Image Caption Generation: A Survey
Survey Paper | Journal Paper
Vol.6 , Issue.3 , pp.256-262, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.256262
Abstract
In recent years, the amount of images are increasing due to advancement in the technologies. This proliferation in Image data demands analysis and generation of image descriptions. The generated image captions must describe the image in a precise manner, covering all aspects of the image. Automatic image caption generation has emerged as an important task of research in the new integrated community of language-vision. Image captioning techniques can be broadly divided into data-driven and feature-driven methods. Data-driven techniques involve extraction of a similar image, whose caption is as it is copied or extraction of multiple images and then combining their captions to form appropriate caption for the input image. Feature based methods involve analyzing the visual content of the image and then generating natural language sentences. In this paper, we have reviewed both the methods along with the most efficient feature based technique that uses Convolution Neural Networks (CNNs) and Recurrent Neural Networks (RNNs). Various CNN-RNN based techniques are proposed by researchers to solve the Image captioning task and have achieved remarkable results. First, image objects and their relations are analyzed using CNN and then RNN are used for sentence generation. We have also elaborated the concept of CNN.
Key-Words / Index Term
Image captioning, image understanding, CNN, RNN, natural language generation
References
[1] B. Z. Yao, X. Yang, L. Lin, M. W. Lee, and S.-C. Zhu, “I2T: Image parsing to text description,” in Proc. IEEE, vol. 98, no. 8, pp. 1485– 1508, Aug. 2010.
[2] Y. Feng and M. Lapata, "Automatic Caption Generation for News Images," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 4, pp. 797-812, April 2013.
[3] G. Kulkarni et al., "BabyTalk: Understanding and Generating Simple Image Descriptions," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 12, pp. 2891-2903, Dec. 2013.
[4] G. Kulkarni, V. Premraj, S. Dhar, S. Li, Y. Choi, A.C. Berg, and T.L. Berg, “Baby Talk: Understanding and Generating Image Descriptions,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 1601-1608, 2011.
[5] A. Farhadi “Every picture tells a story: Generating sentences from images,” in Proc. 11th Eur. Conf. Comput. Vis.: Part IV, 2010, pp. 15–29.
[6] R. Kiros and R. Z. R. Salakhutdinov, “Multimodal neural language models,” in Proc. Neural Inf. Process. Syst. Deep Learn. Workshop, 2013.
[7] J. Mao, W. Xu, Y. Yang, J. Wang, and A. Yuille, “Explain images with multimodal recurrent neural networks,” in arXiv:1410.1090, 2014.
[8] A. Karpathy and L. Fei-Fei, "Deep Visual-Semantic Alignments for Generating Image Descriptions," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, no. 4, pp. 664-676, April 1 2017.
[9] Y. Yang, C. L. Teo, H. Daume III, and Y. Aloimonos, “Corpusguided sentence generation of natural images,” in Proc. Conf. Empirical Methods Natural Language Process., 2011, pp. 444–454.
[10] D. Elliott and F. Keller, “Image description using visual dependency representations,” in Proc. Empirical Methods Natural Language Process., 2013, pp. 1292–1302.
[11] A. Gupta and P. Mannem, “From image annotation to image description,” in Neural Information Processing. Berlin, Germany: Springer, 2012
[12] J. Donahue et al., "Long-Term Recurrent Convolutional Networks for Visual Recognition and Description," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, no. 4, pp. 677-691, April 1 2017.
[13] P. He´de, P.A. Moellic, J. Bourgeoys, M. Joint, and C. Thomas, “Automatic Generation of Natural Language Descriptions for Images,” Proc. Recherche d ’Information Assistee par Ordinateur, 2004.
[14] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” in Neural Computation. Cambridge, MA, USA: MIT Press, 1997.
[15] A. Tariq and H. Foroosh, "A Context-Driven Extractive Framework for Generating Realistic Image Descriptions," in IEEE Transactions on Image Processing, vol. 26, no. 2, pp. 619-632, Feb. 2017.
[16] K. Fu, J. Jin, R. Cui, F. Sha and C. Zhang, "Aligning Where to See and What to Tell: Image Captioning with Region-Based Attention and Scene-Specific Contexts," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, no. 12, pp. 2321-2334, Dec. 1 2017.
[17] Z. Shi and Z. Zou, "Can a Machine Generate Humanlike Language Descriptions for a Remote Sensing Image?," in IEEE Transactions on Geoscience and Remote Sensing, vol. 55, no. 6, pp. 3623-3634, June 2017.
[18] A. Muscat and A. Belz, "Learning to Generate Descriptions of Visual Data Anchored in Spatial Relations," in IEEE Computational Intelligence Magazine, vol. 12, no. 3, pp. 29-42, Aug. 2017.
[19] Y. Yang, C. L. Teo, H. Daumé III, and Y. Aloimonos, “Corpus-guided sentence generation of natural images,” in Proc. 16th Conf. on Empirical Methods in Natural Language Processing, Edinburg, Scotland, July 27-31, 2011, pp. 444–454.
[20] D. Elliott and F. Keller, “Image description using visual dependency representations,” in Proc. 18th Conf. on Empirical Methods in Natural Language Processing, Seattle, Oct. 18-21, 2013, pp. 1292–1302.
[21] M. Mitchell, X. Han, J. Dodge, A. Mensch, A. Goyal, A. Berg, K. Yamaguchi , T. Berg, K. Stratos, and H. Daumé, III, “Midge: Generating image descriptions from computer vision detections,” in Proc. 13th Conf. of the European Chapter of the Association for Computational Linguistics, Avignon, France, Apr. 23-27, 2012, pp. 747–756.
[22] P. Kuznetsova, V. Ordonez, T. L. Berg, and Y. Choi, “Treetalk: Composition and compression of trees for image descriptions,” Trans. Assoc. Comput. Linguist., vol. 2, no.10, pp. 351–362, June 2014.
[23] L. Gao, Z. Guo, H. Zhang, X. Xu and H. T. Shen, "Video Captioning With Attention-Based LSTM and Semantic Consistency," in IEEE Transactions on Multimedia, vol. 19, no. 9, pp. 2045-2055, Sept. 2017.
[24] M. Kilickaya, B. K. Akkus, R. Cakici, A. Erdem, E. Erdem and N. Ikizler-Cinbis, "Data-driven image captioning via salient region discovery," in IET Computer Vision, vol. 11, no. 6, pp. 398-406, 9 2017.
[25] L. Li, S. Tang, Y. Zhang, L. Deng and Q. Tian, "GLA: Global–Local Attention for Image Description," in IEEE Transactions on Multimedia, vol. 20, no. 3, pp. 726-737, March 2018.
[26] L. Yang and H. Hu, "TVPRNN for image caption generation," in Electronics Letters, vol. 53, no. 22, pp. 1471-1473, 10 26 2017.
[27] H. Fang et al., "From captions to visual concepts and back," 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, 2015, pp. 1473-1482.
[28] J. Devlin, H. Cheng, H. Fang, S Gupta, L Deng, X. He, G. Zweig, M. Mitchell, “Language Models for Image Captioning: The Quirks and What Works” Cornell University Library, Oct.-2015.
[29] X. He and L. Deng, "Deep Learning for Image-to-Text Generation: A Technical Overview," in IEEE Signal Processing Magazine, vol. 34, no. 6, pp. 109-116, Nov. 2017.
[30] J. Wu and H. Hu, "Cascade recurrent neural network for image caption generation," in Electronics Letters, vol. 53, no. 25, pp. 1642-1643, 12 7 2017. doi: 10.1049/el.2017.3159
[31] S. Cascianelli, G. Costante, T. A. Ciarfuglia, P. Valigi and M. L. Fravolini, "Full-GRU Natural Language Video Description for Service Robotics Applications," in IEEE Robotics and Automation Letters, vol. 3, no. 2, pp. 841-848, April 2018.
[32] M. Banko, V. Mittal, and M. Witbrock, “Headline Generation Based on Statistical Translation,” Proc. 38th Ann. Meeting Assoc. for Computational Linguistics, pp. 318-325, 2000.
[33] K. He, X. Zhang, S. Ren and J. Sun, "Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 37, no. 9, pp. 1904-1916, Sept. 1 2015.
[34] Y. Cui, F. Zhou, J. Wang, X. Liu, Y. Lin and S. Belongie, "Kernel Pooling for Convolutional Neural Networks," 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, 2017, pp. 3049-3058.
[35] G, T. Jain “Discriminatory Image Caption Generation Based on Recurrent Neural Networks and Ranking Objective,” International Journal of Computer Science and Engineering, Vol 5 (10), pp.260-265, Oct 2017.
Citation
Khushboo Khurana, Shyamal Mundada, "Image Caption Generation: A Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.256-262, 2018.
Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.263-268, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.263268
Abstract
Cloud computing is the paradigm used to provide resource on share basis to multiple machines. Due to availability of resources this mechanism becoming extremely popular for accessing resources as and when desired by machines. Reliability however is the issue associated with cloud computing. Data transferred and stored over the cloud will be under siege due to the malicious access or attacks. This paper present the comprehensive survey of techniques used in order to encrypt the data and enhance reliability of cloud. Cloud reliability enhancement is ensured using the encryption algorithms which are researched over the past era. Efficient parameters are extracted and qualitative comparison is presented to depict the efficient encryption mechanism that can be used in future works.
Key-Words / Index Term
Cloud Computing, Reliability, Encryption
References
[1] X. Yu, “Intelligent Urban Traffic Management System Based on Cloud Computing and Internet of Things,” pp. 2169–2172, 2012.
[2] B. Mills, T. Znati, and R. Melhem, “Shadow Computing: An energy-aware fault tolerant computing model,” 2014 Int. Conf. Comput. Netw. Commun., pp. 73–77, 2014.
[3] C. A. Chen, M. Won, R. Stoleru, and G. G. Xie, “Energy-efficient fault-tolerant data storage and processing in mobile cloud,” IEEE Trans. Cloud Comput., vol. 3, no. 1, pp. 28–41, 2015.
[4] S. S. Lakshmi, “Fault Tolerance in Cloud Computing,” vol. 04, no. 01, pp. 1285–1288, 2013.
[5] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” Proc. - 10th IEEE Int. Conf. High Perform. Comput. Commun. HPCC 2008, pp. 5–13, 2008.
[6] Z. Xiao, W. Song, and Q. Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1107–1117, Jun. 2013.
[7] U. Wajid, C. Cappiello, P. Plebani, B. Pernici, N. Mehandjiev, M. Vitali, M. Gienger, K. Kavoussanakis, D. Margery, D. G. Perez, and P. Sampaio, “On Achieving Energy Efficiency and Reducing CO 2 Footprint in Cloud Computing,” vol. 7161, no. c, 2015.
[8] Y. Xie, H. Wen, B. Wu, Y. Jiang, and J. Meng, “Transactions on Cloud Computing,” vol. 13, no. 9, 2015.
[9] D. Ardagna, G. Casale, M. Ciavotta, J. F. Pérez, and W. Wang, “Quality-of-service in cloud computing : modeling techniques and their applications,” pp. 1–17, 2014.
[10] M. Armbrust, I. Stoica, M. Zaharia, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, and A. Rabkin, “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, p. 50, 2010.
[11] S. Saha, S. Pal, and P. K. Pattnaik, “A Novel Scheduling Algorithm for Cloud Computing Environment,” vol. 1, 2016.
[12] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.8-14, 2016
[13] Poonam R. Wagh, Amol D. Potgantwar, "Providing Security to Data Stored on HDFS Using Security Protocol", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.20-25, 2017.
[14] K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015.
[15] F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.
[16] X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data Access Control for Multiauthority Cloud Storage Systems,” pp. 1–14, 2015.
[17] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[18] V. Biksham, “Query based computations on encrypted data through homomorphic encryption in cloud computing security,” pp. 3820–3825, 2016.
[19] G. A. Prajapati, S. S. Satav, S. Dahiphale, S. More, and P. N. Bogiri, “Cloud Computing Security : From Single to Multi-Clouds using digital signature,” vol. 2, no. 6, pp. 204–213, 2014.
[20] M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell, and E. Dubois, “Security transparency : the next frontier for security research in the cloud,” J. Cloud Comput., 2015.
[21] B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu, T. Qiu, and S. Member, “An Efficient Protocol with Bidirectional Verification for Storage,” vol. 3536, no. c, pp. 1–13, 2016.
[22] A. Bhandari, “Secure Algorithm for Cloud Computing and Its Applications,” pp. 188–192, 2016.
[23] J. I. A. You, Z. Zhong, G. Wang, B. O. Ai, and S. Member, “Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors,” vol. 2, 2014.
[24] R. Chen, Y. Mu, G. Yang, and F. Guo, “BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication,” IEEE Trans. Inf. Forensics Secur., vol. 10, no. 12, pp. 2643–2652, Dec. 2015.
[25] N. Hesabian, H. Haj, and S. Javadi, “Optimal Scheduling In Cloud Computing Environment Using the Bee Algorithm,” vol. 3, no. 6, pp. 253–258, 2015.
[26] K. Saranya and A. Professor-i, “Modern Applications of QR-Code for Security,” no. March, pp. 1–5, 2016.
[27] O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R. Obiedat, M. M. Abu-Faraj, and H. Faris, “Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review,” Commun. Netw., vol. 06, no. 01, pp. 15–21, 2014.
Citation
Mehak Gandhi, Kiranbir Kaur, "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.263-268, 2018.
A Study on Distributed Computing Framework: Hadoop, Spark and Storm
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.269-274, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.269274
Abstract
The storage and management ............... that show promising results.
Key-Words / Index Term
Distributed framework, distributed computing
References
[1]. Vairaprakash Gurusamy, S.Kannan, K.Nandhini, “ The [2]. Vairaprakash Gurusamy, K.Nandhini, “Ibis: The New Era for Distributed Computing”, International Journal of Engineering Sciences and Research Technology (IJESRT), ISSN: 2277-9655, Volume 7, Issue 1, DOI: 10.5281/zenodo.1135392
Citation
Vairaprakash Gurusamy, S. Kannan, K. Nandhini, "A Study on Distributed Computing Framework: Hadoop, Spark and Storm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.269-274, 2018.
Capture Me:Identifying and Characterizing Photo Screenshot Privacy in Social Media Apps
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.275-281, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.275281
Abstract
Social networking apps offer a straightforward way for people to have a simple social presence through web. They provide a virtual environment for people to share each and every activity, their interests, and their circle of acquaintance with their family, friends, or even the unknown. With so much sharing, hackers, attackers, kidnappers and thieves have found very easy ways to steal personal information through these networking apps. In this paper, we will discuss a main and security breach and its respective prevention techniques. In this paper we propose an application for secure exchange of photos and profile safety between users. This architecture improves the customization of profiles.
Key-Words / Index Term
Social Apps, Android Apps,Prevention,Security Breach,Profile,Photographs
References
[1] Ankit Tuteja, `5 New WhatsApp, Facebook, Twitter, Instagram, Snapchat Features You Should Know About`,2016. [Online].Available:http://www.news18.com/news/tech/whatsapp-to-instagram-5-new-features-in-5-popular-apps-1268720.html [Accessed: 10- Dec- 2017].
[2] Kurt Wagner,Rani Mallo, ` It’s getting harder and harder to tell Instagram, Facebook, Snapchat and Twitter apart`, 2017. [Online].Available:https://www.recode.net/2017/4/4/15168010/social-media-facebook-instagram-snapchat-twitter-live-stories-apps-copying [Accessed: 5- Dec- 2017].
[3] http://www.trai.gov.in/sites/default/files/OTT-CP-27032015.pdf
[4] Abhishek Kumar , Subham Kumar Gupta , Animesh Kumar Rai , Sapna Sinha (2013,April). “Social Networking Sites and Their Security Issues” International Journal of Scientific and Research Publications. [Online]. 3. (4). Available: http://www.ijsrp.org/research-paper-0413/ijsrp-p1666.pdf [Accessed: 5- Nov- 2017]
[5]Jeff Dunn, `Here`s How Slowly Twitter Has Grown Compared To Facebook, Instagram, And Snapchat `, 2017. [Online]. Available: https://www.businessinsider.in/heres-how-slowly-twitter-has-grown-compared-to-facebook-instagram-and-snapchat/articleshow/57090718.cms [Accessed: 15-Nov- 2017].
[6] https://its.ucsc.edu/security/breaches.html
[7] http://experis.us/Website-File-Pile/Whitepapers/Experis/experis_security_breaches_white_paper_may_2014.pdf
Citation
Deepali Virmani, Nikita Jain,Priya Bhasin,Devansh Chopra, "Capture Me:Identifying and Characterizing Photo Screenshot Privacy in Social Media Apps," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.275-281, 2018.
Arcus Cloud: A Private Cloud Establishment
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.283-291, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.283291
Abstract
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources like networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction. “Arcus Cloud” aims at establishing a private cloud that works on high speed LAN and enhances the cost efficiency pertaining to the resource requirement of an organization. Arcus Cloud provides a platform for the allocation of various resources such as storage, processor, hardware and software resources via Virtualization. LAN being the most common medium of connectivity across any organization, Arcus Cloud shall prove to be a distinct example that portrays the simplicity of establishing a Private Cloud that efficiently handles resource allocation. Arcus Cloud aims at providing on – demand services with greater flexibility, reliability, elasticity and scalability. The project aims at providing a user friendly interface for accessing various services provided by the platform, namely Arcus Cloud. Configuring and managing authentication server that ensures privacy and security of its end users is the first priority. It also gives a brief idea about the concepts of Load Balancing and Live Migration which can constitute the future modules of this project. Basically Arcus Cloud will prove to be an exceptional example at describing how efficiently a Private Cloud can be established and this Private Cloud will be highly scalable thus easy to expand as per the user requirements.
Key-Words / Index Term
Cloud Computing, Arcus Cloud, Private Cloud, PaaS, Hypervisor, Virtualization, Virtual Machines, Authentication Server, Load Balancing, Live Migration
References
[1] Carneige Mellon, Grace Lewis (2010) “Basics About Cloud Computing” Software Engineering Institute September Issue
[2] Cary Landis, Dan Blacharski, “Cloud Computing Made Easy”, Version 0.3
[3] Kamyab Khajehei, “Role Of Virtualization In Cloud Computing”, (IJARC) International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Issue 4, April 2014.
[4] Naveed Alam, “Survey On Hypervisors”, School of Informatics and Computing, Indiana University, Bloomington.
[5] Yogesh Bharadwaj, Dr. Manju Kaushik, “A Review Paper on Virtualization and Security in Cloud Computing”, (IJARC) International Journal of Advance Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
[6] Sarfraz Nawaz Brohi, Mervat Adib Bamiah “Exploit of Open Source Hypervisors for Managing the Virtual Machines on Cloud” (IJAEST) International Journal of Advanced Engineering Science and Technologies, Volume 9, Issue No. 1,055-060.
[7] Prachi Soni, Monali Sahoo, “Multi-factor Authentication Security Framework in Cloud Computing”, (IJARC) International Journal of Advance Research in Computer Science and Software Engineering, Volume 5, Issue 1, January 2015.
[8] Qi Zhang, Lu Cheng, Raouf Boutaba, “Cloud computing: state-of-the-art and research challenges” The Brazilian Computer Society 2010, Received: 8 January 2010 / Accepted: 25 February 2010 / Published online: 20 April 2010.
[9] Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo, “Cloud Computing Research and Development Trend”, 2010 Second International Conference on Future Networks.
[10] NIST Definition of Cloud Computing v15.
[11] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia, “A View of Cloud Computing”, communications of the acm | april 2010 | vol. 53 | no. 4.
Citation
Vishva Patel, Dhara Patel, Sunit Parmar, "Arcus Cloud: A Private Cloud Establishment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.283-291, 2018.
Prediction Model for Diabetes Mellitus Using Machine Learning Techniques
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.292-296, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.292296
Abstract
In today’s world diabetes is the major health challenges in India. It is a group of a syndrome that results in too much sugar in the blood. It is a protracted condition that affects the way the body mechanizes the blood sugar. Prevention and prediction of diabetes mellitus is increasingly gaining interest in medical sciences. The aim is how to predict at an early stage of diabetes using different machine learning techniques. In this paper basically, we use well-known classification that are Decision tree, K- Nearest Neighbors, Support Vector Machine, and Random forest. These classification techniques used with Pima Indians diabetes dataset. Therefore, we predict diabetes at different stage and analyze the performance of different classification techniques. We Also proposed a conceptual model for the prediction of diabetes mellitus using different machine learning techniques. In this paper we also compare the accuracy of the different machine learning techniques to finding the diabetes mellitus at early stage.
Key-Words / Index Term
Diabetes; Decision Tree, K-Nearest Neighbors, Machine Learning, Random Forest, Support Vector Machine.
References
[1] International Diabetes federation. Diabetic Atlas Fifth Edition 2011.
[2] American Diabetes Association. Diagnosis and classification of diabetes mellitus. Diabetes Care 2009;32(Suppl. 1): S62–7.
[3] Krentz AJ, Bailey CJ. Oral antidiabetic agents: current role in type 2 diabetes mellitus. Drugs 2005;65(3):385–411.
[4] Tsave O, Halevas E, Yavropoulou MP, Kosmidis Papadimitriou A, Yovos JG, Hatzidimitriou A, et al. Structure-specific adipogenic capacity of novel, welldefined ternary Zn(II)-Schiff base materials. Biomolecular correlations in zincinduced differentiation of 3T3-L1 pre-adipocytes to adipocytes. J Inorg Biochem Nov 2015; 152:123–37.
[5] Halevas E, Tsave O, Yavropoulou MP, Hatzidimitriou A, Yovos JG, Psycharis V, et al. Design, synthesis and characterization of novel binary V(V)-Schiff base materials linked with insulin-mimetic vanadium-induced differentiation of 3T3-L1 fibroblasts to adipocytes. Structure–function correlations at the molecular level. J Inorg Biochem Jun 2015; 147:99–115.
[6] Tsave O, Yavropoulou MP, Kafantari M, Gabriel C, Yovos JG, Salifoglou A. The adipogenic potential of Cr(III). A molecular approach exemplifying metalinduced enhancement of insulin mimesis in diabetes mellitus II. J Inorg Biochem Oct 2016; 163:323–31.
[7] Sakurai H, Kojima Y, Yoshikawa Y, Kawabe K, Yasui H. Antidiabetic vanadium(IV) and zinc(II) complexes review article coordination. Chem Rev March 2002; 226(1–2):187–98.
[8] Nongyao Nai-arun, Rungruttikarn Moungmai(2015)Comparison of classifiers for the risk of diabetes ELSEVIER Procedia Computer Science 69 (2015) 132-142.
[9] Pima Indian diabetes datasets from UCI Repository.
[10] Çalisir D, Dogantekin E. An automatic diabetes diagnosis system based on LDA Wavelet Support Vector Machine Classifier. Expert Syst Appl 2011;38(7):8311–5.
[11] Ganji MF, Abadeh MS. A fuzzy classification system based on ant colony optimization for diabetes disease diagnosis. Expert Syst Appl 2011;38(12):14650–9.
[12] Georga EI, Protopappas VC, Ardigò D, Marina M, Zavaroni I, Polyzos D, et al. Multivariate prediction of subcutaneous glucose concentration in type 1 diabetes patients based on support vector regression. IEEE J Biomed Health Inform 2013; (1):71–81.
[13] Agarwal V, Podchiyska T, Banda JM, Goel V, Leung TI, Minty EP, et al. Learning statistical models of phenotypes using noisy labeled training data. J Am Med Inform Assoc May 12, 2016.
[14] El-Sappagh S, Elmogy M, Riad AM. A fuzzy-ontology-oriented case-based reasoning framework for semantic diabetes diagnosis. Artif Intell Med Nov 2015;65(3):179208.
[15] Chin-Yuan Fan, Pei-Chann Chang, Jyun-Jie Lin, J.C. Hsieh. A Hybrid model combining Case-based reasoning and Fuzzy Decision Tree for Medical Data Classification. Applied Soft Computing; 2011; 11(1); pp.632–644.
[16] Nihat Yilmaz, Onur Inan, Mustafa Serter Uzer. A New Data Preparation Method Based on Clustering Algorithms for Diagnosis Systems of Heart and Diabetes Diseases. Springer: Transaction Processing Systems:J Med Syst; April 2014;38:48.
[17] Yuan R, Guangchen B. Determination of Optimal SVM Parameters by Using Genetic Algorithm/Particle Swarm Optimization. Journal of Computers; 2010; No.5;1160-1169.
[18] Patil B M, Joshi R C, Toshniwal D. Impact of K-Means on the performance of classifiers for labeled data. Comm. Com. Inf. Sc.94;2010; 423-434.
[19] Aishwarya S, Anto S. A Medical Decision Support System based on Genetic Algorithm and Least Square Support Vector Machine for Diabetes Disease Diagnosis. International Journal of Engineering Sciences & Research Technology; April2014; 3(4).
[20] OhW, KimE, CastroMR, Caraballo PJ, Kumar V, Steinbach MS, et al. Type 2 diabetes mellitus trajectories and associated risks. Big Data Mar 1 2016;4(1):25–30.
[21] Ioannis Kavakiotis, Olga Tsave, Athanasios Salifoglou, Nicos Maglaveras, Ioannis Vlahavas, Ioanna Chouvarda Machine learning and datamining methods in diabetes research ELSEVIER Computational and Structural Biotechnology journal 15(2017) 104-116.
[22] J. Pradeep Kandhasamy, S. Balamurali(2015) Performance analysis of classifier models to predict diabetes mellitus ELSEVIER Procedia Computer Science 47 (2015) 45-5.
[23] N. Radha and S. Ramya “Performance Analysis of Machine Learning Algorithms for Predicting Chronic Kidney Disease”, International Journal of Computer Sciences and Engineering Vol.-3, Issue -8, pp(72-76) Aug 2015 E-ISSN: 2347-2693.
Citation
N.A. Farooqui, Ritika, A. Tyagi, "Prediction Model for Diabetes Mellitus Using Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.292-296, 2018.
Threats and Vulnerabilities of Cloud Computing: A Review
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.297-302, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.297302
Abstract
Cloud computing is a new frontier in computing technologies. It is well known for its pay-per-use model for billing customers and providing other features like elasticity, ubiquity, scalability, and availability of resources for businesses. Cloud computing provides delivery models like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS) which can be utilized by various organizations to solve their data storage and processing needs. From recent surveys conducted by well known reputed cloud providers, it is apparent that more and more organizations and enterprises are moving their workloads to cloud. The top concern among the organizations to move their workloads or processes to cloud is security. Even though the security measures provided in cloud computing are evolving over the years, it still remains as a major challenge or obstacle. This paper provides an overview of numerous threats and vulnerabilities of cloud computing which can act as a guide to decision makers in organizations to evaluate the security in clouds.
Key-Words / Index Term
Cloud Computing, Cloud Security, Cloud Threats, Cloud Vulnerabilities
References
[1] K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez, "An analysis of security issues for cloud computing," J. Internet Serv. Appl., vol. 4, no. 1, p. 5, 2013.
[2] P. S. Suryateja, "A Comparative Analysis of Cloud Simulators," Int. J. Mod. Educ. Comput. Sci., vol. 8, no. 4, pp. 64–71, 2016.
[3] Tripwire Top Cloud Security Threats - https://www.tripwire.com/state-of-security/security-data-protection/cloud/top-cloud-security-threats/ (last accessed on Mar, 2018)
[4] CSOonline Top Cloud Security Threats 2018 - https://www.csoonline.com/article/3043030/security/12-top-cloud-security-threats-for-2018.html (last accessed on Mar, 2018)
[5] Comparethecloud 8 Public Cloud Security Threats - https://www.comparethecloud.net/articles/8-public-cloud-security-threats-to-enterprises-in-2017/ (last accessed on Mar, 2018)
[6] Tierpoint Top 5 Cloud Data Security Threats - https://www.tierpoint.com/top-5-cloud-data-security-threats-in-2018/ (last accessed on Mar, 2018)
[7] Techtarget Five Cloud Security Threats to Combat in 2018 - http://searchcloudcomputing.techtarget.com/tip/Five-cloud-security-threats-to-combat-in-2018 (last accessed on Mar, 2018)
[8] R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013
[9] S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013
[10] N. Khan and A. Al-yasiri, "Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework," Procedia - Procedia Comput. Sci., vol. 94, pp. 485–490, 2016.
[11] G. Somani, M. Singh, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing : Issues , taxonomy , and future directions," Comput. Commun., vol. 107, pp. 30–48, 2017.
[12] B. Varghese and R. Buyya, "Next Generation Cloud Computing: New Trends and Research Directions," vol. 2017, no. September, pp. 1–22, 2017.
[13] B.SriVarsha, P.S.Suryateja, "Using Advanced Encryption Standard for Secure and Scalable Sharing of personal Health Records in Cloud," International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5(6), 7745-7747, 2014.
Citation
P.S. Suryateja, "Threats and Vulnerabilities of Cloud Computing: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.297-302, 2018.
A Secure Cloud Environment
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.303-315, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.303315
Abstract
Cloud Computing has been a one-key, cost-effective solution for many small I.T industries from past few decades in terms of storage, computation etc. It provides different kinds of services and infrastructural support. While cloud makes these services more appealing, it also brings some critical security threats to the cloud service users as well as to the cloud service providers. In this paper authors have tried to identify major security threats faced by different models of cloud in current day scenario and providing with some suitable solutions addressing those threats like One-time password, Homomorphic encryption technique, Access control and Data Recovery mechanism in different cloud deployment models.
Key-Words / Index Term
Third Party Auditor, One-time password, Homomorphic encryption technique, Access control and Data Recovery mechanism, Cloud Service User (CSU), Cloud Service Provider(CSP).
References
[1] P. Mell, T. Grance, NIST definition of cloud computing. National Institute of Standards and Technology, October 2009
[2] GTSI Group, “Cloud Computing - Building a Framework for Successful Transition,” White Paper, GTSI Corporation, 2009.
[3] Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program “Architectural Implications of Cloud Computing”, May 18, 2011
[4] Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and Challenges’, IDC eXchange, viewed 18 February 2010, from
[5] ISO. ISO 7498-2:1989. Information processing systems- Open Systems Interconnection. ISO 7498-2
[6] Dlamini M T, Eloff M M and Eloff J H P, ‘Internet of People, Things and Services – The Convergence of Security, Trust and Privacy’, 2009
[7] Md.TanzimKhorshed,A.B.M.ShawkatAli,SalehA.Wasimi,“Asurveyongaps,threatremediationchallengesandsomethoughtsforproactive attack detection in cloud computing”, School of Information and Communication Technology, CQ University QLD4702, Australia
[8] Cong Wang, Qian Wang, and Kui Ren Wenjing Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM 2010
[9] Xiaojun Yu, Qiaoyan Wen, “A View About Cloud Data Security From Data Life Cycle”, IEEE ,2010
[10] Uma Somani, Kanika Lakhani, Manish Mundra , “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing” ,2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010),IEEE
[11] P. Syam Kumar, R. Subramanian and D. Thamizh Selvam, “Ensuring Data Storage Security in Cloud Computing using Sobol Sequence”, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC – 2010) ,IEEE.
[12] Xi Cao, Li Xu, Yuexin Zhang and Wei Wu, “Identity-based Proxy Signature for Cloud Service in SaaS”, Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012,IEEE
[13] Junli Zhu, and Qiaoyan Wen, “SaaS Access Control Research Based on UCON”, Fourth International Conference on Digital Home, 2012,IEEE
[14] Kiyoshi Nishikawa, Kenji Oki and Akihiko Matsuo, “SaaS Application Framework using Information Gateway Enabling Cloud Service with Data Confidentiality”, 19th Asia-Pacific Software Engineering Conference,IEEE, 2012.
[15] Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala,peng Ning. “Managing Security of virtual machine images in a cloud environment.” CCSW’09: Proceedings of the 2009 ACM workshop on Cloud computing security, November 2009, pp 91-96.
[16] Miranda Mowbray, Siani Pearson “A Client –based privacy Manager for Cloud Computing”. OMSWARE `09: Proceedings of the Fourth International ICST Conference on communication system software and middle ware, June 2009 ACM.
[17] Flavio Lombardi, Roberto Di Pietro. “Transparent Security for Cloud”. SAC `10: Proceedings of the 2010 ACM Symposium on Applied Computing, March 2010, pp 414-415.
[18] S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013
[19] Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal, “A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security”, Annals of Faculty Engineering Hunedoara International Journal of Engineering (Archived copy), scheduled for publication in vol. 10, issue 1, January 2012. ISSN: 1584-2665.
[20] "IBM`s homomorphic encryption could revolutionize security" was originally published at InfoWorld.com.
[21] Pabak Indu, Souvik Bhattacharyya and Gautam Sanyal,“Different Aspects in Cloud Computing: A Comprehensive Review” Elixir Inform. Tech. 71 (2014) 24594-24602,June 2014.
Citation
P. Indu, S. Bhattachryya, "A Secure Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.303-315, 2018.
Frequent Itemset Mining: A Metadata Based Approach for Knowledge Discovery
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.316-320, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.316320
Abstract
Frequent sets play a crucial role in many Data Mining tasks that try to find interesting patterns from databases, such as correlations, association rules, classification and clustering. The Association Rules is one of the most used functions in data mining. The method is used both database researchers and data mining users. In this article, association rule mining algorithms are discussed and demonstrated. Mining Associate rule algorithm that search for approximate strong association rules from multimedia databases. The Apriori-like sequential pattern mining approach based on candidate generates-and test can also be explored by mapping a sequence multimedia database into vertical data format. This approach is useful to finding frequent itemsets, which probabilistic frequent itemsets based on possible datasets.
Key-Words / Index Term
Web Multimedia Mining, Association rule, Frequent itemsets, Knowledge discovery
References
[1] Agrawal, R., Imielinski, T., Swami, “A.: Mining association rules between sets of items in large databases”,
[2] Acm SIGKDD Explorations Newsletter, Volume 22, Issue 2, June 1993, ISBN: 0-89791-592-5.
[3] Bart Goethals, Mohammed J. Zaki, “Advances in Frequent Itemset Mining Implementations Report on FIMI’03”, ACM SIGKDD Explorations Newsletter, Volume 6, Issue 1, June 2004, ISSN: 1931-0145.
[4] Michael Hahsler, Bettina Grun and Kurt Hornik, “arules – A Computational Environment for Mining Association Rules and Frequent Item Sets”, Journal of Statistical Software, Volume 14, Issue 15,October 2005,.
[5] ChenGang “MediaInfo extractor – A Tool for Media Data Mining”, 2011. http://mediaarea.net/en/MediaInfo.
[6] Jyothsna R. Nayak and Diane J. Cook, “Approximate Association Rule Mining”, FLAIRS-01 Proceedings. 2001, AAAI (www.aaai.org).
[7] Syed Khairuzzaman Tanbeer , Chowdhury , Farhan Ahmed and Byeong-Soo Jeong , “Parallel and Distributed Algorithms for FP mining in large Databases”, IETE Technical Review Vol 26, Issue 1 , pp 55-65, Jan 2009.
[8] Pradeep Chouksey* Juhi Singh, R.S. Thakur and R.C. Jain, “Frequent Pattern Mining using Candidate Generation approach with Single Scan of Database”, Symposium on Progress in Information & Communication Technology 2009
[9] Ms. Manali Rajeev Raut, Ms. Hemlata Dakhore, “Association Rule Mining in Horizontally Distributed Databases”, Manali Rajeev Raut et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7540-7544
[10] Zhi Liu,Tianhong Sunand Guoming Sang," An Algorithm of Association Rules Mining in Large Databases Based on Sampling ", International Journal of Database Theory and Application Vol.6, No.6 , 2013.
[11] Renáta Iváncsy, István Vajk’, “Frequent Pattern Mining in Web Log Data”, Acta Polytechnica Hungarica Vol. 3, No. 1, 2006.
[12] S. M. Fakhrahmad1 And Gh. Dastghaibyfard2, “An Efficient Frequent Pattern Mining Method and its Parallelization in Transactional Databases”, Journal Of Information Science And Engineering 27, 511-525 (2011).
[13] Siddu P. Algur1, Basavaraj A. Goudannavar2*,“Web Multimedia Mining: Metadata Based Classification and Analysis of Web Multimedia”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) November-2015, pp. 324-330 ISSN: 2277-128X
Citation
Basavaraj A. Goudannavar, Prashant Bhat, "Frequent Itemset Mining: A Metadata Based Approach for Knowledge Discovery," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.316-320, 2018.
A Comparative Study of Containers for Live Migration in Cloud Computing Environment
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.321-326, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.321326
Abstract
Cloud computing, a modern world technology ensures that the resources are efficiently utilized, provisioned and are available all the time. When one virtual machine is running on one host and then urge rises to migrate that Virtual Machine to some other host on the same or different network; then live migration of Virtual Machines comes into the picture. In the simple live migration of processes, applications or virtual machines, process as well as operating system, on which the machine is operating needs to be migrated. But with the introduction of containers in the cloud computing, migration process becomes easy and less complex. Now, only the process or the virtual machine is only migrated to another host, regardless of the underlying operating system. Containers had made migration process easy because they contain inbuilt operating system in them. In this paper, we are going to review different containers that are used in the live migration of virtual machines.
Key-Words / Index Term
Cloud Computing, Containers, High-Performance Computing, Live Migration, Virtualization
References
[1] C. Computing and I. Dublin, “Inter-Cloud application migration and portability using Linux containers for better resource provisioning and interoperability Ivin polo sony,” no. September 2015.
[2] R. Buyya, “Market-oriented cloud computing: Vision, hype, and the reality of delivering computing as the 5th utility,” 2009 9th IEEE/ACM Int. Symp. Clust. Comput. Grid, CCGRID 2009, vol. 25, no. 6, p. 1, 2009.
[3] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, “Xen and the art of virtualization,” Proc. Ninet. ACM Symp. Oper. Syst. Princ. - SOSP ’03, p. 164, 2003.
[4] R. Dua, A. R. Raja, and D. Kakadia, “Virtualization vs containerization to support PaaS,” Proc. - 2014 IEEE Int. Conf. Cloud Eng. IC2E 2014, pp. 610–614, 2014.
[5] O. Laadan and J. Nieh, “Operating system virtualization,” Proc. 3rd Annu. Haifa Exp. Syst. Conf. - SYSTOR ’10, p. 1, 2010.
[6] S. Osman, D. Subhraveti, G. Su, and J. Nieh, “The design and implementation of Zap: a system for migrating computing environments,” SIGOPS Oper. Syst. Rev., vol. 36, no. SI, pp. 361–376, 2002.
[7] M. G. Xavier, M. V. Neves, F. D. Rossi, T. C. Ferreto, T. Lange, and C. A. F. De Rose, “Performance Evaluation of Container-Based Virtualization for High-Performance Computing Environments,” 2013 21st Euromicro Int. Conf. Parallel, Distrib. Network-Based Process., pp. 233–240, 2013.
[8] F. Romero and T. J. Hacker, “Live migration of parallel applications with OpenVZ,” Proc. - 25th IEEE Int. Conf. Adv. Inf. Netw. Appl. Work. WAINA 2011, pp. 526–531, 2011.
[9] S. Nadgowda, S. Suneja, N. Bila, and C. Isci, “Voyager: Complete Container State Migration,” Proc. - Int. Conf. Distrib. Comput. Syst., no. Section III, pp. 2137–2142, 2017.
[10] A. Mirkin, A. Kuznetsov, and K. Kolyshkin, “Containers checkpointing and live migration,” 2008 Linux Symp., pp. 1–8, 2008.
[11] L. Zhang, J. Litton, F. Cangialosi, T. Benson, D. Levin, and A. Mislove, “Picocenter,” Proc. Elev. Eur. Conf. Comput. Syst. - EuroSys ’16, no. Llmi, pp. 1–16, 2016.
Citation
Anmol Bhandari, Kiranbir Kaur, "A Comparative Study of Containers for Live Migration in Cloud Computing Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.321-326, 2018.