Factor Analysis of Population Growth using Data Analytics
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.422-425, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.422425
Abstract
According to the estimation billionth person was born in 1804 and the second billionth was born about 123 years later in 1927. Since then it has taken humans 60 years to reach the 5 billion mark and now we are closer to population of 8 billion. India contributes about 20% of this population making it as the second most populous country in the world. Originally, most of the important predictions were made using the Malthusian growth models. The science of data analytics has opened up new possibilities in the creation of prediction graphs. Prediction graphs give useful information about tackling the problem of increasing population. R programming language is used to identify factors that impact the rate of change of population. Important factors such as literacy rate, death rate, religion and so on, deeply impact the rate of population growth. From the Kaiser-Meyer-Olkin test and Factor Analysis found that out of all factors that were considered, religious differences and migration rate were the most important factors affecting the rate of population growth.
Key-Words / Index Term
Malthusian growth model,Data Analytics, Factors, R-Programmimg language, Kaiser-Meyer-Olkin
References
[1] Dr. Samir Vazidbhai Vohra, `Population Growth-India`s problem`, PARIPEX – Indian Journal of Research, Vol. 4 , Issue : 11 , November 2015, ISSN - 2250-1991.
[2] Suriani Hassan, Norlita Ismail, Wan Yonsharlinawati Wan Jaafar, Khadizah Ghazali, Kamsia Budin, Darmesah Gabda and Asmar Shahira Abdul Samad , `Using factor analysis on study of factors affecting students` learning style`, International journal of Applied Mathematics and Informatics, Vol. 6, 2012.
[3] Lucas Gren, Alfredo Goldman, `Useful statistical methods for human factors research in software engineering`, ACM, p.p 121-124, 2016.
[4] Sanchita Patil,` Big data analytics using R `, IRJET, Vol. 03, Issue: 07, July-2016.
[5] Huabin Wei, Yanqing Jiang and Yuxing Zhang, `A review of two population growth models`, Asian Journal of Economic Modelling, 3(1): 8-20, 2015
[6] Shilpa S Kulkarni et al,` Analysis of population growth in India and estimation for future`, IJIRSET, Vol. 3, Issue 9, Sep- 2014.
[7] Mohammed Yiha Dawed, Purnachandra Rao Koya, Ayele Taye Goshu,`Mathematical modelling of population growth: The case of logistic and Von Bertalanffy models`, Open Journal of Modelling and Simulation, 2, 113-126, 2014.
[8] A. Alexander Beaujean, `Factor analysis using R`, Practical Assessment, Research & Evaluation, Vol. 18, Number 4, Feb- 2013.
[9] Feng Zhiming et al, ‘Natural environment suitability for human settlements in China based on GIS`, Journal of Geographical Sciences, 19: 437-446 ,2009
[10] S,. Ramana, S. Sabitha, R. Senthil Kumar, T. Senthil Prakash “Atmospheric Change on the Geographical Theme Finding Of Different Functions on Human Mobility”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2 , pp.134-151, Apr-2018
[11] K. Sarmah, “Comparison Studies of Speaker Modeling Techniques in Speaker Verification System”, International Journal of Scientific Research in Network Security and Communication , Vol.5 , Issue.5 , pp.75-82, Oct-2017
Citation
Anupama Girish , Aditya Dey, Ankit Sharma, Ketan Jain, Kumar Sanket, Amutha S., Ramesh Babu. D.R, "Factor Analysis of Population Growth using Data Analytics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.422-425, 2018.
Dynamic S-box implementation in PRESENT Cipher
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.426-431, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.426431
Abstract
Lightweight cryptography is a very promising cryptographic technique which focuses on providing security to the smart devices in the IOT environment. The devices used in the IOT environment generate a large amount of data which can be very critical and sensitive to us. These IOT devices are generally very small and require low power to operate. So implementing strong cryptographic algorithms which need high computation is very difficult because of these limitations. Many lightweight ciphers are developed which focused on providing efficient encryption in these resource sensitive environment without taking much computational power. These ciphers are based on different approaches like AES, Feistel networks. In this paper it is proposed to make some change in the design of one such lightweight cipher i.e. PRESENT. The PRESENT cipher is based on the Substitution Permutation network and utilizes the S-box during the encryption. Here, the motivation is to improve the cipher technique and increase its efficiency by creating the dynamic S-boxes and comparing it with the static S-box on various factors.
Key-Words / Index Term
IOT, AES, LightWeight Ciphers, PRESENT cipher, SP Network
References
[1] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang and W. Zhao, "A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications," in IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, Oct. 2017.
[2] D. Makoshenko and I. Enkovich, "IoT development: Discovering, enabling and validation of real life IoT scenarios," 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), Valencia, pp. 159-164, 2017.
[3] M. Frustaci, P. Pace, G. Aloi and G. Fortino, "Evaluating Critical Security Issues of the IoT World: Present and Future Challenges," in IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483-2495, 2018.
[4] Sadiya Shakil and Vineet Singh, "Security of Personal Data on Internet of Things Using AES", International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.35-39, 2016.
[5] Zheng Gong, Svetla Nikova, and Yee Wei Law. 2011. “KLEIN: a new family of lightweight block ciphers”. In Proceedings of the 7th international conference on RFID Security and Privacy (RFIDSec`11), Ari Juels and Christof Paar (Eds.). Springer-Verlag, Berlin, Heidelberg, pp. 1-18, 2011.
[6] Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim. 2016. “The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS”. In Proceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9815, Matthew Robshaw and Jonathan Katz (Eds.), Vol. 9815. Springer-Verlag, Berlin, Heidelberg, pp. 123-153, 2016.
[7] Jian Guo, Thomas Peyrin, Axel Poschmann, and Matt Robshaw. 2011. “The LED block cipher”. In Proceedings of the 13th international conference on Cryptographic hardware and embedded systems (CHES`11), Bart Preneel and Tsuyoshi Takagi (Eds.). Springer-Verlag, Berlin, Heidelberg, pp. 326-341, 2011.
[8] Shirai T., Shibutani K., Akishita T., Moriai S., Iwata T. (2007) “The 128-Bit Blockcipher CLEFIA (Extended Abstract)”. In: Biryukov A. (eds) Fast Software Encryption. FSE 2007. Lecture Notes in Computer Science, vol 4593. Springer, Berlin, Heidelberg, pp. 181-195, 2007.
[9] Deukjo Hong, Jung-Keun Lee, Dong-Chan Kim, Daesung Kwon, Kwon Ho Ryu, and Dong-Geon Lee. 2013. “LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors”. In Revised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 8267 (WISA 2013), Yongdae Kim, Heejo Lee, and Adrian Perrig (Eds.), Vol. 8267. Springer-Verlag New York, Inc., New York, NY, USA, pp. 3-27, 2013.
[10] R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith and L. Wingers, "The SIMON and SPECK lightweight block ciphers," 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, pp. 1-6, 2015.
[11] Bogdanov A. et al. (2007) “PRESENT: An Ultra-Lightweight Block Cipher”. In: Paillier P., Verbauwhede I. (eds) Cryptographic Hardware and Embedded Systems - CHES 2007. CHES 2007. Lecture Notes in Computer Science, vol 4727. Springer, Berlin, Heidelberg, pp. 450-466, 2007.
[12] Albrecht M.R., Driessen B., Kavun E.B., Leander G., Paar C., Yalçın T. (2014) “Block Ciphers – Focus on the Linear Layer (feat. PRIDE)”. In: Garay J.A., Gennaro R. (eds) Advances in Cryptology – CRYPTO 2014. CRYPTO 2014. Lecture Notes in Computer Science, vol 8616. Springer, Berlin, Heidelberg, pp. 57-76, 2014.
[13] Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim. 2016. “The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS”. In Proceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9815, Matthew Robshaw and Jonathan Katz (Eds.), Vol. 9815. Springer-Verlag, Berlin, Heidelberg, pp. 123-153, 2016.
[14] Matthew Robshaw. 2008. “The eSTREAM Project. In New Stream Cipher Design”s, Matthew Robshaw and Olivier Billet (Eds.). Lecture Notes In Computer Science, Vol. 4986. Springer-Verlag, Berlin, Heidelberg, pp. 1-6, 2008.
[15] De Cannière C., Preneel B. (2008) “Trivium”. In: Robshaw M., Billet O. (eds) New Stream Cipher Designs. Lecture Notes in Computer Science, vol 4986. Springer, Berlin, Heidelberg, pp. 244-266, 2008.
[16] Wu W., Zhang L. (2011) “LBlock: A Lightweight Block Cipher”. In: Lopez J., Tsudik G. (eds) Applied Cryptography and Network Security. ACNS 2011. Lecture Notes in Computer Science, vol 6715. Springer, Berlin, Heidelberg, pp. 327-344, 2011.
[17] Deepanshu Mehta, "Internet of Things: Applications and Challenges", International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.289-293, 2018.
Citation
Kumar Anurupam, "Dynamic S-box implementation in PRESENT Cipher," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.426-431, 2018.
Clustering Incomplete Mixed Datasets by using Extended Squeezer Algorithm and Finding Incomplete Set Mixed Dissimilarity (ISMD)
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.432-437, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.432437
Abstract
Clustering mixed datasets is one of the challenging task. Traditional algorithms like k-prototype algorithm is used for mixed dataset, but is limited to only complete datasets. In any dataset missing values are common. To handle such missing values or incomplete mixed datasets we use extended squeezer algorithm, which includes the new dissimilarity measure ISMD that is incomplete set mixed dissimilarity for numerical and categorical attribute values. In this method we consider dissimilarities in the missing values and in this extended squeezer algorithm it not only cluster the incomplete dataset, it also need not to input the missing values and need not to initialize any clusters at the beginning. This method is compared with traditional k-prototype algorithm on benchmark datasets. The experimental results shows that the ISMD using extended squeezer algorithm gives better accuracy than the traditional k-prototype algorithm and also it overcomes the limitation of initial clusters. This method is implemented by using Python programming. The results shows that there is significant improvement in the clustering results.
Key-Words / Index Term
Incomplete set mixed dissimilarity, k-prototype, extended squeezer algorithm, Python programming
References
[1] M.V.Jagannatha Reddy and Dr. B. Kavitha, “clustering mixed numerical and categorical dataset using similarity weight and filter method”, International journal of Database Theory and Applications, vol-5, no-1 March- (2012), pp-121-134
[2] H. Zhexue, “Extension to the K-means algorithm for clustering large data sets with categorical values”, Data Mining and Knowledge Discovery, (1998), pp. 283-304.
[3] T. Covões and E. Hruschka, “A study of K-Means-based algorithms for constrained clustering”, Intelligent Data Analysis, vol. 17, no. 3, (2013), pp. 485-505.
[4] H. Zhexue, “Clustering large data sets with mixed numeric and categorical values”, Proceedings of the 1th pacific-Asia Conference on Knowledge Discovery & Data Mining. Singapore: World Scientific, (1997), pp. 21-34.
[5] W. Qian, W. Cheng and F. Zhenyuan, “Summary of k-means clustering algorithm”, Electronic Design Engineering, vol. 20, no. 7, (2012), pp. 21-24.
[6] C. Dan and W. Zhenhua, “A K-prototypes Algorithm Based on Improved Initial Center Points”, Computer Knowledge and Technology, (2010) November.
[7] C. Sotirios, “A fuzzy c-means-type algorithm for clustering of deal with mixed numeric and categorical attributes employing a probabilistic dissimilarity functional”, Expert Systems with Applications, vol. 38, no. 7, (2011), pp. 8684-8689.
[8] W. Fengmei and H. Lixia, “A Missing Data Imputation Method Based on Neighbor Rules”, Computer Engineering, vol. 38, no. 21, (2012).
[9] X. Fang and Z. Guizhu, “Clustering algorithm based on Modified Shuffled Frog Leaping Algorithm and K-means”, Computer Engineering and Applications, vol. 49, no. 1, (2013), pp. 176-180.
[10] Takashi Furukawa, Shin-ichi Ohnishi, and Takahiro Yamanoi “On a Fuzzy c-means Algorithm for Mixed Incomplete Data Using Partial Distance and Imputation” Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I, IMECS 2014, March 12 - 14, 2014, Hong Kong.
[11] Vaishali H. Umathe, Prof. Gauri Chaudhary. “A Review on Incomplete Data And Clustering” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2) , 2015, pp 1225-1227
[12] J. Twisk, M. de Boer, W. de Vente and M. Heymans, “Multiple imputation of missing values was not necessary before performing a longitudinal mixed-model analysis”, Journal of Clinical Epidemiology, vol. 66, no. 9, (2013), pp. 1022-1028.
[13] Wu Sen, Chen Hong and Feng Xiaodong “Clustering algorithm for incomplete data sets with mixed numeric and categorical Attributes” IJDTA, vol. 6 No. 5 2013, pp 95-104.
[14] W. Guoyin, “Expansion in the theory of rough set in incomplete information system”, Journal of computer research and development, vol. 33, no. 10, (2002), pp. 1239-1240.
[15] M..V.Jagannatha Reddy, Dr.B.Kavitha “Clustering Incomplete Mixed Numerical and Categorical Datasets using Modified Squeezer Algorithm International Journal of Computer Science and Engineering, E- ISSN:2347-2693, Vol-4, issue-5 pp-36-41 may-16
Citation
M.V. Jagannatha Reddy, D. Ramachandra Reddy, M. Mahesh Kumar, "Clustering Incomplete Mixed Datasets by using Extended Squeezer Algorithm and Finding Incomplete Set Mixed Dissimilarity (ISMD)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.432-437, 2018.
ECG Signal Classification Based On Deep Learning Classifier
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.438-441, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.438441
Abstract
ECG (Electrocardiogram), non-stationary biomedical signal measures the electrical activity of the human heart. This ECG signal helps the professional as a diagnostic tool to predict the cardiac disorder and the function of the human heart. According to the report of WHO (World Health Organization), most of the humans suffer from the cardiac disorder and passed due to the cardiac illness.ECG signal analysis is an important factor in this prediction and this work proposes an automatic classification of the signal which identifies the normal and abnormal signal. The ECG signals are taken from the MIT BIH database. The ECG signal is identified as normal and abnormal with the deep learning classifier CNN. The CNN is a convolution neural network which requires minimal pre-processing compared with traditional machine learning classifier. This work focus on the prediction of the cardiac disorder with automatic classification.
Key-Words / Index Term
ECG, Arrhythmia, MIT-BIH, CNN
References
[1] Latifah Aljafar et., al., "Classification of ECG signals of normal and abnormal subjects using common spatial pattern”, IEEE 5th International Conference, 2016.
[2] G.Kaur, G Singh and V Kumar, "A review on biometric recognition", International Journal of Bio-Science and Biotechnology, Vol. 6, no:4, 2014.
[3] z.Deng, M. Zhar, et.al., "Deep Structured models for group activity recognization", British Machine Vision Conference 2015.
[4] R. Collobert and J. Weston, “A unified architecture for natural language processing: Deep neural networks with multitask learning,” in Proceedings of the 25th International Conference on Machine Learning. ACM, Pg No: 160–167, 2008.
[5] K. Fukushima, “Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position,” Biological Cybernetics, vol. 36, no. 4, pp. 193–202, 1980.
[6] M. Abo-Zahhad, S. M. Ahmed, and S. N. Abbas, "Biometric authentication based on PCG and ECG signals: present status and future directions," Signal, Image and Video Processing, vol. 8, no. 4, pp. 739– 751, 2014.
[7] R.Kavitha, Dr.T.Christopher " Predicting Accuracy in ECG signal classification: A comparative method for feature selection", Journal of advanced research and dynamic control systems, vol.10 pp:273-281,2018.
Citation
R. Kavitha, T.Christopher, "ECG Signal Classification Based On Deep Learning Classifier," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.438-441, 2018.
Iris Detection Using Segmentation Techniques
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.442-444, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.442444
Abstract
This paper introduces an approach to be adopted for the detection of iris from the medical image of human eye. The microscopic image of human eye is taken which consists of number of features such as pupil, retina, iris etc. Firstly image pre-processing is done on the input image so as to remove unwanted noise from it and then various image segmentation techniques such as edge detection, Hough transform etc. are applied for the efficient identification of the inner and outer boundary of iris. To efficiently detect iris boundary, accurate evaluation of circumference of iris in the human eye is required.
Key-Words / Index Term
Segmentation,Edgedetection,Houghtransform,etc
References
[1] Navita Kamboj, Preeti Gupta,“A Review on Segmentation techniques for
Iris Recognition System”, International Journal of Engineering and
Management Research, Vol.5, pp. 14-16, 2015.
[2] Mahmoud Mahlouji and Ali Noruzi,” Human Iris Segmentation for Iris Recognition in Unconstrained Environments “, International Journal of Computer Science Issues, Vol. 9, pp.149-152, 2012.
[3] M. Karpaga Kani, Dr.T. Arumuga MariaDevi, “Iris Segmentation and Recognition System” International Journal of Advanced Research in Computer Engineering & Technology,Vol. 3, pp. 1-5, 2014.
[4] D.Anitha,M.Suganthi and P.Suresh, “Image Processing of Eye to Identify the Iris Using Edge Detection Technique based on ROI and Edge Length”, International Conference on Signal, Image Processing and Applications, Vol. 21,pp.1 -5,2011.
[5] Surjeet Singh, Kulbir Singh, “Segmentation Techniques for Iris Recognition System” ,International Journal of Scientific & Engineering Research Vol. 2, pp.1-8, 2011.
[6] Nidhi Manchanda, Oves Khan, Rishita Rehlan and Jyotika Pruthi, ”A Survey: Various Segmentation Approaches to Iris Recognition”, International Journal of Information and Computation Technology,Vol. 3,pp.419-424,2013.
Citation
Neeti Taneja, Mohammad Shabaz, Vinayak Khajuria, "Iris Detection Using Segmentation Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.442-444, 2018.
Evaluation framework of reusability QoS metrics for Cloud based SaaS: an empirical study
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.445-450, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.445450
Abstract
Cloud based software-as-a-service (SaaS) is a new paradigm where services are offered over the internet. The service providers develop and deploy services that consumers can use to build their applications of high quality. As such, consumers can use these services in various applications and in various combinations. The main concern for every consumer is the quality of the service being provided by the service provider. There are number of quality attributes available to assess the quality of service. Some of the attributes are reliability, scalability, availability, reusability and coupling etc. After reviewing number of QoS attributes, we have found that Reusability and coupling of services, is a key QoS attribute to measure the value and Return on Investment (ROI) of the cloud based software service. In this paper we have proposed a reusability framework for cloud based SaaS and constructed their metrics scores. We have also done empirical evaluation on three different cloud based software services to show applicability of our proposed framework.
Key-Words / Index Term
Reusability, cloud based Software-as-a-Service, Quality attributes, Metrics, Cloud computing
References
[1]Gillett, F., “Future View: The New tech Ecosystems of Cloud, Cloud Services, And Cloud Computing,” Making Leaders Successful Every Day, FORRESTER Research, 2008.
[2] Sang, H. O., et al., “A Reusability Evaluation Suite for Cloud Services”, IEEE 8th International Conference on e-Business Engineering, pp. 111-118, 2011
[3]Clements, P., Kazman, R., & Klein, M. Evaluating Software Architectures. Boston, MA: Addison-Wesley, 2002.
[4]Software Engineering—Product Quality—Part 1: Quality Model. ISO/IEC 9126-1, June, 2001.
[5]Software Engineering—Product Quality—Part 2: External Metrics. ISO/IEC TR 9126-3, July, 2003.
[6]Choi, S.W., Her, J.S., and Kim, S.D., “QoS Metrics for Evaluating Services from the Perspective of Service Providers,” In Proceedings of IEEE International Conference on e-Business Engineering (ICEBE 2007), pp. 622-625, 2007
[7]Garg, S.K., et al., “A framework for ranking of cloud computing services”, Future Generation Computer Systems, vol.29 No.4, pp.1012-1023, 2013
[8]Lee, J. Y., et al., “Software Approaches to Assuring High Scalability in Cloud Computing”, IEEE International Conference on E-Business Engineering, pp. 300-306, 2010
[9]Jureta et al., “A comprehensive quality model for service-oriented systems”, Software Quality Journal, Vol.17 No.1, pp. 65-98, 2009
[10]Washizaki, H. et al., “A metrics suite for measuring reusability of software components,” In proceedings of METRICS’03, pp. 211–223, 2003
[11]McCall, J.A., Richards, P.K., and Walters, G.F., Factors in Software Quality, US Rome Air Development Center Reports, Vol. I, II, III, RADC-TR,pp. 77-369, 1997
[12]Kim, S.D., "Software Reusability," Wiley Encyclopedia of Computer Science and Engineering, Vol.4, pp.2679-2689, 2009
[13]Her, J.S., La, H.J., and Kim, S.D., “A Formal Approach to devising a Practical Method for Modeling Reusable Services,” In Proceedings of the 7th IEEE International Conference on e-Business Engineering (ICEBE 2008), pp. 221-228, 2008
[14]Frakes, W. and Terry, C., “Software Reuse: Metrics and Models,” ACM Computing Surveys, Vol. 28, No. 2, 1996.
[15] Google Maps https://developers.google.com/maps/documentation/webservices
[16] Bing Maps http://www.microsoft.com/maps/choose-your-bing-maps-PI.aspx
[17] OVI Maps http://api.maps.ovi.com/devguide/overview.html
[18]L. Ejiogu, Software Engineering with Formal Metrics, QED Publishing, 1991
[19]IEEE standard for a software quality metrics methodology, IEEE Std 1061-1998, 1998.
Citation
Monika Sethi, Jatender Kumar, "Evaluation framework of reusability QoS metrics for Cloud based SaaS: an empirical study," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.445-450, 2018.
Effects of Varying Resolution on Performance of CNN based Image Classification: An Experimental Study
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.451-456, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.451456
Abstract
Convolutional neural network (CNN) based image classifiers always take input as an image, automatically learn its feature and classify into predefined output class. If input image resolution varies, then it hinders classification performance of CNN based image classifier. This paper proposes a methodology (training testing methods TOTV, TVTV) and presents the experimental study on the effects of varying resolution on CNN based image classification for standard image dataset MNIST and CIFAR10. The experimental result shows that degradation in resolution from higher to lower decreases performance score (accuracy, precision and F1 score) of CNN based Image classification.
Key-Words / Index Term
Varying Resolution, Convolution Neural Network, Image Classification, Feature Learning, Classification
References
[1] Guo, Yanming, et al. "Deep learning for visual understanding: A review." Neurocomputing, Vol.187, pp.27-48, 2016.
[2] Sheikh, H. R., and A. C. Bovik. "Image information and visual quality.", IEEE Transactions on Image Processing,Vol.15, Issue.2, pp.430-444, 2006.
[3] Lu, Dengsheng, and Qihao Weng. "A survey of image classification methods and techniques for improving classification performance.", International Journal of Remote sensing, Vol.28, Issue.5, pp.823-870, 2007.
[4] Hoo-Chang, Shin, et al. "Deep convolutional neural networks for computer-aided detection: CNN architectures, dataset characteristics and transfer learning.", IEEE transactions on medical imaging, Vol.35, Issues.5, pp.1285, 2016.
[5] Deng, Li, and Dong Yu. "Deep learning: methods and applications.", Foundations and Trends® in Signal Processing Vol.7, Issue.3–4, pp.197-387, 2014.
[6] Dodge, Samuel, and Lina Karam. "Understanding how image quality affects deep neural networks.", Quality of Multimedia Experience (QoMEX), 2016 Eighth International Conference on. IEEE, 2016.
[7] Basu, Saikat, et al. "Learning sparse feature representations using probabilistic quadtrees and deep belief nets.", Neural Processing Letters, Vol.45, Issue.3, pp.855-867, 2017.
[8] Dejean-Servières, Mathieu, et al. “Study of the Impact of Standard Image Compression Techniques on Performance of Image Classification with a Convolutional Neural Network”, Diss. INSA Rennes; Univ Rennes; IETR; Institut Pascal, 2017.
[9] Sanchez, Angel, et al. "Analyzing the influence of contrast in large-scale recognition of natural images.", Integrated Computer-Aided Engineering, Vol.23, Issue.3, pp.221-235, 2016.
[10] Chevalier, Marion, et al. "LR-CNN for fine-grained classification with varying resolution.", Image Processing (ICIP), 2015 IEEE International Conference on. IEEE, 2015.
[11] Ullman, Shimon, et al. "Atoms of recognition in human and computer vision.", Proceedings of the National Academy of Sciences, Vol.113, Issue.10, pp.2744-2749, 2016.
[12] Chen*, D., D. A. Stow, and P. Gong. "Examining the effect of spatial resolution and texture window size on classification accuracy: an urban environment case.", International Journal of Remote Sensing, Vol.25, Issue.11, pp.2177-2192, 2004.
[13] Sokolova, Marina, and Guy Lapalme. "A systematic analysis of performance measures for classification tasks.", Information Processing & Management, Vol.45, Issue.4,pp. 427-437,2009.
[14] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner. "Gradient-based learning applied to document recognition.", Proceedings of the IEEE, Vol.86, Issue.11, pp.2278-2324, 1998.
[15] Krizhevsky, Alex, and Geoffrey Hinton., “Learning multiple layers of features from tiny images”, Technical report, University of Toronto, Vol.1, Issue.4, 2009.
Citation
Suresh Prasad Kannojia, Gaurav Jaiswal, "Effects of Varying Resolution on Performance of CNN based Image Classification: An Experimental Study," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.451-456, 2018.
Multilevel Code Cleaning using Root Extract Method for Java Programs
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.457-461, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.457461
Abstract
The code cleaning requires the incorporation of the various processes to remove the clones from the source code as well as the programming irregularities, which improve the overall design of the code. In this paper, the proposed model has been designed for the purpose of code cleaning by using the multi-factor code cleaning algorithm. The proposed model is entirely based upon the elimination of the source code irregularities, which contains the bad smells, code clones and other such problems. The proposed model is designed to work in the three primary components, which includes the code clone and smell detection and marking algorithm, which is followed by the refactoring method estimation and then the application of the refactoring application in the final phase for the act of cleaning the source code. The proposed model utilizes the divide and conquer method, which is concerned with the extraction of the methods from the class files. Also the proposed model analyzed and extracts the independent statements from the extracted methods, which incorporates the common statement elimination, which removes the common statements from the duplication removal process. The proposed model has been designed to refactor the code on the basis of the bad smell detection and elimination with the appropriate method. The proposed model has been analyzed under the various kinds of the datasets for the experimental evaluation, where it has been found better. The proposed model has been recorded with the significant values of the parameters of the accuracy, precision and recall.
Key-Words / Index Term
Code clone detection, Code cleaning, Duplication detection, Overlapping shifting method
References
[1] M. Fowler, Refactoring: Improving the Design of Existing Code, Addison-Wesley, 2000.
[2] W. G. Griswold, W. F. Opdyke, The Birth of Refactoring: A retrospective on the Nature of High-Impact Software Engineering Research, IEEE Software, 32 (6) (2015), 30-38.
[3] R. Geiger, Evolution Impact of Code Clones, Diploma Thesis, University of Zurich, October, 2005.
[4] M. Hafiz, J. Overbey, Refactoring Myths, IEEE Software 32 (6) (2015), 39-43.
[5] ToolIclonehttp://www.softwareclones.org/iclones.php>(accessed December 2015).
[6] ToolJcdhttp://www.swag.uwaterloo.ca/jcd/> (accessed December 2015).
[7] R. Koschke, I. D. Baxter, M. Conradt, J. R. Cordy, Software Clone Management Towards Industrial Application, Dagstuhl Seminar 12071 on 2 (2) (2012) 21-57.
[8] M. Kim, Z. Thomas, N. Nachiappan, An Empirical Study of Refactoring Challenges and Benefits at Microsoft, Software Engineering, IEEE Transactions on 40, (7 ) (2014) 633-649.
[9] E. Kodhai, S. Kanmani, Method-Level Code Clone Modification using Refactoring Techniques for Clone Maintenance, Advanced Computing: An International Journal (ACIJ), 4 (2), March 2013, 7-26.
[10] E. Murphy-Hill, C. Parnin, A.P. Black, Refactoring Tools: Fitness for Purpose, IEEE Transactions on Software Engineering, 25, (5), (2008) 38-44.
[11] E. Murphy-Hill, A. P. Black, Why Don’t People Use Refactoring Tools?, in proceedings of the Computer Science Faculty Publications and Presentations, Portland State University, Portland, (2007), Paper 115.
[12] T. Mens, T. Tourwé, A Survey of Software Refactoring, IEEE Transactions on Software Engineering, 30, (2), (2004) 126-139.
[13] M. O’Keeffe, M. Ó, Cinnéide, Search-based refactoring: an empirical study, J. Softw.Maint.Evol, Res. Pract., 20, (2008), 345–364.
[14] C.K. Roy, J.R. Cordy, A Survey on Software Clone Detection Research, Technical Report 2007-541, Queen’s University at Kingston Ontario, Canada, 2007, p.115.
[15] C.K Roy, M.F Zibran, R. Koschke, The Vision of Software Clone Management: Past, Present, and Future (keynote paper), in: proceeding of the Software Maintenance and Reengineering and Reverse Engineering, Antwerp, Belgium, (CSMR-WCRE), 2014, pp. 18-33.
[16] D. Rattan, R. Bhatia, and M. Singh, Software clone detection: A systematic review, Information and Software Technology 55 (7) (2013) 1165-1199.
[17] M. Tufano, F. Palomba, G. Bavota, R. Oliveto, M. D. Penta, A. D. Lucia, D. Poshyvanyk, When and Why Your Code Starts to Smell Bad, in: Proceedings of the 37th International Conference on Software Engineering, Florence, Italy, 2015, pp. 403-414.
[18] N. Tsantalis, D. Mazinanian, G. P. Krishnan, Assessing the Refactorability of Software Clones, Software Engineering, IEEE Transactions on 41 (11) (2015) 1055-1090.
[19] M. D Wit, A. Zaidman, A. V. Deursen, Managing Code Clones Using Dynamic Change Tracking and Resolution, In: proceeding of the ICSM, 2009 pp. 169–178.
[20] M. D Wit, Managing Clones Using Dynamic Change Tracking and Resolution, Master’s thesis, Software Engineering Research Group, Delft University of Technology, 2009.
[21] M. F. Zibran, C. K. Roy, The Road to Software Clone Management: A survey, Technical Report 2012–03, The University of Saskatchewan, Canada, Feb., 2012 p. 54.
[22] M. F. Zibran, Chanchal Kumar Roy, Conflict-aware optimal scheduling of prioritised code clone refactoring, IET Software, on 7 (3) (June, 2013) 167-186.
Citation
Pooja Kapila, A. Sharma, N. Kaur, "Multilevel Code Cleaning using Root Extract Method for Java Programs," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.457-461, 2018.
Analysis on Wireless Sensor Networking Applications, Classification and Challenges Mechanisms
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.462-466, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.462466
Abstract
Wireless sensor network is the emerging area where we are largely depending on it, in our day to day life. The major application of the wireless sensor network is the emergency navigation service during the emergency situations, and the main goal of this service is to save the people from emergency situations by guiding them to reach a safe with small congestion and fewer detours. Wireless Sensor Network will be the future of communication and it plays the vital rule of super internet in the future were all data are powered by wireless communication for transmission. This research paper discuss the techniques, key challenges and classification applications.
Key-Words / Index Term
Classification, Mechanism, Adaptive, Fault Tolerance
References
[1] Das, T “Employing Cooperative Group Mobility Model For Mobile Target Tracking In Wsn”, Ieee Conf. On Applications And Innovations In Mobile Computing (Aimoc), 2015, Pp. 55 – 61.
[2] Zhou Xin-Lian “The Research Of Inner-Cluster Nodes Scheduling Algorithm In Wsn”, Ieee Conf On Information Technology And Applications (Ifita), 2011, Pp. 131 – 134.
[3] Gagneja, K.K “Heuristic Clustering With Secured Routing In Heterogeneous Sensor Networks” Ieee Conf. On Security And Privacy Of Mobile, Wireless, And Sensor Networks (Mwsn), 2013, Pp. 9 – 16.
[4] Jambli, M.N. “Transmission Power Control In Mobile Wireless Sensor Networks: Simulation-Based Approach”, Ieee Conf. On Wireless Communications And Applications (Icwca 2012),, 2012, Pp. 1 – 6.
[5] Jasleen Kaur, Kamaljit Singh Saini, Rubal Grewal, “Priority Based Congestion Avoidance Hybrid Scheme For Wireless Sensor Network”, 1st International Conference On Next Generation Computing Technologies (Ngct-2015) Dehradun, India, 4-5, September 2015.
[6] Anu Arya, Jagtar Singh,“Comparative Study Of Aodv, Dsdv And Dsr Routing Protocols In Wireless Sensor Network Using Ns-2 Simulator”, (Ijcsit) International Journal Of Computer Science And Information Technologies, Vol. 5, No. 4 , 2014.
[7] B.N. Jagdale, Pragati Patil, P. Lahane, D. Javale, “Analysis And Comparison Of Diatance Vector, Dsdv And Aodv Protocol Of Manet”, International Journal Of Distributed And Parallel Systems (Ijdps), Vol. 3, No. 2, March 2012.
[8] M. Mahmoud And X. Shen, “Esip: Secure Incentive Protocol With Limited Use Of Public-Key Cryptography For Multi-Hop Wireless Networks,” Ieee Trans. Mobile Computing, Vol. 10, No. 7, Pp. 997- 1010, July 2011.
[9] M. Mahmoud And X. Shen, “An Integrated Stimulation And Punishment Mechanism For Thwarting Packet Drop In Multihop Wireless Networks,” Ieee Trans. Vehicular Technology, Vol. 60, No. 8, Pp. 3947-3962, Oct. 2011
[10] Maryam M. Alotaibi And Hussein T. Mouftah, " Data Dissemination For Heterogeneous Transmission Ranges In Vanets", Ieee Conference On Local Computer Networks, Pp.818-825, 2015.
Citation
Jayakeerthi M., "Analysis on Wireless Sensor Networking Applications, Classification and Challenges Mechanisms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.462-466, 2018.
Towards Enablement Of Efficient Forensics Of Encrypted Storage Devices Such As HDDs and SSDs
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.467-473, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.467473
Abstract
Today, encryption is considered as a basic security measure to ensure protection of sensitive data contained within storage devices from external physical threats (such as people on-site) as well as network threats (such as malicious users over the internet or intranet). Today, since encryption techniques are freely and commercially available at ease to computer users all over the world, they have far reaching effects when utilized by malicious users to hide their data for the purpose of avoiding to get caught by lawful authorities. This research work essentially takes the case of encrypted disks/volumes that could cause problems in digital forensic investigations, since they provide criminal suspects with a range of opportunities for deceptive anti-forensics and a countermeasure to legislation written to force suspects to reveal decryption keys. This research work also covers techniques using which decryption keys could be found out so that encrypted data could be obtained in decrypted form to uncover artifacts of evidentiary value. This could also help the lawful authorities to bring cyber-criminals to justice and aid digital forensic analysts with a technique in their hands for retrieving data out of encrypted storage devices especially HDDs and SSDs.
Key-Words / Index Term
Attack vector, BitLocker, Decryption, Disk, Encryption, Forensics, Hackers, HDD, Lawful, Malicious, SSD, Volume
References
[1] Adi Shamir, Nicko van Someren, "Playing Hide and Seek with Stored Keys", Proceeding, FC `99 Proceedings of the Third International Conference on Financial Cryptography, Springer-Verlag , pp.118-124, 1998.
[2] Brian Kaplan, Matthew Geiger, "RAM is Key: Extracting Disk Encryption Keys From Volatile Memory", pp.1-29, 2007.
[3] Eoghan Casey, Gerasimos J. Stellatos, "The Impact of Full Disk Encryption on Digital Forensics", pp.93-98, 2008.
[4] Sarah Lowman, "The Effect of File and Disk Encryption on Computer Forensics", pp.1-14, 2010.
[5] Christopher Hargreaves, Howard Chivers, "Detecting Hidden Encrypted Volumes", IFIP International Conference on Communications and Multimedia Security, pp.233-244, 2010.
[6] Sasa Mrdovic, Alvin Huseinovic, "Forensic Analysis of Encrypted Volumes Using Hibernation File", 19th Telecommunications Forum (TELFOR) Proceedings of Papers, pp.22-24, 2011.
[7] Eoghan Casey, Geoff Fellows, Matthew Geiger, Gerasimos Stellatos, "The growing impact of full disk encryption on digital forensics", DIGITAL INVESTIGATION 8, pp.129-134, 2011.
[8] Adedayo M. Balogun, Shao Ying Zhu, "Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology", International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4, Issue.5, pp.36-40, 2013.
[9] Mario Piccinelli, Paolo Gubian, "Detecting Hidden Encrypted Volume Files via Statistical Analysis", International Journal of Cyber-Security and Digital Forensics (IJCSDF), Vol. 3, Issue.1, pp.30-37, 2014.
[10] P. Shabana Subair, C. Balan, S. Dija, K.L. Thomas, "Forensic Decryption of FAT BitLocker Volumes", Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C,pp.17-29, 2014.
Citation
Jay Parag Mehta, Digvijaysinh Rathod, "Towards Enablement Of Efficient Forensics Of Encrypted Storage Devices Such As HDDs and SSDs," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.467-473, 2018.