Sequence Classification by Using Auto Calculation of Support
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.393-397, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.393397
Abstract
Sequence classification is an efficient task in data mining. Sequence classification problem can be solved by rules that consist of interesting patterns. Another major problem in data mining is pattern mining. In pattern mining, patterns can be used as rules. These rules may be more accurate or simpler to understand while classifying the data object. The cohesion and support of the pattern are used to define interestingness of a pattern. The degree of interest in patterns in a given class of sequences can be measured by combining these two factors. The patterns found can be used to generate reliable classification rules. There are two different ways to build a classifier. The first classifier consists of advanced classification methods that rely on association rules. In the second classifier, the value belonging to the new data object is first measured then the rules are ranked. A well-known methods of association classification are CBA (Classification based on Association rules), CMAR (Classification based on Multiple class-Association Rules), and CPAR (Classification based on Predictive Association Rules) etc. mine the frequent and confident patterns for building a classifier. All these approaches do not consider the cohesion of a pattern and applicable to only one type of pattern. These limitations can be overcome by taking into account a cohesion factor to define interestingness of pattern and can consider another type of pattern.
Key-Words / Index Term
Sequence classification, interesting patterns, classification rules
References
[1] B. Liu, W. Hsu, and Y. Ma, “Integrating classification and association rule mining,” in Proc. ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 1998, pp. 80–86.
[2] B. Liu, Y. Ma, and C.-K. Wong, “Classification using association rules: Weaknesses and enhancements,” in Proc. Data Mining Sci. Eng. Appl., 2001, pp. 591–605.
[3] W. Li, J. Han, and J. Pei, “Cmar: Accurate and efficient classification based on multiple class-association rules,” in Proc. IEEE Int. Conf. Data Mining, 2001, pp. 369–376
[4] X. Yin and J. Han, “Cpar: Classification based on predictive association rules,” in Proc. SIAMInt. Conf. Data Mining, 2003, pp. 331–335.
[5] J. Pei, J. Han, B. Mortazavi-Asl, J. Wang, H. Pinto, Q. Chen, U. Dayal, and M.-C. Hsu, Mining sequential patterns by patterngrowth: The prefixspan approach,” IEEE Trans. Knowl. Data Eng., vol. 16, no. 11, pp. 1424–1440, Nov. 2004
[6] T. P. Exarchos, M. G. Tsipouras, C. Papaloukas, and D. I. Fotiadis, “A two-stage methodology for sequence classification based on sequential pattern mining and optimization,” Data Knowl. Eng., vol. 66, no. 3, pp. 467–487, Sep. 2008.
[7] M. J. Zaki, C. D. Carothers, and B. K. Szymanski, “Vogue: A
variable order hidden Markov model with duration based on frequent sequence mining,” ACM Trans. Knowl. Discovery Data, vol. 4, no. 1,p. 5, 2010.
[8] X. Zhang, G. Chen, and Q. Wei, “Building a highly-compact and accurate associative classifier,” Appl. Intell., vol. 34, no. 1, pp. 74–86, 2011.
[9] L. T. Nguyen, B. Vo, T.-P. Hong, and H. C. Thanh, “Classification based on association rules: A lattice-based approach,” Expert Syst. Appl., vol. 39, no. 13, pp. 11 357–11 366, 2012.
[10] C. Zhou, B. Cule, and B. Goethals, “Itemset based sequence classification, ”in Machine Learning and Knowledge Discovery in Databases. New York, NY, USA: Springer, 2013, pp. 353–368.
[11] Cheng Zhou, Boris Cule, and Bart Goethals, ”Pattern Based Sequence Classification” vol.28, NO. 5, May 2016
Citation
G. R. Mane, S. B. Bhagate, "Sequence Classification by Using Auto Calculation of Support," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.393-397, 2018.
Energy Efficient Developments of Smartphone Environment and Cellular Network – Opportunities and Challenges
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.398-406, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.398406
Abstract
Smartphones bring people into different level of computing and life style but all the features and computing abilities of smartphone is entirely rely upon battery backup. Short of power backup directly distresses user experience and it leverages new energy efficient findings. Over the past ten years, plethora of finding is carried out related to energy optimization and conservation developments of smartphone and mobile communication and this changes the entire perspective of the platform. This paper tries to fetch such a trend setting outcomes from the legendary researchers, compares them and provides evidence of the fact. This review of literature covers a wide range of the study regarding 3G/4G network communication, Smartphone Apps performance and usage patterns and highlights their research proposals, solutions, architectures and results regarding to the energy efficiency in smartphone and cellular network. This literature study may offer many research directions to the upcoming researchers.
Key-Words / Index Term
Traffic Aware Optimization, Radio Signal Strength, Screen Off, Smartphone, Energy Efficiency, Cellular Network, Mobile Computing
References
[1] Niranjan Balasubramanian et al. “Energy Consumption in Mobile Phones: Measurement, Design Implications, and Algorithms,” in Proc. ACM IMC, pp. 280–293, 2009.
[2] 3GPP, “System impact of poor proprietary fast dormancy,” 3GPP discussion and decision notes RP-090941, 2009.
[3] Lee et al. “On the Detection of Signaling DoS Attacks on 3G Wireless Networks,” in Proc. 26th IEEE International Conference on Computer Communications, IEEE, pp. 1289-1297, 2007.
[5] Lee et al. “Impact of inactivity timer on energy consumption in WCDMA and CDMA2000,” in Proc.3rd Annual Wireless Telecommunication Symposium (WTS), 2004.
[6] Chuah M et al. “Impacts of Inactivity Timer Values on UMTS System Capacity,” in Proc. Wireless Communications and Networking Conference, 2002.
[7] Yeh, J.-H., Chen, J.-C., and Lee, C.-C., “Comparative Analysis of Energy-Saving Techniques in 3GPP and 3GPP2 Systems,” IEEE transactions on vehicular technology, Vol. 58, No. 1, 2009.
[8] Pekka and Barbuzzi et al, “Theory and Practice of RRC State Transitions in UMTS Networks”, in Proc. 5th IEEE Broadband Wireless Access Workshop, pp 1-6, 7th of July 2009.
[9] Henry Haverinen et al, “Energy Consumption of Always-On Applications in WCDMA Networks,” in Proc. IEEE 65th Vehicular Technology Conference, VTC2007-Spring. pp.964-968, 2007.
[10] G.P. Perrucci et al. “Survey on Energy Consumption Entities on the Smartphone platform,” in Proc.73rd IEEE Vehicular Technology Conference (VTC Spring), 2011.
[11] Metri, Grace et al. “What is eating up battery life on my SmartPhone: A case study.” in Proc. 2012 International Conference on Energy Aware Computing, pp.1-6. 2012.
[12] Junxian Huang et al. “RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks,” Journal of Passive and Active Measurement, Springer International Publishing, vol. 8362, pp. 1-11, 2014.
[13] Moo-Ryong Ra et al. “Energy-Delay Tradeoffs in Smartphone Applications,” in Proc. 8th international conference on Mobile systems, applications, and services (MobiSys’10), ACM, pp. 255-270, 2010.
[14] Feng Qian et al. “Characterizing Radio Resource Allocation for 3G Networks,” in Proc. 10th ACM SIGCOMM Conference on Internet Measurement, Australia, pp. 137-150, 2010.
[15] Sanae Rosen et al. “Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild,” in Proc. Internet Measurement Conference, pp. 339-345, 2015.
[16] Nurminen, J. K. et al. “Consumer attitudes towards energy consumption of mobile phones and services,” in Proc. Vehicular Technology Conference Fall (VTC 2010-Fall). 2010.
[17] L. Zhang et al. “Accurate Online Power Estimation and Automatic Battery Behavior Based Power Model Generation for Smartphones,” in Proc. 8th international conference on Hardware/software code sign and system synthesis, 2010.
[18] Yeseong Kim et al. “A Personalized Network Activity-Aware Approach to Reducing Radio Energy Consumption of Smartphones,” IEEE Transactions on Mobile Computing, Vol. 15, No. 3, pp. 544 – 557, March 2016.
[19] Mohamed Oulmahdi et al. “Reducing Energy Cost of Keepalive Messages in 3G Mobiles,” in Proc. 27th International Conference on Advanced Information Networking and Applications Workshops, 2013.
[20] RR Kar and SS Nayak, “An Efficient Adaptive Channel Allocation Scheme for Cellular Networks,” IOSR Journal of Computer Engineering, Volume 16, Issue 2, pp. 75-79, Mar-Apr. 2014.
[21] Feng Qian et al. “TOP: Tail Optimization Protocol for Cellular Radio Resource Allocation,” in Proc. IEEE International Conference on Network Protocols (ICNP), pp. 285–294, 2010.
[22] Athivarapu, Pavan K. et al. “RadioJockey: mining program execution to optimize cellular radio usage.” in Proc. 18th annual international conference on Mobile computing and networking, pp. 101-112, 2012.
[23] Huang, Yuheng et al. “Adaptive fast dormancy for energy efficient wireless packet data communications.” in Proc. 2013 IEEE International Conference on Communications (ICC) pp. 6194-6199, 2013.
[24] Abdo, Jacques Bou et al. “Application-Aware Fast Dormancy in LTE.” in Proc. 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp. 194-201, 2014.
[25] Xue, Guangtao et al. “SmartCut: Mitigating 3G Radio Tail Effect on Smartphones.” IEEE Transactions on Mobile Computing, pp.169-179, 2015.
[26] Feng Qian et al. “Periodic Transfers in Mobile Applications: Network-wide Origin, Impact, and Optimization,” in Proc. 21st international conference on World Wide Web, pp. 51-60, 2012.
[27] Shuo Deng et al. “Traffic-Aware Techniques to Reduce 3G/LTE Wireless Energy Consumption,” in Proceedings of the 8th international conference on Emerging networking experiments and technologies (CoNEXT `12). ACM, New York, pp.181-192, 2012.
[28] C. Monteleoni et al. “Managing the 802.11 energy/performance tradeoff with machine learning”. Technical Report MIT-LCS-TR-971, MIT CSAIL, 2004.
[29] C. Monteleoni and T. Jaakkola et al. “Online learning of non-stationary sequences”. In Neural Information Processing Systems 16, Canada, December 2003.
[30] GSMA Technical Document Version 1.0, “Fast Dormancy Best Practises,” July 2011.
[31] Wang, Le et al. “Power consumption analysis of constant bit rate data transmission over 3G mobile wireless networks.” in Proc.11th International Conference on ITS Telecommunications, pp. 217-223, 2011.
[32] Feng Qian et al. “Profiling Resource Usage for Mobile Applications-A Cross-layer Approach,” in Proceedings of the 9th international conference on Mobile systems, applications, and services, pp. 321-334, 2011.
[33] Narendran Thiagarajan and Gaurav Aggarwal et al , “Who Killed My Battery: Analyzing Mobile Browser Energy Consumption,” WWW 2012, France, April 16–20, 2012.
[34] Zhao, Bo et al. “Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks.” in Proc.31st International Conference on Distributed Computing Systems, pp. 413-422, 2011.
[35] Puustinen, Ismo H. and Jukka K. Nurminen. “The Effect of Unwanted Internet Traffic on Cellular Phone Energy Consumption.” in Proc. 4th IFIP International Conference on New Technologies, Mobility and Security, pp. 1-5, 2011.
[36] Zhao, Bo et al. “Energy-Aware Web Browsing in 3G Based Smartphones.” in Proc. IEEE 33rd International Conference on Distributed Computing Systems, pp. 165-175, 2013.
[37] Feng Qian et al. “How to Reduce Smartphone Traffic Volume by 30%?,” in Proc. International Conference on Passive and Active Network Measurement, pp. 42-52, 2013.
[38] Hoque, Mohammad Ashraful et al. “Saving Energy in Mobile Devices for On-Demand Multimedia Streaming - A Cross-Layer Approach.” in Proc. TOMCCAP 10, pp. 25:1-25:23, 2014.
[39] Ya-Ju Yu et al. “Energy-Adaptive Downlink Resource Allocation in Wireless Cellular Systems,” IEEE Transactions on Mobile Computing, Volume: 14, Issue: 9, Sept. 1, pp. 1833-1846, 2015.
[40] Zhang, Qian et al. “Network-adaptive scalable video streaming over 3G wireless network.” in Proc. ICIP, 2001.
[41] Qian Zhang et al. "QoS-adaptive multimedia streaming over 3g wireless channels." MMSA2000, pp. 9-10, Nov 2000.
[42] Gember, Aaron et al. “Obtaining in-context measurements of cellular network performance,” In Proc. Internet Measurement Conference, 2012.
[43] Q. Xu and J. Erman et al. “Identifying Diverse Usage Behaviors of Smartphone Apps,” in Proc. ACM IMC, 2011.
[44] A. A. Sani and Z. Tan et al. “The Wireless Data Drain of Users, Apps, & Platforms,” ACM SIGMOBILE Mobile Computing and Communications Review, 17(4), 2013.
[45] J. Huang et al. “Anatomizing Application Performance Differences on Smartphones,” in Proc. ACM MobiSys, 2010.
[46] Y. Kim and J. Kim, “Personalized diapause: Reducing radio energy consumption of smartphones by network-context aware dormancy predictions,” in Proc. Workshop Power Aware ComputSyst., 2012.
[47] A. Aucinas, et al. “Staying Online while Mobile: The Hidden Costs,” in Proc. CoNEXT, 2013.
[48] Huang, Junxian et al. “Screen-off traffic characterization and optimization in 3G/4G networks.” In Proc. Internet Measurement Conference, 2012.
[49] Falaki, Hossein et al. “A first look at traffic on smartphones.” in Proc. Internet Measurement Conference, 2010.
[50] Martins, Marcelo et al. “Selectively Taming Background Android Apps to Improve Battery Lifetime.” In Proc.USENIX Annual Technical Conference, 2015.
[51] Chen, Xiaomeng et al. “Smartphone Energy Drain in the Wild: Analysis and Implications.” In Proc. SIGMETRICS, 2015.
[52] Ding li et al, “An Empirical study of the energy consumption of android applications,” in Proc. IEEE international conference of software maintenance and evolution, pp.121-130, 2014.
[53] Ville Kononen et al, “Optimizing power consumption of always-on applications based on timer alignment,” in Proc. Third International Conference on Communication Systems and Networks (COMSNETS), 2011.
[54] L. Ravindranath, et al. “Appinsight: Mobile app performance monitoring in the wild,” in Proc. OSDI, 2012.
[55] H. Liu, Y. Zhang, and Y. Zhou, “Tailtheft: Leveraging the wasted time for saving energy in cellular communications,” in Proc. 6th International Workshop on MobiArch, pp. 31–36, 2011.
[56] Sai Suren Kumar Kasireddet al. “Measurements of Energy Consumption in Mobile Applications with respect to Quality of Experience,” Master thesis, Blekinge Institute of Technology, 2012.
[57] Abdelmotalib, Ahmed et al. “Background Traffic Analysis for Social Media Applications on Smartphones,” in Proc. Second International Conference on Instrumentation, Measurement, Computer, Communication and Control, pp. 817-820, 2012.
[58] Qualcomm, “System Parameter Recommendations to Optimize PS Data User Experience and UE Battery Life”, Engineering Services Group, Technical Document, 2007.
[59] Hossein Falaki et al. “Diversity in Smartphone Usage,” in Proc. MobiSys’10, San Francisco, USA, 2010.
[60] Y. Diao et al. “Fast and memory-efficient regular expression matching for deep packet inspection,” in Proc. ACM/IEEE Symposium Architecture of Network Communication System, pp. 93–102, 2006.
[61] Nan, Eleonora et al. “User data traffic analysis for 3G cellular networks,” in Proc. 8th International Conference on Communications and Networking in China (CHINACOM) pp.468-472, 2013
[62] Ahmad Rahmati, Angela Qian, and Lin Zhong, “Understanding Human-Battery Interaction on Mobile Phones,” Proceedings of the 9th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2007, pp. 265-272, Singapore, September, 2007.
[63] Nishkam Ravi et al, “Context-Aware Battery Management for Mobile Phones,” A feasibility study, 2006
[64] “The New Multi-screen World: Understanding Cross-platform Consumer Behavior”, Google, 2012.
[65] Chen, Xiaomeng et al. “Smartphone Background Activities in the Wild: Origin, Energy Drain, and Optimization.” in Proc. MobiCom, 2015.
[66] Feng Qian and junxian Huang et al. “Screen-Off Traffic Characterization and Optimization,” in Proceedings of the ACM Internet Measurement Conference, IMC `12, pages 357–364. ACM, 2012.
[67] Bijan Golkar et al. “Resource Allocation in Autonomous Cellular Networks,” IEEE Transactions on Wireless Communication, 2013.
[68] Qualcomm, Technical Document, “Managing Background Data Traffic in Mobile Devices,” Jan 2012.
[69] Selim Ickin et al, “QoE-Based Energy Reduction by Controlling the 3G Cellular Data Traffic on the Smartphone”
[70] Ella Peltonen et al. “Energy modeling of system settings: A crowdsourced approach,” in IEEE International Conference on Pervasive Computing and Communications, PerCom USA, pp. 37-45, 2015.
[71] Narseo Vallina et al. “Energy management techniques in modern mobile handsets,” IEEE Communication Surveys Tutorials, PP(99):1 –20, 2012.
[72] Aaron Schulman et al, “Bartendr: A Practical Approach to Energy-aware Cellular Data Scheduling,” in Proc. MobiCom’10, September 2010.
[73] Abhijnan Chakraborty et al, “Coordinating Cellular Background Transfers using LoadSense,” in Proc. MobiCom’13, 2013.
[74] Ning Ding et al, “Characterizing and Modeling the Impact of Wireless Signal Strength on Smartphone Battery Drain,” in Proc SIGMETRICS’13, June 17–21, 2013.
Citation
S.Pandikumar, G.Sujatha, M.Sumathi, "Energy Efficient Developments of Smartphone Environment and Cellular Network – Opportunities and Challenges," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.398-406, 2018.
An adaptive learning frame work for slow learners in an e-learning environment
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.407-412, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.407412
Abstract
One of the biggest challenges that many of the 21st-century teachers face in traditional classroom teaching is the difficulty to deal with students from diverse backgrounds. Especially in the case of slow learners they find it so hard to deal with and make them learn their academic subjects. Teachers are giving instructions or delivering learning contents to learners, without understanding the learner profile parameters such as learning style, motivation, attitude, aptitude etc. They should understand the art and science of teaching. In the current education paradigm students are compelled to learn the same learning material at the same time and rate. Hence teachers are expected to adopt new methods and technologies to eliminate this problem. E-learning is an activity where learners are able to achieve their educational goals based on their skills, interest, motivation, learning style etc. Through adaptive learning learners’ exact needs, their goals, preferences, etc. can be achieved during the learning process. Hence, the objective of the study is to develop a frame work of an adaptive learning system which helps the slow learners to be more active and engaged in their learning process.
Key-Words / Index Term
Adaptive learning, E-contents, Instructional Design, Learning Management System, Slow Learners
References
[1] P.Tripathi, S.Mukerji, “Handbook of Research on Technology-Centric Strategies for Higher Education Administration”,IGI Global. 2017.
[2] C. Ives, “Instructional-Design Theories and Models, Volume III: Building a Common Knowledge Base” Journal of Educational Technology & Society, Vol. 13, Issue.2, pp. 219-221, 2010.
[3] S.Subramanian,”Assessing the Effectiveness of Individualized Integrated Intervention Strategies to Turn Around Slow Learners: An Experimental Study”, ncert,2012.
[4] B. Holmes, J. Gardner,” E-learning: Concepts and practice”, Sage,2006.
[5] S. M. Shweta Pawar, “A Proposed System for Adaptive E-learning Using Ant Colony Optimization” IJSART ,pp. 72-76, 2015.
[6] N. Radwan “An adaptive learning management system based on learner’s learning style”, International Arab Journal of e-Technology, Vol. 3, Issue.4, pp.7, 2014.
[7] S. Graf, T. C. Liu, “Supporting teachers in identifying students` learning styles in learning management systems: An automatic student modelling approach”, Journal of Educational Technology & Society, Vol. 12, Issue.4, pp.3-14,2009.
[8] J. Yang, Z. X. Huang, Y. X. Gao, & H. T. Liu, ”Dynamic learning style prediction method based on a pattern recognition technique”, IEEE Transactions on Learning Technologies, , Vol. 7, Issue.2, pp.165-177, 2014.
[9] Y.H. Hung, R.I. Chang, C.F Lin, “Hybrid learning style identification and developing adaptive problem-solving learning activities”, Computers in Human Behavior, Vol.55, pp.552-561, 2016.
[10] A. Klašnja-Milićević, B. Vesin, M. Ivanović, Z. Budimac,& L. C. Jain, ”E-Learning Systems: Intelligent Techniques for Personalization” Springer, Vol. 112, 2016.
[11] P. Sarkar, C. Kar, “Adaptive E-learning Using Deterministic Finite Automata”, International Journal of Computer Applications, Vol. 97, Issue.21, pp.14-17, 2014.
[12] C. Makkena, K. Anuradha, “A Study on Efficiency of Data Mining Approaches to Online -Learning Methods” , International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol. 2, Issue. 4, pp. 808-816, 2017.
[13] A. Roy, K.Basu,”A Comparative Study of Statistical Learning and Adaptive Learning”, arXiv preprint arXiv: 1511.07538,2015.
[14] L.K. Poon, S.C. Kong, M.Y. Wong, T.S.Yau, ” Mining Sequential Patterns of Students’ Access on Learning Management System”, In the proceedings of the 2001 International Conference on Data Mining and Big Data, Springer, Cham, pp.191-198, 2017.
[15] S. J. Raut, “Smart Class Learning Management System for School Education”, International Journal of Scientificic Research in Computer Science and Engineering, Vol.06 , Special Issue.01 , pp.9-13, Jan-2018
[16] J. F. Hughes, Computer graphics: principles and practice. Pearson Education,2014.
[17] J. G. Ruiz, M. J. Mintzer, R. M. Leipzig, “The impact of e-learning in medical education” Academic medicine, Vol.81, Issue.3, pp.207-212, 2006.
[18] L. Joseph,, & S. Abraham, “Instructional design for learning path identification in an e-learning environment using felder-silverman learning styles model” In the proceedings of the IEEE International Conference on Networks & Advances in Computational Technologies (NetACT), pp. 215-220, 2017.
[19] A.Deepa E. C. Blessie,”Input Analysis for Accreditation Prediction in Higher Education Sector by Using Gradient Boosting Algorithm”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.3, pp.23-27, 2018.
Citation
Lumy Joseph, Sajimon Abraham, "An adaptive learning frame work for slow learners in an e-learning environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.407-412, 2018.
Performance and analysis of Adhoc On Demand Multipath Distance Vector Routing Protocol ( AOMDV) and Enhanced Multipath MPR AODV Routing Protocol(EMMDV) in MANET
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.413-418, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.413418
Abstract
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a network topology without the use of any existing network infrastructure or centralized administration. Routing is the process which transmitting the data packets from a source node to a given destination . The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on demand) routing strategy is a popular routing category for wireless ad hoc routing. In this chapter an attempt has been made to compare two Reactive (on demand) routing protocols in MANETs: EMMDV and AOMDV protocol.
Key-Words / Index Term
MANET,AODV, AOMDV,EMMDV and MPR
References
B. Shen, H. Y. Ke, and Z. G. Hu, “Adaptive mechanisms to enhance Internet connectivity for mobile ad hoc networks,” Wireless Communications, Networking and Mobile Computing, 2006. WiCOM 2006 International Conference on 22-24 September 2006.
[2]. ZHU. W. “Multipoint Relay flooding” Master of Science Thesis Stockholm, Sweden TRITA-ICT-EX- 2009.
[3]. Perkins CE, Belding-Royer E, Das SR. Ad hoc on-demand distance vector (AODV) routing,July 2003. RFC 3561.
[4]. T.D. Le and H. Choo, ―Efficient Flooding Scheme Based on 2-Hop Backward Information in Ad Hoc Networks, In Proceeding of the IEEE International Conference on Communications, pages 2443-2447, 2008
[5]. Amirhossein Moravejosharieh , Hero Modares, Rosli Salleh and Ehsan Mostajeran, Performance Analysis of AODV, AOMDV, DSR, DSDV Routing Protocols in Vehicular Ad Hoc Network,Research Journal of Recent Sciences ISSN 2277-2502Vol. 2(7), 66-73, July (2013)
[6]. P.P.Pham, S.Perreau, “Increasing the network performance using multi-path routing mechanism with load balance”, Institute of Telecommunications Research, University of South Australia, Australia, September 2003
[7]. M.Geetha ,Dr.R.Umarani“An Overview of Multi Point Relay AODV in Mobile Ad hoc Network “ ©gopalax -International Journal of Technology And Engineering System(IJTES): Jan –March 2011 ,
[8]. M.Geetha ,Dr.R.Umarani” Performance Comparison And Implementation of MPRAODV and AODV In Mobile Adhoc Network”,International Journal of Advanced Computer Applications( IJACA), Vol.II, Issue-I,pp.32-39,March,2012
[9]. M.Geetha ,Dr.R.Umarani “Trigger Agent in Core Router Based on EMMDV Protocol for MANETs” , European Journal of Scientific Research, Vol.100 No.3 May 2013,,pp.408-415.
[10]. Dr.M.Geetha “A Novel Approach for Internet Connectivity in Mobile Ad Hoc Network Using Enhanced Multipath MPR AODV Routing Protocol” Singaporean Journal of Scientific Research(SJSR), Vol.9.No.1 2017,Pp.1-8
[11]. Ducksoo Shin*, Jonghyup Lee, Jaesung Kim, And Jooseok” An Adaptive Ad Hoc On-Demand Multipath Distance Vector Routing Protocol Using Dynamic Route Switching “Journal Of Engineering Science And Technology vol. 4, no. 2 (2009) 171 - 183
Citation
M. Geetha, "Performance and analysis of Adhoc On Demand Multipath Distance Vector Routing Protocol ( AOMDV) and Enhanced Multipath MPR AODV Routing Protocol(EMMDV) in MANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.413-418, 2018.
Preventing Road Accidents using IoT
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.419-423, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.419423
Abstract
Road accidents are one of the biggest concerns leading to loss of life. Road accident injuries are predictable and preventable, but it is important to understand the ways in which road safety interventions and technology can be used to prevent or may be completely wash out this curse. One of the major factors for this is over speeding. This paper talks about how introducing IoT devices in automobiles and accident prone areas helps reduce the risk of accidents. Our proposal works by sensing the automobiles in accident prone areas based on its current location, checking for its speed and notifying the driver about what needs to be done. In cases of accidents, notifications are sent to the automobiles nearby informing them about it, while distress signals are sent to the nearest police station and hospital for immediate help. The idea would also be useful in many other applications such as alerting the concerned in the event of an accident, thus helping in immediate response from emergency services.
Key-Words / Index Term
Safety, Accident, IoT, Cloud, Location, Speed
References
[1] Jorge Z., Carlos T. , Juan C. and Pietro M., “Providing Accident Detection in Vehicular Networks through OBD-II Devices and Android-based Smartphones”, Proceedings of the IEEE 36th Conference on Local Computer Networks, Washington, DC, USA, pp.813-819, October 2011.
[2] Patel K.H., "Utilizing the Emergence of Android Smartphones for Public Welfare by Providing Advance Accident Detection and Remedy by 108 Ambulances", International Journal of Engineering Research & Technology (IJERT), Vol.2, Issue.9, pp.1340-1342, September 2013.
[3] Sneha R.S. and Gawande A. D., "Crash Notification System for Portable Devices", International Journal of Advanced Computer Technology (IJACT), Vol.2, Issue.3, pp.33-38, June 2013.
[4] Sadiki Lameck Kusyama1 , Dr. Michael Kisangiri1 , Dina Machuve, “Automatic vehicle over speed, accident alert and locator system for public transport (Buses)”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.2327-2331, August 2013.
[5] C.Vidya Lakshmi, J.R.Balakrishnan, “Automatic accident Detection via Embedded GSM message interface with Sensor Technology”, International Journal of Scientific and Research Publications, Vol.2, Issue.4, April 2012.
[6] Sonali N. and Maheshwari R., “An Intelligent Obstacle and Overspeeding Sensor to prevent dashing of Motorcycles”, International Journal of Soft Computing and Artificial Intelligence, Vol.1, Issue.1, pp.14-17, Nov 2012.
[7] Hamid M. Ali, Zainab S. Alwan, “Car Accident Detection and Notification System using Smartphone”, International Journal of Computer Science and Mobile Computing, Vol.4, Issue.5, pp.620-635, April 2015.
[8] Chris T., White J., Dougherty B. , Albright A. and Schmidt DC.," WreckWatch: Automatic Traffic Accident Detection and Notification with Smartphones", International Journal of mobile network and application, Springer, Hingham, MA, USA., Vol.16, Issue.3, pp.285-303, March 2011.
[9] Aditi Zear, Pradeep Kumar Singh and Yashwant Singh, “Intelligent Transport System: A Progressive Review”, Indian Journal of Science and Technology, Vol 9(32), pp.1-8, August 2016.
[10] Pradeep Kumar Singh, Vibhu Kapoor, Kopal Tripathi, Yugal Kumar and Shaweta Khanna, “IoT Enabled Immediate Response System For People In Case Road Accidents”, International Journal of Latest Trends in Engineering and Technology, Vol.9, Issue.2, pp.132-138, August 2017.
Citation
R. Sai Prasanth, Soorya Sahar P.N., Spoorthi S., Sweta Kumari, "Preventing Road Accidents using IoT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.419-423, 2018.
Analytical Study of Association Rule Mining Algorithm for Retrieving Frequent Itemsets in Big Datasets
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.424-436, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.424436
Abstract
Information retrieval as an executive Demas extensible as a technique near procedure as takeout applicable information use for Big Information. Information mining as advanced study big extent information near concludes original information using sketch model, leaning, as a associations. Among the extend World Wide Web, this digit information lay up as a completed obtainable by machine amplified enormously, as a technique near retrieve information as about big information grow enormous consequence used for business, scientific as a engineering do research community. Frequent Itemset Mining individual the majority widely functional measures near retrieve about use information from information. Nonetheless, as its technique be useful near Big Information, combinatorial eruption cuspidate itemsets has grown to be challenge. A current growth use neighborhood about parallel programming obtainable outstays apparatus near conquer difficulty. However, apparatus include possess scientific disadvantage, for example impartial information allocation as an inter-communication expenses. During advance study, we scrutinize request about Frequent Itemset Mining using MapReduce framework. We bring in original technique used for takeout big informationsets: Big-Frequent-Itemset Mining. Its technique optimized near sprint lying on extremely big informationsets. Come near comparable consequently, we apply a dispersed association rule mining algorithm lying on big information set forename as a Genetic Algorithm as a Adaptive-Miner which utilize adaptive approach used for judgment frequent patterns among superior accurateness as a competence. Adaptive-Miner utilizes adaptive approach based lying on the fractional processing informationsets. Adaptive-Miner constructs implementation strategy previous to all iteration as a go away among top appropriate strategy reduce time as a space complexity. Adpative-Miner is dynamic association rule mining algorithms adjust this come near based lying on scenery about informationset. Consequently, this dissimilar as enhanced modern static association rule mining algorithms. We behavior techniqueically research near increase approaching keen on efficiency, as a scalability about Adaptive-Miner algorithm lying on big informationset. use its research’s, we exhibit scalability about techniques.
Key-Words / Index Term
Genetic Algorithm, association rule mining algorithm, association rules; big data sets; frequent pattern mining; map reduce.
References
[1]Wang T, Rudin C, Wagner D, Sevieri R. Learning to detect patterns of crime. In: European conference on machine learning and principles and practice of knowledge discovery in databases. 2013.
[2]Amsterdamer Y, Grossman Y, Milo T, Senellart P. Crowdminer: mining association rules from the crowd. Proc VLDB Endow. 2013;6(12):1250–3. https://doi.org/10.14778/2536274.2536288
[3]Amsterdamer Y, Grossman Y, Milo T, Senellart P. Crowd mining. In: Proceedings of the 2013 ACM SIGMOD international conference on management of data. SIGMOD ’13. New York: ACM; 2013. p. 241–52. https://doi.org/10.1145/2463676.2465318.
[4]Naulaerts S, Meysman P, Bittremieux W, Vu TN, Vanden Berghe W, Goethals B, Laukens K. A primer to frequent item- set mining for bioinformatics. Brief Bioinform.2015;16(2):216. https://doi.org/10.1093/bib/bbt074.
[5] Li J, Roy P, Khan SU, Wang L, Bai Y. Data mining using clouds: an experimental implementation of Apriori over Mapre- duce. In: 12th international conference on scalable computing and communications (ScalCom’13). 2012. p. 1–8.
[6] Qiu H, Gu R, Yuan C, Huang Y. Yafim: a parallel frequent itemset mining algorithm with spark. In: IEEE international parallel distributed processing symposium workshops. 2014. p. 1664–71. https://doi.org/10.1109/IPDPSW.2014.185.
[7] Rathee S, Kaul M, Kashyap A. R-Apriori: an efficient apriori based algorithm on spark. In: Proceedings of the 8th workshop on Ph.D. workshop in information and knowledge management. PIKM 15. Melbourne: ACM; 2015. p. 27–34. https://doi.org/10.1145/2809890.2809893.
[8] Farzanyar Z, Cercone N. Efficient mining of frequent itemsets in social network data based on mapreduce frame- work. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ASONAM ’13. New York: ACM; 2013. p. 1183–8.https://doi.org/10.1145/2492517.2500301.
[9] Moans S, Aksehirli E, Goethals B. Frequent itemset mining for big data. In: Proceedings of IEEE international confer- ence on big data. 2013. p. 111–8.https://doi.org/10.1109/BigData.2013.6691742.
[10] Origami S, Ding Q, Tabrizi N. Exploring hadoop as a platform for distributed association rule mining. In: FUTURE COMPUTING 2013-the fifth international conference on future computational technologies and applications. 2013. p. 62–7.
[11] Yong W, Zhe Z, Fang W. A parallel algorithm of association rules based on cloud computing. In: Proceedings of 8th international conference on communications and networking in China (CHINACOM). 2013. p. 415–9. https://doi. org/10.1109/ChinaCom.2013.6694632.
[12] Lin X. Mr-apriori: association rules algorithm based on mapreduce. In: Proceedings of IEEE 5th international confer-ence on software engineering and service science. 2014. p. 141–4. https://doi.org/10.1109/ICSESS.2014.6933531.
[13] Barkhordari M, Niamanesh M. Scadibino: an efective mapreduce-based association rule mining method. In: Proceedings of the sixteenth international conference on electronic commerce. ICEC ’14. New York: ACM; 2014. p. 1–118. https://doi.org/10.1145/2617848.2617853.
[14] Singh S, Garg R, Mishra P. Performance analysis of apriori algorithm with different data structures on hadoop cluster. 2015. Arrive preprint arXiv: 1511.07017.
[15] Zhang F, Liu M, Guy F, Sheen W, Shamir A, Ma Y. A distributed frequent itemset mining algorithm using spark for big data analytics. Cults Compute. 2015; 18(4):1493–501.
[16] FIMI. FIMI datasets. FIMI. 2017. http://fimi.ua.ac.be/data/. Accessed 2 Jan 2017.
[17] SPMF. SPMF: a java open-source data mining library. SPMF. 2017. http://www.philippe foumier-http://www.philippe-foumier-viger.com/spmf/index.php?link=datasets.php.accessed 2 Jan 2017.
[18] Alfredo Cuzzocrea, Carson Kai-Sang Leung, Richard Kyle MacKinnon. Mining constrained frequent itemsets from distributed uncertain data. Future Generation Computer Systems. 2014; 37:117-126.
[19] DsonDela Cruz, Carson Kai-Sang Leung, Fan Jiang. Mining `following` patterns from big sparse social networks. In Proceedings of the International Symposium on Foundations and Applications of Big Data Analytics (FAB 2016),San Francisco, CA, USA. ACM. 2016; 923-930.
[20] Kun He, Yawed Sun, David Bindle, John E.Hopcroft, Yamuna Li. Detecting overlapping communities from local Spectral subspaces. In 2015 IEEE International Conference on Data Mining (ICDM 2015), Atlantic City, NJ, USA. 2015; 769-774.
[21] Yuan Chen, Xiang Zhao, Xiamen Lin, Yang Wang. Towards frequent sub graph mining on single large uncertain graphs. In 2015 IEEE International Conference on Data Mining (ICDM 2015), Atlantic Citing, USA.2015; 41-50.
[22] Fan Jiang, Carson Kai-Sang Leung, Dashing Liu, Aaron M. Peddle. Discovery Dashing Liu, Aaron M. of really popular friends from social networks. In Proceedings of the 4th IEEE International Conference on Big Data and Cloud Computing (BD Cloud 2014), Sydney, Australia. 2014;342-349.
[23] Dhanalakshmi. D and Dr. J. Komala Lakshmi, “A Survey on Data Mining Research Trends”, A Survey on Data Mining Research Trends, Volume 3, Issue 10 October, 2014 Page No. 8911-8919
[24] Rena Ishtar and Rena Ishtar, “Frequent Itemset Mining in Data Mining: A Survey”, International Journal of Computer Applications (IJCA), Volume 139 – No.9, April 2016.
[25] Sanjaydeep Singh Lodhi and Premnarayan Arya,“Frequent Itemset Mining Technique in Data Mining”, International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012.
[26] Bourget, Christian. "Frequent item set mining", Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 2.6(2012): pp. 437-456.
[27] Ghosting a, Kambadur P, Penult E, and Kennan R. NIMBLE: a toolkit for the implementation of parallel data mining and machine learning algorithms on mapreduce. In Proc. ACM SIGKDD, ACM. 2011; 334–342.
[28] Zhou L, Zhan Z, Chang J, Li J, Huang JZ, Fen S. Balanced parallel fop-growth with mapreduce. In: 2010 IEEE youth conference on information, computing and telecommunications. 2010. p. 243–6. https://doi.org/10.1109/YCICT.2010.5713090.
[29] Yang XY, Liu Z, Fu Y. Mapreduce as a programming model for association rules algorithm on hadoop. In: Proceedings of the 3rd international conference on information sciences and interaction sciences. 2010. p. 99–102. https:// doi.org/10.1109/ICICIS.2010.5534718.
[30] Li L, Zhang M. The strategy of mining association rule based on cloud computing. In: Proceeding of international conference on business computing and global informatization. 2011. p. 475–8. https://doi.org/10.1109/BCGIn .2011.125.
[31] Yu H, Win J, Wang H, Jun L. An improved apriori algorithm based on the Boolean matrix and hadoop. Proscenia Eng. 2011; 15:1827–31
[32] Cheung DW, Han J, Ng VT, Fu AW, Fu Y. A fast distributed algorithm for mining association rules. In: Proceeding of fourth International conference on parallel and distributed information systems. 1996. p. 31–42. https://doi.org/10.1109/PDIS.1996.568665
Citation
Sachin Kumar Pandey , "Analytical Study of Association Rule Mining Algorithm for Retrieving Frequent Itemsets in Big Datasets," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.424-436, 2018.
Multi-User Detection in Wireless Networks using Successive Signal Detection and Decision Feedback Equalization
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.437-443, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.437443
Abstract
Multi User Detection or MUD is a major challenge faced in the field of wireless and cellular communications. Wireless Networks are becoming increasingly everywhere in computer networks due to less cost and maintenance overhead. While some wireless networks may operate in regulated spectrum and the majority operate in the unregulated (ISM) band. It is highly challenging for a base or control station to successfully detect signals from multiple users in the same frequency range. This may occur due to comparatively small frequency re-use distance. This paper proposes a technique based on decision feedback equalization (DFE) and strongest signal cancellation for multi-user detection (MUD) in wireless networks. It has can be seen that by employing the proposed system, the Bit Error Rate (BER) for strong, average and weak users assemble. Thus it indicates the fact that all the signals are detected with equal accuracy.
Key-Words / Index Term
Multi User Detection (MUD), User Equipment (UE), Inter Symbol Interference (ISI), Frequency Selective Channel, Bit Error Rate (BER).
References
[1] X Wang, H Lou, Yonghang Jiang , Xiang-Yang Li, Yunhao Liu , Panlong Yang, “Montage: Combine Frames with Movement Continuity for Real-time Multi-User Tracking”, IEEE Transactions on Mobile Computing, IEEE 2017.
[2] B Wang, L Dai, Y Zhang, T Mir, “Dynamic compressive sensing-based multi-user detection for uplink grant-free NOMA”, Vol-20, Issue-11, IEEE 2016.
[3] J Choi, J Mo, RW Heath, “Near maximum-likelihood detector and channel estimator for uplink multiuser massive MIMO systems with one-bit ADCs”, Vol-64, Issue-5, IEEE Xplore- 2016.
[4] Maha Alodeh ; Symeon Chatzinotas ; Björn Ottersten, “Energy-Efficient Symbol-Level Precoding in Multiuser MISO Based on Relaxed Detection Region”, Vol-15, Issue-5, IEEE Xplore- 2016.
[5] Fabian Monsees ; Matthias Woltering ; Carsten Bockelmann ; Armin Dekorsy, “Compressive Sensing Multi-User Detection for Multicarrier Systems in Sporadic Machine Type Communication”, IEEE 2015.
[6] Bichai Wang ; Linglong Dai ; Yifei Yuan ; Zhaocheng Wang, “Compressive Sensing Based Multi-User Detection for Uplink Grant-Free Non-Orthogonal Multiple Access”, IEEE-Xplore 2015.
[7] S Wang, Y Li, J Wang, “Multiuser detection in massive spatial modulation MIMO with low-resolution ADCs”, IEEE Transactions on Wireless Communication, Vol-14, Issue-4, IEEE Xplore 2015.
[8] S Narayanan, MJ Chaudhry, A Stavridis, “Multi-user spatial modulation MIMO”, Proceedings of Wireless Communications and Networking Conference (WCNC), IEEE 2014.
[9] P Botsinis, D Alanis, SX Ng, LLCSO Hanzo, “Quantum-Assisted Multi-User Detection for Direct-Sequence Spreading and Slow Subcarrier-Hopping Aided SDMA-OFDM Systems”, IEEE 2014.
[10] A Mukherjee, SAA Fakoorian, J Huang, “Principles of physical layer security in multiuser wireless networks: A survey”, Vol-16, Issue-3, IEEE 2014.
[11] S Roger, D Calabuig, J Cabrejas, “Multi-user non-coherent detection for downlink MIMO communication”, Vol-21, Issue-10, IEEE 2014.
[12] Henning F. Schepker ; Carsten Bockelmann ; Armin Dekorsy, “Exploiting Sparsity in Channel and Data Estimation for Sporadic Multi-User Communication”, Proceedings in Wireless Communication Systems (ISWCS 2013), IEEE 2013.
[13] SK Mohammed, EG Larsson, “Constant-envelope multi-user precoding for frequency-selective massive MIMO systems”, Vol-3, Issue-5, IEEE 2013.
[14] C Studer, EG Larsson, “PAR-aware large-scale multi-user MIMO-OFDM downlink”, IEEE, 2013.
[15] WX Meng, SY Sun, HH Chen, “Multi-user interference cancellation in complementary coded CDMA with diversity gain”, Volume-2, Issue-3, IEEE 2013.
[16] HF Schepker, A Dekorsy, “Compressive sensing multi-user detection with block-wise orthogonal least squares”, Proceedings in Vehicular Technology Conference (VTC, Tokyo), IEEE 2012.
[17] K Rasadurai, N Kumaratharan, “Performance enhancement of MC-CDMA system through turbo multi-user detection”, Proceedings in International Conference on Computer Communication and Informatics (ICCCI), IEEE 2012.
[18] X Shang, B Chen, HV Poor, “Multiuser MISO interference channels with single-user detection: Optimality of beamforming and the achievable rate region”, Vol-57, Issue-7, IEEE Transactions on Information Theory, IEEE 2011.
[19] H Zhu, GB Giannakis, “Exploiting sparse user activity in multiuser detection”, IEEE Transactions on Communications, IEEE 2011.
[20] S.Hong, “Multi-Resolution Bayesian Compressive Sensing for Cognitive Radio Primary User Detection” Proceedings in Global Telecommunications Conference (GLOBECOM 2010), IEEE 2010.
[21] TW Yune, CH Choi, GH Im, JB Lim, “SC-FDMA with iterative multiuser detection: improvements on power/spectral efficiency”, Vol-48, Issue-3, IEEE 2010.
[22] D Angelosante, E Biglieri, M Lops, “Neighbor discovery in wireless networks: A multiuser-detection approach”, Vol-3, Issue-1, Elsevier 2010.
[23] Ratnesh Kumar Shukla, Ajay Agarwal, Anil Kumar Malviya,” An Introduction of Face Recognition and Face Detection for Blurred and Noisy Images”, International journal of scientific research in computer sciences and engineering, Vol-6, Issue.3, pp.39-43 , June 2018.
[24] A. Sebastian, S. Sivagurunathan,” A Survey on Load Balancing Schemes in RPL based Internet of Things”, International Journal of Scientific Research in Network Security and Communication , Volume-6, Issue-3, June 2018.
Citation
Aditya Rege, Santosh Pawar, Sheetesh Sad, "Multi-User Detection in Wireless Networks using Successive Signal Detection and Decision Feedback Equalization," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.437-443, 2018.
An Integral Solution of Negative Pell’s equation involving two digit sphenic numbers
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.444-445, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.444445
Abstract
We look for figuring out non-trivial integral solutions of the negative Pell’s equation involving two digit sphenic numbers 30 and 66 for the choice of odd integers including zero. We find some interesting recurrence relations using the solutions.
Key-Words / Index Term
Pell equation, Integer Solutions, 2 digit sphenic numbers
References
[1] John Stillwell, “Elements of Number theory”, Springer – Verlag, New York, 2003.
[2] Kenneth Ireland and Michael Rosen, “A Classical introduction to Modern Number Theory”, Springer – Verlag, New York, 1990.
[3] L.E.Dickson, “History of Theory of Numbers”, Chelsea Publishing Company, New York, 1952.
[4] L.J.Mordell, “Diophantine equations”, Academic Press, New York, 1969.
[5] S.G.Telang, “Number Theory”, Tata McGraw-Hill Publishing Company Limited, New Delhi, 1996.
[6] M.A.Gopalan and G.Janaki “Observation on ”, Acta Ciencia Indica, Vol.34, Issue.2, pp-693, 2008.
[7] G.Janaki and S.Vidhya, “On the integer solutions of the Pell equation ”, International Journal of Scientific Research in Science, Engineering and Technology, Vol.2, Issue.2, pp.1195-1197, 2016.
[8] G.Janaki and S.Vidhya, “On the integer solutions of the Pell equation ”, International Journal of Multidisciplinary Research and Development, Vol.3, Issue.5, pp.39-42, 2016.
[9] G.Janaki and S.Vidhya, “On the negative Pell equation ”, International Journal of Applied Research, Vol.2, Issue.11, pp.462-466, 2016.
Citation
S. Vidhya, G. Janaki, "An Integral Solution of Negative Pell’s equation involving two digit sphenic numbers," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.444-445, 2018.
Enhanced Image Transferring Scheme using Security Techniques
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.446-451, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.446451
Abstract
Rapid growth in technology has enabled cyber attackers hack the data and misuse the content transferring using the authentication method. Due to this information transferring requires more security. Attackers can thoroughly figure out sensitive data from the traditional methods, using the hash value. Traditional methods of visual cryptography approach were used to transfer the sensitive data. Enhanced image scheme is proposed to hide the sensitive data. Transferring sensitive data in the form of image with the printed text requires more security without allowing the attackers to change the sensitive data. In this project OCR engine, tesseract approaches help in recognizing and conversions of the printed text to the machine typed characters. AES algorithm is then applied to encrypt these machine typed characters. Steganography technique is used for binding the secure data with the cover image without changing the input data format. Digital signature approach is used for verifying the extracted and decrypted character from the output image with the input data. Using multiples algorithms in the proposed approach enables more security for transferring of sensitive data. PNG image format is used for the implementation of the proposed system for better accuracy.
Key-Words / Index Term
OCR engine, Tesseract, Cryptography, Steganography and Digital Signature
References
[1] Dana Yang, Inshil Doh, and Kijoon Chae “Enhanced Password Processing Scheme Based on Visual Cryptography and OCR” Dept. Computer Science and Engineering Ewha Womans University, 2017,IEEE.
[2] Akhil, “Overview of Tesseract OCR engine” Department of Computer Science and Engineering National Institute of Technology, Calicut Monsoon-2016 Seminar Report.
[3] Pijush Chakraborty and Arnab Mallik “An Open Source Tesseract based Tool for Extracting Text from Images with Application in Braille Translation for the Visually Impaired” International Journal of Computer Applications (0975 –8887) Volume 68 – No.16, April 2013.
[4] Arnab Mallik, Asst. Professor, CSE Dept, Calcutta Institute of Engineering and Management “An Open Source Tesseract based Tool for Extracting Text from Images with Application in Braille Translation for the Visually Impaired”, International Journal of Computer Applications (09758887) Volume 68–No.16, April 2013.
[5] Chirag Patel, Atul Patel, Dharmendra Patel, Charotar University of Science and Technology “Optical Character Recognition by Open Source OCR Tool Tesseract: A Case Study” international Journal of Computer Applications (0975 –8887) Volume 55–No.10, October 2012.
[6] Md. Alam Hossain, Md. Biddut Hossain, Md. Shafin Uddin, Shariar Md. Imtiaz “Performance Analysis of Different Cryptography Algorithms” Computer Science and Engineering Department, Jessore University of Science & Technology, Bangladesh.
[7] Kundankumar Rameshwar Saraf, “Text and Image Encryption Decryption Using Advanced Encryption Standard” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS).
[8] José Manuel Ortega, “Python Cryptography & Security” europython 2016, bilbao, 20-26 July.
[9] Pri a Bharti, Roopali Soni, “A New Approach of Data Hiding in Images using Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 58–No.18, November 2012.
[10] Chirag Patel, Atul Patel, Dharmendra Patel “Optical Character Recognition by Open Source OCR Tool Tesseract: A Case Study” International Journal of Computer Applications (0975 – 8887) Volume 55–No.10, October 2012.
[11] Li, X., Wang, J.: A Steganographic Method based Upon JPEG and Particle Swarm Optimization Algorithm. Information Sciences 177(15), 3099–3109 (2007).
[12] Abdel-Karim Al Tamimi, “Performance Analysis of Data Encryption Algorithms” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 3, March 2016.
[13] Avinash Kak, “AES: The Advanced Encryption Standard Lecture Notes on “Computer and Network Security”, Purdue University, February 2018.
[14] S.R. Subramanya and Byung K. Yi, “Digital signatures” March/April 2006 IEEE Potentials.
[15] Laurent Luce`s Blog “Python and cryptography with pycrypto” March 2018.
[16] Mohana kumar S and Jagadeesh S N “Study of privacy preserving and detection of sensitive data explore using message digest” International journal of Advance research in computer and communication, volume 5, issues 6, pages 118-122.
[17] N.S.Lele,”Image Classification Using Convolutional Neural Network”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.22-26 , 2018.
Citation
Madhura.M, Mohana Kumar.S, "Enhanced Image Transferring Scheme using Security Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.446-451, 2018.
Semantics discovery of Short Text
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.452-456, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.452456
Abstract
Currently every person’s use short text in real life for communication and chatting purpose. Short texts are also uses in social posts, news titles, events, search queries, tweets, conversations, keywords, Short text understanding is a confusing process in ideas deals with secret messages. The short text is produce that contain social posts, discussions, keywords and news titles which are restricted context and represent the significance of the text or insufficient information. As short text has more than one meaning, they are challenging to understand as they are noisy and ambiguous. The term can be any single or multi-word. Short texts do not contain satisfactory information. Some short texts have unique features. So these short texts are difficult to handle. It essential well understand the short text. Semantic analysis is necessary to understand the short text properly. Tasks such as part-of-speech tagging, concept labelling and segmentation are used for semantic analysis. Conduct short text uses in real life information. The prototype system is constructed and used to recognize the short text. These systems deliver the semantic knowledge from knowledge base and collection of written words that are automatically harvest. Creating construction of co-occurrence network and term extraction showing to better understand for short text.
Key-Words / Index Term
Short Text, Semantics, Text segmentation, co-occurrence,Term Extraction
References
[1] M. Utiyama and H. Isahara, “A statistical model for domain-independent text Segmentation,” in Proc. 39th Annu. Meeting Assoc. Comput. Linguistics, 2001, pp. 499–506.
[2] N. Mishra, R. Saha Roy, N. Ganguly, S. Laxman, and M. Choudhury, “Unsupervised query segmentation using only query logs,” in Proc. 20th Int. Conf. Companion WorldWideWeb, 2011, pp. 91–92.
[3] D. Deng, G. Li, and J. Feng, “An efficient Trie-based method for approximate entity extraction with edit-distance constraints,” in Proc. IEEE 28th Int. Conf. Data Eng., 2012, pp. 762–773.
[4] P. Li, H. Wang, K. Q. Zhu, Z. Wang, and X. Wu, “Computing term similarity by large probabilistic ISA Knowledge,” in Proc. 22nd ACM Int. Conf. Inform. #38; Manage., 2013, pp. 1401–1410
[5] W. Hua, Z. Wang, H. Wang, K. Zheng, and X. Zhou, “Short text understanding through lexical-semantic analysis,” in ICDE, pp. 495–506, 2015.
[6] Zheng Yu, Haixun Wang, Xuemin Lin, Senior Member, IEEE, and Min Wang, “Understanding Short Texts through Semantic Enrichment and Hashing”. VOL. 28, NO. 2, FEBRUARY 2016
[7] Wen Hua, Zhongyuan Wang, Haixun Wang, Member, IEEE, Kai Zheng, Member, IEEE, and Xiao Fang Zhou, Senior Member, IEEE, “Understand Short Texts by Harvesting and Analyzing Semantic Knowledge” , VOL. 29, NO. 3, MARCH 2017
[8] E. Brill, “A simple rule-b9ased part of speech tagger,” in Proc. Workshop Speech Natural Language, 1992, pp. 112–116.
[9] R. Weischedel, R. Schwartz, J. Palmucci, M. Meteer, and L. Ramshaw, “Coping with ambiguity and unknown words through probabilistic models,” Comput. Linguistics, vol. 19, no. 2, pp. 361–382, 1993.
[10] https://cracku.in/blog/nicknames-of-indian-states-and-cities-pdf/
[11] http://www.txtdrop.com/abbreviations.php
Citation
P. G. Kamble, S. B. Bhagate, "Semantics discovery of Short Text," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.452-456, 2018.