An Intelligent Computational Algorithm for Optimal Self Scheduling of GENCOs to Improve The Profit in a Day-ahead Energy and Reserve Market
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.251-265, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.251265
Abstract
This paper presents an effective methodology for self scheduling of thermal generators to improve the profit of generation companies (GENCOs) in a day-ahead joint energy and reserve market. A recently projected Exchange Market Algorithm (EMA) is proposed to solve self scheduling problem. EMA is a powerful tool and having two dominant absorbing operators to pulling the solutions toward optimality and two smart searching operators for extract optimum point in optimization problem. Therefore, the proposed approach provides capability to determine global optimal solution for self scheduling problem. The problem modelled in the form of bi-objective optimization framework to simultaneously maximize the profit of GENCOs and reduce emission quantity taking into account reserve power generation.. The thermal generators emit the greenhouse gases into the atmosphere, which is answerable for change of climate and global warming in our environment. Sufficient spinning reserve is one of the major factors for reliable operation and profit maximization of power suppliers. So the problem is carefully coined with a view to maximize the profit of GENCOs by considering reserve power generation and added in the objective function. Also generated reserve power is sold in the reserve market. Numerical example with IEEE 39 bus (10 units with 24 hour) test system is considered to evaluate the performance of the proposed EMA. From the simulation results, it is found that the EMA based approach is able to afford the better solutions in terms of fuel cost, revenue, profit and emission with lesser computational effort.
Key-Words / Index Term
Deregulation, Self scheduling of GENCOs, Energy and Reserve generation, Profit maximization, Reduction of Emission, Exchange market algorithm
References
[1] Mohammad Shahidehpour, H.Yamin, and Zuyili, “Market Operations in Electric Power Systems Forecasting, Scheduling and Risk Management”. Wiley, New York,2002.
[2] Mohammad Shahidehpour, Muwaffaq and Alomoush “Restructured electrical power systems, Operation, Trading, and volatility” Wiley, New York, 2000.
[3] Narayana Prasad Padhy, “Unit commitment problem under deregulated environment- a review”, Power Engineering Society General Meeting, Vol 2, PP. 1088-1094, 2003.
[4] Mohammad Shahidehpour and Hatim yamin, Saleem, AI–agtash, “Security Constrained Optimal Generation Scheduling for GENCOs”, IEEE Transactions on power systems, vol. 19, NO.3, PP.1365-1371, August 2004.
[5] Wood A. J. and Woolenberg B. F., “Power generation, operation and control”, New York, NY: John Wiley Sons, 1996.
[6] Narayana Prasad Padhy, “Unit Commitment—A Bibliographical Survey”, IEEE Transactions on power systems, Vol. 19, No. 2,pp.1196- 1205, May 2004.
[7] Takayuki Shiina and Isamu Watanabe “Lagrangian relaxation method for price-based unit commitment problem”, Engineering optimization, Vol.36, No.6, pp.705-719, 2004.
[8] Simoglou CK, Biskas PN, Bakirtzis AG., “Optimal self-scheduling of a thermal producer in short-term electricity markets by MILP”, IEEE Trans Power Syst., Vol.25, pp.1965–77, 2010.
[9] K. Chandram, N. Subrahmanyam and M. Sydulu, “Improved Pre-prepared Power Demand Table and Muller’s Method to Solve the Profit Based Unit Commitment Problem.”, Journal of Electrical Engineering & Technology, Vol.4, No.2 pp.159-167. 2008
[10] K. Chandram, N. Subrahmanyam and M. Sydulu. “New approach with Muller method for profit based unit commitment”, Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century IEEE, pp 1-8, 2008
[11] T.A.A Victoire, A.E. Jeyakumar, “Unit commitment by a tabu-search-based hybrid-optimization technique”, IEE Proceedings Generation. Transmission & Distribution, Vol.15, No.2, pp.563–570. 2006.
[12] Georgilakis PS., “Genetic algorithm model for Profit maximization of generating companies in deregulated electricity markets”, Application of Artificial Intelligence, Vol.23, pp.538–552, 2009.
[13] Dionisios K. Dimitroulas, Pavlos S. Georgilakis, “A new memetic algorithm approach for the price based unit commitment problem”, Applied Energy, Vol.88, No.12, pp.4687–4699, 2011.
[14] Jacob Raglend , C. Raghuveer, G. Rakesh Avinash, N.P. Padhy , D.P. Kothari., “Solution to profit based unit commitment problem using particle swarm optimization”. Applied Soft Computing, Vol.10, No.4, pp.1247–1256. 2010
[15] C.Christopher Columbus and Sishaj P Simon., “Profit based unit commitment for GENCOs using Parallel PSO in a distributed cluster”, ACEEE Int. J. on Electrical and Power Engineering, Vol.2, No.3, 2011.
[16] C.Christopher Columbus, K. Chandrasekaran, Sishaj P.Simon, “Nodal ant colony optimization for solving profit based unit commitment problem for GENCOs”, Applied soft computing, Vol.12, pp.145-160, 2012.
[17] C.Christopher Columbus and Sishaj P Simon, “Profit based unit commitment: A parallel ABC approach using a workstation cluster”, Computers and Electrical Engineering, Vol.38, pp.724-745, 2012.
[18] T. Venkatesan, C. Muniraj, “A Solution to the Profit Based Unit Commitment Problem Using Integer-Coded Bacterial Foraging Algorithm”, International review on electrical engineering, Vol. 7, No 1 pp. 152–162, 2014.
[19] K. Srikanth Reddy, Lokesh Kumar Panwar, Rajesh Kumar, B.K. Panigrahi, “Binary fireworks algorithm for profit based unit commitment (PBUC) problem”, Electrical Power and Energy Systems , Vol.83, pp.270-285, 2016.
[20] Prateek Kumar Singhal, Ram Naresh and Veena Sharma. “Binary fish swarm algorithm for profit-based unit commitment problem in competitive electricity market with ramp rate constraints”, IET Generation, Transmission & Distribution, Vol.9, No 13, pp.1697-1715, 2015.
[21] B. Rampriya and K. Mahadevan,“ Scheduling the Units and Maximizing the Profit of Gencos Using LR-PSO Technique”, International Journal on Electrical Engineering and Informatics, Vol 2, No 2, pp 150-1 58, Nov 2010.
[22] Pathom attaviriyanupap, Hiroyuki kita,Jun Hasegawa., “A Hybrid LR-EP for Solving New Profit-Based UC Problem Under Competitive Environment”, IEEE Transactions on power systems, Vol.18, No.1, pp.229-237, 2003
[23] R. Ashok Kumar, K. Asokan and S.Ranjith Kumar “Optimal Scheduling of Generators to Maximize GENCOs profit using LR combined with ABC Algorithm in Deregulated Power System” IEEE Conference Preceding, pp. 75-83, April 2013.
[24] K. Asokan and R. Ashok Kumar “An Innovative approach for self Scheduling of Generation companies to maximize the Profit by considering Reserve generation”. Australian Journal of Basic and Applied sciences, Vol. 8, No. 6, pp. 179-195 April 2014.
[25] D. Sam Harison • T. Sreerengaraja. “Swarm Intelligence to the Solution of Profit-Based Unit Commitment Problem with Emission Limitation”.Arab Journal of sciences and engineering, Vol. 38, pp. 1415-1425, 2013.
[26] J.P.S.Catalao, S.J.P.S. Mariano, V.M.F.Mendes, L.A.F.M.Ferreria, “A Practical approach for profit-based unit commitment with emission limitations”, Electrical power and energy systems, Vol.32, pp.218-224, 2010.
[27] J.P.S.Catalao and V.M.F.Mendes, “Influnce of environmental constraints on Profit-Based short-rerm thermal scheduling”, IEEE Transactions on power systems, Vol.2, No.2, pp.131-138, 2010.
[28] Lixin Tang and Ping Che, “Generation Scheduling Under a CO2 EmissionReduction Policy in the Deregulated Market”, EEE Transactions on engineering management, Vol.60, No.2, pp.387-397, 2013.
[29] T. Venkatesan, M.Y. Sanavullah, “SFLA approach to solve PBUC problem with emission limitation”, Electrical power and energy systems, Vol.46, pp.1-9, 2013.
[30] K. Asokan and R. Ashok Kumar, “Emission controlled Profit based Unit commitment for GENCOs using MPPD Table with ABC algorithm under Competitive Environment”. WSEAS Transaction on Systems, Accepted for publications.
[31] Zhaowei Geng, Antonio J.Conejo, Qixin chen, Chongqing kang, “Power generation scheduling considering stochastic emission limit”, Electrical power and energy systems, Vol.95, pp.374-383, 2018.
[32] Naser Ghorbani, Ebrahim Babaei, “Exchange market algorithm”, Applied Soft Computing , Vol.19, pp.177-187, 2014.
[33] Naser Ghorbani, “Combined heat and power economic dispatch using exchange market algorithm” , Electrical power and energy systems, Vol.82, pp.58-66, 2016.
[34] Abhishek Rajan, T.Malakar, “Exchange market algorithm based optimum reactive power dispatch”, Applied soft computing, Accepted for publications.
[35] Naser Ghorbani, Ebrahim Babaei, “Exchange market algorithm for economic load dispatch”, Electrical power and energy systems, Vol.75, pp.19-27, 2016.
[36] Abhishek Rajan, T.Malakar, “Optimum economic and emission dispatch using exchange market algorithm”, Electrical power and energy system, Vol.82, pp.545-560, 2016
Citation
Senthilvadivu A, Gayathri K, Asokan K, "An Intelligent Computational Algorithm for Optimal Self Scheduling of GENCOs to Improve The Profit in a Day-ahead Energy and Reserve Market," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.251-265, 2018.
Stock Market Close Price Prediction Using Neural Network and Regression Analysis
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.266-271, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.266271
Abstract
The financial market is very dynamic in nature and changing continuously. In addition of that due to it’s dynamicity prediction of stock price values are not much accurate. In order to predict the stock’s close values accurately machine learning technique is used in this proposed work. The proposed technique usages supervised learning technique because supervised learning techniques can predict values more accurately. In order to train and test the proposed machine learning prediction technique the YQL data in offline mode is used. The proposed stock market price prediction method is a hybrid data model. In this context two different algorithms are combined for obtaining the goodness of both the techniques. Here both the algorithms are analyze data according to their methodology and perform prediction. After that both algorithms’ approximated values are combined by computing the mean values as final prediction. Therefore the proposed technique optimizes the performance of the traditional back propagation based stock market price prediction. The implementation of the proposed technique is performed using the JAVA technology and the performance of the system is measured in term of accuracy, error rate, time complexity and memory usages. The performance of the system demonstrate the proposed technique enhance the prediction of the close values. In addition of that comparative performance study of proposed technique is performed with the traditional back propagation model using experimental outcomes. Results demonstrate proposed technique out perform with respect to the traditional approach of stock market price prediction.
Key-Words / Index Term
Stock Market Price Prediction, Regression Analysis, Error Adjustment
References
[1] Moghaddam, Amin Hedayati, Moein Hedayati Moghaddam, and Morteza Esfandyari, "Stock market index prediction using artificial neural network", Journal of Economics, Finance and Administrative Science 21, no. 41 (2016), pp. 89-93.
[2] Gorunescu, F, Data Mining: Concepts, Models, and Techniques, Springer, 2011.
[3] Han, J., and Kamber, M., Data mining: Concepts and techniques, Morgan-Kaufman Series of Data Management Systems San Diego: Academic Press, 2001.
[4] Neelam adhab Padhy, Dr. Pragnyaban Mishra and Rasmita Panigrahi, “The Survey of Data Mining Applications and Feature Scope, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)”, vol.2, no.3, June
[5] Introduction to Data Mining and Knowledge Discovery, Dunham, M. H., Sridhar, S., “Data Mining: Introductory and Advanced Topics”, Pearson Education, New Delhi, 1st Edition, 2006.
[6] Mohammed J. Zaki and Wagner Meira Jr, “Data Mining and Analysis Fundamental Concepts and Algorithms”, Cambridge University Press Hardback, 2014 [Book]
[7] Neelamadhab Padhy, Dr. Pragnyaban Mishra, “The Survey of Data Mining Applications and Feature Scope”, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), PP. 43-58 Vol.2, No.3, June 2012.
[8] Tao Li, Steve Luis, Shu-Ching Chen, Vagelis Hristidis. "Using data mining techniques to address critical information exchange needs in disaster affected public-private networks", Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 2010.
[9] Kantardzic, Mehmed ―Data mining: Concepts, Models, Methods, and Algorithms, John Wiley & Sons, 2003.
[10] Ian H. Witten; Eibe Frank; Mark A. Hall, ―Data Mining: Practical Machine Learning Tools and Techniques (3rd Ed.), Elsevier, 30 January 2011.
[11] Shalev-Shwartz, Shai, and Shai Ben-David. Understanding machine learning: From theory to algorithms, Cambridge University press, 2014.c.
Citation
Prateek Purey, Anil Patidar, "Stock Market Close Price Prediction Using Neural Network and Regression Analysis," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.266-271, 2018.
Energy Preserves Task Scheduling In Heterogeneous Virtual Machine Framework
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.272-277, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.272277
Abstract
In Virtual machine, Energy conservation is the major problem and it provides benefits such as reducing costs, increased reliability of the system and it also provides protection to the environment. Energy–aware scheduling is used to achieve these benefits. Existing energy-aware scheduling algorithms are not real time task oriented and also it lacks in system schedulability. Vacation queuing model is used for real-time, a periodic, independent task to solve this problem. The system which is proposed here can achieve energy optimization by combining the virtual machine resources with current exploitation. The eminence of hardware and nodes are well-organized with virtual network topologies. Vacation system is implemented with sojourn time to guarantee the schedulability of real-time tasks, efficiently. Simultaneously, energy consumption via dynamic VMs consolidation is concentrated. There are two strategies i.e. scale up and scale down to achieve a suitable trade-off sandwiched between task’s schedulability and energy preservation. Energy conservation is achieved by switching the active host to sleep mode when the system does not perform any action. The task should be completed within the deadline and each user must provide the deadline to avoid rejection. The deadline is analyzed and acknowledgement is provided to the scheduler for each task completion.
Key-Words / Index Term
Virtualmachine, Scheduling, Deadline, Resources
References
[1] G. Lovasz, F. Niedermeier , and H. De-Meer, Performance tradeoffs of energy-aware virtual machine consolidation, Journal of Networks Software Tools and Applications, vol. 16, pp. 37–38, 2013.
[2] J. X. Chen, Energy efficient design of virtual machine data center, Virtual machine IDC, vol. 57, pp. 481–496, 2011.
[3] O. Philippe and L. Jorge, Deep network and service management for virtual machine and data centers: A report on CNSM 2012, Journal of Network and Systems Management, vol. 21, pp. 707–712, 2013.
[4] Y. S. Jing, A. Shahzad, and S. Kun, State-of-the-art research study for green virtual machine , Journal of Super, vol. 65, pp. 445–468, 2013.
[5] T. L. Chen and H. L. Lachlan, Simple and effective dynamic provisioning for power-proportional data centers, IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1161–1171, 2013.
[6] C. Y. Lee and A. Zomaya, Energy conscious scheduling for distributed systems under different operating conditions, IEEE Transactions on Parallel and Distributed Systems, vol. 22, pp. 1374–1381, 2011.
[7] J. Guo, F. Liu, D. Zeng, J. C. S. Liu, and H. Jin, A cooperative game based allocation for sharing data center networks, in Proceedings IEEE Infocom, 2013, pp. 2139–2147.
[8] Z. Zhou, F. Liu, H. Jin, B. Li, B. Li, and H. Jiang, On arbitrating the power-performance tradeoff in SaaS virtual machines, in Proceedings IEEE Infocom, 2013, pp. 872–880.
[9] W. Deng, F. Liu, H. Jin, B. Li, and D. Li, Harnessing renewable energy in virtual machine datacenters: Opportunities and challenges, IEEE Network Magazine, vol. 28, pp. 48–55, 2014.
[10] F. Xu, F. Liu, L. Liu, H. Jin, B. Li, and B. Li, iAware: Making live migration of virtual machines interference aware in the virtual machine, IEEE Transactions on Computers, vol. 63, pp. 3012–3025, 2014.
Citation
RV. Deepa, E. Ramaraj, "Energy Preserves Task Scheduling In Heterogeneous Virtual Machine Framework," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.272-277, 2018.
Diabetes Classification Using Machine Learning Techniques With The Help of Cloud Computing
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.278-283, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.278283
Abstract
Now a days Diabetes mellitus is a major global public health problems. The machine learning techniques can be applied to help the people in detection of diabetes at an early stage and treatment, which may help in avoiding complications. In our work attempts to propose three kinds of techniques K- Nearest Neighbor (KNN), Naive Bayes (NB) and Artificial Neural Network (ANN) for classifying the individual user as diabetic or non diabetic.Providing diagnostic aid for diabetic by using a set of data that contains only medical information obtained without advanced medical equipments, can help number of people who want to discover the disease or the risk of disease at an initial stage. The experimental system achieves classification accuracy of KNN is 92.59%, NB is 85.71% and ANN is 94.64%. The aim of this study is to classify diabetes disease and deploy in to cloud for cost effective and easy to use.
Key-Words / Index Term
Diabetes mellitus, K-Nearest Neighbor, Naïve Bayes, Artificial Neural Network, Cloud
References
[1] Barrie Sosinsky, “Cloud Computing Bible”, Wiley Publication, India. Pp 083-120, 2011. For Book
[2] American Diabetes Association, “Diagnosis and Classification of Diabetes Mellitus”, American Diabetes Association Journals, Vol 37, Pp. 81-90, January 2014. For Journal
[3] E O Olaniyi, K Adnan,” Onset Diabetes Diagnosis using Artificial Neural Network”, International Journal of Scientific & Engineering Research, Vol 5 Issue 10, Oct 2014. For Journal
[4] Ch Chakradhara Rao, Mogasala Leelarani and Y Ramesh Kumar, “Cloud:Computing Services And Deployment Models”, International Journal of Engineering and Computer Science, Vol. 2, Issue 12, pp.3389 – 3392, Dec 2013. ISSN:2319 – 7242. For Journal
[5] Sean Marston, Zhi Li , Subhajyoti Bandyopadhyay, Juheng Zhang , Anand Ghalsasi, “Cloud computing - The business perspective”, Elsevier, pp. 176–189, 2010. For Journal
[6] Mehrbakhsh Nilashi, Othman Ibrahim, “Accuracy Improvement for Diabetes Disease Classification a Case on a Public Medical Dataset”, Fuzzy Information and Engineering Elsevier 2017.
[7] Amit kumar Dewangan and Pragati Agrawal “Classification of diabetes Mellitus using Machine Learning Techniques”, International journal of engineering and applied science, vol.2, issue 5, may 2015. For Journal
[8] Parashar A, Burse K and Rawat K, “A Comparative Approach for Pima Indians Diabetes Diagnosis using LDA - Support Vector Machine and Feed Forward Neural Network”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, pp. 378-383, 2014. ISSN: 2277 128X. For Journal
[9] Dilip Kumar, Sanchita paul, “Classification of Pima Indian Diabetes Dataset using Naïve Bayes with genetic algorithm as an attribute selection”. Communication and computing system, Dec 2017. For Coference
[10] Akil Bansal, Manish kumar Ahirwar, Piyush kumar sukla, “A Survey on Classification Algorithms used in Healthcare Environment of the Internet of Things”. International journal of Computer Sciences and Engineering, Vol 6, Issue 7, Pp 883-887, July 2018. For Journal
[11] Pankaj Deep kaur and Inderveer Chana ” Cloud based intelligent system for delivering health care as a service”, 2013 Elsevier, Volume 113, Issue 1, pp. 346-359, January 2014. For Journal
[12] Aiswarya Iyer, S.Jeyalatha, Ronak Sumbaly,” International Journal of DataMining & Knowledge Management Process, Vol.5, No.1, January 2015. For Journal
[13] Pooja, Komal kumar Bhatia, “Spam Detection using Naïve Bayes Classifier”. International journal of Computer Sciences and Engineering, Vol 6, Issue 7, Pp 712-716, July 2018. For Journal
[14] Manaswini Pradhan, Ranjit Kumar Sahu,”Predict the onset of diabetes disease using Artificial Neural Network (ANN)”, International Journal of Computer Science & Emerging Technologies, Vol 2, Issue 2, April 2011. For Journal
Citation
J. Seetha, T. Chakravarthy, "Diabetes Classification Using Machine Learning Techniques With The Help of Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.278-283, 2018.
Min-Max based K-means Clustering Algorithm using Artificial Neural Network Approach
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.284-288, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.284288
Abstract
K-means clustering approach is the most commonly used approach to reduce the sum of intra-cluster differences. But there is problem regarding the selection of centroid in k means clustering algorithm. Centroid can be poor or best depending upon the data. Therefore, there is a probablility of selecting good or bad centroid. So, in case of poor centroid selection, data does not get clustered in proper manners. To overcome this problem, we have used Min-max based K-means clustering algorithm along with ANN (Minimum- maximum based artificial neural network). The ANN algorithm overcomes the pitfalls of Min-max based K-means algorithm (Poor selection of centroid). In our research we have used Min-max K-means algorithm along with ANN to find out the exact category according to the labeled input data. Here, ANN is firstly trained with labeled input data. On the basis of training, testing phase is done to determine the accurate output for labeled input data. The enhancement in the accuracy of the proposed work from the existing work is approximately 16.47%.
Key-Words / Index Term
Clustering, K-mean, Min-Max, ANN
References
[1] A. Chadha, “Efficient Clustering Algorithms in Educational Data Mining”, Handbook of Research on Knowledge Management for Contemporary Business Environments (pp. 279-312). IGI Global, 2018.
[2] M. Kalra, N. Lal, & S. Qamar, “K-Mean Clustering Algorithm Approach for Data Mining of Heterogeneous Data”, Information and Communication Technology for Sustainable Development (pp. 61-70). Springer, Singapore, 2018.
[3] Juntao Wang, Xiaolong, “An improved k means clustering algorithm”, IEEE 3rd International Conference on Communication Software and Networks, 2018.
[4] A. Bansal, M. Sharma & S. Goel, “Improved k-mean clustering algorithm for prediction analysis using classification technique in data mining”, International Journal of Computer Applications (0975–8887), Volume 157, 33-40, 2017.
[5] K. Vaswani, & A. M. Karandikar, , “An Algorithm for Spatial Data Mining using Clustering”, Journal of Engineering and Applied Sciences,2017
[6] K.Teknomo, “K-means clustering tutorial”, Medicine, 100(4), 3, 2006.
[7] N. K.Visalakshi, & J. Suguna, “K-means clustering using Max-min distance measure”, Fuzzy Information Processing Society, 2009. NAFIPS 2009, Annual Meeting of the North American (pp. 1-6). IEEE, 2009.
[8] M. K. Yadav, & S. Sharma, “A SURVEY OF FAST AND EFFICIENT K MEANS CLUSTERING ALGORITHM”, International Journal of Engineering, Management & Medical Research (IJEMMR), Vol 1, no. 9, 2015.
[9] G. Tzortzis, & A. Likas, “The MinMax k-Means clustering algorithm”, Pattern Recognition, 47(7), 2505-2516, 2014.
[10] D. K. Ghosh & S. Ari, “A static hand gesture recognition algorithm using k-mean based radial basis function neural network”, Information, Communications and Signal Processing (ICICS) 2011 8th International Conference on (pp. 1-5). IEEE, 2011.
[11] R. J. Schalkoff, “Artificial neural networks”, New York: McGraw-Hill, 2011.
[12] B. Yegnanarayana, “Artificial neural networks”, PHI Learning Pvt. Ltd, 2011.
[13] Z. Zhang, “Artificial neural network”, Multivariate Time Series Analysis in Climate and Environmental Research (pp. 1-35). Springer, Cham, 2018.
Citation
Gurpreet Virdi, Neena Madan, "Min-Max based K-means Clustering Algorithm using Artificial Neural Network Approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.284-288, 2018.
Internet of Things: Applications and Challenges
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.289-293, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.289293
Abstract
Internet of Things (IoT) refers to the latest technology which is changing the way of looking towards the world. The terminology Internet of Things (IoT) refers to a future where every day physical objects are connected by the Internet in one form or the other, but technology is quickly changing the way we interact with the world around us. It is the advancements in the networking with the help of which real world objects can be connected to communicate with one another without human intervention. IoT envisions a future in which both digital and physical world can be linked, by means of appropriate information and technologies. IoT is supported by the wide range of distributed devices with embedded identification, sensing and/or actuation capabilities. In this paper will discuss the applications and challenges of Internet of Things (IoT).
Key-Words / Index Term
Internet of Things, IoT Components, IoT Applications, Challenges, Smart Home, Smart Environment, Smart Cities
References
[1] Yogita Pundir, Nancy Sharma and Yaduvir Singh, “Internet of Things(IoT): Challenges and Future Directions.” International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 3, March 2016.
[2] Shanzhi Chen, “A Vision of IoT: Applications, Challenges, and Opportunities with China Perspective.” IEEE INTERNET OF THINGS JOURNAL., VOL., 1, NO. 4, AUGUST 2014.
[3] Saad Albishi, “Challenges and Solutions for Applications and Technologies in the Internet of Things.” Procedia Computer Science 124 (2017) 608-614.
[4] Zeinab Kamal Aldein and Elmustafa Sayed Ali Ahmed,“Internet of Things Applications, Challenges and Related Future Technologies.” WSN 67(2) (2017) 126-148.
[5] Yen-Kuang Chen, “Challenges and Opportunities of Internet of Things.” 978-1-4673-0772/7/12.
[6] Zaid Ajas Moharkan, Tanupriya Choudhary, Subhash Chand Gupta and Gaurav Raj,” Internet of Things and its Application in E-Learning.” 3rd International Conference on “Computational Intelligence and Communication Technology” (IEEE-CICT 2017).
[7] Prajakta Deshpande, Anuja Damkonde and Vaibhav Chavan,” The Internet of Things: Vision, Architecture and Applications.” International Journal of Computer Applications (1975 – 8887 Vol –No.2, Nov 2017.
[8] Mayank Dixit, Jitendra Kumar and Rajesh Kumar, “Internet of Things and Challenges.” 978-1-4673-7910-6/15 2015 IEEE.
[9] S.B. Yoon, B. Petrov, and K. Liu, “December. Advanced wafer level technology: Enabling innovations in mobile, IoT and wearable electronics,” In Electronics Packaging and Technology Conference (EPTC, IEEE), pp. 1-5, 2015.
[10] Swan, M. (2012). Sensor mania! The Internet of Things, wearable computing, objective metrics, and the Quantified Self 2.0. Journal of Sensor and Actuator Networks, 1(3), 217-25.
[11] Khaled Abdulla Al Rabaiei and Saad Haorus,” Internet of Things: Applications and Challenges” 2016 12th International Conference on Innovations in Information Technology (IIT).
[12] Mobyen Uddin Ahmed, Mats Bjorkman, Aida Čaušsević, Hossein Fotouhi, and Maria Linden. An Overview on the Internet of Things for Healthy Monitoring Systems.
[13] Ovidiu Vennesa, Peter Friess, "Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems", River Publishers, 2013, pp. 278-279.
Citation
Deepanshu Mehta, "Internet of Things: Applications and Challenges," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.289-293, 2018.
Current Trends and Future Implementation Possibilities of the Merkel Tree
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.294-301, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.294301
Abstract
A current popular trend of wallet security research is cryptography. For that Merkle tree is one of the solutions to enhance wallet security. It is basically used for cryptocurrencies, file system authentication, backup system, control system, database, etc. but it can be used for communication authentication and many more. And that is highlighted in this paper by stating the few future Merkle tree implementation possibility with its basic technical requirements. In this survey study also discuss about the Merkle tree concept with its advantages and disadvantages and its implementations such as Bitcoin, Ethereum, Hash-based Cryptography, Apache Cassandra, Btrfs, ZES, IPFS with their comparisons.
Key-Words / Index Term
Merkle Tree, Bitcoin, Ethereum, Hash-based Cryptography, Apache Cassandra, Btrfs, ZES, IPFS
References
[1] Gencer, Adem Efe, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin Gün Sirer. "Decentralization in Bitcoin and Ethereum Networks." arXiv preprint arXiv:1801.03998 (2018).
[2] Campero, Richard, Sean Davis, Graeme Jarvis, and Terezinha Rumble. "Architecture for access management." U.S. Patent 9,858,781, issued January 2, 2018.
[3] Tran, Bao, and Ha Tran. "Smart device." U.S. Patent Application 15/807,138, filed March 22, 2018.
[4] Harm, Julien, Josh Obregon, and Josh Stubbendick. "Ethereum vs. Bitcoin." Creighton University, undated manuscript, retrieved 1 (2017).
[5] Ethereum community, “Ethereum Homestead Documentation” ,Release 0.1, March 01, 2017.
[6] Nian, Lam Pak, and David LEE Kuo Chuen. "Introduction to bitcoin." In Handbook of Digital Currency, pp. 5-30. 2015.
[7] Chebotko, Artem, Andrey Kashlev, and Shiyong Lu. "A big data modeling methodology for apache cassandra." In Big Data (BigData Congress), 2015 IEEE International Congress on, pp. 238-245. IEEE, 2015.
[8] Buterin, Vitalik. "A next-generation smart contract and decentralized application platform." white paper (2014).
[9] Benet, Juan. "IPFS-content addressed, versioned, P2P file system." arXiv preprint arXiv:1407.3561 (2014).
[10] Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." (2008).
[11] Hülsing, Andreas, Stefan-Lukas Gazdag, Denis Butin, and Johannes Buchmann. "Hash-based Signatures: An outline for a new standard."
[12] https://en.wikipedia.org/wiki/Merkle_tree
[13] https://www.investopedia.com/terms/m/Merkle-tree.asp
[14] https://en.wikipedia.org/wiki/Hash-based_cryptography
[15] https://en.wikipedia.org/wiki/Apache_Cassandra
Citation
Mansi Bosamia, Dharmendra Patel, "Current Trends and Future Implementation Possibilities of the Merkel Tree," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.294-301, 2018.
A Novel Approach for Classifying Gene Expression Datasets
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.302-305, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.302305
Abstract
Classification of Gene expression data is one of the challenging tasks in the domain of Bio-medical recognition. Working on high dimensional data sets always poses complexity on accuracy and on the computational fronts. A Novel approach for classifying the gene expression data has been proposed which paves path for better efficiency and effectiveness measure using an enhanced algorithm for analyzing the sequential patterns by use of a novel algorithm which surpasses the existing methods. This approach provides a better heuristics for working with both supervised and the semi-supervised data. The proposed methodology increases the efficiency by making use of the threshold values which has been used for pruning the data sets which gives rise to a higher confidence on the data sets. The classification thus achieved could help us understand the patterns using the prediction algorithm and then grouping them based on the class labels. This work and the technique that is to be used could serve us in predicting interesting knowledge on the input gene data set. As the data set is of high dimension it throws open the corridors for various analysis on the acquired classes and considerably alleviate the computation cost.
Key-Words / Index Term
Classification, Gene Expression, Supervised, Semi-supervised, pruning
References
[1] Heba Abusamra. “A comparative study of featue selection and clasification methods for gene expression data of glioma”, Procedia Science Direct , Elsevier Issue.10.1016/j.procs.2013.10.003. For Conference.
[2] Jia Lv,Qinke Peng,Xiao Chen, Zhi Sun , “A multi-objective heuristic algorithm for gene expression microaray data classification”, Elsevier, Expert Systems with Applications 59(2016)13-19.
[3] Krisztian Buza, “Classification of Gene Expression dat: A Hubness-aware semi-supervised approach”, Elsevier, Computer Methods and Programs in Biomedicine 127(2016) 105-113.
[4] Hung-Yi Lin, “Gene Discretization based on EM clustering and adaptive sequential forward gene selection for molecular classification”,Elsevier, Applied Soft Computing 48(2016) 683-690..
[5] Sara Tarek,Reda Abd Elwahab,Mahmoud Shoman, “Gene Expression based cancer classification”, Egyptian Informatics Journal 2016.
[6] Devi Arockia Vanitha ,Devaraj D,Venkatesulu, “Gene Expression Data classification using support Vector Machine and Mutual Information–based Gene selection”, Procedia Computer science 47(2015)13-21.
[7] Konstantina Kourou, Costas Papaloukas,Dimitrois I.Fotiadis, “Intergration of pathway Knowledge and Dynamic Bayesian Networks for the prediction of Oral Cancer Recurrence”, IEEE 2016.
[8] Thanh Nguyen, Saeid Nahavandi, “Modified AHP for Gene Selection and Cancer Classification using Type-2 Fuzzy Logic”, IEEE Transtions on Fuzzy Systems, Vol 24 No.2 April 2016.
[9] Jesus Maillo,Sergio Ramirez,Issac Triguero,Fransico Herrera, “kNN-IS: An interative Spark-based design of the K-nearest Neighbors classifiers for big data” Knowledge based Systems, Elsevier 000(2016)1-13.
[10] Pradeep K.Sharma, Vaibhav Sharma, Jagrati Nagdiya, “ A Proposed Method for Mining High Quality itemset with Transactional weighted utility using Genetic alogirthm Technique”, IJSRCSE, Vol -5, Issue 1, pp 31-35, 2017.
[11] T. Senthilselvi, R.Parimala, “Improving Clustering Accuracy using Feature Extraction Method “, IJSRCSE, Vol-6, Issue-2, pp 15-19, 2108.
Citation
A. Immaculate Mercy, M. Chidambaram, "A Novel Approach for Classifying Gene Expression Datasets," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.302-305, 2018.
Optical Antenna: A Key Enabling Arial For Device To Device Communication
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.306-309, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.306309
Abstract
The optical antenna transmits optical signals on nanometer scale. The nano-scale devices are expected to radiate in – THZ frequency range. The optical antenna has unique biological Application for communication networks to be analyzed. Its frequency response with high mode conductive antenna element for nano devices. The optical antenna has unique and key application for such types of area based configuration for optical communication devices. The optical antenna made-up nanoparticle like gold, particle because the calculation of three dimensions is possible in infrared band. In this research articles we have studied about antenna emission, distribution, characterization of terahertz (THZ) optical emission with high resonance of nanoantenna optical frequencies result. The wavelength optical antenna 400 nm nano-scale enable to study for far field radiation distribution.
Key-Words / Index Term
Optical antenna, terahertz (THZ), DRA antenna, Gold-particle, nanoscale transmit, Dielectric Antenna, spontaneous emission, nanoparticle
References
[1]. Mohan, A., 2015. The advanced generation mobile broadband technology for wireless communication system and its applications. IJAR, 1(12), pp.383-385.
[2]. MOHAN, ANAND. "RADIATION CHARACTERISTIC OF METALLIC NANO- PARTICLE WITH APPLICATION TO NANO-ANTENNA." “An Experimental Study of Effect of Amalkirasayan and Amalkiswaras with Help of Electron Microscopy” 1-9 8, no. 5&6 (2014): 45.
[3].MOHAN,ANAND."SYNTHESIS OF BI-METALLIC NANOPARTICLES AND ANALYSIS OF THEIR PERFORMANCES." “An Experimental Study of Effect of Amalkirasayan and Amalkiswaras with Help of Electron Microscopy” 1-9 8, no. 5&6 (2014): 59.
[4]. Mohan, A. (2016). Study of Plasmonic Nano Antennas and Their Optimization., International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-5, Issue-5) Special Issue on International Conference on Advances in Engineering (ICAE) -2016 Conference Held at Hotel Magaji Orchid, Sheshadripuram, Bengaluru, India.
[5]. Mohan Anand “ROLE OF NANOANTENNA SYSTEM IN TRANSFORMING THERMAL ENERGY, Airo International Research Journal ISSN: 2320-3714 Volume: 7 June 2016
[6]. Mohan Anand “IOT: A BIG REVOLUTION FOR NANOSCIENCE” 7th virtual NanotechnologyPosterConference http://www.nanopaprika.eu/group/nanoposter/page/p17-21
[7]. Sachchida Nand Singh; Ashok Kumar: Anand Mohan: Study of nanoantennas for enhanced Optical emission, Proceedings of International Conference on Advances in Light Technologies and Spectroscopy of Materials (ICALTSM -2016), page. no. 256, January16-18, 2016.
[8].Akyildiz IF, Jornet JM, Han C. Terahertz band: Next frontier for wireless communications. Physics Communications. 2014; 12:16–32. DOI: 10.1016/j.phycom. 2014.01.006
[9].Anand Mohan,Cylindrical dielectric resonator antennas (CDRA) & its applications for human life, ISCA, Souvenir of 4th International Virtual Congress IVC-2017, ISBN: 978-93-84659-68-4, 2017
[10].Nagatsuma T, Ducournau G, Renaud CC. Advances in terahertz
communications accelerated by photonics. Nature Photonics.
2016;10(6):371–379
[11]. Anand Mohan, Ashok Kumar, Uses of Optical Nanoantenna in ICT and its Ability, Souvenir of 3rd International Virtual Congress, 3rd International Virtual Congress IVC-2016, ISBN: ISBN: 978-93-84648-78-7, 2016
[12].Anand Mohan, Study of Plasmonic Nano-Materials for Surface
enhanced Localized Surface Plasmon Resonance Spectroscopy (LSPR) &Their Applications for OpticalAntennas, Indian Journal of Agriculture and Allied Sciences, ISSN 2395-1109 Volume: 1, No.: 4, Year: 2015,
[13].Scholl, J. A., García-Etxarri, A., Koh, A. L. & Dionne, J. A. Observation of Quantum Tunneling between Two Plasmonic Nanoparticles. Nano Lett. 13, 564–569(2013).
[14]. K. O’Brien, H. Suchowski, J. Rho, A. Salandrino, B. Kante,X. Yin, X. Zhang, Predicting nonlinear properties of metamaterialsfrom the linear response, Nature Materials 14 (2015)379–383.
Citation
Anand Mohan, "Optical Antenna: A Key Enabling Arial For Device To Device Communication," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.306-309, 2018.
Enhancing Portability and Confidentiality of Data Migration Among Inter Clouds
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.310-315, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.310315
Abstract
Transferring information over the network is widely used fast and reliable source for communication. Users with wide fidelity use this mechanism for transferring and accessing information. Portability and interoperability within the cloud system through offline and online mediums are continuously desirable but the problem of security arises during the transmission process. Security and reliability is the key issue during the transfer process which is considered in this research. Information security is provided using the public and private key RSA cryptography. The experiment is implied not only at offline data but also at online data such as Google Docs. Redundancy handling mechanism is used to ensure that space at data storage provider is least used since cost in DSP is accompanied by the amount of storage used. Overall space requirement in case of heavy files is reduced and security of online information accessing is enhanced by the use of RSA cryptography with redundancy handling mechanism.
Key-Words / Index Term
Interoperability, Portability, Security, reliability, RSA, Redundancy, Cost
References
[1] F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.
[2] X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data Access Control for Multiauthority Cloud Storage Systems,” pp. 1–14, 2015.
[3] J. Aikat et al., “Rethinking Security in the Era of Cloud Computing,” no. June, 2017.
[4] K. Hwang, X. Bai, Y. Shi, M. Li, W.-G. Chen, and Y. Wu, “Cloud Performance Modeling with Benchmark Evaluation of Elastic Scaling Strategies,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 130–143, Jan. 2016.
[5] T. H. Noor, Q. Z. Sheng, L. Yao, S. Dustdar, and A. H. H. Ngu, “CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 367–380, Feb. 2016.
[6] M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, p. 50, 2010.
[7] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” Proc. - 10th IEEE Int. Conf. High Perform. Comput. Commun. HPCC 2008, pp. 5–13, 2008.
[8] S. J. Nirmala, N. Tajunnisha, and S. M. S. Bhanu, “Service provisioning of flexible advance reservation leases in IaaS clouds,” vol. 3, no. 3, pp. 154–162, 2016.
[9] M. Marwan, A. Kartit, and H. Ouahmane, “Secure Cloud-Based Medical Image Storage using Secret Share Scheme,” 2016.
[10] D. V. Dimitrov, “Medical internet of things and big data in healthcare,” Healthc. Inform. Res., vol. 22, no. 3, pp. 156–163, 2016.
[11] J. Li, J. Li, X. Chen, C. Jia, W. Lou, and S. Member, “Identity-based Encryption with Outsourced Revocation in Cloud Computing,” pp. 1–12, 2013.
[12] S. Seo, M. Nabeel, and X. Ding, “An Ef fi cient Certi fi cateless Encryption for Secure Data Sharing in Public Clouds,” pp. 1–14, 2013.
[13] S. Wang, J. Zhou, J. K. Liu, J. Yu, and J. Chen, “An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing,” vol. 6013, no. c, pp. 1–13, 2016.
[14] D. Xu, C. A. I. Fu, G. Li, and D. Zou, “Virtualization of the Encryption Card for Trust Access in Cloud Computing,” vol. 5, 2017.
[15] A. Alabdulatif, H. Kumarage, I. Khalil, M. Atiquzzaman, and X. Yi, “Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure,” IET Wirel. Sens. Syst., vol. 7, no. 6, pp. 182–190, 2017.
[16] J. Li, X. Lin, Y. Zhang, and J. Han, “KSF-OABE : Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage,” vol. 1374, no. c, pp. 1–12, 2016.
[17] L. Jiang, D. Guo, and S. Member, “Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage,” vol. 5, 2017.
[18] C. Liu, S. Member, L. Zhu, J. Chen, and S. Member, “Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud,” vol. 3782, no. c, pp. 1–11, 2017.
[19] C. Song, Y. Park, J. Gao, S. K. Nanduri, and W. Zegers, “Favored Encryption Techniques for Cloud Storage,” pp. 267–274, 2015.
[20] N. Veeraragavan, “Enhanced Encryption Algorithm ( EEA ) for Protecting Users ’ Credentials in Public Cloud.”
[21] P. Xu, S. He, W. Wang, W. Susilo, and H. Jin, “Lightweight Searchable Public-key Encryption for Cloud-assisted Wireless Sensor Networks,” IEEE Trans. Ind. Informatics, vol. XX, no. XX, pp. 1–12, 2017.
[22] K. L. Tsai et al., “Cloud encryption using distributed environmental keys,” Proc. - 2016 10th Int. Conf. Innov. Mob. Internet Serv. Ubiquitous Comput. IMIS 2016, pp. 476–481, 2016.
[23] A. El-yahyaoui, “A verifiable fully homomorphic encryption scheme to secure big data in cloud computing,” 2017.
[24] G. Thomas, “Cloud computing security using encryption technique,” pp. 1–7.
Citation
Gagandeep Kaur, Kiranbir Kaur, "Enhancing Portability and Confidentiality of Data Migration Among Inter Clouds," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.310-315, 2018.