Evaluation of Fault Tolerant & Min-Max Load Balancing Algorithm in Grid Computing
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1331-1337, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13311337
Abstract
Grid computing is a growing technology, which have hundreds or thousands of computational nodes to execute large applications. The main issues consider in grid computing is Load balancing, Fault tolerant and Fault recovery. In order to utilize the resource efficiently and to satisfy all the requirements of the user, there is need for effective scheduling algorithm. Scheduler schedule job to available resources in the sites and result submit to user. Otherwise if any faults detects by fault detector, In the event of failures, how to execute the job from the processor failure. Since grid is more difficult, complex to implement and manage, so there could be the differences in their performance under diverse experimental conditions. We should modify the algorithm. To achieve high throughput and proper resource utilization we purpose Min-Max fair scheduling algorithm for load balancing. This paper focus on how to increase performance of Grid Environment. The proposed system builds on using Grid Simulation Toolkit (Gridsim).
Key-Words / Index Term
Load Balancing, Grid Computing, Fault Tolerant & Fault Recovery, Min-Max Fair Scheduling algorithm
References
Nikolaos D, Doulamis, Anastsios D. Doulamis, Emmanouel A. Varvarigos and Theodora A. Varvarigou, ”Fair scheduling algorithm in grids”, IEEE transactions on parallel and distributed systems, Vol. 18, No.11, November 2007, pp. 1630-1648.
[2] Buyya, R., Abramson, J., and Giddy, j/ Nimrod/G: architecture for a resource management and scheduling system in a global computational Grid. 4th IEEE conf. on High-performance computing, 2000.
[3] Kai lu and Albert Y.Zomaya “A Hybrid policy for Job Scheduling and Load Balancing in Heterogeneous Computational Grids” 6th International Symposium on parallel and Distributed Computing, IEEE, 2007.
[4] Manish Arora, Sajal K. Das and Rupak Biswas “A De-centralized Scheduling and Load Balancing Algorithm for Heterogeneous Grid Environments”, Proceeding of the International Conference on Parallel Processing Workshops, IEEE, 2002, pp. 1-7.
[5] Yajun Li, Yuhang Yang and Rongbo Zhu “A Hybrid Load balancing Strategy of Sequential Tasks for Computational Grids”, International Conference on Networking and Digital Society, IEEE, 2009, pp. 112-117.
[6] S.K. Karthik Kumar, M. Udhaya Preethi and P. Chitra “Fair Scheduling Approach for Load Balancing and Fault Tolerant in grid environment”, IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology, 2013. pp. 446-451.
[7] Jing Wei-peng, liu Ya-qiu and Wu Qu “Fault-tolerant task scheduling in Multiprocessor systems based on Primary-Backup Scheme”, IEEE, 2010, pp. 670-675.
[8] Jasma balasangameshwara, Nedunchezhian Raju “A Hybrid policy for fault tolerant load balancing in grid computing environment”, Journal of network and Computer Applications, Vol. 35, Issue 1, January 2012.
[9] Hwang s, Kesselman C,”A flexible framework for fault tolerance in the grid”, Journal of grid computing, 2003.
[10] N. Budhiraja et al., S. Mulender “The primary Backup Approach”, Distributed systems, pp.169-197, 1993.
[11] Li K, “Optimal load distribution in non dedicated heterogeneous cluster and grid computing environment”, Journal of Systems Architecture: The EUROMICRO Journal 2008.
[12] Nandagopal Malarvizhi, Rhymend Uthariaraj V, “Decentralized dynamic load balancing for multi cluster grid environment” Future Generation Computer Systems 2009.
[13] L. Anand, D. Dhose, V. Mani, “ELISA: An estimated load information scheduling algorithm for distributed computing systems”, Computers & Mathematics with applications, Vol. 37, Issue 8, April 1999.
Citation
Mahesh Reddy G, Lakshminarayana G, Srinuvasa Reddy K, "Evaluation of Fault Tolerant & Min-Max Load Balancing Algorithm in Grid Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1331-1337, 2018.
Implementation of Dynamic Keyword Query Suggestions on Geo Location using Document Proximity
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1338-1342, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13381342
Abstract
A search engine is an online tool for searching any information on the World Wide Web like documents, business services, images, videos and so on. Many tools were there for helping the search engine helping the search engine like page ranking algorithms, voice search, image mining and keywords suggestions. From all this tools keyword suggestions will help online users to retrieve needed information and Express the queries without any background knowledge. Many tools were proposed to enhance the keyword suggestions like click-through, random walk method etc. But those are not satisfied user requirements in the modern world. In this paper proposing a novel structure of Keyword recommendation using location proximity which gives useful suggestion on geo based location. From the baseline algorithms, we are enhancing the partition based algorithm to achieve keyword suggestions. In addition, we enhance instant search keywords by using location proximity. Our proposed algorithm achieves better performance compared with existing algorithms in time ratio.
Key-Words / Index Term
Baseline algorithm, partition based algorithm, location proximity, keyword suggestions
References
[1] Shuyao Qi “Location aware keyword query suggestion based on document proximity” IEEE 10.1109/ICDE.2016.7498428
[2] H. Tong, C. Faloutsos, and J.-Y. Pan, “Fast random walk with restart and its applications,” in Proc. 6th Int. Conf. Data Mining,2006, pp. 613–622.
[3] P. Berkhin, “Bookmark-coloring algorithm for personalized page rank computing,” Internet Math., vol. 3, pp. 41–62, 2006.
[4] M. Gupta, A. Pathak, and S. Chakrabarti, “Fast algorithms for top k personalized page rank queries,” in Proc. 17th Int. Conf. World Wide Web, 2008, pp. 1225–1226.
[5] Song and L.-W. He, “Optimal rare query suggestion with implicit user feedback,” in Proc. 19th Int. Conf. World Wide Web 2010, pp. 901–910.-9.
[6] Y. Fujiwara, M. Nakatsuji, H. Shiokawa, T. Mishima, and M.Onizuka, “Efficient ad-hoc search for personalized PageRank,” inProc. ACM SIGMOD Int. Conf. Manage. Data, 2013, pp. 445–456.
[7] Y. Fujiwara, M. Nakatsuji, M. Onizuka, and M. Kitsuregawa, “Fastand exact top-k search for random walk with restart,” Proc. VLDBEndowment, vol. 5, no. 5, pp. 442–453, Jan. 2012.
[8] S. Cucerzan and R. W. White, “Query suggestion based on userlanding pages,” in Proc. 30th Annu. Int. ACM SIGIR Conf. Res.Develop. Inf. Retrieval, 2007, pp. 875–876.
[9] R. Li, B. Kao, B. Bi, R. Cheng, and E. Lo, “DQR: A probabilistic approach to diversified query recommendation,” in Proc. 21stACM Conf. Inf. Knowl. Manage., 2012, pp. 16–25.
[10] P. Berkhin, “Bookmark-coloring algorithm for personalized PageRank computing,” Internet Math., vol. 3, pp. 41–62, 2006.
[11] T. Gaasterland, “Cooperative answering through controlled query relaxation,” IEEE Expert, vol. 12, no. 5, pp. 48–59, Sep. 1997
[12] H. Tong, C. Faloutsos, and J.-Y.Pan, “Fast random walk with restart and its applications,” in Proc. 6th Int. Conf. Data Mining,2006, pp. 613–622.
[13] N. Lao and W. W. Cohen, “Relational retrieval using a combination of path-constrained random walks,” Mach. Learn., vol. 81,no. 1, pp. 53–67, 2010.
[14] R. Li, B. Kao, B. Bi, R. Cheng, and E. Lo, “DQR: A probabilistic approach to diversified query recommendation,” in Proc. 21stACM Conf. Inf. Knowl. Manage., 2012, pp. 16–25.
[15] Y. Song and L.-W.He, “Optimal rare query suggestion with implicit user feedback,” in Proc. 19th Int. Conf. World Wide Web,2010, pp. 901–910.
[16] Q. Mei, D. Zhou, K. Church,“Query suggestion using hittingtime,” In CIKM, 2008, pp. 469–478.
Citation
P Sujini, D.N. Vasundhara, "Implementation of Dynamic Keyword Query Suggestions on Geo Location using Document Proximity," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1338-1342, 2018.
Locating and Detecting Nipple for Pornographic Image Identification
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1343-1347, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13431347
Abstract
In this paper, a fast and robust algorithm for identification of nude images based on the examination of skin color regions and nipple locating and detection is presented. The skin color information fundamentally provides regions of interest. So as to segment human skin area from non-skin areas in view of color, we require a dependable skin color model that is versatile to individuals of various skin hues and to various lighting conditions. We utilized a model of skin color in the YCbCr color space for separate out skin color region.
Key-Words / Index Term
Skin color segmentation, Object detection, Recognition, Porn image identification
References
1. M. Fleck, D. Forsyth, and C. Bregler, "Finding naked people," in Proc. ECCV`96, vol. II, 1996, pp. 592-602.
2. D. Forsyth and M. Fleck, "Body plans," in Proc. IEEE CVPR, 1997, pp. 678-683.
3. Wang, 1. Li, G. Wiederhold, and o. Firschein, "System for screening objectionable images using daubechies` wavelets and color histograms," in Proc. InterWltional Workshop on Interactive Distributed Multimedia Systems and Telecommunications Services, 1997, pp. 20-30.
4. A. Drimbarean, P. Corcoran, M. Cucic, and V Buzuloiu, "Image processing techniques to detect and filter objectionable images based on skin tone and shape recognition," in Proc. IEEE Int. Conference on Consumer Electronics, Los Angeles, USA, June 2001, pp. 278-279.
5. M. Jones and 1. Rehg, "Statistical color models with application to skin detection," International JourWll of Computer Vision, vol. 46, no. 1, pp. 81-96, 2002.
6. Qing-Fang Zheng, Ming-Ji Zhang, and Wei-Qiang Wang, “A Hybrid Approach to Detect Adult Web Images”, Advances in Multimedia Information Processing - PCM 2004 LNCS 3332, pp. 609–616
7. Rigan Ap-Apid, “An Algorithm for Nudity Detection”, Proceedings of the 5th Philippine Computing 2005
8. Herbert Bay, Tinne Tuytelaars, and Luc Van Gool “SURF: Speeded Up Robust Features”, Computer Vision and Image Understanding Volume 110 Issue 3, June, 2008 Pages 346-359
9. Yue Wang, Jun Li, HeeLin Wang, and ZuJun Hou, “Automatic Nipple Detection Using Shape and Statistical Skin Color Information”, The 16th Intl Conf on Multimedia Modeling, MMM2010. Lecture Notes in Computer Science 5916 publication date 2010 , pp. 644–649
10. Baozhu Wang, Xiuying Chang, Cuixiang Liu” Skin Detection and Segmentation of Human Face in Color Images”, International Journal of Intelligent Engineering and Systems, Vol.4, No.1, 2011, PP 10-17.
11. Survey: 70% of boys began watching porn at 10 years http://timesofindia.indiatimes.com/city/coimbatore/Survey-70-of-boys-began-watching-porn-at-10-years/articleshow/48209402.cms, download on May 2017
12. FACTS FOR PREVENTION: The Impact of Pornography on Children & Youth http://www.preventtogether.org/Resources/Documents/Impact_of_Porn_on_Youth_9.pdf, download on May 2017
Citation
Amresh Vijay Nikam, "Locating and Detecting Nipple for Pornographic Image Identification," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1343-1347, 2018.
Big Data: A New Way To Look At World.
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1348-1352, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13481352
Abstract
Big Data is a term which now a days everyone is aware of. This has changed view of every normal human or technocrat towards world. Technocrats sees this as a world full of challenges yet more of opportunities to explore this world more vividly. The voluminous data evolving these days with exponential rate is one of the biggest concern of technological world, yet bigger challenge is to explore and extract useful information out of this world and exploit is to the fullest to get maximum benefit. This paper ca be taken as reference paper or a tutorial for the one who want to gain in depth basic knowledge of big data and pursue research further.
Key-Words / Index Term
Big Data, Varacity, Variety, Value, Volume, Map Reduce, Hadoop
References
1. IBM Bringing BIG DATA to enterprise: http://www-01.ibm.com/software/in/data/bigdata/
2. Jacobs, A. (6 July 2009). "The Pathologies of Big Data". ACMQueue.
3. Magoulas, Roger; Lorica, Ben (February 2009). "Introduction to Big Data". Release 2.0 (Sebastopol CA: O’Reilly Media) (11).
4. Avnet Advantage: The Blog http://www.ats.avnet.com/na/en-us/news/Pages/The-5-Vs-of-Big-Data.aspx
5. Dataconomy: Understanding Big Data : http://dataconomy.com/seven-vs-big-data/
6. Data Alchamists: http://dataalchemists.com.au/2013/05/5-vs-big-data/)
7. Donna Burbank, Enterprise Architects: the 5 V’s of Big Data http://enterprisearchitects.com/the-5v-s-of-big-data/
8. Billings S.A. "Nonlinear System Identification: NARMAX Methods in the Time, Frequency, and Spatio-Temporal Domains". Wiley, 2013
9. Bertolucci, Jeff "Hadoop: From Experiment To Leading Big Data Platform", "Information Week", 2013. Retrieved on 14 November 2013.
10. Bertolucci, Jeff "Hadoop: From Experiment To Leading Big Data Platform", "Information Week", 2013. Retrieved on 14 November 2013.
11. Apache Hadoop: http://hadoop.apache.org/
12. Big Data Technologies: http://bigdata.impetus.com/technologies.
13. Big Data Challanges: http://www.sas.com/resources/asset/five-big-data-challenges-article.pdf.
14. Drowning in numbers -- Digital data will flood the planet—and help us understand it better. The Economist, Nov 18, 2011. http://www.economist.com/blogs/dailychart/2011/11/big-data-0
15. Using Data for Systemic Financial Risk Management. Mark Flood, H V Jagadish, Albert Kyle, Frank Olken, and Louiqa Raschid. Proc. Fifth Biennial Conf. Innovative Data Systems Research, Jan. 2011.
16. Understanding individual human mobility patterns. Marta C. González, César A. Hidalgo, and Albert-László Barabási. Nature 453, 779-782 (5 June 2008)
17. Bamford, James (15 March 2012). "The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)". Wired Magazine. Retrieved 2013-03-18.
18. UN GLobal Pulse (2012). Big Data for Development: Opportunities and Challenges (White p. by Letouzé, E.). New York: United Nations.
19. Layton, Julia. "Amazon Technology". Money.howstuffworks.com. Retrieved2013-03-05.
20. Wingfield, Nick (2013-03-12). "Predicting Commutes More Accurately for Would-Be Home Buyers - NYTimes.com". Bits.blogs.nytimes.com. Retrieved 2013-07-21.
21. AMPLab at the University of California, Berkeley". Amplab.cs.berkeley.edu. Retrieved 2013-03-05.
Citation
Kamal Kumar Ranga, C.K. Nagpal, "Big Data: A New Way To Look At World.," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1348-1352, 2018.
Network Blocking Probability Based Evaluation of Spectrum Fragmentation in Elastic Optical Networks
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1353-1362, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13531362
Abstract
In Elastic Optical Networks (EONs), overcoming spectrum contiguity and continuity constraints is a challenging task while allocating spectrum slots (SS) to an incoming traffic demand. The frequent setup and release of SS over spectrum paths (SP) lead to unused isolated non- contiguous SSs. These isolated SS becomes unusable for future connections and causes significant fragmentation of spectral resources and degrades the network performance. This paper presents a spectrum assignment (SA) strategy that allocates SS based upon the relative difference between the required SS width and available SS width. The performance of proposed SA technique is evaluated in terms of Network Blocking Probability (NBP) by carrying out simulations under variable load conditions. The comparative analysis shows that the proposed strategy reduces spectrum fragmentation effectively as compared to existing SA strategies.
Key-Words / Index Term
EONs, Routing and Spectrum Assignment (RSA), SS, NBP, Orthogonal Frequency Division Multiplexing (OFDM), SP, National Science Foundation Network Topology (NSFNET)
References
[1] Deepak Sharma, Suresh Kumar, “An Overview of Elastic Optical Networks and its Enabling Technologies”. International Journal of Engineering and Technology (IJET) Vol. 9 No 3 Jun-Jul 2017, pp (1643-1649) ISSN 0975-4024 DOI: 10.21817/ijet/2017/v9i3/170903022.
[2] Deepak Sharma, Suresh Kumar, “Design and Evaluation of OFDM Based Optical Communication Network” Journal of Engineering and Applied Sciences Vol. 12 S. Issue 2 ,(2017)pp:6227-6233 DOI:10.3923/jeasci.2017.6227.6233.
[3] Shakya, Sunny, "Management of Spectral Resources in Elastic Optical Networks." Dissertation, Georgia State University, 2015.
[4] Deepak Sharma, Suresh Kumar, “Evaluation of Network Blocking Probability and Network Utilization Efficiency on Proposed Elastic Optical Network using RSA Algorithms.” Journal of Optical Communications, 0(0),(aop) (2018). doi:10.1515/joc-2017-0204
[5] B. C. Chatterjee, S. Ba and E. Oki, "Fragmentation Problems and Management Approaches in Elastic Optical Networks: A Survey," in IEEE Communications Surveys & Tutorials, vol. 20 pp. 183-210, 2018. doi: 10.1109/COM2017.276102
[6] D. Amar, E. Le Rouzic, N. Brochier, J.-L. Auge, C. Lepers, and N. Perrot, “Spectrum fragmentation issue in flexible optical networks: analysis and good practices,” Photon. Netw. Commun., vol. 29, no. 3, pp. 230–243,
[7] W. Shi, Z. Zhu, M. Zhang, and N. Ansari, “On the effect of bandwidth fragmentation on blocking probability in elastic optical networks,” IEEE Trans. on Commun., vol.61, no.7, pp.2970–2978,(2013). doi:10.1109/TCOMM. 053013.120853.
[8] M. Zhang, W. Shi, L. Gong, W. Lu, and Z. Zhu, “Bandwidth defragmentation in dynamic elastic optical networks with minimum traffic disruptions,” in IEEE International Conference on Communications (ICC), Budapest, 2013, pp. 3894-3898.doi: 10.1109/ICC.2013.6655165.
[9] M. Chino, T. Miyazaki, E. Oki, S. Okamoto, and N. Yamanaka, “Adaptive elastic spectrum allocation based on traffic fluctuation estimate in flexible OFDM-based optical networks.” in IEEE 17th International Conference on High Performance Switching and Routing (HPSR), Yokohama, 2016, pp. 81-86. doi: 10.1109/HPSR.2016.7525643
[10] R. R. Coifman and M. V. Wickerhauser, “Entropy-based algorithms for best basis selection,” IEEE Trans. on Inform. Theory, vol. 38, no. 2, pp. 713–718, (1992) doi: 10.1109/18.119732.
[11] P. Wright, M. C. Parker, and A. Lord, “Simulation results of Shannon entropy based flexgrid routing and spectrum assignment on a real network topology,” 39th European Conference and Exhibition on Optical Communication (ECOC 2013), London, 2013, pp. 1-3. doi: 10.1049/cp.2013.1428 .
[12] Y. Yu, J. Zhang, Y. Zhao, X. Cao, X. Lin, and W. Gu, “The first single-link exact model for performance analysis of flexible grid WDM networks,” Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), Anaheim, CA, 2013, pp. 1-3.
[13] J. Kim, S. Yan, A. Fumagalli, E. Oki, and N. Yamanaka, “An analytical model of spectrum in a two-service elastic optical link,” IEEE Global Communications Conference (GLOBECOM), San Diego, CA, 2015, pp. 1-6.
doi: 10.1109/GLOCOM..7417243
[14] A. Rosa, C. Cavdar, S. Carvalho, J. Costa, and L. Wosinska, “Spectrum allocation policy modeling for elastic optical networks,” High Capacity Optical Networks and Emerging/Enabling Technologies, Istanbul, 2012, pp. 242-246.
doi: 10.1109/HONET.2012.6421472
[15] B.C. Chatterjee and E. Oki, “Performance evaluation of spectrum allocation policies for elastic optical networks,” in 17th International Conference on Transparent Optical Networks (ICTON), 2015, pp. 1-4.
doi: 10.1109/ICTO/.7193485
[16] W. Fadini, B.C. Chatterjee, and E. Oki, “A subcarrier-slot partition scheme with first-last fit spectrum allocation for elastic optical networks,” Computer Networks, Volume 91, 2015, Pages 700-711, https://doi.org/10.1016/ 2015.08.048.
[17] Y. Yin, H. Zhang, M. Zhang, M. Xia, Z. Zhu, S. Dahlfort, and S. Yoo, “Spectral and spatial 2D fragmentation-aware routing and spectrum assignment algorithms in elastic optical networks [invited],” IEEE/OSA Journal of Optical Communications and Networking, vol. 5, no. 10, pp. A100-A106, Oct. 2013. doi: 10.1364/JOCN.5.00A100
[18] X. Chen, A. Jukan, and A. Gumaste, “Multipath de-fragmentation: achieving better spectral efficiency in elastic optical path networks,” in Proceedings IEEE INFOCOM, Turin, 2013, pp. 390-394.
doi: 10.1109/INFCOM.2013.6566801
[19] J. Comellas, X. Calzada, and G. Junyent, “Efficient spectrum assignment in elastic optical networks,” in 18th International Conference on Transparent Optical Networks (ICTON), Trento, 2016, pp. 1-4. doi: 10.1109/ICTON.2016.7550506
[20] Y. Qiu, “An efficient spectrum assignment algorithm based on variable ( 2017), Pages 39-46, ISSN 1573-4277, https://doi.org/10.1016/j.osn.2016.11.005.
[21] S. Sugihara, Y. Hirota, S. Fujii, H. Tode, and T. Watanabe, “Dynamic resource allocation for immediate and advance reservation in spacedivision-multiplexing-based elastic optical networks,” IEEE/OSA Journal of Optical Communications and Networking, vol. 9, no. 3, pp. 183-197, March 2017. doi: 10.1364/JOCN.9.000183
[22] S. K. Singh and A. Jukan, “Efficient spectrum defragmentation with holding-time awareness in elastic optical networks,” IEEE/OSA Journal of Optical Communications and Networking, vol. 9, no. 3, pp. B78-B89, March 2017. doi: 10.1364/JOCN.9.000B78
[23] S. K. Singh, W. Bziuk, and A. Jukan, “Analytical performance modeling of spectrum defragmentation in elastic optical link networks,” Opt. Switching Netw., vol. 24, pp. 25–38, 2017 ISSN 1573-4277, https://doi.org/10.1016/j.osn.2016.11.001.
[24] R. Proietti, C. Qin, B. Guan, Y. Yin, R. P. Scott, R. Yu, and S. Yoo, “Rapid and complete hitless defragmentation method using a coherent RX lo with fast wavelength tracking in elastic optical networks,” Opt. Exp., vol. 20, no. 24, pp. 26 958–26 968, 2012. https://doi.org/10.1364/OE.20.026958
[25] X. Wang, I. Kim, Q. Zhang, P. Palacharla, and M. Sekiya, “A hitless defragmentation method for self-optimizing flexible grid optical networks,” in 38th European Conference and Exhibition on Optical Communications, Amsterdam, 2012, pp. 1-3. doi: 10.1364/ECEOC.2012.P5.04
[26] R. Wang and B. Mukherjee, “Provisioning in elastic optical networks with non-disruptive defragmentation,” Journal of Lightwave Technology, vol. 31, no. 15, pp. 2491-2500, Aug.1, 2013. doi: 10.1109/JLT.2013.2268535
[27] F. Cugini, M. Secondini, N. Sambo, G. Bottari, G. Bruno, P. Iovanna, and P. Castoldi, “Push-pull technique for defragmentation in flexible optical networks,” in Proc National Fiber Optic Engineers Conference, OSA Technical Digest (Optical Society of America, 2012), paper JTh2A.40. https://doi.org/10.1364/NFOEC.2012.JTh2A.40
[28] M. Zhang, Y. Yin, R. Proietti, Z. Zhu, and S. J. B. Yoo, "Spectrum Defragmentation Algorithms for Elastic Optical Networks using Hitless Spectrum Retuning Techniques," in Optical Fiber Communication Conference/National Fiber Optic Engineers Conference 2013, OSA Technical Digest (online) (Optical Society of America, 2013), paper OW3A.4. https://doi.org/10.1364/OFC.2013.OW3A.4
[29] R. Zhu, Y. Zhao, H. Yang, X. Yu, J. Zhang, A. Yousefpour, N. Wang, and J. P. Jue, “Dynamic time and spectrum fragmentation-aware service provisioning in elastic optical networks with multi-path routing,” Opt. Fiber Technol., vol. 32, pp. 13–22, 2016. ISSN 1068-5200 https://doi.org/10.1016/j.yofte.2016.08.009
[30] O.Pedrola, A. Castro, L. Velasco, M. Ruiz, J. P. Fernández-Palacios, and D. Careglio. "CAPEX Study for a Multilayer IP/MPLSOver-Flexgrid Optical Network", Journal of Optical Communications and Networking, 2012. Vol 4, Issue: 8, Aug. 2012 pp. 639 - 650 DOI: 10.1364/JOCN.4.000639 .
Citation
D. Sharma, S. Kumar, "Network Blocking Probability Based Evaluation of Spectrum Fragmentation in Elastic Optical Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1353-1362, 2018.
Stage Prediction of Lung Tumor Identification: A Decision Tree Model for Particle Swarm Optimization Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1363-1372, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13631372
Abstract
Text mining has become a basic methodology for computational applications in the field of medical Reports. Text mining can be applied in the medical field for diagnosis of organs like Lung tumor, Head and neck, diabetes and other related diseases. Lung tumor is the most common disease, with more than one million cases being reported worldwide each year. The most effective way to reduce lung tumor deaths is by early diagnosis. This study aims to determine the lung tumor TNM Staging diagnosis. This research data uses National Cancer Institute (NCI) from UCI machine learning. Historical Medical Text Reports constitute a rich and varied source of information, which is today readily accessible, due to large-scale digitization efforts. But in spite of such large scale digitization efforts, stage data in Tumor (cancer) registries is often incomplete, inaccurate, or simply not collected. This paper describes a classification that automatically extracts Tumor staging information from the medical reports that identify malignant cases that are well suited for TNM staging using one class. This is because the decision is unaffected by the outliers and the form of the data fits more precisely. The system uses text classification techniques to extract elements of the stage listed in Tumor staging guidelines. When processing new reports, it classifies relevant sentences to help reach the staging decision and consequently, assigns the most likely stage. This Staging decision is appropriate for medical Text mining.
Key-Words / Index Term
Text data mining, Tumor staging, Decision tree and PSO
References
[1] K.Arutchelvan,2dr.Ponperiasamy”evaluation of staging classification in lung cancer”
International journal of advanced research in computer science and software engineering volume 6, issue 8, august 2016
[2] Alexandreszabo and leandronunes de castro” a constructive data classification version of the particle swarm optimization algorithm” hindawi publishing corporation Mathematical Problems in engineering volume 2013, article id 459503, 13pageshttp://dx.doi.org/10.1155/2013/459503
[3] Chi-hyuckjun†, yun-jucho and hyeseon lee present “improving tree-based classification rules using a particle swarm optimization” springer, ifip advances In information and communication technology, aict-398 (part ii), pp.9-16, 2013
[4] David e. Midthun “early detection of lung cancer [version 1; referees: 3 approved]” 25 April 2016, 5(f1000 faculty rev):739 (doi:10.12688/f1000research.7313.1)
[5] David e. Rumelhart, geoffrey e. Hinton, ronald j. Williams, “learning representations by backpropagating errors”, letter to nature, 1986.
[6] Divya chauhan, varunjaiswal” development of computational tool for lung cancer prediction using data mining” international journal of computer applications technology and research volume 5– issue 7, 417 - 421, 2016
[7] Eberhart, R.C. and Kennedy, J. “A new optimizer using particle swarm theory”, Proceeding of Sixth International Symposium on Micromachine and Human Science, pp. 39-43, 1995.
[8] Kennedy, J., Eberhart, R.C. and Shi, Y. “Swarm intelligence”, Morgan Kaufmann Publishers, San Francisco, 2001.
[9] Hassanlemjabbar-alaoui , omeruihassan, yi-wei yang, petrabuchanan” lung cancer: biology and treatment options” © 2015 elsevier
[10] Iain a. Mccowan, phd, darren c. Moore, meng, anthony n. Nguyen, phd, Rayleen v. Bowman, phd, belinda e. Clarke, phd, edwina e. Duhig, mary-jane fry” collection of cancer stage data by classifying free-textMedical reports” j am med inform assoc. 2007;14:736 –745. Doi 10.1197/jamia.m2130
[11] kun-huangchen, kung-jengwang, min-lung tsai, kung-min wang, angeliamelani adrian1, wei-chungcheng, tzu-sen yang, nai-chia teng, kuo-pin tan and ku-shangchang: “gene selection for cancer identification: a decision tree model empowered by particle swarm optimization algorithm”. Chen et al. Bmc bioinformatics 2014.
[12] y.-j. Lee, o. L. Mangasarian, and w. H. Wolberg, “breast cancer survival and chemotherapy: a support vector machine analysis”, data mining institute, computer sciences department, university of wisconsin, 2000.
[13] C.J. Mantas, J. Abellán, Credal-c4.5: Decision tree based on imprecise probabilities to classify noisy data, Expert Systems with Applications, 41 (2014) 4625-4637.
[14] Mamuslim, shrukmana , e sugiharti1 , b prasetiyo1 and s alimah2” optimization of c4.5 algorithm-based particle swarm optimization for breast cancer diagnosis” international conference on mathematics, science and education 2017 (icmse2017)
[15] Paul thompson, rizatheresa batista-navarro, georgios kontonatsios,Jacob carter, elizabeth toon, john mcnaught, carsten timmermann,Michael worboys, sophia ananiadou “Text mining the history of medicine” plos one | doi:10.1371/journal.pone.0144717 January 6, 2016
[16] Perveen S 2016 Performance Analysis of Data Mining Classification Techniques to Predict Diabetes publisher: Procedia Comp. Sci. 82 115-121
[17] Pranavtejagarikapati , naveenkumarpenki, sashankgogineni “improvised gene selection using particle swarm optimization with decision tree as classifier” international journal of new technology and research (ijntr) issn:2454-4116, volume-3, issue-9, september 2017 pages 80-86
[18] j.r, quinlan, “induction of decision trees”, journal of machine learning, volume 1, number 1, march, 1986.(10)
[19] N.V. Ramana Murthy and Prof. M.S. Prasad babu” a critical study of classification algorithms for lungcancer disease detection and diagnosis” International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 1041-1048
[20] J. Ross Quinlan(1993) C4.5: Programs for Machine Learning by. Morgan Kaufmann Publishers, Inc.,
[21] Sujatha, dr.k.usha rani, ”evaluation of decision tree classifiers on tumor data sets”, ijettcs, vol2, issue4, july-aug2013, pg.no:418-423
[22] Thangaraju p, barkavi g “lung cancer early diagnosis using some data mining classification techniques: a survey” an international journal of advanced computer technology, 3 (6), june-2014 (volume-iii, issue-vi)
[23] S. Tsim , c.a. O’dowd, r. Milroy , s. Davidson “staging of non-small cell lung cancer (nsclc):a review” 2010 elsevier ltd
[24] Vanaja, s. And k. Rameshkumar presents “performance analysis of classification algorithms on medical diagnoses-a survey” journal of computer science,2014.
[25] International Journal of Scientific Research in Computer Sciences and Engineering (ISSN: 2320-7639)
[26] International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256).
Citation
P. Jyotsna, P. Govindarajulu P, "Stage Prediction of Lung Tumor Identification: A Decision Tree Model for Particle Swarm Optimization Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1363-1372, 2018.
Financial Market Predictions: Generative Vs Discriminative Methods
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1373-1378, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13731378
Abstract
Prediction of stock market is acclaimed by many as one of the most challenging areas for machine learning. The existence of quant industry that makes use of artificial intelligence based computational methods to predict the market provide enough evidence contrary to Efficient Market Hypothesis and Random Walk theory. Recent research on the financial market has focused on machine learning based approaches where instead of specifying the rules, learning algorithms are employed to make use of existing data. Financial markets provide one of the most organized data sets where data from each tick is recorded. Both generative and discriminative class of machine learning techniques have been explored in search of improved accuracy. Even with the abundance of structured financial data, complex, chaotic and nonlinear nature of the market that can ride on public emotions keeps the scope for probabilistic generative methods. This paper discusses the usability of machine learning techniques from both the classes: generative and discriminative along with the characteristics of data that enables them.
Key-Words / Index Term
Discriminative, Financial market, Generative, Machine Learning, Sentiment Analysis, Supervised Learning
References
[1] K. Wang, C. Zong, and K.-Y. Su, “Integrating Generative and Discriminative Character-Based Models for Chinese Word Segmentation,” ACM Trans. Asian Lang. Inf. Process., vol. 11, no. 2, pp. 1–41, 2012.
[2] A. Y. Ng and M. I. Jordon, On Discriminative vs. Generative Classifiers: A comparison of logistic regression and naive Bayes. MIT Press, 2002.
[3] P. M. Long, R. A. Servedio, and H. U. Simon, “Discriminative learning can succeed where generative learning fails,” Inf. Process. Lett., vol. 103, no. 4, pp. 131–135, 2007.
[4] J. L. Ticknor, “A Bayesian regularized artificial neural network for stock market forecasting,” Expert Syst. Appl., vol. 40, no. 14, pp. 5501–5506, 2013.
[5] L. Deng and N. Jaitly, “Deep Discriminative and Generative Models for Pattern Recognition,” in Handbook Of Pattern Recognition And Computer Vision (5th Edition), Fifth., C. C. Hau, Ed. World Scientific Press, 2015, pp. 1–26.
[6] T. S. B. Fletcher, “Machine learning for financial market prediction,” p. 207, 2012.
[7] C. M. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag Berlin, Heidelberg ©2006, 2006.
[8] J. Xu, H. Li, and S. Zhou, “An Overview of Deep Generative Models,” IETE Tech. Rev., vol. 32, no. 2, pp. 131–139, 2015.
[9] J. Patel, S. Shah, P. Thakkar, and K. Kotecha, “Predicting stock market index using fusion of machine learning techniques,” Expert Syst. Appl., vol. 42, no. 4, pp. 2162–2172, 2015.
[10] B. K. Wong and Y. Selvi, “Neural network applications in finance: A review and analysis of literature (1990–1996),” Inf. Manag., vol. 34, no. 3, pp. 129–139, 1998.
[11] G. S. Atsalakis and K. P. Valavanis, “Surveying stock market forecasting techniques - Part II: Soft computing methods,” Expert Syst. Appl., vol. 36, no. 3 PART 2, pp. 5932–5941, 2009.
[12] R. C. Cavalcante, R. C. Brasileiro, V. L. F. Souza, J. P. Nobrega, and A. L. I. Oliveira, “Computational Intelligence and Financial Markets: A Survey and Future Directions,” Expert Syst. Appl., vol. 55, pp. 194–211, 2016.
[13] E. A. Gerlein, M. McGinnity, A. Belatreche, and S. Coleman, “Evaluating machine learning classification for financial trading: An empirical approach,” Expert Syst. Appl., vol. 54, pp. 193–207, 2016.
[14] A. Khadjeh Nassirtoussi, S. Aghabozorgi, T. Ying Wah, and D. C. L. Ngo, “Text mining for market prediction: A systematic review,” Expert Syst. Appl., vol. 41, no. 16, pp. 7653–7670, 2014.
[15] B. S. Kumar and V. Ravi, A survey of the applications of text mining in financial domain, vol. 114. Elsevier B.V., 2016.
[16] F. Z. Xing, E. Cambria, and R. E. Welsch, “Natural language based financial forecasting: a survey,” Artif. Intell. Rev., pp. 1–25, 2017.
[17] P. Hájek, “Combining bag-of-words and sentiment features of annual reports to predict abnormal stock returns,” Neural Comput. Appl., vol. 29, no. 7, pp. 343–358, 2018.
[18] Q. Li, J. Wang, F. Wang, P. Li, L. Liu, and Y. Chen, “The role of social sentiment in stock markets : a view from joint effects of multiple information sources,” Multimed. Tools Appl., 2016.
[19] J. Padmanabhan and M. J. Johnson Premkumar, “Machine Learning in Automatic Speech Recognition: A Survey,” IETE Tech. Rev., vol. 32, no. 4, pp. 240–251, 2015.
Citation
P. Misra, S. Chaurasia, "Financial Market Predictions: Generative Vs Discriminative Methods," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1373-1378, 2018.
A Grid Connected Hybrid System with A Transformer coupled Bidirectional DC-DC Converter
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1379-1385, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13791385
Abstract
In this paper, a grid-connected hybrid system consisting of photovoltaic (PV) array, wind turbine, and battery storage are considered and a control strategy for power flow management of the considered hybrid system with an efficient transformer-coupled bidirectional dc-dc converter is presented. This transformer is used to interface the non-conventional energy sources to the main dc bus of the system. The specified converter consists of a buck-boost converter fused with multi-input dc-dc converter and a full bridge dc–ac inverter. A boost half-bridge converter is used to tackle power from the wind generator and a bipolar buck-boost converter is used to tackle power from PV panel along with battery charging and discharging control. Compared with the traditional methods, the proposed method can coordinate all the sources in such a way that to utilize it in an efficient way using Maximum power point tracking (MPPT) control and State of charge (SOC) control for PV, Wind and battery respectively and a coordinated control strategy for MPPT and battery SOC control by reducing control complexity, also provide galvanic isolation using High frequency transformer thus significant savings in component count and also switching and conduction losses will be reduced. The presented system aims to meet the load demand, manage the power flow from considered sources, inject surplus power into the grid and charge the battery from the grid as and when required. Simulation results obtained using MATLAB/Simulink
Key-Words / Index Term
Bidirectional buck-boost DC-DC converter, full-bridge boost DC-AC Inverter, hybrid system, maximum power point tracking, solar photovoltaic (PV), transformer coupled boost dual-half-bridge bidirectional DC-DC converter
References
[1] W. Kellogg, M. Nehrir, G. Venkataramanan, and V. Gerez,“Generation unit sizing and cost analysis for stand-alone wind, photovoltaic and hybrid wind/PV systems,”IEEE Trans. Ind. Electron., vol. 13, no. 1, pp. 70-75, Mar. 1998.
[2] B. S. Borowy and Z. M. Salameh,“Dynamic response of a stand-alone wind energy conversion system with battery energy storage to a wind gust,” IEEE Trans. Energy Convers., vol. 12, no. 1, pp. 73-78, Mar. 1997.
[3] F. Valenciaga, P. F. Puleston, and P. E. Battaiotto, “Power control of a solar/wind generation system without wind measurement: a passivity/sliding mode approach,” IEEE Trans. Energy Convers., vol. 18, no. 4, pp. 501-507, Dec. 2003.
[4] Z. Qian, O. A. Rahman, and I. Batarseh, “An integrated four-Port DC/DC converter for renewable energy applications, "IEEE Trans. Power Electron.,vol. 25, no. 7, pp. 1877-1887, July. 2010.
[5] F. Nejabatkhah, S. Danyali, S. Hosseini, M. Sabahi, and S. Niapour, “Modeling and control of a new three-input DC-DC boost converter for hybrid PV/FC/battery power system,” IEEE Trans. Power Electron., vol. 27, no. 5, pp. 2309-2324, Feb. 2014.
[6] H. C. Chiang, T. T. Ma, Y. H. Cheng, J. M. Chang, and W. N Chang, “Design and implementation of a hybrid regenerative power system combining grid-tie and uninterruptible power supply functions,” IET Renew. Power Gen., vol. 4, no. 1, pp. 8599, 2010.
[7] F. Giraud and Z. M. Salameh, “Steady-state performance of a grid-connected rooftop hybrid wind-photovoltaic power system with battery storage, ” IEEE Trans. Energy Convers., vol. 16, no. 1, pp. 1-7, Mar. 2001.
[8] S. K. Kim, J. H. Jeon, C. H. Cho, J. B. Ahn, and S. H. Kwon, “Dynamic modeling and control of a grid-connected hybrid generation system with versatile power transfer," IEEE Trans. Ind. Electron., vol. 55, no. 4, pp. 1677-1688, Apr. 2008.
[9] H. Wu, K. Sun, S. Ding, and Y. Xing, “Topology derivation of non-isolated three-port dc-dc converters from DIC and DOC,” IEEE Trans. Power Electron., vol. 28, no. 7, pp. 3297-3307, July 2013.
[10] W.Li, C. Xu, H. Luo, Y. Hu, X. He, and C. Xia, “Decoupling-Controlled Triport Composited DC/DC Converter for Multiple Energy Interface” IEEE Trans. Ind. Electron., vol. 62, no. 7, pp. 4504-4513, July 2015.
[11] C. Xu, Y. Gu, H. Luo, Y. Hu, Y. Zhao, W. Li and X. He, “Performance analysis of coupled inductor based multiple-input DC/DC converter with PWM plus phase-shift (PPS)control strategy,” in Proc. of IEEE Energy Conversion Congress and Exposition, ECCE Asia’2013, pp. 994-998, Sept. 2013.
[12] B. Mangu and B.G. Fernandes, “Multi-input transformer coupled DCDC converter for PV-wind based stand-alone single phase power generating system, ” in Proc. of IEE EEnergy Convers. Congr. Expo. (ECCE), Pittsburgh, PA, USA, Sep. 2014, pp. 5288–5295.
[13] B. Mangu, S. Akshatha, D. Suryanarayana, and B. G. Fernandes, “Grid-Connected PV-Wind Battery based multi-input transformer-coupled bidirectional DC-DC converter for household applications,” IEEE Journal of Emerging and Selected Topics in Power Electronics, vol. 4, NO. 3, pp. 1086-1095, September 2016
Citation
J. Mano Priya, T. Narasimha Prasad, "A Grid Connected Hybrid System with A Transformer coupled Bidirectional DC-DC Converter," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1379-1385, 2018.
HAT: An Efficient Deduplicatable Dynamic POS Scheme
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1386-1391, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13861391
Abstract
Dynamic PoS is valuable cryptographic crude that empowers a user to check the trustworthiness of outsourced documents and to proficiently refresh the records in a cloud server. In spite of the fact that analysts have arranged a few dynamic PoS plots in single user situations, the issue in multi-user conditions has not been examined adequately. A sensible multi-user cloud stockpiling framework needs the safe client-side cross-user de-duplication strategy that allows a user to skirt the transferring technique and get the possession of the records now, once elective house proprietors of proportional documents have uploaded them to the cloud server. To the most straightforward of our information, none of the present dynamic PoS will bolster this framework. amid this paper, we tend to present the origination of de-duplicatable dynamic evidence of capacity related propose a development refers to as DeyPoS, to acknowledge dynamic PoS and secure cross-user duplication, in the meantime. Considering the difficulties of structure decent variety and individual tag age, we tend to abuse a one of a kind apparatus alluded to as Homomorphic Authenticated Tree (HAT).
Key-Words / Index Term
De-duplication, Proof of ownership, Dynamic proof of storage, Cloud Computing
References
[1] Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS, pp. 598–609, 2007.
[2] A. Juels and B. S. Kaliski, Jr., “PORs: Proofs of retrievability for large files,” in Proc. of CCS, pp. 584 –597,2007.
[3] F. Armknecht, J.-M. Bohli, G. O. Karame, Z. Liu, and C. A. Reuter, “Outsourced proofs of retrievability,” in Proc. of CCS, pp. 831–843, 2014.
[4] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of ASIACRYPT, pp. 90–107, 2008.
[5] Y. Dodis, S. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in Proc. of TCC, pp. 109–127, 2009.
[6] Z. Mo, Y. Zhou, and S. Chen, “A dynamic proof of retrievability (PoR) scheme with o(logn) complexity,” in Proc. of ICC, pp. 912–916, 2012.
[7] E. Shi, E. Stefanov, and C. Papamanthou, “Practical dynamic proofs of retrievability,” in Proc. of CCS, pp. 325–336, 2013.
[8] D. Cash, A. K¨upc¸ ¨u, and D. Wichs, “Dynamic proofs of retrievability via oblivious RAM,” in Proc. Of EUROCRYPT, pp. 279–295, 2013.
[9] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proc. of CCS, pp. 491–500, 2011.
[10] J. Xu, E.-C. Chang, and J. Zhou, “Weak leakage-resilient client side De-duplication of encrypted data in cloud storage,” in Proc. Of ASIACCS, pp. 195–206, 2013.
[11] Q. Zheng and S. Xu, “Secure and efficient proof of storage with De-duplication,” in Proc. of CODASPY, pp. 1– 12, 2012.
[12] R. Du, L. Deng, J. Chen, K. He, and M. Zheng, “Proofs of ownership and retrievability in cloud storage,” in Proc. of TrustCom, pp. 328–335, 2014.
[13] B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” in Proc. of INFOCOM, pp. 2904–2912, 2013.
[14] B. Wang, B. Li, and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,” IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 43–56, 2014.
[15] J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user modification,” in Proc. of INFOCOM, pp. 2121–2129, 2014.
Citation
K. N. Priyanka, K. Aruna Kumari, "HAT: An Efficient Deduplicatable Dynamic POS Scheme," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1386-1391, 2018.
User Behavior Patterns in Social Networks Using Generalized Sequence Pattern
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1392-1397, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13921397
Abstract
OSN`s have turned into the real world of data and excitement for many clients because of the colossal increment of the availability alternatives. Portable web has altered the clients to get to long range interpersonal communication destinations effortlessly and furthermore permits to different social multimedia content whenever, anyplace and in the interest of any character. Thusly, the association behaviors amongst clients and MSNs are becoming more extensive and entangled. This makes the investigation of client cooperations and behaviors more muddled. This paper principally expanded and enhanced the situation examination system for the particular social area, named as SocialSitu, and further proposed a novel calculation for clients` intention serialization investigation in light of great Generalized Sequential Pattern (GSP). We utilized the enormous volume of client behaviors records to investigate the continuous arrangement mode that is important to foresee client intention. Our test chosen two general sorts of intentions: playing and sharing of multimedia, which are the most widely recognized in MSNs, in view of the intention serialization calculation under various minimum support limit (Min_Support). By utilizing the clients` tiny behaviors examination on intentions, we found that the ideal personal conduct standards of every client under the Min_Support, and a client`s standards of conduct are diverse because of his/her character varieties in a huge volume of sessions information.
Key-Words / Index Term
Multimedia social networks, situation analytics, intention prediction, behavior pattern, big data
References
[1] Y. G. Jiang and J. J. Wang, “Partial Copy Detection in Videos:A Benchmark and an Evaluation of Popular Methods,” IEEETrans. Big Data, vol. 2, no. 1, pp. 32-42, Jan/Mar 2016, doi:10.1109/TBDATA.2016.2530714.
[2] C. K. Chang, H. Y. Jiang, H. Ming, and K. Oyama, “Situ: A situation-theoretic approach to context-aware service evolution,” IEEE Trans. Serv. Comput., vol. 2, no. 3, pp. 261-275, 2009, doi: 10.1109/TSC.2009.21.
[3] C. K. Chang, “Situation Analytics-A foundation for a new software engineering paradigm,” Computer, vol. 49, no. 1, pp. 24-33, Jan. 2016.
[4] Zhiyong Zhang ; Ranran Sun ; Xiaoxue Wang ; Changwei Zhao,"A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks"||IEEE Transactions on Big Data,doi:10.1109/TBDATA.2017.2657623.
[5] H. Ming, C. K. Chang, and J. Yang, “Dimensional SituationAnalytics : from Data to Wisdom,” Proc Int Comput Software Appl Conf, vol. 1, pp. 50-59, Jul. 2015, doi:10.1109/COMPSAC.2015.199.
[6] M. A. Rahman, H. N. Kim, A. El Saddik, and W. Gueaieb, “A context-aware multimedia framework toward personal social network services,” Multimedia Tools Appl., vol. 71, no. 3, pp.
1717-1747, Aug. 2014.
[7] Y. G. Shen, G. S. Guo, and J. J. WU, “A Context-aware Collaborative Filtering Algorithm on Mobile Recommendation,” Science Technology and Engineering, vol. 8, pp. 49-52+64, Aug. 2014.
[8] E. D. Tong, Q. Shen, J. Lei, Y. Liu, and H. Tang, “Study onContext-aware Technologies for Internet of Things,” Computer Science, vol. 4, no. 38, pp. 9-14+20, Apr. 2011.
[9] F. Amato, F. Gargiulo, V. Moscato, F. Persia, and A. Picariello, “Recommendation of multimedia objects for social network applications,” CEUR Workshop Proc., pp. 288-293, Mar. 2014.
[10] X. Liu, “Towards context-aware social recommendation via trust networks,” 14th International Conference on Web Information Systems Engineering (WISE 2013), pp. 121-134, Oct. 2013, doi: 10.1007/978-3-642-41230-1_11.
[11] Y. Zhang, T. J. Lv, and H. Q. Li, “Improved N-gram Prediction Model Research Based on Context-Aware Environment,” Microcomputer Applications, vol. 30, no. 9, 2009.
[12] R. Bar-David and M. Last, “Context-aware location prediction,” 5th International Workshop on Mining Ubiquitous and Social Environments (MUSE 2014), pp. 165-185, Sep. 2014.
[13] W. P. Lee and K. H. Lee, “Making smartphone service recommendations by predicting users’ intentions: A contextaware approach,” Inf. Sci., vol. 277, pp. 21-35, Sep. 2014.
[14] X. L. Shen, M. K. O. Lee, and C. M. K. Cheung, “Exploring online social behavior in crowdsourcing communities: A relationship management perspective,” Comput. Hum. Behav., vol. 40, pp. 144-151, Nov. 2014.
[15] Y. Chen, F. Li, J. Chen, B. Du, K.-K. R. Choo, and H. Hassanand, “EPLS: A novel feature extraction method for migration data clustering,” J. Parallel Distr. Com., submitted for publication.
[16] V. Radhakrishna, S. A. Aljawarneh, P. V. Aljawarneh, and K.-K. R. Choo, “A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns,” Soft Comput., preprint, 18 Nov. 2016, doi: 10.1007/s00500-016-2445-y.
[17] Z. Zhang, R. Sun, C. Zhao, C. K. Chang, and B. B. Gupta, “CyVOD: A Novel Trinity Multimedia Social Network Scheme,” Multimedia Tools Appl., 26 Nov. 2016, doi:10.1007/s11042-016-4162-z.
Citation
N. Ramavathy, V.Priyadarshini, "User Behavior Patterns in Social Networks Using Generalized Sequence Pattern," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1392-1397, 2018.