TECHNOLOGICAL CYBERCRIME IN INDIA AND ITS HINDRANCE
Technical Paper | Journal Paper
Vol.6 , Issue.10 , pp.789-791, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.789791
Abstract
Today new technologies are entering into the world that is providing many informational resources. Technologies are needed in fast moving of information. Maximum security is created, but some lacks in security. It could be identified by cyber criminals and they are moving faster in global era and moreover they could be entering into human privacy. Information is wealth that could bring more facilities to business, entertainment, education and mobility. In India many cyber criminals are rapidly growing and breaking the security to earn money. This could be cultivated day to day by police, but many lacking in software’s and investigation. Every day cyber criminals are born and it could be endless one. This paper deals with many security depends on analyzing the various types are crime and deals with methodology like classification techniques to prevent the information from cyber-attacks.
Key-Words / Index Term
Cybercrime statistics, Methods of prevention, Hacking, Unauthorized access and Classification
References
[1]. S. Shriram, RESEARCH ARTICLE CYBER SECURITY AND RELATED CRIMES IN INDIAN SCENARIO International Journal of Current ResearchVol. 6, Issue, 03, pp.5403-5412, March, 2014
[2]. Shubham Kumar, Guide Faculty - Dr.SantanuKoley, Associate Professor, *Uday Kumar * 2017 “Present scenario of cybercrime in INDIA and its preventions”International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 1971 ISSN 2229-5518
[3]. AnimeshSarmah, RoshmiSarmah , AmlanJyotiBaruah, “A brief study on Cyber Crime and Cyber Law’s of India” International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017
[4]. Subhash Desai “Study of Online Cyber Crimes in India”American Journal of Computer Science and Engineering SurveyISSN 2349 – 7238
[5]. P. K. Paul* & P. S. Aithal** “cybercrime: challenges, issues, recommendation and suggestion in indian context“
International Journal of Advanced Trends in Engineering and Technology (IJATET), ISSN (Online): 2456 - 4664 (www.dvpublication.com) Volume 3, Issue 1, 2018
[6]. 1Alpna, 2Dr. SonaMalhotra “Cyber Crime-Its Types, Analysis and Prevention Techniques” Volume 6, Issue 5, May 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
[7]. SoumyaSatishRevankar “cybercrime and cyber security “ International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017
[8]. Jitender Kumar, “Cyber Crime in India: An Overview”. Imperial Journal of Interdisciplinary Research (IJIR)Vol-3, Issue-4, 2017ISSN: 2454-1362.
[9]. M. Elavarasi1* and N. M. Elango22017 “Analysis of Cybercrime Investigation Mechanism in India” Indian Journal of Science and Technology, Vol 10(40), DOI: 10.17485/ijst/2017/v10i40/119416, October 2017
[10]. PoojaAggarwal, PiyushArora, Neha, Poonam “Review on cyber crime and security” , 2014International Journal of Research in Engineering and Applied Sciences (IJREAS)
Citation
M. Suriakala, P. Narayanasamy, "TECHNOLOGICAL CYBERCRIME IN INDIA AND ITS HINDRANCE," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.789-791, 2018.
A Survey on Cross - Domain Opinion Mining
Survey Paper | Journal Paper
Vol.6 , Issue.10 , pp.792-796, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.792796
Abstract
The social network growth is increased and the interest of people in analyzing reviews and opinions for products before buy them. In this regarding research communities, academia, public and service industries are working rigorously on sentiment analysis, also known as, opinion mining, to extract and analyze public mood and views. Analyzing the sentiments in massive user-generated online data, such as product reviews and micro blogs, has become a hot research topic. Sentiment analysis is widely known as a domain dependent problem. In this paper presents a rigorous survey on cross domain sentiment analysis, challenges for social media, then identified problems in different domains usually have different sentiment expressions and a general sentiment classifier is not suitable for all domains. The main problem is the selection of sentiment from huge volume of opinionated data for different kinds of event which is available in the social networks, but there exist a huge difficulty in predicting the accurate outcome of the event at cross domain. A natural solution to this problem is to train a domain-specific sentiment classifier for each target domain. However, the labeled data in target domain is usually insufficient, and it is costly and time-consuming to annotate enough samples.
Key-Words / Index Term
Data Mining, Opinion Mining, Machine Learning, Cross - Domain Sentiment Analysis, SentiWordNet
References
[1] S. J. Pan, X. Ni, J.-T. Sun, Q. Yang, and Z. Chen, ‘‘Cross-domain sentiment classification via spectral feature alignment,’’ in Proc. 19th Int. Conf. World.Wide Web, vol. 10.2010, p. 751.
[2] C. Lin, Y. Lee, C. Yu, and H. Chen, ‘‘Exploring ensemble of models in taxonomy-based cross-domain sentiment classification,’’ in Proc. 23rd ACM Int. Conf. Conf. Inf. Knowl. Manage.-(CIKM), 2014, pp. 1279 –1288.
[3] J. Blitzer, R. McDonald, and F. Pereira, ‘‘Domain adaptation with structural correspondence learning,’’ in Proc. Conf. Empirical Methods Natural Lang. Process., 2006, pp. 120–128.
[4] J. Blitzer, M. Dredze, and F. Pereira, ‘‘Biographies, bollywood, boom-boxes and blenders: Domain adaptation for sentiment classification,’’ in Proc. ACL, vol. 7. 2007, pp. 440–447.
[5] J. Yu and J. Jiang, ‘‘Learning sentence embeddings with auxiliary tasks for cross-domain sentiment classification,’’ in Proc. Conf. Empirical Methods Natural Lang. Process., 2016, pp. 236–246.
[6] D. M. Blei and M. I. Jordan, ‘‘Modeling annotated data,’’ in Proc. 26th Annu. Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 2003, pp. 127–134.
[7] Pang, Bo, Lillian Lee, and ShivakumarVaithyanathan. "Thumbs up?: sentiment classification using machine learning techniques." Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10.Association for Computational Linguistics, 2002.
[8] Turney, Peter D. "Thumbs up or thumbs down?: semantic orientation applied to unsupervised classification of reviews." Proceedings of the 40th annual meeting on association for computational linguistics.Association for Computational Linguistics, 2002.
[9] Yan Dang; Yulei Zhang; Hsinchun Chen, "A Lexicon-Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews, Intelligent Systems, IEEE , vol.25, no.4, pp.46,53, July-Aug.2010 doi: 10.1109/MIS.2009.105
[10] Hung, Chihli, and Hao-Kai Lin. "Using objective words in SentiWordNet to improve word-of-mouth sentiment classification." IEEE Intelligent Systems 28.2 (2013): 0047-54.
[11] Bhaskar, J.; Sruthi, K.; Nedungadi, P., "Enhanced sentiment analysis of informal textual communication in social media by considering objective words and intensifiers," Recent Advances and Innovations in Engineering (ICRAIE), 2014 , vol., no., pp.1,6, 9-11 May 2014 doi: 10.1109/ICRAIE.2014.6909220.
[12] Muhammad faheem Khan, Aurangzeb and khairullah khan efficient word sense disambigutionteqnique for sentence level sentiment classification of online review‖ Sci.Int(Lahore).25(4),2013.
[13] Bollegala, D.; Weir, D.; Carroll, J., "Cross-Domain Sentiment Classification Using a Sentiment Sensitive Thesaurus," Knowledge and Data Engineering, IEEE Transactions on , vol.25, no.8, pp.1719,1731, Aug. 2013 doi: 10.1109/TKDE.2012.103
[14] A. Esuli, F. Sebastiani, SENTIWORDNET: a publicly available lexical resource for opinion mining, in: Proceedings of the 5th Conference on Language Resources and Evaluation LREC-06, Genoa, Italy, 2006, pp. 417–422.
[15] S. Baccianella, A. Esuli, F. Sebastiani, SENTIWORDNET 3.0: an enhanced lexical resource for sentiment analysis and opinion mining, in: Proceedings of LREC10, Malta, 2010, pp. 2200–2204.
[16] A. Moreo, M. Romero, J.L. Castro, J.M. Zurita, Lexicon-based commentsoriented news sentiment analyzer system, Expert Syst. Appl. 39 (2012) 9166– 9180.
[17] H. Cho et al., Data-driven integration of multiple sentiment dictionaries for lexicon-based sentiment classification of product reviews, Knowl.-Based Syst. 71 (2014) 61–71.
[18] M. Hu, B. Liu, Mining and summarizing customer reviews, in: Proceedings of Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2004, pp. 168–177.
[19] F.Å. Nielsen, A New ANEW: Evaluation of a Word List for Sentiment Analysis in Microblogs, 2011.
[20] M. Taboada, J. Brooke, M. Tofiloski, Lexicon-based methods for sentiment analysis, Comput.Linguist. 37 (2) (2011) 267–307.
[21] A. Weichselbraun, S. Gindl, A. Scharl, Extracting and grounding contextualized sentiment lexicons, IEEE Intell. Syst. 28 (2) (2013) 39–46.
[22] D. Bollegala, D. Weir, J. Carroll, Cross-domain sentiment classification using a sentiment sensitive thesaurus, IEEE Trans. Knowl. Data Eng. 25 (8) (2013).
[23] E. Riloff, J. Wiebe, Learning extraction patterns for subjective expressions, in: Proceedings of the 2003 Conference on Empirical Methods in Natural Language Processing (EMNLP 2003), 2003, pp. 105–112.
[24] P.J. Stone, E.B. Hunt, A computer approach to content analysis: studies using the general inquirer system, in: Proceedings of the Spring Joint Computer Conference (AFIPS 1963), 1963, pp. 241–256.
[25] E. Cambria, R. Speer, C. Havasi, A. Hussain, SenticNet: a publicly available semantic resource for opinion mining, in: AAAI Fall Symposium: Commonsense Knowledge, vol. 10, p. 02, 2010.
[26] J.C. de Albornoz, L. Plaza, P. Gervas, Sentisense: an easily scalable conceptbased affective lexicon for sentiment analysis, in: Proceedings of the 8th International Conference on Language Resources and Evaluation (LREC 2012), 2012, pp. 3562–3567.
[27] S. Cerini, V. Compagnoni, A. Demontis, M. Formentelli, C. Gandini, Micro- 862 WNOp: a gold standard for the evaluation of automatically compiled lexical resources for opinion mining, in: A. Sanso (Ed.), Language Resources and Linguistic Theory, Franco Angeli, 2007, pp. 200–210.
[28] S. Tan, X. Cheng, Y. Wang, H. Xu, Adapting naive bayes to domain adaptation for sentiment analysis, in: M. Boughanem et al. (Eds.), ECIR 2009, LNCS 5478, 2009, pp. 337–349.
[29] K. Bollacker, C. Evans, P. Paritosh, T. Sturge, J. Taylor, FreeBase: a collaboratively created graph database for structuring human knowledge, in: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, ACM, 2008, pp. 1247–1250.
[30] C. Bizer, J. Lehmann, G. Kobilarov, S. Auer, C. Becker, R. Cyganiak, S. Hellmann, DBpedia-A crystallization point for the web of data, Web Semant.: Sci., Serv. Agents World Wide Web 7 (3) (2009) 154–165.
[31] J. Blitzer, M. Dredze, F. Pereira, Biographies, bollywood, boom-boxes and blenders: domain adaptation for sentiment classification, in: Proceedings of the 45th Annual Meeting of the Association for Computational Linguistics, ACL’07, vol. 7, 2007, pp. 187–205 (13, 29).
[32] B. Pang, L. Lee, A sentiment education: sentiment analysis using subjectivity summarization based on minimum cuts, in: Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics, July 2004, p. 271.
[33] Z.Yan et al, EXPRS: an extended page rank method for product feature extraction from online consumer reviews, Inform Manage (2015), http://dx.doi.org/10.1016/j.imm.2015.02.002
[34] A.Hendari, Mhd. A.Tavakoli, N.Salim, Z.Hendari, Detection of Review Spam:aSurvvey, Expert Syst. Appl. 42 (7) (2015) 3634 – 3642.
[35] JyotiS.Deshmukh a, Amiya Kumar Tripathy, Entropy based Classifier for Cross – Domain Opinion Mining, Applied Computing and Informatics 144 (2017) 55-64.
Citation
V. Manimekalai, S. Gomathi @ Rohini, "A Survey on Cross - Domain Opinion Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.792-796, 2018.
Study Report of existing forensic tools and technologies to identify Darknet
Review Paper | Journal Paper
Vol.6 , Issue.10 , pp.797-800, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.797800
Abstract
DarkNet is the portion of Internet that is intentionally kept hidden and is only accessible by special soft wares and non-standard communication protocols and ports. Accessing these portion is not illegal at all times, but these software make it possible to keep the user anonymous and preserve data privacy. Anonymous communication has gained popularity and is of much interest. Anonymity leads to compromising nonrepudiation and security goals. Apart from providing freedom of speech to user, anonymity also provides conducive environment to illegal activities and different kinds of cyber-attacks. Network surveillance and forensic investigation is required to reconstruct or collect evidence but becomes a challenge due to anonymity, encryption and newer ways of cyber-attack. Innovative methods and techniques are required for overcoming these challenges of DarkNet. Sniffing the network for information, traffic analysis, anomaly and intrusion detection are few techniques to find evidences. With a plethora of tools and techniques available for collecting, identifying, processing and analyzing data on the networks, we try to explore few tools for forensic investigation in the DarkNet.
Key-Words / Index Term
Darknet, Freenet, I2P, Tor, whonix
References
[1] Dr. Digvijaysinh Rathod,” Darknet forensic”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 6, Issue 4, July- August 2017
[2] Rhyme Upadhyaya, Aruna Jain, “Cyber Ethics and Cyber Crime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet ”, Published in International Conference on Computing, Communication and Automation (ICCCA), pp.143-148 ,2016
[3] Afzaal Ali, Maria Khan, Muhammad Saddique , Umar Pirzada, Muhammad Zohaib, Imran Ahmad, Narayan Debnath “ TOR vs I2P: A Comparative Study”, Published in: 2016 IEEE International Conference on Industrial Technology (ICIT), pp.1748-1751, 2016
[4] Thorsten Ries, Andriy Panchenko, Radu State and Thomas Engel , “Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance”, AISC `11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116, 2011
[5] Roger Dingledine, Nick Mathewson, Paul Syverson,” Tor: The Second-Generation Onion Router”, 13th conference on USENIX Security Symposium - Volume 13, 2004
[6] Clarke I., Sandberg O., Wiley B., Hong T.W. (2001) Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath H. (eds) Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol 2009. Springer, Berlin, Heidelberg.
[7] Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor, “A Bird`s Eye View on the I2P Anonymous File-sharing Environment”,
Proceedings of the 6th International Conference on Network and System Security, pp.135-148, 2012.
[8] Whonix, www.whonix.org/wiki, 25-Aug- 2018
[9] Packet Sniffer-Fiddler, https://www.telerik.com/fiddle, 25-Aug- 2018
[10] Netminer Sniffer and Network Visualization tool, www.netminer.com, 25-Aug- 2018
[11] Wireshark and ethereal network protocol analyser toolkit,1st edition, elsevier,ISBN: 9781597490733
[12] Capsa Real time portable network anlalyser, Users Guide, 2018
[13] Netsnigg-ng as Network analyser, www.netsniff-ng.org, 20-Sep 2018
[14] M Roesch - Lisa , “ Snort: lightweight intrusion detection network”, Proceedings of LISA `99: 13th Systems Administration Conference, 1999
[15] Suricata IDS, www.suricata-ids.org, 25-Aug- 2018
[16] Bro IDS, www.bro.org/sphinx/intro, 25-Aug - 2018
[17] Security Onion IDS, www.securityonion.net, 25-Aug - 2018
[18] Openwips IPS, www.openwips-ng.org, 25-Aug - 2018
[19] Kismet IDS, www.kismetwireless.net/ 25-Aug - 2018
[20] NetDetecor IDS, www.niksun.com, 25-Aug - 2018
[21] Seong Soo Kim and A. L. Narasimha Reddy, “NetViewer: A Network Traffic Visualization and Analysis Tool” Texas A&M University, 19th Large Installation System Administration Conference (LISA ’05), 2005
[22] Network monitoring tool, www.manageengine.com/products/netflow, 25-Aug - 2018
[23] Elasticsearch, www.elastic.co/products/kibana 25-Aug - 2018
Citation
Preeti S. Joshi, Dinesha H.A., "Study Report of existing forensic tools and technologies to identify Darknet," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.797-800, 2018.
Performance Evaluation Using Classifier Algorithm On Endometrial Cancer Data
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.801-807, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.801807
Abstract
Many factors affecting the success of data mining techniques, the pureness of data are one of the factors. The inclusion of irrelevant and noisy data in the pattern analyzing phase, can results poor predicting performance. To discover information from the endometrial carcinoma data set, the pre-processing technique such as cleaning, transforming and modelling are applied. Diverse kinds of pre-processing techniques were functions in the data set in order to work with the full pledged data set. Methodology Used: The data mining tool WEKA is used for feature selection. Using various classifiers, evaluators and search methods six features are selected out of eighteen, attributes. The performance evaluation was done using RStudio. The accuracy of the classifiers model Random Forest and Naïve Bayes are checked for the minimized and full data sets. The hybrid model was formed by combing both the models to improve the performance of the classifier model. Findings: The Hybrid model was adopted for the performance evaluation by combining naïve Bayes and random forest classifier and the accuracy of the new model is 93.55%.
Key-Words / Index Term
WEKA; Endometrial; R; carcinoma; classifiers; Naïve Bayes; Random Forest
References
[1] A detailed guide – endometrial cancer. Available in http://www.cancer.org/cancer/endometrialcancer/what-is-endometrial-cancer.
[2] A detailed guide – endometrial cancer. Available in www. cancer. org/ cancer/ endometrial cancer/cancer-risk-factors.
[3] Chia-Ming Wang, Yin-Fu Huang, Evolutionary-based feature selection approaches with new criteria for data mining: A case study of credit approval data, Elsevier Journal, Expert Systems with Applications 36 (2009) 5900–5908
[4] E. Friberg & N. Orsini & C. S. Mantzoros & A. Wolk, Diabetes Mellitus And Risk Of Endometrial Cancer: A Meta-Analysis, Springer-Verlag 2007.
[5] F.Angiulli and C. Pizzuti, “Outlier Mining in Large High-Dimensional Data Sets”, IEEE Trans. on Knowledge and Data Engineering, vol. 17, no. 2, pp. 203-215, 2005.
[6] Faysal A Saksouk, MD; Chief Editor: Eugene C Lin, MD. Endometrial Carcinoma Imaging.
[7] Wrathematics (27 August 2011). "How Much of R Is Written in R". librestats. Retrieved 2018-08-07.
[8] “7 of the Best Free Graphical User Interfaces for R". linuxlinks.com. Retrieved 9 February 2016.
[9] Huan Liu and Lei Yu, Toward Integrating Feature Selection Algorithms for Classification and Clustering, IEEE Transactions on Computers, Pages 191 - 226
[10] J.Han, M.Kamber, J.Pei. Data Mining concepts and Techniques. 3rd Edition, Simon Fraser University, pages-230-240, 2006.
[11] M. Dash. Feature selection via set cover. In Proceedings of IEEE Knowledge and Data Engineering Exchange Workshop, pages 165–171, 1997.
[12] Mark Hall and Geoffrey Holmes, Benchmarking Attribute Selection Techniques for Discrete Class Data Mining, Mark Hall and Geoffrey Holmes, 2002
[13] Mark Hall, correlation based feature selection for district and numeric machine learning, In proc. Of 17th International conference on Machince Learning, ICML2000.
[14] P. Mitra, C. A. Murthy, and S. K. Pal. Unsupervised feature selection using feature similarity. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(3):301–312, 2002.
[15] P. Ravisankar, V. Ravi, G. Raghava Rao, I. Bose, Detection of financial statement fraud and feature selection using data mining techniques, Elsevier Journal Decision Support Systems 50 (2011) 491–500
[16] Ramya Rathan, Sridhar R, Balasubraminian S, Association Rule- Spatial Data Mining Approach For Exploration Of Endometrial Cancer Data, International Journal Of Advanced Research In Computer Science And Software Engineering, Volume 3, Issue 10, October 2013.
[17] The Cancer Genome Atlas Research Network. Integrated Genomic Characterization of Endometrial Carcinoma. Nature. May 2, 2013. DOI: 10.1038/nature12113.
[18] Wei-Shinn Ku, A Bayesian Inference-Based Framework for RFID Data Cleansing, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 10, Page - 2177, 2013
[19] K. Pavya, B. Srinivasan, "Enhancing Wrapper Based Algorithms for Selecting Optimal Features from Thyroid Disease Dataset", International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.7-13, 2018.
[20] B. Bakariya, G.S. Thakur, "Effectuation of Web Log Preprocessing and Page Access Frequency using Web Usage Mining", International Journal of Computer Sciences and Engineering, Vol.1, Issue.1, pp.1-5, 2013.
[21] G. Pandey, N. Mishra, "Optimal Feature Selection in Stream Data Classification Using Improved Ensemble Classifier for High Dimension Data", International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.12-18, 2016.
Citation
A. Hency Juliet, R. Padmajavalli, "Performance Evaluation Using Classifier Algorithm On Endometrial Cancer Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.801-807, 2018.
Suspecting Lupus by Analyzing Rashes using Artificial Neural Networks (ANN)
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.808-812, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.808812
Abstract
In this research paper lupus disease is suspected using Artificial Neural Networks (ANN). Lupus is a chronic disease which is not curable. But it can be controlled by early diagnosis. By analyzing various symptoms it is very difficult to diagnose lupus manually. This paper is an approach to diagnose lupus in an efficient way with the help of ANN. An ANN has been designed here to suspect lupus. The ANN consists of many neurons associated with weights. Each neuron represents each symptom. Here patients are classified into two categories: infected and non-infected. Classification is an important tool in medical diagnosis. The data was collected from North Bengal Medical College for training the net.
Key-Words / Index Term
Disease Suspection, Artificial Neural Networks (ANN), SLR
References
[1] Farhad Soleimanian Gharehchopogh, Maryam Molany and Freshte DabaghchiMokri, “Using Artificial Neural Network in diagnosis of thyroid disease”: a caseStudy, International Journal Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013.
[2] R. Dey, V. Bajpai, G. Gandhi, B. Dey, “Application of Artificial Neural Network (ANN) technique for Diagnosing Diabetes Mellitus”, the Third international Conference on Industrial and Information Systems(ICIIS), PP.1-4, IEEE, Kharagpur, India,2008..
[3] F.S. Gharehchopogh, Z.A. Khalifelu,” Neural Network Application in Diagnosis of Patient: A CaseStudy”, International Conference on Computer Networks and Information Technology (ICCNIT), PP- 245 – 249, Abbottabad, Pakistan, 2011.Study”, International Conference on Computer Networks and Information Technology (ICCNIT), PP. 245 – 249, Abbottabad, Pakistan, 2011.
[4] Payel Saha, Rakesh Kumar Mandal “Detection Of Dengue Disease using Artificial neural Network” International Journal of Computer Sciences and Engineering , May 12, 2016.
[5] Laurene Fausett, “ Fundamentals of Neural Networks”
[6]http://timesofindia.indiatimes.com/life-style/health-fitness/health-news/Living-with-lupus/articleshow/29909854.cms (Available online)
[7]https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3380630/#R11(Available online)
Citation
Payel Saha, Rakesh Kumar Mandal, "Suspecting Lupus by Analyzing Rashes using Artificial Neural Networks (ANN)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.808-812, 2018.
Cloud Computing Technologies for Privacy Data and Digital Security Authentication: A Literature Survey
Survey Paper | Journal Paper
Vol.6 , Issue.10 , pp.813-826, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.813826
Abstract
Cloud computing is a model for enabling ubiquitous convenient, where the resources of a data center are shared using virtualization technology. Cloud computing is one of the dynamic provisioning technology. Cloud computing technology can be implemented in a wide variety of architectures under different services and deployment models. Privacy to the data stored in cloud server is a major challenging operation in cloud computing. The objective of this paper is to explore different methods for efficiently growing latest digital techniques. The main aim of this paper is to design and propose strong security system to the data stored in the cloud system. This paper presents a literature review we studied the background work of carried-out by the various approaches about the uses of cloud technology. We have proposed framework and different methods which provides, identification of high protection. The literature review presents previous studies related to the objectives of the present study. Further various features that make the proposed framework more suitable for analysis and evaluation of cloud computing. The privacy cloud algorithms are categorized into subgroups according to the high level security concerns in the cloud computing.
Key-Words / Index Term
Cloud Computing, Privacy and Protection Technique, Digital Authentication for Data Security, Algorithms for Privacy
References
[1] Ranchal et al., “Protection of Identity Information in Cloud Computing without Trusted Third Party”, 2010 29th IEEE International Symposium on Reliable Distributed Systems, pp. 368-372, 2010.
[2] Z. Xin et al., “Research on Cloud Computing Data Security Model Based on Multi-dimension”,International Symposium on Information Technology in Medicine and Education, IEEE, pp. 897-900, 2012.
[3] Rao, Srinivasa and V Nageswara Rao, “Cloud Computing: an Overview”, Computing, pp71-76, 2009.
[4] Mell, Peter and Timothy Grance, “The NIST Definition of Cloud Computing”, National Institute of Standards and Technology, 2011.
[5] Mitra, A., & Kundu, A., “Cost optimized set of Primes Generation with Cellular Automata for Stress Testing in Distributed Computing”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) Procedia Technology, 10, Elsevier, pp 365-372, 2013.
[6] A.S. Tanenbaum and M. Van Steen., “Distributed systems: principles and paradigm”, prentice Hall PTR, Upper Saddle River, NJ, USA, 2001.
[7] C.S.R.Prabhu, “Grid and Cluster Computing”, 2012.
[8] Yeo, C. S., Buyya, R., Pourreza, H., Eskicioglu, R., Graham, P., & Sommers, F. “Cluster Computing: High-Performance, High-Availability, and High-Throughput Processing on a Network of Computer. Communication”, 1-24.
[9] R, Buyya, “High-Performance Cluster Computing: Architecture and system”, prentice Hall PTR, NJ, 1999.
[10] William Maples, “ High Performance Computing, Grid Computing”
[11] Zhang, M. A. Z. Y. D. P., “Adoptability of grid computing technology in power systems analysis, operations and control”, Engineering and Technology, 2009.
[12] Yeo, C. S., Buyya, R., Assunção, M. D. D., Yu, J., Sulistio, A., Venugopal, S., et al.,”Utility Computing on Global Grids Benefits of Utility Computing”. Group, 1-26.
[13] R. Buyya et al., “ Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities”,2008.
[14] A. Jansen,” Cloud Hooks: Security and Privacy Issues in Cloud Computing”, Proceedings of the 44th Hawaii International Conference on System Sciences, pp 1-10, 2011.
[15] N. Provos, “The Ghost In The Browser Analysis of Web-based Malware”, USENIX Association, 2007.
[16] D.Tao, “ Cloud Platform Based Automated Security Testing System for Mobile Internet”, Tsinghua Science and Technology, Vol. 20, Number 6,pp. 537-544, 2015.
[17] Hebiya et al., “Secure Data Storage Framework using Anti-XSS in cloud”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.4, Issue 11, pp. 11429- 11436, 2015.
[18] Kaushik et al., “Keyless User Defined Optimal Security Encryption”, International Journal of Computer and Electrical Engineering, Vol.4, No.2, pp. 99-103,2012.
[19] Gholami et al., “Big Data Security and Privacy Issues in the Cloud”, International Journal of Network Security & Its Applications, Vol.8, No.1, pp.59-79, 2016.
[20] Tang et al., “Multi-Tenancy Authorization Models for Collaborative Cloud Services”, International Conference on Collaboration Technologies and Systems, IEEE Xplore: pp.132-138, 2013.
[21] Goyal et al., “Veracity Aware Defense Algorithm (VADA) for Cloud computing environment”, pp. 57-68.
[22] K. Malviya et al., “On Security Issues in Web Applications through Cross Site Scripting (XSS)”, 20th Asia-Pacific Software Engineering Conference, pp.583-588,2013.
[23] Mircea, “Addressing Data Security in the Cloud”,International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol.6, No.6,pp.798-805, 2012.
[24] K. Dhanabakiyam,V. Divya,“Enhanced Protection Over Data Streams under Multiple Keys in Cloud”, International Journal of Advance Research, Ideas and Innovations in Technology, Vol. 4, Issue 2,pp.439-442,2018.
[25] Vijai et al., “An Efficient Framework Security Model of Sharing Data for Privacy Protection and Performance-Based Outsource Data Sharing on Cloud”,International Journal of Advance Research, Ideas and Innovations in Technology, Vol.4, Issue 2,pp.297-304,2018.
[26] Viswanadham et al., “Security Issues in Cloud Computing and Associated Mitigation Techniques”,Advances in Information Science and Computer Engineering,pp. 528-540.
[27] D.Bein, “The Impact of Cloud Computing on Web 2.0”, Economy Informatics, vol. 9, no.1,pp.9-12, 2009.
[28] J. Kumar et al., “Analysis of Security Vulnerabilities for web Based
Application”, Fourth International Conference on Advances in Recent Technologies in Communication and Computing, pp.233-236,2012.
[29] H.Albaroodi et al.,“A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift)”, Journal of Computer Science, 11 (3), 590-597, 2015.
[30] N.Nagar and U.Suman,“Architectural Comparison and Implementation of Cloud Tools and Technologies”,International Journal of Future Computer and Communication, Vol. 3, No. 3,pp.153-160, 2014.
[31] T. Sivasakthi and N. Prabakaran, “Applying Digital Signature with Encryption Algorithm of User Authentication for Data Security in Cloud Computing”, International Journal of Innovative Research in Computer and Communication Engineering,Vol. 2, Issue 2, pp. 3102-3107, 2014.
[32] S.Singh et al.,“Analysis of EnDeCloudReports for Encrypting and Decrypting Data in Cloud”, International Journal of Computer Applications, Vol. 136 – No.12,pp.12-16, 2016.
[33] K. Sarita, J. Thakur,“Data Centric Security Algorithms In Cloud Computing - A Review”, International Journal for Research in Applied Science & Engineering Technology, Vol.5 Issue X,pp.1155-1160, 2017.
[34] M.Panda, “Performance Analysis of Encryption Algorithms for Security”, International conference on Signal Processing, Communication, Power and Embedded System,2016.
[35] Chuang et al., “An Effective Privacy Protection Scheme for Cloud Computing”, pp.260-265,ICACT,2011.
[36] N. Nagar and U. Suman,“Two Factor Authentication using M-pin Server for Secure Cloud Computing Environment”, International Journal of Cloud Applications and Computing, 4(4), pp. 42-54,2014.
[37] V. Kapoor, “A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security”, Int. J. Sci. Res. In Network Security and Communication, Vol.1 Issue 2,pp.39-46, 2013.
[38] Prakash et al., “Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System”, International Journal of Engineering and Computer Science, Vol.3 Issue 4, pp. 5215-5223, 2014.
[39] Priyanka et al., “A New Approach for Design of Model Matching Controllers for Time Delay Systems by Using GA Technique”,Journal of Engineering Research and Applications, Vol. 5, Issue 1, pp.89-99 ,2015.
[40] K. Dasgupta et al., “A Genetic Algorithm (GA) based Load Balancing Strategy for Cloud Computing”,International Conference on Computational Intelligence: Modeling Techniques and Applications, pp. 340 – 347, 2013.
[41] Changhee H., J. Hur,“Efficient and privacy-preserving biometric identification in cloud”, The Korean Institute of Communications Information Sciences, Publishing Services Elsevier, pp.135-139,2016.
[42] John et al.,“Cryptanalytic Attacks on Pseudorandom Number Generators”, pp. 1-22.
[43] N. Saravanan et al., “An Implementation of RSA Algorithm in Google Cloud using Cloud SQL”,Research Journal of Applied Sciences, Engineering and Technology 4(19), pp.3574-3579, 2012.
[44] G.Singh, supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”,International Journal of Computer Application, Vol. 67– No.19,pp.33-38, 2013.
[45] Karthik S. et al.,“Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System”,International Journal of Scientific Engineering and Research,Vol. 2 Issue 11, pp.24-31, 2014.
[46] P.Mahajan et al., “A Study of Encryption Algorithms AES, DES and RSA for Security”, Global Journal of Computer Science and Technology Network, Web & Security,Vol.13 Issue 15 Version 1.0, pp.15-22, 2013.
[47] R. Kaur ,S. Kinger, “Analysis of Security Algorithms in Cloud Computing”,International Journal of Application or Innovation in Engineering & Management, Vol.3, Issue 3,pp. 171-176, 2014.
[48] Hebiya et al., “Secure Data Storage Framework using Anti-XSS in cloud”,International Journal of Innovative Research in Science,Engineering and Technology, Vol.4, Issue 11, pp.11429- 11436, 2015.
[49] R. K. Seth, et al., “TBDS- A New Data Security Algorithm in Cloud Computing”, International Journal of Computer Science and Information Technologies, Vol. 5 (3) , pp., 2703-2706, 2014.
[50] D.Rao et al., “A Design of Cloud Privacy Manager Algorithm”, International Journal of Computer Science and Network Security, Vol.12, No.7,pp.36-41, 2012.
[51] Buyya et al., “Cloud Computing Principles and Paradigms”.
[52] Mihai et al., “Cloud Security Is Not (Just) Virtualization Security”,
CCSW-09, 2009.
[53] A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, Proceedings of the 44th Hawaii International Conference on System Sciences, pp 1-10, 2011.
[54] Dale L, “Virtualization Technologies in Information Systems Education”, Journal of Information Systems Education, Vol.20 (3), PP.339-348.
[55] M. A. Vouk,“Cloud Computing – Issues, Research and Implementations”, Journal of Computing and Information Technology - CIT 16, 4, pp.235–246, 2012.
[56] M.Komu et al., “Secure Networking for Virtual Machines in the Cloud”, IEEE International Conference on Cluster Computing Workshops,pp. 88-96, 2012.
[57] B. Furht and A. Escalante, “Handbook of cloud computing”, Springer New York Dordrecht Heidelberg London, ISBN 978-1-4419-6523-3, 2010.
Citation
Rakesh Prasad Sarang , "Cloud Computing Technologies for Privacy Data and Digital Security Authentication: A Literature Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.813-826, 2018.
Performance Comparison of Forecasting on Solar Plant Generation Data
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.827-834, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.827834
Abstract
The purpose of this paper is to compare the forecasting performances of daily generation of a solar plant by utilizing the autoregressive time series models. As the demand for energy is increasing frequently all over the world, the proper integration of solar energy and its accurate predictions become necessary for our society for better planning and distribution of energy. In this study, we compare our solar energy time series data with Autoregressive Integrated Moving Average with Explanatory Variable (ARIMAX) and Vector Autoregressive (VAR) time series models for analyzing our solar plant data separately and at last conclusion is made on the better performance of these two methods. Moreover for VAR model effects of various variables are tested for maximum production of solar power. For evaluating the accuracy performance of our forecasted data, we use Mean Absolute Error (MAE), Mean Absolute Scaled Error (MASE) and Root Mean Square Error (RMSE) measurements.
Key-Words / Index Term
ARIMAX, MAE, MASE, RMSE, Solar Plant Generation, VAR
References
[1] A. Jalalkamali, M. Moradi and N. Moradi, “Application of several artificial intelligence models and ARIMAX model for forecasting drought using Standardized Precipitation Index”, Int. J. Environ. Sci. Technology, Vol. 12, pp. 1201-1210, 2015.
[2] Billy M. Williams, “Multivariate vehicular traffic flow prediction, Evaluation of ARIMAX modelling”, Journal of the transportation research board ,pp. 194-200, January 2001
[3] B. Yogarajah, C. elankumaran and R. Vigneswaran, “Application of ARIMAX Model for forecasting Paddy Production in Trincomalee District in Sri Lanka”, Proceeding of third international Symposium, Vol. 24, pp. 2-3, July 2013
[4] Christopher Bennett, Rodney A. Stewart and Junwei Lu, “ Autoregressive with Exogenous Variables and Neural Network Short- Term Load Forecast Models for Residential Low Voltage Distribution Networks”, Energies, Vol. 7, pp. 2938-2960, 2014
[5] Ding N, Besanger Y, “ Time series method for short – term load forecastingusing smart metering in distribution systems, “ International Proceeding of the IEEE Trondheim Power Tech, pp. 1-6, 2011
[6] D.K.Chaturvedi and Isha, “ Solar Power Forecasting: A Review”,International Journal of Computer Applications”, Vol.145, Issue. 6, July 2016
[7] El Mostafa Bentour, “ A ranking of VAR and structural models in forecasting”,http://mpra.ub.uni-muenchen.de/61502/, January 2015
[8] Herui Cui and Xu Peng , “Short –Term City Electric Load Forecasting with Considering Temprature Effects: An Improved ARIMAX Model”, Hindawi Pubishing Corporation, Mathematical Problem in Engineering , Volume 2015
[9] Gulam Ali “Cointegration VAR and VECM and ARIMAX Econometric Approaches for water quality Variaties” Journal of Statistical and Econometric Methods, Vol. 4, Issue. 1, pp.1-38, 2015
[10] Harendra Kumar Yadav, Vinay Kumar Yadav and Vijay Kumar, “ Potential of solar energy in India: A Review” International Advanced Research Journal of Science, Engineering and Technology, Vol. 2, Issue 1, May 2015
[11] Jabar H. Yousif and Hussein A. Kazem, “ Modeling of Daily Solar Energy System Prediction using Soft Cmputing Methods for Oman”, Research Journal of Applied Sciences, Engineering and Technology 13(3): 237-244, 2016
[12] Jai Singh Arya, Aadesh Kumar Arya and Sanjeev Aggarwal, “ Recent Trends in Solar Energy Generation”, Association of Computer Electronics and Electrical Engineers, 2013
[13] Javed Iqbal, “Forecasting Methods: A Comparative Analysis”, Proc. Eight Stat. Sem. 2001, K.U, MPRA Paper No.23856, posted29. Auguest 2013
[14] Jing Fan, Rui Shan and Xiaoqin Cao & Peiliang Li, “The Analysis to Tertiary- industry with ARIMAX Model”, Journal of Mathematics Research, Vol.1, No.2, September 2009
[15] Mohamed Abuella and Badrul Chowdhary, “Solar power Forecasting Using Support Vector Regression” in proceeding of the American Society for Engineering Management 2016
[16] Paul S. P. Cowperwait and Andrew V. Metcalfe,“Introductory Time Series with R” ,Springer, 2008
[17] Phillips, P. C. B.; Ouliaris, S. (1990). "Asymptotic Properties of Residual Based Tests for Cointegration".Econometrica. Vol.58, Issue.1, pp. 165–193.
[18] Renny Elfira Wulansari, Setiawan and Suhartono, “A Comparison of Forecasting Performance of Seasonal ARIMAX and Hybrid Seasonal ARIMAX –ANN of Surabaya’s Currency Circulation Data”, International Journal of Management and Applied Science , Vol.2, Issue-10,Oct-2016
[19] Robert H. Shumway and David S. Stoffer, “Time Series Analysis and Its Applications With R Examples”,Second Edition, Springer text in Statistics, 2005
[20] S.M. Husnain Bokhari and Mete Feridun, “Forecasting inflation through Econometric models : An Empirical Study on Pakistani Data”, Vol. 7, Issue. 1, pp.39-47, 2006
[21] Stijin de Waele and Piet M.T. Broerson, “ Order Selection for Vector Autoregressive Model” ,IEEE transactions on signal processing, Vol. 51, Issue. 2, February, 2003
[22] Uyodhu Amekauma Victor- Edema and Prof Isaac Didi Essi , “Autoregressive Integrated Moving Average with Exogenous Variable(ARIMAX) Model for Nigerian Non Oil Export”, European Journal of Business and Management, Vol. 8, Issue. 36, 2016
[23] Wiwik Anggraeni, Kuntoro Boga Andri, Sumaryanto and Faizal Mahananto, “The performance of ARIMAX Model and Vector Autoregressive (VAR) Modelforecasting strategic commodity price in Indonesia”, Procedia Computer Science, pp.189-196, November 2017
[24] Wiwik Anggraeni, Retno Aulia Vinarti and Yuni Dwi Kurniawati, “Performance Comparisions Between Arima and arimax Method in Moslem Kids Clothes Demand Forecasting: Case Study”, Procedia Computer Science, Vol.72, pp.630-637, 2015
Citation
Sukhpal Kaur, Madhuchanda Rakshit, "Performance Comparison of Forecasting on Solar Plant Generation Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.827-834, 2018.
Comparative Study on Detection and Classification Approaches on Man-Made Objects from Satellite Images
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.835-844, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.835844
Abstract
Automatic extraction of buildings and change detection of buildings from satellite images is an important tool for city management and planning. The discovery of changes is the process of identifying differences in the state of the objects extracted from the remote image by observing different time periods. The main objective of this paper is to extract the manmade objects (buildings) from the given input satellite images and detect the changes in the extracted building map. This work presents the Region of Interest (ROI) and extraction of the building using K-Nearest Neighbor (KNN), Support Vector Machine (SVM) and Extreme Learning Machine (ELM) techniques. Initially, the input satellite image is de-noised by using the Wavelet Shrinkage de-noising approach. Then the K-Means, Fuzzy C-Means (FCM) and Artificial Bee Colony (ABC) approaches are applied to the de-noised image to segment the vegetation and non-vegetation areas and then extract the features using Local Binary Pattern (LBP) Technique. Finally, the extracted features are given to the KNN, SVM and ELM classifier to get the building map and then the change detection process is applied. In this paper, the comparison is made on three clustering approaches and three classifier approaches to find the best approach for manmade object extraction. From the experimental result, it is shown that the ABC approach performs better than K-Means and FCM in clustering and ELM provides the best result than the KNN and SVM in classifiers.
Key-Words / Index Term
Building Extraction, Vegetation, Non-Vegetation, Wavelet Shrinkage, FCM, K-Means, ABC, LBP, KNN, SVM, ELM
References
L. Theng, “Automatic building extraction from satellite imagery,” Eng. Lett., vol. 13, no. 3, pp. 1–5, Nov. 2006.
[2] K. Karantzalos and D. Argialas, “A region-based level set segmentation for automatic detection of man-made objects from aerial and satellite images,” Photogramm. Eng. Remote Sens., vol. 75, no. 6, pp. 667–677, 2009.
[3] D. Singh, R. Maurya, A. Shukla, M. Sharma, and P. Gupta, “Building extraction from very high resolution multispectral images using NDVI based segmentation and morphological operators,” in Proc. Students Conf. Eng. Syst., Mar. 2012, pp. 1–5.
[4] T. Hermosilla, L. Ruiz, J. Recio, and J. Estornell, “Evaluation of automatic building detection approaches combining high resolution images and LiDAR data,” Remote Sens., vol. 3, no. 6, pp. 1188–1210, 2011.
[5] B. Sirmacek and C. Unsalan, “Urban-area and building detection using SIFT keypoints and graph theory,” IEEE Trans. Geosci. Remote Sens., vol. 47, no. 4, pp. 1156–1167, Apr. 2009.
[6] B. Sirmacek and C. Unsalan, “A probabilistic framework to detect buildings in aerial and satellite images,” IEEE Trans. Geosci. Remote Sens., vol. 49, no. 1, pp. 211–221, Jan. 2011.
[7] P. Hough, “Method and means for recognizing complex patterns,” U.S. Patent 3 069 654, Dec. 18, 1962.
[8] T. Kim and J. Muller, “Development of a graph-based approach for building detection,” Image Vision Comput., vol. 17, no. 1, pp. 3–14, 1999.
[9] D. Haverkamp, “Automatic building extraction from IKONOS imagery,” in Proc. Amer. Soc. Photo Remote Sens., 2004, pp. 23–28.
[10] D. Woo, Q. Nguyen, Q. N. Tran, D. Park, and Y. Jung, “Building detection and reconstruction from aerial images,” in Proc. Int. Soc. Photogramm. Remote Sens. Congr., Beijing, China, 2008, pp. 713–718.
[11] S. Vinson, L. Cohen, and F. Perlant, “Extraction of rectangular buildings in aerial images,” in Proc. Scand. Conf. Image Anal., 2001.
[12] K. Karantzalos and N. Paragios, “Recognition-driven two-dimensional competing priors toward automatic and accurate building detection,” IEEE Trans. Geosci. Remote Sens., vol. 47, no. 1, pp. 133–144, Jan. 2009.
[13] O. Benarchid et al., “Building extraction using object-based classification and shadow information in very high resolution multispectral images, a case study: Tetuan, Morocco,” Can. J. Image Process. Comput. Vision, vol. 4, no. 1, pp. 1–8, Jan. 2013.
[14] S. Kluckner and H. Bischof, “Image-based building classification and 3d modeling with super-pixels,” in Proc. Int. Soc. Photogramm. Remote Sens. Photogramm. Comput. Vis. Image Anal., 2010, pp. 291–296.
[15] A. Shackelford and C. Davis, “A combined fuzzy pixel-based and objectbased approach for classification of high-resolution multispectral data over urban areas,” IEEE Trans. Geosci. Remote Sens., vol. 41, no. 10, pp. 2354–2363, Oct. 2003.
[16] Z. Sheng-hua, H. Jian-jun, and X. Wei-xin, “A new method of building detection from a single aerial photograph,” in Proc. 9th Int. Conf. Signal Process., Oct. 2008, pp. 1219–1222.
[17] C. Senaras, M. Ozay, and F. T. Y. Vural, “Building detection with decision fusion,” IEEE J. Sel. Topics Appl. Earth Observ. Remote Sens., vol. 6, no. 3, pp. 1295–1304, Jun. 2013.
[18] D. Chai, W. Forstner, and M. Y. Yang, “Combine Markov random fields ¨ and marked point processes to extract building from remotely sensed images,” in Proc. ISPRS Ann. Photogramm. Remote Sens. Spatial Inf. Sci., 2012, pp. 1219–1222.
[19] O. ¨ O. Karada ¨ g, C. Senaras, and F. T. Y. Vural, “Segmentation fusion for ˘ building detection using domain-specific information,” IEEE J. Sel. Topics Appl. Earth Observ. Remote Sens., vol. 8, no. 7, pp. 3305–3315, Jul. 2015.
[20] J. Femiani, E. Li, A. Razdan, and P. Wonka, “Shadow-based rooftop segmentation in visible band images,” IEEE J. Sel. Topics Appl. Earth Observ. Remote Sens., vol. 8, no. 5, pp. 2063–2077, May 2015.
[21] D. Konstantinidis, T. Stathaki, V. Argyriou, and N. Grammalidis, “A probabilistic feature fusion for building detection in satellite images,” in Proc. 10th Int. Conf. Comput. Vision Theory Appl., 2015, pp. 205–212.
[22] N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,” in Proc. IEEE Conf. Comput. Vision Pattern Recognit., Jun. 2005, vol. 1, pp. 886–893.
[23] T. Ojala, M. Pietikainen, and D. Harwood, “Performance evaluation of texture measures with classification based on Kullback discrimination of distributions,” in Proc. Int. Conf. Pattern Recognit., Oct. 1994, vol. 1, pp. 582–585.
[24] T. Ojala, M. Pietikainen, and D. Harwood, “A comparative study of texture measures with classification based on featured distributions,” Pattern Recognit., vol. 29, no. 1, pp. 51–59, Jan. 1996.
[25] X. Wang, T. Han, and S. Yan, “An HOG-LBP human detector with partial occlusion handling,” in Proc. Int. Conf. Comput. Vision, Sep. 2009, pp. 32–39.
[26] J. Zhang, K. Huang, Y. Yu, and T. Tan, “Boosted local structured HOGLBP for object localization,” in Proc. Int. Conf. Comput. Vision Pattern Recognit., Jun. 2011, pp. 1393–1400.
[27] A. Fitch, A. Kadyrov, W. Christmas, and J. Kittler, “Fast robust correlation,” IEEE Trans. Image Process., vol. 14, no. 8, pp. 1063–1073, Aug. 2005.
[28] A. Dempster, N. Laird, and D. Rubin, “Maximum likelihood from incomplete data via the EM algorithm,” J. Roy. Statist. Soc. B, vol. 39, no. 1, pp. 1–38, 1977.
Citation
Sure Venkata Padmavathi Devi, D. Murugan, A. Ramya, T. Ganesh Kumar, "Comparative Study on Detection and Classification Approaches on Man-Made Objects from Satellite Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.835-844, 2018.
Efficient Relational Interest Feature Selection for Improving the Quality of M-distance Education Using Content-Based Information Similarity Measure
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.845-855, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.845855
Abstract
The advanced development of education needs the distance learning for improving the student knowledge based on the relational content providence. E-learning improvements are based on M-learning techniques through the knowledge learning process without providing the right content of subjectivity resource to the student be to create the problems. The M-learning process contains digital information with subjectivity reference of content based on the student interest. The content analysis techniques doesn’t create relational subjectivity interest measure on multimedia content services. To intake the challenge approach, we propose an Efficient Relational interest feature selection for improving the quality of M-distance education using content-based information similarity measure(RIF: MDEISM). This initially analyses the interest in multimedia content information to extract the relation feature on the subjectivity. Further, the extracted features are observed by relative semantic analysis using information similarity measure to get the optimized result from web learning resources. The resultant proves the higher efficient relational content analysis to improve the m-learning distance education.
Key-Words / Index Term
knowledge learning, content mining, interest analysis, feature analysis, similarity measure.
References
[1]. C. Romero and S. Ventura, “Educational data mining: A survey from 1995 to 2005,” Expert systems with applications, vol. 33, no. 1, pp. 135-146, July 2007.
[2]. Andreas Schmidt ,Bridging the Gap between Knowledge Management and E-Learning with Context-Aware Corporate Learning, Professional Knowledge Management and Lecture Notes in Computer Science, Vol. 3782, pp. 203-213.2005.
[3]. Jiang, W., et al., Similarity-based online feature selection in content-based image retrieval. Image Processing, IEEE Transactions on. 15(3): p. 702-712, 2006.
[4]. S. Tang, M. Henneghan, and A. E. Rhalibi, "Introduction to games-based learning," in Games-based learning advancements for multi-sensory human-computer interfaces: Techniques and effective practices, T. Connolly, M. Stansfield, and L. Boyle, Eds. Hershey, PA: IGI Global, pp. 1-17 2009,.
[5]. Abdelrahman Amer and John Oommen, B. Lists on Lists: A Framework for Self-organizing Lists in Environments with Locality of Reference, Experimental Algorithms, Proceedings of 5th International Workshop, Cala Galdana, Menorca, Spain. Vol. 4007, pp. 102-120.2006
[6]. Al-Mubaid, H. And Nguyen, H.A.. A Cross-Cluster Approach for Measuring Semantic Similarity between Concepts, IEEE International Conference on Information Reuse and Integration, pp. 551 – 556. 2006
[7]. Jin, W & Ho, HH, ‘A Novel Lexicalized HMM-Based Learning Framework for Web Opinion Mining,` Proc. 26th Ann. Int`l Conf. Machine Learning, pp. 465-472. 2009
[8]. Aleksandra Klasnja, Milicevic, Boban Vesin, Mirjana Ivanovic & Zoran Budimac, ‘E-Learning personalization based on hybrid recommendation strategy and learning style identification,` Computers & Education, vol. 56, pp. 885-899. 2011
[9]. Amal Zouaq and Roger Nkambou. Enhancing Learning Objects with an Ontology-Based Memory, IEEE Transaction on Knowledge and Data Engineering, Vol.21, No.6, pp.881-893, 2009.
[10]. Deborah, LJ, Baskaran, R & Kannan, , ‘Ontology Construction using Computational Linguistics for e-Learning,` International visual informatics conference, In Visual Informatics: Sustaining Research and Innovations, Springer Berlin Heidelberg, pp. 50-63, 2011.
[11]. S. Chandhok and P. Babbar, “M-learning in distance education libraries: A case scenario of Indira Gandhi national open university,” The Electronic Library, vol. 29, no. 5, 2011.
[12]. J. L. Moore, C. Dickson-Dean, and K. Galyen, "e-Learning, online learning, and distance learning environments: Are they the same?" Internet and Higher Education, vol. 14, no. 2, pp. 129- 135, March 2011.
[13]. K. Donnelly, “Learning on the move: how m-learning could transform training and development,” Development and Learning in Organizations, vol. 23, no. 4, 2009.
[14]. A. Kruger, A. Merceron, and B. Wolf, “A data model to ease analysis and mining of educational data,” in Educational Data Mining, 3rd International Conference On Educational Data Mining. Pittsburgh, PA, 2010, pp. 131-140, 2010.
[15]. KonstantinaChrysafiadi & Maria Virvou 2015, ‘Fuzzy Logic for Adaptive Instruction in an E-learning Environment for Computer Programming,` IEEE Transactions on Fuzzy Systems, vol. 23, no. 1, pp. 164-177.
[16]. Xia Min-Jie & Zhang Jin-ge, ‘Research on Personalized Recommendation System for e-Commerce based on Web Log Mining and User Browsing Behaviors,` Proceedings of IEEE International Conference on Computer Application and System Modeling, pp. V12- 408-411, 2010.
[17]. Aasia Ali; Sanjay Sharma, Content-based image retrieval using feature extraction with machine learning, Intelligent Computing and Control Systems (ICICCS), 2017
[18]. 4. Antonio Garrido & Lluvia Morales, ‘E-Learning And Intelligent Planning: Improving Content Personalization,` IEEE Revistalbero Americana De Tecnologias Del Aprendizaje, vol. 9, no. 1, pp. 1-7. 2014
[19]. Carlos Bobed & Eduardo Mena, ‘QueryGen: Semantic Interpretation of Keyword Queries Over Heterogeneous Information Systems,` Information Sciences, vol. 329, pp. 412-433. 2016
[20]. Vishal Pant; Shivansh Bhasin; Subhi Jain,” Self-learning system for personalized e-learning” International Conference on Emerging Trends in Computing and Communication Technologies (ICETCCT),2017
Citation
S. Senthil, M. Prabakaran, "Efficient Relational Interest Feature Selection for Improving the Quality of M-distance Education Using Content-Based Information Similarity Measure," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.845-855, 2018.
Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.856-862, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.856862
Abstract
Digital forensics tools are often used to calculate the hash value of the digital test unit. The MD5 and SHA hash function is used in digital forensics tools to calculate and verify that a dataset has not been altered, due to the application of multiple collection and analysis tools and pro-cedures of evidence. In addition, because of the impact on the personal life of the subject of the survey, the verification of the proper functioning of the tools and procedures is crucial. This article discusses the importance of hashing value in digital forensics for digital evidence. The search uses six different possible cases as an experiment to generate and verify the hash value of the test drive by using a forensic tool to demonstrate the importance of the hash value in digital forensics. In addition, unreliable results can be obtained due to incorrect use of the Tools application.
Key-Words / Index Term
SHA; MD5; hash function ; digital forensic
References
[1]. S. Ardisson. Producing a Forensic Image of Your Client’s Hard Drive? What You Need to Know, Qubit, 1, pp. 1-2, 2017.
[2]. “Digital signature standard,” FIPS PUB 186-2, 2016. Available from: www.csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
[3]. G. Palmer. A road map for digital forensic research. Report From the First Digital Forensic Research Workshop (DFRWS), August 2016.
[4]. M. Alazab, S. Venkatraman & P. Watters. Digital forensic techniques for static analysis of NTFS images, Proceedings of ICIT2009, Fourth International Conference on Information Technology, IEEE Xplore, 2009.
[5]. M. Reith, C. Carr, & G. Gunsch. An examination of digital forensic models, International Journal of Digital Evidence, 1, pp.1-12, 2002.
[6]. Nelson, B. Phillips, A. Enfinger, F. Steuart, C. Guide to Computer Forensics and Investigations: Third Edi-tion, Course Technology, 2008.
[7]. Ronald L. Rivest. The MD5 message-digest algorithm, IETF RFC 1321, 1992. Available from www.ietf.org/rfc/rfc1321.txt
[8]. Secure hash standard, FIPS PUB 180-1, 1995. Available from: www.itl.nist.gov/fipspubs/fip180-1.htm
[9]. Guidance Software Inc. Encase forensics. http://www.guidancesoftware.com.
Citation
Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse, "Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.856-862, 2018.