Efficient Learning on Imbalanced Image Set
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.121-126, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.121126
Abstract
Handling imbalanced image sets is a challenging issue being faced by the conventional categorizer. Imbalance problem occur with real world data due to various reasons, to which the ordinary classifiers gets influenced towards major class data. In this paper, we aim to balance bi-class absolute image set by creating synthetic samples of minority class images. Tests on three image sets using five synthetic image generation methods, four image features and three evaluation measures is carried out. KNN classification is performed on all three image set which are pretty imbalanced and the results indicate that synthetic creation of minor class images progresses the performance measures.
Key-Words / Index Term
Imbalanced image set, k-nn categorization, Synthetic image generation, performance measures improvement
References
[1] Dr. Durga Prasad, Dr. K Nageswar Rao, “An Imprved approach on class imbalance data using within class minority oversampling technique” International Journal of latest trends in engineering and technology, VOL.7, 2017l.
[2] Yingying Qin, Wenjie Chen, Jie Chen, “Generating images for imbalanced dataset problem” Institute of Electrical and Electronics Engineer (IEEE), 2016.
[3] Bartosz Krawezyk, “Learning from Imbalanced data: open challenges and future data”, 2016, Springerlink.com.
[4] Jiaojiao Li, Qian Du, Wei Li, Yunsng Li “Representation based yper spectral Image Classification with Imbalanced data”, Institute of Electrical and Electronics Engineers (IEEE), 2016.
[5] Gregory Luppescu, Raj Shah,“Personalized Image Enhancement” Institute of Electrical and Electronics Engineers(IEEE) , 2016.
[6] Anu Namdeo, Sandeep Singh Bhadriya, “A Review on Image enhancement techniques with its advantages and disadvantages” IJSART, 2016.
[7] Hebatallah Mostafa Anwer, Mohamed Farouk, Ayman Abdel-HamAida Ali, Siti Mariyam Shamssuddin, Anca L Ralescu, “Classification with class imbalance problem: A review” Intertiol Jourl Of Advances In Soft Computing And Its Applications, 7 (3). pp. 176-204, 2015.
[8] Vaishnavi L Kaundanya, Anita Patil, Ashish Panat “Classfication of Emotions from EGG using KNN classifier” 2015, IJSET.
[9] Apurva Sonak, R A Patankar “A survey on methods to handle Imbalance dataset” 2015 International Conference on Computing, Networking an d Communications(IJCSMC).
[10] Tdd Perry, Mhommed Bader-El-Den, Steven Cooper, “Imbalanced classification using Genetically Optimized Cost sensitive classifiers” Institute of Electrical and Electronics Engineers (IEEE),2015.
[11] M Srinivas, R Bharath, P Rajalakshmi, C Krishna Mohan, “Multi-level categorization method for medical methods”, 2015, 17th International conference n E-Health Networking, Application & Services (HealthCom).
[12] Dr. D Ramyachitra, P Manikandan,“ Imbalanced dataset classification and solutions: A Review” July 4 2014, International Journal of Computing and Business Research (IJCBR).
[13] M Akkil Jabbar, B L Deekshatulu, Priti Chandra “Classification of Heart disease using KNN and Genetic algorithm” International Conference on Cmputational Intelligence: Modelling Techniques and Applications(CIMTA,)2013.
[14] Mr. Rushi Lngadge, Ms. Snehalata S Dngre, Dr. Latesh Malik, “Class Imbalance problem in data mining: A Review”, International Journal of Computer Science and Network (IJCSN), Feb 2013 .
[15] Ruchika Mishra, Utkarsh Sharma, “Review of Image Enhancement Technique”, 7th International Journal of Engineering Research and Technology (IJERT), August 8 2013.
[16] Nour Moustafa, Jill Slay “Improving classification performance for the Minority class in highly imbalanced dataset using Boosting”, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT`12).
[17] Arun Kumar M N, H S Sheshadri, “On the class of Imbalanced datasets”, International Journal of Computer Applications (IJCA), April, 2012.
[18] Tarek M Bittibssi, Gouda I Salama, Yehia Z Mehaseb and Adel E Henawy, “Image Enhancement Algorithms using FPGA”, 2012 8th International Computer Engineering Conference (ICENCO).
[19] Pradeep N, Girisha H, Sreepathi B and Karibasappa K, “Feature extraction of Mammograms”, International journal of -l of Bioinformatics research, Vol 4, 2012.
[20] G N Srinivasa, Shoba G, “Statistical Texture analysis”, Proceedings of world academy of Science and Technology-vol 36, dec 2008.
[21] Wacharasak Siriseriwan and Krung Sinapiromsaran, “ The Effective Redistribution of Imbalance Dataset: Relocating safe-level SMOTEwith Minority outcast handling”, Department of Mathematics and Computer Science, Faculty of Science, Chulalongkorn University, Bangkok 10300, Thailand, 12 Nov 2014.
Citation
Shivani Guldas, "Efficient Learning on Imbalanced Image Set," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.121-126, 2018.
Energy Efficient, Data Centric Routing Algorithm In Mobile Wireless Sensor Nodes (Energy Savings Quantification)
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.127-135, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.127135
Abstract
In this paper, we quantitatively (mathematically) reason the energy savings achieved in a wireless sensor grid network, by using circular leveling and sectoring routing algorithm. Due to the energy constraints on the sensor nodes (in terms of transmission and reception of energy) energy awareness has become crucial in sensor network. We provide analytical expression for the energy wastage that occurs when traditional Data Centric routing algorithm such as Direct Diffusion is utilized. Analytical results are validated through simulation, in NS2 simulator which shows the promising potentials of our leveling and sectoring technique.
Key-Words / Index Term
Wireless Sensor Networks, Routing, Energy Efficiency, Gauss`s Lattice Point
References
[1] George E Andrews. 1994. Number theory. Courier Corporation.
[2] Mohammed Nazeer, G.Rama Murthy, RPratap singh, “Leveling and Sectoring Algorithm: Lattice Point Problem(Quantification of Energy Savings)”. ACM IML conference,United Kingdom 2017, (2017)
[3] Kamal A.E Al-Karaki, J.N. 2004. “Routing techniques in wireless sensor networks: a survey”. IEEE Wireless Communications 11(6), 628 (2004).
[4] Heinzelman, C. A. B., W.R. “Energy-efficient communication protocol for wireless micro sensor networks”. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. 2000
[5] I an akyildiz and varun wireless sensor network 2010 WILEY
[6] Leandro A. Villas, Azzedine Boukerche a, Horacio A.B.F. de Oliveira c,Regina B. de Araujo d, Antonio A.F. Loureiro “A spatial correlation aware algorithm to perform efficient data collection in wireless sensor networks ” Elsevier 2014.
[7] Manjeshwar, A.; Agarwal, D. P. 16th International IEEE “Proceedings of Parallel and Distributed Processing Symposium” pp. 195-202 2002.
[8] Fouzi Semchedine , Louiza Bouallouche-Medjkoune, Moussa Tamert, Farouk Mahfoud,Djamil Aïssani.” Load balancing mechanism for data-centric routing in wireless sensor networks” Computers and Electrical Engineering Elsevier 2014
[9] Ragesh Hajela, Rama Murthy Garimella, and Deepti Sabnani. 2010. “LCSD: Leveling Clustering and Sectoring with Dissemination Nodes to Perform Energy Efficient Routing in Mobile Cognitive Wireless Sensor Networks”. In Computational Intelligence and Communication Networks (CICN), 2010 International Conference on. IEEE, 177–182.
[10]Abhishek Goyal, Navdeep Kaur, Ramamurthy Garimella, et al. 2009. “Distributed energy efficient key distribution for dense wireless sensor networks”. In Computational Intelligence, Communication Systems and Networks, 2009. CICSYN’09. First International Conference on. IEEE, 143–148.
[11] Md Aquil Mirza and Rama Murthy Garimella. 2009. “PASCAL: power aware sectoring based clustering algorithm for wireless sensor networks”. In 2009 International Conference on Information Networking. IEEE, 1–6.
[12] G Lakshmi Phani, K Venkat Sayeesh, K Vinod Kumar, and G Rama Murthy. 2010.”ERFLA: Energy efficient combined routing, fusion, localization algorithm in cognitive WSN”. In 2010 Seventh International Conference on Wireless and Optical Communications Networks-(WOCN). IEEE, 1–5.
[13] Priyanka Sharma and Garimella Rama Murthy. 2014. “Mathematical Modelling of Energy Wastage in Absence of Levelling and Sectoring in Wireless Sensor Networks”. arXiv preprint arXiv:1402.5845 (2014).
Citation
Mohammed Nazeer, Garimella Rama Murthy, "Energy Efficient, Data Centric Routing Algorithm In Mobile Wireless Sensor Nodes (Energy Savings Quantification)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.127-135, 2018.
A Hybrid Approach for Performing Accurate prediction of Green Products using Recommender System
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.136-139, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.136139
Abstract
Today many distinct products exists along with the configuration. Technology is advancing as well, proposed system deals with recommender system based on KNN clustering techniques. KNN along with filtering mechanism is introduced as a base mechanism to predict most likely products to be promoted through the recommender system. Simulation results indicates that the C-KNN (Content based K nearest neighbour technique is better than individual approaches of KNN and content based filtering.
Key-Words / Index Term
Configuration, Recommender system, KNN, C-KNN
References
[1] Jabbar MA, Deekshatulu BL, Chandra P. Classification of Heart Disease Using K- Nearest Neighbor and Genetic Algorithm. Procedia Technol [Internet]. Elsevier B.V.; 2013;10:85–94. Available from: http://dx.doi.org/10.1016/j.protcy.2013.12.340
http://www.sciencedirect.com/science/article/pii/S2212017313004945
[2] Enriko IKA, Suryanegara M, Gunawan D. Heart Disease Prediction System using k-Nearest Neighbor Algorithm with Simplified Patient ’ s Health Parameters. 1843;8(12).
[3] Berka, T., & Plößnig M. Designing Recommender Systems for Tourism. Proc ENTER 2004. 2004;
[4] Wanaskar UH, Vij SR, Mukhopadhyay D. A Hybrid Web Recommendation System Based on the Improved Association Rule Mining Algorithm. J Softw Eng Appl [Internet]. 2013;2013(August):396–404. Available from: http://www.scirp.org/journal/PaperInformation.aspx?paperID=35243#.U1XQhF5YzWo
[5] Berkovsky S, Freyne J. Web Personalization and Recommender Systems. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD ’15 [Internet]. New York, New York, USA: ACM Press; 2015 [cited 2016 Feb 18]. p. 2307–8. Available from: http://dl.acm.org/citation.cfm?id=2783258.2789995
[6] Bourke S. The Application of Recommender Systems in a Multi Site, Multi Domain Environment. In: Proceedings of the 9th ACM Conference on Recommender Systems - RecSys ’15 [Internet]. New York, New York, USA: ACM Press; 2015 [cited 2016 Feb 18]. p. 229–229. Available from: http://dl.acm.org/citation.cfm?id=2792838.2799495
[7] Choi IY, Kim JK, Ryu YU. A Two-Tiered Recommender System for Tourism Product Recommendations. In: 2015 48th Hawaii International Conference on System Sciences [Internet]. IEEE; 2015 [cited 2016 Feb 18]. p. 3354–63. Available from: http://dl.acm.org/citation.cfm?id=2760444.2761472
[8] General Chair-Bergman L, General Chair-Tuzhilin A, Program Chair-Burke R, Program Chair-Felfernig A, Program Chair-Schmidt-Thieme L. Proceedings of the third ACM conference on Recommender systems. In: Proceedings of the third ACM conference on Recommender systems [Internet]. ACM; 2009 [cited 2016 Feb 18]. Available from: http://dl.acm.org/citation.cfm?id=1639714
[9] Hong H-K, Park K-W, Lee D-H. Tag recommendation system for multimedia retrieval in mobile Environment. In: The 18th IEEE International Symposium on Consumer Electronics (ISCE 2014) [Internet]. IEEE; 2014 [cited 2016 Feb 18]. p. 1–2. Available from: http://ieeexplore.ieee.org/articleDetails.jsp?arnumber=6884307
[10] Lee Y-L, Huang F-H. Recommender system architecture for adaptive green marketing. Expert Syst Appl [Internet]. Pergamon Press, Inc.; 2011 Aug 1 [cited 2016 Feb 18];38(8):9696–703. Available from: http://dl.acm.org/citation.cfm?id=1967763.1968016
[11] Schafer J Ben, Konstan J, Riedi J. Recommender systems in e-commerce. In: Proceedings of the 1st ACM conference on Electronic commerce - EC ’99 [Internet]. New York, New York, USA: ACM Press; 1999 [cited 2015 Dec 2]. p. 158–66. Available from: http://dl.acm.org/citation.cfm?id=336992.337035
[12] Baltrunas L. Context-Aware Collaborative Filtering Recommender Systems. 2011;4(April):172.
[13] Resnick P, Varian H. Recommender systems. Commun ACM [Internet]. 1997;1–21. Available from: http://dl.acm.org/citation.cfm?id=245121
Citation
Jatinder Kaur, Rajeev Kumar Bedi, S.K. Gupta, "A Hybrid Approach for Performing Accurate prediction of Green Products using Recommender System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.136-139, 2018.
Survival Prediction of Myocardial Infarction Disease using Cloud Assistance
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.140-143, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.140143
Abstract
E-healthcare system have been increasingly facilitating health condition monitoring, early intervention and evidence based medical treatment by accepting the Personal Health Information (PHI) of the patients. Myocardial Infarction is one of the most leading cause variations in the health condition and that can be lead to the death of the human being. The early prediction of such disease can reduce or prevent development of it and helps to take the necessary treatment. The proposed system is one efficient tool to predicting such diseases. This system can learn from the past data of those patients to be capable of predicting the survival of death of the patient with myocardial infarction. The health information data of the patients who are suffering from such disease is collected and stored. It consists survival period and some clinical data of patients who suffered from myocardial infarction can be used to train an intelligent system to predict the survival or death of current myocardial infarction patients. The Gaussian Naïve Bayes algorithms are used to train the collected data of patients and generalize the survival or death of current patients suffering from myocardial infarction. Experimentally, the instances are stored in the cloud and used as the trained instance. The test data will be provided by the physician to predict the survival or death of the current patient suffering from myocardial infarction.
Key-Words / Index Term
E-healthcare system, Authentication, Cloud, Myocardial infarction, Gaussian naïve Bayes classifier algorithm, survival prediction
References
[1]. Jun Zhou, Zhenfu Cao, Senior Member, IEEE, Xiaolei Dong, and Xiaodong Lin, Senior Member, IEEE, “PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems”, IEEE journal of selected topics in signal processing vol 9, no 7, October 2015.
[2]. M. Lichman, UCI Machine Learning Repository [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California, School of Information and Computer Science. 2013.
[3]. Abdulkader Helwan, Dilber Uzun Ozsahin, Rahib Abiyev, John Bush, “One-Year Survival Prediction of Myocardial Infarction, (IJACSA) International Journal of Advanced Computer Science and Applications, vol 8, no 6, 2017.
[4]. J. Zhou, Z. Cao, X. Dong, and X. Lin, “TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems,” in Proc. IEEE INFOCOM, 2015.
[5]. J. Zhou, X. Lin, X. Dong, and Z. Cao, “PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system,” IEEE Trans. Parallel Distrib. Syst., to be published.
[6]. L. Gatzoulis and L.lakovidis, “ wearable and portable E-health systems”, IEEE Eng. Med. Biol., MF., vol 26, no. 5, pp. 51-56, sep-oct. 2007.
[7]. AS. Mullasari, P. Balaji, and T. Khando, “Managing complications in acute myocardial infarction”, Journal of the Association of Physicians of India 59, pp. 43-8, 2011.
[8]. BW. Karlson, J. Herlitz, O. Wiklund, A. Richter, and A. Hjalmarson, “Early prediction of acute myocardial infarction from clinical history, examination and electrocardiogram in the emergency room”. The American journal of cardiology 68 (2), pp. 171-175, 1991.
Citation
Patil C.N., Sumana.M., "Survival Prediction of Myocardial Infarction Disease using Cloud Assistance," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.140-143, 2018.
CRITICAL ANALYSIS ON CRYPTOCURRENCY
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.144-148, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.144148
Abstract
A cryptocurrency is a digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of this security feature. A defining feature of a cryptocurrency, and arguably its most endearing allure, is its organic nature; it is not issued by any central authority, rendering it theoretically immune to government interference or manipulation. The anonymous nature of cryptocurrency transactions makes them well-suited for a host of nefarious activities, such as money laundering and tax evasion. The first cryptocurrency to capture the public imagination was Bitcoin, which was launched in 2009 by an individual or group known under the pseudonym Satoshi Nakamoto. As of September 2015, there were over 14.6 million bitcoins in circulation with a total market value of $3.4 billion. Bitcoin`s success has spawned a number of competing cryptocurrencies, such as Litecoin Namecoin and PPCoin.
Key-Words / Index Term
cryptocurrency,bitcoin,litecoin
References
[1]. Sonali singh , Arfiha Khatoon , Sarvesh Kumar , Harshita Chawala “An Analysis of cryptocurrency”,IEEE Confrence,2018
[2]. Prasanta Kumar Dey “Cryptocurrency”:-few words on digital money”, IJTSRD, May-June 2018.
[3]. Mahendra Kumar Shrivas, Thomas Yeboah, “A Crictal Review of Cryptocurrency Systems”, Texila International Journal of Academic Research
[4]. Volume 4, Issue 2, Dec 2017.
[5]. Lewis Tseng, “Bitcoin’s Consistency Property”, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing.
[6]. Florian Tschorsch and Bj¨orn Scheuermann , “Bitcoin and Beyond: A Technical Survey onDecentralized Digital Currencies”, IEEE COMMUNICATION SURVEYS & TUTORIALS,2015.
[7]. Christopher J. Pavlovski, “Reference Architecture for Cryptocurrency in Banking”, IT in Industry, vol. 3, no. 3, 2015.
Citation
R. Sujeetha A.P., Sarthak Haldar, Bijoy Krishna Saha, Pranjal Katyayan, "CRITICAL ANALYSIS ON CRYPTOCURRENCY," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.144-148, 2018.
Mapping Of Pulmonary Disease Ontology Terms Using Graph Stream
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.149-152, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.149152
Abstract
Since long, organizations have been looking for information sources that can store data which can provide structured organization and focuses on meaning access of data. Sematic web helps a lot in this context to retrieve meaningful data. This paper emphasizes on mapping developed ontology terms and their retrieval with the help of Graph Stream. We developed an ontology for Pulmonary diseases which consists of classes , objects, relations, and their properties and division of diseases is given as sub classes and Levenshtein’s Edit system algorithm has been used for similarity calculations. The generated ontology has been sent for preprocessing and is fed to Graph Stream for graph generation. The results produced are comparable to the results of human annotators.
Key-Words / Index Term
Ontology mapping, pulmonary diseases, similarity calculations, graph generation, human evaluation
References
[1] A Kivela, E Hyvonen .”Ontological theories for the Semantic Web”, Helsinki: HIIT Publications, 2002, pp.111- 136
[2] T Gruber, ”Towards principles for the design of ontologies used for knowledge sharing”, International Journal of Human-Computer Studies .Vol. 43(5/6), pp.907-928. 1995
[3] Harmelen, Frank & Lifschitz, Vladimir & Porter, Bruce. (2007).” The Handbook of Knowledge Representation”. Elsevier Science San Diego, USA. 1034.
[4] Marvin Minsky. 1974. A Framework for Representing Knowledge. Technical Report. Massachusetts Institute of Technology, Cambridge, MA, USA.
[5] J. Han and Y. Fu. “Dynamic generation and renement of concept hierarchies for knowledge discovery in databases”. In Proc. AAAI`94 Workshop on Knowledge Discovery in Databases(KDD`94), Seattle, WA, 157-168, 1994.
[6] J. Han. Mining knowledge at multiple concept levels. In Proc. 4th Int. Conf. on Information and Knowledge Management (CIKM`95), Baltimore, Maryland, 19-24, 1995.
[7] Bali, R.K., 2000. Towards a qualitative informed model for EPR implementation: Considering organizational culture. Proceeding of the IEEE International Conference on Information Technology Applications in Biomedicine (ITABITIS), Arlington, USA., pp: 353-358.
[8] Bose, R., 2003. Knowledge management-enabled health care management systems: Capabilities, infrastructure and decision-support. Exp. Syst. Appl., 24: 59-71
[9]A. Gómez-PérezOntology evaluationHandbook on Ontologies (first ed.), Springer, Berlin (2004)pp. 251–275
[10] Zweigenbaum, J. Bouaud, B. Bachimont, J. Charlet, B. Séroussi, J.- Boisvieux From text to knowledge: a unifying document-oriented view of analyzed medical language Methods Inf. Med., 37 (4–5) (1998), pp. 384-393
[11] Audrey Baneyx, Jean Charlet, Marie-Christine Jaulent, Building an ontology of pulmonary diseases with natural language processing tools using textual corpora, International Journal of Medical Informatics,Volume 76, Issues 2–3,2007.
[12]J. Simon, M. Dos Santos, J. Fielding, B. SmithFormal ontology for natural language processing and the integration of biomedical databases Int. J. Med. Inf., 75 (3–4) (2006), pp. 224-231
[13]J. Charlet, B. Bachimont, M.-C. JaulentBuilding medical ontologies by terminology extraction from texts: a proposalComput. Biol. Med. (2005)
[14] J. Euzenat and P. Shvaiko Ontology Matching, 2007, ISBN: 978-3 540-49611-3, Springer Berlin Heidelberg, New York
[15] Rishin, Haldar, Debajyoti Mukhopadhyay, Levenshtein Distance Technique in Dictionary Lookup Methods: An Improved Approach, arXiv preprint arXiv: 1101.1232, 2011.
[16] C. Dharma Devi, S. Thaddeus “Information Retrieval Mechanism for Dynamic Health Care” International Journal of Computer Sciences and Engineering Vol.-6, Issue-9, Sept. 2018
Citation
P. Radhika, P. Suresh Verma, N. Lakshmi Kalyani, P. Rama Krishna, "Mapping Of Pulmonary Disease Ontology Terms Using Graph Stream," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.149-152, 2018.
Visual Analytics: Need, Process, Scope, Tools & Techniques and Challenges
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.153-158, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.153158
Abstract
Visual analytics employs interactive visualizations to integrate users’ knowledge and inference capability into numerical/algorithmic data analysis processes. It is an active research field that has applications in many sectors, such as security, finance, and business.. This paper aims at providing an overview of visual analytics, need, scope, tools and techniques and the most important technical research challenges in the field.
Key-Words / Index Term
visual analytics, information visualization, data analysis, user interaction
References
[1] K. Parimala, G. Rajkumar, A. Ruba, S.Vijayalakshmi,” Challenges and Opportunities with Big Data” International Journal of Scientific Research in Computer Sciences and Engineering, Vol.5, Issue.5, pp.16-20, October (2017)
[2] Shilpa M Patil, Dr. H S Guruprasad,” A Study on Visual Analytics” International Journal of Computer Science and Information Technology Research, Vol. 3, Issue 1, pp: (303-308), Month: January - March 2015.
[3] Yuzuru Tanaka, Jonas Sjobergh, Keisuke Takahashi,” A Need for Exploratory Visual Analytics in Big Data Research and for Open Science, 2016.20th international Conference information Visualization (IV), ISSN: 2375-0138, DOI: 10.1109/IV.2016.42
[4] Keim D A, Kohlhammer J, Ellis G, Mansmann F. Mastering the Information Age: Solving Problems with Visual Analytics. Florian Mansmann, 2010.
[5] https://www.proschoolonline.com/blog/visual-analytics-need-model-tools-applications-2/[4].
[6] http://www.vismaster.eu/faq/the-visual-analytics-process/[5].
[7] Daniel A. Keim, Florian Mansmann, J ̈orn Schneidewind, Jim Thomas, and Hartmut Ziegler” Visual Analytics: Scope and Challenges”,First Publ in: Lecture notes in Computer Science No: 4404(2008), pp 76-79[6].
[8] https://searchbusinessanalytics.techtarget.com/definition/big-data-analytics.
[9] http://infinitylimited.co.uk/visual-analytics-key-attributes-scope-and-advantages/
[10] https://www.softwareadvice.com/bi/visual-analytics-tools-comparison/
[11] https://x.smu.edu.sg/node/68.
[12] http://www.visual-analytics.eu/faq/
[13] Boyd, D. and Crawford, K.,Critical Questions for Big Data, Information, Communication & Society, May 2012.
[14] Keim, D.A., Kohlhammer, J., Pohl, M., Santucci, G., Solving Problems with Visual Analytics, Procedia Computer Science, 2011.
[15] Czerwinski,M., DeLine, R., Drucker, S., Fisher, D.,Interactions with Big Data Analytics, 2012.
Citation
R. Shankar, S. Duraisamy, "Visual Analytics: Need, Process, Scope, Tools & Techniques and Challenges," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.153-158, 2018.
Pre-processing Phase of Automatic Text Summarization for the Assamese Language
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.159-163, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.159163
Abstract
Pre-processing is the first and important phase of automatic text summarization. Pre-processing helps in normalizing a text document and generating a structured representation of the text. Major pre-processing tasks include segmentation, tokenization, stop-word removal, stemming and lemmatization. In this paper, we discuss these pre-processing tasks required for automatically summarizing Assamese text documents. Both Stemming and lemmatization play an important role in the pre-processing phase of morphologically rich highly inflected language like Assamese. We present a corpus based approach for stemming the Assamese words using n-gram similarity matching technique. We also propose a hybrid method for lemmatization of the Assamese verbs to obtain the grammatically correct root of a verb. Assamese verbs are the most inflectional compared to other word categories. Stemming alone is not sufficient to find the original roots in case of Assamese verbs. So, after segmentation, tokenization and stop-word removal we first apply stemming to all the words in the text document irrespective of their grammatical categories and then apply lemmatization to only the Assamese verbs. For identifying the Assamese verbs we use a look-up dictionary which contains a list of possible stems along with the corresponding lemma of the verbs.
Key-Words / Index Term
Pre-processing, Summarization, Stemming, Lemmatization, n-gram
References
[1] Maryam Kiabod, Mohammad Naderi Dehkordi and Sayed Mehran Sharafi, “A Novel Method of Significant Words Identification in Text Summarization”, Journal of Emerging Technologies in Web Intelligence, Vol. 4, No. 3, August, 2012.
[2] Joel Larocca Neto, Alex A. Freitas, Celso A. A. Kaestner, “Automatic Text Summarization using a Machine Learning Approach”, Proceeding SBIA `02 Proceedings of the 16th Brazilian Symposium on Artificial Intelligence: Advances in Artificial Intelligence Pages 205-215 November 11 - 14, 2002.
[3] Gordon, Raymond G., Jr. (ed.). “Ethnologue: Languages of the World”, Fifteenth edition. Dallas, Tex.: SIL International, 2005.
[4] Dipanjan Das, André FT Martins. "A survey on automatic text summarization." Literature Survey for the Language and Statistics II course at CMU 4,192-195, 2007.
[5] Prachi Shah, Nikita P. Desai, “A Survey of Automatic Text Summarization Techniques for Indian and Foreign Languages”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) – 2016.
[6] Silla, C.N., Kaestner, C.A.A. “An Analysis of Sentence Boundary Detection Systems for English and Portuguese Documents” In: Gelbukh A. (eds) Computational Linguistics and Intelligent Text Processing. CICLing 2004. Lecture Notes in Computer Science, vol 2945. Springer, Berlin, Heidelberg.
[7] Moral, C., de Antonio, A., Imbert, R. & Ramírez, J. “A survey of stemming algorithms in information retrieval/ Information Research”, 19(1) paper 605.
[8] Banikanta Kakati. “Assamese, Its Formation and Development”. LBS Publication, G.N.B. Road, Guwahati, fifth edition, 1995.
[9] Golok Chandra Goswami, “Structures of Assamese”. Department of Publication, Gauhati University, 1982.
[10] Nitin Indurkhya , Fred J. Damerau, “Handbook of Natural Language Processing”, Chapman & Hall/CRC, 2010.
[11] Tuomo Korenius , Jorma Laurikkala , Kalervo Järvelin , Martti Juhola, “Stemming and lemmatization in the clustering of finnish text documents”, Proceedings of the thirteenth ACM international conference on Information and knowledge management, Washington, D.C., USA ,November 08-13, 2004.
[12] Plisson Joel, Lavrac Nada and Mladenic Dunja. “A rule based approach to word lemmatization”, Proceedings of the 7th International Multi-Conference Information Society IS. 2004.
[13] M. F. Porter “An algorithm for suffix stripping. Program”, 14(3): 130-137. 1980
[14] Adamson, G. W. & Boreham, J., "The use of an Association Measure Based on Character Structure to identify Semantically Related Pairs of Words and Document Titles", InformationStorage and Retrieval 10, pp 253-260, 1974.
[15] Akinwale, A.T., Niewiadomski, A E Cient “Similarity Measures for Texts Matching” Journal of Applied Computer Science Vol. 23 No. 1,pp. 7-28, 2015,
[16] Kleinberg, J. & Tardos, É. “Algorithm Design”, Addison Wesley, 2006.
Citation
Gunadeep Chetia, Gopal Chandra Hazarika, "Pre-processing Phase of Automatic Text Summarization for the Assamese Language," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.159-163, 2018.
Traffic Analysis Attacks Over Networks of Anonymous Communication
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.164-171, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.164171
Abstract
The Infrastructure of Onion routing has major feature which is its flexibility and that is common to all kind of distributed systems. The Onion routing approach offers anonymous data transfer scheme worldwide. The traffic analysis method can be used to break anonymity of the anonymous network, for example TORs (The Onion Routing). Traffic confirmation attacks in low latency networks, mixing networks and in other similar networks are active fields of research. The main idea behind this research is traffic confirmation and analysis of attacks in anonymous communication. Traffic confirmation attacks are used in this research to make successful analysis of traffic of communicating parties over anonymous communication on Internet. It is described in detail that the nature of dropping the packets of Tor Protocol (the onion router) can put anonymity in danger and can harm it. In this paper advantage has been taken of forward compatibility feature by TOR to perform a new drop mark attack and also explained about different traffic confirmation attacks.
Key-Words / Index Term
TOR, Services, Security, Privacy, Attacks, Anonymity, Traffic Analysis
References
[1] “Traffic Analysis.” Wikipedia, Wikimedia Foundation, Aug. 2018, en.wikipedia.org/wiki/ Traffic_analysis.
[2] Leuven, K.U. Introducing Traffic Analysis Attacks, Defences and Public Policy Issues. Dec. 2005, www0.cs.ucl.ac.uk/staff/G.Danezis/talks/TAIntro-prez.pdf.
[3] Murdoch, Steven J., and George Danezis. "Low-cost traffic analysis of Tor." Security and Privacy, 2005 IEEE Symposium on. IEEE, 2005.
[4] Borisov, N., D Anezis, G., Mittal, P.,And Tabriz, P.” Denial of service or denial of security? How attacks on reliability can compromise anonymity. In CCS ’07: Proceedings of the 14th ACM onference on Computer and communications security (New York, NY, USA, October 2007), ACM, pp. 92–102
[5] Pappas, V., A Thanasopoulos , E., Ioannidis, S.,And Markatos, E. P. Compromising anonymity sing packet spinning. In Proceedings of the 11th Information Security Conference (ISC 2008) (2008), T.-C. Wu, C.-L. Lei, V. Rijmen, and D.-T. Lee, Eds., vol. 5222 of Lecture Notes in computer Science, Springer,pp. 161–174.
[6] A. Back, U. Moller, and A. Stiglic, “Traffic analysis attacks and trade-offs in anonymity providing systems,” Lecture Notes in Computer Science, vol. 2137, no. 245-257, p. 76, 2001.
[7] Evans, Nathan S., Roger Dingledine, and Christian Grothoff. "A Practical Congestion Attack on Tor Using Long Paths." USENIX Security Symposium. 2009.
[8] A. Acquisti, R. Dingledine, and P. Syverson. On the economics of anonymity. In R. N. Wright, editor, Financial Cryptography. Springer-Verlag, LNCS 2742, 2003.
[9] A. Hintz. Fingerprinting websites using traffic analysis. In R. Dingledine and P. Syverson, editors, Privacy Enhancing Technologies (PET 2002), pages 171-178. Springer-Verlag, LNCS 2482, 2002.
[10] Rochet, Florentin, and Olivier Pereira. "Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols." Proceedings on Privacy Enhancing Technologies 2018.2 (2018): 27-46.
[11] Ling, Zhen, et al. "Extensive analysis and large-scale empirical evaluation of Tor bridge discovery." INFOCOM, 2012 Proceedings IEEE. IEEE, 2012.
[12] Syverson, Paul, R. Dingledine, and N. Mathewson. "Tor: The second generation onion router." Usenix Security. 2004.
[13] X. Fu, Z. Ling, J. Luo, W. Yu, W. Jia, and W. Zhao. “One cell is enough to break tor’s anonymity”, In Proceedings of Black Hat Technical Security Conference, pages 578–589.Citeseer, 2009.
[14] A. Biryukov, I. Pustogarov, and R.-P. Weinmann. Trawling for Tor Hidden services: Detection, measurement, deanonymization In Proceedings of the 2013 IEEE Symposium on Security and Privacy, May 2013.
[15] Top-1000 alexa data set. http://s3.amazonaws.com/alexa-static/top-1m.csv.zip, 2017. Accessed: 2017-05-20.
[16] Ling, Zhen, et al. "Extensive analysis and large-scale empirical evaluation of Tor bridge discovery." INFOCOM, 2012 Proceedings IEEE. IEEE, 2012.
[17] Diaz, C., Preneel, B.: Taxonomy of mixes and dummy traffic. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) SEC 2004. IIFIP, vol. 148, pp. 217–232. Springer, Boston, MA (2004).
[18] Kohls, Katharina Siobhan, and Christina Pöpper. "POSTER: Traffic Analysis Attacks in Anonymity Networks." Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 2017.
Citation
Parul, Narinder Sharma, "Traffic Analysis Attacks Over Networks of Anonymous Communication," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.164-171, 2018.
Predicting Student Performance using Data Mining
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.172-177, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.172177
Abstract
Data mining focuses on collection information from knowledge bases or data warehouses and therefore the info collected that had never been famous before, it`s valid and operational. today instructional data processing is associate rising discipline, involved with varied Approaches like Predicting student performance, Analysis and visual image of information, Providing feedback for supporting instructors, Recommendations for college students, Social network analysis and then thereon mechanically extracts that means from giant repositories of information generated by or associated with people`s learning activities in instructional setting. One of the most important challenges is to enhance the standard of the academic processes therefore on enhance student’s performance. Thus, it`s crucial to line new ways and plans for an improved management of the present processes. This model helps to predict student’s future learning outcomes mistreatment knowledge sets of senior students.
Key-Words / Index Term
Data Mining, Educational Data Mining
References
[1] Crist´obal Romero, Member, IEEE, and Sebasti´an Ventura, Senior Member, IEEE, “Educational Data Mining: A Review of the State of the Art ” VOL. 40, NO. 6, NOVEMBER 2010.
[2] Parneet Kaura, Manpreet Singhb ,Gurpreet Singh Josanc “Classification and Prediction based DataMining Algorithms to Predict Slow Learners in Education Sector” Science Direct Procedia Computer Science 57 ( 2015 ) 500 – 508 2015 (ICRTC- 2015).
[3] Renza Campagni, Donatella Merlini, Renzo Sprugnoli, Maria Cecilia Verri, “DataMining Models for Student Careers”, Science Direct - Expert Systems with Applications 42 (2015) 5508–5521.
[4] Harwatia, Ardita Permata Alfiania, Febriana Ayu Wulandari,” Mapping Student’s Performance Based on Data Mining Approach”, Science Direct Agriculture and Agricultural Science Procedia3 (2015) 173 – 177.
[5] Manolis Chalaris, Stefanos Gritzalis, Manolis Maragoudakis, Cleo Sgouropoulou and Anastasios Tsolakidis,“ Improving Quality of Educational Processes Providing New Knowledge using Data Mining Techniques”, Science Direct - Procedia - Social and Behavioral Sciences 147 ( 2014 ) 390 – 397.
[6] V.Ramesh Assistant Professor Department of CSA, SCSVMV University Kanchipuram India “Predicting Student Performance: A Statistical and Data Mining Approach”, International Journal of Computer Applications (0975 – 8887) Volume 63– No.8, February 2013 35.
[7] Krpan, Slavomir Stankov, “Educational Data Mining for Grouping Students in E-learning System”, Proceedings of the ITI 2012 34th Int. Conf. on Information Technology Interfaces, June 25 – 28, 2012, Cavtat, Croatia.
[8] Dursun Delen, “A Comparative Analysis of Machine Learning Techniques for Student Retention Management”, Science Direct - Decision Support Systems 49 (2010) 498–506.
[9] Ali Buldua, Kerem Üçgüna, “DataMining Application on Students’ Data”, Science Direct - Procedia Social and Behavioral Sciences 2 (2010) 5251–5259.
[10] Jiawei Han , Micheline Kamber , Jian Pei ,”Data Mining: Concepts and Techniques”, Third Edition (The Morgan Kaufmann Series in Data Management Systems) 3rd Edition.
[11] http://www.intechopen.com/books/theory-and-applications-for-advanced-text-mining
[12] Nurbiha A Shukora , Zaidatun Tasira, Henny Vander Meijden, “An Examination of Online Learning Effectiveness using DataMining”,Science Direct - Procedia - Social and Behavioral Sciences 172(2015) 555 –562.
Citation
Mabel Christina, "Predicting Student Performance using Data Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.172-177, 2018.