Segmentation and Classification of Histologocal Structures in H & E Stained Images
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.869-873, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.869873
Abstract
Segmenting a broad class of histological structures is a prerequisite to determine the pathological basis of cancer, to clarify spatial interactions between histological structures in the tumor microenvironments, making precision medicine studies easy with deep molecular profiles, and provide an exploratory tool for pathologists. Histological structure determination helps elucidate spatial tumor biology. Role focuses on the segmentation of histological structures present in colored images with stains (H & E) of the breast tissue. Accurate segmentation of histological structures can help build a spatial interaction map to serve as an exploratory tool for pathologists. Breast cancer if detected early can be cured easily. Hence detection methods need to have more accurate diagnosis. Images obtained out of the scans done, processed to get the segments, which are then seen as clusters. These clusters are evaluated with classification techniques to reach the diagnosis result.
Key-Words / Index Term
histopathalogical image analysis, image segmentation, image statistics
References
[1] Luong Nguyen, “Spatial statistics for segmenting histological structures in HE stained tissue images", IEEE TMI, 2017.
[2] E. Bejnordi et al, “Automated detection of dcis in whole-slide he stained breast histopathology images", IEEE TMI, 2016.
[3] J. Vicory et al, “Appearance normalization of histology slides, Computerized Medical Imaging and Graphics",vol. 43, pp. 8998, 2015.
[4] X. Li and K. N. Plataniotis, “A complete color normalization approach to histopathology images using color cues computed from saturation weighted statistics"IEEE TBME, vol. 62, no. 7, pp.18621873, 2015.
[5] P. Isola et al, “Crisp boundary detection using pointwise mutual information,"ECCV 2014, 2014, pp. 799814.
[6] Vahadane et al, “Structure-preserving color normalization and sparse stain separation for histological images,"IEEE TMI, 2016.
[7] F. Liu and L. Yang, “A novel cell detection method using deep convolutional neural network and maximum-weight independent set,"MICCAI, pp. 349357, 2015.
[8] J. L. Fine, “21st century workow: A proposal,"Journal of Pathology Informatics, vol. 5, no. 1,p. 44, 2014.
[9] B.-R. Wei and R. M. Simpson, “Digital pathology and image analysis augment biospecimen annotation and biobank quality assurance harmonization,",Clinical biochemistry, vol. 47, no. 4, pp.274279, 2014
[10] M. T. McCann et al, “Images as occlusions of textures: a framework for segmentation,", Clinical biochemistry, vol. 47, no. 4, pp. 274279, 2014.
[11] N. M. Rajpoot, “HyMaP: A hybrid magnitude-phase approach to unsupervised segmentation of tumor areas in breast cancer histology images,",Journal of Pathology Informatics, vol.4,no.2,p.1,2013
[12] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
Citation
S.B.Pawar, V.S.Gaikwad, "Segmentation and Classification of Histologocal Structures in H & E Stained Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.869-873, 2018.
IoT Architectures based on Blockchain Technologies
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.874-878, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.874878
Abstract
We are witnessing an exponential growth of the Internet of Things (IoT) market. Across the globe, wherever there is internet connectivity, each individual owns multiple devices which are connected to the internet. Further, there are “things” which are directly connected to each other through the internet and act independent of human intervention by participating in automated business processes to provide business value. A wide range of IoT applications have been developed and deployed in the recent past. However, the IoT technologies have some inherent drawbacks and challenges, for e.g. security and scalability issues. On the other hand the use of blockchain technologies is also experiencing an exponential growth, even beyond the financial applications. As both IoT and blockchain technologies are finding widespread acceptance, researchers and practitioners have experimented with the adoption of blockchain technologies for IoT based applications with a view to build robust and state of the art systems. Such initiatives have been quite successful. This paper reviews the current research status of IoT and blockchain technologies and discusses how the blockchain technologies are leveraged to address some of the challenges faced during the development of IoT based applications. It identifies research trends and future scope to build IoT architectures based on blockchain technologies.
Key-Words / Index Term
IOT, Blockchain, Security, Distributed Ledger, Sensors, Actuators, SOA, Reference Architecture, Ethereum, Raspberry Pi, Scalability, Digital Transformation
References
[1] Daniel Newman “Top 10 trends for digital transformation in 2018”, Forbes Sep 26, 2017.
[2] The Internet of Things: an Overview, Internet society, October 2015.
[3] Bagadhi Sateesh. “Introduction to Internet of Things”, International Journal of Computer Sciences and Engineering. Vol.-6, Issue-6, June 2018.
[4] Gurpreet Kaur1 and Manreet Sohal. “IOT Survey: The Phase Changer in Healthcare Industry”, Int. J. Sc. Res. in Network Security and Communication (IJSRNSC), Volume-6, Issue-2, April 2018.ISSN: 2321-3256.
[5] The Industrial Internet of Things Volume G1: Reference Architecture. 2017. IIC:PUB:G1:V1.80:20170131.
[6] Joss Colchester, “Blockchain Overview”, A Complexity Labs Publication eBook, 2018.
[7] Yuanyu Zhang,Shoji Kasahara,Yulong Shen, Xiaohong Jiang and Jianxiong Wan. “Smart Contract-Based Access Control for the Internet of Things”, arXiv:1802.04410v1 [cs.CR] 13 Feb 2018.
[8] “What is Blockchain Technology? A Step-by-Step Guide For Beginners”, blockgeeks.com.
[9] Chandrashekhar Singh Rajawat and Hemant Gupta. “Smart Contract Management Using Blockchain Technology”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), Volume 3, Issue 3, ISSN : 2456-3307.
[10] Kshetri, Nir (2017). "Can Blockchain Strengthen the Internet of Things?”, IEEE IT Professional (19)4, 68-72
[11] Harsh Agrawal, “IoT, Blockchain and the Future”, DZone, IoTZone, Mar. 07, 18.
[12] Jeremy Coward, “Meet the Visionary Who Brought Blockchain to the Industrial IoT”, Internet of Things Institute, 13 Dec. 2016.
[13] Darth Revan, Blockchain, “Ethereum & IoT POC: Machine Maintenance”, Series of posts in Medium. Nov 6, 2017 to Nov 27, 2017.
[14] Said Eloudrhiri. “Create a private Ethereum blockchain with IoT devices”, Series of tutorials in ChainSkills. 24 February 2017 to 3 April 2017.
[15] Marco Conoscenti, Antonio Vetr`o and Juan Carlos De Martin. “Blockchain for the Internet of Things: a Systematic Literature Review”, IEEE author’s version of the work.
[16] Kambhampaty, Shankar., Chandra, Satish., (2006), “Enterprise Architecture Definition Framework for IT Service Providers”, International Federation for Information Processing, Volume 205, Research and Practical Issues of Enterprise Information Systems, eds. Tjoa, A.M., Xu, L., Chaudhry, S., (Boston:Springer), pp.261-272.
[17] Kambhampaty, Shankar., Chandra, Satish., “Service Oriented Architecture for Enterprise Applications”, Proceedings of the 5th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Madrid, Spain, February 15-17, 2006 (pp48-54).
Citation
Satish Chandra Gullena, "IoT Architectures based on Blockchain Technologies," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.874-878, 2018.
Current Trends In Steganography
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.879-882, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.879882
Abstract
Steganography relies on volatility in order to perform information hiding inside apparently innocuous payloads. Steganography helps in create secure communication between two parties, without any mediator noticing the presence of the particular communication. Steganalysis is the parallel to steganography. A steganalyst tries to find out the presence of a covert communication between two parties and either modify their communication. Many different techniques are introduced to make communication more secure by using steganography. All of them are proven to be secure in there own way. Many new techniques are coming in existence from past few years. In this paper, we review the different techniques that has already introduced.
Key-Words / Index Term
Steganography, QR code, DWT, Bluetooth, Logistic Map , DNA
References
[1]. Rutuja Kakade, Nikita Kasar, Shruti Kulkarni, Shubham Kumbalpuri, Sonali Patil, Student, Associate Professor, Dept.of Computer Engineering, PCCOE, Maharashtra, India” Image Steganography and Data hiding in QR Code” International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 05 | May -2017, e-ISSN: 2395 -0056.
[2]. Divya Suryawanshi, Meetali Salvi, Soumya Pandey Terna Engineering College, Nerul, Navi Mumbai IT Department, Mumbai University, Image steganography for criminal cases, Volume 5, Issue 2 | ISSN: 2321-9939
[3]. Marwan Ali Albahar, Olayemi Olawumi, Keijo Haataja, Pekka Toivanen University of Eastern Finland, School of Computing, Kuopio Campus, “ A novel method for bluetooth pairing using steganography”International Journal on Information Technologies & Security, № 1 (vol. 9), 2017
[4]. Shuliang Sun,School of Electronics and Information Engineering, Fuqing Branch of Fujian Normal University, China,” A Novel Secure Image Steganography Using Improved Logistic Map and DNA Techniques”
https://www.researchgate.net/publication/317829911, Article • May 2017.
[5]. S. U. Maheswari and D. J. Hemanth, “Different methodology for image steganography-based data hiding: Review paper,” International Journal of Information and Communication Technology, vol. 7, issue 4/5, pp. 521-536, 2015.
[6]. X. Wangand and D. Luan, “A Novel Image Encryption Algorithm Using Chaos and Reversible Cellular Automata, Communications in Nonlinear Science and Numerical Simulation, Vol. 18, No. 11, pp. 3075-3085, November, 2013.
[7]. S.K. Yadav, Manish Dixit Dept.of Computer Engineering, Madhav Institute of technology and science, Gwalior, India “A comparative study for image steganography using Transformation Domain method” International journal of science and Engineering(IJCSE), Volume: 05 Issue: 06 | Jun -2017.
[8]. Rajesh Shah, Yashwant Singh Chouhan Christian eminent college, Indore (M. P.)India” Encoding of Hindi Text Using Steganography Technique” International Journal of Scientific Research in Comp c Research in Computer Science and Engineering Science and Engineering Science and Engineering Research Paper Vol-2, Issue-1 E-ISSN: 2320-7639
Citation
Kirti, Parmod Sarowa, "Current Trends In Steganography," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.879-882, 2018.
A Survey on Classification Algorithms Used in Healthcare Environment of the Internet of Things
Survey Paper | Journal Paper
Vol.6 , Issue.7 , pp.883-887, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.883887
Abstract
The Internet of Things evolved in various application areas that include medical care or health care. This technology helps the patients and doctors to predict the various diseases accurately and diagnose these diseases according to result. The important aspect of this survey is how data collected by sensor-enabled devices in healthcare or medical care environment of the Internet of Things is processed and classified. This survey paper provides a recent review of the different classification algorithms such as SVM, Naïve Byes, Decision Tree, KNN etc. which were used to classify the data collected from sensor-enabled devices of healthcare or medical care environment of the Internet of Things by the help of comparison table. This survey shows a brief review of how IoT gives their contribution in the field of healthcare by using different sensors and communication protocols. This paper also outlines the parameters of classification algorithms such as in terms of accuracy, true positive rate (TPR), precision, false positive rate (FPR) etc used to classify the healthcare data.
Key-Words / Index Term
Internet of Things, Large Data Set, Healthcare, Medical care, Classification Algorithms, Smart Healthcare
References
[1] S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain and K. S. Kwak, "The Internet of Things for Health Care: A Comprehensive Survey," in IEEE Access, vol. 3, pp. 678-708, 2015.
[2] K. Chui, W. Alhalabi, S. Pang, P. Pablos, R. Liu, and M. Zhao, “Disease Diagnosis in Smart Healthcare: Innovation, Technologies and Applications,” Sustainability, vol. 9, no. 12, p. 2309, Dec. 2017.
[3] Gowrishankar S., Prachita M Y. and Arvind Prakash, “IoT based Heart Attack Detection, Heart Rate and Temperature Monitor”. International Journal of Computer Applications (IJCA) 170(5):26-30, July 2017
[4] I. Bisio, A. Delfino, F. Lavagetto and A. Sciarrone, "Enabling IoT for In-Home Rehabilitation: Accelerometer Signals Classification Methods for Activity and Movement Recognition," in IEEE Internet of Things Journal, vol. 4, no. 1, pp. 135-146, Feb. 2017.
[5] Marimuthu Palaniswami, Rajkumar Buyya, Jayavardhana Guddi, Slaven, Marusic, “Internet of Things (IOT): A Vision, Architectural Elements, And Future Directions,” Elsevier, Future Generation Computer Systems, vol.29, pp. 1645-1660, Feb. 2013.
[6] Furqan Alam, Rashid Mehmood, Iyad Katib, Aiiad Albeshri, “Analysis of Eight Data Mining Algorithms for Smarter Internet of Things (IoT)”, Procedia Computer Science, Volume 98, 2016, Pages 437-442, ISSN 1877-0509.
[7] Feng Chen, , Pan Deng, Jiafu Wan, Daqiang Zhang, Athanasios V. Vasilakos, Xiaohui Rong, “Data Mining for the Internet of Things: Literature Review and Challenges”, International Journal of Distributed Sensor Networks(IJDSN), 2015, Volume 2015.
[8] Prabal Verma, Sandeep K. Sood, “Cloud-Centric Iot Based Disease Diagnosis Healthcare Framework”, Journal of Parallel and Distributed Computing (JPDC), 2017.
[9] Bagadhi Sateesh, "Introduction to Internet of Things", International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1086-1090, 2018.
[10] Mantripatjit Kaur, Anjum Mohd Aslam, "Big Data Analytics on IOT: Challenges, Open Research Issues and Tools", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.81-85, 2018
[11] Syed L., Jabeen S., Manimala S., “Telemammography: A Novel Approach for Early Detection of Breast Cancer through Wavelets Based Image Processing and Machine Learning Techniques”. Advances in Soft Computing and Machine Learning in Image Processing. Studies in Computational Intelligence, vol 730. Springer, Cham, 2018.
[12] Verma, P., Sood, S.K. & Kalra, S., “Cloud‑Centric IoT Based Student Healthcare Monitoring Framework”, Journal of Ambient Intelligence and Humanized Computing (JAIHC), (2017).
[13] Sanjay Sareen, Sandeep K. Sood, Sunil Kumar Gupta, “IoT-based cloud framework to control Ebola virus outbreak”, Journal of Ambient Intelligence and Humanized Computing, Springer 2016.
[14] N. Keshan, P. V. Parimi and I. Bichindaritz, "Machine learning for stress detection from ECG signals in automobile drivers," 2015 IEEE International Conference on Big Data (Big Data), Santa Clara, CA, 2015, pp. 2661-2669.
[15] P. S. Pandey, "Machine Learning and IoT for prediction and detection of stress," 2017 17th International Conference on Computational Science and Its Applications (ICCSA), Trieste, 2017, pp. 1-5.
[16] A. Walinjkar and J. Woods, "ECG classification and prognostic approach towards personalized healthcare," 2017 International Conference On Social Media, Wearable And Web Analytics (Social Media) (ICWWA), London, 2017, pp. 1-8.
[17] Ani R, Krishna S, Anju N, Sona Aslam M,O.S Deepa, “IoT Based Patient Monitoring and Diagnostic Prediction Tool using Ensemble Classifier”, International Conference on .
[18] D. Azariadi, V. Tsoutsouras, S. Xydis and D. Soudris, "ECG signal analysis and arrhythmia detection on IoT wearable medical devices," 2016 5th International Conference on Modern Circuits and Systems Technologies (MOCAST), Thessaloniki, 2016, pp. 1-4.
Citation
Akhil Bansal, Manish Kumar Ahirwar, Piyush Kumar Shukla, "A Survey on Classification Algorithms Used in Healthcare Environment of the Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.883-887, 2018.
Performance Enhancement of Edge Detection Methods for Human Bone Fracture X-Ray Image Using Graphical Processors
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.888-894, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.888894
Abstract
Edge detection is a crucial step in medical imaging and in a no. of other image processing applications, such as face-identification or recognition, and other classification problems. Various methods have been developed for edge detection based on applications and edge types. Some of the most common techniques used are Sobel, Prewitt, Robert, LoG and Canny etc. However, most of these methods for edge detection of various images (including x-rays image) is a computationally expensive process in terms of both time and space. Because of this delay the patients and the doctors do not get instant information or imaging reports (for example regarding fractured bone in case of x-rays). This ultimately leads to delayed diagnosis and treatment of the patient. In this work we present our findings of research related to an important edge detection technique which involve finding image gradient. We emphasize that our approach is equally valid for many different kinds of edges in an image and not just for fractured bone. To eliminate latency issue we used a graphical processor with CUDA API to implement an image gradient. The graphical processors are massively parallel processors that come inside a graphics card and have become a standard piece of hardware on all modern day computing systems including portable hand-held device. We emphasize that alternate solutions such as FPGA (Field Programmable Gate Array) and ASIC (Application Specific Integrated Circuit) based solutions are much costlier and take much longer time for development as compared to a graphical processor which is programmable using C-CUDA. We compared our implementation’s performance with respect to a CPU-only implementation. To prove our idea we used an algorithm which is a parallel version of naïve serial algorithm. Thanks to GPU’s enormous amount of computational units, our GPU-implementation shows several fold speed ups with respect to a standard CPU-only implementation. Our proof-of-concept (PoC) developed as part of this research, thus establish that the GPU stands a very good candidate for such edge detection problems where we need faster results, i.e. in real time or in near real-time.
Key-Words / Index Term
Digital Image, Edge detection, GPU, CUDA, X-ray, gradient
References
[1] Marr and E. Hildrith, “Theory of Edge Detection,” Proc. Royal Society of London, B207, pp. 187–217, 1980.
[2] James Clerk Maxwell, DIGITAL IMAGE PROCESSING Mathematical and Computational Methods.
[3] R .Gonzalez and R. Woods, Digital Image Processing, ,Addison Wesley, 1992, pp 414 - 428.
[4] S. Sridhar, Oxford university publication. , Digital Image Processing.
[5] Shamik Tiwari , Danpat Rai & co.(P) LTD. “Digital Image processing”
[6] J. F. Canny. “A computational approach to edge detection”. IEEE Trans. Pattern Anal. Machine Intell., vol.PAMI-8, no. 6, pp. 679-697, 1986 Journal of Image Processing (IJIP), Volume (3) : Issue (1)
[7] Geng Xing, Chen ken , Hu Xiaoguang “An improved Canny edge detection algorithm for color image” IEEE TRANSATION ,2012 978-1-4673-0311-8/12/$31.00 ©2012 IEEE.
[8] Punarselvam, E., & Suresh, P. (2011). Edge Detection of CT scan Spine disc image using Canny Edge Detection Algorithm based on Magnitude and Edge Length. 3rd International Conference on Trendz in Information Sciences & Computing (TISC2011). doi:10.1109/tisc.2011.6169100
[9] Nikolic, M., Tuba, E., & Tuba, M. (2016). Edge detection in medical ultrasound images using adjusted Canny edge detection algorithm. 2016 24th Telecommunications Forum (TELFOR). doi:10.1109/telfor.2016.7818878
[10] Chang, C., & Kehtarnavaz, N. (2015). Computationally efficient image deblurring using low rank image approximation and its GPU implementation. Journal of Real-Time Image Processing, 12(3), 567-573. doi:10.1007/s11554-015-0539-x
[11] Sher Jung, Rajendra Kumar Sharma, GSZRP: Graphics-hardware based Optimized Secure Zone Routing protocol, IJARSE (ISSN: 2319-8354),Volume No.06, Issue No. 12, December 2017
[12] Agarwal, N., Nellans, D., Ebrahimi, E., Wenisch, T. F., Danskin, J., & Keckler, S. W. (2016). Selective GPU caches to eliminate CPU-GPU HW cache coherence. 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA). doi:10.1109/hpca.2016.7446089
[13] “Convolution,” Wikipedia, 20-May-2018. [Online]. Available: http://en.wikipedia.org/wiki/Convolution. [Accessed: 23-May-2018].
[14] R. Farber, “CUDA, Supercomputing for the Masses: Part 1,” Dr. Dobb`s. [Online]. Available: http://www.drdobbs.com/high-performance-computing/207200659. [Accessed: 23-May-2018].
[15] “Weather, Atmospheric, Ocean Modeling, and Space Sciences,” NVIDIA. [Online]. Available: http://www.nvidia.com/object/weather.html. [Accessed: 23-May-2018].
[16] “The AI Computing Company | NVIDIA.” [Online]. Available: https://www.bing.com/cr?IG=746A37FE329B48A9922870D343DAB2B1&CID=0CAFD34A11B26EA30FA3D8B2104F6F1E&rd=1&h=FZfALwVHxE_S9H2WNKhtElNoV47kgQDk68vgEU4&v=1&r=https://www.nvidia.com/en-us/about-nvidia/ai-computing/&p=DevEx.LB.1,5549.1. [Accessed: 23-May-2018].
Citation
Saima Iram, Jabir Ali, Pradeep Kumar, "Performance Enhancement of Edge Detection Methods for Human Bone Fracture X-Ray Image Using Graphical Processors," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.888-894, 2018.
Schedule based MAC Protocols in wireless sensor networks - A Survey
Survey Paper | Journal Paper
Vol.6 , Issue.7 , pp.895-901, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.895901
Abstract
A wireless sensor network made up of huge amount of devices that are less in size as well as self-directed and distributed. These devices are known as sensor nodes that comprises of various components. Sensor nodes are low power battery devices. Energy consumption is a vital issue in wireless sensor networks (WSN).Various MAC protocols have been designed to lower the usage of energy in WSN. WSN-MAC protocols are categorized into two types: contention based and schedule based protocols. This paper discusses the challenges of WSN and Schedule - based MAC protocols and compare the various schedule based MAC protocols by highlighting their strengths and weaknesses.
Key-Words / Index Term
Time division multiple access (TDMA); Wireless Sensor Network (WSN); MAC protocols
References
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci(Aug. 2002),” A survey on sensor networks”, IEEE Communications Magazine, vol.40, no.8,pp. 102-114.
[2] Carlo Fischione,”An Introduction to Wireless Sensor Networks”, Royal Institute of Technology,page no. 69.
[3] D. Estrin, D. Culler, K. Pister, and G. Sukhatme(Jan 2002,), “Connecting the physical world with pervasive networks”, IEEE Pervasive Computing, pp. 59-69.
[4] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci(Mar.2002), “ Wireless sensor networks : A survey”, Computer Networks, vol 38, no. 4 , pp. 393-422.
[5] F. Zhao and L. Guibas, Wireless Sensor Networks (2004): An Information Processing Approach, Morgan Kaufmann Publishers, San Francisco, CA.
[6] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler and J. Anderson(Sept. 2002), “ Wireless sensor networks for habitat monitoring”, in Proceedings of 1st ACM International Workshop on Wireless sensor networks and Applications (WSNA’ 02), Atlanta, GA, ,pp. 88 -97.
[7] Abul Kalam Azad, M. Humayun Kabir, Md. Bellal Hossain (November 2013.) ,” A Survey on Schedule based MAC protocols for Wireless Sensor Networks”,International journal of Computer Science and Network, Vol. 2 ,Issue 6.
[8] W.ye, J. Heidemann and D. Estrin, “An Energy efficient MAC protocol for wireless sensor Networks”, IEEE INFOCOM,New York,vol. 2, June 2002.
[9] Pijus Kumar Pal, Punyasha Chatterjee(june 2014), “ A Survey on TDMA based MAC Protocols for Wireless Sensor Network”, international journal of emerging technology and advanced engineering, volume 4,issue 6.
[10] T. Nieberg, S. Dulman, P. Havinga, L. V. Hoesel and J. Wu (November 2003), “Collaborative Algorithms for Communication in Wireless Sensor Networks”, Ambient Intelligence: Impact on Embedded Systems, Kluwer Academic Publishers, ISBN 1-4020-7668-1.
[11] L. F. W. van Hoesel and P. J. M Havinga, “A lightweight medium access protocol (LMAC) for wireless sensor networks: Reducing Preamble Transmissions and Transceiver State Switches”, in First International Conference on Networked Sensing Systems, Tokyo, 2004.
[12] L.F.W. van Hoesel and P.J. M Havinga, “A light weight medium access protocol (LMAC) for wireless sensor networks :Reducing Preamble Transmissions and Transceiver State Switches”, in First international conference on Networked Sensing systems,Tokyo,2004
[13] G. Lu, B. Krishnamachari, and C. S. Raghavendra. “An adaptive energy-efficient and low-latency MAC for data gathering sensor networks”, 4th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks, 2004.
[14] Anitha K,Usha S prof & HOD, “A Scheduled Based MAC Protocols for Wireless Sensor Network: A Survey,IJANA, ISSN: 0975-0282
[15] Injong Rhee, Ajit Warrier, Jeongki Min and Lisong Xu, “DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad Hoc Networks”, IEEE Transactions on Mobile Computing, vol. 8,no. 10, October 2009.
[16] Muhammad Aman Sheikh, Micheal Drieberg and Noohul Basheer Zain Ali, “ Fair Scheduling Algorithm for wireless sensor networks”,IEEE, 2011
[17] B. Dezfouli et.al, DICSA: Distributed and concurrent link scheduling algorithm for data gathering in wireless sensor networks, ELSEVIER,Ad Hoc Netw. (2014).
[18] Sheikh Tahir Baksh et.al,”Adaptive Sleep Efficient Hybrid Medium Access Control algorithm for next generation wireless sensor networks”,EURASIP journal on wireless communications and networking,2017
Citation
Neetu, Sanjeev Indora, "Schedule based MAC Protocols in wireless sensor networks - A Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.895-901, 2018.
A Project/Quality Manager’s Responsibility is Not Turning “Quality” To Be A Very Expensive Paper Weight
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.902-907, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.902907
Abstract
Now a day’s, Pressure to relinquish the software is superseding the software testing. A project or product is being relinquished without concentrating on testing. This is transpiring to capture the market from the competitors. Hence its often a best practice across different organizations QA is verbalized to be a supplemental or overhead to the organization. No matter whatever the stake holder’s defining the QA, it’s the project manager or the Quality manager’s job not to make it a very extravagant paper weight. In general, QA is not a sumptuous area being one of the phases in Software Project management. QA turns extravagant only if it is neglected or ignored. This paper discusses about different techniques, how better they could be taken care w.r.to Quality. These methods avail a Project or Quality manager to work on QA for not making it as a very sumptuous paper weight.
Key-Words / Index Term
Project/Quality manager, Project management life cycle, Quality
References
[1]. www.SearchSoftwareQuality.com
[2]. www.borland.com
[3]. http://www.cse.dcu.ie/essiscope/
[4]. http://www.softwareqatest.com/
[5]. www.SearchSoftwareQuality.com
[6]. www.Standish group.com
[7]. Project Management Institute. URL: http://www.pmi.org/projectmanagement/success.htm
[8]. http://pmtips.net/project-control/
Citation
Kranthi Kumar R, Kiran Kumar Reddi, "A Project/Quality Manager’s Responsibility is Not Turning “Quality” To Be A Very Expensive Paper Weight," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.902-907, 2018.
Intelligent Road Traffic Control System for Traffic Congestion: A Perspective
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.908-915, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.908915
Abstract
An important measurement for the cost-effective growth of any nation is rapidly increasing vehicle count. The effect of raise in vehicle count grows the traffic congestion. It results in wastage of energy, time and environmental pollution. To meet the demands of an overgrowing city the traditional traffic lights deployed in cities are not sufficient since these traffic lights have specific predetermined time intervals for changing from a red phase to green phase. This major issue, that most of the cities is facing in spite of measures being taken to palliate and reduce it. In recent years traffic congestion has become apparent as one of the major challenges for engineers, planners, and policymakers, not in all urban setting, but worldwide. In this regard with the help of Intelligent Transportation Systems (ITS), several attempts were made to automate the traffic lights based on the density of vehicles on the road. Some researchers suggested the use of various distinctive sorts of strategies and computerized sensor frameworks to examine traffic density and to tackle the congestion issue depending on the traffic nature. This paper reviews different sensor frameworks by analyzing the pros and cons of each in cost, reliability, accuracy, efficiency, and maintenance overhead.
Key-Words / Index Term
Intelligent Transportation Systems; Computer Vision; Machine Learning; Wireless Sensors; Traffic Control
References
[1] Cai, Chen, Yang Wang, and Glenn Geers. "Vehicle-to-infrastructure communication-based adaptive traffic signal control."IET Intelligent Transport Systems 7.3, pp. 351-360, 2013.
[2] L. Vanajakshi, "Centre of Excellence in Urban Transport IIT Madras Synthesis Report on ITS Including Issues and Challenges in India," pp. 1-58 December 2010.
[3] G. Xiong, K. Wang, F. Zhu, C. Cheng, X. An, and Z. Xie, “Parallel traffic management for the 2010 Asian Games,” IEEE Intell. Syst., vol. 25, no. 3, pp. 81–85, 2010.
[4] T. Roor, “Intelligent Transportation System in India - A Review,” January, 2016.
[5] C. Lan and G. Chang, “A Traffic Signal Optimization Model for Intersections Experiencing Heavy Scooter – Vehicle Mixed Traffic Flows,” vol. 16, no. 4, pp. 1771–1783, 2015.
[6] M. Lv, L. Chen, X. Wu, and G. Chen, "A road congestion detection system using undedicated mobile phones." IEEE Transactions on Intelligent Transportation Systems", vol. 16, no. 6, pp. 3060–3072, 2015.
[7] Ministry of Transport, Intelligent Transport Systems Technology Action Plan 2014-18, May. 2014.
[8] Shirazi, Mohammad Shokrolah, and Brendan Tran Morris. "Vision-based turning movement monitoring: count, speed & waiting time estimation." IEEE Intelligent Transportation Systems Magazine 8.1, pp. 23-34, 2016
[9] P. Y. P. Singh and U. P. Bijnor, “Analysis and Designing of Proposed Intelligent Road Traffic Congestion Control System with Image Mosaicking Technique,” International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) vol. 2, no. 4, pp. 27–31, 2013.
[10] Tettamanti, Tamás., “Advanced Methods for Measurement and Control in Urban Road Traffic Networks,” 2013.
[11] I. Arel, C. Liu, T. Urbanik, and A. G. Kohls, “Reinforcement learning-based multi-agent system for network traffic signal control,” IET Intell. Transp. Syst., vol. 4, no. 2, p. 128, 2010.
[12] A. Menon, R. Sinha, D. Ediga, I. Technology, and O. A. Road, “IMPLEMENTATION OF INTERNET OF THINGS IN BUS TRANSPORT SYSTEM OF SINGAPORE ”, 2013.
[13] J. Park, Y. L. Murphey, R. McGee, J. G. Kristinsson, M. L. Kuang, and A. M. Phillips, “Intelligent trip modeling for the prediction of an origin-destination traveling speed profile,” IEEE Trans. Intell. Transp. Syst., vol. 15, no. 3, pp. 1039–1053, 2014.
[14] S. K. Shukla and A. Agrawal, “Present and Future Perspective on Optimization of Road Network Management,” vol. 22, no. 2, pp. 64–67, 2015.
[15] C. Chen, D. Zhang, N. Li, and Z. H. Zhou, “B-planner: Planning bidirectional night bus routes using large-scale taxi GPS traces,” IEEE Trans. Intell. Transp. Syst., vol. 15, no. 4, pp. 1451–1465, 2014.
[16] A. Vu, S. Member, A. Ramanandan, A. Chen, J. A. Farrell, M. Barth, and S. Member, “Real-Time Computer Vision / DGPS-Aided Inertial Navigation System for Lane-Level Vehicle Navigation,” vol. 13, no. 2, pp. 899–913, 2012.
[17] D. Srinivasan, M. C. Choy, and R. L. Cheu, “Neural networks for real-time traffic signal control,” IEEE Trans. Intell. Transp. Syst., vol. 7, no. 3, pp. 261–272, 2006.
[18] I. Transportation, S. Its, J. Program, and O. Jpo, “Intelligent Transportation Systems (ITS) Strategic Plan 2015-2019,” 2014.
[19] A. Geiger, M. Lauer, C. Wojek, C. Stiller, and R. Urtasun, “3D traffic scene understanding from movable platforms,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 36, no. 5, pp. 1012–1025, 2014.
[20] F. Zhang, “The current situation and development thinking of the intelligent transportation system in China,” 2010 Int. Conf. Mech. Autom. Control Eng. MACE2010, vol. 717, pp. 2826–2829, 2010.
[21] Y. C. S. Huang and L. F. P. Hsiao, “Vehicle detection and tracking under various lighting conditions using a particle filter,” no. May 2011, pp. 1–8, 2012.
[22] R. Jyothi Priya, S. M. Mansoor Roomi, B. Yogameena, V. Abhaikumar, and S. Raju, “People/vehicle classification by recurrent motion of skeleton features,” IET Comput. Vis., vol. 6, no. 5, pp. 442–450, 2012.
[23] D.-Y. Chen, G.-R. Chen, and Y.-W. Wang, “Real-time dynamic vehicle detection on resource-limited mobile platform,” IET Comput. Vis., vol. 7, no. 2, pp. 81–89, 2013.
[24] X. Liu, D. Tao, M. Song, L. Zhang, J. Bu, and C. Chen, “Learning to track multiple targets,” IEEE Trans. Neural Networks Learn. Syst., vol. 26, no. 5, pp. 1060–1073, 2015.
[25] H. Hajimolahoseini, H. Soltanian-Zadeh, and R. Amirfattahi, “Robust vehicle tracking algorithm for nighttime videos captured by fixed cameras in highly reflective environments,” IET Comput. Vis., vol. 8, no. 6, pp. 535–544, 2014.
[26] NTDPC, India Transport Report: Moving India to 2032, vol. II. 2014.
[27] E. Castillo, M. Nogal, J. M. Menéndez, S. Sánchez-Cambronero, and P. Jiménez, “Stochastic demand dynamic traffic models using generalized beta-gaussian bayesian networks,” IEEE Trans. Intell. Transp. Syst., vol. 13, no. 2, pp. 565–581, 2012.
[28] V. Tyagi, S. Kalyanaraman, and R. Krishnapuram, “Vehicular Traffic Density State Estimation Based on Cumulative Road Acoustics,” IEEE Trans. Intell. Transp. Syst., vol. 13, no. 3, pp. 1156–1166, 2012.
[29] Y. Chen, D. Yang, L. Xin, and Y. Zhang, “Real-time detecting and tracking of traffic shockwaves based on weighted consensus information fusion in distributed video network,” IET Intell. Transp. Syst., vol. 8, no. 4, pp. 377–387, 2014.
[30] M. R. Gahrooei and D. B. Work, “Inferring Traffic Signal Phases From Turning Movement Counters Using Hidden Markov Models." IEEE Transactions on Intelligent Transportation Systems”, vol. 16, no. 1, pp. 91–101, 2015.
[31] S. A. Fayazi and A. Vahidi, “Crowdsourcing Phase and Timing of Pre-Timed Traffic Signals in the Presence of Queues: Algorithms and Back-End System Architecture,” IEEE Trans. Intell. Transp. Syst., vol. 17, no. 3, pp. 870–881, 2016.
[32] A. Guerrero-ibáñez, C. Flores-cortés, P. Damián-Reyes, and J. R. G. Pulido, "Emerging Technologies for Urban Traffic Management," Urban Development. InTech, 2012.
[33] M. Patel and N. Ranganathan, “IDUTC: An intelligent decision-making system for urban traffic-control applications,” IEEE Trans. Veh. Technol., vol. 50, no. 3, pp. 816–829, 2001.
[34] R. Hawi, G. Okeyo, and M. Kimwele, “Techniques for Smart Traffic Control: An In-depth Review,” vol. 4, no. 7, pp. 566–573, 2015.
[35] S. Hollborn, “Report Intelligent Transport Systems in Japan,” 2002.
[36] I. Journal, O. F. Engineering, S. On, P. Of, and V. Routing, "International Journal of engineering sciences & research technology study on performance of vanet routing protocols and challenges," vol. 9655, no. 8, pp. 922–927, 2015.
[37] M. S. Uddin and A. K. Das, “Real-time Area Based Traffic Density Estimation by Image Processing for Traffic Signal Control System: Bangladesh Perspective,” Electrical Engineering and Information Communication Technology (ICEEICT), 2015 International Conference on. IEEE, pp. 21–23, May 2015.
[38] S. Djahel, R. Doolan, G.-M. Muntean, and J. Murphy, “A Communications-Oriented Perspective on Traffic Management Systems for Smart Cities: Challenges and Innovative Approaches,” IEEE Commun. Surv. Tutorials, vol. 17, no. 1, pp. 125–151, 2015.
[39] F. Espinosa, C. Gordillo, R. Jiménez, and O. Avilés, “Dynamic traffic light controller using machine vision and optimization algorithms,” Engineering Applications (WEA), 2012 Workshop on. IEEE, pp. 1–6, 2012.
[40] M. H. Malhi, M. H. Aslam, F. Saeed, O. Javed, and M. Fraz, “Vision Based Intelligent Traffic Management System,” Frontiers of Information Technology (FIT), pp. 137–141, 2011.
[41] K. Nellore and G. Hancke, “A Survey on Urban Traffic Management System Using Wireless Sensor Networks,” Sensors, vol. 16, no. 2, p. 157, 2016.
[42] N. Buch, S. A. Velastin, and J. Orwell, “A review of computer vision techniques for the analysis of urban traffic,” IEEE Trans. Intell. Transp. Syst., vol. 12, no. 3, pp. 920–939, 2011.
[43] J. Hopkin, “Study on ITS Directive , Priority Action A: The Provision of EU-wide Multimodal Travel Information Services D5 Final Report,” no. May, 2016.
[44] D. S. N. Kheirabadi, D. N. M. Kulkarni, and D. A. D. Shaligram, “Wireless Sensor Network Based Traffic Monitoring; Overview and Threats To Its Security,” J. Glob. Res. Comput. Sci., vol. 2, no. 8, p. 6, 2011.
[45] I. G. Guardiola, T. Leon, and F. Mallor, “A functional approach to monitor and recognize patterns of daily traffic profiles,” Transp. Res. Part B Methodol., vol. 65, pp. 119–136, 2014.
[46] Jiankai Wang, N. Indra-Payoong, A. Sumalee, and S. Panwai, “Vehicle Reidentification With Self-Adaptive Time Windows for Real-Time Travel Time Estimation,” IEEE Trans. Intell. Transp. Syst., vol. 15, no. 2, pp. 540–552, 2014.
[47] N. D. Agrawal and A. Sahu, “Intelligent Real Time Traffic Controller Using Image Processing – A Survey,” vol. 4, no. 4, pp. 2980–2983, 2015.
[48] “http://www.its-uk.org.uk.” .
[49] “http://www.Itscanada.Ca.” .
[50] “http:// www.itsindia.org.” .
[51] News from SakalNews- Today Section, Title- “To install Intelligent Traffic Monitoring system at Pune-Mumbai highway”, pp 1, 1st December 2017.
[52] News from Maharashtra times of India , Title-"Vehicle strength increased about 50 lakhs", 8th September 2017.
[53] Chaudhry, G. A. "Evolution of the transportation system in
Dubai." Network Industries Quarterly 14, pp. 7-11, 2012.
[54] http://eustandards.in, in the framework of project SESEI, Indo-European dialogues on ICT standards & Emerging Technologies, 07_dibyendu_sengupta_ebtc.pdf, 13th -14th March 2014.
[55] Xinlu, Ma, Liu Nanyun, and Li Bei. "The Date Collection and Analysis in Roundabouts with Traffic Signals."Measuring Technology and Mechatronics Automation (ICMTMA), 2016 Eighth International Conference on.IEEE, 2016.
[56] Li, Zhang, Lu Fei, and Zhao Yongyi. "Based on the Particle Swarm Optimization_NeuralNetwork integration algorithm in Internet of Vehicles application." Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC),Oct 3 (pp. 1973-1977) IEEE 2016.
[57] Singh, Bhupendra, and Ankit Gupta. "Recent trends in intelligent transportation systems: a review." Journal of Transport Literature 9.2 : 30-34 2015.
Citation
Pallavi A. Mandhare, Vilas Kharat, C.Y. Patil, "Intelligent Road Traffic Control System for Traffic Congestion: A Perspective," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.908-915, 2018.
The Numerical Solution of Nonlinear Nonhomogeneous System of Differential Equations By Differential Transform Technique
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.916-919, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.916919
Abstract
There are several methods available; analytical (Exact), approximate and numerical; for solving differential equations. Most of these methods are computationally exhaustive because they require a lot of time and space. The Zhou’s differential transform technique has an edge over the traditional methods as it uses the polynomial as the approximation to exact solution. In this paper differential transform technique is employed to solve some nonlinear nonhomogeneous, initial value problems in system of differential equations which are often encountered in applied sciences and engineering. The solutions produced by differential transform method are compared with the exact solutions achieved by Laplace transform technique. It is observed that numerical results obtained by differential transform method are in good agreements with the analytical solutions.
Key-Words / Index Term
Differential transform technique, System of differential equations, Laplace transforms technique, Exact solution
References
[1] J. K. Zhou, “Differential transformation and its applications for electrical circuits”, Huazhong University press. Wuhan, China. (In Chinese) , 1986.
[2] C. L. Chen, Y. C. Liu, “Differential transformation technique for steady nonlinear heat conduction problems”, Applied Mathematics and Computation, Vol.95, pp.l55-164, 1998.
[3] C. L. Chen, Y. C. Liu, “Solution of two point boundary value problems using the differential transformation method”, Journal of Optimization Theory and Applications, Vol.99, pp. 23-35, 1998.
[4] C. K.Chen, and S. H. Ho, “Application of differential transformation to eigenvalue problems”, Appl. Math. Comput, Vol.79, pp.173–188, 1996.
[5] C. L. Chen, Y. C. Liu, “Solution of two point boundary value problems using the differential transformation method”, J. Opt. Theory. Appl., Vol.99,pp. 23-35, 1998.
[6] F. Ayaz, “Applications of differential transform method to differential-algebraic equations”, Applied Mathematics and Computation, Vol.152, pp.649-657, 2004.
[7] F. Kangalgil, F. Ayaz, “Solitary wave solutions for the KdV and mKdV equations by differential transform method”, Chaos, Solitons and Fractals, Vol.41 (1), pp. 464-472, 2009.
[8] S. V. Ravi Kanth, K. Aruna, “Two-dimensional differential transform method for solving linear and non-linear Schrodinger equations”, Chaos, Solitons and Fractals, 2009.Vol.4l (5), pp. 2277-2281, 2009.
[9] A. Arikoglu, I. Ozkol, “Solution of fractional differential equations by using differential transforms method”, Chaos, Solitons and Fractals, Vol.34, pp. l473-1481, 2007.
[10] J. Biazar, M. Eslami, “Differential transform method for quadratic Riccati differential equation”, International Journal of Nonlinear Science, Vol.9 (4),pp. 444-447, 2010.
[11] M. I. Jang, C. L. Chen, Y. C. Liu, “On solving the initial value problems using the differential transformation method”, Applied Mathematics and Computation, HS: 5460, 2000.
[12] S. H. Chang, I. L. Chang, “A new algorithm for calculating one-dimensional differential transform of nonlinear functions”, Applied Mathematics and Computation, Vol.195, pp. 799-808, 2008.
[13] N. Mostafa, A. Ahmad, K. Ali, “Efficient multi-step differential transform method:Theory and its application to nonlinear oscillators”, (Elsevier) Commun Nonlinear Sci Numer Simulat, Vol.53, pp. 154–183, 2017.
[14] T. Montri, P. Sasitorn, “The numerical solutions of differential transform method and the Laplace transform method for a system of differential equations”, (Elsevier) Nonlinear Analysis: Hybrid Systems Vol.4, pp. 425–431, 2010.
Citation
S. P. Dahake, G. Purohit, A.V. Dubewar, "The Numerical Solution of Nonlinear Nonhomogeneous System of Differential Equations By Differential Transform Technique," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.916-919, 2018.
A Study on Data Preprocessing Methods on Web Log Data in Web Usage Mining
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.920-928, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.920928
Abstract
Web usage Mining is an extension of traditional data mining. As the tremendous amount of data is increasing, the prominence of internet is growing. This impact upholds the user’s needs and the users are also increasing in enormous speed. Because of these realities the web data has been budding day to day. Therefore extracting the useful data from WWW has become the challenging one. Due to this fact the users are feeling disoriented. So it is necessary for the web usage miners to discover the new way of finding the desired information or the ease of accessing the web. As a result the web mining has become more popular and reached the peak in research field having in mind about mining the data and WWW as well. The aim of the proposed research is to survey on different Data preprocessing techniques carried out by most of researchers has been discussed, where this web log preparation is considered as the first step on web mining process to identify the user behavior. This phase is referred to be the most important process to ensure the quality of the log data. The log files are gathered and pre-processed by removing the unwanted or irrelevant information. A complete overview on data preprocessing may recommend better technique to find the user behavior and to improve the performance, and finally we concluded by providing a glimpse of various Web mining Applications.
Key-Words / Index Term
Web usage mining, Web server log, Data Preprocessing, User identification, Session Identification
References
[1] R.Shanthil, Dr.S.P.Rajagopal, “An Efficient Web Mining Algorithm to Mine Web Log Information”
[2] Dharmendra Patel, Dr. Kalpesh Parikh, Atul Patel,” Sessionization –A Vital Stage in Data Preprocessing of Web Usage Mining - A Survey” International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 1, Jan-Feb. 2012, pp. 327-330.
[3] http://www.surfray.com/blog/2009/08/11/iis-log-file-formats-overview/
[4] Jia Li (2013), “Research of Analysis of User Behavior Based on Web Log”, International Conference on Computational and Information Sciences. 2013
[5] Jiawei Han et al, “Data mining, concept and techniques” .cs.sfu.ca, 2, Jan. 31, 2011. [Online]. Available: http://www.cs.sfu.ca.
[6] J. Han, M. Kamber and J. Pei, “Data mining: concepts and techniques”, Morgan Kaufmann, (2006).
[7] C.P.Sumathi, R.PadmajaValli, Santhanam,” An Overview Of Preprocessing of Web Log Files For Web Usage Mining” Journal of Theoretical and Applied Information Technology 31st December 2011. Vol. 34 No.2
[8] Dafa-Alla, Mirghani. A. Eltahir and Anour F.A(2013),” Extracting Knowledge from Web Server Logs Using Web Usage Mining”, 2013 international conference on computing, electrical and electronic engineering (ICCEEE)
[9] Tasawar Hussain, dr.asghar and dr. Masood” preprocessing techniques in web log mining” 2010
[10] Theint Theint Aye “Web Log Cleaning for Mining of Web Usage Patterns”, University of Computer Studies, Mandalay 2011.
[11] Chandana S. Khatavkar, Prof. Mangesh Wanjari, “A Hybrid approach for Clustering Weblog”, International Journal of Advanced Research in Computer Science and Software Engineering. Volume 5, Issue 3, March 2015.
[12] Abdul Rahaman Wahab Sait and Dr. T.Meyappan “Data preprocessing and Transformation techniques to generate Patterns from Web Logs”, International conference on Computer Science and Information Systems (ICSIS’2014) Oct 2014.
[13] B.Uma Maheshwari, 2P.Sumathi,” An Effective Method to Preprocess the Data in Web Usage Mining”, ARPN Journal of Science and Technology, Vol. 3, NO. 3, March 2013
[14] P.Nithya, 2 Dr. Sumathi,” A Survey on Web Usage Mining: Theory and Applications”, P Nithya et al, Int.J.Computer Technology & Applications, Vol 3 (4), 1625-1629.
[15] Sheetal A. Raiyani1, Shailendra Jain2, Ashwin G. Raiyani3.” Advanced Preprocessing using Distinct User Identification in web log usage data”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 6, August 2012.
[16] Ramya C., Shreedhara K. S., and Kavitha G.” Preprocessing: A Prerequisite for Discovering Patterns in Web Usage Mining Process”, International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2011.
[17] Chitraa, Dr. Antony Selvadoss Davamani,” An Efficient Path Completion Technique for web log mining”, IEEE International Conference on Computational Intelligence and Computing Research, 2010
[18] Surbhi Anand, Rinkle Rani Aggarwal,” An Efficient Algorithm for Data Cleaning of Log File using File Extensions”, International Journal of Computer Applications (0975 – 888) Volume 48– No.8, June 2012.
[19] R. Cooley, B. Mobasher, J. Srivastava , “Data Preparation for Mining World Wide Web Browsing Pattern” in Journal of Knowledge and Data Engineering Workshop, IEEE, 1999Vol.1 Page(s): 5-32
[20] G. Castellano, A. M. Fanelli, M. A. Torsello,” Log Data Preparation for Mining Web Usage Patterns” IADIS International Conference Applied Computing 2007
[21] G T Raju, Nandini N,” Preprocessing of Web Usage Data for Application in Prefetching to Reduce Web Latency”, International Journal of Electrical& Computer Sciences IJECS-IJENS Vol: 14 No: 04
[22] Navin Kumar Tyagi1, A.K. Solanki2& Sanjay Tyagi3,” An algorithmic approach to data preprocessing in Web Usage Mining”, International Journal of Information Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 279-283
[23] K. R. Suneetha, Dr. R. Krishnamoorthi,” Identifying User Behavior by Analyzing Web Server Access Log File”, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009.
[24] Abdul Rahaman Wahab Sait, and Dr.T.Meyappan,” Data Preprocessing and Transformation Technique to Generate Pattern from the Web Log”, International conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, 2014.
[25] Naga Lakshmi, Raja Sekhara Rao, Sai Satyanarayana Reddy,”An Overview of Preprocessing on Web Log Data for Web Usage Analysis” International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-2, Issue-4, March 2013.
[26] Mona S.Kamat, J.W.Bakal & Madhu Nashipudi,” Optimization of Web Preprocessing in Web Usage Mining”, Volume-2, Issue-6, 2013.
[27] Dr. Girish S. Katkar,” Use of Log Data for Predictive Analytics through Data Mining”, Current Trends in Technology and Science Volume: 3, Issue: 3 (Apr-May. 2014)
[28] B N ShankarGowda, Vibha Lakshmikanthab, K R Venugopal, L M Patnaikd,” A Framework for Preprocessing Web Log in the Data Warehouse Environment for Web User Behavior Analytics” International Journal of Information Processing, 8(1), 40-52, 2014IK International Publishing House Pvt. Ltd., New Delhi, India.
[29] Vijay Kumar Padala1, Sayeed Yasin2, Durga Bhavani Alanka3,” A Novel Method for Data Cleaning and User- Session Identification for Web Mining”, International Journal of Modern Engineering Research (IJMER), Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2816-2819.
[30] Shashi Sahu1,Leena Sahu2 “A Survey on Frequent Web Page Mining with Improving Data Quality of Log Cleaner”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 3 , March 2015
[31] Xiaohua Hu,” DB-HReduction: A Data Preprocessing Algorithm for Data Mining Applications”, 0893-9659/03/$ - see front matter c° 2003 Elsevier Science Ltd. All rights reserved.
Citation
R.Sandrilla, M. Savitha Devi, "A Study on Data Preprocessing Methods on Web Log Data in Web Usage Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.920-928, 2018.