Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.361-365, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.361365
Abstract
Building high secured software components is very important for component-based software projects. The confidentiality of software is one of the important factors determining the security of components. Estimating confidentiality near the beginning in the software development life cycle, particularly at design phase, may help the designers to integrate required highly secured for improving overall security of the developed software. In this paper researcher introduced a metric based model “Confidentiality Assessment Model (CAMOOD)”. This model measure the confidentiality induced by the use of various object-oriented design concepts like data hiding, aggregation, inheritance, coupling and cohesion. Herein, we compared our measurement results with various contributions.
Key-Words / Index Term
Software E-Security, Confidentiality, Security Factors
References
[1]. S. Chandra & R. A. Khan, “A Methodology to Check Confidentiality of a Class Hierarchy”, Elsevier, Vol. 10, Issue 3, 2010.
[2]. Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V, Asoke K Talukder, Alwyn Roshan Pais, “Suraksha: A Security Designers’ Workbench”, presented in Hack.in 2009, IIT Kanpur, India, 17-19 March 2009.
[3]. I. Chowdhury, B. Chan, and M. Zulkernine, "Security metrics for source code structures," in Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems Leipzig, Germany: ACM, 2008.
[4]. A. Mishra, D. Agarwal and M. H. Khan, “Integrity Estimation Model: Fault Perspective”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol 5, Issue 5, pp 1246-1249, May 2017.
[5]. Bharat B. Madan, Katerina Goˇseva-Popstojanova, Kalyanaraman Vaidyanathan and Kishor S. Trivedi “Modeling and Quantification of Security Attributes of Software Systems”, Proceedings of the International Conference on Dependable Systems and Networks (DSN’02), IEEE, 2002, pp: 505-514.
[6]. Danijel et. al., “Software Fault Prediction Metrics:A Systematic Literature Review”, ACM, 2013.
[7]. Soham H. “Security Metric for Object Oriented Class Design- Result Analysis”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-6, May 2013.
[8]. Dr. Linda Rogenberg, Dinnis Brennan, “Principle Components of Orthogonal Object Oriented Metrics (323-08-14)”, White Paper Analyzing Results of NASA Object oriented Data, Oct 2001.
[9]. Raees Ahmad Khan, “Security Improvement of Object Oriented Design using Refactoring Rules”, I.J. Modern Education and Computer Science, 2015
[10]. Finding Accessibility and Interaction vulnerability of Rational Rose Class Design Using Design Metrics Soham H. Gandhi, D. R. Anekar, Mahevash A. Shaikh, Ajinkya A. Salunkhe.
[11]. Ubaidull et. al., “Security Requirement for Software Quality - A Survey of Engineering Discipline”, International Journal of ICT and Management, 2014.
[12]. Shazia Yasin, Khalid Haseeb, "Cryptography Based E-Commerce Security: A Review". IJCSI-Vol. 9, Issue 2, No 1, March 2012.
[13]. Shalini Chandra, “Availability state transition model”, ACM SIGSOFT Software Engineering Notes • May 2011
[14]. Randy C. Marchany, Joseph G. Tront, "E-Commerce Security Issues"Proceedings of the 35th Hawaii International Conference on System Sciences – 2002.
[15]. A. Mishra, D. Agarwal and M. H. Khan, “Confidentiality Estimation Model: Fault Perspective” International Journal of Advanced Research in Computer Science (IJARCS), Volume.8 Issue. 4, June 2017.
[16]. Steve Counsell, Stephen Swift, Jason Crampton “The interpretation and Utility of Three Cohesion Metrics for Object – Oriented Design” (ACM Transactions on SE & Methodology, Vol. 15, No. 2, April 2006.
[17]. P.Nikhat, S. Kumar and M. H. Khan, “Model to Quantify Integrity at Requirement Phase”, Indian Journal of Science and Technology, Vol. 9, Aug 2016.
[18]. Amjan Shaik, “Statistical Analysis For Object Oriented Design Software Security Metrics”, International Journal of Engineering Science and Technology Vol. 2(5), 2010
[19]. Suhel Ahmad Khan, “Confidentiality Quantification Model at Design Phase”, International Journal of Information and Education Technology, Vol. 2, No. 5, October 2012.
[20]. M. Jureczko & L. Madeyski, “Towards identifying software project clusters with regard to defect prediction”, IEEE, 2010.
[21]. Leslie Lamport, Password Authentication with Insecure Communication. Technical Note. Communication of the ACM, 1981.
Citation
Surabhi Saxena, Devendra Agarwal, "Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.361-365, 2018.
Localization Adopting Machine Learning Techniques in Wireless Sensor Networks
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.366-374, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.366374
Abstract
Monitoring of dynamic environments that change rapidly with time is the prime application of wireless sensor networks. This change of behaviour is reasoned to either certain external factors or limitation of system designs itself in unpredicted causality. To adapt such conditions, machine learning techniques are deemed to be beneficial in eliminating the need for unnecessary redesign. Moreover, the techniques based on machine learning encourages many practical solutions to maximize usages of resource and thus enhances the lifespan of the sensor network. In this paper, an extensive literature is furnished over machine learning techniques that are used to address the issue of node localization in wireless sensor networks (WSNs). Strengths and weaknesses of each of the proposed algorithm in literature have been analysed and evaluated against the problem it has been developed. A comparative table is also presented to guide future designers in developing machine learning solutions suitable for specific application challenges in localization.
Key-Words / Index Term
Wireless sensor networks, machine learning, localization, clustering, data aggregation
References
[1] T. O. Ayodele, “Introduction to Machine Learning,” in New Advances in Machine Learning, In Tech, 2010.
[2] A. H. Duffy, “The “What” and “How” of Learning in Design,” IEEE Expert, vol. 12, no. 3, pp. 71–76, 1997.
[3] P. Langley and H. A. Simon, “Applications of Machine Learning and Rule Induction,” Communications of the ACM, vol. 38, no. 11, pp. 54–64, 1995.
[4] H. Liu, H. Darabi, P. Banerjee, and J. Liu, “Survey of Wireless Indoor Positioning Techniques and Systems,” IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 37, no. 6, pp. 1067–1080, 2007.
[5] J. Wang, R. Ghosh, and S. Das, “A Survey on Sensor Localization,” Journal of Control Theory and Applications, vol. 8, no. 1, pp. 2–11, 2010.
[6] A. Nasipuri and K. Li, “A Directionality Based Location Discovery Scheme for Wireless Sensor Networks,” in Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications. ACM, pp. 105–111, 2002.
[7] W. Dargie and C. Poellabauer, Localization. John Wiley & Sons, Ltd, pp. 249–266, 2010.
[8] M. Morelande, B. Moran, and M. Brazil, “Bayesian Node Localisation in Wireless Sensor Networks,” in IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2545–2548, 2008.
[9] C.H. Lu and L.C. Fu, “Robust Location-Aware Activity Recognition using Wireless Sensor Network in an Attentive Home,” IEEE Transactions on Automation Science and Engineering, vol. 6, no. 4, pp. 598–609,2009.
[10] A. Shareef, Y. Zhu, and M. Musavi, “Localization using Neural Networks in Wireless Sensor Networks,” in Proceedings of the 1st International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, pp. 1–7, 2008.
[11] J. Winter, Y. Xu, and W.-C. Lee, “Energy Efficient Processing of K Nearest Neighbour Queries in Location-Aware Sensor Networks,” in 2nd International Conference on Mobile and Ubiquitous Systems: Networking and Services. IEEE, pp. 281–292, 2005.
[12] P. P. Jayaraman, A. Zaslavsky, and J. Delsing, “Intelligent Processing of k-Nearest Neighbours queries using Mobile Data Collectors in a Location Aware 3D Wireless Sensor Network,” in Trends in Applied Intelligent Systems. Springer, pp. 260–270.21, 2010.
[13] L. Yu, N. Wang, and X. Meng, “Real-Time Forest Fire Detection with Wireless Sensor Networks,” in International Conference on Wireless Communications, Networking and Mobile Computing, vol. 2, pp. 1214–1217, 2005.
[14] M. Bahrepour, N. Meratnia, M. Poel, Z. Taghikhaki, and P . J. Havinga,“Distributed Event Detection in Wireless Sensor Networks for Disaster Management,” in 2nd International Conference on Intelligent Networking and Collaborative Systems. IEEE, pp. 507–512, 2010.
[15] M. Kim and M.-G. Park, “Bayesian Statistical Modeling of System Energy Saving Effectiveness for MAC protocols of Wireless Sensor Networks,” in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, ser. Studies in Computational Intelligence. Springer Berlin Heidelberg, vol. 209, pp. 233–245, 2009.
[15] Y.J. Shen and M.S. Wang, “Broadcast Scheduling in Wireless Sensor Networks using Fuzzy Hopfield Neural Network,” Expert Systems with Applications, vol. 34, no. 2, pp. 900 – 907, 2008.
[17] R. V. Kulkarni and G. K. Venayagamoorthy, “Neural Network Based Secure Media Access Control Protocol for Wireless Sensor Networks,” in Proceedings of the 2009 International Joint Conference on Neural Networks, ser. IJCNN’09. Piscataway, NJ, USA: IEEE Press, pp. 3437–3444, 2009,
[18] D. Janakiram, V. Adi Mallikarjuna Reddy, and A. Phani Kumar, “Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks,” in 1st International Conference on Communication SystemSoftware and Middleware. IEEE, pp. 1–6, 2006.
[19] J. W. Branch, C. Giannella, B. Szymanski, R. Wolff, and H. Kargupta,“In Network Outlier Detection in Wireless Sensor Networks,” Knowledge and Information Systems, vol. 34, no. 1, pp. 23–54, 2013.
[20] S. Kaplantzis, A. Shilton, N. Mani, and Y. Sekercioglu, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines,” in 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, pp. 335–340, 2007.
[21] S. Rajasegarar, C. Leckie, M. Palaniswami, and J. Bezdek, “Quarter Sphere based Distributed Anomaly Detection in wireless sensor networks,” in International Conference on Communications, 2007, pp.3864–3869.
[22] A. Snow, P. Rastogi, and G. Weckman, “Assessing Dependability of Wireless Networks using Neural Networks,” in Military Communications Conference. IEEE, 2005, pp. 2809–2815 Vol. 5.
[23] A. Moustapha and R. Selmic, “Wireless Sensor Network Modeling using Modified Recurrent Neural Networks: Application to Fault Detection,” IEEE Transactions on Instrumentation and Measurement, vol. 57, no. 5,pp. 981–988, 2008.
[24] Y. Wang, M. Martonosi, and L.-S. Peh, “Predicting Link Quality using Supervised Learning in Wireless Sensor Networks,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 11, no. 3, pp.71–83, 2007.
[25] K. Beyer, J. Goldstein, R. Ramakrishnan, and U. Shaft, “When is “Nearest Neighbour” Meaningful?” in Database Theory. Springer, pp. 217–235, 1999.
[26] T. O. Ayodele, “Types of Machine Learning Algorithms,” in New Advances in Machine Learning. InTech, 2010.
[27] S. R. Safavian and D. Landgrebe, “A Survey of Decision Tree Classifier Methodology,” IEEE Transactions on Systems, Man and Cybernetics,vol. 21, no. 3, pp. 660–674, 1991.
[28] Y. Bengio, “Learning Deep Architectures for AI,” Foundations and Trends in Machine Learning, vol. 2, no. 1, pp. 1–127, 2009.
[29] R. Lippmann, “An Introduction to Computing with Neural Nets,” ASSP Magazine, IEEE, vol. 4, no. 2, pp. 4–22, 1987.
[30] W. Dargie and C. Poellabauer, Localization. John Wiley & Sons, Ltd, pp. 249–266, 2010.
[31] T. Kohonen, Self Organizing Maps, ser. Springer Series in Information Sciences. Springer Berlin Heidelberg, vol. 30, 2001.
[32] G. E. Hinton and R. R. Salakhutdinov, “Reducing the Dimensionality of Data with Neural Networks,” Science, vol. 313, no. 5786, pp. 504–507, 2006.
[33] I. Steinwart and A. Christmann, Support Vector Machines. Springer,2008.
[34] Z. Yang, N. Meratnia, and P. Havinga, “An Online Outlier Detection Technique for Wireless Sensor Networks using Unsupervised Quarter-Sphere Support Vector Machine,” in International Conference on Intelligent Sensors, Sensor Networks and Information Processing. IEEE, pp. 151–156, 2008.
[35] Y. Chen, Y. Qin, Y. Xiang, J. Zhong, and X. Jiao, “Intrusion Detection System based on Immune Algorithm and Support Vector Machine in Wireless Sensor Network,” in Information and Automation, ser. Communications in Computer and Information Science. Springer Berlin Heidelberg, vol. 86, pp. 372–376, 2011.
[36] Y. Zhang, N. Meratnia, and P. J. Havinga, “Distributed Online Outlier Detection in Wireless Sensor Networks using Ellipsoidal Support Vector Machine,” Ad Hoc Networks, vol. 11, no. 3, pp. 1062–1074, 2013.
[37] W. Kim, J. Park, and H. Kim, “Target Localization using Ensemble Support Vector Regression in Wireless Sensor Networks,” in Wireless Communications and Networking Conference, pp. 1–5, 2010.
[38] D. Tran and T. Nguyen, “Localization in Wireless Sensor Networks based on Support Vector Machines,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 7, pp. 981–994, 2008.
[39] B. Yang, J. Yang, J. Xu, and D. Yang, “Area Localization Algorithm for Mobile Nodes in Wireless Sensor Networks based on Support Vector Machines,” in Mobile Ad-Hoc and Sensor Networks. Springer, pp. 561–571, 2007.
[40] G. E. Box and G. C. Tiao, Bayesian inference in statistical analysis, John Wiley & Sons, vol. 40. 2011.
[41] C. E. Rasmussen, “Gaussian Processes for Machine Learning, “In Adaptive Computation and Machine Learning. Citeseer, 2006.
[42] S. Lee and T. Chung, “Data Aggregation for Wireless Sensor Networks using Self-Organizing Map,” in Artificial Intelligence and Simulation, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, vol. 3397, pp. 508–517, 2005.
[43] R. Masiero, G. Quer, D. Munaretto, M. Rossi, J. Widmer, and M. Zorzi, “Data Acquisition through Joint Compressive Sensing and Principal Component Analysis,” in Global Telecommunications Conference. IEEE, pp. 1–6, 2009.
[44] R. Masiero, G. Quer, M. Rossi, and M. Zorzi, “A Bayesian Analysis of Compressive Sensing Data Recovery in Wireless Sensor Networks,” in International Conference on Ultra Modern Telecommunications Workshops, pp. 1–6, 2009.
[45] A. Rooshenas, H. Rabiee, A. Movaghar, and M. Naderi, “Reducing the Data Transmission in Wireless Sensor Networks using the Principal Component Analysis,” in 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing. IEEE, pp. 133–138, 2010.
[46] S. Macua, P. Belanovic, and S. Zazo, “Consensus-based Distributed Principal Component Analysis in Wireless Sensor Networks, ” in 11th International Workshop on Signal Processing Advances in Wireless Communications, pp. 1–5, 2010.
[47] Y.C. Tseng, Y.C. Wang, K.Y. Cheng, and Y.Y. Hsieh, “ IMouse: An Integrated Mobile Surveillance and Wireless Sensor System,” Computer, vol. 40, no. 6, pp. 60–66, 2007.
[48] D. Li, K. Wong, Y. H. Hu, and A. Sayeed, “Detection, Classification, and Tracking of Targets,” IEEE Signal Processing Magazine, vol. 19 ,no. 2, pp. 17–29, 2002.
[49] T. Kanungo, D. M. Mount, N. S. Netanyahu, C. D. Piatko, R. Silverman, and A. Y. Wu, “An Efficient k-Means Clustering Algorithm: Analysis and Implementation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 881–892, 2002.
[50] I. T. Jolliffe, Principal Component Analysis. Springer verlag, 2002.
[51] D. Feldman, M. Schmidt, C. Sohler, D. Feldman, M. Schmidt, and C. Sohler, “Turning Big Data into Tiny Data: Constant-Size Coresets for k-Means, PCA and projective clustering,” in SODA, pp. 1434–1453, 2013.
[52] C. Watkins and P. Dayan, “Q-learning,” Machine Learning, vol. 8, no. 3-4, pp. 279–292, 1992.
[53] C. Musso, N. Oudjane, and F. Le Gland, “Improving Regularised Particle Filters,” in Sequential Monte Carlo Methods in Practice. Springer, pp. 247–271, 2001.
[54] Y.X. Wang and Y.J. Zhang, “Non-Negative Matrix Factorization: A Comprehensive Review,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 6, pp. 1336–1353, 2013.
[55] S. Yun, J. Lee, W. Chung, E. Kim, and S. Kim, “A Soft Computing Approach to Localization in Wireless Sensor Networks,” Expert Systems with Applications, vol. 36, no. 4, pp. 7552–7561, 2009.
[56] S. Chagas, J. Martins, and L. de Oliveira, “An Approach to Localization Scheme of Wireless Sensor Networks based on Artificial Neural Networks and Genetic Algorithms,” in 10th International Conference on New Circuits and Systems. IEEE, pp. 137–140, 2012.
[57] Z. Merhi, M. Elgamel, and M. Bayoumi, “A Lightweight Collaborative Fault Tolerant Target Localization System for Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 8, no. 12, pp. 1690–1704, 2009.
[58] H.-P. Tan, R. Diamant, W. K. Seah, and M. Waldmeyer, “A Survey of Techniques and Challenges in Underwater Localization,” Ocean Engineering, vol. 38, no. 14, pp. 1663–1676, 2011.
[59] E. Cayirci, H. Tezcan, Y. Dogan, and V. Coskun, “Wireless Sensor Networks for Underwater Surveillance Systems,” Ad Hoc Networks, vol. 4, no. 4, pp. 431–446, 2006.
[60] A. Krause, A. Singh, and C. Guestrin, “Near Optimal Sensor Placements in Gaussian Processes: Theory, Efficient Algorithms and Empirical Studies,” The Journal of Machine Learning Research, vol. 9, pp. 235–284, 2008.
[61] D. Gu and H. Hu, “Spatial Gaussian Process Regression with Mobile Sensor Networks,” IEEE Transactions on Neural Networks and Learning Systems, vol. 23, no. 8, pp. 1279–1290, 2012.
[62] L. Paladina, M. Paone, G. Iellamo, and A. Puliafito, “Self Organizing Maps for Distributed Localization in Wireless Sensor Networks,” in 12th IEEE Symposium on Computers and Communications, pp. 1113–1118, 2007.
[63] G. Giorgetti, S. K. S. Gupta, and G. Manes, “Wireless Localization using Self Organizing Maps,” in Proceedings of the 6th International Conference on Information Processing in Sensor Networks, ser. IPSN ’07. New York, NY, USA: ACM, pp. 293–302, 2007.
[64] J. Hu and G. Lee, “Distributed Localization of Wireless Sensor Networks using Self-Organizing Maps,” in IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, pp.284–289, 2008.
[65] S. Li, X. Kong, and D. Lowe, “Dynamic Path Determination of Mobile Beacons Employing Reinforcement Learning for Wireless Sensor Localization,” in 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 760–765, 2012.
Citation
S. Pandey, "Localization Adopting Machine Learning Techniques in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.366-374, 2018.
Cost Optimization Techniques in Cloud Computing
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.375-380, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.375380
Abstract
The key qualities of distributed computing are the capacity of scaling assets basically endlessly, the ability to pay just when an asset is really required, and the disposal of extensive forthright expenses for clients [1,2]. What`s more, low costs and usability urge ventures to use distributed computing to have their IT framework. Distributed computing is offered by cloud suppliers, among which the most conspicuous illustrations are Amazon Web Services (AWS) , Google Cloud , and Microsoft Azure . Each cloud supplier has distinctive evaluating systems; be that as it may, for processing assets they offer two classes of items: ondemand cases and saved examples. On-request cases are virtual machines made and paid for just when used. A cloud client includes and expels a request example with greatest adaptability. Then again, held cases are computational assets saved and paid for a specific period, with a forthright expense. The last class requires a larger amount of duty for the client; in this manner, if broadly used, they result to be less expensive amid a long haul usage. All together stay away from pointless costs, clients of distributed computing need watchful arranging. On one hand saved occurrences are helpful for fetched reserve funds. Then again, if held occurrences are underutilized, they create superfluous expenses. As of now, specialists have broadly examined the field of cost enhancement in distributed computing. A standout amongst the most encouraging strategies is to use Integer Programming to demonstrate the enhancement issue [3, 4]. Different creators misuse a two-advance approach: to start with, they propose a request forecaster and after that, they plan to locate an ideal arrangement with transformative algorithms[5,6]. The paper assesses the proposed demonstrate utilizing information from an industry case, contrasting the execution and an brute-force approach.
Key-Words / Index Term
Cloud Computing, Cost Optimization, Reserved Instances, Software as a service; Platform as a service; Infrastructure as a service
References
[1] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al. A view of cloud computing. Communications of the ACM 53, 4 (2010), 50–58.
[2] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., and Zaharia, M. Above the clouds: A berkeley view of cloud computing. Tech. rep., Electrical Engineering and Computer Sciences University of California at Berkeley, 2009.
[3] Chaisiri, S., Kaewpuang, R., Lee, B.-S., and Niyato, D. Cost minimization for provisioning virtual servers in amazon elastic compute cloud. In Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2011 IEEE 19th International Symposium on (2011), IEEE, pp. 85–95.
[4] Chaisiri, S., Lee, B.-S., and Niyato, D. Robust cloud resource provisioning for cloud computing environments. In Service-Oriented Computing and Applications (SOCA), 2010 IEEE International Conference on (2010), IEEE, pp. 1–8.
[5] Mark, C. C. T., Niyato, D., and Chen-Khong, T. Evolutionary optimal virtual machine placement and demand forecaster for cloud computing. In Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on (2011), IEEE, pp. 348–355.
[6] Yousefyan, S., Dastjerdi, A. V., and Salehnamadi, M. R. Cost effective cloud resource provisioning with imperialist competitive algorithm optimization. In Information and Knowledge Technology (IKT), 2013 5th Conference on (2013), IEEE, pp. 55–60.
[7] FILANI, D., HE, J., GAO, S., RAJAPPA, M., KUMAR, A., SHAH, R., AND NAAPPAN, R. Dynamic data center power management: Trends, issues and solutions. Intel Technology Journal (2008).
[8] VISHWANATH, K. V., AND NAGAPPAN, N. Characterizing cloud computing hardware reliability. In Proc. of 1st ACM Symposium on Cloud Computing (June 2010).
[9] PINHERIO, E., BIANCHINI, R., CARRERA, E. V., AND HEATH, T. Dynamic cluster reconfiguration for power and performance. In Compilers and Operating Systems for Low Power (2003), L. Benini, M. Kandemir, and J. Rammanujam, Eds., Kluwer.
[10] Al-Roomi, M., Al-Ebrahim, S., Buqrais, S., Ahmad, I., (2013), Cloud Computing Pricing Models: A Survey. International Journal of Grid and Distributed Computing: Vol 6. No 5.
[11] Lampe, U., Hans, R., Selieger, M., Pauly, M., Schiefer, M., (2014). Pricing in Infrastructure Clouds – An Analytical and Empirical Examination. In: Proceedings of the 20th Americas conference on Information systems.
[12] Lai, K., (2005). Markets are dead long live markets. In: SIGecom Exchanges 5(4): pp 1–10.
[13] Weinhardt, C., Blau, B., Stößer, J., (2009). Cloud Computing – A Classification, Business Models, and Research Directions. Business & Information Systems Engineering 05/2009.
[14] Pueschel, T., Anandasivam, A., Buschek, S., Neumann, D., (2009). Making money with clouds: Revenue optimization through automated policy decisions. ECIS - European Conference on Information Systems 17.
[15] Labes, S., Erek, K., Zarnekow, R., (2013). Common Patterns of Cloud Business Models. In Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013.
[16] Lilienthal, M., (2013). A Decision Support Model for Cloud Bursting, Business & Information Systems Engineering 2|2013.
[17] Lambrecht, A., Skiera, B., (2006). Paying Too Much and Being Happy about It: Existence, Causes and Consequences of Tariff-Choice Biases. Marketing Research 43, number 2 (2006): 212-223
[18] Microsoft cloud services pricing details (2014). .https://azure.microsoft.com/en-us/pricing/details/cloud-services/, accessed 02 Aug 2014
[19] Varian, H. R., (2003). Economics of Information Technology. Working Paper.
Citation
B. Mahesh, "Cost Optimization Techniques in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.375-380, 2018.
Application of clustering algorithm for analysis of Student Academic Performance
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.381-384, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.381384
Abstract
The analysis of the Student academic performance in educational institutions is a crucial task to make managerial decisions and to impart quality education. The data pertaining to the educational institutions is increasing rapidly. Mining these large volumes of the data will help the management to make academia decisions. Predicting the academic performance of the student at an early stage of their course will help the academia to identify the merit students and also to put more efforts in developing remedial programs for the weaker students to improve their performance. In this paper, we applied k-means clustering algorithm for analysing the students result data and predicting the students’ performance.
Key-Words / Index Term
Academic Performance, Data Mining, Student’s result data, clustering
References
[1] H. Jiawei. Kamber, and J. Pei, Data Mining: Concepts and Techniques, San Francisco California, Morgan Kaufmann Publishers, 2012.
[2] A.K. Jain, Data clustering: “50 years beyond K-means, Pattern Recognition Letters”, Elsevier, vol.31, pp.651-666, 2010.
[3] Md. Hedayetul Islam Shovon, “Prediction of Student Academic Performance by an Application of K-Means Clustering Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2(7), July 2012.
[4] Monika Goyal, Rajan Vohra, “Applications of Data Mining in Higher Education”, International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012
[5] Ayesha, S. , Mustafa, T. , Sattar, A. and Khan, I. (2010) ‗Data Mining Model for Higher Education System‘, European Journal of Scientific Research, vol. 43, no. 1, pp. 24-29.
[6] M. N. Quadri1 and Dr. N.V. Kalyanka- Drop Out Feature of Student Data for Academic Performance Using Decision Tree, Global Journal of Computer Science and Technology Vol. 10 Issue 2 (Ver 1.0), April 2010.
[7] Baradwaj, B. and Pal, S. (2011) ‗Mining Educational Data to Analyze Student s‘ Performance‘, International Journal of Advanced Computer Science and Applications, vol. 2, no. 6, pp. 63-69.
[8] Oyelade, O. J, “Application of k-Means Clustering algorithm for prediction of Students’ Academic Performance”, (IJCSIS) International Journal of Computer Science and Information
Security, Vol.7, 2010.
[9] Sajadin Sembiring, M. Zarlis, Dedy Hartama,Ramliana S, Elvi Wani. Prediction of Student Academic Performance by An Application of Data Mining Techniques, International Conference on Management and Artificial Intelligence, Bali, Indonesia,IPEDR vol.6 ,pp.110-114,2011.
[10] P. Ajith, M.S.S.Sai, B. Tejaswi, Evaluation of Student Performance: An Outlier Detection Perspective, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-2, January, 2013.
[11] D. Kabakchieva, “Analyzing University Data for Determining Student Profiles and Predicting Performance”, Cybernetics and Information Technologies, Vol.1(3), March 2013.
Citation
A Seetharam Nagesh, Ch V S Satyamurty, "Application of clustering algorithm for analysis of Student Academic Performance," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.381-384, 2018.
Knowledge Analytics in Cloud Centric IoT Vicinities
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.385-390, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.385390
Abstract
The rapid increasing of real-time applications in today’s IoT (internet of things) world progressively lead to several problem issues such as, data volume, velocity, variety, and value. The study reveals that around 80% data in today’s IoT world are unstructured and needs an extensive knowledge exploration framework to turn the massively produced data into cognitive values (knowledge) of goldmines. In contemporary IoT vicinities, the time to get knowledge is very slow and the applicability of the knowledge is very poor, so the knowledge researchers start looking new framework that deals with the problems of semantic knowledge analytics and inference. In a typical semantic knowledge analytic scenario, context specification, rule specification, and frame specification may be used to define the structural relationships of knowledge, where the contexts, rules, and frames are stored as specification of framework and sub-framework. In this work, we investigate the viability of a context and rule Analytic framework (CORA-framework) for trustful knowledge analytic and inference in the cloud centric IoT vicinities. We also investigate a knowledge inference case in order to estimate the probabilistic error analysis based on outlier prospect and the knowledge analytic precision based on the root mean square error prospect. The analysis and discussion suggest implementing an outlier analytic mechanism to increase CORA-framework accuracy with estimating the error prediction outcome.
Key-Words / Index Term
IoT (internet of things), context and rule specification, outlier analytic, IoT knowledge analytic, cloud
References
[1] Mishra, Nilamadhab, Chung-Chih Lin, and Hsien-Tsung Chang. "A Cognitive Oriented Framework for IoT Big-data Management Prospective."Communication Problem-Solving (ICCP), 2014 IEEE International Conference on. IEEE, 2014.
[2] S.J. Nasti, M. Asgar, M.A. Butt , "Analysis of Customer Behaviour using Modern Data Mining Techniques", International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.64-66, 2017.
[3] Zarko, Ivana Podnar, et al. "IoT data management methods and optimisation algorithms for mobile publish/subscribe services in cloud Environment. “Networks and Communications (EuCNC), 2014 European Conference on. IEEE, 2014.
[4] Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29.7 (2013): 1645-1660.
[5] Anantharam, Pramod, Payam Barnaghi, and Amit Sheth. "Data Processing and Semantics for Advanced Internet of Things (IoT) Applications: modeling, annotation, integration, and perception." Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics. ACM, 2013.
[6] Mishra, Nilamadhab, Hsien-Tsung Chang, and Chung-Chih Lin. "An IoT Knowledge Re-engineering Framework for Semantic Knowledge Analytics for BI-services." Mathematical problems in engineering, vol. 2015, Article id-759425, 12 pages (2015).
[7] Dagnino, Aldo, and David Cox. "Industrial Analytics to Discover Knowledge from Instrumented Networked Machines." Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (SEKE’14), Vancouver, Canada. 2014.
[8] Chang, H. T., Mishra, N., & Lin, C. C., IoT big-data centred knowledge granule analytic and cluster framework for BI applications: a case base analysis. PloS one, 10(11), 2015.
[9] Mishra, N., Chang, H. T., & Lin, C. C. Sensor data distribution and knowledge inference framework for a cognitive-based distributed storage sink environment. International Journal of Sensor Networks, 26(1), 26-42,2018.
[10] Mishra N,. "In-network Distributed Analytics on Data-centric IoT Network for BI-service Applications", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN: 2456-3307, Volume 2, Issue 5, pp.547-552, September-October.2017.
[11] Patnaik, B. C., & Mishra, N. “A Review on Enhancing the Journaling File System”, Imperial Journal of Interdisciplinary Research, 2, no. 11 (2016)
[12] Chang, H. T., Yu-Wen Li., & Mishra, N. “mCAF: A Multi-dimensional Clustering Algorithm for Friends of Social Network Services”, Springer Plus, 2016.
[13] Chang, H. T., Liu, S. W., & Mishra, N. “A tracking and summarization system for online Chinese news topics”, Aslib Journal of Information Management, 67(6), 687-699,2015.
[14] Mishra, N., Lin, C. C., & Chang, H. T. “A Cognitive Adopted Framework for IoT Big-Data Management and Knowledge Discovery Prospective”, International Journal of Distributed Sensor Networks, 2015.
[15] Mishra, N., Lin, C. C., & Chang, H. T. “Cognitive inference device for activity supervision in the elderly”, The Scientific World Journal, 2014.
[16] Mishra, N., Chang, H. T., & Lin, C. C. “Data-centric Knowledge Discovery Strategy for a Safety-critical Sensor Application”, International Journal of Antennas and Propagation, Article ID 172186, 11 pages, 2014. doi:10.1155/2014/172186.
Citation
Nilamadhab Mishra, Kindie Alebachew, Bikash Chandra Patnaik , "Knowledge Analytics in Cloud Centric IoT Vicinities," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.385-390, 2018.
Survey on Tweet Segmentation and Sentiment Analysis
Survey Paper | Journal Paper
Vol.6 , Issue.1 , pp.391-394, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.391394
Abstract
With the explosive growth of user generated messages, twitter has become a social site where millions of users can exchange their opinions. Sentiment analysis on twitter data plays an important role in finding public opinions which have provided an economical and effective way timely, which is very useful for decision making in various domains. A company can take the public opinion in tweets to obtain user review towards its products where a politician can adjust his position with respect to the opinion change of the public. There have been a large number of research studies and industrial applications in the area of public sentiment tracking and modeling. Millions of users give their opinions on Twitter, making it a valuable platform for tracking and analyzing public sentiment. Such tracking and analysis can provide critical information for decision making in various domains. So, it has attracted attention in both academic and industry. Previous researches showed that the tweet was classified appropriately only if the tweet would contain the exact same label as the training set. But this approach fails when the tweet contains a synonym or a variant of the label instead of the exact same label.
Key-Words / Index Term
Classifier, Opinion Mining, Lexicon, Sentiment Analysis, Twitter
References
[1] Chenliang Li, Aixin Sun, Jianshu Weng, and Qi He, Member IEEE, “Tweet Segmentation And Its Application To Named Entity Recognition”, IEEE Transactions on knowledge and data engineering ,Vol.27,No.2, pages. 558-570 , 2015.
[2] Ana C. E. S. Lima, Lean Dran. Castro, “Development of a Novel Algorithm for Sentiment Analysis Based on Adverb Adjective Noun
Combinations”, IEEE, 2012.
[3] R. Varghese, “A Survey on Sentiment Analysis and Opinion
Mining”, IJRET, 2013.
[4] Ana C. E. S. Lima, Lean Dran.Castro “Automatic sentiment Analysis
of Twitter Message”, IEEE, 2012.
[5] Magar Ranjeet, Bhoge Swapnil, “A Survey on Tweet Segmentation
and its Application to Named Entity Recognition”, IJIRCCE, 2016.
[6] Chenliang Li, Aixin Sun, Anwitaman Datta “ Twevent: Segment-
based Event Detection from Tweets”, ACM, 2012.
[7] M. Ganga, S. Aanjan Kumar,“Segmenting and Detecting Malicious
Tweets and Harmful Entity Recognition” , IJIRCCE, 2016.
[8] Hu X. Tang, “The How, When and Why of Sentiment Analysis”,
IJCTA, 2013.
[9] R. Gomathi, M. Rajkumar, “ Tweet Segmentation And
Classification For Rumor Identification using KNN Approach”,
IJCRME, 2016.
[10] Shachi H. Kumar, University of California, Santa Cruz Computer
Science, “Twitter Sentiment Analysis CMPS 242 Project Report”.
[11] Ian H. Witten, “Text Mining”, pp. 1-23.
[12]Vishal Gupta , Gurpreet S. Lehal, “A Survey of Text Mining
Techniques and Applications”, JOURNAL OF EMERGING
TECHNOLOGIES IN WEB INTELLIGENCE, Vol.1, 2012.
[13] Xiaowen Ding, Bing Liu, Philip S. Yu, “A Holistic Lexicon
Based Approach to Opinion Mining ”, ACM, 2008.
[14] Ion Smeureanu, Cristian Bucur, “Applying Supervised Opinion
Mining Techniques on Online User Reviews”, Informatics, Economics, Vol .16, 2012.
[15] K. Nathiya, Dr. N. K. Sakthivel, “Development of an Enhanced
Efficient Parallel Opinion Mining for Predicting the Performance
of Various Products”, International Journal of Innovative
Research in Computer and Communication Engineering, Vol.1,
2013.
[16] Arti Buche, Dr. M. B. Chandak, Akshay Zadgaonkar, “OPINION
MINING AND ANALYSIS: A SURVEY”, International Journal
on Natural Language Computing, Vol.2, 2013.
[17] Doyen Sahoo, Chenghao Liu, and Steven C.H. Hoi “ Malicious
URL Detection using Machine Learning: A Survey”, IEEE, 2017.
[18] V. Gayathri, A.E. Narayanan “Tweet Segmentation And
Classification For Rumor Identification Using KNN Approach”,
Indian J. SCI. Res. 14 (1): 102-108, 2016.
[19] S. Kukku S, Reshma Reghu and Gaina K.G, “Tweet Segmentation
and its Application Using RandomWalk And Part-of-speech
Methods”, I J C T, pp. 7497-7501 , 2016.
[20] MandhalaVinoothna, “Segmentation of Trust Worthy Based Secure
Data”, International Journal of Big Data Security Intelligence
Vol.2, No.2, pp. 23-28 ,2015.
[21] Chetan Chavan, Ranjeet Singh, “Summarization of Tweets and
Named Entity Recognition from Tweet Segmentation”,
International Conference on Automatic Control and Dynamic
Optimization (ICACDOT),International Institute of Information
Technology, pages. 66-71 , 2016.
[22] Sonam Meshram, Hirendra Hajare, “Tweet Segmentation and
Enhancement of Tweets”, International Journal of Science and
Research (IJSR), Volume.5 Issue.5, pages. 577-579, 2016.
[23] Prof. Vikas Balasaheb Burgute, Prof. A. K. Gupta, “Named Entity
Recognition using Tweet Segmentation ”, International Research
Journal of Engineering and Technology (IRJET), Vol: 4, Issue: 7,
pages. 1068-1075, 2017.
Citation
S.S. Ansari, T. Diwan, "Survey on Tweet Segmentation and Sentiment Analysis," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.391-394, 2018.
A Survey on Enhanced Routing Protocol for Underwater Sensor Networks
Survey Paper | Journal Paper
Vol.6 , Issue.1 , pp.395-401, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.395401
Abstract
Opportunistic void avoidance routing (OVAR) convention has been proposed for UWSNs. It is an any cast, geographic and entrepreneurial steering convention. Expanding consideration has as of late been given to underwater sensor networks (UWSNs) due to their capacities in the sea checking and asset revelation. UWSNs are looked with changed difficulties, the most remarkable of which is maybe how to proficiently convey parcels considering the majority of the limitations of the accessible acoustic correspondence channel. The proposed an improved directing convention, called opportunistic void avoidance routing (OVAR). This address the void issue and the vitality unwavering quality exchange off in the determination of sending set. OVAR exploits disseminated beaconing, builds the contiguousness chart at each jump and chooses a sending set that holds the best exchange off amongst unwavering quality and vitality proficiency. The one of a kind highlights of OVAR in choosing the hopeful nodes in the region of each different prompts the determination of the concealed node issue.
Key-Words / Index Term
Underwater sensors, Opportunistic Routing
References
[1]. Heidemann, J.; Stojanovic, M.; Zorzi, M. “Underwater Sensor Networks: Applications, Advances, and Challenges”. Philos. Trans. R. Soc. (A) 2012, 370, 158–175.
[2]. Guo, Z.; Luo, H.; Hong, F.; Yang, M.; Li, N. “Current progress and Research Issues in Underwater Sensor Networks”. J. Comput. Res. Dev. 2010, 47, 377–389.
[3]. Qarabaqi, P.; Stojanovic, M. “Statistical Characterization and Computationally Efficient Modeling of a Class of Underwater Acoustic Communication Channels”. IEEE J. Ocean. Eng. 2013, 38, 701–717.
[4]. Coutinho, R.W.L.; Boukerche, A.; Vieira, L.F.M.; Loureiro, A.A.F. “GEDAR: Geographic and Opportunistic Routing Protocol with Depth Adjustment for Mobile Underwater Sensor Networks”. In Proceedings of the IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014; pp. 251–256.
[5]. Hong, F.; Zhang, Y.L.; Yang, B.Z.; Guo, Y.; Guo, Z. “Review on Time Synchronization Techniques in Underwater Acoustic Sensor Networks”. Acta Electron. Sin. 2013, 41, 960–965.
[6]. Peng, J.; Hong, C.J.; Liu, T. “Strategy of routing based on layered for underwater wireless sensor networks”. J. Commun. 2014, 35, 25–31.
[7]. Stojanovic, M.; Freitag, L. “Recent Trends in Underwater Acoustic Communications”. Mar. Technol. Soc. J. 2013, 47, 45–50.
[8]. Ayaz, M.; Baig, I.; Abdullah, A.; Faye, I. Review: “A survey on routing techniques in underwater wireless sensor networks”. J. Netw. Comput. Appl. 2011, 34, 1908–1927.
[9]. Ahlswede, R.; Cai, N.; Li, S.Y.R.; Yeung, R.W. “Network Information Flow”. IEEE Trans. Inf. Theory 2000, 46, 1204–1216.
[10]. Erez, E.; Kim, M.; Xu, Y.; Yeh, E.M.; Médard, M. “Deterministic Network Model Revisited: An Algebraic Network Coding Approach”. IEEE Trans. Inf. Theory 2014, 60, 4867–4879.
[11]. Angelopoulos, G.; Chandrakasan, A.P.; Médard, M. PRAC: “Exploiting Partial Packets without Cross-layer or Feedback Information”. In Proceedings of the IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014; pp. 5802–5807.
[12]. Zhang, X.; Neglia, G.; Kurose, J.; Towsley, D.; Wang, H. “Benefits of Network Coding for Unicast Application in Disruption-Tolerant Networks”. IEEE/ACM Trans. Netw. 2013, 5, 1407–1420.
[13]. Wu, H.; Chen, M.; Guan, X. “A Network Coding Based Routing Protocol for Underwater Sensor Networks”. Sensors 2012, 12,4559–4577.
[14]. Wang, D.; Zhang, Q.; Liu, J. “Partial Network Coding: Theory and Application for Continuous Sensor Data Collection”. In Proceedings of the IEEE International Workshop on Quality of Service (IWQoS), New Haven, CT, USA, 19–21 June 2006; pp. 93–101.
[15]. Yan, H.; Shi, Z.J.; Cui, J.H. “DBR: Depth-based routing for underwater sensor networks”. In Proceedings of the 7th International IFIP-TC6 Networking Conference on Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Singapore, 5–9 May 2008; pp. 72–86.
[16]. Xie, P.; Cui, J.H.; Lao, L. “VBF: vector-based forwarding protocol for underwater sensor networks”. In Proceedings of the 5th International IFIP-TC6 Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, Coimbra, Portugal, 15–19 May 2006; pp. 1216–1221. Sensors 2015, 15 12735.
[17]. Nicolaou, N.; See, A.; Xie, P.; Cui, J.H.; Maggiorini, D. “Improving the robustness of location-based routing for underwater sensor networks”. In Proceedings of the OCEANS 2007—Europe, Aberdeen, UK, 18–21 June 2007; p. 106.
[18]. Jornet, J.M.; Stojanovic, M.; Zorzi, M. “Focused beam routing protocol for underwater acoustic networks”. In Proceedings of the Third ACM International Workshop on Underwater Networks (WUWNet), San Francisco, CA, USA, 14–19 September 2008; pp. 75–82.
[19]. Chen, Y.S.; Juang, T.Y.; Lin, Y.W.; Tsai, I.C. “A Low Propagation Delay Multi-Path Routing Protocol for Underwater Sensor Networks”. J. Internet Technol. 2010, 11, 153–165.
[20]. Mo, H.; Zhou, Z.; Zuba, M.; Peng1, Z.; Cui, J.H.; Shu, Y. “Practical Coding-based Multi-hop Reliable Data Transfer for Underwater Acoustic Networks”. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012; pp. 5751–5756.
[21]. Chitre, M.; Soh, W.S. “Network coding to combat packet loss in underwater networks”. In Proceedings of the Fifth ACM International Workshop on UnderWater Networks (WUWNet), Woods Hole, MA, USA, 30 September–1 October 2010; p. 106.
[22]. Guo, Z.; Wang, B.; Xie, P.; Zeng, W.; Cui, J.H. “Efficient error recovery with network coding in underwater sensor networks”. Ad Hoc Netw. 2009, 7, 791–802.
[23]. Kun, H; Zhigang, J; Ping, H. “A New Opportunistic Routing Mechanism Based on Partial Network Coding”, In Proceedings of the 5th International Conference on Intelligent Networks and Intelligent Systems, Bucharest, Romania, 19–21 September 2012; pp. 154–157.
[24]. P. Xie, Z. Zhou, Z. Peng, J.-H. Cui, and Z. Shi, “Void avoidance in three-dimensional mobile underwater sensor networks”, in Wireless Algorithms, Systems, and Applications, pp. 305–314, Springer, 2009.
[25]. H. Yu, N. Yao, and J. Liu, “An adaptive routing protocol in underwater sparse acoustic sensor networks”, Ad Hoc Networks, 2014.
[26]. R. W. Coutinho, A. Boukerche, L. F. Vieira, and A. A. Loureiro, “A novel void node recovery paradigm for long-term underwater sensor networks,” Ad Hoc Networks, 2015.
[27]. Rodolfo W.L. Coutinho, Azzedine Boukerche, Luiz F.M. Vieira, and Antonio A.F. Loureiro “Geographic and Opportunistic Routing for Underwater Sensor Networks” IEEE Transactions on Computers, Vol. 65, no. 2, Feb 2016.
[28]. Cong Wang, Songtao Guo, and Yuanyuan Yang “An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks” DOI 10.1109/TMC.2016.2533390, IEEE.
[29]. Yi Gao, Student Member, IEEE, Wei Dong, Member, IEEE, Chun Chen, Member, IEEE, Jiajun Bu, Member, IEEE, and Xue Liu, Member, IEEE, “Towards Reconstructing Routing Paths in Large Scale Sensor Networks” DOI 10.1109/TC.2015.2417564, IEEE.
[30]. Ningrinla Marchang, Member, IEEE, Raja Datta, Senior Member, IEEE, and Sajal K. Das, Fellow, IEEE “A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks” IEEE Transactions on Vehicular Technology.
Citation
K. Mithun Kumar, P. Varaprasada Rao, "A Survey on Enhanced Routing Protocol for Underwater Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.395-401, 2018.
Machine Translation : Need of the Time
Survey Paper | Journal Paper
Vol.6 , Issue.1 , pp.402-404, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.402404
Abstract
Machine Translation provides a solution in breaking the language barrier so that humans can transform information, it is important application of Natural Language Processing There are many different languages spoken in this world. Among those language English is the global language. Though it is global language many people can’t understand English especially in rural areas of India. From the many years machine translation has been a topic of research. There are many methods and techniques for achieving the machine translation. In India many regional languages are spoken. The mother of all these native languages in India is Sanskrit. A great storage of knowledge with subjects like medicine, mathematics, Geography, Geology, Astronomy, philosophy and many others is kept alive and fresh in Sanskrit for thousands of years. Hence here we have chosen Sanskrit as the target language. Most of the literature, political documents etc. are available in English. So we have chosen English as a source language. This paper illustrates about the language translation mechanism which converts English text to Sanskrit text using Rule Based approach. Presently work on machine translation in India is performed at various locations like JNU, IIT Kanpur, CDAC Pune and many more.
Key-Words / Index Term
Rule based dictionary approach, Parser, Bilingual dictionary, Formant Synthesizer. Morphological analyzer, Corpus based translation, English-to-Sankrit Transliteration
References
XI. References
[1] V.M.Barkade, “English to Sanskrit machine translation semantic mapper”, International Journal of Engineering Science and Technology Vol. 2(10), 2010, 5313-5318, 2010
[2] V.M Barkade, “English to Sanskrit Machine Translator Lexical Parser and Semantic Mapper”, National Conference On "Information and Communication Technology", NCICT-IOJ, 2010.
[3] Vimal Mishra, “Approach of English to Sanskrit machine translation based on case-based reasoning, artificial neural networks and translation rules”, International Journal of Knowledge Engineering and Soft Data Paradigms, 2010-12-01
[4] P.R.Devale,V.M..Barkade “English to Sanskrit Machine Translator: Lexical Parser”, International Journal on Computer Science and Engineering, ISSN-0975-3397,Vol.02, N0.06, 2010
[5] P.R.Devale,V.M..Barkade “English to Sanskrit Machine Translator: Semantic Mapper”, International Journal of Engineering Science and Technology, ISSN-0975-5462,Vol.02, N0.10, 2010
[6] P.R.Devale, D.T.Mane, “Rule Based Approach for English-to-Sanskrit Machine Translation and Synthesizer System”, Oriental Journal of Computer Science & Technology : An International Journal, Vol.3, No.2, ISSN : 0974-6471, 2010
[7] P.R.Devale,V.M..Barkade “English to Sanskrit Machine Translator: Lexical Parser and Semantic Mapper”,International Journal on Computer Science and Engineering , ISSN-0975-3397, 2010
[8] P.R.Devale Sandeep Warhade, “Statistical Machine Translation Approach for English-to-Sanskrit Translation in Ubiquitous Environment”, International Journal of Engineering and Innovative Technology, ISSN:2277-3754,Vol 1, Issue 6, 2012
[9] P.R.Devale Sandeep Warhade, “Design of Phrase Based Decoder for English-to-Sanskrit Translation”, Journal of Global Research in Computer Science, ISSN:2229-371X, Vol 3, Issue 1, 2012
[10] P.R.Devale Sandeep Warhade “English-to-Sanskrit Statistical Machine Translation with Ubiquitous Application”, International Journal of Computer Applications, ISSN:0975-8887, Vol.51, Issue.01, 2012
Authors Profile
Mr.P.R.Devale pursued Bachelor of Engineering in Computer Engineering from Walchand College of Engineering, Sangli (India) in 1992 and he pursued his Master of Engineering in Computer Engineering from Bharati Vidyapeeth Demmed Univesity College of Engineering, Pune (India) in 2004. Currently he is pursuing his Ph.D in Computer Engineering from Bharati Vidyapeeth Deemed University, Pune (India).
Mr.S.H.Patil pursued Bachelor of Engineering in Computer Engineering from Walchand Institute of Technology, Solapur (India) in 1989 and he pursued his Master of Engineering in Computer Engineering from University of Pune (India), in 1992. He has completed his Ph.D in Computer Engineering from Bharati Vidyapeeth Deemed University, Pune (India) in 2009. Currently he is working as Professor in the Department of Computer Engineering in Bharati Vidyappeth Deemed University College of Engineering, Pune (India).
Citation
P.R. Devale, S.H. Patil, "Machine Translation : Need of the Time," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.402-404, 2018.
Advanced Gaming CAPTCHA for Better Security Concern
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.405-408, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.405408
Abstract
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a test to distinguish a human from a robot. There are different kinds of CAPTCHA available and there security varies accordingly such as text based CAPTCHA, picture based CAPTCHA, 3D CAPTCHA, Audio CAPTCHA and Gaming CAPTCHA. This paper is based on gaming CAPTCHA and gaming CAPTCHA may have static object and targets, as well as dynamic, but only dragging the object to the target is not supposed to be the best security because nowadays attacking level has been raised. CAPTCHA should be more advanced and analytical for best security in the field of CAPTCHA. This paper proposed an advanced gaming CAPTCHA which is more advanced and analytical or intellectual. And this gaming CAPTCHA is often easy and interactive for human and impossible for robot. This system took the CAPTCHA into another level.
Key-Words / Index Term
Gaming CAPTCHA, Puzzle, Robot, Action Script, WAMP Server, MySQL
References
[1] JingSong Cui, LiJing Wang, JingTing Mei, Da Zhang, Xia Wang, Yang Peng, WuZhou Zhang, “CAPTCHA Design Based on Moving Object Recognition Problem”, IEEE Transaction, 2009.
[2] Jing-Song Cui, Jing-Ting Mei, Xia Wang, Da Zhang, Wu-Zhou Zhang, “A CAPTCHA Implementation Based on 3D Animation”, IEEE Transaction, 2009.
[3] Chun-Ming Leung, “Depress Phishing by CAPTCHA with OTP”, IEEE Transaction, 2009.
[4] Aadhirai R, Sathish Kumar P J and Vishnupriya S, “Image CAPTCHA: Based on Human Understanding of Real World Distances”, IEEE Transaction, 2012.
[5] Song Gao, Manar Mohamed, NiteshSaxena and Chengcui Zhang, “Gaming the game: Defeating a game CAPTCHA with efficient and robust hybrid attacks”, IEEE Transaction, 2014.
[6] ArtemShumilov, AndreyPhilippovich, “Cloud-Based CAPTCHA Service”, IEEE Transaction, 2016.
[7] Vipin Kumar and Atul Barve, “Dynamic Object and Target based Gaming CAPTCHA for Better Security Analysis”, International Journal of Computer Applications (0975 – 8887) Volume 162 – No 5, 2017.
Citation
Madhav Chaturvedi, Ankur Taneja, "Advanced Gaming CAPTCHA for Better Security Concern," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.405-408, 2018.
POS Tagging for Marathi Language using Hidden Markov Model
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.409-412, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.409412
Abstract
Part-of-speech (POS) tagging plays significant role in almost every natural language processing task. This paper addresses a problem of POS tagging for Marathi language. Marathi is free word order, morphologically rich and highly inflectional Indian language. Supervised learning method that uses Hidden Markov Model is implemented to mark Marathi text using POS tags. The dataset required for training the algorithm consists of 12,000 Marathi sentences comprising news from popular Marathi newspaper. The algorithm for POS tagging predicts the tag for current word using the previous word tag pair. The POS tagging system has reported 86.61% accuracy in predicting correct POS to the words.
Key-Words / Index Term
Marathi, HMM, POS, Part of Speech, Tagset, Supervised learning
References
[1] Nita Patil, Ajay S. Patil and B. V. Pawar,"Issues and Challenges in Marathi Named Entity Recognition " International Journal on Natural Language Computing (IJNLC) Vol. 5, No.1, pp:15-31(2016) .
[2] Bharati, A., Sharma, D.M., Bai, L., Sangal, R., “AnnCorra: Annotating Corpora Guidelines for POS and Chunk Annotation for Indian Languages” (2006).
http://ltrc.iiit.ac.in/tr031/posguidelines.pdf
[3] Singh Thoudam Doren and Bandyopadhyay Sivaji, “Morphology Driven Manipuri POS Tagger”, Proceedings of the IJCNLP-08 Workshop on NLP for Less Privileged Languages, pages 91–98, Hyderabad, India (2008)
[4] Shrivastava, M., Bhattacharyya, P., (2008) “Hindi POS Tagger Using Naive Stemming: Harnessing Morphological Information Without Extensive Linguistic Knowledge”. In: International Conference on NLP (ICON08), Macmillan Press, New Delhi.
[5] Manju K., Soumya S., Sumam, M. I., (2009) “Development of a POS Tagger for Malayalam - An Experience”. In International Conference on Advances in Recent Technologies in Communication and Computing, pp.709-713.
[6] H B Patil, A S Patil and B V Pawar. “Part-of-Speech Tagger for Marathi Language using Limited Training Corpora”. IJCA Proceedings on National Conference on Recent Advances in Information Technology NCRAIT(4), 2014, pages 33-37.
[7] Pallavi Bagul, Archana Mishra, Prachi Mahajan, Medinee Kulkarni, Gauri Dhopavkar, "Rule Based POS Tagger for Marathi Text". In proceeding of: International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 1322-1326.
[8] Jyoti Singh, Nisheeth Joshi, Iti Mathur “Part Of Speech Tagging Of Marathi Text Using Trigram Method”. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No.2, DOI: 10.5121/ijait2013.3203.
[9] Nidhi Mishra, Amit Mishra, “Part of Speech Tagging for Hindi Corpus”. In proceeding of International Conference on Communication Systems and Network Technologies, 978-0-7695-44373/11, 2011 IEEE DOI 10.1109/CSNT.2011.118.
[10] Javed Ahmed Mahar, Ghulam Qadir Memon, “Rule Based Part of Speech Tagging of Sindhi Language”. In proceeding of International Conference on Signal Acquisition and Processing 978-0-7695-3960-7/10,2010 IEEE DOI 10.1109/ICSAP.2010.27.
Citation
Nita V. Patil, "POS Tagging for Marathi Language using Hidden Markov Model," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.409-412, 2018.