Energy-Aware Frameworks in Cloud Data Centers to Manage Workload and Diminish Power Consumption: A Survey
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.422-432, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.422432
Abstract
Cloud Computing is a service model for enabling convenient, on-demand network access to a shared pool of configurable computing resources which can be rapidly provisioned and released. In cloud data centers various computing resources like servers, network devices and cooling systems which constantly evolve in size and in complexity so it consumes large amount of energy which increase extensive power consumption in data centers. As cloud data center resources are not optimized for their maximum utilization, they consume more power so it needs to consolidate virtual machines (VMs) of servers of data center which helps to optimize the usage of cloud resources hence reduce the energy consumption. By considering the optimized power consumption of various data center resources, the researchers have proposed various methodologies and algorithms to reduce power consumption in servers and network devices. In this paper, we have done insightful study of the modern techniques on data center’s power model of servers, network components also on VM overload/under-load detection, VM selection and VM placement or consolidation of VMs which optimize the utilization of data center’s servers for power model which and reduce energy consumption in data center.
Key-Words / Index Term
Server consolidation, VM Migration, Quality of Service, virtualized data center, Service Level Agreements, Highest Thermostat Setting, Energy efficient, virtual machine placement, migration, dynamic resource allocation, cloud computing, data centers
References
[1] Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhka “Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution”, International Journal of Scientific Research in Computer Science and Engineering,Vol.1, Issue-6, pp.13-16, Dec 2013.
[2] Karthik Kumar and Yung-Hsiang Lu, “Cloud Computing For Mobile Users: Can Offloading Computation Save Energy”, Published by the IEEE Computer Society, 2010.
[3] Nabil Sultan, “Cloud computing for education: A new dawn”, International Journal of Information Management, vol. 30, pp. 109–116, 2010.
[4] Fatma A. Omara, Sherif M. Khattab and Radhya Sahal, “Optimum Resource Allocation of Database in Cloud Computing”, Egyptian Informatics Journal, vol. 15, pp.1–12, 2014.
[5] George Pallis, “Cloud Computing The New Frontier of Internet Computing”, Published by the IEEE Computer Society, 2010.
[6]Saurabh Kumar Garg, Steve Versteeg and Rajkumar Buyya, “A framework for ranking of cloud computing services”, Future Generation Computer Systems, vol. 29, pp. 1012–1023, 2013.
[7]S. Wang, A. Zhou, C. Hsu, X. Xiao and F. Yang, "Provision of Data-Intensive Services Through Energy- and QoS-Aware Virtual Machine Placement in National Cloud Data Centers", IEEE Transactions on Emerging Topics in Computing, vol. 4, no. 2, pp. 290-300, 2016.
[8]M. Abdullahi, M. Ngadi and S. Abdulhamid, "Symbiotic Organism Search optimization based task scheduling in cloud computing environment", Future Generation Computer Systems, vol. 56, pp. 640-650, 2016.
[9] Ajay Jangra and Renu Bala “Spectrum of Cloud Computing Architecture: Adoption and Avoidance Issues”, International Journal of Computing and Business Research, Vol. 2, Issue 2, May 2011.
[10] S. Energy “Report to congress on Server and data center energy efficiency public law 109-431”, public Law Vol. 109, p.431, 2007.
[11] Faiza Fakhar, Barkha Javed, Raihan ur Rasool, Owais Malik and Khurram Zulfiqar, “Software level green computing for large scale systems”, Journal of Cloud Computing: Advances, Systems and Applications, vol. 1, no. 4, 2012.
[12] Robert Basmadjian, Hermann De Meer, Ricardo Lent and Giovanni Giuliani, “Cloud computing and its interest in saving energy: the use case of a private cloud”, Journal of Cloud Computing: Advances, Systems and Applications, vol. 1, no. 5, 2012.
[13] Lingjia Tang, Mary Lou Soffa and Jason Mars, “Directly Characterizing Cross Core Interference through Contention Synthesis”, ACM 2011.
[14] Gaurav Dhiman, Giacomo Marchetti and Tajana Rosing, “vGreen: A System for Energy-Efficient Management of Virtual Machines”, ACM Transactions on Design Automation of Electronic Systems, Vol. 16, No. 1, 2010.
[15] Xiangzhen Kong, ChuangLin, YixinJiang, WeiYan and XiaowenChu, “Efficient dynamic task scheduling in virtualized datacenters with fuzzy prediction”, Journal of Network and Computer Applications, 2010 (Elsevier).
[16]Andreas Merkel, Jan Stoess, Frank Bellosa, “Resource-conscious scheduling for Energy Efficiency on Multicore Processors”, EuroSys `10 Proceedings of the 5th European conference on Computer systems, pp.153-166, 2010.
[17] Sriram Govindan, Jeonghwan Choi, Arjun R. Nath, Amitayu Das, Bhuvan Urgaonkar, Member, Anand Sivasubramaniam, “Xen and Co.: Communication-Aware CPU Management in Consolidated Xen-Based Hosting Platforms”, IEEE Transactions On Computers, vol. 58, no. 8, 2009.
[18] George Kousiourisa, Tommaso Cucinottab and Theodora Varvarigoua, “The effects of scheduling, workload type and consolidation scenarios on virtual machine performance and their prediction through optimized artificial neural networks”, The Journal of Systems and Software, vol. 84, pp. 1270– 1291, 2011.
[19] Corentin Dupont, Thomas Schulze, Giovanni Giuliani, Andrey Somov and Fabien Hermenier, “An Energy Aware Framework for Virtual Machine Placement in Cloud Federated Data Centres”, ACM, 2012.
[20]S.Greenberg, E. Mills,B. Tschudi, P. Rumsey and B.Myatt, “Best Practices for Data Centers : Lessons Learned from Benchmarking 22 Data Centers”, Proceedings of the ACEEE Summer Study on Energy Efficiency in Buildings in Asilomar, CA. ACEEE, August, vol. 3, pp. 76–87256–259, Dec. 2013, 2006.
[21] C.H. Hsu, K. Slagter, S.C. Chen, and Y.C. Chung, “Optimizing Energy Consumption with Task Consolidation in Clouds”, Information Sciences, 2012.
[22] D. Meisner, B. Gold, and T. Wenisch, “PowerNap: eliminating server idle power”, ACM SIGPLAN Notices, vol. 44, no. 3, pp. 205–216, 2009.
[23] T. Horvath, T. Abdelzaher, K. Skadron, and X. Liu, “Dynamic voltage scaling in multitier web servers with end-to-end delay control”, Computers, IEEE Transactions on, vol. 56, no. 4, pp. 444– 458, 2007.
[24] Lin Wang, Fa Zhang, Jordi Arjona Aroca and Athanasios V. Vasilakos “GreenDCN: a General Framework for Achieving Energy Efficiency in Data Center Networks”, IEEE Journal on selected areas in communications, January 2014.
[25] Mingwei Xua, Yunfei Shang and Dan Lia, Xin Wang “Greening Data Center Networks with Throughput-guaranteed Power-aware Routing”, ACM SIGCOMM Workshop on Green Networking 2010.
[26] J. F. Botero, X. Hesselbach, M. Duelli and D. Schlosser, A. Fischer, and H. De Meer, "Energy efficient virtual network embedding,”, Communications Letter, IEEE, vol. 16, pp. 756-759, 2012.
[27] Tran Manh Nam, Nguyen Huu Thanh and Doan Anh Tuan,”Green data center using centralized power-management of network and servers” International Conference on Electronics, Information, and Communications (ICEIC), IEEE pp. 1- 4, 2016.
[28] W. Fang, X. Liang, S. Li, L. Chiaraviglio, and N. Xiong “VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers", Computer Networks, 2012.
[29] A. Beloglazov, "Energy-Efficient Management of Virtual Machines in Data Centers for Cloud Computing", Ph.D. thesis, The University of Melbourne, 2013.
[30] A. Beloglazov and R. Buyya, "OpenStack Neat: A Framework for Dynamic and Energy-Efficient Consolidation of Virtual Machines in OpenStack Clouds”, Concurrency and Computation: Practice and Experience (CCPE), pp. 32–36, 2014.
[31] A. Beloglazov and R. Buyya, "Optimal Online Deterministic Algorithms and Adaptive Heuristics for Energy and Performance Efficient Dynamic Consolidation of Virtual Machines in Cloud Data Centers", Concurrency and Computation: Practice and Experience (CCPE), vol. 24, no. 13, pp. 1397–1420, 2012.
[32] W. Cleveland and C. Loader, "Smoothing by Local Regression: Principles and Methods", Statistical Theory and Computational Aspects of Smoothing, 1996.
[33] W. Cleveland, “Robust Locally Weighted Regression and Smoothing Scatterplots”, Journal of the American Statistical Association, 1979.
[34]] A. Singh and S. Kinger, “Virtual Machine Migration Policies in Clouds”, International Journal of Science Research, vol. 2, no. 5, pp. 364–367, 2013.
[35] A. Beloglazov and R. Buyya, “Adaptive Threshold-Based Approach for Energy-Efficient Consolidation of Virtual Machines in Cloud Data Centers”, Proceedings of the 8th International Workshop on Middleware for Grid, Clouds and E-science, Bangalore, India, 2010.
[36] A.verma, G. Dasgupta, T. Nayak and R.Kothar “Server Workload Analysis for Power Minimization Using Consolidation”, Proc. the 2009 USENIX Annual Technical Conference, San Diego, USA, 2009.
[37] S. Masoumzadeh and H. Hlavacs “Integrating VM Selection Criteria in Distributed Dynamic VM Consolidation Using Fuzzy Q-Learning”, Proc. the 9th International Conference on Network and Service Management (CNSM 2013), pp. 332– 338, Oct. 2013.
[38] A. Beloglazov, J. Abawajy and R. Buyya “Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing”, Future Generation Computer Systems, vol. 28, no. 5, pp. 755–768, 2012.
[39] P. Sayeedkhan, “Virtual Machine Placement Based on Disk I/O Load in Cloud”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), pp. 5477-5479, 2014.
[40] Y. Yu and Y. Gao, “Constraint Programming-Based Virtual Machines Placement Algorithm in Datacenter”, Intelligent Information Processing, pp. 295–304, 2012.
[41] B. B. Nandi, A. Banerjee, S. C. Ghosh and N. Banerjee, “Stochastic VM Multiplexing for Datacenter Consolidation”, IEEE Ninth International Conference on Services Computing, pp. 114–121, Jun. 2012.
[42] G. Wu, M. Tang, Y. Tian and W. Li “Energy-efficient virtual machine placement in data centers by genetic algorithm”, Neural Information Processing, pp. 315–323, 2012.
[43] Mi, H., Wang, H., Yin, G., Zhou, Y., Shi, D. and Yuan, L “Online self-reconfiguration with performance guarantee for energy efficient large-scale cloud computing data centers”, In Services Computing (SCC), IEEE International Conference on pp. 514-521, 2010
[44] Gaurav Chadha, Scott Mahlke and Satish Narayanasamy, “When Less Is MOre (LIMO): Controlled Parallelism for Improved Efficiency”, ACM, 2012.
[45] Jordi Guitart, David Carrera, Vicenc Beltran, Jordi Torres and Eduard Ayguade, “Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms”, Computer Networks, vol. 52,pp. 1390–1409, 2008.
[46] Anton Beloglazov, Jemal Abawajyb and Rajkumar Buyya, “Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing”, Future Generation Computer Systems, vol. 28, pp. 755–768, 2012.
[47] Nadjia Kara, Mbarka Soualhia, Fatna Belqasmi, Christian Azar and Roch Glitho, “Genetic-based Algorithms for Resource Management in Virtualized IVR Applications”, Journal of Cloud Computing, vol. 3, no.15, 2014.
[48] F. Farahnakian, T. Pahikkala, P. Liljeberg, and J. Plosila, “Energy Aware Consolidation Algorithm Based on K-Nearest Neighbor Regression for Cloud Data Centers”, IEEE/ACM 6th Int. Conf. Util. Cloud Comput., pp..
[49] Y. Wu, M. Tang, and W. Fraser, “A simulated annealing algorithm for energy efficient virtual machine placement”, IEEE Int. Conf. Syst. Man, Cybern., pp. 1245–1250, Oct. 2012.
[50] Yu Huanle and Shi.Weifeng “An OpenStack-based resource optimization scheduling framework”, IEEE 6th International Symposium on Computational Intelligence and Design, Oct. 2013.
[51] Moreno Marzolla and Ozalp Babaoglu “Server Consolidation in Clouds through Gossiping” IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, June 2011.
[52]N. Kord and H. Haghighi, “An energy-efficient approach for virtual machine placement in cloud based data centers”, 5th Conf. Inf. Knowl. Technol., pp. 44–49, May 2013.
[53]S. S. Masoumzadeh and H. Hlavacs, “Integrating VM selection criteria in distributed dynamic VM consolidation using Fuzzy Q-Learning”, Proc. 9th Int. Conf. Netw. Serv. Manag. (CNSM 2013), pp. 332–338, Oct. 2013.
[54] F. Farahnakian, P. Liljeberg, and J. Plosila, “Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning”, 22nd Euromicro Int. Conf. Parallel, Distrib. Network-Based Process. pp. 500–507, Feb. 2014.
[55] Yufan Ho “Server Consolidation Algorithms with Bounded Migration Cost and Performance Guarantees in Cloud Computing” in Fourth IEEE International Conference on Utility and Cloud Computing pp. 155-161, 2011.
[56] Zhe Huang, Danny H.K.”A Virtual Machine Consolidation Framework for MapReduce Enabled Computing Clouds”, ITC 2012.
[57] Z. Zhou, Z. Hu, J. Yu, J. Abawajy and M. Chowdhury, “Energy-efficient virtual machine consolidation algorithm in cloud data centers”, Journal of Central South University, vol. 24, no. 10, pp. 2331-2341, 2017.
[58]X. Li, P. Garraghan, X. Jiang, Z. Wu and J. Xu, “Holistic Virtual Machine Scheduling in Cloud Datacenters towards Minimizing Total Energy”, IEEE Transactions on Parallel and Distributed Systems, vol. 29, no. 6, pp. 1317-1331, 2018.
[59] H. Duan, C. Chen, G. Min and Y. Wu “Energy-aware scheduling of virtual machines in heterogeneous cloud computing systems”, Future Generation Computer Systems, vol. 74, pp. 142-150, 2017.
[60] F. Rossi, M. Xavier, C. De Rose, R. Calheiros and R. Buyya, “E-eco: Performance-aware energy-efficient cloud data center orchestration”, Journal of Network and Computer Applications, vol. 78, pp. 83-96, 2017.
[61]W. Zhu, Y. Zhuang and L. Zhang “A three-dimensional virtual resource scheduling method for energy saving in cloud computing”, Future Generation Computer Systems, vol. 69, pp. 66-74, 2017.
[62] M. Khoshkholghi, M. Derahman, A. Abdullah, S. Subramaniam and M. Othman, “Energy-Efficient Algorithms for Dynamic Virtual Machine Consolidation in Cloud Data Centers”, IEEE Access, vol. 5, pp. 10709-10722, 2017.
[63] Boominathan Perumal, Aramudhan Murugaiyan “A Firefly Colony and Its Fuzzy Approach for Server Consolidation and Virtual Machine Placement in Cloud Datacenters”, Hindawi Publishing Corporation Advances in Fuzzy Systems, February 2016.
[64] Monil and Mohammad Rahman “Fuzzy logic-based VM selection strategy for cloud environment”, International Journal Cloud Computing, Vol. 6, No. 2, 2017.
[65] Mohammad Alaul Haque Monil, Rashedur M. Rahman “VM consolidation approach based on heuristics, fuzzy logic, and migration control”, Journal of Cloud Computing: Advances, Systems Applications, pp.5-8, 2016.
[66] Yongqiang Gao, Haibing Guan, Zhengwei Qi, Yang Houb and Liang Liu “A multi-objective ant colony system algorithm for virtual machine placement in cloud computing”, Journal of Computer and System Sciences , pp.1230–1242 ,March 2013.
[67] Seyed Ebrahim Dashti, Amir Masoud Rahmani “Dynamic VMs placement for energy efficiency by PSO in cloud computing”, Journal of Experimental & Theoretical Artificial Intelligence, 28:1-2, pp. 97-112.
[68] Shangguang Wang, “Particle Swarm Optimization for Energy-Aware Virtual Machine Placement Optimization in Virtualized Data Centres”, published in IEEE ICPADS October 2013.
Citation
Rajesh P. Patel, Ramji Makawana , "Energy-Aware Frameworks in Cloud Data Centers to Manage Workload and Diminish Power Consumption: A Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.422-432, 2018.
A ProperFit Virtual Machine Migration Approach for the Load Balancing in Cloud
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.433-436, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.433436
Abstract
With the invention of the cloud computing, the utilization of the physical resources has improved drastically. The main technology that enable the cloud computing is virtualization which allows to create several virtual machine (VM)onto the single physical machine (PM). It increased the utilization of the physical resources because single hardware resources are shared by the several users. Although virtualization technique optimize the server utilization but add new issue named load balancing that need to addressed for the effective utilization of the physical resource and maintain the quality of services (QoS). To deal with the load balancing VM migration approach is used which permit to travel the VM from physical machine (host) to another. Three stages are engaged with the relocation procedure i.e., source PM choice, VM selection and the last step is target PM selection. Plenty of work on the load balancing in cloud are presented in the last few decades and mostly they are differ in the VM selection and VM placement polices. After the study of previous work on the VM migration it can be says that choosing an appropriate VM is a non-trival task and the performance of the load balancing approach is mainly depends on the appropriate VM selection polices. In this paper we select the three different types of virtual machine for the migration and then placed it to the physical machine where the load on the physical machine is between 20 to 50. CloudSim simulator is used to evaluate the performance of the physical.
Key-Words / Index Term
Migration, energy efficient, virtualization, VM selection, VM placement, SLA violation
References
[1] R. Buyya et al., “Market Oriented cloud computing: vision, hype and reality for delivering it services as computing utilities,” CoRR, 2008.
[2] P. Mell et al, “NIST definition of cloud computing,” vol. 15, October 2009.
[3] Introduction to Cloud Computing, available at http://www.webopedia.com/TERM/C/cloud_computing.html
[4] Rajeev Kumar Gupta and R.K. Pateriya,” Balance Resource Utilization (BRU) Approach for the Dynamic Load Balancing in Cloud Environment by using AR Prediction Model ”, Journal of Organizational and End User Computing (JOEUC), Volume 29, Issue 4, Article 2, 2017.
[5] A. Rabiatul et al., "Virtual Machine Migration Implementation in Load Balancing for Cloud Computing", six IEEE international conference, 2014.
[6] A Jain et al., “A Threshold Band Based Model For Automatic Load Balancing in Cloud Environment”, in proc. of IEEE International Conference on Cloud Computing in Emerging Markets, pp 1-7, 2013.
[7] A. Awad et al., " Enhanced Particle Swarm Optimization For Task Scheduling In Cloud Computing Environments", International Conference on Communication, Management and Information Technology (ICCMIT), ScienceDirect, pp. 920 – 929, 2015.
[8] G.Shobana et al., "Nature Inspired Preemptive Task Scheduling for Load Balancing in Cloud Datacenter", International Conference on Information Communication and Embedded Systems (ICICES), pp. 1-6, 2014.
[9] R. Addawiyah et al., "Virtual Machine Migration Implementation in Load Balancing for Cloud Computing", six IEEE international conference, 2014.
[10] Lei Xu et al., "An Integrated Dynamic Resource Scheduling Framework in On-Demand Clouds", journal of Information Science and Engineering, pp. 1-8, 2015.
[11] Y. Fang, F. Wang, and J. Ge, “A Task Scheduling Algorithm Based on Load Balancing in Cloud Computing”, Web Information Systems and Mining, Lecture Notes in Computer Science, Vol.63, pages 271-277, 2010.
[12] R. Calheiros, R Ranjan, César A. F. De Rose, R. Buyya, “ CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services” , 2011.
[13] B. Wickremasingh et al.. "A CloudSim-based Visual Modeller for Analyzing Cloud Computing Environments and Applications”, in: Proceedings 24th International Conference on Advanced Information Networking and Applications (AI NA), 2010.
Citation
Damodar Tiwari, Shailendra Singh, Sanjeev Sharma, "A ProperFit Virtual Machine Migration Approach for the Load Balancing in Cloud," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.433-436, 2018.
A Review of Different Techniques Utilized for Crop Yield Prediction
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.437-442, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.437442
Abstract
In India, farmers are not getting expected crop yield from their productions. Crop production mostly depends on weather conditions and some statistical methodologies. To get higher crop production yield, farmers sometimes need advices for predicting and analyzing future crop production. This helps farmers to produce a crop with maximum yield. Such methods will be helpful for farmers and government to make a better decision to increase crop production. In this paper present a review on crop yield prediction (CYP) with different data mining (DM) techniques used to evaluate and predict the problem lead to increase CYP. The result analysis is performed on root mean square error (RMSE) and peak signal noise ratio (PSNR).
Key-Words / Index Term
RMSE, ANFIS, Data mining, Crop Yield, PSNR
References
[1] B Vishnu Vardhan and D. Ramesh, O Subhash Chander Goud “ Density Based Clustering Technique on Crop Yield Prediction” International Journal of Electronics and Electrical Engineering Vol. 2, No. 1, March, 2014
[2] Naushina Farheen Imam Shaikh , Prof. R. V. Argiddi “Annual Crop Yield Prediction and Recommend Planting of Different Crops by Using Data Mining Technique” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 10, October 2016
[3] Chapman P. Gleason Large Area Yield Estimation/ Forecasting Using Plantprocess Models By Chapman P. Gleason For Presentation At The 1982 Winter Meeting Americansociety Of Agricultural Engineers Palmer House, Chicago, Illinois December R 14-17, 1982.
[4] Jiawei Han, Micheline Kamber, Jian Pie, “Data Mining Concepts and Techniques”, Morgan Kaufmann, ASIN B0058NBJ2M
[5] Raorane A.A., Kulkarni R.V. “Data Mining: An effective tool for yield estimation in the agricultural sector” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 1, Issue 2, July – August 2012
[6] Applying Naive Bayes Data Mining Technique for Classification of Agricultural Land Soils P.Bhargavi, Dr.S.Jyothi, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009
[7] SVM- Muller, K., et al. "An introduction to kernel-based learning algorithms.” Neural Network IEEE transactions on 12.2 (2001): 181-201
[8] Aliyu Muazu, Azmi Yahya, W.I.W. Ishak, S. Khairunniza-Bejo. Yield prediction modeling using data envelopment analysis methodology for direct seeding, wetland paddy cultivation. Agriculture and Agricultural Science Procedia. 2014; 2, 181-190.
[9] K. Menaka , N.Yuvaraj “A survey on crop yield prediction models” Indian Journal of Innovations and Developments Vol 5(12), October, 2016.
[10] Kadir, M. K. A., Ayob, M. Z., & Miniappan, N. (2014, August). Wheat yield prediction: Artificial neural network based approach. In Engineering Technology and Technopreneuship (ICE2T), 2014 4th International Conference on (pp. 161-165). IEEE.
[11] Keong, Y. K., & Keng, W. M. (2012). Statistical modeling of weather-based yield forecasting for young mature oil palm. APCBEE Procedia, 4, 58-65.
[12] Khoshnevisan, B., Rafiee, S., Omid, M., & Mousazadeh, H. (2014). Development of an intelligent system based on ANFIS for predicting wheat grain yield on the basis of energy inputs. Information processing in agriculture, 1(1), 14-22.
[13] M. Gunasundari Ananthara, Dr. T. Arunkumar and Ms. R. Hemavathy “CRY – An improved Crop Yield Prediction model using Bee Hive Clustering Approach for Agricultural data sets” International Conference on Pattern Recognition, Informatics and Mobile Engineering, IEEE, 2013.
[14] Monali Paul, Santosh K. Vishwakarma, Ashok Verma “Analysis of Soil Behaviour and Prediction of Crop Yield using Data Mining Approach” International Conference on Computational Intelligence and Communication Networks, IEEE-2015.
[15] Niketa Gandhi, Owaiz Petkar and Leisa J. Armstrong “Rice Crop Yield Prediction Using Artificial Neural Networks” International Conference on Technological Innovations in ICT For Agriculture and Rural Development (TIAR 2016), IEEE.
[16] Aakunuri Manjula, Dr.G .Narsimha “XCYPF: A Flexible and Extensible Framework for Agricultural Crop Yield Prediction” 9th International Conference on Intelligent Systems and Control (ISCO) IEEE-2015
[17] E.T. Papageorgioua,*, A.T. Markinosb, T.A. Gemtosb “ Fuzzy cognitive map based approach for predicting yield in cotton crop production as a basis for decision support system in precision agriculture application. Elsevier-2011, PP 3643-3657.
[18] Ashwani Kumar Kushwaha, SwetaBhattachrya “Crop yield prediction using Agro Algorithm in Hadoop” International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 5, No2, April 2015
[19] S. Poongodi and M. Rajesh Babu “Prediction of Crop Production using Improved C4.5 with ANFIS Classifier” International Journal of Control Theory and Applications volume 10 , Number 21 , 2017.
[20] Sellam,V., Poovammal, E., “Prediction of Crop Yield using Regression Analysis”, Indian Journal of Science and Technology, Vol. 9(38), pp.1- 5, 2016.
[21] Fathima, G.N., Geetha, R., “Agriculture Crop Pattern Using Data Mining Techniques”, International Journal of Advanced Research in Computer Science and Engineering, Vol. 4, Issue 5, pp.781-786, 2014.
[22] R.Kalpana,N.Shanti and S.Arumugam ,“A survey on data mining techniques in Agriculture”,International Journal of advances in Computer Science and Technology, vol. 3, No. 8,426- 431, 2014
[23] G.N.Fatima,R.Geeta ,“Agriculture crop pattern using data mining techniques”, International Journal of Advanced Research in in Computer Science and Software Engineering, vol. 4, No. 5,781-786 , 2014 .
[24] Aditya Shastry , Sanjay H A and Madhura Hegde, “A Parameter based ANFIS Model for crop yield prediction”, IACC 2015 IEEE,pp 253-257.
[25] K. Verheyen, D. Adriaens, M. Hermy, and S. Deckers, “High resolution continuous soil classification using morphological soil profiledescriptions”, Geoderma, vol. 101, pp. 31-48, 2001.
[26] Veenadhari, S. 2007, “Crop productivity mapping based on decision tree and Bayesian classification”. Unpublished M.Tech Thesis submittedto Makhanlal Chaturvedi National University of Journalism and Communication, Bhopal.
[27] Sanjay D. Sawaitul, Prof. K.P. Wagh, Dr. P.N. Chatur, “Classification and Prediction of Future Weather by using Back Propagation Algorithm-An Approach”, International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Issue 1, January 2012, pp. 110-113.
[28] V.R.Thakare and H.M. Baradkar. “Fuzzy System forMaximum Yield from Crops”, International Journal ofApplied Information Systems, pp. 4-9 , March 2013.
[29] Hemageetha, N., “A survey on application of data mining techniques to analyze the soil for agricultural purpose”, 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp.3112-3117, 2016.
[30] Niketa Gandhi, Owaiz Petkar, Leisa J. Armstrong,” PredictingRice Crop Yield Using Bayesian Networks”, ICACCI,IEEE 2016,pp 795-799.
[31] Umid Kumar Dey, Abdullah Hasan Masud, Mohammed Nazim Uddin, “Rice Yield Prediction Model Using Data Mining”, ECCE, IEEE 2017, pp 321-326.
Citation
Rabina Dayal, Arun Kumar Yadav, "A Review of Different Techniques Utilized for Crop Yield Prediction," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.437-442, 2018.
Prevention of Power Theft Using Concept of Multifunction Meter and PLC
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.443-447, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.443447
Abstract
In the system and networks, abnormal behavior is detected by anomaly-based IDS (Intrusion Detection System). If the working of a computer system is different from normal working is considered as an attack. The difference of comparison relies on traffic rate, a variety of packets for every protocol etc. Malicious traffic or data on a system is detected by intrusion detection process. To detect illegal, suspicious and malicious information and data, IDS can be a part of the software or a device. First is Detection of an attack then using different method to stop, Prevent an attack and disaster is the user’s highest priority. Anomaly-based IDS satisfy their requirement and demand.In present scenario electricity theft isa major hurdle in front of government. This problem affects Indian economy. The loss on quantity of theft is mirrored in the electricity company.People are affording more charges because intruders steal electricity by many ways.
Key-Words / Index Term
Intrusion detection system, Anomaly based system, Electricity theft, Intruders
References
[1]. D. Alahakoon and Xinghuo Yu, “Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey” , IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 1, FEBRUARY 2016 .
[2]. Q. Sun, H. Li, Z. Ma, “A Comprehensive Review of Smart Energy Meters in Intelligent Energy Networks” , January 2015.
[3]. B.Saikiran, R.Hariharan, “Review of methods of power theft in Power System” ,International Journal of Scientific & Engineering Research, Volume 5, Issue 11, November-2014.
[4]. N. Mohammad , A. Barua and M.Arafat,“ A Smart Prepaid Energy Metering System to Control Electricity Theft”, 2013 International Conference on Power, Energy and Control (ICPEC).
[5]. S. McLaughlin, D. Podkuiko, and P. McDaniel, “Energy Theft in the Advanced Metering Infrastructure”, International Conference on Critical Information Infrastructures Security, 2016.
[6]. R. Berthier, W. H. Sanders, and H. Khurana, “Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions” , 2010 First IEEE International Conference on Smart Grid Communications.
[7]. Victor C. M. Leung, “Electricity Theft Detection in AMI Using Customers` Consumption Patterns”, IEEE Transactions on Smart Grid • May 2015.
[8]. J. Nagi, K. S. Yap, S. K. Tiong,” Detection of Abnormalities and Electricity Theft using Genetic Support Vector Machines”, IEEE paper on march 1, 2009.
[9]. Thomas B.Smith, “Electricity theft: a comparative analysis” Elesvier 2004.
[10]. R.Rashed, M.AlanFung, F.Mohammadi, K.Raahemifar, “A survey on Advanced Metering Infrastructure”,International Journal of Electrical Power & Energy Systems, Volume 63, December 2014.
[11]. A. Rial and G. Danezis, “Privacy-Preserving Smart Metering”, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011.
[12]. K. Laeeq, W.Laeeq, “A comparative study among possible wireless technologies for smart grid communication networks”, In: First international conference on modern communication & computing technologies; 2014.
[13]. R.Kalaivani, M.Gowthami,S.Savitha, N.Karthick, S.Mohanvel,” GSM Based Electricity Theft Identification in Distribution Systems”, International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 10- Feb 2014.
Citation
Uma Soni, Uma Kumari, "Prevention of Power Theft Using Concept of Multifunction Meter and PLC," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.443-447, 2018.
An image Denoising Method Based On Multi Resulation Bilateral Filter
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.448-452, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.448452
Abstract
Bilateral filter is a nonlinear filter and the method image edge information mainly in filtering considers both gray level similarities and geometric closeness of the neighboring pixel without smoothing edges. Based on the study and research of bilateral filter found of the bilateral filter is well suited to image denoising. The bilateral filter is appropriate for color and grey picture filtering system with strong performance. It has appeared to be a successful picture denoising procedure. We can use it to the blocking artifacts reduce. A vital issue with the program with the bilateral filter is the choice of the channel parameters which influence the outcomes essentially. Other hand research interest of bilateral filter is increasing speed of the calculations rate. There are three main efforts of this dissertation. First I will discuss about empirical study of the optimal selection of parameter in image denoising. Here I proposed a development of multi resolution bilateral filter where bilateral filter is used to the low frequency sub-band of a signal decomposed through wavelet filter. Multi resolution bilateral filter combined with wavelet thresholding to develop a new image denoising development which finished up to be very efficient in noise eliminating in real noisy image. Second contribution is a flexible method to reduce compression artifacts for avoid over smoothing texture areas and to effectively eliminate blocking and performing artifacts. In this research first detected the block boundary discontinuities and texture regions these are then use to manage the spatial and strength parameters of bilateral filter. The analyze outcome confirm that the suggested method can improve the quality of renewed image far better than the most preferred bilateral filter. Third part is the development of the fast bilateral filter which is convenience for combination of multiple windows to estimate the Gaussian filter more accurately.
Key-Words / Index Term
Bilateral Filter; Image Denoising; Multi Resolution
References
[1] D. L. Donoho and I. M. Johnstone, "Ideal spatial adaptation by wavelet shrinkage," Biometrika, vol. 81, no. 3, pp. 425-455, 1994.
[2] D. L. Donoho, I. M. Johnstone, G. Kerkyacharian, and D. Picard, "Wavelet shrinkage: Asymptopia?," J. Roy. Statist. Assoc. B, vol. 57, no. 2, pp. 301-369, 1995.
[3] S. G. Chang, B. Yu, and M. Vetterli, "Adaptive wavelet thresholding for image denoising and compression," IEEE Trans. Image Process., vol. 9, no. 9, pp. 1532-1546, Sep. 2000.
[4] J. Portilla, V. Strela, M. J. Wainwright, and E. P. Simoncelli, "Image denoising using scale mixtures of gaussians in the wavelet domain," IEEE Trans. Image Process., vol. 12, no. 11, pp. 1338-1351, Nov. 2003.
[5] A. Pizurica and W. Philips, "Estimating the probability of the presence of a signal of interest in multiresolution single- and multiband image denoising," IEEE Trans. Image Process., vol. 15, no. 3, pp. 654-665, Mar. 2006.
[6] F. Luisier, T. Blu, and M. Unser, "A new sure approach to image de-noising: Inter-scale orthonormal wavelet thresholding," IEEE Trans. Image Process., vol. 16, no. 3, pp. 593-606, Mar. 2007.
[7] S. Lyu and E. P. Simoncelli, "Statistical modeling of images with fields of gaussian scale mixtures," in Advances in Neural Information Pro-cessing Systems 19, B. Sch?lkopf, J. Platt, and T. Hoffman, Eds.
[8] M. Elad and M. Aharon, "Image denoising via learned dictionaries and sparse representation," presented at the IEEE Computer Vision and Pat-tern Recognition, Jun. 2006.
[9] M. Elad and M. Aharon, "Image denoising via sparse and redundant representations over learned dictionaries," IEEE Trans. Image Process., vol. 15, no. 12, pp. 3736-3745, Dec. 2006.
[10] J. Mairal, M. Elad, and G. Sapiro, "Sparse representation for color image restoration," IEEE Trans. Image Process., vol. 17, no. 1, pp. 53-69, Jan. 2008.
[11] K. Dabov, V. Katkovnik, A. Foi, and K. Egiazarian, "Image denoising with block-matching and 3D filtering," presented at the SPIE Electronic Imaging: Algorithms and Systems V, Jan. 2006.
[12] K. Dabov, A. Foi, V. Katkovnik, and K. Egiazarian, "Image denoising by sparse 3D transform-domain collaborative filtering," IEEE Trans. Image Process., vol. 16, no. 8, pp. 2080-2095, Aug. 2007.
[13] K. Hirakawa and T. W. Parks, "Image denoising using total least squares," IEEE Trans. Image Process., vol. 15, no. 9, pp. 2730-2742, Sep. 2006.
[14] C. Tomasi and R. Manduchi, "Bilateral filtering for gray and color im-ages," in Proc. Int. Conf. Computer Vision, 1998, pp. 839-846.
[15] J. S. Lee, "Digital image smoothing and the sigma filter," CVGIP: Graph. Models and Image Process., vol. 24, no. 2, pp. 255-269, Nov. 1983.
[16] L. Yaroslavsky, Digital Picture Processing-An Introduction. New York: Springer Verlag, 1985.
[17] S. M. Smith and J. M. Brady, "Susan-A new approach to low level image processing," Int. J. Comput. Vis., vol. 23, pp. 45-78, 1997.
[18] M. Elad, "On the origin of the bilateral filter and ways to improve it," IEEE Trans. Image Process., vol. 11, no. 10, pp. 1141-1151, Oct. 2002.
[19] D. Barash, "A fundamental relationship between bilateral filtering, adaptive smoothing, and the nonlinear diffusion equation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 6, pp. 844-847, Jun. 2002.
[20] A. Buades, B. Coll, and J. Morel, "Neighborhood filters and PDE`s," Numer. Math., vol. 105, pp. 1-34, 2006.
[21] N. Sochen, R. Kimmel, and R. Malladi, "A general framework for low level vision," IEEE Trans. Image Process., vol. 7, no. 3, pp. 310-318, Mar. 1998.
[22] N. Sochen, R. Kimmel, and A. M. Bruckstein, "Diffusions and confu-sions in signal and image processing," J. Math. Imag. Vis., vol. 14, no. 3, pp. 195-209, 2001.
[23] F. Durand and J. Dorsey, "Fast bilateral filtering for the display of highdynamic-range images," in Proc. SIGGRAPH, 2002, pp. 257-266.
[24] E. Eisemann and F. Durand, "Flash photography enhancement via intrinsic relighting," in Proc. SIGGRAPH, 2004, pp. 673-678.
[25] E. P. Bennett and L. McMillan, "Video enhancement using per-pixel virtual exposures," ACM Trans. Graph., vol. 24, no. 3, pp. 845-852,2005.
[26] R. Fattal, M. Agrawala, and S. Rusinkiewicz, "Multiscale shape and detail enhancement from multi-light image collections," ACM Trans. Graph., vol. 26, no. 3, Aug. 2007.
[27] Color Test Images [Online]. Available: http://decsai.ugr.es/~javier/denoise April 2008
[28] S. Acton, "Multigrid anisotropic diffusion," IEEE Trans. Image Process., vol. 7, no. 3, pp. 280-291, Mar. 1998.
[29] S. Paris and F. Durand, "A fast approximation of the bilateral filter using a signal processing approach," in Proc. Eur. Conf. Computer Vision, 2006, pp. 568-580.
Citation
Md Shaiful Islam Babu, Kh Shaikh Ahmed, Md Samrat Ali Abu Kawser, Ajkia Zaman Juthi, "An image Denoising Method Based On Multi Resulation Bilateral Filter," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.448-452, 2018.
A Bird View on Deep Learning Facial Expression Recognition Approaches for Thermal and Infrared Images
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.453-459, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.453459
Abstract
With the capability to self-learn and succeed to achieve favourable results in various classification problem, deep learning techniques are increasingly used for Automatic Facial Expression Recognition (AFER). In this paper, we provide brief survey on deep learning technique particularly Convolutional Neural Networks (CNN) for Facial Expression Recognition (FER) and newly introduced Infrared based FER dataset. This review is focused on various CNN techniques applied in almost last half decade for FER on Infrared and Visible light images. There are certain unique advantages of using thermal and infrared images which can make FER techniques robust. Paper describes the standard flow of deep facial expression recognition and suggested methods based on research conducted specifically in this area. Later, review of existing novel deep neural networks and implementations for still images and video-based FER for Infrared Images is provided which subsequently follows glimpses of available well-known datasets. Since all types of cameras experience price reduction over the years, in near future integration and usage of such cameras would be common also because of its illumination invariant characteristic. It becomes evident at the end of the paper that there is a definite scope of developing promising and robust FER with use of Infrared and Thermal images.
Key-Words / Index Term
Convolution Neural Networks, Deep Learning, Facial Expression Recognition, Infrared Images
References
[1] P. Ekman ; W.V Friesen,. “Facial Action Coding System: Investigator’s Guide”, 1st ed.; Consulting Psychologists Press: Palo Alto, CA, USA, pp. 1–15, 1978., ISBN 9993626619.
[2] D. Matsumoto, “More evidence for the universality of a contempt expression,” Motivation and Emotion, vol.16, no.4, pp.363–368,1992.
[3] Happy, S.L.; George, A.; Routray, “ A real time facial expression classification system using local binary patterns”. In Proceedings of the 4th International Conference on Intelligent Human Computer Interaction, Kharagpur, India, pp. 1–5, 2012.
[4] G. Zhao and M. Pietikainen, “Dynamic texture recognition using local binary patterns with an application to facial expressions,” IEEE transactions on pattern analysis and machine intelligence, vol. 29, no. 6, pp. 915–928, 2007.
[5] A.S. Mali, A.A. Kenjale, P.M. Ghatage, A.G. Deshpande, "Mood based Music System", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.27-30, 2018
[6] S. Ioannou, V. Gallese, and A. Merla, “Thermal infrared imaging in psychophysiology: potentialities and limits,” Psychophysiology, vol. 51, no. 10, pp. 951–963, 2014.
[7] M. Kopaczka, K. Acar, and D. Merhof, “Robust facial landmark detection and face tracking in thermal infrared images using active appearance models,” in International Conference on Computer Vision Theory and Applications (VISAPP), Rome, Italy, pp. 150–158, February 2016
[8] S. He, S. Wang, W. Lan, H. Fu and Q. Ji, "Facial Expression Recognition Using Deep Boltzmann Machine from Thermal Infrared Images," 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction, Geneva, pp. 239-244, 2013.
[9] P. Viola and M. Jones, "Rapid object detection using a boosted cascade of simple features," Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, Kauai, HI, USA, pp. I-I. 2001.
[10] Mollahosseini, D. Chan, and M. H. Mahoor, “Going deeper in facial expression recognition using deep neural networks,” in Applications of Computer Vision (WACV), 2016 IEEE Winter Conference on. IEEE, pp. 1–10,2016.
[11] H. Jung, S. Lee, J. Yim, S. Park, and J. Kim, “Joint fine-tuning in deep neural networks for facial expression recognition,” in Computer Vision (ICCV), 2015 IEEE International Conference on. IEEE, pp. 2983–2991, 2015.
[12] V. Kazemi and J. Sullivan, "One millisecond face alignment with an ensemble of regression trees," IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, pp. 1867-1874, 2014.
[13] P. Simard, D. Steinkraus, J. C. Platt,” Best practices for convolutional neural networks applied to visual document analysis”, in Proceedings Seventh International Conference on Document Analysis and Recognition, pp. 958–963, 2003.
[14] A.T.Lopes, E.de Aguiar, A.F.DeSouza, and T.Oliveira-Santos,‘‘Facial expression recognition with convolutional neural networks: Coping with few data and the training sample order,’’ Pattern Recognition., vol. 61, pp. 610–628, Jan. 2017.
[15] D. A. Pitaloka, A. Wulandari, T. Basaruddin, and D. Y. Liliana, “Enhancing cnn with preprocessing stage in automatic emotion recognition,” Procedia Computer Science, vol. 116, pp. 523–529, 2017.
[16] W. Li, M. Li, Z. Su, and Z. Zhu, “A deep-learning approach to facial expression recognition with candid images,” in Machine Vision Applications (MVA), 2015 14th IAPR International Conference on. IEEE, pp. 279–282,2015.
[17] Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, pp. 1097–1105, 2012.
[18] Maas, Andrew L.. “Rectifier Nonlinearities Improve Neural Network Acoustic Models.” (2013).
[19] K. He, X. Zhang, S. Ren, and J. Sun, “Delving deep into rectifiers: Surpassing human-level performance on imagenet classification,” in Proceedings of the IEEE international conference on computer vision, pp. 1026–1034, 2015.
[20] S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network training by reducing internal covariate shift,” arXiv preprint arXiv:1502.03167, 2015
[21] G. E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever, and R. R. Salakhutdinov, “Improving neural networks by preventing co-adaptation of feature detectors,” arXiv preprint arXiv:1207.0580, 2012(dropouts)
[22] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
[23] C. Szegedy et al., "Going deeper with convolutions," 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, pp. 1-9, 2015.
[24] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778, 2016
[25] O`Shea, Keiron & Nash, Ryan. “An Introduction to Convolutional Neural Networks”, ArXiv e-prints.2015
[26] Peng, M.; Wang, C.; Chen, T.” NIRFaceNet: A Convolutional Neural Network for Near-Infrared Face Identification.” Information vol. 7, no. 4:61, 2016
[27] Corneanu, C.A; Simon, M.O.; Cohn, J.F.; Guerrero, S.E. “Survey on RGB, 3D, thermal, and multimodal approaches for facial expression recognition: History, trends, and affect-related applications”. IEEE Trans. Pattern Anal. Mach. Intell., 38, 1548–1568, 2016.
[28] Zhang, Wei & Zhang, Youmei & Ma, Lin & Guan, Jingwei & Gong, Shijie.” Multimodal learning for facial expression recognition “Pattern Recognition, 48, 10.1016/j.patcog.2015.04.012, (2015).
[29] P. Lucey, J. F. Cohn, T. Kanade, J. Saragih, Z. Ambadar, and I. Matthews, “The extended cohn-kanade dataset (ck+): A complete dataset for action unit and emotion-specified expression,” in Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on. IEEE, pp. 94–101, 2010.
[30] M. J. Lyons, S. Akamatsu, M. Kamachi, J. Gyoba, and J. Budynek, “The japanese female facial expression (jaffe) database,” 1998.
[31] G. Zhao, X. Huang, M. Taini, S. Z. Li, and M. Pietik¨aInen, “Facial expression recognition from near-infrared videos,” Image and Vision Computing, vol. 29, no. 9, pp. 607–619, 2011
[32] S. Wang, Z. Liu, S. Lv, Y. Lv, G. Wu, P. Peng, F. Chen, and X. Wang, “A natural visible and infrared facial expression database for expression recognition and emotion inference,” IEEE Transactions on Multimedia, vol. 12, no. 7, pp. 682–691, 2010.
[33] M. Kopaczka, R. Kolk and D. Merhof, "A fully annotated thermal face database and its application for thermal facial expression recognition" 2018 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Houston, TX, pp. 1-6, 2018.
[34] B. Yang, J. Cao, R. Ni and Y. Zhang, "Facial Expression Recognition Using Weighted Mixture Deep Neural Network Based on Double-Channel Facial Images," in IEEE Access, vol. 6, pp. 4630-4640, 2018.
[35] Fathallah, L. Abdi and A. Douik, "Facial Expression Recognition via Deep Learning," 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, pp. 745-750, 2017.
[36] B. Hasani and M. H. Mahoor, “Facial expression recognition using enhanced deep 3d convolutional neural networks,” in Computer Vision and Pattern Recognition Workshops (CVPRW), 2017 IEEE Conference on. IEEE, pp. 2278–2288, 2017
[37] Hernández B, Olague G, Hammoud R, Trujillo L, Romero E. “Visual learning of texture descriptors for facial expression recognition in thermal imagery”. Computer Vision and Image Understanding. 2007.
[38] S. Wang, M. He, Z. Gao, S. He, and Q. Ji, “Emotion recognition from thermal infrared images using deep boltzmann machine,” FCS, vol. 8, no. 4, pp. 609–618, 2014.
[39] Shen, P.; Wang, S.; Liu, Z. “Facial expression recognition from infrared thermal videos”. Intell. Auton. Syst, 12, 323–333, 2013.
[40] Wang, S., He, S., Wu, Y. et al. “Fusion of visible and thermal images for facial expression recognition” Front. Comput. Sci. 8: 232-242, 2014.
[41] Z. Wu, T. Chen, Y. Chen, Z. Zhang, and G. Liu, “Nirexpnet: Three stream 3d convolutional neural network for near infrared facial expression recognition,” Applied Sciences, vol. 7, no. 11, pp. 1184-1197, 2017
[42] L. Trujillo, G. Olague, R. Hammoud, and B. Hernandez, “Automatic feature localization in thermal images for facial expression recognition,” in Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 14–14, 2005.
[43] G.Sowmiya, V. Kumutha, "Facial Expression Recognition Using Static Facial Images", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.72-75, 2018
Citation
Reshma Nehlani, Devang Pandya, "A Bird View on Deep Learning Facial Expression Recognition Approaches for Thermal and Infrared Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.453-459, 2018.
Load Balancing In Mobile Cloud Computing: A Review
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.460-465, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.460465
Abstract
cloud computing is said to be the next big boom technology in IT industry infrastructure. It is claimed that it provides new levels of efficiency, flexibility and cost savings of the resources that are used in industries. Mobile Cloud Computing (MCC) is applications, Internet-based data, and related services accessed via smartphones, laptop computers, tablets and other portable devices. By using MCC, the processing and the storage of intensive mobile device jobs will take place in the cloud system and the results will be back to the mobile device. But the mobile cloud computing have some issues like power consumption, bandwidth, mobility and security. Using the mobile devices for accessing the cloud it needs an efficient load balancing technique for offloading the data to the users. In this paper, there is a detailed review on different load balancing techniques which are existing model in cloud analyst tool and some policies by different authors.
Key-Words / Index Term
Mobile Device, Mobile Computing, Cloud Computing, Power Consumption, Bandwidth, Mobility, Security
References
[1]. M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, The case for VM-based cloudlets in mobile computing, IEEE Pervasive Computing, 8(4), 14–23, 2009.
[2]. KalaiSelvi B. Mary L. (2014, August). A Survey of Load Balancing Algorithms using VM. , International Journal of Advancements in Research & Technology: IJOART 2014, pp 68-76, ISSN: 2278-7763
[3]. Kaur R. And Luthra P. (2012) .Load Balancing in Cloud Computing. Association of Computer Electronics and Electrical Engineers: ACEE 2014, pp. 375-381, ISSN: 1899-0142, DOI:02.ITC.2014.5.92
[4]. Panwar R., Mallick B. (2015, May) .A Comparative Study of Load Balancing Algorithms in Cloud Computing. , International Journal of Computer Applications: IJCA 2015, pp.33-37, ISSN: 0975 – 8887, DOI: 24, May 2015
[5]. L. Shakkeera and Latha Tamilselvan ,” QoS and load balancing aware task scheduling framework for mobile cloud computing environment”, Int. J. Wireless and Mobile Computing, Vol. 10, No. 4, 2016 309.
[6]. A.Singh, D.Juneja and M.Malhotra,” Autonomous Agent Based Load Balancing Algorithm in Cloud Computing”, International Conference on Advanced Computing Technologies and Applications (ICACTA-2015), Procedia Computer Science 45 ( 2015 ) 832 – 841
[7]. K.Singh,” Energy Efficient Load Balancing Strategy for Mobile Cloud Computing “,International Journal of Computer Applications (0975 – 8887) Volume 132 – No.15, December2015 6
[8]. X.Wei, J.Fan, Z.Lu and K.Ding,” Application Scheduling in Mobile Cloud Computing with Load Balancing”, Journal of Applied Mathematics,Volume 2013.
[9]. I. Cushman, M.Sadi, L.Chen and R. Haddad,” A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing”, DOI: 10.1109/MobileCloud.2017.41
[10]. B.Kim, H.Byun, Y.Heo and Y.Jeong ,” Adaptive Job Load Balancing Scheme on Mobile Cloud Computing with Collaborative Architecture”, DOI: 10.3390/sym9050065
[11]. D.Yao, C.Yu, H.Jin, and J.Zhou,” Energy Efficient Task Scheduling in Mobile Cloud Computing”, DOI: 10.1007/978-3-642-40820-5_29.
[12]. C. Chen, R.Stoleru and G.ie,” Energy-efficient Load-balanced Heterogeneous Mobile Cloud”, DOI: 10.1109/ICCCN.2017.8038422.
[13]. J.Grover, S.Katiyar ,”Agent Based Dynamic Load Balancing in Cloud Computing”, DOI: 10.1109/ICHCI-IEEE.2013.6887799
[14]. R.Hasan and M.Mohammed ,”A Krill Herd Behaviour Inspired Load Balancing of Tasks in Cloud Computing “Studies in Informatics and Control, ISSN 1220-1766, vol. 26(4), pp. 413-424, 2017.
[15]. B.Zhou, A.V.Dastjerdi, R.N. Calheiros, S.N.Srirama, and Rajkumar Buyya,”mCloud: A Context-aware Offloading Framework for Heterogeneous Mobile Cloud,” IEEE Transactions on Services Computing vol: 10, issue: 5, 2017, pp: 797 - 810.
[16]. Changboka, H.Chang, H.Ahn and Euiin Choi,” Efficient Context Modeling Using OWL in Mobile Cloud Computing”, Energy Procedia, vol:16, Part B, 2012, pp:1312-1317.
[17]. M. Rahimi, N.Venkatasubramanian, and A. Vasilakos,”MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing”, International Conference on Cloud Computing (CLOUD), DOI: 10.1109/CLOUD.2013.100
[18]. D.Parmar,A. Kumar, A.Nivangune ,P.Joshi and U.Rao,”Discovery and Selection Mechanism of Cloudlets in a Decentralized MCC environment”, International Conference on Mobile Software Engineering and Systems (MOBILESoft), 2016, DOI: 10.1109/MobileSoft.2016.017
[19]. D.Egbe, M.B. Mutanga and M.O. Adigun,” Service Discovery In Ad-Hoc Mobile Cloud: Contemporary Approaches And Future Direction”, Journal of Theoretical and Applied Information Technology, August 2016. Vol:90,pp:101-117.
[20]. L.Chunlin,Y.Xin, Z.Yang and L.Youlong,”Multiple Context Based Service Scheduling for Balancing Cost and Benefits of Mobile Users and Cloud Datacenter Supplier in Mobile Cloud”, Computer Networks, Vol:122, July 2017, pp: 138-152.
[21]. D.Kovachev and R. Klamma,” Context-aware Mobile Multimedia Services in the Cloud”, International Workshop of the Multimedia Metadata Community on Semantic Multimedia Database Technologies, 2009.
Citation
C. Arun, K. Prabu, "Load Balancing In Mobile Cloud Computing: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.460-465, 2018.
A Review Paper On - Analysis And Performance Evaluation For Congestion Control Routing Protocols In Manet
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.466-470, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.466470
Abstract
MANET is aggregation of wireless mobile nodes that can transmit in absence of main controller and do not have fixed configuration. MANET has dynamic nature due to which every node travel effortlessly in network. The multipaths has to be constructed in order to avoid and control congestion. In MANET, link collapse or node failure could be a reason for packet loss. There are many problems and outcomes in mobile ad-hoc network. Presence of many nodes transmitting packets simultaneously over network, the probability of mislaying packet over the network advances to a larger scope. Various congestion control techniques and algorithms has been discussed in this paper. The motive of the paper is to examine and contrast among many proposed techniques of congestion control in MANETs.
Key-Words / Index Term
MANET, CONGESTION, AODV ROUTING PROTOCOLS
References
[1]. Sandeep Kumar , Suresh Kumar, “ Study of MANET: Characteristics, Challenges, Applications, Routing Protocol and Security Attacks ”, In: International Journal of R & D in Engineering Science and Management (ISSN 2393-865X), Vol-2, Issue 5, p.p.266-274. July 2015.
[2]. Sapna Khurana, Suresh Kumar, “A Study of Congestion Control in MANET: Review”, In: International Journal of Engineering Technology Science and Research IJETSR ( ISSN 2394 – 3386) Volume 4, Issue 5 pp 94-98, May 2017.
[3]. Sandeep Kumar , Suresh Kumar, “Analysis of SEAHN Demand Distance Vector in Wireless Mobile Ad-hoc Network”, In: International Journal of Enhanced Research In Science, Technology & Engineering (ISSN : 2319-7463), Vol-04 Issue 7, p.p.273-281.July 2015.
[4]. Deepak Sharma, Suresh Kumar, “A Comprehensive Review of Routing Protocols in Heterogeneous Wireless Networks”, In: International Journal of Enhanced Research in Management and Computer Applications, ISSN: 2319-7471Vol. 4, Issue 8, pp: 101-121, August-2015.
[5]. Bhupinder Kaur, Vaibhav Pandey, “A Survey on Congestion Control Techniques in MANETs”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 5, pp(1441-1446), May 2015.
[6]. N. Sharma, A. Gupta, S. S. Rajput and V. K. Yadav, “Congestion Control Techniques in MANET: A Survey”, In 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2016, pp. 280-282.doi: 10.1109/CICT.2016.62May 2017 .
[7]. Geetika Maheshwari, Mahesh Gour, Umesh Kumar Chourasia, “A Survey on Congestion Control in MANET”, In (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) ,pp(998-1001) ,(2014)
[8]. D. A. Tran and H. Raghavendra, “Congestion Adaptive Routing in Mobile Ad Hoc Networks”, In IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 11, pp. 1294-1305, Nov. 2006. doi: 10.1109/TPDS.2006.151
[9]. Sandeep Dalal, Renu Ruhil, “Routing based Congestion Control Metric:RFR”, In International Journal of Computer Applications (0975 – 8887) Volume 99, Issue 11, pp(20-24), (2014).
[10]. V. Thilagavathe, Dr. K. Duraiswamy, “ Cross Layer based Congestion Control Technique for Reliable and Energy Aware Routing in MANET”, In International Journal of Computer Applications (0975 – 8887) Volume 36, Issue 12, pp (1-6), (2011).
[11]. Sreenivas B.C, G.C. Bhanu Prakash, K.V. Ramakrishnan, “M-ADTCP: An Approach for Congestion Control in MANET”, In Advances in Computing & Inf. Technology, AISC 178, pp. (531–540),2013.
[12]. H. Gupta and P. Pandey, “Survey of routing base congestion control techniques under MANET”, 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), Tirunelveli, pp. 241-244, 2013. doi: 10.1109/ICE-CCN.2013.6528501
[13]. Y. J. Lee and G. F. Riley, “A workload-based adaptive load-balancing technique for mobile ad hoc networks”, IEEE Wireless Communications and Networking Conference, 2005, New Orleans, LA, 2005, pp. 2002-2007 Vol. 4.doi: 10.1109/WCNC.2005.1424826
[14]. Anju, Sugandha Singh, “Modified AODV for Congestion Control in MANET”, In International Journal of Computer Science and Mobile Computing, Vol.4 Issue.6, pp. 984-1001, (June- 2015)
[15]. Y. Mai, F. M. Rodriguez and N. Wang, “CC-ADOV: An effective multiple paths congestion control AODV”, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, pp. 1000-1004, 2018.doi: 10.1109/CCWC.2018.8301758
[16]. N. Sharma, A. Gupta, S. S. Rajput and V. K. Yadav, “Congestion Control Techniques in MANET: A Survey”, 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2016, pp. 280-282. doi: 10.1109/CICT.2016.62
[17]. M. Sedrati,A. Benyahia,” Multipath Routing to Improve Quality of Service for Video Streaming Over Mobile Ad Hoc Networks”, In Wireless Pers Commun, Volume 99, Issue 2, pp 999–1013 (2018)
[18]. Sukhwinder Singh, Vijay Laxmi , “ A Review on Techniques for Controlling the Congestion in MANET”, IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 3, June 2017
[19]. Sapna Khurana, Suresh Kumar , Deepak Sharma, “Performance Evaluation of Congestion Control in MANETs using AODV, DSR and ZRP Protocols” International Journals of Advanced Research in Computer Science and Software Engineering, ISSN: 2277-128X Volume-7, Issue-6,pp 398-403, 2018. DOI 10.23956/ijarcsse /V716/0218
Citation
Bhawna Ahlawat, Vikas Nandal, "A Review Paper On - Analysis And Performance Evaluation For Congestion Control Routing Protocols In Manet," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.466-470, 2018.
A Review on effect of SVM in Intrusion Detection System
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.471-474, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.471474
Abstract
Intrusion detection system is a system combining both software and hardware that monitors and analysis huge volume of network traffic and detects malicious activities. The role of IDS in system security is significant but not sufficient. Data analysis is a part of the IDS process. Data mining is a data analytic tool. If it is integrated with IDS, performance of IDS will be elevated. One of the data mining classification algorithms is SVM. It is widely applied in IDS. In this paper a methodical study on SVM in IDS was done. This paper reports the effect of SVM in IDS. It is observed that SVM increases the performance of IDS and also it has some limitations. This review provides new ways for further research to overcome these limitations.
Key-Words / Index Term
Data mining, Intrusion Detection System, SVM
References
[1]. Jamal Hussain, Aishwarya Mishra “An Effective Intrusion Detection Framework Based On Support Vector Machine Using Nsl - KDD Dataset”, in Indian Journal of Computer Science and Engineering (IJCSE), e-ISSN : 0976-5166, Vol. 8 No. 6 PP: 703 -713, Dec 2017-Jan 2018
[2]. Jiapu Zhang, “A Complete List of Kernels Used in Support Vector Machines” in Biochemistry & Pharmacology: Open Access, DOI: 10.4172/2167-0501.1000195, PP: 4-5. 2015
[3]. Jayshree Jha, Leena Ragha, “ Intrusion Detection System using Support Vector Machine”, in International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868,PP:25-30,2013.
[4]. Minakshi Bisen1, Amit Dubey2, “An Intrusion Detection System Based On Support Vector Machine Using Hierarchical Clustering And Genetic Algorithm” in International Journal Of Engineering And Computer Science ISSN:2319-7242, Volume 4 Issue 1, PP: 10062-10064, January 2015.
[5]. Zhenlong Li, Qingzhou Zhang and Xiaohua Zhao, “Performance analysis of K-nearest neighbor, support vector machine, and artificial neural network classifiers for driver drowsiness detection with different road geometries” in International Journal of Distributed Sensor Networks 2017, Vol. 13(9) PP:1-9, 2017
[6]. Sandeep Ranode, “Intrusion Detection System Using SVM Classification” in International Journal of Innovative Research in Computer and Communication Engineering, ISSN(Online): 2320-9801, Vol. 4, Issue 6, PP: 12180- 12184, June 2016.
[7]. Liliya Demidova ,Evgeny Nikulchev ,Yulia Sokolova , “ Big Data Classification Using the SVM Classifiers with the Modified Particle Swarm Optimization and the SVM Ensembles”, in International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7, No. 5, PP: 294-31, 2016
[8]. Lei Shi1, Qiguo Duan2, Xinming Ma1, and Mei Weng1, “The Research of Support Vector Machine in Agricultural Data Classification” in IFIP International Federation for Information Processing 2012, CCTA 2011, Part III, IFIP AICT 370, PP: 265–269, 2012.
[9]. Vitthal Manekar1, Kalyani Waghmare2, “Intrusion Detection System using Support Vector Machine and Particle Swarm Optimization (PSO)” in International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume-4 Number-3 Issue-PP: 808-812, 16 September-2014.
Citation
C. Amali Pushpam, J. Gnana Jayanthi, "A Review on effect of SVM in Intrusion Detection System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.471-474, 2018.
Occupational Hazards and its Impact on Health of Eyes: A Survey
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.475-480, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.475480
Abstract
This research has been undertaken to examine the impact of occupational hazards on health of Computer Professionals, The essential data have been collected using Community-Survey method. Additionally books, journals, and websites have been referred for getting certain conclusions from the collected survey samples. In this survey based descriptive research, Opinions of diverse Computer professionals in pune city, Maharashtra are taken to find out the average health of the eyes. This research also tries to find certain patterns on the usage of electronic gadget in a particular age group and their tendency towards getting a particular eye disease.
Key-Words / Index Term
Carpal Tunnel, Hazards, Health, Syndrome, Repetitive Strain
References
[1]. World Health Organization, WHO definition of Health. (WHO Publication No.2, p. 100). New York, WHO Press
[2]. Dr. D. Rajan,"Occupational Hazards And Health: A Comparative Study Among Medical Laboratory Technician"s in International Journal for Research in Applied Science and Engineering Technology (IJRASET),Vol. 5, No.7, pp. 305-315
[3]. Ahmed, H. O., and Mark, S., Newson Smith, "Knowledge and Practices of Cement Workers Related to Occupational Hazard" in United Arab Emirates. J Egypt Public Health Assoc, Vol. 85, No. 3, pp. 149-167.
[4]. Javed Sadaf and Tehmina Yaqoob "Gender Based Occupational Health Hazards among Paramedical Staff In Public Hospitals of Jhelum", International Journal of Humanities and Social Science, Vol. 1, No. 3, pp. 175-180.
[5]. Saldaria, M. A. M., Susana Garcia Herrero, Javier Garcia Rodriguez and Dale Ritzel, "The Impact of Occupational Hazard Information on Employee Health and Safety: An Analysis by Professional Sectors in Spain", International Electronic Journal of Health Education, Vol. 15, pp. 83-98.
[6]. Pooja Dwivedi and Kiran, U.V, "Occupational Hazards among Farm Women", in International Journal of Humanities and Social Science Invention, Vol. 2, No. 7, pp. 8-10.
[7]. Rajan, D."Occupational Hazards among Medical Laboratory Technicians", SCMS Journal of Indian Management, Vol. 11, No. 1, pp. 134 – 148.
[8]. https://www.aoa.org/patients-and-public/caring-for-your-vision/protecting-your-vision/computer-vision-syndrome
[9]. https://www.nhs.uk/conditions/repetitive-strain-injury-rsi/
[10]. Rodner C, Raissis A, "Akelman E: Carpal tunnel syndrome. Orthopaedic Knowledge" in Online Journal.Rosemont, IL, American Academy of Orthopaedic Surgeons, 2009; 7(5). Accessed March 2016.
[11]. https://orthoinfo.aaos.org/en/diseases--conditions/carpal-tunnel-syndrome/
[12]. http://netaddiction.com/ebay-addiction/
Citation
Neeta A. Deshpande, Pramod B. Deshmukh, Prateek Thakare, "Occupational Hazards and its Impact on Health of Eyes: A Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.475-480, 2018.