Web-based Teaching in Particular Developing Counties, Experience at “Sulamani University”
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.1-4, Mar-2016
Abstract
Throughout the progress of technology at Kurdistan Region Independent (KRI) Universities, it was investigated the influence of technological resources on teaching and learning at the KRI Universities. The all modifications of technological resources occurred from past up to now which created a new teaching and learning generation. Before year 2003 the traditional approach was applied in teaching and learning without any improvement due to the sanctions over Kurdistan Region by Ba`ath Regime. As a result of that, the universities at Kurdistan were isolated from the universal development of technology. Respectively, traditional teaching (TT) approach (or On-campus teaching) was more common at the University of Sulaimani as teachers had limited materials that they relied mainly on the suitable books for the course, face to face, and (whiteboard-and-marker) teaching. The new generation, namely electronic teaching (ET) (or Off-campus teaching) started after year 2003 because the University of Sulaimani did not go through all the stages of developing technology, therefore, most modern technology were brought to that university; for example network, computer and internet. However there is still a gap between TT and ET because of unavailability of electronic learning (e-learning) infrastructure or any e-learning (EL) center at that university so far. Despite that, the web base teaching (WBT) has not been functioned yet and that is turn out to be a gap between teachers, learner and technologies; in addition to that teachers and learners have been using technologies for the reason of teaching but they don’t have sufficient background about the fully e-teaching (ET). This paper discussed the function of modern technological devices components (computer, internet and networking) to teaching approach and the method that has been created here is a web base teaching (WBT), with multimedia devices by lecturing video synchronized with PowerPoint which contains of twenty five week- lectures loaded to specific domain name and students can retrieve whenever they want. Finally, this paper examines the results of In-class-Test between groups of ten students in Computer science Department which they will have test by both of the methods namely on & Off-campus-teaching. Subsequently the lecturer investigates which result is more attractive by the teachers and students. The results show either in traditional or on the Web and ways or utilizing the computer and internet with strong network infrastructure for improving teaching in Sulamani University. The use of software application Camtasia studio8 for PowerPoint slides with teacher voice combined. The investigation of the real time for all both ON&OFF campus by testing groups of students and compare the results between the results.
Key-Words / Index Term
E-learning and e-teaching; based-Computer teaching; web base teaching; On and Off campus teaching
References
[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, "A Novel Security Based Model for Wireless Mesh Networks", International Journal of Scientific Research in Network Security and Communication, Vol -01, Issue-01Mar -Apr 2013 , pp (11-15),
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265
Citation
Kamaran HamaAli.A.Faraj, "Web-based Teaching in Particular Developing Counties, Experience at “Sulamani University”," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.1-4, 2016.
Survey on AIAOD: Advanced Intelligent Abandoned Object Detection
Survey Paper | Journal Paper
Vol.4 , Issue.3 , pp.5-9, Mar-2016
Abstract
Object detection and tracking is a very challenging task in image processing. This paper discusses about various object detection and tracking methods for crowded area such as airports, railway stations, shopping malls, residential apartment . Three major steps in video surveillance analysis are detection of moving objects, track those objects from frame to frame and recognise behaviours of those track objects to find out for suspicious activity detection. This paper mainly highlights the various object detection, object representation and object tracking techniques which are performed by different researchers in the past. This survey focused on different object detection using - background subtraction, fuzzy logic, temporal logic, hadoop, via temporal consistency modelling, nonflat static objects detection, abandoned detection of object in real time environments, detection of object on the basis of 3-dimensional image information. The usage of object tracking is for public safety, for efficient traffic management on roads , to fight against crime and terrorism.
Key-Words / Index Term
Abandoned Object Detection, Surveillance Systems, Fuzzy Logic, Temporal Logic, Consistency Model Etc.
References
[1] Fahian Shahriar Mahin1, Md. Nazmul Islam1, Gerald Schaefer2, and Md. Atiqur Rahman Ahad1, "A Simple Approach for Abandoned Object Detection", Int`l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV`15 | 427
[2] A. Singh, S. Sawan, M. Hanmandlu, V.K. Madasu, B.C. Lovell, " An abandoned object detection system based on dual background segmentation",2009 Advanced Video and Signal Based Surveillance,78-0-7695-3718-4/09 $25.00 © 2009 IEEE DOI 10.1109/AVSS.2009.74
[3] "An Efficient Approach for Real Time Tracking of Intruder and Abandoned Object in Video Surveillance System", International Journal of Computer Applications (0975 – 8887) Volume 54– No.17, September 2012
[4] "An Abandoned object Detection System using Background Segmentation", International Journal of Engineering Research & Technology (IJERT),Vol. 3 Issue 1, January - 2014
[5] Ansuman Mahapatra, Tusar Kanti Mishra, Pankaj K Sa, and Banshidhar Majhi, "Background Subtraction and Human Detection in Outdoor Videos using Fuzzy Logic", conference paper in ieee international conference on fuzzy systems • January 2013
[6] Hui Kong, Member, IEEE, Jean-Yves Audibert ,and Jean Ponce , Fellow, IEEE "Detecting Abandoned Objects with a Moving Camera" TIP-05187-2009, accepted 2009, accepted
[7] Pallavi S. Bangare, Nilesh J. Uke,"Implementation of Abandoned Object Detection in Real Time Environment", International Journal of Computer Applications (0975 – 8887) Volume 57– No.12, November 2012
[8] YingLi Tian, Senior Member, IEEE, Rogerio Schmidt Feris, Member, IEEE, Haowei Liu, Student Member, IEEE, Arun Hampapur, Senior Member, IEEE, and Ming-Ting Sun, Fellow, Ieee,"Robust Detection of Abandoned and Removed Objects in Complex Surveillance Videos", ieee Transactions On Systems, Man, And Cybernetics—Part C: Applications And Reviews, Vol. 41, No. 5, September 2011
[9] Yiliang Zeng 1, Jinhui Lan 1,*, Bin Ran 2, Jing Gao 1 and Jinlin Zou, "A Novel Abandoned Object Detection System Based on Three-Dimensional Image Information", Sensors 2015, 15
[10] Tejas Naren TN1, Shankar SiddharthKA2 , Venkat Krishnan S3,Sanjeevi LR4, "Abandoned Object Detection for Automated video Surveillance using Hadoop" , International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering.An ISO 3297: 2007 Certified Organization Vol. 3, Special Issue 3, April 2014
[11] Medha Bhargava • Chia-Chih Chen • M. S. Ryoo •J. K. Aggarwal,"Detection of object abandonment using temporal logic", Received: 24 January 2008 / Revised: 22 September 2008 / Accepted: 18 November 2008 / Published online: 15 January 2009
[12] Kevin Lin, Shen-Chi Chen, Chu-Song Chen, Daw-Tung Lin, Senior Member, IEEE, and Yi-Ping Hung "Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance", IEEE Transactions On Information Forensics And Security, Vol. 10, No. 7, July 2015 1359
[13] Thi Thi Zin, Member, IEEE, Pyke Tin, Hiromitsu Hama, Member, IEEE,and Takashi Toriu, Member, IEEE, "Unattended Object Intelligent Analyzer for Consumer Video Surveillance", IEEE Transactions on Consumer Electronics, Vol. 57, No. 2, May 2011
[14] Sivabalakrishnan.M, Dr.D.Manjula," Adaptive Background subtraction in Dynamic Environments Using Fuzzy Logic", Sivabalakrishnan.M. et al. / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 270-273
[15] Shuai Zhang, Member, IEEE, Chong Wang, Member, IEEE, Shing-Chow Chan, Member, IEEE, Xiguang Wei, and Check-Hei Ho," New Object Detection, Tracking, and Recognition Approaches for Video Surveillance Over Camera Network", IEEE SENSORS JOURNAL, VOL. 15, NO. 5, MAY 2015 2679
[16] Himani S. Parekh1, Darshak G. Thakore 2, Udesang K. Jaliya 3," A Survey on Object Detection and Tracking Methods", Vol. 2, Issue 2, February 2014 Copyright to IJIRCCE.
[17] Sanjivani Shantaiya, Kesari Verma, Kamal Mehta," Study and Analysis of Methods of ObjectDetection in Video, (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013
Citation
Sonali A. Hargude and S. R. Idate, "Survey on AIAOD: Advanced Intelligent Abandoned Object Detection," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.5-9, 2016.
Elate – A New Student Learning Model Utilizing EDM for Strengthening Math Education
Research Paper | Journal Paper
Vol.4 , Issue.3 , pp.10-14, Mar-2016
Abstract
The increase of e-learning resources such as interactive learning environments, learning management systems (LMS), intelligent tutoring systems (ITS), and hypermedia systems as well as the establishment of school databases of student test scores has created large repositories of data. These data can be converted into knowledge for enhancing teaching and learning process. This paper proposes a new learning model ELATE (Enhancing Learning And Teaching) for strengthening Mathematics education in school level and proposes a frame work for using Educational Data Mining for knowledge management. This model utilizes Educational Data Mining (EDM) methods to provide results to the learners regarding their performance and skill level and to the teachers about their wards performance and their capabilities. The teachers can use the EDM results to motivate the slow learners and move the over practiced students to the next level. The ELATE frame work proposed in this paper has five levels processing to provide knowledge management services to stakeholders of educational institutions especially for the teachers and students.
Key-Words / Index Term
LMS, ITS, ELATE, Educational Data Mining
References
[1] Romero, C. & Ventura, S, “Educational Data Mining: a Survey from 1995 to 2005”, Expert Systems with Applications, Vol. 1, Issue-33, Elsevier, pp. 135-146, 2007.
[2] Stamper, J.C., Koedinger, K.R., “Human-machine student model discovery and improvement using DataShop”, In Biswas, G., Bull, S., Kay, J., Mitrovic, A. (eds.) AIED. LNCS, vol. 6738, pp. 353–360. Springer, Heidelberg, 2011.
[3] Shyamala, K., Rajagopalan, S.P., “Data Mining Model for a Better Higher Educational System”, Information Technology Journal, Vol. 5, Issue-3, pp. 560-564, 2006.
[4] Ranjan, J., Ranjan, R.,“Application of Data mining Techniques in Higher Education in India”, Journal of Knowledge Management Practice, Vol. 11, Special Issue 1, January 2010.
[5] Bhusry Mamta, “Institutional Knowledge to Institutional Intelligence: A Data Mining Enabled Knowledge Management Approach”, International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2, Issue-5, pp. 1356-1360, 2012.
[6] Brent Martin , Antonija Mitrovic , Kenneth R Koedinger , Santosh Mathan, “Evaluating and Improving Adaptive Educational Systems with Learning Curves”, User Modeling and User-Adapted Interaction ,Vol.21, Issue-3, pp.249-283, 2011.
[7] Baker, R. S. J. d. “Data Mining for Education.” In International Encyclopedia of Education, 3rd ed., Edited by B. McGaw, P. Peterson, and E. Baker. Oxford, UK: Elsevier, 2011
[8] Baker, R. S. J. D., and K. Yacef, “The State of Educational Data Mining in 2009: A Review and Future Visions.” Journal of Educational Data Mining, Vol. 1, Issue-1, pp.3–17, 2009.
[9] Romero, C., Ventura,S., “Educational data mining: A review of the state of the art”, IEEE Transactions on systems man and Cybernetics Part C.Applications and review, Vol. 40, Issue-6, pp.601-618, 2010.
[10] Koedinger, K.R., Stamper, J.C., McLaughlin, E.A., & Nixon, T., “Using data-driven discovery of better student models to improve student learning”, In Yacef, K., Lane, H., Mostow, J., & Pavlik, P. (Eds.) In Proceedings of the 16th International Conference on Artificial Intelligence in Education, pp. 421-430, 2013.
[11] Pooja Thakar, Anil Mehta, Manisha, “Performance Analysis and Prediction in Educational Data Mining: A Research Travelogue”, International Journal of Computer Applications, Vol. 110, Issue-15, pp. 60-68 January 2015.
[12] Koedinger, K.R., Baker, R.S.J.d., Cunningham, K., Skogsholm, A., Leber, B., Stamper, J., “A Data Repository for the EDM community: The PSLC DataShop”, In Romero, C., Ventura, S., Pechenizkiy, M., Baker, R.S.J.d. (Eds.) Handbook of Educational Data Mining. Boca Raton, FL: CRC Press, 2010.
[13] S. Lakshmi Prabha, Dr. A. R. Mohamed Shanavas, “ Analysing Students Performance Using Educational Data Mining Methods”, International Journal of Applied Engineering Research, , Vol. 10, Issue-82, pg. 667-671, 2015.
[14] S. Lakshmi Prabha, Dr. A. R. Mohamed Shanavas, “A Study on Learning Factor Analysis – An Educational Data Mining Technique for Student Knowledge Modeling”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol.17, Issue-6, Ver. IV, pp.95-101,. Nov – Dec. 2015.
[15] S. Lakshmi Prabha, Dr. A. R. Mohamed Shanavas, “Assessing Students Performance Using Learning Curves”, International Journal of Engineering and Techniques, Vol. 1 Issue-6, pp. 6-16, Jan - Feb 2016.
[16] S. Lakshmi Prabha A. R. Mohamed Shanavas, “Implementation of E-Learning Package for Mensuration-A Branch of Mathematics”, IEEE, pp.219-221, 2014.
[17] Tawseef Ayoub Shaikh1, Amit Chhabra,” Effect of WEKA Filters on the Performance of the NavieBayes Data Mining Algorithm on Arrhythmia and Parkinson’s Datasets”, International Journal of Computer Sciences and Engineering(IJCSE), Vol. 2, Issue-5, pp.45-51, May 2014.
Citation
S. Lakshmi Prabha and A.R.Mohamed Shanavas, "Elate – A New Student Learning Model Utilizing EDM for Strengthening Math Education," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.10-14, 2016.
Image Denoising in Ultra Sound image using DWT with various Filters
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.15-24, Mar-2016
Abstract
Image denoising is the predominant task in the field of image processing and computer vision. The occurrence of noise is due to the influence of various internal and external sources that creates de trop signals, resulting in image noise. In medical images the presence of noise may leads to false clinical diagnosis. To prevent the contingence of noise, various image denoising algorithms are employed expeditiously to uproot the noise. Discrete Wavelet Transform (DWT) is employed to extinguish the occurrence of noise in medical images. It decomposes the input image into detailed and approximate coefficients at three levels. The sampled data is transformed into array of wavelet coefficients. Filters are introduced to eliminate the noises which are coupled with the input image. Wiener Filter, Adaptive Bilateral Filters (ABF) and Boundary Discriminative Noise Detection (BDND) are used to denoise the speckle noise and salt and pepper noise present in the Ultra Sound image. From these results it is observed that ABF filter works well against the speckle noise with the following metrics Peak Signal to Noise Ratio (PSNR), SSIM (Structural Similarity Index Measure), CoC (Coefficient of Correlation), EPI (Edge Preserving Index) for Medical images corrupted with noise.
Key-Words / Index Term
Wavelet transform, Wiener filter, BDND filter, ABF
References
[1]. Renjini L, Jyothi R L, “Wavelet Based Image Analysis: A Comprehensive Survey”, International Journal of Computer Trends and Technology (IJCTT) – Volume 21 Number 3 – Mar 2015.
[2]. Abbas H. Hassin AlAsadi,”Contourlet Transform Based Method for Medical Image Denoising”, International Journal of Image Processing (IJIP), Volume (9): Issue (1): 2015.
[3]. Neeraj Saini, Pramod Sethy, “Performance based Analysis of Wavelets Family for Image Compression-A Practical Approach”, International Journal of Computer Applications (0975 – 8887) Volume 129 – No.9, November, 2015.
[4]. Sai Gayathri. N, “Removal of High Density Impulse Noise Using Boundary Discriminative Noise Detection Algorithm”, International Journal of Innovative Research in Computer and Communication Engineering, March 2014.
[5]. Vijayalakshmi. A, Titus.C and Lilly Beaulah.H , “Image Denoising for different noise models by various filters: A Brief Survey” ,International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),Volume 3,page no 42-4,2014.
[6]. Meenakshi Chaudhary, Anupma Dhamija “A brief study of various wavelet families and compression techniques”, Journal of Global Research in Computer Science, April 2013(a-d, f)
[7]. Jyothi. Shettar, Ekta. Maini, Shreelakshmi S, Shashi Raj K, “Image sharpening & de-noising using bilateral & adaptive bilateral filters-A comparative analysis”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, August 2013
[8]. Reena Thakur, “Analysis of Orthogonal and Biorthogonal Wavelet using Gaussian noise for image denoising”, IJAIEM, ISSN-2319-4847, 2013.
[9]. Pragati Agrawal and Jayendra Singh Verma, ”A Survey of Linear and Non-Linear Filters for Noise reduction”, International Journal of Advance Research in Computer Science and Management Studies, Volume 1, Issue 3,pp:18-25,2013.
[10]. Er.Ravi Garg and Er. Abhijeet Kumar, “Comparison of Various Noise Removals Using Bayesian Framework”, International Journal of Modern Engineering Research (IJMER) , Jan-Feb 2012.
[11]. S. Agrawal and R.Sahu, International Journal of Science, Engineering and Technology Research (IJSETR) 1, 32-35 ,2012
[12]. Cheng Chen; Ningning Zhou, “A new wavelet hard threshold to process image with strong Gaussian Noise”, Advanced Computational Intelligence (ICACI), 2012.
[13]. Priyanka Singh, Priti Singh, Rakesh Kumar Sharma ,“JPEG Image Compression based on Biorthogonal, Coif lets and Daubechies Wavelet Families” , International Journal of Computer Applications (0975 – 8887 Volume 13– No.1, January 2011.
[14]. Shan Lal, Mahesh Chandra, Gopal Krishna Upadhyay, Deep Gupta, “Removal of Additive Gaussian Noise by Complex Double Density Dual Tree Discrete Wavelet Transform” ,MIT International Journal of Electronics and Communication Engineering, Vol. 1, No. 1, pp. 8-16, Jan 2011.
[15]. Olawuyi, N.J.” Comparative Analysis of Wavelet Based Denoising Algorithms on Cardiac Magnetic Resonance Images” Afr J Comp & ICT Olawuyi et al - Comparative Analysis of Wavelet-Based Denoising Algorithm Vol 4. No. 1. June 2011.
[16]. Zhu Youlian, Huang Cheng, “An Improved Median Filtering Algorithm Combined with Average Filtering” , Third International Conference on Measuring Technology and Mechatronics Automation, IEEE, 2011.
[17]. Fry.J, Pusateri. M, “High Speed Pipelined Architecture for Adaptive Median Filter” Applied Imagery Pattern Recognition Workshop (AIPR), 2010, IEEE.
[18]. H. Yoshino, C. Dong, Y. Washizawa and Y. Yamashita. “Kernel Wiener Filter and its Application to Pattern Recognition”, IEEE Transactions on neural networks, 2010.
[19]. Francisco Estradad, Allon Jepson. Stochastic “Image Denoising”. ESTRADA, FLEET, JEPSON, 2009.
[20]. Mehul P. Sampat, Member, IEEE, Zhou Wang, Member, IEEE, Shalini Gupta, Alan Conrad Bovik, Fellow, IEEE, and Mia K. Markey, Senior Member, IEEE,”Complex Wavelet structural similarity A new image similarity index”,2009
[21]. Rafael C. Gonzalez, Richard E. Woods, ―Digital Image Processing‖, 3rd edition, Pearson Education, 2008.
[22]. S.Kother Mohideen., Dr. S. Arumuga Perumal. and Dr. M. Mohamed Sathik,”Image Denoising using Discrete Wavelet Transform”, IJCSNS International Journal of Computer Science and Network Security. VOL. 8 No.1, January 2008
[23]. Shnayderman, "An SVD-based grayscale image quality measure for local and global assessment," IEEETransactions on Image Processing, vol. 15, no. 2, pp. 422-429, Feb. 2006.
[24]. Damien adamns, Halsey Patterson, “The Haar wavelet transform based image compression and Reconstruction”, Dec14, 2006
[25]. Chen, Y. L., Hsieh, C. T. and Hsu, C. H., "Progressive Image Inpainting Based on Wavelet Transform," lETCE, Trans. Fund., Vol. E88-A, pp. 2826-2834 ,2005
[26]. Zhou Wang, Alan C. Bovik, ‟A Universal Image Quality Index‟, IEEE Signal Processing Letters, vol XX, no Y, march 2002.
[27]. Scott E Umbaugh, “Computer Vision and Image Processing, Prentice Hall PTR”, New Jersey, 1998
[28]. R.Coifman, D. Donoho, “Wavelet invariant denoising in wavelets and statistics”, Springer lecture notes in statics, springer, New York 103, 1998.
[29]. Astola. JandKuosmanen.P, “Fundamentals of Nonlinear Digital Filtering”, Boca Raton, FL: CRC, 1997.
[30]. Sattar, F., L. Floreby, G. Salomon son and B. Lovstrom,”;Image enhancement based on a nonlinear multiscale method. IEEE Trans.Image Process”,1997
[31]. D. L. Donoho, “De-noising by soft-thresholding”, IEEE Trans. Information Theory, vol.41, no.3, pp.613-627, May 1995.
[32]. Sun.T and Neuvo.Y, Detail preserving median based filters in image processing, Pattern Recognition Letter, Vol.15, pp. 341– 347, 1994.
[33]. Bhupal Singh, “Classification of Brain MRI in Wavelet Domain “, International Journal of Electronics and Computer Science Engineering IJECSE, Volume1, Number 3
Citation
Latha Rani G.L, Shajun Nisha.S , M.Mohammed Sathik, "Image Denoising in Ultra Sound image using DWT with various Filters," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.15-24, 2016.
A Study of Wireless Sensor Networks- A Review
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.23-27, Mar-2016
Abstract
The chief function of wireless sensor networks is to forecast and collect the data from the main demesne, process the data and then transmit this data to the destination node. Now, for proper functioning, it requires some energy efficient mechanism so as to make paths between the source (sensor nodes) and the sink node. The path to be chosen should be in such a way so that the lifetime of the network is greatly increased. Wireless sensor network is emerging field because of its wide applications and least cost. It is a wireless network which subsist a group of small sensor nodes which communicate through radio interface. These sensor nodes are composed of sensing, computation, communication and power as four basic elements. But limited energy, communication capability, storage and bandwidth are the main resource constraints. In WSNs, Energy is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. These are battery powered sensor nodes. These small batteries have limited power and also may not easily rechargeable or removable. Long communication distance between sensors and a sink can greatly drain the energy of sensors and reduce the lifetime of a network. In WSNs, energy is a big factor to be considered. Various techniques are used to optimize energy level of sensor nodes of WSN. In this paper, basics of WSN are discussed in terms of architecture of WSN and wireless sensor node. This paper also presents the types of WSN along with its challenges. As clustering is one of the techniques that can improve the efficiency of a node, so clustering and its parameters are also included in this paper.
Key-Words / Index Term
WSN, Nodes, Energy, Communication, Efficiency, Clustering, Sensor, Network
References
[1] Beenish Ayaz, Alastair Allen, Marian Wiercigroch, “Dynamically Reconfigurable Routing Protocol Design for Underwater Wireless Sensor Network”, Proceedings of the 8th International Conference on Sensing Technology, Liverpool, UK, Sep 2-4, 2014.
[2] Ankita, “A Survey on Wireless Sensor Network based Approaches”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 4, Issue 4, April 2014.
[3] Stefanos A. Nikolidakis, Dionisis Kandris, Dimitrios D. Vergados and Christos Douligeris, “Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering”, algorithms ISSN 1999-4893, Open Access, Algorithms, Pg- 29-42, 2013.
[4] Umesh B.N, Dr G Vasanth and Dr Siddaraju, “Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes”, International Journal of Wireless & Mobile Networks (IJWMN), Vol 5, No.1, Feb 2013.
[5] Saraswati Mishra and Prabhjot Kaur, “Comparison of energy efficient data transmission approaches for flat wireless sensor networks”, International Journal of Advanced Smart Sensor Network Systems (IJASSN), Vol 4, Nov 3, July 2014.
[6] Avijit Mathur, Thomas Newe, “Comparison and overview of Wireless sensor network systems for Medical Applications”, Proceedings of the 8th International Conference on Sensing Technology, Liverpool, UK, Sep 2-4, 2014.
[7] S.Ranjitha and D. Prabakar and S. Karthik, "A Study on Security issues in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol-03, Issue-09, Page No (50-53), Sep -2015.
[8] Amr M. Kishk, Nagy W. Messiha, Nawal A. El-Fishawy, Abdelrahman A. Alkafs, Ahmed H. Madian, "Proposed Jamming Removal Technique for Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Vol -03, Issue-02, Page No (1-14), Mar -Apr 2015
Citation
Er. Satish Kumar, "A Study of Wireless Sensor Networks- A Review," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.23-27, 2016.
Data Mining Techniques used in Software Engineering: A Survey
Survey Paper | Journal Paper
Vol.4 , Issue.3 , pp.28-34, Mar-2016
Abstract
A typical software development process has several stages; each with its own significance and dependency on the other. Each stage is often complex and generates a wide variety of data. Using data mining techniques, we can uncover hidden patterns from this data, measure the impact of each stage on the other and gather useful information to improve the software development process. The insights gained from the extracted knowledge patterns can help software engineers to predict, plan and comprehend the various intricacies of the project, allowing them to optimize future software development activities. As every stage in the development process entails a certain outcome or goal, it becomes crucial to select the best data mining techniques to achieve these goals efficiently. In this paper, we survey the available data mining techniques and propose the most appropriate techniques for each stage of the development process. We also discuss how data mining improves the software development process in terms of time, cost, resources, reliability and maintainability.
Key-Words / Index Term
Data Mining, Software Engineering, KDD methods, Software Development, Frequent Pattern Mining, Text Mining, Classification, Clustering
References
[1] Laplante, Phillip (2007). “What Every Engineer Should Know about Software Engineering”, Boca Raton: CRC. ISBN 9780849372285.
[2] “Selecting a development approach”, Centers for Medicare & Medicaid Services (CMS) Office of Information Service (2008). Re-validated: March 27, 2008. Retrieved 27 Oct 2015
[3] Nabil Mohammed Ali Munassar1 and A. Govardhan, “A Comparison Between Five Models Of Software Engineering”, IJCSI International Journal of Computer Science Issues, Volume 07, Issue 05, Page No (94-101), September 2010.
[4] Taylor, Q.and Giraud-Carrier, C. “Applications of data mining in software engineering”, International Journal of Data Analysis Techniques and Strategies, Volume 02, Issue 03, Page No (243-257), July 2010.
[5] T. Xie, S. Thummalapenta, D. Lo and C. Liu, “Data mining for software engineering”, IEEE Computer Society, Volume 42, Issue 08, Page No (55-62), August 2009.
[6] R. H. Thayer, A. Pyster, and R. C. Wood, “Validating solutions to major problems in software engineering project management,” IEEE Computer Society, Page No (65-77), 1982.
[7] C. V. Ramamoorthy, A. Prakash, W. T. Tsai, and Y. Usuda, “Software engineering: problems and perspectives,” IEEE Computer Society, Page No (191-209), October 1984.
[8] J. Clarke et al., “Refomulating software engineer as a search problem,” IEEE Proceeding Software., Volume 150, Issue 03, Page No (161-175), June 2003.
[9] M. Z. Islam and L. Brankovic, “Detective: a decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining,” Third IEEE Conference on Industrial Informatics (INDIN), Page No (701-708), 2005.
[10] M. Aouf, L. Lyanage, and S. Hansen, “Critical review of data mining techniques for gene expression analysis,” International Conference on Information and Automation for Sustainability (ICIAFS) 2008, Page No (367-371), 2008.
[11] P. C. H. Ma and K. C. C. Chan, “An iterative data mining approach for mining overlapping coexpression patterns in noisy gene expression data,” IEEE Trans. NanoBioscience, Volume 08, Issue 03, Page No (252-258), September 2009.
[12] Mendonca, M. and Sunderhaft, N. “Mining software engineering data: a survey”, Data & Analysis Center for Software (DACS) State-of-the-Art Report, No. DACS-SOAR-99-3.
[13] Xie, T., Pei, J. and Hassan, A.E. “Mining software engineering data”, Software Engineering - Companion, 2007. ICSE 2007 Companion. 29th International Conference, Page No (172–173).
[14] Kagdi, H., Collard, M.L. and Maletic, J.I. “A survey and taxonomy of approaches for mining software repositories in the context of software evolution”, Journal of Software Maintenance and Evolution: Research and Practice, Volume 19, Issue 02, Page No (77–131).
[15] C. CHANG and C. CHU, “Software Defect Prediction Using Inter transaction Association Rule Mining”, International Journal of Software Engineering and Knowledge Engineering, Volume 19, Issue 06, Page No (747-764), September 2009.
[16] N. Pannurat, N. Kerdprasop and K. Kerdprasop “Database Reverse Engineering based on Association Rule Mining” , International Journal of Computer Science Issues, Volume 7, Issue 2, Page No (10-15), March 2010
[17] Caiyan Dai and Ling Chen, "An Algorithm for Mining Frequent Closed Itemsets with Density from Data Streams", International Journal of Computer Sciences and Engineering, Volume-04, Issue-02, Page No (40-48), Feb -2016,
[18] S.M.Weiss and C. Kulikowski, “Computer Systems that Learn: Classification and Prediction Methods from Statistics, Neural Nets, Machine Learning and Expert Systems, Morgan Kauffman”, Morgan Kaufmann Publishers Inc, ISBN:1-55860-065-5.
[19] U. M. Fayyad, G. PiateskyShapiro, P. Smuth and R. Uthurusamy, “Advances in Knowledge Discovery and Data Mining”, AAAI Press, ISBN:0-262-56097-6.
[20] M. Halkidia, D. Spinellisb, G. Tsatsaronisc and M. Vazirgiannis, “Data mining in software engineering”, Intelligent Data Analysis 15, Page No (413–441), 2011
[21] M. Berry and G. Linoff, “Data Mining Techniques For marketing, Sales and Customer Support”, John Willey and Sons Inc., ISBN: 978-0-471-17980-1.
[22] K.Selvi, "Identify Heart Diseases Using Data Mining Techniques: an Overview", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (180-187), Nov -2015,
[23] L. Kauffman and P.J. Rousseeuw, “Finding Groups in Data: An Introduction to Cluster Analysis”, John Wiley and Sons, ISBN - 9780470317488.
[24] Lovedeep, Varinder Kaur Atri, “Applications of Data Mining Techniques in Software Engineering”, International Journal of Electrical, Electronics and Computer Systems (IJEECS), Volume 02, Issue 05, Page No (70-74), June 2014.
[25] M. Gegick, P. Rotella and T. Xie, “Identifying security bug reports via text mining: an industrial case study”, Mining Software Repositories (MSR), 7th IEEE Working Conference, Page No (11 – 20), 2010.
[26] P. Runeson, and O. Nyholm, “Detection of duplicate defect reports using natural language processing”, Software Engineering, 2007. ICSE 2007. 29th International Conference, Page No (499 – 510), 2007.
[27] Ian Somerville, “Software Engineering”, AddisonWesley, Chapter 30, 4th edition, ISBN - 9783827370013.
[28] J. Estublier, D. Leblang, A. Van Der Hoek, R. Conradi, G. Clemm, W. Tichy and D. WilborgWeber, “Impact of software engineering research on the practice of software configuration management”, ACM Transactions on Software Engineering and Methodology, Volume 14, Issue 04, Page No (383-430), October 2005 .
[29] H.A. Basit and S. Jarzabek, “Data mining approach for detecting higher level clones in software”, IEEE Transactions on Software Engineering, Volume 35, Issue 04, Page No (497 – 514)
[30] Iam Sommerville, “Requirements Engineering A good practice guide”, Ramos Rowel and Kurts Alfeche, John Wiley and Sons, 1997, ISBN – 9780470359396.
Citation
Nidhin Thomas, Atharva Joshi, Rishikesh Misal and Manjula R, "Data Mining Techniques used in Software Engineering: A Survey," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.28-34, 2016.
Decision Trees for Mining Data Streams Based on the Gaussian Approximation
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.35-38, Mar-2016
Abstract
Decision Trees are considered to be one of the most popular approaches for representing classifiers. Researchers from various disciplines such as statistics, machine learning, pattern recognition, and data mining have dealt with the issue of growing a decision tree from available data. The key point of constructing the decision tree is to determine the best attribute to split the considered node. Several methods to solve this problem were presented so far. However, they are either wrongly mathematically justified or time-consuming. The primary comparison parameters are time and accuracy. Also shown efforts made for handling the change in the concept and they are compared in terms of memory, technique and accuracy. Our method ensures, with a high probability set by the user, that the best attribute chosen in the considered node using a finite data sample is the same as it would be in the case of the whole data stream.
Key-Words / Index Term
Data steam, decision trees, information gain, Gaussian approximation
References
[1] Caiyan Dai and Ling Chen, "An Algorithm for Mining Frequent Closed Itemsets with Density from Data Streams", International Journal of Computer Sciences and Engineering, Volume-04, Issue-02, Page No (40-48), Feb -2016, E-ISSN: 2347-2693
[2] P. Argentiero, R. Chin and P. Beaudet, "An automated approach to the design of decision tree classifiers," IEEE Trans. Pattern Anal. Mach. Intell. PAMI-4, 51-57 (1982).
[3] P. Fletcher and M.j.D. Powell,"A rapid decent method for minimization," Computer Journal, Vol.6, ISS.2, 163-168 (1963).
[4] Rudolf Ahlsmede and Ingo Wegeru, Search problems, Wiley-Interscience, 1987.
[5] K.S. Fu, Sequential methods in pattern recognition and machine learning, Academic press, 1998.
[6] D. E. Gustafson, S. B. Gelfand, and S. K. Mitter, “ A nonparametric multiclass partitioning methods for classification,” in proc. 5th int. conf. pattern Recognition, 654-659 (1980).
[7] E. G. Henrichon,Jr. and K. S. Fu, "A nonparametric partitioning procedure for pattern classification," IEEE Trans. Computer., Vol. C-18, 604-624,(1969).
[8] G. R. Dattatreya and V. V. S. Sarma,"Bayesian and decision tree approaches for pattern recognition including feature measurement costs," IEEE Trans. Pattern Anal. Mach. Intell. Vol. PAMI-3, 293-298, (1981).
[9] R. L. P. Chang and T. Pavlidis, "Fuzzy decision tree algorithms," IEEE Trans Syst. Man Cybernet., vol. SMC-7, 28-35 (1977)
[10] J. Aczel and J. Daroczy, On measures of information and their characterizations, New York: Academic, 1975.
Citation
S.Babu, G.Fathima , "Decision Trees for Mining Data Streams Based on the Gaussian Approximation," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.35-38, 2016.
A Review of Clustering Methods forming Non-Convex clusters with, Missing and Noisy Data
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.39-44, Mar-2016
Abstract
Clustering problem is among the foremost quests in Machine Learning Paradigm. The Big Data sets, being versatile, multisourced & multivariate, could have noise, missing values, & may form clusters with arbitrary shape. Because of unpredictable nature of Big Data Sets, the clustering method should be able to handle missing values, noise, & should be able to make arbitrary shaped clusters. The partition based methods for clustering does not form non-convex clusters, The Hierarchical Clustering Methods & Algorithms are able to make arbitrary shaped clusters but they are not suitable for large data set due to time & computational complexity. Density & Grid Paradigm do not solve the issue related to missing values. Combining different Clustering Methods could eradicate the mutual issues they have pertaining to dataset’s geometrical and spatial properties, like missing data, non-convex shapes, noise etc.
Key-Words / Index Term
Clustering, convex, non-convex, missing values, Big Data, noisy data, data mining, density based
References
[1] Cisco, V. N. I. "The Zettabyte Era: Trends and Analysis." Updated :( Jun 23, 2015), http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/VNI_Hyperconnectivity_WP.pdf ; Document ID :1458684187584791 Accessed :Jan 2016
[2] Najlaa, Zahir, Abdullah, Ibrahim, Albert, Sebti, Bouras Fahad, "A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis," IEEE Transactions on Emerging Topics in Computing, vol. 2, no. 3, 2014.
[3] Leiserson, Rivest, Stein Cormen, Introduction to Algorithms, 3rd ed. ISBN 978-0262033848: Page 43-97, MIT Press & TMH, 2009.
[4] J.B.Macqueen, "Some Methods for classification and Analysis of Multivariate Observations," in 5th Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, Berkeley, 1967, pp. 281-297.
[5] Boomija, "Comparison of Partition Based Clustering Algorithms," Journal of Computer Applications, vol. 1, no. 4, p. 18, Oct-Dec 2008.
[6] A.K Jain and H.C. Martin, "Law, Data clustering: a user’s dilemma," in In Proceedings of the First international conference on Pattern Recognition and Machine Intelligence, 2005.
[7] A.K.Jain, "Data clustering: 50 years beyond K-means," Pattern Recognition Letters, vol. 31, no. 8, pp. 651-666, June 2010.
[8] Vipin Kumar, Pang-Ning Tan, and Michael Steinbach, Introduction to data mining.: Addison-Wesley, 2005. ISBN : 9780321321367
[9] Joulin, Bach Hocking, "Clusterpath An Algorithm for Clustering using Convex Fusion Penalties," in 28th International Conference on Machine Learning , Bellevue, WA, USA, 2011.
[10] Martin, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu Ester, "A density-based algorithm for discovering clusters in large spatial databases with noise," in In Kdd, vol. 96, no. 34, 1996, pp. 226-231.
[11] Amineh, W. Ying Amini, "DENGRIS-Stream: A density-grid based clustering algorithm for evolving data streams over sliding window," in International Conference on Data Mining and Computer Engineering, 2012, pp. 206-210.
[12] Ulrike Von Luxburg, "A tutorial on spectral clustering," Statistics and computing, vol. 17, no. 4, pp. 395-416, 2007.
[13] Pabitra Mitra, Sankar K. Pal, and Aleemuddin Siddiqi, "Non-convex clustering using expectation maximization algorithm with rough set initialization," Pattern Recognition Letters, vol. 24, no. 6, pp. 863-873, 2003.
[14] Saline S Singh & N C Chauhan, "K-means vs K-Medoid: A Comparative Study," in National Conference on Recent Trends in Engineering & Technology, (NCRTET) BVM College, Gujarat, India, 2011.
[15] pafnuty.blog, By Aman Ahuja, Updated: (2013, Aug) https://pafnuty.wordpress.com/2013/08/14/non-convex-sets-with-k-means-and-hierarchical-clustering/ Accessed :Jan 2016
[16] R Core Team (2015). R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. URL http://www.R-project.org/.
[17] Chourasia, Richa, and Preeti Choudhary. "An approach for web log preprocessing and evidence preservation for web mining." (2014): 210-215.
Citation
Sushant Bhargav and. Mahesh Pawar, "A Review of Clustering Methods forming Non-Convex clusters with, Missing and Noisy Data," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.39-44, 2016.
A Study of Various Methods to find K for K-Means Clustering
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.45-47, Mar-2016
Abstract
Clustering is the technique which used to group data from a set of unlabeled data, in a way that data containing similar properties contains in a same group. There are many cluster techniques are used to cluster data thus there is no suitable definition for cluster is available. Techniques like link based clustering, centroid based clustering, distribution based clustering, density based clustering are used. A survey over centroid based K-mean clustering techniques is presented which is widely used for clustering purpose. K-mean clustering technique suffers drawbacks like sensitive to initialization centroid, sensitive to noise, and there is no. of clusters also not defined. Thus an enhanced k-mean technique is presented to reduce such drawbacks and provide an enhanced functionality for clustering.
Key-Words / Index Term
K-Means, Clustering, Centroid, Centroid based clustering, partition based clustering, point based, convex, euclidian
References
[1] Madhu Yedla, Srinivasa Rao Pathakota, and T M Srinivasa, "Enhancing K-means Clustering Algorithm with Improved Initial Center," in IJCSIT, 2010.
[2] Boris Mirkin Mark Ming-Tso Chiang, "Intelligent Choice of the Number of Clusters in K-Means Clustering: An Experimental Study with Different Cluster Spreads," journal of classification, 2009.
[3] S S Dimov, and C D Nguyen D T Pham, "Selection of K in K-means clustering ," IMechE 2005.
[4] Naveen D Chandavarkar Uday Kumar S, "A Survey on Several Technical Methods for Selecting Initial Cluster Centers in K-Means Clustering Algorithm," IJARCSSE, Dec 2014.
[5] David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, Angela Y. Wu Tapas Kanungo, "An Efficient k-Means Clustering Algorithm: Analysis and Implementation," IEEE.
[6] Rebecca J. Passonneau, Austin Lee, Axinia Radeva, Boyi Xie And David Waltz Haimonti Dutta, "Learning Parameters Of The K-Means Algorithm, From Subjective Human Annotation," in Association for the Advancement of Artificial Intelligence, 2011.
[7] H.J. Mucha, "Adaptive cluster analysis, classification and multivariate graphics," Weirstrass Institute for Applied Analysis and Stochastics, 1992.
[8] N.V. Anand Kumar and G. V. Uma, "Improving Academic Performance of Students by Applying Data Mining Technique," European Journal of Scientific Research, vol. 34, 2009.
[9] Navjot Kaur Manjot Kaur, "Web Document Clustering Approaches Using K-Means Algorithm," IJARCSSE, 2013.
[10] Marian Cristian Mihaescu, Mihai Mocanu Cosmin Marian Poteras, "An Optimized Version of the K-Means Clustering Algorithm," in IEEE, 2014.
[11] O.O. Oladipupo, I.C Obagbuwa O.J. Oyelade, "Application of k-Means Clustering algorithm for prediction of Students’ Academic Performance," IJCSIS, 2010.
[12] A. Jamshidzadeh , M. Saadatseresht , S. Homayouni A. Alizade Naeini, "An Efficient Initialization Method For K-Means Clustering Of Hyper spectral Data," ISPRS, Nov 2014.
[13] Zhiyi Fang Chunfei Zhang, "An Improved K-means Clustering Algorithm," in JICS, 2013.
[14] Wenbin, Yang,Yan &Qu Wu, "Interactive visual summary of major communities in a large network," in Pacific Visualization Symposium, Hangzhou,China, 2015, pp. 47-54.
Citation
Hitesh Chandra Mahawari and Mahesh Pawar , "A Study of Various Methods to find K for K-Means Clustering," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.45-47, 2016.
Hybrid Artificial Bee Colony and Ant Colony Optimization Based Power Aware Scheduling for Cloud Computing
Review Paper | Journal Paper
Vol.4 , Issue.3 , pp.48-53, Mar-2016
Abstract
Cloud Comptuing is the act of utilizing a system of remote servers facilitated on the Internet to store, oversee, and prepare information, as opposed to a nearby server or an individual computer . The organization piece based procedures that are mindful from the server determination from the cloud can progress to the cost and adequacy of distributed computing. In this we concentrated on the distinctive swarm savvy based vitality proficient procedures called Ant settlement enhancement and Particle swarm streamlining based methods. There are different planning systems like the utilization of Ant settlement improvement has demonstrated a low convergence rate to the genuine worldwide least even at high quantities of measurements Artificial bee colony optimization algorithm has been widely accepted as a global optimization algorithm of current interest for distributed optimization and control. Particle swarm advancement is restricted to introductory arrangement of particles, wrongly chose particles tends to poor results. In order to overcome these constrains a new hybrid Artificial bee colony and ant colony optimization algorithm for cloud computing environment will be proposed to enhance the energy consumption rate further.
Key-Words / Index Term
Cloud Computing, Artificial bees colony , Ants colony optimization ,load balancing , scheduling
References
[1] Alkhanak, Ehab Nabiel, Sai Peck Lee, and Saif Ur Rehman Khan. "Cost-aware challenges for workflow scheduling approaches in cloud computing environments: Taxonomy and opportunities." Future Generation Computer Systems 50 (2015): 3-21.
[2] Srikantaiah, Shekhar, Aman Kansal, and Feng Zhao. "Energy aware consolidation for cloud computing." Proceedings of the 2008 conference on Power aware computing and systems. Vol. 10. 2008.
[3] Poli, Riccardo. "Analysis of the publications on the applications of particle swarm optimisation." Journal of Artificial Evolution and Applications 2008 (2008): 3.
[4] Bansal, Nidhi, et al. "Cost performance of QoS Driven task scheduling in cloud computing." Procedia Computer Science 57 (2015): 126-130.
[5] Berl, Andreas, et al. "Energy-efficient cloud computing." The computer journal 53.7 (2010): 1045-1051.
[6] Chen, Da-Ren, and Kai-Feng Chiang. "Cloud-based power estimation and power-aware scheduling for embedded systems." Computers & Electrical Engineering 47 (2015): 204-221.
[7] Kalra, Mala, and Sarbjeet Singh. "A review of metaheuristic scheduling techniques in cloud computing." Egyptian Informatics Journal 16.3 (2015): 275-295.
[8] Lakra, Atul Vikas, and Dharmendra Kumar Yadav. "Multi-Objective Tasks Scheduling Algorithm for Cloud Computing Throughput Optimization." Procedia Computer Science 48 (2015): 107-113.
[9] Li, Zhongjin, et al. "A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds." Future Generation Computer Systems (2016).
[10] Cho, Keng-Mao, et al. "A hybrid meta-heuristic algorithm for VM scheduling with load balancing in cloud computing." Neural Computing and Applications 26.6 (2015): 1297-1309.
[11] Wang, Xiaoli, Yuping Wang, and Yue Cui. "A new multi-objective bi-level programming model for energy and locality aware multi-job scheduling in cloud computing." Future Generation Computer Systems 36 (2014): 91-101.
[12] Zhan, Zhi-Hui, et al. "Cloud computing resource scheduling and a survey of its evolutionary approaches." ACM Computing Surveys (CSUR) 47.4 (2015): 63.
[13] Mishra, Abhinav, and Anil Kumar. "Context Switching In Clouds: Analysis And Enhancements." International Journal of Engineering Research and Technology. Vol. 2. No. 7 (July-2013). ESRSA Publications, 2013.
[14] Bai, Qinghai. "Analysis of particle swarm optimization algorithm." Computer and information science 3.1 (2010): 180.
[15] Thomas, Antony, G. Krishnalal, and VP Jagathy Raj. "Credit Based Scheduling Algorithm in Cloud Computing Environment." Procedia Computer Science 46 (2015): 913-920.
Citation
Navdeep Kaur and Anil Kumar, "Hybrid Artificial Bee Colony and Ant Colony Optimization Based Power Aware Scheduling for Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.48-53, 2016.