A Non-Dominated Sorting TLBO Algorithm for Multi-Objective Short-Term Hydrothermal Self Scheduling of GENCOs in a Competitive Electricity Market
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.191-203, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.191203
Abstract
In competitive electricity market worldwide raises many challenging tasks related to the economic and optimal operation of electric power systems. In deregulated market structure, the generation is being despatched by means of hourly power delivery. The penalty is improved on power producers, if they fail to attain the planned energy delivery. The inadequate hydel resources associated with environmental constraints of thermal plants necessiates a precise scheduling system to satisfy the ever growing power demand. The power generator in a hydrothermal has to manage the conflicting objectives of profit maximization and emission minimization. Normally, the multi-objective optimization problem is tuned for optimising the two or more conflicting objectives subject to some constraints. Short-term hydrothermal scheduling (STHTS) problem deals with more objective functions such as profit maximization and emission minimization. Hence it is necessary to evolve a constructive framework based on intelligent techniques. In this paper, a stochastic multi-objective model is derived for the flexible scheduling of hydrothermal plants with valve-point loading effects. A non-dominated sorting teaching learning based optimization (NSTLBO) algorithm is presented for solving STHTS problem. The proposed algorithm is applied to derive a pair of non-dominated results and then the fuzzy based methodology has been argued to choose the best solution. It is tested on a three thermal and four hydro test system with twenty four hour time period. The results are extracted by means of total profit and emission from the plants. Comparative studies have also been done to validate the viability of the proposed method.
Key-Words / Index Term
Deregulation, Hydrothermal Scheduling, Profit Maximization, Emission Limitations, Non-dominated Sorting TLBO algorithm
References
[1] A. J. Wood and B. F. Wollenberg, Power Generation, Operation, and Control, vol. 37. 1996.
[2] M. Shahidehpour, H. Yamin, and Z. Li, Market Operations in Electric Power Systems : Forecasting, Scheduling, and Risk Management, vol. 9. 2002.
[3] Mohammad Shahidehpour, Muwaffaq, Alomoush, Restructured electrical power systems, Operation, Trading, and volatility, John Wiley & Sons (New York, 2000).
[4] J. L. Golden, C. J. Stansberry, R. L. Vice, J. T. Wood, J. Ballance, G. Brown, K. Kamya, E. K. Nielsen, H. Nakajima, M. Ookubo, I. Iyoda, and G. W. Cauley, “Potential Impacts of Clean Air Regulations on System Operations,” IEEE Trans. Power Syst., vol. 10, no. 2, pp. 647–656, 1995.
[5] M. Basu, “A simulated annealing-based goal-attainment method for economic emission load dispatch of fixed head hydrothermal power systems,” Int. J. Electr. Power Energy Syst., vol. 27, no. 2, pp. 147–153, 2005.
[6] M. Basu, “Goal-attainment method based on simulated annealing technique for economic-environmental-dispatch of hydrothermal power systems with cascaded reservoirs,” Electr. Power Components Syst., vol. 32, no. 12, pp. 1269–1286, 2004.
[7] C. L. Chiang, “Optimal economic emission dispatch of hydrothermal power systems,” Int. J. Electr. Power Energy Syst., vol. 29, no. 6, pp. 462–469, 2007.
[8] K. K. Mandal and N. Chakraborty, “Short-term combined economic emission scheduling of hydrothermal systems with cascaded reservoirs using particle swarm optimization technique,” Appl. Soft Comput. J., vol. 11, no. 1, pp. 1295–1302, 2011.
[9] G. Nadakuditi, V. Sharma, and R. Naresh, “Non-dominated Sorting Disruption-based Gravitational Search Algorithm with Mutation Scheme for Multi-objective Short-Term Hydrothermal Scheduling,” Electr. Power Components Syst., vol. 44, no. 9, pp. 990–1004, 2016.
[10] A. Ahmadi, J. Aghaei, H. A. Shayanfar, and A. Rabiee, “Mixed integer programming of multiobjective hydro-thermal self scheduling,” Appl. Soft Comput. J., vol. 12, no. 8, pp. 2137–2146, 2012.
[11] S. Padmini, R. Jegatheesan, and D. F. Thayyil, “A Novel Method for Solving Multi-Objective Hydrothermal Unit Commitment and Sheduling for GENCO Using Hybrid LR-EP Technique,” in Procedia Computer Science, 2015, vol. 57, pp. 258–268.
[12] R. V. Rao, D. P. Rai, and J. Balic, “Multi-objective optimization of machining and micro-machining processes using non-dominated sorting teaching–learning-based optimization algorithm,” Journal of Intelligent Manufacturing, pp. 1–23, 2016.
[13] P. Attaviriyanupap, H. Kita, E. Tanaka, and J. Hasegawa, “A hybrid LR-EP for solving new profit-based UC problem under competitive environment,” IEEE Trans. Power Syst., vol. 18, no. 1, pp. 229–237, 2003.
[14] K. Asokan, and R. Ashok Kumar, “An Innovative approach for self Scheduling of Generation companies to maximize the Profit by considering Reserve generation”, Australian Journal of Basic and Applied Sciences, vol. 8(Issue 6):179-185, 2014.
[15] F. Zou, L. Wang, X. Hei, D. Chen, and B. Wang, “Multi-objective optimization using teaching-learning-based optimization algorithm”, Engineering Applications of Artificial Intelligence, vol. 26(Issue 4):1291-300, 2013.
[16] D. Li, C. Zhang, X. Shao, and W. Lin, “A multi-objective TLBO algorithm for balancing two-sided assembly line with multiple constraints,” Journal of Intelligent Manufacturing, vol. 27, no. 4. pp. 725–739, 2016.
[17] R. Venkata Rao and G. G. Waghmare, “A comparative study of a teaching-learning-based optimization algorithm on multi-objective unconstrained and constrained functions,” J. King Saud Univ. - Comput. Inf. Sci., vol. 26, no. 3, pp. 332–346, 2014.
[18] P. K. Roy, “Teaching learning based optimization for short-term hydrothermal scheduling problem considering valve point effect and prohibited discharge constraint,” Int. J. Electr. Power Energy Syst., vol. 53, no. 1, pp. 10–19, 2013.
[19] R. V. Rao and V. Patel, “An elitist teaching-learning-based optimization algorithm for solving complex constrained optimization problems,” Int. J. Ind. Eng. Comput., vol. 3, no. 4, pp. 535–560, 2012.
[20] R. V. Rao, V. J. Savsani, and J. Balic, “Teaching-learning-based optimization algorithm for unconstrained and constrained real-parameter optimization problems,” Eng. Optim., vol. 44, no. 12, pp. 1447–1462, 2012.
[21] R. V. Rao and V. Patel, “An improved teaching-learning-based optimization algorithm for solving unconstrained optimization problems,” Sci. Iran., vol. 20, no. 3, pp. 710–720, 2013.
[22] K. Yu, X. Wang, and Z. Wang, “An improved teaching-learning-based optimization algorithm for numerical and engineering optimization problems,” J. Intell. Manuf., vol. 27, no. 4, pp. 831–843, 2016.
[23] S. C. Satapathy, A. Naik, and K. Parvathi, “Weighted Teaching-Learning-Based Optimization for Global Function Optimization,” Appl. Math., vol. 4, no. 3, pp. 429–439, 2013.
[24] Q. Niu, H. Zhang, and K. Li, “An improved TLBO with elite strategy for parameters identification of PEM fuel cell and solar cell models,” Int. J. Hydrogen Energy, vol. 39, no. 8, pp. 3837–3854, 2014.
[25] T. Niknam, R. Azizipanah-Abarghooee, and J. Aghaei, “A new modified teaching-learning algorithm for reserve constrained dynamic economic dispatch,” IEEE Trans. Power Syst., vol. 28, no. 2, pp. 749–763, 2013.
Citation
Pasupulati Baburao, R Ashok Kumar, Balamurugan G, K Asokan, "A Non-Dominated Sorting TLBO Algorithm for Multi-Objective Short-Term Hydrothermal Self Scheduling of GENCOs in a Competitive Electricity Market," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.191-203, 2018.
Performance Comparison of Multi class SVM, Support Vector Machine, k-NN and Binary Classification for Intrusion Detection
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.204-211, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.204211
Abstract
Intrusion detection is a fundamental part of security tools, for example, adaptive security appliances, intrusion detection systems, intrusion prevention systems and firewalls. Intrusion detection systems (IDS) plays a important role in detecting the attacks that occur in the PC or networks. Intrusion detection systems (IDS) are the network security mechanism that monitors network and system activities for malicious action.it become indispensable tool to keep information system safe and reliable. Different intrusion detection methods are used, but their performance is an problem. . Intrusion detection performance depends on accuracy, which needs to enhance to decrease false alarms and to increase the detection rate. Such procedures demonstrate limitations, are efficient for use in large datasets, for example, system, and network data. The intrusion detection system is used to analyzing huge traffic data, therefore efficient classification method is important to overcome the issue. Well-known machine learning techniques, namely, SVM, Multiclass SVM, k-NN, Binary Classification (BC) are applied. These techniques well known because of their capability in Classification. The NSL–knowledge discovery and data mining, dataset is used, which is considered a benchmark in the evaluation of intrusion detection mechanisms. The results indicate that Multiclass SVM outperforms other approaches.
Key-Words / Index Term
Support vector machine SVM, Multiclass SVM, k-NN, Binary Classification, NSL-KDD
References
[1] Binhan Xu, Shuyu Chen, Hancui Zhang, Tianshu Wu,” Incremental k-NN, SVM Method in Intrusion Detection”
[2] Manjiri V. Kotpalliwar, 2Rakhi Wajgi” Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP’99 IDS Database”
[3] Muhammad Shakil Pervez, and Dewan Md. Farid “Feature Selection and Intrusion classification in NSL-KDD Cup 99 Dataset Employing SVMs”
[4] Sumaiya Thaseen, Ch.Aswani Kumar “Intrusion Detection Model Using fusion of PCA and
Optimized SVM”
[5]A.M.Chandrasekar, K.Raghuveer, Intrusion Detection Techniques by using K-Means, Fuzzy Neural Networks, SVM Classifier
[6] Noreen Kausar , Brahim Belhaouari Samir, Suziah Sulaiman, Iftikhar Ahmad , Muhammad Hussain “An Approach towards Intrusion Detection using PCA Feature Subsets and SVM”
[7] I. Ahmad, M. Basheri, M.J. Iqbal, A. Raheem “Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection”
[8] Gong Shang-fu,Zhao Chun-lan “Intrusion Detection System Based on Classification”
[9] Nathan Shone, Tran Nguyen Ngoc, Vu Dinh Phai, and Qi Shi “A Deep Learning Approach to Network Intrusion Detection”
[10] Longjie Li, Yang Yu, Shenshen Bai, Ying Hou, and Xiaoyun Chen,”An Effective Two-Step Intrusion Detection Approach Based on Binary Classification and k-NN”
[11] Chuanlong Yin, Yuefei Zhu, Jinlong Fei, and Xinzheng He “Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks “
[12] Rajesh Wankhede, G. H. Raisoni “Intrusion Detection System using Classification Technique”
[13] Abdulla Amin Aburomman, Mamun Bin Ibne Reaz “A novel SVM-kNN-PSO ensemble method for intrusion detection system “
[14]H. Wang, J. Gu, S. Wang, “An effective intrusion detection framework based on SVM with feature augmentation, Knowledge-Based Systems”, Volume 136, 2017, Pages 130-139, ISSN 0950-7051, https://doi.org/10.1016/j.knosys.2017.09.014.
[15]F. Kuang, X. Weihong , S. Zhang, A novel hybrid KPCA and SVM with GA model for intrusion detection, Applied Soft Computing,Volume 18,2014,Pages 178-184,ISSN 1568-4946, https://doi.org/10.1016/j.asoc.2014.01.028.
[16]A. A. Aburomman, M.B. Reaz, A novel SVM-kNN-PSO ensemble method for intrusion detection system, Applied Soft Computing, Volume 38, 2016, Pages 360-372, ISSN 1568-4946, https://doi.org/10.1016/j.asoc.2015.10.011.
[17]M.R. Raman, N. Somu, K. Kirthivasan, R. Liscano, V.S. Sriram, An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine, Knowledge-Based Systems, Volume 134, 2017, Pages 1-12, ISSN 0950-7051, https://doi.org/10.1016/j.knosys.2017.07.005.
[18] S. Teng, N. Wu, H. Zhu, L. Teng and W. Zhang, "SVM-DT-based adaptive and collaborative intrusion detection," in IEEE/CAA Journal of Automatica Sinica, vol. 5, no. 1, pp. 108-118, Jan. 2018. doi: 10.1109/JAS.2017.7510730.
[19] N.Farnaaz, M.A. Jabbar, Random Forest Modeling for Network Intrusion Detection System, Procedia Computer Science, Volume 89, 2016, Pages 213-217, ISSN.18770509,https://doi.org/10.1016/j.procs.2016.06
[20] Chih-Wei Hsu and Chih-Jen Lin, “A Comparison of Methods for Multiclass Support Vector Machines”, IEEE Transaction on Neural Networks, 2002.
[21].Ahmad, F. Amin, "Towards feature subset selection in intrusion detection," 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference, Chongqing, 2014, pp. 68-73.
[22]S.M. Bamakan, H. Wang, T. Yingjie, Y. Shi, An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization, Neuro computing, Volume 199, 2016, Pages 90-102.
[23] J.Jayshree, and L. Ragha. "Intrusion detection system using support vector machine." International Journal of Applied Information Systems (HAIS)-ISSN (2013): 2249-0868
[24] C.C .Chang,.and C.J. Lin., 2011. LIBSVM: a library for support vector machines. ACM transactions on intelligent systems and technology (TIST), 2(3), p.27.
Citation
Kumar Parasuraman, A. Anbarasa Kumar, "Performance Comparison of Multi class SVM, Support Vector Machine, k-NN and Binary Classification for Intrusion Detection," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.204-211, 2018.
Text Categorization using Apriori Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.212-217, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.212217
Abstract
Knowledge exploration from the large set of data, generated as a result of the various data processing activities is an effective application of data mining. Text mining applications have also become important areas of application in the field of document processing. Document clustering has also become an important process for helping the information retrieval systems to organize vast amount of data. This can be tried with categorical data and for image categorization. At the same, time, frequent pattern mining has also become a very important undertaking in data mining. In the research work described in this paper, Apriori algorithm has been applied to generate frequent itemset and this method contains mainly two steps, viz. candidate generation and pruning techniques for the satisfaction of the desired objective. Aim of this paper is to focus on frequent itemset generation from dataset of variable length. Several steps have been executed to achieve the desired result. The primary goal has been to build a method which can be used to find significant items from a text database in an easy and efficient way.
Key-Words / Index Term
Itemsets, Tokenization, Stemming, Apriori algorithm
References
[1] R. Agarwal, R. Srikant “Fast Algorithms for Mining Association Rules”, In Proceedings Of Int. Conf. on Very Lata Bases, pp. 487 – 499, 1994.
[2] B. Babcock, S. Babu, M. Datar,R. Motwani, J. Widom, “Models and Issues in Data Stream Systems”. In Proceedings Of ACM Symp. on Principles of Database Systems, pp. 1-16, 2002.
[3] R. Agrawal, T. Imielinski, and A. Swami,“Mining Association Rules between Sets of Items in Large Databases”, In Proceedings of ACM-SIGMOD International Conference on Management of Data, pp. 207–216, 1993.
[4] G. Manku, R. Motwani, “Approximate Frequency Counts over Data Streams”, In Proceedings of International Conference on Very Large Data Bases, pp. 346-357, 2002.
[5] S. Ozel, H. Atlay, “An Algorithm for Mining Association Rules Using Perfect Hashing and Database Pruning”, Güvenir Bilkent University, Department of Computer Engineering, Ankara, Turkey.
[6] J. Reynaldo, D.B. Tonara, “Data Mining Application using Association Rule Mining ECLAT Algorithm Based on SPMF”, 3rd International Conference on Electrical Systems, Technology and Information, 2017.
[7] S. Rewatkar, A. Pimpalkar, “Associated Sensor Patterns Mining of Data Stream from WSN Dataset”, International Journal on Computer Science and engineering, Vol 8, Issue 10, 2016.
[8] M. El-Hajj, O.R. Zaiane, “COFI Approach for Mining Frequent Itemsets Revisited”, In Proceedings of the Ninth ACM SIGMOD Workshop on Resesrach Isssues in Data Mining and Knowledge Discovery, pp. 70-75, 2004.
[9] W. Cheung, O.R. Zaïane, “Incremental Mining of Frequent Patterns Without Candidate Generation or Support Constraint”, In Proceedings of the Seventh International Database Engineering and Applications Symposium, 2003.
[10] X.Y. Wang, J. Zhang, H.B. Ma, Y.F. Hu, “A New Self-Adaptive Algorithm For Frequent Pattern Mining” , In Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, pp. 13-16, 2006.
[11] S. Aggarwal, R. Kaur, "Comparative Study of Various Improved Versions of AprioriAlgorithm", International Journal of Engineering Trends and Technogy, Vol 4, Issue 4, pp 687-690, 2013.
[12] M.J. Zaki, "Parallel and Distributed Association Mining: A Survey", In Proceedings of Concurrency IEEE, Vol 7, Issue 4, pp 14-25, 1999.
[13] S. Brin, R. Motwani, J. D. Ullman S. Tsur, “Dynamic Itemset counting and Implication Rules for Market Basket Data”, ACM SIGMOD, Vol 26, Issue 2, pp. 255-264, 1997.
[14] Tsay, Y. Jiuan, T. J. Hsu, Y. J. Rung, "FIUT: A New Method for Mining Frequent Itemsets” Information Sciences, Vol 179, Issue 11, 2009.
[15] G.Pyun, U.Yun, K.H.Ryu, “Efficient Frequent Pattern Mining Based on Linear Prefix Tree”, Knowledge-Based Systems,Vo. 55, Issue 1, pp 125-139, 2014.
[16] D. Xin, J. Han, X. Yan, H. Cheng, "Mining Compressed Frequent-Pattern Sets", Proceedings of the Thirty First international Conference on Very Large Data Bases, pp709-720, 2005.
Citation
D.Datta, A. Mitra, D. Nag, N. Roy Choudhury, "Text Categorization using Apriori Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.212-217, 2018.
Robustness Analysis of GWO/PID Approach in Control of Ball Hoop System with ITAE Objective Function
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.218-222, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.218222
Abstract
This work deals with robustness analysis of Grey Wolf Optimization (GWO) / Proportional-Integral-Derivative (PID) approach in control of ball hoop (BH) system with integral of time multiplied absolute error (ITAE) objective function. The robustness analysis of GWO/PID approach has been carried out with ±5% perturbation in the locations of the poles of the BH system. It has been observed that proposed GWO/PID approach with ITAE objective function gives satisfactory performance with ±5% perturbation.
Key-Words / Index Term
BH System, PID, GWO, ITAE, Robustness
References
[1] J. G. Ziegler, Ν. B. Nichols, "Optimum setting for automatic controllers", Trans. ASME, Vol. 64, pp. 7759-7768, 1942.
[2] G.H. Cohen and G.A. Coon, “Theoretical Investigation of Retarded Control”, The American Society of Mechanical Engineer, Vol. 75, pp. 827-834, 1953.
[3] M. Zhuang and D.P. Atherton , “Automatic tuning of optimum PID controllers”, IEEE Proceedings, Vol. 140, Issue 3, pp. 216-224, 1993.
[4] K.J. Astrom and T. Hagglund, “The future of PID control”, Control Engineering Practice, pp. 1163- 1175, 2001.
[5] K.H. Ang, and G. Chong, Y. Li, “PID control system analysis, design and technology”, IEEE Trans. Control System Technology, Vol. 13, pp. 559-576, 2005.
[6] O. Roeva and T. Slavov, “PID Controller tuning based on metaheuristic algorithms for bioprocess control”, Biotechnology & Biotechnological Equipment, pp. 3267-3277, 2014.
[7] S. Pareek, M. Kishnani and R. Gupta, “Optimal tuning of PID controller using meta heuristic algorithms”, IEEE International Conference on Advances in Engineering & Technology Research (ICAETR ),2014.
[8] P. Sreekanth and A. Hari, “Genetic algorithm based self tuning regulator for ball and hoop system”, IEEE Conference on Emerging Devices and Smart Systems (ICEDSS), 2016.
[9] M. EI-Said EI-Telbany, “Employing Particle Swarm Optimizer and Genetic Algorithms for Optimal Tuning of PID Controllers: A Comparative Study”, ICGST-ACSE Journal, volume 7, Issue 2, pp. 49-54, 2007.
[10] H. Mojallali, R. Gholipour, A. Khosravi and H. Babaee, “ Application of chaotic particle swarm optimization to PID parameter tuning in ball and hoop system”, International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, pp. 452-457, 2012.
[11] Morkos and H. Kamal, “ Optimal tuning of PID controller using adaptive hybrid particle swarm optimization algorithm” , Int. J. of Computers, Communications & Control, Vol VII, No.1, pp.101-114, 2012.
[12] D. Davendra, I. Zelinka and R. Senkerik, “Chaos driven evolutionary algorithms for the task of PID Control”, Computers & Mathematics with Applications, Vol. 60, No. 4, pp.1088–1104, 2010.
[13] N. Jain, G. Parmar, R. Gupta and I. Khanam, “ Performance evaluation of GWO/PID approach in control of ball hoop system with different objective functions and perturbation”, Cogent Engineering, Taylor & Francis, Vol. 5, pp. 1-18, 2018.
[14] S. Mirjalili, S. M. Mirjalili and A. Lewis, “Grey Wolf Optimizer”, Adv. Eng. Softw.,ELSEVIER, Vol. 69, pp. 46-61, 2014.
[15] V. Soni, G. Parmar and M. Kumar, “A hybrid grey wolf optimisation and pattern search algorithm for automatic generation control of multi area interconnected power system”, Int. J. of Advanced Intelligence Paradigms, Inderscience [In Press].
[16] C. Muro, R. Escobedo, L. Spectoe and R. P. Coppinger, “Wolf-pack (Canis Lupus) hunting strategies emerge from simple rules in computational simulations”, ELSEVIER, Vol. 88, pp. 192-197, 2011.
[17] P. Wellstead, “ The ball and hoop system”, Automatica,Vol.19, No. 4, pp. 401-406,1983.
[18] G. Parmar, S. Mukharjee and R. Prasad, “Reduced order modelling of linear multivariable system using particle swarm optimization technique”, International Journal of Innovative Computing and Applications, Vol.1, No. 2, pp. 128–137, 2007.
Citation
Mridul Porwal, Girish Parmar, Rajesh Bhatt, "Robustness Analysis of GWO/PID Approach in Control of Ball Hoop System with ITAE Objective Function," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.218-222, 2018.
Malware Dissemination and Anticipation Model for Ensuring Privacy in Time-Varying Population Networks
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.223-227, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.223227
Abstract
In modern days, more and more community joins social networks to contribute to information with others. At the same time, the in sequence sharing/spreading becomes far more frequent and convenient due to the wide usage. The research contented of computer networks comprises arrangement topology, network interchange uniqueness, and the authority of the network behavior on the whole set of connections. The spread and avoidance of network malware knowledge studied in network and have been one of the majority prolific fields in complex network dynamics research. Through our research, we found that some individuality of workstation network virus proliferation is similar to real world outbreak spread. Therefore, any misinformation should be exposed in time when it does not increase to a large group of populace. All preceding works deliberate either how the in succession is extend in the social complex or how to inhibit the further pervasion of an observed misinformation. However, no works considered how to discover the broadcasting of misinformation in time. A possible explanation is to set observers across the network to determine the suspects of misinformation established by the optimization problematic is NP-hard and deliver approximation assurances for an avaricious answer for various meanings of this problem by provides evidence that they are sub modular. In this accomplishment, a novel method to decide on a set of spectator in a social network with the minimum cost, where these observers assurance any misinformation can be discovered with a high likelihood before it reaches a surrounded number of users.
Key-Words / Index Term
Information sharing, Misinformation, Online Social Network, Suspects, Optimization, Privacy
References
[1] M. Fossi and J. Blackbird, “Symantec internet security threat report 2013,” Symantec Corporation, Tech. Rep., April, 2014.
[2] C. C. Zou, D. Towsley, and W. Gong, “Modeling and simulation study of the propagation and defense of internet e-mail worms,” Dependable and Secure Computing, IEEE Transactions on, vol. 4, no. 2, pp. 105–118, 2007.
[3] Z. Chen and C. Ji, “Spatial-temporal modeling of malware propagation in networks,” Neural Networks, IEEE Transactions on, vol. 16, no. 5, pp. 1291–1303, 2005.
[4] S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, and W. Jia, “Modeling propagation dynamics of social network worms,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 8, pp. 1633–1643, 2013.
[5] Y. Cao, V. Yegneswaran, P. A. Porras, and Y. Chen, “Pathcutter: Severing the self-propagation path of xss javascript worms in social web networks.” in NDSS, 2012.
[6] M. R. Faghani and U. T. Nguyen, “A study of xss worm propagation and detection mechanisms in online social networks,” Information Forensics and Security, IEEE Transactions on, vol. 8, no. 11, pp. 1815–1826, 2013.
[7] C. Song, T. Koren, P. Wang, and A.-L. Barab´asi, “Modelling the scaling properties of human mobility,” Nature Physics, vol. 6, no. 10, pp. 818–823, 2010.
[8] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, “Measurement and analysis of online social networks,” in Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. ACM, 2007, pp. 29–42.
[9] M. E. Newman, S. Forrest, and J. Balthrop, “Email networks and the spread of computer viruses,” Physical Review E, vol. 66, no. 3, p. 035101, 2002.
[10] Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, “Analysis of topological characteristics of huge online social networking services,” in Proceedings of the 16th international conference on World Wide Web. ACM, 2007, pp. 835–844.
[11] R. Pastor-Satorras and A. Vespignani, “Epidemic dynamics in finite size scale-free networks,” Physical Review E, vol. 65, no. 3, p. 035108, 2002.
[12] M. Bogun´a, R. Pastor-Satorras, and A. Vespignani, “Epidemic spreading in complex networks with degree correlations,” in Proceedings of the XVIII Sitges Conference on Statistical Mechanics, Lecture Notes in Physics, Springer, Berlin, 2003.
[13] J. O. Kephart and S. R. White, “Directed-graph epidemiological models of computer viruses,” in Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on. IEEE, 1991, pp. 343–359.
[14] D. Chakrabarti, J. Leskovec, C. Faloutsos, S. Madden, C. Guestrin, and M. Faloutsos, “Information survival threshold in sensor and p2p networks,” in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. IEEE, 2007, pp. 1316–1324.
[15] G. Yan, G. Chen, S. Eidenbenz, and N. Li, “Malware propagation in online social networks: nature, dynamics, and defense implications,” in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011, pp. 196–206.
Citation
N. Sindhuja, K. Ravi Kumar, "Malware Dissemination and Anticipation Model for Ensuring Privacy in Time-Varying Population Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.223-227, 2018.
Offloading Scheme for Cloudlets Computation Tasks
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.228-232, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.228232
Abstract
Mobile cloud computing (MCC) has been provided as a viable technique to the derived boundaries of mobile computing. Those barriers include battery lifetime, garage potential and processing power. By using MCC, the storage and the processing of speedy cell device responsibilities will take in the cloud gadget. The outcomes may be repeated to the cellular device. It decreases the required energy and time for reaching such intensive jobs. But, cellular devices connecting with the cloud suffers from the excessive community latency and the massive transmission strength intake mainly whilst the usage of 3G/LTE connections. Then again, multimedia packages are the maximum not unusual packages in modern day mobile gadgets; such packages require excessive computing resources. In this paper, it`s been analyzed a cloudlet-based MCC totally machine that determines the cloudlets aiming at reduce the energy intake and a network put off of multimedia applications even as using MCC.
Key-Words / Index Term
MCC, Cloudlets, LTE Network, Multimedia
References
[1] Mishra, Sushruta, et al. "Analysis of Mobile Cloud Computing: Architecture, Applications, Challenges, and Future Perspectives." Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management.IGI Global, 2018.81-104.
[2] Varghese, Blesson, and RajkumarBuyya. "Next generation cloud computing: New trends and research directions." Future Generation Computer Systems 79 (2018): 849-861.
[3] Erl, Thomas, Robert Cope, and Amin Naserpour. "Cloud Computing Design Patterns (paperback)." (2017).
[4] Agrawal, Dharma P., et al. "Recent Advances in Mobile Cloud Computing." Wireless Communications and Mobile Computing2018 (2018).
[5] Zakarya, Muhammad. "Energy, performance and cost efficient datacenters: A survey." Renewable and Sustainable Energy Reviews 94 (2018): 363-385.
[6] Aazam, Mohammad, SheraliZeadally, and Khaled A. Harras. "Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities." Future Generation Computer Systems (2018).
[7] Noor, Talal H., et al. "Mobile cloud computing: Challenges and future research directions." Journal of Network and Computer Applications 115 (2018): 70-85.
[8] Bilal, Kashif, et al. "Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers." Computer Networks 130 (2018): 94-120.
[9] Yang, Chaowei, et al. "Big Data and cloud computing: innovation opportunities and challenges." International Journal of Digital Earth 10.1 (2017): 13-53.
[10] Saha, Debashis. "A Cost-Effective Cloud Strategy for Small and Medium Enterprises (SMEs): Transforming Business With Amazon`s EC2 Spot Instances." Advances in Data Communications and Networking for Digital Business Transformation.IGI Global, 2018.98-123.
[11] Benedetti, Fabio, et al. "Monitoring resources in a cloud-computing environment." U.S. Patent No. 9,591,074. 7 Mar. 2017.
[12] Dempsey, David, and Felicity Kelliher. "B2B Cloud Computing Software as a Service Revenue Model." Industry Trends in Cloud Computing. Palgrave Macmillan, Cham, 2018. 129-138.
[13] Kasemsap, Kijpokin. "Software as a service, Semantic Web, and big data: Theories and applications." Resource management and efficiency in cloud computing environments.IGI Global, 2017.264-285.
[14] Sharma, VibhuSaujanya, ShubhashisSengupta, and AnnervazKarukapadathMohamedrasheed. "Method and system for managing user state for applications deployed on platform as a service (PaaS) clouds." U.S. Patent No. 9,635,088. 25 Apr. 2017.
[15] Gonzales, Dan, et al. "Cloud-trust—A security assessment model for infrastructure as a service (IaaS) clouds." IEEE Transactions on Cloud Computing 5.3 (2017): 523-536.
[16] Agrawal, Dharma P., et al. "Recent Advances in Mobile Cloud Computing." Wireless Communications and Mobile Computing2018 (2018).
[17] Jonas, Eric, et al. "Occupy the cloud: Distributed computing for the 99%." Proceedings of the 2017 Symposium on Cloud Computing. ACM, 2017.
[18] Jin, A-Long, Wei Song, and WeihuaZhuang. "Auction-based resource allocation for sharing cloudlets in mobile cloud computing." IEEE Transactions on Emerging Topics in Computing 6.1 (2018): 45-57.
[19] Mollah, Muhammad Baqer, MdAbulKalam Azad, and AthanasiosVasilakos. "Security and privacy challenges in mobile cloud computing: Survey and way ahead." Journal of Network and Computer Applications 84 (2017): 38-54.
Citation
C. Abinaya, E. Ramaraj, "Offloading Scheme for Cloudlets Computation Tasks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.228-232, 2018.
A Critical Analysis of Digital Tools Among The Visual Artists
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.233-235, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.233235
Abstract
The aim of the research paper is to study the impact of digital tools among the visual artists. Due to the fast changes in the information and communication technology tools, the digital tools develops and changes day by day. Lack of proper training related to software and tools affects the visual artists with the age groups 35 to 45. The traditional way of doing visual works requires special skills such as eye, hand and mind coordination. Working in the digital system needs other skills such as technical, digital and software knowledge. Even though the pre-production, production and post-production process simplified, it develops a pressure among the traditional visual artist to change their perspective and view of the fine arts. Updating the software version and the new digital tools’ related knowledge makes them depend on the software and technical system rather than the free expression and creativity. Particularly, the artists between the age groups 35 to 45 favor the concept of creating visuals by using brushes and other traditional media. Working with the system develops a stress among the artists. Many of the above age groups give feedback which does not favor the concept of digital graphics. A digital tool gives more flexibility in all the stages of graphic design, drawing & painting, 2D, and 3D animation process. Furthermore, it reduces the complexity of the process of editing, retouching, storing, printing, copying and developing, etc. Working with computer the system for long hours is difficult for the visual artists of age groups 35 to 45. Many artists express their views in favor due to the medium and comfort was given by the traditional brushes and other materials. Handling keyboard and mouse requires more muscular movements than the application of brushes.
Key-Words / Index Term
Visual artist, Digital tools, Flexibility, Stress, Traditional brushes, Physical pain, Opinion of visual artis
References
[1] Olafur Eliason, “The World Economic Forum” Opinion article Davos - Klosters, Switzerland, The Huffington Post Jan. 20-23, Page 44-45, 2016.
[2] Tara, “Exploring the impact of digital technologies on professional responsibilities on education”, SAGE publications Page 23 doi: doi.org/10.1177/1474904115608387. 2015.
[3] May L “The Socially Responsive Self-Social Theory and Professional Ethics”. Chicago: University of Chicago Press, 1996.
[4] Robinson S, “The nature of responsibility in a professional setting”, Journal of Business Ethics 88: 11–19. 1996
[5] Colley H, James D and Diment H (2007), “Unbecoming teachers: Towards a more dynamic notion of professional participation”, Journal of Education Policy 22(2): 173–193.
[6] Solbrekke T and Sugrue C, “Professional responsibility: Retrospect and prospect. In: Professional Responsibility”, New Horizons of Practice? London: Routledge, 11–28. 2010.
[7] Jaradat S, Whyte J and Luck R, “Professionalism in digitally mediated project work”, Building Research and Information 41(1): 51–59 2013.
[8] Cho V “A study of the roles of trust and risk in information oriented online legal services using an integrated model”, Information and Management 43(4): 503–520, 2006.
[9] Susskind R “Tomorrow’s Lawyers: An Introduction to Your Future”,. Oxford: Oxford University Press. 2013.
[10] Laurillard D, “Teaching as a Design Science: Building Pedagogical Patterns for Learning and Technology”, London: Routledge. 2012
Citation
S. Kalaiselvan, A. Kalimuthu, B. Senthil Kumar, "A Critical Analysis of Digital Tools Among The Visual Artists," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.233-235, 2018.
A Survey on Finger Knuckle Print based Biometric Authentication
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.236-240, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.236240
Abstract
Nowadays biometrics based authentication could be a one amongst the necessary technology during this world. Authentication means whether that person is genuine or not. Based on this authentication so many physical and behavioural characteristics are used. Physical characteristics are face, fingerprint, iris, retina, palm print, finger vein and finger knuckle print and behavioural characteristics means that basic actions done by the person like voice, giant, ECG, EEG, keystroke, handwriting and lip movements. Based on this physical traits finger knuckle print is one of the most interest research arena of the researchers nowadays. Because it can be easily accessed, low cost devices are used to capture the image; it cannot be stolen by others, etc. In finger knuckle print based authentication we have got to survive such a lot of papers. Per this study the finger knuckle print encompasses a heap of deserves and limitations. To provide a comprehensive survey, this paper presents a summary of finger knuckle print biometric system, their applications and limitations.
Key-Words / Index Term
Biometrics, biological, behavioural, identification, techniques
References
[1] Shubhangi Neware, “Biometrics System: An Overview”, International Journal of Computer Sciences and Engineering Vol.6(1) Jan 2018.
[2] T. Srinivasa Rao, “A Multimodal Biometric Authentication Technique using Fused Features of Finger, Palm and Speech”, International Journal of Computer Sciences and Engineering Vol.5 (8), Aug 2017.
[3] Ajay Kumar and Zhihuan Xu, “Personal Identification Using Minor Knuckle Patterns From Palm Dorsal Surface”, IEEE Transactions on Information Forensics and Security Volume: 11, Issue: 10, Oct. 2016 .
[4] KamYuen Cheng and Ajay Kumar, “Contactless finger knuckle identification using smartphones”, IEEE Xplore 27 September 2012.
[5] Ajay Kumar, “Importance of Being Unique From Finger Dorsal Patterns: Exploring Minor Finger Knuckle Patterns in Verifying Human Identities”, IEEE Transactions On Information Forensics And Security, Vol. 9, No. 8, August 2014.
[6] Ajay Kumar, “Can We Use Minor Finger Knuckle Images to Identify Humans? ”, IEEE 2012.
[7] Zahra.s.shariatmadar, "Finger-Knuckle-Print Recognition via Encoding Local-Binary-Pattern”, Journal of Circuits, Systems and ComputersVol. 22, No. 06, 1350050 2013.
[8] Shoichiro Aoyama and Koichi Ito, “A finger-knuckle-print recognition algorithm using phase-based local block matching”, Elsevier 2013.
[9] Jialiang Peng et.al, “Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics”, Springer 22 December 2013.
[10] Ming Liu et.al, “A new approach for inner-knuckle-print recognition”, Journal of Visual Languages and Computing Elsevier 2013.
[11] Abdallah Meraoumia et.al, “ Palmprint and Finger-Knuckle-Print for efficient person recognition based on Log-Gabor filter response”, Springer 2011.
[12] Necla Ozkaya et.al, “Discriminative common vector based finger knuckle recognition”, Elsevier 2014.
[13] K. Usha et.al, “Fusion of geometric and texture features for finger knuckle surface recognition”, Alexandria Engineering Journal 2015.
[14] Michael K.O. Goh et.al, “Bi-Modal Palm Print And Knuckle Print Recognition System”, Journal of IT in Asia, Vol 3 (2010).
[15] Lin Zhang et.al, “Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation”, Springer 2009.
[16] Gaurav Jaswal et.al, “DeepKnuckle: revealing the human identity”, Springer 2017.
[17] T.Sabhanayagam et.al, “A Comprehensive Survey on Various Biometric Systems”, International Journal of Applied Engineering Research 2018.
[18] Lin Zhang et.al, “Online Finger-Knuckle-Print Verification for Personal Authentication”, Pattern Recognition Elsevier 2010.
Citation
L. Sathiya, V. Palanisamy, "A Survey on Finger Knuckle Print based Biometric Authentication," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.236-240, 2018.
Accuracy of Retrieval Files in Learning Objects using Cloud E-Learning
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.241-244, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.241244
Abstract
Everything stored on the cloud could potentially be a knowledge source used for e-learning. Given learners` profiles, desires and feedback on what they have already learned, a new form of personalized e-learning emerges, namely Cloud E-Learning (CeL). CeL should be able to choose from structured to totally unstructured learning material but needs to make them useful for each individual. Existing metadata standards cannot facilitate composition of personalized learning paths as a series of learning objects. In this paper, we present the structure of CeL Learning Objects (CeLLOs), which include an additional set of metadata suitable for each phase of CeL development.
Key-Words / Index Term
Cloud E-learning, computing for Education, Electronic Learning
References
[1] Krenare Pireva, Petros Kefalas and Ioanna Stamatopoulou, “Representation of learning objects in cloud e-learning”, Information, Intelligence, Systems & Applications (IISA), 8th International Conference on, IEEE 2017.
[2] E.-M. Kalogeraki, C. Troussas, D. Apostolou, M. Virvou, T. Panayiotopoulos, "Ontology-based model for learning object metadata", Information Intelligence Systems & Applications (IISA) 2016 7th International Conference on. IEEE, pp. 1-6, 2016.
[3] Giovanni Casella, Gennaro Costagliola, Filomena Ferrucci, Giuseppe Polese,Giuseppe Scanniello "A SCORM Thin Client Architecture for E-Learning Systems Based on Web Services" International Journal of Distance Education Technologies, Volume 5, Issue 1,2007.
[4] Xiaofei, L., El Saddik, A., & Georganas,N. D. "An implementable architecture of an e-learning system". In Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering, vol.2 (pp. 717-720) (2003).
[5] Mohammed Khaleel, H. M. El-Bakry, Ahmed A. Saleh, " Developing E-learning Services Based on Cache Strategy and Cloud Computing", International Journal of Information Science and Intelligent System, 2014.
[6] D. Mahanta, and M. Ahmed, “E-Learning Objectives, Methodologies, Tools and its Limitation”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2012.
[7] C. Huandong, W. Shulei, S. Chunhui, and C. Mingrui, “ Research on the Learning Theory of E-learning”, Fifth International Joint Conference on INC, IMS and IDC, NCM`09. IEEE, 2009.
[8] D. Chandran, and S. Kempegowda, “Hybrid E-learning platform based on cloud architecture model: A proposal”, Signal and Image Processing (ICSIP), 2010 International Conference on IEEE, 2010.
[9] Chen Huandong, Wu Shulei, Song Chunhui, Zhan Jinmei,Chen Juntao, Kang Dong, "E-Learning System Model Construction Based Constructivism", 2009 Fifth International Joint Conference on INC, IMS and IDC, NCM`09. IEEE, 2009.
[10] Chine, K. (2010) ‘Learning Math and Statistics on the Cloud, Towards an EC2-Based Google Docs-Like Portal for Teaching / Learning Collaboratively with R and Scilab’, Advanced Learning Technologies (ICALT), 2010 IEEE 10th International Conference on 5-7 July (2010), pp. 752 - 753.
[11] Cubillo, J., Marten, S. & Castro, M. (2011) ‘ New Technologies Applied in the Educational Process’, IEEE Global Engineering Education Conference (EDUCON) –Learning Environments and Ecosystems in Engineering Education, April 4 - 6, (2010) Amman, Jordan, pp. 575-584.
[12] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I. & Zaharia, M. (2009) Above the Clouds: A Berkeley View of Cloud Computing, Electrical Engineering and Computer Sciences University of California at Berkeley.
[13] Angad Grewal, Shri Rai, Rob Phillips and Chun Che Fung "The E-Learning Lifecycle and its Services: The Web Services Approach" Proceedings of the Second International Conference on eLearning for Knowledge-Based Society, August 4-7, 2005
Citation
Faiz Akram, Rajeev Kumar, "Accuracy of Retrieval Files in Learning Objects using Cloud E-Learning," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.241-244, 2018.
A Comprehensive Survey on Semantic based Image Retrieval Systems for Cyber Forensics
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.245-250, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.245250
Abstract
Cyber forensics includes the areas of computer forensics, network forensics and internet forensics. In Cyber forensics, digital images have been widely used for retrieving criminal images, fingerprints, crime incident images and so on. Since the current cyber forensic tools are not very much furnished with the course of action of huge image data, retrieving of image evidences to prosecute the criminal becomes a big issue, most of the evidence is available in the form of raw semantics. Cyber forensic investigators are often faced with the task of manually examining a huge amount of image data to identify potential evidence by the help of this semantics. Thus semantic based image retrieval system (SBIR) is the latest and best alternative to overcome this drawback. The main objective of this paper is to perform extensive literature survey on the different existing methods of semantic based image retrieval system, to find the pitfalls in the existing methods and to propose a SBIR framework for the development of cyber forensic tools.
Key-Words / Index Term
Cyber Forensics SBIR, Digital image, Semantics and Evidence
References
[1]. Tanya Piplani, “DeepSeek: Content Based Image Search & Retrieval”. arXiv:1801.03406v2 [cs.IR] 11 Jan 2018 CoRR abs/1706.06064. http://arxiv.org/abs/1801.03406v2.
[2]. Max H. Quinn, Erik Conser, Jordan M. Witte and Melanie Mitchell. “Semantic Image Retrieval via Active Grounding of Visual Situations” Published in 2018 IEEE 12th International Conference on Semantic Computing.
[3]. Wei Wang, Yuqing Song and Aidong Zhang. “Semantics-based Image Retrieval by RegionSaliency”. Published in International Conference on Image and Video Retrieval CIVR 2002: Image and Video Retrieval, pp 29-37.
[4]. Umar Manzoor, Mohammed A. Balubaid. “Semantic Image Retrieval: An Ontology Based Approach”. Published in International Journal of Advanced Research in Artificial Intelligence (IJARAI), Volume 4 Issue 4, 2015. Digital Object Identifier (DOI) : 10.14569/IJARAI.2015.040401.
[5]. Manikandan Kalimuthu and Ilango Krishnamurthi. “Semantic-Based Facial Image-Retrieval System with Aid of Adaptive Particle Swarm Optimization and Squared Euclidian Distance”. Hindawi Publishing Corporation, Journal of Applied Mathematics, Volume 2015, Article ID 284378, 12 pages http://dx.doi.org/10.1155/2015/284378.
[6]. Anuja khodaska and Siddarth Ladhake. “Semantic Image Analysis for Intelligent Image Retrieval”. Published in International Conference on Intelligent Computing, Communication & Convergence (ICCC-2014). Procedia Computer Science 48 (2015) 192 – 197.
[7]. V. Lavrenko, R. Manmatha and J. Jeon. “A Model for Learning the Semantics of Pictures” published in Advances in Neural Information Processing Systems 16 (NIPS 2003).
[8]. Manish Chowdhury, Sudeb Das and Malay Kumar Kundu. “Interactive Content Based Image Retrieval
Using Ripplet Transform and Fuzzy Relevance Feedback” Published in Indo-Japanese Conference on Perception and Machine Intelligence, 2012, pp 243-251.
[9]. Yixin Chen, Vassil Roussev, Golden G. Richard III and Yun Gao. “Content-Based Image Retrieval for Digital Forensics”. IFIP International Conference on Digital Forensics, 2005: Advances in Digital Forensics pp 271-282.
[10]. Che-Yen Wen and Chiu-Chung Yu. ”Image Retrieval of Digital Crime Scene Images” Published in Forensic Science Journal, 2005;4:37-45.
[11]. Ben Bradshaw. “Semantic based image retrieval: a probabilistic approach”. Published in proceedings of 8th International conference on Multimedia. Pgs: 167-176.
[12]. P.Ramesh Babu, Dr. D.Lalitha Bhaskari and Dr. T.V.Rajinikanth “A Meticulous Survey on Cyber forensics“published in the proceedings ELSEVIER of International Conference proceedings of Advanced Computing Methodologies ICACM held in Hyderabad on 9-10 December 2011.
[13]. Sridhar Nidhi and D. Lalitha Bhaskari “Plethora of Cyber Forensics.” Published in (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 11, 2011.
[14]. R. Brown, B. Pham and O. deVel, “A grammar for the specification of forensic image mining searches”, Proc. 8th Australian and New Zealand Conference on Intelligent Information Systems, Sydney, Australia, 2003.
[15]. Brown, R.; Pham, B., “Image Mining and Retrieval Using Hierarchical Sup p ort Vector Machines”, Proc 11th International, Multimedia Modeling Conference (MMM 2005), 12-14 Jan. 2005 pp. 446 – 451.
[16]. Yow, K. and R. Cipolla, “Feature-based human face detection”, Image and Vision Computing, 1997, vol. 15, (9), pp. 713–735.
Citation
Ramesh Babu P, E. Sreenivasa Reddy, "A Comprehensive Survey on Semantic based Image Retrieval Systems for Cyber Forensics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.245-250, 2018.