Mobile Cache Memory Optimization using Noise Reduction
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.925-931, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.925931
Abstract
Web pages not only contains useful information, but also many features to improve readability and presentation which end up distracting the relevant content as well as occupying more precious memory space. It becomes even more problem while stored in limited mobile cache and prefetch area. While caching and prefetching or when a page is used repeatedly these unnecessary content, called noise such as banner, advertisements, copyright, background images and license information etc. occupy more space, bandwidth while it doesn’t add any value to the user of actual content. Eliminating such noises helps in overall performance improvement of mobile caching, and perfecting. If such noises are not removed, they will become nuisance in web content mining as well. There are many contents which can be identified as noise and there are many techniques to remove them. This paper identifies and removes irrelevant noises in web pages such as background images, search panel, copyright, license information, advertisement. Removing image heavy contents reduces cache memory utilisation, improves performance of content rendering considerably. Care is taken only to remove noises identified and leave the useful contents intact. A brief over view of noise removal and its benefits are discussed in this paper.
Key-Words / Index Term
Noise reduction, web content extraction, caching, pre-fetching
References
[1] Yogita K Patel, Nrendasinh Limbad, “Noise Removal from Web Pages for Web Content Mining”, IJAIIE, Vol. 2, Issue 3, pp 2293 – 2299, 2016.
[2] Dauta, S. Paria and D.K. Kole , “Structural Analysis and Regular Expressions Based Noise Elimination from Web Pages for Web Content Mining”, International conference on advances in computing, communications and informatics”, pp 1445 – 1451, 2014.
[3] L. Yi et al., “Eliminating Noisy Information in Web Pages for Data Mining”, Proceedings of 8th ACM SIGKDD international conference on Knowledge discovery and data mining”, 2003.
[4] L. Yi et al., “Web Page Cleaning for Web Mining Though Feature Weighting”, Proceedings of 18th international joint conference on Artificial Intelligence, 2003.
[5] Julius Onyancha and Valentina Plekhanova, “A User Centric Approach Towards Learning Noise in Web Data”, 12th International conference on Intelligent systems and Knowledge engineering, IEEE, 2017.
[6] Roberto Panerai Velloso and Carina F. Doneles, “Automatic Web Page Segmentation and Noise Removal for Structured Extraction Using Tag Path Sequences”, Journal of information and data management, Vol. 4, No. 3, pp 173 – 187, 2013.
[7] Thanda Htwe and Khin Haymar Saw Hla, “Noise Removing from Web Pages Using Neural Network”, IEEE, Vol. 1, pp 281 – 285, 2010.
[8] H.Xiong, P.N. Tan and V. Kuma, “Mining Strong Affinity Association Patterns in Data Sets with Skewed Support Distribution”, Proceedings in 3rd international conference on data mining, IEEE, pp 387 – 394, 2003.
[9] H. Galhardas, D. Floescu, D. Shasha and E. Simon, “An Extensible Data Cleaning Tool”, Proceedings in ACM SIGMOD International conference on Management of data, 2000. V.J. Hodge and J. Austin, “A Survey of Outlier Detection Methodologies”, Artificial Intelligence Rev., Vol. 22, pp 85-126, 2004.
[10] P.N. Tan, M. Steinbach and V. Kumar, “Introduction to Data Mining”, Addison Wesley, 2005.
[11] Angiulli and C. Pizzuti, “Fast Outlier Detection in High Dimensional Spaces”, Proceedings of 6th European conference on Principles of data mining and knowledge discovery, 2002.
[12] E.M. Knorr, R.T. Ng and V. Tucakov “Distance Based Outliers: Algorithms and Applications”, Very large databases, Vol. 8, pp 237 – 253, 2000.
[13] S.D. Bay and M. Schwabacher, “Mining Distance Based Outliers in Near Linear Time With Randomization and a Simple Pruning Rule”, Proceedings in 9th ACM SIGKDD international conference on Knowledge discovery and data mining”, pp 29-38, 2003.
[14] S. Ramaswamy, R. Rastogi and S. Kyuseok, “Efficient Algorithms for Mining Outliers from Large Data Sets”, Proceedings ACM SIGMOD International conference on management of data, 2000,
[15] Hui Xiong, Gaurav Panddey, Michael Steinbach and Vipin Kumar, “Enhancing Data Analysis with Noise Removal”, Transactions on knowledge and data engineering, IEEE, Vol 18, No 3, pp 304 – 319, 2006.
[16] C. Karypis, “Cluto: Software for Clustering High Dimensional Data Sets”, 2005.
[17] M.M. Breunig, H.P. kriegel, T. Ng and J. Sander, “LOF: Identifying Density Based Local Outliers”, Proceedings of ACM SIGMOD International conference on Management of data, 2000.
[18] P.M. Joshi and S. Liu, “Web Document Text and Images Extraction using DOM Analysis and Natural Language Processing”, Proceedings of 9th ACM symposium on Document engineering, pp 218 – 221, 2009.
[19] Hitesh Kumar Azad, Rahul Raj, Rahul Kumar, Harshit Ranjan, Kumar Abhishek and M.P. Sing, “Removal of Noisy Information in Web Pages”, ICTCS, ACM, 2014.
[20] H.R. Parmar and J. Gadge, “Removal of Image Advertisement from Web Page”, International journal of computer applications, Vol. 27, Issue 7, pp 1-5, 2011.
Citation
P. Amudha Bhomini, Jayasudha J.S, "Mobile Cache Memory Optimization using Noise Reduction," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.925-931, 2018.
A Comprehensive Analysis of Machine Learning Models for Real Time Anomaly Detection in Internet of Things
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.932-937, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.932937
Abstract
Anomaly detection is a major requirement of the current Internet of Things (IoT) and inter-networked communication environment. This work analyzes recent and prominent contributions in the domain of Anomaly detection. The analysis is performed especially in domains related to real time operations and IoT environment. The review is performed and results from most prominent models in literature are considered for analysis. This paper discusses the working mechanisms and the major issues in Anomaly detection such as data imbalance and noise especially in IoT domain and the methods used to handle these issues. Experiments were performed using the NSL-KDD benchmark data set. Precision, False Positive Rate and Accuracy are used to analyze the effectiveness of the models.
Key-Words / Index Term
Multi-Layered Clustering, Ensemble Models, Intrusion Detection, K-Means, SVM
References
[1] N. Mohamudally, M.Mahejabeen Peermamode, “Building an Anomaly Detection Engine (ADE) For IoT Smart Applications“. Procedia computer science, Vol. 134, pp.10-17, 2018
[2] S. Ahmad, L. Alexander, P. Scott, A. Zuha, “Unsupervised real-time anomaly detection for streaming data“, Neurocomputing, Vol. 262, pp.134-147, 2017
[3] Mahdavinejad, S. Mohammad, R. Mohammadreza, B. Mohammadamin, A. Peyman, B. Payam, P. Sheth, “Machine learning for Internet of Things data analysis: A survey“, Digital Communications and Networks, 2017.
[4] Hoque, Mohammad Sazzadul, Md Mukit, Md Bikas, and Abu Naser. "An implementation of intrusion detection system using genetic algorithm." arXiv preprint arXiv:1204.1336, 2012.
[5] Piyush Pareta, Manish Rai, Mohit Gangwar, "An Integrated approach for effective Intrusion Detection with Elasticsearch", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.13-17, 2018
[6] O.Y. Al-Jarrah, P.D. Yoo, S. Muhaidat, G.K. Karagiannidis, K. Taha, “Efficient machine learning for big data: a review“, Big Data Res. big Data, Analytics, and High-Performance Computing, Vol.2, Issue.3, pp.87–93 https://doi.org/10.1016/j.bdr.2015.04.001, 2015
[7] S. Abt, H. Baier, “A plea for utilising synthetic data when performing machine learning based cyber-security experiments“, in: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, ACM, pp.37–45, 2014.
[8] Ramchandar Durgam and R.V.Krishnaiah, "Online Intrusion Alert Aggregation with Generative Data Stream Modeling", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.23-23, 2013
[9] S.M.H. Bamakan , H. Wang , T. Yingjie , Y. Shi , “An effective intrusion detec- tion framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization“, Neurocomputing, Vol.199, pp.90–102, 2016.
[10] S. Akila, and U.S. Reddy. “Data Imbalance: Effects and Solutions for Classification of Large and Highly Imbalanced Data“. Proceedings of ICRECT, Vol.16, pp.28-34, 2016.
[11] J. McHugh , “Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory“, ACM Trans. Inf. Syst. Secur. Vol.3, Issue. 4, pp.262–294, 2000 .
[12] P. Rutravigneshwaran, "A Study of Intrusion Detection System using Efficient Data Mining Techniques", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.5-8, 2017
[13] J.P. Brooks , “Support vector machines with the ramp loss and the hard margin loss“, Operat. Res. Vol.59, Issue.2, pp.467–479, 2011.
[14] A. Somasundaram, and U.S. Reddy. “Modelling a stable classifier for handling large scale data with noise and imbalance“. In Computational Intelligence in Data Science (ICCIDS), IEEE International Conference, pp. 1-6, 2017.
[15] Al-Jarrah, O.Y., Al-Hammdi, Y., Yoo, P.D., Muhaidat, S. and Al-Qutayri, M. “Semi-supervised Multi-Layered Clustering Model for Intrusion Detection“. Digital Communications and Networks. 2017
[16] S.M.H. Bamakan, H. Wang, and Y. Shi. “Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem“. Knowledge-Based Systems, Vol.126, pp.113-126, 2017.
[17] H. Wang, J. Gu, and S. Wang. “An effective intrusion detection framework based on SVM with feature augmentation“. Knowledge-Based Systems, Vol.136, pp.130-139, 2017.
[18] S. Roshan, Y. Miche, A. Akusok, and A. Lendasse. “Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines“. Journal of the Franklin Institute, Vol.355, Issue.4, pp.1752-1779, 2018.
[19] KDD Cup’99 intrusion detection data set, Available on: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, October 2007.
[20] M. Tavallaee, E. Bagheri, W. Lu, and A.A. Ghorbani,. “A detailed analysis of the KDD CUP 99 data set“. In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium, pp. 1-6, July, 2009
Citation
S.L. Sanjith, E George Dharma Prakash Raj, "A Comprehensive Analysis of Machine Learning Models for Real Time Anomaly Detection in Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.932-937, 2018.
Load balancing in cloud using prioritization based on Quality of Services (QoS) demand
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.938-943, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.938943
Abstract
Cloud computing is the emerging technology that delivers the services on demand using the underline internet based software’s. It is used to store a large amount of data and provide the accessibility to that data with minimum response time. Minimum bandwidth is required to assess the stored data from anywhere. In cloud there is a shared repository of resources that the cloud service providers try to utilize efficiently. Cloud vendors lease these services to the cloud customers as per their needs or demands. Customers also pay to the vendors as per their usage of cloud services. It is beneficial for both the service provider and customer as service provider earn money leasing their resources and customers also earn using the resources which otherwise they need to purchase. Cloud computing generally uses the concepts of virtual machines (VM) and their scheduling to feed maximum customers. This paper briefs about how to improve the quality of the services provided to the customer. Here we assign priorities to the customers on the basis of certain factors like number of VMs required, request type based on pricing and association with company etc. On the basis of these factors we assign priorities to the customers and the customers are feed on the basis of this priority. Here we also included the concepts of feeding the users request from the same geographical areas with minimum distance. This will improve the overall performance and throughput of the cloud with maximum customer satisfaction.
Key-Words / Index Term
Cloud Computing, Load balancing, Priority , Laod balancer
References
[1] Khiyaita, A., Zbakh, M., Bakkali, H. El., and Kettani, D.El, 2012, “Load balancing cloud computing: state of art,” In National Days of Network Security and Systems (JNS2), IEEE, pages106–109
[2] Seungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung,” Scheduling Multiple Divisible Loads in a Multi-cloud System”, In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing,USA, 2014, Page(s):371 – 378.
[3] Q. Cao, B. Wei and W. M. Gong, "An optimizd algorithm for task scheduling based on activity based costing in cloud computing," In International Conference on eSciences Modeling and Simulation Design. AK Peters Ltd ,2009, pp. 1-3.
[4] Chaczko Z, Mahadevan V, Aslanzadeh S, Mcdermid C. Availabil-ity and load balancing in cloud computing. In International Confer-ence on Computer and Software Modeling, Singapore 2011 Sep 16 (Vol. 14)
[5] Monika Choudhary, Sateesh Kumar Peddoju “A Dynamic Optimization Algorithm for Task Scheduling in Cloud Environment” IJERA ISSN: 2248-9622 Vol. 2, Issue 3, May-Jun 2012, pp.2564-2568.
[6] S. Singh and K. Kant, "Greedy grid scheduling algorithm in dynamic job submission environment," In International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), 2011, pp. 933-936.
[7] L. Kuan, R. Yahyapour, P. Wieder, C. Kotsokalis, E. Yaqub, A. Jehangiri, "QoS-aware VM placement in multi-domain service level agreements scenarios", Proc. Int. Conf. on Cloud Computing, pp. 661-668, 2013
[8] Mohammadreza Mesbahi,Amir Masoud Rahmani,Anthony Theodore Chronopoulos “Cloud Light Weight : a New solution for Load Balancing in Cloud Computing”,In IEEE International Conference on Data Science & Engineering (ICDSE),Kerla,pp44-50,2014.
[9] Martin Randles, David Lamb, A. Taleb-Bendiab, A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing”,In 10 Proceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops,USA,pp 551-556, 2010.
[10] Hung-Chang Hsiao, Hsueh-Yi Chung, Yu-Chang Chao, “Load Rebalancing for Distributed File Systems in Clouds”, IEEE transactions on parallel and distributed systems, vol. 24, no. 5, pp 951-962, may 2013.
[11] Amandeep, Vandana Yadav, Faz Mohammad, “Different Strategies for Load Balancing in Cloud Computing Environment: a critical Study” , International Journal of Scientific Research Engineering & Technology (IJSRET), Volume 3, Issue 1,pp 52-56 April 2014.
[12] Zhen Xiao, Weijia Song, Qi Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment” , IEEE transactions on parallel and distributed systems, vol. 24, no. 6, pp 1107-1117, june 2013.
[13] Preeti Kushwah “A Survey on Load Balancing Techniques Using ACO Algorithm”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (5),pp 6310-6314 , 2014.
[14] M. Thenmozhi, N. Tamilarasi “Oppurtunistic Routing Through Delay Analytical Methods in Ad-Hoc Wireless Networks”International journal of Computer Science and Engineering, Vol.6 , Issue.11 , pp.246-253, Nov-2018.
Citation
Manmohan Sharma, Vinod Kumar Jain, "Load balancing in cloud using prioritization based on Quality of Services (QoS) demand," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.938-943, 2018.
A Survey on Searching Approaches on Issues in Cloud Based Environment
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.944-947, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.944947
Abstract
Cloud computing is a concept of outsourcing the storage and processing capabilities for storing and managing data and computer programs. With the appearance of cloud computing, it has turned out to be progressively prominent for the owners of data to make available their information to public cloud servers at the time of permitting data users to retrieve this information. For some privacy reasons, a secure search on encrypted cloud information has boosted some of the research works in the single owner model. Normally with information measure capability and restricted battery life, looking on encrypted information imposes serious overhead to computing and communication also as a better power consumption for mobile device users that makes the encrypted search over mobile cloud terribly difficult. The aim of the paper is to conduct a survey on efficient searching techniques on data in cloud environments.
Key-Words / Index Term
Cloud Computing, Cloud Storage, Mobile Cloud Storage (MCS),Cloud Searching, Keyword Search
References
[1] Z. Xia, X. Wang, X. Sun and Q. Wang, "A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data," in IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2,
[2] Z. Fu, X. Sun, Z. Xia, L. Zhou and J. Shu, "Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing,"2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), San Diego, CA, 2013, pp. 1-8.
[3] C. Guo, Q. Song, R. Zhuang and B. Feng, "RSAE: Ranked Keyword Search over Asymmetric Encrypted Cloud Data," Big Data and Cloud Computing (BDCloud), 2015 IEEE Fifth International Conference on, Dalian, 2015, pp. 82-86.
[4] Deepali D. Rane and Dr.V.R.Ghorpade“ Multi-User Multi- Keyword Privacy Preserving Ranked Based Search Over Encrypted Cloud Data” International Conference on Pervasive Computing (ICPC), 2015.
[5] Zhihua Xia, Member, IEEE, Xinhui Wang, Xingming Sun, Senior Member, IEEE, and Qian Wang, Member, IEEE “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO.1,2015.
[6] J.Li,,R.Ma and H.GuanTEES: An Efficient Search Scheme over
Encrypted Data on Mobile Cloud, IEEE.Transaction2015.
[7] https://www.zdnet.com/article/what-is-cloud-computing-everything-you-need-to-know-from-public-and-private-cloud-to-software-as-a/.
[8] https://searchstorage.techtarget.com/definition/cloud-storage.
[9] TraianAndrei ,”Cloud Computing Challenges and Related Security Issues”http://www.cse.wustl.edu/~jain/cse571-09/ftp/cloud/index.html,2009.
[10] https://www.infoworld.com/article/2652198/security/gartner--seven-cloud-computing-security-risks.html.
[11] AnjuChandran, Asso. Prof. P Krishna kumaranThampi,”Survey on Efficient Keyword Search Scheme over Encrypted Data on Mobile Cloud”,International Conference on Emerging Trends in Engineering & Management,2016
[12] https://www.wordstream.com/blog/ws/2011/05/25/keywords-vs-search-queries.
[13] https://www.quora.com/What-is-a-multi-keyword-search-and-a-single-keyword-search-What-is-the-main-difference-between-these-two.
Citation
Priyanka Devi Sahu, Jasmine Minj, "A Survey on Searching Approaches on Issues in Cloud Based Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.944-947, 2018.
Response Time Analysis of Websites Using Jmeter Tool
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.948-952, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.948952
Abstract
Academic institutions use websites for several purposes like examination enrollment, form submission, result declaration and more. However, while accessing those websites applicants encounter several issues like server errors or response timeout failures. Several factors are responsible for such technical issues like heavy traffic, infrastructure limitations etc. The aim of this research paper is to evaluate the response time of different academic websites (both public and private) with the help of jmeter tool. The findings of this research indicate the critical factors behind delayed response time. The paper discusses these results and on their basis, provides certain insights for achieving better response time.
Key-Words / Index Term
Response time, Jmeter tool
References
[1] V. Paxson, “Growth trends in wide-area TCP connections”, Institute of Electrical and Electronics Engineers, Vol.8, Issue.4, pp.8-17, 1994.
[2] D.P. Jayathunga, J.M.D.R. Jayawardana, S.T.C.I. Wimaladharma, H.M.U.M. Herath, “Usability Recommendations for an Academic Website: A Case Study”, International Journal of Scientific and Research Publications, Vol.7, Issue.4, pp.145-152, 2017.
[3] N.J. Lightner, I. Bose, G. Salvendy, “What is wrong with the world-wide web?: a diagnosis of some problems and prescription of some remedies”, Ergonomics, Vol.39, Issue.8, pp.995-1004, 2007.
[4] P. Fageria, M. Kaushik, "Research of Load Testing and Result Based on Loadrunner", International Journal of Civil Engineering, Vol.1, Issue.2348– 8352, pp.1-4, 2014.
[5] S. Bhatti, R. Kumari, "Comparative Study of Load Testing Tools", International Journal of Innovative Research in Computer and Communication Engineering, Vol.3, Issue.3, pp.2334-2338, 2015.
[6] N. Kaur, K. Bahl, "Performance Testing Of Insititute Website Using Jmeter", International Journal of Innovative Science, Engineering &Technology, Vol.3, Issue.4, pp.534-538, 2016.
[7] S. Bhardwaj, A. K. Sharma, “Performance Testing Tools: A Comparative Analysis”, International Journal of Engineering Technology, Management and Applied Sciences, Vol.3, Issue.4, pp.100-104, 2015.
[8] D. Kelkar, K. Kandalgaonkar, "Analysis and Comparison of Performance Testing Tools" International Journal of Advanced Research in Computer Engineering & Technology, Vol.4, Issue.5, pp.1880-1883, 2015.
[9] R., S. Tyagi, “A Comparative study of performance testing tools”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, Issue.5, pp.1300-1307, 2013.
[10] S. Sharmila, E. Ramadevi, “Analysis of performance testing on web application”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.3, Issue.3, pp.5258-5260, 2014.
[11] E. Proko, I. Ninka, “Analyzing and Testing Web Application Performance”, International Journal of Engineering and Science, Vol.3, Issue.10, pp.47-50, 2013.
[12] J., N., P., R., “Comparative Analysis of Web Applications using Jmeter”, International Journal of Advanced Research in Computer Science, Vol.8, Issue.3, pp.774-777, 2017.
[13] S. Kannan, T. Pushparaj, “A Review: Software Security Testing”, International Journal of Computer Science and Engineering, Vol.4, Issue.9, pp.1-8, 2017.
[14] M. Sharma, H.P. Singh, V. Pathak, “Critical Software Testing Using Cloud Computing Tools”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1141-1146, 2018.
[15] P. Singha, A., K. Dubey, J. Palli, "Toolkit for Web Development Based on Web Based Information System", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.1-5, 2018.
[16] A. Ahmad, M. Asif, S. R. Ali, "Review Paper on Shallow Learning and Deep Learning Methods for Network security", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.45-54, 2018.
Citation
Shaily Goyal, Manju Kaushik , "Response Time Analysis of Websites Using Jmeter Tool," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.948-952, 2018.
Automated MRI Brain Tumor Classification and Cancer Detection Using Support Vector Machine
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.953-959, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.953959
Abstract
this research paper proposes an automated and intelligent classification technique of Magnetic Resonance Imaging (MRI) brain images which is extremely important for medical analysis and interpretation. ECG, CT-scan and MRI images are important ways to diagnose brain diseases efficiently. An abnormal growth of cells without any purposes is called a tumor. Sometimes doctors can tell if a tumor is cancer or isn’t using MRI. MRI also used to find the signs that cancer may have spread from its starting part to another part of the body. Radiologist or physician analyze tumor manually by visual inspection which is a conventional method. This may lead to error in classification while a large number of MRIs are to be analyzed. Brain cancer is the leading cause of death among people which is caused from malignant brain tumor. A benign tumor is one that does not invade nearby tissue but a malignant tumor does. The chances of survival can be increased if the tumor can be detected at its early stage. In this paper a novel method to classify brain tumors as benign (non-cancerous) or malignant (cancerous) is presented. MRI brain image database was used for training and testing. Images were filtered, skull-masked and segmented. The proposed method employed wavelet transform to extract features from several images. Principle component analysis (PCA) was applied to reduce dimensionality of features. Gray Level Co-occurrence Matrix (GLCM) based Features were selected and submitted to a kernel support vector machine (KSVM). To generalize KSVM, k-fold stratified cross validation was applied. Features were extracted from MRI images named gray scale, symmetrical and texture features. The main goal of this paper is to offer an excellent result of MRI brain tumor classification and cancer detection using SVM. Our proposed system achieved classification accuracy of 96% for RBF kernel.
Key-Words / Index Term
Brain Tumor, Classification, MRI, K-means clustering, PCA, Wavelet, GLCM, SVM
References
[1] K. B. Vaishnavee and K. Amshakala, “An automated MRI brain image segmentation and tumor detection using SOM-clustering and Proximal Support Vector Machine classifier”, in IEEE International Conference on Engineering and Technology (ICETECH), pp. 1 - 6, 2015.
[2] Ketan Machhale, Hari Babu Nandpuru, Vivek Kapur and Laxmi Kosta, "MRI brain cancer classification using hybrid classifier (SVM-KNN)", in International Conference on Industrial Instrumentation and Control (ICIC), pp. 60-65, 2015.
[3] Hari Babu Nandpuru, S. S. Salankar and V. R. Bora , “MRI brain cancer classification using Support Vector Machine”, in IEEE Students` Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1 - 6, 2014.
[4] Arashdeep Kaur “An Automatic Brain Tumor Extraction System Using Different Segmentation Methods” International Conference on Computational Intelligence & Communication Technology (CICT), pp. 187-191, 2016.
[5] Y. Zhang and L. Wu, “An MR Brain Images Classifier Via Principal Component Analysis and Kernel Support Vector Machine”, in Progress in Electromagnetics Research(PIER) , Vol. 130, pp. 369-388, 2012.
[6] Sheweta Jain, “Brain Cancer Classification Using GLCM Based Feature Extraction in Artificial Neural Network”, IJCSET, ISSN: 2229-3345, Vol. 4 No. 07 Jul 2013.
[7] Ahmed Kharrat, Mohamed Ben Halima and Mounir Ben Ayed, “MRI brain tumor classification using Support Vector Machines and meta-heuristic method”, International Conference on Intelligent Systems Design and Applications (ISDA), pp. 446-451, 2015.
[8] D. Sridhar and IV. Murali Krishna “Brain Tumor Classification using Discrete Cosine Transform and Probabilistic Neural Network” International Conference on Signal Processing Image Processing & Pattern Recognition (ICSIPR), pp. 1-5, 2013.
[9] Jainy Sachdeva, Vinod Kumar, Indra Gupta; Niranjan Khandelwal and Chirag Kamal Ahuja, “Multiclass Brain Tumor Classification Using GA-SVM”, pp. 182-187, 2011.
[10] Walaa Hussein Ibrahim, Ahmed AbdelRhman, Ahmed Osman and Yusra Ibrahim Mohamed “MRI brain image classification using neural networks”, International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), pp. 253-258, 2013.
[11] G. Kharmega Sundararaj and V. Balamurugan, “Robust classification of primary brain tumor in Computer Tomography images using K-NN and linear SVM”, International Conference on Contemporary Computing and Informatics (IC3I), pp. 1315-1319, 2014.
[12] Ahmed Kharrat, KarimGasmi, et.al, “A Hybrid Approach for Automatic Classification of Brain MRI Using Genetic Algorithm and Support Vector Machine”, Leonardo Journal of Sciences. pp. 71-82, 2010.
[13] P. John, “Brain Tumor classification Using Wavelet and Texture Based Neural Network”, International Journal of Scientific & Engineering Research, Vol. 3, Issue 10, pp. 1-7, 2012.
[14] Janki Naik and Prof Sagar Patel, “Tumor Detection and Classification using Decision Tree in Brain MRI”, IJEDR, ISSN: 2321-9939, 2013.
[15] Mr. Ajaj Khan and Ms. Nikhat Ali Syed, “Image Processing Techniques for Automatic Detection of Tumor in Human Brain Using SVM”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCE), Vol. 4, Issue 4, pp. 541-544, 2015.
[16] Asha Patil, Kalyani Patil, Kalpesh Lad, "Leaf Disease detection using Image Processing Techniques", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.33-36, 2018.
[17] Amey Samant, Sushma Kadge, "Classification of a Retinal Disease based on Different Supervised Learning Techniques", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.9-13, 2017
Citation
M. A. Rahman, "Automated MRI Brain Tumor Classification and Cancer Detection Using Support Vector Machine," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.953-959, 2018.
A Study on Performance Analysis of Web Services Using Various Tools
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.960-969, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.960969
Abstract
Testing is an important stage of SDLC that determines the performance and accuracy of the software. Performance testing helps to understand the reliability, scalability, responsiveness, and throughput of software under a given workload owing to its popularity. Web services are increasingly used in web applications and testing them is comparatively difficult with regards to traditional applications in terms of unpredictable load, response time etc. This review paper presents a comparative study of web service testing tools by measuring response time and throughput. Moreover, after thorough examination changes are recommended for web services and testing tools.
Key-Words / Index Term
Web services, LDAP, HTTP, generic TCP connections, JMS and native OS processes, GUI
References
[1]. R. Bhatia, A. Ganpati, “In Depth Analysis of Web Performance Testing Tools”, Engineering Science and Technology: An International Journal, Vol.6, Issue.5, pp.15-19, 2016.
[2]. S. Bhardwaj, A. K. Sharma, “Performance Testing Tools: A Comparative Analysis”, International Journal of Engineering Technology, Management and Applied Sciences, Vol.3, Issue.4, pp.100-105, 2015.
[3]. M. Chen, A. N. K. Chen, B. B. M. Shao, “The implications and impacts of web services to electronic commerce research and practices”, Journal of Electronic Commerce Research, Vol.4, Issue.4, pp.128-139, 2003.
[4]. S. Dhiman, P. Sharma, “Performance Testing: A Comparative Study and Analysis of Web Service Testing Tools”, International Journal of Computer Science and Mobile Computing, Vol.5, Issue.6, pp.507-512, 2016.
[5]. D. Kelkar, K. Kandalgaonkar, “Analysis and Comparison of Performance Testing Tools”, International Journal of Advanced Research in Computer Engineering & Technology, Vol.4, Issue.5, pp.1880-1883, 2015.
[6]. D. A. Menascé, “Response-time analysis of composite Web services”, Institute of Electrical and Electronics Engineers Internet computing, Vol.8, Issue.1, pp.90-92, 2004.
[7]. S. Mumbaikar, P. Padiya, “Web services based on soap and rest principles”, International Journal of Scientific and Research Publications, Vol.3, Issue.5, pp.1-4, 2013.
[8]. N. M, K. Kumar, A. Saha, D. Chahar, “Comparative Study on Performance Testing with Jmeter”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.5, Issue.2, pp.70-76, 2016.
[9]. Rina, S. Tyagi, “A Comparative Study of Performance Testing Tools”, International Journal of Advanced Research in Computer Science and Software Engineering Research, Vol.3, Issue.5, pp.1300-1307, 2013.
[10]. N. Sharma, P. Sharma, H. Singh, “A Comparative Study of Web Service Testing Tool”, International Journal of Engineering Development and Research, Vol.5, Issue.2, pp. 1457-1460, 2017.
[11]. T. Wala, A. K. Sharma, “A Comparative Study of Web Service Testing Tools”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.2, Issue.2, pp.257-261, 2014.
[12] S. Kannan, T. Pushparaj, “A Review: Software Security Testing”, International Journal of Computer Science and Engineering, Vol.4, Issue.9, pp.1-8, 2017.
[13] M. Sharma, H.P. Singh, V. Pathak, “Critical Software Testing Using Cloud Computing Tools”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1141-1146, 2018.
Citation
Shaily Goyal, Manju Kaushik , "A Study on Performance Analysis of Web Services Using Various Tools," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.960-969, 2018.
Impact Assesment of Municipal Solid Waste on Ground Water Quality in and around Kapulauppada Dumpyard in GVMC using Remote Sensing and GIS Techniques
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.970-975, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.970975
Abstract
The improper dumping of the municipal solid waste in the Kapulauppada area of Greater Visakhapatnam Municipal Corporation (GVMC) leads to serious pollution threat to the ground water of the study area. Thus, the present study deals with the physio-chemical parameters of the ground water in the dumping yard of Kapulauppada area which is occupying about 100 acres of the area. The investigation involves the detailed field survey and collection of data and analysis and displaying the results. In the study area, 21 different ground water samples have been collected in and around Kapulauppada. The analysis of the physio-chemical parameters of ground water like pH, total hardness, total alkalinity, chlorides, total dissolved solids, calcium, magnesium, turbidity and electrical conductivity are studied. The results are compared with Bureau of Indian Standards (BIS). Based on the standard calculation methods, the standard parameters such as Water Quality Index (WQI) is calculated for each sample location. The results show that 66.66 % of water is poor for drinking purpose, 23.8% of water is good water and 9.5% of water is excellent for drinking purpose. So improper dumping of municipal solid waste is leading to the pollution of the ground water in the Kapulauppada area.
Key-Words / Index Term
Groundwater, Pollution, Water Quality Index, Remote Sensing, GIS
References
[1] T. B. Reddy, C. V. Ramana, C. Bhaskar, P. J. Chandrababu, “Assessment of heavy metal study on ground water in and around Kapulauppada MSW site, Visakhapatnam, AP.”, International Journal of Science and Nature, Vol.3, pp.468-471, 2012.
[2] T. J. R. Kumar, C. Dushiyanthan, B. Thiruneelakandan, R. Suresh, S. V. Raja, M. Senthilkumar, “Major and trace element characterization of shallow groundwater in coastal alluvium of Chidambaram Town, Cuddalore District, South India.”, Journal of Geoscience and Environment Protection, Vol.4, Issue.01, pp.64, 2015.
[3] S. Mor, K. Ravindra, , R. P. Dahiya, A. Chandra, ”Leachate characterization and assessment of groundwater pollution near municipal solid waste landfill site”, Environmental monitoring and assessment, Vol.118, Issue.1-3, pp. 435-456, 2006.
[4] A. Farooqi, H. Masuda and N. Firdous., “Toxic fluoride and arsenic contaminated groundwater in the Lahore and Kasur districts, Punjab, Pakistan and possible contaminant sources.” Environ. Pollution, Vol.145: pp.839-849, 2007.
[5] S. Devi, P R. Premkumar, “Physicochemical Analysis of Ground water samples near Industrial Area Cuddalore district, Tamil Nadu, India”, International Journal of Chem Tech Research, Vol.4, Issue.1,pp. 29-34, 2012.
[6] K. Hadjibiros , D. Dermatas, C.S. Laspidou,” Municipal solid waste management and landfill site selection in Greece: irrationality versus efficiency”, Journal of Global NEST,Vol. 13, Issue.2, pp. 150-161, 2011.
[7] Prasoon Kumar Singh, BinayPrakash Panigrahy, Ashwani Kumar Tiwari, Bijendra Kumar, PoornimaVerma, “A statistical evaluation for the groundwater quality of Jharia coalfield, India”, International Journal of ChemTech Research, Vol.7, Issue.4, pp 1880-1888. 2014-2015
[8] S. Gupta , G. Dutta , D. Mondal , “Mechanism of Fluoride Mobilization in an Alluvial Aquifer: a Kinetic Approach”, International Journal of ChemTech Research, Vol.9, Issue.4, pp 270-278, 2016.
[9] S. Kalaivani., K. Ramesh, “Groundwater Quality Assessment using WQI In South Coimbatore, Tamil Nadu, India”, International Journal of ChemTech Research, Vol.7, Issue.1, pp .316-322, 2014-2015
[10] N. Rajkumar, T. Subramani, L. Elango, “Groundwater contamination due to municipal solid waste disposal – A GIS based study in erode city”. International Journal of Environmental Sciences, Vol.1, Issue.4, pp. 39-55, 2010.
N. Kumar, D.K. Sinha , “Drinking water quality management through correlation studies among various physic- chemical parameters”. International Journal of Environmental Sciences, Vol.1, Issue.2, pp. 253-259,2010.
[11] M. Sunandana Reddy, L. Harish Kumar, “GIS based Land Information System for Medchal Mandal of R.R. District”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.43-49, 2018.
[12] Suraj Kumar Singh, Vikash Kumar, Shruti Kanga, “Land Use/Land Cover Change Dynamics and River Water Quality Assessment Using Geospatial Technique: a case study of Harmu River, Ranchi (India)”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.17-24, 2017.
Citation
Killana Dileep, G.Jaishankar, P. Jagadeeswara Rao, M. Durgadevi, M.D.R Srinivas, "Impact Assesment of Municipal Solid Waste on Ground Water Quality in and around Kapulauppada Dumpyard in GVMC using Remote Sensing and GIS Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.970-975, 2018.
A Comparative Study On Genre, Format And Changing Trends
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.976-978, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.976978
Abstract
The main aim of the research is to analyze the content of various genres of films released in South India. Also, it aimed to study the elements of commercial cinema and other genres of cinema. In this research, a case study was conducted to identify the impacts of various factors such as star value, characterisation and other elements like story, script, cinematography, music, editing, and visual effects. The South Indian film industry is very well developed in terms of film making methods, genres and visual effects. In this research, this development in films related to genres and different making methods is gathered and compared to study the current trends. The films which are being analyzed in this case study are, and CHANDRA MUKI, THEERAN ADHIGARAM ONDRU and MERKKU THODARCHI MALAI. These film genres are categorised into various formats such as a hybrid of horror and comedy genres, semi non-fictional and realistic fictional film. These films and formats reflect the current cinematic trends, changing mindsets of the south Indian filmgoers and the current society. This case study research tries to compare the current cinematic trends, current filmmaking genres and the latest developments in South Indian cinema industry. From this research, it is observed that many south films have been released during the past ten years with different genres and with different storytelling methods. The star value of the film plays an important role in the success of the film, particularly in the south Indian film industry. At the same time, the filmgoers of south India also accepted the newcomers and directors and new genres.
Key-Words / Index Term
Commercial Films, Genre, Hero value, Hybrid Formats, Fictional, Non-Fictional Formats
References
[1] Barry Keith Grant, “The Film Studies Dictionary", Dum Publications, Edition III, Year 2008
[2.] Emmons, “Film and television: a guide to the reference literature” ,R, ACEL Release, First Edition, Year 2009, ISBN: 1563089149
[3] Denis McQuail “Mass Communication Theory”,Vistaar Publications, 2005
[4] Keval J. Kumar, “Mass Communication in India”,Jaico Publishing, 2000.
[5]Truffaut, FranE ors. "The Films in My L,fe. Trans. Leonard Mayhew", New York: Simon & Schuster, 1918.
[6] McCabe, Colin . Godarcl: "A Portrait of the Artist at Seven", New York: Farrar, Straus & Giroux, 2003..
[7] Sterritt, David "he Filnts of Jeon-Luc Goclard: Seeing the Invisible", Cambridge: Cambridge University Press, 1999.
[8] Bazin, Andr6. "Cinema and Television." Sight and Sound 28,
I Winter -59): 26-30, I 958
[9] Nilsen, Vladimir. The Cinema as a Graphic Art. New York:Hill & Wang, 1959
[10] Clair, Ren6. Cinenta Yesterclay ancl Today. New York: Dover, 1972
[11] Taylor, Richard, and Ian Christie, eds. "The Film Factorv: Russian and Soviet Cinema in Documents, 1939
Citation
B. Senthil Kumar, Ayem Perumal, Col. Manoj Kumar, D. Nivedhitha, "A Comparative Study On Genre, Format And Changing Trends," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.976-978, 2018.
A Review on Various Nearest Neighbor Searching Algorithms Using Graphical Processing Units
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.979-982, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.979982
Abstract
The demand for Graphical Processing Units or GPUs, gained a tremendous hike during the past few years as a result of its migration from processing and representation of mere high dimensional graphical patterns to a heterogeneous high performance computing capability. The future generation data science requirements like Big Data Analysis and Deep Learning increased the popularity of GPUs to a wide extend. Graphical Processing Units or GPUs are well suited for parallel processing which enables visualization of vast amount of real time processed data in a more significant manner than CPU. From processing mere graphical algorithms, GPU has gone through numerous advancements in the past few decades. They can be used to improve the performance and efficiency of any algorithm nowadays. The expenditure of installation and use of GPUs have come down to a great extent from the initial huge amount. Data classification tasks like kNN classification can be done more efficiently and cost effectively by applying parallelism using GPU. kNN algorithms are the most popular data classification algorithm, because of its simplicity, high accuracy and versatility. This paper studies four major kNN algorithms developed for GPU processing and compares the techniques and methodologies used in them.
Key-Words / Index Term
GPU, BF CUDA, CUBLAS, CUKNN
References
[1] Han, Jiawei, Jian Pei, and Micheline Kamber. “Data mining: concepts and techniques”. Elsevier, 2011.
[2] Yigit, Halil. "A weighting approach for KNN classifier". Electronics, Computer and Computation (ICECCO), International Conference on. IEEE, 2013.
[3] Zhang, Shichao, et al. "Efficient knn classification with different numbers of nearest neighbors". IEEE transactions on neural networks and learning systems 29.5, 2018.
[4] Ma, Hongxing, Jianping Gou, Xili Wang, Jia Ke, and Shaoning Zeng. "Sparse Coefficient-Based k-Nearest Neighbor Classification." IEEE Access 5: 16618-16634, 2017.
[5] Buck, Ian. "Gpu computing: Programming a massively parallel processor." International Symposium on IEEE, 2007.
[6] NVIDIA CUDA C Programming Guide Version 4.2, 2012.
[7] Zhang, Min-Ling, and Zhi-Hua Zhou. "ML-KNN: A lazy learning approach to multi-label learning." Pattern recognition , 2007.
[8] Bauce, M., et al. "The GAP project-GPU for real-time applications in high energy physics and medical imaging." 19th IEEE-NPSS Real Time Conference. IEEE, 2014.
[9] McClanahan, Chris. "History and evolution of gpu architecture." A Survey Paper, 2010.
[10] Kim, Youngsok, Jaewon Lee, Donggyu Kim, and Jangwoo Kim. "ScaleGPU: GPU architecture for memory-unaware GPU programming." IEEE Computer Architecture Letters, 2014.
[11] Delgado, Jaime, Gabriel Martín, Javier Plaza, Luis-Ignacio Jiménez, and Antonio Plaza. "On the optimization of memory access to increase the performance of spatial preprocessing techniques on graphics processing units." IEEE International Geoscience and Remote Sensing Symposium, 2016.
[12] Garcia, Vincent, Eric Debreuve, and Michel Barlaud. "Fast k nearest neighbor search using GPU." at arXiv preprint arXiv:0804.1448 , 2008.
[13] Kuang, Quansheng, and Lei Zhao. "A practical GPU based kNN algorithm." Proceedings. The International Symposium on Computer Science and Computational Technology (ISCSCI 2009). Academy Publisher, 2009.
[14] Garcia, Vincent, et al. "K-nearest neighbor search: Fast GPU-based implementations and application to high-dimensional feature matching." Image Processing (ICIP), 17th IEEE International Conference, 2010.
[15] Liang, Shenshen, et al. "Design and evaluation of a parallel k-nearest neighbor algorithm on CUDA-enabled GPU." Web Society (SWS), IEEE 2nd Symposium, 2010.
Citation
Sneha Jacob, Anuj Mohamed, "A Review on Various Nearest Neighbor Searching Algorithms Using Graphical Processing Units," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.979-982, 2018.