Analysis of Two Phase Scheduling within Distributed System for Enhancement of Make span and Flow time
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.278-282, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.278282
Abstract
Job scheduling is state of the art problem in advanced computing system. To tackle the issue of larger Make span and Flow time, several techniques are being researched over. This paper works toward secretion of job scheduling policy where Burst time is considered for arranging the jobs in clusters. Proposed system is categorised into two phases: first phase arranges the jobs by following shortest job first scheduling. The queue thus formed is presented to round robin scheduler with time quantum that varies depending upon the burst time of job. Jobs arranged are arranged in batches of 10% of total jobs in queue. SJF scheduler considered is non primitive where RRS scheduler is primitive. Second phase executes the jobs by looking at the resource clusters. Multi-source shortest path dynamic algorithm is used for selection of job that can be assigned to the resource cluster. Once job execution is complete credits are assigned which will be from 0-10. Higher the credit more proficient is the result. Optimal result is obtained by the application of proposed system in terms of Make span and flow time. Simulation is conducted in MATLAB showing improvement of 6% in overall result.
Key-Words / Index Term
Job Scheduling, SJF, RRS, PBS, Multi source shortest path
References
[1]. Armbrust, M. et al., 2010. A view of cloud computing. Communications of the ACM, 53(4), p.50. Available at: http://portal.acm.org/citation.cfm?doid=1721654.1721672.
[2]. Barbosa, J. & Monteiro, A.P., 2008. A list scheduling algorithm for scheduling multi-user jobs on clusters. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5336 LNCS, pp.123–136.
[3]. Depoorter, W., Vanmechelen, K. & Broeckhove, J., 2014. Advance reservation , co-allocation and pricing of network and computational resources in grids. Future Generation Computer Systems, 41, pp.1–15. Available at: http://dx.doi.org/10.1016/j.future.2014.07.004.
[4]. Elghirani, A. et al., 2008. Performance enhancement through hybrid replication and genetic algorithm co-scheduling in data grids. AICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications, pp.436–443.
[5]. Horng, S.C. & Lin, S.S., 2015. Integrating Ant Colony System and Ordinal Optimization for Solving Stochastic Job Shop Scheduling Problem. Proceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS, 2015-Octob, pp.70–75.
[6]. Kaur, M., Sharma, S. & Kaur, R., 2014. Optimization of Job Scheduling in Cloud Computing Environment. International Journal of Advanced Research in Computer Science and Software Engineering, 4(7), pp.2277–128.
[7]. Kliazovich, D., Bouvry, P. & Khan, S.U., 2013. DENS: Data center energy-efficient network-aware scheduling. Cluster Computing, 16(1), pp.65–75.
[8]. Li, B. et al., 2014. Resource availability-aware advance reservation for parallel jobs with deadlines. , pp.798–819.
[9]. Mirashe, S.P. & Kalyankar, N. V, 2010. Cloud Computing N. Antonopoulos & L. Gillam, eds. Communications of the ACM, 51(7), p.9. Available at: http://arxiv.org/abs/1003.4074.
[10]. Rajvir Kaur, S.K., 2014. Analysis of Job Scheduling Algorithms in Cloud Computing. International Journal of Computer Trends and Technology (IJCTT), 2(March), pp.12–22.
[11]. Ranganathan, K., Iamnitchi, A. & Foster, I., 2002. Improving data availability through dynamic model-driven replication in large peer-to-peer communities. 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2002, pp.0–5.
[12]. Rodger, J.A., 2016. Informatics in Medicine Unlocked Discovery of medical Big Data analytics : Improving the prediction of traumatic brain injury survival rates by data mining Patient Informatics Processing Software Hybrid Hadoop Hive. Informatics in Medicine Unlocked, 1(2015), pp.17–26. Available at: http://dx.doi.org/10.1016/j.imu.2016.01.002.
[13]. Singh, D., Singh, J. & Chhabra, A., 2012. High availability of clouds: Failover strategies for cloud computing using integrated checkpointing algorithms. Proceedings - International Conference on Communication Systems and Network Technologies, CSNT 2012, pp.698–703.
[14]. Suri, P.K. & Rani, S., 2017. Design of Task Scheduling Model for Cloud Applications in Multi Cloud Environment. , 2, pp.11–24.
[15]. Switalski, P. & Seredynski, F., 2014. Scheduling parallel batch jobs in grids with evolutionary metaheuristics. Journal of Scheduling, 18(4), pp.345–357. Available at: http://dx.doi.org/10.1007/s10951-014-0382-0.
[16]. Xhafa, F. et al., 2011. A GA+TS hybrid algorithm for independent batch scheduling in computational grids. Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011, pp.229–235.
[17]. Yousif, A., Abdullah, A.H. & Nor, S.M., 2011. SCHEDULING JOBS ON GRID COMPUTING USING. IEEE Access, 33(2), pp.155–164.
Citation
Jasjit Singh, Anil Kumar, "Analysis of Two Phase Scheduling within Distributed System for Enhancement of Make span and Flow time," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.278-282, 2018.
Identification and Translation of Idiomatic Sentence from Hindi to English
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.283-287, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.283287
Abstract
This investigation is designed to shed light on identification and translation of idiomatic expression from Hindi to English language. The main problem encountered in idiomatic translation was investigated. Identification of idiom is utmost important resource for machine translation system and research. Machine translation system has been developed for many languages such as we have google translator, Bing translator etc. But they are failed to provide the correct translation of sentences containing idioms. The idiom parallel corpus was manually created to test the generated resource. The sentences containing idioms are translated with google translate system and noticed that it does not provide figurative meaning [1] which makes the translation of idioms rather difficult than any text translation. They are the real challenge for machine translation from the preliminary stage of machine translation development. A lot of research has been done for extraction and translation of text in many languages, but no significant research has been captured in Hindi to English idiom translation. In this paper we have given a rule based approach for the identification and translation of idiom using machine translation. The aim of a proper idiom translation is achieving equivalent sense and provide figurative meaning, strategies, cultural aspects and effects. The output is evaluated manually for intelligibility and accuracy. Further This Hindi to English idiom translation system can be expanded for other language pairs to improve their translation by encapsulating correct idiom translation with their ordinary translation.
Key-Words / Index Term
Idioms, Idiom translation, Idiom identification, Machine translation, Hindi, English, Language
References
[1] D. Anastasiou, “Idiom Treatment Experiments in Machine Translation”, Cambridge Scholars Publishing, 2010.
[2] The Oxford companion to the English language (1992:495f.).
[3] M. Gaule & Josan, G. S., “Machine Translation of Idioms from English to Hindi”, International Journal Of Computational Engineering Research, 2(6), 2012.
[4] R. K. Chakrawarti, H. Mishra, & P. Bansal, “Review of Machine Translation Techniques for Idea of Hindi to English Idiom Translation”, International Journal of Computational Intelligence Research, 13(5), 1059-1071, 2017.
[5] F. Ciravegna, S. Harabagiu, “Recent Advances in Natural Language Processing”, IEEE magazine, computer.org/intelligent, 2013.
[6] H. Mishra, R. K. Chakrawarti & P. Bansal, “A New Approach for Hindi to English Translation”, International Journal on Computer Science and Engineering, Vol. 9 No.07, 0975-3397, Jul 2017.
[7] G. V. Garje & G. K. Kharate, “Survey of machine translation systems in India”, International Journal on Natural Language Computing (IJNLC) Vol, 2, 47-67, 2013.
[8] D. Brar & R. Kaur, “A Review of Transliteration system from English to Punjabi”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4 (7), 2277 128X, July 2014.
[9] V. Gupta, N. Joshi & I. Mathur, “Approach for Multiword Expressions and Recognition & Annotation in Urdu Corpora”, Image Information Processing (ICIIP), Fourth International Conference, 2017. IEEE 2017.
[10] V. Gupta, N. Joshi & I. Mathur, “Design & Development of Rule Based Inflectional and Derivational Urdu Stemmer ‘Usal’”, INBUSH-ERA-2015, 7-12, 2015. IEEE 2015.
[11] V. Gupta, N. Joshi & I. Mathur, “Rule Based Stemmer in Urdu”, Computer and Communication Technology (ICCCT), Fourth International Conference, 2013. IEEE 2013.
Citation
N. Thakre, V. Gupta, N. Joshi, "Identification and Translation of Idiomatic Sentence from Hindi to English," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.283-287, 2018.
Underwater Image Restoration Based on Illumination Normalization and Deblurring
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.288-296, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.288296
Abstract
The fundamental reason for submerged image handling is to enhance submerged image enhancement. The preparing of submerged image caught is essential in light of the fact that the nature of submerged images influence and these images drives some significant issues when contrasted with images from a clearer domain. Because of the presence of clean particles in the water, submerged images suffer from the backscattering impact. To overcome this drawback I propose the new method called illumination normalization and deblurring of underwater image restoration. In this paper propose, first estimate the illumination directions of underwater images and cope with the problem of illumination normalization. Secondly deblurring of the underwater image using deconvolution algorithm and finally by the fusing both the results the restored image is acquired.The quality of the enhanced image is evaluated by using the metric is called blind/reference less image spatial quality evaluator (BRISQUE).
Key-Words / Index Term
Image Restoration, Illumination Direction, Illumination Normalization, Deblurring, Deconvolution
References
[1] Bidyut Saha, “A Comparative Analysis of Histogram Equalization Based Image Enhancement Technique for Brightness Preservation”, International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.3, pp.1-5, 2015.
[2] Hussam Elbehiery, “Optical Fiber Cables Networks Defects Detection using Thermal Images Enhancement Techniques”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.22- 29, 2018.
[3] J. Chiang, Y. Chen, “Underwater Image Enhancement by Wavelength Compensation and Dehazing,” IEEE Transaction on Image Processing, vol. 21, Issue.4, pp. 1756–1769, 2012.
[4] K. He., J. Sun, X. Tang, "Single Image Haze Removal Using Dark Channel Prior, "IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, Issue. 12, pp. 2341-2353, 2011.
[5] Adrian Galdran, David Pardo, ArtzaiPicón, and Aitor Alvarez-Gila, “Automatic Red-Channel underwater image restoration”, Science Direct, J. Vis. Commun. Image R. 26132–145, 2015.
[6] H. Wen, Y.Tian, T. Huang, W. Gao, “Single underwater image enhancement with a new optical model,” Proc. IEEE Int. Symp. Circ. & Syst. (ISCAS), pp. 753-756, 2013.
[7] Xinwei Zhao, Tao Jin, Song Qu, “Deriving inherent optical properties from background color and underwater image enhancement”, Lists available at Science Direct, Ocean Engineering 94163–172, 2015.
[8] R. Sathya, M. Bharathi, G. Dhivyasri, “Underwater Image Enhancement by Dark Channel Prior”, IEEE sponsored 2nd International Conference on Electronics and Communication System (ICECS), 2015.
[9] C.Y. Cheng, C.C. Sung, H.H. Chang, "Underwater image restoration by red-dark channel prior and point spread function deconvolution," IEEE International Conference on Signal and Image Processing Applications (ICSIPA), Kuala Lumpur, pp. 110-115, 2015.
[10] C. Ancuti, C.O. Ancuti, T. Haber, P. Bekaert, "Enhancing underwater images and videos by fusion, " IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, pp. 81- 88, 2012.
[11] N. Carlevaris-Bianco, A. Mohan, R.M. Eustice, “Initial results in underwater single image dehazing”, Proc. IEEE Oceans, pp. 1-8, 2010.
[12] HuiminLu, Seiichi Serikawa, “Underwater Scene Enhancement Using Weighted Guided Median Filter”, Marine Technology Society Journal, vol.42, Issue.1, pp.52-67, 2014.
[13] Yan-TsungPeng, Xiangyun Zhao, Pamela C. Cosman, “Single Underwater Image Enhancement Using Depth Estimation based on Blurriness”, IEEE International Conference on Image Processing (ICIP), pp.4952- 4956, 2015.
[14] X. Fu, P. Zhuang, Y. Huang, Y. Liao, X.P. Zhang, X. Ding, “A retinex-based enhancing approach for single underwater image”, in: IEEE Int. Conf. Image Process (ICIP), pp. 4572–4576, 2014.
[15] K. Seemakurthy, A.N. Rajagopalan, "Deskewing of Underwater Images, "IEEE Transactions on Image Processing, vol. 24, no. 3, pp.1046- 1059, 2015.
[16] Q. Zhu, J. Mai, L. Shao, "A Fast Single Image Haze Removal Algorithm Using Color Attenuation Prior, "IEEE Transactions on Image Processing, vol. 24, Issue. 11, pp. 3522-3533, 2015.
[17] Lei Fei and Wang Yingying, “The Research of Underwater Image De- noising Method Based on Adaptive Wavelet Transform”, IEEE Conference,pp.2521-2525, 2014.
Citation
I. Jeya Kumar, A. Lenin Fred, C. Seldev Christopher, "Underwater Image Restoration Based on Illumination Normalization and Deblurring," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.288-296, 2018.
H.264/AVC Video Steganography Techniques: An Overview
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.297-303, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.297303
Abstract
Video steganography is a process of embedding data inside in a raw or compressed video sequence. Nowadays compressed videos are preferred over raw videos for data transfer, and H.264/ AVC video format is the most frequently used video standard over the internet. H.264/AVC provides more compression as compared to the previous standards and maintains better visual quality. In H.264/ AVC video steganography the message hiding can be done by conventional methods such as spatial domain and transform domain techniques. Additionally, it has more hiding options as compared to the previous standards which are also utilized by researchers for secret data embedding. In this paper, a concise overview of H.264/ AVC video standard is given, and survey of existing video steganography techniques in H.264/ AVC is also done with the implementation of a 4-0-4 LSB technique to show the impact of embedding. The pros and cons of different hiding techniques used for data embedding in H.264/AVC video are discussed towards the end. This paper aims to provide a brief introduction of video steganography techniques in H.264/ AVC video coding standard.
Key-Words / Index Term
Video Steganography, H.264/AVC, Motion vector, Entropy Coding, DCT, Spatial domain, Transform domain
References
[1] H. A. V. C. C. Video, Y. Tew, and K. Wong, “An overview of information hiding in H. 264/AVC compressed video,” Circuits Syst. Video Technol. IEEE Trans., vol. 24, no. 2, pp. 305–319, 2014.
[2] I. E. Richardson, H. 264 and MPEG-4 video compression: video coding for next-generation multimedia. John Wiley & Sons, 2004.
[3] A. Neufeld and A. Ker, “A study of embedding operations and locations for steganography in H. 264 video,” IS&T/SPIE Electron. Imaging, 2013.
[4] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H. 264/AVC video coding standard,” IEEE Trans. circuits Syst. video Technol., vol. 13, no. 7, pp. 560–576, 2003.
[5] S. Nimje, A. Belkhede, G. Chaudari, A. Pawar, and K. Kharbikar, “Hiding existence of communication using image steganography,” Int. J. Comput. Sci. Eng., vol. 2, pp. 163–166, 2014.
[6] S. Suri, H. Joshi, V. Mincoha, and A. Tyagi, “Comparative analysis of steganography for coloured images,” Int. J. Comput. Sci. Eng., vol. 2, no. 4, pp. 180–184, 2014.
[7] M. Dalal and M. Juneja, “Video Steganography Techniques in Spatial Domain-A Survey,” in Proceedings of the International Conference on Computing and Communication Systems, Springer, Singapore, pp. 705–711, 2018.
[8] M. Dalal and M. Juneja, “A robust and imperceptible steganography technique for SD and HD videos,” Multimed. Tools Appl., pp. 1–21, 2018.
[9] A. K. Khan and H. Jamal, “The Intra prediction in H. 264,” Nov. Algorithms Tech. Telecommun. Autom. Ind. Electron., pp. 11–15, 2008.
[10] X. Ma, Z. Li, H. Tu, and B. Zhang, “A data hiding algorithm for h.264/AVC video streams without intra-frame distortion drift,” IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 10, pp. 1320–1330, 2010.
[11] E. Esen and A. A. Alatan, “Robust video data hiding using forbidden zone data hiding and selective embedding,” IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 8, pp. 1130–1138, 2011.
[12] Y. Liu, Z. Li, X. Ma, and J. Liu, “A robust data hiding algorithm for H.264/AVC video streams,” J. Syst. Softw., vol. 86, no. 8, pp. 2174–2183, 2013.
[13] Y. Liu, L. Ju, M. Hu, H. Zhao, S. Jia, and Z. Jia, “A new data hiding method for H.264 based on secret sharing,” Neurocomputing, vol. 188, pp. 113–119, 2016.
[14] A. Sur, S. V. M. Krishna, N. Sahu, and S. Rana, “Detection of motion vector based video steganography,” Multimed. Tools Appl., vol. 74, no. 23, pp. 10479–10494, 2015.
[15] Y. Yao, W. Zhang, N. Yu, and X. Zhao, “Defining embedding distortion for motion vector-based video steganography,” Multimed. Tools Appl., vol. 74, no. 24, pp. 11163–11186, 2015.
[16] H. Zhu, R. Wang, and D. Xu, “Information hiding algorithm for H. 264 based on the motion estimation of quarter-pixel,” in Future Computer and Communication (ICFCC), 2010 2nd International Conference on, vol. 1, pp. V1--423, 2010.
[17] W. Jue, Z. Min-qing, and S. Juan-li, “Video steganography using motion vector components,” in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, pp. 500–503, 2011.
[18] Y. Cao, H. Zhang, X. Zhao, and H. Yu, “Covert communication by compressed videos exploiting the uncertainty of motion estimation,” IEEE Commun. Lett., vol. 19, no. 2, pp. 203–206, 2015.
[19] N. Ke and Z. Weidong, “A video steganography scheme based on H. 264 bitstreams replaced,” in Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on, pp. 447–450, 2013.
[20] D. Xu, R. Wang, and Y. Q. Shi, “An improved scheme for data hiding in encrypted H.264/AVC videos,” J. Vis. Commun. Image Represent., vol. 36, pp. 229–242, 2016.
[21] P. C. Su, M. T. Lu, and C. Y. Wu, “A practical design of high-volume steganography in digital video files,” Multimed. Tools Appl., vol. 66, no. 2, pp. 247–266, 2013.
[22] D. Xu, R. Wang, and Y. Q. Shi, “Data hiding in encrypted H.264/AVC video streams by codeword substitution,” IEEE Trans. Inf. Forensics Secur., vol. 9, no. 4, pp. 596–606, 2014.
[23] Y. Yao, W. Zhang, and N. Yu, “Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams,” Signal Processing, vol. 128, pp. 531–545, 2016.
Citation
Mukesh Dalal, Mamta Juneja, "H.264/AVC Video Steganography Techniques: An Overview," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.297-303, 2018.
Improved Scheduling Procedure for Intensify Resource Utilization in Heterogeneous Cloud Environment
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.304-308, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.304308
Abstract
Resource allocation is critical to investigate the need for resources in substantially enhancing every day. To tackle this issue our proposed policy presents a new hybrid strategy known as the fittest job firefly algorithm(FJFFA) which sorts the jobs in the queue according to least cost and maximum profit. This queue is presented to firefly algorithm. Jobs are again sorted randomly and presented to firefly algorithm. The solution thus obtained from the algorithm is superior. Makespan and Flowtime obtained as a result is improved by 6%.
Key-Words / Index Term
FJFFA, Optimal job selection, least cost and maximum cost
References
[1] A. Juan et al., “OPTIMIS : A holistic approach to cloud service provisioning,” Futur. Gener. Comput. Syst., vol. 28, no. 1, pp. 66–77, 2012.
[2] Y. Chu, N. Huang, S. Member, and S. Lin, “Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery,” IEEE, vol. 8, no. 1, pp. 292–303, 2014.
[3] E. R. Gomes, Q. B. Vo, and R. Kowalczyk, “Pure exchange markets for resource sharing in federated clouds,” wileyonlinelibrary, pp. 977–991, 2012.
[4] H. Shen, S. Member, G. Liu, and S. Member, “An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing,” IEEE Trans., vol. 25, no. 4, pp. 862–875, 2014.
[5] A. Beloglazov and R. Buyya, “Managing Overloaded Hosts for Dynamic Consolidation of Virtual Machines in Cloud Data Centers Under Quality of Service Constraints,” IEEE Commun. Lett., vol. X, no. X, pp. 1–14, 2012.
[6] J. F. N. W. Lang, J.M. Patel, “On Energy Management, Load Balancing and Replication,” ACM SIGMOD Rec., pp. 35–42, 2009.
[7] J. So and N. H. Vaidya, “Load-balancing routing in multichannel hybrid wireless networks with single network interface,” IEEE Trans. Veh. Technol., vol. 56, no. 1, pp. 342–348, 2007.
[8] M. M. Alobaedy and K. R. Ku-Mahamud, “Scheduling jobs in computational grid using hybrid ACS and GA approach,” Proc. - 2014 IEEE Comput. Commun. IT Appl. Conf. ComComAp 2014, pp. 223–228, 2014.
[9] D. Paul and S. K. Aggarwal, “Multi-objective evolution based dynamic job scheduler in grid,” Proc. - 2014 8th Int. Conf. Complex, Intell. Softw. Intensive Syst. CISIS 2014, pp. 359–366, 2014.
[10] R. K. Jena, “Multi objective Task Scheduling in Cloud Environment Using Nested PSO Framework,” Procedia - Procedia Comput. Sci., vol. 57, pp. 1219–1227, 2015.
[11] M. Wang and W. Zeng, “A comparison of four popular heuristics for task scheduling problem in computational grid,” 2010 6th Int. Conf. Wirel. Commun. Netw. Mob. Comput. WiCOM 2010, pp. 3–6, 2010.
[12] C. R. Reeves, “A genetic algorithm for flowshop sequencing,” Comput. Oper. Res., vol. 22, no. 1, pp. 5–13, Jan. 1995.
[13] S. Saha, S. Pal, and P. K. Pattnaik, “A Novel Scheduling Algorithm for Cloud Computing Environment,” vol. 1, 2016.
[14] T. Keskinturk, M. B. Yildirim, and M. Barut, “An ant colony optimization algorithm for load balancing in parallel machines with sequence-dependent setup times,” Comput. Oper. Res., vol. 39, no. 6, pp. 1225–1235, 2012.
[15] L. Zuo, L. E. I. Shu, and S. Dong, “A Multi-Objective Optimization Scheduling Method Based on the Ant Colony Algorithm in Cloud Computing,” IEEE Access, vol. 3, 2015.
[16] N. Jain and K. Inderveer, “Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach,” J. Grid Comput., 2016.
[17] A. Khatami and S. H. A. Rahmati, “An efficient firefly algorithm for the flexible job shop scheduling problem,” pp. 2144–2146, 2015.
Citation
Lovejoban Preet Singh, Anil Kumar , "Improved Scheduling Procedure for Intensify Resource Utilization in Heterogeneous Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.304-308, 2018.
The Psychology behind Users Mental Health in Social Media
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.309-316, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.309316
Abstract
New research uncovers how social network information can be utilized to predict users’ psychological and physical wellbeing, adding to a developing number of researchers utilizing social media to make startlingly precise forecasts from the most basic data. The same number of users think what they share on the web, the discoveries give occasion to feel qualms about customary thoughts of "safe" surfing. In spite of the fact that rates of diagnosing mental illness have enhanced in the course of recent decades, numerous cases stay undetected. Side effects related with mental illness are noticeable on Twitter, Facebook, and web forums, and automated techniques are progressively ready to identify misery and other psychological instabilities. In this paper, late investigations that expected to anticipate psychological sickness utilizing web-based social networking are explored. . Mentally ill users have been observed utilizing screening reviews, their open sharing of a determination on Twitter, or by their participation in an online discussion, and they were discernable from control users by designs in their language and online activity. Automated detection techniques may recognize discouraged or generally in danger people through the vast scale passive monitoring of social media, and in the future may complement existing screening methodology.
Key-Words / Index Term
Social Media, Prediction, Classification, Image, Probabilities, Decisiontree
References
[1] Ang Li, Dongdong Jiao, Tingshao Zhu, Detecting depression stigma on social media: A linguistic analysis, Journal of Affective Disorders, May 2018.
[2] Christopher T. Barry, Chloe L. Sidoti, Shanelle M. Briggs, Shari R. Reiter, Rebecca A. Adolescent social media use and mental health from adolescent and parent perspectives, Journal of Adolescence, December 2017.
[3] Eugene Brusilovskiy, Greg Townley, Gretchen Snethen, Mark S. Salzer, Social media use, community participation and psychological well-being among individuals with serious mental illnesses, Computers in Human Behavior, December 2016.
[4] Gillian Fergie, Kate Hunt, Shona Hilton, Social media as a space for support: Young adults` perspectives on producing and consuming user-generated content about diabetes and mental health, Social Science & Medicine, December 2016
[5] Jenna Glover, Sandra L. Frits, KidsAnxiety and Social Media: A Review, Child and Adolescent Psychiatric Clinics of North America, April 2018.
[6] M. Krausz, Social media and e-mental health, European Psychiatry, April 2017.
[7] Mike Conway, Daniel O’Connor, Social media, big data, and mental health: current advances and ethical implications, Current Opinion in Psychology, June 2016
[8] Renwen Zhang, The stress-buffering effect of self-disclosure on Facebook: An examination of stressful life events, socialsupport, and mental health among college students, Computers in Human Behavior, October 2017.
[9] Sharath Chandra Guntuku, David B Yaden, Margaret L Kern, Lyle H Ungar, Johannes C Eichstaed, Detecting depression and mental illness on social media: an integrative review, Current Opinion in Behavioral Sciences, December 2017.
[10] Simon M. Rice, Rosemary Purcell, Patrick D. McGorry, Adolescent and Young Adult Male Mental Health: Transforming System Failures Into Proactive Models of Engagement, Journal of Adolescent Health, March, 2018.
Citation
D. Sridhar, V. Kathiresan, "The Psychology behind Users Mental Health in Social Media," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.309-316, 2018.
A Comparative Study on Spatio-Temporal Data Correlation and Pattern Discovery Techniques for Prediction Mining
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.317-324, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.317324
Abstract
A spatiotemporal database handles both the space and time information. A spatiotemporal database includes spatial (i.e., location and geometry of the object) and temporal data (i.e., timestamp or time interval of valid objects) where geometry of object changes over time. Spatio-temporal correlation analysis is used for identifying the spatial and temporal relationships of multiple events. The spatio-temporal objects contain number of features in pattern discovery process. However, the existing spatio-temporal pattern discovery and prediction techniques are failed to predict the future event in accurate manner and time consumption remained unaddressed. Our main objective of the research is the spatio-temporal correlation, spatio-temporal pattern discovery and prediction with higher accuracy. In order to increase the performance of spatio-temporal pattern discovery and prediction, machine learning technique are employed in our work.
Key-Words / Index Term
Spatiotemporal database, correlation analysis, features, pattern discovery, prediction, machine learning technique
References
Xiabing Zhou, Haikun Hong, Xingxing Xing, Kaigui Bian, Kunqing Xie, Mingliang Xu, “Discovering Spatio-temporal Dependencies Based on Time-lag in Intelligent Transportation Data”, Neurocomputing, Elsevier, Vol. 259, pp. 76-84, 2017.
[2] Mete Celik and Ahmet Sakir Dokuz, “Discovering Socio-Spatio-Temporal Important Locations of Social Media Users”, Journal of Computational Science, Elsevier, Vol. 22, pp. 85-98, 2017.
[3] Chung-Hsien Yu, Wei Ding, Melissa Morabito, and Ping Chen, “Hierarchical Spatio-Temporal Pattern Discovery and Predictive Modeling”, IEEE Transactions on Knowledge and Data Engineering, Vol. 28, Issue 4, pp. 979 – 993, 2016.
[4] Banafsheh Zahraie, Mohsen Nasseri and Fariborz Nematizadeh, “Exploring spatiotemporal meteorological correlations for basin scale meteorological drought forecasting using data mining methods”, Arabian Journal of Geosciences, Springer, Vol. 10, Issue 419, pp. 1-15, 2017.
[5] Dongzhi Zhang, Kyungmi Lee and Ickjai Lee “Hierarchical Trajectory Clustering for Spatio-temporal Periodic Pattern Mining”, Expert Systems with Applications, Elsevier, Vol.92, pp.1-11, 2018.
[6] Alberto Belussi and Sara Migliorini, “A spatio-temporal framework for managing archeological data”, Annals of Mathematics and Artificial Intelligence, Springer, Vol. 80, Issue. 3-4, pp. 175-218, 2017.
[7] Aboubacar Amiri and Sophie Dabo-Niang, “Density estimation over spatio-temporal data streams”, Econometrics and Statistics, Elsevier, Vol. 5, pp.148-170, 2017.
[8] Sanchita Mal-Sarkar, Iftikhar U. Sikder and Vijay K. Konangi, “Spatio-temporal Pattern discovery in sensor data: A multivalued decision systems approach”, Knowledge-Based Systems, Elsevier, Vol. 109, pp.137–146, 2016.
[9] Siming Chen, Xiaoru Yuan, Zhenhuang Wang, Cong Guo, Jie Liang, Zuchao Wang, Xiaolong (Luke) Zhang and Jiawan Zhang, “Interactive Visual Discovering of Movement Patterns from Sparsely Sampled Geo-tagged Social Media Data”, IEEE Transactions on Visualization and Computer Graphics, Vol. 22, Issue 1, pp. 270 – 279, 2016.
[10] Hoang Nguyen, Wei Liu and Fang Chen, “Discovering Congestion Propagation Patterns in Spatio-Temporal Traffic Data”, IEEE Transactions on Big Data, Vol. 3, Issue 2, pp.169 – 180, 2017.
[11] Feng Mao, Minhe Ji and Ting Liu, “Mining spatiotemporal patterns of urban dwellers from taxi trajectory data”, Frontiers of Earth Science, Springer, Vol.10, Issue 2, pp. 205–221, 2016.
[12] Douglas E. Galarus and Rafal A. Angryk, “Spatio-temporal quality control: implications and applications for data consumers and aggregators”, Open Geospatial Data, Software and Standards, Springer, Vol.1, Issue 2, pp. 1-23, 2016.
[13] Juanjuan Zhao, Qiang Qu, Fan Zhang, Chengzhong Xu and Siyuan Liu, “Spatio-Temporal Analysis of Passenger Travel Patterns in Massive Smart Card Data”, IEEE Transactions on Intelligent Transportation Systems, Vol. 18, Issue 11, pp. 3135 – 3146, 2017.
[14] Vijay Kumar Verma and Pradeep Sharma, “Data Dependencies Mining In Database by Removing Equivalent Attributes”, International Journal of Computer Science International Journal of Computer Science and Engineering, Vol.1, Issue. 1,pp. 13-16, 2013.
[15] Pradeep Chouksey, “An Apriori based Algorithm for mining interesting patterns Using Conjunctive datasets”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol. 4 , Issue.5, pp.31-36, 2016.
[16] Namrata Ghuse, Pranali Pawar, Amol Potgantwar, “An Improved Approch For Fraud Detection In Health Insurance Using Data Mining Techniques”, International Journal of Scientific Research in Network Security and Communication, Vol.5 , Issue.3,pp.27-33, 2017.
[17] P. Rutravigneshwaran, “A Study of Intrusion Detection System using Efficient Data Mining Techniques”, International Journal of Scientific Research in Network Security and Communication, Vol. 5, Issue.6, pp.5-8, 2017.
Citation
R. Sarala, V. Saravanan, "A Comparative Study on Spatio-Temporal Data Correlation and Pattern Discovery Techniques for Prediction Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.317-324, 2018.
Granite Classification: An Industrial Application to Color Texture Classification
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.325-330, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.325330
Abstract
Color texture classification is a vital step for describing objects in natural scenes. A novel method is proposed to construct a histogram based on intensity and color channel neighborhood for the color texture classification. The goal of this paper is to explore the suitability of the histogram constructed using the intensity and color channel neighborhood relationship method in automatic classification of granite textures as an industrial application. Experimental tests are conducted on the images from VisTex database. Texture classification is performed using K-Nearest Neighbor (K-NN) and Support Vector Machine (SVM) classification methods. The average classification accuracy 97.93% is obtained for K-NN classification method, where as 100% average classification accuracy is achieved for SVM classification method. Further, experimentations are performed on MondialMarmi database of granite tiles to prove the potential of the proposed method in an industrial application. The classification results demonstrate that proposed method has improved classification accuracy as compared to other color texture classification methods. The results prove that proposed method using SVM is a powerful classification method for classifying granite textures.
Key-Words / Index Term
Color texture classification, Granite classification, Industrial application, Histogram features, Classification methods
References
[1] A. Agarwal, S. S. Bhadouria, “An Evaluation of Dominant Color descriptor and Wavelet Transform on YCbCr Color Space for CBIR”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 5, No. 2, pp.56-62, 2017.
[2] S. K. Badugu, R. K. Kontham, V. K. Vakulabharanam, B. Prajna, “Calculation of Texture Features for Polluted Leaves”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 6, No. 1, pp.11-21, 2018.
[3] M. Turtinen, M. Pietikainen, O. Silvén, T. Maenpaa, M. Niskanen, “Paper Characterisation by Texture using Visualisation-based Training”, International Journal of Advanced Manufacturing Technology, Vol. 22, No.11-12, pp.890-898, 2003.
[4] S. Kukkonen, H. A. Kaelviaeinen, J. P. Parkkinen, “Color Features for Quality Control in Ceramic Tile Industry”, Optical Engineering, Vol. 40, No.2, pp.170-178, 2001.
[5] M. Bennamoun, A. Bodnarova, “Digital Image Processing Techniques for Automatic Textile Quality Control”, Systems Analysis Modelling Simulation, Vol. 43, No.11, pp.1581-1614, 2003.
[6] G. Paschos, M. Petrou, “Histogram Ratio Features for Color Texture Classification”, Pattern Recognition Letters, Vol. 24, No.1-3, pp.309-314, 2003.
[7] A. Porebski, V Vandenbroucke, V Macaire, “Haralick Feature Extraction from LBP Images for Color Texture Classification”, In the workshop of the 2008, IEEE on Image Processing Theory, Tools and Applications, (IPTA 2008), pp. 1-8, Nov.2008.
[8] S. Banerji, A.Sinha, C. Liu, “New Image Descriptors Based on Color, Texture, Shape, and Wavelets for Object and Scene Image Classification”, Neurocomputing, Vol. 117, pp.173-185, 2013.
[9] C. Palm, “Color Texture Classification by Integrative Co-occurrence Matrices”, Pattern Recognition, Vol. 37No.5, pp.965-976, 2004.
[10] F. Bianconi, A. Fernández, E. González, F. Ribas, “Texture Classification through Combination of Sequential Colour Texture Classifiers”, In Iberoamerican Congress on Pattern Recognition, Springer, Berlin, Heidelberg, pp. 231-240, November, 2007.
[11] S. Chindaro, K. Sirlantzis, F. Deravi, “Texture Classification System using Colour space Fusion”, Electronics Letters, Vol. 41, No.10, pp.589-590, 2005.
[12] M. Benco, R. Hudec, P. Kamencay, M. Zachariasova, S. Matuska, “An Advanced Approach to Extraction of Colour Texture Features based on GLCM”, International Journal of Advanced Robotic Systems, Vol. 11, No.7, pp.104, 2014.
[13] C. Cusano, P. Napoletano, R. Schettini, “Evaluating Color Texture Descriptors under Large Variations of Controlled Lighting Conditions”, JOSAA, Vol. 33, No.1, pp.17-30, 2016.
[14] E. Cernadas, M. Fernández-Delgado, E. González-Rufino, P. Carrión, “Influence of Normalization and Color Space to Color Texture Classification”, Pattern Recognition, Vol. 61, pp.120-138, 2017.
[15] S. Shivashankar M. R. Kagale, P. S. Hiremath, “Inter Intensity and Color Channel Co-occurrence Histogram for Color Texture Classification”, In the Proceedings of the 2017 Springer Third International Conference on Cognitive Computing and Information Processing (CCIP, Dec 2017), Bangaluru, India, CCIS 801, pp.182-190, 2018.
[16] R. O. Duda, P. E. Hart, D. G. Stork, “Pattern Classification”, John Wiley & Sons, 2012.
[17] M. Zhao, J. An, H. Li, J. Zhang, S. T. Li, X. M. Li, L. Tao, “Segmentation and Classification of Two-Channel C. Elegans Nucleus-Labeled Fluorescence Images”, BMC Bioinformatics, Vol. 18, No.1, pp.412, 2017.
[18] G. Anthony, H. Gregg, M. Tshilidzi, “Image Classification Using SVMs: One-against-One vs One-against-All”, arXiv preprint arXiv:0711.2914, 2007.
[19] VisTex, “Vision Texture Database”, Vision and Modeling Group, MIT Media Laboratory, http://wwwwhite.media.mit.edu/vismod/imagery/VisionTexture/vistex.html, 1995.
[20] F. Bianconi, A. Fernández, E. González, D. Caride, A. Calviño, “Rotation-Invariant Colour Texture Classification through Multilayer CCR”, Pattern Recognition Letters, Vol. 30, No.8, pp. 765-773, 2009.
[21] F. Bianconi, E. González, A. Fernández, S. A. Saetta, “Automatic Classification of Granite Tiles Through Colour and Texture Features”, Expert Systems with Applications, Vol. 39, No. 12, pp.11212-11218, 2012.
[22] E. González, F. Bianconi, M. X. Álvarez, S. A. Saetta, “Automatic Characterization of the Visual Appearance of Industrial Materials through Colour and Texture Analysis: An Overview of Methods and Applications. Advances in Optical Technologies, 2013.
[23] A. Fernández, O. Ghita, E. González, F. Bianconi, P. F. Whelan, “Evaluation of Robustness against Rotation of LBP, CCR and ILBP Features in Granite Texture Classification”. Machine Vision and Applications, Vol. 22, No.6, pp.913-926, 2011.
[24] A. Fernández, M. X. Álvarez, F. Bianconi, “Texture Description through Histograms of Equivalent Patterns”, Journal of Mathematical Imaging and Vision, vol. 45, No.1, pp.76-102, 2013.
[25] F. Bianconi, R. Bello, A. Fernández, E. González, “On Comparing Colour Spaces from a Performance Perspective: Application to Automated Classification of Polished Natural Stones”, In International Conference on Image Analysis and Processing, Springer, Cham, pp. 71-78, September 2015.
[26] MondialMarmi, “MondialMarmi: A Granite Image Database for Colour and Texture Analysis”, Version 1.1. Available online at http://webs.uvigo.es/antfdez/downloads.html, 2011.
Citation
S. Shivashankar, M.R. Kagale, "Granite Classification: An Industrial Application to Color Texture Classification," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.325-330, 2018.
Device Simulation of Si-Ge HBT Using SILVACO TCAD
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.331-335, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.331335
Abstract
In this paper, we have proposed a Si-Ge HBT Using Silvaco TCAD. In recent years, the band gap engineered devices have received considerable attention due to their inherent advantages such as high speed and high driving capability as compared to homo junction devices. The Si-Ge Hetero junction Bipolar Transistor (HBT) is the first band gap engineered device to be developed on Si. The recent advancement in material growth technology and device design has resulted in Si-Ge HBT’s operating at more than 250GHz cutoff frequency. The present paper deals with the simulation of Si-Ge HBT structures using Silvaco TCAD. HBT structure has been generated through DevEdit and device simulation was carried out using Atlas. Base width and Ge profile are very important parameter for HBT. In view of this, the effect of variation of base width and Ge profile on the parameters like Collector Current (Ic), Current Gain (β), fT and fmax has been studied.
Key-Words / Index Term
HBT, Bipolar Junction Transistor, DEVEDIT 2D, Silvaco TCAD
References
[1] Joseph, A.; Lanzerotti, L.; Sheridan D.; Johnson, J.; Liu, Q.; Dunn, J.; Rieh, J.-S.; Harame, D., “ Advances in Si-Ge HBT BiCMOS Technology,” Silicon Monolithic Integrated Circuits in RF Systems, PP. 1-4, 2004.
[2] Persson, S.; Fjer, M.; Escobedo-Cousin, E.; Olsen, S.H.; Malm, B.G.; Yong-Bin Wang; Hellstro; Stling, M.; O,Neill, A.G., “ Strained-Silicon Heterojunction Bipolar Transistor,” IEEE Transaction on Electronics Devices Volume 57, PP. 1243-1250, June 2010.
[3] Peter Ashburn, “Si-Ge Heterojunction Bipolar Transistor”s, John Wiley & Sons Ltd., 2003.
[4] Silvaco ATLAS manual, Dec.7, 2006.
[5] Cressler J.D., Niu, G., “Silicon Germanium Heterojunction Bipolar Transistor”, Artech House Inc., 2003.
[6] Armstrong, G.A. and Maiti,C.K., “Technology for Computer Aided Design for Si, Si-Ge and GaAs Integrated Circuits”, The Institution of Engineering and Technology, PP. 208-209, 2007.
[7] Hamed, Ghodsi; Hassan, Kaatuzian, “Physical Characteristics Modification of a Si- Ge Semiconductor Device for Performance Improvement In A Terahertz Detecting System” Journal of Semiconductors, Vol. 36, No.-5, May 2015.
[8] C. K. Maiti and G.A. Armstrong, “Applications of Silicon Germanium Hetero structure Devices,” Inst. of Physics Lab., 2001.
[9] Adel S. Sendra and Kenneth C. Smith, “Microelectronics Circuits,” 5th Edition, Oxford University Press, , PP. 382-383. 2004.
[10] Silvaco Dev Edit Mannual, March 1, 2006.
[11] Mathur, N.; Todorova, D.; Roenker, K.P., “Parasitic Barrier Effects in Si-Ge HBT’s Due to p-n Junction Displacement,” Accepted toTtopicalMmeeting on Silicon Monolithic Integrated Circuits in RF Systems, PP. 177-186, Sept. 2001.
[12] Reonker, K.P.; Alterovitz, S.A.; Mueller, C.H., “ Device Physics Analysis of Parasitic Conduction Band Barrier Formation in Si-Ge HBTs” Silicon Monolithic Integrated Circuits in RF systems, PP.182-186, April 2000.
[13] Jagannathan, B.; Khater, M.; Pagette, F.; Rieh, J.-S.; Angell, D.; Chen, H.; Florkey, J.; Golan, F.; Greenberg, D.R.; Groves, R.; Jeng, S.J.; Johnson, J.; Mengistu, E.; Schonenberg, K.T.; Schnabel, C.M.; Smith, P.; Stricker, A.; Ahlgren, D.; Freeman, G.; Stein, K.; Subbanna, S., “ Self Aligned Si-Ge NPN Transistors With 285 GHz fMAX And 207 GHz fT in a Manufacturable Technology,” IEEE Electron Device Letters, Volume 23, PP. 258-260, May 2002.
Citation
Kamal Prakash Pandey, "Device Simulation of Si-Ge HBT Using SILVACO TCAD," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.331-335, 2018.
A Detailed Study On Features of Data Warehousing Database-Vertica
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.336-348, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.336348
Abstract
The data which are to be stored and analyzed for various purposes have gone beyond the storage limit of the traditional relational database system. This has led in emerge of various big data technologies to store and process this huge collection of varieties of data. Vertica is an HP enterprise product, which is used in data warehouses to store and perform data analysis that are stored for decades. Vertica is not only used in data warehouses but also it can be integrated with Hadoop ecosystem for big data analysis. This paper basically describes the architecture, features, storage, various operations in Vertica analytics database that has made Vertica to be used for managing and analysis of large volumes of fast-growing data for achieving higher performance in query intensive applications and data warehouses.
Key-Words / Index Term
Column Orientation, Hybrid Store, Projections, Partitions, Tuple Mover, High Availability, Automatic Database Designer
References
[1] D.J. Abadi, P.A. Boncz, S.Harizopoulos, “Column-oriented database systems”, In The Proceedings of the VLDB Endowment, pp. 1664–1665, 2009.
[2] T. Siivola, “A Short Introduction To Vertica”, RedHat Software Developer Meetup, 2014.
[3] “Vertica Analytics Platform”, Vertica Documentation, Version: 8.1.x, 2018.
[4] C. Bear, A. Lamb, N. Tran, “The Vertica Database: SQL RDBMS For Managing Big Data”, In The Proceedings of the workshop on Management of big data systems, 2012.
[5] M. Stonebraker, “One size fits all: an idea whose time has come and gone”, In The Proceedings of 21st International Conference on Data Engineering, pp. 2-11, 2005.
[6] A. Lamb, et al., “The Vertica Analytic Database : C-Store 7 Years Later”, In The Proceedings of the VLDB Endowment vol.5, No.12, pp 1790–1801, 2012.
[7] D. Abadi, D. Myers, D. DeWitt, S. Madden, “Materialization Strategies in a Column-Oriented DBMS”, In The Proceedings IEEE 23rd International Conference on Data Engineering, pp 466—475, 2007.
[8] S.Chakraborty , J. Doshi, “Data Retrieval from Data Warehouse Using Materialized Query Database”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp-280-284, 2018.
[9] Ramakrishna Varadarajan, V. Bharathan, A. Cary, J. Dave, S. Bodagala, “DBDesigner: A Customizable Physical Design Tool for Vertica Analytic Database”, In The Proceedings of IEEE 30th International Conference, pp. 1084-1095, 2014.
[10] “A DBMS Architecture Optimized for Next-Generation Data Warehousing” , The Vertica Analytic Database Technical Overview White Paper, Vertica System, 2010.
Citation
Jisha Mariam Jose, "A Detailed Study On Features of Data Warehousing Database-Vertica," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.336-348, 2018.