Region Refinement Technique In MGEAR Protocol To Enhancing Sensor Node Life Time
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.867-870, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.867870
Abstract
There are number of energy efficient techniques used to enhance the network life time one of them is gateway based energy-efficient routing protocol (M-GEAR) this protocol is based on the node which is rechargeable and divides network into four logical regions on the basis of the location from the Sink. In this paper we use the Enhanced gateway based energy-efficient technique which works on the basis of multilevel multihop technique with CHs and gateway nodes in region 2 and region 3 and the selection of the cluster heads in these region is based on the energy concept, which improves the network life time by minimizing the data loss and cluster failure.
Key-Words / Index Term
Sensors, Gateway Node, TDMA, Homogeneous Network
References
[1] Q. Nadeem1, M. B. Rasheed1 et al, “M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol for WSNs”, ieee july 2016.
[2] Nazia anjum, Maood ahmed et al,” Gateway Based Energy Efficient Routing: GEER”, International Journal of Advance Research, Ideas and Innovations in Technology, ISSN: 2454-132X, 2017.
[3] Pallavi Jain1 and Harminder kaur2, ” An Improved Gateway Based Multi Hop Routing Protocol for Wireless Sensor Network”, International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1567-1574.
[4] Velanati Mohana Gandhi1, M.V.H.Bhaskara Murthy2,M.Lakshmu Naidu3, “ Performance Analysis of Multihop-Gateway Energy Aware Routing (M-Gear) Protocol for Wireless Sensor Networks”, IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 21, Issue11, Ver. 9 (Nov. 2016) PP 01-07.
[5] Veena Anand , Deepika Agrawal, Preety Tirkeyb, Sudhakar Pandey, “An energy efficient approach to extend network life time of wireless sensor networks”, Elsevier, Procedia Computer Science 92 ( 2016 ) 425 – 430.
[6] Aslam, M., Nadeem Javaid, A. Rahim, U. Nazir, Ayesha Bibi, and Z. A. Khan. "Survey of extended LEACH-Based clustering routing protocols for wireless sensor networks."In High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on, pp. 1232-1238. IEEE, 2012.
[7] Mr. Santosh.Irappa.Shirol, Ashok Kumar. N, Mr. Kalmesh.M.Waderhatti,”Advanced-LEACH Protocol of Wireless Sensor network”, IJETT - Volume4 Issue6- June 2013.
[8] S. Rani and S.H. Ahmed, Multi-hop Routing in Wireless Sensor Networks, Springer Briefs in Electrical and Computer Engineering, DOI 10.1007/978-981-287-730-7_2
[9] Karthick .K et al, ” An Energy-Saving Routing Algorithm for Wireless Body Sensor Network using Data Compression Technique”, ijca-2015.
[10] Shakshi Mehta et al “ Improved Multi-Hop Routing Protocol in Wireless Body Area Networks “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 7, July 2015.
[11] Jung, W. S., Lim, K. W., Ko, Y. B., & Park, S. J. “A hybrid approach for clustering-based data aggregation in wireless sensor networks”, In Digital Society,. ICDS`09. IEEE, Third International Conference on (pp. 112-117), 2009.
[12] Li, Hongjuan, Kai Lin, and Keqiu Li. "Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks." Computer Communications 34.4 (2011): 591-597.
Citation
Preeti Jamwal, Sonam Mahajan, "Region Refinement Technique In MGEAR Protocol To Enhancing Sensor Node Life Time," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.867-870, 2018.
Review On Conventional and Advanced Classification Approaches in Remote Sensing Image Processing
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.871-879, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.871879
Abstract
Nowadays remote sensing image classification process has been most commonly used for object identification. It identifies the object in the remote sensing images by assigning the land cover classes to pixels. In this paper, a review on conventional and advanced remote sensing image classification techniques such as supervised, unsupervised, per pixel, sub pixel and object based image analysis processes has been provided. Further, a brief description about the effective features of different image classification algorithms like Fuzzy classifier, classification based on Artificial Neural Network (ANN), classification based on Support Vector Machine (SVM), Evolutionary Algorithms (EA) and Optimum Path Forest classification algorithms were also given. In the next section of paper various classification methodologies with their characteristics and examples of classifiers are explained. Moreover, this study compares the frequently used image classification algorithms and suggests the remote sensing image classifier to choose the best image classification technique based on the performance of classification that improves the accuracy range.
Key-Words / Index Term
Remote sensing, Image classification, ANN, SVM, Optimum Path Forest
References
[1] Y. Zhong, A. Ma, Y. soon Ong, Z. Zhu, L. Zhang, “Computational intelligence in optical remote sensing image processing”, Applied Soft Computing, Vol.64, pp.75-93, 2017.
[2] T. Lillesand, R.W. Kiefer, J. Chipman, “Remote Sensing and Image Interpretation”, 7th Edition, 2015.
[3] N. Alajlan, Y. Bazi, F. Melgani, R.R. Yager, “Fusion of supervised and unsupervised learning for improved classification of hyperspectral images”, Information Sciences, Vol.217, pp.39-55, 2012.
[4] G. Zhang, Z. Cao, Y. Gu, “A hybrid classifier based on rough set theory and support vector machines”, In International Conference on Fuzzy Systems and Knowledge Discovery, Springer, Berlin, Heidelberg, pp.1287-1296, 2005.
[5] D. Lu, Q. Weng, “A survey of image classification methods and techniques for improving classification performance”, International journal of Remote sensing, Vol.28 Issue.5, pp.823-870, 2007.
[6] M. Salah, “A survey of modern classification techniques in remote sensing for improved image classification”, Journal of Geomatics, Vol.11, Issue.1, pp.21, 2017.
[7] P. Kamavisdar, S. Saluja, S. Agrawal, “A survey on image classification approaches and techniques”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.2, Issue.1, pp.1005-1009, 2013.
[8] S. Abburu, S.B. Golla, “Satellite image classification methods and techniques: A review”, International journal of computer applications, Vol.119, Issue.8, 2015.
[9] M.S. Prasad, T.S. Savithri, I.V.M. Krishna, “Techniques iIn Image Classification; A Survey”, Global Journal of Research In Engineering. Vol.15, Issue.6, 2015.
[10] M. Nair, J.S. Bindhu, “Supervised techniques and approaches for satellite image classification”, International Journal of Computer Applications, Vol.134, Issue.16, 2016.
[11] S.R. Hale, B.N. Rock, “Impact of topographic normalization on land-cover classification accuracy”, Photogrammetric Engineering & Remote Sensing, Vol.69, Issue.7, pp.785-791, 2003.
[12] D.G. Hadjimitsis, C.R.I. Clayton, V.S. Hope, “An assessment of the effectiveness of atmospheric correction algorithms through the remote sensing of some reservoirs”, International Journal of Remote Sensing, Vol.25, Issue.18, pp.3651-3674, 2004.
[13] E. Pretorius, “Image classification towards mapping of vegetation structure: a practical approach”, In International Cartographic Conference, Dresden, Germany, 2013.
[14] T. Kavzoglu, P.M. Mather, “The use of backpropagating artificial neural networks in land cover classification”, International journal of remote sensing, Vol.24, Issue.23, pp.4907-4938, 2003.
[15] J.T. Tou, R.C. Gonzalez, "Pattern recognition principles", Image Rochester NY, Vol.7, 1974.
[16] L. Černá, M. Chytrý, “Supervised classification of plant communities with artificial neural networks”, Journal of Vegetation Science, Vol.16, Issue.4, pp.407-414, 2005.
[17] S.D. Jawak, P. Devliyal, A.J. Luis, “A comprehensive review on pixel oriented and object oriented methods for information extraction from remotely sensed satellite images with a special emphasis on cryospheric applications”, Advances in Remote Sensing, Vol.4, Issue.03, p.177, 2015.
[18] S.K. Langley, H.M. Cheshire, K.S. Humes, “A comparison of single date and multitemporal satellite image classifications in a semi-arid grassland”, Journal of Arid Environments, Vol.49, Issue.2, pp.401-411, 2001.
[19] L. Castellana, A. D’Addabbo, G. Pasquariello, “A composed supervised/unsupervised approach to improve change detection from remote sensing”, Pattern Recognition Letters, Vol.28, Issue.4, pp.405-413, 2007.
[20] S. Lewinski, K. Zaremski, “Examples of object-oriented classification performed on high-resolution satellite images”, Miscellanea geographica, Vol.11, pp.349-358, 2004.
[21] P. Fisher, “The pixel: a snare and a delusion. International Journal of Remote Sensing”, Vol.18, Issue.3, pp.679-685, 1997.
[22] M. Xu, P. Watanachaturaporn, P.K. Varshney, M.K. Arora, “Decision tree regression for soft classification of remote sensing data”, Remote Sensing of Environment, Vol.97, Issue.3, pp.322-336, 2005.
[23] S.K. Singh, V. Kumar, S. Kanga, "Land Use/Land Cover Change Dynamics and River Water Quality Assessment Using Geospatial Technique: a case study of Harmu River, Ranchi (India)", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.17-24, 2017.
[24] J.J. Settle, S.A. Briggs, “Fast Maximum-likelihood Classification of Remotely Sensed Imagery”, International Journal of Remote Sensing, Vol.8, pp.723-734, 1987.
[25] R.S. Dwivedi, S. Kandrika, K.V. Ramana, “Comparison of classifiers of remote-sensing data for land-use/land-cover mapping”, Current Science, pp.328-335, 2004.
[26] P.J. Deer, P. Eklund, “A study of parameter values for a Mahalanobis distance fuzzy classifier”, Fuzzy Sets and Systems, Vol.137, Issue.2, pp.191-213, 2003.
[27] K. Kyrimis, “Monitoring land cover change detection with remote sensing methods in Magnesia prefecture in Greece”, Fresenius Environmental Bulletin, Vol.9, Issue.9/10, pp.659-666, 2000.
[28] H. Zhu, O. Basir, “An adaptive fuzzy evidential nearest neighbor formulation for classifying remote sensing images”, IEEE Transactions on Geoscience and Remote Sensing, Vol.43, Issue.8, pp.1874-1889, 2005.
[29] G. Mountrakis, J. Im, C. Ogole, “Support vector machines in remote sensing: A review”, ISPRS Journal of Photogrammetry and Remote Sensing, Vol.66, Issue.3, pp.247-259, 2011.
[30] H. Jiang, D. Zhao, Y. Cai, S. An, “A method for application of classification tree models to map aquatic vegetation using remotely sensed images from different sensors and dates”, Sensors, Vol.12, Issue.9, pp.12437-12454, 2012.
[31] P.O. Gislason, J.A. Benediktsson, J.R. Sveinsson, “Random Forests for Land Cover Classification”, Pattern Recognition Letters, Vol.27, pp.294-300, 2006.
[32] M. Marconcini, G. Camps-Valls, L. Bruzzone, “A composite semisupervised SVM for classification of hyperspectral images”, IEEE Geoscience and Remote Sensing Letters, Vol.6, Issue.2, pp.234-238, 2009.
[33] M.H. Tseng, S.J. Chen, G.H. Hwang, M.Y. Shen, “A genetic algorithm rule-based approach for land-cover classification”, ISPRS Journal of Photogrammetry and Remote Sensing, Vol.63, Issue.2, pp.202-212, 2008.
[34] P. Shanmugam, Y.H. Ahn, S. Sanjeevi, “A comparison of the classification of wetland characteristics by linear spectral mixture modelling and traditional hard classifiers on multispectral remotely sensed imagery in southern India”, ecological modelling, Vol.194, Issue.4, pp.379-394, 2006.
[35] C.E. Woodcock, S. Gopal, “Fuzzy set theory and thematic maps: accuracy assessment and area estimation”, International Journal of Geographical Information Science, Vol.14, Issue.2, pp.153-172, 2000.
[36] B. Mannan, A.K. Ray, “Crisp and fuzzy competitive learning networks for supervised classification of multispectral IRS scenes”, International Journal of Remote Sensing, Vol.24, Issue.17, pp.3491-3502, 2003.
[37] C.C. Yang, S.O. Prasher, P. Enright, C. Madramootoo, M. Burgess, P.K. Goel, I. Callum, “Application of decision tree technology for image classification using remote sensing data”, Agricultural Systems, Vol.76, Issue.3, pp.1101-1117, 2003.
[38] C. Wu, “Normalized spectral mixture analysis for monitoring urban composition using ETM+ imagery”, Remote Sensing of Environment, Vol.93, Issue.4, pp.480-492. 2004.
[39] J. Zhang, G.M. Foody, “A fuzzy classification of sub-urban land cover from remotely sensed imagery”, International journal of remote sensing, Vol.19, Issue.14, pp.2721-2738, 1998.
[40] N.S. Lele, "Image Classification Using Convolutional Neural Network", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.22-26, 2018.
[41] S.W. Myint, “Urban vegetation mapping using sub‐pixel analysis and expert system rules: a critical approach”, International Journal of Remote Sensing, Vol.27, Issue.13, pp.2645-2665, 2006.
[42] D.A. Roberts, M. Gardner, R. Church, S. Ustin, G. Scheer, R.O. Green, “Mapping chaparral in the Santa Monica Mountains using multiple endmember spectral mixture models”, Remote sensing of environment, Vol.65, Issue.3, pp.267-279, 1998.
[43] C. Wu, A.T. Murray, “Estimating impervious surface distribution by spectral mixture analysis”, Remote sensing of Environment, Vol.84, Issue.4, pp.493-505, 2003.
[44] J. Tang, L. Wang, S.W. Myint, “Improving urban classification through fuzzy supervised classification and spectral mixture analysis”, International Journal of Remote Sensing, Vol.28, Issue.18, pp.4047-4063, 2007.
[45] T. Blaschke, “Object based image analysis for remote sensing”, ISPRS journal of photogrammetry and remote sensing, Vol.65, Issue.1, pp.2-16, 2010.
[46] S.W. Myint, P. Gober, A. Brazel, S. Grossman-Clarke, Q. Weng, “Per-pixel vs. object-based classification of urban land cover extraction using high spatial resolution imagery”, Remote sensing of environment, Vol.115, Issue.5, pp.1145-1161, 2011.
[47] A.S. Banu, P. Vasuki, S.M.M. Roomi, A.Y. Khan, "SAR Image Classification by Wavelet Transform and Euclidean Distance with Shanon Index Measurement", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.3, pp.13-17, 2018.
[48] N.R. Pal, D. Bhandari, “On object background classification”, International journal of systems science, Vol.23, Issue.11, pp.1903-1920, 1992.
[49] U.C. Benz, P. Hofmann, G. Willhauck, I. Lingenfelder, M. Heynen, “Multi-resolution, object-oriented fuzzy analysis of remote sensing data for GIS-ready information”, ISPRS Journal of photogrammetry and remote sensing, Vol.58, Issue.3-4, pp.239-258, 2004.
[50] Y. Zhong, L. Zhang, “An adaptive artificial immune network for supervised classification of multi-/hyperspectral remote sensing imagery”, IEEE Transactions on Geoscience and Remote Sensing, Vol.50, Issue.3, pp.894-909, 2012.
[51] L. Zhang, Y. Zhong, B. Huang, P. Li, “A resource limited artificial immune system algorithm for supervised classification of multi/hyper‐spectral remote sensing imagery”, International Journal of Remote Sensing, Vol.28, Issue.7, pp.1665-1686, 2007.
[52] B. Dixon, N. Candade, “Multispectral landuse classification using neural networks and support vector machines: one or the other, or both?”, International Journal of Remote Sensing, Vol.29, Issue.4, pp.1185-1206, 2008.
[53] C. Joshi, J. De Leeuw, A.K. Skidmore, I.C. Van Duren, H. Van Oosten, “Remotely sensed estimation of forest canopy density: A comparison of the performance of four methods”, International Journal of Applied Earth Observation and Geoinformation, Vol.8, Issue.2, pp.84-95, 2006.
[54] F. Ratle, G. Camps-Valls, J. Weston, “Semisupervised neural networks for efficient hyperspectral image classification”, IEEE Transactions on Geoscience and Remote Sensing, Vol.48, Issue.5, pp.2271-2282, 2010.
[55] L. Bruzzone, M. Chi, M. Marconcini, “A novel transductive SVM for semisupervised classification of remote-sensing images”, IEEE Transactions on Geoscience and Remote Sensing, Vol.44, Issue.11, pp.3363-3373, 2006.
[56] L. Gómez-Chova, G. Camps-Valls, J. Munoz-Mari, J. Calpe, “Semisupervised image classification with Laplacian support vector machines”, IEEE Geoscience and Remote Sensing Letters, Vol.5, Issue.3, pp.336-340, 2008.
[57] X. Yao, Y. Liu, “A new evolutionary system for evolving artificial neural networks”, IEEE transactions on neural networks, Vol.8, Issue.3, pp.694-713, 1997.
[58] M. Cruz-Ramírez, C. Hervás-Martínez, M. Jurado-Expósito, F. López-Granados, “A multi-objective neural network based method for cover crop identification from remote sensed data”, Expert Systems with Applications, Vol.39, Issue.11, pp.10038-10048, 2012.
[59] Y. Zhong, L. Zhang, P. Li, “Multispectral remote sensing image classification based on simulated annealing clonal selection algorithm”, in Preceedings IEEE International Geoscience and Remote Sensing Symposium (IGARSS `05), pp.3745-3748, 2005.
[60] B. Gong, J. Im, G. Mountrakis, “An artificial immune network approach to multi-sensor land use/land cover classification”, Remote Sensing of Environment, Vol.115, Issue.2, pp.600-614, 2011.
[61] C. Oscar, H. Francisco, H. Frank, “Genetic fuzzy systems: evolutionary tuning and learning of fuzzy knowledge bases”, World Scientific. Vol.19, 2001.
[62] D.G. Stavrakoudis, G.N. Galidaki, I.Z. Gitas, J.B. Theocharis, “A genetic fuzzy-rule-based classifier for land cover classification from hyperspectral imagery”, IEEE Transactions on Geoscience and Remote Sensing, Vol.50, Issue.1, pp.130-148, 2012.
[63] C. Puente, G. Olague, S.V. Smith, S.H. Bullock, A. Hinojosa-Corona, M.A. González-Botello, “A genetic programming approach to estimate vegetation cover in the context of soil erosion assessment”, Photogrammetric Engineering & Remote Sensing, Vol.77, Issue.4, pp.363-376, 2011.
[64] J. Keuchel, S. Naumann, M. Heiler, A. Siegmund, “Automatic land cover analysis for Tenerife by supervised classification using remotely sensed data”, Remote sensing of environment, Vol.86, Issue.4, pp.530-541, 2003.
[65] J.A. Gualtieri, R.F. Cromp, “Support vector machines for hyperspectral remote sensing classification”, In 27th AIPR Workshop: Advances in Computer-Assisted Recognition, International Society for Optics and Photonics, Vol.3584, pp.221-233, 1999.
[66] L. Hermes, D. Frieauff, J. Puzicha, J.M. Buhmann, “Support vector machines for land usage classification in Landsat TM imagery”, In Geoscience and Remote Sensing Symposium, 1999. IGARSS`99 Proceedings. IEEE 1999 International, Vol.1, pp.348-350, 1999.
[67] V. Vapnik, “Estimation of dependences based on empirical data [in Russian]”, Nauka, Moscow, 1979.
[68] G. Camps-Valls, L. Gómez-Chova, J. Calpe-Maravilla, J.D. Martín-Guerrero, E. Soria-Olivas, L. Alonso-Chordá, J. Moreno, “Robust support vector method for hyperspectral data classification and knowledge discovery”, IEEE Transactions on Geoscience and Remote sensing, Vol.42, Issue.7, pp.1530-1542, 2004.
[69] F. Melgani, L. Bruzzone, “Classification of hyperspectral remote sensing images with support vector machines”, IEEE Transactions on geoscience and remote sensing, Vol.42, Issue.8, pp.1778-1790, 2004.
[70] M. Fauvel, J. Chanussot, J.A. Benediktsson, “Evaluation of kernels for multiclass classification of hyperspectral remote sensing data”, In Acoustics, Speech and Signal Processing, ICASSP Proceedings, IEEE International Conference, Vol.2, pp.II-II, 2006.
[71] J.C. Bezdec, “Pattern Recognition with Fuzzy Objective Function Algorithms”, Plenum Press, New York, 1981.
[72] J.P. Papa, A.X. FalcãO, V.H.C. De Albuquerque, J.M.R. Tavares, “Efficient supervised optimum-path forest classification for large datasets”, Pattern Recognition, Vol. 45, Issue.1, pp.512-520, 2012.
[73] J.P. Papa, A.X. Falcao, C.T. Suzuki, “Supervised pattern classification based on optimum‐path forest”, International Journal of Imaging Systems and Technology, Vol.19, Issue.2, pp.120-131, 2009.
[74] A.X. Falcão, J. Stolfi, R. de Alencar Lotufo, “The image foresting transform: Theory, algorithms, and applications”, IEEE transactions on pattern analysis and machine intelligence, Vol.26, Issue.1, pp.19-29, 2004.
[75] A.A. Spadotto, J.C. Pereira, R.C. Guido, J.P. Papa, A.X. Falcao, A.R. Gatto, P.C. Cola, A.O. Schelp, “Oropharyngeal dysphagia identification using wavelets and optimum path forest”, In Communications, Control and Signal Processing, ISCCSP, 3rd International Symposium, pp.735-740, 2008.
[76] R. Pisani, P. Riedel, “Land use image classification through optimum-path forest clustering”, Geosci. Remote Sens. Symp. (IGARSS), pp.826-829, 2011.
[77] A. Samant, S. Kadge, "Classification of a Retinal Disease based on Different Supervised Learning Techniques", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.9-13, 2017.
Citation
Gandla Shivakanth, Prakash Singh Tanwar, "Review On Conventional and Advanced Classification Approaches in Remote Sensing Image Processing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.871-879, 2018.
Privacy Preserving Image Transmission Using Random Pattern Mosaic Images Steganography - Survey
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.880-883, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.880883
Abstract
In today’s digital world, privacy concerns for data over the internet have increased. In many communications we transmit digital images and these images contain confidential information. Making is vulnerable towards unauthorized personals attacking the image and leaking our information which demands higher privacy. So, there are a number of methods available for achieving this privacy, one of them being Steganography. This make use of Mosaic image creation which has two distinct techniques, DWT (Discrete wavelet Transform) and DCT (Discrete Cosine Transform). The cover image is arbitrarily selected and uses of this image to hiding of the secret image. Secret image and cover image is split into tiny fragments called tile image and target block respectively. A secret image hiding scheme is proposed with new security features. This scheme utilizes the mosaic images, which is created from the secret and target images. A mosaic image is similar to that of the target image. The secret image fragments are hidden in the target image by performing appropriate color transformations. In these paper we are describe different types of watermarking techniques and differentiate using advantage and disadvantages for future research direction.
Key-Words / Index Term
Steganography, Mosaic Image, DCT (Discrete Cosine Transform), DWT (Discrete Wavelet Transform)
References
[1] Mr.Indrajeet Phutanr and Dr. Sanjay Nalbalwar “A New Method For Secret Image Transmission Via Secret Fragment Visible Mosaic Image”, IEEE 2016.
[2] Ya-Lin Lee And Wen-Hsiang Tsai “A New Secure Image Transmission Technique via Secret-Fragment – Visible Mosaic Images by Nearly Reversible Color Transformations”.IEEE 2014
[3] Anitha Devi M.D and K B Shivakumar “Secured Covert Color Image Transmission using Secret Fragment Visible Mosaic Image and Reversibile Color Transformation Technique”,IEEE 2016
[4] Saravanan Chandran and Koushik Bhattacharya “Performance Analysis of LSB,DCT and DWT for Digital Watermarking Application using Steganography”.
[5] Shahanaz N and Greeshma R “Secret Image Transmission Through Mosaic Image”.
[6] Tamanna and Ashwani Sethi “Steganography: A Juxtaposition between LSB, DCT and DWT.”
[7] Arthe Henriette Pascaline, Li Chun Fong Christopher, Maleika Heenaye-Mamode Khan, Sameerchand Pudaruth,” Using Photomosaic and Steganographic Techniques for Hiding Information inside Image Mosaics”
[8] Senthilarut selvi balu, Mr.Shai Sanmuga Raja,” A Method for Creating Mosaic Image with Small Size Database”.
[9] Manisha Ghortale” Secret-Fragment Visible Mosaic Image Technique for ImageHiding”.
[10] Shabana Vathelil Subair, Timna P Elizabeth, “Secret-Fragment-Mosaic-Images: A Secure Method for Image Transmission”. International Journal of Science and Research (IJSR) ISSN(Online): 2319-7064, Index Copernicus Volume (2013).
[11] Deepali G. Singhavi and Dr. P. N. Chatur, “A New Method for Creation of Secret - Fragment–Visible–Mosaic Image for Secure Communication” IEEE 2nd international conference on innovations in information embedded and communication systems ICIIECS’15.
[12] I. J. Lai and W. H. Tsai, “Secret-Fragment-visible mosaic image-A new computer art and its application to information hiding”, IEEE Trans. Inf. Forens. Secur., vol. 6, no. 3. Pp. 936-945. Sep. 2011.
Citation
Dhruval Kachhiya, Keyur N Upadhayay, Tejaskumar P Bhatt, "Privacy Preserving Image Transmission Using Random Pattern Mosaic Images Steganography - Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.880-883, 2018.
Sentiment Analysis of Tweets using Naïve Bayes Algorithm through R Programming
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.884-889, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.884889
Abstract
The enlargement in development of web 2.0 and web enabled devices smacked huge user generated data hence attracted many researchers in the past years in the field of social media mining. The focal point in mining social media is for obtaining the important decision making opinions, attitudes, sentiments, and emotions. This paper uses naïve bayes algorithm to classify the sentiments and polarity of the tweets of Bengaluru traffic in detail with the help of opinion lexicon through R studio. The tweets on Bengaluru traffic are first accessed from twitter through streaming API, then preprocessed and functions containing naïve bayes classifier is used to classify the tweets into emotions and polarity, through classify emotions and classify polarity functions. Classify emotions functions makes use of naïve bayes algorithm for classifying the emotions into seven categories such as anger, disgust, fear, joy, sadness, surprise, and best fit. Classify polarity function receives two arguments, cleaned tweets and naïve bayes algorithm for classifying the polarity into positive sentiment and negative sentiment. The results are represented through plots in R studio.
Key-Words / Index Term
Sentiment analysis, Naïve bayes, R programming, Data mining and Polarity detection
References
[1] Peerapon Vateekul and Thanabhat Koomsubha, "A study of sentiment analysis using deep learning techniques on Thai Twitter data," in Computer Science and Software Engineering (JCSSE), 2016 13th International Joint Conference on, 2016, pp. 1-6.
[2] Zahra and Jalali, Mehrdad Rezaei, "Sentiment Analysis on Twitter using McDiarmid Tree Algorithm," in 7th International Conference on Computer and Knowledge Engineering (ICCKE 2017), October 26-27 2017, Ferdowsi University of Mashhad, 2017, pp. 33-36.
[3] Monu Kumar and Anju Bala, "Analyzing Twitter sentiments through big data," in Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on, 2016, pp. 2628-2631.
[4] Zhou Jin, Yujiu Yang, Xianyu Bao, and Biqing Huang, "Combining user-based and global lexicon features for sentiment analysis in twitter," in Neural Networks (IJCNN), 2016 International Joint Conference on, 2016, pp. 4525-4532.
[5] Manju Venugopalan and Deepa Gupta, "Exploring sentiment analysis on twitter data," in Contemporary Computing (IC3), 2015 Eighth International Conference on, 2015, pp. 241-247.
[6] Paramita Ray and Amlan Chakrabarti, "Twitter sentiment analysis for product review using lexicon method," in Data Management, Analytics and Innovation (ICDMAI), 2017 International Conference on, 2017, pp. 211-216.
[7] Zhao Jianqiang and Cao Xueliang, "Combining Semantic and Prior Polarity for Boosting Twitter Sentiment Analysis," in Smart City/SocialCom/SustainCom (SmartCity), 2015 IEEE International Conference on, 2015, pp. 832-837.
[8] Umme Aymun Siddiqua, Tanveer Ahsan, and Abu Nowshed Chy, "Combining a rule-based classifier with weakly supervised learning for twitter sentiment analysis," in Innovations in Science, Engineering and Technology (ICISET), International Conference on, 2016, pp. 1-4.
[9] Hima Suresh and others, "An unsupervised fuzzy clustering method for twitter sentiment analysis," in Computation System and Information Technology for Sustainable Solutions (CSITSS), International Conference on, 2016, pp. 80-85.
[10] Aliza Sarlan, Chayanit Nadam, and Shuib Basri, "Twitter sentiment analysis," in Information Technology and Multimedia (ICIMU), 2014 International Conference on, 2014, pp. 212-216.
[11] Suvarna D. Tembhurnikar and Nitin N. Patil, "Topic detection using BNgram method and sentiment analysis on twitter dataset," in Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on, 2015, pp. 1-6.
[12] Rif’at Ahdi Ramadhani, Fatma Indriani, and Dodon T. Nugrahadi, "Comparison of Naive Bayes smoothing methods for Twitter sentiment analysis," Comparison of Naive Bayes Smoothing Methods for Twitter Sentiment Analysis, 2016.
[13] Zhao Jianqiang, "Combing Semantic and Prior Polarity Features for Boosting Twitter Sentiment Analysis Using Ensemble Learning," in Data Science in Cyberspace (DSC), IEEE International Conference on, 2016, pp. 709-714.
[14] Sonia Anastasia and Indra Budi, "Twitter sentiment analysis of online transportation service providers," in Advanced Computer Science and Information Systems (ICACSIS), 2016 International Conference on, 2016, pp. 359-365.
[15] Abhijit Janardan Patankar, Kshama V. Kulhalli, and Kotrappa Sirbi, "Emotweet: Sentiment Analysis tool for twitter," in Advances in Electronics, Communication and Computer Technology (ICAECCT), 2016 IEEE International Conference on, 2016, pp. 157-159.
[16] Fotis Aisopos, Dimitrios Tzannetos, John Violos, and Theodora Varvarigou, "Using n-gram graphs for sentiment analysis: an extended study on Twitter," in Big Data Computing Service and Applications (BigDataService), 2016 IEEE Second International Conference on, 2016, pp. 44-51.
[17] Chintan Dedhia and Jyoti Ramteke, "Ensemble model for Twitter sentiment analysis," in Inventive Systems and Control (ICISC), 2017 International Conference on, 2017, pp. 1-5.
[18] Mohit Mertiya and Ashima Singh, "Combining naive bayes and adjective analysis for sentiment detection on Twitter," in Inventive Computation Technologies (ICICT), International Conference on, vol. 2, 2016, pp. 1-6.
[19] Anurag P. Jain and Vijay D. Katkar, "Sentiments analysis of Twitter data using data mining," in Information Processing (ICIP), 2015 International Conference on, 2015, pp. 807-810.
[20] David Zimbra, Manoochehr Ghiassi, and Sean Lee, "Brand-related Twitter sentiment analysis using feature engineering and the dynamic architecture for artificial neural networks," in System Sciences (HICSS), 2016 49th Hawaii International Conference on, 2016, pp. 1930-1938.
[21] Huma Parveen and Shikha Pandey, "Sentiment analysis on Twitter Data-set using Naive Bayes algorithm," in Applied and Theoretical Computing and Communication Technology (iCATccT), 2016 2nd International Conference on, 2016, pp. 416-419.
[22] Mondher Bouazizi and Tomoaki Ohtsuki, "Opinion mining in Twitter: How to make use of sarcasm to enhance sentiment analysis," in Advances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM International Conference on, 2015, pp. 1594-1597.
[23] M. S. Neethu and R. Rajasree, "Sentiment analysis in twitter using machine learning techniques," in Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on, 2013, pp. 1-5.
[24] Omar Abdelwahab, Mohamed Bahgat, Christopher J. Lowrance, and Adel Elmaghraby, "Effect of training set size on SVM and Naive Bayes for Twitter sentiment analysis," in Signal Processing and Information Technology (ISSPIT), 2015 IEEE International Symposium on, 2015, pp 46-51.
[25] Angelpreethi, P. kiruthika , S. BrittoRameshKumar, “A Methodological Framework for Opinion Mining” in International Journal of Computer Sciences and Engineering, 2018, Vol.6(2)
Citation
Annie Syrien, M. Hanumanthappa, B. Sundaravadivazhagan, "Sentiment Analysis of Tweets using Naïve Bayes Algorithm through R Programming," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.884-889, 2018.
Efficient Image Retrieval approach for Large-scale Chest X Ray data using Hand-Crafted Features and Machine Learning Algorithms
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.890-896, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.890896
Abstract
The rapid growth in digital imaging techniques have resulted in the generation of large volume of diverse medical images. Most of these image corpus is either unlabeled or partially annotated. To ex-tract relevant information from such large-scale image corpus, it is necessary to have an efficient and scalable image retrieval techniques. In this article, we present an effective approach for retrieving images from large-scale Chest X-Ray dataset that have the similar disease conditions or severity as that of the query image. We tested our approach on NIH chest x-ray image dataset, that contains images of pneumonia affected patients. The Histogram of Gradients (HoG) features are found to give better results in classifying the disease. The dimensionality of dense HoG features is reduced by using level decomposition of Haar wavelet and using random projection. The performance degradation happened due to the feature reduction is rectified by using a hybrid approach. The proposed features are compact and capable of conveniently outperforming several existing approaches in image retrieval. To find the nearest match to the query image, the feature space is reduced further by applying k-means clustering. The implementation results are presented to test efficacy of the proposed approach.
Key-Words / Index Term
Medical image retrieval, pneumonia detection, hand-crafted features, classification, Histogram of Gradient, feature reduction, clustering
References
[1] B. Venkataramana, L. Padmasree, M. Srinivasa Rao, G. Ganesan, K. Rama Krishna, “Implementation of Clustering Algorithms for real datasets in Medical Diagnostics using MATLAB”, Journal of Soft Computing and Applications, Vol.2017, Issue.1, pp.53-66, 2017.
[2] N. Zayed, H. A. Elnemr, “Statistical Analysis of Haralick Texture Features to Discriminate Lung Abnormalities”, International Journal of Biomedical Imaging, Hindawi, Volume 2015.
[3] N. R. Ratnasari, A. Susanto, Indah Soesanti, Maesadji, “Thoracic X-ray features extraction using thresholding-based ROI template and PCA-based features selection for lung TB classification purposes”, In the Proceedings of 3rd International Conference on Instrumentation, Communications, Information Technology and Biomedical Engineering (ICICI-BME) Bandung, Indonesia, Nov. 2013.
[4] P. M. Gordaliza, J.J. Vaquero, S. Sharpe, M. Desco, A. M. Barrutia, “Towards an Informational Model for Tuberculosis Leision Discrimination on X-RAY CT Images”, In the Proceedings of 15th International Symposium on Biomedical Imaging (ISBI 2018), Washington, DC, USA, April 2018.
[5] Y. Chan, Y. Zeng, H. Wu M. Wu, H. Sun, “Effective Pneumothorax Detection for Chest X-Ray Images Using Local Binary Pattern and Support Vector Machine”, Journal of Healthcare Engineering, Hindawi, Volume 2018, April 2018.
[6] B. C. Ko, S. H. Kim, J. Y. Nam. “X-ray image classification using random forests with local wavelet-based CS-local binary patterns”, Journal of Digital Imaging, Vol. 24, Issue. 6, pp. 1141-1151, 2011.
[7] K. T. Vo, A. Sowmya, “Diffuse lung disease classification in HRCT lung images using generalized Gaussian density modeling of wavelets coefficients”, In the Proceedings of 16th IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, November 2009.
[8] C. Ray, K. Sasmal, “A New Approach for Clustering of X-ray Images”, International Journal of Computer Science Issues, Vol.7, Issue.4, No.8, July 2010.
[9] C. Reta, I. S. Moreno, J. A. C. Ceballos, “Improving content-based image retrieval for heterogeneous datasets using histogram-based descriptors”, Multimedia Tools and Applications, Springer, Vol. 77, Issue. 7, pp. 8163–8193, April 2018.
[10] M. Muja, D. G. Lowe, “Fast Matching of Binary Features”, In the Proceedings of Ninth Conference on Computer and Robot Vision, CRV `12, pp. 404-410, 2012.
[11] J. Ahmad, K. Muhammad, S.W. J. Baik, “Medical Image Retrieval with Compact Binary Codes Generated in Frequency Domain Using Highly Reactive Convolutional Features”, Journal of Medical Systems, Vol. 42, Issue 24, February 2018.
[12] Z. Li, X. Zhang, H. Müller, S. Zhang, “Large-scale retrieval for Medical Image Analytics: A Comprehensive Review”, Medical Image Analysis, Vol.43 , pp. 66–84, 2018.
[13] W. Weihong , W. Song, “A Scalable Content-based Image Retrieval Scheme using Locality-sensitive Hashing”, International Conference on Computational Intelligence and Natural Computing, Wuhan, China, 2009.
[14] T. Reato, B. Demir L. Bruzzone, “Primitive cluster sensitive hashing for scalable content-based image retrieval in remote sensing archives”, In the proceedings of IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, July 2017.
[15] M. Bruijne, “Machine Learning Approaches in Medical Image Analysis: From Detection to Diagnosis”, Medical Image Analysis, Vol. 33, 94–97, 2016.
[16] Y. D. Cid et al. “Making Sense of Large Data Sets without Annotations: Analyzing Age–related Correlations from Lung CT Scans”, In the Proceedings of Imaging Informatics for Healthcare, Research, and Applications, Medical Imaging, Vol. 10138, Orlando, Florida, United States, March 2017.
[17] I. E. Livieris, A. Kanavos, V. Tampakas, P. Pintelas, “An Ensemble SSL Algorithm for Efficient Chest X-Ray Image Classification”, Journal of Imaging, Vol.4, Issue.7, 2018.
[18] J. G. Dy, C. E. Brodley, A. Kak, L. S. Broderick, A. M. Aisen, “Unsupervised Feature Selection Applied to Content-Based Retrieval of Lung Images”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 25, No. 3, March 2003.
[19] E. M.F. E. Houby, “Medical Images Retrieval using Clustering Technique”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol.3, Issue.5, pp.3134-3141, October 2015.
[20] P. Premalatha, S. Subasree, “Performance Analysis of Clustering Algorithms in Medical Datasets”, In the Proceedings of Second International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2017.
Citation
Irene Getzi S, D. Christopher Durairaj, V Joseph Raj, "Efficient Image Retrieval approach for Large-scale Chest X Ray data using Hand-Crafted Features and Machine Learning Algorithms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.890-896, 2018.
Aspect retrieval in Hindi language feedback using Rule based method
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.897-902, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.897902
Abstract
The era of Web has resulted in generation of vast amount of user-generated content and analysis of all data by the viewer is time consuming process and viewers are interested towards the specific features of an entity, so the aspect based sentiment analysis became more important. Aspect term Extraction is the prime aim for the aspect based sentiment analysis. Aspect based sentiment Analysis have explored the rule based approach to extract the aspect term . By Experimented approach we have achieved average results for aspect term extraction.
Key-Words / Index Term
lexicon,aspect,lemma
References
[1] Mining and summarizing customer reviews; Minqing Hu and Bing Liu; In Proceedings of the ACMSIGKDD International Conference on Knowledge Discovery & Data Mining; 2004 ; pages 168–177, Aug.
[2] Extracting product features and opinions from reviews ; Ana-Maria Popescu and Oren Etzioni; In Proceedings of Conference on Empirical Methods in Natural Language Processing (EMNLP-2005); 2005; pages 3–28.
[3] Opinion Word Expansion and Target Extraction through Double Propagation ; Guang Qiu, Bing Liu, Jiajun Bu, and Chun Chen; Computational linguistics; 2011 ; 37(1):9–27.
[4] Extracting Product Features and Opinion Words Using Pattern Knowledge in Customer Reviews;Su Su Htay and Khin Thidar Lynn; The ScientificWorld Journal Volume 2013, Article ID 394758, 5 pages
[5] A Rule-Based Approach to Aspect Extraction from Product Review; Soujanya Poria, Erik Cambria, Lun-Wei Ku, Chen Gui, Alexander Gelbukh ;ACM ;2014.
[6] An Approach to Perform Aspect level Sentiment Analysis on Customer Reviews using SentiscoreAlgorithm and Priority Based Classification ;Aishwarya Mohan, Manisha.R, Vijayaa.B, Naren.J ; International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4145-4148
[7] Sentiment Analysis of Movie Reviews -A new Feature-based Heuristic for Aspect-level Sentiment Classification;,V.K. Singh, R. Piryani, A. Uddin,P. Waila; Researchgate;2015
[8] Aspect Based Analysis for Rating Prediction of the Restaurant Reviews;Namita Mittal, Basant Agarwal, Shalini Laddha, Manish Sharma;International Journal of Computer System (ISSN: 2394-1065), Volume 02– Issue 03, March, 2015
[9] Aspect based Sentiment Analysis in Hindi: Resource Creation and Evaluation; Md Shad Akhtar, Asif Ekbal and Pushpak Bhattacharyya; LRTC ; 2015
[10] Hindi Dependency Parsing and Treebank Validation ; Bharat Ram Ambati ;LRTC;2005
[11] Solving Data Sparsity for Aspect based Sentiment Analysis using Cross-linguality and Multi-linguality ;Md Shad Akhtar , Palaash Sawant, Sukanta Sen ,Asif Ekbal and Pushpak Bhattacharyya;Proceedings of NAACL-HLT 2018, pages 572–582 New Orleans, Louisiana, June 1 - 6, 2018. c 2018 Association for Computational Linguistics
[12] https://bitbucket.org/sivareddyg/hindi-dependency-parser
Citation
Deepali Mishra Tiwari, "Aspect retrieval in Hindi language feedback using Rule based method," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.897-902, 2018.
Secret sharing scheme Circular Visual Cryptography for Color Images - Survey
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.903-906, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.903906
Abstract
Information Security ensures mathematical techniques and related aspects to provide for confidentiality, data security, entity authentication and data origin authentication. Visual cryptography is a new technique which provides information security using simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information to be encrypted in such a way that their decryption can be performed by the Human Visual System (HVS), without any complex cryptographic algorithms. Circular Random Grids extends the functionality by hiding more data in circular grids to provide confidentiality and secrecy without risking suspicion of an intruder. The proposed scheme complies with the methodology of secret sharing scheme where secret information is divided into various shares in meaningless form and is further recovered on overlapping printed transparencies with the shared information on it. Each of them is then validated for authenticity. An attempt has been made to use circular rings to embed the secret information with certain angular rotation and validation of the individual cipher shared in order to avoid cheating. In this paper we are describe every methods of VCS and presented its comparative study using advantages and disadvantages.
Key-Words / Index Term
Visual cryptography, Random grid, Circular girds, Q’tron neural networks traditional visual cryptography, circular visual cryptography, hierarchical visual cryptography
References
[1] Sandeep Gurung and Mrinaldeep “ChakravortMultiple Information Hiding in General Access Structure Visual Cryptography Using Q’tron Neural Network”. Springer-2018[1]
[2] Abhishek Mishra & Ashutosh Gupta “ Multi secret sharing scheme using iterative Method”. 12 Apr 2018 Elsevier[2]
[3] Bibhas Chandra Das, Md Kutubuddin Saradr, Avishek Adhikari “Efficient Constructions for t-(k; n)-Randon Grid Visual Cryptographic Schemes”. 2017 IEEE[3]
[4] Tzung-Her Chen , Kuang-Che Li “Multi-image encryption by circular random grids”. 2009 Elsevier[4]
[5] Sandeep Gurung, Mrinaldeep Chakravorty, Abhi Agarwal, M K “Multiple Information Hiding using Circular Random Grids”.2015Elsevier[5]
[6] Sandeep Gurung, Bijoy Chhetri, Mrinal Kanti Ghose “A Novel approach for Circular Random Grid with Share Authentication”. 2015 IEEE[6]
[7] S. D. Degadwala and S. Gaur “Metadata of the chapter that will be visualized in SpringerLink”. Springer-2018[7]
[8] Shyong Jian Shyu “ Visual Cryptograms of Random Grids for General Access Structures”. 2012 IEEE[8]
[9] Sandeep Gurung,Gaurav Ojha,M K Ghose “ Multiple Image Encryption using Random Circular Grids and Recursive Image Hiding”. May 2013 IJETAE[9]
[10] Sandeep Gurung, Mrinaldeep Chakravorty, Abhi Agarwal, M K Ghose “Multiple Information Hiding using CircularRandomGrids”.2015Elsevier[10]
Citation
Sudhir Parmar, Sheshang D Degadwala, Nimit Modi, "Secret sharing scheme Circular Visual Cryptography for Color Images - Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.903-906, 2018.
Analysis of Reliability of A Two-Non-Identical Units Cold Standby Repairable System Has Two Types of Failure
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.907-913, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.907913
Abstract
This paper shows the analysis of reliability of a system composed of the two- N.I.U., NO and NS in which NO is operative and NS is kept in standby mode upon failure of operative units NO units NS become operative instantaneously. Unit-1 has two types of failures. Let failure time distribution of type 1 and type 2 are assumed to be exponential with parameters λ1 and λ2 respectively, and the repair time is taken as general. When the second unit is failed it goes for replacement.
Key-Words / Index Term
Reliability, MTSF, Availability, Busy period, Mean Sojourn Time
References
[1]. Agarwal, S.C., Mamta, S. and Shikha, B.; “Reliability characteristic of cold-standbyredundant system”. International Journal of Research and Reviews in Applied Sciences, 3(2), 193-199, (2010).
[2]. El-Damcese, M.A.; “Human error and common-cause failure modelling of a two-unit multiple system”. Journal of Theoretical and Applied Fracture Mechanics, 26, 117-127, (1997).
[3]. Goel, L.R., P. Srivastava and R. Gupta; Two unit cold standby system with correlated failures and repairs. International journal of system science, 23(3), 379-391, (1992).
[4]. Gupta, R. and G. Varshney; A two-identical unit parallel system with geometric failure and repair time distributions. Journal of Cobinatories, Information and System Science; Vol. 32, No.2, pp.127-136, (2007).
[5]. Wei, L., Attahiru, S.A. and Yiqiang, Q.Z.; “Stochastic analysis of a repairable system with three units and two repair facilities”. Journal of Microelectronics Reliability, 38(4), 585-595, (1998).
Citation
Praveen Gupta and Pooja Vinodiya, "Analysis of Reliability of A Two-Non-Identical Units Cold Standby Repairable System Has Two Types of Failure," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.907-913, 2018.
Concept of Prefetching and Caching in Web Usage Mining
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.914-919, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.914919
Abstract
Since the growth of internet is increasing day by day, hence the amount of data that is storing in Web Server is also increasing rapidly. The growth of number of users of internet is also increasing at a rapid rate, this in turn increasing the Web traffic, so we need some type of strategies or mechanism that can handle this rapid growth of Web traffic. Web Prefetching and caching are techniques that can be used to deal with this increased growth of Web Traffic. Web prefetching and caching are processes that prefetch frequent pages which are likely to be requested in near future and caching is used to store these pages in Proxy Cache Server. Here we have proposed some cache replacement policies by which the hit ratio is likely to get increased. We have proposed novel pre fetching and caching scheme to access frequent data items. It helps in improving pattern analysis, and pattern generation process. Proposed techniques will be useful in E-commerce, Web personalization for customer requirement & satisfaction. This will reduce the user overall access time in future.
Key-Words / Index Term
World wide web, Web log, Web mining, Web usage mining, Web Transactions, Caching policies, LRU, LFU, Web Prefetching, Web caching, Hit Ratio
References
[1] H.T. Chen, Pre-fetching and Re-fetching in Web caching systems: Algorithms and Simulation, Master Thesis, TRENT UNIVESITY, Peterborough, Ontario, Canada(2008).
[2] T.Chen, “Obtaining the optimal cache document replacement policy for the caching system of an EC Website”, European Journal of Operational Research.181(2),(2007), pp. 828. Amsterdam.
[3] T. Koskela, J. Heikkonen, ,and K. Kaski, (2003). “Web cache optimization with nonlinear model using object feature”, Computer Networks journal, elsevier , 43(6), ( 2003), pp. 805-817.
[4] J. Cobb, and H. Elaarag, “Web proxy cache replacement scheme based on back-propagation neural network”, Journal of System and Software, 81(9), (2008), pp. 1539-1558.
[5] R. Ayani, Y.M. Teo, and Y.S. Ng, “Cache pollution in Web proxy servers”, International Parallel and Distributed Processing Symposium (IPDPS`03), 22-26 April 2003, pp.7.
[6] A.K.Y. Wong, ” Web Cache Replacement Policies: A Pragmatic Approach”, IEEE Network magazine, 20(1), (2006), pp.28–34.
[7] I. R. Chiang, P. B.Goes, and Z. Zhang, “Periodic cache replacement policy for dynamic content at application server”, Decision Support Systems, Elsevier, 43 (2), (2007), pp. 336- 348.
[8] H.k. Lee, B.S. An, and E.J. Kim, “Adaptive Prefetching Scheme Using Web Log Mining in Cluster-Based Web Systems”, 2009 IEEE International Conference on Web Services (ICWS), (2009), pp.903-910.
[9] L. Jianhui, X. Tianshu, Y. Chao. “Research on WEB Cache Prediction Recommend Mechanism Based on Usage Pattern”, First International Workshop on Knowledge Discovery and Data Mining(WKDD), (2008), pp.473-476.
[10] A. Abhari, S. P. Dandamudi, and S.Majumdar , ”Web Object-Based Storage Management in Proxy Caches”, Future Generation Computer Systems Journal , 22(1-2), (2006). pp. 16-33.
[11] H. Elaarag and S. Romano, “Improvement of the neural network proxy cache replacement strategy”, Proceedings of the 2009 Spring Simulation Multiconference,(SSM’09), San Diego, California, (2009), pp: 90.
[12]. Koskela, J. Heikkonen, ,and K. Kaski, (2003). "Web cache optimization with nonlinear model using object feature", Computer Networks journal, elsevier , 43(6), ( 2003), pp. 805-817
[13] Peter Pirolli, James Pitkow, and Ramana Rao. Silk from a sow`s ear: Extracting usable structures from the web. In CHI-96, Vancouver, 1996.
[14] W. Ali, and S.M. Shamsuddin, “Intelligent Client-side Web Caching Scheme Based on Least recently Used Algorithm and Neuro-Fuzzy System”, The sixth International Symposium on Neural Networks(ISNN 2009), Lecture Notes in Computer Science (LNCS), Springer-Verlag Berlin Heidelberg , 5552, (2009), pp. 70–79.
[15] W. Tian, B. Choi, and V.V. Phoha,“An Adaptive Web Cache Access Predictor Using Neural Network”. Proceedings of the 15th international conference on Industrial and engineering applications of artificial intelligence and expert systems: developments in applied artificial intelligence, Lecture Notes In Computer Science(LNCS), Springer- Verlag London, UK 2358, (2002).450-459.
[16] M.S.Chen, J. Hart, and P.S. Yu. Data mining: An overview from a database perspective. IEEE Transactions on Knowledge and Data Engineering, 8(6):866- 883, 1996.
[17] Rabinovich M, Spatsheck O. Web caching and replication. Addison Wesley; 2002.
[18] T. M. Kroeger, D. D. E. Long, and J. C. Mogul, “Exploring the bounds of web latency reduction from caching and prefetching”, Proceedings of the USENDC Symposium on Internet Technology and Systems, (1997), pp. 13-22.
[19] U. Acharjee, Personalized and Artificial Intelligence Web Caching and Prefetching. Master thesis, University of Ottawa,Canada(2006). A Survey of Web Caching and Prefetching.
[20] Y.f. Huang and J.M. Hsu, “Mining web logs to improve hit ratios of prefetching and caching”. Knowledge-Based Systems, 21(1), (2008), pp. 62- 69.
[21] G. Pallis, A. Vakali, and J.Pokorny, “A clustering-based prefetching scheme on a Web cache environment”, Computers and Electrical Engineering, 34(4), (2008). pp.309-323.
[22] W. Feng, S. Man, and G.Hu, “Markov Tree Prediction on Web Cache Prefetching”, Software Engineering, Artificial Intelligence(SCI), Springer- Verlag Berlin Heidelberg, 209,(2009). pp. 105–120.
[23] Robert Cooley, Bamshad Mobasher, and Jaideep Srivastava. Data preparation for mining world wide web browsing patterns. Knowledge and Information Systems, 1(1), 1999.
[24] Zhang T., Ramakrishnan R., and Livny M., “Birch: AnEfficient Data Clustering Method for Very Large Databases.” In Proceedings of the ACM SIGMODConference on Management of Data, pages 103-114, Montreal, Canada, June 1996.
[25] Schloegel K, Karypis G, Kumar V. Parallel multilevel algorithms for multi-constraint graph partitioning. In: Proceedings of 6th international Euro-Par conference. September 2000. p. 296– 310.
[26] G. Bejerano, “Algorithms for Variable Length Markov Chain Modelling, Bioinformatics, vol. 20, pp. 788-789, Mar. 2004.
[27] J. Borges and M. Levene. “Evaluating Variable Length Markov Chain Models for Analysis of User Web Navigation Sessions”, IEEE Transactions on Knowledge and Data Engineering,19 (4), pp. 441-452, April 2007.
[28] Nanhay Singh, Arvind Panwar and Ram Shringar Raw. Enhancing the performance of Web Proxy Server using Cluster Based Pre-fetching technique. IEEE 2013.
[29] Study of Web Pre-Fetching With Web Caching Based On Machine Learning Technique " (K R Baskaran, Dr. C.Kalarasan, A Sasi Nachimuthu) (2013).
[30] Hybrid Approach for Performance of WebPage Response through Web UsageMining”(Ravinder Singh,Bhumika garg) (2014).
Citation
Pushpraj Singh Chauhan , Sarvottam Dixit, Suresh Jain, "Concept of Prefetching and Caching in Web Usage Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.914-919, 2018.
A Review Approaches for Hiding Sensitive Association Rules in Data Mining
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.920-924, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.920924
Abstract
Nowadays, Data Mining is a popular tool for extracting hidden knowledge from huge amount of data. To find hidden knowledge in the data without revealing sensitive information is one of the major challenges in data mining. There are many strategies have been proposed to hide the sensitive information. Association rule mining is one of the data mining techniques used to extract hidden knowledge from large datasets. This hidden knowledge contains most of the times confidential information that the users want to keep private or do not want to disclose to public. Therefore, privacy preserving data mining (PPDM) techniques are used to preserve such confidential information or restrictive pattern from unauthorized access. In this paper, all the approaches for hiding sensitive association rules in PPDM have been compared theoretically and points out their pros and cons.
Key-Words / Index Term
Data Mining, Association rule mining, privacy preserving data mining (PPDM)
References
[1] Shubhra Rana, Dr. P. anthi Thilagam, “Hierarchical Homomorphic Encryption based Privacy Preserving Distributed Association Rule Mining”. IEEE 13th International Conference on Information Technology, 2014.
[2] Rachit V. Adhvaryu, Nikunj H. Domadiya, “Privacy Preserving in Association Rule Mining On Horizontally Partitioned Database”. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 3, Issue 5, May 2014.
[3] Vaishali Patil, Ramesh Vasappanavara, Tushar Ghorpade, “Securing association rule mining with FP growth algorithm in horizontally partitioned database”. International Conference on Control, Computing, Communication and Materials (ICCCCM), 2016.
[4] Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, and Jun Shao, “Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases”. IEEE, 2016.
[5] Yaoan Jin, Chunhua Su, Na Ruan, and Weijia Jia, “Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree”. Springer International Publishing AG, 2016.
[6] Golnar Assadat Afzali, Shahriar Mohammadi Jia, “Privacy preserving big data mining: association rule hiding using fuzzy logic approach”. The Institution of Engineering and Technology, 2017.
[7] Umesh Kumar Sahu, Anju Singh, “Approaches for Privacy Preserving Data Mining by Various Associations Rule Hiding Algorithms – A Survey”. International Journal of Computer Applications, 2016.
[8] Shabnum Rehman and Anil Sharma, “Privacy Preserving Data Mining Using Association Rule Based on Apriori Algorithm”. Springer Nature Singapore Pte Ltd, 2017.
[9] Narges Jamshidian Ghalehsefidi,, Mohammad Naderi Dehkord, “A Hybrid Algorithm based on Heuristic Method to Preserve Privacy in Association Rule Mining”. Indian Journal of Science and Technology,2016.
[10] D. Menaga, S. Revathi, “Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding”. The Institution of Engineering and Technology, 2018.
[11] Chun-WeiLin, Tzung-PeiHong, Hung-ChuanHsu, “Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining”. Hindawi Publishing Corporation the Scientific World Journal, 2014.
[12] Bettahally N. Keshavamurthy, Asad M. Khan, Durga Toshniwal, “Privacy preserving association rule mining over distributed databases using genetic algorithm”. Neural Comput & Applic, 2013.
[13] Baocang Wang, Yu Zhan, and Zhili Zhang, “Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme”. IEEE, 2017.
[14] P. Amaranatha Reddy, MHM Krishna Prasad, “Challenges to find Association Rules over various types of data items: a Survey”. International Conference on Computing, Communication and Automation(ICCCA), 2017.
[15] Chan Man Kuok, Ada Fu, Man Hon Wong, “Mining Fuzzy Association Rules in Databases”.
[16] Harendra chahar, B N keshavamurthy, chirag modi, “Privacy-preserving distributed mining of association rules using Elliptic-curve cryptosystem and Shamir’s secret sharing scheme”. Indian Academy of Sciences, 2017.
Citation
Janki Patel, Priyanka Shah, "A Review Approaches for Hiding Sensitive Association Rules in Data Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.920-924, 2018.