Credit Card Fraud Detection using Feature Augmentation based Boosted Ensemble (FABE)
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.841-846, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.841846
Abstract
Fraud detection in credit card transactions have become mandatory for the financial services industry due to the huge levels of automations observed in the industry. This work presents a Feature Augmentation based Boosted Ensemble (FABE) for credit card fraud detection on huge data. The proposed model integrates two major components; feature augmentation and ensemble creation. Feature augmentation phase performs feature reduction, feature transformation and feature engineering. Feature reduction aids in effective elimination of unnecessary features, while feature transformation and feature engineering aids in creation of new features that can aid in better predictions. The ensemble creation phase models a boosted ensemble using Decision Trees. Multiple training data bags are created, and multiple base learners are created. The learner with highest weight and lowest error levels is iteratively modelled and used as the final learner. Experiments were performed and comparisons with existing models in literature exhibit the high-performance levels of the proposed FABE model.
Key-Words / Index Term
Credit card fraud detection; Ensemble model; Feature Augmentation; Feature Reduction; Feature Engineering; Boosting
References
[1] J. Fan, F. Han, H. Liu. "Challenges of Big Data Analysis”, National science review, Vol.1, pp.293-314, 2014
[2] R. J.Bolton, D.J. Hand, “Statistical fraud detection: A review”,. Statistical Science, Vol. 17, Issue 3, pp. 235–249, 2002
[3] A. D. Pozzolo, O. Caelen, Y. Le Borgne, S. Waterschoot, G. Bontempi, “Learned lessons in credit card fraud detection from a practitioner perspective”, Expert Systems with Applications, Vol. 41, Issue 10, pp. 4915– 4928, 2014
[4] A. Somasundaram, U.S. Reddy. "Data Imbalance: Effects and Solutions for Classification of Large and Highly Imbalanced Data", Proceedin,gs of ICRECT 16, pp. 28-34, 2016
[5] A. Somasundaram, U.S. Reddy. "Modelling a stable classifier for handling large scale data with noise and imbalance", In Proceedings of International Conference on Computational Intelligence in Data Science (ICCIDS-17), pp. 1-6, 2017.
[6] R. Akbani, S. Kwek, N. Japkowicz, “Applying support vector machines to imbalanced datasets,” Machine Learning: ECML 2004, pp. 39–50, 2004.
[7] N. S. Halvaiee, M. K. Akbari, “A novel model for credit card fraud detection using artificial immune systems”, Appl. Soft Comput. Vol. 24, pp. 40–49, 2014
[8] A.B. Hens, M.K. Tiwari, “Computational time reduction for credit scoring: An integrated approach based on support vector machine and stratified sampling method”, Expert Syst. Appl. Vol. 39, Issue 8, pp. 6774–6781, 2012
[9] A. Somaundaram., U.S. Reddy, "Risk based bagged ensemble (RBE) for credit card fraud detection." In Proceedings of International Conference on Inventive Computing and Informatics (ICICI-17), pp. 670-674, 2017
[10] G. Vaughan, “Efficient big data model selection with applications to fraud detection”, International Journal of Forecasting, 2018
[11] P. Xenopoulos, "Introducing DeepBalance: Random deep belief network ensembles to address class imbalance", arXiv preprint arXiv:1709.10056, 2017
[12] A. G. de Sá, A. C. Pereira, G.L. Pappa, "A customized classification algorithm for credit card fraud detection", Engineering Applications of Artificial Intelligence, Vol. 72, pp. 21-29, 2018
[13] A.Somasundaram, and U.S. Reddy, "Cost Sensitive Risk Induced Bayesian Inference Bagging (RIBIB) for Credit Card Fraud Detection", Journal of Computational Science, 2018
[14] A. Somasundaram, U. S. Reddy, "Parallel and incremental credit card fraud detection model to handle concept drift and data imbalance", Neural Computing and Applications, pp. 1-12, 2018
[15] A. Somasundaram., U.S. Reddy, "Credit Card Fraud Detection Using Non-Overlapped Risk Based Bagging Ensemble (NRBE)" In Proceedings of IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1-4, 2017
[16] W. Fan, Y. A. Huang, H. Wang,P. S. Yu, “Active mining of data streams”, In Proceedings of the 2004 SIAM International Conference on Data Mining, pp. 457–461. SIAM , 2004
[17] F. Carcillo, Y. L. Borgne, O. Caelen,G. Bontempi, "Streaming active learning strategies for real-life credit card fraud detection: assessment and visualization", International Journal of Data Science and Analytics, pp.1-16, 2018.
[18] K. Pichara, A. Soto, A. Araneda, “Detection of anomalies in large datasets using an active learning scheme based on dirichlet distributions”, In Proceedings of Ibero-American Conference on Artificial Intelligence, pp. 163–172, 2008
[19] J. Fan, Y. Feng, J. Jiang, X. Tong, “Feature Augmentation via Nonparametrics and Selection (FANS) in high-dimensional classification”. Journal of the American Statistical Association, Vol. 111, Issue. 513, pp.275-287, 2016
[20] S. T. Roweis, L.K. Saul, “Nonlinear dimensionality reduction by locally linear embedding”, Science, Vol.290, Issue.5500, pp.2323-2326, 2000
[21] J. B. Tenenbaum, V.D. Silva,J.C. Langford, “A global geometric framework for nonlinear dimensionality reduction”, Science, Vol. 290, Issue. 5500, pp.2319-2323, 2000
[22] C. R. Turner, A. Fuggetta, L. Lavazza, A. L. Wolf, “A conceptual basis for feature engineering”, Journal of Systems and Software, Vol. 49, Issue.1, pp.3-15, 1999
[23] L. Lopez, E. Alonso, A. Stefan, “Banksim: A bank payments simulator for fraud detection research”, In proceedings of 26th European Modeling and Simulation Symposium, EMSS 2014, pp. 144–152, France, 2014
[24] V. Jain, "Outlier Detection Based on Clustering Over Sensed Data Using Hadoop", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.2, pp.45-50, 2013
[25] Namrata Ghuse, Pranali Pawar, Amol Potgantwar, "An Improved Approch For Fraud Detection In Health Insurance Using Data Mining Techniques", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.27-33, 2017
Citation
V. Sobanadevi, G. Ravi, "Credit Card Fraud Detection using Feature Augmentation based Boosted Ensemble (FABE)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.841-846, 2018.
SMS Controlled Unmanned Ground Vehicle
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.847-854, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.847854
Abstract
— An unmanned ground vehicle (UGV) is a vehicle that operates on the ground without an onboard human presence. UGVs can be used for many applications where it may be extremely dangerous, impossible, inconvenient, and unreachable by human operators. The UGV is equipped with a set of sensors to monitor the environment, and then it can take an autonomous decision or pass the sensory information to a human operator at a different location who will control the vehicle through wireless or wired communication channel. Study and implementation of various controlling techniques for Unmanned Ground Vehicle are our primary objective. Most of the techniques presently under use are extremely complex and costly as they require high bandwidth communication channel and complex hardware. We have used Short Messaging Service (SMS) to control the UGV, which eliminates the use of high bandwidth channels, costly mobile devices and internet or data connection network. The UGV will be continuously under the supervisory control of an operator till it is under the area covered by the GSM/GPRS mobile network. SMS would be sent through the mobile phone to the UGV housing a GSM module and an Arduino UNO. The SMS will be decoded and a set of signals corresponding to those SMS will be generated and sent to the controlling circuit of the vehicle. Entire experiment was carried out using Arduino UNO, GSM module SIM900A, Motor control driver unit based on L293D, geared DC motors, Aluminium based vehicle chassis, 9V DC batteries and a valid SIM card with enabled SMS facility.
Key-Words / Index Term
SMS, GSM Module SIM 900A, Arduino Uno, Mobile phone, Near far communication (NFC).
References
[1] Raul Ionel, Gabriel Vasiu, Septimiu Mischie, `` GPRS based data acquisition and analysis system with mobile phone control``, Measurement 45 (2012) 1462–1470, Elsevier.
[2] Erdal Bekiroglua, Nihat Daldalb, ``Remote control of an ultrasonic motor by using a GSM mobile phone``, Sensors and Actuators A 120 (2005) 536–542, Elsevier.
[3] Hassan K. Sawalmeh, Haitham E. Bjanthala, Mustafa M. Al-Lahham, Belal H. Sababha,`` A surveillance 3D-Hand-Tracking based Teleoperated UGV``, 2015 6th International Conference on Information and Communication Systems (ICICS), IEEE.
[4] Keirsey D, Mitchell J, Bullock B, Nussmeir T, Tseng D.Y,`` Autonomous Vehicle Control Using Al Techniques``, Vol. SE-11, No. 9, September 1985, IEEE transactions on software Engineering.
[5] Tanmoy Biswas, Debasish Roy, Saptarshi Naskar, ``Cell Phone Operated Land Rover a Novel Approach``, Volume 2,Issue 3, Nov. 2013, ISSN - 2320 - 5121, International Journal of Artificial Intelligence and Mechatronics.
[6] B.A.M. Wakileh, K.F. Gill, `` Robot Control Using Self-Organizing Fuzzy Logic”, 0166-3615/90, 1990 - Elsevier Science Publishers B.V.
[7] Alexander A S Gunawan*, Williama, Boby Hartanto, Aditya Mili, Widodo Budiharto, Afan G Salman, Natalia Chandra, “Development of Affordable and powerful swarm mobile robot based on smartphone android and IOIO board”, Elsevier, Procedia Computer Science, 2nd International Conference on Computer Science and Computational Intelligence 2017.
[8] Ru Nie,``Design and realization of intelligent vehicle based on Android mobile phone Bluetooth control``, Advanced Materials Research Vols 926-930 (2014) pp 2466-2469, Trans Tech Publications, Switzerland.
Citation
Tanmoy Biswas, Arup Kr. Goswami, Manas Pal, Saptarshi Naskar, "SMS Controlled Unmanned Ground Vehicle," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.847-854, 2018.
A Novel Framework for Big Data Analytics in Business Intelligence
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.855-859, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.855859
Abstract
In recent years, due to new technologies databases are growing rapidly. This has resulted in evolution of term “Big Data”. Big Data is nothing but huge data sets that can be processed and analysed to get useful information. Big Data Analytics is the process of inspecting large datasets, extracting information from it. These meaningful information obtained from large data sets can be utilized in business. Big Data Analytics helps business to take innovative, better decisions so as to improve business output. Big Data is large in size, grows very quickly hence impossible for traditional systems to process it. In this paper we review the importance of Big Data, Big Data Analytics and we propose an approach for using uncovered patterns, information of Big Data Analytics in Business Intelligence. Also an attempt is made in listing challenges in Big Data Analytics.
Key-Words / Index Term
Big Data, Business Intelligence, Big data Analytics, Data Clustering, Data Optimization, Classification
References
[1] Sun, Zhaohao & Zou, Huasheng & Strang, Kenneth David. (2015), “Big Data Analytics as a Service for Business Intelligence”, 58. 162-169. 10.1080/08874417.2016.1220239
[2] Jafar Raza Alam, Asma Sajid, Ramzan Talib, Muneeb Niaz, “A Review on the Role of Big Data in Business “, Joint Chiefs of Staff Message Center, Vol. 3, Issue. 4, April 2014, ISSN 2320–088X
[3] Pekka Pääkkönen, Daniel Pakkala, “Reference Architecture and Classification of Technologies, Products and Services for Big Data Systems, Big Data Research”, Volume 2, Issue 4, 2015, Pages 166-186, ISSN 2214-5796
[4] Alexandre Borba, Ana Akemilkeda, “Big Data Usage in the Marketing Information System”, Journal of data analysis and information processing 2014, 2, 77-85
[5] Pingale Murali Manish, Sheetal Kasale, Anit Dani Simon, “Banking & Big Data Analytics”, OSR Journal of Business and Management (IOSR-JBM), e-ISSN: 2278-487X, p-ISSN: 2319-7668 PP 55-58
[6] Hossin Hassani, Xu Huang, Emmanual Silva, “Digitalization and Big Data Mining in Banking”, MDPI, Received: 27 June 2018; Accepted: 17 July 2018; Published: 20 July 2018
[7] Srivastava, Utkarsh & Gopalkrishnan, Santosh, “Impact of Big Data Analytics on Banking Sector: Learning for Indian Banks”, Procedia Computer Science. 50. 643-652. 10.1016/j.procs.2015.04.098
[8] Wani, Mudasir & Jabin, Suraiya , “Big Data: Issues, Challenges and Techniques in Business Intelligence”, Conference: Conference: Proceedings of CSI - 50th Golden Jubilee Annual Convention, Springer (AISC Series), December 2015
[9] Althaf Rahaman.Sk, Sai Rajesh.K, .Girija Rani K, “Challenging tools on Research Issues in Big Data Analytics”, 2018 IJEDR | Volume 6, Issue 1 | ISSN: 2321-9939
[10] Hsinchun Chen, Roger H. L. Chiang, Veda C. Storey, “Business intelligence and analytics: from big data to big impact”, MIS Quarterly Vol. 36 No. 4/December 2012
[11] P. Soumya Sree Laxmi, P. Sree Pranathi, “Impact of Big Data Analytics on Business Intelligence-Scope of Predictive Analytics”, E-ISSN 2277 –4106, P-ISSN 2347 5161, Accepted 22 March 2015, Available online 29 March 2015, Vol.5, No.2 (April 2015)
[12] Siddu P. Algur, Prashant Bhat, “Web Video Mining: Metadata Predictive Analysis using Classification Techniques”, I.J Information Technology and Computer Science 2016 in MECS, DOI:10.5815/ijitcs.2016.02.09
[13] Taylor-Sakyi, Kevin. (2016). “Big Data: Understanding Big Data”, Cornell University Library, arXiv
[14] Hugh J. Watson, “Tutorial: Big Data Analytics: Concepts,Technologies, and Applications”, Communications of the Association for Information System, Volume 34, Article 65
[15] Zakir, Jasmine, (2015), “Big Data Analytics”, Conference: International Association for Computer Information Systems, Volume 16
Citation
Prashant Bhat, Prajna Hegde, Pradnya Malaganve, "A Novel Framework for Big Data Analytics in Business Intelligence," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.855-859, 2018.
Fuzzy Logic: A method to Develop Human like Capabilities for Artificial Intelligence
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.860-865, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.860865
Abstract
Education of forthcoming century is entirely based on technology. This technology enhances the power and style of learning. This leads to either achieve the desired aim or precede in the learning. The technology based education always offers dynamic adaptation to individual student. However the revolution in learning process has changed the entire traditional concept of learning. E-learning provides a personalized educational environment, which may give complexity in learning and decision making process. Researcher had attempted to focus on this complexity and endeavors to find out more appropriate method for its illustration by taking review of various published research articles. This paper throws light on fuzzy inference system and its mechanism by applying fuzzy logic soft computing tool. Researcher has taken care of measure attribute of fuzzy logic for getting minimal and uncertain data. It also revels prediction in e-learning, empowerment of individual and behavioral learner for making it ease and providing cost benefit to ratio.
Key-Words / Index Term
Fuzzy logic, Learning Style, Learning model, visual, verbal, behavioral
References
[1] Birol Ciloglugil, “Adaptivity Based on Felder Silverman Learning Styles Model in E-learning Systems”, 4 th International Symposium on Innovative Technologies in Engineering and Science, 3-5 November 2016.
[2] Konstantina Crysafiadi and Maria Virvou, “Fuzzy Logic for Adaptive Instruction in E-learning Environment for Computer Programming”, IEEE Transaction on Fuzzy Systems”, Vol. 23, No. 1, February 2015.
[3] R.M. Felder and L.K. Silverman, “Learning and Teaching Styles in Engineering Education”, Journal of Engineering Education, Vol. 78, no. 7, pp. 674–681, 1998..
[4] J. Vélez, R. Fabregat, S. Nassiff, J. Petro, and A. Fernandez, “Integrated User Model in Adaptive Virtual Learning Environment”, World Conference on E-Learning in Corporate, Government, Healthcare and Higher Education, Las Vegas, United States, pp. 3275-3284, 2008.
[5] Jegatha Deborah et.al. “Fuzzy logic based learning style prediction in e-learning using web interface information”, , Indian Acadamy of science, sadhana Vol. 40 part 2, pp.379-394, April 2015.
[6] Himanshu Pandya, V. K. Singh, “A fuzzy Logic Based Recommender System for E-learning System with Multi Agent Framework lti Agent Framework”, International Journal of Computer Applications, Vol. 122, No. 17, July 2015.
[7] Ashwai Kharola, Swarnima Kunwar, Gopa B. Choudhary, “Students Performance Evaluation: A fuzzy logic Reasoning Approach”, Journal PM World, Vol. IV, Issue IX – September 2015.
[8] Mukta Goyal, Divekar Yadav, Alka Choubey, “Fuzzy Logic Approach for Adaptive Test Sheet Generation in E-learning”, Jaypee Institute of Information Technology University, Noida, India.
[9] F. Chukwunonso, R. B. Ibrahim, A. B. Selamat, A. Idama, and W. A. Gadzama, “The Impact of the Internet and the World Wide Web on Distance and Collaborative Learning”, In Eighth International MultiConference on Computing in the Global Information Technology, Nice, France, 2013.
[10] G. Woodill, “Where is the Learning in E-learning?”, Educational Psychology Interactive, Valdosta, GA, 2004.
[11] P. Brusilovsky, and P. Miller, ed. Course Delivery Systems for the Virtual University, “Access to Knowledge: New Information Technologies and the Emergence of the Virtual University”, Amsterdam: Elsevier Science, pp. 167- 206, 2001.
[12] A. Alla, “Advances in Intelligent Tutoring Systems: Problem-Solving Modes and Model of Hints”, International Journal of Computers, Communications & Control, Vol. 1, pp. 48-55, 2007.
[13] H. Mohamed, T. Bensebaa, and P. Trigano, “Developing Adaptive Intelligent Tutoring System based on Item Response Theory and Metrics”, International Journal of Advanced Science and Technology, Vol. 43, pp. 1-14, 2012.
[14] P. Brusilovsky, “Developing Adaptive Educational Hypermedia Systems: From Design Models to Authoring Tools”, In Authoring tools for advanced technology Learning Environments, Springer Netherlands, pp. 377-409, 2003.
[15] S. Oxman, and W. Wong, “Adaptive Learning Systems”, [White Paper], DV X Innovations, DeVry Education Group, Integrated Education Solutions, 2014, Available online at: from http://snapwiz.com/wpcontent/uploads/2014/03/DVx_Adaptive_Learning_White_Paper.pdf.
[16] V. Shute, and B. Towle, “Adaptive E-learning”, Educational Psychologist, Vol. 38, no. 2, pp. 105-114, 2003.
[17] H. Pashler, M. McDaniel, D. Rohrer, and R. Bjork, “Learning Styles: Concepts and Evidence”, Psychological Science in the Public Interest, Vol. 9, no. 3, pp. 105-119, 2008.
[18] S. Gholami, and M. S. Bagheri, “Relationship between VAK Learning Styles and Problem Solving Styles regarding Gender and Students` Fields of Study”, Journal of Language Teaching and Research, Vol. 4, no. 4, pp. 700-706, 2013.
[19] Hsieh, T.-C., Wang, T.-I., Su, C.-Y., & Lee, M.-C. “A Fuzzy Logic-based Personalized Learning System for Supporting Adaptive English Learning”, Educational Technology & Society, 15 (1), 273–288, 2012.
[20] Silvia Rita Viola Silvia Rita Viola, “Analysis of Felder-Silverman Index of Learning Styles by a Data-Driven Statistical Approach”, Published in: ISM `06 Proceedings of the Eighth IEEE International Symposium on Multimedia, Pages 959-964, December 11 - 13, 2006 .
[21] ROSS J.T., “Fuzzy Logic with Engineering Application”, (Tata McGraw Hill).
[22] Timothy J.Ross, “Fuzzy logic with engineering application second edition”, University of new Maxico, USA.
Citation
Sangita A. Jaju, Sudhir B Jagtap, "Fuzzy Logic: A method to Develop Human like Capabilities for Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.860-865, 2018.
A Survey on Early Size Estimation Techniques
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.866-874, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.866874
Abstract
Estimations play a very crucial role in the efficient termination of the task in software development life cycle (SDLC). Incorrect estimations hamper the progress of the project. As software estimation plays a critical role to control the project failures rate, estimation in the beginning of the software life cycle turns out to be very important goal for the software engineering community. For the effective development of the software project, early size estimation is considered an important parameter as it is essential for estimating the cost and total development effort. Earlier estimation leads to better project management .The main objective of this article is to explore the present literature with an intention to gain familiarity with the situation to examine the software estimation model and techniques. These estimation model and techniques helps in estimating the software size during the early phase of SDLC and acknowledge the gaps in the literature for future directions.
Key-Words / Index Term
SDLC,UML,Metrics,Early Size estimation
References
[1] A.B.Nassif,”Software size and effort estimation from use case diagrams Using regression and soft computing models”, P.hD Thesis, The School of Graduate and Postdoctoral Studies Western University London, Ontario, Canada, 2012.
[2] O. Demirors, C.Gencel,”Comparison of Size Estimation Techniques Applied Early in the Life Cycle”, Software Process Improvement, Vol.3281, pp. 184-194, 2004.
[3] Kotonya, I.Sommerville,”Requirements Engineering: Processes and Techniques", John Wiley, Chichester; New York, 1998.
[4] S R.Chitamber, D.P.Darcy, C.F.kemerer “Managerial Use of Metrics for Object –Oriented Software: An Exploratory Analysis”, IEEE Transaction on Software Engineering, Vol. 24, pp. 629-639, 1998.
[5] J. J. Dolado, “A Validation of the Component-Based Method for Software Size Estimatio”,IEEE Transaction on Software Engineering, , Vol.26, pp. 1006-1021 ,2000.
[6] M.Sheppered,G.Kadoda,”Cmparing Software Prediction Techniques Using Simulation”,IEEE Transaction on Software Engineering, Vol. 27, pp. 1014-1022,2001.
[7] T. E Hasting, A .S. M Sajeev, “Vector –Based Approach to Software Size Measurement and Effort Estimation”,IEEE Transaction on Software Engineering,Vol 27, pp. 337-350, 2001.
[8] M. Ronchetti, G.Succio, W. Pedrycz, B.Russo, “Early Estimation of Software Size in Object-Oriented Environments A Case Study In a CMM Level 3 Software Firm”, Information Science ,Vol.176, pp.475-489,2001.
[9] P. C.Pendharkar, “Probababilistic Estimation of Software Size and Effort”, Expert System With Application, Vol.37, pp.4435-4440, 2010.
[10] F. G.Wilkie, I. R. McChesney, M.P.Tuxworth,N. G,Leste,”The Value of Software Sizing”, Information and Software technology ,Vol. 53 , pp. 1236-1249, 2011.
[11] Kitchenh, Barbar,Brereton,O. Pearl, Budgen,David, Turner,Mark, Bailey, John., Linkman, Stephen, “Systematic literature reviews in software engineering – A systematic literature review”,Infornation and Software Technology,Vol.51,pp. 7-14,2009.
[12] J.Kaczmarek, M.Kucharski, “Size and Effort Estimation for Application Written in Java”, Information and Software technology, Vol.46, pp. 589-601, 2004.
[13] G .Costagliola, F.Ferrucci, G.Tortora, , G. Vitiello, , “Class Point: An Approach for the Size Estimof Object-Oriented Systems”,IEEE Transaction on Software Engineering,Vol.31, pp. 52-73,2005.
[14] M. Hericko, A. Zivkovic, “The Size and Effort Estimates in Iterative Development”, Information and Software Technology, Vol.50, pp 772–781, 2008.
[15] S.Abrahao, J.Gomez, E. Insfran,”Validating a Size Measure for Effort Estimation in Model-DrivenWeb Development”, Information Sciences,Vol.180, pp. 3932–3954, 2010.
[16] M. Karanam, L. Gottemukkala, "Software Fault Detection Using Improved Relief Detection Method", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.1-4, 2016.
[17] A.B.Nassif, D. Ho, L. F.Capretz, “Towards an Early Software Estimation Using Log –Linear Regression and a Multilayer Perceptron Model”, The Journal of System and Software, Vol.866, pp. 144-160,2013.
[18] M. A. Ahmed, I.Ahmed, J. S Alghmadi,”Probabilistic size proxy for software effort prediction: A framework”, Information and Software technology, Vol.55, pp. 241-251, 2013.
[19] L.Hussain, Kosseim, O. Ormandjieva,”Approximation of COSMIC functional size to support early effort estimation in Agile”, Data& Knowledge Engineering, Vol.85, pp. 2–14, 2013.
[20] S.Jain, , V.Yadav, R.Singh, ,”AnApproach for OO Software Size Estimation Using Predictive Object Point Metric”, Proceedings of the International conference on Computing for Sustainable Global Development, pp. 421-424,2014.
[21] Y.Zhou, Y.Yang, B.Xu, H.Leung, X .Zhou, “Source Code Size Estimation Approach for Object Oriented Systems from UML class Diagrams: A Comparative Study “Information and Software Technology, Vol.56, pp .220-237, 2014.
[22] L. Chen, M.A. Babar, H.Hang,”Towards an evidence-based understanding of electronic data sources”, Proc. 14th Int. Conf. on Evaluation and Assessment in Software Engineering (EASE), UK, 2010.
[23] A.W.Khan, S.U.Khan, “Critical success factors for offshore software outsourcing contract management from vendors”, perspective: an exploratory study using a systematic literature review’, IET Softw., Vol.7,pp. 327–338, 2013.
[24] S.U Khan,et al., “Barriers in the selection of offshore software development outsourcing vendors: an exploratory study using a systematic literature review”,inf. Softw. Technol, Vol.53, pp. 693–706., 2011.
[25] A. Khan, Arif, J.Keung, “Systematic review of success factors and barriers for software process improvement in global software development”, IET Software, pp. 1–11, 2016.
[26] M.Bano, N .Ikram, “Software process improvement: a systematic literature review”, 15th Int. Multitopic Conf. (INMIC,pp. 459–464), 2012.
[27] W.Afzal, R.Torkar, ,R.Feldt, “A systematic review of search-based testing for non-functional system properties”, Inf. Softw. Technol, Vol.51, pp. 957–97, 2009.
[28] A.A Khan, S.Basri,P.D.D. Dominic,et al, “Communication risks and bestpractices in global software development during requirements change management: a systematic literature review protocol”, Res. J. Appl. Sci., Eng.Technol,6, pp. 3514–3519, 2013.
[29] M.Sulayman, , E.Mendes, “A systematic literature review of software process improvement in small and medium web companies, in (Eds.)”,Advances in Software Engineering’ (Springer, Berlin Heidelberg, Germany), vol.59,pp. 1–8., 2009.
[30] E .Mendes, “A systematic review of web engineering research”, Int. Symp. On Empirical Software Engineering, p. 10,2002.
[31] V.D. Bianco, L.Lavazza, , L, G. Morasca, S. Abual.,”Model-based early and rapid estimation of COSMIC functional size – An experimental evaluation,”nformation And Software Technology,Vol.56,No.10, pp. 1253-1267, 2014
[32] Aanchal, S. kumar, "Metrics for Software Components in Object Oriented Environments: A Survey", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.2, pp.25-29, 2013.
[33] K. Lind, R. Heldal,”A Practical Approach to Size Estimation of Embedded Software Components”IEÉE transactions on software engineering, Vol.38, No.5, 2012.
[34] V.Nguyen, ,’Improved Size and Effort Estimation Models for Software Maintenance’,IEEE International Conference on Software Maintenance in Timisoaria, Romania 2010
[35] J. Bielak, Improving Size Estimates Using Historical Data”, IEEE Software,pp. 27-35,2000.
[36] P. G. Kjeldsberg, F.A .Catthoor, “Storage Requirement Estimation for Optimized Design of Data Intensive Applications”, ACM Transactions on Design Automation of Electronic Systems, Vol. 9, No. 2, pp. 133–158,2004.
[37] L.Buglione, C. Ebert,”Estimation Tools and Techniques”, IEEE Software, Vol.28, No.3, pp.92-94, 2011.
[38] Y.S.Seo, D.H .Bae, R.Jeffery, “AREION: Software effort estimation based on multiple regressions with adaptive recursive data partitioning”, Information and Software Technology, Vol.55, No.10, pp.1710-1725,2013.
[39] P. Morrow, F. G. Wilkie, I. R. McChesney,”Function point analysis using NESMA: simplifying the sizing without simplifying the size”,Software Qual J ,Vol.22,pp.611–660 , 2014.
[40] J. C. Juanan, A.Alain, R.S .Pablo , A. Miguel,.,”An experimental study on the conversion between IFPUG and UCP functional size measurement units”,Zhejiang Univ-Sci C (Comput & Electron)Vol.15 No.3, pp.161-173,2014.
[41] P.Judas, L. E. Prokop,” historical compilation of software metrics with applicability to NASA’s Orion spacecraft flight software sizing”,Innovations Syst .Softw. Eng, Vol.7, pp.161–170 ,2011.
[42] G.Robiolo, R.Orosco,”Employing use cases to early estimate effort with simpler metrics”, Innovations Syst. Softw. Eng,Vol.4, pp. 31–43, 2011.
[43] M.Badri, “Source code size prediction using use case metrics: an empirical comparison with use case points” Innovations Syst Softw Eng,13,pp. 143–159, 2017.
[44] D. Binkle, N. Gold, M.Harman, , “An Empirical Study of Static Program Slice Size”,ACMTransactions on Software Engineering andMethodology,Vol.16,No.2, Article 8,2007.
[45] H .Tan, K. Beng. Y.Zhao, H.Zhang,”Conceptual Data Model-Based Software Size Estimation for Information Systems"ACM Transactions on Software Engineering and Methodology,Vol.19,No. 2, Article 4, , 2009.
[46] P. G Kjeldsberg, F.Catthoor, E. Aas, J,”Storage Requirement Estimation for Optimized Design of Data IntensiveApplications”,ACM Transactions on Design Automation of Electronic Systems,Vol. 9, No.2, pp.133–158,2004.
[47] E.S. Papatheocharous, A.S Andreou.”Software Cost Modelling and Estimation Using Artificial Neural Networks Enhanced by Input Sensitivity Analysis”,Journal of Universal Computer Science, Vol.18, No. 14, pp. 2041-2070 , 2012.
[48] M Alférez, R.E.Lopez-Herrejón, A. Moreira, V.Amaral, A.Egyed,”Consistency Checking in Early Software Product Line Specifications - The VCC Approach”,Journal of Universal Computer Science, Vol. 20, No. 5.pp. 640-665,2014.
[49] N.Bouassida, , S.Jamoussi, A. Msaed, H.Ben-Abdallah, , “An Interactive Design Pattern Selection Method”,Journal of Universal Computer Science,Vol.21, No.13 pp. 1746-1766, 2015.
[50] A.B.Nassif, L.F Capretz, D. Ho, “Neural Network Models For Software Development Effort Estimation: A Comparative Study”,Neural Computing And Application,lVol..27,No. 8 ,pp.2369-2380,2016.
Citation
Varinder Kaur Attri , Jatinder Singh, "A Survey on Early Size Estimation Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.866-874, 2018.
A Comparative Study of Supervised Machine Learning Algorithm
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.875-878, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.875878
Abstract
Machine Learning is a process which begins with observations of data to make better decisions of new data in future. Machine Learning algorithms divides as Supervised Machine Learning, Unsupervised Machine Learning, Semi- Supervised Machine Learning and Reinforcement Learning. In this paper, we focus on Supervised Machine Learning Algorithms especially its error rates. A Supervised learning algorithm analyses the training data and produces a classifier (conditional function), which can then be used for mapping test sets. We compare the various Supervised Machine Learning algorithms in terms of its error rates in this paper.
Key-Words / Index Term
Supervised Machine Learning, Classifier, Error Rate
References
[1] Iqbal Muhammad and Zhu Yan, “Supervised Machine Learning Approaches: A Survey”, ICTACT Journal on Soft Computing, Vol. 05, Issue. 03, pp. 946-952, 2015.
[2] Shai Shalev-Shwartz and Shai Ben-David, “Understanding Machine Learning: From Theory to Algorithms”, Cambridge University Press, 2014.
[3] Osisanwo F. Y, Akinsola J.E.T, Awodele O, Hinmikaiye J.O., Olakanmi O., Akinjobi J., “Supervised Machine Learning Algorithms: Classification and Comparison”, International Journal of Computer Trends and Technology, Vol. 48, Issue. 3, pp. 128-138, 2017.
[4] V. Ilango, R. Subramanian, V. Vasudevan, “A Five Step Procedure for Outlier Analysis in Data Mining” European Journal of Scientific Research, Vol. 75, Issue. 3, pp. 327-339, 2012.
[5] Barbara D. Klein & Donald F. Rossin, “Data Quality in Linear Regression Models: Effect of Errors in Test Data and Errors in Training Data on Predictive Accuracy”, Vol. 2, Issue. 2, Informing Science, 1999.
[6] ISSN 1450-216X Vol.75 No.3 (2012), pp. 327-339 © Euro Journals Publishing, Inc. 2012
[7] http://www.europeanjournalofscientificresearch.com European Journal of Scientific Research
[8] ISSN 1450-216X Vol.75 No.3 (2012), pp. 327-339© Euro Journals Publishing, Inc. 2012
[9] http://www.europeanjournalofscientificresearch.com European Journal of Scientific Research
[10]ISSN 1450-216X Vol.75 No.3 (2012), pp. 327-339 © EuroJournals Publishing, Inc. 2012
[11] http://www.europeanjournalofscientificresearch.com European Journal of Scientific Research
[12] Felipe Schneider Costa, Maria Marlene De Souza Pires and Silvia Modesto Nassar, “Analysis Of Bayesian Classifier Accuracy” Journal of Computer Science, Vol. 9 Issue. 11, pp. 1487-1495, 2013.
[13] Hyunjung Shin and Sungzoon Cho, “Neighborhood Property–Based Pattern Selection for Support Vector Machines”, Neural Computation, Volume 19 Issue 3, pp. 816-855, 2007.
[14] DavideAnguita , Alessandro Ghio, Sandro Ridella , and Dario Sterpi, “K–Fold Cross Validation for Error Rate Estimate in Support Vector Machines”, Proceedings of The 2009 International Conference on Data Mining (DMIN), pp. 291-297, 2009.
[15] A. Sheik Abdullah, S. Selvakumar, P. Karthikeyan and M. Venkatesh, “Comparing the Efficacy of Decision Tree and its Variants using Medical Data”, Indian Journal of Science and Technology, Vol. 10 Issue. 18, pp 01-08, 2017.
Citation
D.Sathiya, S. V. Evangelin Sonia, "A Comparative Study of Supervised Machine Learning Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.875-878, 2018.
A Theoretical Feature-wise Study of Malware Detection Techniques
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.879-887, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.879887
Abstract
Malware is the acronym of Malicious Software. It has become a big threat in today’s computing world. The threat is increasing with a greater pace as the use of Internet in our day to day activities is growing extensively. The number of malware creators and websites distributing malware is increasing at an alarming rate which attracts researchers and developers to develop a better security solution for it. Developing an efficient malware detection technique is still an ongoing research. Understanding malware, features of malware, analysis methods and detection techniques are the prerequisites of malware research. In this paper, we have studied a few past research works based on API calls, N-Grams, Opcodes features used in malware detection. A detailed fundamental concept of malware detection is also presented in this paper. Use of Data mining algorithms in malware detection, different types of malware detection and analysis methods along with their pros and cons are also presented here. Aim of this paper is to gain prerequisite knowledge of malware research and concepts of malware detection techniques.
Key-Words / Index Term
Malware detection, API call Sequence, Malware feature, Opcode sequence, n-grams, Data mining
References
[1] Ekta Gandotra, Divya Bansal, Sanjeev Sofat, “Malware Analysis and Classification: A Survey”, Journal of Information Security, April 2014, pp: 56-64
[2] Egele, M., Scholte, T., Kirda, E. and Kruegel, C. , “A Survey on Automated Dynamic Malware-Analysis Techniques and Tools”, Journal in ACM Computing Surveys, 44,2012, Article No. 6.
[3] Kirti Mathur, Saroj Hiranwal, “A Survey on Techniques in Detection and Analyzing Malware Executables”, International Journal of Advanced Research in Computer Science and Software Engineering, April 2013, Volume 3, Issue 4, ISSN: 2277 128X.
[4] Robiah Y, Siti Rahayu S., Mohd Zaki M, Shahrin S., Faizal M. A., Marliza R., “A New Generic Taxonomy on Hybrid Malware Detection Technique, (IJCSIS)International Journal of Computer Science and Information Security”, Vol. 5, No. 1, 2009.
[5] Matthew G. Schultz, Eleazar Eskin, Erez Zadok, and Salvatore J. Stolfo, “Data Mining Methods for Detection of New Malicious Executables”, in Proceedings of the Symposium on Security and Privacy, 2001, pp. 38-49.
[6] Raja Khurram Shahzad, Niklas Lavesson, Henric Johnson, “Accurate Adware Detection using Opcode Sequence extraction”, in Proc. of the 6th International Conference on Availability, Reliability and Security (ARES11),Prague, Czech Republic. IEEE, 2011, pp. 189-195.
[7] S. Hofmeyr, S. Forrest, and A. Somayaji, “Intrusion detection using sequences of system calls.” Journal of Computer Security, , 1998, pp. 151–180.
[8] Yuxin Ding , Xuebing Yuan, Ke Tang, Xiao Xiao, Yibin Zhang,” A fast malware detection algorithm based on objective-oriented association mining”, computers & s e c u rity 3 9, 2013, pp: 3 1 5 -3 2 4, Elsevier.
[9] K. Jeong and H. Lee, “Code graph for malware detection. In Information Networking.” ICOIN. International Conference on,. Jan 2008.
[10] Y. Ye, T. Li, K. Huang, Q. Jiang and Y. Chen, “Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list”. Journal of Intelligent Information Systems, 35(1),2010, pp.1-20.
[11] Wespi, A., Dacier, M., Debar, H.: Intrusion detection using variable- length audit trail patterns. In: Proceedings of the Recent Advances in Intrusion Detection, 2000 , pp. 110–129. Springer, France
[12] Sato, I., Okazaki, Y., Goto, S.: An improved intrusion detection method based on process profiling. IPSJ J. 43,2002, 3316–3326 (2002).
[13] Manzoor, S., Shafiq, M.Z., Tabish, S.M., Farooq, M.: A sense of ‘danger’ for windows processes. In: ICARIS. LNCS, vol. 5666,2009, pp. 220–233. Springer, Heidelberg .
[14] Greensmith, J., Aickelin, U.: The deterministic dendritic cell algorithm. In: Proceedings of the ICARIS. LNCS, vol. 5132,2008, pp. 291– 303. Springer, Heidelberg.
[15] Ahmed, F., Hameed, H., Shafiq, M.Z., Farooq, M.: Using spatio-temporal information in API calls ith machine learning algorithms for malware detection. In: Proceedings of the ACM Conference on Computer and Communications Security, 2009, pp. 55–62.
[16] Seifert, C., Steenson, R., Welch, I., Komisarczuk, P., Endicott-Popovsky, B.: Capture-a behavioral analysis tool for applications and documents. Digit. Investig. 4(Suppl. 1), 2007, S23–S30 .
[17] Madhu K. Shankarapani • Subbu Ramamoorthy , Ram S. Movva • Srinivas Mukkamala, “Malware detection using assembly and API call sequences”, J Comput Virol ,2011, Springer, pp:107–119
[18] Dolly Uppal, Rakhi Sinha, vishakha Mehra and Vinesh Jain, “Exploring Behavioural Aspects of API calls for Malware Identification and Categorization”, 6th int. conf. on computational intelligene and comm. Networks,IEEE,2014,pp:824-828.
[19] Ehab M. Alkhateeb, “Dynamic Malware Detection using API Similarity”, International Conference on Computer and Information Technology ,IEEE, 2017, pp:297-301
[20] D. Bilar, “OpCodes as predictor for malware,” International Journal of Electronic Security and Digital Forensics, vol. 1, no. 2, 2007, pp. 156.
[21] I. Santos, F. Brezo, J. Nieves, and Y. Penya, “Idea: OpCode-sequence based malware detection,”, Engineering Secure Software and System , 2010.
[22] C. Peng, H. Long and F. Ding, “Feature selection based on mutual information: cri-teria of max-dependency, max-relevance, and minredundancy.,” in IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005.
[23] I. Santos, F. Brezo, X. Ugarte-Pedrero, and P. G. Bringas, “OpCode sequences as representation of executables for data-mining-based unknown malware detection,” Information Sciences, Aug. 2011.
[24] I. Santos, C. Laorden, and P. Bringas, “Collective classification for unknown malware detection,” Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011.
[25] I. Santos, F. Brezo, B. Sanz, C. Laorden, and P. G. Bringas, “Using opCode sequences in single-class learning to detect unknown malware,” IET Information Security, vol. 5, no. 4, 2011, p. 220.
[26] I. Santos, B. Sanz, and C. Laorden, “OpCode-sequence-based semi-supervised unknown malware detection,”, Computational Intelligence in Security for Information Systems , 2011.
[27] N. Runwal, R. M. Low, and M. Stamp, “OpCode graph similarity and metamorphic detection,” Journal in Computer Virology, vol. 8, no. 1–2, Apr. 2012, pp. 37–52.
[28] A. Shabtai, R. Moskovitch, C. Feher, S. Dolev, and Y. Elovici, “Detecting unknown malicious code by applying classification techniques on OpCode patterns,” Security Informatics, vol. 1, no. 1, p. 1, 2012.
[29] Cheng Wang et.al. ,” A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm”, 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery ,IEEE,2016,pp:481-487.
[30] Yuxin Ding et. al., Application of Deep Belief Networks for Opcode Based Malware Detection, International Joint Conference on Neural Networks (IJCNN),IEEE,2016,pp:3901-3908.
[31] Jixin Zhang et.al. “IRMD: Malware variant Detection using opcode Image Recognition”, 22nd International Conference on Parallel and Distributed Systems, IEEE, 2016,pp:1175-1180.
[32] Tingting Wang, Ning Xu, “Malware Variants Detection Based on Opcode Image Recognition in Small Training Set”, 2nd International Conference on Cloud Computing and Big Data Analysis,IEEE,2017, pp:328-332.
[33] G. B. S. Gerald, J. Tesauro, Jeffrey O. Kephart, “Neural Network for Computer Virus Recognition.” IEEE Expert, 1996.
[34] W. A. and G. Tesauro, “Automatically Generated Win32 Heuristic Virus Detection,” in Virus Bulletin Conference, 2000.
[35] T. Abou-assaleh, N. Cercone, V. Keselj, and R. Sweidan, “N-gram-based Detection of New Malicious Code,” Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.
[36] M. M. Kolter JZ, “Learning to detect malicious executables in the wild.” in roc of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006.
[37] J. Z. Kolter and M. A. Maloof, “Learning to Detect and Classify Malicious Executables in the Wild,” vol. 7, pp. 2721–2744, 2006.
[38] K.Wang W. Li and, S. Stolfo, , and B. Herzog. “Fileprints: Identifying File Types by n-gram Analysis.” In 6th IEEE Information Assurance Workshop, 2005.
[39] Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharya, and Salvatore J. Stolfo. “MEF: Malicious Email Filter: A UNIX mail Filter That Detects Malicious Windows Executables.” pp. 245–252, 2001.
[40] InSeon Yoo. “Visualizing windows executable viruses using self-organizing maps.” In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pp. 82–89, 2004.
[41] Zhang Fuyong & ZhaoTiezhu, “Malware Detection and Classification Based on ngrams Attribute Similarity”, International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), IEEE, 2017,pp: 793-796.
[42] D. Bruschi, L. Martignoni and M. Monga “Detecting self-mutating malware using control-flow graph matching,” In: Büschkes, R. And Laskov, P. (eds) Detection of Intrusions and Malware & Vulnerability Assessment, volume 4064 of LNCS, pp 129–143. Springer, Berlin. 2006.
[43] Z. Zhao, “A virus detection scheme based on features of Control Flow Graph.” 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pages 943- 947, 2011.
[44] G. Bonfante, M. Kaczmarek, J.Y. Marion. ‘‘Control Flow Graphs as Malware Signatures.’’ WTCV, May, 2007.
[45] Blake Anderson, Daniel Quist, Joshua Neil, Curtis Storlie, Terran Lane “Graph-based malware detection using dynamic analysis” J Comput Virol (2011) 7:247–258, Springer-Verlag France 2011.
[46] Ming Xu, Lingfei Wu, Shuhui Qi , Jian Xu, Haiping Zhang , Yizhi Ren, Ning Zheng , “A Similarity metric method of obfuscated malware using function-call graph”, J Comput Virol Hack Tech (2013) 9,pp :35–47, Springer-Verlag, France, 2013.
[47] Shahid Alam et. al., “Annotated Control Flow Graph for Metamorphic Malware Detection”, Security in Computer Systems and Networks , The Computer Journal, 2014.
[48] Mikhail Zolotukhin and Timo Hamaainen , “Detection of Zero-day Malware Based on the Analysis of Opcode Sequences”, 11th Annual IEEE CCNC - Security, Privacy and Content Protection, 2014,pp:386-391.
[49] Ding Yuxin et. Al., Malicious Code Detection Using Opcode Running Tree Representation, Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing,IEEE,2014,pp:616-621.
[50] Yuxin Ding et. al., Application of Deep Belief Networks for Opcode Based Malware Detection, International Joint Conference on Neural Networks (IJCNN),IEEE,2016,pp:3901-3908.
Citation
Om Prakash Samantray, Satya Narayana Tripathy, Susant Kumar Das, "A Theoretical Feature-wise Study of Malware Detection Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.879-887, 2018.
Big Data Analysis: Enables Internet of Things
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.888-891, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.888891
Abstract
The Big Data and Internet of Things (IoT) are two most emerging techniques in latest years. Data is created constantly & ever increasing rate. Different areas like mobile phones, social media, various medical imaging technologies & more creation of new data. This must be stored somewhere for some purpose. Big data is data whose scale, distribution, diversity, timeliness require the use of new technical architectures & analytics to enable insights that unlock new sources of business value. Internet Of Things is new revolution in abilities of the end point that are connected to the Internet. IoT is about devices, data and connectivity. The real value of Internet of Things is about creating smarter products, delivering intelligent insights and providing new business outcomes .This paper shows factors and relation between Big Data and Internet Of Things. Huge data generated by different IoT devices must be analyzed by different Big Data Analytic tools.
Key-Words / Index Term
Big Data, Internet Of Things, Data Analytics
References
[1]. Internet Of Things A Hands on Approach By Arshdeep Bahga,Vijay Madisetti.
[2].Data Science and Big Data Analytics (Discovering, Analyzing, Visualizing and Presenting Data) EMC Education Services.
[3].K. Ashton, “That ‘internet of things’ thing in the real world, things matter more than ideas,” RFID Journal, June 2009, http://www.rfidjournal..Com/article/print/4986 [Accessed on: 2013-10-25].
[4].Internet of Things (IoT) and its Impact on Big Data
[5].https://www.digitalvidya.com/blog/iot-and-its-impact-on-bigdata
[6].https://www.sciencedirect.com/science/article/
[7].https://www.simplilearn.com/how-big-data-powering-internet-of-things-iot-revolution-article
[8].Towards the Internet of Services, Community Research and Development Information Service, European Commission ,Apr. 2014; http://cordis.europa.eu/fp7/ict/ssai/.
[9].“The Emerging Big Returns on Big Data”, A TCS 2013 Global Trend Study..www.googlebooks.com/Big Data.
[10].http://en.wikipedia.org/wiki/Big_data
Citation
Jadhav Jayshree M., Kulkarni Chandraprabha V. , "Big Data Analysis: Enables Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.888-891, 2018.
The Role Of Mass Media In Creating Awareness On Female Sexual Assault
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.892-895, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.892895
Abstract
The research paper analyses the sexual violence against women in Tamil Nadu. India seemed to display a contradictory picture with on the one hand, a fast growing economy and progressive indicators of development, but on the other hand portrayed as a country with increasing reports on sexual violence against women and problems with gender inequality. The objective of this study was to try to gain a deeper understanding and reflect upon underlying factors of increased reporting of sexual violence in India especially in Tamil Nadu, and to understand in what way the modernization process possibly could be put in relation to the increased reporting of sexual violence, something that was analysed with help from Durkheim’s theory of anomie. The analysis above suggests that, far from contributing to the discussion and understanding on the structural conditions of violence against women and girls, traditional and new media normalise it. By doing so, media promote gender-based violence. This is why media are currently part of the problem rather than the solution to stopping violence against women. The growth of gender-based violence shows its mechanisms are more sophisticated than they were in the past, as are the forms of representing it in media content. There is a large negotiation across the world that offence against women is frequently failed to report. The report says for every twenty minutes, a woman undergoes sexual assault. There is also a belief that the reported crime data against women is twisted. According to Tamil Nadu police, the consciousness in the midst of women has improved that they confront to file complaints.
Key-Words / Index Term
Gender and Violence, sexual harrasment, media portrayal, discrimination, women and gender inequality
References
[1] Beina Xu, Governance in India: Women`s Rights,Updated: June 10, 2013.
[2.] The New Indian Express (New Delhi). 30 November 2012
"Tamil Nadu tops in domestic violence cases". .(Retrieved 25 feb 2014) .
[3] "Tamil Nadu: Rapists Will Be Booked under Modified `Goondas Act`".
[4]Chennai:HindustanTimes.1 January 2013. Retrieved 1 January 2014.
[5] "Tamil Nadu Government makes mandatory CCTVs in public buildings". Press Trust of India (Chennai: NDTV). 8 January 2013. Retrieved 1 January 2014.
[6] The Hindu June 15, 2013,http://www.thehindu.com/opinion/op-ed/on-rape-from-silence-to-justice/article4815055.ece http://www.who.int/violence_injury_prevention/violence/global_campaign/en/chap6.pdf
[7] Sexual harassment against women in India, Author: Varun Kapoor & Kanika Dhingra / OIDA International Journal of Sustainable Development 06: 10 (2013).
[8] "Tamil Nadu tops in domestic violence cases". The New Indian Express (New Delhi). 30 November 2012. Retrieved 25 February 2014.
[9] Sexual harassment against women in India, Author: Varun Kapoor & Kanika Dhingra / OIDA International Journal of Sustainable Development 06: 10 (2013).
[10] "More crime against women in Tamil Nadu".
Deccan Herald (Chennai). 23 April 2013. Retrieved 1 January 2014
Citation
J. Deepa, "The Role Of Mass Media In Creating Awareness On Female Sexual Assault," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.892-895, 2018.
Smart Solid Waste Collection System Based on Internet of Things
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.896-898, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.896898
Abstract
Solid waste makes an ever growing problem at local and as well as universal levels. The disposal of solid waste is polluting all the factors of environment at regional and global levels. The world is facing a great challenge due to increasing urbanization as there is rise in the amount of generated waste and littering due to high demand for food products and other essentials. The main problem is faced in the developing countries than in developed countries was the continuous flow of garbage in all places where public people move around to create the unhygienic conditions. It may invoke several contagious diseases among the nearby people. To avoid such situations and to improve the cleaning, ‘smart waste management system using on IOT’ is proposed. The waste in the dustbins is checked with the help of sensors used in the system, the smallest version, E- nose on a chip containing both the sensors and the processing components then information is sent to the required control room through GSM/GPRS system. RL78/G11 Microcontroller is used to communicate the sensor system with GSM system. An android application is been modeled to monitor the information related to the waste for different selected locations.
Key-Words / Index Term
solid waste collection, RL 78/G11 microcontroller, GSM, Sensor, E nose Sensor
References
[1]. https://www.wired.co.uk/article/internet-of-things-what-is-explained-iot.
[2]. https://whatis.techtarget.com/definition/electronic-nose-e-nose
[3]. https://phys.org/news/2018-05-electronic-nose-variety-scents.html
[4]. https://www.elprocus.com/electronic-nose-work/
[5]. D. Hoornweg, and P. Bhada-Tata, The World Bank: What a Waste- A Global Review of Solid Waste anagement, Urban Development & Local Government Unit, World Bank , 1818 H Street, NW , Washington, DC 20433 USA, 2012.
[6]. M. Faccio, A. Persona, and G. Zanin, “Waste collection multi objective model with real time traceability data,” Waste Management, vol. 31, no. 12, pp. 2391-2405, 2011.
[7]. Y. Huang, B. Baetz, G. Huang, and L. Liu, “Violation analysis for solid waste management systems: an interval fuzzy programming approach,” Journal of Environmental Management, vol. 65, no. 4, pp. 431 – 446, 2002.
Citation
Venkateswarlu pynam, Roje Spandana Rajeti, Manasa Bobbadi, "Smart Solid Waste Collection System Based on Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.896-898, 2018.