Analysis Of Diagnostic System For Alzheimer’s Disease
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.55-58, Dec-2018
Abstract
Alzheimer’s disease was the leading cause of death. There is no cure and no effective treatment for Alzheimer’s disease. The challenges will increase in intensity as demographic changes, particularly the aging of baby boomers, take hold. High prediction of Alzheimer’s, developed in therapy, and appropriate care modalities that likely observe significant investment. The Alzheimer’s disease Neuro Imaging Initiative (ADNI) is an ongoing, longitudinal study designed to develop clinical, imaging, genetic, and biochemical biomarkers for the early detection and tracking of Alzheimer’s disease (AD). The required accomplishments of ADNI have been as follows: the development of standardized methods for clinical tests, magnetic resonance imaging (MRI), positron emission tomography (PET), and cerebrospinal fluid (CSF).In the recent system, a large number of people are suffering from brain related diseases. Studying and finding the solutions for those diseases is the requirement of our need. Dementia is one such disease of the brain. This is most reason for the loss of cognitive functions such as reasoning, memory and other mental abilities which may be due to trauma or normal ageing. Alzheimer’s disease is one of the most dangerous mental disorders which accounts to 60-80% of mental disorders. Diagnosis of this disease at an early stage will help the patients to lead a quality life for the remaining tenure of their life. The focus of the work is to have a review on different neuro psychological tests, the various algorithms used for the purpose of diagnosis, and the tool that may be used for the analysis.
Key-Words / Index Term
Alzheimer’s disease, Diagnosis, MCI
References
[1] Hardy J. “Alzheimer’s disease: the amyloid cascade hypothesis: anupdate and reappraisal”, J Alzheimers Dis;3:151–3, 2006.
[2] Mueller SG, Weiner MW, Thal LJ, Petersen RC, Jack C, Jagust W,et al. “The Alzheimer’s disease neuroimaging initiative”. Neuroimag-ing Clin N Am;15:869–77. xi–xii, 2005.
[3] Weiner MW, Aisen PS, Jack CR Jr, Jagust WJ, Trojanowski JQ,Shaw L, et al. “The Alzheimer’s Disease Neuroimaging Initiative:progress report and future plans”. Alzheimers Dement 2010;6.202.e7–11.e7.
[4] Frisoni GB, Weiner MW. “Alzheimer’s disease neuroimaging initiative special issue”. Neurobiol Aging 2010;31:1259–62.
[5] Petersen RC, Roberts RO, Knopman DS, Boeve BF, Geda YE,Ivnik RJ, et al. “Mild cognitive impairment: ten years later”. Arch Neurol 2009;66:1447–55.
[6] Saykin AJ, Shen L, Foroud TM, Potkin SG, Swaminathan S, Kim S,et al. “Alzheimer’s DiseaseNeuroimaging Initiative biomarkers asquantitative phenotypes: genetics core aims, progress, and plans”. Alzheimers Dement 2010;6(3):265–73.
[7] Hampel H, Shen Y, Walsh DM, Aisen P, Shaw LM, Zetterberg H,et al. “Biological markers of amyloid beta-related mechanisms in Alzheimer’s disease”. Exp Neurol 2010;223:334–46.
[8] Clark CM, Davatzikos C, Borthakur A, Newberg A, Leight S,Lee VM, et al. “Biomarkers for early detection of Alzheimer pathology”. Neurosignals 2008;16:11–8.
[9] Fleisher AS, Donohue M, Chen K, Brewer JB, Aisen PS. “Applications of neuroimaging to disease modification trials in Alzheimer’sdisease”. Behav Neurol 2009;21:129–36.
[10] Shaw LM, Korecka M, Clark CM, Lee VM, Trojanowski JQ. “Biomarkers of neurodegeneration for diagnosis and monitoring therapeutics”. Nat Rev Drug Discov 2007;6:295–303.
[11] Petersen RC, Jack CR Jr. “Imaging and biomarkers in early Alzheimer’s disease and mild cognitive impairment”. Clin PharmacolTher 2009;86:438–41.
[12] Trojanowski JQ, Vandeerstichele H, Korecka M, Clark CM,Aisen PS, Petersen RC, et al. “Update on the biomarker core of theAlzheimer’s Disease Neuroimaging Initiative subjects”. AlzheimersDement 2010;6:230–8.
[13] Hardy J, Selkoe DJ. “The amyloid hypothesis of Alzheimer’s disease:progress and problems on the road to therapeutics”. Science 2002;297:353–6.
[14] Jack CR Jr, Knopman DS, Jagust WJ, Shaw LM, Aisen PS,Weiner MW, et al. “Hypothetical model of dynamic biomarkersof the Alzheimer’s pathological cascade”. Lancet Neurol 2010;9:119–28.
[15] Shaw LM. “PENN biomarker core of the Alzheimer’s disease Neuroimaging Initiative”. Neurosignals 2008;16:19–23
[16] Jack CR Jr, Lowe VJ, Weigand SD, Wiste HJ, Senjem ML,Knopman DS, et al. “Serial PIB and MRI in normal, mild cognitiveimpairment and Alzheimer’s disease: implications for sequenceof pathological events in Alzheimer’s disease”. Brain 2009;132:1355–65.
[17] Braak H, Del Tredici K. “The pathological process underlying Alzheimer’s disease in individuals under thirty”. Acta Neuropathol, 2011;121:171–81.
[18] Dubois B, Feldman HH, Jacova C, Cummings JL, Dekosky ST, Barberger-Gateau P, et al. “Revising the definition of Alzheimer’s disease:a new lexicon”. Lancet Neurol, 2010;9:1118–27.
[19] Sperling RA, Aisen PS, Beckett LA, Bennett DA, Craft S, Fagan AM,et al. “Toward defining the preclinical stages of Alzheimer’s disease:recommendations from the National Institute on Aging-Alzheimer’sAssociation workgroups on diagnostic guidelines for Alzheimer’sdisease”. Alzheimers Dement 2011;7:280–92.
[20] Roberts RO, Geda YE, Knopman DS, Cha RH, Pankratz VS,Boeve BF, et al. “The Mayo Clinic Study of Aging: design and sampling, participation, baseline measures and sample characteristics”. Neuroepidemiology, 2008;30:58–69.
[21] Petersen RC, Roberts RO, Knopman DS, Geda YE, Cha RH,Pankratz VS, et al. “Prevalence of mild cognitive impairment ishigher in men. The Mayo Clinic Study of Aging”. Neurology 2010;75:889–97.
[22] Games D, Adams D, Alessandrini R, Barbour R, Berthelette P,Blackwell C, et al. “Alzheimer-type neuropathology in transgenicmice overexpressing V717F beta-amyloid precursor protein”. Nature, 1995;373:523–7.
[23] Frank RA, Galasko D, Hampel H, Hardy J, de Leon MJ, Mehta PD,et al. “Biological markers for therapeutic trials in Alzheimer’s disease.Proceedings of the biological markers working group; NIA initiativeon neuroimaging in Alzheimer’s disease”. Neurobiol Aging 2003;24:521–36.
[24] Trojanowski J. “Searching for the biomarkers of Alzheimer’s”. PractNeurol;3:30–4, 2004.
[25] Mueller SG, Weiner MW, Thal LJ, Petersen RC, Jack C, Jagust W, et al. “Ways toward an early diagnosis in Alzheimer’s disease: the Alzheimer’s Disease Neuroimaging Initiative”. Cogn Dement;5:56–62, 2006.
[26] Hampel H, Burger K, Teipel SJ, Bokde AL, Zetterberg H,Blennow K. “Core candidate neurochemical and imaging biomarkersof Alzheimer’s disease”. Alzheimers Dement;4:38–48, 2008.
[27] Klunk WE, Engler H, Nordberg A, Wang Y, Blomqvist G, Holt DP,et al. “Imaging brain amyloid in Alzheimer’s disease with PittsburghCompound-B”. Ann Neurol;55:306–19, 2004.
[28] Klunk WE, Mathis CA. “The future of amyloid-beta imaging: a tale ofradionuclides and tracer proliferation”. Curr Opin Neurol;21:683–7, 2008.
[29] Kung MP, Hou C, Zhuang ZP, Skovronsky D, Kung HF. “Binding of two potential imaging agents targeting amyloid plaques in postmortem brain tissues of patients with Alzheimer’s disease”. Brain Res;1025:98–105, 2004.
[30] Schmidt ME, Siemers E, Snyder PJ, Potter WZ, Cole P, Soares H. “The Alzheimer’s Disease Neuroimaging Initiative: perspectives of the Industry Scientific Advisory Board”. Alzheimers Dement;6:286–90, 2010.
[31] Carrillo MC, Sanders CA, Katz RG. “Maximizing the Alzheimer’s Disease Neuroimaging Initiative II”. Alzheimers Dement;5:271–5, 2009.
[32] Toga AW, Crawford KL. “The informatics core of the Alzheimer’s Disease Neuroimaging Initiative”. Alzheimers Dement;6:247–56, 2010.
[33] Jack CR Jr, Bernstein MA, Borowski BJ, Gunter JL, Fox NC, Thompson PM, et al. “Update on the magnetic resonance imagingcore of the Alzheimer’s disease neuroimaging initiative”. AlzheimersDement;6:212–20, 2010.
[34] Jagust WJ, Bandy D, Chen K, Foster NL, Landau SM, Mathis CA,et al. “The Alzheimer’s Disease Neuroimaging Initiative positronemission tomography core”. Alzheimers Dement;6:221–9, 2010.
[35] Aisen PS, Petersen RC, Donohue MC, Gamst A, Raman R,Thomas RG, et al. “Clinical core of the Alzheimer’s Disease Neuroimaging Initiative: progress and plans”. Alzheimers Dement;6:239–46, 2010.
[36] Cairns NJ, Taylor-Reinwald L, Morris JC. “Autopsy consent, braincollection, and standardized neuropathologic assessment of ADNIparticipants: the essential role of the neuropathology core”. Alzheimers Dement;6:274–9, 2010.
[37] Cummings JL. “Integrating ADNI results into Alzheimer’s diseasedrug development programs”. Neurobiol Aging;31:1481–92, 2010.
[38] Mueller SG, Weiner MW, Thal LJ, Petersen RC, Jack CR, Jagust W,et al. “Ways toward an early diagnosis in Alzheimer’s disease: the Alzheimer’s Disease Neuroimaging Initiative (ADNI)”. AlzheimersDement;1:55–66, 2005.
[39] Petersen RC, Trojanowski JQ. “Use of Alzheimer disease biomarkers:potentially yes for clinical trials but not yet for clinical practice”.JAMA;302:436–7, 2009.
Citation
A. Nancy, S. Vijaykumar, "Analysis Of Diagnostic System For Alzheimer’s Disease", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.55-58, 2018.
A Comparative Analysis and Classification of TCP Solutions for MANET
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.59-62, Dec-2018
Abstract
Mobile-Ad hoc networks are qualify by a lack of infrastructure, and by a random and quickly varying network topology; thus the need for a rich dynamic routing protocol that can adapt such an environment. In general, with the high mobility environment and high load network traffic, network performance perhaps took down causing packet loss or increase overhead. TCP optimization in mobile ad hoc networks MANETs is a challenging issue because of some unequaled characteristics of MANETs. Packet losses in MANETs are primarily due to congestion and frequent link losers but in case of wireless networks packet losses are accruing mainly due to congestion. Aims of this article is to Comparative analysis of transport layer perspective, it is very important to regard Transmission Control Protocol (TCP) as well for MANETs because of its broad application, and also demonstrates the several parameters comparison of Transmission Control Protocols solutions for Mobile ad-hoc wireless network
Key-Words / Index Term
MANET, TCP-F, TCP-ELFN, TCP-BuS, ATCP and Split-TCP
References
[1]. Masoud Alfragani Ali and Raghav yadav,”MATCP Modified-ATCP for Mobile Ad hoc Networks”,International Journal of Computer Applications, Vol(147), Iss(3), pp.10-14, 2016.
[2]. Molia,Hardik k and Rashmi Agrawal,”A comprehensive study of cross layer approaches for improving TCP performance in wireless networks”,2015 international conference on computing and communication technologies,2015.
[3]. Sakshi Bhatia, SanjeevRana, Rajneesh kumarGujral,”Security aware congestion control mechanism on SPLIT-TCP overmanet”, Inter. Journal of Sci and Research publications, Vol(4), Iss(2), pp.1-8, 2014.
[4]. Ranjeet V. Bidwe,”Different Transmission Control Protocol variants in wireless environment”, Inter Journal on Recent and Innovation trends computing and communications, Vol(3), Iss(8), pp.5409-5416, 2015.
Citation
A.Thilaka, V. Uma Devi, "A Comparative Analysis and Classification of TCP Solutions for MANET", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.59-62, 2018.
An Image Mining Technique Using Support Vector Machine Based Retinal Image Classification
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.63-69, Dec-2018
Abstract
The attention is routinely mentioned to furnish a window into the health of a person for it`s only in the e Diabetic retinopathy (DR) is a significant eye disease originating from diabetes mellitus ye that one can surely see the exposed flesh of the subject without utilizing invasive tactics. There are quantities of diseases, primarily vascular disorder that depart telltale markers within the retina. Micro aneurysms (MAs) are early signs of DR, so the detection of these lesions is predominant in an efficient screening application to satisfy medical protocols. Retinal photos provide enormous knowledge on pathological alterations brought on via regional ocular disorder which exhibits diabetes, hypertension, arteriosclerosis, cardiovascular disease and stroke. Computer-aided evaluation of retinal picture performs a significant position in diagnostic procedures. Nonetheless, computerized retinal segmentation is problematic by means of the fact that retinal photographs are by and large noisy, poorly contrasted, and the vessel widths can fluctuate from very giant to very small. This paper grants photo processing systems similar to darkish object detection to analyze the situation or increase the enter photograph so as to make it suitable for further processing and beef up the visibility of vessels in color fungus portraits. Then we are able to put in force okay-way clustering algorithm to segment the vessels and automate classification procedure headquartered on support vector computing device to provide regional know-how about arteries and veins. And finally predict cardio vascular diseases and other ailments utilizing CRAE and CRVE measurements.
Key-Words / Index Term
Image processing, Eye components, Disease diagnosis, Cardio vascular diseases, Classification, Support Vector machine
References
[1] Abdallah, Mariem Ben, et al. "Automatic extraction of blood vessels in the retinal vascular tree using multiscalemedialness." Journal of Biomedical Imaging 2015 (2015): 1.
[2] Kaur, Manvir, and Rajneesh Talwar. "Automatic Extraction of Blood Vessel and Eye Retinopathy Detection." European Journal of Advances in Engineering and Technology 2.4 (2015): 57-61.
[3] Wang, Shuangling, et al. "Hierarchical retinal blood vessel segmentation based on feature and ensemble learning." Neurocomputing 149 (2015): 708-717.
[4]Vidyashree, M. R., M. V. Usha, and vtuewit."Locating the optic nerve and blood vessel in a retinal images using graph partition method." (2015).
[5] Annunziata, Roberto, et al. "Leveraging multiscale hessian-based enhancement with a novel exudate inpainting technique for retinal vessel segmentation." IEEE journal of biomedical and health informatics 20.4 (2016): 1129-1138.
[6] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: A simple way to prevent neural networks from overfitting,” The Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929–1958, 2014.
[7] Y. Bengio, P. Lamblin, D. Popovici, H. Larochelle et al., “Greedy layer-wise training of deep networks,” Advances in neural information processing systems, vol. 19, p. 153, 2007.
[8] M. Fraz, P. Remagnino, A. Hoppe, B. Uyyanonvara, A. Rudnicka, C. Owen, and S. Barman, “Blood vessel segmentation methodologies in retinal images - a survey,” Comput. Methods Prog.Biomed. vol. 108, no. 1, pp. 407–433, Oct. 2012. [Online]. Available: http://dx.doi.org/10.1016/j.cmpb.2012.03.009
[9] J. Staal, M. D. Abràmoff, M. Niemeijer, M. A. Viergever, and B. van Ginneken, “Ridge-based vessel segmentation in color images of the retina,” Medical Imaging, IEEE Transactions on, vol. 23, no. 4, pp. 501–509, 2004.
[10] A. Hoover, V. Kouznetsova, and M. Goldbaum, “Locating blood vessels in retinal images by piecewise threshold probing of a matched filter response,” Medical Imaging, IEEE Transactions on, vol. 19, no. 3, pp. 203–210, 2000.
Citation
M. Arulkothaipriya, "An Image Mining Technique Using Support Vector Machine Based Retinal Image Classification", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.63-69, 2018.
ADSSCCE: Analysis of Data Storage Security in Cloud Computing Environment
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.70-75, Dec-2018
Abstract
Cloud computing contextual is a computing model for dealing and accessing services over the internet. It delivers variety of services to the recipient for on-demand. The very important service of the cloud environment is data storage. The data storage in the internet is varying day by day and the data size also varying based on the users need. The end users required the best security mechanism’s. The motivation of this research is to encrypt and decrypt data efficiently and effectively protect the stored data. All over the world the data center is placed in many different locations to maintain and monitor the user data. It is more reliable storage but it has many securities related problems and different kinds issues. The problem is how to secure the data in cloud storage, to protect the data from unauthorized user’s access, data is supposed to either encrypted format or unreadable form. This paper analysis the various cloud data storage security algorithms.
Key-Words / Index Term
Component, Formatting, Style, Styling, Insert (key words)
References
[1] Shakeeba S. Khan, Prof.R.R. Tuteja,” Security in Cloud Computing using Cryptographic Algorithms”, International Journal of Innovative Research in Computer and Communication Engineering , Vol. 3, Issue 1, January 2015.
[2] Sheren A. El-Booz, Gamal Attiya and Nawal El-Fishawy, “A secure cloud storage system combining time-based one-time password and automatic blocker protocol”, El-Booz et al. EURASIP Journal on Information Security ,2016.
[3] Fortine Mata, Michael Kimwele, George Okeyo, “Enhanced Secure Data Storage in Cloud Computing Using Hybrid Cryptographic Techniques (AES and Blowfish)” , International Journal of Science and Research, Volume 6 Issue 3, March 2017.
[4] S. Balamurugan, Dr. S. Sathyanarayana, Enhanced Security as a Service to Protect Data in Public Cloud Storage”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 4, April 2016.
[5] Adamu Ismail Abdulkarim, Boukari Souley, “An Enhanced Cloud Based Security System Using RSA as Digital Signature and Image Steganography” International Journal of Scientific & Engineering Research Volume 8, Issue 7, July-2017.
[6] A.M. Vengadapurvaja, G. Nisha, R. Aarthy, N. Sasikaladevi, “An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security”, Science direct- 7th International Conference on Advances in Computing & Communications, Cochin, India , August 2017.
[7] Dr. L. Arockiam, S. Monikandan, “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013
[8] Sawase Akanksha and B.M.Patil, “A Secure Multiowner Dynamic Groups Data Sharing In Cloud”, International Journal of Advances in Engineering & Technology, Feb., 2016.
[9] Anshu Chaturvedi, D.N.Goswami, Rakesh Prasad Sarang, “Privacy Algorithms to Improve the Secure Framework for Cloud Computing Environment” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 6, Issue 4, April 2017.
[10] Dr. R. Sugumar, K. Arul Marie Joycee,”DSCESEA: Data Security in Cloud using Enhanced Symmetric Encryption Algorithm” International Journal of Engineering Research & Technology, Vol. 6 Issue 10, October – 2017.
[11] Dr. R. Sugumar, K. Arul Marie Joycee ,“Ensure and Secure Data Confidentiality in Cloud Computing Environment using Data Obfuscation Technique”, International Journal Of Advanced Studies In Computer Science And Engineering, Volume 6, Issue 12, 2017.
Citation
Ramalingam Sugumar, K. Arul Marie Joycee, "ADSSCCE: Analysis of Data Storage Security in Cloud Computing Environment", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.70-75, 2018.
An Exhaustive Review of the Privacy Preservation and Security Mechanisms in Big Data Life Cycle
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.76-83, Dec-2018
Abstract
As there is an exponential growth of data in every field of life, the assessment and extraction of data from the massive data sets has derived as a dreadful challenge in this golden era of big data. Conventional security methods cannot be adapted to big data due to its massive volume, and range. Undoubtedly, mining fruitful information from this massive data has been a universal interest for the organizations having large dataset. Big data life cycle includes three phases such as data generation, data storage, and data processing. In big data process, distributed systems are adapted since it needs large storage and high computational power. As many parties are engaged in these systems, the possibility of the violation in security concerns increases. In addition, since big data contains individual’s personal information, privacy is the foremost security concern. The main objective of this paper is to present an exhaustive overview of the privacy preservation mechanisms in big data life cycle. The modern privacy-preserving methods such as the generalization are capable of effectively managing the privacy assaults on a sole data set, whereas the protection of privacy for multiple data sets continues to be hard. Therefore, with intention of conserving the secrecy of multiple data sets, it is desirable to initially anonymize whole data sets and thereafter encrypt them before amassing or exchanging them in cloud. The challenges in existing mechanisms and eventual research discussions relevant to privacy preservation in big data are mentioned. The security techniques to protect the data set from being accessed by illegal users are also discussed.
Key-Words / Index Term
Big Data, Conventional, Data Privacy, Mining, Security
References
[1] NasrinIrshadHussain, BharadwajChoudhury, SandipRakshit, ―A Novel Method for Preserving Privacy in Big-Data Mining, International Journal of Computer Applications (0975 – 8887), Vol. 103, No. 16, pp. 22-25, October 2014.
[2] J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, and A. Byers, “Big data: The next frontier for innovation, competition, and productivity,” Mickensy Global Institute , pp. 1–137, Jun. 2011.
[3] B. Matturdi, X. Zhou, S, Li, and F. Lin, “Big data security and privacy: A review,” China
Communications, vol. 11, no. 14, pp. 135–145, Apr. 2014.
[4] P.Samarati, “Protecting respondent`s privacy in micro data release,” In IEEE Transaction on knowledge and Data Engineering, pp.010-027, 2001
[5] L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, “Information security in big data: Privacy and data mining,” in IEEE Access, vol. 2, pp. 1149–1176, Oct. 2014.
[6] Chen, M.; Mao, S.; Liu, Y. Big data: A survey. Mob. Netw. Appl, Vol.19, pp. 171–209, 2014.
[7] Wenliang Du and Zhijun Zhan, “Using Randomized Response Tech-niques for Privacy-Preserving Data
Mining,” SIGKDD ’03, August 24-27, 2003, Washington, DC, USA.
[8] ArisGkoulalas-Divanis, &GrigoriosLoukides, “Revisiting Sequential Pattern Hiding to Enhance Utility”,
ACM, August 2011.
[9] Yehuda Lindell, Benny Pinkas, ―Secure Multiparty Computation for Privacy-Preserving Data Mining, The Journal of Privacy and Confiden-tiality, Vol. 1, no. 1,, pp. 1-39, 2009.
[10] B. Pinkas, ―Cryptographic techniques for privacy-preserving data mining, SIGKDD Explore, Vol. 4, no. 2, pp. 12-19, 2002.
[11] Pingshui WANG, Survey on Privacy Preserving Data Mining, International Journal of Digital Content
[12] 20 essential Hadoop tools for crunching Big Data [Online] availa-ble:http://bigdata-madesimple.com/20-essential-hadoop-tools-for-crunching-big-data/
[13] Akhil Mittal, “Trustworthiness of Big Data,” International Journal of Computer Applications (0975 –
8887), Vol. 80, no.9, October, 2013.
[14] Boris Glavic,“Big Data Provenance: Challenges and Implications for Benchmarking”, Specifying Big Data
Benchmarks,Vol. 8163, Springer Berlin Heidelberg, 2014.
[15] MogreNeha V., &PatilSulbha,“Slicing: An Approach for Privacy Preservation in High-Dimensional Data Using Anonymization Technique,”IRAJ International Conference, Pune 2013
[16] K.Anbazhagan, Dr.R.Sugumar, M.Mahendran, R.Natarajan, “An Efficient Approach for Statistical Anonymization Techniques for Privacy Preserving Data Mining,”International Journal of Advanced Re-search in Computer and Communication Engineering, Vol. 1, no. 7, pp. 482-485, September 2012.
[17] Y.H.Wu. C.Chiang and A.L.P.Chen. “Hiding Sensitive Association Rules with Limited Side Effects”,
IEEE Transaction on Knowledge and Data Engineering, Vol.19, no.1, pp 29-42, 2007
[18] GarimaSehgal, Dr. KanwalGarg “Comparison of Various Clustering Algorithms” (IJCSIT) International
Journal of Computer Science and Information Technologies, Vol. 5, no. 3, pp. 3074-3076, 2014.
[19] M.-Y. Lin, P.-Y. Lee, and S.-C. “Hsueh. Apriori-based frequent itemset mining algorithms on
MapReduce,”In Proc. ICUIMC, pages 26–30.ACM, 2012.
[20] Singh, Pravesh Kumar, and MohdShahid Husain. "Books Reviews using Naıve Bayes and Clustering lassifier." Second International Conference on Emerging Research in Computing, Information, Communication and Applications “ (ERCICA-2014), pp. 886-891, 2014.
[21] J. Domingo-Ferrer, D. Sanchez, and J. Soria-Comas. “Database anonymization: privacy models, data tility, and microaggregation- based inter-model connections,”. Morgan & Claypool, 2016
[22] L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, pp. 557–570, 2002.
[23] Khaled El Emam,&Fida Kamal Dankar, Protecting Privacy Using k-Anonymity, J Am Med Inform Assoc. Vol. 15, no. 5, pp. 627–637, 2008.
[24] N. Li, T. Li, S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, " IEEE 23rd International Conference on Data Engineering, 2007, pp. 106 - 115.
[25] Meraj Fatima , Dr. T.K.ShaikShavali , G. Kumar, “Strict Privacy with Enhanced Utility Preservation by T-Closeness Through Microaggregation,”Interrnational Journal of Advanced Technology and Innovative Research, Vol.08, no.15, pp. 3026-3035, October-2016.
[26] F. H. Cate, V. M. Schönberger, "Notice and Consent in a World of Big Data," Microsoft Global Privacy Summit Summary Report and Outcomes, Nov 2012.
[27] [27]Friedman A, Schuster A. Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, Washington, DC, USA, pp.25–28, July 2010.
Citation
Manjula GS, T. Meyyappan, "An Exhaustive Review of the Privacy Preservation and Security Mechanisms in Big Data Life Cycle", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.76-83, 2018.
Performance Analysis of Diabetes Disease using Classification Algorithms by WEKA
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.84-88, Dec-2018
Abstract
In Medical industry there are many diseases that makes a patient critical among them diabetes is one of the major disease that affect most of the people in early stage. Diabetes (or Diabetes Mellitus) is a group of metabolic diseases, chronic, in which there are high blood sugar levels and affects the body’s ability to use the energy found in food over a prolonged period. Researchers are finding effective methods for the prediction of diabetes. The main goal is to analysis the performance of various data mining techniques in the diabetes dataset for efficient extraction of valuable patterns. For doing so WEKA software was used as a mining tool for diagnosing the useful pattern. The Pima Indian diabetes dataset are used for the analysis. The dataset was applied in various classification algorithms to analysis the performance to identify an effective model that predict diabetes disease. In this, the analysis is done by applying attribute evaluator to enhance the accuracy then applying Naive Bayes, Bayes Net, J48 and Random Forest and the performance are compared. Through this study, Naive Bayes Algorithm provides better classification accuracy, when compared with classification algorithms like Bayes Net, J48 and Random Forest.
Key-Words / Index Term
Diabetes, Health care, Naive Bayes, Bayes Net, J48 and Random Forest, WEKA
References
[1] Asma A Aljarullah. Decision tree discovery for the diagnosis type-2 diabetes. International conference on innovation in information technology. 2011; p. 303-7.
[2] Aiswarya Iyer, Jeyalatha S and Sumbaly Ronak. Diagnosis of diabetes using classification mining techniques. International Journal of Data Mining & Knowledge Management Process. 2015; 5:1-14. 2.
[3] “Bayes Net”, Wikipedia, Aug 2018.
[4] ChaitraliDangare, S. and SulabaApte,S.Improved study of disease prediction using data mining classification techmiques. Int.J.Comp.Appl., 2012,47(10):75-88.
[5] Global Diabetes Community, http://www.diabetes.co.uk/diabetes_care/blood-sugar-level-ranges.html
[6] Ianchao Han J, Juan C Rodriguze, Beheshti Mohsen. Diabetes Data Analysis and Prediction model discovery. Second International conference on future generation com- munication and networking. 2011; p. 96-9. 13.
[7] “J48”, Wikipedia, March 2018.
[8] K. Saravananathan and T. Velmurugan “Analyzing Diabetic Data using Classification Algorithms in Data Mining” Indian Journal ofScience and Technology, Vol 9 (43) | November 2016 | www.indjst.org
[9] Maniya Hardik, Mosin I Hasan, Komal P Patel. Comparative study of Naive Bayes Classifier and kNN for Tuberculosis. International Journal of Computer Applications. 2011; p. 22-6.
[10] “Naïve Bayes”, Wikipedia, March 2018.
[11] P.Yasodha and M. Kannan, "Analysis of a Population of Diabetic Patients Databases in WekaTool", International Journal of Scientific & Engineering Research, vol. 2, no. 5, 2011.
[12] “Random Forest”, Wikipedia, March 2018.
[13] Sankaranarayanan.S and Dr Pramananda Perumal.T, “Predictive Approach for Diabetes Mellitus Disease through Data Mining Technologies”, World Congress on Computing and Communication Technologies, 2014, pp. 231-233
[14] Sonu Kumari and Archana Singh, “A Data Mining Approach for the Diagnosis of Diabetes Mellitus”, Proceedings of71hlnternational Conference on Intelligent Systems and Control (ISCO 2013)
[15] Stutz J., P. Cheeseman. (1996) Bayesian classification (autoclass): Theory and results. In Advances in Knowledge Discovery and Data Mining. AAAI/MIT Press
[16] Uswa Ali Zia, Dr. Naeem Khan “Predicting Diabetes in Medical Datasets Using Machine Learning Techniques” International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017, ISSN 2229-5518
[17] Velide Phani Kumar and Velide Lakshmi. A Data Mining Approach for Prediction and Treatment of diabetes Disease. International Journal of Science Inventions Today. 2014; 3:73-9.
Citation
G. Paul Davidson, D. Ravindran, "Performance Analysis of Diabetes Disease using Classification Algorithms by WEKA", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.84-88, 2018.
Clothes Protection from Rain Based on Internet of Things (IOT)
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.89-91, Dec-2018
Abstract
Now days it is difficult to predict the changes in season especially during rainy season. In rainy season it is very difficult to prevent the wet clothes from the rain. So there is need for human intervention to continuously monitor this. Keeping a person continuously watching for rain is too much stupidity as a waste of time. As the advancement in science technology is developing, the human comfort & needs are also increasing proportionally. Thus, it is important to take a small step towards the comfort ability and save our time. Thus, in this paper we have proposed a system which includes combination of sensor technology and Internet of Things (IoT). This proposed electro mechanical system(Arduino Uno, Sensor, Transistor and Diode) which continuously monitors the rain in rainy season and automatically takes back the clothes from rain to protect from wet and send fast information to user using GSM (Global System for Mobile) mobile device using SMS (Short Messaging System).
Key-Words / Index Term
Internet of Things (IoT), Arduino Uno, Rain Drop Sensor, BC547 Transistor, 1N4007 Diode, DC Motor, GSM
References
[1] Lu Tan, Neng Wang, “Future Internet: The Internet of Things”, 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010.
[2] https://en.wikipedia.org/wiki/Internet_ of_Things, Jun 25 (2016).
[3] S. Dharmadhikari, N. Tamboli, N. Gawali and N.N. Lokhande “Automatic Wiper System” in International Journal of Computer Technology and Electronics Engineering Vol. 4, No. 2, April 2014 pp.15-18.[4] Pearson, D.,: ‘Rain detector’, US Patent App. 12/963,728, Dec. 9 2010.
Citation
M. Hemalatha, "Clothes Protection from Rain Based on Internet of Things (IOT)", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.89-91, 2018.
Comparison on Two-Dimensional Ultrasound to Three-Dimensional Placenta Image using Segmentation Techniques
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.92-95, Dec-2018
Abstract
Ultrasound Placenta image are usually low in resolution which may lead to loss of characteristics features of the image. Discarded at birth, the placenta is a highly complex and fascinating organ. During the course of a pregnancy, it acts as the lungs, gut, kidneys, and liver of the fetus. Ultrasound is a diagnostic technique which has many purposes though it is typically used by a Gynecologist to check the fetus in the mother`s womb during pregnancy. Image Segmentation is very important in many medical reputation applications. This survey aims at providing an insight about different 2-Dimensional and 3-Dimensional Placenta image segmentation techniques and to help better understanding to the people who are new in this field. This comparative study summarizes the benefits and limitations of various segmentation techniques.
Key-Words / Index Term
Placenta Imaging; Image Segmentation; Image Processing; 2-Dimensional image segmentation; 3-Dimensional image segmentation
References
[1] Pinaki Pratim Acharjya and Dibyendu Ghoshal ” Segmentation of Medical Images Using Morphological Approach” International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013, ISSN 2229-5518.
[2] Ali Abdo Mohammed Al-Kubati, Jamil A. M. Saif, Murad A. A.Taher” Evaluation of Canny and Otsu Image Segmentation” International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE`2012) March 24-25, 2012 Dubai.
[3] Poonam Dhankhar1, Neha Sahu2” A Review and Research of Edge Detection Techniques for Image Segmentation” IJCSMC, Vol. 2, Issue. 7, July 2013, pg.86 – 92.
[4] G. Malathi and Dr. V. Shanthi, “Statistical Measurement of Ultrasound Placenta Images Complicated by Gestational Diabetes Mellitus Using Segmentation Approach”, Journal of Information Hiding and Multimedia Signal Processing, Volume 2, Number 4, October 2011.
[5] T. Hata, H. Tanaka, ”Three-dimensional ultrasound evaluation of the placenta”, Elesevier journal, November 2010. [5]Image Segmentation Techniques Rajeshwar Dass, priyanka, Swapna Devi IJECT Vol. 3, Issue 1, Jan. - March 2012.
[6] G. Malathi and Dr. V. Shanthi” Thickness based Characterization of Ultrasound Placenta Images using Regression Analysis”, International Journal of Computer Applications (0975 – 8887) Volume 3 – No.7, June 2010.
[7] “Histogram Based Classification of Ultrasound Images of Placenta”, G.Malathi, Dr.V.Shanthi, International Journal of Computer Applications, Feb 2010, Volume 1 – No. 16.
[8] “Wavelet Based Features For Ultrasound Placenta Images Classification”, G. Malathi, Dr.V.Shanthi, 2nd International Conference on Emerging Trends in Engineering and Technology, Nagpur, December 2009.
[9] Roy-Lacroix ME, Moretti F, Ferraro ZM, Brosseau L, Clancy J, Fung-Kee-Fung K.” A comparison of standard two-dimensional ultrasound to three-dimensional volume sonography for routine second-trimester fetal imaging.” J Perinatol. 2017 Apr;37(4):380-386. doi: 10.1038/jp.2016.212. Epub 2017 Jan 26
Citation
J. James Manoharan, "Comparison on Two-Dimensional Ultrasound to Three-Dimensional Placenta Image using Segmentation Techniques", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.92-95, 2018.
A Brief Study on Machine Learning
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.96-98, Dec-2018
Abstract
The technology is the knowledge of science put into practical use to solve some problems. The impact of technology in modern life is immeasurable. The most indispensable technology which is helpful in all aspects of life is the Machine Learning (ML). It is the most recent approach to digital transformation which has benefits as well as risks to mankind. It helps us to process with large data in minimum time. This paper includes the difference of Machine learning and Artificial Intelligence. It also provides the description about the machine learning, methods, process types, algorithms, various applications and challenges towards healthcare, business, fraud detection, social media and other internet activities.
Key-Words / Index Term
Machine Learning, Artificial Intelligence, algorithm, process
References
[1] Machine Learning and Deep Learning Methods for Cybersecurity, Yang Xin ; Lingshuang Kong ; Zhi Liu ; Yuling Chen ; Yanmiao Li ; Hongliang Zhu ; Mingcheng Gao, ISSN: 2169-3536, IEEE Access, 15 May 2018.
[2] A survey of machine learning algorithms for big data analytics, S. Athmaja, M. Hanumanthappa, Vasantha Kavitha, 2017 International Conference on Innovations in Information, Embedded and Communication Systems, IEEE.
[3] A Survey on Machine Learning: Concept, Algorithms and Applications Kajaree Das1 , Rabi Narayan Behera, ISSN : 2320-9798 on International Journal of Innovative Research in Computer and Communication Engineering.
[4] A Survey on Application of Machine Learning Techniques in Optical Networks, Francesco Musumeci, Member, IEEE, Cristina Rottondi, Member, IEEE, Avishek Nag, Member, IEEE, Irene Macaluso, Darko Zibar, Member, IEEE, Marco Ruffini, Senior Member, IEEE, and Massimo Tornatore, Senior Member, IEEE.
[5] Caligtan, P. C. Dykes, "Electronic health records and personal health records", Semin Oncol Nurs, vol. 27, pp. 218-228, 2011.
[6] A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View, Qiang Liu ; Pan Li ; Wentao Zhao ; Wei Cai ; Shui Yu ; Victor C. M. Leung, IEEE, 13 February 2018.
[7] L. Zhou, S. Pan, J. Wang, A. V. Vasilakos, "Machine learning on big data: Opportunities and challenges", Neurocomputing, vol. 237, pp. 350-361, May 2017.
[8] Cour, T. and Sapp, B. and Taskar, B. Learning from partial labels, Journal of Machine Learning Research, Volume 12, 1501-1536 2012
[9] Alex Smola and S.V.N. Vishwanathan, Introduction To Machine Learning, Cambridge University Press 2008.
[10] Mohssen Mohammed Muhammad Badruddin Khan Eihab Bashier Mohammed Bashier, Machine Learning Algorithms and Applications, 2017 by Taylor & Francis Group, LLC.
Citation
S.Jenila, D. Ananthi, "A Brief Study on Machine Learning", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.96-98, 2018.
Fuzzy Based Cluster Gateway Election Protocol for Ad hoc Networks
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.99-102, Dec-2018
Abstract
The wireless network places very keen role on today’s network. This network has tremendous potentiality to work towards the users present day aspiration in communication. The efficiency of this network has been improved further with the help clustering the network. These clusters need to communicate through gateways. In this paper a novel gateway identification procedure based on Fuzzy logic has been proposed. In order to substantiate this study the work also covered the experimental results with the help of C++ as a programming language.
Key-Words / Index Term
Fuzzy logic,AODV,gateway
References
[1] S.Thirumurugan, “Direct sequenced C-IAODV Routing Protocol”, International Journal of computer science and technology,vol.1,issue.2, Dec 2010,pp.108-113.
[2] S.Thirumurugan,“C-AODV: Routing Protocol for Tunnel’s Network”, International Journal of computer science and technology,vol.2,issue.1, Mar2011,pp.113-116.
[3] S.Thirumurugan, “ PAC - A Novel approach For Clustering Mechanism in Adhoc Network” , ICSCCN’11,pp 593-598.
[4] S.Thirumurugan, “Analysis of Clustering Techniques in ad hoc network”,
[5] Jieming Wu, WenhuYu.“Optimization and improvement based on K-Means Cluster algorithm”, Second International Symposium on Knowledge Acquisition and Modeling,2009,pp.335-339.
[6] G.S.Malkin and M.E. Steenstrup, “Distance-Vector Routing,” In Routing in Communications Networks, edited by M.E. Steenstrup, Prentice Hall, 1995, pp. 83-98
[7] C.Perkin and P.Bhagwat. Routing over Multihop Wireless Network of Mobile computers.SIGCOMM’94 : Computer communications Review, 24(4):234-244,Oct 1994.
[8] David B. Johnson and David A. Maltz, “Dynamic Source Routingin Ad Hoc Wireless Networks”, In Mobile Computing, dited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, 1996.
[9] D. Johnson, Y. Hu, D. Maltz, “The Dynamic Source Routing Protocol (DSR) for Mobile Ad- hoc Networks for IPv4”. RFC 4728. February, 2007.
[10] Charles E_ Perkins, Sun Microsystems Laboratories, Elizabeth M_ Royer Dept of Electrical and Computer Engineering. “Ad hoc On Demand Distance Vector Routing”,Proceedings of the 2nd IEEE Workshop on Mobile Computing .Systems and Applications, New Orleans, LA, February 1999, pp. 90-100.
Citation
M. Ramesh Kannan, S. Thirumurugan, "Fuzzy Based Cluster Gateway Election Protocol for Ad hoc Networks", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.99-102, 2018.