An Effective Trust-aware Authentication Framework for Cloud Computing Environment
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.125-137, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.125137
Abstract
Although cloud computing has become one of the basic utility in ICT era with several benefits like rapid elasticity, resource pooling broad network access, and on-demand self-service, it introduces dozens of dirty security threats too. An effective authentication protocol is the basis, topmost prioritized and emergence one for the secure cloud communications. As a result, in this article an effective trust-aware authentication framework is proposed based on n-party multi-linear key pairing functions, trust and reputation aggregation functions and time-based dynamic nonce generation. In addition to formulating an effective authentication protocol, we have analyzed the mutual authentication and formal security strength by using cryptographic GNY belief logic which will prove proposed protocol not only meets intended mutual authentication, but also justifies the security strength against the impersonation and ephemeral secret leakage attacks.
Key-Words / Index Term
Mutual Authentication, Single Sign-On, Elliptic-Curve, Cloud Service Provider, Identity Provider, Trustee
References
[1] Shane Mitchell, Nicola V et al. “The Internet of Everything for Cities”, https://www.cisco.com/c/dam/en_us/solutions/industries/docs/gov/everything-for-cities.pdf, June 2013.
[2] Bob Violino, “The dirty dozen: 12 top cloud security threats for 2018”, https://www.csoonline.com/article/3043030/security/12-top-cloud-security-threats-for-2018.html, January 5, 2018.
[3] Holger Schulze, “Cloud security report 2018” https://pages.cloudpassage.com/rs/857-FXQ-213/images/2018-Cloud-Security-Report%20%281%29.pdf.
[4] Tim Mather and SubraKumaraswamy, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance”, http://www.di.fc.ul.pt/~nuno/PAPERS/security3.pdf, 2009.
[5] Jaikumar Vijayan, “Amazon downplays report highlighting vulnerabilities in its cloud service”. http://www.computerworld.com/s /article/9140074/Amazon_downplays_report_highlighting_vulnerabilities_in_its_cloud_service, October 2009.
[6] What is OpenID, OAuth2 and Google Sign In? https://www.youtube.com/watch?v=1M6gqoGiO2s&t=25s, DBA publications, April 20, 2017.
[7] Deep Dive into OAuth for Connected Apps, https://www.youtube.com/watch?v=vlrK3YZ_Fj0.
[8] DBA presenters, “What is OpenID, OAuth2 and Google Sign In?” https://www.youtube.com/watch?v=1M6gqoGiO2s&t=25s, DBA publications, April 20, 2017.
[9] OpenID Foundation, “The OpenID User Interface Extension Best Practices for Identity Providers 2009”. [Online]. Available: http://wiki.openid.net/w/page/12995153/Details-of-UX-Best-Practices-for-OPs
[10] J. M. Alves et al. ”Multi-Factor Authentication with OpenId in Virtualized Environments”, IEEE LATIN AMERICA TRANSACTIONS, VOL. 15, NO. 3, MARCH 2017
[11] Chris Messina, “User Authentication with OAuth 2.0”, https://oauth.net/articles/authentication/.
[12] Chris Messina, “OAuth 1.0, OpenID 2.0 and up next: DiSo”, https://medium.com/chris-messina/tagged/oauth, 2007.
[13] Aloysius Low, Seth Rosenblatt, “Serious security flaw in OAuth, Open ID discovered”, https://www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/, MAY 2, 2014 4:00 AM PDT.
[14] Hargobind Singh, “Deep Dive into OAuth for Connected Apps”, https://www.youtube.com/watch?v=vlrK3YZ_Fj0, October 5, 2015.
[15] Justin Richer, “User Authentication with OAuth 2.0”, https://oauth.net/articles/authentication/, 2012.
[16] Pierluigi Paganini, “One oAuth 2.0 hack, 1 Billion Android App Accounts potentially exposed”, https://securityaffairs.co/wordpress /53081/hacking/oauth-2-0-attack.html. November 5, 2016.
[17] Merritt Maxim, “Tools And Technology: The Identity And Access Management Playbook”, http://www1.janrain.com/rs/253-XLD-026/images/the-forrester-wave-customer-identity-and-access-manageme nt-q2-2017-industry-research.pdf, June 15, 2017.
[18] “Janrain Identity Cloud”, http://www1.janrain.com/rs/253-XLD-026/images/janrain-identity-cloud-datasheet.pdf, 2016.
[19] “Identity and Access Management Resource Guide”, http://certification.salesforce.com/RG_CertifiedIdentityandAccessManagementDesigner .pdf, May 25, 2018.
[20] David Goldsmith, “ForgeRock Identity Platform v5.0”, https://backstage.forgerock.com/docs/platform/5/Platform-5-Platform-Guide.pdf, 2018. https://www.pingidentity.com/content/dam/ping-6-2-assets/Assets/analyst-reports/en/3208-kuppingercole-solutions-custome r-iam.pdf?id=b6322a80-f285-11e3-ac10-0800200c9a66, March 2017.
[21] John Tolbert, “Ping Identity solutions for Customer Identity and Access Management”, https://www.pingidentity.com/content/dam/ping-6-2-assets/Assets/analyst-reports/en/3208-kuppingercole-solutions-custom er-iam.pdf?id=b6322a80-f285-11e3-ac10-0800200c9a66, March 2017.
[22] LoginRadius, “Complete Customer Identity Management” https://www.loginradius.com/press/loginradius-announces-series-a-funding-from-forgepoint-and-microsoft-venture/, July 2018.
[23] Ronny Bjones, “Identity for the 21st Century”, https://www.eema.org/wp-content/uploads/bjones.pdf, 2016.
[24] SaboutNagaraju and LathaParthiban, “SecAuthn: Provably Secure Multi-Factor Authentication for the Cloud Computing Systems”, Indian journal of Science and Technology, Vol 9( 9), March 2016, pp.1-18.
[25] SaboutNagaraju and LathaParthiban, “Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway”,Journal of Cloud Computing: Advances, Systems and Applications (2015) 4:22, pp.1-23.
[26] SaboutNagaraju and S.K.V. Jayakumar, “A Novel Approach for Enabling More Accurate Trust and Reputation Mechanisms with an Efficient and High-Security Remote Authentication in the Cloud Computing Environment”, Indian journal of Science and Technology, Vol 11( 13), April 2018, pp.1-18.
[27] Jia-Lun Tsai and Nai-Wei Lo, “A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services”, IEEE Systems Journal, Vol. 9, No. 3, Sep. 2015, pp. 805-15.
[28] Debiao He et al., “Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services”, IEEE Systems Journal, Vol. 12, No. 2, June 2018, pp. 1621-31.
[29] James Scott, Drew Spaniel, “In 2017, The Insider Threat Epidemic Begins”, https://icitech.org/wp-content/uploads/2017/02/ICIT-Brief-In-2017-The-Insider-Threat-Epidemic-Begins.pdf, February 23, 2017.
[30] L. Gong, R. Needham, and R. Yahalom, “Reasoning about belief in cryptographic protocols” in Proc. 1990 IEEE Computer Society Symp.Research in Security and Privacy, 1990, pp. 234–246.
[31] M. Burrows, M. Abadi, and R. Needham, “A logic of authentication” ACM Trans. Comput. Syst., vol. 23, no. 5, pp. 1–13, 1989.
[32] S. Pearson, “Taking account of privacy when designing cloud computing services” in Proc. CLOUD ICSEWorkshopSoftw. Eng. Challenges CloudComput., 2009, pp. 44–52.
[33] H. Takabi, J. B. D. Joshi, and G. Ahn, “Security and privacy challengesin cloud computing environments” IEEE Security Privacy, vol. 8, no. 6,pp. 24–31, Nov./Dec. 2010.
[34] Z. Xiao and Y. Xiao, “Security and privacy in cloud computing” IEEECommun. Surveys Tuts., vol. 15, no. 2, pp. 843–859, Jul. 2012.
[35] AmlanJyotiChoudhury, Pardeep Kumar, MangalSain, Hyotaek Lim, Hoon Jae-Lee, “A Strong User Authentication Framework for Cloud Computing”, 2011 IEEE Asia -Pacific Services Computing Conference, pp. 110-115, 2011.
[36] J. Yang et al., “A fingerprint recognition scheme based on assemblinginvariant moments for cloud computing communications”, IEEE Syst. J.,vol. 5, no. 4, pp. 574–583, Dec. 2011.
[37] SushmitaRuj, M. Stojmenovic, and A. Nayak, “Decentralized access control with anonymous authentication of data stored in clouds”, IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 384–394, Feb. 2014.
[38] Neil Zhenqiang Gong and Di Wang, “On the Security of Trustee-Based Social Authentications”, IEEE Transactions on Information Forensics And Security, Vol. 9, No. 8, August 2014.
[39] Chin-Ling Chen, Tsai-Tung Yang, Mao-Lun Chiang and Tzay-Farn Shih, “A Privacy Authentication Scheme Based on Cloud for Medical Environment”, J Med Syst (2014) 38:143, pp. 1-16, October 2014.
[40] Hong Liu, HuanshengNing, QingxuXiongand Laurence T. Yang, “Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing”, IEEETransactions On Parallel and Distributed Systems, Vol. 26, No. 1, pp. 241-251, January 2015.
[41] Jun Zhou, Xiaodong Lin, Xiaolei Dong and Zhenfu Cao,“PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System”, IEEE Transactions On Parallel and Distributed Systems, Vol. 26, No. 6, pp. 1693-1703, June 2015.
Citation
SaboutNagaraju, S.K.V. Jayakumar, "An Effective Trust-aware Authentication Framework for Cloud Computing Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.125-137, 2018.
Personal Identification using Local and Global Feature of Finger Vein Patterns using SVM Based Classification
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.138-145, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.138145
Abstract
Personal identification and/or authentication using finger vein pattern is becoming most reliable biometrics in many system securities because of its security, accuracy and convenience. The finger vein pattern based biometrics uses human’s vascular/vein pattern for their unique identification based on the fact that every individual has distinct veins pattern in their fingers. Finger vein pattern biometric trait is robust against the forgery and does not affect due to external factors since it is inherent and hidden under the skin. Therefore, finger vein pattern based biometrics has gained lot of attention of many researchers. This research paper present an approach designed for personal identification using local and global combined features of finger vein pattern. The finger vein pattern local features are extracted using Local Line Binary Pattern and global texture features are extracted using Discrete Wavelet Packet Transform jointly. Feature level fusion method is adopted for constructing the combined feature vector. Then, Support Vector Machine (SVM) based supervised learning algorithm is used for the feature matching and classification. Experiments are conducted using proposed approach on the finger vein image database of Shandong University, China. The experimental results show that proposed approach outperforms the other methods in terms of the recognition accuracy and performance.
Key-Words / Index Term
Finger Vein Recognition, Local Binary Pattern, Line Binary Pattern, Discrete Wavelet Packet Transform, Support Vector Machine (SVM)
References
[1] Eui Chul Lee 1, Hyunwoo Jung and Daeyeoul Kim, “ New Finger Biometric Method Using Near Infrared Imaging”, Sensors, 11, ISSN 1424-8220, pp. 2319-2333, February 2011.
[2] Zhi Liu, Shangling Song, “An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices”, IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, pp. 522-527, May 2012.
[3] S. Damavandinejadmonfared, V. Varadharajan, “Effective finger vein-based authentication: Kernel principal component analysis”, Emerging Trends in Image Processing, Computer Vision and Pattern Recognition, Elsevier, http://dx.doi.org/10.1016/B978-0-12-802045-6.00029-6, 2015.
[4] Ajay Kumar, Yingbo Zhou, “Human Identification using Finger Images”, IEEE Transactions on Image Processing vol. 21, pp. 2228-2244, April 2012.
[5] Santosh P. Shrikhande, Hanumant S. Fadewar, “Personal Identification Using Different Biometrics: A Review”, International Journal of Engineering Research & Technology (IJERT), Vol. 3 Issue 2, pp. 1104-1109, February 2014.
[6] Yingbo Zhou, Ajay Kumar, “Human Identification Using Palm-Vein Images”, IEEE Transactions on Information Forensics and Security, Vol. 6, No. 4, pp. 1259-1274, December 2011.
[7] Lu Yang, Gongping Yang, Yilong Yin and Xiaoming X, “Finger Vein Recognition with Anatomy Structure Analysis”, IEEE Transactions On Circuits And System for Video Technolog,pp. 1-14, 2017.
[8] Jinfeng Yang, Yihua Shi and Jinli Yang, “Personal identification based on finger vein features”, Elsevier, Computers in Human Behavior 27, pp. 1565–1570, November 2010.
[9] Naoto Miura, Akio Nagasaka, Takafumi Miyatake, “Feature extraction of finger vein patterns based on repeated line tracking and its application to personal identification”, Machine Vision and Applications, 15, pp. 194–203, July 2004.
[10] Naoto Miura, Akio Nagasaka, “Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles”, IAPR Conference on Machine Vision Applications, Tsukuba Science City, Japan, pp. 347-50, May 2005.
[11] Cheng Bo Yu, Hua Feng Qin, Lian Zhang, Yan-Zhe Cui, “Finger vein image recognition combining modified hausdorff distance with minutiae feature matching”, J. Biomedical Science and Engineering, pp. 261-272, August 2009.
[12] Eui Chul Lee,1 Hyeon Chang Lee,2 Kang Ryoung Park, “Finger Vein Recognition Using Minutia-Based Alignmentand Local Binary Pattern-Based Feature Extraction”, Wiley Periodicals, Inc, Int J Imaging Syst Technoly,Vol.19 ,pp. 180-186, 2009.
[13] Bakhtiar Affendi Rosdi, Chai Wuh Shing and Shahrel Azmin Suandi, “Finger Vein Recognition Using Local Line Binary Pattern”, Sensors 11, pp. 11357-11371, November 2011.
[14] Jinfeng Yang, Yihua Shi, Jinli Yang, “Personal identification based on finger-vein features”, Elsevier, Computers in Human Behavior, Vol. 27, Isuue.5, pp. 1565–1570, October 2011.
[15] Wang Kejun, Liu Jingyu, Popoola Oluwatoyin, Feng Weixing, “Finger Vein Identification Based On 2-D Gabor Filter”, IEEE, 2nd International Conference on Industrial Mechatronics and Automation, (ICIMA 2010) - Wuhan, China, pp. 10-13, May 2010.
[16] Amnart Petpon and Sanun Srisuk, “Face Recognition with Local Line Binary Pattern”, Fifth IEEE International Conference on Image and Graphics, pp. 533-539, 2009.
[17] Yu Lu, Sook Yoon, Shan Juan Xie, Dong Sun Park, “Finger Vein Identification Using Polydirectional Local Line Binary Pattern”, IEEE International Conference TC pp. 61-65, 2013.
[18] Sangita Bharkad, Manesh Kokare, “Rotated Wavelet Filters-Based Fingerprint Recognition”, International Journal of Pattern Recognition and Artificial Intelligence, Vol. 26, No. 3, pp. 1256008-1- 21, Septmber 2012.
[19] Sangita Bharkad, Manesh Kokare, “Fingerprint Matching using Discreet Wavelet Packet Transform”, 3rd IEEE International Advance Computing Conference (IACC), pp.1184-1188, 2013.
[20] B. S. Manjunath and W.Y. Ma, “Texture Features for Browsing and Retrieval of Image Data”, IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 18, No. 8, pp. 837-842, August 1996.
[21] R. Manthalkar, P.K. Biswas, B.N. Chatterji, “Rotation and scale invariant texture features using discrete wavelet packet transform”, Elsevier, Pattern Recognition Letters 24, pp. 2455–2462, 2003.
[22] Santosh P. Shrikhande, H. S. Fadewar, “Finger Vein Recognition Using Discrete Wavelet Packet Transform Based Features”, IEEE, International Conference on Advances in Computing, Communications and Informatics (ICACCI),pp.1646-1651, August 2015.
[23] Manesh Kokare, P. K. Biswas, B. N. Chatterji, “Texture image retrieval using rotated wavelet filters”, Pattern Recognition Letters 28, pp. 1240–1249, February 2007.
[24] Yilong Yin, Lili Liu, and Xiwei Sun., “SDUMLA-HMT - A Multimodal Biometric Database”, Springer-Verlag Berlin Heidelberg, LNCS 7098, pp. 260-268, 2011.
[25] Xianjing Meng, Gongping Yang, Yilong Yin and Rongyang Xiao, “Finger Vein Recognition Based on Local Directional Code”, Sensors, 12, pp.14937-14952, 2012.
[26] Xiaoming Xi, Gongping Yang, Yilong Yin and Xianjing Meng, “Finger Vein Recognition with Personalized Feature Selection” Sensors 2013, 13, pp.11243-11259, ISSN 1424-8220.
[27] Souad Khellat-kihel, Reza abrishambaf, Nuno Cardoso, João Monteiro, Mohamed Benyettou, “Finger Vein Recognition Using Gabor Filter and Support Vector Machine”, IEEE Conference IPAS’14, International Image Processing Applications and Systems, pp.1-6, 2014.
[28] Kang Ryoung Park, “Finger vein Recognition By combining Global and Local Features Based on SVM”, Computing and Informatics, Vol. 30, 2011, pp. 295–309, 2011.
[29] Jian-Da Wu, Chiung-Tsiung Liu, “Finger-vein pattern identification using SVM and neural network technique”, Expert Systems with Applications 38 (2011), pp. 14284–14289, 2011.
[30] Gongping Yang, Xiaoming Xi, and Yilong Yin, “Finger Vein Recognition Based on a Personalized Best Bit Map”, Hand-Based Biometrics Sensors and Systems, 12 pp.1738-1757, February 2012.
[31] Santosh P. Shrikhande, H. S. Fadewar, “ Finger Vein Recognition using Rotated Wavelet Filters”, International Journal of Computer Applications (0975 – 8887) Volume 149 – No.7, pp. 28-33, September 2016.
[32] Nurhafizah Mahri, Shahrel Azmin Sundi Suandi, and Bakhtiar Affendi Rosdi, “Finger Vein Recognition Algorithm Using Phase Only Correlation”, IEEE International Conference on Emerging Techniques and Challenges for Hand-Based Biometrics (ETCHB), pp. 1-6, August 2010.
[33] Jialiang Peng, Qiong L I, Ahmed A, “ Finger vein recognition with Gabor wavelet and Local Binary Pattern”, IEICE Transaction and System Vol. E.96-D, pp.188-1889, August 2013.
[34] Di Cao, Jinfeng Yang, Yihua Shi, Chenghua Xu, “Structure Feature Extraction for Finger-veinRecognition” Second IAPR Asian Conference on Pattern Recognition, pp. 567-571, 2013.
Citation
Santosh P. Shrikhande, H. S. Fadewar, "Personal Identification using Local and Global Feature of Finger Vein Patterns using SVM Based Classification," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.138-145, 2018.
A Study on γ - Optimization Parameter and Phase Margin of Fourth Order Phase-Locked Loop
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.146-150, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.146150
Abstract
A 4th order phase-locked loop model by considering two different filter configurations in the loop have been developed and behavioral simulation has been performed on MATLAB platform to study the impact of gamma-optimization parameter on it and also to study the stability of the system in terms of phase margin. We have also investigated the bandwidth and lock time of the system.
Key-Words / Index Term
Bandwidth, gamma optimization parameter, lock time, phase margin, stability
References
[1] B. K. Mishra, S Save and S Patil, “Design and Analysis of Second and Third Order PLL at 450MHz”, International Journal of VLSI design & Communication Systems (VLSICS), Vol.2, No.1, pp 97-113, March 2011.
[2] S. Goldman, “Phase locked loop engineering handbook for integrated circuits”, Artech House, 2007.
[3] R. Best, Phase Lock Loops: Theory, Design and Applications, Prentice-Hall, 2001.
[4] Clock Conditioner Owner’s manual, First Edition, winter (2006)
[5] Dean Banerjee, “PLL Performance Simulation and Design” 4th edition, Dogear, (2006).
[6] Lin Jia, Kiat Seng Yeo Jian Guo Ma, Manh Anh Do, Xiao Peng Yu, “Noise transfer characteristics and design techniques of a frequency synthesizer”, Analog Integr. Circ. Sig. Process, Vol. 52, pp. - 89-97, 2007.
[7] K. Kalita, and T. Bezboruah, “Impact of - optimization parameters and phase margin on closed loop gain of phase-locked loop”, International Journal of Electronics and Communication Engineering, Vol. 6, No. 3, pp. 225-231, 2013.
Citation
Munmee Borah, Tulshi Bezboruah, "A Study on γ - Optimization Parameter and Phase Margin of Fourth Order Phase-Locked Loop," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.146-150, 2018.
Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.151-156, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.151156
Abstract
In spite of having limited benefits, software clones mostly have negative impact on software quality, more specifically on software maintenance and thus diminishing software quality and raising the maintenance cost. Not all the clones are possible to remove, but, if possible clones need to be removed from the software system. To remove clones, we need to first detect this duplication in the code base. Literature lists various clone detection techniques that are used to detect duplication in software system. To have a better clone detection technique in future or to select from the available clone detection technique, these available techniques found in literature need to be analyzed. This paper attempts to comparatively analyze the clone detection techniques available in literature and thus will present a future scope as well as the recourse based on the analysis for selection of any particular technique.
Key-Words / Index Term
Code Clone Detection, Clone Detection Techniques, Comparative Analysis
References
[1] Ira D. Baxter, Andrew Yahin, Leonardo Moura, Marcelo Sant` Anna, and Lorraine Bier, "Clone Detection Using Abstract Syntax Tree," in Proceedings of 14th International Conference on Software Maintenance(ICSM`98), Bethesda, Mayland, 1998, pp. 368 - 377.
[2] Stefan Bellon, Rainer Koschke, Giuliano Antoniol, Jens Krinke, and Ettore Merlo, "Comparision and Evaluation of Clone Detection Tools," IEEE Transaction on Software Engineering, vol. 33, no. 9, pp. 577 - 591, 2007.
[3] Chanchal K. Roy and James R. Cordy, "A Survey on Software Clone Detection Research," Queen`s University, Kingston, Technical Report 2007-541, 2007.
[4] Minhaz F. Zibran, Ripon K. Saha, Muhammad Asaduzzaman, and Chanchal K. Roy, "Analysing and Forecasting Near-miss Clones in Evolving Software: An Empirical Study," in Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, Las Vegas, USA, 2011, pp. 295-304.
[5] Filip Van Rysselberghe and Serge Demeyer, "Evaluating Clone Detection Techniques from a Refactoring Perspective," in Proceedings of the 19th IEEE international conference on Automated Software Engineering (ASE`04), Linz, Austria, 2004, pp. 336-339.
[6] Chanchal K Roy and JamesR Cordy, "Scenario-Based Comparison of Clone Detection Techniques," in The 16th IEEE International Conference on Program Comprehension, 2008, pp. 153-162.
[7] Chanchal Kumar Roy, James Cordy, and Rainer Koschke, "Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Quantitative Approach," Science of Computer Programming, vol. 74, no. 7, pp. 470 - 495, March 2009.
[8] Dhavleesh Rattan, Rajesh Bhatia, and Maninder Singh, "Software Clone Detection: A Systematic Review," Information and Software Technology, vol. 55, no. 7, pp. 1165-1199, July 2013.
[9] Abdullah Sheheamer and Jugal Kalita, "A Survey of Software Clone Detection Techniques," International Journal of Computer Applications, vol. 137, no. 10, pp. 1 - 21, March 2016.
[10] Brenda Baker, "On Finding Duplication and Near Duplication in Large Software Systems," in Proceedings of the 2nd Working Conference on Reverse Engineering (WCRE`95), 1995, pp. 86-95.
[11] Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue, "CCFinder: A Multilinguistic Token-Based Code Clone Detection System For Large Scale Source Code," IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 654-670, July 2002.
[12] Jens Krinke, "Identifying Similar Code with Program Dependence Graphs," in Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE`01), Stuttgart, 2001, pp. 301-309.
[13] Jean Mayrand, Clande Leblane, and Ettore Merlo, "Experiment on the Automatic Detection of Function Clones in a Software Systems Using Metrics," in Proceedings of International Conference on Software Maintenance (IWSM`96), Monterey, 1996, pp. 244 -253.
[14] Benjamin Hummel, Elmar Juergens, Lars Heinemann, and Michael Conradt, "Index-Based Code Clone Detection: Incremental, Distributed, Scalable," in IEEE International Conference on Software Maintenance, Timisoara, Romania, 2010.
Citation
Sarveshwar Bharti, Hardeep Singh, "Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.151-156, 2018.
Automated Malignancy detection using neural network
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.157-163, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.157163
Abstract
The present medical scenario though it is very trustworthy and reliable because of the latest medical imaging modalities like MRI and CT etc., manual segmentation is prominently used in early malignancy detection, which is time-consuming. So there is a need for the automated method in terms of both accuracy and time requirement, which will provide better insight to the medical expert. Nowadays the machine learning plays an important role in this aspect since it learns through experience. The purpose of this paper is to demonstrate and make comparison of neural network with a traditional approach. We have used computational phantom data set to be considered as medical images and compare the performance of neural network with traditional segmentation by using dice similarity coefficient. The result concludes that even noise increases in medical images, the neural network approach gives high dsc value than traditional techniques.
Key-Words / Index Term
Medical imaging, Sheep Logan phantom dataset, Fuzzy C-means, neural network
References
[1] Doi, Kunio. "Computer-aided diagnosis in medical imaging: historical review, current status and future potential." Computerized medical imaging and graphics ,Vol.4,Issue 5,pp. 198-211,2007
[2] Al-Ayyoub, Mahmoud, and Duha Al-Zghool. "Determining the type of long bone fractures in x-ray images." WSEAS Transactions on Information Science and Applications, Vol.10,Issue 8 ,pp. 261-270,2013
[3] Al-Ayyoub, Mahmoud, Ismail Hmeidi, and Haya Rababah. "Detecting Hand Bone Fractures in X-Ray Images." JMPT Vol 4,Issue 3,pp: 155-168,2013
[4] Nakamoto, T., et al. "A computer-aided diagnosis system to screen for osteoporosis using dental panoramic radiographs." Dentomaxillofacial Radiology, Vol. 37,Issue 5,pp. 274-281,2008
[5] Raja’S, Alomari, et al. "Toward a clinical lumbar CAD: herniation diagnosis." International journal of computer assisted radiology and surgery, Vol. 6,Issue.1,pp. 119-126, 2011
[6] Alawneh K, Al-dwiekat M, Alsmirat M, Al-Ayyoub M.” Computer-aided diagnosis of lumbar disc herniation” Information and Communication Systems, pp 286-291, 2015
[7] Chan, Tao. "Computer aided detection of small acute intracranial hemorrhage on computer tomography of brain." Computerized Medical Imaging and Graphics ,Vol. 31,Issue 5,pp. 285-298,2007
[8] Al-Ayyoub, Mahmoud, et al. "Automatic detection and classification of brain hemorrhages." WSEAS transactions on computers ,Vol.12,Issue 10,pp. 395-405, 2013
[9] El-Dahshan, El-Sayed A., et al. "Computer-aided diagnosis of human brain tumor through MRI: A survey and a new algorithm." Expert systems with Applications, Vol. 41,Issue 11 ,pp.5526-5545, 2014
[10] Al-Ayyoub M, Husari et al. . "Computer-aided diagnosis of human brain tumor through MRI: A survey and a new algorithm." International Conference on Information and Communication Systems, ACM, p 23,2014
[11] Rangayyan, Rangaraj M., Fabio J. Ayres, and JE Leo Desautels. "A review of computer-aided diagnosis of breast cancer: Toward the detection of subtle signs." Journal of the Franklin Institute ,Vol 344..3-4 ,pp.312-348, 2007
[12] Al-Darabsah, Khaldun, and Mahmoud Al-Ayyoub. "Breast cancer diagnosis using machine learning based on statistical and texture features extraction." Proceedings of the 4th International conference on information and communication systems (ICICS 2013). 2013.
[13] Kim, Jin Hwan. "Computer-aided diagnosis for lung cancer." Journal of Lung Cancer 3.2 (2004): 67-70.
[14] Gletsos, Miltos, et al. "A computer-aided diagnostic system to characterize CT focal liver lesions: design and optimization of a neural network classifier." IEEE transactions on information technology in biomedicine ,Vol. 7.3 ,pp. 153-162, 2003
[15] Yoshida, Hiroyuki, and Janne Nappi. "Three-dimensional computer-aided diagnosis scheme for detection of colonic polyps." IEEE transactions on medical imaging ,Vol. 20.12,pp. 1261-1274, 2001
[16] Oqaily, Ala`A., et al. "Localization of coronary artery thrombosis using coronary angiography." The Third international conference on informatics engineering and information science (ICIEIS2014). The Society of Digital Information and Wireless Communication, 2014.
[17] Al-Ayyoub, Mahmoud, et al. "Automatically determining the location and length of coronary artery thrombosis using coronary angiography." International Journal of Computer Science and Information Security ,Vol. 14 ,2016:
[18] Mookiah, Muthu Rama Krishnan, et al. "Computer-aided diagnosis of diabetic retinopathy: A review." Computers in biology and medicine,Vol 4,Issue .12 ,pp. 2136-2155,2013
[19] Al-Ayyoub, Mahmoud, et al. "Accelerating 3D medical volume segmentation using GPUs." Multimedia Tools and Applications, Vol.77,Issue 4 ,pp. 4939-4958, 2018
[20] Jarrah, Moath, et al. "Medgraph: a graph-based representation and computation to handle large sets of images." Multimedia Tools and Applications ,Vol. 76,Issue.2,pp. 2769-2785, 2017McAuliffe, Matthew J., et al. "Medical image processing, analysis and visualization in clinical research." Computer-Based Medical Systems,. Proceedings. IEEE, 2001.
[21] AlZubi, Shadi, Naveed Islam, and Maysam Abbod. "Multiresolution analysis using wavelet, ridgelet, and curvelet transforms for medical image segmentation." Journal of Biomedical Imaging, 2011 .
[22] Lehmann, Thomas Martin, Claudia Gonner, and Klaus Spitzer. "Survey: Interpolation methods in medical image processing." IEEE transactions on medical imaging,Vol. 18.Issue 11,pp. 1049-1075, 1999
[23] Maintz, JB Antoine, and Max A. Viergever. "A survey of medical image registration." Medical image analysisVol 2,Issue 1,pp1-36, 1998
[24] Eklund, Anders, et al. "Medical image processing on the GPU–Past, present and future." Medical image analysis,Vol 17,Issue 8,pp. 1073-1094,2013
[25] Chen Ch, Pau LF, Wang PSp .”Handbook of pattern recognition and computer vision”. World Scientific vol 27 , 2010
[26] Chuang, Keh-Shih, et al. "Fuzzy c-means clustering with spatial information for image segmentation." computerized medical imaging and graphics, Vol 30, Issue 1,pp. 9-15, 2006
[27] Ugarriza, Luis Garcia, et al. "Automatic image segmentation by dynamic region growth and multiresolution merging." IEEE transactions on image processing,Vol.18,Issue 10,pp 2275-2288,2009
[28] Winder, John, and Richard Bibb. "Medical rapid prototyping technologies: state of the art and current limitations for application in oral and maxillofacial surgery." Journal of oral and maxillofacial surgery,Vol 63.Issue 7,pp. 1006-1015, 2005
[29] AlZubi, Shadi, Mhd Saeed Sharif, and Maysam Abbod. "Efficient implementation and evaluation of wavelet packet for 3d medical image segmentation." Medical Measurements and Applications Proceedings (MeMeA), IEEE International Workshop on. IEEE, 2011.
[30] Gach, H. Michael, Costin Tanase, and Fernando Boada. "2D & 3D Sheep- Logan phantom standards for MRI." Systems Engineering, 2008. ICSENG`08. 19th International Conference on. IEEE, 2008.
[31] Collins, D. Louis, et al. "Design and construction of a realistic digital brain phantom." IEEE transactions on medical imaging, vol 17,Issue 3 pp. 463-468, 2005
[32] Feng, Yuncong, et al. "A multi-scale 3D Otsu thresholding algorithm for medical image segmentation." Digital Signal Processing 60,pp. 186- 199, 2017
[33] Wirjadi, Oliver. "Survey of 3d image segmentation methods." 2007
[34] Zou, Yanni, and Bo Liu. "Survey on clustering-based image segmentation techniques."
[35] Jose, Alan, S. Ravi, and M. Sambath. "Brain tumor segmentation using k-means clustering and fuzzy c-means algorithms and its area calculation." International Journal of Innovative Research in Computer and Communication Engineering Vol2,Issue3 ,pp. 32-57,2014
[36] S. Haykin and N. Network, “A comprehensive foundation,” Neural Networks, vol. 2, no. 2004
[37] Sanchez, Ma Guadalupe, et al. "Medical image restoration with different types of noise." Engineering in Medicine and Biology Society (EMBC), 2012 Annual International Conference of the IEEE. IEEE, 2012.
Citation
B.J.Talati, N.D. Shah, "Automated Malignancy detection using neural network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.157-163, 2018.
Analysis of Received Signal Strength under Handoff Condition using Network Simulator 2
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.164-168, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.164168
Abstract
Wireless communication involves a wide variety of technologies, services and applications, developed to satisfy the user’s specific needs in variety of deployment scenarios. The cellular phones are one of the examples of wireless communication application. Globally, the cellular networks have progressed from a simple first generation to fourth generation and probably will be progressing to fifth generation by the end of 2019. Though there is an appreciable progress in the high speed data with the generation, the problem in the voice call still persists, particularly when in motion, due to the continuous changes in the receiving signal. This article aims at improving the QoS by implementing the tele-traffic pattern proposed in earlier 90’s by Steele and Nofal to manage the hand-off mechanism in order to reduce the voice and data degradation during motion and simulating same using Network Simulator 2 for validation. The results of the experimental analysis show that the hand off degradation of voice and data is reduced by the implementation of the said tele-traffic pattern. Hence, proving the proposed energy detection technique on the Steele and Nofal traffic model to be best suited for the handoff situation.
Key-Words / Index Term
Wireless communication, Handoff technique, Network Simulator 2, Analytical energy detection
References
[1] H. A. Gabbar, A. Zidan, and M. Xiaoli, "Data centers for smart energy grids", in Smart Energy Grid Engineering, Elsevier, pp. 433–452, 2017.
[2] S. Ahmadi, "Wireless broadband standards and technologies", Academic Press Library in Mobile and Wireless Communications, Elsevier, pp. 559–619, 2016.
[3] E. Sisinni and F. Tramarin, "Isochronous wireless communication system for industrial automation", Industrial Wireless Sensor Networks, Elsevier, pp. 167–188, 2016.
[4] P. Ganeshkumar, K. P. Vijayakumar, and M. Anandaraj, "A novel jammer detection framework for cluster-based wireless sensor networks", EURASIP Journal on Wireless Communications and Networking, Vol. 2016, Issue. 1, pp. 35, 2016.
[5] B. R. Chandavarkar and G. R. M. Reddy, "Survey Paper: Mobility Management in Heterogeneous Wireless Networks", Procedia Engineering, Vol. 30, pp. 113–123, 2012.
[6] S. S. Soliman and B. Song, "Fifth generation (5G)cellular and the network for tomorrow: cognitive and cooperative approach for energy savings", Journal of Network and Computer Applications, Vol. 85, pp. 84–93, 2017.
[7] H. Cui, H. Tain, H. Xu, and P. Zhang, "The Research on Handoff Strategy in Beyond 3G Wireless Networks", The Journal of China Universities of Posts and Telecommunications, Vol. 13, Issue 2, pp. 26–30, 2006.
[8] G. A. F. Mohamed Khalaf and H. Z. Badr, "A comprehensive approach to vertical handoff in heterogeneous wireless networks", Journal of King Saud University - Computer and Information Sciences, Vol. 25, Issue. 2, pp. 197–205, 2013.
[9] T. Padmapriya and V. Saminadan, "Handoff Decision for Multi-user Multi-class Traffic in MIMO-LTE-A Networks", Procedia Computer Science, Vol. 92, pp. 410–417, 2016.
[10] A. Hamad, E. Morsy, and S. Adel, "Performance analysis of a handoff scheme for two-tier cellular CDMA networks", Egyptian Informatics Journal, Vol. 12, Issue. 2, pp. 139–149, 2011.
[11] A. Sleem and A. Kumar, "Handoff management in wireless data networks using topography-aware mobility prediction", Journal of Parallel and Distributed Computing, Vol. 65, Issue. 8, pp. 963–982, 2005.
[12] T. Velmurugan, S. Khara, S. Nandakumar, and B. Saravanan, "Seamless Vertical Handoff using Invasive Weed Optimization (IWO) algorithm for heterogeneous wireless networks", Ain Shams Engineering Journal, Vol. 7, Issue. 1, pp. 101–111, 2016.
[13] R. Steele and M. Nofal, "Teletraffic performance of microcellular personal communication networks", IEE Proceedings I Communications, Speech and Vision, Vol. 139, Issue. 4, p. 448, 1992.
[14] T. Issariyakul and E. Hossain, "Introduction to Network Simulator 2 (NS2)", Introduction to Network Simulator NS2, Boston, MA: Springer USA, 2012, pp. 21–40.
[15] D. Pediaditakis, Y. Tselishchev, and A. Boulis, "Performance and scalability evaluation of the Castalia wireless sensor network simulator", Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, 2010.
[16] C. Lochert, A. Barthels, A. Cervantes, M. Mauve, and M. Caliskan, "Multiple simulator interlinking environment for IVC", Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks - VANET ’05, p. 87, 2005.
[17] P. Xie, Z. Zhou, Z. Peng, and H. Yan, "Aqua-Sim: an NS-2 based simulator for underwater sensor networks", Oceans pp. 1–7, 2009.
[18] M. Al-Shurman, S.-M. Yoo, and S. Park, "Black hole attack in mobile Ad Hoc networks", Proceedings of the 42nd annual Southeast regional conference on - ACM-SE 42, p. 96, 2004.
[19] M. Ali, M. Welzl, A. Adnan, and F. Nadeem, "Using the NS-2 network simulator for evaluating network on chips (NoC)", Proceedings - 2nd International Conference on Emerging Technologies 2006, ICET 2006, pp. 506–512, 2006.
[20] V. Rajeshkumar and P. Sivakumar, "Comparative Study of AODV , DSDV and DSR Routing Protocols in MANET Using Network Simulator-2", Scinzer Journal of Engineering, Vol. 1, Issue. 1, pp. 1–5, 2016.
[21] M. Piórkowski, M. Raya, A. L. Lugo, P. Papadimitratos, M. Grossglauser, and J.-P. Hubaux, "TraNS", ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 12, Issue. 1, pp. 31, 2008.
[22] L. Betancur, R. C. Hincapié, and R. Bustamante, "WiMAX channel", Proceeding from the 2006 workshop on ns-2: the IP network simulator - WNS2 ’06, pp. 6, 2006.
[23] Min-Soo Kim, Dong-Min Son, Young-Bae Ko, and Young-Hyun Kim, "A simulation study of the PLC-MAC performance using network simulator-2", 2008 IEEE International Symposium on Power Line Communications and Its Applications, pp. 99–104, 2008.
[24] Daehyoung Hong and S. S. Rappaport, "Traffic model and performance analysis for cellular mobile radio telephone systems with prioritized and nonprioritized handoff procedures", IEEE Transactions on Vehicular Technology, Vol. 35, Issue. 3, pp. 77–92, 1986.
[25] M. Au and R. Steele, "Teletraffic performance of a city street microcellular system using equalised base station loading for TDMA/FCA", Electronics Letters, Vol. 30, Issue. 20, pp. 1649–1650, Sep. 1994.
[26] F. Barceló and J. Jordán, "Channel holding time distribution in cellular telephony", Electronics Letters, Vol. 34, Issue. 2, pp. 146, 1998.
[27] Cooper Chang, Chung-Ju Chang, and Kuen-Rong Lo, "A hierarchical cellular system with reneging and dropping for waiting new and handoff calls", Proceedings of 8th International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC ’97, Vol. 3, pp. 766–770, 1997.
[28] C. Chang, Chung-Ju Chang, and Kuen-Rong Lo, "Analysis of a hierarchical cellular system with reneging and dropping for waiting new and handoff calls", IEEE Transactions on Vehicular Technology, Vol. 48, Issue. 4, pp. 1080–1091, 1999.
[29] J. Labovský, Z. Švandová, J. Markoš, and L. Jelemenský, "Mathematical model of a chemical reactor—useful tool for its safety analysis and design", Chemical Engineering Science, Vol. 62, Issue. 18–20, pp. 4915–4919, 2007.
[30] K. Knobe, J. D. Lukas, and G. L. Steele, "Data optimization: Allocation of arrays to reduce communication on SIMD machines", Journal of Parallel and Distributed Computing, Vol. 8, Issue 2, pp. 102–118, 1990.
Citation
Shivi Saxena, Arun Kumar, "Analysis of Received Signal Strength under Handoff Condition using Network Simulator 2," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.164-168, 2018.
Improving Visual Search Results
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.169-171, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.169171
Abstract
This paper introduces a new method to improve visual search results and understand structured data. While many online resources teach basics of web development, few of them are designed to help novices learn the web development concepts and design patterns used by experts to implement complex visual features. Professional web pages embed these design patterns and could serve as rich learning materials, but their metadata are complex and difficult for novices to understand. This paper presents Metadata.py*, a Metadata inspection tool that helps novices use their visual intuition to make sense of professional web pages/sites. We introduce a new visual relevance testing technique to identify properties that have visual search results, which Metadata.py uses to hide visually irrelevant code and surface unintuitive relationships between properties. In user studies, Metadata.py helped novice developers replicate complex web features 75% faster than those using Chrome Developer Tool and allowed novices to recognize and explain unfamiliar concepts. These results show that visual inspection tools can support learning from complex professional web pages, even for novice developers. Metadata,py: Python Script using Beautiful Soup, a python library for pulling data out of HTML and XML files.
Key-Words / Index Term
Visual Search, SEO, Optimization
References
[1] M. L. Bernard. Examining the effects of hypertext shape on user performance. Usability News, 4(2), 2002.]]
[2] An Attribute-Assisted Reranking Model for Web Image Search, Isroset-Journal (IJSRCSE) Vol.4 , Issue.3 , pp.16-19, Jun-2016
[3] L. H. Armitage and P. G. B. Enser. Analysis of user need in image archives. Journal of Information Science, 23(4):287--299, 1997.]]
[4] P. Borland and P. Ingwersen. The development of a method for the evaluation of interactive information retrieval systems. Journal of Documentation, 53(3):225--250, 1997.]]
[5] R. C. Veltkamp and M. Tanase. Content-Based Image Retrieval Systems: A Survey. Technical Report UU-CS-2000-34, Dept. of Computing Science, Utrecht University, 2000.]].
[6] Greenberg, Jane, M. Pattuelli, B. Parsia, W. Robertson, Author-generated Dublin Core Metadata for Web Resources: A Baseline Study in an Organization, Journal of Digital Information, volume 2 issue 2 (November 2001)
[7] Heery, Rachel and Manjula Patel, Application Profiles: Mixing and Matching Metadata Schemas, Ariadne, Issue 25 (September 2000)
Citation
Saichethan Reddy, "Improving Visual Search Results," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.169-171, 2018.
Comparative Study on Voice Based Chat Bots
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.172-175, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.172175
Abstract
Natural dialog conversation between humans and machines is a flourishing topic of the modern world, now show off their presence across a range of daily use devices and digital assistants. This is tried to be achieved by using sub-field of Artificial Intelligence named Natural Language Processing. The task is to be practically implemented through a series of convenient and capable categories by some of the market leaders with their successful products named the Amazon ALEXA, Microsoft CORTANA, Google ASSISTANT, Apple SIRI to quote a few. A virtual assistant put to real world usage has to perfectly emulate a human dialogue, analyze the input given by a user, represent the same correctly, convert to its process able form and formulate a relevant and appropriate response. In this paper, we review a few market leading voice based chat bots, identifying their technical aspects along with their advantages and disadvantages during the practical usage.
Key-Words / Index Term
Chat bots, NLP (Natural Language Processing), CI (Conversational Interfaces), ALEXA, SIRI, Google ASSISTANT, Microsoft CORTANA)
References
[1] Turing, Alan M. (1950). “Computing machinery and intelligence.”_Mind_59(October):433-60.DOI:10.1093/mind/lix.236.433
[2] A. M. Rahman, A. A. Mamun and A. Islam, "Programming challenges of chatbot: Current and future prospective," 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC), Dhaka, 2017, pp. 75-78. DOI: 10.1109/R10-HTC.2017.8288910
[3] Amanda Purington, Jessie G Taft, Shruthi Sannon, Natalya N Bazarova, Samuel Hardman Taylor, "Alexa is my new BFF": Social Roles, User Satisfaction, and Personification of the Amazon Echo CHI EA `17 Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, Pages 2853-2859 , DOI: 10.1145/3027063.3053246
[4] Zubairm, Paul; Bhat, Heenareyaz; Lone Tanveer, “CORTANA-INTELLIGENT PERSONAL DIGITAL ASSISTANT: A REVIEW”. International Journal of Advanced Research in Computer Science; Udaipur Vol. 8, Iss. 7, (Jul 2017). DOI: http://dx.doi.org/10.26483/ijarcs.v8i7.4225
[5] A. H. Michaely, X. Zhang, G. Simko, C. Parada and P. Aleksic, "Keyword spotting for Google assistant using contextual speech recognition," 2017 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), Okinawa, 2017, pp. 272-278. DOI: 10.1109/ASRU.2017.8268946
[6] A. M. D. Celebre, A. Z. D. Dubouzet, I. B. A. Medina, A. N. M. Surposa and R. C. Gustilo, "Home automation using raspberry Pi through Siri enabled mobile devices", 2015 International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM), Cebu City, 2015, pp. 1-6. doi:10.1109/HNICEM.2015.7393270
[7] Assefi, Mehdi & Liu, Guangchi & Wittie, Mike & Izurieta, Clemente. (2015). “Experimental Evaluation of Apple Siri and Google Speech Recognition”. October 2015, SEDE 2015, At San Diego, DOI: 10.1145/3027063.3053246
[8] V. Këpuska and G. Bohouta, "Next-generation of virtual personal assistants (Microsoft Cortana, Apple Siri, Amazon Alexa and Google Home)" 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, 2018, pp. 99-103. DOI: 10.1109/CCWC.2018.8301638
[9] H. Al-Zubaide and A. A. Issa, "OntBot: Ontology based chatbot", International Symposium on Innovations in Information and Communications Technology, Amman, 2011, pp. 7-12. DOI: 10.1109/ISIICT.2011.6149594
Citation
Anusha S, N Vignesh Karthik, Sampada K S, "Comparative Study on Voice Based Chat Bots," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.172-175, 2018.
Mechanism for Detecting Black Hole Attack in Infrastructure-Less MANET (MDB-MAN)
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.176-181, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.176181
Abstract
Mobile Adhoc Network (MANET) is a self-organized group of wireless nodes forming a tentative network. In MANET nodes would be randomly changing their positions due to its dynamic infrastructure-less property. Therefore it is more susceptible to Black-Hole & Gray-Hole attacks, which are considered as serious attacks to the network. So far several solutions have been developed for MANET but many of them are not efficient. The main purpose of this paper is to present a solution known as mechanism for detecting Black Hole Attack in Infrastructure-Less MANET (MDB-MAN). An Algorithm is developed to detect Black-Hole node based on reactive Adhoc on demand distance vector protocol (AODV), where routes are established on demand. Several times simulations were conducted on proposed model using Network Simulator and found that the Packet Delivery Ratio (PDR) and Throughput is almost similar at time instant 50 msec. as compared to original AODV protocol. The Packet Drop Ratio keeps on changing as time changes and it can be tolerable.
Key-Words / Index Term
MANET, AODV, MDB-MAN, Black-Hole attack, Gray-Hole attack
References
[1] S. Jain, N. Hemrajan, S. Srivastava, “Simulation and Analysis of Performance Parameters for Black Hole and Flooding Attack in MANET Using AODV Protocol”, International Journal of Scientific & Technology Research Vol. 2, Issue. 7, pp. 66-69, July 2013.
[2] A. Patel and A. Jain, “A study of various Black Hole Attack techniques and IDS in MANET”, International Journal of Advanced Computer Technology, Vol. 4, Issue. 3, pp. 58-62, 2016.
[3] R. Garg, V. Mongia, “ Mitigation of Black Hole Attack in Mobile Ad-Hoc Network Using Artificial Intelligence Technique”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology , Vol. 3, Issue. 1, pp. 1168-1174, 2018.
[4] S. Muqtar Ahmed and S. Abdul Sattar, “International Journal of Computer Science and Engineering”, Vol. 6, Issue. 11, pp. 77-82, 2018.
[5] M. Jahnke, J. T¨olle, S. Lettgen, M. Bussmann, and U. Weddige, “A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs”, Springer-Verlag Berlin Heidelberg, pp. 164–180, 2006.
[6] I. Saada, M. Z. Rashad, R. H. Sakr, “Implementing and Comparing LIDBPP (Local Intrusion Detection by Bluff Probe Packet)”, International Journal of Computer Science and Network Security, Vol.16 Issue.8, pp. 20-24, August 2016.
[7] A. A. Bhosle, T. P. Thosar and S. Mehatre, “Black-Holeand Wormhole Attack in Routing Protocol AODV in MAN”, International Journal of Computer Science, Engineering and Applications, Vol. 2, No.1, February 2012.
[8] P.C. TSOU, J. Ming CHANG, Y.Hsuan LIN, H.Chieh CHAO, J. Liang CHEN, “Developing a BDSR Scheme to Avoid Black Hole Attack Based on Proactive and Reactive Architecture in MANETs”, 13th International Conference on Advanced Communication Technology, ICAC-2011.
[9] P. N. Raj and P. B. Swadas, “DPRAODV: A dyanamic learning system against black hole attack in aodv based manet”, IJCSI International Journal of Computer Science Issues, vol. 2, pp. 54–59, 2009.
[10]. L. Himral, V. Vig, and N. Chand, "Preventing Aodv Routing Protocol From Black Hole Attack", International Journal of Engineering Science and Technology (IJEST), Vol .3, 2011.
[11]. H. M. Salmon, C. M. d. Farias, P. Loureiro, L. Pirmez, "Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques", International Journal of Wireless Information Networks, Vol. 20, Issue.1, pp. 39-66, 2013.
[12] S. K. Dhurandher, I. Woungang , R. Mathur , P. Khurana, “GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETs”, 27th International Conference on Advanced Information Networking and Applications Workshops, 2013.
[13] Rutvij, H.J., “MR-AODV: A solution to mitigate black hole and gray hole attacks in AODV based MANETs. Pro”, 3rd International Conference on Advanced Computing and Communication Technologies, CCT-2013.
[14] R. Murugan, A. Shanmugam, “Cluster Based Node Misbehaviour Detection, Isolation and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security 3 Vol. 6; Issue. 3; Start page: 188, 2012.
[15] U. K. Singh, J. Patidar and K. C. Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, International Journal of Scientific Research in Computer Science & Engineering”, Volume-3, Issue-1, pp. 11-16, 2015.
[16] P K. Sharma, S. Mewada and P. Nigam, “Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue. 4, pp. 8-11, 2013.
Citation
Syed Muqtar Ahmed, Syed Abdul Sattar, "Mechanism for Detecting Black Hole Attack in Infrastructure-Less MANET (MDB-MAN)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.176-181, 2018.
Ovarian Cancer Detection Using K-Svm Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.182-188, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.182188
Abstract
Ovarian Cancer represents the main challenge among the gynecologic malignancies and early stage detection is of primary significance, because recently more than 2-3 of the patients present with development infection. Ovarian Cancer disease and treatment has measureable belongings on the superiority of patients of life with OC (ovarian cancer). In this study reviews existing related on eminence of life in users with OC to establish the significance of the topic. The main issues in the detecting process areas are the cancer detection on ultra sound image is not easy to identify on the foundation of gathering or image segmentation and the research work accuracy rate is 90 percent to 95 percent of Normal SVM existing systems. It can be refitted. The quality of the scan in ultrasound images are not appropriate for the system because the view of images is difficult to classify in terms of various segments or data clusters. In research work, implement Otsu technique is reliable and efficient method, used world-widely. It’s an all-around limiting strategy with dark estimation of picture. Otsu technique is a simplified, reliable and efficient method, used world-widely. It’s an all-around limiting strategy with dark estimation of picture. The classification and clustering is used k-SVM to train the cancer images in the each stage dataset and test the cancer detection and enhance the quality of the cancer image (MRI images). To compute the metric of performance like Accuracy Rate, Specificity and Sensitivity and compared with prior approaches i.e. accuracy and other performance metrics.
Key-Words / Index Term
OC (Ovarian Cancer), DWT (Discrete Wavelet Transformation), SVM (Support Vector Machine), DCT (Discrete Cosine Transformation), ED (Edge Detection).
References
[1] "Definition Of The Medical Professional | CGCOM". 2018.Cgcom.Es. https://www.cgcom.es/noticias/2010/12/10_12_13_medical_professional.
[2] Charles Patrick Davis, PhD. 2018. "Cancer Causes, Types, Treatment, Symptoms & Signs". Medicinenet. https://www.medicinenet.com/cancer/article.htm.
[3] Lee, Zne-Jung, Shih-Wei Lin, Cheng-Chic Veritas Hsu, and Yen-Po Huang. "Gene extraction and identification tumor/cancer for microarray data of ovarian cancer." In TENCON 2006. 2006 IEEE Region 10 Conference, pp. 1-3. IEEE, 2006.
[4] Charles Patrick Davis, PhD. 2018. "Cancer Causes, Types, Treatment, Symptoms & Signs". Medicinenet. https://www.medicinenet.com/cancer/article.htm.
[5] Renz, Christian, Jagath C. Rajapakse, Khalil Razvi, and Stephen Koh Chee Liang. "Ovarian cancer classification with missing data." In Neural Information Processing, 2002. ICONIP`02. Proceedings of the 9th International Conference on, vol. 2, pp. 809-813. IEEE, 2002.
[6] Jimenez-del-Toro, Oscar, et al. "Cloud-based evaluation of anatomical structure segmentation and landmark detection algorithms: VISCERAL anatomy benchmarks." IEEE Transactions on Medical Imaging (2016).
[7] Charles Patrick Davis, PhD. 2018. "Cancer Causes, Types, Treatment, Symptoms & Signs". Medicinenet. https://www.medicinenet.com/cancer/article.htm.
[8] Tsai, Meng-Hsiun, Ching-Hao Lai, Shin-Jr Lu, and Shun-Feng Su. "Performance comparisons between unsupervised clustering techniques for microarray data analysis on ovarian cancer." In Systems, Man and Cybernetics, 2006. SMC`06. IEEE International Conference on, vol. 5, pp. 3685-3690. IEEE, 2006
[9] Ullah, Irfan, Iftikhar Ahmad, Hasan Nisar, Saranjam Khan, Rahat Ullah, Rashad Rashid, and Hassan Mahmood. "Computer assisted optical screening of human ovarian cancer using Raman spectroscopy." Photodiagnosis and photodynamic therapy 15 (2016): 94-99.
[10] Akutekwe, Arinze, and Huseyin Seker. "Two-stage computational bio-network discovery approach for metabolites: Ovarian cancer as a case study." In Biomedical and Health Informatics (BHI), 2014 IEEE-EMBS International Conference on, pp. 97-100. IEEE, 2014.
[11] Babahosseini, Hesam, Paul C. Roberts, Eva M. Schmelz, and Masoud Agah. "Roles of bioactive Sphingolipid metabolites in ovarian cancer cell biomechanics." In Engineering in Medicine and Biology Society (EMBC), 2012 Annual International Conference of the IEEE, pp. 2436-2439. IEEE, 2012.
[12] Sameen, Sheema, Zoya Khalid, and Shaukat Iqbal Malik. "In Silico Mining of MicroRNA Signatures in Human Ovarian Cancer." In Bioinformatics and Biomedical Engineering,(iCBBE) 2011 5th International Conference on, pp. 1-4. IEEE, 2011.
[13] Pathak, Hemita, and Vrushali Kulkarni. "Identification of ovarian mass through ultrasound images using machine learning techniques." In Research in Computational Intelligence and Communication Networks (ICRCICN), 2015 IEEE International Conference on, pp. 137-140. IEEE, 2015.
[14] Kaur, Amandeep, Rupinder Kaur, and Navdeep Kumar. "A Review on Image Steganography Techniques." International Journal of Computer Applications 123, no. 4 (2015).
[15] AR, Vanitha L. Venmathi. "Classification of Medical Images Using Support Vector Machine." In Proceedings of International Conference on Information and Network Technology (ICINT 2011). 2011.
[16] Anthony, Gidudu, Hulley Greg, and Marwala Tshilidzi. "Classification of images using support vector machines." arXiv preprint arXiv: 0709.3967 (2007).
Kanungo, Tapas, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu. "An efficient k-means clustering algorithm: Analysis and implementation." IEEE transactions on pattern analysis and machine intelligence 24, no. 7 (2002): 881-892.
Citation
A. Sidhant, L. Sehgal, "Ovarian Cancer Detection Using K-Svm Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.182-188, 2018.