Neuro-Fuzzy Routing with Clusters in Wireless Sensor Network
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.474-479, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.474479
Abstract
Wireless Sensor Networks (WSN) are used in a extensively large number of applications. Based on the advanced development of sensors nodes, routing of data becomes an interesting concept in WSN. Many routing protocols were designed by researchers all over the world concerning about battery power, sensing data, networking lifetime and transmitting data etc. This paper concentrates on routing the data in an intelligent manner than the existing routing protocols. Aggregating the data with the help of clusters from the nearby nodes and the cluster heads are responsible to send the collected data to one or more Sink Node(SN) that request for data. This paper ponders on clustering with neurons in the cluster heads and thereby gathers the needed and correctly sensed information very faster based on fuzzy inference system. Neuron in the form of cluster heads gathers and remembers the data. With the help of NS2 simulator this algorithm is very clear that it surpasses the other routing protocols in an abundant number of ways.
Key-Words / Index Term
Neurons, Clustering, cluster head, SN, Routing, Energy efficient, Fuzzy
References
[1] A Multi-Aware Query Driven (MAQD) routing protocol for mobile wireless sensor networks based on neuro-fuzzy inference., Ahmed I. Saleh, Khaled M. Abo-Al-Ez, Ahmed A. Abdullah, Journal of Network and Computer Applications 88 (2017) 72–9.
[2] Abreu, C., Ricardo, M., Mendes, P., 2014. Energy-aware routing for biomedical wireless sensor networks. J. Netw. Comput. Appl. (Elsevier) 40, 270–278.
[3] Anastasi, G., Conti, M., Francesco, D.M, Passarella. A, (2009), "Energy Conservation in Wireless Sensor Networks: a Survey", Ad Hoc Networks, Vol.7, No.3, pp.537—568.
[4] Aslam N, Philips W, Robertson W, Siva Kumar SH, "A multicriterion optimization technique for energy efficient cluster formation in Wireless Sensor networks", Information Fusion,Elsevier (2010).
[5] Baranidharan, B., B. Santhi, 2016. DUCF: Distributed load balancing Unequal Clustering in wireless sensor networks using Fuzzy approach. Applied Soft Computing, Vol. 40, Pg. 495–506.
[6] B. Krishnamachari, Y. Mourtada, and S. Wicker, “The Energy-Robustness Tradeoff for Routing in Wireless Sensor Networks,” IEEE International Conference on Communications, vol. 3, pp.1833-1837, May 2003.
[7] BrittoRaj, S., R. Srikkanthan and A. Sivanesh Kumar, 2016. Efficient Transmission From Node To Node with Mobile Sink in Clustering Using Sensor Node . Australian Journal of Basic and Applied Sciences, 10(1) , Pg. 280-286
[8] David Culler, Deborah Estrin, Mani Srivastava "Overview of Sensor Networks", IEEE Computer Society, August 2004, pp 41-49.
[9] G. Anastasi, M. Conti, M. Francesco, and A. Passarella, “Energy Conservation in Wireless Sensor Networks: A Survey,” Ad Hoc Networks, vol. 7, no. 3, pp. 537-568, May 2009.
[10] J.S.R. Jang, C.T. Sun, E. Mizutani "Neuro-Fuzzy and Soft Computing", PHI Publication, 1997.
[11] Jung S.; Han Y.; Chung T. 2007. The Concentric Clustering Scheme for Efficient Energy Consumption in the PEGASIS. In: Proceedings of the 9th International Conference on Advanced Communication Technology, Gangwon-Do, Korea. pp. 260-265.
[12] Ma, M., Yang, Y., Zhao, M., 2013. Tour planning for mobile data-gathering mechanisms in wireless sensor networks. IEEE Trans. Vehicular Technol. 62, 1472–1483..
[13] Matin, M., Islam, M., 2012. Wireless Sensor Networks–Technology and Protocols, Book,320 pages, Publisher: InTech, ISBN 978-953-51-0735-4.
[14] Papadopoulos, A., Navarra, A., McCann, J., Pinotti, C., 2012. VIBE: an energy efficient routing protocol for dense and mobile sensor networks. J. Netw. Comput. Appl. (Scidirect) 35, 1177–1190
[15] Murugunathan S.D.; Ma D.C.F.; Bhasin R.I.; Fapajuwo A.O. 2005. A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks. IEEE Radio Commun. 43, S8-S13.
[16] Oldewurtel, Frank and Mahonen, Petri, (2006) "Neural Wireless Sensor Networks", International Conference on Systems and Networks Communications, ICSNC `06, pp.28 – 28.
[17] Perkins, C., Bhagwat, P., 1994. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, ACM 94 Conference on communications Architectures (SIGCOMM), Protocols and Applications, vol. 24, No. 4, pp. 234–244.
[18] Sohrabi K.; Gao J.; Ailawadhi V.; Pottie G.J. 2000. Protocols for self-organization of a wireless sensor network. IEEE Pers. Commun. 7: 16-27.
[19] Saleh, Ahmed I., 2011. A Scalable-adaptive Snack Routing Strategy (SRS) for semiadministrated mobile Ad hoc networks (SAMANETs). Int. J. Wirel. Inf. Netw.,Springe. 18, 257–279.
[20] Vesanto J, Alhoniemi E. (2000) "Clustering of Self Organizing Map". IEEE Transactions on Neural Networks, Vol. 11, No. 3,pp. 586-600.
[21] Ye M.; Li C.; Chen G.; Wu J. 2006. An energy efficient clustering scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 3: 99-119.
[22] A Survey of Civilian Applications of WSN and Security ProtocolsChahat Aggarwal1*, B. B. Gupta2. 1 and 2 Dept. of Computer Engineering, National Institute of Technology, Kurukshetra, India. International Journal of Scientific Research Computer Science and EngineeringVol.6, Issue.3, pp.56-66 , June (2018)
[23] Faulty Link Detection in Cluster based Energy Efficient Wireless Sensor Networks, Manju Bhardwaj, Dep. of Electronics Engineering, Shri Ramswaroop Memorial University, Lucknow, India, IJSRNSC, Volume-5, Issue-3, June 2017
Citation
D. Lissy, S. Behin Sam, "Neuro-Fuzzy Routing with Clusters in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.474-479, 2018.
Classifying Sequences of Market Profile using Deep Learning
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.480-485, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.480485
Abstract
Since its inception, market profile has been used by traders as a way to assess the market value of a stock. By reading market profile charts, it is possible for traders to assess who is driving the market (buyers or sellers) and make trades accordingly. The spatiotemporal feature of market profile can be used to train a deep learning model for classifying sequences of market profile. This is a novel idea and one that needs to be examined and experimented upon. LSTM networks are structures capable of remembering long term dependencies in time series data. Convolutional Neural Networks, on the other hand help in figuring out patterns in multidimensional data. A python library is built to generate market profile from time series data. Leveraging the power of LSTMs and CNNs, two models are proposed for the classification: FC-LSTM and ConvLSTM. The results show that the proposed models are able to catch patterns amongst profiles and FC-LSTM performs better than ConvLSTM on this task.
Key-Words / Index Term
Market Profile, Machine Learning, ConvLSTM
References
[1] Ratnesh Kumar Shukla, Ajay Agarwal, Anil Kumar Malviya, "An Introduction of Face Recognition and Face Detection for Blurred and Noisy Images", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.39-43, 2018.
[2] P. Rutravigneshwaran, "A Study of Intrusion Detection System using Efficient Data Mining Techniques", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.5-8, 2017
[3] K. Greff, R. K. Srivastava, J. Koutník, B. R. Steunebrink and J. Schmidhuber, "LSTM: A Search Space Odyssey," IEEE Transactions on Neural Networks and Learning Systems, Vol. 28, No. 10, pp. 2222-2232, Oct. 2017.
[4] T. Fischer and C. Krauss, ‘‘Deep learning with long short-term memory networks for financial market predictions’’, FAU Discussion Papers in Economics, 2017.
[5] Milosevic, Nikola. “Equity forecast: Predicting long term stock price movement using machine learning.” Journal of Economics Library, Vol. 3, No. 2, pp. 288-294, Jun. 2016.
[6] K. Joshi, H.N. Bharathi, Jyothi Rao, “Stock Trend Prediction using News Sentiment Analysis”, International Journal of Computer Science & Information Technology (IJCSIT), Vol. 8, No. 3, pp67-76, July 2016.
[7] Steidlmayer, J. P. & Hawkins, S. B. “Steidlmayer on Markets: Trading with Market Profile”, John Wiley & Sons, Inc. NJ, 2003.
[8] James F. Dalton, Robert Bevan Dalton, and Eric T. Jones, “Markets in Profile”, John Wiley, New York, 2007.
[9] Krauss, C., Do, X. A., Huck, N., “Deep neural networks, gradient-boosted trees, random forests: Statistical arbitrage on the S&P 500”, European Journal of Operational Research Vol 2, pp. 689-702, 2017.
[10] K. Amudha, S. Padmapriya, D. Saravanan, "Ensemble Forecasting Through Learning Process", International Journal of Computer Sciences and Engineering, Vol. 06, No. 02, pp. 332-335, 2018.
[11] S. Velankar, S. Valecha and S. Maji, "Bitcoin price prediction using machine learning," 20th International Conference on Advanced Communication Technology (ICACT), pp. 144-147, 2018
[12] Kondor, D., Posfai, M., Csabai, I. & Vattay, G. “Do the rich get richer? an empirical analysis of ´ the bitcoin transaction network.” Public Library of Science, Vol. 9, pp. 1–10, 2014.
[13] S. Hochreiter, Y. Bengio, P. Frasconi, J. Schmidhuber, S. C. Kremer, J. F. Kolen, "Gradient flow in recurrent nets: The difficulty of learning long-term dependencies" A Field Guide to Dynamical Recurrent Networks, Piscataway, NJ, USA: IEEE Press, 2001.
[14] X. Shi, Z. Chen, H. Wang, D.-Y. Yeung, W.-K. Wong, and W.-C. Woo, ‘‘Convolutional LSTM network: A machine learning approach for precipitation nowcasting,’’ Neural Information Processing Systems, pp. 802–810, 2015.
[15] Bradley, A. P., “The Use of the Area Under the ROC Curve in the Evaluation of Machine Learning Algorithms”, Pattern Recognition, Vol. 30, No. 6, pp. 1145–1159, 1997.
Citation
Pranshu Rupesh Dave, Priti Srinivas Sajja, "Classifying Sequences of Market Profile using Deep Learning," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.480-485, 2018.
Diagnosis of Heart Disease using Cultural Algorithm with Neural Network
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.486-491, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.486491
Abstract
Heart disease detection is considered as the most complicated task in the world of medical sciences. There arises a necessity to progress the work and to develop a decision support system to find out a heart disease of a patient. To achieve a correct and cost effective treatment computer-based and support systems can be developed to make good decision. These information which exists contains the huge amounts of data which are organized in the form of images, text, charts and numbers. Hence, there is necessity which is motivating to create an excellent and useful project which will help physicians and cardiologists to predict the heart disease before it damage the health. It can be able to solve complicated enquiries for detecting heart disease in a patient and as a result it will assist medical practitioners to make more accurate and precise clinical decisions which traditional decision support systems were not able to decide. By providing effective and respective solution, it will surely help to reduce costs of treatment.
Key-Words / Index Term
Back Propagation, Cardiovascular disease Confusion Matrix, Genetic Algorithm, Neural Network
References
[1] Jones, D.S. and Greene, J.A., 2013. The decline and rise of coronary heart disease: understanding public health catastrophism. American journal of public health, 103(7), pp.1207-1218.
[2] Mathers, C.D. and Loncar, D., 2006. Projections of global mortality and burden of disease from 2002 to 2030. Plos med, 3(11), p.e442.
[3] World Health Organization, 2011. Global status report on noncommunicable diseases 2010. Geneva: World Health Organization.
[4] Buttar, H.S., Li, T. and Ravi, N., 2005. Prevention of cardiovascular diseases: Role of exercise, dietary interventions, obesity and smoking cessation. Experimental & Clinical Cardiology, 10(4), p.229.
[5] Jenkins, C.D., 1988. Epidemiology of cardiovascular diseases. Journal of consulting and clinical Psychology, 56(3), p.324.
[6] World Health Organization, 2007. Prevention of cardiovascular disease. World Health Organization.
[7] Cowie, M.R., Anker, S.D., Cleland, J.G., Felker, G.M., Filippatos, G., Jaarsma, T., Jourdain, P., Knight, E., Massie, B., Ponikowski, P. and López‐Sendón, J., 2014. Improving care for patients with acute heart failure: before, during and after hospitalization. ESC Heart Failure, 1(2), pp.110-145.
[8] Ajay, V.S. and Prabhakaran, D., 2010. Coronary heart disease in Indians: Implications of the INTERHEART study. The Indian journal of medical research, 132(5), p.561.
[9] Centre for Disease Control and Prevention, Online available at: http://www.cdc.gov/heartdisease/risk_factors.htm
[10] American Heart Association, Online available at: http://www.heart.org/HEARTORG/Conditions
[11] D. Isern, D. Sanchez, and A. Moreno, “Agents Applied in Health Care: A Review”, International Journal of Medical Informatics, Vol. 79, Issue 3, pp. 146-166, 2010.
[12] Syed Umar Amin, Kavita Agarwal, Dr. Rizwan Beg, “Genetic Neural Network Based Data Mining in Prediction of Heart Disease Using Risk Factors”, Proceedings of IEEE Conference on Information and Communication Technologies (ICT), pp. 1227–1231, April 2013.
[13] Reynolds, R.G., 1994, February. An introduction to cultural algorithms. In Proceedings of the third annual conference on evolutionary programming (Vol. 131139). Singapore.
[14] Reynolds, R.G. and Peng, B., 2004, November. Cultural algorithms: modeling of how cultures learn to solve problems. In Tools with Artificial Intelligence, 2004. ICTAI 2004. 16th IEEE International Conference on (pp. 166-172). IEEE.
[15] S. Sabeena, V. Sujitha “Prediction of Heart Disease Using AI and NLP Techniques”, International Journal of Computer Sciences and Engineering, Vol-6, Issue-2, Jan 2018
Citation
S. Shrivastava, S. Shrivastava, "Diagnosis of Heart Disease using Cultural Algorithm with Neural Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.486-491, 2018.
A Fusion Technique for The Multimodal Biometric System
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.492-495, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.492495
Abstract
Biometric recognition is the challenging area because security and user authentication is necessary for any login purpose. To identify a person, physiological characteristics are most widely used. This paper proposed a new fusion technique for the integration of finger knuckle print, palmprint and face biometrics. The present study concentrated on the multimodal biometric system due to its benefits. Initially the region of interest was obtained for the biometric traits. Then the features are extracted using Speeded Up Robust Features (SURF). Fusion of finger knuckle print, palmprint and face are done at score level using MeRank fusion rule. The MeRank technique uses classification result as well as matching scores of each trait. The performance of the proposed technique is evaluated and experimental results demonstrated that the fusion technique achieved 98.84% of accuracy for the multimodal biometric system.
Key-Words / Index Term
Feature extraction, score level fusion, SURF, Multimodal system and MeRank
References
[1] C. Busch, “Finger Knuckle Recognition”, Technical University of Denmark, pp. 1-4, 2011.
[2] D. Gabor, “Theory of Communication”, The Journal of the Institute of Electrical Engineers, Vol.93, Issue.3, pp.429-457, 1946.
[3] A. Ross, A. Jain “Information Fusion in Biometrics”, Pattern Recognition Letters, Vol. 24: pp. 2115‐2125, 2003.
[4] K. Geetha, V. Radhakrishnan, “Multimodal Biometric System: A Feature Level Fusion Approach”, International Journal of Computer Applications, Vol.71, Issue.4, pp. 25-29, 2013.
[5] J. Aravind, S. Valarmathy, “Multi classifier-based score level fusion of multi-modal biometric recognition and its application to remote biometrics authentication”, The Imaging Science Journal, Vol.64, Issue.1, pp.1-15, 2015.
[6] P. P. Archana, D.G. Bhalke, “Fusion of fingerprint, palmprint and iris for person identification”, In the proceedings of the International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT - 2016), pp. 960 – 963, 2016.
[7] M. Kazi, Y. Rode, “Multimodal biometric system using face and signature : a score level fusion approach”, Advances in Computational Research, Vol. 4, Issue. 1, pp.99-103, 2012.
[8] H. Bay, T. Tuytelaars, L. V. Gool, "SURF: Speeded up robust features", In 9th European Conference on Computer Vision 2006, pp. 404– 417, 2006.
[9] The Hong Kong Polytechnic University, PolyU Palmprint Database, Available at: http:// www. Comp. polyu. edu.hk/biometrics.
[10] PolyU Finger Knuckle Print Database, Available at: http://www.comp.polyu.edu.hk/ biometrics/FKP.htm.
[11]PolyU FaceDatabase, Available at:
http://www.comp.polyu.edu.hk/ biometrics/
[12] M. Nageshkumar, P. Mahesh, M. Swamy, “An Efficient Secure Multimodal Biometric Fusion using Palmprint and Face Image”, The International Journal of Computer Science Issue, vol. 1, pp. 49-53, 2009.
[13] M. M. Kazi, Y. S. Rode, S. B. Dabhade, N. N. H. Al-Dawla, A. V. Mane, R. R. Manza, K. V. Kale, “Multimodal biometric system using face and signature: a score level fusion approach”, Advances in Computational Research, vol. 4, no. 1, pp. 99-103, 2012
[14] S. Chaudhary, R. Nath, “A New Multimodal Biometric Recognition System Integrating Iris, Face and Voice” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, no. 4, pp.145-150, 2015.
Citation
J. Anne Wincy, Y. Jacob Vetha Raj, "A Fusion Technique for The Multimodal Biometric System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.492-495, 2018.
Simulation Based Exploration of SKC Block Cipher Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.496-501, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.496501
Abstract
Video based Face Recognition (VFR) has significantly more challenges when compared to Still Image-based Face Recognition (SIFR). The objective of this paper is to identify faces in video more precisely. In this paper, the minute details of the face are identified by block based technique. It is classified using neural network. The proposed method is tested with four publicly available datasets: Multiple Biometric Grand Challenge (MBGC), Face and Ocular Challenge Series (FOCS), Honda/UCSD and UMD Comcast10 datasets. The proposed method achieves higher recognition rate when compared to other recent methods.
Key-Words / Index Term
Keyframe, Block matching algorithm, face recognition
References
[1] Z. Huang, S. Shan, R.Wang, H. Zhang, S. Lao, A. Kuerban, and X. Chen, “A benchmark and comparative study of video-based face recognition on cox face database,” IEEE Trans. Image Process., vol. 24, no. 12, pp. 5967–5981, 2015.
[2] J. R. Beveridge, H. Zhang et al., “Report on the fg 2015 video person recognition evaluation,” in Proc. IEEE Int. Conf. Automatic Face and Gesture Recognit., 2015, pp. 1–8.
[3] Y. Sun, X. Wang, and X. Tang, “Deeply learned face representations are sparse, selective, and robust,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2015, pp. 2892–2900.
[4] Y. Sun, Y. Chen, X. Wang, and X. Tang, “Deep learning face representation by joint identification-verification,” in Proc. Adv. Neural Inf. Process. Syst., 2014, pp. 1988–1996.
[5] C. Ding, J. Choi, D. Tao, and L. S. Davis, “Multi-directional multi-level dual-cross patterns for robust face recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 38, no. 3, pp. 518–531, 2016.
[6] J. Phillips, J. R. Beveridge, D. S. Bolme, B. Draper, G. H. Givens, Y. M. Lui, S. Cheng, M. N. Teli, H. Zhang et al., “On the existence of face quality measures,” in Proc. IEEE Int. Conf. Biometrics, Theory, Appl. Syst., 2013, pp. 1–8.
[7] J. R. Barr, K. W. Bowyer, P. J. Flynn, and S. Biswas, “Face recognition from video: A review,” Int. J. Pattern Recognit. Artif. Intell., vol. 26, no. 05, 2012.
[8] M. Bicego, E. Grosso, and M. Tistarelli, “Person authentication from video of faces: a behavioral and physiological approach using pseudo hierarchical hidden markov models,” in Advances in Biometrics, 2006, pp. 113–120.
[9] Y.-C. Chen, V. M. Patel, P. J. Phillips, and R. Chellappa, “Dictionarybased face recognition from video,” in Proc. Eur. Conf. Comput. Vis., 2012, pp. 766–779.
[10] Y. Hu, A. S. Mian, and R. Owens, “Face recognition using sparse approximated nearest points between image sets,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 34, no. 10, pp. 1992–2004, 2012.
[11] M. T. Harandi, C. Sanderson, S. Shirazi, and B. C. Lovell, “Graph embedding discriminant analysis on grassmannian manifolds for improved image set matching,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2011, pp. 2705–2712.
[12] M. Shao, D. Tang, Y. Liu, and T.-K. Kim, “A comparative study of videobased object recognition from an egocentric viewpoint,” Neurocomputing, vol. 171, pp. 982–990, 2016.
[13] R. Gopalan, S. Taheri, P. Turaga, and R. Chellappa, “A blur-robust descriptor with applications to face recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 34, no. 6, pp. 1220–1226, 2012.
[14] T. Ahonen, E. Rahtu, V. Ojansivu, and J. Heikkila, “Recognition of blurred faces using local phase quantization,” in Int. Conf. Pattern Recognit., 2008, pp. 1–4.
[15] Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, “Deepface: Closing the gap to human-level performance in face verification,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2014, pp. 1701–1708.
[16] Y. Hu, A. S. Mian, and R. Owens, “Sparse approximated nearest points for image set classification,” IEEE Conference on Computer Vision and Pattern Recognition, pp. 27–40, 2011.
[17] Lenin, Wilson S, “An Efficient Key frame Extraction Method in Video based Face Recognition” IPASJ International Journal of Computer Science (IIJCS), Volume 6, Issue 2, February 2018, ISSN 2321-5992.
[18] Lenin, Wilson S, “An Efficient Key frame Extraction Method in Video based Face Recognition” IPASJ International Journal of Computer Science (IIJCS), Volume 6, Issue 2, February 2018, ISSN 2321-5992.
[19] R. Haralick, K. Shanmugan, and I. Dinstein, “Textural feature forimage classification,” IEEE Trans. Systems, Man, Cybern., vol.SMC-3, no. 6, pp. 610–621, Nov. 1973.
[20] KatmelBelloulata, Shiping Zhu, and Zaikuo Wang "A Fast Fractal Video Coding Algorithm Using Cross-Hexagon Search for Block Motion Estimation" International Scholarly Research Network ISRN Signal Processing Volume 2011, Article lD 386128, (2011)
[21] J. Huska and P. Kulla, “Trends in block-matching motion estimation algorithms,” Dept. of Radioelectronics, Slovak Univ. of Technology, Bratislava, Tech. Rep.
[22] S. Zhu and K.-K. Ma, “A new diamond search algorithm for fast block-matching motion estimation,” in Proc. Int. Conf. Inf. Commun. Signal Process. (ICICS ’97), vol. 1, Sep. 9–12, 1997, pp.292–296.
[23] C. Zhu, X. Lin, and L.-P. Chau, “Hexagon-based search pattern for fast block motion estimation,” IEEE Trans. Circuits Syst. Video Technol.,vol. 12, no. 5, pp. 349–355, May 2002.
[24] Y. Liang, J. Liu, M. Du, ”A cross octagonal search algorithm for fast block motion estimation”, International Symposium on Intelligent Signal Processing and Communication Systems, Hong Kong, Dec. 13-16, 2005.
[25] R. Chellappa, J. Ni, and V. M. Patel, “Remote identification of faces: problems, prospects, and progress,” Pattern Recognition Letters, vol. 33, no. 15, pp. 1849–1859, Oct. 2012.
[26] P. J. Phillips, P. J. Flynn, J. R. Beveridge, W. T. Scruggs, A. J. O’Toole, D. Bolme, K. W. Bowyer, B. A. Draper, G. H. Givens, Y. M. Lui, H. Sahibzada, J. A. Scallan III, and S. Weimer, “Overview of the multiple biometrics grand challenge,” International Conference on Biometrics, 2009.
[27] National Institute of Standards and Technology, “Multiple biomertic grand challenge (MBGC).”
[28] K.-C. Lee, J. Ho, M.-H. Yang, and D. Kriegman, “Visual tracking and recognition using probabilistic appearance manifolds,” Computer Vision and Image Understanding, vol. 99, pp. 303–331, 2005.
[29] Y. Hu, A. S. Mian, and R. Owens, “Sparse approximated nearest points for image set classification,” IEEE Conference on Computer Vision and Pattern Recognition, pp. 27–40, 2011.
[30] O`Toole A.J, Harms J, Snow S.L, Hurst D.R, Pappas M.R, Ayyad J.H, Abdi H, “Recognizing people from dynamic and static faces and bodies: Dissecting identity with a fusion approach”, Vision Research, Vol. 51, No. 1, 2005, pp.74-83.
Citation
S.Wilson, A. Lenin Fred, "Simulation Based Exploration of SKC Block Cipher Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.496-501, 2018.
Optimized Neural Network Architecture for The Classification of Voice Signals
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.502-506, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.502506
Abstract
In this paper, the performance to optimize feed-forward neural network has been evaluated for the classification of voice signals of English alphabets. There are various feed forward neural network models have been used earlier but the selection of optimize architecture is a challenge. In this paper we are implementing a optimize architecture which is best suitable for the classification of voice signals. Digital signal processing operations are applied on analog speech signals to convert them into digital form and then to make them suitable for further processing by neural network models.
Key-Words / Index Term
Digital signal processing, Optimize neural network, Pattern classification
References
[1]. P. Rani, S. Kakkar and S. Rani, “Speech Recognition Using Neural Network”, In Proceedings of International Conference on Advancements in Engineering and Technology, International Journal of Computer Applications, pp. 11-14, 2015.
[2]. M. A. Anusuya and S. K. Katti, “Speech Recognition by Machine: A Review”, International Journal of Computer Science and Information Security, pg. 181 – 205, Vol. 6, No. 3, 2009.
[3]. X. Cui et.al., “A Study of Variable-Parameter Gaussian Mixture Hidden Markov Modeling for Noisy Speech Recognition”, IEEE Transactions On Audio, Speech, And Language Processing, Vol. 15, No. 4, 2007.
[4]. G.E. Dahl, M. Ranzato, A. Mohamed and G.E. Hinton, “Phone Recognition with the Mean-covariance Restricted Boltzmann Machine”, Adv. Neural Inf. Process. Syst., No. 23, 2010.
[5]. D. Yu, L. Deng and G. Dahl, “Roles of Pre-training and Fine-tuning in Context-dependent DBN-HMMs for Real-world Speech Recognition”, In Proceedings of NIPS Workshop Deep Learn, Unsupervised Feature Learn, 2010.
[6]. H. Bourland and C.J. Wellekens, “Multilayer Perceptrons and Automatic Speech Recognition”, IEEE First International Conference on Neural Networks, San Diego, California IV-407-IV-416, June 21-24, 1987.
[7]. H. Yashwanth, H. Mahendrakar and S. David, “Automatic Speech Recognition Using Audio Visual Cues”, IEEE India Annual Conference, pp. 166-169, 2004.
[8]. Robinson and F. Fallside, “A Recurrent Error Propagation Network Speech Recognizer System”, Computer, Speech and Language, Vol. 5, No. 3, 1991.
[9]. L. Yang and Z. Yang, “Study on Audio Signal’s Classification Based on BP Neural Network”, IEEE Conference Publications on Artificial Intelligence, Management Science and Electronic Commerce, pp. 5153-5155, 2011.
[10]. S. Balochian, E. A. Seidabadand S. Z. Rad, “ Neural Network Optimization Genetic Algorithms for the Audio Classification to Speech and Music”, International Journal of Signal Processing, Image Processing and Pattern Recognition, pg. 47-54, Vol. 6, No. 3, 2013.
[11]. T. Lefteri H. and A. U. Robert, “Fuzzy and Neural Approaches in Engineering”, John Wiley and Sons Publications, 1997.
[12]. R. Hecht-Nielsen, “Theory of Backpropagation Neural Network”, International Joint Conference on Neural Networks, pp. 593-605, Vol. 1, 1989.
[13]. M.J.D. Powell, “Radial Basis Functions for Multivariate Interpolation: A Review”, In Algorithms for the Approximation of Functions and Data, J.C. Mason and M.G. Cox, eds., Clarendon Press, pp. 143-167, 1987.
[14]. S. N. Parappa and M. P. Singh, “Conjugate Descent of Gradient Descent Radial Basis Function for Generalization of Feed-forward Neural Network”, International Journal of Advancements in Research & Technology, pg. 112-125, Vol. 2, Issue 12, 2013.
Citation
Dipak D. Shudhalwar, Ganesh Kumar Dixit, Pallavi Agrawal, "Optimized Neural Network Architecture for The Classification of Voice Signals," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.502-506, 2018.
Adapting TFMCC Protocol in PIM-DM for avoiding Congestion Control in Wired Multicast
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.507-512, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.507512
Abstract
PIM-DM is a multicast routing protocol that uses the underlying unicast routing information base to flood multicast datagrams to all multicast routers. End-to-End Multicast Congestion Control (MCC) is a complex problem. TFMCC (TCP Friendly Multicast Congestion Control) is a congestion control mechanism for multicast transmissions. Where the sending rate is adapted to the receiver experiencing the worst network conditions TFMCC shows better performance. TFMCC is stable and responsive under a wide range of network conditions and scales to receiver sets on the order of several thousand receivers. In this paper, we implemented TFMCC protocol to PIM-DM model and also we compare TFMCC with TCP behaviour. TFMCC is designed to be reasonably fair when competing for bandwidth, sending rate, varying number of links, different receiver capacity and scalability. Experimental results show tremendous performance improvement in throughput without affecting the TCP fairness of the protocol.
Key-Words / Index Term
PIM-DM,TFMCC, Congestion control, Scalability
References
[1] Mohammed A. Al-Jendary1, Maher A. Al-Sanabani2 “Congestion
Avoidance in Wireless Mesh Networks Based On Multicast
Routing Protocols” IJCSE vol-6 Issue-8 Aug 2018 E-ISSN: 2347-2693
[2] Christos Bouras1, postolos Gkamas1 and Georgios Kioumourtzis2.
“ Smooth Multicast Congestion Control for Adaptive Multimedia
Transmission" IEEE Infocom 2003.Twenty-second Annual Joint
Confenence Society (IEEE Cat.No.03CH37428)
[3] “TCP Friendly Rate Control (TFRC): Protocol Specification” S. Floyd M. Handley University College of London J. Padhye Microsoft J. Wider DoCoMo September 2008.
[4] S. Floyd, M. Handley, J. Padhye, and J. Widmer. “Equation-Based
Congestion Control for Unicast “ Pages 49-60 ACM SIGCOMM
Computer Communication Aug 2005
[5] Smith, H., Mutka, M., Rover, D. A “Feedback based Rate control
Algorithm for Multicast Transmitted Video Conferencing,” Accepted for publication in the Journal of High Speed Networks,vol 7 no 3,4,pp 259-279,1998
[6] Sisalem D., Wolisz A. “LDA + TCP - Friendly Adaptation: A
Measurement and Comparison Study,” in the 10th International
Workshop on Network and Operating Systems Support for Digital
Audio and Video (NOSSDAV’2000), June 25 - 28,2000, Chapel
Hill,NC, USA.
[7] Protocol Independent Multicast (PIM), Dense Mode Protocol.
Specification. Deborah Estrin. omputer science Department/ISI
University of Southern california. Los Angeles, CA 90089
estrin@usc.edu. Dino Farinacci. Cisco Systems Inc. 170 West
Tasman Drive,. San Jose, CA 95134 dino@cisco.com
[8] JOR¨ G WIDMER AND MARK HANDLEY “EXTENDING EQUATION-BASED CONGESTION CONTROL TO MULTICAST APPLICATIONS” UNIVERSITAT¨ MANNHEIM PRAKTISCHE INFORMATIK IV L15, 16 D-68131 MANNHEIM.
[9] D.L.Mills,A.Thyagarajan,and B.C Huffman. “Internet Timekeeping around the globe”. Proc Precision Time and Time Inerval(PTTI) Application and Planning Meeting, pages 365-371,Dec 1997.
Citation
V B Deepa, M B Ushadevi, "Adapting TFMCC Protocol in PIM-DM for avoiding Congestion Control in Wired Multicast," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.507-512, 2018.
Software Reliability Modeling Using Neural Network Technique
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.513-524, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.513524
Abstract
In this paper, we propose an artificial neural network-based approach for developing the model for software reliability estimation. The use of intelligent neural network and hybrid techniques in place of the traditional statistical techniques has shown a remarkable improvement in the development of prediction models for software reliability in the recent years. Among the intelligent and the statistical techniques, it is not easy to identify the best one since their performance varies with the change in data. In this paper, firstly the neural network from the mathematical viewpoints of software reliability modeling is explained. Then it is show how to apply neural network to develop a model for the prediction of software reliability. The implementation of proposed model is done with real software failure data sets. From simulation results, the proposed model significantly outperforms the traditional software reliability models.
Key-Words / Index Term
Software Reliability, Statistical, Artificial Neural network, Reliability Prediction
References
[1] M. R. Lyu, “Handbook of Software Reliability Engineering”, McGraw-Hill, 1996.
[2] J. D. Musa, A. Iannino, and K. Okumoto, “Software Reliability, Measurement, Prediction and Application”, McGraw-Hill, (1987).
[3] M. Xie, “Software Reliability Modeling”, World Scientific Publishing, (1991).
[4] C. Y. Huang, M. R. Lyu, and S. Y. Kuo, “A Unified Scheme of Some Non homogenous Poisson Process Models for Software Reliability Estimation,” IEEE Trans. Software Eng., 29 (3) (20030 261-269.
[5] A. L. Goel, and K. Okumoto, “Time-Dependent error-Detection Rate Model for Software Reliability and Other Performance Measures,” IEEE transactions on Reliability, R-28 (3) (1979) 206-211.
[6] M. Ohba, et al., “S-shaped Software Reliability Growth Curve: How Good Is It?” , COMPSAC’82, (1982) 38-44.
[7] S. Yamada, and S. Osaki, “Reliability Growth Models for Hardware and Software Systems Based on Non homogeneous Poisson Processes: a Survey,” Microelectronics and Reliability, 23 (1983) 91-112.
[8] S. Yamada, and S. Osaki, “S-shaped Software Reliability Growth Model with Four Types of Software Error Data”, International Journal of Systems Science, 14 (1983) 683-692.
[9] Z. Jelinski, and P. B. Moranda, “Software Reliability Research,” Statistical Computer Performance Evaluation (ed. Freiberger, W.), Academic Press, New York, (1972) 465-484.
[10] N. Karunanithi, Y. K. Malaiya, and D. Whitley, “Prediction of Software Reliability Using Neural Networks,” Proc. 1991 IEEE International Symposium on Software Reliability Engineering, (1991) 124-130.
[11] S. L. Ho, M. Xie, and T. N. Goh, “A Study of the Connectionist Models for Software Reliability Prediction, Computers and Mathematics with Applications, (46) (2003) 1037-1045.
[12] Y. Takada, K. Matsumoto and K. Torii, “A Software-Reliability Prediction Model Using a Neural Network”, System and Computers” 25 (14) (1994) 22-31
[13] N. Gupta and M. P. singh, “Estimation of Software Reliability with Execution time Model using the Pattern Mapping Technique of Artificial Neural Network”, Computer and Operation Research 32 (2005) 187-199
[14] C. Smidts, M. Stutzke and R.W. Stoddard, “Software reliability modeling: An approach to early reliability prediction”, IEEE Transactions on Reliability 47 (3) (1998) 268-278.
[15] M. Xie, G. Y. Hong and C. Wohlin, “Software reliability prediction incorporating information from a similar project”, Journal of System and Software, 49 (1) (1999) 43-48.
[16] Q. P. Hu, M. Xie and S. H. Ng, “Software reliability prediction improvement with prior information incorporated”, Proceeding of the 12th ISSAT International Conference on Reliability and Quality in Design 06 Chicago USA, (2006) 303-307
[17] N. Karunanithi, D. Whitley, and Y. K. Malaiya, “Prediction of Software Reliability Using Connectionist Models,” IEEE Transaction On Software Engineering, 18 (7) (1992) 563-574.
[18] T. M. Khoshgoftaar, R. M. Szabo, and P. J. Guasti, “Exploring the Behavior of Neural-network Software Quality Models,” Software Engineering Journal, 10 (3) (1995) 89–96.
[19] R. Sitte, “Comparison of Software Reliability Growth Predictions: Neural networks vs. parametric recalibration”, IEEE Transactions on Reliability, 48 (3) (1999) 285-291.
[20] K. Y. Cai, L. Cai, W. D. Wang, Z. Y. Yu, and D. Zhang, “On the Neural Network Approach in Software Reliability Modeling”, The Journal of Systems and Software, (2001) 47-62.
[21] L. Tian, and A. Noore, “On-line prediction of software reliability using an evolutionary connectionist model”, The journal of System and Software 77 (2005) 173-180.
[22] L. Tian and A. Noore, “Evolutionary neural network modeling for software cumulative failure time prediction”, Reliability Engineering & System safety, 87(1) (2005) 45-51
[23] C. G. Bai, Q. P. Hu, M. Xie, S. H. Ng, ”Software failure prediction based on markov Bayesian network model”, The Journal of System and Software 74 (3) (2005) 275-282.
[24] Y. S. Su and C. Y. Huang, “Neural-Network-based approaches for software reliability estimation using dynamic weighted combinational models”, Journal of System and Software, 80 (4) (2006) 606-615.
[25] S. Kanmani, V. R. Uthariaraj, V. Sankaranarayanan, and P. Thambidurai, “Object-oriented software failure fault prediction using neural networks”, Information and Software Technology 49 (2007) 483-492.
[26] H. Madsen, P. Thyregod, B. Burtschy, G. Albeanu, F. Popentiu, “On using soft computing techniques in software reliability engineering”, International Journal of Reliability, Quality and Safety Engineering, 13 (1) (2006) 61-72.
[27] R. Schalkoff, “Patten Recognition: Statistical, Structural and Neural Network.” Wiley India, ISBN 978-81-265-1370-3, (2007).
[28] A. R. Webb, “Statistical Pattern Recognition.”, John Wiley and Sons Ltd., 2nd, ISBN 0-470-84514-7,(2002).
[29] K. Hornik, M. Stinchcombe, and H. White, “Approximation capabilities of multiplayer feedforward networks”, Neural Networks, 4 (1989) 251- 257.
[30] S. Haykin, “Neural Networks”, Second Edition, Pearson Education (Singapore), (2004).
[31] T. Kohonen, “Correlation matrix memories.”, IEEE Trans Computers, 21 (1972) 353–359.
[32] J. B. MacQueen, “Some methods for classification and analysis of multivariate observations.”, Proc 5th Berkeley Symposium on Math Statistics and Probability, University of California Press, Berkeley, (19670 281–297.
[33] D. H. Ackley, G. E. Hinton, and T. J. Sejnowski, “A learning algorithm for Boltzmann machines.”, Cognitive Science, 9 (1985) 147–169
[34] S. Kirkpatrick, J. Gelatt, M. P. Vecchi, “Optimization by simulated annealing. Science”, 220 (1983) 671–680.
[35] T. Kohonen, “A Simple Paradigm for the Self-Organized Formulation of Structured Maps,” Competition and Cooperation in Neural Nets, (Eds.) S. Amari, M. Arbib, Berlin, Springer-Verlag, 5 (1982).
[36] J. J. Hopfield, “Neural Networks and Physical Systems with Emergent Collective Computational Abilities”. Proceedings of the National Academy Sciences (USA), 79 (1982), 2554 – 2558.
[37] J. J. Hopfield, “Neurons with Graded Responses Have Collective Computational Properties Like Those of Two-State Neurons”, in Proceedings of The National Academy Sciences (USA), 81 (1984) 3088 – 3092
[38] A. G. Barto, “Reinforcement learning and adaptive critic methods”, D. A. White, D. A. Sofge, (eds) Handbook of intelligent control: neural, fuzzy, and adaptive approaches, Van Nostrand Reinhold, New York, (1992) 469–471.
[39] A. G. Barto, R. S. Sutton, and C. W. Anderson” Neuron like adaptive elements that can solve difficult learning control problems”, IEEE Trans System Man Cybern, 13 (1983) 834–846.
[40] L. P. Kaelbling, M. H. Littman, and A. W. Moore, “Reinforcement learning: A survey”, Journal of Artificial Intelligence Research, 4 (1996) 237–285.
[41] 41. P. J. Werbos, “Backpropagation through time: What it does and how to do it”, Proc. IEEE, 78 (10) (1990) 1550–1560.
[42] H. Atlan, and I. R. Cohen, “Theories of immune networks. Spriner-Verlag, Berlin (1989)
[43] F. J. Pineda, “Generalization of back-propagation to recurrent neural networks.”, Physical Rev Letter, 59 (1987) 2229–2232.
[44] M. L. Minsky and S. Papert, “Perceptrons.”, MIT Press, Cambridge, MA, (1969).
[45] K. Kanoun and J. C. Laprie, “Software Reliability Trend Analyses from Theoretical to Practical Considerations”, IEEE Transactions on Software Engineering, 20 (9) (1994) 740-747.
Citation
Dipak D. Shudhalwar, Pallavi Agrawal, "Software Reliability Modeling Using Neural Network Technique," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.513-524, 2018.
Soft Computing Approach for Image Contrast Enhancement for Improving Image Visuality
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.525-528, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.525528
Abstract
The image enhancement is the well-known concept among the researchers as in the area of image enhancement a lot of work has been done by several authors but also more amendments can be done. In the image enhancement method not only a large number of techniques but also some ways to enhance the image are existed. The contrast enhancement or to improve the brightness of the image is one of the way to improve the quality of the image. This study develops a new approach for image contrast enhancement by considering HSI colour model and fuzzy inference system to improve the intensity of the image pixels. The simulation is done by taking a set of four different images into an account. The simulation results with respect to the Detail Variance and Background Variance of the images describes that the proposed work performs outstanding comparative to the traditional methods that are GLE, Enhanced AHE and original image.
Key-Words / Index Term
Image Enhancement, Contrast Enhancement, Color Model, HIS Model, Fuzzy Inference Model
References
[1]. A. Kaur et al, “Region of Interest based Contrast Enhancement Techniques for CT images”, 2016 Second International Conference on Computational Intelligence & Communication Technology, pp. 60-63, 2016.
[2]. A. Girdhar, S. Gupta, J. Bhullar, “Region Based Adaptive Contrast Enhancement of Medical Ultrasound Images”, Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, 2015.
[3]. A. Djerouni, H. Hamada, N. Berrached, “MR imaging contrast enhancement and segmentation using fuzzy clustering”, International Journal of Computer Science Issues, Vol. 8, pp. 392-401, 2011.
[4]. A. Makandar, B. Halalli, “Image enhancement techniques using highpass and lowpass filters”, International Journal of Computer Applications, Vol. 109, 2015.
[5]. C.Y. Wong, S. Liu, S.C. Liu, Md A. Rahman, S. Ching-Feng Lin, G. Jiang, N. Kwok, H. Shi, “Image contrast enhancement using histogram equalization with maximum intensity coverage”, Journal of Modern Optics, Vol. 63, pp. 1618-1629, 2016.
[6]. Gopi. P. C, Sharmila. R, Indhumathi. T and Savitha. S, “An Intelligent New Age Method of Image Compression and Enhancement with Denoising for Bio-Medical Application”, IJSRCSE, Vol 1, Issue 4, Pp 12-16, 2013.
[1]. N. Kanwal, A. Girdhar, S. Gupta, “Region Based Adaptive Contrast Enhancement of Medical X-Ray Images”, Bioinformatics and Biomedical Engineering, (iCBBE) 2011 5th International Conference on, 2011.
[2]. N. Naik,, “Low Contrast Image Enhancement using Wavelet Transform based Algorithms: A Literature Review” International Journal of Engineering and Technical Research (IJETR), Vol. 3, pp. 123-128, 2015.
[3]. Ritika, S. Kaur, “Contrast Enhancement Techniques for Images– A Visual Analysis”, International Journal of Computer Applications, Vol. 64, pp. 20-25, 2013.
[4]. R. Kaur, S. Kaur, “Comparison of contrast enhancement techniques for a medical image”. In Emerging Devices and Smart Systems (ICEDSS), IEEE, pp. 155-159, 2016.
[5]. V.A. Kotkar, S.S. Gharde, “Review Of Various Image Contrast Enhancement Techniques”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, pp. 2786-2793, 2013.
Citation
Mehzabeen Kaur, "Soft Computing Approach for Image Contrast Enhancement for Improving Image Visuality," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.525-528, 2018.
Semantic Web Approach of Integrating Big Data- A Review
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.529-532, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.529532
Abstract
Semantic Web is spread by World Wide Web Consortium (W3C) and international standardization body of the web. It is an extended form of the current web which provides an easier way to search, reuse, combine and share the information. Therefore Semantic Web is subsequently viewed as an integrator crosswise over various content, data applications, and frameworks. Today’s big data is usually pronounced as consisting of 3 V’s: volume, variety, and velocity. Variety of data discusses to deal with different formats of data and a large number of various data sources. Thus the problems of big data variety are important for solving many real-world difficulties. Semantic Web is used as an integrator to incorporate data from various kinds of sources like web services, relational databases, and spreadsheets etc. and in different formats. Due to the presence of data heterogeneity, this work presents various difficulties that may not be totally settled with the existing system. This paper is an attempt to focus on the various challenges that involved in integrating data from different types of sources and how different semantic web technologies and tools are used for the integration of disparate data.
Key-Words / Index Term
Semantic Web, Big Data, Disparate Data
References
[1] C. A. Knoblock and P. Szekely, “Exploiting semantics for big data integration”, AI Magazine, Vol.6, Issue.1, pp. 25-38, 2015.
[2] L. Ragusa, “Data Integration Tools for Overcoming Integration Challenges in 2017”, https://www.liaison.com
[3] C. Harvey, “Big Data Challenges”, https://www.datamation.com/bigdata
[4] J. Bhogal, I. Choksi, "Handling Big Data using NoSQL", In the Proceeding of the 2015 IEEE Conference on Advanced Information Networking and Applications Workshop (WAINA), pp. 393-398,2015.
[5] J. Pokorny, "NoSQL databases: a step to database scalability in web environment", International Journal of Web Information Systems, Vol. 9 Issue: 1,pp.69-82, 2013
[6] S. Siwoon, G. Myeong-Seon, and Y.S. Moon, "Anomaly detection for big log data using a Hadoop ecosystem", In the Proceeding of the 2017 IEEE International Conference on Big Data and Smart Computing (BigComp), pp.377-380, 2017
[7] S. Kumar, V. Singh, and B. Saini, "A survey on ontology matching techniques", In the Proceeding of 2014 International Conference on Computer and Communication Technology (ICCCT) , pp. 13-15, 2014.
[8] R. Hammami, H. Bellaaj, and A.H. Kacem, "Interoperability of healthcare information systems", In the Proceeding of the 2014 International Symposium on Networks, Computers and Communications, pp. 1-5, 2014
[9] A. Cuadra, M. M. Cutanda, D. Fuentes-Lorenzo and L. Sánchez, "A semantic web-based integration framework," In the Proceeding of the 2011 International Conference on Next Generation Web Services Practices, pp. 93-98, 2011.
[10] Y. Shi, X. Liu, Y. Xu and ZhenyanJi, "Semantic-based data integration model applied to heterogeneous medical information system”, In the Proceedign of the 2010 International Conference on Computer and Automation Engineering (ICCAE), pp. 624-628, 2010.
[11] S.K. Bansal and S. Kagemann, “Integrating Big Data: A Semantic Extract-Transform-Load Framework” IEEE Computer Society,Volume 48, Issue 3, 42-50, 2015.
[12] I. Merelli, H. Pérez-Sánchez, S. Gesing and D. D’Agostino, “Managing, Analysing, and Integrating Big Data in Medical Bioinformatics: Open Problems and Future Perspectives”, BioMed Research International, Volume 2014, pp.1-13, 2014.
[13] D. Ostrowski, N. Rychtyckyj, P. MacNeille and M. Kim,“Integration of Big Data Using Semantic Web Technologies” In the Proceeding of IEEE International Conference on Semantic Computing, pp.382-385, 2016.
[14] J Ahmed, R Gulmeher “Nosql databases: New trend of databases,emerging reasons, classification and security issues” International journal of engineering sciences & research technology, Volume 4, Special issue 6, June 2015.
[15] Oluigbo Ikenna V., Nwokonkwo Obi C., Ezeh Gloria N., Ndukwe Ngoziobasi G., "Revolutionizing the Healthcare Industry in Nigeria: The Role of Internet of Things and Big Data Analytics", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.1-12, 2017
[16] Anitya Kumar Gupta, Srishti Gupta, "Security Issues in Big Data with Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.27-32, 2017
[17] Loukia Karanikola, Isambo Karali and Sally McClean (2014), “Uncertainty reasoning for the Big Data Semantic Web”, In the Proceeding of IEEE 15th International Conference on Information Reuse and Integration, 147 – 154, 2014
[18] J.F. Sánchez-Rada, M. Torres, C.A. Iglesias, R. Maestre, and E. Peinado, “A Linked Data approach to sentiment and emotion analysis of twitter in the financial domain”, In the Proceedings of the Second International Workshop on Finance and Economics on the Semantic Web (FEOSW 2014), Anissaras, Crete, Greece. 26th May 2014, pp.51-62, 2014
[19] Zhang, J., & Huang, M. L. “5Ws model for big data analysis and visualization”, In the Proceeding of IEEE International Conference Computational Science and Engineering, pp. 1021-1028, 2013
[20] D. Jeon, and W. Kim, “Development of semantic decision tree,” In the Proceedings of 3rd International Conference on Data Mining and Intelligent Information Technology Applications (ICMiA), pp. 28-34, 2011
[21] R.T. Bedeley, and L.S. Iyer, “Big Data opportunities and challenges: the case of banking industry”, In the Proceedings Southern Association for Information Systems Conference (SAIS), Macon, pp. 1-6, 2014
Citation
Jeelani Ahmed, Muqeem Ahmed, "Semantic Web Approach of Integrating Big Data- A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.529-532, 2018.