik, R. Bidarra, & K. J. de Kraker. “Using Semantics to Improve the Design of Game Worlds”. In AIIDE, 2009
[41] R. Lopes & R. Bidarra. “A semantic generation framework for enabling adaptive game worlds”. In Proceedings of the 8th International Conference on Advances in Computer Entertainment Technology,. ACM, pp 6, 2011
[42] P. Prusinkiewicz, “Graphical applications of L-systems”. In Proceedings of graphics interface, Vol. 86, No. 86, pp. 247-253, 1986
Citation
V. K. Vashistha, S.K. Malik, "Procedural Content Generation in Games towards Semantic Web," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.803-812, 2018.
A Review on “Image Steganography with LSB & DWT Techniques”
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.813-818, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.813818
Abstract
In all the fields of steganography such as image, text, audio, video there are many techniques used totransfer the secret messages without known to other person. Using the Steganography technique to hide the data or message in an image,LSB and DWT are two easy techniques which are usefull and implemented easily to improve robustness and performance of algorithms. LSB method used to transfer the large data and replace some information in pixel with information from the data in image. Overall use of LSB doesn’t affect the representation of image. In this technique, LSB method will be used to transfer the large data and replace some information in pixel with information from the data in an image.DWT method is used to embed converted data into cover medium to conceal its presence. For the security, we will use the technique DWT which is used with the low frequency (used for narrow bandwidths) and high frequencies (for wider bandwidths) and for the flexibility.
Key-Words / Index Term
Steganography, Least-significant-bit (LSB), Discrete Wavelet Transform(DWT)
References
[1]Er. MunishKatoch and ReenuJaswal, " Image Steganography: A Review," International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 4, April 2016.
[2]K.Dhinesh, K.Meenachi, A.Selvabharathi, S.Senthamilselvan, “An ImprovedLSB Based Steganography Technique for Grayscale and Color Images,” International Journal of Advanced Research in Electronic and Communication Engineering, Vol. 5, Issue 4, April 2016.
[3]L.Baby Victoria, “A Study on Spatil Domain and Transform Domain Steganography Techniques used in Image Hiding,” International Journal of Innovative Technology and Creative Engineering, Vol.5 No.5 May 2015.
[4]Sukhjinder Singh, KulbhushanSingla, Dr. Rahul Malhohtra, “A Robust Image Steganography Technique using Quantized Range Table and Local Area Pixel Value Differencing,” International Journal of Advanced Research in Electronic and Communication Engineering, Vol. 5, Issue 2, February 2016.
[5]S.Thenmozhi, M.Chandrasekaran, “Multilayered, High Capacity, Distortionless Image Steganogaphy using ANN,” South Asian Journal and Technology, Vol.2,No.21 pp.63- 73, 2016.
[6]Mamta Jain and Saroj Kumar Lenka, “A Review on Data Leakage Prevention using Image Steganography,” Mamta Jain et al./ International Journal of Computer Science Engineering, Vol.5, No.002, Mar 2016.
[7]S.Krishnan, M.S. Abdullah, “Enhanced Security Audio Steganography by Using Higher Least Significant Bit,” Journal of Advanced Research in Computing and Applications ISSN(ONLINE), Vol.2,No.1.pp.39-54, 2016.
[8]Ms.Kajal Prakash kamble, Ms SwapnaliVasantKhabale, Mr. AnkushShahu Morale, “An Infallible Method to Transfer Confidential Data using Delta Steganography,”International Research Journal of Engineering and Technology, Vol.03, Issue:02, Feb-2016.
[9]Komal Kapoor, “Digital Image Steganography based Security Model using Wavelet for Internet Voting Environment,” International Journal of Advanced Research in Electronics and Communication Engineering, Volume 5, Issue 2, February 2016.
[10] Ashley S.Kelsey, CajetanM.Akujuobi, “ A Discrete Wavelet Transform Approach for Enhanced Security in Image Steganography,” International Journal of Cyber-Security and Digital Forensics(IJCSDF) 5(1):10-20,The Society of Digital Information and Wireless Communications, 2016 (ISSN:2305-0012).
[11]DeepakGarg, Gourav Sharma, “Applications of Steganography in Information Hiding,” International Journal of Advanced Research in Education Technology, Vol.3, Issue 1, Jan-Mar. 2016.
[12]MsVedantiM.Khandare, Dr. SiddharthA.Ladhake,Mr.U.S.Ghate, “An Approach of ECG Steganography to Secure the Patient’s Confidential Information,” International Research Journal of Engineering and Technology, Volume: 03, Issue: 03| Mar-2016.
[13]Sumanth C, Dr. M B Meenavathi, “Audio-Video Steganography using Face Recognition Technique for Authentication,” International Journal of Advanced Research in Electronics and Communication Engineering, Volume 5, Issue 5, May 2016.
[14] Md. Mizanur Rahman, Pronab Kumar Mondal, Indrani Mandal, Habiba Sultana, “Secure RGB Image Steganography Based on Triple-A Algorithm and Pixel Intensisty,” International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March- 2016.
[15]Seema S. Girare, Malvika U. Saraf, “Literature Review on Different Watermarking & Steganography Technique,” International Research Journal of Engineering and Technology, Volume: 03, Issue: 04| Apr-2016.
[16] Don Caeiro and Sanjana S, “Detection of Steganography Using Metadata in JPEG Files,” The International Journal of FORENSIC COMPUTER SCIENCE( www.IJoFCS.org),2015.
[17]SaurabhPaliwal, “ A Surve& Applications of Various Image Steganography Techniques,” International Journal of Scientific & Engineering Research, Volume 7, Issue 1, January-2016.
[18]RiyadhBassilAbduljabbar, “ Steganography System using Slantlet Transform,” Journal of Information, Communication, and Intelligence Systems(JICIS), Volume 2, Issue 1, February2016.
[19]Hamad A. Al- Korbi, Ali Al- Ataby, Majid A.Al-Taee and Waleed Al-Nuaimy, “ Highly Efficient Image Steganography Using Haar DWT for Hiding Miscellaneous Data,” Jordanian Journal of Computers and Information Technology (JJCIT), Vol.2,No. 1,April 2016.
[20] Mamta Jain and Saroj Kumar Lenka, “ A Review of Digital Image Steganography Using LSB and LSB Array,” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 3(2016).
[21] Mr. Mohit “An Enhanced Least Significant Bit Steganography Technique,” International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) Volume 5, Issue 6, June 2016.
[22]G. Raj Kumar, M. MaruthiPrasada Reddy, T. LalithKumar,“An Implementation of LSB Steganography Using DWT Technique,” International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November,2014.
[23]Juned Ahmed Mazumder, KattamanchiHemachandran, “Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method,” International Journal of Computer Sciences and Engineering, Volume-2, Issue-7, July 2014.
[24]Vanitha T, Anjalin D Souza, Rashmi B, SweetaDSouza, “ A Review on Steganography- Least Significant Bit Algorithm and Discrete Wavelet Transform Algorithm,” International Journal of Innovative Research in Computer and Communication Engineering Vol.2, Special Issue 5, October 2014.
[25]M Abhilash Reddy, P. Sanjeeva Reddy, GS Naveen Kumar, “DWT AND LSB ALGORITHM BASED IMAGE HIDING IN A VIDEO,” International Journal of Engineering Science & Advanced Technology Volume-3, Issue-4, Aug-Sep 2013.
[26]KalpanaShete, MangalPatil, J.S. Morbale “FPGA Implementation of Image Steganography Using LSB & DWT,” International Journal of Computer Science and Network, Volume 4, Issue 6, December 2015.
[27] Kalpana Sanjay Shete, MangalPatil and J.S. Chitoda, “Least Significant Bit and Discrete Wavelet Transform Algorithm Realization for Image Steganography Employing FPGA,” I. J. Image, Graphics and Signal Processing Vol.6, June 2016.
[28]StutiGoel, ArunRana&Manpreet Kaur, “ A Review of Comparison Techniques of Image Steganography,” Global Journal of Computer Science & Technology Graphics & VisionVolume-13, Issue-4 Version 1.0, 2013.
[29]Manisha and DeepkiranMunjal, “Dual Steganography Technique Using Status LSB and DWT Algorithms,” International Journal of Innovative Research in Computer and Communication Engineering, Volume 4, Issue 6, June 2016.
Citation
Neha, Mr Mohit, "A Review on “Image Steganography with LSB & DWT Techniques”," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.813-818, 2018.
A Cloud based Assurance Framework for Implementation of ERP in SMEs: A Literature Survey
Survey Paper | Journal Paper
Vol.6 , Issue.9 , pp.819-829, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.819829
Abstract
Enterprise Resource Planning (ERP) system is an integral component of IT infrastructure in many organizations. They are the vital asset to any organization in carrying out various operational tasks with greater reliability and efficiency. Most of the Indian SMEs have adopted the traditional ERP systems and have incurred heavy cost while implementing these systems. Cloud computing has changed the era of doing the business in the global market. SMEs will not have to invest more for the implementation of cloud ERP they can utilize the resources as a service and pay as per their usage. Cloud ERP is nothing more than ERP software that had been implemented on cloud. This paper present to review a deeper understanding of Cloud ERP , emerging technologies such as Cloud Computing , Software as Service (SaaS), to frame the multi-tenant assured framework which are more relevant and beneficial for SMEs.
Key-Words / Index Term
ERP, Component, Cloud Computing, Cloud ERP, Multi-tenancy , Saas ERP adoption
References
[1] B. Hayes, ""Cloud Computing"," Communications of the ACM, vol. 51, pp. 9-11, 2008.
[2] Stalert J., Whinston.A, Fan M., "The adoption and design methodologies of component based enterprise system," European Journal Information System, vol. 9, no. 1, pp. 25-35, March 2000.
[3] P.Mell and T.Grance, "Draft nist working defination on cloud computing," vol. 15, Aug. 21, 2009.
[4] Wen-Yau Liang, Hui-Yu Hsu Chin-Sheng Chena, "A cloud computing platform for ERP applications," Applied Soft Computing ,Elsevier, 2014.
[5] Dr. Bright Keswani Rajeev Sharma, "STUDY OF CLOUD BASED ERP SERVICES FOR SMALL AND MEDIUM ENTERPRISES (Data is processed by Text Mining Technique)," Revista de Sistemas de Informaco da FSMA, vol. 13, pp. 2-10, 2014.
[6] Xun Xu, "From cloudcomputingtocloudmanufacturing," Robotics and Computer-Integrated Manufacturing, Elsevier, vol. 28, pp. 75-86, 2012.
[7] Chee Shin Yeo,SriKumar Venugopal,James Broberg,Ivona Brandic RajKumar Buya, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Article in Future Generation Computer Systems, Elsevier, pp. 1-19, December 2008.
[8] Member , IAENG Gurpreet Singh, Manpreet Singh Manna, and Gurpreet Singh Bhasin Member, "A Study of Impact of ERP and Cloud Computing In Business Enterprises," in Proceedings of the World Congress on Engineering and Computer Science 2013 Volume I WCECS 2013, San Francisco, USA, October 23-25, 2013.
[9] Raj Sandu Ergun Gide, "A Study to Explore the Key Factors Impacting on Cloud Based Service Adoption in Indian SMEs," in 12th International Conference on e-Business Engineering IEEE, 2015 , pp. 387-392.
[10] Dr. Amandeep Singh Marwaha, Sarvjit Singh, "Framework of ERP System Implementation For SMEs In Punjab," International Journal of Computer Applications & Information Technology, vol. I, no. II, pp. 61-64, September 2012.
[11] Dr. M.P. Jaiswal, Ms. Surabhi Pandey, Dr. G.N. Purohit, "Challenges Involved in Implementation of ERP on Demand Solution: Cloud Computing," International Journal of Computer Science Issues, vol. 9, no. 4, pp. 481-488, July 2012.
[12] Ashwani Mehra, Haresh Jola, Anand Kumar,Dr.Madhvendra Misra, Ms.Vijayshri Tiwari, Monika Sharma, "Scope of cloud computing for SMEs in India," JOURNAL OF COMPUTING, vol. 2, no. 5, pp. 144-149, 5 MAY 2010.
[13] Babis Schoinochoritis, Ekaterini Vlachou, Dimitris Mourtzis, "A New Era of Web Collaboration : Cloud Computing and its Applications in Manufacturing," in International Working Conference "Toatal Quality Management -Advanced and Intelligent Approaches", Belgrade, Serbia, 1-5, June,2015, pp. 11-23.
[14] G. T. Thampi, V.R. Kalamkar, Prashant D.Deshmukh, "Investigation of Quality Benefits of ERP Implementation in Indian SMEs," Elsevier, Procedia Computer Science , vol. 49, pp. 220-228, 2015.
[15] A. Seetharaman, John Rudolph Raj, Prashant Gupta, "The usage and adoption of cloud computing by small and medium businesses," Elsevier, International Journal of Information Management, vol. 33, pp. 861-874, 2013.
[16] Majed A. Al-Mashari , Abdullah A. Al-Ghofaili, "ERP System Adoption Traditional ERP Systems vs. Cloud-Based ERP Systems," in International Conference on the Innovative Computing Technology, IEEE, 2014, pp. 135-139.
[17] Eman S. Nasr,Mervat H. Geith Mohamed A. Abd Elmonem, "Benefits and challenges of cloud ERP systems - A systematic literature review," Future Computing and Informatics Journal ,Science Direct, vol. 1, pp. 1-9, March 2017.
[18] Harsh Vardhan Samalia,Piyush Verma Devesh Kumar, "Exploring suitability of cloud computing for small and medium sized enterprises in India," Journal of Small Business and Enterprise Development , Emelrad Insight, pp. 1-20, 28 June 2018.
[19] Ruben Picek , Stapic Zlatko Marko Mijac, "Cloud ERP System Customization Challenges," in Central European Conference on Information and Intelligent Systems, Varaždin, Croatia, September 18-20, 2013, pp. 132-296.
[20] Shima Ramezani Tehrani and Farid Shirazi, "Factors Influencing the Adoption of Cloud Computing by Small and Medium Size Enterprises (SMEs)," Springer International Publishing Switzerland, pp. 631–642, 2014.
[21] Janet Lee-Shang Lau ,Jinghua Kuang, Fiona Fui-Hoon Nah, "Critical factors for successful implementation of enterprise systems," Emerlad Insight,Business Process Management , vol. 7, no. 3, pp. 285 - 296, 25 November 2015.
[22] Subhas C. Misra, Akash Singh, Vinod Kumar, Uma Kumar Shivam Gupta, "Identification of Challenges and their Ranking in the Implementation of Cloud ERP: A Comparative Study for SMEs and Large Organizations," Emerald Insight, vol. 34, no. 7, pp. 1-38, 8 July 2017.
[23] Dr. Max Erik Rohde, Fengze Zhong, "Cloud Computing and ERP: A Framework of Promises and Challenges," in 25th Australasian Conference on Information Systems, Auckland, New Zealand, 8th -10th Dec 2014, pp. 1-10.
[24] Chirag Gala, Guo Chao Alex Peng, "Cloud ERP: a New Dilemma to Modern Organisations?," Journal of Computer Information Systems, vol. 54, no. 3, pp. 22-30, 2014.
[25] Adekemi O. Salako, Alexeis Garcia-Perez, Jacek Lewandowski, "SaaS Enterprise Resource Planning Systems: Challenges of their adoption in SMEs," in IEEE 10th International Conference on e-Business Engineering, 2013, pp. 56-61.
[26] Ravi Seethamraju, "Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium sized Enterprises (SMEs) and Medium Sized," Springer Science+Business Media New York 2014, vol. 16, pp. 475-492, 27 May 2014.
[27] Dinesh Kumar Saini, Jabar H. Yousif and Sandhya V Khandage S L Saini, "Cloud Computing and Enterprise Resource Planning Systems," in Proceedings of the World Congress on Engineering, London, U.K., July 6 - 8, 2011.
[28] Shareeful Islam, Christos Kalloniatis, Stefanos Gritzalis Haralambos Mouratidis, "A framework to support selection of cloud providers based on security and privacy requirements," The Journal of Systems and Software, Elsevier, pp. 1-18, 2013.
[29] Christoph Reic, Martin Knahl, Alexander Passfall and Nathan Clarke Frank Doelitzscher, "An agent based business aware incident detection system for cloud environments," Journal of Cloud Computing: Advances, Systems and Applications , Springer , vol. 1, no. 19, pp. 1-19, 2012.
[30] Adel Alkhalil , Justice Opara-Martins Reza Sahandi, "SMEs’ Perception of Cloud Computing: Potential and Security," International Federation for Information Processing, vol. IFIP AICT 380, pp. 186-195, 2012.
[31] Anna Lenart, "ERP in the Cloud – Benefits and Challenges," Springer-Verlag Berlin Heidelberg, LNBIP 93, pp. 39-50, 2011.
[32] John Grundy,Amani S. Ibrahim, Mohamed Almorsy, "Adaptable, model-driven security engineering for SaaS cloud-based applications," Springer Science+Business Media New York , pp. 1-38, September 2013.
[33] Nogol Memari,Aida Hakemi,Hamidreza Latifi, Faraz Fatemi Moghaddam, "A Reliable E-Service Framework Based on Cloud Computing Concepts for SaaS Applications," in IEEE Conference on e-Learning, e-Management and e-Services, Sarawak, Malaysia, 2-4, December, 2013, pp. 100-104.
[34] Manish Mahajan, Gurpreet Kaur, "Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms," Int. Journal of Engineering Research and Applications , vol. 3, no. 5, pp. 782-786, Sep-Oct 2013.
[35] Tianyu Wo, Jianxin Li, Bo Li Liang Zhong, "A Virtualization-based SaaS Enabling Architecture for Cloud Computing," in Sixth International Conference on Autonomic and Autonomous Systems, China, 2010, pp. 144-149.
[36] Josune Hernantes,Nicolas Serrano, Gorka Gallardo, "Designing SaaS for Enterprise Adoption Based on Task, Company, and Value-Chain Context," IEEE,Internet Computing, vol. 22, no. 4, pp. 37-45, July-August 2018.
[37] Yusmadi Yah Jusoh, Rotimi Rowland Ogunrinde, "Investigating Cloud ERP Providers Selection for SMES in A Multi-Tenant Environment," International Journal of Enhanced Research in Management & Computer Applications, vol. 3, no. 11, pp. 6-15, November 2014.
[38] Savvas Papagiannidis, Feng Li Yazn Alshamaila, "Cloud computing adoption by SMEs in the northeast of England: A multi‐perspective framework," Journal of Enterprise Information Management,emerald insight, vol. 26, no. 3, pp. 250-275, 2013.
[39] Indu Saini, Ashu Khanna,S. K. Peddoju, "Cloud and Traditional ERP systems in Small and Medium Enterprises," in International Conference on Information Systems and Computer Networks, IEEE,2014, pp. 138-141.
[40] Yong Zhang,Shijun Liu, Xiaoyan Jiang, "A Well-designed SaaS Application Platform Based on Model-driven Approach," in Ninth International Conference on Grid and Cloud Computing, 2010, pp. 276-281.
[41] Sameer Kumar, Sanjay Kumar Singh, Cyril Foropon, Charu Chandra, Shivam Gupta, "Role of cloud ERP on the performance of an organization: contingent resource based view perspective," Emerald Insight, International Journal of Logistics Management, pp. 1-37, April 2018.
[42] Simona Popa, Isabel Martinez-Conesa, Pedro Soto-Acosta, "Information technology, knowledge management and environmental dynamism as drivers of innovation ambidexterity: a study in SMEs," Emerald Publishing Limited, Journal of Knowledge Management, pp. 1-19, February 2018.
[43] Tripti Mahara, "PEST- Benefit/Threat Analysis for selection of ERP in Cloud for SMEs ," ASIAN JOURNAL OF MANAGEMENT RESEARCH, vol. 3, no. 2, pp. 365-373, 2013.
[44] Suresh K. Garg,Chitra Sharma, Durgesh Sharma, "A cloud computing-based framework for internationalisation of SMEs," International Jounal of Cloud Computing, vol. 2, no. 4, pp. 364-377, 2013.
[45] Ahmed A. Al-Johan and Ahmed E. Youssef, "A Framework for ERP Systems in SME Based on Cloud Computing Technology," International Journal on Cloud Computing: Services and Architecture (IJCCSA), vol. 3, no. 3, pp. 1-14, June 2013.
Citation
Sunaina Mehta, Ashish Oberoi, Sarvjit Singh Bhatia, "A Cloud based Assurance Framework for Implementation of ERP in SMEs: A Literature Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.819-829, 2018.
Analysis of Abnormality based on Size in Red Blood Cells in Peripheral Blood Smear Images
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.830-834, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.830834
Abstract
The diagnostic formulations in patients rest on a tripod consisting of clinical history, physical examination and laboratory investigations. In most of the cases diagnoses are mainly done based on laboratory medicine. Current manual techniques lack precision and reproducibility and hence automated methods where an image of the smear is captured and analyzed offers more precision and accuracy. Accurate analysis of the cells including the red cells in the blood smear images is vital for the diagnosis of various diseases and pathological conditions in patients. This calls for accurate detection and segmentation of the Red Blood Cells (RBCs) prior to analysis. Normal RBCs are biconcave in shape with a central pale area and any deviation in most of the RBCs in their size and ratio of the total surface area of the cell to the central pale area from the normal represents an abnormality. If the size and volume of an RBC is less than a normal cell it is indicative of a pathological process called as microcytosis and on the other hand macrocytosis is the condition where the cell is enlarged. This paper proposes an automated method of analyzing the RBCs in blood smear images for morphological abnormalities, which is an extension of an earlier work focusing on segmentation of all the cells in the blood smear images using Watershed Transform.
Key-Words / Index Term
Segmentation, Watershed Algorithm, Morphological Operations, Mean Corpuscular Volume
References
[1] F. Sheeba, H.M. Thomas, J.J. Mammen, “Segmentation and Watermarking of Peripheral Blood Smear Images” In the Proceedings of the 5th IEEE Conference on Bio-Inspired Computing – Theory and Applications (BICTA), Liverpool Hope University, UK, pp. 1373-1376, 2010.
[2] J.J. Mammen, P. Maqlin, F. Sheeba, T. Robinson, “Making Malarial Diagnosis More Reliable: Using Image Analysis for Identification of Plasmodium Falciparum Gameotcytes”, Journal of Pathology Informatics, vol.2:43e, pp. s19-20., 2011
[3] F. Sheeba, T. Robinson, J.J. Mammen, H.M. Thomas, A.K. Nagar, “White Blood Cell Segmentation and Reversible Watermarking”, in the Proceedings of the IASTED International Symposia on Imaging and Signal Processing in Healthcare and Technology (ISPHT), Washington DC, USA,, 2011.
[4] F. Sheeba, A.K. Nagar, T. Robinson, J.J. Mammen, “Segmentation of Peripheral Blood Smear Images Using Tissue-Like P Systems”, International Journal of Natural Computing Research, 3(1), pp, 16-27, 2012.
[5] F. Sheeba, T. Robinson, J.J. Mammen, A.K. Nagar, “Detection of Plasmodium Falciparum in Peripheral Blood Smear Images”, in the Proceedings of the International Conference on Bio-Inspired Computing – Theory and Applications (BICTA) 2012, ABV-IITM, Gwalior, India, 2012.
[6] F. Sheeba, T. Robinson, J. Michael, P. Maqlin, J.J. Mammen, “Segmentation of Sputum Smear Images for Detection of Tuberculosis Bacilli”, BMC Infectious Diseases, 2012
[7] F. Sheeba, T. Robinson, J.J. Mammen, A.K. Nagar, “Splitting of Overlapping Cells in Peripheral Blood Smear Images by Concavity Analysis”, Lecture Notes in Computer Science, Volume: 8466, 2015.
[8] F. Sheeba, T. Robinson, J.J. Mammen, M. Kumar, V. Rangslang, “Convex Hull Based Detection of Overlapping Red Blood Cells In Peripheral Blood Smear Images”, in the IFMBE Proceedings of 7th WACBE World Congress on Bioengineering, Vol. 52, pp. 51-53, 2015.
[9] F. Sheeba, T. Robinson, J.J. Mammen, A.K. Nagar, “Segmentation of Overlapping Gametocytes of P.falciparum using the Active Contour Model”, in the RPS Proceedings of 17th International Workshop on Combinatorial Image Analysis, ISI, Kolkatta, 2015.
[10] F. Sheeba, T. Robinson, J.J. Mammen, R. Nithish, S. Karthick, “Detection Of Overlapping Tuberculosis Bacilli in Sputum Smear Images”, in the IFMBE Proceedings of the 7th WACBE World Congress on Bioengineering, pp 54-56, 2015.
[11] N.H. Mahmood, M.A Mansor, “Red Blood Cells Estimation using Hough Transform Technique”, Signal & Image Processing : an International Journal (SIPIJ)”, Vol.3, No.2, 2012.
[12] H. Khajehpour, A.M. Dehnavi, H. Taghizad, E. Khajehpour, M. Naeemabadi, “Detection and Segmentation of Erythrocytes in Blood Smear Images Using a Line Operator and Watershed Algorithm”, Journal of Medical Signals and Sensors, Jul-Sep 3(3), pp. 164–171, 2013.
[13] J.M. Sharif, M.F. Miswan, M,A, Ngadi, M.D. Sah, H.J. Salam, M. Mahadi, B.A. Jamil, “Red Blood Cell Segmentation using Masking and Watershed Algorithm: A Preliminary Study”, In the Proceedings of the International Conference on Biomedical Engineering (ICoBE), 2012.
[14] A.P Janwale, “Plant Leaves Image Segmentation Techniques: A Review”, International Journal of Computer Sciences and Engineering 5(5), pp. 147-150, 2017
[15] K. P. Palli, S. R. Edara, K. Chandrasekharaiah, “Segmentation of RBC in Blood Smear Image using Discrete Shearlet Transform”, International Journal of Computer Applications 137(6), pp. 1-4, 2016.
[16] S. Kulasekaran; F. Sheeba; J.J. Mammen; B. Saivigneshu; S. Mohankumar, “Morphology Based Detection of Abnormal Red Blood Cells in Peripheral Blood Smear Images”, in the IFMBE Proceedings of the 7th WACBE World Congress on Bioengineering pp 57-60, 2015.
[17] D. N. Patil, U. P. Khot, “Image Processing Based Abnormal Blood Cells Detection”, International Journal of Technical Research and Applications Special Issue 31, pp. 37-43, 2015.
[18] Razalitomari, W.N. Wanzakaria, M.M. Abduljamil, F. Mohdnor, N. F. Nikfuad, “Computer Ai.ded System For Red Blood Cell Classification In Blood Smear Image”, Procedia Computer Science, Volume 42, pp. 206-213, 2014.
[19] S. Bala, A. Doegar , “Automatic Detection of Sickle cell in Red Blood cell using Watershed Segmentation” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015.
Citation
F. Sheeba, T. Robinson, J.J. Mammen, J.M.S. Philips, T. Sathyaraj, S.V. Prabhu, "Analysis of Abnormality based on Size in Red Blood Cells in Peripheral Blood Smear Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.830-834, 2018.
Textual Similarity Detection from Sentence
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.835-839, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.835839
Abstract
In computer science, textual similarity used for detecting the similarity between words, terms, sentences, paragraph, and document. In natural language processing, sentence similarity performs the tasks such as document summarization, word sense disambiguation, short answer grading , and information retrieval. The lexical overlapping approach evaluates the similarity between the sentence and finds whether a sentence pair is semantically equivalent or not. Existing methods are used for checking the similarity of long text documents. These methods process sentences in high-dimensional space and are not much efficient, requires human input and also not adaptable to some application domains. Semantic textual similarity methods improved in two areas -(a) in the semantic relation between the words and (b) in semantic resources to reduce the dimension. The proposed architecture uses the two methods for directly computing the similarity between very short texts of the sentence and long text sentences. The Weighted Overlap Approach based proposed method provides a nonparametric similarity by comparing the similarity of the rankings for an intersection of the senses in both the sentences. The Cosine similarity based proposed method identify all distinct words from the sentences. In the proposed work the similarity detection methods are focused to check the synonyms similarity between the sentences.
Key-Words / Index Term
Natural Language Processing, Semantic Textual Similarity, Word Similarity, Sentence similarity, Text Similarity
References
[1]. Y. Li, D. McLean, Z. A. Bandar, J. D. OShea, and K. Crockett. 2006. "Sentence similarity based on semantic nets and corpus statistics". In the procedding of Transactions on Knowledge and Data Engineering IEEE, Vol.18(8), pp. 1138-1150.
[2]. Y. Liu and C.Q. Zong, "Example-Based Chinese-English Machine Translation", In the proceding of.2004 IEEE Intternational Conf Systems, Man, and Cybernetics, Vol.1-7, 2004, pp.6093-6096.
[3]. LiHong, D. Wang, and M. Huang, "Improved Sentence Similarity Algorithm based on VSM and its application in Question Answering System". Intelligent Computing and Intelligent Systems (ICIS), 2010, In the procedding of International Conference on IEEE, 2010, pp. 368 - 371.
[4]. Eneko Agirre, Daniel Cer, Mona Diab and Gonzalez-Agirre Aitore, 2012. SemEval-2012 task6: "A pilot on Semantic textual Similarity". procedding of First Joint Conference on Lexical and Computational Semanticcs,June 7-8, 2012. pages 385-393.
[5]. Z. Wu and M. Palmer, "Verb semantics and lexical selection", In the Proceedings of 32nd annual Meeting of the Association for Computational Linguistics, (1994) June. IEEE, 2005, pp. 27-30.
[6]. R. M. Courtney Corley, "Measuring the semantic similarity of texts," proceding of in ACL workshop on Empirical Modeling of semantic Equivalence and Entailment (EMSEE),2013. IEEE, 005, pp. 13-18.
[7]. R. RL. Xu, D. Wang, and M. Huang, "Improved Sentence Similarity Algorithm based on VSM and its application in Question Answering System." Intelligent Computing and Intelligent Systems (ICIS), 2010, procedding of International Conference on IEEE, 2010, pp. 368 - 371.
[8]. Jiang, Jay J., and David W. Conrath. "Semantic similarity based on corpus statistics and lexical taxonomy", In the Proceedings of ROCLING X, Taiwan, 1997, https://arxiv.org/abs/cmp-lg/9709008 accessed on November 7, 2017.
[9]. Z.Jingling , Z. Huiyun , Cui .Baojiang ."Sentence Similarity Based on Semantic Vector Model" In the procedding of Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 2014, IEEE, pp. 499-503.
[10]. Emiliano Giovannetti, Simone Marchi, and Simonetta Montemagni, "Combining Statistical Techniques and Lexico -syntactic Patterns for Semantic Relations Extraction from Text", In the procedding of sixth international conference on Stastical Technique 2008,IEEE, pp. 399-402.
Citation
S.L. Patil, K.P. Adhiya, "Textual Similarity Detection from Sentence," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.835-839, 2018.
Probabilistic Support Vector Regression Classification Model for Credit Card Fraud Detection
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.840-843, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.840843
Abstract
The researchers have already worked with many supervised and unsupervised methods for the purpose of credit card fraud detection. The supervised models have been found more efficient for the purpose of credit card fraud detection. The major goal of the credit card fraud detection research is to improve the accuracy while decreasing the elapsed time. The proposed credit card fraud detection models purposes the use of feature extraction and selection of the credit card data with linear regression algorithm for the credit card fraud detection. The feature engineering and analysis would be performed over the given trans-actional data and then final classification of the anomalies or outliers is done using linear regression classifier. The proposed model has been tested under the various experiments from the various groups of test cases. The test case groups have been ob-tained after applying the various levels of the feature elimination and feature selection over the collection of credit card transac-tion data. The proposed credit card fraud classification model is based upon two different models, which includes the Naïve Bayes and Support Vector Regression. The main aim of the research is to achieve the higher credit card fraud recognition accuracy, with the minimum classification complexity.
Key-Words / Index Term
Credit card fraud detection, Early Fraud Detection, Regressive analysis, Linear regression models
References
[1]. Li, Jinyan, Simon Fong, Yan Zhuang, and Richard Khoury. "Hierarchical classification in pattern discovery for outlier analysis of credit card database." Soft Computing (2015): 1-10.
[2]. Prollochs, Nicolas, Stefan Feuerriegel, and Dirk Neumann. "Enhancing Outlier analysis of Financial News by Detecting Negation Scopes." InSystem Sciences (HICSS), 2015 48th Hawaii International Conference on, pp. 959-968. IEEE, 2015.
[3]. Cui, Limeng, Fan Meng, Yong Shi, Minqiang Li, and An Liu. "A Hierarchy Method Based on LDA and SVM for Credit card fraud detection." In Data Mining Workshop (ICDMW), 2014 IEEE International Conference on, pp. 60-64. IEEE, 2014.
[4]. Ouyang, Yuanxin, Yao Huangfu, Hao Sheng, and Zhang Xiong. " target on the problem of news title classification which is an essential and typical member in short text fami-ly." In Neural Information Processing, pp. 581-588. Springer International Publishing, 2014.
[5]. Krishnlal G, S Babu Rengarajan, K G Srinivasagan, “ A new pattern discovery approach based on HMM-SVM for web credit card fraud detection” International Journal of Computer Applications (0975-8887) Volumn 1- No.19,2010.
[6]. Vandana Korde, C namrata Mahender, “Text classification and classifier a survey,” International Journal of Artificial Intelligence and Application (IJAIA), vol.3, No.2, March2012.
[7]. Mita K. Dalal, Mukesh A.Zaveri,” Automatic text Classifica-tion,” International Journal of Computer Applications (0975-8887) Volumn 28- No.2, August 2011.
[8]. Denial I.Morariu, Lucian N. Vintan, and Volker Tresp, “Meta- Clalssification using SVM classifiers for text documents “, “World Academy of science engineering and technology” 21,2006.
[9]. Hyeran Byun 1 and Seong-Whan Lee2, “ Application of Sup-port Vector machines for pattern recognition: A Survey,” SVM 2002, LNCS 2388,pp.213-236,2002.
[10]. D. Morariu, R. Cre,Tulescu and L.,Vin,tan, “ improving the SVM Meta Clssifier for text document by using Naïve bayes,”Int. J. of Computers, communication and control, ISSN 1841-9844.
[11]. Lie Lu, Stan Z. Li and Hong –Jiang Zhang, “ Content based Audion Segmentation using Support vector machine.”
[12]. CREŢULESCU, Radu George, and N. VINŢAN Lucian. "Contributions to Document Classification System Design." Vol. 1, Issue 1, SIBIU, 2011.
[13]. Hyeran Byun 1 and Seong-Whan Lee2, “ Application of Sup-port Vector machines for pattern recognition: A Survey,” SVM 2002, LNCS 2388,pp.213-236,2002.
[14]. Krishnlal G, S Babu Rengarajan, K G Srinivasagan, “ A new pattern discovery approach based on HMM-SVM for web credit card fraud detection” International Journal of Computer Applications (0975-8887) Volumn 1- No.19,2010.
[15]. Zhang, Yulei, Yan Dang, Hsinchun Chen, Mark Thurmond, and Cathy Larson. "Automatic credit card database monitoring and classification for syndromic surveillance." Decision Support Systems 47, no. 4 (2009): 508-517.
Citation
Nikita Sawhney, B. Kaur, H. Kaur, "Probabilistic Support Vector Regression Classification Model for Credit Card Fraud Detection," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.840-843, 2018.