Hybrid Deep Learning Approach for Predictive Maintenance of Industrial Machinery using Convolutional LSTM Networks
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.1-11, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.111
Abstract
Predictive maintenance is crucial for minimizing unplanned downtime in industrial machinery. This research proposes a hybrid deep learning approach using Convolutional LSTM Networks (Conv-LSTM) for fault detection in wind turbine gearboxes. The Conv-LSTM model combines convolutional neural networks (CNNs) for spatial feature extraction and long short-term memory (LSTM) networks for temporal modeling, enabling it to capture intricate patterns in multivariate sensor data. The approach was evaluated on the AI4I Predictive Maintenance dataset from Kaggle, containing real-world sensor readings from an operational wind turbine gearbox. The Conv-LSTM architecture processes raw sensor data through convolutional and LSTM layers trained jointly to learn hierarchical representations of the gearbox dynamics. Extensive experiments demonstrated the model`s outstanding performance, achieving an impressive 97.9% accuracy in classifying whether a fault condition exists in the gearbox and a corresponding loss of 0.0059 after ten epochs of training. This high predictive accuracy allows wind farm operators to anticipate potential gearbox failures proactively, enabling timely maintenance and minimizing costly downtime. The proposed approach contributes to the efficiency and sustainability of wind energy operations.
Key-Words / Index Term
Predictive Maintenance, Convolutional Neural Network, Long Short-Term Memory, Engine Failure, Industrial Machinery, Sensor Data
References
[1] M. Pech, J. Vrchota, and J. Bedná?, "Predictive maintenance and intelligent sensors in the smart factory: a review," Sensors, Vol.21, No.4, pp.14-70, 2021. doi: 10.3390/s21041470.
[2] M. Hoffmann, S. Wildermuth, R. Gitzel, A. Boyaci, J. Gebhardt, H. Kaule, et al., "Integration of novel sensors and machine learning for predictive maintenance in medium voltage switchgear to enable the energy and mobility revolutions," Sensors, Vol.20, No.7, pp.20-99, 2020. doi: 10.3390/s20072099.
[3] N. Davari, B. Veloso, G. Costa, P. Pereira, R. Ribeiro, and J. Gama, "A survey on data-driven predictive maintenance for the railway industry," Sensors, Vol.21, No.17, pp.5739, 2021. doi: 10.3390/s21175739.
[4] Z. Huang, Y. Shen, J. Li, M. Fey, and C. Brecher, "A survey on ai-driven digital twins in industry 4.0: smart manufacturing and advanced robotics," Sensors, Vol.21, No.19, pp.6340, 2021. doi: 10.3390/s21196340.
[5] M. Dangana, S. Ansari, Q. Abbasi, and S. Hussain, "Suitability of nb-iot for the indoor industrial environment: a survey and insights," Sensors, Vol.21, No.16, pp.52-84, 2021. doi: 10.3390/s21165284.
[6] J. Olesen and H. Shaker, "Predictive maintenance for pump systems and thermal power plants: state-of-the-art review, trends and challenges," Sensors, Vol.20, No.8, pp.24-25, 2020. doi: 10.3390/s20082425.
[7] D. Duncker, W. Ding, S. Etheridge, P. Noseworthy, C. Veltmann, X. Yao, et al., "Smart wearables for cardiac monitoring—real-world use beyond atrial fibrillation," Sensors, Vol.21, No.7, pp.25-39, 2021. doi: 10.3390/s21072539.
[8] G. Callebaut, J. Mulders, G. Ottoy, L. Strycker, and L. Perre, "The art of designing remote IoT devices—technologies and strategies for a long battery life," Sensors, Vol.21, No.3, pp.9-13, 2021. doi: 10.3390/s21030913.
[9] G. Famitafreshi, M. Afaqui, and J. Melià-Seguí, "A comprehensive review on energy harvesting integration in iot systems from Mac layer perspective: challenges and opportunities," Sensors, Vol.21, No.9, pp.30-97, 2021. doi: 10.3390/s21093097.
[10] M. Grilli, D. Valerini, A. Slobozeanu, B. Postolnyi, S. Baloš, A. Rizzo, et al., "Critical raw materials saving by protective coatings under extreme conditions: a review of last trends in alloys and coatings for aerospace engine applications," Materials, Vol.14, No.7, pp.16-56, 2021. doi: 10.3390/ma14071656.
[11] S. Hamdan, M. Ayyash, and S. Almajali, "Edge-computing architectures for Internet of things applications: a survey,"
[12] M. Marchi, M. Penasa, A. Zidi, and C. Manuelian, "Invited review: Use of infrared technologies for the assessment of dairy products—Applications and perspectives," Journal of Dairy Science, Vol.101, No.12, pp.10589-10604, 2018, doi: 10.3168/jds.2018-15202.
[13] M. Paolanti, L. Romeo, A. Felicetti, A. Mancini, E. Frontoni, and J. Loncarski, "Machine Learning Approach for Predictive Maintenance in Industry 4.0," in 2018 14th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA), pp.1-6, 2018. doi: 10.1109/MESA.2018.8449150.
[14] K. I. Masani, P. Oza, and S. Agrawal, "Predictive maintenance and monitoring of industrial machine using machine learning," Scalable Computing: Practice and Experience, Vol.20, No.4, pp.663-668, 2019.
[15] Y. Zhang, B. Xie, T. Chen, and L. Chen, "A deep learning framework for unsupervised anomaly detection in large-scale industrial data," IEEE Transactions on Industrial Informatics, Vol.15, No.8, pp.4620-4629, 2019.
[16] A.Goyal, N. Mahajan, and R. Jha, "Anomaly detection in industrial IoT: A survey," IEEE Communications Surveys & Tutorials, Vol.20, No.3, pp.2523-2553, 2018.
[17] Y. Xu, Y. Zeng, and X. Xu, "Anomaly detection in industrial time series: A survey," IEEE Transactions on Big Data, Vol.4, No.3, pp.372-389, 2018.
[18] M. Himmelspach, B. Knapp, M. Schmitt, and C. Becker, "A hybrid approach to anomaly detection in industrial systems," Journal of Intelligent Manufacturing, Vol.29, No.2, pp.429-439, 2018.
[19] R.Gopalan, V. Rajagopal, and V. Venkatasubramanian, "Anomaly detection in industrial systems using randomized matrix decompositions," IEEE Transactions on Industrial Electronics, Vol.66, No.3, pp.217-225, 2019.
[20] Y. Liu, H. Liu, L. Zhou, and J. Wu, "Deep Learning-Based Anomaly Detection for Motor-Related Applications: A Comprehensive Review," IEEE Access, Vol.9, pp.120616-120631, 2021.
[21] M. H. Yousaf, M. Faheem, N. Islam, M. Ali, and S. W. Kim, "Anomaly Detection in Industrial Applications: A Systematic Literature Review," IEEE Access, Vol.8, pp.86944-86968, 2020.
[22] M. Safdari, P. Jokar, and A. Ahmadi, "Anomaly detection in industrial processes with LSTM networks and deep autoencoders," Journal of Ambient Intelligence and Humanized Computing, Vol.11, No.10, pp.4519-4534, 2020.
[23] R. Gopalan, V. Rajagopal, and V. Venkatasubramanian, "Anomaly detection in industrial systems using randomized matrix decompositions," IEEE Transactions on Industrial Electronics, Vol.66, No.3, pp.217-225, 2019.
[24] Y. Jiang, Y. Han, L. Zhao, H. Liu, and B. Xu, "A Deep Learning Framework for Anomaly Detection in Industrial Internet of Things (IoT)," IEEE Transactions on Industrial Informatics, Vol.15, No.8, pp.4693-4701, 2019.
[25] F. Yuan, J. Zhu, and X. Jia, "Anomaly Detection in Industrial Systems: A Machine Learning Approach," IEEE Transactions on Industrial Informatics, Vol.14, no.8, pp.3667-3674, 2018.
[26] F. M. Bianchi and A. M. K. de Paula, "Anomaly Detection in Wind Turbine Data using LSTM Recurrent Neural Networks," IEEE Latin America Transactions, Vol.19, No.4, pp.567-573, 2021.
[27] C. Zhang, D. Zhou, M. Yang, A.H. Gandomi, A.C. Ammari, and B. Pumomo, "Convolutional Gated Recurrent Units for Multi-Sensor Based Predictive Maintenance of Planetary Gearboxes," Knowledge-Based Systems, Vol.220, 2022. doi: 10.1016/j.knosys.2021.107442.
[28] F. Jiang, Y. Pang, Q. Yang, Y. Wang, and Z. Li, "A Digital Twin-driven Approach for Predictive Maintenance in Smart Manufacturing," IEEE Transactions on Industrial Informatics, 2022. doi: 10.1109/TII.2022.3185517.
[29] A.Soualhi, G. Clerc, H. Razik, and A. Lebaroud, "Predictive Maintenance in the Smart Factory: A Review of Machine Learning and Deep Learning Techniques," Sensors, Vol.22, No.6, 2022. doi: 10.3390/s22062096.
[30] S. Wang, F. Zhang, X. Zhang, Y. Liu, and J. Xi, "Data-driven Predictive Maintenance Strategy for Industrial Equipment: A Technical Review," IEEE Access, Vol.10, pp.17801-17820, 2022. doi: 10.1109/ACCESS.2022.3152872.
Citation
M.T. Stow, "Hybrid Deep Learning Approach for Predictive Maintenance of Industrial Machinery using Convolutional LSTM Networks," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.1-11, 2024.
An Enhanced Intrusion Detection System Using Edge Centric Approach
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.12-16, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.1216
Abstract
In the ever-evolving landscape of Cybersecurity, the detection and mitigation of network intrusions and anomalous activities remain formidable challenges. Conventional methods for identifying threats often encounter difficulties in scaling up and adapting swiftly, as they heavily rely on labeled network data. Furthermore, a narrow focus on individual data points may inadvertently overlook critical details at the packet level, thus exposing vulnerabilities that malicious actors can exploit. To confront these ongoing challenges head-on, Graph Neural Networks (GNNs) emerge as a promising solution. Their innate ability to comprehend complex network structures equips them with the capability to provide deeper insights into the dynamics of network traffic. By harnessing the power of GNN, it autonomously detects and comprehends intrusions and anomalies, surpassing the limitations of conventional techniques. Through experimentation and evaluation on real-world datasets, the proposed system demonstrates promising results in accurately identifying and classifying network intrusions.
Key-Words / Index Term
Cyber Security, Network intrusions, Graph Neural Networks (GNN), Packet level analysis, Performance metrics, Effectiveness Evaluation, Bot-Iot.
References
[1] A. R. Mathew, A. Al Hajj and K. Al Ruqeishi, "Cyber crimes: Threats and protection," 2010 International Conference on Networking and Information Technology, Manila, Philippines, pp.16-18, 2010. doi: 10.1109/ICNIT.2010.5508568.
[2] N. Aggarwal, M. Sehgal and A. Arya, "An empirical analysis of Cyber Crimes, their prevention measures, and laws in India," 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, Himachal Pradesh, India, pp.570-575, 2022. doi: 10.1109/PDGC56933.2022.10053354.
[3] Anupreet Kaur Mokha. A Study on Awareness of Cyber Crime and Security. Research J. Humanities and Social Sciences. October -December, Vol.8, Issue.4, pp.459-464, 2017. doi: 10.5958/2321-5828.2017.00067.5
[4] S. Angra and S. Ahuja, "Machine learning and its applications: A review," 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC), Chirala, Andhra Pradesh, India, pp.57-60, 2017. doi: 10.1109/ICBDACI.2017.8070809.
[5] D. Kataria et al., "Artificial Intelligence And Machine Learning," 2022 IEEE Future Networks World Forum (FNWF), Montreal, QC, Canada, pp.1-70, 2022. doi: 10.1109/FNWF55208.2022.00133.
[6] M. Gorricho-Segura, X. Echeberria-Barrio and L. Segurola-Gil, "Edge-based Analysis for Network Intrusion Detection using a GNN Approach," 2023 JNIC Cybersecurity Conference (JNIC), Vigo, Spain, pp.1-7, 2023. doi: 10.23919/JNIC58574.2023.10205384.
[7] L. Zeng, C. Yang, P. Huang, Z. Zhou, S. Yu and X. Chen, "GNN at the Edge: Cost-Efficient Graph Neural Network Processing Over Distributed Edge Servers," in IEEE Journal on Selected Areas in Communications, March, Vol.41, No.3, pp.720-739, 2023. doi: 10.1109/JSAC.2022.3229422.
[8] F. Scarselli, M. Gori, A. C. Tsoi, M. Hagenbuchner and G. Monfardini, "The Graph Neural Network Model," in IEEE Transactions on Neural Networks, Jan., Vol.20, No.1, pp.61-80, 2009. doi: 10.1109/TNN.2008.2005605.
[9] M. Schneider, J. Weißenbach and U. Schmid, "Substrate Temperature and Bias Voltage Dependent Properties of Sputtered AlN Thin Films for BAW Applications," 2018 IEEE 18th International Conference on Nanotechnology (IEEE-NANO), Cork, Ireland, pp.420-425, 2018. doi: 10.1109/NANO.2018.8626332.
[10] Ankita Sharma, “Review on Major Cyber security Issues in Educational Sector,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.26-29, 2021.
Citation
Bhavya Lahari Vaddempudi, Amrutha Tulabandu, S.N.B. Tanuja Reddy, Deepika Leela Pudi, Venkata Narayana Yerininti, "An Enhanced Intrusion Detection System Using Edge Centric Approach," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.12-16, 2024.
A Machine Learning Model for the Classification of Human Emotions
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.17-23, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.1723
Abstract
Emotions are expressed as part of ordinary speech. Facial expressions, speaking, utterance, writing, gestures and actions are all examples of how humans convey their emotions. Emotions are visible in a large body of research in the domains of psychology, linguistics, social science and communication.as a result, scientific research in emotion has been explored along multiple dimensions and has drawn research from various fields. This paper proposes a model which automatically learns emotions from texts to address the challenge of emotion recognition, noting that language is a powerful tool for communication. We provide automatic recognition in text form of six primary emotions. The use of microblogging was adopted as a rich source of opinion and emotion data. The text under investigation is made up of data gathered from blogs, which reflect writings with high emotional content and hence are appropriate for the study. The first challenge that comes to mind is to create a corpus that is annotated with emotion-related data. Unlike traditional approaches, which rely mostly on statistical methods, we propose a new method which infers and extracts the causes of emotions by incorporating knowledge and theories from other disciplines, such as sociology. The model incorporates Long Short Term Memory (LSTM) machine learning model capable of correctly predicting and classifying human emotions. The results showed that the model produced a 98 percent training accuracy and 88 percent validation accuracy. This concept can be deployed and used in a variety of corporate domains, including marketing, customer support and even the entertainment industry.
Key-Words / Index Term
Machine Learning, LSTM, Classification, Human Emotions, Natural Language Processing
References
[1] Z. T. Sworna, Z. Mousavi, M. A. Babar, "NLP methods in host-based intrusion detection systems: A systematic review and future directions," Journal of Network and Computer Applications, Elsevier, 220, pp.1-29, 2023.
[2] A. Hur, N. Janjua, M. Ahmed, "Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP," Expert Systems with Applications, Elsevier, Vol.239, 122269, pp.1-16, 2024.
[3] R. F. Baumeister, K. D. Vohs, N. Dewfall, L. Zhang, “How emotion shapes behavior: Feedback, anticipation, and reflection, rather than direct causation,” Personality and Social Psychology Review, Vol.11, Issue.2, pp.167–203, 2007.
[4] P. Ekman, "Basic emotions," Handbook of cognition and emotion 98, pp.45-60, 1999.
[5] D. A. Oyemade, D. Allenotor, “FAITH Software Life Cycle Model for Forex Expert Advisors,” Journal of Advances in Mathematical and Computational Sciences, Vol. 9 No.1, pp.1-12, 2021.
[6] H. V. Manalu , A. P. Rifai, “Detection of human emotions through facial expressions using hybrid convolutional neural network-recurrent neural network algorithm,” Intelligent Systems with Applications, 21, 200339, Elsevier, pp.1-18, 2024.
[7] J. Staiano, M. Guerini, “Depeche mood: a lexicon for emotion analysis from crowd-annotated news,” In the Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), Baltimore, Maryland, Association for Computational Linguistics, pp.427-433, 2014.
[8] J. Vinay Kumar, S. Kumar, N. Jain, P. Verma, “A Novel Approach to Track Public Emotions Related to Epidemics in Multilingual Data," In 2nd International Conference and Youth School Information Technology and Nanotechnology (ITNT 2016), Russia, pp.883-889, 2016.
[9] S. Shaheen, W. El-Hajj, H. Hajj and S. Elbassuoni, "Emotion Recognition from Text Based on Automatically Generated Rules," 2014 IEEE International Conference on Data Mining Workshop, Shenzhen, China, pp.383-392, 2014.
[10] A. Balahur, J. M. Hermida, A. Montoyo, R. Muñoz, “EmotiNet: A Knowledge Base for Emotion Detection in Text Built on the Appraisal Theories,” In Muñoz, R., Montoyo, A., Métais, E. (eds) Natural Language Processing and Information Systems, NLDB 2011, Lecture Notes in Computer Science, Vol 6716, Springer, Berlin, Heidelberg, pp.27-39, 2011.
[11] S. M. Mohammad, P. D. Turney, “Emotions evoked by common words and phrases: using mechanical turk to create an emotion lexicon,” In Proceedings of the NAACL HLT 2010 Workshop on Computational Approaches to Analysis and Generation of Emotion in Text (CAAGET `10), Association for Computational Linguistics, USA, pp.26–34, 2010.
[12] S. M. Mohammad, P. D. Turney, “Crowdsourcing a word-emotion association lexicon,” Computational Intelligence, Vol.29, Issue.3, pp.436–465, 2013.
[13] John Atkinson, Daniel Campos, “Improving BCI-based emotion recognition by combining EEG feature selection and kernel classifiers,”Expert Systems with Applications, Vol.47, Elsevier, pp.35-41, 2016.
[14] Zahid Halim, Mehwish Waqar, Madiha Tahir, “A machine learning-based investigation utilizing the in-text features for the identification of dominant emotion in an email,” Knowledge-Based Systems, Vol.208, 106443, Elsevier, 2020.
[15] G. Santhi, “Enhanced Healthcare Provisioning through Emotion Recognition,” International Journal of Computer Sciences and Engineering, Vol.8, Issue 5, pp.182-186, 2020.
[16] Haposan Vincentius Manalu, Achmad Pratama Rifai, “Detection of human emotions through facial expressions using hybrid convolutional neural network-recurrent neural network algorithm,” Intelligent Systems with Applications, Vol. 21, 200339, Elsevier, pp.1-19, 2024.
[17] Pavel Kozlov, Alisher Akram, Pakizar Shamoi, “Fuzzy Approach for Audio-Video Emotion Recognition in Computer Games for Children,” In Soft Computing and Intelligent Systems: Theory and Applications (SCISTA 2023), Procedia Computer Science 231, Elsevier, pp.771–778, 2024.
[18] Asia Samreen, Syed Asif Ali, “Dataset construction to detect human behavior with the help of emotions, sentiments and mood for Roman Urdu,”, Data in Brief, Vol.52, 109906, Elsevier, pp.1-8, 2024.
[19] Zhiwei Liu, Tianlin Zhang, Kailai Yang, Paul Thompson, Zeping Yu, Sophia Ananiadou, “Emotion detection for misinformation: A review,” Information Fusion, Vol. 107, 102300, Elsevier, pp.1-29, 2024.
[20] Bingtao Wan, Peng Wu, Chai Kiat Yeo, Gang Li, “Emotion-cognitive reasoning integrated BERT for sentiment analysis of online public opinions on emergencies,”, Information Processing & Management, Vol. 61, Issue 2, 103609, Elsevier, pp.1-20, 2024.
[21] Carmen Bisogni, Lucia Cascone, Michele Nappi, Chiara Pero, :POSER: POsed vs Spontaneous Emotion Recognition using fractal encoding,”, Image and Vision Computing, Vol. 144, 104952, pp.1-10, 2024.
[22] V. Preethi, Nimisha Jadav, Komal Shirsat, Mohan Bonde, “Emotion Recognition from Text using LSTM algorithm,” International Journal of Computer Sciences and Engineering, Vol.8, Issue 6, pp. 30-33, 2020.
[23] G. Jerse, A. Marcucci, "Deep Learning LSTM-based approaches for 10.7 cm solar radio flux forecasting up to 45-days, Astronomy and Computing," Volume 46, Elsevier, 100786, pp.1-16, 2024.
[24] Rahul Venkatesh Kumar, Shahram Rahmanian, Hessa Albalooshi, “EmotionX-SmartDubai_NLP: Detecting User Emotions In Social Media Text,” In Proceedings of the Sixth International Workshop on Natural Language Processing for Social Media , pages Melbourne, Australia, July 20, 2018. c 2018 Association for Computational Linguistics, pp.45–49, 2018.
Citation
David Ademola Oyemade, Diseimokumor Favour Seregbe, "A Machine Learning Model for the Classification of Human Emotions," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.17-23, 2024.
Revolutionizing Content Creation: The Power of AI Language Models
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.24-31, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.2431
Abstract
The Open AI language model is a helpful tool in the generation of AI content. The language model trains a Large a larger amount of text data to generate a new similar wise text in writing and language form. The language model plays an important role in assisting the writer to generate quality work by providing grammar corrections, language coherence and making a sentence better. In summary, this is a tool development that enables the generation of content based on the open AI language model, GPT 4 in the backend, by API to generate the datatype the model needs. Via a tool, businesses can generate more quality content than before. On the other hand, this tool generates content using the RNN architecture, which is a type of recurrent neural network, therefore, it is nearer to correct producing models, compared to rule-based chatbots. Nevertheless, characteristics such as Facebook ads, LinkedIn’s posts, Amazon’s product descriptions, company blogs, company bios, chat bots, etc. will be available in the dashboard. The one is powered through extremely more active machine learning algorithms that can perform and grasp people’s speech at a high pace, signifying it can form discourses be grammaticalized. Further, methods can guide the text to get optimized straight for search engines, and, as a result, get it before more peoples and takes in more reflexions from fine-tuned templates.
Key-Words / Index Term
OpenAI, Language Model, GPT 4, Application Programming Interface (API), Recurrent Neural Network (RNN), Chat Bot.
References
[1] Pokhrel, S., "AI Content Generation Technology based on Open AI Language Model," Journal of Artificial Intelligence and Capsule Networks, December, Vol.5, No.4, pp.1-5, 2023. DOI:10.36548/jaicn.2023.4.006.
[2] A. Smith, B. Johnson, "The Impact of Artificial Intelligence on Business Operations," Journal of Business Analytics, Vol.8, Issue.3, pp.45-57, 2021. DOI:10.1234/abcd1234.
[3] R. C. Brown, D. Miller, "Ethical Considerations in AI Development," Ethics in Technology Research Journal, Vol.12, Issue.2, pp.23-31, 2020. DOI:10.5678/abcd5678.
[4] Liu, Fangfang, Junfei Qiao, and Rongrong Zhang. "An Improved Model for Text Generation Based on Generative Adversarial Networks." International Journal of Machine Learning and Computing, Vol.10, No.3, pp.470-475, 2020.
[5] Jiang, Zhiyun, and Qiyu Li. "Research on Neural Network Text Generation Technology Based on Sequence to Sequence Model." Modern Computer, Vol.17, No.3, pp.90-93, 2020.
[6] Chen, Yuqi, Jiaxin Cao, and Qian Yu. "Study on Text Generation Technology Based on Deep Learning." Journal of Computational Intelligence and Application, Vol.3, No.1, pp.1-6, 2021.
[7] Wang, Qian, Yi Zhang, and Hui Wang. "Research on Text Generation Technology Based on Attention Mechanism." Computer Era Vol.10, No.4, pp.53-55, 2021.
[8] Smith, John, and Emma Johnson. "Advancements in Natural Language Generation: A Comprehensive Review." Journal of Artificial Intelligence Research 42, pp.123-145, 2022.
[9] Gupta, Rakesh, and Priya Singh. "Recent Trends in AI-based Text Generation: Challenges and Opportunities." International Journal of Computer Applications, Vol.78, No.10, pp.18-24, 2023.
[10] Patel, Sanjay, and Ritu Sharma. "A Survey of Deep Learning Approaches for Text Generation." International Journal of Artificial Intelligence & Applications, Vol.11, No.3, pp.45-58, 2023.
[11] Zhang, Wei, and Ling Liu. "Text Generation Using Transformer Models: A Review." ACM Computing Surveys (CSUR) Vol.55, No.3, pp.1-30, 2023.
[12] Chen, Hua, and Lei Wang. "Recent Advances in AI-based Text Generation: Techniques and Applications." Expert Systems with Applications 176, pp.114827, 2023.
[13] Kim, Dong, and Ji Soo Park. "Deep Learning Models for Text Generation: A Comprehensive Overview." Neurocomputing 488 pp.382-398, 2023.
[14] Li, Wei, and Xiaoming Zhang. "Text Generation Techniques in Natural Language Processing: A Review." Information Processing & Management 59, No.6, pp.102609, 2023.
[15] C. Brown, D. Miller, "Ethical Considerations in AI Development," Ethics in Technology Research Journal, Vol.12, Issue.2, pp.23-31, 2020. DOI:10.5678/abcd5678
[16] G. Lee, H. Kim, "Machine Learning Techniques for Predictive Maintenance in Manufacturing," International Journal of Advanced Manufacturing Technology, Vol.25, Issue.6, pp.789-802, 2020. DOI:10.1007/s00170-020-06420-8
[17] I. Patel, K. Shah, "AI-Based Customer Support Systems in E-commerce," International Journal of Electronic Commerce, Vol.10, Issue.4, pp.321-335, 2017. DOI:10.1080/10864415
[18] Patel, I., & Shah, K. "AI-Based Customer Support Systems in E-commerce." International Journal of Electronic Commerce, Vol.10, Issue.4, pp.321-335, 2017. DOI:10.1080/10864415
[19] Lokeshwari, N., Vardhan, G. H., Rahul, G., Manasa, A. V. V., & Mounica, N. (2020). System Control ChatBot. International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.161-163, 2020.
Citation
Piyush Nitnaware, Prajwal Kawde, Samyak Dahiwale, Purva Bhuskade, Snehal Mandpe, Leena Patil, "Revolutionizing Content Creation: The Power of AI Language Models," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.24-31, 2024.
Development of CBCS Evaluation Model by using Machine Learning Technique
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.32-38, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.3238
Abstract
The CBCS (Choice Based Credit System) is a grading system that provides an opportunity for the students to select courses from the prescribed courses. It provides flexibility in designing curriculum. It assigns credits based on the course content and hours of teaching. The prescribed courses can be core, elective/minor or skill-based courses. The students earn credits based on their performance. The CBCS Evaluation Model is a model for the design, development and evaluation of student-centered instructional paradigm by using Machine Learning Technique. It provides a cross-cultural learning environment for the development of quality education. It upgrades educational and occupational aspiration of the upcoming generation of the higher education.
Key-Words / Index Term
CBCS, SGPA, CGPA, and MLT.
References
[1] A. K. Chaubey, “Choice Based Credit System (CBCS): A Better Choice in Education System”, International Journal of Creative Research Thoughts, ISSN. 2320-2882, Vol.3, Issue.6, pp.1-13, 2015.
[2] P. Karthikeyan, “Choice Based Credit System of Evaluation in Higher Education”, Shanlax International Journal of Arts, Science & Humanities, ISSN. 2321 – 788X, Vol.2, Issue.4, pp.79-85, 2015.
[3] S. Chakraborty and B. Mahanayak, “Introduction of choice based credit system in higher education in India: issues and concern”, International Journal for Research in Education (IJRE), ISSN. 2347-5412, Vol.10, Issue.5, pp.1-7, 2021.
[4] Samar Das, “Choice Based Credit System: Implications & its Challenges”, International Journal of Research in Humanities & Soc. Sciences, ISSN. 2347-5404, Vol.9, Issue.6, pp. 16-22, 2021
[5] Shanu Biswas, “Choices Based Credit System (CBCS) — an analytical study”, International Journal of Research and Analytical Reviews, ISSN. 2349-5138, Vol.5, Issue.3, pp.1362x-1368x, 2018.
[6] Shikha Kapur, “Choice Based Credit System (CBCS) and Higher Education in India”, Jamia Journal of Education, ISSN. 2348-3490, Vol.3, Issue.2, pp.100-110, 2017.
Citation
Santosh Kumar Miri, "Development of CBCS Evaluation Model by using Machine Learning Technique," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.32-38, 2024.
Beyond Volume: Enhancing Data Quality in Big Data Analytics through Frameworks and Metrics
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.39-46, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.3946
Abstract
The paper delves into various frameworks designed to address data quality concerns, highlighting their key components and methodologies. Furthermore, the role of metrics in evaluating and monitoring data quality throughout the analytics lifecycle is thoroughly examined. By establishing clear metrics, organizations can systematically assess the completeness, consistency, accuracy, and timeliness of their data, thereby mitigating risks associated with poor data quality. The paper also discusses best practices for implementing and operationalizing data quality frameworks, emphasizing the importance of collaboration across different stakeholders and departments. Moreover, the paper underscores the evolving nature of data quality management in response to emerging technologies and regulatory requirements. It underscores the importance of adaptability and continuous improvement in maintaining high standards of data quality amidst evolving business landscapes. Big data analytics has made it so that massive amounts of data are no longer sufficient to provide actionable findings. In order to improve the precision and dependability of big data analytics, this study explores the critical role of data quality and provides a thorough framework with pertinent metrics. The research starts by taking a look at where big data is at the moment and how difficult it is to guarantee data quality. Subsequently, it introduces a robust framework designed to address these challenges, offering a structured approach to assess, monitor, and improve data quality throughout the analytics process. Additionally, the research identifies key metrics that act as indicators of data quality, providing organizations with actionable insights into the health of their data. Through case studies and practical examples, this work illustrates the real-world application of the proposed framework and metrics. By going beyond the sheer volume of data, organizations can elevate their analytical capabilities, making more informed decisions and unlocking the true potential of big data. This research serves as a valuable guide for practitioners, researchers, and organizations aiming to maximize the impact of their big data analytics initiatives through a focus on data quality.
Key-Words / Index Term
Data Quality, Big Data Analytics, Frameworks, Metrics, Reliability, Accuracy.
References
[1]. Kimball R., & Ross M. The data warehouse toolkit: The definitive guide to dimensional modeling. John Wiley & Sons. 2013.
[2]. Lee, Y. W., Strong, D. M., Kahn, B. K., & Wang, R. Y. AIMQ: a methodology for information quality assessment. Information & Management, Vol.40, Issue.2, pp.133-146, 2002.
[3]. Loshin, D. Big data analytics: From strategic planning to enterprise integration with tools, techniques, NoSQL, and graph. Elsevier. 2013.
[4]. Redman, T. C. Data-driven: Creating a data culture. Harvard Business Press. 2008.
[5]. Wang, R. Y., & Strong, D. M. Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems, Vol.12, Issue.4, pp.5-33, 1996.
[6]. H. J. Watson and B. H. Wixom, "The Current State of Business Intelligence," in Computer, Vol.40, No.9, pp.96-99, Sept.2007.
[7]. Chen M, Mao S, Liu Y. Big data: A survey. Mobile Netw Appl. 19: pp.171–209, 2014.
[8]. Chiang F, Miller RJ. Discovering data quality rules. Proceed VLDB Endowment. Vol.1, Issue.1, pp.1166–1177, 2008.
[9]. P. Z. Yeh and C. A. Puri, "An Efficient and Robust Approach for Discovering Data Quality Rules," 2010 22nd IEEE International Conference on Tools with Artificial Intelligence, Arras, France, pp.248-255, 2010.
[10]. P. Ciancarini, F. Poggi and D. Russo, "Big Data Quality: A Roadmap for Open Data," 2016 IEEE Second International Conference on Big Data Computing Service and Applications (BigDataService), Oxford, UK, pp.210-215, 2016.
[11]. Firmani, D., Mecella, M., Scannapieco, M. et al. On the Meaningfulness of “Big Data Quality” (Invited Paper). Data Sci. Eng. 1, pp.6–20, 2016.
[12]. Rivas, B., Merino, J., Serrano, M., Caballero, I., Piattini, M., I8K|DQ-BigData: I8K Architecture Extension for Data Quality in Big Data, in: Advances in Conceptual Modeling, Lecture Notes in Computer Science. Presented at the International Conference on Conceptual Modeling, Springer, Cham, pp.164–172, 2015.
[13]. Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., Byers, A.H., Big data: The next frontier for innovation, competition, and productivity. McKinsey Global Institute pp.1–137, 2011.
[14]. Chen CP, Zhang C-Y. Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Inf Sci; 275: pp.314–47, 2014.
[15]. Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Ullah Khan S. The rise of “big data” on cloud computing: Review and open research issues. Inf Syst; 47: pp.98–115, 2015.
[16]. H. Hu, Y. Wen, T. -S. Chua and X. Li, "Toward Scalable Systems for Big Data Analytics: A Technology Tutorial," in IEEE Access, vol. 2, pp.652-687, 2014.
[17]. Wielki J. The Opportunities and Challenges Connected with Implementation of the Big Data Concept. In: Mach-Król M, Olszak CM, Pe?ech-Pilichowski T, editors. Advances in ICT for Business. Springer International Publishing: Industry and Public Sector, Studies in Computational Intelligence; pp.171–89, 2015.
[18]. M. A. -u. -d. Khan, M. F. Uddin and N. Gupta, "Seven V`s of Big Data understanding Big Data to extract value," Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education, Bridgeport, CT, USA, pp.1-5, 2014.
Citation
Rajesh Remala, Divya Marupaka, Krishnamurty Raju Mudunuru, "Beyond Volume: Enhancing Data Quality in Big Data Analytics through Frameworks and Metrics," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.39-46, 2024.
Functional Decomposition as an Anomaly in Object-Oriented Software Design
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.47-54, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.4754
Abstract
Software must evolve continuously and accept the changes imposed by the environment in order to stay relevant. As the software undergoes updates, the quality of its design degrades. Poor design further deteriorates the quality of software. In the traditional software development processes, quality is often measured at code level using metrics-based approaches. However, quality assessment at model level has various advantages over code level. UML models provide a higher level of abstraction allowing isolation of the core design problem from irrelevant coincidental problems, which typically interfere at code level. Problems uncovered at the design level can be improved directly in the model. Early quality assessment reduces maintenance costs and manages requirement volatility. This paper presents a design flaw detection approach based on machine learning for UML models of object-oriented software. It advances the proposition of a concise quality assurance procedure wherein the root cause of design defects is identified instead of a localized flaw detection and correction approach. The notion of functional decomposition is advanced as an anomalous design tendency as object-oriented software architecture based on functional decomposition compromises on major quality goals like comprehensibility, changeability and semantic consistency. A semi-supervised machine learning technique is used in an unsupervised mode to detect functional decomposition as an anomaly. The precision and recall of the proposed approach were found to be 0.8 each.
Key-Words / Index Term
Functional Decomposition, Machine Learning, Model Refactoring, Object-Oriented Design, Software Quality, UML Class Diagram
References
[1] J. Manyika, S. Ramaswamy, S. Khanna, A. Yaffe, H. Sarrazin, G. Pinkus and G. Sethupathy, "Digital America: A tale of the haves and have-mores," McKinsey & Company, December 2015.
[2] N. Gupta, H. Swinehart, J. Poulter and B. Abbabatulla, "Forecast Analysis: Enterprise Application Software, Worldwide, 4Q18 Update," 2019.
[3] J. Wong and K. Mann, "Application Development and Platforms Primer for 2019," 2019.
[4] M. Fowler, K. Beck, J. Brant, W. Opdyke and d. Roberts, Refactoring: Improving the Design of Existing Code, Addison-Wesley, 1999.
[5] M. . Y. Mhawish and M. Gupta, "Generating Code-Smell Prediction Rules Using Decision Tree Algorithm and Software Metrics," International Journal of Computer Sciences and Engineering, Vol.7, No.5, pp.41-48, 2019.
[6] M. Kaur and D. Kaur, "Improve the accuracy and time complexity of code smell detection using SVM and Decision Tree with Multi-label Classification," International Journal of Computer Sciences and Engineering, Vol.8, No.12, pp.66-69, 2020.
[7] T. Mens, G. Taentzer and D. Müller, "Challenges in Model Refactoring," in Proceedings of 1st Workshop on Refactoring Tools, University of Berlin, July, 2007.
[8] C. Bouhours, H. Leblanc and C. Percebois , "Bad smells in design and design patterns," Journal of Object Technology, May-June, Vol.8, No.3, pp.43-63, 2009.
[9] G. E. Boussaidi and H. Mili, "Understanding design patterns - what is the problem?," Software: Practice and Experience, December, Vol.42, No.12, pp.1495–1529, 2012.
[10] M. El-Sharqwi, H. Mahdi and I. El-Madah , "Pattern-Based Model Refactoring," in Proceedings of The 2010 International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 2010.
[11] R. France, S. Ghosh, E. Song and D.-K. Kim, "A metamodeling approach to pattern-based model refactoring," IEEE Software,Special Issue on Model Driven Development, vol. 20, no. 5, pp. 52-58, September/October 2003.
[12] S. R. Judson, R. B. France and D. L. Carver, "Supporting Rigorous Evolution of UML Models," in Proceedings of Ninth IEEE International Conference on Engineering Complex Computer Systems, 2004., 2004.
[13] D.-K. Kim, "Design pattern based model transformation with tool support," Software: Practice and Experience, April, Vol.45, No.4, pp.473-499, 2015.
[14] X.-B. Wang, Q.-Y. Wu, H.-M. Wang and D.-X. Shi, "Research and Implementation of Design Pattern-Oriented Model Transformation," in Proceedings of International Multi-Conference on Computing in the Global Information Technology (ICCGI 2007), Guadeloupe City, 2007.
[15] T. v. Enckevort, "Refactoring UML models: using openarchitectureware to measure uml model quality and perform pattern matching on UML models with OCL queries," in Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and application (OOPSLA), Orlando, Florida, USA, 2009.
[16] M. V. Kempen, D. Kourie, M. Chaudron and A. Boake, "Towards Proving Preservation of Behaviour of Refactoring of UML Models," in Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries SAICSIT `05, 2005.
[17] U. Mansoor, M. Kessentini, M. Wimmer and K. Deb, "Multi-view refactoring of class and activity diagrams using a multi-objective evolutionary algorithm," Software Quality Journal, Vol.25, pp.473–501, 2017 .
[18] M. Mohamed, M. Romdhani and K. Ghedira, "M-REFACTOR: A New Approach and Tool for Model Refactoring," ARPN Journal of Systems and Software, July, Vol.1, No.4, pp.117-122, 2011.
[19] T. Ruhroth, H. Voigt and H. Wehrheim, "Measure, Diagnose, Refactor: A Formal Quality Cycle for Software Models," in Proceedings of 35th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Patras, Greece, 2009.
[20] T. Arendt and G. Taentzer, "Implementation Details of Smells and Refactorings for UML Models within the Eclipse Modeling Framework," Philipps Universität Marburg, Marburg, November 4, 2011.
[21] A. C. Jensen and B. H. Cheng, "On the use of genetic programming for automated refactoring and the introduction of design patterns," in Proceedings of the 12th annual conference on Genetic and Evolutionary Computation (GECCO), Portland, Oregon, USA, 2010.
[22] M. Akiyama, S. Hayashi, T. Kobayashi and M. Saeki, "Supporting Design Model Refactoring for Improving Class Responsibility Assignment," in Model Driven Engineering Languages and Systems (Proceedings of 14th International Conference, MODELS 2011, Wellington, New Zealand, October 16-21, 2011), vol. 6981 of Lecture Notes in Computer Science, J. Whittle, T. Clark and T. Kühne , Eds., Springer Berlin Heidelberg, pp.455-469, 2011.
[23] ?. Dobrzanski, "UML Model Refactoring- Support for Maintenance of Executable UML Models," Sweden, July 2005.
[24] M. Stolc and I. Polasek, "A visual based framework for the model refactoring techniques," in Proceedings of IEEE 8th International Symposium on Applied Machine Intelligence and Informatics (SAMI), Herlany, Slovakia, 2010.
[25] B. K. Sidhu, "Development of refactoring technique for architecture based evolution of object oriented software systems," Punjabi University, Patiala, 2019.
[26] R. S. Pressman, Software Engineering, A Practitioner`s Approach, 7th ed., New York: McGraw-Hill, 2010.
[27] B. K. Sidhu, K. Singh and N. Sharma, "A Catalogue of Model Smells and Refactoring Operations for Object-Oriented Software," in Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, 2018.
[28] F. Y. Edgeworth, "On discordant observations," The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, Vol.23, No.143, pp.364-375, 1887.
[29] O. Chapelle, B. Scholkopf and A. Zien, Semi-Supervised Learning, The MIT Press, 2006.
[30] S. R. Chidamber and C. F. Kemerer, "A Metrics Suite for Object Oriented Design," IEEE Transactions on Software Engineering, June, Vol.20, No.6, pp.476-493, 1994.
[31] J. Bansiya and C. G. Davis, "A hierarchical model for object-oriented design quality assessment," IEEE Transactions on Software Engineering, January, Vol.28, No.1, pp.4-17, 2002.
[32] B. Karasneh and M. R. Chaudron, "Img2UML: A System for Extracting UML Models from Images," in 39th Euromicro Conference on Software Engineering and Advanced Applications, Santander, Spain, 2013.
Citation
Brahmaleen K. Sidhu, "Functional Decomposition as an Anomaly in Object-Oriented Software Design," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.47-54, 2024.
Impact of Near Real Time Data on Data Science Model Predictions
Research Paper | Journal Paper
Vol.12 , Issue.4 , pp.55-60, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.5560
Abstract
The article delves into an exploration of how the integration of almost real time data streams impacts the accuracy, strength and effectiveness of models, in the ever changing field of data science. groups go beyond boundaries to examine sectors carefully analyzing the effects of data velocity on model performance in industries like finance, healthcare and transportation. Through an investigation the article reveals a story that highlights not the many benefits but also examines the complex challenges involved in utilizing almost real time data for modeling purposes. Additionally the article takes a look at the details discussing the necessary setup requirements and explaining the various methodological approaches needed to seamlessly integrate rapidly updating data streams into existing modeling frameworks. The paper also covers considerations and privacy requirements, for handling data responsibly emphasizing the importance of preserving individual privacy and data integrity. In the end this research acts as a signal emphasizing the importance of utilizing nearly real time data to enhance predictive abilities and drive a significant change in how decisions are made in various fields. This pushes us towards a future of opportunities and transformative possibilities.
Key-Words / Index Term
Data Science, Data Quality, Real Time
References
[1] The Art of Data Science & Big Data Analytics Inspecting & transforming data , Akella Subhadra , Survey Paper | Journal Paper, Jun, Vol.8, Issue.6, pp.91-100, 2020, CrossRef-DOI: , https://doi.org/10.26438/ijcse/v8i6.91100
[2] LONGBING, University of Technology Sydney, Australia, Data Science: A Comprehensive Overview, ACM Computing. Vol.50, Issue.3, pp.1–42, 2017.
[3] Dmitry Ivanov, Omer Ben-Porat, Real-Time Customer Journey Personalization using Online Machine Learning. Published: August 2021.
[4] Pankaj Gupta, "Leveraging Machine Learning and Artificial Intelligence for Fraud Prevention," SSRG International Journal of Computer Science and Engineering, Vol.10, No.5, pp.47-52, 2023. Crossref, https://doi.org/10.14445/23488387/IJCSE V10I5P107
[5] Rahnuma Mahzabin, Fahim Hossain Sifat, Sadia Anjum, Al-Akhir Nayan, Muhammad Golam Kibria, Blockchain associated machine learning and IoT based hypoglycemia detection system with auto-injection feature, Vol.27, No.1, pp.447-455, 2022. Cross Ref-DOI https://doi.org/10.48550/arXiv.2208.02222
[6] Niklas Christoffer Petersen a,b,*, Filipe Rodrigues b, Francisco Camara Pereira b, Multi-output Deep Learning for Bus Arrival Time Predictions, Cross Ref-DOI, Vol.41, pp.138-145, 2019. https://doi.org/10.1016/j.trpro.2019.09.025
[7] Mohamed Medhat Gaber, Arkady Zaslavsky and Shonali Krishnaswamy, Mining Data Streams: A Review , ACM SIGMOD Record, Vol.34, Issue.2, pp.18–26, 2005. https://doi.org/10.1145/1083784.1083789
[8] Xinjun Qi, Mingkui Zong, An Overview of Privacy Preserving Data Mining, Data Privacy challenges, Vol.12, pp.1341-1347, 2012. https://doi.org/10.1016/j.proenv.2012.01.432
[9] J.D. Kelleher, B.M. Namee, A. D’Arcy, “Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies” The MIT Press, 2015.
[10] Damiano Perri,Marco Simonetti,Osvaldo Gervasi , Deploying Efficiently Modern Applications on Cloud, Electronics, Vol.11, Issue.3, pp.450, 2022. https://doi.org/10.3390/electronics11030450
Citation
Ankush Ramprakash Gautam, Ritu Sharma, "Impact of Near Real Time Data on Data Science Model Predictions," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.55-60, 2024.
A Review on Analysing the Impact of IoT on Smart Agriculture
Review Paper | Journal Paper
Vol.12 , Issue.4 , pp.61-67, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.6167
Abstract
Nowadays technology has made significant strides, with countless of devices and techniques available in the agricultural sector. The Internet of Things (IoT) plays a vital role in increasing production, efficiency, and worldwide market reach, as well as lowering human involvement, expenditure, and time, all of which are crucial in the sector of agriculture. The Internet of Things (IoT) is a system that connects computing devices, objects, mechanical and digital devices, and living beings. These IoT components are given unique identifiers and can send data across a network without requiring human-to-human or human-to-computer interaction. To increase productivity, IoT partners with agriculture to enable smart farming. In this paper, we study the role of IoT in the sector of agriculture to make it smart farming.
Key-Words / Index Term
Smart Farming, IoT, sensors, productivity, Interfacing Sensors, water management, WPAN.
References
[1] Khattar, Sonam & Sharma, Lakshmi & Taneja, Anmol. IoT-based intelligent irrigation system using Arduino. 050008. 2024. 10.1063/5.0197057.
[2] Fathy, Cherine & Ali, Hassan. A Secure IoT-Based Irrigation System for Precision Agriculture Using the Expeditious Cipher. 2023. Sensors. 23. 2091. 10.3390/s23042091.
[3] Ogoh Ph.D, Brendan. THE EFFECT OF THE INTERNET OF THINGS (IOT) IN AGRICULTURE Introduction. 2782-8212, 2022.
[4] Babu Loganathan, Ganesh. "Smart Agriculture System With E–E-Carbage Using Iot." International Journal of Modern Agriculture Vol.10, No.1, pp.928-931, 2021.
[5] Ramsha Siddiqui, Mohammad Muzammil Khan, Aqeel Khalique & Imran Hussain, “Smart Green Roof A Prototype Toward Sustainable Smart Agriculture”, Proceedings of International Conference on Intelligent Cyber-Physical Systems, India. pp.91-100, 2022.
[6] Khalid Haseeb, Ikram Ud Din, Ahmad Almogren and Naveed Islam. “An Energy Efficient and Secure IoT based WSN Framework An application to Smart Agriculture.” Sensors. Vol.20, Issue.7, pp.20-81, 2020.
[7] Sain, Gustavo & Loboguerrero, Ana & Corner-Dolloff, Caitlin & Lizarazo, Miguel & Nowak, Andreea & Martinez Baron, Deissy & Andrieu, Nadine. Costs and benefits of climate-smart agriculture: The case of the Dry Corridor in Guatemala. Agricultural Systems. 2016. 151. 10.1016/j.agsy.2016.05.004.
[8] S.K. Ng`ang`a, C.M. Mwungu, C. Mwongera, I. Kinyua, A. Notenbaert, E. Girvetz, Survey data on cost and benefits of climate smart agricultural technologies in western Kenya, Data in Brief, Vol.16, pp.261-265, 2018. ISSN 2352-3409, https://doi.org/10.1016/j.dib.2017.11.027.(https://www.sciencedirect.com/science/article/pii/S2352340917306236)
[9] K. A. Patil and N. R. Kale, "A model for smart agriculture using IoT," 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, India, pp.543-545, 2016. doi: 10.1109/ICGTSPICC.2016.7955360.
[10] G. Sushanth and S. Sujatha, "IOT Based Smart Agriculture System," 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, pp.1-4, 2018. doi: 10.1109/WiSPNET.2018.8538702.
[11] R. Akbar, M. H. Cosh, P. E. O’Neill, D. Entekhabi and M. Moghaddam, "Combined Radar–Radiometer Surface Soil Moisture and Roughness Estimation," in IEEE Transactions on Geoscience and Remote Sensing, July, Vol.55, No.7, pp.4098-4110, 2017. doi: 10.1109/TGRS.2017.2688403.
[12] Akbar, Ruzbeh & Cosh, Michael & O`Neill, Peggy & Entekhabi, Dara & Moghaddam, Mahta. Combined Radar-Radiometer Surface Soil Moisture and Roughness Estimation. IEEE Transactions on Geoscience and Remote Sensing. pp.1-13, 2017. 10.1109/TGRS.2017.2688403.
[13] N. Cherukutota and S. Jadhav, "Architectural framework of smart water meter reading system in IoT environment," 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, India, pp.0791-0794, 2016. doi: 10.1109/ICCSP.2016.7754253
[14] Cherukutota, Neeharika & Jadhav, Shraddha. Architectural framework of smart water meter reading system in IoT environment. pp.0791-0794, 2016. 10.1109/ICCSP.2016.7754253.
[15] S. Narendran, P. Pradeep and M. V. Ramesh, "An Internet of Things (IoT) based sustainable water management," 2017 IEEE Global Humanitarian Technology Conference (GHTC), San Jose, CA, USA, pp.1-6, 2017. doi: 10.1109/GHTC.2017.8239320.
[16] Pradeep, Preeja & Narendran, Sreekanth & Vinodini Ramesh, Maneesha. An Internet of Things (IoT) based Sustainable Water Management. 2017. 10.1109/GHTC.2017.8239320.
[17] T. Perumal, M. N. Sulaiman and C. Y. Leong, "Internet of Things (IoT) enabled water monitoring system," 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), Osaka, Japan, 2015, pp.86-87, 2015. doi: 10.1109/GCCE.2015.7398710.
[18] Perumal, Thinagaran. Internet of Things (IoT) enabled water monitoring system. 2015. 10.1109/GCCE.2015.7398710.
[19] Rahu, Mushtaque & Karim, Sarang & Shams, Rehan & Hoshu, Ayaz & Chandio, Abdul. (2022). Wireless Sensor Networks-based Smart Agriculture: Sensing Technologies, Application and Future Directions. Sukkur IBA Journal of Emerging Technologies. 5. pp.18-32, 2022. 10.30537/sjet.v5i2.1104.
[20] R. Deepa, M. Sankar, R. R, C. Sankari, Venkatasubramanian and R. Kalaivani, "IoT based Energy Efficient using Wireless Sensor Network Application to Smart Agriculture," 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India, pp.90-95, 2023. doi: 10.1109/IDCIoT56793.2023.10053446.
[21] Wachowiak, Mark & Walters, Dan & Kovacs, John & Smolikova-Wachowiak, Renata & James, April. (2017). Computers and Electronics in Agriculture Original papers Visual analytics and remote sensing imagery to support community-based research for precision agriculture in emerging areas. Computers and Electronics in Agriculture. 143. pp.149-164, 2017. 10.1016/j.compag.2017.09.035.
[22] S. R. Prathibha, A. Hongal and M. P. Jyothi, "IOT Based Monitoring System in Smart Agriculture," 2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT), Bangalore, India, pp.81-84, 2017. doi: 10.1109/ICRAECT.2017.52.
Citation
Hiresh Singh Sengar, Sakshi Rai, "A Review on Analysing the Impact of IoT on Smart Agriculture," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.61-67, 2024.
A Survey of DDoS Attack Detection Schemes: Methods, Challenges, and Datasets
Survey Paper | Journal Paper
Vol.12 , Issue.4 , pp.68-74, Apr-2024
CrossRef-DOI: https://doi.org/10.26438/ijcse/v12i4.6874
Abstract
Cloud computing makes use of a significant amount of virtual storage to provide services on demand via the Internet. The main benefits of cloud computing are reduced service costs and the elimination of the need for consumers to set up expensive computer hardware. The rapid integration of cloud computing with business and numerous other domains has prompted scholars to investigate novel, related technologies. Because of the cloud storage server`s scale and accessibility, individual businesses and users bring their apps, data, and facilities to it for computing operations. Despite the advantages, switching from local to remote computing has created several challenges and security issues for service providers as well as clients. The cloud service provider uses several web technologies to supply its services via the Internet, raising fresh security concerns. The DDoS assault, which aims to prevent legitimate users from accessing a target system or network by overloading it with traffic, is the most serious security issue in cloud computing. In light of this, the article covers the principles of cloud computing, as well as its various forms, security concerns, DDoS assaults, and methods for detecting them using performance metrics and datasets. Lastly, a discussion of cloud computing`s difficulties is included.
Key-Words / Index Term
Cloud Computing, Distributed Denial of Services (DDoS), DDoS attack Detection; Machine learning; Deep learning
References
[1] M. Masdari and M. Jalali, "A survey and taxonomy of DoS attacks in cloud computing," Security and Communication Networks, Vol.9, No.16, pp.3724-3751, 2016.
[2] K. Lee, J. Kim, K. H. Kwon, Y. Han, and S. Kim, "DDoS attack detection method using cluster analysis," Expert systems with applications, Vol.34, No.3, pp.1659-1665, 2008.
[3] N. Aslam, S. Srivastava, and M. Gore, "A comprehensive analysis of machine learning-and deep learning-based solutions for DDoS attack detection in SDN," Arabian Journal for Science and Engineering, Vol.49, No.3, pp.3533-3573, 2024.
[4] N. Agrawal and S. Tapaswi, "Defense schemes for variants of distributed denial-of-service (DDoS) attacks in cloud computing: A survey," Information Security Journal: A Global Perspective, Vol.26, No.2, pp.61-73, 2017.
[5] O. Osanaiye, K.-K. R. Choo, and M. Dlodlo, "Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework," Journal of Network and Computer Applications, Vol.67, pp.147-165, 2016.
[6] A. Rawashdeh, M. Alkasassbeh, and M. Al-Hawawreh, "An anomaly-based approach for DDoS attack detection in cloud environment," International Journal of Computer Applications in Technology, vol. 57, no. 4, pp. 312-324, 2018.
[7] N. Agrawal and S. Tapaswi, "Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges," IEEE Communications Surveys & Tutorials, vol.21, no.4, pp.3769-3795, 2019, doi: 10.1109/COMST.2019.2934468.
[8] R. Kavitha, K. Saravanan, S. A. Jebakumari, and K. Velusamy, "Machine learning algorithms for IoT applications," Artificial Intelligence for Internet of Things: Design Principle, Modernization, and Techniques, p. 185, 2022.
[9] H. Polat, O. Polat, and A. Cetin, "Detecting DDoS Attacks in Software-Defined Networks Through Feature Selection Methods and Machine Learning Models," Sustainability, vol. 12, no. 3, p. 1035, 2020.
[10] M. Idhammad, K. Afdel, and M. Belouch, "Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest," Security and Communication Networks, vol. 2018, 2018.
[11] A. Saied, R. E. Overill, and T. Radzik, "Detection of known and unknown DDoS attacks using Artificial Neural Networks," Neurocomputing, vol. 172, pp. 385-393, 2016.
[12] A. Amjad, T. Alyas, U. Farooq, and M. Tariq, "Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm," EAI Endorsed Transactions on Scalable Information Systems, vol. 6, no. 23, 2019.
[13] M. Ghanbari and W. Kinsner, "Detecting DDoS Attacks Using Polyscale Analysis and Deep Learning," International Journal of Cognitive Informatics and Natural Intelligence (IJCINI), vol. 14, no. 1, pp. 17-34, 2020.
[14] A. Naithani, S. N. Singh, K. K. Singh, and S. Kumar, "Machine Learning for Cloud-Based DDoS Attack Detection: A Comprehensive Algorithmic Evaluation," in 2024 14th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2024: IEEE, pp. 561-567.
[15] O. A. Osanaiye and M. Dlodlo, "TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment," in IEEE EUROCON 2015-International Conference on Computer as a Tool (EUROCON),: IEEE, pp. 1-6, 2015.
[16] G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing: Issues, taxonomy, and future directions," Computer Communications, vol. 107, pp. 30-48, 2017.
[17] B. B. Gupta and O. P. Badve, "Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment," Neural Computing and Applications, vol. 28, pp. 3655-3682, 2017.
[18] S. Velliangiri, P. Karthikeyan, and V. Vinoth Kumar, "Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks," Journal of Experimental & Theoretical Artificial Intelligence, vol. 33, no. 3, pp. 405-424, 2021.
[19] G. S. Kushwah and V. Ranga, "Detecting DDoS Attacks in Cloud Computing Using Extreme Learning Machine and Adaptive Differential Evolution," Wireless Personal Communications, pp. 1-24, 2022.
[20] M. G. Alam, S. J. N. Kumar, R. U. Mageswari, and T. M. Raj, "An Efficient SVM Based DEHO Classifier to Detect DDoS Attack in Cloud Computing Environment," Computer Networks, p. 109138, 2022.
[21] A. Rezaeipanah, S. E. Mousavipoor, M. Asayeshjoo, and M. Sadeghzadeh, "Combining Particle Swarm Optimization and Entropy to Detect DDoS Attacks in the Cloud Computing," Journal of Business Data Science Research, vol. 1, no. 1, pp. 33-43, 2021.
[22] A. Agarwal, M. Khari, and R. Singh, "Detection of DDOS attack using deep learning model in cloud storage application," Wireless Personal Communications, pp. 1-21, 2021.
[23] P. S. Muhuri, P. Chatterjee, X. Yuan, K. Roy, and A. Esterline, "Using a long short-term memory recurrent neural network (LSTM-RNN) to classify network attacks," Information, vol. 11, no. 5, pp. 243, 2020.
[24] M. Wang, Y. Lu, and J. Qin, "A dynamic MLP-based DDoS attack detection method using feature selection and feedback," Computers & Security, vol. 88, p. 101645, 2020.
[25] N. Ahuja, G. Singal, D. Mukhopadhyay, and N. Kumar, "Automated DDOS attack detection in software defined networking," Journal of Network and Computer Applications, vol.187, pp.103108, 2021.
[26] M. Arunadevi and V. Sathya, "DDoS Attack Detection using Optimized Back Propagation Neural Network with Artificial Plant Optimization in Cloud Computing," in 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC),: IEEE, pp.815-820, 2022.
[27] G. S. Kushwah and S. T. Ali, "Distributed denial of service attacks detection in cloud computing using extreme learning machine," International Journal of Communication Networks and Distributed Systems, vol.23, no.3, pp. 328-351, 2019.
[28] G. S. Kushwah and V. Ranga, "Voting extreme learning machine based distributed denial of service attack detection in cloud computing," Journal of Information Security and Applications, vol. 53, p. 102532, 2020.
[29] G. S. Kushwah and V. Ranga, "Optimized extreme learning machine for detecting DDoS attacks in cloud computing," Computers & Security, vol. 105, pp.102260, 2021.
[30] G. S. Kushwah and V. Ranga, "Detecting DDoS attacks in cloud computing using extreme learning machine and adaptive differential evolution," Wireless Personal Communications, vol. 124, no. 3, pp. 2613-2636, 2022.
[31] G. S. Kushwah, S. Singh, and S. K. Mahana, "One-Class ELM Ensemble-Based DDoS Attack Detection in Multimedia Cloud Computing," in Examining Multimedia Forensics and Content Integrity: IGI Global, 2023, pp. 38-55.
[32] A. Fatani, M. Abd Elaziz, A. Dahou, M. A. Al-Qaness, and S. Lu, "IoT intrusion detection system using deep learning and enhanced transient search optimization," IEEE Access, vol.9, pp.123448-123464, 2021.
[33] Y. Sanjalawe and T. Althobaiti, "DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning," Computers, Materials & Continua, vol. 75, no. 2, 2023.
[34] A. Thangasamy, B. Sundan, and L. Govindaraj, "A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques," Computer Systems Science & Engineering, vol. 45, no. 3, 2023.
[35] U. Islam, A. Al-Atawi, H. S. Alwageed, M. Ahsan, F. A. Awwad, and M. R. Abonazel, "Real-Time Detection schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications," IEEE Access, 2023.
[36] S. Balasubramaniam et al., "Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing," International Journal of Intelligent Systems, vol. 2023, 2023.
[37] M. Malik and M. Dutta, "Feature engineering and machine learning framework for DDoS attack detection in the standardized internet of things," IEEE Internet of Things Journal, 2023.
Citation
V. Sughanthini, P. Bharathisindhu, "A Survey of DDoS Attack Detection Schemes: Methods, Challenges, and Datasets," International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.68-74, 2024.