Adopting Machine Learning Models for Data Analytics-A Technical Note
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.359-364, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.359364
Abstract
Data science is the most promising area in computer science today. Data science uses various methods and techniques to deal with large volume of data accumulated day by day. Predictive analytics is the prime concept in data science by processing these large volumes of data to make important predictions. This is being achieved through machine learning family of algorithms. This paper makes a note on the core concept of machine learning and the strategies to adopt suitable machine learning algorithms for the problems in data science. It also reviews different areas of machine learning applications in data science.
Key-Words / Index Term
Data Science, Machine Learning, Supervised Learning, Reinforcement Learning
References
[1]. J.D. Kelleher, B.M. Namee, A. D’Arcy, “Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies” The MIT Press, 2015.
[2]. H. Chen, R.H.L. Chiang, V.C. Storey, “Business Intelligence and Analytics: From Big Data to Big Impact”, MIS Quarterly, Vol. 36, No. 4, pp. 1165-1188, 2012.
[3]. T.M. Mitchell, “Machine learning and data mining”, Commun. ACM, Vol. 42, No.11, pp.30-36, 1999.
[4]. J. Lin, A. Kolcz, “Large-scale machine learning at twitter”, In Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data (SIGMOD `12). ACM, New York, NY, USA, pp.793-804, 2012.
[5]. S. Ryu, “Predictive Analytics: The Power to Predict Who Will Click Buy, Lie or Die”, Healthc Inform Res., vol.19, No.1, pp.63-65, 2013.
[6]. L.Wang, et al., “Automatic Epileptic Seizure Detection in EEG Signals Using Multi-Domain Feature Extraction and Nonlinear Analysis”, Entropy, vol.19, no.6, 222, 2017.
[7]. R.S. Michalski, J.G. Carbonell, T.M. Mitchell, “Machine Learning An Artificial Intelligence Approach”, 1983
[8]. A. Vellido, J.D. Martín-Guerrero, P.J.G. Lisboa, “Making machine learning, models, interpretable”, In Proc. European Symposium On Artificial Neural Networks, Computational Intelligence and Machine Learning, 2012.
[9]. S.B. Kotsiantis, “Supervised Machine Learning: A Review of Classification Techniques”. In Proceedings of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, Ilias Maglogiannis, Kostas Karpouzis, Manolis Wallace, and John Soldatos (Eds.). IOS Press, Amsterdam, The Netherlands, pp.3-24, 2007.
[10]. J. Dougherty, R. Kohavi, M. Sahami, “Supervised and Unsupervised Discretization of Continuous Features”, In Proceedings of the Twelfth International Conference on Machine Learning, San Francisco (CA), pp.194-202, 1995.
[11]. T.G. Dietterich,” Ensemble Methods in Machine Learning”, In: Multiple Classifier Systems, MCS 2000, Lecture Notes in Computer Science, vol 1857, Springer, Berlin, Heidelberg. 2000.
[12]. A.J. Smola, & B. Schölkopf, “A Tutorial on Support Vector Regression”, Statistics and Computing, vol.14, No.199, 2004.
[13]. P.K. Chan, M.V. Mahoney, M.H. Arshad, “A machine learning approach to anomaly detection”, (CS-2003-06). Melbourne, FL. Florida Institute of Technology, 2003.
[14]. R. Xu, D. Wunsch, "Survey of clustering algorithms," in IEEE Transactions on Neural Networks, vol. 16, no. 3, pp. 645-678, May 2005.
[15]. M.L. Littman, A.W. Moore, L.P. Kaelbling, “Reinforcement Learning: A Survey”, Journal of Artificial Intelligence Research, Vol.4, pp.237-285,1996.
[16]. M. Nasser, Nasrabadi, "Pattern Recognition and Machine Learning," Journal of Electronic Imaging, vol.16, No.4, 049901, 2007.
[17]. K.C. Fu, “Sequential Methods in Pattern Recognition and Machine Learning”, Vol.52, Academic Press, 1968.
[18]. M.M. Richter, S. Paul, “Signal Processing and Machine Learning with Applications”, Springer International Publishing, 2018.
[19]. J.L. Cabra, D. Mendez, Luis C. Trujillo. “Wide Machine Learning Algorithms Evaluation Applied to ECG Authentication and Gender Recognition”, In Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications (ICBEA `18). ACM, New York, NY, USA, pp.58-64, 2018.
[20]. R. John Martin, S. Sujatha, S.L. Swapna, “Multiresolution Analysis in EEG Signal Feature Engineering for Epileptic Seizure Detection”, International Journal of Computer Applications, Vol.180, No.17. pp.14-20, February 2018.
[21]. R.A. Miller, A. Geissbuhler, “Diagnostic Decision Support Systems”, In: Berner E. (eds) Clinical Decision Support Systems. Health Informatics. Springer, NY, pp. 99-125, 2016.
[22]. E. Chong, C. Han, Frank C. Park, “Deep Learning Networks for Stock Market Analysis and Prediction: Methodology, Data Representations, and Case Studies”, Expert Systems with Applications, Vol;.83, pp.187-205, 2017.
[23]. X. Z. Zhang, "Building Personalized Recommendation System in E-Commerce using Association Rule-Based Mining and Classification," In Proc. International Conference on Machine Learning and Cybernetics, Hong Kong, pp. 4113-4118, 2007.
[24]. D. Freitag, “Machine Learning for Information Extraction in Informal Domains”. Machine Learning, Vol.39, pp.169–202, 2000.
[25]. Rakesh. S.Shirsath, Vaibhav A.Desale, Amol. D.Potgantwar, "Big Data Analytical Architecture for Real-Time Applications", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.1-8, 2017.
[26]. V.K. Gujare, P. Malviya, "Big Data Clustering Using Data Mining Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.9-13, 2017
[27]. K.S. Shin, T.S. Lee, H.J. Kim, “An application of support vector machines in bankruptcy prediction model”, Expert Systems with Applications, Vol.28, No.1, pp.127-135,2005.
Citation
John Martin R, Swapna S.L, Sujatha S, "Adopting Machine Learning Models for Data Analytics-A Technical Note," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.359-364, 2018.
LINK STABLE INTELLIGENT CACHING MULTIPATH AND MULTICAST ROUTING PROTOCOL FOR WSN
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.365-372, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.365372
Abstract
Quality of Services is an important aspect in Wireless Adhoc network, where nodes are organized with reduced resources like low energy and low bandwidth due to the lack of network infrastructure. There are various QOS aware routing protocol presented to improve the link quality to enhance the WSN quality of services, but most of these protocols were limited to efficient routing and to minimizing the overhead. Moreover many of these protocols suffer from design issues which makes quality of service ,a challenging research task due to lack of efficient routing protocols . In this protocol we propose a new multipath, multicast routing protocol that addresses the issue of route congestion .In this protocol we propose a Link Stable Intelligent Caching Multipath and Multicast Routing protocol for WSN by adopting particle swarm optimization technique to identify the optimal route and employed intelligent caching to minimize route congestion and to improve the load balancing.
Key-Words / Index Term
WSN, PSO, Load Balancing, Caching, QOS in wireless sensor network
References
[1] Yi, J., Adnane, A., David, S.and Parrein, B., “Multipath Optimized Link State Routing for Mobile AdHoc Networks”, AdHoc Networks(2010),Elsevier, doi:10.1016/j.adhoc.2010.04.007.
[2] P. P. Tandon and BibhudattaSahoo, “A Novel Congestion Avoidance Based Load Balanced Routing with Optimal Flooding in Mobile Ad Hoc Networks”, In the proceedings of the International Conference on Contemporary Computing, UFL& JIITU,IC3 (2008), pp. 195-202.
[3] ]Moon Jeong Kim, Dong Hoon Lee,andYoung Ik Eom, “Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad Hoc Networks”, Proceedings: International Conference on Computational science and its applications, vol. Part III (ICCSA), 2007,pp. 1187-1196.
[4] Gabriel loan Ivascu, Samuel Pierre and Alejandro Quintero, “QoS Routing with Traffic Distribution in Mobile ad hoc Networks”, Computer Communications, vol.32,2009,pp. 306-316.
[5] Shruti Sangwan, Nitin Goel, and Ajay Jangra, “ AELB: Adaptive and Efficient Load Balancing Schemes to Achieve Fair Routing in Mobile Ad hoc Networks (MANETs)”, International Journal of Computer science and technology, vol. 2, issue 3 (version 1) , September 2011,pp. 11-15.
[6] K.R. Shobhaand K. Rajanikanth, “Intelligent Caching in on-demand Routing Protocol for Mobile Ad Hoc Networks”, World Academy of Science, Engineering and Technology, 2009.
[7] Premalatha.J and Bala Subramanie.P, “Enhancing the quality of service in WSNs by effective routing”, ICWCSC 2010.
[8] Moon Jeong Kim, Dong Hoon Lee, and YoungIkEom, “Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad Hoc Networks”, In the Proceedings of the International Conference on Computational science and its applications, vol. Part III (ICCSA), 2007,pp. 1187-1196.
[9] Melike Oz Pasaogullari, Catherine M. Harmonosky and Sanjay Joshi, “Node Independent Multipath Routing Algorithm for WSN”.
[10] Chengyong Liu, KezhongLiu and Layuan Li, “Research of QoS –aware Routing Protocol with Load Balancing for Mobile Ad Hoc Networks”, In the Proceedings of the 4th International Conference on Wireless communication, 2008.
[11] Satyanarayana, D. and Rao, S.V., “Link Failure Prediction QoS Routing Protocol for WSN”, Information and Communication Technology in Electrical Sciences, ICTES 2007, December 2007, pp. 1031-1036.
[12] Luo Liu, Cuthbert, L., “A Novel QoS in Node-Disjoint Routing for Ad Hoc Networks”, IEEE ICC Workshop, 2008,pp. 202-206.
[13] Navid Nikaein and Christian Bonnet, “A Glance at Quality of Service Models for Mobile Ad Hoc Networks”, DNAC, 2002.
[14] ChunxueWu,Fengna Zhang and Hongming Yang, “A Novel QoS Multipath Routing in WSNs”, International Journal of Digital Content Technology and its Applications, 2010.
[15] G. Narsimha,A. Venugopal Reddy and S.S.V.N. Sarma,
“The Effective Multicasting Routing Protocol in Wireless Mobile Ad hoc Network”, In the Proceedings of the 6th International Conference on networking (ICN’07),IEEE,2007.
[16] N Zhang, A Anpalagan “Comparative Review of QoS –Aware On-Demand Routing in Ad Hoc Wireless Networks”, Wireless Sensor Networks (WSN), 2010,pg no:274-284.
[17] Garg, N. Batra, I. Taneja, A. Bhatnagar, A. Yadav, S. Kumar,”Cluster Formation based Comparison of Genetic Algorithm and Particle swarm Optimization Algorithm in Wireless Sensor Network”, Isroset-Journal (IJSRCSE) Vol.5 , Issue.2 , pp.14-20, Apr-2017
[18] V. Prasad, VS. Sunsan,”Multi path dynamic routing for data integrity and delay Minimization differentiated services in wireless sensor network”, Isroset-Journal (IJSRCSE)Vol.4 , Issue.4 , pp.20-23, Aug-2016
Citation
Padmaleela Damaraju, M Sesha Shayee, "LINK STABLE INTELLIGENT CACHING MULTIPATH AND MULTICAST ROUTING PROTOCOL FOR WSN," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.365-372, 2018.
Model-based Test Case Prioritization
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.373-381, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.373381
Abstract
The efficiency of Software testing can be improved by scheduling the test cases using test case prioritization technique (TCP). A novel test case prioritization approach is proposed to schedule the execution of test cases in testing process of software development. Our approach prioritizes the test cases generated from UML Sequence diagram. The major objective of our TCP approach is to achieve high rate of fault detection and test coverage. In this paper, an intermediate graph is created form UML sequence diagram to generate the message sequence paths. We calculate the weights of each node of the graph according to the affecting nodes using forward slice and edge using information flow model. Then the weights of test paths which are generated from sequence diagram are calculated by adding the weights of associated nodes and edges. According to the weights of corresponding test paths the test cases are prioritized. The obtained results indicate that the proposed technique is effective in prioritizing the test cases by the Average Percentage of Fault Detection (APFD) metric to estimate the performance of our proposed approach. The result of our proposed approach is compared with the result of traditional approach using APFD for some selected software. Finally, our proposed prioritization approach is also compared with some available related work.
Key-Words / Index Term
Test case prioritization, sequence diagram, message sequence path, forward slicing, information flow model
References
[1]. R. Mall, “Fundamentals of Software Engineering”, Prentice-Hall, Springer-Verlag GmbH, 3rd Edition 2009.
[2]. M. Khatibsyarbini, M.A. Isa, Dayang N.A, Jawawi, R. Tumeng, “Test case prioritization approaches in regression testing: A systematic literature review” Information and Software Technology, Vol.93, pp. 74-93, January 2018.
[3]. H. Srikanth, L. Williams. “On the economics of requirements-based test case prioritization”, In Proceedings of the Seventh International Workshop on Economics-Driven Software Engineering Research, 2005.
[4]. C. E.Williams, “Software testing and the UML” In Proceedings of the International Symposium on Software Reliability Engineering, (ISSRE ’99), Boca Raton, FL, November 1999.
[5]. S. Elbaum, A.G.Malishevsky, G.Rothermel, “Test case prioritization: A family of empirical studies”, IEEE Transactions on Software Engineering, Vol. 28,Issue.2, pp. 159-182, 2002.
[6]. J. Chen , L. Zhu , T. Y. Chen , D. Towey, Fei-Ching Kuo , R. Huang , Y. Guo, “Test case prioritization for object-oriented software: An adaptive random sequence approach based on clustering”, The Journal of Systems and Software, Vol. 135, pp. 107–125, 2018.
[7]. G. Rothermel, R. H.Untch, C.Chu, M. J.Harrold, “Prioritizing test cases for regression testing”, Software Engineering, Vol. 27,Issue.10, pp. 929-948, 2001.
[8]. M.Weiser, “Program slicing”, In Proceedings of the 5th International Conference on Software, San Diego, Calif, USA, pp. 439–449, 1981.
[9]. M. Weiser, “Programmers Use Slices when Debugging”, Communications of the ACM 25, vol.7, pp.446-452, 1982.
[10]. A. Besz´edes, “Global dynamic slicing for the C language,” Acta Polytechnica Hungarica, vol. 12, no. 1, pp. 117–136, 2015.
[11]. X. B. Li, C. X. Fan, J. Pang, and J. J. Zhao, “A model for slicing JAVA programs hierarchically,” Journal of Computer Science and Technology, vol. 19, no. 6, pp. 848–858, 2004.
[12]. H. W. Alomari, M. L. Collard, J. I. Maletic, N. Alhindawi, and O. Meqdadi, “srcSlice: very efficient and scalable forward static slicing,” Journal of Software: Evolution and Process, vol. 26, no.11, pp. 931–961, 2014.
[13]. J. Silva, “A vocabulary of program slicing-based techniques”, ACM Computing Surveys, vol. 44, no. 3, article 12, 2012.
[14]. Z. Awedikian, K. Ayari, G . Antoniol, “MC/DC Automatic Test Input Data Generation”, In Proceedings of the 11th Annual conference on Genetic and evolutionary computation, ACM, pp. 1657-1664, 2009.
[15]. M. Weiser, “Program slicing”, IEEE Transactions on Software Engineering, Vol. 10, No. 4,pp.352–357, 1984.
[16]. D. Kundu, D.Samanta, “A novel approach of prioritizing use case scenarios”, Asia–Pacific Software Engineering Conference (APSEC), IEEE Computer Society, Washington, DC, pp. 542-549, 2007.
[17]. C. R.Panigrahi, R. Mall, “Model-based regression test case prioritization”, ACM SIGSOFT Software Engineering Notes, Vol. 35,No.6, pp. 1-7, November 2010.
[18]. P.G. Sapna , A. Balakrishnan”An Approach for Generating Minimal Test Cases for Regression Testing”, Procedia Computer Science, Vol. 47,pp. 188 – 196, 2015
[19]. S. Panda, D. Munjal, D. P. Mohapatra, ”A Slice-Based Change Impact Analysis for Regression Test Case Prioritization of Object-Oriented Programs”, Advances in Software Engineering, Volume 2016, pp.1-20, 2016.
[20]. S. Gupta , H. Raperia , E. Kapur , H. Singh, A. Kumar,”A Novel Approach for test case Prioritization”, International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.3, 2012.
[21]. D. Jeffrey, N.Gupta, “Test case prioritization using relevant slices”, International Computer Software and Applications Conference (COMPSAC). IEEE Computer Society, Washington, DC, pp. 411–420, 2006.
[22]. S.S.Basa, S.Swain, D.P.Mohapatra,”UML Activity Diagram-Based Test Case Generation”, Journal of Emerging Technologies and Innovative Research (JETIR), Volume 5, Issue 8, 2018.
[23]. C. Mingsong, Q. Xiaokang, L. Xuandong, ”Automatic test case generation for UML activity diagrams”, In International workshop on Automation of software test, pp. 2-8, 2006.
[24]. D. Kundu, D. Samanta,” A Novel Approach to Generate Test Cases from UML Activity Diagrams”, Journal of Object Technology, Vol. 8, No. 3, pp.65-83, 2009.
[25]. G.Rothermel., R. H.Untch, C.Chu, M. J.Harrold, “Prioritizing test cases for regression testing”, Software Engineering, Vol. 27,Issue.10, pp. 929-948, 2001.
[26]. S. Elbaum, G. Rothermel, S. Kanduri, and A. Malishevsky, “Selecting a cost-effective test case prioritization technique”, Software Quality Control, Vol.12, Issue.3, pp.185–210, 2004.
Citation
S.S. Basa, S.K. Swain, D.P. Mohapatra, "Model-based Test Case Prioritization," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.373-381, 2018.
Design and Performance Analysis of Body Wearable Antenna
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.382-386, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.382386
Abstract
In this paper an inset feed, rectangular microstrip textile patch antenna operating at 2.4 GHz has been proposed. The designed antenna is analyzed under bend and normal condition. For design of this antenna, 2.85 mm thick polyester fabric with dielectric constant of 1.44 is used as a substrate and 0.04 mm thick copper is used as conductive part of antenna. The designed antenna is tuned at desired frequency with return loss of -32.5 dB and an impedance bandwidth of 90 MHz is observed. Then same antenna is simulated on a three layer body phantom model (containing properties of muscles, skin and fat) for flat and bending conditions. A SAR (specific absorption rate) analysis is also done on the basis of 1 g and 10 g tissue of human body. Variations in performance parameters like return loss, gain and SAR due to lossy nature of human body are observed and analyzed. Further EBG (electromagnetic band gap) material is used to reduce SAR.
Key-Words / Index Term
Body wearable patch antenna, SAR (specific absorption rate), EBG (electromagnetic band gap)
References
[1] C. Hertleer, A. Tronquo, H. Rogier, L. Vallozzi and L. Van Langenhove, "Aperture-Coupled Patch Antenna for Integration Into Wearable Textile Systems," in IEEE Antennas and Wireless Propagation Letters, vol. 6, pp. 392-395, 2007.
[2] D. Paul, H.Giddens, M. Paterson,G. Hilton, and J.McGeehan, “Impact of body and clothing on a wearable textile dual band antenna at digital television and wireless communications bands,” IEEE Trans. Antennas Propag., vol. 61, no. 4, pp. 2188–2194, 2013.
[3] Y. Sun, S. W. Cheung and T. I. Yuk, "Design of a textile ultra-wideband antenna with stable performance for body-centric wireless communications," in IET Microwaves, Antennas & Propagation, vol. 8, no. 15, pp. 1363-1375, 9 12 2014.
[4] S. Zhu and R. Langley, "Dual-band wearable antennas over EBG substrate," in Electronics Letters, vol. 43, no. 3, pp. 141-142, 1 Feb. 2007.
[5] S. Yan, P. J. Soh and G. A. E. Vandenbosch, "Wearable dual-band composite right/ left-handed waveguide textile antenna for WLAN applications," in Electronics Letters, vol. 50, no. 6, pp. 424-426, 13 March 2014.
[6] L. Vallozzi, H. Rogier and C. Hertleer, "Dual Polarized Textile Patch Antenna for Integration Into Protective Garments," in IEEE Antennas and Wireless Propagation Letters, vol. 7, pp. 440-443, 2008.
[7] M. Virili, H. Rogier, F. Alimenti, P. Mezzanotte and L. Roselli, "Wearable Textile Antenna Magnetically Coupled to Flexible Active Electronic Circuits," in IEEE Antennas and Wireless Propagation Letters, vol. 13, pp. 209-212, 2014.
[8] S. Yan, P. J. Soh and G. A. E. Vandenbosch, "Compact All-Textile Dual-Band Antenna Loaded With Metamaterial-Inspired Structure," in IEEE Antennas and Wireless Propagation Letters, vol. 14, pp. 1486-1489, 2015.
[9] P. Salonen and Y. Rahimat-Samii, "Textile antennas: effects of antenna bending on input matching and impedance bandwidth," in IEEE Aerospace and Electronic Systems Magazine, vol. 22, no. 3, pp. 10-14, March 2007.
[10] Q. Bai and R. Langley, "Crumpled textile antennas," in Electronics Letters, vol. 45, no. 9, pp. 436-438, 23 April 2009.
[11] S. Agneessens and H. Rogier, "Compact Half Diamond Dual-Band Textile HMSIW On-Body Antenna," in IEEE Transactions on Antennas and Propagation, vol. 62, no. 5, pp. 2374-2381, May 2014.
[12] Nagar, KS. Solanki, "Design and Analysis of Micro Strip Patch Antenna", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.1-5, 2013
[13] Arpit Nagar, Aditya Singh Mandloi and Khem Singh Solanki, "Microstrip Antenna Using Dummy EBG", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.24-28, 2013
[14] P. J. Soh, G. Vandenbosch, F. H. Wee, A. van den Bosch, M. Martinez-Vazquez and D. Schreurs, "Specific Absorption Rate (SAR) Evaluation of Textile Antennas," in IEEE Antennas and Propagation Magazine, vol. 57, no. 2, pp. 229-240, April 2015.
[15] S. J. Chen, T. Kaufmann, D. C. Ranasinghe and C. Fumeaux, "A Modular Textile Antenna Design Using Snap-on Buttons for Wearable Applications," in IEEE Transactions on Antennas and Propagation, vol. 64, no. 3, pp. 894-903, March 2016.-1
[16] H. J. Lee, K. L. Ford and R. J. Langley, "Switchable on/off-body communication at 2.45 GHz using textile microstrip patch antenna on stripline," in Electronics Letters, vol. 48, no. 5, pp. 254-256, 1 March 2012.
[17] C.A. Balanis, Modern Antenna Handbook 3rd edition. A John Wiley and Sons, Inc., Publications, 2005.
[18] ALI, U. ... et al, Design and SAR analysis of wearable antenna on various parts of human body, using conventional and artificial ground planes. Journal of Electrical Engineering and Technology, 12 (1), pp. 317-328, 2017.
[19] Sievenpiper, L. Zhang, J. F. R. Broas, G. N. Alexopolous, and E. Yablonovitch, “High-impedance electromagnetic surfaces with a forbidden frequency band,” IEEE Trans. on Microwave Theory and Techniques, Vol. 47, no. 11, pp. 2059-2074, Nov. 1999.
Citation
Jaget Singh, B.S Sohi, "Design and Performance Analysis of Body Wearable Antenna," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.382-386, 2018.
The Emergence of Blockchain Technology in Ubiquitous Computing
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.387-391, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.387391
Abstract
Blockchain Systems and Ubiquitous computing are changing the manner we work together and lead our lives. A standout amongst the most imperative utilizations of the Blockchain technology is in automation processes, digital assistants and Internet-of-Things (IoT). Machines have so far been constrained in ability primarily because they have restricted capacity to exchange value. Any monetary exchange of value which is of significant worth must be supervised by humans or human based centralized ledgers. Blockchain technology changes all that. It allows machines to have unique identities and hence a virtual presence. Blockchain technology even allows for automated verification by the network of machines itself. It permits machines to exchange value and introduce the element of discretion in the hands of Machines. This can form the basis for ultimately developing IoT going on to Artificial Intelligence. This paper aims to investigate and expound couple of most impactful use-cases of blockchain technology in ubiquitous computing/omnipresent processing.
Key-Words / Index Term
Blockchain, ubiquitous computing, IoT, cryptocurrency, crypto wallet.
References
[1] Kartik Hegadekatti, Automation Process and Blockchain Process, [Online], MPRA.
[2] S.K. Sharma, L. Gupta, “A Novel Approach for Cloud Computing Environment”, International Journal of Computer Sciences and Engineering, Vol. 4, Issue.12, pp.1-5, 2014.
[3] Stefan Posland, Ubiquitous Computing, Wiley Publication, 2009.
[4] The Internet of Money by Andreas M Autonopoulos , [Offline]
[5] Blockchain for Dummies by Tiana Laurance. [Hardboumd]
[6] Satwik.P.M., Geluvaraj B, T.A. Ashok Kumar, “A study on application of AI, ML, DL and Blockchain in healthcare and Pharmaceuticals and it’s furture”, International Journal of Computer Sciences and Engineering, Vol.6 , Issue.8 , pp.765-770, Aug-2018
[7] Satish Chandra Gullena, “IoT architectures based on blockchain technologies”, International Journal of Computer Sciences and Engineering, Vol.6 , Issue.7 , pp.874-878, Jul-2018
[8] N. S . Tinu, “ A survey on Blockchain technology – taxonomy, consensus algorithms and applications, International Journal of Computer Sciences and Engineering, Vol.6 , Issue.5 , pp.691-696, May-2018
[9] Shahid Ul Haq, Yashwant Singh, “On IoT Security Models : Traditional and Block chain”, International Journal of Computer Sciences and Engineering, Vol.06 , Special Issue.03 , pp.26-31, Apr-2018
Citation
Parthasarathy P.D., Vinod Vijayakumaran, "The Emergence of Blockchain Technology in Ubiquitous Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.387-391, 2018.
A Comparision of Access Control Schemes for Cloud Data Privacy
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.392-395, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.392395
Abstract
Cloud deliver awesome comfort to its users as the user experience cloud services without having own hardware infrastructure. Now a day’s cloud services have important role on the internet as most of the services used by us are either cloud based or likely to be migrated in to cloud. The open architecture of cloud invites various security and vulnerability issues. The user data are outsourced and there is no strong privacy present between the user and cloud server because cloud uses third party intervention (which generally access the user data and auditing them). Outsourcing cloud data leads various vulnerability and privacy issues. Many researchers proposed different technique to address privacy preservation in the cloud computing, but still they are not 100% succeeded, some of them works on fine grained access control and some advocated attribute base access control scheme. In this paper, we made an attempt to compare two renowned privacy preservation schemes based on Fine Grained and Attribute based access control mechanism.
Key-Words / Index Term
Cloud Computing,privacy preservation,Fine Grained
References
[1] M.Thangavel,S.Sridhar, “An Analysis of privacy preservation schemes in cloud computing”,2nd IEEE International Conferenceon Engineering & Technology ,March 2016.
[2] J. K. Liu, M. H. Au, X. Huang, R. Lu, J. Li, “Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services,”, Transactions on Information Forensics and Security, Vol. 11, No. 3, pp. 484-497, March, 2016.
[3] Umar Khalid Farooqui,P.K.Bharti ,et . al. “A Review: privacy preservation in Cloud Environment issues and challenges”,IJRASET Volume 5 Issue VIII ,2017
[4] M. Thangavel, P. Varalakshmi, S. Sridhar, “An Analysis of Privacy Preservation Schemes in Cloud Computing”, 2nd IEEE International Conference on Engineering and Technology (ICETECH), 17th & 18th March 2016, Coimbatore, TN, India.
[5] H. Liu, H. Ning, Q. Xiong, L.T. Yang, “Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing,” Transactions on Parallel and Distributed Systems, Vol. 26, No. 1, pp241-251, January, 2015.
[6] Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong, Member, IEEE, and Laurence T. Yang, Member, IEEE “Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing” , IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 26, NO. 1, JANUARY 2015.
[7] Sun, Yunchuan, et al. "Data security and privacy in cloud computing." International Journal of Distributed Sensor Networks (2014).
[8] L.A. Dunning, R. Kresman, “Privacy Preserving Data Sharing With
Anonymous ID Assignment”, Transaction on Information Forensics and Security, IEEE, Vol. 8, No. 2, pp. 402-413, February, 2013.
[9] P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” Nat’l Inst. of Standards and Technology, 2009.
[10] M. H. Au, W. Susilo, and Y. Mu, “Constant-size dynamic k-TAA,” in Proc. 5th Int. Conf. SCN, 2006, pp. 111–125.
[11] J. Camenisch and A. Lysyanskaya, “Signature schemes and anonymous credentials from bilinear maps,” in Advances in Cryptology. Berlin,Germany: Springer-Verlag, 2004, pp. 56–72.
[12] J. Camenisch and A. Lysyanskaya, “A signature scheme with efficient protocols,” in Proc. 3rd Int. Conf. Secur. Commun. Netw. (SCN), Amalfi,Italy, Sep. 2002, pp. 268–289.
[13] R. Canetti, “Universally Composable Security: A New Paradigm for Cryptographic Protocols,” Proc. 42nd IEEE Symp. Foundations of Computer Science (FOCS ’01), pp. 136-145, Oct. 2001.
[14] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,”in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004,
pp. 41–55.
[15] H. K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-based signatures,” in Topics in Cryptology, vol. 6558. Berlin, Germany: Springer-Verlag, 2011, pp. 376–392.
[16] D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of
security capabilities,” ACM Trans. Internet Technol., vol. 4,
no. 1, pp. 60–82,
[17] A. Juels, D. Catalano, and M. Jakobsson, “Coercion-resistant electronic elections,” in Proc. WPES, 2005, pp. 61–70. 2004.
[18] T. Okamoto, “Receipt-free electronic voting schemes for large scale elections,” in Proc. 5th Int. Workshop Secur. Protocols, 1997, pp. 25–35
Citation
Umar Khalid Farooqui, Ajay Kumar Bharti, "A Comparision of Access Control Schemes for Cloud Data Privacy," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.392-395, 2018.
Multi-Configuration Styles of Structured Data Mashup using SDXMapping
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.396-404, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.396404
Abstract
The structured data mashup is the special kind of data mashup which deals with well structured data throughout the mashup development process. This paper highlights mashup development life cycle and the roles of IT developers as well as end users in various steps of mashup development. The pre-mashup configuration is the essential process of the any data mashup development that creates mashup module consisting of data module, service module, mapping module and UI module. In this work, we have explored mapping module called SDXMapping to design multi-configuration styles of structured data mashup, which will not only help the mashup developers but also the end users to develop the data mashup as per the situational need
Key-Words / Index Term
Data Mashup, Structured Data Mashup, Mashup Development Life Cycle, SDXMapping, Multi-Configuration Styles
References
[1] Fung, Benjamin CM, Thomas Trojer, Patrick CK Hung, Li Xiong, Khalil Al-Hussaeni, and Rachida Dssouli, “Service-oriented architecture for high-dimensional private data mashup”, IEEE Transactions on Services Computing 5, no. 3, pp. 373-386, 2012.
[2] Lee, Yong-Ju, “Semantic-Based Web API Composition for Data Mashups”, J. Inf. Sci. Eng. 31, no. 4, pp. 1233-1248, 2015.
[3] Yu, Daniel, “Efficient Processing of Almost-Homogeneous Semi-Structured Data”, Master`s thesis, 2018.
[4] Hardaha, Prakash, Shailendra Singh, “Structured Data REST Protocol for End to End Data Mashup”, Future Internet10, no. 10, 2018.
[5] Beemer, Brandon, and Dawn Gregg, “Mashups: a literature review and classification framework.”, Future Internet 1.1: 59-87,2009.
[6] Taivalsaari, Antero, “Mashware: The future of web applications” 2009.
[7] Desolda, Giuseppe, Carmelo Ardito, Maria Francesca Costabile, and Maristella Matera, “End-user composition of interactive applications through actionable UI components”, Journal of Visual Languages & Computing 42 : 46-59,2017.
[8] Paternò, Fabio, “End user development: Survey of an emerging field for empowering people”, ISRN Software Engineering 2013.
[9] Fischer, Thomas, Fedor Bakalov, and Andreas Nauerz, “An Overview of Current Approaches to Mashup Generation”, In Wissensmanagement, pp. 254-259. 2009.
[10] Vancea, A.; Grossniklaus, M.; Norrie, M, “Database-Driven Web Mashups”, International Conference On Web Engineering, Yorktown Heights, New York, pp. 162-174, 2008.
[11] Easton, Annette, and George Easton, “Demystifying Mashups”, In Proceedings of Informing Science & IT Education Conference (InSITE), pp. 479-486, 2010.
[12] Gao, Lianli, Peng Wang, Jingkuan Song, Zi Huang, Jie Shao, and Heng Tao Shen, “Event Video Mashup: From Hundreds of Videos to Minutes of Skeleton”, In Thirty-First AAAI Conference on Artificial Intelligence, 2017.
[13] Meerwaldt, Rick, Albert Meroño-Peñuela, and Stefan Schlobach, “Mixing Music as Linked Data: SPARQL-based MIDI Mashups”, In Workshop on Humanities in the Semantic Web-WHiSe II (ISWC 2017), 2017.
[14] Di Lorenzo, Giusy, Hakim Hacid, Hye-young Paik, and Boualem Benatallah, “Data integration in mashups”, ACM Sigmod Record 38, no. 1,pp. 59-66, 2009.
[15] Zaka, Bilal, Christian Safran, and Frank Kappe, “Personalized Interactive Newscast (PINC): Towards a multimodal interface for personalized news” In Semantic Media Adaptation and Personalization, IEEE Second International Workshop on, pp. 56-61, 2007.
[16] WALES, NEW SOUTH, “Mashups for Data Integration: An Analysis”, 2008.
[17] Boulakbech, Marwa, Nizar Messai, Yacine Sam, and Thomas Devogele, “Visual Configuration for RESTful Mobile Web Mashups”, In Web Services (ICWS), 2017 IEEE International Conference on, pp. 870-873, 2017.
[18] Heath, Tom, and Christian Bizer, “Linked data: Evolving the web into a global data space”, Synthesis lectures on the semantic web: theory and technology 1, no. 1,pp. 1-136, 2011.
[19] Ruback, Livia, Marco Antonio Casanova, Alessandra Raffaetà, Chiara Renso, and Vania Vidal, “Enriching Mobility Data with Linked Open Data”, In Proceedings of the 20th ACM International Database Engineering & Applications Symposium, pp. 173-182, 2016.
[20] Tran, Tuan Nhat, Duy Khanh Truong, Hanh Huu Hoang, and Thanh Manh Le, “Linked data mashups: a review on technologies, applications and challenges”, In Asian Conference on Intelligent Information and Database Systems, pp. 253-262. Springer International Publishing, 2014.
[21] Zook, Matthew, and Jessica Breen, “Mapping Mashups”, The International Encyclopedia of Geography, 2017.
[22] Ennals, Rob, Eric Brewer, Minos Garofalakis, Michael Shadle, and Prashant Gandhi, “Intel Mash Maker: join the web”, ACM SIGMOD Record 36, no. 4, pp. 27-33, 2007.
[23] Hira, Shrabanti, and S. M. Labib, “Conceptual study of Web-based PPGIS for Designing Built Environment: Identifying Housing Location Preferences in Littleborough”, 2017.
[24] Hoyer, Volker, and Marco Fischer, “Market overview of enterprise mashup tools”, Service-Oriented Computing–ICSOC 2008, pp. 708-721,2008.
[25] Patel, Ahmed, Ibrahim AlShourbaji, and Samaher Al-Janabi, “Enhance business promotion for enterprises with mashup technology”, Middle-East Journal of Scientific Research 22, no. 2 pp. 291-299, 2014.
[26] Ngu, Anne HH, Michael P. Carlson, Quan Z. Sheng, and Hye-young Paik, “Semantic-based mashup of composite applications” IEEE Transactions on Services Computing 3, no. 1,pp. 2-15, 2010.
[27] Ma, Shang-Pin, Chun-Ying Huang, Yong-Yi Fanjiang, and Jong-Yih Kuo, “Configurable RESTful Service Mashup: A Process-Data-Widget Approach”, Appl. Math 9, no. 2L, pp. 637-644, 2015.
[28] Im, Janggwan, Seonghoon Kim, and Daeyoung Kim, “Iot mashup as a service: Cloud-based mashup service for the internet of things”, In Services Computing (SCC), 2013 IEEE International Conference on, pp. 462-469, 2013.
[29] Barhamgi, Mahmoud, Chirine Ghedira, Djamal Benslimane, S-E. Tbahriti, and Michael Mrissa, “Optimizing daas web service based data mashups”, In Services Computing (SCC), 2011 IEEE International Conference on, pp. 464-471, 2011.
[30] Madhavan, Jayant, Loredana Afanasiev, Lyublena Antova, and Alon Halevy, “Harnessing the deep web: Present and future”, arXiv preprint arXiv:0909.1785, 2009.
[31] Hornung, Thomas, Kai Simon, and Georg Lausen, “Mashups over the deep web”, In International Conference on Web Information Systems and Technologies, Springer, Berlin, Heidelberg, pp. 228-241, 2008.
[32] Auinger, Andreas, Martin Ebner, Dietmar Nedbal, and Andreas Holzinger, “Mixing content and endless collaboration–MashUps: Towards future personal learning environments”, In International Conference on Universal Access in Human-Computer Interaction, Springer, Berlin, Heidelberg, pp. 14-23, 2009.
[33] Jarrar, Mustafa, and Marios D. Dikaiakos, “A query formulation language for the data web”, IEEE Transactions on Knowledge and Data Engineering 24, no. 5, 783-798, 2012.
[34] Simmen, David E., Mehmet Altinel, Volker Markl, Sriram Padmanabhan, and Ashutosh Singh, “Damia: data mashups for intranet applications”, In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pp. 1171-1182, 2008.
[35] Bouguettaya, Athman, Surya Nepal, Wanita Sherchan, Xuan Zhou, Jemma Wu, Shiping Chen, Dongxi Liu, Lily Li, Hongbing Wang, and Xumin Liu, “End-to-end service support for mashups”, IEEE Transactions on Services Computing 3, no. 3, 250-263.2010.
[36] Kang, Jaewoo, and Jeffrey F. Naughton, “On schema matching with opaque column names and data values”, In Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 205-216, 2003.
[37] Tuchinda, Rattapoom, Craig A. Knoblock, and Pedro Szekely, “Building mashups by demonstration”, ACM Transactions on the Web (TWEB) 5, no. 3,16, 2011.
[38] Guo, Mingchuan, and Yong Yu, “Mutual enhancement of schema mapping and data mapping”, In International Workshop on Mining for and from the Semantic Web, p. 88, 2004.
[39] Mecca, Giansalvatore, Paolo Papotti, and Donatello Santoro, “Schema Mappings: from Data Translation to Data Cleaning”, In A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, Springer, Cham, pp. 203-217, 2018.
[40] Salminen, Arto, and Tommi Mikkonen, “Mashups-Software Ecosystems for the Web Era”, In IWSECO@ ICSOB, pp. 18-32, 2012.
Citation
Prakash Narayan Hardaha, Shailendra Singh, "Multi-Configuration Styles of Structured Data Mashup using SDXMapping," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.396-404, 2018.
FPGA Implementation for Fractal Quadtree Image Compression
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.405-409, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.405409
Abstract
The growth of digital technology over the past decades is leading to new challenges like storage and transmission of digital images. As the digital image in its raw form occupies more storage space and takes longer time for transmission. Several image compression methods exist to address this issue and fractal image compression is one among the popular image compression methods. But fractal image compression has a disadvantage of more encoding time. In this paper, we have proposed a new architecture for fractal image compression. The proposed architecture is modeled using Verilog HDL, synthesized using Xilinx ISE 14.2, implemented on Xilinx Spartan 6 FPGA board and is tested on Standard Lena image[512x512]. The proposed architecture will reduce the design cycle time and the implementation cost. The results of the proposed architecture have shown a considerable reduction in encoding time to 5.897ns when compared to software implementation.
Key-Words / Index Term
Architecture, Fractal Image Compression, FPGA, Quadtree Decomposition
References
[1] M. Gloria, “Trends in medical image compression”, Current Medical Imaging Reviews, pp. 1-21, 2006.
[2] S. Bhavani, K. Thanushkodi, “A novel fractal image coding for quasi-lossless medical image compression”, European Journal of Scientific Research, Vol.70 No.1, 2012.
[3] C. Frigaard, J.T. Gade, Hemmingsen., T. Sand, “Image compression based on a fractal theory”, Institute for Electronic Systems, Aalborg University, 1994.
[4] M. Barnsley, “Fractal Everywhere”, Academic Press, San Diego, 1993.
[5] J. Arnaud, “Image coding based on a fractal theory of iterated contractive image transformation”, IEEE Transaction on Image Processing, pp18-30.Vol.1, No.1, 1992.
[6] Y. Fisher, “Fractal image compression Theory and Application”, Springer Verlag, 1995.
[7] M. Panigrahy,I. Chakrabarti, A. S. Dhar, “Hardware implementation of quadtree based fractal image decoder”, IEEE Xplore , 2016.
[8] S. Padmashree, Rohini Nagapadma, “Comparative analysis of quadtree partitioned iterated function systems for medical Images,” International Journal for computer applications, 0975-8887, vol. 59, 2012.
[9] M. Bharathi, T. Janani, “Fractal Image Compression Using Quantum Search Algorithm”, Journal of Computational and Theoretical Nanoscience, 2017.
[10] J. Wang, Y. Tian, X. Meng, T. Liu, “FPGA implement method for two-dimensional integer wavelet transform in the space-based on-orbit image compression system”, Proceedings SPIE 10256, Second International Conference on Photonics and Optical Engineering, 2017.
[11] C.Y. Yuen, O.Y. Lui, K.W. Wong, “Hybrid fractal image coding with quadtree-based progressive structure,” J.Vis. Commun. Image Represent, pp. 1328–1341, 2013.
[12] X. Y. Wang, “An improved fast fractal image compression using spatial texture correlation”, Chinese Physics. B, Vol. 20, 2011.
[13] Chetan, S Deepak, “Fractal image compression using quadtree decomposition and DWT”, International Journal of Scientific Engineering and Research, 2015.
[14] A. G. Ananth, “Fractal Image Compression of Satellite Color Imageries Using Variable Size of Range Block”, International Journal of Image Processing, 2014.
[15] C. Thirumoorthi, "Edge Based Compression Using Embedded Zero Wavelet Tree (EBC –EZWT) for Lung Cancer CT Scan Medical Image", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.653-659, 2018
[16] S. D. Kasute, M. Kolhekar, "ROI Based Medical Image Compression", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.1, pp.6-11, 2017
Citation
S. Padmavati, Vaibhav Meshram, "FPGA Implementation for Fractal Quadtree Image Compression," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.405-409, 2018.
Identify And Remove Time And Location Dependent Attack Using Trust Concept for MANETs
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.410-416, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.410416
Abstract
One of the sort of ad-hoc network is Mobile ad hoc networks (MANETs). MANETs are making them arrange and owned formulated network and there is no concentrated base station. In routing forwarding the data packet between nodes is core issue due to badly behaving or untrustworthy nodes present in the network. Recommendation trust model is a framework to find out the untrustworthy nodes and provide routes for packets to destination. A trust demonstrate takes recommendation by nodes transforms into an issue in light of the nearness of deceptive proposition like as ballot-stuffing, bad-mouthing and collusion. Untrustworthy nodes in the existing trust models lead to attacks by using recommendation which is investigated in this paper. Time and Location Dependent Attack Detection (TLDAD) Approach has been proposed in this paper to successfully sift through attacks identified as dishonest recommendation. The fundamental commitment of this work is to identify and remove time and location dependent attack related to recommendation Trust Model in MANETs. The model is tested under a couple of mobile and isolated topologies within which nodes find some changes in neighborhood provoking regular course changes. This paper focuses on a secure communication path across the nodes in the network. The experimental examination shows activeness and accuracy of the proposed method in a dynamic MANET condition.
Key-Words / Index Term
Mobile ad hoc networks, Dishonest recommendation, Trust management, Recommendation Trust Model , Time and Location Dependent Attack
References
[1] H. Deng, W. Li, and D. Agrawal, “Routing security in wireless ad hoc networks,” IEEE Commun. Mag., vol. 40, no. 10, pp. 70–75, Oct. 200
[2] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: Imperatives and challenges,” Ad Hoc Netw., vol. 1, no. 1, pp. 13–64, 2003.
[3] G. Sabeena Gnanaselvi, T.V.Ananthan, “An Analysis of Applications, Challenges and Security Attacks in MANET” , International Journal of Computer Sciences and Engineering, Vol.6 , pp. 941-947, 2018.
[4] P. Gupta, P. Bansal, “Different Attacks and their Defense Line in Mobile Ad hoc Networks” , International Journal of Computer Sciences and Engineering, Vol.6 , pp.176-190, 2018.
[5] Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solution in ad hoc networks,” in Proc. 7th Nordic Workshop Secure IT Syst., 2003, no. 14, pp. 1–10.
[6] R. Li, J. Li, P. Liu, and J. Kato, “A novel hybrid trust management framework for MANETs,” in Proc. 29th IEEE Int. Conf. Distrib. Comput. Syst. Workshops, 2009, pp.251–256.
[7] Y. Yu, K. Li, W. Zhou, and P. Li, “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,” J. Netw. Comput.Appl., vol. 35, no. 3pp, 867–880, 2012.
[8] K. Hoffman, D. Zage, and C. Nita-Rotaru, “A survey of attack and defense techniques for reputation systems,” ACM Comput. Surveys, vol. 42, no. 1, p. 1, 2009.
[9] W. Li, J. Parker, and A. Joshi, “Security through collaboration and trust in MANETs,” Mobile Netw. Appl., vol. 17, no. 3, pp. 342–352, 2012.
[10] J. Luo, X. Liu, and M. Fan, “A trust model based on fuzzy recommendation for mobile ad-hoc networks,” Comput. Netw., vol. 53, no. 14, pp. 2396–2407, 2009.
[11] C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, “E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks,” Ad Hoc Netw., vol. 7, no. 6,pp. 1156–1168, 2009.
[12] P.B.Velloso, R.P.Laufer, D.de O Cunha, O.C.M.Duarte, and G.Pu-jolle, ‘’Trust management in mobile ad hoc networks using a scalable maturity-based model,’’Network and Service Management, IEEE Trans-actions on, 7, (3), pp. 172-185, 2010.
[13] H.Yu, S.Liu, A.C.Kot, C.Miao, and C.Leung, ‘’Dynamic witness selection for trustworthy distributed cooperative sensing in cognitive radio networks’’, Communication Technology (ICCT), 2011 IEEE 13th In-ternational Conference on, pp. 1-6, 2011.
[14] T.Issariyakul and E.Hossain,‘‘Introduction to network simulator NS2,’’Springer, 2011.
Citation
Namrata Kumari, Chetan Agrawal, Pooja Meena, "Identify And Remove Time And Location Dependent Attack Using Trust Concept for MANETs," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.410-416, 2018.
Content Based Image Retrieval using Learnt Features from Convolution Neural Networks
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.417-421, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.417421
Abstract
Content based image retrieval (CBIR) relies on fetching relevant images from a dataset based on low level image features. Image features such as colour, texture and shape have been widely used in CBIR applications. These handcrafted features have been carefully designed and found to perform well in image retrieval task. The performance of these features greatly depends on the choice of the handcrafted features being used and domain knowledge. Hence there is a need to identify image features which are independent of domain knowledge and can be dynamically extracted from image data. Machine learning is a promising area here, since it focuses on learning representations from input data. Machine learning methods have been applied in various image processing tasks earlier. Convolution neural networks (CNN) models are able to create expressive features from image data and are successfully applied in image classification tasks. In this paper, we create a frame work to use CNNs to learn features from the image data and use these learned features for content based image retrieval. We test our proposed CBIR framework to retrieve images from a digital library database of art images. The results are compared against standard CBIR model which uses global colour histogram handcrafted feature. The results show that the learnt features extracted from a CNN model perform equally good as handcrafted features when applied to image retrieval task.
Key-Words / Index Term
Content based image retrieval, Convolution neural networks, Machine learning, Global colour histogram
References
[1] Yong Rui and Thomas S. Huang, “Image Retrieval: Current Techniques, Promising Directions and Open Issues”, Journal of Visual Communication and Image Representation, 1999.
[2] Wei-Ying Ma and HongJiang Zhang, “Content-Based Image Indexing and Retrieval”, Handbook of Multimedia Computing, CRC Press, 1999.
[3] Lei, Z., Fuzong, L. and Bo, Z., “A CBIR method based on colour-spatial feature”, Proceedings of IEEE Region 10 Conference: TENCON 99, Multimedia Technology for Asia-Pacific Information Infrastructure, Vol 1: 166-169, 1999.
[4] Park, J., An, Y., Kang, G., Rasheed, W., Park, S. and Kwon, G., “Defining a New Feature Set for Content-Based Image Analysis Using Histogram Refinement “, International Journal of Imaging Systems and Technology - Multimedia Information Retrieval, Volume 18 Issue 2-3, 2008.
[5] N. Sharma, P. Rawa, and J. Singh, “Efficient CBIR using colour histogram processing,” Signal & Image Processing, vol. 2, no. 1, p. 94, 2011.
[6] H. Muller, N. Michoux, D. Bandon, A. Geissbuhler, "A review of content-based image retrieval systems in medical applications—clinical benefits and future directions", International Journal of Medical Informatics, 73, pp. 1-23, 2004.
[7] C.H. Lin, R.T. Chen and Y.K. Chan, “A smart content-based image retrieval system based on colour and texture feature”, Image and Vision Computing vol.27, pp.658–665, 2009.
[8] LeCun, Y., Boser, B., Denker, J.S., Henderson, D., Howard, R.E., Hubbard, W., Jackel, L.D.: Backpropagation applied to handwritten zip code recognition. Neural Comput. 1(4), 541–551, 1989.
[9] Bobić, V., Tadić, P., Kvaščev, G, “Hand gesture recognition using neural network based techniques.” in Neural Networks and Applications (NEUREL), 13th Symposium on (pp. 1-4). IEEE, 2016.
[10] Lawrence, S., Giles, C. L., Tsoi, A. C., & Back, A. D. “Face recognition: A convolutional neural-network approach.”IEEE transactions on neural networks, 8(1):98-113,1997.
[11] Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Rabinovich, A, “Going deeper with convolutions.” in Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 1-9). 2015.
[12] S. Minaee, A. Abdolrashidi, and Y. Wang, "Iris recognition using scattering transform and textural features," in Signal Processing and Signal Processing Education Workshop (SP/SPE), 2015 IEEE, pp. 37-42, 2015.
[13] S. Minaee, A. Abdolrashidi, and Y. Wang, "Face Recognition Using Scattering Convolutional Network," arXiv preprint arXiv:1608.00059, 2016.
[14] Ivanova, Krassimira, “Content-Based Image Retrieval in Digital Libraries of Art Images Utilizing colour Semantics”, Institute of Mathematics and Informatics – BAS, Sofia, Bulgaria, 515-518. 10.1007/978-3-642-24469-8_62, 2011.
[15] D. Sherlin, D. Murugan, "A Case Study on Brain Tumor Segmentation Using Content based Imaging", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.3, pp.1-5, 2018
[16] N. Rezazadeh, "Initialization of weights in deep belief neural network based on standard deviation of feature values in training data vectors", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.1-8, 2017
Citation
Vijayakumar Bhandi, Sumithra Devi. K. A., "Content Based Image Retrieval using Learnt Features from Convolution Neural Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.417-421, 2018.