An Effective Feature Extraction through Fourgram Scheme for Long Payloads in Network Intrusion Detection Systems
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.296-303, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.296303
Abstract
Now a day’s security is very global issue in Network based systems. The rate of cyber terrorism has increased day by day and it put national security under risk. In addition, network attacks have caused several damages to different sectors (i.e., individuals, economy, enterprises, organizations, and governments). Network Intrusion Detection Systems are giving the solutions against these attacks. NIDS always need to improve their performance in terms of increasing the accuracy and decreasing false alarm rates. Feature selection gives the ranking to the data set attributes and it can help for selecting the most important features from the entire set of data. In the previous researches feature selection selects the irrelevant and redundant features. These are causes of increasing the processing speed and time. An efficient feature selection method eliminates dimension of data and decrease redundancy and ambiguity. In the present network intrusion detection systems working with the long payload features are not easy tasks because many machine learning algorithms can’t handle these long payload features. Some of the Network Intrusion Detection Systems are not process these long payload features. To solve this problem, a new methodology called feature extraction through Fourgram technique has been proposed. The long payload features are processed these proposed technique and prepared to be implemented in machine learning algorithms and the results were carried out on ISCX 2012 data set. The designed feature selection system has shown a very good improvement on the performance using different metrics like Accuracy, F- Measure etc.
Key-Words / Index Term
NIDS,Feature Extraction,Fourgram Scheme, Long Payload Features, Dataset, Dictionary Building
References
[1] TarfaHamed, Rozita Dara, Stefan C. Kremer, Network intrusion detection system based on recursive feature addition and bigram technique, International journal of computers & security, Vol. 73, pp.137–155, 2018.
[2] Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA, “Toward developing a systematic approach to generate benchmark datasets for intrusion detection”, International journal of Computer Security, Vol.3,No.31,pp.357-374,2012.
[3] Garcia LP, de Carvalho AC, Lorena AC, “Effect of label noise in the complexity of classification problems”,International journal of Neurocomputing”, Vol.19,No.16,pp.108-119,2015.
[4] Beigi EB, Jazi HH, Stakhanova N, Ghorbani AA,“Towards effective feature selection in machine learningbased bonnet detection approaches”, In the proceedings of the 2014 IEEE conference on Communications and Network Security,pp.247–255, 2014.
[5] Bolon-Canedo V, Snchez-Maroo N, Alonso-Betanzos A, Bentez J, Herrera F, “A review of microarray datasets and applied feature selection methods”, International journal of Information Sciences”,Vol.5,No.42,pp.111-135,2014.
[6] Beniwal S, Arora J, “Classification and feature selection techniques in data mining”, International journal of engineering and Research and technology, Vol.1, No.6, pp.1-6, 2012.
[7] Fahad A, Tari Z, Khalil I, Habib I, Alnuweiri H, “Toward an efficient and scalable feature selection approach for internet traffic classification”, International journal of Computer Networks”,Vol.9.No.57,pp.2040-2057,2013.
[8] Aghdam MH, Kabiri P, “Feature selection for intrusion detection system using ant colony optimization”, International journal of network security, Vol.3, No.18, pp.420-432, 2016.
[9] Bolón-Canedo V, Sánchez-Maroño N, Alonso-Betanzos, “A review of feature selection methods on synthetic data”, International journal of information systems, Vol.3, No. 34, pp.483-519, 2013.
[10] Sahu SK, Sarangi S, Jena SK, “A detail analysis on intrusion detection datasets”In the proceedings of the 2014 IEEE International conference on Advance Computing Conference (IACC), pp.1348-1353, 2014.
[11] Mancini LV, Di Pietro R, “Intrusion Detection Systems”, International journal of Springer, Vol.5, No.9,pp.513-524, 2008.
[12] Ambusaidi MA, He X, Nanda P, Tan Z, “Building an intrusion detection system using a filter-based feature selection algorithm”, International journal of Computer science and applications, Vol.10, No.65, pp.2986-2998, 2016.
[13] Abou El Kalam A., Gad El Rab M., and Deswarte Y, “A model-driven approach for experimental evaluation of intrusion detection systems, International journal of Security Communication Networks, Vol.7, No.14, pp.1955–1973, 2014.
[14] Mell P, Hu V, Lipmann R, Haines J, Zissman M, “An overview of issues in testing intrusion detection systems”, Technical Report, NIST IR 7007, National Institute of Standard and Technology, USA, 2003.
[15] NiccolòCascarano, Luigi Ciminiera, FulvioRisso, “Improving cost and accuracy of DPI traffic classifiers”, In Proceedings of the ACM Symposium on Applied Computing (SAC `10) ACM, New York, NY, USA, pp.641-646, 2010.
[16] Laurent Bernaille , Renata Teixeira , Ismael Akodkenou,Augustin Soule , KaveSalamatian, “Traffic classification on the fly”, Journal of ACM SIGCOMM Computer Communications, Vol.36, No.2, pp.145-158, 2006.
[17] Zhang M, Wang L, Jajodia S, Singhal A, Albanese M, “Networkdiversity: a security metric for evaluating the resilience ofnetworks against zero-day attacks”, International journal of transformation of information science Vol.5, No.11, pp.1071–1086, 2016.
[18] Chang C-C, Lin C-J. LIB, “SVM: a library for support vector machines”, International journal of Intelligent System Technologies, Vol.3, No.2, pp.215-226, 2011.
Citation
Abdul Rustum Ali, K N Brahmaji Rao, "An Effective Feature Extraction through Fourgram Scheme for Long Payloads in Network Intrusion Detection Systems," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.296-303, 2018.
COMPARISON OF ENCRYPTION ALGORITHMS ON NoSQL DATABASES
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.304-311, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.304311
Abstract
Security has become one of the key features of data transmission on large databases. Sensible data that are available in the form of documents or unstructured format must be shared among the users in a confidential manner. NoSQL databases are nowadays popular in handling the unstructured data that are available as open source databases such as MongoDB, Cassandra, Redis etc. This paper make a detailed study on the encryption techniques of NoSQL databases especially MongoDB which becomes popular in data management. Since encryption features are not applied on handling the data in MongoDB, the various encryption techniques proposed on securing the sensitive data at rest and at transit are compared based on different encryption algorithms.
Key-Words / Index Term
Data Security, NoSQL, MongoDB Encryption, encryption at rest, encryption at transit
References
[1]. P.R.Hariharan & Dr. K.P. Thooyamani , Various Schemes for Database Encryption - A Survey”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 (2017) pp. 8763-8767, Research India Publications.
[2]. Jef Van Loon, Prof. Dr. C-C. Kanne, Ch. Sturm, “Database Security - Concepts, Approaches”, Article in IEEE Transactions on Dependable and Secure Computing • Seminar in Database Systems, University of Zurich, Department of Informatics, Autumn Term 2008, DOI: 10.1109/TDSC.2005.9 • Source: IEEE Xplore.
[3]. Mubina Malik and Trisha Patel, “DATABASE SECURITY - ATTACKS AND CONTROL METHODS”, International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016.
[4]. S. Priyadharshini, R. Rajmohan, “Analysis on Database Security Model Against NOSQL Injection”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT | Volume 2 | Issue 2 | ISSN : 2456-3307
[5]. Suna Yin, Dehua Chen, Jiajin Le,China, 2016 IEEE,"STNOSQL Creating NOSQL Database on the SensibleThings Platform.
[6]. Boyu Hou, Kai Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu, USA, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing ,"Mongo Database NOSQL Injection Analysis and Detection".
[7]. Anil Kumar, Harsha H L, B. Swaroop Reddy, K.Sunil Kumar Reddy, Krishna N, “Homomorphic Encrypted MongoDB for Users Data Security”, International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 5, Issue 6, June 2018.
[8]. https://en.wikipedia.org/wiki/Paillier_cryptosystem M.W. Grim, A.T. Wiersma, F. Turkmen, “Security and Performance Analysis of Encrypted NoSQL Databases”, February 12, 2017.
[9]. Alves, Pedro. A framework for searching encrypted databases. In Anais do XVI Simpsio Brasileiro em Segurana da Informao e de Sistemas Computacionais (SBSeg 2016), 2016.
[10]. Brian F Cooper, Adam Silberstein, Erwin Tam, Raghu Ramakrishnan, and Russell Sears. “Benchmarking cloud serving systems with YCSB”, In Proceedings of the 1st ACM symposium on Cloud computing, pages 143{154. ACM, 2010.
[11]. At-test encryption in MongoDB 3.2: features and performance. https://www.mongodb.com /blog/post/at-rest-encryption-in-mongodb-3-2-features-and-performance.Accessed: 2017-01-23.
[12]. Vidushi Jain, Aviral Upadhyay, , “MongoDB and NoSQL Databases”,International Journal of Computer Applications (0975 – 8887) Volume 167 – No.10, June 2017
[13]. Zhu Wei-ping, Li Ming-xin- Using MongoDB to Implement Textbook Management System instead of MySQL IEEE2011
[14]. Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov - Security Issues in NoSQL Databases IEEE2011
[15]. Tianyu Jia, Xiaomeng Zhao, Zheng Wang, Dahan Gong and Guiguang Ding - Model Transformation and Data Migration from Relational Database to MongoDB IEEE 2016.
[16]. Charmi Pariawala, and Ravi Sheth,” Encrypting Data of MongoDB at Application Level”, Advances in Computational Sciences and Technology, Volume 10, Number 5 (2017) pp. 1199-1205
[17]. Karan Patel, Kirti Sharma, Mosin Hasan. “Encrypting MongoDB Data using Application Level Interface”. Discovery, 2015, 46(214), 164-169
[18]. Anand Shende1, Omkar Gurav2, Swapnil Shirode3, Piyush Govekar 4, S.N.Zaware 5, “Secure Unique Identification using Encrypted Storage in NoSQL Database”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 4, April 2016
[19]. Hanan A. Al-Souly, Abeer S. Al-Sheddi, Heba A. Kurdi;Fast, Lightweight Symmetric Encryption Algorithm for Secure Database. (IJACSA) International Journal of Advanced Computer Science and Applications, Special Issue on Extended Papers from Science and Information Conference 2013.
[20]. https://docs.mongodb.com/manual/core/security-encryption-at-rest.
Citation
P. Rajesh Kannan, R. Mala, "COMPARISON OF ENCRYPTION ALGORITHMS ON NoSQL DATABASES," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.304-311, 2018.
Fast and Effective Method for the Detection of Brain Tumor using Chebyshev Harmonic Fourier Moments
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.312-316, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.312316
Abstract
Brain tumor is a serious type of disorder which is caused by the abnormal cells formation within the brain. The identification of brain tumor and further analysis from the Magnetic Resonance Imaging (MRI) is a vigorous process and in this paper fast and effective method is used for the tumor detection by using Chebyshev Harmonic Fourier Moments (CHFMs) on segmented magnetic resonance brain images. The proposed method is free from any overflow situations as it does not involve any factorial term and also free from underflow situations as no power terms are involved. Before the segmentation process, the feature set is extracted by using 2D Continuous Wavelet Transform (2D-CWT). Asymmetry in the MR brain image is analyzed by using CHFMs on each of the tissues segmented in the head. Once the presence of asymmetry is confirmed, it leads us to the diagnosis of the tumor. After the presence of tumor, the region of tumor is extracted by using Polar Harmonic Transforms (PHTs) as these transforms are found to be good descriptors in the field of image analysis and impose less computational complexity due to the absence of any factorial term in the calculation of radial kernels. The effectiveness of the proposed method is analyzed by doing experiments on 35 MR brain images with tumor and 65 normal MR brain images. It is observed that that the proposed method and technique is successful in 97% cases.
Key-Words / Index Term
Tumor detection, Chebyshev Harmonic Fourier Moments, Polar Harmonic Transforms, Segmentation
References
[1] M. R. Teague, “Image analysis via the general theory of moments,” Journal of the Optical Society of America, vol. 70, pp. 920-930, 1980.
[2] A. B. Bhatia and E. Wolf, “On the circle polynomials of Zernike and related orthogonal sets,” Proc. of the Cambridge Philosophical Society, vol. 50, pp. 40-48, 1954.
[3] Y. Sheng and L. Shen, “Orthogonal Fourier Mellin moments for invariant pattern recognition,” J. Opt. Soc. Am. A, vol. 11, Issue 6, pp. 1748-1757, 1994.
[4] R. Upneja and C. Singh, “Fast computation of Jacobi-Fourier moments for invariant image recognition,” Pattern Recognition, vol. 48, Issue 5, pp. 1836-1843, 2015.
[5] Y. Jiang, Z. Ping, and L. Gao, “A fast algorithm for computing Chebyshev-Fourier moments,” Proc. 2010 International Conference on Future Information Technology and Management Engineering (FITME), pp. 425 – 428, 9-10, 2010.
[6] Z. Dokur, and T. Olmez, “Classification of Magnetic Resonance Images using a novel neural network”, Proceedings of the IEEE-EMBS Asia Pacific conference on biomedical engineering, pp. 242-243, 2000.
[7] W. Qian, L. Li, and P. Clarke, “Image feature extraction for mass detection in digital mammography: Influence of wavelet analysis”, Medical Physics, vol. 26, Issue 3, pp. 402-408, 1999.
[8] E.J. Feleppa, A. Kalisz, J.B.S. Melgar, and F.L. Lizzi, “Typing of Prostate Tissue by Ultrasonic Spectrum Analysis”, IEEE Transactions on Ultrasonics, ferroelectrics, and frequency control, vol. 43, Issue 4, pp. 609-619, 1996.
[9] A. Jose, S. Ravi, and M. Sambath, “Brain Tumor Segmentation Using K-Means Clustering and Fuzzy C-Means Algorithms and Its Area Calculation”, International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, pp. 3496-3501, 2014.
[10] E.A. Maksaud, M. Emlogy, R. Al-Awadi, “Brain Tumor Segmentation based on a Hybrid Clustering Technique”, Science Direct: Egyptian Informatics Journal, vol. 16, pp. 71-81, 2015.
[11] M. Kanimozhi, and C.H. Bindu, “Brain MR Image Segmentation Using Self Organizing Map”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, pp. 3968-3973, 2013.
[12] Z. Ping, R. Wu, and Y. Sheng, “Image description with Chebyshev-Fourier moments,” J. Opt. Soc. Am. A, vol. 19, Issue 9, pp. 1748-1754, 2002.
[13] R. Upneja, C. Singh and A. Prashar, “Fast Computation of Chebyshev- Harmonic Fourier moments”, LNIT, vol. 3, Issue 2, pp. 60-64, 2015.
[14] C. Singh and E. Walia, “Algorithms for fast computation of Zernike moments and their numerical stability,” Image and Vision Computing, vol. 29, Issue 4, pp. 251-259, 2011.
Citation
A. Prashar, R. Upneja, "Fast and Effective Method for the Detection of Brain Tumor using Chebyshev Harmonic Fourier Moments," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.312-316, 2018.
Differentiated Caching for Improved QoS in Vehicular Content-centric Networks
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.317-322, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.317322
Abstract
Vehicular networks facilitate safer and more comfortable travel, but pose several challenges due to high rates of mobility and poor link quality. Information Centric Networking (ICN) is a recently proposed network paradigm that improves performance of networks with content as the focus. In this paper, we propose a differentiated cache replacement scheme called D-cache for content centric vehicular networks. In D-cache, vehicular network traffic is divided into time-sensitive sensor data (S-data) and infotainment related data (I-data). Simulation results show that the proposed scheme improves both the cache hit ratio and the average content retrieval time even at high mobility rates for content centric vehicular networks.
Key-Words / Index Term
Vehicular networks, content-centric networks, qualtiy of service, caching
References
[1] V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, R. L. Braynard, Networking named content, in: Proceed-ings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT ’09, 2009, pp. 1–12.
[2] Named Data Networking, https://named-data.net/project/, [Online; accessed 01-October-2018] (2010).
[3] PSIRP: Publish-Subscribe Internet Routing Paradigm, http://www.psirp.org/, [Online; accessed 09-October-2018].
[4] M. Amadeo, C. Campolo, A. Molinaro, Crown: Content-centric networking in vehicular ad hoc networks, IEEE Communications Letters 16 (9) (2012) 1380–1383.
[5] W. Quan, F. Song, C. Yu, M. Zhang, Icn based vehicle-to-cloud delivery for multimedia streaming in urban vehicular networks, China Communications 13 (9) (2016) 103–112.
[6] W. Quan, C. Xu, J. Guan, H. Zhang, L. A. Grieco, Social coop-eration for information-centric multimedia streaming in highway vanets, in: World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on a, IEEE, 2014, pp. 1–6.
[7] L. Wang, A. Afanasyev, R. Kuntz, R. Vuyyuru, R. Wakikawa, L. Zhang, Rapid traffic information dissemination using named data, in: Proceedings of the 1st ACM workshop on emerg-ing name-oriented mobile networking design-architecture, algo-rithms, and applications, ACM, 2012, pp. 7–12.
[8] M. Amadeo, C. Campolo, A. Molinaro, Information-centric net-working for connected vehicles: a survey and future perspectives, IEEE Communications Magazine 54 (2) (2016) 98–104.
[9] S. Chilukuri, K. Chakravarthy Chilukuri, S. Korla, Provider mo-bility in content centric networks - issues and challenges, Inter-national Journal of Mobile Network Design and Innovation 7 No. 3/4 (2017) 150 – 157.
[10] S. Podlipnig, L. Bosz¨ormenyi,¨ A survey of web cache replacement strategies, ACM Computing Surveys (CSUR) 35 (4) (2003) 374– 398.
[11] M. Rabinovich, O. Spatscheck, Web caching and replication, Vol. 67, Addison-Wesley Boston, USA, 2002.
[12] G. Zhang, Y. Li, T. Lin, Caching in information centric networking: A survey, Computer Networks 57 (16) (2013) 3128–3141.
[13] I. Psaras, R. G. Clegg, R. Landa, W. K. Chai, G. Pavlou, Modelling and evaluation of ccn-caching trees, in: International Conference on Research in Networking, Springer, 2011, pp. 78–91.
[14] D. Grewe, M. Wagner, H. Frey, Perceive: Proactive caching in icn- based vanets, in: Vehicular Networking Conference (VNC), 2016 IEEE, IEEE, 2016, pp. 1–8.
[15] G. Rizzo, M. R. Palattella, T. Braun, T. Engel, Content and context aware strategies for qos support in vanets, in: Advanced Information Networking and Applications (AINA), 2016 IEEE 30th International Conference on, IEEE, 2016, pp. 717–723.
[16] Y. Li, Y. Yang, R. Rahmani, T. Kanter, X. Su, J. Riekki, Gap-based caching for icn-based vehicular networks, in: 2016 IEEE 83rd Ve-hicular Technology Conference: VTC 2016-Spring, Nanjing, China, 15–18 May 2016, IEEE Computer Society, 2016.
[17] Y. Kim, Y. Kim, J. Bi, I. Yeom, Differentiated forwarding and caching in named-data networking, Journal of Network and Computer Applications 60 (2016) 155 – 169.
[18] K. Cho, M. Lee, K. Park, T. T. Kwon, Y. Choi, S. Pack, Wave: Popularity-based and collaborative in-network caching for content-oriented networks, in: Computer Communications Work-shops (INFOCOM WKSHPS), 2012 IEEE Conference on, IEEE, 2012, pp. 316–321.
[19] NS-3 based Named Data Networking (NDN) simulator, http://ndnsim.net/1.0/index.html, [Online; accessed 09-October-2018].
[20] R.Kumari, P. Nand, “Performance Analysis of existing Routing Protocols” International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), ISSN-2320-7639, Vol. 5 No. 5, October-2017.
Citation
Korla Swaroopa, Sireesha Rodda, Shanti Chilukuri, "Differentiated Caching for Improved QoS in Vehicular Content-centric Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.317-322, 2018.
Deep Learning for Human Action Recognition – Survey
Survey Paper | Journal Paper
Vol.6 , Issue.10 , pp.323-328, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.323328
Abstract
Human action recognition (HAR) in visual data has become one of the attractive research area in the field of computer vision including object detection, recognition, retrieval, domain adaptation, transfer learning, segmentation etc. Over the last decade, HAR evolved from heuristic hand crafted feature to systematic feature learning namely deep feature learning. Deep feature learning can automatically learn feature from the raw inputs. Deep learning algorithms, especially Convolutional Neural Network (CNN), have rapidly become a methodology of choice for analysing recognition of videos. In this paper, details of recent trends and approaches of deep learning including CNN, Recursive Neural Network (RNN), Long Short term Memory (LSTM) and Autoencoders which are used in HAR are discussed. The challenges are identified to motivate the researchers for future works.
Key-Words / Index Term
HAR, CNN, LSTM, Deep Learning model
References
[1] D.D. Dawn, S.H. Shaikh, “A comprehensive survey of human action recognition with spatio-temporal interest point (STIP) detector”, The Visual Computer, Vol. 32, Issue. 3, pp. 289-306, March 2016.
[2] S. Herath, M. Harandi, F. Porikli, “Going deeper into action recognition: A survey”, Image and vision computing, Vol. 60, pp. 4-21, April 2017.
[3] C. Indhumathi, V. Murugan, “A Survey on Neural Network based Approaches and Datasets in Human Action Recognition”, International Journal of Computer Sciences and Engineering, Vol. 6, Issue 6, June 2018.
[4] N.S. Lele, “Image Classification using Convolutional Neural Network” Vol. 6, Issue 3, PP.22-26, June 2018.
[5] B. Li, M. He, Y. Dai, X. Cheng,Y. Chen, “3D skeleton based action recognition by video-domain translation-scale invariant mapping and multi-scale dilated CNN” Multimedia Tools and Application, pp. 1-21, January 2018.
[6] W. Ding, K. Li, E. Belyaev, F. Cheng, “Tensor-based linear dynamical systems for action recognition from 3D skeletons” Pattern Recognition, Vol. 77, pp. 75-86, 2018.
[7] Q. Ke, M. Bennamoun, S. An, F. Sohel, F. Boussaid, “Learning Clip Representations for Skeleton-Based 3D Action Recognition”, IEEE Transactions on Image Processing, Vol. 27, No. 6, June 2018.
[8] Z. Li, K.G.E. Gavves, M. Jain, C.G.M. Snoek, “VideoLSTM convolves, attends and flows for action recognition”, Computer Vision and Image Understanding, Vol. 166, pp.41–50, 2018.
[9] A. Ullah, J. Ahmad, K. Muhammad, M. Sajjad, S.W. Baik, “Action Recognition in Video Sequences using Deep Bi-Directional LSTM With CNN Features”, Special Section on Visual Surveillance and Biometrics: Practices, Challenges, And Possibilities, Vol. 6, 2018.
[10] Y. Xu, L. Wang, J. Cheng, H. Xia, J. Yin, “DTA: Double LSTM with temporal-wise attention network for action recognition” IEEE International Conference on Computer and Communications (ICCC), pp. 1676-1680, December, 2017.
[11] A. Ignatov, “Real-time human activity recognition from accelerometer data using Convolutional Neural Networks” Applied Soft Computing. Vol.62, pp. 915–922, 2018.
[12] C. Cao, Y. Zhang , C. Zhang and H. Lu, “Body Joint Guided 3-D Deep Convolutional Descriptors for Action Recognition” IEEE Transactions on Cybernetics, Vol. 48, No. 3, March 2018.
[13] X. Wang, L. Gao, P. Wang, X. Sun and X. Liu, “Two-Stream 3-D convNet Fusion for Action Recognition in Videos With Arbitrary Size and Length”, IEEE Transactions On Multimedia, Vol. 20, No. 3, March 2018.
[14] A. Grushin, D.D. Monner, J.A. Reggia, A. Mishra,”Robust Human Action Recognition via Long Short-Term Memory”, International Joint Conference on Neural Networks (IJCNN), 2013.
[15] S. Nitish, M. Elman, S. Ruslan, “Unsupervised Learning of Video Representations using LSTMs”, Proceedings of the 32nd International Conference on Machine Learning, France, 2015.
[16] H. Gammulle, S. Denman, S. Sridharan, C. Fookes, “Two stream lstm: A deep fusion framework for human action recognition”, IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 177-186, March 2017.
[17] X. Wang, L. Gao, Song, J. and Shen, H., “Two stream lstm CNN: saliency-aware 3-D CNN with LSTM for video action recognition”. IEEE Signal Processing Letters, Volume 24, Issue 4, pp.510-514, 2017.
[18] J. Liu, G. Wang, L.Y. Duan, K. Abdiyeva, and A.C. Kot, “Skeleton-based human action recognition with global context-aware attention LSTM networks”, IEEE Transactions on Image Processing, Volume 27, Issue 4, pp.1586-1599, 2018.
[19] I. Lee, D. Kim, S. Kang, S. Lee, “Ensemble deep learning for skeleton-based action recognition using temporal sliding lstm networks” IEEE International Conference on Computer Vision (ICCV), pp. 1012-1020 , October, 2017.
[20] J. Liu, G. Wang, P. Hu, L.Y. Duan, A.C. Kot, “Global context-aware attention lstm networks for 3d action recognition”, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) ,Vol. 7, pp. 43, July 2017.
[21] L. Wang, X. Zhao, Y. Liu, “Skeleton Feature Fusion based on Multi-Stream LSTM for Action Recognition”, IEEE Access, September, 2018.
[22] C. Li, P. Wang, S. Wang, Y. Hou, W. Li, ”Skeleton-based action recognition using LSTM and CNN” IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp. 585-590, July 2017.
[23] S. Song, C. Lan, J. Xing, W. Zeng, J. Liu, “Spatio-Temporal Attention-Based LSTM Networks for 3D Action Recognition and Detection” IEEE Transactions on Image Processing, Volume 27, Issue 7, pp. 3459-3471, July, 2018.
[24] Y. Yuan, X. Liang, X. Wang, D.Y. Yeung, A. Gupta,” Temporal Dynamic Graph LSTM for Action-Driven Video Object Detection” International Conference on Computer Vision, pp. 1819-1828, October, 2017.
[25] N. Srivastava, E. Mansimov, R. Salakhudinov, “Unsupervised learning of video representations using LSTMs”, International conference on machine learning, pp. 843-852, Junuary 2015.
[26] S. Das, M. Koperski, F. Bremond, G. Francesca, “A Fusion of Appearance based CNNs and Temporal evolution of Skeleton with LSTM for Daily Living Action Recognition” arXiv preprint arXiv:1802.00421, 2018.
[27] J.C. Núñez, R. Cabido, J. Pantrigo, A. Montemayor, J. Vélez, ”Convolutional Neural Networks and Long Short-Term Memory for skeleton-based human activity and hand gesture recognition” Pattern Recognition Vol. 76, pp.80–94, 2018.
[28] S. Sharma, R. Kiros, R. Salakhutdinov, “Action Recognition using Visual Attention”, arXiv preprint arXiv:1511.04119, 2015.
[29] X. Qinkun, S. Yang, “Human Action Recognition Using Autoencoder”, IEEE International Conference on Computer and Communications, 2017.
[30] G. Ian, B. Yoshua, C. Aaron,” Deep Learning” MIT Press, 2016.
[31] P. Josh, G. Adam, “Deep Learning: A Practitioner`s Approach”, O’reilly, 2017.
[32] E.P. Ijjina and C.K. Mohan, “Human action recognition using genetic algorithms and convolutional neural networks”, Pattern Recognition, 2016.
[33] E.P. Ijjina and C.K. Mohan, ”Hybrid deep neural network model for human action recognition“ Applied soft computing, 2015.
[34] J. Donahue, L.A. Hendricks, S. Guadarrama and M. Rohrbach, “Long-term Recurrent Convolutional Networks for Visual Recognition and Description” Conference on Computer Vision and Pattern Recognition (CVPR 2015), 2015.
[35] M. Xu, A. Sharghi, X. Chen, D.J. Crandall, “ Fully-Coupled Two-Stream Spatiotemporal Networks for Extremely Low Resolution Action Recognition”, IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1607-1615, March 2018.
[36] L.N. Pondhu, G. Pondhu, “Tuning Convolution Neural networks for Hand Written Digit Recognition”, International Journal of Computer Sciences and Engineering,Vol. 6, Issue 8, August 2018.
Citation
K.Kiruba, D. Shiloah Elizabeth, C Sunil Retmin Raj, "Deep Learning for Human Action Recognition – Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.323-328, 2018.
Comparative Study of Hybrid Attribute Based Encryption for Cloud Computing System
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.329-335, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.329335
Abstract
Due to reliability, there are million and millions of the uses and users of the cloud storages. So clouds are heavily developing field for various purposes. Many cloud hosts are providing services to different clients for their data storage. Due to disaster management cloud can be used as secured storage mechanism. For such cloud storages encryption is done many a ways for securing cloud data. The hybrid attribute based encryption i.e hybrid H-HABE is the method to encrypt the contents. This paper discusses the hybrid H-HABE encryption method for the cloud storages. The technique is also used to hide identity of the user that means the anonymous authentication can be implemented only by use of attributes. Our research work also analyses the importance of the data security in the cloud. Reason for choosing symmetric encryption algorithms are efficient to handle encryption and decryption for large amount of data, and effective speed of storing data and accessing the data in the cloud system. For implementation purpose here are considered the type of file as document file(doc), text file(txt) which can be enhance to sound file(.avi), video file, image file with different formats(BMP,JPG,GIFF,PNG).
Key-Words / Index Term
Cryptography,Security,Cloud Computing System; hybrid H-HABE
References
[1]Rajadeep Bhanot, Rahul Hans, “A review and Comparative Analysis of various Encryption Algorithms”, International Journal of Security and its Applications, vol. 9,Issue 4,2015.
[2]Zaran Hercigonja, Durga gimnazija Varazdin and Croatia, ”Comparative Analysis of Cryptographic Algorithms”, International Journal of Digital Technology and Economy, Vol 1, issue 2, 2016.
[3]Faiqa Maqsood, Muhammad Ahmad, Muhammad Mumtaz Ali, Munam Ali hah,” Cryptography: A Comparative Analysis for Modern Techniques”, International journal of Advanced Computer Science and Applications, vol 8, issue 6,2017.
[4] Shraddha D. “Performance Analysis of AES and DES Cryptographic Algorithms on Windows & Ubuntu using Java”, International Journal of Computer Trends and Technology. 2016;35(4):179-183.
[5] Pooja B.,”Optimization of Cryptography Algorithms in Cloud Computing”, International Journal of Computer Trends and Technology. 2017;46(2):67-72.
[6] Cloud Computing Challenges Businesses are Facing These Days an article by Mona Lebied in Business Intelligence , January 2017.
[7]”An Overview of Cryptography” an article by Gary C. Kessler, Embry-Riddle Aeronautical University - Daytona Beach, March 2016 .
[8] Managing Data Encryption, an article available at https://cloud.google.com/storage/docs/encryption#rotating-keys , January 2017
[9] What are the 12 biggest cloud computing security threats? , an article by Matthew Wilson available at https://www.ibm.com/blogs/cloud-computing/2016/04/12-biggest-cloud-computing-security-threats/ , April 2016.
[10] Encryption At Rest In Google Cloud Platform, an article available at https://cloud.google.com/security/encryption-at-rest/default-encryption/ , April 2017.
[11] Pereira, G. C., et al.,(2017). “Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems”, Security and Communication Networks, 2017.
[12]. Sharma, S., et al., (2017). “Study on Cryptography and Techniques”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2(1).
[13]. Wu, Jiehong et al.,. "A study on the power consumption of using cryptography algorithms in mobile devices." Software Engineering and Service Science (ICSESS), 2016 7th IEEE International Conference on. IEEE, 2016.
[14]. Bhandari, Akshitaet al.,"Secure algorithm for cloud computing and its applications.", Cloud System and Big Data Engineering (Confluence), 2016 6th International Conference. IEEE, 2016.
[15]. Jakimoski, Kire, "Security Techniques for Data Protection in Cloud Computing" International Journal of Grid and Distributed Computing Vol.9. No1 (2016):PP.49-56.
[16]. Waleed, AL-Museelem, and Li Chunlin. "User Privacy and Security in Cloud Computing." International Journal of Security and Its Applications Vol.10 No.2 (2016): Pp.341-352.
[17]. Alotaibi, Mutlaq B. "Antecedents of software-as-a-service (SaaS) adoption: a structural equation model." International Journal of Advanced Computer Research Vol.6 No.25 (2016): PP.114.
[18] Li, J.; Huang, X.; Chen, X.; Xiang, Y. Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2201–2210.
[19] Choi, C.; Choi, J.; Kim, P. Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput. 2014, 67, 711–722.
[20] Wei, L.; Zhu, H.; Cao, Z.; Dong, X.; Jia, W.; Chen, Y.; Vasilakos, A.V. Security and privacy for storage and computation in cloud computing. Inf. Sci. 2014, 258, 371–386.
[21]Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, W. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 131–143.
[22]Subashini, S.; Kavitha, K. A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 2011, 34, 1–11.
Citation
G. Narmadhai, S. Vijay Bhanu, "Comparative Study of Hybrid Attribute Based Encryption for Cloud Computing System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.329-335, 2018.
EFFICIENT SELFISH NODE MANAGEMENT METHOD FOR MANET
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.336-340, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.336340
Abstract
In a mobile ad-hoc network, congestion is one among the foremost necessary restrictions that deteriorate the performance of the total network. It’s essential to regulate the info rate utilized by every sender so as to not overload the network, wherever multiple senders vie for link information measure. The Packets at the network is also dropped after they reach the router and can`t be forwarded. Several packets area unit dropped whereas excessive quantities of packets make a network bottleneck. The proposed ESNM technique of the research uses the Watchdog method with IRTBDM to cut back the congestion rate at the MANET. The proposed technique provides a higher packet delivery ratio, scale back packet drop ratio and communication overhead over existing methods. These factors are necessary for MANET performance and reliability.
Key-Words / Index Term
ESNM, Congestion control, Watchdog method, Replica allocation, Selfish node
References
[1]. Suchita. A. Kulkarni, P. U. Dere, “Truthful detection of selfish nodes in context to replica allocation over a mobile ad hoc network”, International Journal of Industrial Electronics and Electrical Engineering, ISSN: 2347-6982 Volume- 2, Issue- 2, Feb.-2014, pp 10-16.
[2]. Byung-GulRyu, Woo-Jong Ryu, Yong-Ku Lee, and Sang Keun Lee, “Selfish Replica Allocation in a Mobile Ad Hoc Network with Data Update”, IEEE Conference Big Comp 2015, pp142-150.
[3]. P. J. Kumar, P. Ilango, “An Optimized Replica Allocation Algorithm Amidst of Selfish Nodes in MANET”, Wireless Pers Communication, Springer Science Business Media New York 2016, pp 120-140
[4]. Jae-Ho Choi, Kyu-Sun Shim, Sang Keun Lee, and Kun-Lung Wu, “Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network”, IEEE Transactions on mobile computing, vol. 11, no. 2, February 2012, pp 278-292.
[5]. Jae-Ho Choi, Kyu-Sun Shim, Sang Keun Lee, and Kun-Lung Wu, “Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network”, IEEE Transactions on Mobile Computing, Vol. 11, No. 2, February 2012, pp 909-920.
[6]. Esha Kumar, Shivanka Chugh, S.P Ghrera, “Performance Analysis of RED, With Different TCP Congestion Control Mechanism”, 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC 2011), Published by IEEE 2011, Vol-6, PP 414-420, ISSN 978-1 4577-0240-2/11.
[7]. Patel j.k., Dubey, “Mobile AdHoc Network Performance Improvement Using Strategically RED ”, Published by Ninth International Conference on Wireless and Optical Communications Networks WOCN2012, 2012, IEEE, Vol-4, PP 1-4, ISSN 2151-7681.
[8]. Zhao Shuang and Shang Yu, “A Study of Congestion Control Strategy Based on the Router on the Internet”, Published by Third International Conference on Multimedia Information Networking and Security, IEEE 2011 Vol. 13, pp 114-118, print ISBN 978-1-4577-1795-6.
[9]. Gianluigi Pibiri, CiaránMcGoldrick, and Meriel Huggard, “Using Active Queue Management to Enhance Performance in IEEE802.11”.Published by ACM, Vol 17, ISBN 978-1-60558-621, pp70-77.
[10]. N. Gomathi, P. Seethalakshmi, and A. Govardhan, ”Active Queue Management for Multimedia Streaming in Mobile Ad-Hoc Networks”, Published by European Journal of Scientific Research, ISSN 1450-216X Vol.72 No.1 (2012), pp. 107-123.
[11]. Chien-Erh Weng, Rui-Yi Li and Chao Hsing Hsu, ”Joint Priority Random Early Detection and IEEE 802.11 EDCF to Support QoS in Wireless LAN”, Published by International Journal of Innovative Computing, Information and Control Volume 8, Number 8, August 2012 ISSN 1349-4198, pp. 5425-5438.
[12]. D. C. Joy Winnie Wise and N. Kesavan Nair, “Congestion Control Algorithm for Wireless Networks”. Published by European Journal of Scientific Research, ISSN 1450 -216 X Vol.80 No.4 (2012), pp.487-493.
[13]. Wu-changing, Dilip D. Kandlurz, and DebanjanSahaz, Kang G. Shin, “A Self Configuring RED Gateway”, Published by INFOCOM ` Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE Vol-3, ISSN 0743-166X, PP 1320-1328.
Citation
Sandeep dubey, Ravi kumar Singh pippal, "EFFICIENT SELFISH NODE MANAGEMENT METHOD FOR MANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.336-340, 2018.
Empirical Analysis on Stream Classification & Clustering with Concept Drift in MOA
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.341-345, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.341345
Abstract
Stream data processing is the next ‘big thing’ in big data which is one of the most propagating fields in computer science. The stream data analytics is an important aspect while dealing with data stream mining. While dealing with the classification of stream data, concept drift and its effect are required to be considered. Massive online analysis (MOA) is one of the most popular tools to perform analytics on stream data. We primarily deal with three features which are provided by moa namely classification, clustering & concept drift. The key emphasis is on experimental analysis on the combination of different procedures and learner algorithm which are suited for training the model so it can be used for the prediction purpose. Besides that, we have also tried to identify drift (change) in data and its effect on performance. So conceptually after taking proper measures about the noise and drifts, we can construct a model which is persistent to all the changes it faces. Stream analytics also required exploring the different clustering techniques which have a wide number of applications. We have presented all the empirical analysis carried out on classification and clustering techniques in a tool called MOA.
Key-Words / Index Term
Stream Processing, Concept Drift, classification, Clustering, MOA
References
[1]. Bifet, A., Holmes, G., Pfahringer, B., Read, J., Kranen, P., Kremer, H., ... & Seidl, T. (2011, September). MOA: a real-time analytics open source framework. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases (pp. 617-620). Springer, Berlin, Heidelberg.
[2]. Kranen, P., Kremer, H., Jansen, T., Seidl, T., Bifet, A., Holmes, G., & Pfahringer, B. (2010, December). Clustering performance on evolving data streams: Assessing algorithms and evaluation measures within MOA. In Data Mining Workshops (ICDMW), 2010 IEEE International Conference on (pp. 1400-1403). IEEE.
[3]. Kranen, P., Kremer, H., Jansen, T., Seidl, T., Bifet, A., Holmes, G., ... & Read, J. (2012, April). Stream data mining using the MOA framework. In International Conference on Database Systems for Advanced Applications (pp. 309-313). Springer, Berlin, Heidelberg.
[4]. Jani, R., Bhatt, N., & Shah, C. (2017, March). A Survey on Issues of Data Stream Mining in Classification. In International Conference on Information and Communication Technology for Intelligent Systems (pp. 137-143). Springer, Cham.
[5]. Gama, J. (2010). Knowledge discovery from data streams. Chapman and Hall/CRC.
[6]. Tsymbal, A. (2004). The problem of concept drift: definitions and related work. Computer Science Department, Trinity College Dublin, 106(2).
[7]. Hassani, M., Kim, Y., & Seidl, T. (2013, April). Subspace MOA: subspace stream clustering evaluation using the MOA framework. In International Conference on Database Systems for Advanced Applications (pp. 446-449). Springer, Berlin, Heidelberg.
[8]. Ahmed, M. (2018). Data summarization: a survey. Knowledge and Information Systems, 1-25.
[9]. Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H. Witten. The WEKA data mining software: an update. SIGKDD Explor. Newsl., 11(1):10–18, 2009.
[10]. Domingos, P., & Hulten, G. (2000, August). Mining high-speed data streams. In Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 71-80). ACM.
[11]. Conference on Knowledge Discovery and Data Mining, pages 71–80, 2000.
[12]. Al-Radaideh, Q. A., & Al Nagi, E. (2012). Using data mining techniques to build a classification model for predicting employees performance. International Journal of Advanced Computer Science and Applications, 3(2).
[13]. Gama, J., Žliobaitė, I., Bifet, A., Pechenizkiy, M., & Bouchachia, A. (2014). A survey on concept drift adaptation. ACM computing surveys (CSUR), 46(4), 44.
[14]. Hoens, T. R., Polikar, R., & Chawla, N. V. (2012). Learning from streaming data with concept drift and imbalance: an overview. Progress in Artificial Intelligence, 1(1), 89-101.
[15]. Kremer, H., Kranen, P., Jansen, T., Seidl, T., Bifet, A., Holmes, G., & Pfahringer, B. (2011, August). An effective evaluation measure for clustering on evolving data streams. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 868-876). ACM.
[16]. Ibanez, A. C. (2017). Introduction to Stream Mining.
[17]. Devi, Y. S., & Nagababu, G. (2017). Comparison of Clustering Algorithms in Data stream mining: A Literature Survey.
[18]. Dipti, M., & Patel, T. (2014). K-means based data stream clustering algorithm extended with no. of cluster estimation method. International Journal of Advance Engineering and Research Development (IJAERD), 1(6).
[19]. Silva, J. A., Faria, E. R., Barros, R. C., Hruschka, E. R., De Carvalho, A. C., & Gama, J. (2013). Data stream clustering: A survey. ACM Computing Surveys (CSUR), 46(1), 13.
[20]. Wilks, D. S. (2011). Cluster analysis. In International geophysics (Vol. 100, pp. 603-616). Academic press.
[21]. Parikh, D., & Tirkha, P. (2013). Data mining & data stream mining—open source tools. International Journal of Innovative Research in Science, Engineering and Technology, 2(10), 5234-5239.
[22]. Fernandes, M. (2017). Data Mining: A Comparative Study of its Various Techniques and its Process. International Journal of Scientific Research in Computer Science and Engineering, 5(1), 19-23.
Citation
Hari A. Patel, Harsh N. Patel, Nirav Bhatt, "Empirical Analysis on Stream Classification & Clustering with Concept Drift in MOA," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.341-345, 2018.
Emperical Evaluation of Machine Learning algorithms for Breast Cancer Data Classification
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.346-351, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.346351
Abstract
Breast cancer (BC) is a deathly cancer disease which occurs mainly in women and the greater number of breast cancer patients leads to death according to global statistics. The early examination of Breast Cancer can augment the durability of patients, and it helps to improve the prompt medication to the patients. Machine learning plays an important role in health care and they are more powerful in classification and prediction process. There are various classification algorithms used based upon then data set. This work is the implementation of few classification algorithms such as Random Forest, K Nearest Neighbor, Navie Bayes, Support Vector Machine, and Artificial Neural Network for breast cancer data set. This paper is the comparative study of these algorithms using R tool. The goal of this paper is to analyze the accuracy of these algorithms. The implementation procedure reveal that the performance of any algorithm varies based on the data set attributes and characteristics.
Key-Words / Index Term
Machine Learning, Classification, Random Forest, K Nearest Neighbor, Navie Bayes, Support Vector Machine, Artificial Neural Network, R Tool
References
[1]. Https://www.digitalocean.com/community/tutorials/an-introduction-to-machine-learning.
[2]. Mengjie Yu, B.S. “Breast Cancer Prediction Using Machine Learning Algorithm”, May 2017 - he University of Texas at Austin.
[3]. B Nithya “Comparative Analysis of Classification Methods in R Environment with two Different Data Sets”, December 2017 - International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT | Volume 2 | Issue 6 | ISSN: 2456-3307.
[4]. P.Dhivyapriya “Classification of Cancer Dataset in Data Mining Algorithms Using R Tool”, February 2017 - International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 1, Jan – Feb 2017.
[5]. Vikas Chaurasia1, Saurabh Pal “A Novel Approach for Breast Cancer Detection using Data Mining Techniques”, January 2014 - International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 2, Issue 1, January 2014
[6]. Jahanvi Joshi, RinalDoshi “Diagnosis And Prognosis Breast Cancer Using Classification Rules” November 2014 - International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014 ISSN 2091-2730.
[7]. J.S.Saleema , N.Bhagawathi , S.Monica, P.Deepa Shenoy , K.R.Venugopal and L.M.Patnaik “Cancer Prognosis prediction using balanced Stratified sampling” February 2014 - International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.3, No. 1.
[8]. Tuba Kiyan, Tulay Yildirim “Breast Cancer Diagnosis Using Statistical Neural Networks” 2004 - Istanbul University - Journal of Electrical & Electronics Engineering Volume Number: 4.
[9]. Subrata Kumar Mandal “Performance Analysis of Data Mining Algorithms For Breast Cancer Cell Detection Using Naïve Bayes, Logistic Regression and Decision Tree” 2017 - International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 6 Issue 2 Feb. 2017, Page No. 20388-20391.
[10]. Adnan Alam khan and Shariq Ahmed “Comparative analysis of data mining tools for lungs cancer patients” 2015 Journal of Information & Communication Technology Vol. 9, No. 1, (Spring2015) 33-40.
[11]. E. SathiyaPriya “A Study on Classification Algorithms and Performance Analysis of Data Mining using Cancer Data to Predict Lung Cancer Disease” 2017-International Journal of New Technology and Research (IJNTR) ISSN:2454-4116, Volume-3, Issue-11, November 2017 Pages 88-93.
[12]. ShamreenFathimaSaddique, Sharmithra P, Justin Xavier D “Prediction of Lung Cancer Using Classifier Models” 2016 - International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2016): 79.57 | Impact Factor (2015): 6.391.
[13]. Hlaudi Daniel Masethe and Mosima Anna Masethe “Prediction of Heart Disease using Classification Algorithms” 2014 - Proceedings of the World Congress on Engineering and Computer Science 2014 Vol II WCECS 2014, 22-24 October, 2014, San Francisco, USA.
[14]. T. Marikani “Prediction of Heart Disease using Supervised Learning Algorithms” 2017 - International Journal of Computer Applications (0975 – 8887) Volume 165 – No.5, May 2017.
[15]. R. Jothikumar and R.V. Sivabalan “Analysis of Classification Algorithms for Heart Disease Prediction and its Accuracies” 2016 - Middle-East Journal of Scientific Research 24 (Recent Innovations in Engineering, Technology, and Management & Applications): 200-206, 2016 ISSN 1990-9233.
[16]. Akil Bansal, Manish kumar Ahirwar, Piyush kumar sukla, “A Survey on Classification Algorithms used in Healthcare Environment of the Internet of Things”. International journal of Computer Sciences and Engineering, Vol 6, Issue 7, Pp 883-887, July 2018.
[17]. J.Seetha and T.Chakravarthy, “Diabetes classification using machine learning techniques with the help of cloud computing”. International journal of Computer Science and Engineering, Pp. 278-283, ISSN. 2347-2693, Vol. 6, Issue. 8, Aug-2018.
Citation
S. Kumaravel, S. Ophilia Domanica Vithya, "Emperical Evaluation of Machine Learning algorithms for Breast Cancer Data Classification," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.346-351, 2018.
FUZZY GRAVITATIONAL CLASSIFIER FOR CLASSIFYING IMBALANCED DATASETS
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.352-358, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.352358
Abstract
Developing a precise and consistent model for classifying imbalanced medical data is one of the major challenges in machine learning and data mining. As the advanced growth in medical technology, a classy medical classification system is essential that make use of data mining algorithms to support medical diagnosis practice. Though the standard medical data seldom obeys the requirements of different knowledge engineering tools, most of the medical datasets are considered to be highly imbalanced with respect to their class label. So the imbalancing problem has been found to thwart the efficiency of the learning model. The only way to avoid this problem is to reduce the gap between both majority and minority class instances. In our approach a fuzzy gravitational classifier with weighting scheme is employed, in which weight is optimized using Particle swarm optimization algorithm. The technique is implemented and tested with three well known bench mark imbalanced dataset from UCI and KEEL repository. A comparative study is made with two existing classification methods viz. Weighted nearest neighbour and class based weighted nearest neighbour. Evaluation results shows our hybrid approach gives better performance on imbalanced data in terms of AUC, F-measure and G-mean.
Key-Words / Index Term
Imbalanced data, PSO optimization, Data gravitation classifier, Fuzzy soft set, JFIM
References
[1]. R.C. Holte, L. Acker, and B.W. Porter, “Concept Learning and theProblem of Small Disjuncts” Proc. Int’l J. Conf. ArtificialIntelligence, pp. 813-818, 1989.
[2]. G.M. Weiss, “Mining with rarity: a unifying framework”, SIGKDD Explor. Vol.6, pp. 7–19, 2004.
[3]. V. García, R. Mollineda, J.S. Sánchez, “On the k-NN performance in a challenging scenario of imbalance and overlapping”, Pattern Anal. Appl. Vol.11, pp. 269–280, 2008.
[4]. C. Seiffert, T.M. Khoshgoftaar, J. Van Hulse, et al. ,”An empirical study of the classification performance of learners on imbalanced and noisy softwarequality data”, in: Procedings of IEEE International Conference on Information Reuse and Integration, pp. 651–658, 2007.
[5]. K. Napierala, J. Stefanowski, S. Wilk, “Learning from imbalanced data in presence of noisy and borderline examples”, in: Proceedings of 7th International Conference on Rough Sets and Current Trends in Computing (RSCTC2010), pp. 158–167, 2010.
[6]. L. Peng, H. Zhang, B. Yang, Y. Chen, M.T. Qassrawi, G. Lu, “Traffic identification using flexible neural trees”, in: Proceeding of the 18th International Workshop of QoS (IWQoS 2012), pp. 1–5, 2012.
[7]. Fawcett, T., & Provost, F. J. “Adaptive fraud detection. Data Mining and Knowledge Discovery”, Vol.1, no.3, pp.291–316, 1997.
[8]. P. Clifton, A. Damminda, and L. Vincent, “Minority Report in Fraud Detection: Classification of Skewed Data,” ACM SIGKDDExplorations Newsletter, vol. 6, no. 1, pp. 50-59, 2004.
[9]. T. Basu, C.A. Murthy, “Towards enriching the quality of k-nearest neighbour rule for document classification”, Int. J. Mach. Learn. Cybern., pp. 1–9, 2013.
[10]. Ghosh, A., Pal, N., & Das, J.,” A fuzzy rule based approach to cloud cover estimation. Remote Sensing of Environment”, vol.100, no.4, pp. 531–549, 2006.
[11]. Huang, Y. M., Hung, C. M., & Jiau, H. C.,” Evaluation of neural networks and data mining methods on a credit assessment task for class imbalance problem.Nonlinear Analysis: Real World Applications”, vol.7, no.4, pp.720–747, 2006.
[12]. I. Chairi, S. Alaoui, A. Lyhyaoui,, “Intrusion detection based sample selection for imbalanced data distribution”, in: Proceeding of Second International Conference on Innovative Computing Technology (INTECH), pp. 259–264, 2012.
[13]. Xu, L., Chow, M. Y., & Taylor, L. S. (2007), ”Power distribution fault causeidentification with imbalanced data using the data mining-based fuzzyclassification E-algorithm”, IEEE Transactions on Power Systems, vol.22, no.1, pp. 164–171, 2007.
[14]. Chi, Z., Yan, H., & Pham, T. , “Fuzzy algorithms with applications to image processing and pattern recognition”. World Scientific journal off science, pp. 132-140, 1996.
[15]. Mazurowski, M., Habas, P., Zurada, J., Lo, J., Baker, J., & Tourassi, G. (2008),”Training neural network classifiers for medical decision making: The effects of imbalanced datasets on classification performance”, Neural Networks, vol.21, no.2, 427–436, 2008.
[16]. R. Barandela, J.S. Sánchez, V. García, E. Rangel, “Strategies for learning in class imbalance problems”, Pattern Recogn, Vol.36, pp. 849–851, 2003.
[17]. G.E.A.P.A. Batista, R.C. Prati, M.C. Monard, “A study of the behaviour of several methods for balancing machine learning training data”, SIGKDD Explor. Vol.6, pp. 20–29, 2004.
[18]. S. A. Dudani, “The distance-weighted k-nearest-neighbor rule,” IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. SMC-6, no. 4, pp. 325–327, 1976.
[19]. Q. Gao and Z. Wang, “Center-based nearest neighbor classifier,” Pattern Recognit., vol. 40, no. 1, pp. 346–349, 2007.
[20]. J.Wang, P. Neskovic, and L. N. Cooper, “Improving nearest neighbor rule with a simple adaptive distance measure,” Pattern Recognit. Lett., vol. 28, no. 2, pp. 207–213, 2007.
[21]. R. Paredes and E. Vidal, “A class-dependent weighted dissimilarity measure for nearest neighbor classification problems,” Pattern Recognit. Lett., vol. 21, no. 12, pp. 1027–1036, 2000.
[22]. R. Paredes and E. Vidal, “Learning weighted metrics to minimize nearest neighbor classification error,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 7, pp. 1100–1110, 2006.
[23]. L. Peng, B. Peng, Y. Chen, and A. Abraham, “Data gravitation based classification,” Inf. Sci., vol. 179, no. 6, pp. 809–819, 2009.
[24]. Sinciya P.O, J. Jeya A Celin, “Weight Optimized Gravitational Classifier for High Dimensional Numerical Data Classification “, International Journal of Pure and Applied Mathematics”, Volume 116, No. 22, pp.251-263, 2017.
[25]. Sinciya P.O, Jeyaa Celin Jesu, “JFIM: A Novel Filter Feature Selection approach Using Joint Feature Interaction Maximization”, International journal of intelligent engineering and systems, Vol.10, No.6, pp. 195-203,2017.
[26]. H. Dubey and V. Pudi. “Class based weighted k nearest neighbor over imbalanced dataset”, PAKDD 2013, pp. 305-316, 2013.
Citation
Sinciya P.O., J. Jeya A Celin, "FUZZY GRAVITATIONAL CLASSIFIER FOR CLASSIFYING IMBALANCED DATASETS," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.352-358, 2018.