Multi-Attribute Decision Making Approach Based on Neutral Membership Degree of Picture Fuzzy Set
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.89-94, Nov-2023
Abstract
In this study we proposed a new weighted aggregation operator for ranking the picture fuzzy numbers (PFNs) which is based on neutral membership value of PFN. As the picture fuzzy set (PFS) is an extension version of intuitionistic fuzzy set theory with introducing the neutral membership value during data analysis. The neutral membership value in PFS reflecting the ambiguous nature of the subject to judgment. The ambiguity is depending on the neutral membership value of PFN. The proposed weighted aggregation operator manages the ambiguity according to neutral membership value. Then, the aggregation operator applies in a multi attribute decision making method where attribute value of the alternative are picture fuzzy numbers. In the decision making process, the weight of attributes are calculated according to neutral values and aggregate the multiple attributes into a single PFN. Then estimate the individual score value of the alternatives. Lastly, ranking the alternative according to score value. Finally, a practical example for students’ performance in the multiple paper examination is highlighted for verifying the developed approach and demonstrates its practicality and effectiveness.
Key-Words / Index Term
Aggregation operators, Decision-making, Picture fuzzy set, Weighted Aggregation operators.
References
[1]. L. A. Zadeh, “Fuzzy sets. Information Control,” Vol.8, pp.338–356, 1965.
[2]. H. Liao, Z. Xu, “A VIKOR-based method for hesitant fuzzy multi-criteria decision making,” Fuzzy Optim. Decis. Mak., Vol.12, No.4, pp.373–392, 2013.
[3]. H Garg, “Some Picture Fuzzy Aggregation Operators and Their Applications to Multicriteria Decision-Making”, Arab J SciEng, Vol.42, pp.5275–5290, 2017.
[4]. G WEI, “TODIM Method for Picture Fuzzy MultipleAttribute Decision Making”, INFORMATICA, Vol.29, No.3, pp.555–566, 2018.
[5]. C Wang, X Zhou, H Tu, S Tao, “Some Geometric Aggregation Operators Based on Picture Fuzzy Sets and Their Application in Multiple Attribute Decision Making”, Italian journal of pure and applied mathematics No.37, pp.477-492, 2017.
[6]. S. Das, M. B. Kar, S Kar, “Group Multi-criteria Decision Making Using Intuitionistic Multi-fuzzy Stes”, Journal of Uncertainty Analusis and Applications, Vol.1, No.10, 2013.
[7]. H. Garg, “Some Picture Fuzzy Aggregation Operators and Their Applications to Multicriteria Decision-Making”, Arab J Sci Eng, Vol.42, pp.5275–5290, 2017.
[8]. Z. S. Xu, R. R.Yager, “Some geometric aggregation operators based on intuitionistic fuzzy sets”, Int. J. Gen. Syst, Vol.35, pp.417–433, 2006.
[9]. Z.S. Xu, “Intuitionistic fuzzy aggregation operators”, IEEE Transaction on Fuzzy System, Vol.15, pp.1179–1187, 2007.
[10]. F. E. Mohamed, “A VIKOR Method for Solving Personnel Training Selection Problem”, International Journal of Computer Science, Vol.1, No.2, 2012.
[11]. H. Shiha, H Shyurb, E. S. Leec, “An extension of TOPSIS for group decision making”, Mathematical and Computer Modelling, Vol.45, pp.801–813, 2007.
[12]. L.A. Zadeh, “Fuzzy-set-theoretic interpretation of linguistic hedges”, Journal of Cybernetics Vol.2, pp.4–34, 1972.
[13]. S. M. Chen, J.M. Tan, “Handling multi criteria fuzzy decision-making problems based on vague set theory.” Fuzzy Set Syst. Vol.67, pp.163–172, 1994.
[14]. V. Belton, T. Gear, “On a Short-coming of Saaty`s Method of Analytic Hierarchies”, Omega, pp.228-230, 1983.
[15]. C.L. Hwang, K. Yoon, Multiple Attribute Decision Making, Springer-Verlag, Berlin, 1981.
[16]. J. Grant, “Churn modeling by rough set approach”, manuscript, 2001.
[17]. P. Majumdar, S.K. Samanta, “Generalised fuzzy soft sets”, Comput. Math. Appl. Vol.59, pp.1425–1432, 2010.
[18]. P.K. Maji, More on intuitionistic fuzzy soft sets, Lect. Notes Comput. Sci. 5908, pp.231–240, 2009.
[19]. Z.M. Zhang, S.H. Zhang, “Type-2 fuzzy soft sets and their applications in decision making”, J. Appl. Math. p.1–35, 2012.
[20]. W. Xu, J. Ma, S.Y. Wang, G. Hao, “Vague soft sets and their properties”, Comput. Math. Appl. 59, pp.787–794, 2010.
[21]. K.T.Atanassov, “Intuitionistic fuzzy sets, Fuzzy Sets and Systems”, Vol.20, pp.87-96, 1986.
[22]. D. Dubois, H. Prade, Rough fuzzy sets and fuzzy rough sets, Int. J. of General Systems, Vol.17, pp.191-209, 1990.
[23]. M.B. Gorzalczany, “Interval-valued fuzzy controller based on verbal model of object”’, Fuzzy Sets and Systems Vol.28, No.1, pp.45–53, 1988.
[24]. V. Torra, “Hesitant fuzzy sets”. Int. J. Intell. Syst., Vol.25, pp.529–539, 2010.
[25]. J.C. Leyva-Lópezand, E. F. González, “A new method for group decision support based on ELECTRE III methodology,” European Journal of Operational Research, Vol. 148, pp.14-27, 2003.
[26]. B.C.Cuong, V. Kreinovich, “Picture fuzzy sets,” J. Comput. Sci. Cybern. Vol.30, No.4, pp.409–416, 2014.
[27]. A Si, S Das, S Kar, An approach to rank picture fuzzy numbers for decision making problems. Decision Making: Applications in Management and Engineering, Vol.2, No.2. pp.54-64, 2019.
[28]. S. Dan, M. B. Kar, S. Majumder, B. Roy, S. Kar, D. Pamucar, “Intuitionistic type-2 fuzzy set and its properties”, Symmetry, Vol.11, No.6, pp.808, 2019.
[29]. A. Si, S. Das, S. Kar, “Extension of TOPSIS and VIKOR method for decision-making problems with picture fuzzy number” In Proceedings of the Global AI Congress, Springer Singapore, pp.563-577, 2019.
Citation
Amalendu Si, Surajit Dan, Sujit Das, "Multi-Attribute Decision Making Approach Based on Neutral Membership Degree of Picture Fuzzy Set," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.89-94, 2023.
Impact of Stress on Humans and Its Detection Using Artificial Intelligence
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.95-100, Nov-2023
Abstract
Stress is our body`s emotional and physical reaction to a circumstance or event that we perceive as risky or difficult. Different levels of stress are experienced by people on a regular basis, which causes serious problems. Three main types of stress are acute stress, episodic stress, and chronic stress. A new or challenging situation generates acute stress in your body. It`s the emotion people experience as a deadline approaches or when they just miss getting hit by a car. We might even come across it as a result of a fun pastime. Like an exciting ride on a roller coaster or a stunning feat of personal achievement. Acute stress is a category for short-term stress. After a little period of time, the body and emotions usually return to normal. Then comes Continual acute pressures are referred to as episodic acute stresses. The cause of this can be persistently tight job deadlines. It might also be due to the frequent high-stress situations that some professions face. Long-lasting demands are ultimately what lead to chronic stress. One example is living in a high-crime area or constantly fighting with your significant other. These health issues have all been related to the onset of stress, dilated pupils, increased heart rate, anxiety, mood swings, lack of sleep, weight gain, insomnia, panic attacks, persistent headaches, and other variables. So, the stress management system will offer a technique of management from which we can identify the level of stress or kinds of stress and offer solutions for how we can lower the tension and release people from this type of stress.
Key-Words / Index Term
stress, disease, man, woman, acute, chronic etc.
References
[1]. Hannigan, B., Edwards, D., & Burnard, P. (2004). Stress and stress management in clinical psychology: Findings from a systematic review. Journal of Mental Health, 13(3), pp.235-245, 2004.
[2]. Kassymova, K., Kosherbayeva, N., Sangilbayev, S., & Schachl, H. (2018, September). Stress management techniques for students. In International Conference on the Theory and Practice of Personality Formation in Modern Society (ICTPPFMS 2018) pp.47-56, 2018.
[3]. Rusch, S. (2019). Stress management. Springer.
[4]. Bhargava, D., & Trivedi, H. (2018). A study of causes of stress and stress management among youth. IRA-International Journal of Management & Social Sciences, 11(03), pp.108-117, 2018.
[5]. Tomczak, M. T., Wójcikowski, M., Pankiewicz, B., ?ubi?ski, J., Majchrowicz, J., Majchrowicz, D., & Szczerska, M. (2020). Stress monitoring system for individuals with autism spectrum disorders. IEEE Access, 8, pp.228236-228244, 2020.
[6]. Beck, A. R., Verticchio, H. R., & Miller, A. (2020). Levels of stress and characteristics of perfectionism in CSD students. Teaching and Learning in Communication Sciences & Disorders, 4(1), 3, 2020.
[7]. Mitchell, J. T., & Everly Jr, G. S. (2000). Critical incident stress management and critical incident stress debriefings: Evolutions, effects and outcomes, 2000.
[8]. Pallavicini, F., Argenton, L., Toniazzi, N., Aceti, L., & Mantovani, F. (2016). Virtual reality applications for stress management training in the military. Aerospace medicine and human performance, 87(12), pp.1021-1030, 2016.
[9]. Charlesworth, E. A., Murphy, S., & Beutler, L. E. (1981). Stress management skill for nursing students. Journal of Clinical Psychology, 37(2), pp.284-290, 1981.
[10]. Milne, B., Joachim, G., & Niedhardt, J. (1986). A stress management programme for inflammatory bowel disease patients. Journal of advanced nursing, 11(5), pp.561-567, 1986.
[11]. Everly, G. S., Flannery, R. B., & Eyler, V. A. (2002). Critical incident stress management (CISM): A statistical review of the literature. Psychiatric Quarterly, 73, pp.171-182, 2002.
[12]. Randall, R., Cox, T., & Griffiths, A. (2007). Participants` accounts of a stress management intervention. Human Relations, 60(8), pp.1181-1209, 2007.
[13]. Sharma, M., & Rush, S. E. Mindfulness-based stress reduction as a stress management intervention for healthy individuals: a systematic review. Journal of evidence-based complementary & alternative medicine, 19(4), pp.271-286, 2014.
[14]. Rahe, R. H., & Tolles, R. L. (2002). The Brief Stress and Coping Inventory: A useful stress management instrument. International Journal of Stress Management, 9, pp.61-70, 2002.
[15]. Hayes, D. M., Eddy, J. M., Hayes, D. M., & Eddy, J. M. (1985). Stress management education: A life skills approach for health promotion professionals. Wellness Perspectives, 2(4), 9-11.
[16]. Walton, S. J. (1990). Stress management training for overseas effectiveness. International Journal of Intercultural Relations, 14(4), pp.507-527, 1990.
[17]. Eisen, K. P., Allen, G. J., Bollash, M., & Pescatello, L. S. (2008). Stress management in the workplace: A comparison of a computer-based and an in-person stress-management intervention. Computers in Human Behavior, 24(2), pp.486-496, 2008.
[18]. De Jesus, S. N., & Conboy, J. (2001). A stress management course to prevent teacher distress. International Journal of Educational Management.
[19]. Lees, S., & Ellis, N. (1990). The design of a stress?management programme for nursing personnel. Journal of advanced nursing, 15(8), 946-961.
[20]. Fothergill, A., Edwards, D., & Burnard, P. (2004). Stress, burnout, coping and stress management in psychiatrists: findings from a systematic review. International Journal of Social Psychiatry, 50(1), 54-65.
[21]. Zetterqvist, K., Maanmies, J., Ström, L., & Andersson, G. (2003). Randomized controlled trial of internet-based stress management. Cognitive Behaviour Therapy, 32(3), 151-160.
[22]. Errisuriz, V. L., Pasch, K. E., & Perry, C. L. (2016). Perceived stress and dietary choices: The moderating role of stress management. Eating behaviors, 22, 211-216.
[23]. Auerbach, S. M. (1989). Stress management and coping research in the health care setting: an overview and methodological commentary. Journal of Consulting and Clinical Psychology, 57(3), 388.
[24]. Tetrick, L. E., & Winslow, C. J. (2015). Workplace stress management interventions and health promotion. Annu. Rev. Organ. Psychol. Organ. Behav., 2(1), 583-603.
[25]. Van der Hek, H., & Plomp, H. N. (1997). Occupational stress management programmes: a practical overview of published effect studies. Occupational medicine, 47(3), 133-141.
[26]. Elkin, A. J., & Rosch, P. J. (1990). Promoting mental health at the workplace: the prevention side of stress management. Occupational Medicine (Philadelphia, Pa.), 5(4), 739-754.
[27]. Varvogli, L., & Darviri, C. (2011). Stress management techniques: Evidence-based procedures that reduce stress and promote health. Health science journal, 5(2), 74.
[28]. Jackson, E. M. (2013). Stress relief: The role of exercise in stress management. ACSM`s Health & Fitness Journal, 17(3), 14-19.
[29]. Carter, C. S., & Altemus, M. (1997). Integrative functions of lactation hormones in social behaviour and stress management.
[30]. Richardson, K. M., & Rothstein, H. R. (2008). Effects of occupational stress management intervention programs: a meta-analysis. Journal of occupational health psychology, 13(1), 69.
[31]. Shiralkar, M. T., Harris, T. B., Eddins-Folensbee, F. F., & Coverdale, J. H. (2013). A systematic review of stress-management programs for medical students. Academic Psychiatry, 37, 158-164.
[32]. Olpin, M., & Hesson, M. (2015). Stress management for life: A research-based experiential approach. Cengage Learning.
[33]. Chiauzzi, E., Brevard, J., Thurn, C., Decembrele, S., & Lord, S. (2008). My Student Body–Stress: An online stress management intervention for college students. Journal of health communication, 13(6), 555-572.
[34]. Ivancevich, J. M., Matteson, M. T., Freedman, S. M., & Phillips, J. S. (1990). Worksite stress management interventions. American psychologist, 45(2), 252.
[35]. Linden, W. (2004). Stress management: From basic science to better practice. Sage Publications.
[36]. Edwards, D., & Burnard, P. (2003). A systematic review of stress and stress management interventions for mental health nurses. Journal of advanced nursing, 42(2), 169-200.
[37]. Kerr, G., & Goss, J. (1996). The effects of a stress management program on injuries and stress levels. Journal of applied sport psychology, 8(1), 109-117.
[38]. Giga, S. I., Cooper, C. L., & Faragher, B. (2003). The development of a framework for a comprehensive approach to stress management interventions at work. International Journal of Stress Management, 10(4), 280.
[39]. Romas, J. A., & Sharma, M. (2022). Practical stress management: A comprehensive workbook. Academic Press.
[40].Smith, J. C. (2002). Stress management: A comprehensive handbook of techniques and strategies. Springer Publishing Company.
[41]. Chiesa, A., & Serretti, A. (2009). Mindfulness-based stress reduction for stress management in healthy people: a review and meta-analysis. The journal of alternative and complementary medicine, 15(5), 93-600.
[42]. Boss, P., Bryant, C. M., & Mancini, J. A. (2016). Family stress management: A contextual approach. Sage Publications.
[43]. Greenberg, J. S. (2002). Comprehensive stress management.
[44]. Murphy, L. R. (1996). Stress management in work settings: A critical review of the health effects. American journal of health promotion, 11(2), 112-135.
[45]. Quick, J. C., Wright, T. A., Adkins, J. A., Nelson, D. L., & Quick, J. D. (1997). Preventive stress management in organizations (Vol. 1997, pp. 89-110). Washington, DC: American Psychological Association.
[46]. Sutherland, V., & Cooper, C. (2000). Strategic stress management: An organizational approach. Springer.
[47]. Sanches, P., Höök, K., Vaara, E., Weymann, C., Bylund, M., Ferreira, P., ... & Sjölinder, M. (2010, August). Mind the body! Designing a mobile stress management application encouraging personal reflection. In Proceedings of the 8th ACM conference on designing interactive systems (pp. 47-56).
[48]. Velicer, W. F., Prochaska, J. O., Fava, J. L., Norman, G. J., & Redding, C. A. (1998). Smoking cessation and stress management: applications of the trans-theoretical model. Homeostasis, 38(5-6), 216-33, 1998.
[49]. Heber, E., Lehr, D., Ebert, D. D., Berking, M., & Riper, H. (2016). Web-based and mobile stress management intervention for employees: a randomized controlled trial. Journal of medical Internet research, 18(1), e5112, 2016.
[50]. Shapiro, S. L., Shapiro, D. E., & Schwartz, G. E. (2000). Stress Management in Medical Education Table 1. A Review of the Literature on Stress Management in Medical Education, 1969 to 1998Table 1. Continued. Table 1. Continued. Table 1. Continued. Table 1. Continued. Table 1. Continued. A Review of the Literature. Academic medicine, 75(7), pp.748-759, 2000.
Citation
Hrithick Paul, Nirbhay Mishra, Sayani Ghatak, Dhararmpal Singh, Debmitra Ghosh, Sahil Das, P. Singha, "Impact of Stress on Humans and Its Detection Using Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.95-100, 2023.
Crime Scene classification of Digital Images Sourced from CCTV Footage
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.101-106, Nov-2023
Abstract
CCTV image classification using machine learning algorithm is a novel way of using machine learning for security. This paper investigates how classification can be done using statistical indicators of image pixels without employing extensive image processing techniques. It further performs comparative study of performances of some commonly used classification algorithms in classifying images. The highest performance was by the K-Nearest Neighbor classifier with accuracy, precision, and recall scores of 95\%, 90\%, and 100\% respectively.
Key-Words / Index Term
CCTV image classification, Crime Scene Identification, CCTV Footage Analysis, Machine Learning, CCTV Security, Classification Algorithm.
References
[1] Eamthanakul, Busarin, Mahasak Ketcham, and Narumol Chumuang. "The traffic congestion investigating system by image processing from CCTV camera." In 2017 international conference on digital arts, media and technology (ICDAMT), pp. 240-245. IEEE, 2017.
[2] Manu, Y. M., G. K. Ravikumar, and S. V. Shashikala. "Anomaly Alert System using CCTV surveillance." In 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), pp. 1-5. IEEE, 2022.
[3] Intani, Pattana, and Teerapong Orachon. "Crime warning system using image and sound processing." In 2013 13th International Conference on Control, Automation and Systems (ICCAS 2013), pp. 1751-1753. IEEE, 2013.
[4] Gupta, Pratishtha, Manisha Rathore, and G. N. Purohit. "Detection of direction deviation of vehicle using CCTV cameras." In International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), pp. 1-10. IEEE, 2014.
[5] Conaire, Ciarán O., Noel E. O`Connor, Eddie Cooke, and Alan F. Smeaton. "Multispectral object segmentation and retrieval in surveillance video." In 2006 International Conference on Image Processing, pp. 2381-2384. IEEE, 2006.
[6] Chmielewska, Agata, Parzych Marianna, Tomasz Marciniak, Adam Dabrowski, and Przemyslaw Walkowiak. "Application of the projective geometry in the density mapping based on CCTV monitoring." In 2015 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), pp. 179-184. IEEE, 2015.
[7] Yang, Yan, Brian C. Lovell, and Farhad Dadgostar. "Content-based video retrieval (cbvr) system for cctv surveillance videos." In 2009 Digital Image Computing: Techniques and Applications, pp. 183-187. IEEE, 2009.
[8] Sodanil, Maleerat, and Chalermpong Intarat. "A development of image enhancement for CCTV images." In 2015 5th International Conference on IT Convergence and Security (ICITCS), pp. 1-4. IEEE, 2015.
[9] Harte, Naomi, Andrew Rankin, Gary Baugh, and Anil Kokaram. "Detection of illegal dumping from CCTV at recycling centres." In 2007 International Machine Vision and Image Processing Conference, pp. 204-204. IEEE Computer Society, 2007.
[10] Saad, Mohamad Hanif Md, and Aini Hussain. "Design and development of intelligent anomalous behaviour and event detection system." In 2010 6th International Colloquium on Signal Processing & its Applications, pp. 1-5. IEEE, 2010.
[11] Rizki, Rai Purnama, Eki Ahmad Zaki Hamidi, Lia Kamelia, and Ramdani Wahyu Sururie. "Image processing technique for smart home security based on the principal component analysis (PCA) Methods." In 2020 6th International conference on wireless and telematics (ICWT), pp. 1-4. IEEE, 2020.
[12] Noguchi, Hirofumi, Takuma Isoda, and Seisuke Arai. "End-to-End Person Re-identification including Camera Zooming based on Meta-Analysis for Images." In 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 3285-3290. IEEE, 2021.
[13] Alpatov, Boris A., Pavel V. Babayan, and Maksim D. Ershov. "Embedded image processing and video analysis in intelligent camera-based vision system." In 2020 9th Mediterranean Conference on Embedded Computing (MECO), pp. 1-4. IEEE, 2020.
[14] Khasanova, Aliia, Alisa Makhmutova, and Igor Anikin. "Image denoising for video surveillance cameras based on deep learning techniques." In 2021 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), pp. 713-718. IEEE, 2021.
[15] Casanova, Guillermo, Daniel Yandún, and Graciela Guerrero. "Analysis of video surveillance images using computer vision in a controlled security environment." In 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6. IEEE, 2020.
16] Khan, Muhammad Aseer. "Image Processing Based Real Time Motion Detection System Using GSM and Embedded System." In 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1-6. IEEE, 2020.
Citation
Saumitra Biswas, Sanchayan Bhaumik, Tanay Bag, "Crime Scene classification of Digital Images Sourced from CCTV Footage," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.101-106, 2023.
An improved algorithm with Multifactor Authentication Scheme for Telecare Medical Information System (TMIS)
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.107-113, Nov-2023
Abstract
Telemedicine and its base, Telecare Medical Information System (TMIS), are becoming popular trend in the post COVID days. Faster Internet services and wireless technologies essentially provide faster data transfer facilities in Internet of Things (IoT) environment. To provide remote healthcare services, wearable and household medical devices are connected to form IoT networks. Thus, private data are exposed over the Internet and privacy maintenance is an issue. Elliptic Curve Cryptographic (ECC), a public key system, may be used since it can handle lightweight keys for small devices. One way hash-functions are very useful to protect any data but are irreversible. Hashing is useful to implement for data integrity. Our proposed system will use public key cryptosystem where keys are generated in ECC over a cyclic field. Beside this, One Time Password (OTP) will be used to provide another layer of user verification that will be transmitted in the GSM like telephone network. We will expect to provide security at different levels for all kind of users in a TMIS environment.
Key-Words / Index Term
Internet of Things (IoT), Elliptic Curve Cryptography (ECC), One Time Password (OTP), Hashing, Encryption and Decryption.
References
[1] Poornima Naga, Preeti Chandrakarb, Karan Chandrakar,“An Improved Two-Factor Authentication Scheme for Healthcare System, International Conference on Machine Learning and Data Engineering”, Procedia Computer Science, Elsevier, 1079–1090, 2023, DOI: 10.1016/j.procs.2023.01.087.
[2] Anjali Singh, Marimuthu Karuppiah , Rajendra Prasad Mahapatra, “Cryptanalysis on a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”, Cyber Security and Applications , Elsevier B.V., 2022, https://doi.org/10.1016/j.csa.2022.100008.
[3] R. Amin, G.P. Biswas, “A secure three-factor user authentication and key agreement protocol for TMIS with user anonymity”, J. Med. Syst., Springer, 39 (8), 1–19, 2015, DOI 10.1007/s10916-015-0258-7.
[4] C. Madan Kumar , Ruhul Amin, M. Brindha., “Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System”, Cyber Security and Applications, Elsevier B.V, 2023, https://doi.org/10.1016/j.csa.2023.100013.
[5] Niranchana Radhakrishnan and Amutha Prabakar Muniyandi, “Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System”, Journal of Healthcare Engineering, Hindawi, 2022, https://doi.org/10.1155/2022/9273662.
[6] Tzu-Wei Lin1 and Chien-Lung Hsu, “Chaotic Maps-based Privacy- Preserved Three-Factor Authentication Scheme for Telemedicine Systems”, International Journal of Network, Vol.25, No.2, PP.194-200, Mar. 2023, DOI: 10.6633/IJNS.202303 25(2).02).
[7] Shuyun Shi, Min Luo ,Yihong Wen, Lianhai Wang, and Debiao He , “A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems”, Security and Communication Networks, Volume, Hindawi, 2022, https://doi.org/10.1155/2022/6735003.
[8] Lijun Xiaoa, Songyou Xie, Dezhi Han, Wei Liang, Jun Guo & Wen-Kuang Choul., “A lightweight authentication scheme for telecare medical information system”, Connection Science, Taylor & Francis, VOL.33,NO.3, pp. 769–785, 2021, DOI: 10.1080/09540091.2021.1889976.
[9] Muhammad Tanveer, Abd Ullah Khan, Ahmed Alkhayyat, Shehzad Ashraf Chaudhry, Yousaf Bin Zikria, Sung Won Kim, “REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System”, IEEE Access, February, 2022, DOI:10.1109/ACCESS.2022.3153069.
[10] Jongseok Ryu, Jihyeon Oh, Deokkyu Kwon, Seunghwan Son , Joonyoung Lee, Yohan Park, And Youngho Park.,“Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System”, IEEE Access, Vol- 10, January, 2022, DOI: 10.1109/ACCESS.2022.3145959.
[11] Abraham Isiaho *, Kelvin Kabeti Omieno and Hillan Rono , “Tele-care medical information systems security techniques: A critical review of the state of the art techniques”, WJAETS, 07(02), P240–P254.,December,2022, https://doi.org/10.30574/wjaets.2022.7.2.0136.
[12] Guosheng Xu, Shuming Qiu, Haseeb Ahmad, Guoai Xu, Yanhui Guo, Miao Zhang and Hong Xu, “A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography”, Sensors, MDPI, 18, 2394; doi:10.3390/s18072394.
[13] Fairouz Sherali, Sarhan Falah, “An Efficient Two Factor User Authentication and Key Exchange Protocol for Telecare Medical Information System”, International Journal of Mathematics and Computer Science, 15(2020), no. 4, 1015–1027, 2020, ISSN 1814-0432.
[14] Yohan Park, “A Secure User Authentication Scheme with Biometrics for IoT Medical Environment”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 11,pp 607-615, 2018, .
[15] Anuj Kumar Singh , Arun Solanki , Anand Nayyar, and Basit Qureshi, “Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards”, Applied Science, MDPI, 10, 8291; doi:10.3390/app10228291
[16] Priyank Nayak, Ravi Singh Pippal, “A Robust Patient Authentication Scheme For Telecare Medicine Information Systems (Tmis) Against Smart Card Security Breach”, VOL 7, ISSUE 19, ISSN- 2394-5125 ,2020.
[17] Mourade Azrour , Jamal Mabrouki , and Rajasekhar Chaganti, “New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT”, Security and Communication Networks, Hindwai, Volume 2021, Article ID 5546334, 12 pages ,2021, https://doi.org/10.1155/2021/5546334.
[18] Vani Rajasekar, Premalatha Jayapaul, Sathya Krishnamoorthi, Muzafer Sara?evi?, “Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications:A Multilayer Systematic Survey”, Acta Polytechnica Hungarica, Vol. 18, No. 3,pp 97-106, 2021.
[19] Niranchana Radhakrishnan, Marimuthu Karuppiah, “An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems”, Informatics in Medicine Unlocked, Elsevier B.V., https://doi.org/10.1016/j.imu.2018.02.003, 2018
[20] Arezou Ostad-Sharif1 & Dariush Abbasinezhad-Mood1 & Morteza Nikooghadam, “Journal of Medical Systems (2019) 43: 10 https://doi.org/10.1007/s10916-018-1120-5, 2019.
Citation
Asit Kumar Nayek, Radha Krishna Jana, Arpan Adhikary, "An improved algorithm with Multifactor Authentication Scheme for Telecare Medical Information System (TMIS)," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.107-113, 2023.
Unlocking the Future: Leveraging Big Data Analytics for Predictive Healthcare Insights
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.114-119, Nov-2023
Abstract
This article shows that predictive analytics using big data analytics has become a powerful tool for disease prediction and prevention in healthcare. This article provides an overview of the application of predictive analytics using big data analytics in healthcare. Machine learning models that use a wide variety of data, including medical data, genetic data, lifestyle data, and the environment, are used to identify and generate accurate predictions. Benefits of predictive testing in healthcare include early disease detection, personalised medicine, and lifestyle changes. Supports interventions that improve clinical outcomes. The allocation of resources and planning have also been simplified, and better treatment and prevention measures have been used. As a result, issues such as privacy concerns, data quality, and ethical considerations must be addressed. Predictive analytics from big data analytics has the potential to transform healthcare and improve patient care and public health outcomes.
Key-Words / Index Term
Predictive analytics, big data analytics, Disease prediction, Disease prevention, Healthcare, Machine learning models, Medical data, Genetic data etc.
References
[1] Abbott, P.A, Coenen Amy“Globalisation and advances in information and communication technologies: The impact on nursing and health” Nurs Outlook 2008;56:238-246.
[2] Arshia Rehman, “ Leveraging Big Data Analytics in Healthcare Enhancement: Trends, Challenges and Opportunities”, Multimedia Systems 28(1):1-33,Jan 2021.
[3] Aziz: A review of the role of public health informatics in healthcare. Journal of Taibah University Medical
[4] Chen, J., Li, K., Rong, H., Bilal, K., Yang, N., Li, K.: A disease diagnosis and treatment recommendation system based on big data mining and cloud computing. Information Sciences 435, (2018)
[5] Galetsi, P: A review of the literature on big data analytics in healthcare. Journal of the Operational Research Society pp. (2019)
[6] Alexander, C.: Big data analytics in heart attack prediction. The Journal of Nursing Care.
[7] Gamache R, Kharrazi H, Weiner JP. Public and Population Health Informatics: The Bridging of Big Data to Benefit Communities. Yearb Med Inform. 2018 Aug;27(1):199-206. doi: 10.1055/s-0038-1667081. Epub 2018 Aug 29. PMID: 30157524; PMCID: PMC6115205.
[8] B¨ack, T.: Evolutionary computation: Toward a new philosophy.
[9] Gary D Bader1,2 and Christopher WV Hogue*1,“ An automated method for finding molecular complexes in large protein interaction networks. BMC Bioinformatics 2003, 4:2.
[10]K. Bakshi, "Considerations for big data: Architecture and approach," 2012 IEEE Aerospace Conference, Big Sky, MT, USA, 2012, pp. 1-7, doi: 10.1109/AERO.2012.6187357.
[11] Jiajia Chen,Fuliang Qian,Wenying Yan,and Bairong Shen, “Translational biomedical informatics in the cloud: present and future” Hindawi Publishing Corporation BioMed Research International Volume 2013, Article ID 658925,
Citation
P. Chatterjee, A. Barman, D. Dey, A. Dutta, R.K. Jana, D. Singh, S. Dutta, N. Mishra, "Unlocking the Future: Leveraging Big Data Analytics for Predictive Healthcare Insights," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.114-119, 2023.
An Empirical Comparison of Linear and Non-linear Classification Using Support Vector Machines
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.120-126, Nov-2023
Abstract
Support Vector Machines (SVMs) are used in large-scale linear and non-linear non-probabilistic binary or multi-class classification. Classification using SVM techniques gives better accuracy than other machine learning classification methods. Various Support Vector Classification (SVC) algorithms are available in the literature, and many researchers are facing the problem of choosing the best methods for real-world applications. This paper integrates LibSVM and LibLINEAR tools with the Weka tool. The Radial Basis Function (RBF), Polynomial, Sigmoid and Linear kernel-based C-SVC and nu-SVC models, as well as predictive linear SVM models, are applied to six UCI machine learning datasets. The presentations of various SVC methods are empirically matched using Classification Accuracy (CA), Root Mean Square Error (RMSE), and Area Under Curve (AUC) metrics. The proposed method for this article is RBF kernel and linear kernel in C-SVC and nu-SVC models. The performance of the proposed models is trained and tested with UCI machine learning datasets for non-linear and linear classification. The results are compared with state-of-the-art SVC models. RBF kernel in C-SVC and nu-SVC models has achieved an accuracy of 97.3% and 98%, respectively, for non-linear classification on the Iris dataset. The linear kernel in C-SVC and nu-SVC models has achieved 96.6% and 98% accuracy for linear classification on the Iris dataset. L2-Regularized L2-Hinge Loss dual and primal SVC model has a classification accuracy of 96% for large-scale linear classification on the Iris dataset. Therefore, some conclusions based on overall performances on six datasets are as follows. (i) RBF kernel-based C-SVC model performs better than other non-linear SVC methods. (ii) Linear kernel-based C-SVC and nu-SVC methods perform better in the case of linear classification. (iii) In large-scale linear classification, L1-Regularized L2-Loss SVC, Multi-class SVC by Crammer Singer and L2-Regularized L2-Loss SVC methods perform better than other linear SVC methods. (iv) Most of these methods give good results in the case of datasets having all the most numeric attributes or dimensions and a large number of instances or vectors.
Key-Words / Index Term
Support Vector Machines, Kernel Functions, Regularized Losses, Classification
References
[1]. Vapnik, Vladimir. The nature of statistical learning theory. Springer science & business media, 1999.
[2]. Hearst, Marti A., et al. "Support vector machines." IEEE Intelligent Systems and their applications 13.4 (1998): 18-28.
[3]. Zhang, Xian-Da, and Xian-Da Zhang. "Support vector machines." A Matrix Algebra Approach to Artificial Intelligence (2020): 617-679.
[4]. James, Gareth, et al. "Support vector machines." An introduction to statistical learning: with applications in R (2021): 367-402.
[5]. Das, Subhankar, and Sanjib Saha. "Data mining and soft computing using support vector machine: A survey." International Journal of Computer Applications 77.14 (2013).
[6]. Cervantes, Jair, et al. "A comprehensive survey on support vector machine classification: Applications, challenges and trends." Neurocomputing 408 (2020): 189-215.
[7]. Chapelle, Olivier, et al. "Choosing multiple parameters for support vector machines." Machine learning 46 (2002): 131-159.
[8]. Schölkopf, Bernhard, Alexander J. Smola, and Francis Bach. Learning with kernels: support vector machines, regularization, optimization, and beyond. MIT press, 2002.
[9]. Rakotomamonjy, Alain. "Variable selection using SVM-based criteria." Journal of machine learning research 3.Mar (2003): 1357-1370.
[10]. Cortes, Corinna, and Vladimir Vapnik. "Support-vector networks." Machine learning 20 (1995): 273-297.
[11]. Schölkopf, Bernhard, et al. "New support vector algorithms." Neural computation 12.5 (2000): 1207-1245.
[12]. Schölkopf, Bernhard, et al. "Estimating the support of a high-dimensional distribution." Neural computation 13.7 (2001): 1443-1471.
[13]. Vapnik, Vladimir N. "An overview of statistical learning theory." IEEE transactions on neural networks 10.5 (1999): 988-999.
[14]. Knerr, Stefan, Léon Personnaz, and Gérard Dreyfus. "Single-layer learning revisited: a stepwise procedure for building and training a neural network." Neurocomputing: algorithms, architectures and applications. Springer Berlin Heidelberg, 1990.
[15]. Chang, Chih-Chung, and Chih-Jen Lin. "LIBSVM: a library for support vector machines." ACM transactions on intelligent systems and technology (TIST) 2.3 (2011): 1-27..
[16]. Wu, Ting-Fan, Chih-Jen Lin, and Ruby Weng. "Probability estimates for multi-class classification by pairwise coupling." Advances in Neural Information Processing Systems 16 (2003).
[17]. Lin, Chih-Jen, and Ruby C. Weng. "Simple probabilistic predictions for support vector regression." National Taiwan University, Taipei (2004).
[18]. Que, Z., and Lin, C J. "One-class SVM probabilistic outputs." Technical report, National Taiwan University, 2022. URL http://www.csie.ntu.edu.tw/~cjlin/papers/oneclass_prob/oneclass_prob.pdf.
[19]. Fan, Rong-En, et al. "LIBLINEAR: A library for large linear classification." the Journal of machine Learning research 9 (2008): 1871-1874.
[20]. Boser, Bernhard E., Isabelle M. Guyon, and Vladimir N. Vapnik. "A training algorithm for optimal margin classifiers." Proceedings of the fifth annual workshop on Computational learning theory. 1992.
[21]. Hsieh, Cho-Jui, et al. "A dual coordinate descent method for large-scale linear SVM." Proceedings of the 25th international conference on Machine learning. 2008.
[22]. Lin, Chih-Jen, Ruby C. Weng, and S. Sathiya Keerthi. "Trust region newton methods for large-scale logistic regression." Proceedings of the 24th international conference on Machine learning. 2007.
[23]. Keerthi, S. Sathiya, et al. "A sequential dual method for large scale multi-class linear SVMs." Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. 2008.
[24]. Chauhan, Vinod Kumar, Kalpana Dahiya, and Anuj Sharma. "Problem formulations and solvers in linear SVM: a review." Artificial Intelligence Review 52.2 (2019): 803-855.
[25]. Crammer, Koby, and Yoram Singer. "On the learnability and design of output codes for multiclass problems." Machine learning 47 (2002): 201-233.
[26]. Tan, Xian, Fasheng Yu, and Xifeng Zhao. "Support vector machine algorithm for artificial intelligence optimization." Cluster Computing 22 (2019): 15015-15021.
[27]. Chen, Yanhua, et al. "A hybrid application algorithm based on the support vector machine and artificial intelligence: An example of electric load forecasting." Applied Mathematical Modelling 39.9 (2015): 2617-2632.
[28]. Chiang, Hsiu-Sen, et al. "A novel artificial bee colony optimization algorithm with SVM for bio-inspired software-defined networking." International Journal of Parallel Programming 48 (2020): 310-328.
[29]. Frohlich, Holger, Olivier Chapelle, and Bernhard Scholkopf. "Feature selection for support vector machines by means of genetic algorithm." Proceedings. 15th IEEE International Conference on Tools with Artificial Intelligence. IEEE, 2003.
[30]. Tang, Yichuan. "Deep learning using linear support vector machines." arXiv preprint arXiv:1306.0239 (2013).
[31]. Campbell, Colin. "Kernel methods: a survey of current techniques." Neurocomputing 48.1-4 (2002): 63-84.
[32]. Koshiba, Yoshiaki, and Shigeo Abe. "Comparison of L1 and L2 support vector machines." Proceedings of the International Joint Conference on Neural Networks, 2003.. Vol. 3. IEEE, 2003.
[33]. Chapelle, Olivier. "Training a support vector machine in the primal." Neural computation 19.5 (2007): 1155-1178.
[34]. Nalepa, Jakub, and Michal Kawulok. "Selecting training sets for support vector machines: a review." Artificial Intelligence Review 52.2 (2019): 857-900.
[35]. Yuan, Guo-Xun, Chia-Hua Ho, and Chih-Jen Lin. "Recent advances of large-scale linear classification." Proceedings of the IEEE 100.9 (2012): 2584-2603.
[36]. Van Den Doel, Kees, Uri Ascher, and Eldad Haber. "The lost honour of l2-based regularization." Large Scale Inverse Problems, Radon Ser. Comput. Appl. Math 13 (2012): 181-203.
[37]. Halder, Chayan, Jaya Paul, and Kaushik Roy. "Comparison of the classifiers in Bangla handwritten numeral recognition." 2012 International Conference on Radar, Communication and Computing (ICRCC). IEEE, 2012.
[38]. Vidhya, M. "Efficient classification of portscan attacks using Support Vector Machine." 2013 International Conference on Green High Performance Computing (ICGHPC). IEEE, 2013..
[39]. Datta, R. P., and Sanjib Saha. "Applying rule-based classification techniques to medical databases: an empirical study." International Journal of Business Intelligence and Systems Engineering 1.1 (2016): 32-48.
[40]. Blake, C. and Merz, C. J. "UCI repository of machine learning datasets." University of California, Irvine, Dept. of Information and Computer Sciences.(http://www.cs.waikato.ac.nz/~ml/weka/)
[41]. WEKA3 tool for machine learning and knowledge analysis. Online available at http://www.cs.waikato.ac.nz/~ml/weka/
[42]. Saha, Sanjib, and Debashis Nandi. "Data Classification based on Decision Tree, Rule Generation, Bayes and Statistical Methods: An Empirical Comparison." Int. J. Comput. Appl 129.7 (2015): 36-41.
[43]. Shawe-Taylor, John, and Shiliang Sun. "A review of optimization methodologies in support vector machines." Neurocomputing 74.17 (2011): 3609-3618.
[44]. Saha, Sanjib. "Non-rigid Registration of De-noised Ultrasound Breast Tumors in Image Guided Breast-Conserving Surgery." Intelligent Systems and Human Machine Collaboration. Springer, Singapore, 2023. 191-206.
[45]. Saha, Sanjib, et al. "ADU-Net: An Attention Dense U-Net based deep supervised DNN for automated lesion segmentation of COVID-19 from chest CT images." Biomedical Signal Processing and Control 85 (2023): 104974.
[46]. Chen, Pai-Hsuen, Chih-Jen Lin, and Bernhard Schölkopf. "A tutorial on ?-support vector machines." Applied Stochastic Models in Business and Industry 21.2 (2005): 111-136.
Citation
Sanjib Saha, "An Empirical Comparison of Linear and Non-linear Classification Using Support Vector Machines," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.120-126, 2023.
Utilizing an Implicit Health Analysis Integrated Simulation for Hospital-Nurse Staffing Strategy
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.127-133, Nov-2023
Abstract
This summary presents the application of an integrated simulation platform for the analysis of poor health in practical nursing care. The platform uses advanced techniques to model and analyse the complex health behaviours of nursing home residents. The platform leverages implicit health analysis to capture hidden patterns and subtle changes in people`s health to better understand their needs. Through simulation-based evaluation, various aspects of the strategy can be analysed, including employee engagement, community health, and the need for assistance. The platform provides the framework for improving employee decisions by identifying the best strategies to meet the diverse and changing needs of nursing home residents. Using this new approach, nursing homes can improve care, reduce labour costs and ultimately improve residents` overall quality of life.
Key-Words / Index Term
Skilled Nurse, Registred Nurse,NB,Simulator
References
[1] Xuxue Sun , Nan Kong , Nazmus Sakib , Chao Meng , Kathryn Hyer , Hongdao Meng , Chris Masterson , Mingyang Li, “ A Latent Survival Analysis Enabled Simulation Platform For Nursing Home Staffing Strategy Evaluation”.
[2] Ridong Wanga,, Karmel S. Shehadehb,, Xiaolei Xiea,, Lefei Lia, “Integrated optimization approaches for nursing home staffing strategy evaluation”,https://arxiv.org/pdf/2203.14430.pdf.
[3] U.S. Centers for Medicare and Medicaid Services, 2014. Nursing Home Penalty Data 2014. Baltimore, MD: CMS; 2014.https://data.medicare.gov/Nursing-Home-Compare/Penalty-Counts/t8q7-k6ku
[4] C. Harrington, H. Carrillo and R. Garfield, 2015. “Nursing facilities, staffing, residents and facility deficiencies, 2009 Through 2014”. Menlo Park: The Henry J. Kaiser Family Foundation.
[5]Xuxue Sun , Nan Kong , Youbing Zhao , Nazmus Sakib , Chao Meng , Hongdao Meng , Kathryn Hyer , Ying Li f, Chris Masterson , Mingyang Li, “A latent survival analysis integrated simulation platform for nursing home staffing strategy evaluation”,Computers & Industrial Engineering, Volume 177, March 2023, 109074.
[6] Janiszewski Goodin, H., 2003. “The nursing shortage in the United States of America: an integrative review of the literature”. Journal of advanced nursing, 43(4), pp.335-343.
[7] R Tamara Konetzka, S Clark Stearns and J Park, 2008. “The staffing-outcomes relationship in nursing homes”. Health services research, 43(3), pp.1025-1042.
[8] K. Spilsbury, C. Hewitt, L. Stirk and C. Bowman, 2011. “The relationship between nurse staffing and quality of care in nursing homes: a systematic review”. International journal of nursing studies, 48(6), pp.732-750.
[9] C. Mueller, G. Arling, R. Kane, J. Bershadsky,D., Holland, & A.Joy (2006). Nursing home staffing standards: Their relationship to nurse staffing levels. The Gerontologist, 46(1), 74-80.
[10] J.R. Bowblis, 2011. Staffing ratios and quality: An analysis of minimum direct care staffing requirements for nursing homes. Health services research, 46(5), pp.1495-1516.
[11] X. Zhang, S. Barnes, B. Golden, M. Myers and P. Smith, 2019. Lognormal-based mixture models for robust fitting of hospital length of stay distributions. Operations Research for Health Care, 22, p.100184.
Citation
Abhisan Paul, Diganta Biswas, Radha Krishna Jana, "Utilizing an Implicit Health Analysis Integrated Simulation for Hospital-Nurse Staffing Strategy," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.127-133, 2023.
Measure Underachievement’s in the Space of Livelihoods through Artificial Intelligence
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.134-140, Nov-2023
Abstract
Ensuring a sustainable livelihood to the larger counts of the population is the most challenging agenda of any developing country. So this work wants to quantify the level of under achievements of different economies in the field of sustainable livelihood. The contribution of influencing variables of under-achievement and contributing variables to achievement in the construction of under achievement livelihood space is also determined under this work. The interaction between these two types of variables and their juxtaposed effects are evaluated through the use of artificial neural network. Finally this method of artificial intelligence is used to achieve a self-sustained monotonic high rate of development. The whole work is presented through a set theoretic approach which is followed by the testing of the same. It is expected that the application of neural network in the process of self-sustained growth of sustainable livelihood is unique in academic discourses.
Key-Words / Index Term
Artificial Intelligence, Sustainable livelihood, Graph theory, Artificial Neural Network, Sustainable Livelihood, Under achievement.
References
[1]. DFID. Department for International Development. UK : s.n., 2000.
[2]. www.gov.uk. www.gov.uk. [Online] 1997. https://www.gov.uk/government/organisations/department-for-international-development.
[3]. The Sustainable Livelihoods Approach, From a psychological perspective. Elsemarie Kappel Petersen, Michelle Lind Pedersen. s.l.: University of Aarhus, June 2010, The Sustainable Livelihoods Approach.
[4]. UNDP. Application of the Sustainable Livelihoods Framework in Development Projects. s.l. : United Nations Development Programme, 2017.
[5]. Sustainable rural livelihoods: practical concepts for the 21st century. Robert Chambers, Gordon Conway. 1992, IDS Discussion, pp.296, 1992.
[6]. Krantz, Lasse. The Sustainable Livelihood Approach to Proverty Reduction. The Sustainable Livelihood Approach to Proverty Reduction. s.l. : Swedish International Developmenent Cooperation Agency, pp.1-44, 2001.
[7]. Microcredit, Social Capital, and Common Pool Resources. C.LeighAnderson, LauraLocker. 1, s.l. : Elseviar Science Ltd, 2002, World Development, Vol.30, pp.98-105, 2002.
[8]. Arild Angelsen, Helle Overgaard Larsen, Carsten Smith Olsen. Measuring Livelihoods and Environmental Dependence Methods for Research and Fieldwork. London : s.n., 2012.
[9]. Human-Level Artificial Intelligence? Be Serious! Nilsson, Nils J. 2005, American Association for Artificial Intelligence, pp. 68-75.
[10]. Explanation in Artificial Intelligence: Insights from the Social Sciences. Miller, Tim. 2017, Artificial Intelligence.
[11]. John Morton, Nicholas Meadows. Pastoralism and sustainable livelihoods: An emerging agenda. Pastoralism and sustainable livelihoods: An emerging agenda. s.l. : Natural Resources Institute, University of Greenwich, 2000.
[12]. Tourism as a sustainable livelihood strategy. Teresa C.H. Tao, Geoffrey Wall. s.l. : Elsevier, , Tourism Management, pp.90-98, 2009.
[13]. Sustainable livelihoods and people’s vulnerability in the face of coastal hazards. JC Gaillard, Emmanuel A. Maceda, Elodie Stasiak, Iwan Le Berre, Maria Victoria O. Espaldon. s.l. : Springer Science, Journal of Coastal Conservation, June, pp.119-129, 2009.
[14]. Quantum multidimensional color images similarity comparison. Ri-Gui Zhou, Ya-Juan Sun. 2014, Quantum Information Processing, pp.1605-1624, 2014.
Citation
Soumya Sengupta, Dharmpal Singh, "Measure Underachievement’s in the Space of Livelihoods through Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.134-140, 2023.
An Empirical Comparison and Effect of Clustering Massive Data on Association Rule Mining
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.141-148, Nov-2023
Abstract
This paper explores the different techniques of association rule mining (ARM) and clustering in unsupervised learning and data mining. As many works have already been done on the Apriori algorithm of ARM, but there was very limited work on the other algorithms such as Predictive Apriori, Tertius and Filtered Associator. The main problem of ARM is handling a large dataset and then scanning it repeatedly. A pre-clustering effort would reduce the dataset size for each such scan for each such cluster and thus would offer overall less time requirement. The different algorithms of ARM are executed on two different datasets such as Breast Cancer and Zoo. There is a scope for improvement in performance by applying filters and clustering techniques on ARM. The best model has been proposed as follows: (i) Use data source; (ii) Apply filters (numeric to nominal and replace missing value); (iii) Apply additional filters (attribute selection or merge two values or remove folds) or evaluation method (training set maker); (iv) Apply clustering methods (K-Means, Farthest Fast, Expectation Maximization, Hierarchical and Make Density Based); (v) Apply ARM methods (Apriori, Predictive Apriori, Tertius and Filtered Associator); (vi) View result. The different ARM algorithms are evaluated with certain metrics and compared against each other based on accuracy, lift value and execution time. However, the best rules found from each ARM algorithm are different. The paper discusses the effect of clustering on ARM and claims that clustering the data before applying ARM is better.
Key-Words / Index Term
Unsupervised Learning, Data Mining, Association Rule Mining, Apriori, Clustering, K-Means
References
[1] Agarwal, Rakesh, and Ramakrishnan Srikant. "Fast algorithms for mining association rules." Proc. of the 20th VLDB Conference. Vol.487, 1994.
[2] Agrawal, Rakesh, Tomasz Imielinski, and Arun Swami. "Database mining: A performance perspective." IEEE transactions on knowledge and data engineering 5.6: pp.914-925, 1993.
[3] Agrawal, Rakesh, Tomasz Imieli?ski, and Arun Swami. "Mining association rules between sets of items in large databases." Proceedings of the 1993 ACM SIGMOD international conference on Management of data. 1993.
[4] Kaushik, Minakshi, et al. "A systematic assessment of numerical association rule mining methods." SN Computer Science 2.5: 348, 2021.
[5] Ünvan, Yüksel Akay. "Market basket analysis with association rules." Communications in Statistics-Theory and Methods 50.7: pp.1615-1628, 2021.
[6] Kaushik, Minakshi, et al. "On the potential of numerical association rule mining." Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications: 7th International Conference, FDSE 2020, Quy Nhon, Vietnam, Proceedings 7. Springer Singapore, 2020, November pp.25–27, 2020.
[7] Liu, Bing, Yiming Ma, and Ching Kian Wong. "Improving an association rule based classifier." Principles of Data Mining and Knowledge Discovery: 4th European Conference, PKDD 2000 Lyon, France, Proceedings 4. Springer Berlin Heidelberg, 2000, September pp.13–16, 2000.
[8] Altaf, Wasif, Muhammad Shahbaz, and Aziz Guergachi. "Applications of association rule mining in health informatics: a survey." Artificial Intelligence Review 47: pp.313-340, 2017.
[9] Kaur, Manpreet, and Shivani Kang. "Market Basket Analysis: Identify the changing trends of market data using association rule mining." Procedia computer science 85: pp.78-85, 2016.
[10] Feng, Feng, et al. "Soft set based association rule mining." Knowledge-Based Systems 111: pp.268-282, 2016.
[11] Chiclana, Francisco, et al. "ARM–AMO: An efficient association rule mining algorithm based on animal migration optimization." Knowledge-Based Systems 154: pp.68-80, 2018.
[12] Ganda, Ritu. "Knowledge discovery from database using an integration of clustering and association rule mining." International Journal of Advanced Research in Computer Science and Software Engineering 3.9: pp.13-18, 2013.
[13] Shweta, Ms, and Dr Kanwal Garg. "Mining efficient association rules through apriori algorithm using attributes and comparative analysis of various association rule algorithms." International Journal of Advanced Research in Computer Science and Software Engineering 3.6: pp.306-312, 2013.
[14] Tan, Steinbach, and Kumar, "Cluster Analysis: Basic Concepts and Algorithms," Introduction to Data Mining, 2006, Addison-Wesley.
[15] Y?lmaz, Nergis, and Gülfem I??klar Alptekin. "The Effect of Clustering in the Apriori Data Mining Algorithm: A Case Study." Proceedings of the World Congress on Engineering. Vol.3. 2013.
[16] Scheffer, Tobias. "Finding association rules that trade support optimally against confidence." Intelligent Data Analysis 9.4: pp.381-395, 2005.
[17] Aher, Sunita B., and L. M. R. J. Lobo. "A comparative study of association rule algorithms for course recommender system in e-learning." International Journal of Computer Applications 39.1: pp.48-52, 2012.
[18] Flach, Peter A., and Nicolas Lachiche. "Confirmation-guided discovery of first-order rules with Tertius." Machine learning 42.1-2 (2001): 61.
[19] Bathla, Himani, and K. Kathuria. "Apriori algorithm and filtered associator in association rule mining." International Journal of Computer Science and Mobile Computing 4.6 (2015): 299-306.
[20] MacQueen, J. "Classification and analysis of multivariate observations." 5th Berkeley Symp. Math. Statist. Probability. Los Angeles LA USA: University of California, 1967.
[21] Murtagh, Fionn, and Pedro Contreras. "Algorithms for hierarchical clustering: an overview." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 2.1 (2012): 86-97.
[22] Kriegel, Hans?Peter, et al. "Density?based clustering." Wiley interdisciplinary reviews: data mining and knowledge discovery 1.3 (2011): 231-240.
[23] WEKA3 tool for machine learning and knowledge analysis. Online available at http://www.cs.waikato.ac.nz/~ml/weka/
[24] Blake, C. and Merz, C. J. "UCI repository of machine learning datasets." University of California, Irvine, Dept. of Information and Computer Sciences.(http://www.cs.waikato.ac.nz/~ml/weka/)
[25] Asadi, Sh, Seyed Jafari, and Z. Shokrollahi. "Developing a course recommender by combining clustering and fuzzy association rules." Journal of AI and Data mining 7.2: pp.249-262, 2019.
[26] Datta, R. P., and Sanjib Saha. "Applying rule-based classification techniques to medical databases: an empirical study." International Journal of Business Intelligence and Systems Engineering 1.1: pp.32-48, 2016.
[27] Saha, Sanjib, and Debashis Nandi. "Data Classification based on Decision Tree, Rule Generation, Bayes and Statistical Methods: An Empirical Comparison." Int. J. Comput. Appl 129.7: pp.36-41, 2015.
[28] Das, Subhankar, and Sanjib Saha. "Data mining and soft computing using support vector machine: A survey." International Journal of Computer Applications 77.14, 2013.
[29] Saha, Sanjib. "Non-rigid Registration of De-noised Ultrasound Breast Tumors in Image Guided Breast-Conserving Surgery." Intelligent Systems and Human Machine Collaboration. Springer, Singapore, pp.191-206, 2023.
[30] Saha, Sanjib, et al. "ADU-Net: An Attention Dense U-Net based deep supervised DNN for automated lesion segmentation of COVID-19 from chest CT images." Biomedical Signal Processing and Control 85: 104974, 2023.
Citation
Sanjib Saha, "An Empirical Comparison and Effect of Clustering Massive Data on Association Rule Mining," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.141-148, 2023.
SafeWay: An Android Application based Automatic Vehicle Accident Detection and Messaging System
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.149-154, Nov-2023
Abstract
The research paper outlines the creation of vehicle accident detection and notification system that is based on an Android application. When a vehicle collision occurs, the system uses sensors and mobile technologies to notify the necessary parties, including emergency services, insurance providers, and worried family members. A predestined contact list will get an emergency alert message from the system when it has detected and appraise the relentlessness of a vehicle accident. The technology is proposed to be extremely accurate and effectual at detecting and responding to auto accidents. When a vehicle`s velocity suddenly changes, the system employs a mix of accelerometer, gyroscope, and Global Positioning System (GPS) sensors to look for impending accident signs. After determining the accident`s relentlessness using an algorithm, the system sends an emergency alert message to a predetermined contact list. The system has undergone testing and been shown to be reliable and successful in identifying vehicle collisions and transmitting emergency signals. The design and development of the system, its possible applications, and the benefits and difficulties of its adoption are all covered in the research paper. The paper also explores the possibility for more study to enhance the system.
Key-Words / Index Term
Android Application, Global Positioning System (GPS), Accident Detection System.
References
[1]. Prabha, Chander & SUNITHA, R. & ANITHA, R. Automatic Vehicle Accident Detection and Messaging System Using GSM and GPS Modem. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering. 3. pp.10723-10727, 2014. 10.15662/ijareeie.2014.0307062.
[2]. Chen, Patrick & Liu, Yong-Kuei & Hsu, Chia-Shih. An Emergent Traffic Messaging Service Using Wireless Technology. 6122. pp.44-51, 2010. 10.1007/978-3-642-13601-6_6.
[3]. Chaudhari, H. Agrawal, S. Poddar, K. Talele and M. Bansode, "Smart Accident Detection And Alert System," IEEE India Council International Subsections Conference (INDISCON), NAGPUR, India, 2021.
[4]. N. Kattukkaran, A. George and T. P. M. Haridas, "Intelligent accident detection and alert system for emergency medical assistance," International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, pp.1-6, 2017. doi: 10.1109/ICCCI.2017.8117791.
[5]. H. M. Sherif, M. A. Shedid and S. A. Senbel, "Real time traffic accident detection system using wireless sensor network," 6th International Conference of Soft Computing and Pattern Recognition (SoCPaR), Tunis, Tunisia, pp.59-64, 2014. doi: 10.1109/SOCPAR.2014.7007982.
[6]. C. Devi and S. Gowri, "An automatic Smart Phone with IoT based Accident detection and alerting System," 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, pp.426-432, 2021. doi: 10.1109/ICECA52323.2021.9676093.
[7]. R. Rishi, S. Yede, K. Kunal and N. V. Bansode, "Automatic Messaging System for Vehicle Tracking and Accident Detection," International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, pp.831-834, 2020. doi: 10.1109/ICESC48915.2020.9155836.
[8]. G. Rajesh, A. R. Benny, A. Harikrishnan, J. Jacob Abraham and N. P. John, "A Deep Learning based Accident Detection System," 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, pp.1322-1325, 2020. doi: 10.1109/ICCSP48568.2020.9182224.
[9]. Patel, Tirth & Patel, Saurabh. Accident Alert System Using Pressure Sensing Device. 10.13140/RG.2.2.26491.39200. 2022.
[10]. Baballe M.A., Yau A, Farouk S., Ibrahim, Muhammad A., Mustapha N. K. Accident Detection System with GPS, GSM, and Buzzer, Journal of Mathematical Techniques and Computational Mathematics, Vol.2, Issue.3, 2023.
[11]. Chiddarwar G., Dhivar S., Kulkarni A., Gajbhiye B., Chaudhari N. Accident Alert System Using IoT, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, ISSN : 2456-3307. 2022.
[12]. Doshi, Aayush & Shah, Bhavya & Kamdar, Jubin. Accilert -Accident Detection And Alert System. International Journal of All Research Education and Scientific Methods (IJARESM), Vol.9, Issue.11, 2021.
[13]. Sumathy, B. & Sundari, L & Priyadharshini S, Janani & Jayavarshini, G. Vehicle Accident Emergency Alert System. IOP Conference Series: Materials Science and Engineering. pp.10-12, 2021. 012042. 10.1088/1757-899X/1012/1/012042.
[14]. White, Jules & Thompson, Chris & Turner, Hamilton & Dougherty, Brian & Schmidt, Douglas. WreckWatch: Automatic Traffic Accident Detection and Notification with Smartphones. MONET. 16. pp.285-303, 2011. 10.1007/s11036-011-0304-8.
[15]. Singh, Saiyyam & Bhatnagar, Vedant & Gautam, Sarthak & Satwaliya, Deepanshu. Instant Messaging Application Based on Android. International Journal for Research in Applied Science and Engineering Technology. 10. pp.3096-3102, 2022. 10.22214/ijraset.2022.43009.
[16]. Archana, Myaka. Automatic Vehicle Accident Detection System. International Journal for Research in Applied Science and Engineering Technology. 9. pp.2975-2979, 2021. 10.22214/ijraset.2021.35670.
[17]. Tian, Daxin & Zhang, Chuang & Duan, Xuting & Wang, Xixian. An Automatic Car Accident Detection Method Based on Cooperative Vehicle Infrastructure Systems. IEEE Access. pp.1-1, 2019.
Citation
Shadma Bakhtawar, Shahid Imam, Shadab Ali, Sunil, "SafeWay: An Android Application based Automatic Vehicle Accident Detection and Messaging System," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.149-154, 2023.