Optimal Route Selection Strategy in Wireless Mesh Networks
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.238-243, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.238243
Abstract
A wireless communication network offers a flexible information transport platform that allows mobile users to roam without suffering intolerable performance degradation networking. Due to the complex infrastructure and mobility of nodes that led to dynamic network topology, therefore, the routing is one of the most important challenges in wireless mesh networks. To overcome these challenges, a number of routing techniques have been developed. This paper focuses on finding the optimal path which using to transfer data. Here, a fuzzy based model (using three input parameters and one output parameter optimal route) is proposed in order to mimic the route discovery mechanism in routing protocols with using new parameters like (Number of hops, Local Battery level, Received Signal Strength Indicator) as the input to fuzzy inference system. A number of fuzzy rules are generated which are very important in reasoning processes for making a final decision about what is path most select.
Key-Words / Index Term
WMN, FIS, AODV, DSR, Optimal route
References
[1] Ajeet Kumar Pandey and N.K. Goyal, “A Fuzzy Model for Early software Fault prediction using process Maturity and software Matrics, IJEE, 1(2), pp. 239-243,Dec,2009.
[2] Pankaj Sharma, Shruti Kohli, Ashok Kumar Sinha, “DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System”, Computer Science and Information Technology (CS) & IT), 2012, PP. 31-36.
[3] Taqwa Odey Fahad, Prof. Abduladhim A.Ali, “Improvement of AODV Routing on MANETs using Fuzzy Systems”, Iran J. Elecrical & Electronics Engineering, Vol. 7, No. 2, 2011, pp. 102-106.
[4] P. Shiva Prakash, T. N. Nagabhushan, Kirill Krinkin, “Energy Aware Power Save Management in Wireless Mesh Networks”, Proceeding of the 14th Conference of FRUCT Association, pp. 121-131.
[5] SAddel Akram Shafqat, “Battery and Frequency optimized AODV for Wireless Mesh Networks”, Canadian Journla on Multimedia and wireless Networks , Vol. 1, No. 3, April 2010, pp. 31-37.
[6] George J.Klir & Bo Yuan, “Fuzzy Sets & Fuzzy Logic:Theory & Applications”, PHI Learning Pvt. Ltd, second edition, 2009.
[7] William stallings, Wireless Communicatins and Networks, Pearson Education Pvt Ltd, Fourth Edition, New Delhi, 2004.
[8] Ashoke K Ghose, Basics of Wireless Communications, PHI (Prentice –Hall of India Pvt. Ltd, First Edition, 2004.
[9] Bacharaju Vishnu Swathi, “Evaluation of a NeuroFuzzy Unsupervised Feature Selection Approach”, International Journal of Computer Sciences and Engineering, Volume-5, Issue-12, pp. 29-34, December, 2017.
Citation
Pushpender Sarao, T. Raghavendra Gupta, S. Suresh, "Optimal Route Selection Strategy in Wireless Mesh Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.238-243, 2018.
Techniques of Sentiment Classification, Emotion Detection, Feature Extraction and Sentiment Analysis: A Comprehensive Review
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.244-261, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.244261
Abstract
Sentiment Analysis(SA) is a way of analyzing the sentiment/emotion in the sentence. Entity, sentence or document- level sentences have been carried out to discover the polarity of text. Sentiment is measured using various approaches such as lexical-based and supervised machine learning methods. This survey focuses on various methods for Feature Extraction and Emotion Detection. Before applying any algorithm for sentiment polarity identification, preprocessing is to be carried over. Machine learning(ML) techniques such as Naive Bayes, SVM, and Max Entropy have been applied to identify the polarity score that are classified as positive, negative or neutral. Feature Selection method identifies a subset of most functional features from the entire set of features. The major challenge in Opinion mining lies in identifying the emotion expressed in the text. This survey provides an insight into the efficient techniques, methods and future scope in opinion mining investigation.
Key-Words / Index Term
Sentiment Analysis; Support Vector Machine; Emotion Detection; Feature Selection; Machine Learning
References
[1] W. Che, Y. Zhao, H. Guo, Z. Su, and T. Liu, “Sentence Compression for Aspect-Based Sentiment Analysis,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 12, pp. 2111–2124, 2015.
[2] D. Sejal, V. Rashmi, K. R. Venugopal, S. S. Iyengar, and L. M. Patnaik, “Image Recommendation based on Keyword Relevance using Absorbing Markov Chain and Image Features,” International Journal of Multimedia Information Retrieval, vol. 5, no. 3, pp. 185–199, 2016.
[3] K. C. Srikantaiah, N. K. Kumar, K. R. Venugopal, and L. M. Patnaik, “Web Caching and Prefetching with Cyclic Model Analysis of Web Object Sequences,” International Journal of Knowledge and Web Intelligence 2, vol. 5, no. 1, pp. 76–103, 2014.
[4] R. H. Vishwanath, S. V. Leena, K. C. Srikantaiah, S. Kumar, P. D. Shenoy, K. R. Venugopal, and L. M. Patnaik, “APST: Approximation and Prediction of Stock Time-Series Data using Pattern Sequence,” International Conference on Data Mining Workshops, 2013.
[5] G. U. Vasanthakumar, B. Prajakta, P. D. Shenoy, K. R. Venugopal, and L. M. Patnaik, “PIB: Profiling Influential Blogger in Online Social Networks, A Knowledge Driven Data Mining Approach,” Procedia Computer Science, vol. 54, pp. 362–370, 2015.
[6] B. Liu, “Sentiment Analysis and Opinion Mining,” Synthesis Lectures on Human Language Technologies, vol. 5, no. 1, pp. 1–167, 2012.
[7] G. Wang, J. Sun, J. Ma, K. Xu, and J. Gu, “Sentiment Classification:
The Contribution of Ensemble Learning,” Decision support systems,
vol. 57, pp. 77–93, 2014.
[8] G. Vinodhini and R. M. Chandrasekaran, “Sentiment Analysis and
Opinion Mining: A Survey,” International Journal of Advanced Re- search in Computer Science and Software Engineering, vol. 2, no. 6, pp. 282–292, 2012.
[9] D. Tang, B. Qin, F. Wei, L. Dong, T. Liu, and M. Zhou, “A Joint Segmentation and Classification Framework for Sentence Level Sentiment Classification,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 11, pp. 1750–1761, 2015.
[10] A. Jindal, A. Dua, K. Kaur, M. Singh, N. Kumar, and S.
Mishra, “Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid,” IEEE Transactions on Industrial Informatics, vol. 12, no. 3, pp. 1005–1016, 2016.
[11] M. Gamon, “Sentiment Classification on Customer Feedback Data: Noisy Data, Large Feature Vectors and the Role of Linguistic Analysis,” Proceedings of the 20th international conference on Computational Linguistics, pp. 841–847, 2004.
[12] X. Zhou, X. Wan, and J. Xiao, “CMiner: Opinion Extraction and Summarization for Chinese Microblogs,” IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 7, pp. 1650–1663, 2016.
[13] Q. Ye, Z. Zhang, and R. Law, “Sentiment Classification of Online Reviews to travel Destinations by Supervised Machine Learning Approaches,” Expert Systems with Applications, vol. 36, no. 3, pp. 6527– 6535, 2009.
[14] G. Laboreiro, L. Sarmento, J. Teixeira, and E. Oliveira, “Tokenizing Micro-Blogging Messages using a Text Classification Approach,” Proceedings of the Fourth Workshop on Analytics for Noisy Unstructured Text Data, pp. 81–88, 2010.
[15] M. R. Saleh, M. T. Mart ́ın-Valdivia, A. Montejo-Ra ́ez, and L. Uren ̃a- Lo ́pez, “Experiments with SVM to Classify Opinions in Different Domains,” Expert Systems with Applications, vol. 38, no. 12, pp. 14 799–14 804, 2011.
[16] R. Moraes, J. F. Valiati, and W. P. G. Neto, “Document-Level Sentiment Classification: An Empirical Comparison between SVM and ANN,” Expert Systems with Applications, vol. 40, no. 2, pp. 621–633, 2013.
[17] S. M. Mohammad, S. Kiritchenko, and X. Zhu, “NRC-Canada: Building the state-of-the-art in Sentiment Analysis of Tweets,” Seventh International Workshop on Semantic Evaluation Exercises (SemEval- 2013), 2013.
[18] S. Liu, X. Cheng, F. Li, and F. Li, “TASC: Topic-Adaptive Sentiment Classification on Dynamic Tweets,” IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 6, pp. 1696–1709, 2015.
[19] J. Smailovic ́, M. Grcˇar, N. Lavracˇ, and M. Zˇnidarsˇicˇ, “Stream-Based Active Learning for Sentiment Analysis in the Financial Domain,” International Journal of Information Sciences, vol. 285, pp. 181–203, 2014.
[20] S. Canuto, M. A. Goncalves, and F. Benevenuto, “Exploiting New Sentiment-Based Meta-Level Features for Effective Sentiment Analysis,” Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, pp. 53–62, 2016.
[21] D. D. Wu, L. Zheng, and D. L. Olson, “A Decision Support Approach for Online Stock Forum Sentiment Analysis,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 44, no. 8, pp. 1077–1087, 2014.
[22] A. Sharma and S. Dey, “A Document-Level Sentiment Analysis Approach using Artificial Neural Network and Sentiment Lexicons,” ACM SIGAPP Applied Computing Review, vol. 12, no. 4, pp. 67–75, 2012.
[23] X. Wang, F. Wei, X. Liu, M. Zhou, and M. Zhang, “Topic Sentiment Analysis in Twitter: A Graph-Based Hashtag Sentiment Classification Approach,” Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 1031–1040, 2011.
[24] M. Trupthi, S. Pabboju, and G. Narasimha, “Improved Feature Ex- traction and Classification Sentiment Analysis,” International Conference on Advances in Human Machine Interaction (HMI), pp. 1–6, 2016.
[25] R. Yao and J. Chen, “Predicting Movie Sales Revenue using Online Re- views,” IEEE International Conference on Granular Computing (GrC), pp. 396–401, 2013.
[26] P. Bhoir and S. Kolte, “Sentiment Analysis of Movie Reviews using Lexicon Approach,” IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–6, 2015.
[27] A. Ekawijana and H. Heryono, “Composite Naive Bayes Classification and Semantic method to enhance Sentiment Accuracy Score,” 4th International Conference on Cyber and IT Service Management, pp. 1–4, 2016.
[28] V. Jha, N. Manjunath, P. D. Shenoy, K. Venugopal, and L. Patnaik, “HOMS: Hindi Opinion Mining System,” IEEE 2nd International Conference on Recent Trends in Information Systems (ReTIS), pp. 366– 371, 2015.
[29] R. Jose and V. S. Chooralil, “Prediction of Election Result by Enhanced Sentiment Analysis on Twitter Data using Classifier Ensemble Approach,” International Conference on Data Mining and Advanced Computing (SAPIENCE), pp. 64–67, 2016.
[30] M. A. M. Raja, S. G. Winster, and S. Swamynathan, “Review Analyzer: Analyzing Consumer Product Reviews from Review Collections,” International Conference on Recent Advances in Computing and Software Systems (RACSS), pp. 287–292, 2012.
[31] P. Andriotis, G. Oikonomou, T. Tryfonas, and S. Li, “Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations,” IEEE Transactions on Cybernetics, vol. 46, no. 9, pp. 1974–1985, 2016.
[32] C. Wang, Z. Xiao, Y. Liu, Y. Xu, A. Zhou, and K. Zhang, “SentiView: Sentiment Analysis and Visualization for Internet Populars,” IEEE Transactions on Human-Machine Systems, vol. 43, no. 6, pp. 620–630, 2013.
[33] C. C. Yang and T. D. Ng, “Analyzing and Visualizing Web Opinion Development and Social Interactions with Density-Based Clustering,” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol. 41, no. 6, pp. 1144–1155, 2011.
[34] C. Troussas, M. Virvou, and S. Mesaretzidis, “Comparative Analysis of Algorithms for Student Characteristics Classification using a Methodological Framework,” 6th International Conference on Information, Intelligence, Systems and Applications (IISA), pp. 1–5, 2015.
[35] X. Chen, M. Vorvoreanu, and K. Madhavan, “Mining Social Media Data for understanding Students Learning Experiences,” IEEE Trans actions on Learning Technologies, vol. 7, no. 3, pp. 246–259, 2014.
[36] E. Haddi, X. Liu, and Y. Shi, “The Role of Text Pre-Processing in Sentiment Analysis,” Procedia Computer Science, vol. 17, pp. 26–32, 2013.
[37] G. Liu, X. Xu, B. Deng, S. Chen, and L. Li, “A Hybrid method for Bilingual Text Sentiment Classification based on Deep Learning,” 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/ Distributed Computing (SNPD), pp. 93–98, 2016.
[38] N. F. Da Silva, E. R. Hruschka, and E. R. Hruschka, “Tweet Sentiment Analysis with Classifier Ensembles,” International Journal of Decision Support Systems, vol. 66, pp. 170–179, 2014.
[39] F. H. Khan, S. Bashir, and U. Qamar, “TOM: Twitter Opinion Mining Framework using Hybrid Classification Scheme,” International Journal of Decision Support Systems, vol. 57, pp. 245–257, 2014.
[40] L. Shi, B. Sun, L. Kong, and Y. Zhang, “Web Forum Sentiment Analysis based on Topics,” Ninth IEEE International Conference on Computer and Information Technology, 2009. CIT’09, vol. 2, pp. 148– 153, 2009.
[41] D. Tang, F. Wei, N. Yang, M. Zhou, T. Liu, and B. Qin, “Learning Sentiment-Specific Word Embedding for Twitter Sentiment Classification,” Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, pp. 1555–1565, 2014.
[42] J. Yang, Y. Liu, X. Zhang, X. Yuan, Y. Zhao, S. Barlowe, and S. Liu, “Piwi: Visually Exploring Graphs based on their Community Structure,” IEEE Transactions on Visualization and Computer Graphics, vol. 19, no. 6, pp. 1034–1047, 2013.
[43] R. Xia, C. Zong, and S. Li, “Ensemble of Feature Sets and Classification Algorithms for Sentiment Classification,” International Journal of Information Sciences, vol. 181, issue. 6, pp. 1138–1152, 2011.
[44] L. Jiang, M. Yu, M. Zhou, X. Liu, and T. Zhao, “Target-Dependent Twitter Sentiment Classification,” Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, pp. 151–160, 2011.
[45] M. Sokolova and G. Lapalme, “A Systematic Analysis of Performance Measures for Classification Tasks,” International Journal of Information Processing & Management, vol. 45, no. 4, pp. 427–437, 2009.
[46] D. T. Vo and Y. Zhang, “Target-Dependent Twitter Sentiment Classification with Rich Automatic Features,” Proceedings of the Twenty- Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015), pp. 1347–1353, 2015.
[47] M. Speriosu, N. Sudan, S. Upadhyay, and J. Baldridge, “Twitter Polarity Classification with Label Propagation over Lexical Links and the Follower Graph,” Proceedings of the First workshop on Unsupervised Learning in NLP, pp. 53–63, 2011.
[48] Y. Hu and W. Li, “Document Sentiment Classification by Exploring Description Model of Topical Terms,” International Journal of Computer Speech & Language, vol. 25, issue. 2, pp. 386–403, 2011.
[49] Y. Zhang, M. J. Er, R. Venkatesan, N. Wang, and M. Pratama, “Sentiment Classification using Comprehensive Attention Recurrent models,” International Joint Conference on Neural Networks (IJCNN), pp. 1562–1569, 2016.
[50] M. Taboada, J. Brooke, M. Tofiloski, K. Voll, and M. Stede, “Lexicon- Based Methods for Sentiment Analysis,” Computational linguistics, vol. 37, issue. 2, pp. 267–307, 2011.
[51] D. Davidov, O. Tsur, and A. Rappoport, “Enhanced Sentiment Learning using Twitter Hashtags and Smileys,” Proceedings of the 23rd International Conference on Computational Linguistics: posters, pp. 241–249, 2010.
[52] A. Celikyilmaz, R. Sarikaya, M. Jeong, and A. Deoras, “An Empirical Investigation of Word Class-Based Features for Natural Language Understanding,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 24, no. 6, pp. 994–1005, 2016.
[53] A. L. Maas, R. E. Daly, P. T. Pham, D. Huang, A. Y. Ng, and C. Potts, “Learning Word Vectors for Sentiment Analysis,” Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol 1, pp. 142–150, 2011.
[54] E. C. Dracut, H. Wang, P. Sistla, C. Yu, and W. Meng, “Polarity Consistency Checking for Domain Independent Sentiment Dictionaries,” IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 3, pp. 838–851, 2015.
[55] W.-F. Chen, M.-H. Chen, M.-L. Chen, and L.-W. Ku, “A Computer- Assistance Learning System for Emotional Wording,” IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 5, pp. 1093– 1104, 2016.
[56] D. Tang, F. Wei, B. Qin, N. Yang, T. Liu, and M. Zhou, “Sentiment Embeddings with Applications to Sentiment Analysis,” IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 2, pp. 496–509, 2016.
[57] R. P. Schumaker, Y. Zhang, C.-N. Huang, and H. Chen, “Evaluating Sentiment in Financial News Articles,” International Journal of Decision Support Systems, vol. 53, issue. 3, pp. 458–464, 2012.
[58] F. Ren and Y. Wu, “Predicting User-Topic Opinions in Twitter with Social and Topical Context,” IEEE Transactions on Affective Computing, vol. 4, no. 4, pp. 412–424, 2013.
[59] J. Yi, T. Nasukawa, R. Bunescu, and W. Niblack, “Sentiment Analyzer: Extracting Sentiments about a given Topic using Natural Language Processing Techniques,” Third IEEE International Conference on Data Mining, pp. 427–434, 2003.
[60] M. Z. Asghar, A. Khan, S. Ahmad, and F. M. Kundi, “A Review of Feature Extraction in Sentiment Analysis,” Journal of Basic and Applied Scientific Research, vol. 4, no. 3, pp. 181–186, 2014.
[61] A. Celikyilmaz, R. Sarikaya, M. Jeong, and A. Deoras, “An Empirical Investigation of Word Class-Based Features for Natural Language Understanding,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 24, no. 6, pp. 994–1005, 2016.
[62] S. Poria, E. Cambria, N. Howard, G.-B. Huang, and A. Hussain, “Fusing Audio, Visual and Textual Clues for Sentiment Analysis from Multimodal Content,” Neurocomputing, vol. 174, pp. 50–59, 2016.
[63] B. Agarwal and N. Mittal, “Prominent Feature Extraction for Review Analysis: An Empirical Study,” Journal of Experimental & Theoretical Artificial Intelligence, vol. 28, no. 3, pp. 485–498, 2016.
[64] S. Pasarate and R. Shedge, “Comparative Study of Feature Extraction Techniques used in Sentiment Analysis,” 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS- INBUSH), pp. 182–186, 2016.
[65] A. Duric and F. Song, “Feature Selection for Sentiment Analysis based on Content and Syntax Models,” International Journal of Decision Support Systems, vol. 53, no. 4, pp. 704–711, 2012.
[66] F. Li, S. J. Pan, O. Jin, Q. Yang, and X. Zhu, “Cross-Domain co-Extraction of Sentiment and Topic Lexicons,” Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Long Paper, vol 1, pp. 410–419, 2012.
[67] H. Uguz, “A Two-Stage Feature Selection Method for Text Categorization by using Information Gain, Principal Component Analysis and Genetic Algorithm,” International Journal of Knowledge-Based Systems, vol. 24, issue. 7, pp. 1024–1032, 2011.
[68] R. M. Elawady, S. Barakat, and N. M. Elrashidy, “Different Feature Selection for Sentiment Classification,” International Journal of Information Science and Intelligent System, vol. 3, no. 1, pp. 137–150, 2014.
[69] A. Abbasi, H. Chen, and A. Salem, “Sentiment Analysis in Multiple Languages: Feature Selection for Opinion Classification in Web Forums,” ACM Transactions on Information Systems (TOIS), vol. 26, no. 3, pp. 1–34, 2008.
[70] B. Agarwal, S. Poria, N. Mittal, A. Gelbukh, and A. Hussain, “Concept- Level Sentiment Analysis with Dependency-Based Semantic Parsing: A Novel Approach,” International Journal of Cognitive Computation, vol. 7, no. 4, pp. 487–499, 2015.
[71] Y. Matsuyama, A. Saito, S. Fujie, and T. Kobayashi, “Automatic Expressive Opinion Sentence Generation for Enjoyable Conversational Systems,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 2, pp. 313–326, 2015.
[72] N. Shelke, S. Deshpande, and V. Thakare, “Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews,” Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, pp. 651–659, 2017.
[73] H. Wang, L. Liu, W. Song, and J. Lu, “Feature-Based Sentiment Analysis Approach for Product Reviews,” Journal of Software, vol. 9, no. 2, pp. 274–279, 2014.
[74] F. Xianghua, L. Guo, G. Yanyan, and W. Zhiqiang, “Multi-Aspect Sentiment Analysis for Chinese Online Social Reviews based on Topic Modeling and HowNet Lexicon,” International Jouranl of Knowledge-Based Systems, vol. 37, pp. 186–195, 2013.
[75] Z. Yu, Z. Yu, X. Zhou, C. Becker, and Y. Nakamura, “Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 4, pp. 759–768, 2012.
[76] W. Rong, Y. Nie, Y. Ouyang, B. Peng, and Z. Xiong, “Auto-Encoder
Based Bagging Architecture for Sentiment Analysis,” Journal of Visual
Languages & Computing, vol. 25, no. 6, pp. 840–849, 2014.
[77] E. M. Alshari, A. Azman, N. Mustapha, S. C. Doraisamy, and M. Alksher, “Prediction of Rating from Comments Based on Information Retrieval and Sentiment Analysis,” 2016 Third International Conference on Information Retrieval and Knowledge Management (CAMP), pp.
32–36, 2016.
[78] A. Giachanou and F. Crestani, “Tracking Sentiment by Time Series
Analysis,” Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 1037– 1040, 2016.
[79] A. Krouska, C. Troussas, and M. Virvou, “The Effect of Preprocessing Techniques on Twitter Sentiment Analysis,” 7th International Conference on Information, Intelligence, Systems Applications (IISA), pp. 1–5, 2016.
[80] C.-L. Liu, W.-H. Hsaio, C.-H. Lee, G.-C. Lu, and E. Jou, “Movie Rating and Review Summarization in Mobile Environment,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 42, no. 3, pp. 397–407, 2012.
[81] G. Qiu, B. Liu, J. Bu, and C. Chen, “Opinion Word Expansion and Target Extraction through Double Propagation,” Computational Linguistics, vol. 37, no. 1, pp. 9–27, 2011.
[82] S. Wang, D. Li, X. Song, Y. Wei, and H. Li, “A Feature Selection Method based on Improved Fishes Discriminant Ratio for Text Sentiment Classification,” Expert Systems with Applications, vol. 38, no. 7, pp. 8696–8702, 2011.
[83] N. Shelke,“Approaches of Emotion Detection from Text, ”International Journal of Computer Science and Information Technology Research, vol. 2, no. 2, pp. 123–128, 2014.
[84] E. T. Brown, A. Ottley, H. Zhao, Q. Lin, R. Souvenir, A. Endert, and R. Chang, “Finding Waldo: Learning about Users from their Interactions,” IEEE Transactions on Visualization and Computer Graphics, vol. 20, no. 12, pp. 1663–1672, 2014.
[85] C. Liu, L. Xu, Z. Wang, and N. Wang, “Sentiment Analysis method based on Context View,” 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC- FSKD), pp. 1577–1581, 2016.
[86] B. OF ́laherty and C. Heavin, “Positioning Predictive Analytics for Customer Retention,” Journal of Decision Systems, vol. 24, no. 1, pp. 3–18, 2015.
[87] S. Poria, E. Cambria, G. Winterstein, and G.-B. Huang, “Sentic Patterns: Dependency-Based rules for Concept-Level Sentiment Analysis,” International Journal of Knowledge-Based Systems, vol. 69, pp. 45–63, 2014.
[88] M. D. Munezero, C. S. Montero, E. Sutinen, and J. Pajunen, “Are they different? Affect, Feeling, Emotion, Sentiment, and Opinion Detection in Text,” IEEE Transactions on Affective Computing, vol. 5, no. 2, pp. 101–111, 2014.
[89] V. Sintsova and P. Pu, “Dystemo: Distant Supervision Method for Multi-Category Emotion Recognition in Tweets,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 8, no. 1, p. 13, 2016.
[90] C.-J. Su and Y.-A. Chen, “Social Media Analytics Based Product Improvement Framework,” International Symposium on Computer, Consumer and Control (IS3C), pp. 393–396, 2016.
[91] X. Quan, Q. Wang, Y. Zhang, L. Si, and L. Wenyin, “Latent Discriminative Models for Social Emotion Detection with Emotional Dependency,” ACM Transactions on Information Systems (TOIS), vol. 34, no. 1, pp. 2–19, 2015.
[92] E. Kouloumpis, T. Wilson, and J. D. Moore, “Twitter Sentiment Analysis: The Good the Bad and the Omg!” Proceedings of the Fifth International Conference on Weblogs and Social Media, vol. 11, no. 538- 541, p. 164, 2011.
[93] V. Perez-Rosas, R. Mihalcea, and L.-P. Morency, “Utterance-Level Multimodal Sentiment Analysis,” Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (1), vol. 1, pp. 973–982, 2013.
[94] J. Bollen, H. Mao, and X. Zeng, “Twitter Mood Predicts the Stock Market,” Journal of Computational Science, vol. 2, no. 1, pp. 1–8, 2011.
[95] G. S. Solakidis, K. N. Vavliakis, and P. A. Mitkas, “Multilingual Sentiment Analysis using Emoticons and Keywords,” IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), vol. 2, pp. 102–109, 2014.
[96] Z. Wang, S. Y. M. Lee, S. Li, and G. Zhou, “Emotion Analysis in Code-Switching Text with Joint Factor Graph Model,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 25, no. 3, pp. 469–480, 2017.
[97] Pushpa C N, Thriveni J, Venugopal K R and L M Patnaik, “Radial Basis Neural Network Technique based Web Page Recommendation System”, International Journal of Computer Sciences and Engineering (IJCSE), vol. 2, no. 9, pp. 1-7, September 2014.
[98] Y. Lu, M. Steptoe, S. Burke, H. Wang, J.-Y. Tsai, H. Davulcu, D. Montgomery, S. R. Corman, and R. Maciejewski, “Exploring Evolving Media Discourse through Event Cueing,” IEEE Transactions on Visualization and Computer Graphics, vol. 22, no. 1, pp. 220–229, 2016.
[99] S. Asur and B. A. Huberman, “Predicting the Future with Social Media,” IEEE/WIC/ACM International Conference on Web Intelligence, vol. 1, pp. 492–499, 2010.
[100] C. Clavel and Z. Callejas, “Sentiment Analysis: From Opinion Mining to Human-Agent Interaction,” IEEE Transactions on Affective Computing, vol. 7, no. 1, pp. 74–93, 2016.
[101] H. Kang, S. J. Yoo, and D. Han, “Senti-Lexicon and improved Naive Bayes algorithms for Sentiment Analysis of Restaurant reviews,” International Journal of Expert Systems with Applications, vol. 39, no. 5, pp. 6000–6010, 2012.
[102] E. Psomakelis, K. Tserpes, D. Anagnostopoulos, and T. Varvarigou, “Comparing Methods for Twitter Sentiment Analysis,” 6th Conference on Knowledge Discovery and Information Retrieval, 2015.
[103] T. H. Nguyen, K. Shirai, and J. Velcin, “Sentiment Analysis on Social Media for Stock Movement Prediction,” International Journal of Expert Systems with Applications, vol. 42, no. 24, pp. 9603–9611, 2015.
[104] S. Krening, B. Harrison, K. M. Feigh, C. L. Isbell, M. Riedl, and A. Thomaz, “Learning from Explanations using Sentiment and Advice in RL,” IEEE Transactions on Cognitive and Developmental Systems, vol. 9, no. 1, pp. 44–55, 2017.
[105] F. Li, S. Wang, S. Liu, and M. Zhang, “SUIT: A Supervised User- Item Based Topic Model for Sentiment Analysis.” Proceedings of the Twenty-Eighth Conference on Artificial Intelligence, vol. 14, pp. 1636–1642, 2014.
[106] N. Li and D. D. Wu, “Using Text Mining and Sentiment Analysis for Online Forums Hotspot Detection and Forecast,” International Journal of Decision support systems, vol. 48, no. 2, pp. 354–368, 2010.
[107] A. C. E. Lima, L. N. de Castro, and J. M. Corchado, “A Polarity Analysis Framework for Twitter Messages,” International Journal of Applied Mathematics and Computation, vol. 270, pp. 756–767, 2015.
[108] Y. Y. Chen and K. V. Lee, “User-Centered Sentiment Analysis on Customer Product Review,” International Journal of World Applied Sciences, vol. 12, pp. 32–38, 2011.
[109] Z. Yan, M. Xing, D. Zhang, B. Ma, and T. Wang, “A Context- Dependent Sentiment Analysis of Online Product Reviews based on Dependency Relationships,” Association for Information Systems, 2014.
[110] G. Li and F. Liu, “Application of a Clustering Method on Sentiment Analysis,” Journal of Information Science, vol. 38, no. 2, pp. 127–139, 2012.
[111] K. Ghag and K. Shah, “Comparative Analysis of the Techniques for Sentiment Analysis,” International Conference on Advances in Technology and Engineering (ICATE), pp. 1–7, 2013.
[112] J. Smailovic, M. Grcar, N. Lavrac, and M. Znidarsic, “Stream-based Active Learning for Sentiment Analysis in the Financial Domain,” International Journal of Information Sciences, vol. 285, pp. 181–203, 2014.
[113] W. Wei and T. Yongxin, “Network Public Sentiment Orientation Analysis based on HMM Model,” International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2269–2273, 2016.
[114] C. Wang, Z. Xiao, Y. Liu, Y. Xu, A. Zhou, and K. Zhang, “SentiView: Sentiment Analysis and Visualization for Internet Popular Topics,” IEEE Transactions on Human-Machine Systems, vol. 43, no. 6, pp. 620–630, 2013.
[115] P. H. Calais Guerra, A. Veloso, W. Meira Jr, and V. Almeida, “From Bias to Opinion: A Transfer-Learning Approach to Real-Time Sentiment Analysis,” Proceedings of the 17th ACM SIGKDD international conference on Knowledge Discovery and Data Mining, pp. 150–158, 2011.
[116] A. Trilla and F. Alias, “Sentence-Based Sentiment Analysis for Expressive Text-to-Speech,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 21, no. 2, pp. 223–233, 2013.
[117] P. Goncalves, M. Arau ́jo, F. Benevenuto, and M. Cha, “Comparing and Combining Sentiment Analysis Methods,” Proceedings of the first ACM Conference on Online Social Networks, pp. 27–38, 2013.
[118] X. Yu, Y. Liu, X. Huang, and A. An, “Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 4, pp. 720–734, 2012.
[119] K. Hiroshi, N. Tetsuya, and W. Hideo, “Deeper Sentiment Analysis using Machine Translation Technology,” Proceedings of the 20th International Conference on Computational Linguistics, pp. 494–500, 2004.
[120] M. Dermouche, L. Kouas, J. Velcin, and S. Loudcher, “A Joint Model for Topic-Sentiment Modeling from Text,” Proceedings of the 30th Annual ACM Symposium on Applied Computing, pp. 819–824, 2015.
[121] N. Claypo and S. Jaiyen, “Automatic Keyword Selection for Sentiment Analysis using Class Dependency and Dissimilarity,” 13th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 1–6, 2016.
[122] R. Jongeling, S. Datta, and A. Serebrenik, “Choosing your Weapons: On Sentiment Analysis Tools for Software Engineering Research,” IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 531–535, 2015.
[123] Q. Fang, C. Xu, J. Sang, M. S. Hossain, and G. Muhammad, “Word- of-Mouth Understanding: Entity-Centric Multimodal Aspect-Opinion Mining in Social Media,” IEEE Transactions on Multimedia, vol. 17, no. 12, pp. 2281–2296, 2015.
[124] H. Lee, H. J. Lee, R. A. Cruz, and J. L. Enriquez, “Electronic Word of Mouth (eWOM) in the Movie Industry,” Proceedings of the 18th Annual International Conference on Electronic Commerce: e-Commerce in Smart Connected World, pp. 1–7, 2016.
[125] E. Cambria, “An Introduction to Concept-Level Sentiment Analysis,” Mexican International Conference on Artificial Intelligence, pp. 478-483, 2013.
[126] A. G. Vural, B. B. Cambazoglu, and P. Karagoz, “Sentiment-Focused Web Crawling,” Proceedings of the 21st ACM International Conference on Information and Knowledge Management, vol. 8, no. 4, pp. 1–21, 2014.
[127] X. Li, H. Xie, L. Chen, J. Wang, and X. Deng, “News Impact on Stock Price Return via Sentiment Analysis,” International Journal
Citation
Mamatha M., Thriveni J., Venugopal K.R., "Techniques of Sentiment Classification, Emotion Detection, Feature Extraction and Sentiment Analysis: A Comprehensive Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.244-261, 2018.
Distributed Routing Protocol which increasing Quality of Service for Hybrid Wireless Network
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.262-265, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.262265
Abstract
Wireless transmission is the reserch field for the researcher for increasing the quality of service. With the expanding level of wireless transmission in today`s condition, individuals regularly required QOS for sharing their information between the hubs. For bearing QOS to the client, numerous specialists proposed a lot many techniques to give QOS ensured directing to hybrid systems, they endeavor to enhance the system limit and dependability yet they avoid oblige in QOS. For this issue, our principle goal of this paper is to enhance the QOS and proficiency of directing methodology with compels over hybrid wireless data spilling utilizing QOD convention. This expects to build up the QOS based reliable architecture against the hybrid wireless routing issues. The framework likewise goes for giving both proactive and responsive answers for powerful routing. The objective of this paper is to give a proficient element routing management to bargain with difficulties of information transmission to channel the neighbor hubs through which the next hop transmission happens.
Key-Words / Index Term
Hybrid Network, Wireless Sensor Network, QoS Routing, Distributed Routing
References
[1]. Ze Li and Haiying Shen, “A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014.
[2]. Ambuja Devidas Patil, “A QoS-oriented Distributed Routing Protocol for Hybrid Wireless Networks”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 4, Issue 6, June 2016.
[3]. S.Aakasham, S.R.Mugunthan, “A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks”, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. II (Mar – Apr. 2015), PP 50-58.
[4]. Mathumathi, Manjusha.T.M, “A QoS-oriented distributed routing protocol for hybrid wireless networks”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 1, January 2015.
[5]. Dr. P.RADHA, K.S.MALARVIZHI, “A QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL FOR HYBRID WIRELESS NETWORKS WITH QUALIFIED NEIGHBOR NODE SELECTION”, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056, Volume: 02 Issue: 06 | Sep-2015.
[6]. Ze Li and Haiying Shen, “A QoS-oriented Distributed Routing Protocol for Hybrid Networks”, Clemson University, Clemson, SC 29631, USA.
[7] Robinpreet Kaur & Mritunjay Kumar Rai,”A Novel Review on Routing Protocols in MANETs”, Undergraduate Academic Research Journal (UARJ), ISSN : 2278 – 1129, Volume-1, Issue-1, 2012.
[8] M. Usha, S. Jayabharathi, Wahida Banu R,”REAODV: An enhanced routing algorithm for QoS Support in Wireless Ad-hoc Sensor Networks “, IEEE International conference on Recent trends in Information Technology, 2011.
[9] P. Gupta and P. R. Kumar,”The Capacity of Wireless Networks”, IEEE Transactions on Information Theory, 46(2) pp 388-404, 2007.
[10] Khabbazian.M and Bhargava V.K, “Localized Broadcasting with Guaranteed Delivery and Bounded Transmission Redundancy,” IEEE Transaction Computers, vol. 57, No.8, pp 1072-1086, 2008.
[11] Z. Shen and J.P. Thomas, “Security and QoS Self-Optimization in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 7, pp 1138-1151, Sept. 2008.
Citation
Uma. k. Thakur, C. G. Dethe, "Distributed Routing Protocol which increasing Quality of Service for Hybrid Wireless Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.262-265, 2018.
Feature level intentions based product recommendations with case-based reasoning
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.266-274, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.266274
Abstract
Crucial data like product features and opinions are mined from online reviews. The obtained opinions are further analyzed for orientations. These orientations that are positive, negative or neutral are counted to determine the sentiment of the feature. The product recommendations performed by using the sentiments lead to a problem called “customer churn”. This is due to the tide of sentiment change. The reviewer intention on the product feature is important in finalizing the recommended list of product cases. In order to carry out this, the statistical intentions are calculated. The product cases are generated for a product by using these calculated intentions. The statistical intentions of the common features are stabilized to uncover the finalized features at the time of product similarity calculation. This “intent-to-opine” way of product recommendations addresses the problem of customer churn in the long run.
Key-Words / Index Term
Customer Reviews, Product Features, Sentiments, Customer Churn, Intentions, Product Recommendations, Case Based Reasoning
References
[1] Dong, Ruihai, et al. "Opinionated product recommendation." International Conference on Case-Based Reasoning. Springer Berlin Heidelberg, 2013.
[2] http://www.infosysblogs.com/data-analytics/2013/12/_my_personal_experience_of.html. Accessed on 10-04-2017.
[3] Liu, Yang, et al. "Riding the tide of sentiment change: sentiment analysis with evolving online reviews." World Wide Web 16.4 (2013): 477-496.
[4] Carlos, Cohan Sujay, and Madhulika Yalamanchi. "Intention Analysis for Sales, Marketing and Customer Service." COLING (Demos). 2012.
[5] Turney, Peter D., and Michael L. Littman. "Measuring praise and criticism: Inference of semantic orientation from association." ACM Transactions on Information Systems (TOIS) 21.4 (2003): 315-346.
[6] http://www.aiaioo.com/whitepapers/intention_analysis_use_cases.pdf. Accessed on 10-04-2017.
[7] Resnick, Paul, et al. "GroupLens: an open architecture for collaborative filtering of netnews." Proceedings of the 1994 ACM conference on Computer supported cooperative work. ACM, 1994.
[8] Stavrianou, Anna, and Caroline Brun. "Expert Recommendations Based on Opinion Mining of User‐Generated Product Reviews." Computational Intelligence 31.1 (2015): 165-183.
[9] Lang, Ken. "Newsweeder: Learning to filter netnews." Proceedings of the 12th international conference on machine learning. 1995.
[10] Zhou, Jia, Tiejian Luo, and Fuxing Cheng. "Modeling learners and contents in academic-oriented recommendation framework." Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on. IEEE, 2011.
[11] Kolodner, Janet. Case-based reasoning. Morgan Kaufmann, 2014.
[12] Burke, Robin D., Kristian J. Hammond, and B. C. Yound. "The FindMe approach to assisted browsing." IEEE Expert 12.4 (1997): 32-40.
[13] Holland, Stefan, Martin Ester, and Werner Kießling. "Preference mining: A novel approach on mining user preferences for personalized applications." European Conference on Principles of Data Mining and Knowledge Discovery. Springer Berlin Heidelberg, 2003.
[14] Chen, Guanliang, and Li Chen. "Recommendation based on contextual opinions." International Conference on User Modeling, Adaptation, and Personalization. Springer International Publishing, 2014.
[15] Gurini, Davide Feltoni, et al. "Analysis of sentiment communities in online networks." Proceedings of the International Workshop on Social Personalization & Search, co-located at SIGIR. 2015.
[16] Li, Xiu, Huimin Wang, and Xinwei Yan. "Accurate recommendation based on opinion mining." Genetic and Evolutionary Computing. Springer International Publishing, 2015. 399-408.
[17] Dong, Ruihai, et al. "Combining similarity and sentiment in opinion mining for product recommendation." Journal of Intelligent Information Systems 46.2 (2016): 285-312.
[18] Toutanova, Kristina, and Christopher D. Manning. "Enriching the knowledge sources used in a maximum entropy part-of-speech tagger." Proceedings of the 2000 Joint SIGDAT conference on Empirical methods in natural language processing and very large corpora: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics-Volume 13. Association for Computational Linguistics, 2000.
[19] Manning, Christopher. "Part-of-speech tagging from 97% to 100%: is it time for some linguistics?." Computational Linguistics and Intelligent Text Processing (2011): 171-189.
[20] Liu, Bing. Web data mining: exploring hyperlinks, contents, and usage data. Springer Science & Business Media, 2007.
[21] Christiane Fellbaum (1998, ed.) WordNet: An Electronic Lexical Database. Cambridge, MA: MIT Press.
[22] Cambria, Erik, et al. "SenticNet: A Publicly Available Semantic Resource for Opinion Mining." AAAI fall symposium: commonsense knowledge. Vol. 10. No. 0. 2010.
[23] Lafferty, John, Andrew McCallum, and Fernando Pereira. "Conditional random fields: Probabilistic models for segmenting and labeling sequence data." Proceedings of the eighteenth international conference on machine learning, ICML. Vol. 1. 2001.
[24] Poria, Soujanya, et al. "A rule-based approach to aspect extraction from product reviews." Proceedings of the second workshop on natural language processing for social media (SocialNLP). 2014.
[25] Hu, Minqing, and Bing Liu. "Mining and summarizing customer reviews." Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2004.
[26] Huang, Anna. "Similarity measures for text document clustering." Proceedings of the sixth new zealand computer science research student conference (NZCSRSC2008), Christchurch, New Zealand. 2008.
[27] http://gadgets.ndtv.com/samsung-galaxy-j7-prime-3735-vs-oppo-f1-plus-3414-vs-apple-iphone-6s-plus-2955 . Accessed on 10-04-2017.
[28] Wang, Wei, and Hongwei Wang. "Opinion-enhanced collaborative filtering for recommender systems through sentiment analysis." New Review of Hypermedia and Multimedia 21.3-4 (2015): 278-300.
Citation
D. Teja Santosh, K.C. Ravi Kumar, P. Chiranjeevi, "Feature level intentions based product recommendations with case-based reasoning," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.266-274, 2018.
Image Security Implementing Steganography and Cryptographic Methods
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.275-279, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.275279
Abstract
Steganography is that the art of concealment the actual fact communication is going down, by concealment info in other info. Many different carrier file formats can be used, but digital pictures are the foremost well-liked because of their frequency on the web. This paper introduces 2 new strategies wherever in cryptography and steganography are combined to encode the information as well on hide the information in another medium through image process. This paper securing the image by encryption is finished by DES formula victimisation the key image. The encrypted image may be hide in another image by victimisation LSB techniques, so that the secret’s terribly existence is hid. The coding may be done by the same key image victimisation DES formula.
Key-Words / Index Term
Steganography, Cryptography, image hiding, Least-significant bit(LSB) scheme
References
[1] C. Kurak and J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IEEE 8 Annual Computer Security Applications Conference, 30 Nov-4 Dec, 1992, pp. 153- 159.
[2] J.C. Judge, Steganography: Past, present, future. SANS Institute publication,http://www.sans.org/reading_room/ whitepapers/stenganography/552.php, 2001.
[3] Km. Pooja ,Arvind Kumar , “Steganography- A Data Hiding Technique” International Journal of Computer Applications ISSN 0975 – 8887, Volume 9– No.7, November 2010.
[4] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2)(1998) 2634.
[5] N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 01 (3)(2003)32-44.
[6] N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC.
[7] P. Moulin and R. Koetter, Data-hiding codes, Proceedings of the IEEE, 93 (12)(2005)2083-
2126.
[8] R. Chandramouli, M. Kharrazi, N. Memon, “Image Steganography and Steganalysis: Concepts and Practice “ , International Workshop on DigitalWatermarking, Seoul, October 2004.
[9] R.J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IEEE Journal Selected Areas in Communications,
16(4), pp. 474-481.
[10] S.B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23,
2004, pp. 417-418.
[11] T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, SA
Citation
A. Balasubramani, Ch.D.V. Subba Rao, "Image Security Implementing Steganography and Cryptographic Methods," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.275-279, 2018.
Data Retrieval from Data Warehouse Using Materialized Query Database
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.280-284, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.280284
Abstract
Decision making in an organization requires aggregate as well as non- aggregate results, computed from data stored in data warehouse. Performance in case of result extraction from a data warehouse is an important factor. Probability that the same query is fired more often is high. This results into frequent analysis of warehouse data for fetching same results or results with incremental updates. This paper discusses an approach for storing such frequent queries along with their result, timestamp, frequency and threshold in a separate database. Past results are fetched from database and only incremental updates are done through data marts. This approach may improve performance removing or reducing execution time.
Key-Words / Index Term
Data warehouse, Data mart, materialized query, faster execution
References
[1] T. Morzy, R. Wrembel, “On Querying Versions of Multiversion Data Warehouse,” DOLAP’04, November 12–13, 2004, Washington, DC, USA. Copyright 2004 ACM 1-58113-977-2/04/001.
[2] S. Vanichayobon. “Indexing Techniques for Data Warehouses’ Queries”. [Online] Available: http://www.cs.ou.edu/~database/documents/vg99.pdf [Accessed September 15, 2016]
[3] A. Gupta, I. S. Mumick, V.S.Subrahmanian, “Maintaining Views Incrementally,” Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Pages 157-166.
[4] D. Quass, “Maintenance Expressions for Views with Aggregation,” Views`96, June 1996, [Online]. Available: http://ilpubs.stanford.edu:8090/183/1/1996-54.pdf.
[5] Y. Zhuge, H. G.Molina, J. Hammer, J. Widom, “View Maintenance in a Warehousing Environment,” Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, Pages 316-327.
[6] A. Gupta, H.V. Jagadish, I. S. Mumick, “Data Integration using Self-Maintainable Views,” Advances in Database Technology — EDBT `96, Volume 1057 of the series Lecture Notes in Computer Science, pp 140-144.
[7] K. A. Ross, D. Srivastava, S.Sudarshan, “Materialized View Maintenance and Integrity Constraint Checking: Trading Space for Time,” Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, Pages 447-458.
[8] J. Zhou, P. A. Larson, H. G. Elmongui, “Lazy Maintenance of Materialized Views,” VLDB `07 Proceedings of the 33rd International Conference on Very large Databases, Pages 231-242.
[9] D. Srivastava, S. Dar, H. V . Jagadish, A. Y.Levy, “Answering Queries with Aggregation Using Views,” Proceedings of the 22nd VLDB Conference, Mumbai (Bombay), India, 1996.
[10] D. Agrawal, A. El Abbadi, A. Singh, T. Yurek, “Efficient View Maintenance at Data Warehouses,” SIGMOD ’97 AZ,USA @ 1997 ACM 0-89791 -911 -419710005.
[11] J. Goldstein, P. A. Larson, “Optimizing Queries Using Materialized Views: A Practical, Scalable Solution,” Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data, Pages 331-342, ISBN:1-58113-332-4.
[12] P. Vassiliadis, “Modeling Multidimensional Databases, Cubes and Cube Operations,” Proceedings of Tenth International Conference on Scientific and Statistical Database Management, 1998.
[13] P. Vassiliadis, T. Sellis, “A Survey of Logical Models for OLAP databases,” ACM SIGMOD Record, Volume 28 Issue 4, Dec.1999, Pages 64 – 69.
[14] V. Harinarayan, A. Rajaraman, J. D. Ullman, “Implementing Data Cubes Efficiently,” Proceedings of the 1996 ACM SIGMOD International Conference on Management of data, Pages 205-216.
[15] A. Datta, H. Thomas, “The Cube Data Model: A Conceptual Model and Algebra for On-Line Analytical Processing in Data Warehouses,” Decision Support Systems, Volume 27, Issue 3, December 1999, Pages 289-301.
[16] R. Agrawal, A. Gupta, S. Sarawagi, “Modeling Multidimensional Databases,” Proceedings 13th International Conference on Data Engineering, pages232-243.
[17] P. Deshpande, S. Agarwal, J. Naughton, R. Ramakrishnan, “Computation of Multidimensional Aggregates,” Proceedings 22nd VLDB Conference.
[18] S. J. Chun, C. W. Chung, J. H. Lee, S. L. Lee, “Dynamic Update Cube for Range-Sum Queries,” Proceedings of the 27th VLDB Conference.
[19] J. Shanmugasundaram, U. Fayyad, P. S. Bradley, “Compressed Data Cubes for OLAP Aggregate Query Approximation on Continuous Dimensions,” Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, Pages 223-232.
[20] C. Li , X. S. Wang, “A Data Model for Supporting On-Line Analytical Processing,” Proceedings of the fifth international conference on Information and knowledge management, Pages 81-88.
[21] G. K. Gupta, Introduction to Data Mining with Case Studies, PHI Learning Private Limited, 2014.
[22] S. Chakraborty, J. Doshi, “Faster Query Result Retrieval Approaches from a Data Warehouse: A Survey,” “International Journal of Current Engineering and Scientific Research (IJCESR)”, Volume 4, Issue 6, 2017, ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, Pages 7-14.
[23] F. Sultan, A. Aziz, “Ideal Strategy to Improve Data warehouse Performance,” International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 409-415.
Citation
Sonali Chakraborty, Jyotika Doshi , "Data Retrieval from Data Warehouse Using Materialized Query Database," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.280-284, 2018.
Spectral Analysis of Blood Glucose using Noninvasive Technique
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.285-288, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.285288
Abstract
Diabetes is condition that affects your body’s ability to consume the energy present in our diet. Glucose gives energy to your body cells. Body cells need insulin that is present in our blood for getting glucose and utilizes it for energy. Increase of glucose in blood can damage the small blood veins in your kidneys, heart. Blood glucose level can be monitored by two methods namely invasive and noninvasive methods. Currently invasive glucose monitoring methods are widely used. In this method, the skin is pricked to draw blood and put collected drop into a measurement device. Invasive blood glucose measurement methods are highly accurate and common but they are very uncomfortable. For this reason research on noninvasive method is being carried out worldwide. This method is painless and finger pricking is avoided. A noninvasive method based on NIR technique using occlusion is proposed. The body site is ear lobe or finger. The output of optical signal is analyzed by performing FFT analysis.
Key-Words / Index Term
Diabetes, Noninvasive, NIR Spectroscopy
References
[1] Steve Chaplin “Noninvasive Blood Glucose Testing: The Horizon” Practical Diabetes , Vol 33, No 9, Nov 2016.
[2] Jyoti Yadav, Asha Rani, Vaijnder Singh, Bhaskar Moahn Murari, “Comparative study of Different Measurement Sites using NIR Based Non-invasive Glucose Measurement system”,4th ICECCS, Procedia computer Science 70,2015,pp469-475.
[3] Kiseok Song, Unsoo Ha, Seangwook Park, Joonsung Bae, Hui-Jun, “An impedance and multi-wavelength Near-Infrared Spectroscopy IC for Non-invasive Blood Glucose Estimation”, IEEE Journal of Solid-State Circuits,Vol 50, No.4, April 2015, pp 1025-1037.
[4] Hussan Ali Al naam, Mohamed Osman, Idress, Abdalsalam Awad, Ola S. Abdalsalam,Frangoon Mohamed, “Noninvasive Blood Glucose Measurement Based on Photo-acoustic Spectroscopy”, International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering,7-9 sep 2015,khartoum,pp-1-4.
[5] Xiaoli Li, Chengwei Li, “Research on Noninvasive Glucose Concentration Meassurement by NIR Transmission” IEEE Intenational Conference on computer an communications,10-11 Oct 2015,Chengdu, pp 223-228.
[6] K. A. Unnikrishana Menon, Deepak Hemachandran, Abhishek Thekkeyil Kunnath, “Voltage Intensity based Noninvasive Blood Glucose Monitering” 4th ICCCNT 2013, July 4-6, Tiruchengode, India, pp 1-5.
[7] Ola S. Abdalsalam, Alaa Aldeen Awouda, “Noninvasive Glucose Monitoring using scattering spectroscopy” American Journal of Biomedical Engineering 2014,Vol 4,pp 53-59.
[8] Praful P. Pai, Pradut Kumar Sanki, Arjit De, Swapna Banerjee, “NIR photoacoustic spectroscopy for Noninvasive Glucose Measurement” 37th Annual International Conference of IEEE Engineering in Medicine and Biology Society, 25-29 Aug 2015, Milan, pp 7978-7981.
[9] Masab Ahmad, Awais Kamboh, Ahmed Khan, “Non-invasive blood glucose monitoring using Near Infrared Spectroscopy”, EDN Network, Oct16, 2013.
[10] O.S.Khalil, “Non-invasive Glucose measurement Techniques: An update from 1999 to the Dawn of the new millenium”, Diabetes Technology Therapeatics, Vol.6, no.5, 2004, pp 660-697.
Citation
Vandana C. Bavkar, A.A.Shinde, "Spectral Analysis of Blood Glucose using Noninvasive Technique," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.285-288, 2018.
Satellite Image Enhancement Using DWT and Gaussian Filter
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.289-297, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.289297
Abstract
These days the image taken by the satellite generally utilized for differing applications however the element of these image degraded because of climate change, atmosphere and different elements are responsible. In image processing, an assortment of image enhancement methods have been produced for the satellite image restoration and improvement. This paper proposes an approach which utilizes DWT, Hybrid filter and Gaussian filter. The simulation of our anticipated technique is done utilizing the MATLAB2012a simulator which involves various functions for image enhancement and the similar examination of our strategy utilizes the execution measurements, for example, PSNR, EME and RMSE. The experimental consequences of our methodology give enhanced quality of image than the existing methods.
Key-Words / Index Term
Image processing; Satellite image; DWT; MATLAB; PSNR; MSE, RMSE
References
[1] P. Suganya, N. Mohanapriya, B. Kalaavathi, “Satellite image resolution enhancement using multi wavelet transform and comparison of interpolation techniques”, International Journal of Research in Engineering and Technology, eISSN: 2319-1163 | pISSN: 2321-7308, Volume: 03 Special Issue: 07 | May-2014.
[2] DEVI.S, JINI CHERIYAN, “Image Enhancement Using Guided Image Filter and Wavelet Based Edge Detection”, International Journal of Modern Engineering Research (IJMER), Vol. 3, Issue.3, May.-June. 2012 pp-1702-1706
[3] T.V. HYMA LAKSHMI, T. MADHU, E.V.KRISHNA RAO, V.LAKSHMI MOUNICA, “Satellite Image Resolution Enhancement Using Discrete Wavelet Transform and Gaussian Mixture Model”, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 02 Issue: 04 | July-2015
[4] Dr. Muna F. Al-Samaraie and Dr. Nedhal Abdul Majied Al Saiyd, “Colored Satellites Image Enhancement Using Wavelet and Threshold Decomposition”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 3, September 2011.
[5] P. Suganya, N. Mohanapriya, B. Kalaavathi, “Satellite image resolution enhancement using multi wavelet transform and comparison of interpolation techniques”, International Journal of Research in Engineering and Technology, eISSN: 2319-1163 | pISSN: 2321-7308, Volume: 03 Special Issue: 07 | May-2014.
[6] Arya P Unni, “Satellite Image Enhancement Using 2D Level DWT”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 3 Issue 3, March 2014.
[7] Yong Yang1, Shuying Huang2, Junfeng Gao3, Zhongsheng Qian, “Multi-focus Image Fusion Using an Effective Discrete Wavelet Transform Based Algorithm”, measurement science review, volume 14, no. 2, 2014.
[8] Pavithra C , Dr. S. Bhargavi, “Fusion of two images based on wavelet transform”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 5, May 2013.
[9] Wenkao Yang, Jing Wang and Jing Guo, “A Novel Algorithm for Satellite Images Fusion Based on Compressed Sensing and PCA”, Hindawi Publishing Corporation, Mathematical Problems in Engineering, pp. 1 – 10, Volume 2013.
[10] Lasmika, K. Raveendra, "Improving Quality of Satellite Image by Wavelet Transforming & Morphological Filtering", International Journal of Innovative Research in Science, Engineering and Technology, ISSN: 2319- 8753,Vol. 3, Issue 7, July 2014.
[11] S. Revathy , J. Jebakumari Beulah Vasanthi “Satellite Image De-Noising Using Huffman Codeing with Various Filters”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 5, Special Issue 1, March 2017.
[12] Sundaram, M.K., Sasikala, D., and Rani, A.P., “A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter”, International Journal of Innovative Research in Science , Engineering and Technology, ISSN: 2319-8753, Vol. 3, Issue 3, March 2014, pp. 10333-10337.
[13] Deepa, P., and Suganthi, M., “performance Evaluation of various Denoising Filters for Medical image”, International journal of computer science and information technologies, Vol. 5(3), 2014, ISSN: 0975-9646, pp. 4205-4209.
[14] Khaled Sahnoun and Noureddine Benabadji., “On – Board Satellite Image Compression Using The Fourier Transform And Huffman Coding”, The International Journal of Computational Science, Information Technology and Control Engineering, Volume 1, Issue 1, April 2014, pp. 17-23.
[15] Yashavanth, E. Vijay Kumar L.J, and Suresh, K.V., “Hybrid Fractal Image Compression For Satellite Images”, Technical Research Organization India, Volume 1, Issue 2, 2015, pp. 9-13.
[16] S. Mallat, “A Theory for Multiresolution Signal Decomposition: The Wavelet Representation,” IEEE Pattern Analysis.
[17] Michael Weeks, Magdy Bayoumi,” Discrete Wavelet Transform: Architectures, Design and Performance Issues”, 2003.
[18] M. Vishwanath and C. Chakrabarti, “A VLSI Architecture for Real-Time Hierarchical Encoding/Decoding of Video using the Wavelet Transform,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’94), Adelaide, Australia, vol. 2, April 19–22, 1994, pp. 401–404.
[19] A. Bruce, D. Donoho, and H.-Y. Gao, “Wavelet Analysis,” IEEE Spectrum, Oct. 1996, pp. 26–35.
[20] A. Teolis, “Identification of Noisy FM Signals using Non Orthogonal Wavelet Transforms,” SPIE Wavelet Applications IV, vol. 3078, April 22–24, 1997, pp. 590–601.
Citation
Kshipra Singh, Jijo S Nair, "Satellite Image Enhancement Using DWT and Gaussian Filter," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.289-297, 2018.
Future Generation’ Mobile Protection and Security
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.298-303, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.298303
Abstract
The future of mobile wireless communication networks will be experiencing several generations. This kind of development will drive the researches of information technology in industrial area of continuous development and evolution. In this paper, we have explored future generations of mobile wireless communication networks including 4th, 5th,and so forth. If looking to past, wireless access technologies have been followed different evolutionary paths with aim at unified target related to performance and efficiency in high mobile environment. Android develops one of the most popular mobile operating system in the whole world, as a side effect of this popularity, Android becomes the most preferred destination of hackers with different aims, some of them looking for making money and others are just having fun by raid the privacy of the others without their authorization. Nowadays, Android security has become a major problem because of the free application provided and functionalities that make it very easy for anyone to progress it. However, various systems have been planned by a large number of scholars to address these problems.
Key-Words / Index Term
3G, 4G, 5G, Phones, Android, Hacking
References
[1] Richard Goodwin “The History of mobile phones from 1973 to 2008: The Handsets That Made It ALL Happen “March 2017.
[2] Types.org.uk,” Types of Phones “,2016. http://types.org.uk/phones/types-of-phones/
[3] Afaq H. Khan, Mohammed A. Qadeer, Juned A. Ansari, Sariya Waheed,” 4G as a Next Generation Wireless Network “, International Conference on Future Computer and Communication ,2009.
[4] Wikipedia,” List of mobile phone generation “, November 2017
[5] Latifa Er-Rajy, My Ahmed El Kiram,” How far android is secure?”, IEEE,2015
[6] Wikipedia,” 5G”, November 2017. https://en.wikipedia.org/wiki/5G
[7] Daniel George,” 5G Wireless System “, St. Thomas College ,2014
[8] Pankaj Sharma,” Evolution of Mobile Wireless Communication Network -1G to 5G as well as Future Prospective of Next Generation Communication Network “, IJCSMC, Vol .2, Aug 2013.
[9] David Hall 1 ,” The Important of Bandwidth “, Electronic Design ,” 2015, http://www.electronicdesign.com/test-measurement/simple-transient-response-measurement-determines-power-supply-bandwidth
[10] Kumaravel, K. “Comparative Study of 3G and 4G in Mobile Technology. International Journal of Computer Science 8(5): 256-263. [20] “5G Mobile Phone Technology” ,2011, www.pediain.com
[11] Gupta, P. and Patil P. 4G- a new era in wireless telecommunication. Magister Program in S/W Engineering, Malardalen University.
[12] Williams, C., Strusani, D, Vincent, D. and Kovo, D. The Economic Impact of Next-Generation Mobile Services: How 3G Connections and the Use of Mobile Data Impact GDP Growth. The Global Information Technology Report: 77-80 ,2013
[13] Tutorials point simple learning,” Android -Architecture “,2017. https://www.tutorialspoint.com/android/android_architecture.htm
[14] Webkit “BSD License “, Apple Inc ,2009
[15] Hacking Tips and Tricks,” Hidden secret codes of android smart phone” 2013
[16] http://rishinhr.blogspot.in/2013/07/android-hidden-secret-codes-of-android.html
[17] Darien Graham -Smith,” 12-ways to hack-proof your smartphone”, Theguardian,2017
[18] https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
[19] Seed Guide,” What are 1G, 2G, 3G & 4G network?”, SpeedGuide.net ,2017
[20] Xichun Li, Rosli Sallah ,” The Future of Mobile Wireless Communication Networks”, International Conference on Communication Software and Networks ,2009.
Citation
M.A. Bari, I. Sultana, N. Fathima, S. Ahamad, "Future Generation’ Mobile Protection and Security," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.298-303, 2018.
An Innovative Approach of Dehooking for Online Handwritten Bengali Characters and Words
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.304-307, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.304307
Abstract
For the last few decades several researches have been conducted on Online handwriting analysis. But scholars have unanimously agreed to the fact that it is challenging research area. To recognize with perfect prediction some pre-processing steps are essential. In this paper an honest endeavor is made to present dehooking as one of the important pre-processing steps. Here Bengali online handwritten Characters and words are considered as samples for removing hooks. Hooks are basically common artifacts used by people during fast writing. Hooks are very common issues present at the beginning in very rare case and the end of character stroke in maximum case and are generated by the pen-down and pen up movements respectively. Dehooking is the process of eliminating such unwanted strokes that appear due to inaccuracies in pen down position. Dehooking algorithms are applied to remove hooks. Here, strokes are detected by comparing the number of points with a threshold value. If the value is greater than the threshold value, the mark is retained or it is removed otherwise. In this new and innovative approach we focus on the dehooking at the end of character stroke and consider last 20 percent of each stroke for checking, according to distance from the co-ordinate of the first pixel. In last 20 percent of a stroke, we calculated angle among three consecutive pixels. If in a particular point, angle among three consecutive pixels is falling suddenly then immediately we pointed out that point. After pointing out the angle falling place we checked the entire remaining pixel after that point, whether all the remaining points are getting fade slowly or not. If it is found that all the remaining points are getting faded slowly then it can be assumed that it is a hook. After detecting the hook of a particular stroke we remove all the remaining pixels from the falling angle place so that hook can be removed and the handwritten character remains hook less. I have tested 4000 Bengali online handwritten characters and have got 97.02 percent of accuracy.
Key-Words / Index Term
Online, Handwriting, Character, Angle, Fade, Hook
References
[1] Mazumdar, Bijaychandra,“The history of the Bengali language” (Repr. [d. Ausg.] Calcutta, 1920. ed.). New Delhi: Asian Educational Services. p. 57. ISBN 8120614526, 2000.
[2] Aini Najwa Azmi, Dewi Nasien, Siti Mariyam Shamsuddin,“A review on handwritten character and numeral recognition for Roman, Arabic, Chinese and Indian scripts”, International Journal of advanced studies in Computer Science and Engineering, Vol 2 issue 4, 2013
[3] Fareeha Anwar, Muhammad Adnan Aftab, Dr.Syed Afaq Hussain, Dr.Ayyaz Hussain “Preprocessing of Online Urdu Handwriting for Mobile Devices”, International Journal of Computer Science and Network Security, Vol.17 No.10, October 2017
[4] Anitha Mary M.O. Chacko, Dhanya P.M.,“Handwritten Character Recognition in Malayalam Scripts– a Review”, International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 1, January 2014
[5] Muhammad Imran Razzak, Syed Afaq Hussain, Muhammad Sher, Zeeshan Shafi Khan, “Combining Offline and Online Preprocessing for Online Urdu Character Recognition”, Proceedings of the International Multi Conference of Engineers and Computer Scientists 2009, Vol I IMECS 2009, March 18 - 20, 2009, Hong Kong
Citation
Gouranga Mandal, "An Innovative Approach of Dehooking for Online Handwritten Bengali Characters and Words," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.304-307, 2018.