BER Performance Analysis of WiMax MIMO System Under Different Channel Conditions
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.394-400, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.394400
Abstract
High speed and high quality communication is the requirement of users in the public environment for transmission of different forms of data. WiMax technology is able to provide the data at high communication rate and with higher bandwidth. The incorporation of MIMO technique in WiMax system not only provide robust platform to fading but boost up the system performance. In this paper, 2×2 WiMax MIMO architecture is simulated with specification of different modulation techniques (64-QAM,BPSK) and for different fading channels (Rayleigh, AWGN) by using MATLAB. The analysis results are generated in terms of BER rate. The simulation results identified that the communication in WiMax MIMO is achieved at lower BER rate.
Key-Words / Index Term
WiMax, MIMO, Rayleigh, AWGN, Modulation Scheme, BER
References
[1] IEEE Std. 802.16TM-2004, “Part 16:Air Interface for fixed broadband wireless access system”, October 2004.
[2] IEEE 802.16-2005: IEEE Standard for local and metropolitan area network-Part 16:Air Interface for fixed and mobile broadband wireless access system-Amendment 2:Physical layer and medium access control layers for combined fixed and mobile operation in licensed brands,Feb 2006.
[3] D.Gesbert , H.Bolcskei, D.Gore and A.Paulraj, “MIMO wireless channels: Capacity and performance prediction”, In the Proceeding of Global Telecommunication conference,2000.
[4] X.Zhang, Y.Wang and W.Wang , “Capacity analysis of adaptive multiuse frequency-time domain radio resource allocation in OFDMA system” ,in Proc. IEEE Int. Symp. Circuits and systems,2006.
[5] G.J.Foschini, “Layered space-time architecture for wireless communication in fading environment when using multi-element antennas” ,Bell Laboratories Technical Journal,Vol.2,pp 41-59 October 1996.
[6] P.W.Wolniansky, G.J.Foschini, G.D.Golden and R.A.Valenzuela, “V-BLAST:An architecture for realizing very high data rates over the rich-scattering wireless channel” , In the Proceeding of URSI International symposium on Signals, Systems and Electronics, 1998.
[7] D.Gesbert , M.Shafi, D.Shiu,P.Smith and A.Naguib , “From theory to practice: An overview of MIMO space time coded wireless systems” ,IEEE Journal on selected areas of communication, April 2003.
[8] M.Jankiraman, “Space-time codes and MIMO systems” ,July 2004.
[9] S.M.Alamouti, “A simple transmit diversity scheme for wireless communications” ,IEEE Journal on selected areas of communication(JSAC),Vol.16,pp1451-1458,October 1998.
[10] G.J.Foschini and M.J.Gans, “On limits of wireless communication ina fading environment when using multiple antennas”,Wireless Personal Communication,Vol. 6,no.3,March 1998,P.311.
[11] J. Akom, "Mathematical model of the polarization orthogonal signals for WiMAX MIMO system," In the Proceedings of 2014 First International Scientific-Practical Conference Problems of Infocommunications Science and Technology, Kharkov, 2014, pp. 139-141.
[12] H. Zerrouki and M. Feham, "A physical layer simulation for WiMAX MIMO-OFDM system: Throughput comparison between 2×2 STBC and 2×2 V-BLAST in Rayleigh fading channel," In the Proceedings of 2014 International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, 2014, pp. 757-764.
[13] M. Tran, D. Halls, A. Nix, A. Doufexi and M. Beach, "Mobile WiMAX: MIMO Performance Analysis from a Quality of Service (QoS) Viewpoint," In the Proceedings of 2009 IEEE Wireless Communications and Networking Conference, Budapest, 2009, pp. 1-6.
[14] Sarris, A. R. Nix and A. Doufexi, "WiMAX MIMO Measurement in a Residential Line-of-Sight Environment," In the Proceedings of 2007 IEEE International Conference on Signal Processing and Communications, Dubai, 2007, pp. 1295-1298.
[15] M. Tran, A. Doufexi and A. Nix, "Mobile WiMAX MIMO performance analysis: Downlink and uplink," In the Proceedings of 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Cannes, 2008, pp. 1-5.
[16] M. Cheema and S. A. Kulkarni, "Iterative ICI Cancellation in MIMO OFDM WiMAX Systemwith LDPC Channel Coding," In the Proceedings of 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, 2015, pp. 532-536.
[17] S. Medhn and D. Hailemariam, "Cooperative MIMO system for WiMAX technology," AFRICON 2015, Addis Ababa, 2015, pp. 1-6.
[18] K. Yamaguchi et al., "Performance evaluation of downlink MU-MIMO transmission based on mobile WiMAX system in computer simulations and field experiments," In the Proceedings of 2014 International Conference on Information and Communication Technology Convergence (ICTC), Busan, 2014, pp. 253-258
[19] T. S. Siadari, F. P. Rezha and S. Y. Shin, "Applied MIMO based on Hadamard transform in IEEE 802.16 WiMAX system," In the Proceedings of IET International Conference on Information and Communications Technologies (IETICT 2013), Beijing, 2013, pp. 582-586.
[20] B. Sahoo, R. R. Prasad and P. Samundiswary, "BER analysis of mobile WiMAX system using LDPC coding and MIMO system under Rayleigh channel," In the Proceedings of 2013 International Conference on Communication and Signal Processing, Melmaruvathur, 2013, pp. 514-518.
[21] S. Hendre and M. Murugan, "Performance of precoded orthogonal space time block code MIMO system for mobile WiMAX system," In the Proceedings of 2013 International Conference on Communication and Signal Processing, Melmaruvathur, 2013, pp. 5-8.
[22] N. Prabakaran and K. S. Shaji, "Performance analysis of uplink MIMO in 2×2 mobile WiMAX system," In the Proceedings of 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition, Coimbatore, 2013, pp. 6-9.
[23] Anggraini, J. Peissig and T. Kaiser, "Virtual MIMO in WiMAX relay system," In the Proceedings of 2012 International Symposium on Signals, Systems, and Electronics (ISSSE), Potsdam, 2012, pp. 1-4.
Citation
Parul Sangwan, Vikas Nandal, "BER Performance Analysis of WiMax MIMO System Under Different Channel Conditions," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.394-400, 2018.
Social Networking using Semantic Web with Social Tagging System
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.401-406, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.401406
Abstract
Social networks are simple graphs where nodes represent either the people or the groups and links represent their relationships. Social networks explicitly exhibit relationships among individuals and groups. It is used for trust calculation, information sharing and recommendation, ontology construction and relation and relevance detection. Semantic Web is not a separate web but it is an extension of the current web in which information has well-defined meaning enabling computers and people to work better with cooperation. Semantic web (SW) has proven to be a useful data integration tool, facilitating the meaningful exchange of heterogeneous data. Ontology is a tool for data integration. Social Tagging Systems (STSs) allow collaborative users to share and annotate many types of resources (webpages, songs, etc.) with descriptive and semantically meaningful information called tags. Our proposed system constructs social network among individuals based on users’ interest predicted from their tag usage in the Social Tagging System using semantic web.
Key-Words / Index Term
Social Tagging System (STS), Social Network (SN), Semantic Web (SW), Randomized Singular Value Decomposition (RSVD), Recommendation, User interest
References
[1] X. Li, L. Guo, and Y. Zhao, “Tag-based social interest discovery”, Proceedings of the 17th international conference on World Wide Web,” page 675--684. New York, NY, USA, ACM, 2008.
[2] Jose Javier Astrain, Alberto Cordoba, Francisco Echarte, Jesus Villadangos, “An Algorithm for the Improvement of Tag-based Social Interest Discovery,” SEMAPRO, The Fourth International Conference on Advances in Semantic Processing, 2010.
[3] Panagiotis Symeonidis, Alexandros Nanopoulos and Yannis Manolopoulos, “A Unified Framework for Providing Recommendation in Social Tagging systems Based on Terenary Semantic Analysis,” IEEE Transactions on Knowledge and Data Engineering, Vol. 22, No. 2, February 2010.
[4] Hak-Lae Kim, John G. Breslin, Stefan Decker, and Hong-Gee Kim, “Mining and Representing User Interests: The Case of Tagging Practice,” IEEE Transactions On Systems, Man and Cybernetics-Part A: Systems and Humans, Vol-41, No.4, July 2011.
[5] L. A. Adamic, E. Adar, “Friends and neighbors on the Web,” Social Networks, Vol. 25, No. 3., pp. 211-230, July 2003.
[6] Peter Mika, “Flink: Semantic web technology for the extraction and analysis of social networks,” Web Semantics: Science, Services and Agents on the World Wide Web, Elsevier, 2005.
[7] Yutaka Matsuo, Junichiro Mori, Masahiro Hamasaki, TakuichiNishimura, HideakiTakeda, KoitiHasida, MitsuruIshizuka, “POLYPHONET: An advanced social network extraction system from the Web, Web Semantics: Science, Services and Agents on the World Wide Web,” Volume 5, Issue 4, Pages 262-278, December 2007.
[8] J Mori, Y Matsuo, K Hashida, “Web Mining Approach for a User-centered Semantic Web” … - Proc. Int`l Workshop on …, 2005.
[9] Junichiro Mori, Tatsuhiko Sugiyama, and Yutaka Matsuo, “Real-world oriented information sharing using social networks,” In Proceedings of the international ACM SIGGROUP conference on Supporting group work (GROUP `05), ACM, New York, NY, USA, 81-84, 2005.
[10] Jin Y., Matsuo Y., Ishizuka M., “Extracting Social Networks Among Various Entities on the Web,” In: Franconi E., Kifer M., May W. (eds) The Semantic Web: Research and Applications, ESWC 2007, Lecture Notes in Computer Science, vol. 4519. Springer, Berlin, Heidelberg.
[11] Culotta, Aron, Bekkerman, Ron and McCallum, Andrew, "Extracting social networks and contact information from email and the Web," Computer Science Department Faculty Publication Series, 33, 2004.
[12] Neetu Anand, Tapas Kumar, “Prediction of User Interest and Behaviour using Markov Model”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.119-123, 2017.
[13] C. Nanda, M. Dua, “A Survey on Sentiment Analysis”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.67-70, April 2017.
[14] P Drineas, MW Mahoney, “A randomized algorithm for a tensor-based generalization of the singular value decomposition,” - Linear algebra and its applications, Elsevier, 2007.
[15] R. Indra, M. Thangaraj, “An Integrated Recommender System using Semantic Web with Social Tagging System”, International Journal on Semantic Web and Information Systems (IJSWIS), Vol. 15, Issue 2, No. 3, 2019. [In Press]
[16] Zhenlei Yan, Jie Zhou, “User Recommendation with Tensor Factorization in Social Networks,” ICASSP, 2012.
[17] Shuhui Jiang, Xueming Qian, Jialie Shen, Yun Fu, Tao Mei, “Author Topic Model based Collaborative Filtering for Personalized POI Recommendation,” In Multimedia, IEEE Transactions on, IEEE, volume 17, 2015.
[18] Knowledge & Data Engineering Group, University of Kassel: Benchmark Folksonomy Data from BibSonomy, version of December 31st, 2006.
Citation
R. Indra, M. Thangaraj, "Social Networking using Semantic Web with Social Tagging System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.401-406, 2018.
Identification and Removal of Jelly-Fish Attack in IoT
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.407-414, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.407414
Abstract
IoT is the internet of things where various small utility based networks interconnect to each other. Thus, they can share the data amongst enormous connected devices and small IoT based network for utility share the data to the remote network. This way the network can have the vulnerability to various types of attacks. While there is an attack situation the network performance will be downgraded. The trust-based scheme has been used for detection of the Sybil and the Jellyfish attacker node. This technique will be based on self-cooperation between the nodes. Where each node mark the trust value of the other node. Only trusted nodes will be marked as the intermediate node. In consequently, no malicious node can be the part of the network. The performance can be enhanced using the trust based value technique. This performance has been measured under two different parameters like the end to end delay and the throughput.
Key-Words / Index Term
Ad-hoc ,Sybil, Internet of Things. Jellyfish, ESCT, Trust Value , Security Challenges, Delay variance, end to end encryption,Throughput
References
[1] Hamdan , Husam Tibor , László “Survey of Platforms for Massive IoT”, 2018 IEEE, 978-1-5386-1208-8
[2] Vipindev Adat, and B. B. Gupta,” A DDoS Attack Mitigation Framework for Internet of Things”,issue 978,2017.
[3] Sujatha Sivabalan, Dr P J Radcliffe et al. “Detecting IoT Zombie Attacks on Web Servers”,2017 ,27th Int. Telecommunication Networks and Applications Conference (ITNAC) pp 1-3.
[4] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the Internet of Things: A Review,” 2012, in Proc. of Intl. Conf. on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648-651
[5] J. Granjal, E. Monteiro, and J. S´a Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues,” 2015, IEEE Communications Surveys & Tutorials Volume: 17, Issue: 3, pp. 1294-1312.
[6] M. Todd Gardner, Cory Beard, Deep Medhi ”Using SEIRS Epidemic Models for IoT Botnets Attacks” 2017 ISBN 978-3-8007-4383-4 pp 1-8 IEEE DRCN CONFERENCE 2017.
[8] Sapna Hans and Jitendra Kumar,” A Review on Jellyfish Attack in MANET”, 2015 Int. Journel of Engineering, Applied and Management Sciences Paradigms, Vol 24, Issue 01.
[9] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements and future direction”, 2013, Future Generation Computer Systems, Vol.29, p. 1645-1660
[10] S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, Volume 76, 15 January 2015, Pages 146-164
[11] R. H. Weber, “Internet of Things – New security and privacy challenges,” Computer Law & Security Review, Vol. 26, No. 1, Jan. 2010, pp. 23-30
[12] J. Yun, Il-Y. Ahn, N.-M. Sung, and J. Kim, “A Device Software Platform for Consumer Electronics Based on the Internet of Things”, 2015, IEEE Transactions on Consumer Electronics, Vol. 61, No. 4
[13] Surapon Kraijak1 “A Survey On IoT Architectures, Protocols, Applications, Security, Privacy, Real-World Implementation And Future Trends” 2016 IEEE 978-1-78561-035-6 pp 1-6
[14] Mian.M Ahemd,” IoT Security: A Layered Approach for Attacks & Defenses” ,2017 IEEE - 978-1-5090-5984-3 pp-104-110
[15] A.Rajan“ Sybil Attack in IoT : Modeling and Defenses ”, 2017 IEEE- 978-1-5090-6367-3/17 pp 2323-2327
[16] Ruo Jun Cai,Xue Jun Li,and Peter Han Joo Chong “An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs “ 2017, IEEE - 1536-1233 pp.1-1
[17] Patel Pooja Munish Megha ,”Jelly Fish Attack Detection and Prevention in MANET”, 2017, IEEE- 978-1-5090-4929-5
[18] Sakshi Sachdeva ,“Detection and analysis of Jellyfish attack in MANETs”, 2017, IEEE pp1-5
Citation
Manveen Kaur, Jashanpreet Kaur, "Identification and Removal of Jelly-Fish Attack in IoT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.407-414, 2018.
Cancer Classification from Gene Expression data using Fuzzy-Rough techniques: An Empirical Study
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.415-420, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.415420
Abstract
Cancer classification from gene expression data is one of the most challenging research areas in the field of computation biology, bioinformatics and machine learning as the number of clinically labeled samples are very few compared to number of genes present. Also the cancer subtype classes are often highly overlapping, imprecise, and indiscernible in nature. Various machine techniques have been developed and applied on gene expression data for cancer sample classification. Here in this article, an empirical study of cancer classification from microarray gene expression data is performed using fuzzy-rough nearest neighbour techniques where performance of four different types of classifiers viz., Fuzzy nearest neighbour, Fuzzy-rough nearest neighbour, Vaguely quantified fuzzy-rough nearest neighbour and Ordered weighted average based fuzzy-rough nearest neighbor are investigated. The experiments are carried out on eight publicly available real life microarray gene expression cancer datasets. To assess the results of the classifiers percentage accuracy, precision, recall, macro averaged F1 measure, micro averaged F1 measure and kappa are used. The comparative study of the investigated methods is also done using paired t-test. Fuzzy-rough nearest neighbour method is found to be better for most of the data sets for cancer classification.
Key-Words / Index Term
Cancer Classification, Fuzzy-Rough set, Vaguely Quantified, Ordered Weighted Average, Microarray Gene Expression data
References
[1] D. Stekel, “Microarray Bioinformatics”, 1st ed., Cambridge, Cambridge University Press, UK, 2003.
[2] M. Dettling and P. Buhlmann, “Boosting for tumor classification with gene expression data”, Bioinformatics, Vol. 19, Issue. 9, pp.1061–1069, 2003.
[3] D. Jiang, C. Tang and A. Zhang, “Cluster analysis for gene expression data: A survey”, IEEE Transactions on Knowledge and Data Engineering, Vol.16, Issue.11,pp.1370–1386, 2004.
[4] R. Priscilla and S. Swamynathan, “A semi-supervised hierarchical approach: two-dimensional clustering of microarray gene expression data”, Frontiers of Computer Science, Vol.7, Issue.2, pp. 204–213, 2013.
[5] A. Halder and S. Misra, “Semi-supervised fuzzy k-NN for cancer classification from microarray gene expression data”, in Proceedings of the 1st International Conference on Automation, Control, Energy and Systems (ACES 2014) (IEEE Computer Society Press) pp.1–5,2014.
[6] D. Du, K. Li, X. Li, and M. Fei, “A novel forward gene selection algorithm for microarray data,” Neurocomputing, vol. 133, pp. 446–458, 2014.
[7] L. Zadeh, “Fuzzy sets”, Information and Control, Vol.8, Issue.3, pp.338–353, 1965.
[8] Z. Pawlak, “Rough sets”, International Journal of Computer and Information Science, Vol.11, Issue.5, pp.341–356, 1982.
[9] A.M. Radzikowska and E.E. Kerre, “A comparative study of fuzzy rough sets”, Fuzzy Sets and Systems, Vol.126, pp.137–156, 2002.
[10] J.M. Keller, M.R. Gray and J.A. Givens, “A fuzzy K -nearest neighbor algorithm”, IEEE Transactions on Systems, Man and Cybernetics, Vol.15, Issue.4, pp. 580–585, 1985.
[11] R. Jensen and C. Cornelis, “A new approach to fuzzy-rough nearest neighbour classification”, in: Proceedings of the 6th International Conference on Rough Sets and Current Trends in Computing, pp. 310–319, 2008.
[12] R. R. Yager, “On ordered weighted averaging aggregation operators in multicriteria decision making”, IEEE Transaction on Systems, Man and Cybernetics, Vol.18, pp.183-190, 1988.
[13] M. Dettling, “Bagboosting for tumor classification with gene expression data”, Bioinformatics, Vol.20, Issue.18, pp.583–593, 2004.
[14] Technology Agency for Science and Research. Kent ridge bio-medical dataset repository.
[15] A. Halder, S. Ghosh, and A. Ghosh. “Aggregation pheromone metaphor for semi-supervised classification”, Pattern Recognition, Vol.46, Issue.8, pp.2239–2248, 2013.
[16] J. Cohen, “A coefficient of agreement for nominal scales”, Educational and Psychological Measurement, Vol.20, Issue.1 pp. 37–46, 1960.
[17] E. Kreyszig, “Introductory Mathematical Statistics”, 1st ed,
John Wily, 1970.
Citation
Ansuman Kumar, Anindya Halder, "Cancer Classification from Gene Expression data using Fuzzy-Rough techniques: An Empirical Study," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.415-420, 2018.
Design of Low Power Pierce Crystal Oscillator Using CMOS Technology
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.421-423, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.421423
Abstract
Crystal Oscillators are key parts employed in several electronic circuits, similar to in portable applications, digital and microprocessor-based devices. so as to save lots of power, low-power consuming circuit is commonly desired. A high demand of oscillator in portable instruments leads to high performance crystal oscillators to implement in silicon chip. A 20 MHz Pierce crystal oscillator is designed in a 0.13m CMOS process using Mentor Graphics with 1V supply. This exhibits approximately a section noise of -60dB/Hz at one megahertz offset. This employed in communication system similar to Electronic Warfare system.
Key-Words / Index Term
CMOS, Low Power, Crystal Oscillator, Pierce Oscillator
References
[1] Mohammad Marufuzzaman, “Design of Low Power Crystal Oscillator In .13μm CMOS Technology”, IEEE Sponsored International Conference on advance in Electrical, Electronic and system Engineering, Nov 2016[194-198]
[2] Kin Keung, “Study of Low Power Crystal Oscillator Design”, IEEE International Conference on Innovations in Communication Systems, Vilnius 2013.
[3] J. Lim, “An Ultra-Compact and Low-Power Oven Controlled Crystal Oscillator Design for Precision Timing Applications”, IEEE Transactions on Ultrasonic, Ferroelectrics, and Frequency Control, vol. 57, no. 9, September 2010[1906-1913]
[4] Akshy Behal, “Crystal Oscillator: A detailed study”, International journal of innovative research in technology, 2014[1975-1978]
[5] Zeng Xianwen , “A Fast Start-up, Low-Power Differential Crystal Oscillator for DRM/DAB Receiver”, Institute of RF- & OE-ICs, Southeast University, Nanjing, 210096, China,2010[1027-1030]
[6] D. Aebischer, H. Oguey, and V. von Kaenel, “A 2.1 MHz crystal oscillator time base with a current consumption under 500 nA,” IEEE J. Solid-State Circuits, vol. 32, no. 7, pp. 999–1005, Jul 1997.
[7] Udo Karthaus, "A Differential Two-Pin Crystal Oscillator-Concept, Analysis, and Implementation", IEEE Transactions on Circuits and Systems-II: Express Briefs, Vol. 53, No. 10, pp. 1073-1077, October 2006.
[8] Shao-Hua Zhou, Jian-Ping Zeng, Qi Xiong, Yun Zeng, "Study and design of integrated crystal oscillator" Wireless Communications & Signal Processing pp.I-3, 2009.
[9] Robert J. Matthys, “Crystal Oscillator circuits[M]”, Florida:Krieger Publishing, 1992.
[10] Neil H. E. Weste, D. M. Harris “CMOS VLSI Design“, Pearson Education,Inc.,South Asia, 2011, ISBN no. 9780321547743
Citation
P.L. Suryawanshi, V.R. Pawar, "Design of Low Power Pierce Crystal Oscillator Using CMOS Technology," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.421-423, 2018.
A Review: Reliability Evaluation of Interlocking Software based on NHPP model
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.424-427, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.424427
Abstract
Software reliability is one of the main factors to measure the quality of software. Since software errors cause spectacular failures in some cases, we need to measure the reliability factor to determine the quality of software product, predict reliability in the future, and use it for planning resources needed to fix failures. Software reliability models are applicable tools to analyze software in order to evaluate the reliability of software. During the past twenty five years, more than fifty different models have been proposed for estimating software reliability but many of software practitioners do not know how to utilize these models to evaluate their products. In this paper we will present a survey on different models of software reliability and their characteristics.
Key-Words / Index Term
Reliability Prediction, Non-Homogeneous Poisson Process, Failure Intensity
References
[1] Musa JD (1980) Software life cycle empirical/experience data, data & analysis center for software. Available at http://www.dacs.org. Accessed 17 Sep 2010
[2] Goel AL, Okumoto K (1979) Time-dependent fault detection rate model for software and other performance measures. IEEE Trans Reliab 28(3):206–211
[3] Littlewood B (1979) Software reliability model for modular structure. IEEE Trans Reliab 28(3):241–246
[4] Musa JD (1998) More reliable, faster, cheaper testing with software reliability engineering. Softw Qual Prof 1(1):27–37
[5] Norman F (1997) Application of software reliability engineering for NASA space shuttle. International Symposium on Software Reliability Engineering (ISSRE) 1:71–82
[6] Kapur PK, Garg RB, Kumar S (1999) Contributions to hardware & software reliability. World Scientific, Singapore
[7] Kapur PK, Gupta A, Jha PC, Goyal SK (2010) Software quality assurance using software reliability growth modelling: state of the art. Int J Bus Inf Syst 6(4):463–496
[8] Musa JD (2005) Software reliability engineering: making solid progress. Softw Qual Prof 7(4):5–16
[9] Pham H (2006) System software reliability. Springer, London
[10] Kohavi R (1995) The power of decision tables. In: The eighth european conference on machine learning (ECML-95), Heraklion, Greece, pp 174–189
[11] Phillip S (2003) DTReg predictive modeling software available at http://www.dtreg.com. Accessed 8 Jan 2011
[12] Karunanithi N, Whitley D, Malaiya Y (1992) Prediction of software reliability using connectionist models. IEEE Trans Softw Eng 18(7):563–574
[13] Aggarwal KK, Singh Y, Kaur A, Malhotra R (2006) Investigating the effect of coupling metrics on fault proneness in object-oriented systems. Softw Qual Prof 8(4):4–16
[14] Goel B, Singh Y (2009) An empirical analysis of metrics. Softw Qual Prof 11(3):35–45
[15] Singh Y, Kumar P (2010a) A software reliability growth model for three-tier client–server system. Int J Comp Appl 1(13):9–16. doi: 10.5120/289-451
[16] Singh Y, Kumar P (2010b) Determination of software release instant of three-tier client server software system. Int J Softw Eng 1(3):51–62
[17] Singh Y, Kumar P (2010c) Application of feed-forward networks for software reliability prediction. ACM SIGSOFT Softw Eng Notes 35(5):1–6
[18] Chin-Yu Huang, Sy-yen Kuo, Lyu, M.R., 2004, Optimal allocation of testing resource considering cost, reliability and testing effort. 10th Pacific Rim International Symposium on Dependable Computing, 2004, 103-112.
[19] Dai Y., Xie M., Poh K. and Yang B., 2003, Optimal testing resource allocation with generic algorithm for modular software systems, Journal of Systems and software, 66, 1, 47-55.
[20] Gokhale S.S., Lyu N. and Trivedi K., 2006, Incorporating fault debugging activities into software reliability models: A simulation approach, IEEE transactions on reliability, 55, 2, 281-292.
[21] Jain M. Maheshwari S. and Priya K., 2005, Optimal release policies for software reliability growth model (SRGM) with maintenance costs, Journal of ICT, l4, 99-115.
[22] Jain, M. and Priya, K., 2002, Optimal policies for software testing time, Computer Society of India, 32,3, 25-30.
[23] Kimura, M., Toyota, T. and Yamada, S.,1999, Economic analysis of software release problems with warranty cost and reliability requirement, Reliability Engineering and System Safety, 66, 49-55.
[24] Prasad L., Gupta A. and Badoria S., 2009, Measurement of Software reliability using Sequential Bayesian Technique, Proceedings of the world congress on Engineering and Computer Science, 11, 242-246.
[25] Quadri S., Ahmad N. and Peer M., 2008, Software optimal policy and reliability growth modeling, Computation for national development, 2008, 247-256.
[26] Quadri S.M.K. and Ahmad N., 2010, Software Reliability Growth Modeling with new modified Weibull testing effort and optimal release policy, International Journal of Computer Applications, 6 ,12
[27] Worwa K., 2005, A discrete-time software reliability growth model and its applications for predicting the number of errors encountered during program testing, Control and Cybernetics, 34, 2, 589-606.
[28] Yamada, S. and Osaki, S., 1986, Optimal software release policy for a nonhomogeneous software error detection rate model, Microelectronics and Reliability, 26, 691-702.
Citation
Nishi, Dinesh Kumar, "A Review: Reliability Evaluation of Interlocking Software based on NHPP model," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.424-427, 2018.
A Review On Finger Print Detection Technique
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.428-432, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.428432
Abstract
Fingerprint analysis is the most essential part of human identification or human recognition. The biometric technique has been used to eye, facial, speech for recognition etc. In this paper we have discussion about the working of biometric system, pattern recognition. Review about the various technique used in finger print matching, image segmentation and its application. To mark the fingerprint from the image processing of Euclidean distance is required which will learn from the previous values and drive new values on the basis of current situations. In this paper, various techniques of image segmentation and fingerprint matching has been reviewed and discussed in terms of their outcomes.
Key-Words / Index Term
Correlation, Minutiae, Gabor Filters, Neural Network
References
[1] Umesh Singh Tomar, Abhinav Vidwans, “A Review of Fingerprint Recognition by Minutiae’s Analysis” in IJEAIS (International Journal of Engineering and Information Systems) Issues, Vol. 1 Issue 8, ISSN: 2000-000X, October – 2017.
[2] Heli Shah, Rajat Arora, “A Machine Learning Approach for Enhanced Fingerprint Recognition Technique” in IJCA (International Journal of Computer Applications) Issues, Volume 176 – No, October 2017.
[3] Farah Dhib Tatar and Mohsen Machhout, “Improvement of the fingerprint recognition process” in IJBB (International Journal on Bioinformatics & Biosciences) Issues, Vol.7, No.2, June 2017
[4] D Sai Gowtham, D Lakshmana Rao, D Lavanya and D Laxmi Mounika, “Fingerprint Recognition Using Minutiae Extraction” in (SSRG International Journal of Electronics and Communication Engineering) Issues, ISSN: 2348 – 8549, March 2017
[5] Saloni Lamba1, Paru Raj2, “Edge Detection using Average filter & Thresholding” in (International Journal of Engineering and Computer Science) Issues, ISSN:2319-7242, Volume 6 Issue, 9 September 2017.
[6] Ritu Bhargava, Anchal Kumawat Neeraj Bhargava, “Fingerprint Matching of Normalized Image based on Euclidean Distance”, IJCA (International Journal of Computer Applications) Issue, Volume 120 – No.24, June2015.
[7] Neeraj Bhargava, Anchal Kumawat, Ritu Bhargava, “Fingerprint Matching of Normalized Image based on Euclidean Distance” in (International Journal of Computer Applications) Issue,Volume 120 – No.24, June 2015.
[8] Farah Dhib Tatar1 And Mohsen Machhout2, “Improvement Of The Fingerprint Recognition Process”, IJBB (International Journal on Bioinformatics & Biosciences) Issue, Vol.7, No.2, June2017
[9] S.Mahalakshmi, Prabha.M.Karani, “ Study Of Edge Detection Techniques In Automatic License Plate Recognition”, in IRJET ( International Research Journal of Engineering and Technology) Issues, ISSN: 2395 -0056, Volume-04,Apr-2017.
[10] Neha Yadav, “Image Segmentation of Color Image using Threshold Based Edge Detection Algorithm in MatLab”in IJIACS (International Journal of Innovations & Advancement in Computer Science) Issues, ISSN 2347 – 8616 Volume 6, Issue2,February2017.
[11] Heli Shah, Rajat Arora, “A Machine Learning Approach for Enhanced Fingerprint Recognition Technique”,IJCA (International Journal of Computer Applications) Issue,ISSN0975 – 8887 Volume176, No.6, October 2017
Citation
V K Choudhary, Krishna Malik, "A Review On Finger Print Detection Technique," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.428-432, 2018.
An Energy Efficient Hierarchical Routing Protocol in IoT
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.433-436, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.433436
Abstract
Internet of Things (IoT) can possibly enhance the way we associate with things. IoT imagines the possibility of all-inclusive availability of everything which is characterized as the worldwide system of remarkably identifiable and addressable savvy things representing the capacity to interface and speak with other brilliant things. Each savvy protest comprises of a chip, handset module, sensors and power source. The greater part of the circumstances these frameworks need to manage low power and lossy systems (LLNs), where nodes have restricted memory, preparing capacity, and power. In any case, stringent Quality of Service (QoS) is required which is trying to give as the sensors are interconnected utilizing lossy connections. A routing protocol is required as these devices can be scattered in a spontaneous way. In this paper a novel hierarchal routing protocol has been proposed and compared with existing TEEN routing protocol. The proposed mechanism is implemented using MATLAB 2017 and compared with existing TEEN routing protocol.
Key-Words / Index Term
IoT (Internet of Things), Energy, Routing, Cluster, Cluster head and TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol).
References
[1] Aijaz and A. Aghvami, "Cognitive machine-to-machine communications for internet-of-things: A protocol stack perspective," IEEE Internet of Things Journal, vol. 2, no. 2, pp. 103-112, April 2015.
[2] V. Karagiannis, P. Chatzimisios, F. Vazquez-Gallego, and J. Alonso-Zarate, "A survey on application layer protocols for the internet of things," Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11-17, 2015.
[3] P. Pongle and G. Chavan, "A survey: Attacks RPL and 6LowPAN in IoT," in International Conference on Pervasive Computing (ICPC 2015), Jan 2015, pp. 1-6,
[4] A Performance Evaluation of RPL in Contiki - DiVA portal. [Online].Available:https://www.divaportal.org/smash/get/diva2:8335 72/fulltext01.pdf. [Accessed: 30-Oct-2016].
[5] RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. [Online].Available:https://www.net.in.tum.de/fileadmin/tum/net/net2011-07-1/net-2011-07-1_09.pdf. [Accessed: 30-Oct-2016].
[6] An Energy-Efficiency-Oriented Routing Algorithm over RPL [Online].Available: http://www.inf.cyut.edu.tw/ait2013/ft_209.pdf. [Accessed: 26-Aug-2016].
[7] M. Zhao, I. Ho, and P. H. J. Chong, “An Energy-efficient Region-based RPL Routing Protocol for Low-Power and Lossy Networks,” IEEE Internet of Things Journal, pp. 1–1, 2016.
[8] H.-S. Kim, H. Kim, J. Paek, and S. Bahk, "Load Balancing under Heavy Traffic in RPL Routing Protocol for Low Power and Lossy Networks," IEEE Transactions on Mobile Computing IEEE Trans.on Mobile Comput., pp. 1-1, 2016.
[9] “A Performance Evaluation of RPL in ContikiHazrat Ali Master`s Thesis,” owner guides and user manuals. [Online]. Available: http://manualzz.com/doc/17548237/a-performance-evaluation-of-rplin-contiki-hazrat-ali-mas... [Accessed: 20-Apr-2017].
Citation
Naresh Kumar, Manpreet Singh, "An Energy Efficient Hierarchical Routing Protocol in IoT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.433-436, 2018.
IWT-SVD based Image Watermarking under Various Attacks
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.437-441, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.437441
Abstract
Watermarking is used for protection of Rights, authentication and lots of other applications. The work deals with implementation of combined watermarking technique based on Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD). This combined technique utilizes the benefits of both transforms; IWT and SVD. Here, the cover image is decomposed into four sub bands (LL, LH, HL and HH) using IWT; then SVD was applied to LL sub band. After embedding, IWT-SVD technique is tested under various attacks such as: noise addition, resizing filtering etc. and simulation results demonstrated that this combined technique is robust against those attacks. All simulation results display in tabular forms.
Key-Words / Index Term
Digital Image Watermarking, IWT, SVD, PSNR,NCC
References
[1] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding”, IBM System Journal, Vol. 35, NOS 3&4, pp. 313-336, 1996.
[2] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1687, December, 1997.
[3] Xia, Xiang-Gen, C. G. Boncelet, and G. R. Arce, “A multiresolution watermark for digital images”, Proc. IEEE International Conference on Image Processing, Vol. 1, pp. 548-551, October, 1997.
[4] Kundur, Deepa, and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion”, Proc. IEEE International Conference on Image Processing, Vol. 1, pp. 544-547, October, 1997.
[5] W. Sweldens, “The lifting scheme: A construction of second generation wavelets”, SIAM J. Math. Anal., Vol. 29, No. 2, pp. 511–546, 1998.
[6] Dugad, Rakesh, K. Ratakonda, and N. Ahuja, “A new wavelet-based scheme for watermarking images”, ICIP Proc. IEEE International Conference on Image Processing, Vol. 2, pp. 419-423, October, 1998.
[7] E. T. Lin, and E. J. Delp, “A review of data hiding in digital images”, Proc. of the Image Processing, Image Quality, Image Capture Systems Conference, Vol. 299, pp. 274-278, April, 1999.
[8] R. Liu, and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership”, IEEE transactions on Multimedia, Vol. 4, No. 1, pp. 121-128, March, 2002.
[9] P. H. W. Wong, O. C. Au, and G. Y. M. Yeung, “A novel blind multiple watermarking technique for images”, IEEE Transactions on Circuits and Systems for Video Technology, pp. 813-830, September, 2003.
[10] Huang, Fangjun, and Zhi-Hong Guan, “A hybrid SVD-DCT watermarking method based on LPSNR”, Pattern Recognition Letters 25.15, pp. 1769-1775, 2004.
[11] E. Ganic, and A. M. Eskicioglu, “Robust DWT-SVD domain image watermarking: embedding data in all frequencies”, Proc. of the 2004 Workshop on Multimedia and Security, September, 2004.
[12] A. Sverdlov, S. Dexter, and A. M. Eskiciogl, “Robust DCT-SVD domain image watermarking for copyright protection: embedding data in all frequencies”, 13th European IEEE Signal Processing Conference, pp. 1-4, Sepember, 2005.
[13] M. Calagna, H. Guo, L. V. Mancini, and S. Jajodia, “A robust watermarking system based on SVD compression”, Proc. of the 2006 ACM symposium on Applied computing, pp. 1341-1347, April, 2006.
[14] Z. Zhou, B Tang, and X. Liu, “A Block-SVD based image watermarking method”, IEEE The Sixth World Congress on Intelligent Control and Automation, Vol. 2,pp. 10347-10351, June, 2006.
[15] A. Miyazaki, and F. Uchiyama, “An image watermarking method using the lifting wavelet transform”, IEEE International Symposium on Intelligent Signal Processing and Communications, pp. 155-158, December, 2006.
[16] Lee, Sunil, C. D. Yoo, and T. Kalker, “Reversible image watermarking based on integer-to-integer wavelet transform”, IEEE Transactions on Information Forensics and Security 2.3, pp. 321-330, September, 2007.
[17] Ali Al-Haj, “Combined DWT-DCT digital image watermarking”, Journal of Computer Science 3.9, pp. 740-746, Sepember, 2007.
[18] Loukhaoukha, and J. Y. Chouinard, “Hybrid watermarking algorithm based on SVD and lifting wavelet transform for ownership verification”, IEEE, 11th Canadian Workshop on Information Theory, CWIT 2009, pp. 177-182, May, 2009.
[19] L. Hu, and F. Wan, “Analysis on wavelet coefficient for image watermarking”, IEEE International Conference on Multimedia Information Networking and Security (MINES), pp. 630-634, 2010.
[20] J. Panda, J. Bisht, and R. Kapoor, “Digital image watermarking in integer wavelet domain using hybrid technique”, IEEE International Conference on Advances in Computer Engineering, 2010.
[21] S. Lagzian, M. Soryani, and M. Fathy, “A new robust watermarking scheme based on RDWT-SVD”, International Journal Of Intelligent Information Processing, Vol. 2, No. 1, March, 2011.
[22] M. Thapa, Dr S. K. Sood, and A. P. M. Sharma, “Digital image watermarking technique based on different attacks”, International Journal of Advanced Computer Science and Applications, Vol. 2, 2011.
[23] Kashyap, Nikita, and G. R. Sinha, “Image watermarking using 2-level DWT”, Advances in Computational Research 4.1, pp. 42-45, 2012.
[24] Navnidhi, “Various digital image watermarking techniques and wavelet transforms”, International Journal of Emerging Technology and Advanced Engineering 2.5, pp. 363-366, 2012.
[25] M. Ibrahim, M. M. Rahman, and M. Iqbal, “Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation”, arXiv preprint arXiv:1307.6328, 2013.
[26] N. Bisla, and P. Chaudhary, “Comparative study of DWT and DWT-SVD image watermarking techniques”, International Journal of Advanced Research in Computer Science and Software Engineering 3.6, June, 2013.
[27] S. Lingamgunta, V. K. Vakulabaranam, and S. Thotakura, “Reversible watermarking for image authentication using IWT”, International Journal of Signal Processing, Image Processing & Pattern Recognition, Vol. 6, 2013.
[28] P. V. Nagarjuna, and K. Ranjeet, “Robust blind digital image watermarking scheme based on stationary wavelet transform”, IEEE Sixth International Conference on Contemporary Computing, pp. 451-454, August, 2013.
[29] Lena, G. Dayalin, and S. S. Dhayanithy, “Robust image watermarking in frequency domain”, International Journal of Innovation and Applied Studies, 2013.
[30] A. Kala, and K. Thaiyalnayaki, “Robust lossless image watermarking in integer wavelet domain using SVD”, International Journal of Computer Science Engineering, pp. 30-35, 2013.
[31] Makbol, Nasrin, and B. E. Khoo, “A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition”, Digital Signal Processing 33, pp. 134-147, October, 2014.
[32] S. Agarwal, Priyanka, and U. Pal, “Different types of attack in image watermarking including 2D, 3D images”, International Journal of Scientific & Engineering Research, Vol. 6, No. 1, January, 2015.
[33] M. Gupta, G. Parmar, R. Gupta, and M. Saraswat, “ Discrete wavelet transform-based color image watermarking using uncorrelated color space and artificial bee colony”, International Journal of Computational Intelligence Systems, Vol. 8, No. 2, pp. 364-380, 2015.
[34] Prerna Gupta, and Girish Parmar, “Hybrid image watermarking using IWT-SVD”, Proc. International Journal of Engineering Technology, Management and Applied Sciences, Vol. 5, No. 3, March, 2017.
[35] Prerna Gupta, and Girish Parmar, “Image watermarking using IWT-SVD and its comparative analysis with DWT-SVD”, Proc. IEEE International Conference on Computer, Communications and Electronics (COMPTELIX-2017), pp. 527-531, July, 2017.
Citation
Amit Kumar , Girish Parmar, Rajesh Bhatt, "IWT-SVD based Image Watermarking under Various Attacks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.437-441, 2018.
Identifying Competitors from Large Unstructured Dataset Using Naïve Bayes Classifier and Apriori Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.442-450, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.442450
Abstract
Along line of research has shown the vital significance of recognizing and observing company’s contestants. In the framework of this activity various questions are emerge like: In what way we justify and measure the competitiveness between two items? Who are the most important competitors of a specified item? What are the various features of an item that act on competitiveness? Inspired by this issue, the advertising and administration group have concentrated on observational strategies for competitor distinguishing proof and in addition on techniques for examining known contenders. Surviving examination on the previous has concentrated on mining near articulations (e.g.one product is superior then other product) from the web or other documentary sources. Despite the fact that such articulations can without a doubt be indications of strength, they are truant in numerous spaces. By surveying the various papers, we found the conclusion of basic significance of the competitiveness between two items on the basis of market sectors. In this paper, we state novel description of the competitiveness between two items, based on the market sector. This system estimation of competitiveness uses customer reviews of different domains, a plentiful source of information. This system shows an efficient approach for evaluating competitiveness in large review datasets and finding the top-k competitors. Our experiments are based on a corpus of Yelp.in, TripAdvisor.com, and Amazon customer reviews which states that the proposed methodology can extract comparative relations more precisely. In this paper, we state an efficient framework for the classification of reviews of mainstream domain using k-means clustering and Naïve Bayes algorithm. This system evaluates the competitiveness of two items from frequent item set to find top-k competitor using Apriori algorithm.
Key-Words / Index Term
Data mining, Web mining, Information Search and Retrieval, K_means clustering, Naïve Bayes Classifier, Rule mining.
References
[1] K. Xu, S. S. Liao, J. Li, and Y. Song, “Mining comparative opinions from customer reviews for competitive intelligence,” Decis.Support Syst., 2011
[2] R. Decker and M. Trusov, “Estimating aggregate consumer preferences from online product reviews,” International Journal of Research in Marketing, vol. 27, no. 4, pp. 293–307, 2010.
[3] Z. Ma, G. Pant, and O. R. L. Sheng, “Mining competitor relationships from online news: A network-based approach,” Electronic Commerce Research and Applications, 2011.
[4] R. Li, S. Bao, J. Wang, Y. Yu, and Y. Cao, “Cominer: An effective algorithm for mining competitors from the web,” in ICDM, 2006.
[5] Z. Ma, G. Pant, and O. R. L. Sheng, “Mining competitor relationships from online news: A network-based approach,” Electronic Commerce Research and Applications, 2011.
[6] R. Li, S. Bao, J. Wang, Y. Liu, and Y. Yu, “Web scale competitor
discovery using mutual information,” in ADMA, 2006
[7] C. W.-K. Leung, S. C.-F. Chan, F.-L. Chung, and G. Ngai, “A probabilistic rating inference framework for mining user preferences from reviews,” World Wide Web, vol. 14, no. 2, pp. 187–215, 2011.
[8] E. Marrese-Taylor, J. D. Vel´asquez, F. Bravo-Marquez, and Y. Matsuo, “Identifying customer preferences about tourism products using an aspect-based opinion mining approach,” Procedia Computer Science, vol. 22, pp. 182–191, 2013.
[9] R. Li, S. Bao, J. Wang, Y. Liu, and Y. Yu, “Web scale competitor discovery using mutual information,” in ADMA, 2006.
[10] S. Bao, R.Li,Y.Yu,andY.Cao, “Competitorminingwiththeweb,” IEEE Trans. Knowl. Data Eng., 2008.
[11] G. Pant and O. R. L. Sheng, “Avoiding the blind spots: Competitor identification using web text and linkage structure,” in ICIS, 2009.
[12] D. Zelenko and O. Semin, “Automatic competitor identification from public information sources,” International Journal of Computational Intelligence and Applications, 2002.
[13] R. Decker and M. Trusov, “Estimating aggregate consumer preferences from online product reviews,” International Journal of Research in Marketing, vol. 27, no. 4, pp. 293–307, 2010.
[14] K. Lerman, S. Blair-Goldensohn, and R. McDonald, “Sentiment summarization: evaluating and learning user preferences,” in ACL, 2009, pp. 514–522.
[15] C.-T. Ho, R. Agrawal, N. Megiddo, and R. Srikant, “Range queries in olap data cubes,” in SIGMOD, 1997, pp. 73–88.
[16]Y.L Wu, D. Agrawal, and A. ElAbbadi, “Using wavelet decomposition to support progressive and approximate range-sum queries over data cubes,” in CIKM, ser. CIKM ’00, 2000, pp. 414–421.
[17] D. Gunopulos, G. Kollios, V. J. Tsotras, and C. Domeniconi, “Approximating multi-dimensional aggregate range queries over real attributes,” in SIGMOD, 2000, pp. 463–474.
[18] M. Muralikrishna and D. J. DeWitt, “Equi-depth histograms for estimating selectivity factors for multi-dimensional queries,” in SIGMOD, 1988, pp. 28–36.
[19] N. Thaper, S. Guha, P. Indyk, and N. Koudas, “Dynamic multidimensional histograms,” in SIGMOD, 2002, pp. 428–439.
[20] K.-H. Lee, Y.-J. Lee, H. Choi, Y. D. Chung, and B. Moon, “Parallel data processing with mapreduce: a survey,” AcM sIGMoD Record, vol. 40, no. 4, pp. 11–20, 2012.
[21] S.B¨ orzs¨onyi, D. Kossmann, and K. Stocker, “The skyline operator,” in ICDE, 2001.
Citation
A.A. Kushwah, Y.C. Kulkarni, "Identifying Competitors from Large Unstructured Dataset Using Naïve Bayes Classifier and Apriori Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.442-450, 2018.