A Comparative Study on Student Academic Performance Prediction Using ID3 and C4.5 Classification Algorithms
Research Paper | Journal Paper
Vol.8 , Issue.4 , pp.106-111, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.106111
Abstract
The ability to predict a student’s performance on a given concept is an important tool for the education institutions, as it allows them to understand the ability of students and derive important methods to enhance their knowledge levels. It is the responsibility of educational institutions to have an approximate prior knowledge of their students to predict their performance in future academics and to train them in various activities. It is used to identify bright students and also provides them an opportunity to pay attention to and improve the slow learners. For predicting the student academic performance a data mining technique under classification is used. I have analyzed the data set containing information about students, such as full name, Roll number, scores in board examinations of classes X and XII, Rank in Eamcet examinations, branch and admission type. ID3 and C4.5 classification algorithms are applied to predict the performance of newly admitted students in their future examinations. In this paper, the performance of ID3 and C4.5 algorithms are compared in terms of parameters like accuracy, error rate and the execution time and the experimental Results shown that C4.5 was found to be best in terms of execution time.
Key-Words / Index Term
ID3, Classification, Prediction.
References
[1] Kalpesh Adhatrao, Aditya Gaykar, Amiraj Dhawan, Rohit Jha and Vipul Honrao “Predicting Students’ Performance using ID3 and C4.5 classification algorithms”, International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.3, No.5, pp.39-52,September 2013.
[2] Brijesh Kumar Bharadwaj and Saurabh Pal, “Mining Educational Data to Analyze Students Performance”, International Journal of Advances in Computer Science and Applications,Vol. 2(6) , pp. 63- 69, 2011.
[3] Surjeet Kumar Yadav, “Data Mining: A Prediction for Performance improvement of Engineering Students using Classification‖”, World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221- 0741 Vol. 2, No. 2, 51-56, 2012.
[4] Crist´obal Romero," Educational Data Mining: A Review of the State of the Art," IEEE Transactions On Systems, Man, and Cybernetics— Part C: Applications And Reviews, Vol. 40, No. 6, November 2010.
[5] Mining, H., Wenying, N. and Xu, L., (2009) “An improved decision tree classification algorithm based on ID3 and the application in score analysis”, Chinese -Control and Decision Conference (CCDC), pp 1876- 1879.
[6] Xiaoliang, Z., Jian, W., Hongcan Y., and Shangzhuo, W., (2009) “Research and Application of the improved Algorithm C4.5 on Decision Tree”, International Conference on Test and Measurement (ICTM), Vol. 2, pp 184-187.
[7] M. Mayilvaganan,D .Kalpanadevi," Comparison of Classification Techniques for predicting the Performance of Students Academic Environment," in International Conference on Communication and Network Technologies (ICCNT), 2014.
[8] R.S.J.D Baker and K.Yacef, “The State of Educational Data Mining in 2009: A Review and Future Visions” , Journal of Educational Data Mining, 1, Vol 1, No 1, 2009.
Citation
Kandepi Suneetha, "A Comparative Study on Student Academic Performance Prediction Using ID3 and C4.5 Classification Algorithms," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.106-111, 2020.
Web Based College Automation System
Technical Paper | Journal Paper
Vol.8 , Issue.4 , pp.112-114, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.112114
Abstract
In this paper focuses on a College Automation system is an Web Based project. Which is helpful for students as well as the Faculties, Library and Admin (Record Manager) In the existing system all the activities are done manually. It is very costly and time consuming. In our proposed system, Student can view college related details like assignment, notes, notices, view available books details, attendance, library status etc. Librarian can record new book details also issue book and renew book, etc. Faculty can upload assignment, mark, student attendance, etc. The proposed work has three modules: 1.Student 2.Admin 3.Staff. In Student module student need to register after the registration He/She need to be verify their email. Only after verification of email He/She can login into system. In Admin module, admin can handle and view the all record which store in database. This college automation system access anytime and anywhere, whenever user wants. College Automation System enables colleges to manage enrollment, students, faculty, attendance, fees, scheduling, assignments, grades and library of the institution. This system has easy interface. To overcome the problem of manual system we have developed this system.
Key-Words / Index Term
Attendence system,Libaray status,asp.net,sql
References
[1] A.V. Pai, A.Krishna,”Web Based Student Attendence System” IJARSE, Vol No.5, Issue No.03, March 2012
[2] Geeta R.B., S.G.Totad, ”Student Information System” IJARCCE, Vol No.2, Issue 6, June 2013.
[3] Mohitha H V,Anandu Mohan, ”College Automaton And Management” IJIRCCE, Vol.5, Issue 5, May 2017.
[4] S. Patnaik, K. Singh, ”College Management System” IRJET, Vol No.3, Issue No.05, May 2016.
[5] S. Patnaik, K.K. Singh, R. Ranjan, N. Kumari "College Management System", International Research Journal of Engineering and Technology (IRJET), Vol. 3, Issue. 5, May 2016.
[6] S.J. Raut "Smart Class Learning Management System for School Education", Review Paper | Journal Paper (IJSRCSE), Vol. 6, Issue. 1, pp.9-13, January 2018.
Citation
S.S.Chavan, G.S. Vejare, S.G. Dsouza, N.M. Shivsharan, "Web Based College Automation System," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.112-114, 2020.
Android Based College Management System
Technical Paper | Journal Paper
Vol.8 , Issue.4 , pp.115-118, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.115118
Abstract
In this paper focuses on a College Management system is an android application Based project. Which is helpful for students as well as the Faculties, Finance Department, Library and Admin (Record Manager). In the existing system all the activities are done manually. It is very costly and time consuming. In our proposed system, Student can view college related details like assignment, notes, notices, view available books details, give feedback or submit their issues etc. He/She view the detail of their Fee, etc. Librarian can record new book details also issue book and renew book, etc. Finance department can handle record like student fee details and salary of employee details, etc. Faculty can upload assignment, mark student attendance, etc. The proposed work has five modules: 1.Student 2.Faculty 3.Finance department 4.Librarian 5.Admin. In Student module student need to register after the registration He/She need to be verify their email. Only after verification of email He/She can login into system. In Librarian module, when Librarian add new book, that notification goes to all the subscriber of application access the system. In Admin module, admin can handle and view the all record which store in database. This college management system access anytime and anywhere, whenever user wants.
Key-Words / Index Term
College management system, Android Operating System, Firebase database, Java, XML.
References
[1] Vishwakarma R Ganesh, "Android College Management System", International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), Vol. 5, Issue. 4, April 2016.
[2] K. Datarkar, N. Hajare, N. Fulzele, S. Kawle, V. Suryavanshi, D. Radke "Online College Management System", International Journal of Computer Science and Mobile Computing, Vol. 5, Issue. 4, pg. 118-122, April 2016.
[3] M. Narendran, Ch. Venkata Rajesh, M. Venkata Siva Kumar, M. Venkatesh, G. Sree Ram Pavan "A Mobile Based College Application for Managing Records Based On Random Secure Procedure", Imperial Journal of Interdisciplinary Research (IJIR), Vol. 3, Issue. 9, 2017.
[4] A.J. kadam, A. Singh, K. Jagtap, S. Tankala "Mobile Web Based Android Application for College Management System", International Journal of Engineering and Computer Science, Vol. 6, Issue. 2, pg. 20206-20209, 2015.
[5] S. Patnaik, K.K. Singh, R. Ranjan, N. Kumari "College Management System", International Research Journal of Engineering and Technology (IRJET), Vol. 3, Issue. 5, May 2016.
[6] D. Rathore, A. Julwania, D.K. Dixit "AMS: Attendance Management System using Android Environment", Research Paper | Isroset-Journal (IJSRCSE), Vol. 4, Issue. 2, pp.20-25, April 2016.
[7] S.J. Raut "Smart Class Learning Management System for School Education", Review Paper | Journal Paper (IJSRCSE), Vol. 6, Issue. 1, pp.9-13, January 2018.
Citation
D.S. Pujare, M.S. Mir, S.M. Melasagare, "Android Based College Management System," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.115-118, 2020.
Cloud Packets Forensics through NIDS and NIPS with Honeypot
Technical Paper | Journal Paper
Vol.8 , Issue.4 , pp.119-122, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.119122
Abstract
As of today, almost everyone currently relocating their administrations into the cloud to offer an increasingly adaptable, open, versatile and omnipresent assistance. In any case, this additionally carries more introduction to security dangers, digital assaults and troubles in dependability and wellbeing. The proposed arrangement is to send a Honeypot in the Intrusion Detection and Prevention System (IDPS) model so as to ensure upgraded execution, extended degree of security in the Distributed computing condition and decrease in the threats to the Cloud condition - by concentrating on the issue of how the information is stored in the Cloud. The structure depicted utilizations both Anomaly Detection (AD) and Signature Detection (SD) in coordinated effort, to recognize various assaults and deny them access using the proposed IPS. The goal of this report is to feature, perceive and ensnare inward interlopers by the utilization of the Honeypot.
Key-Words / Index Term
Intrusion detection system(IDS), intrusion prevention system(IPS), honeypot, anomaly detection(AD), signature detection(SD), firewall, insider threat, PC assault, network assault
References
[1] G. Aceto, A. Botta, W. de Donato and A. Pescapè, “Cloud Monitoring: definitions, issues and future directions”, 2012 IEEE 1st Int. Conf. on Cloud Networking (CLOUDNET), Paris, France, 2012, pp. 63-67.
[2] A. Malik and M. M. Nazir, “Security Framework for Cloud Computing Environment: A Review”, J. of Emerging Trends in Computing and Information Sciences, Vol. 3, No. 3, March 2012, pp. 390 – 394.
[3] K. Lee, “Security Threats in Cloud Computing Environments”, Int. J. of Security and its Applications, vol. 6, no. 4, Oct. 2012, pp. 25-32.
[4] S. Y. Ho, “Instrusion Detection – Systems for today and tomorrow”.
[5] S. M. Moorthy and M. Rajeswari, “Virtual Host based Intrusion Detection System for Cloud”, Int. J. of Eng. & Tech., Vol. 5, issue 6, Dec 2013/Jan 2014, p. 5024.
[6] H. M. Alsafi, W. M. Abduallah and A. K. Pathan, “IDPs: An Integrated Intrusion Handling Model for Cloud Computing Environment”, March 2012.
[7] C. Modi, D. Patel, B. Borisaniya, A. Patel and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing”, The J. of Supercomputing, vol. 63, issue 2, pp. 561 – 592.
[8] L. Spitzner, “The Value of Honeypots”, 10th Jan., 2003.
[9] N. F. Huang, C. Wang, I. J. Liao, C. W. Lin and C. N. Kao, “An OpenFlow-based collaborative intrusion prevention system for cloud networking”, 2015 IEEE International Conference on Communication Software and Networks (ICCSN), Chengdu, 2015, pp. 85-92, 607 June 2015.
[10] K. Shridhar and N. Gautam, “A Prevention of DDoS Attacks in Cloud Using Honeypot”, Int. J. of Science and Research (IJSR), vol. 3, issue 11, Nov. 2014, pp. 2378 – 2383.
[11] D. Winder, “How to use the cloud as a honeypot”, 2nd Oct., 2014.
[12] V. Sing, A. Kumar and D. Kumar, “An Advanced Hybrid Intrusion Detection System in Cloud Computing Environment”, Int. J. for Research in App. Sci. and Eng. Tech. (IJRASET), vol. 2, issue 6, June 2014, pp. 302 – 309.
[13] Jha, A., Johnson, D., Murari, K., Raju, M., Cherian, V., & Girikumar, Y.. OpenStack Beginner`s Guide (for Ubuntu - Precise). CSS Corp. Pvt. Lt, 2012.
Citation
Bhanushree V.K, Minavathi, "Cloud Packets Forensics through NIDS and NIPS with Honeypot," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.119-122, 2020.
A Comprehensive Study on Behavioural Parameters-Based Drowsiness Detection Techniques
Review Paper | Journal Paper
Vol.8 , Issue.4 , pp.123-128, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.123128
Abstract
Drowsiness or fatigue is one of the major causes of road accidents. Numerous deadly mishaps can be forestalled if the drowsy drivers are cautioned in time. A variety of drowsiness detection techniques exist that monitor the state of the driver while driving and a warning alert is triggered if they do not concentrate on driving. In order to determine the state of the driver, various relevant features from facial expressions can be extracted such as yawning, eye closure, and head movements. This paper aims to study the existing techniques in order to enhance them or create a hybrid of them for a better result. The study highlights existing behavioural drowsiness detection techniques. Firstly, in this paper, we classify the existing techniques into three categories: behavioural, vehicular, and physiological parameters-based techniques. Our main focus is on the behavioural parameters. Secondly, implementation techniques for behavioural parameters used for drowsiness detection are reviewed in detail. In the end, the accuracy of each technique implemented is represented in a tabular format. The challenges faced along with the conclusion of the study may help researchers for finding further work in the relevant field.
Key-Words / Index Term
Driver drowsiness, fatigue detection, supervised learning, classification, support vector machine (SVM), yawning, eye closure
References
[1] Anilkumar C.V, Mansoor Ahmed, Sahana R, Thejashwini R, Anisha P.S, "Design of Drowsiness, Heart Beat Detection System and Alertness Indicator for Driver Safety", In the Proceedings of the 2016 IEEE International Conference On Recent Trends In Electronics Information Communication Technology, India, pp-937-941, 2016.
[2] Ashish Kumar and Rusha Patra, "Driver Drowsiness Monitoring System using Visual Behaviour and Machine Learning", IEEE Journal, pp: 339-344, 2018.
[3] Bappaditya Mandal, Liyuan Li, Gang Sam Wang, and Jie Lin, "Towards Detection of Bus Driver Fatigue Based on Robust Visual Analysis of Eye State", IEEE Transactions on Intelligent Transportation Systems, Vol. 18, NO. 3, pp: 545-557, 2017.
[4] Belhassen Akrout and Walid Mahd, "Yawning detection by the analysis of variational descriptor for monitoring driver drowsiness", In the Proceedings of International Image Processing applications and Systems Conference, IEEE, pp:1-5, 2016.
[5] Feng You, Xiaolong Li, Yunbo Gong, Haiwei Wang, Hongyi Li, "A Real-time Driving Drowsiness Detection Algorithm With Individual Differences Consideration", IEEE Access, Vol.7, 2019.
[6] Jang Woon, Byung-Gil Han, Kwang-Ju Kim, Yun-Su Chung, Soo-In Lee,"Real-time Drowsiness Detection Algorithm for Driver State Monitoring Systems", pp-73-75, IEEE 2018.
[7] Jun-Juh Yan, Hang-Hong Kuo,Ying-Fan Lin, Teh-Lu Liao, "Real-time Driver Drowsiness Detection System Based on PERCLOS and Grayscale Image Processing",2016 International Symposium on Computer, Consumer and Control,IEEE, pp:243-246, 2016.
[8] Kangning Li, Shangshang Wang, Chang Du, Yuxin Huang, Xin Feng, Fengfeng Zhou, "Accurate Fatigue Detection Based on Multiple Facial Morphological Features", Hindawi, Journal of Sensors, Vol. 2019, pp:1-10,2019.
[9] Lei Zhao, Zenkai Wang, Xiaojin Wang, Qing Liu, "Driver drowsiness detection using facial dynamic fusion information and a DBN",IET Intell. Transp. Syst., 2018, Vol. 12 Iss. 2, pp. 127-133,2017.
[10] Marchel T. Tombeng, Hence Kandow, Stenly I. Adam, Argha Silitonga, Juve Korompis, "Android-Based Application To Detect Drowsiness When Driving Vehicle", In the Proceedings of 1st International Conference on Cybernetics and Intelligent System (ICORIS),Indonesia, pp:102-104, 2019.
[11] Melissa Yauri, Brian Meneses-Claudio and Natalia Vargas-Cuentas, "Design of a Vehicle Driver Drowsiness Detection System through Image Processing using Matlab", IEEE, 2018.
[12] Menchie Miranda, Alonica Villanueva, Brian Meneses-Claudio, Natalia Vargas-Cuentas, Avid Roman-Gonzalez" PORTABLE PREVENTION AND MONITORING OF DRIVER’S DROWSINESS FOCUSES TO EYELID MOVEMENT USING INTERNET OF THINGS",IEEE, 2018.
[13] Muhammad Tayab Khan, Hafeez Anwar et al., "Smart Real-Time Video Surveillance Platform for Drowsiness Detection Based on Eyelid Closure", Wireless Communications and Mobile Computing, Hindawi, Vol. 2019, pp: 1-9, 2019.
[14] Omar Rigane, Karim Abbes, Chokri Abdelmoula and Mohamed Masmoudi, “A Fuzzy Based Method for Driver Drowsiness Detection”, In the Proceedings of 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications", pp: 143-147, 2017.
[15] Omar Wathiq and Bhavna D. Ambudkar, "Optimized Driver Safety through Driver Fatigue Detection Methods", In the Proceedings of International Conference on Trends in Electronics and Informatics, IEEE, pp:68-73, 2017.
[16] Rateb Jabbar, Khalifa Al-Khalifa, Mohamed Kharbeche, Wael Alhajyaseen, Mohsen Jafari, Shan Jiang, "Real-time Driver Drowsiness Detection for Android Application Using Deep Neural Networks Techniques", In the Proceedings of the 9th International Conference on Ambient Systems, Networks, and Technologies, Elsevier, Vol. 2018, pp- 400–407, 2018.
[17] Samra Naz,Aneeqa Ahmed, Qurat ul ain Mubarak, IrumNoshin," Intelligent Driver Safety System Using Fatigue Detection", ICACT2017, pp-89-93, 2017.
[18] Umit Budak,Varun Bajaj, Yaman Akbulut, Orhan Atilla, Abdulkadir Sengur, "An Effective Hybrid Model for EEG-Based Drowsiness Detection", IEEE Sensors Journal, Vol. 19,No. 17, pp:7624-7631, 2019.
[19] Wanghua Deng and Ruoxue WU,"Real-Time Driver-Drowsiness Detection System Using Facial Features", Preparation of Papers for IEEE Transactions and Journals, IEEE Access, “Unpublished”.
[20] ZhuoniJie, Marwa Mahmoud, Quentin Stafford-Fraser, Peter Robinson, Eduardo Dias and Lee Skrypchuk,” Analysis of yawning behaviour in spontaneous expressions of drowsy drivers”, In the Proceedings of 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition, pp:571-576, 2018.
Citation
Manishi, Naveen Kumari, "A Comprehensive Study on Behavioural Parameters-Based Drowsiness Detection Techniques," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.123-128, 2020.
TaxoFinder A Graph-Based Technique for Taxonomy Learning
Technical Paper | Journal Paper
Vol.8 , Issue.4 , pp.129-132, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.129132
Abstract
Taxonomy is an essential process for gaining, sending, and classifying information, and also creating and using applications in several fields. To minimize humans, work to form the taxonomy learning from scratch and then increase the consistency of the taxonomy, now we suggest an approach to taxonomy learning, called TaxoFinder. TaxoFinder does three stages to construct a taxonomy automatically. Next, it distinguishes notions which are specific to the domain from a corpus of text. Later, it develops a graph describing how these definitions are connected at once depending on their co-occurrences. We will provide a technique for calculating strengths of associative between the concepts as the main method in TaxoFinder, which proves the strength and how tightly they have associated in the graphs, Using their similarities and spatial differences in sentences. Then lastly, have the TaxoFinder which uses a graph-analytical algorithm to trigger a taxonomy. TaxoFinder attempts to construct a taxonomy in such a way that to create a taxonomy, it enhances the associative strengths between the concepts in the graph. We test TaxoFinder on three separate domains using the gold standard evaluation: Mass-meetings emergency response, autism research and disorder domains. We evaluate TaxoFinder as the very effective subsumption method in this development, and it reveals that TaxoFinder was an efficient solution that successfully outperforms the subsumption process.
Key-Words / Index Term
Knowledge searching, Taxonomy learning, Taxonomy, TaxoFinder, keyword phrases
References
[1] K. Meijer, F. Frasincar, and F. Hogenboom, “A semantic approach for extracting domain taxonomies from text,” Decision Support Syst., vol. 62, pp. 78–93, 2014.
[2] W. Wong, W. Liu, and M. Bennamoun, “Ontology learning from text: A look back and into the future,” ACM Comput. Surv. vol. 44, no. 4, pp. 20:1–20:36, Sep. 2012.
[3] M. A. Hearst, “Automatic acquisition of hyponyms from large text corpora,” in Proc. 14th Conf. Comput. Linguistics, 1992, vol. 2, pp. 539–545.
[4] P. Pantel and M. Pennacchiotti, “Espresso: Leveraging generic patterns for automatically harvesting semantic relations,” in Proc. 21st Int. Conf. Comput. Linguistics 44th Annu. Meet. Assoc. Comput. Linguistics, 2006, pp. 113–120.
[5] X. Liu, Y. Song, S. Liu, and H. Wang, “Automatic taxonomy construction from keywords,” in Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012, pp. 1433–1441.
[6] E.-A. Dietz, D. Vandic, and F. Frasincar, “TaxoLearn: A semantic approach to domain taxonomy learning,” in Proc. IEEE/WIC/ACM Int. Joint Conf. Web Intell. Intell. Agent Technol., 2012, pp. 58–65.
[7] W. Wang, P. Mamaani Barnaghi, and A. Bargiela, “Probabilistic topic models for learning terminological ontologies,” IEEE Trans. Knowl. Data Eng., vol. 22, no. 7, pp. 1028–1040, Jul. 2010.
[8] Z. Kozareva and E. Hovy, “A semi-supervised method to learn and construct taxonomies using the web,” in Proc. Conf. Empirical Methods Natural Language Process., 2010, pp. 1110–1118.
[9] P. Velardi, S. Faralli, and R. Navigli, “OntoLearn Reloaded: A graph-based algorithm for taxonomy induction, “Comput. Linguistics, vol. 39, no. 3, pp. 665–707, 2013.
[10] Y.-B. Kang, P. D. Haghighi, and F. Burstein, “CFinder: An Intelligent Key Concept Finder from Text for Ontology Development,” Expert Syst. Appl., vol. 41, no. 9, pp. 4494–4504, 2014.
[11] T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson, Introduction to Algorithms, 2nd Ed. New York, NY, USA: McGraw-Hill, 2001.
[12] K. Dellschaft and S. Staab, “Strategies for the evaluation of ontology learning,” in Proc. Conf. Ontol. Learn. Population: Bridging Gap Between Text Knowl, 2008, pp. 253–272.
[13] F. M. Suchanek, G. Ifrim, and G. Weikum, “Combining linguistic and statistical analysis to extract relations from web documents,” in Proc. 12th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2006, pp. 712–717.
[14] S. P. Ponzetto and M. Strube, “Taxonomy induction based on a collaboratively built knowledge repository,” Artif. Intell. , vol. 175, no. 9-10, pp. 1737–1756, Jun. 2011.
[15] A. B. Rios-Alvarado, I. Lopez-Arevalo, and V. J. Sosa-Sosa, “Learning concept hierarchies from textual resources for ontologies construction, " “Expert Syst. Appl., vol. 40, no. 15, pp. 5907–5915, Nov. 2013.
Citation
Abhijeet Ashokrao Kadam, Shivputra Guruling Swami, "TaxoFinder A Graph-Based Technique for Taxonomy Learning," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.129-132, 2020.
An Ensemble Deep Learning Technique for Plant Identification
Technical Paper | Journal Paper
Vol.8 , Issue.4 , pp.133-135, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.133135
Abstract
Plant identification system is helped to find unidentified plants. Plant identification is most difficult task with the existing classification algorithms. Many existing classifiers are present to identify the plant species with the help of leafs. With the various drawbacks, the system will not reach that much. In recent years, many applications belong to various domains and technologies are using the Deep Learning (DL) for rapid and better results. In this paper, the Novel Approach (NA) is introduced with the combination of CNN adopted with ensemble methods such as bagging and boosting. This paper addresses that the Convolutional Neural Network (CNN) with ensemble methods is better than Machine Learning methods to identify the plant by leaf. The ensemble methods are to improve the accuracy and sensitivity of plant identification model. The parameters such as sensitivity and accuracy are the two metrics to show the performance.
Key-Words / Index Term
CNN, Bagging, Boosting, Novel Approach
References
[1] Cope, J. S., Remagnino, P., Barman, S., & Wilkin, P. (2010, December). The extraction of venation from leaf images by evolved vein classifiers and ant colony algorithms. In International Conference on Advanced Concepts for Intelligent Vision Systems (pp. 135-144). Springer Berlin Heidelberg.
[2] Anami, B. S., Suvarna, S. N., & Govardhan, A. (2010). A combined color, texture and edge features based approach for identification and classification of indian medicinal plants. International Journal of Computer Applications,6(12), 45-51.
[3] A. Aakif, M. F. Khan, "Automatic classification of plants based on their leaves", Biosyst. Eng., vol. 139, pp. 66-75, Nov. 2015.
[4] Go¨eau, H., Bonnet, P., Joly, A.: Plant identification in an open-world (lifeclef 2016). In: CLEF working notes 2016. (2016)
[5] J. Wäldchen, P. Mäder, "Plant Species Identification Using Computer Vision Techniques: A Systematic Literature Review" in Arch. Comput. Methods Eng., pp. 1-37, Jan. 2017.
Citation
P. Siva Prasad, A. Senthilrajan, "An Ensemble Deep Learning Technique for Plant Identification," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.133-135, 2020.
A Survey on Classification of Rumors on Social Media Using Machine Learning
Survey Paper | Journal Paper
Vol.8 , Issue.4 , pp.136-140, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.136140
Abstract
Due to recent mobile technology advances, consumers have 24* 7 accesses to social networks. With regard to knowledge gaps, the dissemination of misinformation is closely linked, particularly when the data is published slowly, often as unverified data. A significant investigation is done in online social media, particularly micro-blogging websites, automatically detect rumors. Recent research on the follow-up of disinformation in social media has explored such terminology. This article will present an overview of social media rumor detection research including various types of rumor classification available in order to recognize the rumor and class text. In this survey paper we will also highlight the features of classification algorithms like Naïve Bayes, Support Vector Machine, Logistic Regression and K-Nearest Neighbor.
Key-Words / Index Term
Rumor detection, social networks, machine Learning, fake, NLP
References
[1] K. Ali, H. Dong, A. Bouguettaya, A. Erradi, and R. Hadjidj, “Sentiment Analysis as a Service: A Social Media Based Sentiment Analysis Framework,” in Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017, 2017.
[2] H. Ahmed, I. Traore, and S. Saad, “Detecting opinion spams and fake news using text classification,” Secur. Priv., 2018.
[3] M. Granik and V. Mesyura, “Fake news detection using naive Bayes classifier,” in 2017 IEEE 1st Ukraine Conference on Electrical and Computer Engineering, UKRCON 2017 - Proceedings, 2017.
[4] M. Z. Asghar, A. Khan, F. Khan, and F. M. Kundi, “RIFT: A Rule Induction Framework for Twitter Sentiment Analysis,” Arab. J. Sci. Eng., 2018.
[5] G. W. Allport and L. Postman, “An analysis of rumor,” Public Opin. Q., 1946.
[6] H. Dunn and C. Allen, “Rumors, urban legends and internet hoaxes,” Proc. Annu. Meet. …, 2005.
[7] N. DiFonzo and P. Bordia, “Rumor, gossip and urban legends,” Diogenes. 2007.
[8] M. Rezwanul, A. Ali, and A. Rahman, “Sentiment Analysis on Twitter Data using KNN and SVM,” Int. J. Adv. Comput. Sci. Appl., 2017.
[9] A. Zubiaga, M. Liakata, and R. Procter, “Exploiting context for rumour detection in social media,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2017.
[10] W. Etaiwi and G. Naymat, “The Impact of applying Different Preprocessing Steps on Review Spam Detection,” in Procedia Computer Science, 2017.
[11] S. Kotsiantis, E. Koumanakos, D. Tzelepis, and V. Tampakas, “Predicting fraudulent financial statements with machine learning techniques,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006.
[12] B. Ma, D. Lin, and D. Cao, “Content representation for microblog rumor detection,” in Advances in Intelligent Systems and Computing, 2017.
[13] A. Majumdar and I. Bose, “Detection of financial rumors using big data analytics: the case of the Bombay Stock Exchange,” J. Organ. Comput. Electron. Commer., 2018.
[14] S. Tschiatschek, A. Singla, M. Gomez Rodriguez, A. Merchant, and A. Krause, “Fake News Detection in Social Networks via Crowd Signals,” 2018.
[15] S. Hamidian and M. Diab, “Rumor Identification and Belief Investigation on Twitter,” 2016.
[16] Rajit Nair, Vaibhav Jain, Amit Bhagat, Ratish Agarwal, “An Efficient Approach for Sentiment Analysis Using Regression Analysis Technique,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.161-165, 2019..
[17] P. Donovan, “How idle is idle talk? One hundred years of rumor research,” Diogenes. 2007.
[18] V. Qazvinian, E. Rosengren, D. R. Radev, and Q. Mei, “Rumor has it: Identifying misinformation in microblogs,” in EMNLP 2011 - Conference on Empirical Methods in Natural Language Processing, Proceedings of the Conference, 2011.
[19] P. Bordia, “Studying verbal interaction on the Internet: The case of rumor transmission research,” Behav. Res. Methods, Instruments, Comput., 1996.
[20] M. Takayasu, K. Sato, Y. Sano, K. Yamada, W. Miura, and H. Takayasu, “Rumor diffusion and convergence during the 3.11 Earthquake: A twitter case study,” PLoS One, 2015.
[21] C. Castillo, M. Mendoza, and B. Poblete, “Predicting information credibility in time-sensitive social media,” Internet Res., 2013.
[22] K. Chai, H. T. Hn, and H. L. Cheiu, “Naive-Bayes Classification Algorithm,” Proc. 25th Annu. Int. ACM SIGIR Conf. Res. Dev. Inf. Retr., 2002.
[23] P. Cunningham and S. J. Delany, “K -Nearest Neighbour Classifiers,” Mult. Classif. Syst., 2007.
[24] C. Cortes and V. Vapnik, “Support-Vector Networks,” Mach. Learn., 1995.
[25] S. R. Safavian and D. Landgrebe, “A Survey of Decision Tree Classifier Methodology,” IEEE Trans. Syst. Man Cybern., 1991.
Citation
Ria Purohit, Nidhi Ruthia, Chetan Agrawal, "A Survey on Classification of Rumors on Social Media Using Machine Learning," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.136-140, 2020.
A Comprehensive Review on Road Traffic Fatal Accidents in India
Review Paper | Journal Paper
Vol.8 , Issue.4 , pp.141-144, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.141144
Abstract
Road traffic (RT) security is a major issue for government transport authorities& citizens. Road accidents (RAs) are unclear & accidents are unpredictable & their survey needs issues that affect them. RAs source problems are greater at an alarming rate. Adjusting traffic accidents on roads is a critical challenge. Towards provide benign driving recommendations, clear & suspicious consider of RT information is dangerous. The main of this paper is to consider RAs in India at the national, urban & state city levels. Exploration of RA situation at city & state level displays that there is a vast difference in fatalness threat across states & cities. The probability of fatality is greater than the average in India for ten people outside union territory and 35 Member States. While in these metropolitan cities RAs are slightly lower in India, almost 50 percent of the cities are facing greater fatality risks than their fossil counterparts. There is so an urgent want to identify a failing situation in injuries & road deaths& towards proceeds suitable action.
Key-Words / Index Term
Road Traffic, Safe Driving, Data Mining Techniques, Literature Review
References
[1] Divya Bansal and Lekha Bhambhu, “Execution of the Apriori algorithm of data mining directed towards tumultuous crimes concerning women”, International Journal of Advanced Research in Computer Science and Software Engineering, 3(9), September 2013
[2] Amira A El Tayeb, Vikas Pareek, and Abdelaziz Araar, “Applying association rules mining algorithms for traffic accidents in Dubai”, International Journal of Soft Computing and Engineering, September 2015
[3] William M Evanco, “The potential impact of rural mayday systems on vehicular crash fatalities”, Accident Analysis & Prevention, 31(5):455–462, September 1999.
[4] Tibebe Shah, Shawndra Hill (2013), “ Mining Road Traffic Accident Data to Improve Safety: Role of Road-related Factors on Accident Severity in Ethiopia”
[5] Jianfeng Xi, Zhao et al. A Traffic Accident CausationAnalysis Method Based on AHP Apriori 137 (2016) 680-687.
[6] Evgenikos, Yannis, et al. Characteristics and causes of heavy goods vehicles and buses accidents in EuropeTRA 14 (2016) 2158.
[7] Goel, Sachdeva “Analysis of Road Accidents on N(-1between 98 Km to 148 Km [2016] pisc -256.
[8] Batrakova, Gredasova, influence of Road Conditions onTraffic Safety 134 (2016)196.
[9] Helen, Wellman, et al “A practical tool for public health surveillance: Semi-automated coding of short injury narratives from large administrative databases usingNaïve Bayes algorithms (2015) 165.
[10] Taylor, Lacovara et al “Near-miss narratives from the fire service: A Bayesian analysis (2014) 119.
[11] Wong, J., and Y. Chung (2008). "Comparison of methodology Approach to Identify Causal Factors of accident Severity." Transportation Research Record2083: 190-198.
[12] Chong, M., A. A., et al. (2005). "Traffic Accident AnalysisUsing Machine learning Paradigms." Informatica 29(1).
[13] Ali et al.“A Data Mining Approach to )identify key factors Of Traffic )injury Severity Traffic &Transportation”, Vol. 23, 2011, No. 1, 11-17.
[14] Brijesh Kumar Baradwaj, Saurabh Pal, “MiningEducational Data to Analyze Students Performance” (IJACSA) International Journal of Advanced ComputerScience and Applications, Vol. 2, No. 6, 2011 [15].
[15] Ting, Tsang, et al., Naïve Bayes a Good Classifier for document Classification [2011].
[16] Shao, S.P., Estimating car driver injury severity in car/tractor-trailer collision. Accident analysis and prevention 19 (3), 207-217, 1987.
[17] Ceder A. et al. Safety belts used in urban areas: analysis of usage pattern and safety evaluation (in Hebrew) Haifa: Technion, Transportation research institute; Aug 1989.
[18] O’day J. Accident data quality. National Cooperative highway research program: Synthesis of highway practics 92. Transportation Research board. Washington DC. National Academy Press: 1993.
[19] Paterson R., Baxter D. Coding manual for traffic accident information (users edition) Sydney: Traffic authority for new Sout wales 1987.
[20] Rosman D. L; Knuiman M. W. A Comparison of hospital and police road injury data. Accident analysis and prevention 26(2): 215-222, 1994.
Citation
Soniya Mudgal, Mahesh Parmar, "A Comprehensive Review on Road Traffic Fatal Accidents in India," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.141-144, 2020.
An Image Segmentation Approach Using Watershed Technique
Review Paper | Journal Paper
Vol.8 , Issue.4 , pp.145-148, Apr-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i4.145148
Abstract
Watershed algorithm is used in image processing primarily for segmentation purposes. The main aim of this technique is to segment the image, generally when two regions of interest are close to each other i.e, their edge touch. Watersheds use many of the concepts of edge-detection, thresholding & region growing and often produce stable segmentation results. Watershed segmentation algorithm is an attractive method when compared to other segmentation algorithm. The Watershed segmentation technique can be applied to binary image, gray scale image and textural images. In many field of image processing including medical image segmentation, the watershed transform has been widely used. This method yields a result of accurate segmentation by reducing the over segmentation effect. Watershed transform is applied on distance transform, gradient image ,and marker controlled image and check which among the three yield the best result.
Key-Words / Index Term
Thresholding, Image segmentation, Distance Transform, Gradient Magnitude, Marker controlled watershed segmentation.
References
[1] Arindrajit Seal, Arunava Das, Prasad Sen “Watershed:An Image Segmentation Approach”,International journal for Computer Science and Information Technology,vol.6,no.3, pp.2295-2297,2015.
[2] Amandeep Kaur, Aayushi, “Image Segmentation Using Watershed Transform”,vol.4 ,no.1 pp.5-8,March 2014.
[3] S. Beucher, “The Watershed Transformation Applied To Image Segmentation”, pp.1-26 ,2014.
[4] Anju Bala,” An Improved Watershed Image Segmentation Technique Using Matlab",International Journal for Scientific and Engineering Research,vol.3,no.6,pp.1-4, June 2012.
[5] Md.Habibur Rahman, Md. Rafiqul Islam," Segmentation Of Color Image Using Adaptive Thresholding And Masking With Watershed Algorithm ",IEEE,2013.
[6] Ning Li, Miaomiao Liu, And Youfu Li,” Image Segmentation Algorithm Using Watershed Transform And Level Set Method ",IEEE,pp.613-616,2007.
[7] Pinaki Pratim Acharjya, Dibyendu Ghoshal,” Watershed Segmentation Based On Distance Transform And Edge Detection Techniques ",International Journal of Computer Application,vol.52,no.13, pp.6-10,August2012.
[8] Muhammad Waseem Khan,” A Survey: Image Segmentation Techniques ”,International Journal of Future Computer and Communication,pp.89-93,April 2014.
[9] Dibya jyoti Bora,Anli kumar gupta,”A New Efficient Color Image Segmentation Approach Based on Combination of Histogram Equalization with Watershed Algorithm”, International Journal of Computer Sciences and Engineering,pp.156-167,June2016.
[10] Qing Chen, Xiaoli Yang, Emil M. Petri. “Watershed Segmentation For Binary Images With Different Distance Transforms”, IEEE , pp.111 -116, 2006.
[11] Rafael C. Gonzalez And Richard E. Woods, “Digital Image Processing”, Pearson,United State, pp. 786-804, 2018.
[12] K. Parvati, B. S. Prakasa Rao, And M. Mariya Das,” Image Segmentation Using Gray-Scale Morphology And Marker-Controlled Watershed Transformation ",Hindawi Publishing Corporation Discrete Dynamics in Nature and Society,pp.1-8,2008.
[13] Amanpreet kaur, Ashish Verma, “The Marker-Based Watershed Segmentation A-Review”, International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 3, pp.171-174,September 2013.
[14] Paul T. Jackway,” Gradient Watersheds In Morphological Scale-Space ",IEEE Transaction on Image Processing ,vol.5,no.6,pp.13-21,June 1996.
[15] H.P.Ng, S.H.Ong, K.W.C. Foong, P.S. Goh, W.L. Nowinski,” Medical Image Segmentation Using K-Means Clustering And Improved Watershed Algorithm ",IEEE,pp.61-65,2006.
[16] Lalitha K, Amrutha R, Stafford Michahial, Dr M Shivakumar,” Implementation Of Watershed Segmentation ",International Journal of Advance Research in Computer and Communication Engineering,vol.5,no.15,pp.196-199,December 2016.
[17] Jia Wang, Hanqing Lu, Gerard Eude, Qingshan Liu, “A Fast Region Merging Algorithm For Watershed Segmentation”,IEEE Signal Processing,vol.1,pp.781 -784,October 2004.
[18] K.K.Thanammal,”Analytical Study on Watershed Segmentation of the Pulmonary Lobes from Chest CT Scan Image”, International Journal of Scientific Research in Computer Sciences and Engineering,vol.5,no.3,pp.98-103,June 2017.
[19] V. Davis, S.Devane, “Diagnosis of Brain Hemorrage Using Artificial Neural Network” ,International Journal of Scientific Research in Network Security
Citation
Bimalini Meher, Chandra Sekhar Panda, "An Image Segmentation Approach Using Watershed Technique," International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.145-148, 2020.