A Survey of QoS based on Real time and Reliable Routing Protocols for Wireless Sensor Networks
Survey Paper | Journal Paper
Vol.6 , Issue.6 , pp.1144-1148, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11441148
Abstract
Contemporary development in wireless sensor networks has haltered the expeditious advances in real-time applications. Numerous routing protocols were proposed for these applications however design issue is real-time guarantee. In this paper, the futuristic in WSN routing protocols is surveyed whilst emphasizing on merits and performance issues. The paper provides a classification of real-time routing protocols and highlights another major issue in this direction, i.e. reliability along with other research issues.
Key-Words / Index Term
Wireless Sensor Networks, Reliable transport protocols, Real Time Routing
References
[1] AKYILDIZ I, SU W and SANKARASUBRAMANIAM Y et al., “Wireless sensor networks: a survey,” Computer Networks [J], Vol. 38, pp. 393-422, March 2002.
[2] AKKAYA K and YOUNIS M, “A Survey on Routing Protocols for Wireless Sensor Networks,” Ad Hoc Network (Elsevier) [J], 3(3), pp.325-349, 2005.
[3] HE T, STANKOVIC J and LU C et al., “SPEED: A stateless protocol for real-time communication in sensor networks,” in the Proceedings of International Conference on Distributed Computing Systems [C], Providence, RI, May 2003.
[4] AL-KARAKI J and KAMAL A, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE Wireless Communication [J], 11(6), pp.6-28, 2004.
[5] LU C, BLUM B and ABDELZAHER T et al., “RAP: A Real-time Communication Architecture for Large-Scale Wireless Sensor Networks,” in the Proceedings of the Eighth IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS’ 02) [C], 2002.
[6] FELEMBAN E, LEE C and EKICI E, “MMSPEED: Multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks,” IEEE Transactions on Mobile Computing [J], 5(6), pp. 738-754, 2006.
[7] LI Y, CHEN C and SONG Y et al., “Real-time QoS support in wireless sensor networks: a survey,” in the Proceedings of 7th IFAC Int Conf on Fieldbuses & Networks in Industrial & Embedded Systems (FeT’07) [C], Toulouse, France, Nov 2007.
[8] MISRA S, REISSLEIN M and XUE G, “A survey of multimedia streaming in Wireless Sensor Networks,” IEEE Communications Surveys & Tutorials, pp. 18-39, Volume: 10, Issue: 4, 2008 .
[9] AKKAYA K and YOUNIS M, “Energy and QoS aware routing in wireless sensor networks,”Cluster Computing [J], 8(2-3), 2005, 179-188.
[10] JOHNSON D and MALTZ D, “Dynamic Source Routing in Ad Hoc Wireless Networks,” in Mobile Computing [M], edited by Tomas Imielinski and Hank Korth, Kluwer Academic Publisher, ISBN: 0792396979, 1996, Chapter 5, pages 153-181.
[11] PERKINS C and ROYER E, “Ad Hoc On-Demand Distance Vector (AODV) Routing,” in the Proceedings of IEEE WMCSA’99 [C], Feb. 1999.
[12] KARP B and KUNG H, “Greedy Perimeter Stateless Routing for Wireless Networks,” in the Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom 2000) [C], Boston, MA, August 2000, pp. 243-254.
[13] CHIPARA O, HE Z and XING G et al., “Real-time Power-Aware Routing in Sensor Networks,” in the Proceedings of the 14th IEEE International Workshop on Quality of Service (IWQoS 2006) [C], New Haven, CT, June 2006.
[14] Koulali, M. et al., “QDGRP: A Hybrid QoS Distributed Genetic Routing Protocol for Wireless Sensor Networks,” pp. 47–52, May 2012.
[15] STANKOVIC J, ABDELZAHER T and LU C et al., “Real-time communication and coordination in embedded sensor networks,” in the proceedings of IEEE 91(7) [C], 1002-1022.
[16] ZHAO W, STANKOVIC J and RAMAMRITHAM K, “A Window Protocol for Transmission of Time-Constrained Messages,” IEEE Transactions on Computers [J], 39(9), p.1186-1203, September 1990.
[17] AKKAYA K and YOUNIS M, “An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks,” in the Proceedings of the IEEE Workshop on Mobile and Wireless Networks (MWN2003) [C], Providence, Rhode Island, May 2003.
[18] YOUNIS M, YOUSSEF M and ARISHA K, “Energy-Aware Routing in Cluster-Based Sensor Networks,” in the Proceedings of the 10th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002) [C], Fort Worth, TX, October 2002.
[19] ZUBERI K and SHIN K, “Design and Implementation of Efficient Message Scheduling for Controller Area Network,” IEEE Transactions on Computers [J], 49(2), February 2000.
[20] KANDLUR D, SHIN K and FERRARI D, “Real-time Communication in Multi-hop Networks,” IEEE Transactions on Parallel and Distributed Systems [J], pp.1044-1056, October 1994.
[21] ZHAO L, KAN B and XU Y et al., “A Fault-Tolerant, Real-Time Routing Protocol for Wireless Sensor Networks,” Wireless Communications, Networking and Mobile Computing 2007 (WiCom 2007) [C], Sept. 21-25, 2007, p.2531-2534.
[22] KWEON S and SHIN K, “Providing Deterministic Delay Guarantees in ATM Networks,”IEEE/ACM Transactions on Networking [J], 6(6), December 1998.
[23] LI C, BETTATI R and ZHAO W, “Static Priority Scheduling for ATM Networks,” in the Proceedings of IEEE Real-time Systems Symposium [C], December 1997.
[24] LIEBEHERR J, WREGE D and FERRARI D, “Exact Admission Control in Networks with Bounded Delay Services,” IEEE/ACM Transactions on Networking [J], 1996.
[25] WANG S, XUAN D and BETTATI R et al., “Providing Absolute Differentiated Services for Real-time Applications in Static-Priority Scheduling Networks”, IEEE INFOCOM 2001 [C]
[26] STOICA I and ZHANG H, “Providing Guaranteed Services Without Per Flow Management,”SIGCOMM [C], 1999.
[27] ARAS C, KUROSE J, REEVES D et al., “Real-Time Communication in Packet-Switched Networks,” in the Proceedings of the IEEE [C], Vol. 82 No. 1, Jan. 1994, pp.122-139.
[28] TILAK S, ABU-GHAZALEH N and HEINZELMAN W, “A Taxonomy of Wireless Microsensor Network Models,” in ACM Mobile Computing and Communications Review (MC2R) [C], June 2002.
[29] CHEN M, LEUNG V and MAO S et al., “Directional geographical routing for real-time video communications in wireless sensor networks”, Computer Communication [J], 30 (2007), p.3368-3383, 2007.
[30] POTHURI P, SARANGAN V and THOMAS J, “Delay-constrained, energy-efficient routing in wireless sensor networks through topology control,” in the Proceedings of 2nd IEEE International Conference On Networking [C], Sensing and Control, April 2006.
[31] EGEN S and VARAIYA P, “Energy efficient routing with delay guarantee for sensor networks,” Wireless Networks [J], Springer, Netherlands, p.679-690, June 16, 2006.
[32] KAMAI T, WAKAMIYA N and MURATA M, “Proposal of an Assured Corridor Mechanism for Urgent Information Transmission in Wireless Sensor Networks,” IEICE TRANS. COMMUN. [J], Vol.E90-B, No.10, October 2007.
[33] YOUNIS M, AKKAYA K, ELTOWEISSY M and WADAA A, “On Handling QoS Traffic in Wireless Sensor Networks,” in the Proceedings of the 37th Hawaii International Conference on System Sciences [C], 2004.
[34] YUAN L, CHENG W and DU X, “An energy-efficient real-time routing protocol for sensor networks,” Computer Communications [J] ,30 (2007), p.2274-2283, 2007.
[35] KHALD Z, AHMED G and KHAN N, “A Real-time Energy-aware Routing Strategy for Wireless Sensor Networks,” in the Proceedings of Asia-Pacific Conference on Communications [C], p.381-384, 2007.
[36] Kemal Akkaya, Mohamed Younis, “An Energy aware QoS Routing Protocol for wireless sensor Networks”.
[37] Sayyed Majid Mazinani ., “A Tree-Based Reliable Routing Protocol in Wireless Sensor Networks,” IEEE (IS3C), pp. 491-494, June 2012.
[38] Ali Naderi, Sayyed Majid Mazinani, Amin Zadeh Shirazi, and Mahya Faghihnia, “Adaptive Majority Based Re-Routing For Differentiated Reliability In Wireless Sensor Networks,” July 2012.
[39] Koulali, M. et al., “QDGRP: A Hybrid QoS Distributed Genetic Routing Protocol for Wireless Sensor Networks,” pp. 47–52, May 2012.
Citation
Anuj Kumar Jain, Sandip Goel, Devendra Prasad, "A Survey of QoS based on Real time and Reliable Routing Protocols for Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1144-1148, 2018.
A Review on Different Methods to Prevent Black Hole Attack in MANET
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1149-1156, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11491156
Abstract
Mobile ad hoc networks (MANET) are dynamic, decentralized and infrastructure less network, where at any given point of time nodes can join or leave the network. Due to the property of flexibility and simplicity MANET are widely used in military communication, mobile conferencing and emergency communication. As Ad-hoc networks are autonomous mobile nodes, they form a temporary based network which has no fixed infrastructure. Every node in the network is autonomous hence they act as host as well as router. Due to this nature of MANET, where any node can join or leave the network without any permission, security is the main challenge in such networks. One of the major security issues in MANET is Black hole attack. It occurs when a malicious node referred as black hole joins the network. during the process of discovering route this node acts as if it has route to the destination and takes all the packets into it and does not forward to the desired destination, Instead it drops all the packets. In this paper, we have surveyed on few of the techniques and methodologies for detecting and preventing black hole attack in MANET using AODV routing protocol.
Key-Words / Index Term
MANET, AODV Routing Protocol, Ad hoc network, Black hole
References
[1] K. Madhuri, N. K. Viswanath and P.U. Gayatri “Performance Evaluation of AODV under Black
Hole Attack in MANET using NS2”, IEEE International Conference On ICT and Business Industry &
Government (ICTBIG), pp. 1-3, Nov. 2016.
[2] S.R. Deshmukh, P.N. Chatur and N.B. Bhople “AODV-Based Secure Routing Against Black-hole Attack in MANET”, IEEE International Conference On Recent Trends in Electronics, Information & Technology, pp. 1960-1964, ISSN:978-1-5090-0774, May 2016.
[3] G. Bendale and S. shrivastava “An Improved Black-hole Attack Detection and Prevention Method for Wireless Ad-hoc Network”, IEEE International Conference on ICT in Business & Government, pp. 1-7, ISSN: 978-1-5090-5515, Apr. 2016.
[4] A. Siddiqua, K. Sridev and A. A. Khan Mohammad “Preventing Black-hole Attacks in MANET Using Secure Knowledge Algorithm” IEEE International Conference On Signal Processing and Communication Engineering System, Jan2015, pp. 421-425.
[5] C. B. Dutta and U. Biswas “An Energy Aware Black-hole Attack for Multipath AODV ”, IEEE International Conference On Business and Information Management, pp. 142-147, ISSN: 978-1-4799-3264-1, Jan. 2014.
[6] V. Gaikwad(Mohite) and L. Ragha “Security Agents for Detecting and Avoiding Cooperative Black-hole Attacks in MANET”, IEEE International Conference On Applied and Theoretical Computing & Communication Technology, pp. 306-311, ISSN: 978-1-14673-9223, Apr. 2015
[7] S. Jain and Dr. A. Khuteta “Detecting and Overcoming Black-hole Attack in Mobile Ad-hoc Network”, IEEE International Conference On Green Computing and Internet of Things, pp. 225-229, ISSN: 978-1-4673-7910, Jan. 2015.
[8] L. Mejaele and E. O. Ochola “Effect of Varying Node Mobility in the Analysis of Black Hole Attack on MANET Reactive Routing Protocol”, IEEE Information Security for South Africa(ISSA), pp. 62-68, ISSN: 978- 1-5090-2473, Aug. 2016.
[9] H. Kaur and A. singh “Identification and Mitigation of Black Hole Attack in wireless Sensor Networks”,IEEE International Conference On Micro-Electronics and Telecommunication Engineering, pp. 616-619, Sept. 2016.
[10 ]Balachandra and N. p. Shetty “ Interception of Black-Hole Attacks in Mobile AD-HOC Network”
IEEE International Conference On Inventive Computation Technology(ICICT), pp. 1-5, volume-3, Aug. 2016.
[11] B. Singh, D. Srikanth and C.R. Suthikshn kumar, “mitigating effects of Black hole Attack in Mobile Ad- hoc Networks: Military Perspective”, IEEE International Conference On Engineering and Technology, pp. 810-814, ISSN: 978-1-4673-9916, March 2016.
[12] A. Dorri and H. Nikdel “A New Approach for Detecting and Eliminating Cooperative Black hole node in MANET”, IEEE Conference On Information and Knowledge Technology, pp. 1-6, ISSN: 978-1-4673-7485-9, May 2015.
[13] H. Moudni, M. M. Mouncif and B. El Hadadi “Modified AODV Routing Protocol to Improve Security and performance against Black Hole Attack”, IEEE International Conference On Information Technology for Organizations Development, pp. 1-7, ISSN: 978-1-4673-7689, Apr. 2016.
[14] F. Thachil and K. C. Shet “A Trust Based Approach for AODV protocol to Mitigate Black-hole attack in MANET”, IEEE International Conference in Computing Science, pp. 281-285, Sept.2012.
[15] R. Yerneni and A. K. Sarje “Secure AODV Protocol to mitigate Black Hole Attack in Mobile Ad-hoc Networks”, IEEE International Conference on Computing Communication and Networking Technologies(ICCCNT), pp. 1-5, July 2012
Citation
Pranjul Sarathe, Neeraj Shrivastava, "A Review on Different Methods to Prevent Black Hole Attack in MANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1149-1156, 2018.
Investigating into the Emerging Research Areas of Social Network Analysis
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1157-1161, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11571161
Abstract
Social Network Analysis is one of the extensively analysed and researched areas in the current era. Due to the advancements in technology and hence the incremented count of Internet users, this field has gained remarkable attention in the past few years. The massive, noisy and unstructured nature of online datasets that are generating every minute from social networking profiles, blogs, comments, reviews in form of thumbs up and thumbs down, star ratings has posed great challenges for researchers and analysts in order to mine quality facts. The outcomes from the mining of this data expedite and improve the decision forming process. This paper outlines the different issues and the subfields that can be considered as part of Social Network Analysis and need to be studied .It also presents the related algorithms and techniques defined earlier.
Key-Words / Index Term
Data Mining, Influence Propagation, Recommender System, Opinion Mining, Link Analysis, Community Detection, Sentiment Analysis
References
[1] Mariam Adedoyin-Olowe, Mohamed Medhat Gaber, Frederic Stahl, ‘A Survey of Data Mining Techniques for Social Network Analysis’, School of Computing Science and Digital Media, Robert Gordon University Aberdeen, AB10 7QB, UK, School of Systems Engineering, University of Reading PO Box 225, Whiteknights, Reading, RG6 6AY, UK
[2] G Nandi, A Das, ‘Online Social Network Mining: Current Trends and Research Issues’, IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
[3] Daniel Amo Filva, Francisco J. Garcia Penalvo, Marc Alier Forment, ‘A Social Network Analysis Approaches for Social Learning Support’, Proceedings of the Second International Conference on Technological Ecosystems for Enhancing Multiculturality (TEEM 2014)(Salamanca, Spain, October 1-3, 2014) (pp. 269-274). New York, NY, USA: ACM. doi:10.1145/2669711.2669910
[4] Said A. Salloum, Mostafa, Al-Emran, Azza Abdel Monem, Khaled Shaalan, ‘A Survey of Text Mining in Social Media: Facebook and Twitter Perspectives’, Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 1, 127-133 (2017)
[5] Burke, R, ’Hybrid recommender systems: Survey and experiments’, User Modelling and User-Adapted Interaction, 12(4):331–370, 2002.
[6] Mohammad Al Hasan, Vineet Chaoji, Saeed Salem, and Mohammed Zaki,’ Link Prediction using Supervised Learning’, Rensselaer Polytechnic Institute, Troy, New York 12180
[7] Walaa Medhat , Ahmed Hassan, Hoda Korashy, ‘Sentimental Analysis algorithms and application: A survey’, Ain Shams Engineering Journal, 2090-4479 _ 2014 Production and hosting by Elsevier B.V.
[8] Devika M D, Sunitha C, Amal Ganesh,’ Sentiment Analysis: A Comparative Study On Different Approaches’, Science Direct, Fourth International Conference on Recent Trends in Computer Science & Engineering, Chennai, Tamil Nadu, India, Procedia Computer Science 87 ( 2016 ) 44 – 49
[9] Au Yeung, C. M., and Iwata,’Strength of social influence in trust networks in product review sites’, In Proceedings of the fourth ACM international conference on Web search and data mining (pp.495-504). ACM, 2011.
[10]Social-Network-Illustration in Concepts & Ideas|People|Technology,Preview-124730,Vexels.com
[11] Suqi Cheng, Huawei Shen, Junming Huang, Guoqing Zhang, Xueqi Cheng, ‘StaticGreedy: Solving the Scalability-Accuracy Dilemma in Influence Maximization’, Research Centre of Web Data Sciences & Engineering Institute of Computing Technology, Chinese Academy of Sciences
[12] Liyan Dong,1,2 Yongli Li,3 Han Yin,1,2 Huang Le,1,2 and Mao Rui,’ The Algorithm of Link Prediction on Social Network’, Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2013, Article ID 125123
[13] C.Amali Pushpam, J.Gnana Jayanthi,’ Overview on Data Mining in Social Media’, © 2017, IJCSE All Rights Reserved 147International Journal of Computer Sciences and Engineering, Volume-5 Issue-11, E-ISSN: 2347-2693
Citation
Deepti Gupta, "Investigating into the Emerging Research Areas of Social Network Analysis," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1157-1161, 2018.
A Model Driven Approach for Risk Reduction in Insulin Pump
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1162-1170, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11621170
Abstract
This paper presents our effort of using model-driven engineering to establish insulin pump software based on the generic PCA reference model. The reference model was first translated into a network of timed automata using the UPPAAL tool. We applied the TIMES tool to automatically generate platform-independent code as its preliminary implementation. The code is then interface with pump hardware, software and deployed onto a real PCA pump. Experiments show that the code worked correctly and effectively with the real pump. To check the compatibility and rules violation we have also developed a test stub to check the consistency between the proposed model and the code through conformance testing. Challenges faced and their resolution during our work is also discussed in this paper.
Key-Words / Index Term
Model based engineering, Code Synthesis, Insulin Pump, TIMES Tool
References
[1] The generic patient controlled analgesia pump model. http://rtg.cis.upenn.edu/gip.php3.
[2] Bin Ma and Sheng Liu, "A PZT Insulin Pump Integrated with a Silicon Micro Needle Array for Transdermal Drug Delivery" Fifty sixth IEEE ECTC Conference, San Diego, 2006: 677-681.
[3] The Insulin Model http://www.endocrineweb.com/conditions/diabetes/diabetes-what-insulin
[4] T. Amnell, E. Fersman, L. Mokrushin, P. Pettersson, and W. Yi. “TIMES: a tool for schedulability analysis and code generation of real-time systems” In FORMATS, 2003.
[5] H. S. Hong, S. D. Cha, I. Lee, O. Sokolsky, and H. Ural. “Data flow testing as model checking”, In ICSE, pages 232–243, 2003.
[6] D. C. Schmidt. “Model-driven engineering”, IEEE Computer Magazine, February 2006.
[7] I. Assayad, V. Bertin, F. X. Defaut, P.Gerner, O. Quevreux, and S. Yovine. “Jahuel: A formal framework for software synthesis, ECMDA-FA, 2005.
[8] S. Burmester, H. Giese, and W. Schafer. Model-driven architecture for hard real-time systems: From platform independent models to code. ECMDA-FA, 2005.
[9] Intensified Treatment of Diabetes in Pediatrics Today http://general-medicine.jwatch.org/cgi/content/full/2011/712/1
[10] Continuous Real-Time Glucose Monitoring for Better Control. http://www.medtronicdiabetes.net/treatmentoptions/continuousglucosemonitoringto
[11] BaekGyu Kim, Anaheed Ayoub, Oleg Sokolsky, Insup Lee, Paul Jones, Yi Zhang, and Raoul Jetley. Safety-Assured Development of the GPCA Infusion Pump Software.The International Conference on Embedded Software 475-487, 2011.
[12] Zhi Xu, Sheng Liu , Zhiyin Gan, Bin Ma, Guojun Liu, Xinxia Cai, Honghai Zhang, Zhigang Yang. An Integrated Intelligent Insulin Pump Electronic Packaging technology, ICEPT 2006.
[13] Frank Truyen, “The Fast Guide to Model Driven Architecture The Basics of Model Driven Architecture (MDA)”, Cephas Consulting Corp January 2006.
[14] Christen Rees et. al., “Recommendations for Insulin Dose Calculator Risk Management”, Journal of Diabetes Science and Technology 2014 Jan; 8(1): 142–149.
[15] Brooke H. McAdams and Ali A. Rizvi, “An Overview of Insulin Pumps and Glucose Sensors for the Generalist”, Journal of Clinical Medicine2016 Jan; 5(1): 5.
[16] Levon Gevorkov , Anton Rassõlkin , Ants Kallaste , Toomas Vaimann, “Simulink based model for flow control of a centrifugal pumping system”, 25th International Workshop on Electric Drives: Optimization in Control of Electric Drives (IWED), PP-1-4, Feb, 2018.
[17] Alessio Bucaioni, Lorenzo Addazi, Antonio Cicchetti, Federico Ciccozzi, Romina Eramo, Saad Mubeen, Mikael Sjödin, “MoVES: A Model-Driven Methodology for Vehicular Embedded Systems” , IEEE Access PP- 6424-6445, Jan 2018.
[18] B. Bakariya, G.S. Thakur, “Effectuation of Web Log Preprocessing and Page Access Frequency using Web Usage Mining”, International Journal of Computer Sciences and engineering, Vol.1 , Issue.1 , pp.1-5, Sep-2013.
[19] K. J. Modi, D.P. Chowdhury, “A Framework for Management and Monitoring of QoS-based Cloud Services”, International Journal of Computer Sciences and engineering, Vol.5, Issue.5, pp.115-119, May-2017.
Citation
Vishal Bhatt, Kapil Kumar Gupta, Nitin Goel, "A Model Driven Approach for Risk Reduction in Insulin Pump," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1162-1170, 2018.
A Speculative Study on Hadoop Scheduling Algorithms
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1171-1176, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11711176
Abstract
Big Data is a term which mainly focuses on the use of techniques to capture, process, analyze and visualize large datasets in a reasonable time span. Different platforms, tools and software used for this purpose are known as “Big Data technologies”. Hadoop is an open-source framework used to process large amount of data in an inexpensive and efficient way by using MapReduce which is used for processing and generating large data sets with a parallel, distributed algorithm on a cluster. Job scheduling is a key factor for achieving high performance in big data processing. The paper presents a comparative study of job scheduling algorithms in Hadoop environment. In addition, this paper describes the features, advantages and disadvantages of various Hadoop scheduling algorithms such as FIFO, Fair, Capacity, LATE, Energy-aware, Resource-aware, Matchmaking, Delay and Deadline Constraints.
Key-Words / Index Term
Big Data, Hadoop, Mapreduce, Distributed Systems, Hadoop Scheduling Algorithms
References
[1] O’Reilly Media, “Big Data Now”, O’Reilly media, Inc., 2011.
[2] Rakesh. S. Srisath, Vaibhav A. Desale, Amol. D. Potgantwar, “Big Data Analytical Architecture for Real-Time Applications”, IJSRNSC, Vol. 5, Issue 4, 2017.
[3] K. Parimala, G. Rajkumar, A. Ruba, S. Vijaylashmi, “Challenges and Opportunities with Big Data”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 5, Issue 5, pp. 16-20, 2017.
[4] Jason Venner, “Pro hadoop”, Apress, ISBN 978-1-4302-1943-9, 2009.
[5] Jared Dean, “Big data, data mining, and machine learning: value creation for business leaders and practitioners”, John Wiley & Sons, 2014.
[6] DT Editorial Services, “Big Data”, Black Book, Dreamtech Press, ISBN 978-93-5119-931-1, 2016.
[7] Dean, Jeffrey, Sanjay Ghemawat, "MapReduce: simplified data processing on large clusters", Communications of the ACM, Vol. 51, Issue 1, pp. 107-113, 2008.
[8] Jens Dittrich, Jorge-Arnulfo and Quiane-Ruiz, “Efficient big data processing in Hadoop MapReduce”, Proceedings of the VLDB Endowment, Vol. 5, No. 12, pp. 419-429, 2012.
[9] Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung, “The Google file system”, ACM SIGOPS operating systems review, Vol. 37, Issue 5, pp. 20-43, 2003.
[10] J.V. Gautam, H.B. Prajapati, V.K. Dabhi, S. Chaudhary, “A survey on job scheduling algorithms in big data processing”, IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT’15), Coimbatore, pp. 1–11, 2015.
[11] Jiong Xie, FanJun Meng, HaiLong Wang, HongFang Pan, JinHong Ceng, Xiao Qin, “Research on scheduling scheme for hadoop clusters”, Procedia Comput. Sci., Vol. 18, pp. 468-471, 2013.
[12] S. Suresh, N.P. Gopalan, “An optimal task selection scheme for hadoop scheduling”, IERI Procedia, Vol. 10, pp. 70-75, 2014.
[13] Lisia S. Dias, Marianthi.G. Ierapetritou, “Integration of scheduling and control under uncertainties: review and challenges”, Vol. 116, pp. 98-113, 2016.
[14] S. Divya, R. Kanya Rajesh, Rini Mary Nithila I, Vinothini M, “Big data analysis and its scheduling policy - Hadoop”, IOSR J. Computer Engineering (IOSR-JCE), Vol. 17, Issue 1, pp. 36-40, 2015.
[15] B.P Andrews, A. Binu, “Survey on Job Schedulers in Hadoop Cluster”, IOSR Journal of Computer Engineering, pp. 46-50, 2013.
[16] M. Pastorelli, A. Barbuzzi, D. Carra, M. Dell’Amico and P. Michiardi, “Practical size based scheduling for MapReduce workloads”, IEEE International Conference on Big Data, pp. 51-59, 2013.
[17] J.C. Anjos, I. Carrera, W. Kolberg, A.L. Tibola, L.B. Arantes, C.R. Geyer, MRA, “Scheduling and data placement on MapReduce for heterogeneous environments”, Future Generation Computer System, Vol. 42, pp. 22–35, 2015.
[18] Willis Lang, Jignesh M. Patel, “Energy Management for MapReduce Clusters”, Department of Computer Sciences, University of Wisconsin Madison, USA, 2010.
[19] M. Yong, Shiwali Mohan, Nitin Garegrat, "Towards a resource aware scheduler in hadoop", ICWS, pp. 102-109, 2009.
[20] Dazhao Cheng, Jia Rao, Changjun Jiang, Xiaobo Zhou, “Resource and deadline aware job scheduling in dynamic hadoop clusters”, IEEE 29th International Parallel and Distributed Processing Symposium, ISBN 978-1-4799-8649-1, 2015.
[21] C. He, Ying Lu, David Swanson, "Matchmaking: A new MapReduce scheduling technique", IEEE 3rd International Conference, Athens, Greece, 2011.
[22] Qiaomin Xie, Mayank Pundir, Yi Lu, Cristina L. Abad, Roy H. Campbell, Pandas, “Robust locality-aware scheduling with stochastic delay optimality”, IEEE/ACM Trans. Netw., Vol. 25, Issue 2, pp. 662-675, 2016.
[23] K . Kc, K . Anyanwu, "Scheduling hadoop jobs to meet deadlines”, IEEE 2nd Int. Conf. IEEE, Indianapolis, USA, pp. 388-392, 2010.
[24] Matei Zaharia, Andy Konwinski, Anthony D. Joseph, Randy Katz, Ion Stoica, “Improving MapReduce performance in heterogeneous environments”, 8th USENIX conference on Operating systems design and implementation, pp. 29-42, 2008.
[25] Mohd Usama, Mengchen Liu, Min Chen, “Job schedulers for Big data processing in Hadoop environment: testing real-life schedulers using benchmark programs”, Digital Communications and Networks, Vol. 3, Issue 4, pp. 260–273, 2017.
Citation
Vanika, Aman Kumar Sharma, "A Speculative Study on Hadoop Scheduling Algorithms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1171-1176, 2018.
Deep Leaning Architectures and its Applications: A Survey
Survey Paper | Journal Paper
Vol.6 , Issue.6 , pp.1177-1183, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11771183
Abstract
In the field of Artificial Intelligence (AI), Deep Learning is a method falls in the wider family of Machine Learning algorithms that works on the principle of learning. Deep learning models basically works without human intervention and they are equivalent, and sometimes even, superior than humans. With the rise of emerging technology, deep learning draws an attention by many researchers and it is widely used in several areas including image, sound and text analysis. The paper discussed deep learning background, types of deep learning architectures and applications from different domains where researchers used deep learning models successfully.
Key-Words / Index Term
Deep Learning, Convolutional Neural Network, Deep Belief Network, Recurrent Neural Network
References
[1] Deng, Li. Three classes of deep learning architectures and their applications: a tutorial survey, APSIPA transactions on signal and information processing, 2012
[2] Bengio, Y., Learning deep architectures for AI. Foundations and trends in Machine Learning 2, 1-127, 2009
[3] What Is Deep Learning?, retrieved from https://in.mathworks.com/discovery/deep-learning.html on May 20, 2018
[4] Convolutional Neural Networks Tutorial in TensorFlow, retrieved from http://adventuresinmachinelearning.com/convolutional-neural-networks-tutorial-tensorflow/ on May 20, 2018
[5] Min, Seonwoo & Lee, Byunghan & Yoon, Sungroh, Deep Learning in Bioinformatics. Briefings in Bioinformatics, 2016, 18. 10.1093/bib/bbw068
[6] Zhang W, et al., Deep convolutional neural networks for multi-modality isointense infant brain image segmentation, Neuroimage, 108, 214–224, 2015, doi: 10.1016/j.neuroimage.2014.12.061
[7] Moeskops P, et al., Automatic segmentation of MR brain images with a convolutional neural network, IEEE Trans. Med. Imaging, 35(5), 1252–1261, 2016, doi: 10.1109/TMI.2016.2548501
[8] Nie D, Dong N, Li W, Yaozong G, Dinggang S, Fully convolutional networks for multi-modality isointense infant brain image segmentation, in 2016 I.E. 13th International Symposium on Biomedical Imaging (ISBI), 2016
[9] Chen, Lele & Wu, Yue & Dsouza, Adora & Z. Abidin, Anas & Xu, Chenliang & Wismüller, Axel, MRI tumor segmentation with densely connected 3D CNN, 2018, 10.1117/12.2293394
[10] Raunaq Rewari, Automatic Tumor Segmentation from MRI scans, http://cs231n.stanford.edu/reports/2016/pdfs/328_Report.pdf
[11] Y. Dong, Y. Pan, X. Zhao, R. Li, C. Yuan and W. Xu, Identifying Carotid Plaque Composition in MRI with Convolutional Neural Networks, 2017 IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, pp. 1-8, 2017
[12] Margeta, J., Criminisi, A., Cabrera Lozoya, R., Lee, D.C., Ayache, N., Fine-tuned convolutional neural nets for cardiac MRI acquisition plane recognition, Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, Taylor & Francis, pp. 339 – 349, 2017
[13] Vázquez Romaguera, Liset, Costa, Marly Guimarães Fernandes, Romero, Francisco Perdigón, Costa Filho, Cicero Ferreira Fernandes, Left ventricle segmentation in cardiac MRI images using fully convolutional neural networks, Proceedings of the SPIE, Volume 10134, id. 101342Z 11 pp. 2017
[14] Wang, Xinggang & Yang, Wei & Weinreb, Jeffrey & Han, Juan & Li, Qiubai & Kong, Xiangchuang & Yan, Yongluan & Ke, Zan & Luo, Bo & Liu, Tao & Wang, Liang, Searching for prostate cancer by fully automated magnetic resonance imaging classification: Deep learning versus non-deep learning. Scientific Reports, 7, 2017, 10.1038/s41598-017-15720-y.
[15] M. Srinivas, D. Roy and C. K. Mohan, Discriminative feature extraction from X-ray images using deep convolutional neural networks, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, 2016, pp. 917-921
[16] Y. Dong, Y. Pan, J. Zhang and W. Xu, Learning to Read Chest X-Ray Images from 16000+ Examples Using CNN, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Philadelphia, PA, 2017, pp. 51-57.
[17] C. Liu et al., TX-CNN: Detecting tuberculosis in chest X-ray images using convolutional neural network, 2017 IEEE International Conference on Image Processing (ICIP), Beijing, 2017, pp. 2314-2318. doi: 10.1109/ICIP.2017.8296695
[18] Cernazanu-Glavan, C & Stefan, Holban, Segmentation of Bone Structure in X-ray Images using Convolutional Neural Network. Advances in Electrical and Computer Engineering. 13. 87-94, 2013, 10.4316/aece.2013.01015
[19] P. Rao, N. A. Pereira and R. Srinivasan, Convolutional neural networks for lung cancer screening in computed tomography (CT) scans, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Noida, 2016, pp. 489-493
[20] Xiangrong Zhou, Ryosuke Takayama, Song Wang; Xinxin Zhou, Takeshi Hara, Hiroshi Fujita, Automated segmentation of 3D anatomical structures on CT images by using a deep convolutional network based on end-to-end learning approach, Proc. SPIE 10133, Medical Imaging 2017: Image Processing, 1013324 (24 February 2017); doi: 10.1117/12.2254201
[21] Lisowska, Aneta & Beveridge, Erin & Muir, Keith & Poole, Ian, Thrombus Detection in CT Brain Scans using a Convolutional Neural Network. 24-33, 2017, 10.5220/0006114600240033.
[22] K. J. Piczak, Environmental sound classification with convolutional neural networks, 2015 IEEE 25th International Workshop on Machine Learning for Signal Processing (MLSP), Boston, MA, 2015, pp. 1-6. doi: 10.1109/MLSP.2015.7324337
[23] S. Dieleman, P. Brakel, B. Schrauwen, Audio-based music classification with a pretrained convolutional network, Proceedings of the 12th International Society for Music Information Retrieval (ISMIR) conference, pp. 669-674, 2011.
[24] Aykanat, M., Kılıç, Ö., Kurt, B. et al. J Image Video Proc. (2017) 2017: 65. https://doi.org/10.1186/s13640-017-0213-2
[25] Q. Chen, W. Zhang, X. Tian, X. Zhang, S. Chen and W. Lei, "Automatic heart and lung sounds classification using convolutional neural networks," 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, 2016, pp. 1-4.
[26] O. Abdel-Hamid, A. r. Mohamed, H. Jiang, L. Deng, G. Penn and D. Yu, "Convolutional Neural Networks for Speech Recognition," in IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, no. 10, pp. 1533-1545, Oct. 2014..
[27] X. Ouyang, P. Zhou, C. H. Li and L. Liu, "Sentiment Analysis Using Convolutional Neural Network," 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Liverpool, 2015, pp. 2359-2364.
[28] Stojanovski, Dario & Strezoski, Gjorgji & Madjarov, Gjorgji & Dimitrovski, Ivica. (2015). Twitter Sentiment Analysis Using Deep Convolutional Neural Network. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 9121. 10.1007/978-3-319-19644-2_60.
[29] A. Hassan and A. Mahmood, "Deep Learning approach for sentiment analysis of short texts," 2017 3rd International Conference on Control, Automation and Robotics (ICCAR), Nagoya, 2017, pp. 705-710. doi: 10.1109/ICCAR.2017.7942788
[30] Cai G., Xia B. (2015) Convolutional Neural Networks for Multimedia Sentiment Analysis. In: Li J., Ji H., Zhao D., Feng Y. (eds) Natural Language Processing and Chinese Computing. Lecture Notes in Computer Science, vol 9362. Springer, Cham
[31] Geoffrey E. Hinton (2009), Deep belief networks, Scholarpedia, 4(5):5947.
[32] HussamHebbo, Jae Won Kim, Classification with Deep Belief Networks, https://www.ki.tu-berlin.de/fileadmin/fg135/publikationen/Hebbo_2013_CDB.pdf
[33] M. Tim Jones, Deep learning architectures, https://www.ibm.com/developerworks/library/cc-machine-learning-deep-learning-architectures/index.html
[34] Wang, Hai & Cai, Yingfeng & Chen, Long. (2014). A Vehicle Detection Algorithm Based on Deep Belief Network. The Scientific World Journal. 2014. 647380. 10.1155/2014/647380
[35] R. Sarikaya, G. E. Hinton and A. Deoras, "Application of Deep Belief Networks for Natural Language Understanding," in IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, no. 4, pp. 778-784, April 2014. doi: 10.1109/TASLP.2014.2303296
[36] Bei Zhong, Jin Liu, Yuanda Du, Yunlu Liaozheng and Jiachen Pu, Extracting Attributes of Named Entity from Unstructured Text with Deep Belief Network, International Journal of Database Theory and Application Vol.9, No.5 (2016), pp.187-196
[37] Jin Y., Zhang H., Du D. (2017) Incorporating Positional Information into Deep Belief Networks for Sentiment Classification. In: Perner P. (eds) Advances in Data Mining. Applications and Theoretical Aspects. ICDM 2017. Lecture Notes in Computer Science, vol 10357. Springer, Cham
[38] Liu T. (2010) A Novel Text Classification Approach Based on Deep Belief Network. In: Wong K.W., Mendis B.S.U., Bouzerdoum A. (eds) Neural Information Processing. Theory and Algorithms. ICONIP 2010. Lecture Notes in Computer Science, vol 6443. Springer, Berlin, Heidelberg
[39] A. J. Yepes, A. MacKinlay, J. Bedo, R. Garnavi, and Q. Chen. Deep belief networks and biomedical text categorisation. In Proceedings of the Twelfth Annual Workshop of the Australasia Language Technology Association, page 123, 2014.
[40] G. Liu, L. Xiao and C. Xiong, "Image Classification with Deep Belief Networks and Improved Gradient Descent," 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, 2017, pp. 375-380.
[41] S. Zhou, Q. Chen and X. Wang, "Discriminative Deep Belief Networks for image classification," 2010 IEEE International Conference on Image Processing, Hong Kong, 2010, pp. 1561-1564. doi: 10.1109/ICIP.2010.5649922
[42] P. Zhong, Z. Gong, S. Li and C. B. Schönlieb, "Learning to Diversify Deep Belief Networks for Hyperspectral Image Classification," in IEEE Transactions on Geoscience and Remote Sensing, vol. 55, no. 6, pp. 3516-3530, June 2017. doi: 10.1109/TGRS.2017.2675902
[43] Kim J, Kang U, Lee Y. Statistics and Deep Belief Network-Based Cardiovascular Risk Prediction. Healthc Inform Res. 2017 Jul;23(3):169-175.
[44] ALTAN, Gökhan & Allahverdi, Novruz & Kutlu, Yakup. (2017). Diagnosis of Coronary Artery Disease Using Deep Belief Networks. European Journal of Engineering and Natural Sciences. 2. 29-36.
[45] Turner, J.T. & Page, Adam & Mohsenin, Tinoosh & Oates, Tim. (2014). Deep Belief Networks used on High Resolution Multichannel Electroencephalography Data for Seizure Detection. 75-81.
[46] Mohamed abd el Zaher, Ahmed allah & Eldeib, Ayman. (2015). Breast cancer classification using deep belief networks. Expert Systems with Applications. 46. 139-144. 10.1016/j.eswa.2015.10.015.
[47] Guo-Ping Liu, Jian-Jun Yan, Yi-Qin Wang, et al., “Deep Learning Based Syndrome Diagnosis of Chronic Gastritis,” Computational and Mathematical Methods in Medicine, vol. 2014, Article ID 938350, 8 pages, 2014. https://doi.org/10.1155/2014/938350.
[48] M. D. Prasetio, T. Hayashida, I. Nishizaki and S. Sekizaki, "Deep belief network optimization in speech recognition," 2017 International Conference on Sustainable Information Engineering and Technology (SIET), Malang, 2017, pp. 138-143.
[49] Zulkarneev M., Grigoryan R., Shamraev N. (2013) Acoustic Modeling with Deep Belief Networks for Russian Speech Recognition. In: Železný M., Habernal I., Ronzhin A. (eds) Speech and Computer. SPECOM 2013. Lecture Notes in Computer Science, vol 8113. Springer, Cham
[50] Farahat, Mahboubeh & Halavati, Ramin. (2016). Noise Robust Speech Recognition Using Deep Belief Networks. International Journal of Computational Intelligence and Applications. 15. 1650005. 10.1142/S146902681650005X.
[51] Lee JG, Jun S, Cho YW, Lee H, Kim GB, Seo JB, Kim N., Deep Learning in Medical Imaging: General Overview. Korean J Radiol. 2017 Jul-Aug;18(4):570-584
[52] Recurrent Neural Networks Tutorial, Part 1 – Introduction to RNNs, http://www.wildml.com/2015/09/recurrent-neural-networks-tutorial-part-1-introduction-to-rnns/
[53] Min, Seonwoo & Lee, Byunghan & Yoon, Sungroh. (2016). Deep Learning in Bioinformatics. Briefings in Bioinformatics. 18. 10.1093/bib/bbw068.
[54] Wim De Mulder, Steven Bethard, Marie-Francine Moens, A survey on the application of recurrent neural networks to statistical language modeling, Computer Speech & Language, Volume 30, Issue 1, 2015, Pages 61-98
[55] T. Ishitaki, R. Obukata, T. Oda and L. Barolli, "Application of Deep Recurrent Neural Networks for Prediction of User Behavior in Tor Networks," 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), Taipei, 2017, pp. 238-243.
[56] Malek, Alaeddin. (2008). Applications of Recurrent Neural Networks to Optimization Problems. 10.5772/5556.
[57] B. Q. Huang, Tarik Rashid and M-T. Kechadi, Multi-Context Recurrent Neural Network for Time Series Applications, World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:1, No:10, 2007
[58] Serban, I. V., Klinger, T., Tesauro, G., Talamadupula, K., Zhou, B., Bengio, Y., & Courville, A. C. (2017, February). Multiresolution Recurrent Neural Networks: An Application to Dialogue Response Generation. In AAAI (pp. 3288-3294).
[59] V. Pham, T. Bluche, C. Kermorvant and J. Louradour, "Dropout Improves Recurrent Neural Networks for Handwriting Recognition," 2014 14th International Conference on Frontiers in Handwriting Recognition, Heraklion, 2014, pp. 285-290.
[60] Graves A. (2012) Offline Arabic Handwriting Recognition with Multidimensional Recurrent Neural Networks. In: Märgner V., El Abed H. (eds) Guide to OCR for Arabic Scripts. Springer, London
[61] Chakraborty, Bappaditya & Sarathi Mukherjee, Partha & Bhattacharya, Ujjwal. (2016). Bangla online handwriting recognition using recurrent neural network architecture. 1-8. 10.1145/3009977.3010072.
[62] P. Voigtlaender, P. Doetsch and H. Ney, "Handwriting Recognition with Large Multidimensional Long Short-Term Memory Recurrent Neural Networks," 2016 15th International Conference on Frontiers in Handwriting Recognition (ICFHR), Shenzhen, 2016, pp. 228-233
Citation
Sanskruti Patel, Atul Patel, "Deep Leaning Architectures and its Applications: A Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1177-1183, 2018.
Retrieving System Performance
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1184-1186, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11841186
Abstract
A system used for backing files, storing and retrieving. The temporary storage is created for storing the files using hard disk. The operating system makes the backup of all the details. The operating system will be compared and if it same the data and information will be combined. Otherwise distracted information is stored in common file and retrieved. The network speed and easy access of data will improve the system performance. Administrator can also schedule the system based on the report of SPM. SPM also provides graphical representation to evaluate the performance of the system easily. Operating system is to provide efficient use of resources. The performance of the system is fully depends on the kernel of the system. The evaluation of performance will increase the opportunities for work team. Networking speed will also be increased and good maintenance of storage. Software provides information provided to improve the system performance and sharing, rewriting the storage area to earn better result. The Storage capacity of the system is improved with high speed and low cost.
Key-Words / Index Term
SPM, Storage, Hard disk, Performance
References
[1] CN Lu, KT Chen, MC Lin, YT Lin –“ Performance assessment of an integrated distribution SCADA-AM/FM system” ,1996, … and Distribution Conference, …, - ieeexplore.ieee.org
1) [2] C Zhang, J Naughton, D DeWitt, Q Luo…“ On supporting containment queries in relational database management systems” , 2001.,- ACM SIGMOD - dl.acm.org
[3] F Yildiz, M HOTAMIŞLI, A Eleren , “Construction of multi dimensional performance measurement model in business organizations: an empirical study”, 2011 - Journal of Economic and - eprints.ibu.edu.ba
[4] JI Kim, I Park, HH Lee, “An intelligent context-aware learning system based on mobile augmented reality” …, 2011 , Ubiquitous Computing and Multimedia, Springer
[5] NK Velagapudi, BK Ghosh , “Robust planning and scheduling for automated batch manufacturing systems” , 1989- Computers & industrial engineering, - Elsevier
[6]SA Mehmood Gilani, A Mumtaz , “Enhancing performance of image retrieval systems using dual tree complex wavelet transform and support vector machines”, 2008, CIT. Journal of Computing and - hrcak.srce.hr
Citation
S. Girija, "Retrieving System Performance," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1184-1186, 2018.
A Review of Advanced Techniques and Technology to Detecting Fingerprint
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1187-1191, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11871191
Abstract
The human fingerprint have been key biometric technology providing authentication and security for last decades. Currently fingerprint detection technology used in almost every Smartphone and laptop manufacturing company also considering implementing fingerprints detection technology in laptop. It is preferred by the most of people due to its accuracy, reliability, distinctiveness, feasibility and acceptability. There is several technologies available in the market for scanning the image which works on different principle viz. optical unique fingers impression in which Optical fingers impression sensor works by catching a high definition image of the fingertip through light source. This sort of sensor has a specific kind of high resolution advanced camera. The upper layer of the sensor, where the finger is put, is known as the touch surface. After this layer is a light-producing phosphor layer which illuminates the surface of the finger. The light reflected from the edges and valleys of the finger and goes through that layer which catches a picture of the fingertip. Semiconductor likewise called capacitance unique mark sensors, this sensor additionally produces a picture of the edges and valleys of fingertip yet as opposed to detecting the example utilizing light, and it utilizes electrical current. Ultrasonic unique mark sensors, this sensor influences utilization of the standards of ultrasonography keeping in mind the end goal to make visual picture of the unique mark. Ultrasonic sensor utilizes high recurrence sound waves to create the example of fingertip. Here it measures the reflected sound wave to generate pattern.
Key-Words / Index Term
Minutiae point, Fingerprint patterns, Imaging Technology, Techniques for extraction, Binarization, Thinning, Crossing Number Algorithm
References
[1] Karthikeyan, S., and J. Nithya. "Secured Electronic Voting Machine Using Biometric." (2017).
[2] Harshada Jadhav, Ruksar Khan, Anusha Gugale, Bhushan Thakare "Detection and Rectification of Distorted Fingerprints Paper."(2017).
[3] Prof.K.Mahajan, SharvariTatwawadi, Ayesha Shaikh, RashmiShewatkar, "Biometrics Based Security System for Bank Lockers with OTP Support.”(2017).
[4] Arunkumar and A.Arun Raja, "Biometrics Authentication Using Raspberry Pi."(2015).
[5] A. Aditya Shankar, P.R.K.Sastry, A. L.Vishnu Ram, A.Vamsidhar, "Finger Print Based Door Locking System."(2015).
[6] Manisha Redhu AndDr.Balkishan, "Fingerprint Recognition Using Minutiae Extractar."(2013).
[7] Pallavi Verma and Namit Gupta, "Fingerprint Based Student Attendance System Using GSM."(2013).
[8] Kocharyan, Davit, and Hakob Sarukhanyan. "High Speed fingerprint recognition method." 2nd International Conference on Multimedia Technology (ICMT2011).
[9] https://www.androidauthority.com/how-fingerprint-scanners-work-670934
[10] http://www.biometric-solutions.com/fingerprint-recognition.html
Citation
Priyanka P. Patel, "A Review of Advanced Techniques and Technology to Detecting Fingerprint," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1187-1191, 2018.
Product Recommendation Systems a Comprehensive Review
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1192-1195, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11921195
Abstract
In today’s environment the idea of establishing business without the use of internet is not possible. More and more users are shifted towards online systems. So companies are also converged toward the online business. Every company in their attempt to establish strong foots required some sort of mechanism which can promote their product. So recommender system comes into existence. The recommender system is the filtering system which will detect the preferences of the users. By looking at the preference of the users companies can decide which product to be launched in the market and which is not. So recommender system is the need of the hour. Recommender systems are used for wide variety of applications which includes movies, music, news, life insurance etc. In this paper we review various technique that are used for recommender system for recommending electronic products.
Key-Words / Index Term
Recommender System, Users, Online System, online business
References
[1] Stephen et al., 2017 Measures of Similarity in Memory-Based Collaborative Filtering Recommender System MISNC’17 July 17-19.
[2] Abhijit, P. et al., 2016. Online Recommendation of Electronic Goods., pp.1554–1556.
[3] Aciar, S. et al., 2007. Recommender System Based on Consumer Product Reviews. pdf.
[4] Baltrunas, L., 2011. Context-Aware Collaborative Filtering Recommender Systems., 4 (April), p.172.
[5] Barragáns-Martínez, B., Costa-Montenegro, E. & Juncal-Martínez, J., 2015. Developing a recommender system in a consumer electronic device. Expert Systems with Applications, 42(9), pp.4216–4228.
[6] Barreda, A.A. et al., 2015. Generating brand awareness in Online Social Networks. Computers in Human Behavior, 50, pp.600–609. Available at: http://linkinghub. elsevier.com/retrieve/pii/S0747563215002137.
[7] Driskill, R. & Riedl, J., 1999. Recommender Systems for E-Commerce: Challenges and Opportunities. American Association for Artificial Intelligence, pp.73–76. Available at: http://aaaipress.org/Papers/Workshops/1999/WS-99-01/WS99-01-012. pdf.
[8] Dutta, R. & Mukhopadhyay, D., 2008. Offering A Product Recommendation System in E-commerce. IEEE.
[9] Farsani, H.K. & Nematbakhsh, M., 2006. A semantic recommendation procedure for electronic product catalog. World Academy of Science, Engineering and Technology, 22(10), pp.7–12.
[10] Gong, S., 2012. A Flexible Electronic Commerce Recommendation System. Physics Procedia, 24, pp.806–811. Available at: http://linkinghub.elsevier.com/ retrieve/ pii/ S1875389212001630.
[11] Guo, Y. et al., 2018. Mobile e-commerce recommendation system based on multi-source information fusion for sustainable e-business. Sustainability (Switzerland), 10 (1).
[12] Hoic-Bozic, N., Holenko Dlab, M. & Mornar, V., 2015. Recommender System and Web 2.0 Tools to Enhance a Blended Learning Model. IEEE Transactions on Education, pp.1–1.Available at: http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper. htm?arnumber=7104183.
[13] Lee, T. et al., 2006. An Ontology-Based Product Recommender System for B2B Marketplaces. International Journal of Electronic Commerce, 11(2), pp.125–155. Available at: http://www.tandfonline.com/doi/full/10.2753/JEC1086-4415110206.
[14] Mobasher, B., 2011. Recommender Systems in Ecommerce. Data Mining Applications with R, 2015 (September), pp.81–90. Available at: http://dx.doi.org/ 10.1016/B978-0-12-411511-8.00005-0.
[15] Thai-Nghe, N. et al., 2010. Recommender system for predicting student performance. Procedia Computer Science, 1(2), pp.2811–2819.
[16] Vaidya, N., 2017. Keyword Based Recommender System For Electronic Products Using Weight Based Recommendation., (6), pp.24–28.
[17] Yu, T., Benbasat, I. & Cenfetelli, R.T., 2016. How to design interfaces for product recommendation agents to influence the purchase of environmentally-friendly products. Proceedings of the Annual Hawaii International Conference on System Sciences, 2016-March, pp.620–629.
[18] Zheng, X. et al., 2015. A Hybrid Trust-based Recommender System for Online Communities of Practice. IEEE Transactions on Learning Technologies, 1382 (c), pp.1–13.
Citation
Jatinder Kaur, Rajeev Kumar Bedi, S.K. Gupta, "Product Recommendation Systems a Comprehensive Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1192-1195, 2018.
Leveraging the growth of the nation by upliftment of its rural counterpart – An ICT based approach
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1196-1200, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11961200
Abstract
Problems too know, which is the most appropriate location to, dwell in. Rural people mostly believe that, “their destiny is to be in the midst of numerous problems” and that nothing can change their fate. Most of us will agree too, that mostly the urban lot are enjoying the fruits of the tree called “Modernization” ,where as rural people are still engaged in agricultural and small scale industries/business, unaware about what is going on in exterior world . In order to provide the basic necessities and facilities needed to live, the government surely has done a lot but when it comes to making the people of village competent enough to face the fast paced world and its challenges, still a lot has to be done . The most valuable step in this situation would be to modernize the countryside of our nation , so that the population in villages will also be capable enough to leverage the growth of India in every dimension. There are several policies both for the rich and poor, in every country that takes care of its diversified citizens, but whether they are actually implemented or not, is still a mystery. Currently there are some barriers in the development of villages, such as lack of quality education, lack of employment, shortage of resources, non accessible internet etc. This paper is an attempt to cover some of the case studies of the rural people across the globe, who took a step towards transforming their lives. The barriers in the way of rural development, are also highlighted here. Probable and promising solutions based on ICT tools and techniques are also presented.
Key-Words / Index Term
ICT-Information and Communication Technology, Sustainable, Policy Making, Barriers, Patanjali
References
[1]. Waseem Akram Mir, Kumar Rakesh, “A Study on Role and Applications of ICT in development of rural areas”, International Journal of Scientific Research and Management(IJSRM), Vol 5 Issue 08 2017,pp 6758-6763.
[2]. Javita Pramanik, Bijan Sankar, Shyamalendu Kandar, “Impact of ICT in Rural development: Perspective of Developing Countries”, American Journal of rural Development, 2017, 5(4), pp 117-120, Doi: 10:12691/ajrd-5-4-5.
[3]. More Anand, Kanungo Priyesh, “Use of cloud computing for implementation of e-Governance Services”, International Journal of Scientific Research in Computer Science and Engineering, ISSN: 2320-7639,Vol 5, Issue 3, pp 115-118,June 2017.
[4]. S. Sharma, R. Upadhyay, “Information Communication Technology (ICT) and digitalization : A Complete Analysis with MGNREGA” ,International Journal of Scientific Research in Network Security and Communication ISSN:2321-3256, Vol -5,Issue-3,June 2017.
[5]. Ghavifekr Simin, Kunjappan Thanusha, Ramasamy Logeswary, Anthony Annreetha,“Teaching and Learning with ICT tools, Issues and Challenges from Teacher’s perceptions”, Malaysian Online Journal of Educational Technology, Volume 4, Issue 2, 2016,pp-38 -57
[6]. Kak Sucheeta, Gond Sunita, “ICT for service delivery in Rural India-scope,challenges and present scenario”,IOSR Journal of Computer Engineering(IOSR-JCE),e-ISSN- 2278-0661,
p-ISSN: 2278-8727, Volume 17, Issue 6, ver 1(Nov-Dec 2015),pp 12-15.
[7]. Tauffiqu Ahamad , Jitendra Kumar Pandey, “A study on application and role of ICT in rural development", International Journal of Emerging Technologies and Innovative Research , ISSN:2349-5162, Vol.1, Issue 6, page no.455-458, November-2014.
[8]. Moslem Savari , Reza Ebrahimi Mayand, “Barriers of sustainable rural development from perspective of experts”, International Journal of Advanced Biological and Biomedical Research, Volume 1, Issue 8, 2013, pp 789-794.
[9]. Devi Sharmila, Mohamad Rizwaan, Chander Shubash, “ICT for quality of education in India”, International Journal of Physical and Social Sciences(IJPSS), Volume-2, Issue 6, June- 2012, pp-542 – 554.
[10]. Kumar, Abhay and Singh, Krishna M, “Role of ICTs in Rural Development with Reference to Changing Climatic Conditions” (March 23, 2012). ICT FOR AGRICULTURAL DEVELOPMENT UNDER CHANGING CLIMATE, Krishna M. Singh, M.S. Meena, eds., Narenda Publishing House, 2012 .
[11]. Anastasia Stratigea, “ICTs for Rural Development :Potential Applications and Barriers involved”,
Networks and Communications Studies,NETCOM, Vol 25(2011), pp-179-204.
[12]. Sushmita Mukherjee, “Application of ICT in rural development : opportunities and challenges”, Global Media Journal- Indian Edition/ISSN 2249-5835, Winter Issue/Dec 2011, Vol 2/No.02,pp 1-8.
Citation
Chitralekha Dwivedi, "Leveraging the growth of the nation by upliftment of its rural counterpart – An ICT based approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1196-1200, 2018.