Automated Customer Query Resolver Using Data Mining
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.305-307, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.305307
Abstract
their queries. In this case ,financial as well as human resources are consumed to a greater extent. In order to reduce this problem, there should be an efficient solution. There are some existing technologies which are used by modern enterprise centres. In an enterprise service centre, when the customer places his query, the frequently asked questions are displayed first. If the customer is not satisfied with the solution or if the required content is not available, then the call will be transferred to the enterprise service centre. As the call is placed, the human interaction between the customer and the enterprise service centre will be substantially increased. In this paper, we propose a system which reduces human interaction and provides automation for resolving queries. For this purpose we use the concept of enterprise mobility. Mobility provides exciting opportunities to interact with your customers, partners and suppliers, empower your employees and connect things to your business.
Key-Words / Index Term
Knowledge management service, semantic web, data mining
References
[1] Tang, Min, Bryan Pellom, and Kadri Hacioglu. ”Call-type classification and unsupervised training for the call center domain.” Automatic Speech Recognition and Understanding, 2003. ASRU’03. 2003 IEEE Workshop on. IEEE.
[2] Rasooli, Pooya, and Amir Albadvi. ”Knowledge Management in Call Centres.” Electronic Journal of Knowledge Management 5, no. 3 (2007):323-332.
[3] Ferna´ndez, Alberto, Salvador Garc´ıa, Mar´ıa Jose´ del Jesus, and Francisco Herrera. ”A study of the behaviour of linguistic fuzzy rule based classification systems in the framework of imbalanced data-sets.”Fuzzy Sets and Systems 159, no. 18 (2008): 2378-2398.
[4] Juan Li, Nazia Zaman, Ammar Rayes, Ernesto Custodio”Semantics- enhanced Online Intellectual Capital Mining Service for Enterprise Customer Centers ”2015
[5] Nidhin Thomas, Atharva Joshi, Rishikesh Misal and Dr Manjula R “Data Mining techniques used in software engineering: A Survey” 2016.
[6] https://www.ics.uci.edu/~eppstein/161/960227.html
[7] https://www.geeksforgeeks.org/searching-for-patterns-set-2-kmp-algorithm/
Citation
P.H. Wadekar, B.K.Wani, N.N.Joshi, A.W. Jadhav , "Automated Customer Query Resolver Using Data Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.305-307, 2018.
Cloud Computing Security Techniques for Enhancing Utilization Efficiency
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.308-311, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.308311
Abstract
Cloud computing provides resources or services both in terms of hardware and software using network (typically internet). Physical machines thus can perform operations beyond their capabilities. Cloud provides services including IaaS, PaaS and SaaS. Everything user needs is physically close to them hence extensive use of cloud is on the prospect. As users increases so does security threats. Cloud resources could be the target through application of attacks. Several techniques being suggested and research over to avoid critical consequence of threats. This paper provides comprehensive study of techniques used to enhance security within cloud computing environment. Comparative study also list best possible techniques which can work upon in the future.
Key-Words / Index Term
Cloud, Services, Attacks, Threats
References
[1] N. Wahidah, B. Ab, K. Jenni, S. Mandala, and E. Supriyanto, “Review On Cloud Computing Application In P2P Video Streaming,” Procedia - Procedia Comput. Sci., vol. 50, pp. 185–190, 2015.
[2] J. Aikat, N. Carolina, J. S. Chase, A. Juels, C. Tech, T. Ristenpart, and C. Tech, “Rethinking Security in the Era of Cloud Computing,” no. June, 2017.
[3] B. Nicolae, “BlobCR : Efficient Checkpoint-Restart for HPC Applications on IaaS Clouds using Virtual Disk Image Snapshots.”
[4] C. Pahl and I. Centre, “Containerization and the PaaS Cloud,” 2015.
[5] R. Buyya, “Introduction to the IEEE Transactions on Cloud Computing,” vol. 1, no. 1, pp. 3–21, 2013.
[6] K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015.
[7] J. I. A. You, Z. Zhong, G. Wang, B. O. Ai, and S. Member, “Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors,” vol. 2, 2014.
[8] X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data Access Control for Multiauthority Cloud Storage Systems,” pp. 1–14, 2015.
[9] B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu, T. Qiu, and S. Member, “An Efficient Protocol with Bidirectional Verification for Storage,” vol. 3536, no. c, pp. 1–13, 2016.
[10] F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.
[11] S. Abdelwahab, B. Hamdaoui, M. Guizani, and T. Znati, “R EPLISOM : Disciplined Tiny Memory Replication for Massive IoT Devices in LTE Edge Cloud,” vol. 4662, no. c, 2015.
[12] A. Sharma and S. Sharma, “Credit Based Scheduling Using Deadline in Cloud Computing Environment,” pp. 1588–1594, 2016.
[13] Y. Zhao and S. S. M. Chow, “Updatable Block-Level Message-Locked Encryption,” pp. 449–460, 2017.
[14] P. You, Y. Peng, W. Liu, and S. Xue, “Security Issues and Solutions in Cloud Computing,” 2012.
[15] Z. Xiao, W. Song, and Q. Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1107–1117, Jun. 2013.
[16] C.-N. Yang and J.-B. Lai, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing,” in 2013 International Symposium on Biometrics and Security Technologies, 2013, pp. 259–266.
[17] X. Li, J. Li, and F. Huang, “A secure cloud storage system supporting privacy-preserving fuzzy deduplication,” Soft Comput., Jan. 2015.
[18] S. Guilloteau, F. T. Orange, France, and V. Mauree, “Privacy in Cloud Computing,” Media Informatics, no. March, p. 26, 2012.
[19] T. H. Noor, Q. Z. Sheng, L. Yao, S. Dustdar, and A. H. H. Ngu, “CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 367–380, Feb. 2016.
[20] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” in 2010 IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 253–262.
[21] O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R. Obiedat, M. M. Abu-Faraj, and H. Faris, “Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review,” Commun. Netw., vol. 06, no. 01, pp. 15–21, 2014.
[22] K. Hwang, X. Bai, Y. Shi, M. Li, W.-G. Chen, and Y. Wu, “Cloud Performance Modeling with Benchmark Evaluation of Elastic Scaling Strategies,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 130–143, Jan. 2016.
[23] H. Wang, Z. Kang, and L. Wang, “Performance-Aware Cloud Resource Allocation via Fitness-Enabled Auction,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1160–1173, Apr. 2016.
[24] K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, Sep. 2013.
Citation
Jaya, Kiranbir Kaur, "Cloud Computing Security Techniques for Enhancing Utilization Efficiency," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.308-311, 2018.
Mobile Cloud Computing Reliability Enhancement: A Study Of Existing Techniques Including Shadow Cores
Review Paper | Journal Paper
Vol.6 , Issue.4 , pp.312-316, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.312316
Abstract
As the interest for mobile cloud computing keeps on expanding, cloud specialist organizations confront the overwhelming test to meet the arranged SLA agreements, as far as dependability and convenient .execution, while accomplishing cost and energy efficiency. This paper proposes Shadow Replication, a novel fault-tolerance mechanism for Mobile cloud computing, which flawlessly address fault at scale, while limiting energy utilization and lessening its effect on cost. Energy conservation is achieved by creating dynamic cores rather than static cores. Cores are created by the application of cloudlets. In other words proportionate cores are created. Core failure metrics are considered to be memory capacity, energy and power consumption. In case any of the parameter exceeded threshold value, core is supposed to be faulted and progress is maintained within shadow which is maintained 1 per host. Progress of deteriorated Core is shifted to next core within other VM. In case all the core within VM deteriorated, VM migration is performed. Comparative study of techniques used to establish reliability within MCC is presented for future enhancements in terms of latency, downtime and migration time.
Key-Words / Index Term
Mobile cloud computing, shadow Replication; fault tolerance; Energy Conservation
References
[1] B. Meroufel and G. Belalem, “Adaptive time-based coordinated checkpointing for cloud computing workflows,” Scalable Comput., vol. 15, no. 2, pp. 153–168, 2014.
[2] D. Kliazovich, P. Bouvry, and S. U. Khan, “GreenCloud : A Packet-level Simulator of Energy- aware Cloud Computing Data Centers,” J. Supercomput., vol. 62, no. 3, pp. 1263–1283, 2012.
[3] B. Alami Milani and N. Jafari Navimipour, “A comprehensive review of the data replication techniques in the cloud environments: Major trends and future directions,” J. Netw. Comput. Appl., vol. 64, pp. 229–238, 2016.
[4] R. Balamanigandan, “Analyzing massive machine data maintaining in a cloud computing,” vol. 23, no. 10, pp. 78–81, 2013.
[5] D. Singh, J. Singh, and A. Chhabra, “High availability of clouds: Failover strategies for cloud computing using integrated checkpointing algorithms,” Proc. - Int. Conf. Commun. Syst. Netw. Technol. CSNT 2012, pp. 698–703, 2012.
[6] Y. Zhang, Z. Zheng, and M. R. Lyu, “BFTCloud: A Byzantine Fault Tolerance framework for voluntary-resource cloud computing,” Proc. - 2011 IEEE 4th Int. Conf. Cloud Comput. CLOUD 2011, no. July 2011, pp. 444–451, 2011.
[7] P. K. Szwed, D. Marques, R. M. Buels, S. A. McKee, and M. Schulz, “SimSnap: Fast-forwarding via native execution and application-level checkpointing,” Proc. - Eighth Work. Interact. between Compil. Comput. Archit. INTERACT-8 2004, pp. 65–74, 2004.
[8] K. H. Kim and C. Subbaraman, “A modular implementation model of the Primary-Shadow TMO replication scheme and a testing approach using a real-time environment simulator,” Softw. Reliab. Eng. 1998. Proceedings. Ninth Int. Symp., pp. 247–256, 1998.
[9] K. H. Kim and C. Subbaraman, “An Integration of the Primary-Shadow TMO Replication (PSTR) Scheme with a Supervisor-based Network Surveillance Scheme and its Recovery Time Bound Analysis,” Proc. SRDS ’98 (IEEE CS 17th Symp. Reliab. Distrib. Syst. 1998, pp.168-176., pp. 168–176, 1998.
[10] “chain_declustering.pdf.” .
[11] M. R. Marty and M. D. Hill, “Virtual hierarchies to support server consolidation,” ACM SIGARCH Comput. Archit. News, vol. 35, no. 2, p. 46, 2007.
[12] R. T. Kaushik, “GreenHDFS : Towards An Energy-Conserving , Storage-Efficient , Hybrid Hadoop Compute Cluster,” HotPower, pp. 1–9, 2010.
[13] D. Kliazovich, P. Bouvry, and S. U. Khan, “DENS: Data center energy-efficient network-aware scheduling,” Cluster Comput., vol. 16, no. 1, pp. 65–75, 2013.
[14] Y. Lin and H. Shen, “EAFR: An Energy-Efficient Adaptive File Replication System in Data-Intensive Clusters,” IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 4, pp. 1017–1030, 2017.
[15] J. Liu, F. Zhao, X. Liu, and W. He, “Challenges Towards Elastic Power Management in Internet Data Centers,” 2009 29th IEEE Int. Conf. Distrib. Comput. Syst. Work., pp. 65–72, 2009.
[16] B. Mills, T. Znati, R. Melhem, K. B. Ferreira, and R. E. Grant, “Energy consumption of resilience mechanisms in large scale systems,” Proc. - 2014 22nd Euromicro Int. Conf. Parallel, Distrib. Network-Based Process. PDP 2014, pp. 528–535, 2014.
[17] A. Odlyzko, “Data Networks are Lightly Utilized, and will Stay that Way,” Rev. Netw. Econ., vol. 2, no. 3, pp. 210–237, 2003.
[18] H.-I. Hsiao and D. J. DeWitt, “A performance study of three high availability data replication strategies,” [1991] Proc. First Int. Conf. Parallel Distrib. Inf. Syst., pp. 18–28.
[19] X. Cui, T. Znati, and R. Melhem, “Adaptive and Power-Aware Resilience for Extreme-scale Computing.”
[20] C. S. Shih and T. K. Trieu, “Shadow phone: Context aware device replication for disaster management,” Proc. - 2012 5th IEEE Int. Conf. Serv. Comput. Appl. SOCA 2012, 2012.
[21] K. Akherfi, M. Gerndt, and H. Harroud, “Mobile cloud computing for computation offloading : Issues and challenges,” Appl. Comput. Informatics, 2017.
[22] S. Choi, K. Chung, and H. Yu, “Fault tolerance and QoS scheduling using CAN in mobile social cloud computing,” 2013.
[23] N. M. Dhanya and G. Kousalya, “Adaptive and Secure Application Partitioning for Of fl oading in Mobile Cloud Computing,” vol. 1, pp. 45–53, 2015.
[24] L. A. Tawalbeh, “Mobile Cloud Computing Model and Big Data Analysis for Healthcare,” vol. 3536, no. c, 2016.
[25] C. You, K. Huang, and H. Chae, “Energy Efficient Mobile Cloud Computing Powered by Wireless Energy Transfer,” vol. 8716, no. c, pp. 1–14, 2016.
[26] J. P. D. Comput, B. Javadi, J. Abawajy, and R. Buyya, “Failure-aware resource provisioning for hybrid Cloud infrastructure,” J. Parallel Distrib. Comput., vol. 72, no. 10, pp. 1318–1331, 2012.
[27] S. Zhang, Z. Qian, Z. Luo, J. Wu, and S. Lu, “Burstiness-Aware Resource Reservation for Server Consolidation in Computing Clouds,” vol. 9219, no. c, pp. 1–14, 2015.
[28] F. Doelitzscher, A. Sulistio, C. Reich, H. Kuijs, and D. Wolf, “Private cloud for collaboration and e-Learning services : from IaaS to SaaS,” pp. 23–42, 2011.
Citation
Ramanpreet kaur, Kiranbir kaur, "Mobile Cloud Computing Reliability Enhancement: A Study Of Existing Techniques Including Shadow Cores," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.312-316, 2018.
Amazon Backed File System: A Review
Review Paper | Journal Paper
Vol.6 , Issue.4 , pp.317-321, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.317321
Abstract
Cloud Computing is one of the major emerging IT technologies and is highly promising in terms of resources provisioning, unlimited data storage, remote access to applications, easy data backup amenity etc. One of its emerging platforms is AWS S3. It provides storage for the web. It serves developers/users with easy web-scale computing platform. This platform is reliable, scalable, inexpensive and efficient and provides persistent cloud storage. Amazon S3 and amazon.com share common scalable storage root in terms of their infrastructure. The data here is stored in fundamental containers called buckets. A bucket has the capacity to store limitless data. Infinite objects can be stored in a bucket, with each object being able to store a maximum of 5 TB of data. These objects require a unique developer-assigned key to be stored and retrieved by the developers. The data stored this way can be downloaded any instant of time by any user. Permissions to upload or download data to one’s own bucket can be granted or denied. The web service always keeps the data secure from unauthorized access using its invulnerable authentication mechanism. Various operations can be executed through the API such as Read an object, delete an object, list keys etc. Amazon S3 associates REST and SOAP API interfaces.
Key-Words / Index Term
Cloud Computing, Cloud Storage, Amazon Web Services, Bucket, Folder, File, Hierarchy, Flat File System
References
[1] R. Uhlig et. al., Microsoft Cloud Technology, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
[2] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31- 37), Jan -Feb 2013.
[3] A. Bessani, M. Correia, B. Quaresma, F. Andr´e, and P. Sousa. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. In EuroSys 2011, Apr. 2011.
[4] Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (83-85), Jul -2014, E-ISSN: 2347-2693
[5] N. Zhu, J. Chen, and T.-C. Chiueh. TBBT: Scalable and Accurate Trace Replay for File Server Evaluation. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST), Dec. 2005.
[6] A. Muthitacharoen, R. Morris, T. M. Gil, and B. Chen. Ivy: A Read/Write Peer-to-Peer File System. In Proceedings of the 5th Conference on Symposium on Operating Systems Design and Implementation (OSDI), Dec. 2002.
[7] Omer Y. Adam, Young Choon Lee, and Albert Y. Zomaya, “Constructing Performance-Predictable Clusters with Performance-Varying Resources of Clouds”, 2016.
[8]S. Narula. “CLOUD COMPUTING SECURITY:
AMAZON WEB SERVICE”. 2015 Fifth International Conference on Advanced Computing & Communication Technologies, 2015.
[9]J. Howard, M. Kazar, S. Nichols, D. Nichols, M. Satyanarayanan, R. Sidebotham, and M. West. Scale and Performance in a Distributed File System. ACM Transactions on Computer Systems (TOCS), 6(1):51–81, Feb. 1988.
[10] Jesús Hernández Martin, Ioan Raicu. Performance evaluation of AWS; Exploring storage alternatives in Amazon Web Services. http://datasys.cs.iit.edu/reports/2012_AWS-storage-benchmarks-TR.pdf.
[11] R. Kotla, L. Alvisi, and M. Dahlin. SafeStore: A Durable and Practical Storage System. In Proceedings of the 2007 USENIX Annual Technical Conference, June 2007.
[12] J. Li, M. Krohn, D. Mazi`eres, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proceedings of the 6th Conference on Symposium on Operating Systems Design and Implementation (OSDI), Dec. 2004.
[13] P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud Storage with Minimal Trust. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI), Oct. 2010.
[14] Meiko Jensen, JorgSehwenk et al. “ 2015 Fifth International Conference on Advanced Computing & Communication Technologies, 2015.
[15] Yibin Li, Keke Gai, Longfei Qiu, Meikang Qiu, Hui Zhao, “Intelligent cryptography approach for secure distributed big data storage in cloud computing”, 2017.
[16] Simson L. Garfinkel. An Evaluation of Amazon’s Grid Computing Services: EC2, S3 and SQS. https://dash.harvard.edu/bitstream/handle/1/24829568/tr-08-07.pdf?sequence=1
[17] R. Pike, D. Presotto, S. Dorward, B. Flandrena,
K. Thompson, H. Trickey, and P. Winterbottom. Plan 9
From Bell Labs. USENIX Computing Systems, 8(3):221–254, Summer 1995.
[18] S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST), 2002.
[19] P.Shanthi Bala,” Intensification of Educational Cloud Computing and Crisis of Data Security in Public Clouds”,IJCSE Vol. 02, No. 03, 2010, 741-745.
[21] M. Rosenblum and J. K. Ousterhout. The Design and Implementation of a Log-Structured File System. ACM Transactions on Computer Systems (TOCS), 10(1):26–52, 1992.
[22] C. Ruemmler and J. Wilkes. A trace-driven analysis of disk working set sizes. Technical Report HPL-OSR-93-23, HP Labs, Apr. 1993.
[23] R. Sandberg, D. Goldberg, S. Kleirnan, D. Walsh, and B. Lyon. Design and Implementation of the Sun Network Filesystem. In Proceedings of the Summer USENIX Technical Conference, pages 119–130, 1985.
[24] J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka,and E. Zeidner. Internet Small Computer Systems Interface(iSCSI), Apr. 2004. RFC 3720, http://tools.ietf.org/html/rfc3720.
[25] M. Vrable, S. Savage, and G. M. Voelker. Cumulus:Filesystem Backup to the Cloud. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), Feb. 2009.
Citation
S.Malhotra, V. Bali, "Amazon Backed File System: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.317-321, 2018.
The Blue Brain Technology: Study and Application Review
Review Paper | Journal Paper
Vol.6 , Issue.4 , pp.322-324, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.322324
Abstract
Since the beginning of time the human brain has been the ultimate source for new information and ideas, that needs to be archived which is lost with time. With the advancements in sciences we are able to conduct this by the technology of Blue Brain to convert real mind data into virtual supercomputer memory. In this paper I discuss on the Blue Brain Project and its strategies, requirements, advantages and limitations. Also, further we discuss its future applications in which the technology can be used after further development of this technology.
Key-Words / Index Term
Blue Brain, Supercomputer, Artificial Intelligence,Neurocomputing, Blue Brain Project, Blue Gene Supercomputer
References
[1] GordonM, ShepherdaJason, JS Mirskya, “The Human Brain Project: neuroinformatics tools for integrating, searching and modeling multidisciplinary neuroscience data” Trends in Neuroscience, Volume 21 Issue 11, November 1998.
[2] Joha Johansson C and Lansner A., “Towards cortex sized artificial neural systems. Towards cortex sized artificial neural systems”. Neural Networks, 2007
[3] S. Eilemann, M. Abdellah, N. Antille, A. Bilgili, G. Chevtchenko, R. Dumusc, C. Favreau, J. Hernando, D. Nachbaur, P. Podhajski, J. Villafranca, F. Schürmann. From Big Data to Big Displays High-Performance Visualization at Blue Brain. Springer. 20 October 2017
[4] Henry Markram, “The Human Brain Project”, Scientific American, a division of Nature America, Inc, Vol 306 No. 6, 2012
[5] Nakul Ghimire, Mr. Fahad Iqbal, “Blue Brain”, International Journal of Computer Science and Information Technology Research, Vol 2 Issue 2, April-June 2014.
[6] Sandberg, Anders; Boström, Nick, “Whole Brain Emulation: A Roadmap” 2008.
[7] Henry Markram, “The Blue Brain Project”, 2006.
[8] M. Abdellah, J. Hernando, N. Antille, S. Eilemann, H. Markram, F. Schürmann. Reconstruction and visualization of large-scale volumetric models of neocortical circuits for physically-plausible in silico optical studies. BMC Bioinformatics, 13 September 2017.
Citation
Harsh Ghelani , "The Blue Brain Technology: Study and Application Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.322-324, 2018.
Python as a key for Data Science
Review Paper | Journal Paper
Vol.6 , Issue.4 , pp.325-328, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.325328
Abstract
Data science is the science of studying scientific data, business data and it’s an integration of Artificial Intelligence, statistics, computing technology. Data science is a field that relates to data cleansing, preparation and analysis. Data science algorithms are used in many industries like Internet searches, Digital Advertisements, Travelling, Healthcare, Gaming, Financial services etc. Data science can solve the problems like classification, identifying anomalies, to quantify, finding way of organization, decision making issues etc. In this paper, we have shown how python is useful and acts as a key to solve such problems. In addition to python, there are also some other platforms which are used to solve a task completely based on data science. Here we have focused on python and it’s packages that are highly useful for data science based problems. We have shown how python can be used for data analysis and data visualization.
Key-Words / Index Term
Data Science, Python, Data analysis, Data Visualization
References
[1]. Javin D. West, “The science of data science”, Journal of Integrated creative studies, No. 2016-010-e, May 2016.
[2]. Wes McKinney, “pandas: a Foundational Python Library for DataAnalysis and Statistics”, DLR Portal, www.dlr.de/sc/Portaldata/15/Resources/dokumente/.../pyhpc2011_submission_9.pdf.
[3]. Gaurav, Zunaid Alam, “Road Safety in india using Data Mining Approach”, International Conference, REDSET 2017, CCIS 799, https://doi.org/10.1007/978-981-10-8527-7_17
[4]. Rosa Filguiera, Iraklis Klampanos, Amrey Krause, Mario David, Alexander Moreno and Malcolm Atkinson, “A Python Framework for Data-Intensive Scientific Computing”, IEEE Conference, 978-1-4673-6750-9, Nov-2014.
[5]. Ing. Zdena Dobesova, “Programming Language Python for Data Processing”, IEEE Conference, 978-1-4244-8165-1/11, Sept-2011.
[6]. Fabien Dubosson , Stefano Bromuri, and Michael Schumacher, “A Python Framework for Exhaustive Machine Learning Algorithms and Features Evaluations “, IEEE Conference, 1550-445X/16, March-2016.
[7]. Ankur Bhatia, “Artificial Intelligence – Making an Intelligent personal assistant”, International Journal of Computer Science and Engineering, Vol. 6, No. 6, 2015.
[8]. Nurul Afiqah Mat Zaib , Nor Erne Nazira Bazin , Noorfa Haszlinna Mustaffa , Roselina Sallehuddin, “Integration of System Dynamics with Big Data Using Python: An Overview”, IEEE Conference, 978-1-5090-6255-3/17, May 2017.
Citation
Gaurav, Ritu Sindhu, "Python as a key for Data Science," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.325-328, 2018.
A Novel Approach for Security in Digital Image Processing Using Water Marking: Analysis
Review Paper | Journal Paper
Vol.6 , Issue.4 , pp.329-335, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.329335
Abstract
In this era of digital security, protection and illegal redistribution of digital media has become a major issue. The digital watermarking has been utilized to shield digital data from illicit redistribution and changes. In digital water denoting the image has been upgraded by installing commotion tolerant flag into transporter flag. Encryption procedures used to encode critical information has been inclined to assaults or attacks. Assist examination in encryption yields image encryption instrument as contrasting option to content encryption. The investigation of different system of digital watermarking as image encryption has been done in this paper to examine techniques which are better and can be used in future for enhancement; likewise the commitment of watermarking methods for security purposes has been broke down. The proposed literature provides comparative studies of techniques used in watermarking along with attributes considered including PSNR and MSE for enhancement.
Key-Words / Index Term
Digital Security, Watermarking, Encryption, PSNR MSE
References
[1] X. Pan, B. T. Yan, and K. Niu, “Multiclass detect of current steganographic methods for JPEG format based re-stegnography,” Link: http://www.ws.binghamton.edu/fridrich/Research/single.pdf , Proc. - 2nd IEEE Int. Conf. Adv. Comput. Control. ICACC 2010, vol. 4, no. experiment 1, pp. 79–82, 2010.
[2] R. Gupta and T. P. Singh, “New proposed practice for secure image combing cryptography stegnography and watermarking based on various parameters,” doi: 10.1109/IIH-MSP.2013.134 Proc. 2014 Int. Conf. Contemp. Comput. Informatics, IC3I 2014, pp. 475–479, 2014.
[3] X. Pan, B. Yan, and K. Niu, “Multiclass Detect of Current Steganographic Methods for JPEG Format Based Re-stegnography,”doi: 10.1109/ICCIAS.2006.295451, IEEE Access ,no. experiment 1, pp. 2–5, 2014.
[4] N. Sarani and K. Amudha, “A security technique based on watermarking and encryption for medical image,” doi: 10.1109/ICIIECS.2015.7192934, ICIIECS 2015 - 2015 IEEE Int. Conf. Innov. Information, Embed. Commun. Syst., pp. 3–6, 2015.
[5] M. Mese and P. P. Vaidyanathan, “Optimal histogram modification with MSE metric,” doi:10.1109/ICIIECS.2015.7192934 in 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221), 2001, vol. 3, pp. 1665–1668, 2001.
[6] C. Chang-yanab, Z. Ji-xian, and L. Zheng-jun, “Study on methods of noise reduction in a stripped image,” doi: 10.1109/TGRS.2016.2594080 IEEE Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci., no. 1, pp. 2–5, 2008.
[7] A. Kaur and J. Kaur, “Comparision of Dct and Dwt of Image Compression Techniques,” Doi: 10.1109/IPAS.2016.7880068 vol. 1, no. 4, pp. 49–52, 2012.
[8] K. Saranya and A. Professor-i, “Modern Applications of QR-Code for Security,” DOI: 10.1109/ICETECH.2016.7569235 no 2. March, pp. 1–5, 2016.
[9] V. Saravanan and A. Neeraja, “Security issues in computer networks and stegnography,” DOI: 10.1109/ISCO.2013.75696 7th Int. Conf. Intell. Syst. Control. ISCO 2013, pp. 363–366, 2013.
[10] A. U. Islam, F. Khalid, M. Shah, Z. Khan, T. Mahmood, A. Khan, U. Ali, and M. Naeem, “An improved image steganography technique based on MSB using bit differencing,” DOI: 10.1109/INTECH.2017.6935,2016 6th Int. Conf. Innov. Comput. Technol. INTECH 2016, pp. 265–269, 2017.
[11] T. Bathinda, “Invisible Video Multiple Watermarking Using Optimized Techniques,” doi: 10.1129/IEEE.2016.7929 IEEE Access vol. 3, pp. 1665–1668, 2016.
[12] S. S. Gonge, “An Integration of SVD Digital Image Watermarking with AES Technique for Copyright Protection and Security of Bank Cheque Image,”DOI: 10.12109/IEEE.2016.192934, IEEE pp. 769–778, 2016.
[13] P. Peng and I. S. Member, “Efficient Face Verification in Mobile Environment Using Component-based PCA,” doi: 10.12023/CISP.2013.71934no.3 Cisp, pp. 753–757, 2013.
[14] V. Ponomaryov, “Computer-aided detection system based on PCA/SVM for diagnosis of breast cancer lesions,” doi: 10.1102/CCEEEC.2015.12304,2015 Chil. Conf. Electr. Electron. Eng. Inf. Commun. Technol., pp. 429–436, 2015.
[15] M. Sajid, Q. Khizrai, and P. S. T. Bodkhe, “Image Encryption using Different Techniques for High Security Transmission over a Network,”DOI: 10.1209/IEEE.2014.34294 IEEE access vol. 2, no. 4, 2014.
[16] T. Zhang, Y. Zhou, and C. L. P. Chen, “A new combined chaotic system for image encryption,” doi: 10.1109/CSAE.2012.45923342,CSAE 2012 - Proceedings, 2012 IEEE Int. Conf. Comput. Sci. Autom. Eng., vol. 2, no. 2, pp. 331–335, 2012.
[17] A. Elsayed, A. Elleithy, P. Thunga, and Z. Wu, “Highly secure image steganography algorithm using curvelet transform and DCT encryption,” DOI: 10.1109/IEEE.2015.3429342015 IEEE Long Isl. Syst. Appl. Technol. Conf. LISAT 2015, pp. 2–7, 2015.
[18] Y. Zhou, K. Panetta, and S. Agaian, “Image encryption using binary key-images,” DOI: 10.1119/IEEE.2009.5602934 2009 IEEE Int. Conf. Syst. Man Cybern., no. October, pp. 4569–4574, 2009.
[19] xiaolin wu, B. Zhu, Y. Hu, and Y. Ran, “A novel colour image encryption scheme using rectangular transform-enhanced chaotic tent maps,” DOI: 10.1219/IEEE.2017.100986,IEEE Access, vol. 3536, no. c, pp. 1–1, 2017.
[20] A. Belazi, A. A. Abd El-Latif, and S. Belghith, “A novel image encryption scheme based on substitution-permutation network and chaos,”DOI: 10.23109/IEEE.2015.7192934,IEEE Signal Processing, vol. 128, pp. 155–170, 2016.
[21] M. Sandilya and M. Chawla, “Spatial Domain Image Steganography based on Security and Randomization,” DOI:11.4564/IEEE.2014.674934IEEE ACCESSvol. 5, no. 1, pp. 156–159, 2014.
[22] Z. Beiji and M. Y. Abdullah, “Information Security Technique in Frequency Domain,”, DOI: 10.5673/IACS.2011.234094 IEEE ACCESS vol. 5, no. December, pp. 279–289, 2011.
[23] M. Mofarreh-bonab, “Image Encryption by PCA,”DOI: 10.2239/IEEEOCS.2015.543623 IEEE OPEN ACCESS vol. 3, no. 3, pp. 28–30, 2015.
Citation
Prabhpreet Kaur, Sonali Kanotra, "A Novel Approach for Security in Digital Image Processing Using Water Marking: Analysis," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.329-335, 2018.
DATA MIGRATION TECHNQIUES WITHIN CLOUD COMPUTING: A COMPREHENSSIVE ANALYSIS
Review Paper | Journal Paper
Vol.6 , Issue.4 , pp.336-340, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.336340
Abstract
Cloud computing is becoming need of the hour for providing resources at pay per use to users. Data migration is the mechanism of transferring data to cloud where it is stored in virtual environment. It is key consideration behind the active data migration process where users storage is preserved. Up gradation or consolidation is accomplished within cloud using the application of data migration. During migration process, parameters are required to be validated. These parameters involve downtime and migration time. As the migration is finished, organization validates the transfer process statistically. The accuracy of data migration process is also questioned by the organization. in case accuracy is low migration is rejected. Data and pre-processing and cleaning facilities improve data quality via removal of unnecessary or repeated data. This paper presents the distinct data migration techniques within cloud used to transfer Users data to data centers for effectively storing and servicing the user. Techniques presented are compared comprehensively for future enhancements.
Key-Words / Index Term
Data migration, techniques, downtime, migration time, accuracy
References
[1] S. Asif, R. Shah, A. H. Jaikar, and S. Noh, “A Performance Analysis of Precopy , Postcopy and Hybrid Live VM Migration Algorithms in Scientific Cloud Computing Environment,” pp. 229–236, 2015.
[2] H. Wang, Z. Kang, and L. Wang, “Performance-Aware Cloud Resource Allocation via Fitness-Enabled Auction,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1160–1173, Apr. 2016.
[3] T. Chalermarrewong, T. Achalakul, and S. C. W. See, “The Design of a Fault Management Framework for Cloud,” 2012 9th Int. Conf. Electr. Eng. Comput. Telecommun. Inf. Technol., pp. 1–4, 2012.
[4] I. P. Egwutuoha, S. Cheny, D. Levy, B. Selic, and R. Calvo, “Energy efficient fault tolerance for high performance computing (HPC) in the cloud,” IEEE Int. Conf. Cloud Comput. CLOUD, pp. 762–769, 2013.
[5] J. Guitart, M. Macias, K. Djemame, T. Kirkham, M. Jiang, and D. Armstrong, “Risk-driven proactive fault-tolerant operation of IaaS providers,” Proc. Int. Conf. Cloud Comput. Technol. Sci. CloudCom, vol. 1, pp. 427–432, 2013.
[6] C. Pahl and I. Centre, “Containerization and the PaaS Cloud,” 2015.
[7] F. Doelitzscher, A. Sulistio, C. Reich, H. Kuijs, and D. Wolf, “Private cloud for collaboration and e-Learning services : from IaaS to SaaS,” pp. 23–42, 2011.
[8] M. E. M. Diouri, O. Gl??ck, and L. Lef??vre, “Towards a novel smart and energy-aware service-oriented manager for extreme-scale applications,” 2012 Int. Green Comput. Conf. IGCC 2012, 2012.
[9] and R. B. Liu, Jialei, S. Wang, Ao Zhou, S.A P Kumar, “Using Proactive Fault - Tolerance Approach to Enhance Cloud Service Reliability,” IEEE Trans. Cloud Comput., pp. 1–13, 2016.
[10] M. S. Bruneo, Dario, S. Distefano, F. Longo, A. Puliafito, “Workload-based software rejuvenation in cloud systems.,” vol. 62, no. 6, pp. 1072–1085.
[11] and J. T. L. Silva, J. Alonso, “Using Virtualization to Improve Software Rejuvenation,” IEEE Trans. Comput., vol. 58, no. 11, pp. 1525–1538, 2009.
[12] P. Gupta and S. Banga, “Topic - Review of Cloud Computing in Fault Tolerant Environment With Efficient Energy Consumption,” vol. 1, no. 4, pp. 251–254, 2013.
[13] A. Kumar, “An Efficient Ch heckpointing Approach h for Fault Tolerance in Tim me Critical Systems wi ith Energy Minimization,” pp. 704–707, 2015.
[14] R. Baldoni, J. M. Hélary, A. Mostefaoui, and M. Raynal, “On modeling consistent checkpoints and the domino effect in distributed systems,” Rapp. Rech. Natl. Rech. En Inform. En Autom., 1995.
[15] M. Salehi, M. K. Tavana, S. Rehman, S. Member, M. Shafique, and A. Ejlali, “Two-State Checkpointing for Energy-Efficient Fault Tolerance in Hard Real-Time Systems,” pp. 1–12, 2016.
[16] W. Lang, J. M. Patel, and J. F. Naughton, “On energy management, load balancing and replication,” ACM SIGMOD Rec., vol. 38, no. 4, p. 35, 2010.
[17] J. Zhao, K. Yang, X. Wei, Y. Ding, L. Hu, and G. Xu, “A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 305–316, Feb. 2016.
[18] F. Ma, F. Liu, and Z. Liu, “Live Virtual Machine Migration based on Improved Pre-copy Approach,” pp. 230–233, 2010.
[19] Y. Zhong, J. Xu, Q. Li, H. Zhang, and F. Liu, “Memory State Transfer Optimization for Pre-copy based Live VM Migration,” pp. 290–293, 2014.
[20] D. Kapil, E. S. Pilli, and R. C. Joshi, “Live virtual machine migration techniques: Survey and research challenges,” in 2013 3rd IEEE International Advance Computing Conference (IACC), 2013, pp. 963–969.
[21] M. R. Desai, “Efficient Virtual Machine Migration in Cloud Computing,” no. Vm, pp. 1015–1019, 2015.
[22] Y. Liu and W. Wei, “A Replication-Based Mechanism for Fault Tolerance in MapReduce Framework,” Math. Probl. Eng., vol. 2015, 2015.
[23] A. Elghirani, R. Subrata, A. Y. Zomaya, and A. Al Mazari, “Performance enhancement through hybrid replication and genetic algorithm co-scheduling in data grids,” AICCSA 08 - 6th IEEE/ACS Int. Conf. Comput. Syst. Appl., pp. 436–443, 2008.
[24] D. Jung, S. Chin, K. S. Chung, and H. Yu, “VM Migration for Fault Tolerance in Spot Instance Based Cloud Computing,” pp. 142–151, 2013.
[25] A. Gupta, U. Mandal, P. Chowdhury, M. Tornatore, and B. Mukherjee, “Cost-Efficient Live VM Migration Based on Varying Electricity Cost in Optical Cloud Networks,” pp. 4–6, 2014.
[26] S. Rajput and A. C. Computing, “International Journal of Advanced Research in Computer Science and Software Engineering Live-VM Migration Policies , Attacks & Security – A Survey,” vol. 4, no. 2, pp. 366–373, 2014.
[27] Z. Li, “Optimizing VM Live Migration Strategy Based On Migration Time Cost Modeling,” pp. 99–109, 2016.
[28] V. Verroios and M. Roussopoulos, “Time-Constrained Live VM Migration in Share-Nothing IaaS -Clouds,” 2014.
[29] S. Zhang, Z. Qian, Z. Luo, J. Wu, and S. Lu, “Burstiness-Aware Resource Reservation for Server Consolidation in Computing Clouds,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 964–977, Apr. 2016.
Citation
Kiranbir kaur, Harpreet kumari, "DATA MIGRATION TECHNQIUES WITHIN CLOUD COMPUTING: A COMPREHENSSIVE ANALYSIS," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.336-340, 2018.
Implementation and Analysis of the Performance of EDTA (Enhanced Decision Tree Data Mining Algorithm) for diagnosis of Angioplasty and Stents for Heart Disease Treatment
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.541-543, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.541543
Abstract
Data mining is a process of extraction of useful information and patterns from huge data. It is also called as knowledge discovery process, knowledge mining from data, knowledge extraction or data pattern analysis. We present a improved approach to support nearest neighbor queries from mobile hosts by leveraging the sharing capabilities of wireless ad-hoc networks. We illustrate how previous query results cached in the local storage of neighboring mobile peers can be leveraged to either fully or partially compute and verify spatial queries at a local host. The feasibility and appeal of our technique is illustrated through extensive simulation results that indicate a considerable reduction of the query load on the remote database.
Key-Words / Index Term
Mobile Services, CART, C45, EDTA
References
[1] Xiang Lian, Student Member, IEEE, and Lei Chen, Member, IEEE, “Ranked Query Processing in Uncertain Databases”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 22, NO.3, MARCH 2010.
[2] Stavroula G. Mougiakakou, Member, IEEE, “SMARTDIAB: A Communication and Information Technology Approach for the Intelligent Monitoring, Management and ollow-up of Type 1 Diabetes Patients”, IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 14, NO. 3, MAY 2010.
[3] Eric Hsueh-Chan Lu, Vincent S. Tseng, Member, IEEE, “Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments” , IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 23, NO. 6, JUNE 2011.
[4] Mark N. Gasson, EleniKosta, Denis Royer, Martin Meints, and Kevin Warwick, “Normality Mining: Privacy Implications of Behavioral Profiles Drawn From GPS Enabled Mobile Phones”, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 41, NO. 2, MARCH 2011.
[5] Tzung-Shi Chen, Member, IEEE, Yen-Ssu Chou, and Tzung-Cheng Chen, “Mining User Movement Behavior Patterns in a Mobile Service Environment”, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 42, NO. 1, JANUARY 2012.
[6] R.Agrawal, T. Imielinski, and A. Swami, “Mining Associationsbetween Sets of Items in Massive Databases,” Proc. ACMSIGMOD, pp. 207-216, May 1993.
[7] R.Agrawal and J. Shafer, “Parallel Mining of Association Rules,”IEEE Trans. Knowledge and Data Eng, vol. 8, no. 6, pp. 866-883, Dec.1996.
[8] R.Agrawal and R. Srikant, “Mining Sequential Patterns,” Proc.11th Int’l Conf. Data Eng., pp. 3-14, Mar. 1995.
Citation
Amarjeet Kaur, Ashok Jetawat2, Gurpreet Singh, "Implementation and Analysis of the Performance of EDTA (Enhanced Decision Tree Data Mining Algorithm) for diagnosis of Angioplasty and Stents for Heart Disease Treatment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.541-543, 2018.
Intruder Attack Detection In Data Network Organization Using Data Mining Techniques
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.544-549, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.544549
Abstract
Networked data contain interconnected entities for which inferences are to be made. For example, web pages are interconnected by hyperlinks, research papers are associated by references, phone accounts are linked by calls, conceivable terrorists are linked by communications. Networks have turned out to be ubiquitous. Correspondence networks, financial transaction networks, networks portraying physical systems, and social networks are all ending up noticeably progressively important in our everyday life. Regularly, we are interested in models of how nodes in the system influence each other (for example, who taints whom in an epidemiological system), models for predicting an attribute of intrigue in light of observed attributes of objects in the system. The technique of SVM is applied which will classify the data into malicious and non-malicious. To increase the accuracy of classification technique Knn classier is applied which increase accuracy, execution time.
Key-Words / Index Term
Data network, attacks, data mining,, IDS/IPS machine learning
References
[1] G. Zhang, B. E. Patuwo, and M. Y. Hu, “Forecasting with artificial neural networks: The state of the art,” International journal of forecasting, Vol.14(1), pp. 35-62. 1998
[2] L. M. Manevitz, and M. Yousef, “One-class SVMs for document classification,” Journal of machine Learning research, Vol. 2, pp. 139- 154, 2002
[3] B. Schölkopf, and A. J. Smola, “Learning with kernels: support vector machines, regularization, optimization, and beyond,” MIT press, USA, 2002
[4] C. T. Lin, C. M. Yeh, S. F. Liang, J. F. Chung, and N. Kumar, “Supportvector- based fuzzy neural network for pattern classification,” IEEE Trans Fuzzy Systems, Vol.14(1), pp. 31-41, 2006
[5] MF. Amin and K. Murase, “Single-layered complex-valued neural network for real-valued classification problems,” Neurocomputing 72, January 2009, pp. 945-955
[6] Doris Hooi-Ten Wong & Selvakumar Manickam, “Intelligent Expertise Classification Approach: An Innovative Artificial Intelligence Approach To Accelerate Network Data Visualization”, 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE)
[7] C. S. Dangare, and S. S. Apte, “Improved study of heart disease prediction system using data mining classification techniques,” International Journal of Computer Applications, Vol. 47(10), pp. 44-48, 2012
[8] HY. Huang, YJ. Lin, YS. Chen and HY. Lu, “Imbalanced data classification using random subspace method and SMOTE,” 2012 Joint 6th International Conference on Soft Computing and Intelligent Systems (SCIS) and 13th International Symposium on Advanced Intelligent Systems (ISIS) , November 2012, pp.817-820
[9] R. O. Duda, P. E. Hart, and D. G. Stork, “Pattern classification”, John Wiley & Sons, Canada, 2012
[10] AR. Hafiz, AA. Yarub, MF. Amin, and K. Murase, “Classification of Skeletal Wireframe Representation of Hand Gesture using Complex- Valued Neural Network,” Neural Processing Letters 42(3), December 2015, pp.649-664
[11] Pedro Amaral, et.al, “Machine Learning in Software Defined Networks: Data Collection and Traffic Classification”, 2016
[12] Pedro Amaral, Joao Dinis, Paulo Pinto, Luis Bernardo, Joao Tavares, Henrique S. Mamede, “Machine Learning in Software Defined Networks: Data Collection and Traffic Classification”, 2016, IEEE 24th International Conference on Network Protocols (ICNP), Workshop on Machine Learning in Computer Networks (NetworkML 2016)
[13] Zhizhong Kang, Juntao Yang, and Ruofei Zhong, “A Bayesian-Network-Based Classification Method Integrating Airborne LiDAR Data With Optical Images”, 2016, IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING
[14] Sahan L. Maldeniya, Ajantha S. Atukorale, Wathsala W. Vithanage, “Network Data Classification Using Graph Partition”, 2013, IEEE.
[15] Nikola K. Kasabov, Maryam Gholami Doborjeh, and Zohreh Gholami Doborjeh, “Mapping, Learning, Visualization, Classification, and Understanding of fMRI Data in the NeuCube Evolving Spatiotemporal Data Machine of Spiking Neural Networks”, 2016, IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS
[16] Kentarou Matsuda, Kazuyuki Murase, “Single-layered Complex-valued Neural Network with SMOTE for Imbalanced Data Classification”, 2016, Joint 8th International Conference on Soft Computing and Intelligent Systems
[17] Parisa Naraei, Abdolreza Abhari, Alireza Sadeghian, “Application of Multilayer Perceptron Neural Networks and Support Vector Machines in Classification of Healthcare Data”, FTC 2016 - Future Technologies Conference
[18] Joseph D. Prusa, Taghi M. Khoshgoftaar, “Designing a Better Data Representation for Deep Neural Networks and Text Classification”, 2016 IEEE 17th International Conference on Information Reuse and Integration
[19] Lorenzo A. Rossi, Bhaskar Krishnamachari and C.-C. Jay Kuo, “Energy Efficient Data Collection via Supervised In-Network Classification of Sensor Data”, 2016, International Conference on Distributed Computing in Sensor Systems
[20] Justin Salamon and Juan Pablo Bello, “Deep Convolutional Neural Networks and Data Augmentation for Environmental Sound Classification”, 2016, IEEE
[21] Bambang Sugiarto, Rika Sustika, “Data Classification for Air Quality on Wireless Sensor Network Monitoring System Using Decision Tree Algorithm”, 2016, 2nd International Conference on Science and Technology-Computer (ICST)
[22] Balasaheb Tarle, Sudarson Jena, “Improved Artificial Neural Network For Dimension Reduction In Medical Data Classification”, 2016, IEEE
[23] Ran Zhang, Lifeng Wu, Xiaohui Fu and Beibei Yao, “Classification of Bearing Data Based on Deep Belief Networks”, 2016, IEEE
[24] Yinfeng Zhao, Lei Li, “Link Prediction-based Multi-label Classification on Networked Data”, 2016, IEEE First International Conference on Data Science in Cyberspace
[25] Saptarshi Rudra, Soham Mitra, Soumyajit Das, Abhisek Roy, Shibasis Guha, “Gender Classification System from Offline Survey Data Using Neural Networks”, 2016, IEEE
[26] Joao Roberto Bertini Junior, Maria do Carmo Nicoletti, “Functionally Expanded Streaming Data as Input to Classification Processes Using Ensembles of Constructive Neural Networks”, 2016, IEEE
[27] Arun Manicka Raja M., Swamynathan S., “ENSEMBLE LEARNING FOR NETWORK DATA STREAM CLASSIFICATION USING SIMILARITY AND ONLINE GENETIC ALGORITHM CLASSIFIERS”, 2016 Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI)
Citation
Renu Dewli, Anubhooti Papola, "Intruder Attack Detection In Data Network Organization Using Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.544-549, 2018.