Mutual Exclusive Sleep Awake Distributive Clustering (MESADC): An Energy Efficient Protocol for Prolonging Lifetime of Wireless Sensor Network
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.1-7, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.17
Abstract
Energy awareness is idiopathic task in wireless sensor network. For prolonging lifetime of wireless sensor network, the use of sensors plays a prerequisite role. Saving sensors energy is the main outfit so that network lifetime will improve. So keeping in mind the sensor remaining energy; a new clustering protocol which will work in sleep awake mode is proposed. Along with this mutual exclusion is used in sleep awake mode to fetch cluster head over communication range. In modernistic stint none of the protocol uses mutual exclusion algorithm in sleep awake mode. The proposed protocol Mutual Exclusive Sleep Awake Distributive Clustering (MESADC) chooses a cluster head in such a manner so that sensor lifetime will improve. If sensor lifetime improves then network’s lifetime automatically improve. The performance of MESADC protocol is compared with HEED protocol. Experimental results were obtained with the help of MATLAB. On the groundwork of the comparison between two protocols one finds that the performance of MESADC protocol is prominent in prolonging lifetime of wireless sensor network as compared with HEED protocol.
Key-Words / Index Term
Sleep Awake, Distributive, Clustering, Sensor, Network
References
[1] Noritaka S, Hiromi M, Hiroki M, Michiharu M, Centralized and Distributed clustering methods for energy efficient wireless sensor Networks. In Proceedings of the International Multi Conference of Engineers and Computer Scientists IMECS, March 2009.
[2] Christophe J. Merlin, Wendi B. Heinzelman, Schedule Adaptation of Low-Power-Listening Protocols for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, vol. 9, no. 5, pp. 672-685, May 2010 .
[3] C.-F. Hein, M. Liu, “Network coverage using low duty-cycled sensors: random and coordinated sleep algorithms” in: Proceedings of the IPSN’04, 2004, pp.
[4] Wendi BH, Anantha PC, Hari B. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. In IEEE transactions on Wireless Communications 2002; 1(4).
[5] Ossama Y, Sonia F. HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks. In IEEE transaction on Mobile Computing 2004; 3(4).
[6] Gaurav G, Mohamed Y. Performance evaluation of load-balanced clustering of wireless sensor networks. In 10th International Conference on Telecommunications, ICT 2003.
[7] Arati M, Dharma PA. TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks. In IEEE 15th international conference on parallel on 2001.
[8] Sangho Y, Junyoung H, Yookun C, Jiman H. PEACH: Power efficient and adaptive clustering hierarchy protocol for wireless sensor networks. In Elsevier International Journal of Computer Communication Network Coverage and Routing Schemes for Wireless Sensor Networks. 2007; 30(14-15): 2842-52.
[9] Yang Y, Wu HH, Chen HH. Short: Shortest hop routing tree for wireless sensor networks. In Proceedings of IEEE ICC, 2006.
[10] Li C, Ye M, Chen G, Wu J. An energy-efficient unequal clustering mechanism for wireless sensor networks, in Proceedings of the 2nd IEEE International conference on Mobile Ad-hoc and Sensor Systems, 2005.
[11] Loscrì V, Morabito G, Marano S. A Two-Levels Hierarchy for Low-Energy Adaptive Clustering Hierarchy (TL-LEACH). In IEEE international conference on Vehicular Technology 2005;
[12]. G. N. S. Abhishek Varma*, G. Aswani Kumar Reddy, Y. Ravi Theja and T.Arunkumar.: Cluster Based Multipath Dynamic Routing (CBDR) Protocol for Wireless Sensor Networks Indian Journal of Science and Technology, Vol 8(S2),17-22, January (2015).
[13]. Stefanos A. Nikolidakis, Dionisis Kandris, Dimitrios D. Vergados, Christos Douligeris.: Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering. Algorithms, 6, 29-42; doi:10.3390/a6010029 (2013).
[14] U. Cetintemel, A. Flinders, Y. Sun, “Power-efficient data dissemination in wireless sensor networks”, in: Proceedings of the ACMMobiDE’03, 2003.
[15] A. Manjeshwar, D. Agrawal, “TEEN: a routing protocol for enhanced efficiency in wireless sensor networks”, in: Proceedings of the IEEE IPDPS 2001, pp. 2009–2012.
[16] J. Sen.: A survey on wireless sensor network security. CoRR, vol. abs/1011.1529, (2010).
[17] C-Y Chong, S.P. Kumar, “Sensor networks: evolution, opportunities and challenges” Proc IEEE 91 (8) (2003) 1247-1256.
[18] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “A survey on wireless sensor networks”, IEEE Common. Mag. 41 (8) (2003) 102-114.
[19] Ameer AA, Mohamed Y. A survey on clustering algorithms for wireless sensor networks. In international journal Elsevier computer communication 2007; 30(14-15).
[20] Jawad, H.M.; Nordin, R.; Gharghan, S.K.; Jawad, A.M.; Ismail, M. Energy-Efficient wireless sensor networks for precision agriculture: A review. Sensors 2017, 17, 1781.
[21] Yashwant Singh, Urvashi Chugh.: Mutual Exclusive Distributive Clustering (MEDC) Protocol for Wireless Sensors Networks. International Journal of Sensors, Wireless Communications and Control Bentham Science Press, Vol. 3 No. 2, (2013)
Citation
B. Gupta, S. Rana, "Mutual Exclusive Sleep Awake Distributive Clustering (MESADC): An Energy Efficient Protocol for Prolonging Lifetime of Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.1-7, 2018.
Performance analysis of Fuzzy VM Management techniques for Task scheduling on Cloud systems
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.14-19, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.1419
Abstract
Cloud Computing has been widely adopted by many industries as a platform to support distributed applications. Cloud provides the advantages of reduced operation costs, flexible system configuration and elastic resource provisioning. Even though cloud has been rapidly getting adopted there are various open challenges in areas such as management of virtual resources, security and organizational issues. One of the prominent technologies used by cloud computing is the virtualization. The virtualization technology faces tremendous challenges in supporting real-time applications on cloud as these applications demand real-time performance in open, shared and virtualized computing environments. In this paper we are analyzing the usage of fuzzy logic in improving the performance of time constrained tasks. Our proposed system makes use of fuzzy logic in scheduling of tasks to Virtual machines and in identification of destination host in migrating the overloaded virtual machines which can give better performance than the traditional scheduling algorithms used on cloud systems.
Key-Words / Index Term
: Cloud Computing, Fuzzy logic, VM management, Performance metrics.
References
[1] P. Mell and T. Grance, “The NIST Definition of Cloud
Computing,” US Nat’l Inst. of Science and Technology, 2011;
http://csrc.nist.gov/publications/nist pubs/800-145/SP800-
145.pdf.
[2] Ehab NabielAlkhanak, Sai Peck Lee, Saif Ur Rehman Khan,
“Cost- aware challenges for workflow scheduling
approaches in cloud computing environments: Taxonomy and
opportunities”,Future Generation Computer Systems,ElseVier 50
(2015) 3–21
[3] Marisol García-Valls, Tommaso Cucinotta, Chenyang
Lu“Challenges in real-time virtualization and predictable cloud
computing”.
[4] Mohammad A H, Monil and Rashedur M. R,”VM consolidation
approach based on heuristics, fuzzy logic, and migration control”
Journal of Cloud Computing: Advances, Systems and
Applications (2016) 5:8DOI 10.1186/s13677-016-0059-7
[5] Ehab NabielAlkhanak, Sai Peck Lee, Saif Ur Rehman Khan,
“Cost-aware challenges for workflow scheduling approaches in
Cloud computing environments: Taxonomy and
opportunities”,Future Generation Computer Systems,ElseVier 50
(2015) 3–21
[6] D. Chitra Devi and V. RhymendUthariaraj “Load Balancing in Cloud Computing Environment Using Improved Weighted Round Robin Algorithm for Nonpreemptive Dependent Tasks”,The Scientific World Journal Volume 2016, Article ID 3896065, 14 pages
[7] Chun-Wei Tsai,Wei-chang Huang, M-S Chieng,Ming-chao Chiang and Chu-Sing Yang,” A Hyper-heuristic Scheduling Algorithm for Cloud” ,IEEE transactions on cloud computing Vol-2 No2 April -June 2014.
[8] M.M.M. Fahmy, “A fuzzy algorithm for scheduling non-periodic job on soft real-time single processor system” ,Ain Shams Engineering
Journal (2010) 1, 31–38
[9] Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose, and R Buyy,“ CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning”, Algorithms Software: Practice and Experience (SPE), Volume 41, Number 1, Pages: 23-50, ISSN: 0038-0644, Wiley Press, New York, USA, January, 2011.
[10] JawwadShamsi,• Muhammad Ali Khojaye • Mohammad Ali Qasmi“Data-Intensive Cloud Computing: Requirements, Expectations,
Challenges, and Solutions “, J Grid Computing (2013) 11:281–310 DOI 10.1007/s10723-013-9255-6
[11] Brendan Jennings Rolf Stadler “ Resource Management in Clouds: Survey and Research Challenges “ J NetwSyst Manage DOI
10.1007/s10922-014-9307-7
[12] Fei Teng, Frédéric Magoulès • Lei Yu • Tianrui Li “ A novel real-time scheduling algorithm and performance analysis of a MapReduce-based cloud “,J Supercomput (2014) 69:739–765 DOI 10.1007/s11227-014-1115-z
[13] Avtar Singh and Kamlesh Dutta “ A novel real-time scheduling
algorithm. and performance analysis of a MapReduce-based cloud” IEEK Transactions on Smart Processing and Computing, vol. 2, no. 6,December 2013.
[14] Tom Springer, Steffen Peter Tony Givargis “Fuzzy Logic Based
Adaptive HierarchicalScheduling for Periodic Real-Time Tasks”,
EWiLi’15, October 8th, 2015, Amsterdam, The Netherlands
[15] Kai Hwang , Xiaoying Bai , Yue Shi , Muyang Li, Wen-Guang
Citation
R.A. Kulkarni, S.B. Patil, N. Balaji, "Performance analysis of Fuzzy VM Management techniques for Task scheduling on Cloud systems," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.14-19, 2018.
Automatic die design and fatigue life prediction of forming die using AI technique: Expert System
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.20-30, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.2030
Abstract
Sheet metal forming is an important process which causes some changes in the shape of solid metal parts via plastic (permanent) deformation. When deliberating with sheet metal forming process in this scenario, die and punch cost plays a vital role, making the processes costlier in whole production cycle. It is required to estimate the die life because it is repeatedly used in manufacturing process. Approximate calculation of fatigue life of axisymmetric forming dies helps in planning for the production. This is calculated using AI technique Expert system. In present research work, the development of expert system has been done using VB, python and AutoCAD environment. The developed ES is enabling to generate manufacturing drawing of the designed die which requires few input parameters. Based on few input parameters, ES predict the fatigue life of these dies during deep drawing forming operations.
Key-Words / Index Term
Deep Drawing, Die Design, Fatigue, Expert System(ES), AI
References
[1] S. Q. Xie, and J. Q. Liu, “Integrated concurrent approach for compound sheet metal cutting and punching”, International Journal of Production Research, Vol.39, Issue.6, pp.1095–1112, 2001
[2] K. V. Ramana, and P. V. M. Rao, “Automated manufacturability evaluation system for sheet metal components in mass production”, International Journal of Production Research, Vol.43, Issue.B, pp.3889-3913, 2005
[3] M. Ghatrehnaby, and B. Arezoo, “A fully automated nest-ing and piloting system for progressive dies”, Journal of Materials Processing Technology, Vol.209, Issue.1, pp.525–535, 2009
[4] D. Y. Kim, and J. J. Park, “Development of an expert sys-tem for the process design of axisymmetric hot steel forging”, Journal of Materials Processing Technology, Vol-01, Issue.1-3, pp.223-230, 2000
[5] M. S. Kim, J. C. Choi, Y. H. Kim, G. J. Huh, and C. Kim, “An Automated Process Planning and Die Design System for Quasi-Axisymmetric Cold Forging Products”, International Journal of Advanced Manufacturing Technology, Vol.20 Issue.3, pp. 201–213, 2002
[6] R. Ravi, Y. V. R. K. Prasad, and V. V. S. Sarma, “Development of Expert Systems for the Design of a Hot-Forging Process Based on Material Workability”, Journal of Materials Engineering and Performance, Vol.12, pp. 646-652, 2003
[7] T. Ohashi, S. Imamura, T. Shimizu, M. Motomur, “Computer-aided die design for axis-symmetric cold forging products by feature elimination”, Journal of Materials Processing Technology, Vol.137, issue.1-3, ,pp. 138–144, 2003
[8] S. J. Lee, T. S. Kim, S. S. Lee, and K. S. Park, “Development of an Expert System for the Trim Die Design in Au-tomotive Industry”, In Tenth Computer Supported Cooperative Work in Design Conference (CSCWD), IEEE pp.1-6, 2006
[9] X. Zhang, M. Lu, P. Su, G. Xu, and H. Zhao, “Research on Neural Network Integration Fusion Method and Application on the Fault diagnosis of Automotive Engine”, In the Proceedings of the 2007 IEEE Second Industrial Electronics and Applications Conference (ICIEA 2007), IEEE. pp.48, 2007
[10] T. Giannakakis, and G. C. Vosniakos, “Sheet metal cutting and piercing operations planning and tools configuration by an expert system”, International Journal of Advanced Manufacturing Technology, Vol.36 Issue.7-8,, pp. 658–670, 2008
[11] X. Zhang, C. Y. Han, Y. Cui, Y. P. Lu, E.F. Liu, and H. B.Cui, “An Active Knowledge Support System for Design of Automobile Ball”, in International Workshop on Intelli-gent Systems and Applications (ISA 2009), IEEE, pp. 1-4, 2009
[12] A. B. Johnston, L. P. Maguire, and T. M. McGinnity, “Downstream performance prediction for a manufacturing system using neural networks and six-sigma improvement techniques”, Robotics and Computer-Integrated Manufacturing, vol.25, Issue.3, pp. 513– 521, 2009
[13] T. M. Dale, W. A. Young, and R. P. Judd, “A rule-based approach to predict forging volume for cost estimation during product design”, International Journal of Advanced Manufacturing Technology, Vol.46 Issue.1-4, pp.31–41,2010
[14] K. VeeraBabu, R. Ganesh Narayanan, and G. Saravana Kumar, “An expert system for predicting the deep drawing behavior of tailor welded blanks”, Expert Systems with Applications, Vol.37, pp. 7802–7812, 2010
[15] M.V.Jagannatha Reddy , B.Kavitha, “Expert System to Predict the Type of Fever Using Data Mining Techniques on Medical Databases”, International Journal of Computer Science and Engineering, Vol.3 , Issue.9 , pp. 165-171, 2015
[16] B. Falk, U. Engel, and M. Gieger, “Fundamental aspects for the evaluation of the fatigue behavior of cold forging tools”, Journal of Materials Processing Technology, Vol.119, pp.158-164, 2001
[17] P. Skov-Hansen, N. Bay, J. Grùnbñk, and P. Brùndsted, “Fatigue in cold-forging dies: tool life analysis”, Journal of Materials Processing Technology, Vol.95, pp. 40-48, 1999
[18] ABAQUS user guide, 2013
[19]S. Kashid, and S. Kumar, “prediction of life of punches of compound die using artificial neural network”, in 5th International & 26th All India Manufacturing Technology, Design and Research Conference (AIMTDR 2014), vol.62, pp. 1-6, 2014
[20]V. H. Shankar, V. R. Kumar, and N. V. S. Shankar, “fatigue analysis of polymer composite deep drawing die”, International Journal of Mechanical Engineering and Robotics Research, Vol.4, Issue.2, pp. 22-29,2015
[21] A. V. Valsov, Thermomechanical Fatigue of Dies for Hot Stamping, in Steel In Translation, Vol.46, Isuue.5 pp. 356-360,2016
[22] V. B. Bhandari, Design of Machine Elements, Third Ed., Tata McGrow Hill Edu. Pvt. Ltd., 2013.
[23] AUTOCAD user manual, 2010
[24]ASM International, Fatigue, Elements of Metallurgy and Engineering Alloys, 2008.
Citation
M.R Bhatt, H Mehta, S.H Buch, "Automatic die design and fatigue life prediction of forming die using AI technique: Expert System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.20-30, 2018.
Image Based User Experience (UX) Factor Analysis- Mobile Phone Perspective
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.31-36, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.3136
Abstract
This paper mainly assesses original image used within a mobile application to understand the differences and comparing them with the standard size. The purpose is to predict success rate of mobile applications prior availability to its customer. To do so, we considered sizes of Android based application which can be improved for the ease of user friendliness. In android package kit (.apk) the buttons are usually (.png) files where the size may differ based on various screen perspective. An application is developed to find and compare the existing button size found in a mobile application to the respective standard in terms of User Experience (UX) factor. Initially, the result in this work will produce a statistic for developers to compare button standard with the original standard and finally produce a generic overview to get a probable success rate with other products in the market. The main finding of this work are, consider an agile based approach during development including revising the developed applications if required before the final release to their user and to overcome the standard of the design issue in terms of standard button measurements with similar products.
Key-Words / Index Term
User Experience Factor; Button Size; Android Package Kit; PPI; DPI
References
[1] V.K. Gujare, P. Malviya “Android Malicious apps and Malware Security: A Review”, International Journal of Computer Sciences and Engineering, Vol. 4, Issue.,4, pp.43-47, 2016
[2] Zaihasriah Zahidi, Yan Peng Lim, Peter Charles Woods: Understanding the user experience (UX) factors that influence user satisfaction in digital culture heritage online collections for non-expert users, Science and Information Conference, London (2014)
[3] Sari Kujala et al.: UX Curve: A method for evaluating long-term user experience. Interacting with Computers, Vol. 23, No. 5 (2011)
[4] appannie.com: App Annie works with UX factor and offers prior app evaluation, [Online]. Available: https://www.appannie.com/ (Accessed on 4th November 2017)
[5] developer.android.com: Android Developers report on screen support,[Online].Available:https://developer.android.com/guide/practices/screens-support.html (Accessed on 4th November 2017)
[6] Cho, B., Lee, S., Xu, M., Ji, S., Kim, T., Kim, J.: Prevention of Cross-update Privacy Leaks on Android. Computer Science and Information Systems, Vol. 15, No. 1. (2018)
[7] Mastering the Iteration: An Agile White Paper, Dean Leffingwell, Rally Software Development Corporation (2007)
[8] Robert Holler: Five Myths of Agile Development, The Agile Management Company, V1-0210 (2010)
[9] Steve Benford, Chris Greenhalgh, Gabriella Giannachi, Brendan Walker, Joe Marshall, and Tom Rodden: Uncomfortable user experience. Communications of the ACM, 56(9):66 – 73 (2013)
[10] Frank Bentley and Edward Barrett: Building Mobile Experiences. MIT Press(2012)
[11] Bederson, B.B., Grosjean, J. and Meyer, J.: Toolkit Design for Interactive Structured Graphics. IEEE Trans. Soft-Eng., Vol. 30, No. 8, pp.535-546 (2004)
[12] Semantic Studios: User Experience Design, [Online]. Available: http://semanticstudios.com/user\_experience\_design/ (Accessed on 4th November, 2017)
[13] J. Meyerson, P. Galloway, and R. Bias: Improving the user experience of professional researchers: Applying a user-centered design framework in archival repositories. In Proceedings of the 2012 American Society for Information Science and Technology Vol. 49, No. 1. (2013)
[14] Brewster, S.A.: Overcoming the lack of screen space on mobile computers, Personal and Ubiquitous Computing, 6, 3, 188-205 (2002)
[15] Pekka Parhi, Amy K. Karlson, Benjamin B. Bederson: Target Size Study for One-Handed Thumb Use on Small Touchscreen Devices. Proceedings of the 8th conference on Human-computer interaction with mobile devices and services. PP.203-210, Espoo, Finland (2006)
[16] Colle, H.A., and Hiszem, K.J. Standing at a kiosk: effects of key size and spacing on touch screen numeric keypad performance and user experience. Ergonomics, 47, 13, 1406-1423 (2004)
[17] Karlson, A.K., Bederson, B.B. and SanGiovanni, J. AppLens and LaunchTile: two designs for one-handed thumb use on small devices. Proc. CHI 2005, ACM Press, 201-210 (2005)
[18] Margaret Rouse: Definition of pixels, [Online]. Available:http://whatis.techtarget.com/definition/pixel (Accessed on 3rd July 2017)
[19] Sebastien Gabriel: Designers guide to DPI, [Online]. Available:http://sebastien-gabriel.com/designers-guide-to-dpi/dpi (Accessed on 31st August 2017)
[20] Sebastien Gabriel: Designers guide to DPI, [Online]. Available:http://sebastien-gabriel.com/designers-guide-to-dpi/ppi-setting (Accessed on 31st August 2017)
[21] t-table: provided by San Jose State University, USA, [Online].Available:http://www.sjsu.edu/faculty/gerstman/StatPrimer/t-table.pdf (Accessed on 29th November 2017)
Citation
Ishtiak Morshed,Huibin Shi , Saujanna Jafreen, Seraj Al Mahmud Mostafa, "Image Based User Experience (UX) Factor Analysis- Mobile Phone Perspective," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.31-36, 2018.
A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.37-42, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.3742
Abstract
Cryptography is a intelligence to absorb the ambush of the accession by barter abstracts or admonition into advisement form, so the bulletin cannot be recognized. Today, there are abounding algorithms acclimated for the for Image encryption, but the chaotic encryption methods accept a acceptable aggregate of speed and high security. In abounding years, the chaotic based cryptographic apportioned accept been acceptable some new and abstruse means to advance defended Image encryption techniques. The chaos-based encryption schemes are composed of two steps: chaotic confusion and pixel diffusion. We aboriginal accord a explain addition into chaotic Image encryption and again we investigate some important backdrop and behavior of the logistic map. The logistic map, alternate trajectory, or random-like fluctuation, could not be acquired with some best of antecedent condition. Therefore, a blatant logistic map with accretion arrangement babble is introduced.
Key-Words / Index Term
Chaotic Confusion,Pixel Diffsion,Image Encrytion,Logistic Mapping
References
[1] Ying-yu C. and Chong Fu, ”An Image Encryption Scheme Based on High Dimension Chaos System,” Int.Cof. Intelligent computation technology and automation,pp. 104-108, 2008.
[2]. HAN Feng-ying, “Image Encryption Algorithm Based on Improved Logistic Chaotic Systems” , Journal of central South University of Forestry and Technology,28(1):153-157,2008
[3] Weihua Z. Ying S. “Encryption Algorithms Using Chaosand CAT Methodology,” International Conference onAnti-Counterfeiting Security and Identification in
Communication (ASID) ,pp. 20 - 23,2008
[4] Mohammad Ali Bani Younes and Aman Jantan, Image EncryptionUsing Block-Based Transformation Algorithm, IAENG International Journal
of Computer Science, 35:1, IJCS_35_1_03,2008
[5 ] C.K. Huang and H.H. Nien, Multi chaotic systems based pixel shuffle for image encryption, Optics Communications 282 2123–2127,2009
[6] Musheer Ahmed, M.shamsher Alam “A new algorithm of encryption and decryption of images using chaotic mapping” International Journal on computer science and engineering,vol.2(1),pp46-50,2009
[7] V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution- diffusion based image cipher using chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulation,vol.14,no.7,pp.3056–3075,2009.
[8]Xiang Di, L. X. and Wang P., “Analysis and Improvement of a Chaos Image Encryption Algorithm,”Chaos, Solution and Fractal .Journal on computer science and engineering,vol.2(1), 2009
[9]Jonathan M.Blackedge,Musheer Ahmed ,Omar Farooq“Chaiotic image encryption algorithm based onfrequency domain scrambling” ,School of ElectricalEngineering systems Articles,Dublin Institute ofTechnolog,2010
[10]. C. J., S. G. and S. R., “An Image Encryption Scheme Based on One Time Pads - A Chaotic Approach,” Int.Conf. on Computing , Communication and Networking
Technologies, pp. 1 – 6, July. 2010.
[11].Chenghang Yu, Baojun Zhang and Xiang Ruan,The Chaotic Feature ofTrigonometric Function and Its Use for Image Encryption, EighthInternational Conference on Fuzzy Systems and Knowledge Discovery(FSKD),2011
[12]. G.A.Sathishkumar, Dr.K.Bhoopathy bagan and Dr.N.Sriraam, ImageEncryption Based on Diffusion and Multiple Chaotic Maps, InternationalJournal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March,2011.
[13] Komal D Patel, Sonal Belani,”Image Encryption Using DifferentTechniques”:A Review, International Journal of Emerging Technology andAdvanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume1, Issue 1, November 2011
[14] John Justin M, Manimurugan S, A Survey on Various EncryptionTechniques, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
[15] Ruisong, Y. and Haiying ,Z.(2012). An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps. I. J. Computer Network and Information Security, 7, pp.41-50.
[16] LEI Li-hong ,BAI Feng-ming,HAN Xue-hui, New Image EncryptionAlgorithm Based on Logistic Map and Hyper-chaos, International Conferenceon Computational and Information Sciences,2013
[17] A Novel Image Encryption Using Arnold Cat proposed by Pan Tian-gong and Li Da-yong College of Measurement-Control Tech & Communications Engineering, International Journal of Security and Its Applications Vol.7, No.5 2013
[18] F.K Tabash, M.F Rafiq, M Izharrudin”Image Encryption Algorithm based on Chaotic Map, International Journal of Computer Applications (0975-8887) Vol 64, number13 2013
[19] Ninth International Conference on Computational Intelligence and Security, A SymmetricImage Encryption Scheme Using Chaotic Baker map and Lorenz System, Chong Fu*, Wen-jingLi, Zhao-yu Meng, Tao Wang, Pei-xuan Li, (2013), (IEEE).
[20] Sukhjeevan Kaur Et Al , Int.J.Computer Technology & Applications, , A Review Of ImageEncryption Schemes Based On The Chaotic Map, Vol 5 (1),144-149, 2014
[21] Sandhya Rani et al. International Journal of Advanced Computer Research (ISSN) (print):2249-7277 ISSN (online): 2277-7970) Volume-4 Number-2 Issue, 2014
[22] Jun-xinChen,Zhi-liangZhu, Li-boZhang, ChongFu, andHaiYu An Efficient Diffusion Scheme for Chaos-Based Digital Image Encryption, Volume 2014, Article ID 427349, 13 pages http://dx.doi.org/10.1155/2014/427349.
[23]. Mayank Mishra, Prashant Mishra, Chinmay Garg “A new Algorithm of encryption and decryption of images using Chaotic Mapping, International Journal of Information and computing Technology ISSN 0974-2239 Vol 4 November 7,2014
[24] Pawan Mishra, Surbhi Prakash “Encryption Of images By Multiple Chaotic Maps, IJAFRC Vol 2, Issues 4, April-.ISSN 2348-4853, 2015
[25] ]LingFeng Liu, Suoxia Miao,”A new image encryption algorithm based on logistic map with varying parameter, SpringerPlus, received 20 September 2015, Accepted 1 March 2016, Published 8 March, 2016.
Citation
Shweta Chauhan, Pawan Kumar Mishra, "A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.37-42, 2018.
Modeling the Process Parameters of Roller Burnishing using RSM and Prediction of Micro Hardness using Artificial Neural Network
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.43-50, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.4350
Abstract
Neural network computational techniques are a new alternative to conventional numerical modeling. This paper presents modeling using response surface methodology (RSM). Box and Wilson Central Composite Design (CCD) is used for preparing experiment matrix. The independent parameters in the experiment are speed, feed, force and number of tool passes. These variables are controlled during the burnishing process. The response parameter is micro hardness. Experimental samples are prepared using Single Roller Burnishing Tools (Carbide). Vickers micro hardness tester is used to measure micro hardness. A quadratic mathematical model is developed using RSM. An Artificial neural network (ANN) model is developed using three-layer feed-forward back-propagation. The neural network model is trained using measured values of micro hardness. The different algorithms are used to train the model. Best performance is achieved with correlation coefficient 0.9. This study concludes that an artificial neural network is the best alternative to fit the nonlinear data.
Key-Words / Index Term
Burnishing , RSM, Micro Hardness, ANN
References
[1] B. Bhushan, Introduction to tribology: John Wiley & Sons, 2013.
[2] P. Benardos and G. C. Vosniakos, "Prediction of surface roughness in CNC face milling using neural networks and Taguchi`s design of experiments," Robotics and Computer-Integrated Manufacturing, vol. 18, pp. 343-354, 2002.
[3] T. Özel and Y. Karpat, "Predictive modeling of surface roughness and tool wear in hard turning using regression and neural networks," International Journal of Machine Tools and Manufacture, vol. 45, pp. 467-479, 2005.
[4] N. B. Fredj and R. Amamou, "Ground surface roughness prediction based upon experimental design and neural network models," The International Journal of Advanced Manufacturing Technology, vol. 31, pp. 24-36, 2006.
[5] C.-F. J. Kuo and Y.-S. Wu, "Application of a Taguchi-based neural network prediction design of the film coating process for polymer blends," The International Journal of Advanced Manufacturing Technology, vol. 27, pp. 455-461, 2006.
[6] M. Mia and N. R. Dhar, "Prediction of surface roughness in hard turning under high pressure coolant using Artificial Neural Network," Measurement, vol. 92, pp. 464-474, 2016.
[7] K. Çelebi, E. Uludamar, E. Tosun, Ş. Yıldızhan, K. Aydın, and M. Özcanlı, "Experimental and artificial neural network approach of noise and vibration characteristic of an unmodified diesel engine fuelled with conventional diesel, and biodiesel blends with natural gas addition," Fuel, vol. 197, pp. 159-173, 2017.
[8] R. Sharda and R. B. Patil, "Connectionist approach to time series prediction: an empirical test," Journal of Intelligent Manufacturing, vol. 3, pp. 317-323, October 01 1992.
[9] D. Kim, "Normalization methods for input and output vectors in backpropagation neural networks," International Journal of Computer Mathematics, vol. 71, pp. 161-171, 1999/01/01 1999.
[10] I. El-Sonbaty, U. Khashaba, A. Selmy, and A. Ali, "Prediction of surface roughness profiles for milled surfaces using an artificial neural network and fractal geometry approach," Journal of Materials Processing Technology, vol. 200, pp. 271-278, 2008.
[11] G. Zhang, B. E. Patuwo, and M. Y. Hu, "Forecasting with artificial neural networks:: The state of the art," International journal of forecasting, vol. 14, pp. 35-62, 1998.
[12] A. M. Zain, H. Haron, and S. Sharif, "Prediction of surface roughness in the end milling machining using Artificial Neural Network," Expert Systems with Applications, vol. 37, pp. 1755-1768, 2010.
[13] S. Makridakis and R. L. Winkler, "Averages of forecasts: Some empirical results," Management Science, vol. 29, pp. 987-996, 1983.
Citation
Vijay Kurkute, Sandip chavan, "Modeling the Process Parameters of Roller Burnishing using RSM and Prediction of Micro Hardness using Artificial Neural Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.43-50, 2018.
Q Factor Based Performance Evaluation of Bidirectional TDM PON Network Using Hybrid Amplifier Configurations
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.51-60, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.5160
Abstract
Passive Optical Networks (PONs), designed by Full Service Access Network (FSAN) working group, is the converged infrastructure standardized by ITU and IEEE. PONs support services such as traditional telephony, VoIP and various other multimedia services upto a logical reach of 60km with a split ratio of 1:128. Hence to enhance the reach and performance of PONs, one of the foremost solutions is the use of hybrid optical amplifiers. In this present paper, a model of bidirectional Time Division Multiplexing (TDM) PON using hybrid optical amplifiers configuration (Semiconductor Optical Amplifier (SOA), Raman Amplifier and Erbium Doped Fiber Amplifier (EDFA)) is presented. The performance of the designed system is evaluated for variation of Q Factor with transmission distance using (i) SOA-Raman (ii) SOA-EDFA and (iii) EDFA-EDFA hybrid configuration by carrying out simulations.
Key-Words / Index Term
PON, FSAN, Optical Line Terminal (OLT), Optical Network Unit (ONU), Optical Distribution Network (ODN), EDFA, TDM, WDM SOA
References
[1] R. Kaur, Sanjeev Dewra, “A Review on Passive Optical Network”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 4, April 2015.
[2] M. Agarwal, M.G.Wani, “Four Extended-Reach TDM PONs Sharing a Bidirectional Hybrid CWDM Amplifier,” International Journal of Current Trends in Engineering & Research (IJCTER) e-ISSN 2455–1392 Volume 2 Issue 6, June 2016 pp. 321 – 327
[3] S. Khant, A. Patel, “Designing four-Channel High Rate TDM Passive Optical Network with NRZ Scheme for Wired Environment”. International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 22 (2017) pp. 12746-12751
[4] A.B. Dar, F Zahoor, RK Jha, N Tripathi, M Sabraj, “An Analysis of 16 Channel 64 User Hybrid WDM/TDM Topology in the Optiwave Simulation Environment,” International Journal of Computer Sciences and Engineering. VOL-4 Issue 5 pp(31-35). ISSN 2347-2693. 2016
[5] F. Effenberger et al., "An introduction to PON technologies [Topics in Optical Communications]," in IEEE Communications Magazine, vol. 45, no. 3, pp. S17-S25, March 2007. doi: 10.1109/MCOM.2007.344582
[6] P. P. Iannone et al., "Four Extended-Reach TDM PONs Sharing a Bidirectional Hybrid CWDM Amplifier," in Journal of Lightwave Technology, vol. 26, no. 1, pp. 138-143, Jan.1, 2008.
doi: 10.1109/JLT.2007.913072
[7] K. Khairi, Z. A. Manaf, D. Adriyanto, M. S. Salleh, Z. Hamzah and R. Mohamad, "CWDM PON system: Next generation PON for access network," 2009 IEEE 9th Malaysia International Conference on Communications (MICC), Kuala Lumpur, 2009, pp. 765-768. doi: 10.1109/MICC.2009.5431392
[8] B. Zhu and D. Nesset, "GPON reach extension to 60 km with entirely passive fibre plant using Raman amplification," 2009 35th European Conference on Optical Communication, Vienna, 2009, pp. 1-2.
[9] C. Zhang, J. Huang, C. Chen, and K. Qiu, "All-optical virtual private network and ONUs communication in optical OFDM-based PON system," Opt. Express 19, 24816-24821 (2011).
[10] B. Chen, C. Gan, Qi, Y., et al. “A Novel Reliable WDM-PON System”. Journal of Optical Communications, 32(4), pp. 247-250. (2011) doi:10.1515/JOC.2011.050
[11] B. Zhu, D. Au, F. Khan, and Y. Li, "Coexistence of 10G-PON and GPON Reach Extension to 50-km with Entirely Passive Fiber Plant," in 37th European Conference and Exposition on Optical Communications, OSA Technical Digest (CD) (Optical Society of America, 2011), paper Th.13.B.5.
[12] C. H. Yeh, C. W. Chow, H. Y. Chen and J. Y. Sung, "Hybrid OFDM-based multi-band wireless and baseband signal transmission in PON access," in Electronics Letters, vol. 48, no. 7, pp. 390-392, March 29 2012. doi: 10.1049/el.2011.3635
[13] T. Cevik, “A Hybrid OFDM-TDM Architecture with Decentralized Dynamic Bandwidth Allocation for PONs,” The Scientific World Journal, vol. 2013, Article ID 561984, 9 pages, 2013. doi:10.1155/2013/561984
[14] Niazi, Shahab & Zhang, Xiaoguang & Xi, Lixia & Munir, Abid & Afridi, Muhammad & Khan, Dr.Yousaf. (2013). “A Viable Passive Optical Network Design for Ultrahigh Definition TV Distribution.” Advances in Opto-Electronics. 2013. 10.1155/2013/219271.
[15] Chen, H., Gan, C., Gong, Y., et al. “Novel Colorless WDM-PON Featuring Optional Broadcast Service and High Reliability”. Journal of Optical Communications, 35(1), pp. 71-75. (2013). doi:10.1515/joc-2013-0155
[16] A Sharma, D. Dhawan, “Cost Effective Long Reach Hybrid WDM-TDM Passive Optical Network Using Bidirectional EDFA,” International Journal of Scientific & Engineering Research, Volume 4, Issue 5, pp( 2126-2130) May-2013 ISSN 2229-5518
[17] K. Nyachionjeka and W. Makondo, “Effects of Modulation Techniques (Manchester Code, NRZ or RZ) on the Operation of Hybrid WDM/TDM Passive Optical Networks,” International Scholarly Research Notices, vol. 2014, Article ID 984157, 8 pages, 2014. doi:10.1155/2014/984157
[18] Song, Y., Gan, C., Gong, Y., et al. “A Survivable WDM-PON Architecture Using Optical Carrier Suppression Technique”. J. Opt. Commun., 34(4), pp. 357-360. (2013) doi:10.1515/joc-2013-0041
[19] S. Chen, Wei Nai, F. Zhang, S. Wang, D Dong, and Yi Yu, “Mathematical Verification for Transmission Performance of Centralized Lightwave WDM-RoF-PON with Quintuple Services Integrated in Each Wavelength Channel,” Advances in OptoElectronics, vol. 2015, Article ID 183675, 13 pages, 2015. doi:10.1155/2015/183675
[20] M Morant, J Pérez, and R Llorente, “Polarization Division Multiplexing of OFDM Radio-over-Fiber Signals in Passive Optical Networks,” Advances in Optical Technologies, vol. 2014, Article ID 269524, 9 pages, 2014. doi:10.1155/2014/269524
[21] Li, L. & Zhao, D.. “Performance of Phase Modulation in WDM-PON Transmission System”. Journal of Optical Communications, 36(1), pp. 57-65. (2015) doi:10.1515/joc-2014-0050.
[22] Payal, Rajbir Singh, Deepak Sharma, “Performance Comparison of Hybrid Optical Amplifiers with Different Modulation Formats”. International Journal of Electronics Electrical and Computational Systems (IJEECS) ISSN: 2348 117X Vol. 6 Issue 11 , Nov- 2017 pp(315-320 ).
[23] Payal , S. Kumar, D. Sharma, “Performance Analysis of NRZ and RZ Modulation Schemes in Optical Fiber Link Using EDFA.” International Journal of Computer Science and Software Engineering Vol. 7, Issue 8 ,pp(161-168) August 2017 ISSN. 2277-128. doi:10.23956/ijarcsse/V7I8/0102.
Citation
D. Sharma, Payal, S. Kumar, "Q Factor Based Performance Evaluation of Bidirectional TDM PON Network Using Hybrid Amplifier Configurations," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.51-60, 2018.
Complex analysis of classified of Soil parameters and its relationship identification using PCA
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.61-70, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.6170
Abstract
This study was carried out to predict meaningful information from large data set of soil parameters and representation in graphical manner to make its clear understanding This analysis help in determining role of dependent variable and independent variable in the system and their relationships, their dependability for designing any prediction system. A field study is carried out to collect information for assessing soil parameter. Soil parameters analysis is done on 902 soil samples collected from KrushiVighan Kendra, Ghatkhed, Amravati. The values of C, N, P, K, Mg, C, Fe, Cu, Zn, B, Mo, Lime, Saline, CEC, Mn, OM and pH of soil sample collected for the year 2011-2012 and 2012-2013 andPrinciple Component Analysis (PCA) is used to predict these soil parameters as a dependent and independent parameter that have direct/indirect effects on productivity.
Key-Words / Index Term
complex analysis.soilparameter,Principle Component Analysis,Cu_copper, Fe_iron; ; K_potassium; Mn_manganese; OC_organic content: P_ phosphorus; Zn_zinc.
References
[1] Kevin Mc-Sweeney, Sabine Grunwald,,Soil Morphology, Classification, and Mapping, University of Wisconsin- Madison , 1999
[2] R. M. Larka, S. R. Kaffkab, D. L. Corwinca, Multi-resolution analysis of data on electrical conductivity of soil using wavelets, Journal of Hydrology Vol. 272, pp 276–290, 2003
[3] Abdi. H. & Williams L. J., Principal component analysis, Wiley Interdisciplinary Reviews Computational Statistics, Vol. 2, pp. 433– 459, 2010.
[4] Ali Salehi1 and G. ZahediAmiri, Study of Physical and Chemical Soil Properties Variations Using Principal Component Analysis Method in the Forest, North of Iran, Caspian J. Env. Sci. Vol. 3 No. 2, pp. 131-137, 2005.
[5] A Xing Zhu,Feng Qi,Amanda Moore,James E Burt,Prediction of soil properties using membership values Geoderma, Vol.158, pp.199–206, 2010.
[6] P. Bhargavi , Dr. S. Jyothi, Soil Classification Using Data Mining Techniques:A Comparative Study, International Journal of Engineering Trends and Technology- July to Aug,Vol.2, Issue 1,pp.55-59,2011.
[7] M. Kumar & A. L. Babel, Available Micronutrient Status and Their Relationship with Soil Properties of Jhunjhunu Tehsil, District Jhunjhunu, Rajasthan, India, Journal of Agricultural Science, Vol 3, No 2, pp 102-118, 2011.
[8] J.O. Ogunwole, E.N. O. Iwuafor, N.M. Eche, J. Diels, Effect of organic and inorganic soil amendments on soil physical and chemical properties in a west africa savanna agroecosystem,Tropical and Subtropical Agroecosystems, Vol. 12, No. 2, pp. 247-255, 2010.
[9] A.Akbarzadeh,R.Taghizadeh,Mehrjardi H. Rahimi Lake & H.Ramezanpour,Application of artificial intelligence in modeling of soil properties,Enviromental Research Journal Vol.3,No.2,pp.19-24,2009.
Citation
M.V.Mawale, V.N.Chavan, "Complex analysis of classified of Soil parameters and its relationship identification using PCA," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.61-70, 2018.
Impact of Various Performance Parameters on Distributed Protocols in Wireless Sensor Networks
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.65-69, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.6569
Abstract
Wireless Sensor Network (WSN) consists of small sensor nodes that cooperate with each other to send sensed data to the Base-Station (BS). Several challenges are imposed in WSN with energy consumption being the most important. Clustering improves energy efficiency in WSN by sending data through CHs in one-hop and multi-hop communication. Distributed clustering methods are more efficient as compared to centralized clustering methods in terms of energy efficiency and the choice of the optimal parameter value is important in distributed clustering as it acts as a significant part in preserving energy. Individual parameters like the position of BS, the optimal number of CHs, heterogeneity factor etc. impact the performance in distributed protocols. This work evaluates the performance of well-known distributed protocols by varying the values of different parameters to study their effect on network performance. Simulations are performed and results are analyzed to check the effect of performance parameters.
Key-Words / Index Term
Wireless Sensor Network (WSN), Clustering, Distributed protocols, Centralized protocols, Stability
References
[1] S. Kaur and R. N. Mir. "Clustering in Wireless Sensor Networks-A Survey" International Journal of Computer Network and Information Security, Vol.8, No.6, 2016
[2] R.M.B. Hani and A.A. Ijjeh, “A survey on leach based energy aware protocols for wireless sensor networks”, Journal of communication, Vol. 8, 2013.
[3] T. Gao, R. Jin, “A regional centralized clustering routing algorithm for wireless sensor networks”, IEEE, 2008.
[4] K. Padmanabhan, P. Kamalakkannan, “Energy-efficient Dynamic Clustering Protocol for Wireless Sensor Networks”, International Journal of Computer Applications, Vol.38, No.11, 2012.
[5] N. Kamyabpour, D.B. Hoang, “Modeling overall energy consumption in wireless sensor networks”, 11th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT-10, pp. 8–11, 2010.
[6] W.Heinzelman, A.Chandrakasan, and H. Balakrishnan, “Energy-Efficient Communication Protocols for Wireless Microsensor Networks”, Proceedings of the 33rd Hawaaian International Conference on Systems Science (HICSS), 2000.
[7] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan,“An application specific protocol architecture for wireless microsensor networks” IEEE Transactions on Wireless Communications, Vol. 4,pp. 660-670, 2002.
[8] L. Qing, Q. Zhu, M. Wang, "Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks" ELSEVIER, Computer Communications, Vol. 29, pp 2230-2237, 2006.
[9] S. Georgios, I. Matta, and A. Bestavros. “SEP: A stable election protocol for clustered heterogeneous wireless sensor networks”. Boston University Computer Science Department, 2004.
[10] S. Faisal, "Z-SEP: Zonal-stable election protocol for wireless sensor networks." arXiv preprint arXiv: 1303.5364, 2013.
Citation
Sukhkirandeep Kaur, R.N Mir, "Impact of Various Performance Parameters on Distributed Protocols in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.65-69, 2018.
Aspect-Opinion Identification and Classification Using Custom Heuristic Rules
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.76-80, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.7680
Abstract
Users opinion about different entities forms the huge repository of data over internet. It is highly impossible to accurately monitor and find what actually a user wants to say about an entity from this large amount of data. Data analyst these days concentrates on finely analyzing opinions about particular entity and for this reason the extraction of aspects and its corresponding opinions of that entity are important. This work concentrates on identifying aspects and their corresponding opinion from the provided user opinions which helps to obtain fine grained knowledge about the entity. To obtain aspects and related opinions custom heuristic rules are created by using regular expression on the parts-of-speech tagging. The created rules are provided to Stanford natural language processing (SNLP) classifier and finds association of aspect words and opinion words from the opinion corpus. The classification is done by SNLP classifier and Naïve Bayes (NB) classifier. Identification of aspects and aspect specific opinions are accurately obtained using custom heuristic rules applied over SNLP compared to NB.
Key-Words / Index Term
Aspects, Opinions, Heuristic Rules, SNLP, NB.
References
[1] Quan Fang, Changsheng Xu, Jitao Sang, M. Shamim Hossain and Ghulam Muhammad,”Word-of-mouth understanding: entity-centric multimodal aspect-opinion mining in social media,” IEEE transaction on multimedia, volume 17.No. 12, pp. 2281-2296, December 2015.
[2] Masud Karim, Rashedur M. Rahman, “Decision tree and naïve bayes algorithm for classification and generation of actionable knowledge for direct marketing,” Journal of Software Engineering and Applications, 6, pp 196-206, 2013.
[3] F. Chua, W. Cohen, J. Betteridge, E. Lim, “Community-Based Classification of Noun Phrases in Twitter,” In the Proceedings of the 21st international ACM conference of information and knowledge management (CIKM’ 12), pp 1702-1706, 2012.
[4] Richard Socher and et. Al, “Recursive deep models for semantic compositionality over sentiment a Treebank,” In the Proceedings of the conference on empirical methods in natural language processing, EMNLP’13, 2013.
[5] Bo Pang, Lillian Lee, Shivakumar Vaithyanathan, “Thumbs up? Sentiment Classification using Machine Learning Techniques,” In Proceedings of the EMNLP 2002, pp. 79–86, 2002.
[6] Sida Wang and Christopher Manning, “Baselines and bigrams: simple, good sentiment and topic classification,” In Proceedings of the 50th Annual Meeting of the Association for computational Linguistics (ACL’12), volume 2, July 08 – 14, pp 90-94, 2012.
[7] B. Liu and L. Zhang,“A survey of opinion mining and sentiment analysis,” in Mining Text Data. New York, NY, USA: Springer, 2012, pp. 415–463, 2012.
[8] Moghaddam, S., Popowich F., “Opinion polarity identification through adjectives”, CoRR arXiv: 1011.4623 (2010).
[9] S. Moghaddam and M. Ester, “On the design of lda models for aspectbased opinion mining,” In the Proceedings of 21st ACM International Conference on Information and Knowledge Management (CIKM’12), pp. 803–812, 2012.
[10] W. X. Zhao, J. Jiang, H. Yan, and X. Li, “Jointly modeling aspects and opinions with a MaxEnt-LDA hybrid,” in the proceedings of the conference on the Empirical Methods in Natural Language Processing (EMNLP 2010), MIT, Massachusetts, USA, pp. 56–65, 2010.
[11] A. Mukherjee and B. Liu, “Aspect extraction through semi-supervised modeling,” In the Proceedings of Assoc. Comput. Linguistics, 2012, pp. 339–348, 2012.
[12] M. Hu and B. Liu, “Mining and summarizing customer reviews,” In the Proceedings of the Tenth ACM SIGMOD International Conference on Knowledge Discovery and Data Mining (KDD 2004), pp. 168–177, 2004.
[13] Qian Liu, Zhiqiang Gao, Bing Liu3 and Yuanlin Zhang, “Automated Rule Selection for Aspect Extraction in Opinion Mining,” In the Proceedings of Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015), pp 1291-1297, 2015.
[14] Y. Yang, C. Chen, M. Qiu, F. s. Bao, “Aspect extraction from product reviews using category hierarchy information,” In the Proceedings of the 15th Conference of the European Chapter of Association for Computational Linguistics: Volume 2, Short Papers, pages 675–680, 2017.
[15] Y. Fang, L. Si, N. Somasundaram, and Z. Yu, “Mining contrastive opinions on political texts using cross-perspective topic model,” In the Proceedings of the Fifth ACM WSDM 2012, pp. 63–72, 2012.
[16] A. McCallum and K. Nigam, “A comparison of event models for naïve bayes text classification,” In the Proceedings of the ICML/AAAI-98 workshop on learning for text categorization, Madison, WI, pp. 41–48, 26–27 July 1998.
Citation
T. U. Kadam, P. Kaur, "Aspect-Opinion Identification and Classification Using Custom Heuristic Rules," International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.76-80, 2018.