Review and Study of Intelligent Techniques in Emergency Vehicle Management System
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.366-371, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.366371
Abstract
The major problem in the transportation system is the interference of the emergency vehicle service, like fire fighting units, ambulance, and so on. When an emergency vehicle arrives on the multilane roadways, it is tough for the private vehicle’s driver to find out the correspondence of the emergency vehicle. Hence, there is a requirement of an intelligent traffic management system for effectively managing the emergency and the normal vehicles. This article surveys various research works in the field of emergency vehicle management. According to the existing works, an emergency vehicle management system is classified into six types, namely smart traffic control system, traffic timer synchronization, traffic forecasting, emergency vehicle recognition, route guidance and navigation for emergency vehicle, and dynamic path planning for emergency vehicle. Finally, an analysis is done based on the published years, techniques used, tools employed and metrics utilized in the emergency vehicle management techniques that are reviewed.
Key-Words / Index Term
Transportation system, emergency vehicle management, traffic control, path planning, traffic forecasting
References
[1] V. Venkatesh and N. Syed, "Smart Traffic Control System for Emergency Vehicle Clearance," International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no.8, pp. 7242-7246, 2015.
[2] M.D. Srivastava, Prerna, S. Sachin, S. Sharma, and U. Tyagi, "Smart Traffic Control System Using PLC and SCADA," International Journal of Innovative Research in Science, Engineering and Technology, vol. 1, no. 2, pp. 169-172, 2012.
[3] Y.S. Jaladanki and A.S.K. Reddy, "Smart Traffic Control System for Prevention and Control of Blockade, Emergency Vehicle Clearance and Stolen Vehicle Identification," International Journal of Innovative Technology and Research, vol.4, no.4, pp. 3253 – 3256, 2016.
[4] A.S. Amogh, S. Pujari. S.N. Gowda, and V.M. Nyamati, "Traffic Timer Synchronization based onCongestion," In Proceedings of the International Conference on Computational Systems and Information Systems for Sustainable Solutions, pp. 255-260, 2016.
[5] H.A. Rahman, J.R. Martí, and K.D. Srivastava, "Road Traffic Forecasting through Simulation and Live GPS-feed from Intervehicle Networks," In Proceedings of the IEEE Conference on Global Humanitarian Technology, pp. 36-40, 2012.
[6] A. Dombalyan, V. Kocherga, E. Semchugova, and N. Negrov, "Traffic Forecasting Model for a Road Section," In Proccedings of the 12th International Conference on Organization and Traffic Safety Management in large cities,Petersburg, Russia, pp. 159-165, 2017.
[7] V. Sciancalepore, K. Samdanis, X. Costa-Perez, D. Bega, M. Gramaglia, and A. Banchs, "Mobile Traffic Forecasting for Maximizing 5G Network Slicing Resource Utilization," In Proceedings of the IEEE Conference on Computer Communications, 2017.
[8] T. Swathi and B.V. Mallu, "Emergency Vehicle Recognition System," International Journal of Engineering Trends and Technology (IJETT), vol. 4, no. 4, pp. 987-990, April 2013.
[9] B. Fazenda, H. Atmoko, F. Gu, L. Guan, and A. Ball, "Acoustic based safety emergency vehicle detection for intelligent transport systems," In Proceedings of the conference on ICCAS-SICE, Fukuoka, Japan, 2009.
[10] Afdhal and Elizar, "Enhanced Route Guidance and Navigation for Emergency Vehicle Using V2I-Based Cooperative Communication," In Proceedings of the International Electronics Symposium, pp. 145-150, 2015.
[11] B. Gong, Z. Yang, and C. Lin, "Dispatching Optimization and Routing Guidance for Emergency Vehicles in Disaster," In Proceedings of the IEEE International Conference on Automation and Logistics, Shenyang, China, pp. 1121-1126, August 2009.
[12] L. Zuo, N. Zhang, Y. He, and T. Zhou, "Research on Dynamic Route Guidance and Navigation System Based on Multi Information Feedback," In Proceedings of the International Conference on Sensing, Diagnostics, Prognostics, and Control, pp. 421- 424, 2017.
[13] H.K. Gedawy, M.B. Dias, and K. Harras, "Dynamic Path Planning and Traffic Light Coordination for Emergency Vehicle Routing," 2009.
[14] C.C. Li, I. Wang, X. Wang, and Y. Zhang, "A Model based Path Planning Algorithm for Self-driving Cars in Dynamic Environment," In Proceedings of the Chinese Automation Congress (CAC), Wuhan, China, 2015.
[15] V. Singh and K.E. Willcoxy, "Methodology for Path Planning with Dynamic Data-Driven Flight Capability Estimation," AIAA Journal, vol. 55, no. 8, pp. 2727-2738, 2017.
[16] J. Wang, M. Garratt, and S. Anavatti, "Dynamic Path Planning Algorithm for Autonomous Vehicles in Cluttered Environments," In Proceedings of IEEE International Conference on Mechatronics and Automation, Harbin, China, 2016.
[17] J. Zhao, Y. Guo, and X. Duan, "Dynamic Path Planning of Emergency Vehicles Based on Travel Time Prediction," Journal of Advanced Transportation, pp. 1-14, 2017.
[18] K. Nellore and G.P. Hancke, "Traffic Management for Emergency Vehicle Priority based on Visual Sensing," Sensors, vol. 10, no. 11, pp. 1-22, 2016.
[19] Bringing-v2i-and-v2v-communications-to-workzone-safety, available at: http://www.itsinternational.com/sections/nafta/features/bringing-v2iand- v2v-communications-to-workzone-safety, accessed February 2015.
[20] H. Hartenstein, K.P. Laberteaux, "A tutorial survey on vehicular ad hocnetworks," IEEE Communications Magazine, vol.46, no.6, pp.164-171, June 2008.
[21] N.A. Naumova, V.V. Zyryanov, “A method of computing the traffic flow distribution density in the network with new flow-forming objects being put into operation,” Journal of Theoretical and Applied Information Technology, vol. 78, no. 1, pp. 76–83, 2015.
Citation
Cyriac Jose, K.S. Vijula Grace, "Review and Study of Intelligent Techniques in Emergency Vehicle Management System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.366-371, 2018.
Authenticating Mobile Phone User using Keystroke Dynamics
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.372-377, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.372377
Abstract
Since few decades, the simple password authentication has either replaced or compounded with biometrics (such as Facial Recognition, Fingerprint Scan etc.) to provide better security. Keystroke Dynamics is behavioral biometrics that can perform continuous authentication to detect intruders. In this paper, we investigate whether user specific password gives better performance than artificially rhythmed password. Also, impact of sensory data on overall performance of the system is examined. Finally, Genetic Algorithm is used to optimize the features. The features used to analyze the user data were hold time, flight time and X, Y and Z axis reading from accelerometer sensor. Results showed that user data gives better performance than artificially rhythmed passwords. Best accuracy of around 90% was achieved by using user specified passwords and optimizing the results with genetic algorithm.
Key-Words / Index Term
Keystroke dynamics, Typing behaviour, Mobile, Authentication, Biometrics
References
[1] S. Bhatt and T. Santhanam, “Keystroke dynamics for biometric authentication - A survey,” 2013 Int. Conf. Pattern Recognition, Informatics Mob. Eng., pp. 17–23, 2013.
[2] F. Monrose and A. D. Rubin, “Keystroke dynamics as a biometric for authentication,” Futur. Gener. Comput. Syst., vol. 16, no. 4, pp. 351–359, 2000.
[3] I. Bhardwaj, N. D. Londhe, and S. K. Kopparapu, “Study of imposter attacks on novel fingerprint dynamics based verification system,” IEEE Access, vol. 5, pp. 595–606, 2017.
[4] R. Solanki and P. Shukla, “Estimation of the User’s Emotional State by Keystroke Dynamics,” Int. J. Comput. Appl., vol. 94, no. 13, pp. 21–23, 2014.
[5] N. L. Clarke, S. M. Furnell, B. M. Lines and P. L. Reynolds, “Keystroke dynamics on a mobile handset: a feasibility study,” Information Management & Computer Security, vol. 11, no. 4, pp. 161–166, 2003.
[6] T. Sim and R. Janakiraman, “Are digraphs good for free-text keystroke dynamics?,” Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2007.
[7] K. S. Killourhy and R. Maxion, “Comparing Anomaly Detectors for Keystroke Dynamics,” IEEE Computer Society Press, Los Alamitos, California, pp. 125–134, 2009.
[8] S. Hwang, S. Cho, and S. Park, “Keystroke dynamics-based authentication for mobile devices. Computers and Security, vol. 28, no. 2, pp. 85–93, 2003.
[9] R. Giot, M. El-Abed and C. Rosenberger, “GREYC keystroke: A benchmark for keystroke dynamics biometric systems. IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS, 2009.
[10] Y. Li, B. Zhang, Y. Cao, S. Zhao, Y. Gao and J. Liu, “Study on the BeiHang Keystroke Dynamics Database,” In International Joint Conference on Biometrics, pp. 1-5, 2011.
[11] J. A. Robinson, V. M. Liang, J. A. M. Chambers, and C. L. MacKenzie, “Computer user verification using login string keystroke dynamics,” IEEE Trans. Syst. Man, Cybern. Part ASystems Humans., vol. 28, no. 2, pp. 236–241, 1998.
[12] S. Haider, A. Abbas, and A. K. Zaidi, “A multi-technique approach for user identification through keystroke dynamics,” IEEE Int. Conf. Syst. man Cybern., vol. 2, pp. 1336–1341, 2000.
[13] F. Gutiérrez, “Biometrics and data mining: Comparison of data mining-based keystroke dynamics methods for identity verification,” MICAI 2002 Adv. …, pp. 460–469, 2002.
[14] V. Kacholia and S. Pandit, “Biometric Authentication using Random Distributions (BioART),” Proc. 15th Can. IT Secur. Symp. Canada, vol. 5, pp. 1–8, 2003.
[15] L. C. Freire Araujo, M. Gustavo Lizarraga, L. H. Rabelo Sucupira, J. B. Tadanobu Yabu-uti, and L. L. Lee, “Typing Biometrics User Authentication based on Fuzzy Logic,” Lat. Am. Trans. IEEE (Revista IEEE Am. Lat., vol. 2, no. 1, pp. 69–74, 2004.
[16] W. E. Eltahir, M. J. E. Salami, A. F. Ismail, and W. K. Lai, “Dynamic keystroke analysis using AR model,” Industrial Technology, 2004. IEEE ICIT ’04. 2004 IEEE International Conference on, vol. 3. p. 1555–1560 Vol. 3, 2004.
[17] Y. Sang, H. Shen, and P. Fan, “Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine,” Lect. Notes Comput. Sci., vol. 3320, pp. 666–669, 2004.
[18] S. S. Joshi and V. V. Phoha, “Investigating hidden Markov models capabilities in anomaly detection,” in Proceedings of the 43rd annual southeast regional conference on - ACM-SE 43, vol. 1, 2005.
Citation
Baljit Singh Saini, Navdeep Kaur, Kamaljit Singh Bhatia, "Authenticating Mobile Phone User using Keystroke Dynamics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.372-377, 2018.
Intelligent Travel Bot using Wide and Deep Learning
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.378-382, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.378382
Abstract
The usual approach of planning a trip involves a serious of tedious tasks. The manual way is to book through a travel company, which will give you an itinerary for your trip and the costs involved, another way is to book through an online website, where you can pick a place, look for hotel, book a room and then make travel arrangements to your desired destination. The process involved is time consuming and involves looking through various booking websites to find the best bang for your buck. We propose a solution which will make this process as smooth as possible through the use of an interactive travel bot deployed on social media platforms. In this travel bot, a user enters a query asking for a place to stay in a location. The travel bot then constructs a persona based on transactional history of the user, for example, hotels that the user has shown interest in previously. Using this persona and a wide and deep neural network, personalized recommendations are generated by the travel bot.
Key-Words / Index Term
Recommender system, TensorFlow, Wide and Deep Learning, Chatbot, Hotel booking
References
[1] “MyBuys study” available at https://www. digitalcommerce360.com/2009/09/03/product-recommendations-supercharge-online-conversion-rates-stu/ referred on 28/04/17
[2] “Alterra’s Marina” http://alterra.ai/ referred on 26/8/16
[3] “Hello Hipmunk” https://www.hipmunk.com/hello referred on 26/8/16
[4] Heng-Tze Cheng, Levent Koc, Jeremiah Harmsen, Tal Shaked, Tushar Chandra, Hrishi Aradhye, Glen Anderson, Greg Corrado, Wei Chai, Mustafa Ispir, Rohan Anil, Zakaria Haque, Lichan Hong, Vihan Jain, Xiaobing Liu, Hemal Shah: Google Inc.: Wide and Deep Learning for Recommender Systems
Citation
Siddhant Rele, Danish Ali Furniturewala, Sagar Raulo, Neepa Shah, "Intelligent Travel Bot using Wide and Deep Learning," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.378-382, 2018.
A Systematic Literature Survey for Detecting Ambiguity in SRS Using Artificial Intelligence
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.383-387, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.383387
Abstract
Research in recent years has shown integration amongst the significant and dynamic areas of software engineering and semantic web engineering. The success of any software system is depending on how well it meets the requirements of the stakeholders. A software requirement specification written in natural languages, are basically ambiguous, which makes the documentation unclear. Due to unclear requirements, software developers develop software, which is different from the expected software based on the customer needs. Therefore, well documented requirements should be unambiguous and it is possible only when it has only one meaning.The main purpose of this research is to propose a technique that is able to detect ambiguity in software requirements specification document automatically using artificial intelligence. To validate the outcome of the proposed work, generated result of the proposed work will be evaluated and validated by making the comparison between the proposed prototype results, previous ambiguity detection framework and human-generated results to decide how the proposed work is more efficient and reliable for ambiguity detection.
Key-Words / Index Term
Software Requirements Specification, Artificial Intelligence, Deep Learning, Ambiguity Detection
References
[1] R. Beniwal. "Analysis of Testing Metrics for Object Oriented Applications." In Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, pp. 41-46. IEEE, 2015.
[2] K. Sharma, R. Garg, C. K. Nagpal, and R. K. Garg. "Selection of optimal software reliability growth models using a distance-based approach." Reliability, IEEE Transactions on 59, no. 2, pp. 266-276, 2010.
[3] K. S. Kaswan, S. Choudhary, and K. Sharma. "Software Reliability Modeling using Soft Computing Techniques: Critical Review." J Inform Tech SoftwEng 5, no. 144, 2015.
[4] R. Studer, R. Benjamins, and D. Fensel, “Knowledge engineering: Principles and methods,” Data & Knowledge Engineering 25, no.1, pp. 161–198, 1998.
[5] HJ Happel and S Seedorf. "Applications of ontologies in software engineering." In Proc. of Workshop on Sematic Web Enabled Software Engineering"(SWESE) on the ISWC, pp. 5-9. 2006.
[6] Y Zhao, J Dong and T Peng, “Ontology classification for semantic-webbased software engineering,Services Computing, IEEE Transactions on Services Computing”, Vol. 2, No. 4, pp. 303-317, 2009.
[7] D Gaševiü, N Kaviani and M Milanoviü. "Ontologies and software engineering." In Handbook on Ontologies, pp. 593-615. Springer Berlin Heidelberg, 2009.
[8] M.P.S Bhatia, A Kumar, and R Beniwal, “Ontologies for Software Engineering: Past, Present, and Future,”pp 232-238 IEEE , 2016.
[9] M.P.S. Bhatia, R. Beniwal and A. Kumar, "An ontology-based framework for automatic detection and updation of requirement specifications." In Contemporary Computing and Informatics (IC3I), 2014 International Conference on, pp. 238-242. IEEE, 2014.
[10] M.P.S. Bhatia, A. Kumar, and R. Beniwal, "Ontology Based Framework for Automatic Software’s Documentation." In Computing for Sustainable Global Development, 2015 2nd International Conference on, pp. 725-728. IEEE. 2015.
[11] B S. Dogra, K Kaur, and D Kaushi. Enterprise Information Systems in 21st Century: Opportunities and Challenges. New Delhi: Deep and Deep Publications, 2009.
[12] S Armitage, “Software Requirement Specification.” 1996. http://www4.informatik.tu-muenchen.de/proj/va/SRS.pdf (Last accessed date: October, 2015)
[13] Navarro-Almanza, Guillermo Licea "Towards Supporting Software Engineering Using Deep Learning: A Case of Software Requirements Classification" Software Engineering Research and Innovation (CONISOFT), 2017 5th International Conference in, IEEE 2017
[14] Yu Kai, Jia Lei, Chen Yuqiang et al., "Deep Learning: Yesterday Today and Tomorrow[J]", Journal of Computer Research and Development, vol. 50, no. 9, pp. 1799-1804, 2013.
[15] SC. Levinson, "Pragmatics (Cambridge textbooks in linguistics)." 1983.
[16] A Nigam, N Arya, B Nigam and D Jain. "Tool for Automatic Discovery of Ambiguity in Requirements," IEEE 2012.
[17] Sandhu, G. and S. Sikka. State-of-art practices to detect inconsistencies and ambiguities from software requirements. in Computing, Communication & Automation (ICCCA), International Conference in,IEEE 2015.
[18] A. Aamodt, E. Plaza, "Case-Based Reasoning: Foundational Issues Methodological Variations and System Approaches", Artificial Intelligence Comm., vol. 7, no. 1, pp. 39-59, 1994.
[19] Hagal, M.A. and S.F. Alshareef. A systematic approach to generate and clarify consistent requirements. in IT Convergence and Security (ICITCS), International Conference in,IEEE 2013.
[20] D.M. Berry, E. Kamsties and M.M. Krieger "From contract drafting to software specification: Linguistic sources of ambiguity-a handbook version 1.0."(2003). http://cs.uwaterloo.ca/~dberry/handbook/ambiguityHandbook.pdf
Citation
Shruti Mishra, Vijay Birchha, Bhawna Nigam, "A Systematic Literature Survey for Detecting Ambiguity in SRS Using Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.383-387, 2018.
A Systematic Study of Human Gait Analysis Using Machine Learning Approaches
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.388-393, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.388393
Abstract
The prime objective of this paper is to comprehend the human gait in biometric and biomedical applications. Human gait recognition is recognizing people from the manner in which they walk. It is identified with acquiring biometric data, for example, identity, gender, ethnicity and age from people walking patterns. Likewise, biomedical data can be acquired like individual`s illness, body abnormality. In the walking process, the human body shows general periodic motion, particularly upper and lower limbs, which reflect the person`s unique movement pattern. Contrasted with different biometrics modalities, gait can be acquired from distance and is hard to hide and camouflage. Gait has been topic in PC vision with extraordinary advancement accomplished in ongoing ten years. In this paper, we give a survey over state-of-art gait innovation; focus on different factors in gait methodology and ongoing advances in biomedical engineering.
Key-Words / Index Term
Human gait, Gait recognition, Biometrics, Biomedical
References
[1] R. D. Green and L. Guan, “Quantifying and Recognizing Human Movement Patterns from Monocular Video Im-ages-Part II: Applications to Biometrics,” IEEE Transac-tions on Circuits Systems for Video Technology, Vol. 14, No. 2, 2004, pp. 191-198.
[2] Davrondzhon Gafurov., A Survey of Biometric Gait Recognition: Approaches, Security and Challenges, NIK-2007 conference.
[3] L. Wang, H. Z. Ning, T. N. Tan and W. M. Hu, “Fusion of Static and Dynamic Body Biometrics for Gait Recog-nition,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 2, 2004, pp. 149-158.
[4] Bobick, A., Johnson, A.: Gait recognitin using static activity-specific parameters. In: Computer Vision and Pattern Recognition 2001. Volume I., Kauai, HI(2001).
[5] J. B. dec. M. Saunders, V. T. Inman and H. D. Eberhart, “The Major Determinants in Normal and Pathological Gait,” The Journal of Bone and Joint Surgery, Vol. 35-A, No. 3, 1953, pp. 543-558.
[6] Jeffrey E. Boyd, James J. Little, “Biometric Gait Recognition”, Springer-Verlag Berlin Heidelberg, pp. 19–42, 2005
[7] M. Hofmann and G. Rigoll, "Improved Gait Recognition using Gradient Histogram Energy Image," 2012 19th IEEE International Conference on Image Processing, Orlando, FL, 2012, pp. 1389-1392.
[8] E. Hossain and G. Chetty, "A multi-modal gait based human identity recognition system based on surveillance videos," 2012 6th International Conference on Signal Processing and Communication Systems, Gold Coast, QLD, 2012, pp. 1-4.
[9] S. Gabriel-Sanz, R. Vera-Rodriguez, P. Tome and J. Fierrez, "Assessment of gait recognition based on the lower part of the human body," 2013 International Workshop on Biometrics and Forensics (IWBF), Lisbon, 2013, pp. 1-4.
[10] A. O. Lishani, L. Boubchir and A. Bouridane, "Haralick features for GEI-based human gait recognition," 2014 26th International Conference on Microelectronics (ICM), Doha, 2014, pp. 36-39.
[11] S. C. Bakchy, M. R. Islam and A. Sayeed, "Human identification on the basis of gait analysis using Kohonen self-organizing mapping technique," 2016 2nd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE), Rajshahi, 2016, pp. 1-4.
[12] W. G. Bhargavas, K. Harshavardhan, G. C. Mohan, A. N. Sharma and C. Prathap, "Human identification using gait recognition," 2017 International Conference on Communication and Signal Processing (ICCSP), Chennai, 2017, pp. 1510-1513.
[13] Z. Wu, Y. Huang, L. Wang, X. Wang and T. Tan, "A Comprehensive Study on Cross-View Gait Based Human Identification with Deep CNNs," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, no. 2, pp. 209-226, 1 Feb. 2017.
Citation
Ankita Yadav, Dipti Verma, "A Systematic Study of Human Gait Analysis Using Machine Learning Approaches," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.388-393, 2018.
A Comprehensive Study of Security in Cloud Computing
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.394-398, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.394398
Abstract
Cloud computing has become a popular model for reducing cost of business, improvise quality of services, and provide good & secure computing. It opens up the Computing World by providing the access to anything and anywhere through Internet. It acts as a spectrum of substantial interest among IT professionals, technocrats & business leaders due to these proven potentials. Numerous emerging computing paradigms database outsourcing serves as future advantages of cloud computing. With the increasing speed of its popularity, many security questions are arising with their respective solutions aiming to give a better understanding of their complex scenario, in this paper we will provide a comprehensive view over security in context of cloud computing and also provide a view of current status of security at present. To start with, we`ll take a look at various Cloud computing models, cloud computing deployment models, key issues in security along with challenges in provocation of permissions to various platforms.
Key-Words / Index Term
Cloud Computing, secure computing, database outsourcing, deployment models, challenges
References
[1] M. Sadiku, S. Musa, O. Momoh, Cloud computing: opportunities and challenges, IEEE Potentials 33 (1) (2014) 34–36.
[2] D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, P. RM Inácio, Security issues in cloud environments: a survey, Int. J. Inform. Sec. 13 (2) (2014), 113–170.
[3] Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." 2011.
[4] Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.
[5] L. FB Soares, D. AB Fernandes, J.V. Gomes, M.M. Freire, P. RM Inácio, Cloud security: state of the art, in: Security, Privacy and Trust in Cloud Systems, Springer, Berlin, Heidelberg, 2014, pp. 3–44.
[6] Alessandro Iudica, Understanding the Cloud v1.0, December 2014, IBM Education Understanding The Cloud 1, © 2013 IBM Corporation.
[7] H. Yu, N. Powell, D. Stembridge, X. Yuan, Cloud computing and security challenges, in: Proceedings of the 50th Annual Southeast Regional Conference, ACM, 2012, pp. 298–302.
[8] Vishnu Patidar, Makhan Kumbhkar, "Analysis of Cloud Computing Security Issues in Software as a Service", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.3, pp.1-5, 2014.
[9] R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.
Citation
Manjot Kaur Bhatia, Akash Bhardwaj, Diksha Singla, "A Comprehensive Study of Security in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.394-398, 2018.
Association Rules Mining in Cloud Computing Environments using Improved Apriori Algorithm
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.399-403, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.399403
Abstract
This paper describes how data mining is used in cloud computing. Data Mining used for extracting potentially useful information from raw data. The integration of data mining techniques into normal day-to-day activities has become commonplace. Every day people confronted with targeted advertising, and data mining techniques help businesses to become more efficient by reducing costs. Cloud computing provides a powerful, scalable and flexible infrastructure into which one can integrate, previously known, techniques and methods of Data Mining. Data security and access control are the most challenging in cloud computing because users send their sensitive data to the cloud service providers. The service providers must have a suitable way to protect their client’s sensitive data. Association rules are dependency rules, which predict occurrence of an item based on occurrences of other items. Apriori is the best-known algorithm to mine association rules. In this paper, we use Modified Apriori algorithm to mine the data from the cloud using sector/sphere framework with association rules.
Key-Words / Index Term
Data mining, Cloud Computing Association rules
References
[1]. Iyer Chandrasekharan P.K. Baruah “Privacy-Preserving Frequent Itemset Mining in Outsourced Transaction Databases” Sri Sathya Sai Institute of Higher Learning Prashanti Nilayam, A.P., India 2015 IEEE.
[2]. Abdur Rahim Mohammad Forkan, Ibrahim Khalil “BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Healthcare” IEEE Transaction on cloud computing, vol. x, no. x, February 2015.
[3]. Jinggui Liao, Yuelong Zhao, and Saiqin Long,―MRPrePostA Parallel algorithm adapted for mining big data,‖ IEEE Workshop on Electronics,Computer and Applications, 2014
[4]. Aditi V. Jarsaniya, Shruti B. Yagnik. “A Literature Survey on Frequent Pattern Mining for Biological Sequence”. © 2014 IJIRT | Volume 1 Issue 6 | ISSN: 2349-6002
[5]. Dr. Vijayalakshmi M N, S.Anupama Kumar, Kavyashree BN. 2014. ― Investigating Interesting Rules Using Association Mining for Educational Data‖, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 2, pp.268-271
[6]. Lingjuan Li , Min Zhang , “The Strategy of Mining Association Rule Based on Cloud Computing”, 2011 IEEE.
[7]. ]T.R. Gopalakrishnan Nair, K.Lakshmi Madhuri , “Data Mining Using Hierarchical Virtual KMeans Approach Integrating Data Fragments In Cloud Computing Environment”,2011 IEEE.
[8]. L. J. Li and M. Zhang, “The strategy of mining association rule based on cloud computing,” in Proc. 2011 International Conference on Business Computing and Global Informatization.
[9]. F. Marozzo, D. Talia, and P. Trunfio, “A cloud framework for parameter sweeping data mining applications,” in Proc. 2011 Third IEEE International Conference on Coud Computing Technology and Science.
[10]. Jiabin Deng, JuanLi Hu, Anthony Chak Ming LIU, Juebo Wu, “Research and Application of Cloud Storage”,2010 IEEE.
[11]. Yang Lai , Shi ZhongZhi ,” An Efficient Data Mining Framework on Hadoop using Java Persistence API” , 2010 10th IEEE International Conference on Computer and Information Technology (CIT 2010).
[12]. K. W. Lin, Y.-C. Luo, 2009, “A Fast Parallel Algorithm for Discovering Frequent Patterns”, GRC `09. IEEE Int. Conf. on Granular Computing, pp. 398 – 403.
[13]. J. Zhou and K.-M. Yu, 2008, “Tidset-based Parallel FP-tree Algorithm for the Frequent Pattern Mining Problem on PC Clusters”, Lecture Notes in Computer Science 5036, pp. 18- 28.
[14]. J. Zhou and K.-M. Yu, 2008, “Balanced Tidset-based Parallel FP-tree Algorithm for the Frequent Pattern Mining on Grid System”, Fourth Int. Conf. on Semantics, Knowledge and Grid, pp. 103-108.
[15]. A. Javed, and A. Khokhar, 2004, “Frequent Pattern Mining on Message Passing Multiprocessor Systems”, Distributed and Parallel Databases, vol. 16, pp. 321–334.
[16]. G. Grahne and J. Zhu, 2003, “Efficiently Using Prefix-trees in Mining Frequent Itemsets”, In Proc. of the IEEE ICDM Workshop on Frequent Itemset Mining Implementations.
[17]. J. Han, J. Pei, and Y. Yin, 2000, “Mining Frequent Patterns without Candidate Generation”, In Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pp.1-12
[18]. R. J. Bayardo, Jr., Brute-force mining of high-confidence classification rules. In Proceedings of the 3rd international conference on knowledge discovery and data mining (KDD`97), Newport Beach, California, USA.
[19]. M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, 1996, “A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise”, In Proc. 2nd Int. Conf. on Knowledge Discovery and Data Mining, Portland, OR, AAAI Press, pp. 226-231.
[20]. R. Agrawal, R. Srikant, Mining Sequential Patterns, in: Proc. of the 11th Int’l Conf. on Data Engineering, 1995, pp. 3-14.
[21]. R. Agrawal and R. Srikant. Quest Synthetic Data Generator. IBM Almaden Research Center, San Jose, California, http://www.almaden.ibm.com/cs/quest/syndata.html.
[22]. R. Agrawal, T. Imielinski*, and A. Swami, 1993, “Mining association rules between sets of items in large databases”, In Proc. of the 1993 ACM-SIGMOD Int. Conf. on management of data (SIGMOD’93), p
Citation
Avinash Sharma, Sarvottam dixit, N. K. Tiwari, "Association Rules Mining in Cloud Computing Environments using Improved Apriori Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.399-403, 2018.
A Study on Various Packet Classification Algorithm for Network Security Systems
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.404-408, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.404408
Abstract
Routers can likewise function as firewalls and perform variety of operations on the incoming and outgoing packets. On the off chance that when every one of the packets share common header attributes, it is named as a packet flow. With a specific end goal to classify a packet, routers perform a query on a classifier table utilizing at least one fields from the packet header to classify the packet into its relating flow. A classifier is a set of rules which distinguish each flow and the fitting actions to be taken for any packet having belonging to that flow. The paper analyzes the problem of packet classification and different proposed systems for the same.
Key-Words / Index Term
Packet classification, dimensions, fields, flows, prefixes
References
[1] T.Y.C. Woo, “A modular approach to packet classification algortithms”, Bell Laboratories, Lucent Technologies.
[2] P. Gupta and N. McKeown, “Packet Classification using Hierarchical Intelligent Cuttings”, IEEE Micro, pp 34-41, vol. 20, no.1 , January/February2000.
[3] D.Medhi, K.Ramasamy, “Network Routing Algorithms Protocols and Architectures”, Morgan Kauffman Series on Networking, pp. 567-579; pp. 704 March 2007.
[4] Kim, K.C. Claffy, M. Formenkov, D. Barman, M. Faloutsos, and K. Lee, “Internet traffic demysitfied : Myths, caveats, and best practices,” ACM Conext, 2008.
[5] S. Sahni, K.S. Kim, and H. Lu, ”Data structures for onedimensional packet classification using most specificrule matching,” Proc. Parallel Architectures, Algorithms and Networks (I-SPAN ’02), pp. 1-12, May 2002, doi:10.1109/ISPAN.2002.1004254.
[6] V. Srinivasan, G. Varghese, S. Suri, and M. Waldvogel, ”Fast and scalable layer four switching,” Proc. ACM Conf. Applications, technologies, architectures, and protocols for computer communications (SIGCOMM ’99), pp. 191-202, Sep. 1999, doi:10.1145/285237.285282.
[7] D.E. Taylor and J.S. Turner, ”Scalable Packet Classification using Distributed Crossproducting of Field Labels,” Proc. IEEE Conf. Computer and Communications Societies (INFOCOM ’05), pp 269-280, Mar. 2005, doi:10.1109/INFCOM.2005.1497898
[8] J. Xu, M. Singhal, and J. Degroat, ”A novel cache architecture to support layer-four packet classification at memory access speeds,” Proc. IEEE Conf. Computer and Communications Societies (INFOCOM ’00), pp. 1445-1454, Mar. 2000, doi:10.1109/INFCOM.2000.832542.
[9] D. Rovniagin and A. Wool, ”The Geometric Efficient Matching Algorithm for Firewalls,”, IEEE Trans. Dependable and Secure Computing, vol. 8, iss. 1, Jan./Feb. 2011, pp. 147-159, doi:10.1109/TDSC.2009.28.
[10] V. Srinivasan, S. Suri, and G. Varghese, ”Packet classification using tuple space search,” Proc. ACM Conf. Applications, technologies, architectures, and protocols for computer communication (SIGCOMM ’99), pp. 135-146, Aug. 1999, doi:10.1145/316188.316216.
[11] L. Choi, H. Kim, S. Kim, and M.H. Kim, ”Scalable Packet Classification Through Rulebase Partitioning Using the Maximum Entropy Hashing,” IEEE/ACM Trans. Networking, vol 17, iss. 6, Dec. 2009, doi:10.1109/TNET.2009.2018618.
Citation
Chanchal Pandey, Dipti Verma, "A Study on Various Packet Classification Algorithm for Network Security Systems," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.404-408, 2018.
A CSA based Source Code Plagiarism Detection Approach using Sparse Principle Component Analysis
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.409-417, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.409417
Abstract
Detection of source code plagiarism is valuable for both the academia and industry. Plagiarism is an approach of unlawfully stealing other person source code or program code which is a serious issue for common open source programming and other software companies. Numerous techniques have been introduced priori for automatic detection of source code plagiarism using Evolutionary Intelligent algorithm like Genetic Algorithm (GA), Particle Swarm Optimization (PSO) etc. These techniques are more susceptible to premature convergence and more time consuming. In this paper, considering the benefits of artificial immune system, source code plagiarism approach is proposed that overcomes the drawbacks of previous genetic algorithm and particle swarm optimization algorithms. The sparse PCA is employed for dimensionality reduction prior to detection approach for obtained sparse matrix. Using CSA, the detection between source codes is computed and fitness evaluation is measured using Normalized Euclidean distance (NED) and Normalized Cumulative Reciprocal Rank (NCRR).The performance analysis of the suggested approach showed that it has better precision and recall values when compared with existing Meta heuristic based Source code plagiarism detection algorithms.
Key-Words / Index Term
Source Code detection, Plagiarism approach, Artificial Immune System, Clonal Selection Algorithm, Sparse PCA
References
[1] W. Zhou, Y. Zhou, X. Jiang, and P. Ning, “Detecting repackaged smartphone applications in third-party android marketplaces,” in Proc. 2nd ACM Conf. Data Appl. Security Privacy, 2012, pp. 317–326.
[2] S. Burrows, S. M. M. Tahaghoghi and J. Zobel, “Efficient plagiarism detection for large code repositories”, Software Practice and Experience, vol.37, pp. 151-175, 2006.
[3] G. Cosma and M. Joy, "Towards a Definition of Source-Code Plagiarism," IEEE Transactions on Education, vol. 51, no. 2, pp. 195 - 200, 2008.
[4] Cosma, G., Joy, M., 2008. Towards a definition of source-code plagiarism. IEEE Trans. Edu. 51 (2), 195–200.
[5] Kustanto, C., Liem, I., 2009. Automatic source code plagiarism detection. In: 2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing. IEEE, pp. 481–486.
[6] Rabbani, F.S., Karnalim, O., 2017. Detecting source code plagiarism on .NET programming languages using low-level representation and adaptive local alignment. J. Inf. Org. Sci. 41 (1), 105–123.
[7]nLancaster, T., Culwin, F., 2004. A comparison of source code plagiarism detection engines. Comput. Sci. Edu. 14 (2), 101–112.
[8] V. Anjali, T. R. Swapna and B. Jayaraman, "Plagiarism Detection for Java Programs without Source Codes," in The International Conference on Information and Communication Technologies, Kochi, 2014.
[9] A. Cuomo, A. Santone and U. Vilano, "A novel approach based on formal methods for clone detection," in The 6th International Workshop on Software Clones, 2012.
[10] Stamatatos, E. (2011). Plagiarism detection using stop word n_grams. Journal of the American Society for Information Science and Technology, 62(12), 2512-2527.
[11] Stein, B., Lipka, N., &Prettenhofer, P. (2011). Intrinsic plagiarism analysis. Language Resources and Evaluation, 45(1), 63-82.
[12] Alzahrani, S., &Salim, N. (2010). Fuzzy semantic-based string similarity for extrinsic plagiarism detection. Braschlerand Harman.
[13] Gillium, J. (2015). Big data etbibliothèques: traitement etanalyseinformatiques des collections numériques
[14] Banjade, R., Maharjan, N., Gautam, D., &Rus, V. (2016).DTSim at SemEval-2016 Task 1: Semantic Similarity Model Including Multi-Level Alignment and Vector-Based Compositional Semantics. Proceedings of Sem Eval, 640-644.
[15] A. Flint, S. Clegg, and R. Macdonald. Exploring staff perceptions of student plagiarism. Journal of Further and Higher Education, 30:145–156, 2006.
[16] P. Keith-Spiegel, B. G. Tabachnick, B. E. Whitley, and J. Washburn. Why professors ignore cheating: Opinions of a national sample of psychology instructors. Ethics and Behavior, 8(3):215–227, 1998.
[17] W. B. Croft, and D. J. Harper. Using probabilistic models of document retrieval without relevance information. J. Documentation, 35(4): pp. 285-295, 1979
[18] Guyon, J. Weston, S. Barnhill, and V. Vapnik. Gene selection for cancer classification using support vector machines. Machine Learning, 46(1-3):389–422, 2002.
[19] L. De Castro, F. J. Von Zuben, ‘The CSA with engineering applications,’GECCO 2000, Workshop Proceedings, Workshop on Artificial Immune Systems and Their Applications, Las Vegas, USA, 2000, 36-37.
[20] L. N. De Castro, F. J. Von Zuben, ‘Learning and Optimization Using the Clonal Selection Principle,’IEEE Transactions on Evolutionary Computation, Vol. 6, No. 3, June 2002, pp. 239-251.
[21]. Forrest, S. et al.: Using genetic algorithms to explore pattern recognition in the immune system. Evol. Compute. 1, 191–211 (1993).
[22]. Jennifer A. White, Simon M. Garrett: Improved Pattern Recognition with Artificial Clonal Selection? ICARIS 2003, LNCS 2787, Springer-Verlag Berlin Heidelberg 2003. 181-193(2003).
[23] Jinhyun Kim, HyukGeun Choi, Hansang Yun, Byung-Ro Moon, “Measuring Source Code Similarity by Finding Similar Sub graph with an Incremental Genetic Algorithm”, In Proceeding of the Genetic and Evolutionary Computation Conference, pp. 925-932, ACM, 2016.
[24] M.Bhavani, Prof K.Thammi Reddy, Prof P.Suresh Varma, “An Iterative Genetic Algorithm Based Source Code Plagiarism Detection Approach Using NCRR Similarity Measure”, Journal of Theoretical and Applied Information Technology, 2018.
[25] R. Vidal, Y. Ma, and S. Sastry. Generalized principal component analysis (gpca). IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 12, pp. 1945-1959, 2005.
[26] Vanita Jain, Aarushi Jain, Achin Jain, Arun Kumar Dubey, “Comparative Study between FA, ACO, and PSO Algorithms for Optimizing Quadratic Assignment Problem”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.76-81, 2018.
[27] S.Arora, P. Shukla, N. Karankar, "Community Structure Detection in Social Networking Data Using Text Mining Approach", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.9-15, 2017
Citation
M. Bhavani, K. Thammi Reddy, P. Suresh Varma, "A CSA based Source Code Plagiarism Detection Approach using Sparse Principle Component Analysis," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.409-417, 2018.
Travel Route Recommendation System using Big-Multisource Social Media: A Survey
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.418-421, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.418421
Abstract
In the era of internet, social media has become a big boom for Internet users. These users used to share their day-to-day activities on social media sites like Facebook, Twitter, Flicker and so on. Different data gets uploaded related to users activities like check-ins, GPS locations, tagging friends, travel routes, shopping, dining and photos. The comfort of user convenience has resulted in tremendously increased user count of the Internet. Simultaneously, it is also leading to building of information as a huge database of places, routes, services etc. Considering these all things, our targeted work is to build an enhanced travel advisory and recommendation system. Such a system gives complete freedom to users for choosing their suitable trip options. The users gets able to fetch complete information like statistics of users visited given place, available facilities and most importantly preferred travel routes. All this information can have associated cost options for ease of decision-making. With the help of social media activities like recommendations, likes/dislikes, posts, shares, tags and check-in information, it can build automatic trip advisor to provide better travelling experience with cost-saving and user convenient features. This diverse database can provide features like text-based and pictorial search module. Thus the available maps and locations help users to synchronize their actions with existing routes along with probable route restructuring functionality. Also uses can use the combination of skyline representative concepts and keyword extraction module for appropriate decision making to choose the best place from multiple Places-of Interest (POIs).
Key-Words / Index Term
Recommendation System, Decision Making, User Convenience, Keyword Extraction, Skyline Representative
References
[1]. Y. Arase, X. Xie, T. Hara, and S. Nishio. "Mining people’ strip from large scale geo-tagged photos". In Proceedings of the 18th ACM international conference on Multimedia, pages 133–142. ACM, 2010.
[2]. X. Cao, L. Chen, G. Cong, and X. Xiao. Keyword-aware optimal route search. Proceedings of the VLDB Endowment, 5(11):1136–1147, 2012.
[3]. H. Yin, B. Cui, Y. Sun, Z. Hu, and L. Chen. LCARS: A spatial item recommender system. ACM Transactions on Information Systems (TOIS), 32(3):11, 2014.
[4]. D. Chen, C. S. Ong, and L. Xie. Learning points and routes to recommend trajectories. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pages 2227–2232, 2016.
[5]. M. Clements, P. Serdyukov, A. De Vries, and M. Reinders ,Using Flicker Geo Tag To Predict User Travel Behavior, In proceeding of the 33rd International ACMSIGIR Conference Research Development Information Retrieval, 2010
[6]. D. Chen, C. S. Ong, and L. Xie,” Learning Points And Routes To Recommend Trajectories.” In Proceedings of the 25th ACM International Conference On Information And Knowledge Management, 2016
[7]. B. Zheng, N. J. Yuan, K. Zheng, X. Xie, S. Sadiq , and X. Zhou, “Approximate Keyword Search In Semantic Trajectory Database” In Data Engineering (ICDE), IEEE 31st International Conference,2015.
[8]. W. T. Hsu, Y. T. Wen, L. Y. Wei, and W. C. Peng, -Skyline travel routes: Exploring skyline for trip planning,‖ in Proceed. IEEE 15th Int. Conf. Mobile Data Manage., 2014, pp. 31–36.
[9]. X. Cao, G. Cong, and C. S. Jensen. Mining significant semantic locations from GPS data. Proceedings of the VLDB Endowment, 1009–1020, 2010.
[10]. A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,” in Proc. Symp. Usable Privacy Security, 2008.
[11]. X. Li, J. Han, J. Lee, and H. Gonzalez, “Traffic density-based discovery of hot routes in road networks,” Advances in Spatial and Temporal Databases, pp. 441–459, 2007.
[12]. D. Sacharidis, K. Patroumpas, M. Terrovitis, V. Kantere, M. Potamias, K. Mouratidis, and T. Sellis, “On-line discovery of hot motion paths,” in EDBT, 2008, pp. 392–403.
[13]. J. Patel and D. DeWitt, “Partition based spatial-merge join,” ACM SIGMOD Record, vol. 25, no. 2, pp. 259–270, 1996.
Citation
Shital.N.Raul, Nitin N. Patil, "Travel Route Recommendation System using Big-Multisource Social Media: A Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.418-421, 2018.