Speaker Recognition System Using Deep Learning with Convolutional Neural Network
Research Paper | Journal Paper
Vol.8 , Issue.10 , pp.60-64, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.6064
Abstract
The task of identifying humans by their voice seems to be an easy task for human beings as people interact with a particular person, their mind is upskilled with that voice and the brain becomes proficient enough to easily recognize that particular voice next time. Using this human mind concept, the structure is designed and implemented. In the proposed system Convolutional Neural Network (CNN) has been used. 110 voice samples from 11 different participants/speakers have been collected. These voice signals were converted into the form of an image of the signal spectrogram. 90% of data were used for training and the remaining 10% was used for testing. Implementation was done in RStudio with R programming language. The system achieved 82% accuracy. The proposed system is facile and lucrative.
Key-Words / Index Term
Convolutional neural network, speaker recognition, Keras, voice signal spectrogram, tuneR
References
[1]. Rajsekhar G., “Real-Time Speaker Recognition using MFCC and VQ”, Ph.D. Thesis, Department of Electronics & Communication Engineering, National Institute of Technology Rourkela, pp. 9-71, 2008.
[2]. S. Furui, “An Overview of Speaker Recognition Technology”, ESCA Workshop on Automatic Speaker Recognition, Identification and Verification, Martigny, Switzerland, pp. 1-9, April 1994.
[3]. Hemant A. and T. K. Basu, “Advances in Speaker Recognition: A Feature-Based Approach,” Int. Conf. Artificial Intelligence and Pattern Recognition, AIPR’07, Orlando, Florida, USA, July 9-12, pp. 528-537, 2007.
[4]. Waghmare, et. al., “Emotion Recognition System from Artificial Marathi Speech using MFCC and LDA Techniques” 2014.
[5]. P. L. De Leon, et. al., "Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech," in IEEE Transactions on Audio, Speech, and Language Processing, vol. 20, no. 8, pp. 2280-2290, Oct. 2012.
[6]. Kim, et. al., “Dysarthric speech database for universal access research”. Proceedings of the Annual Conference of the International Speech Communication Association, INTERSPEECH. 1741-1744. 2008.
[7]. Shrishirmal, et. al., “Development of Marathi Language Speech Database from Marathwada Region” 2015.
[8]. P. J. Castellano, et. al., "Telephone-based speaker recognition using multiple binary classifiers and Gaussian mixture models," IEEE International Conference on Acoustics, Speech, and Signal Processing, Munich, 1997, pp. 1075-1078 vol.2. 1997.
[9]. G. Doddington, “Speaker Recognition – Identifying People by their Voice”, Proceedings of IEEE, vol.73, 1651-1664, Nov. 1985.
[10]. Yeldener, S. & Rieser, J.H., “A background noise reduction technique based on sinusoidal speech coding systems. Acoustics, Speech, and Signal Processing”, International Conference on. 3. 1391 - 1394 vol.3. 10.1109/ICASSP.2000.861840.
[11]. Ch. Srinivasa Kumar, P. M. Rao., “Design Of An Automatic Speaker Recognition System Using MFCC, Vector Quantization And LBG Algorithm”, International Journal of Computer Sciences and Engineering, Vol. 3, No. 8, pp.2942-2954, 2011.
[12]. Parmar Dharmistha R, “a survey on speaker recognition with various feature extraction techniques, “International Journal of Computer Sciences and Engineering, Vol. 7, Issue. 8, pp.884-887, 2019.
Citation
Sandeep Kumar, Samridhi Dev, "Speaker Recognition System Using Deep Learning with Convolutional Neural Network," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.60-64, 2020.
A Mechanism for Mobile Data Offloading to Wireless Mesh Networks
Research Paper | Journal Paper
Vol.8 , Issue.10 , pp.65-70, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.6570
Abstract
Wireless communications at its core is all about convenience – making it easy to apply a wide variety of network typologies quickly, easily, and cost-effectively. We often think of wireless in terms of a mobile device talking to a base station or access point – the point-to-multipoint topology, plus handoff between cells. And, normally, the interconnections between those cells use wire or perhaps a different form of point-to-point wireless. Suppose instead that the required interconnect was implemented as a form of relay, with one cell simply redirecting traffic wirelessly to the next, making it possible to implement almost any configuration; that’s the domain of the wireless mesh. In this research a mechanism on mobile data offloading using wireless mesh networks is performed. In which one source node is connected with a sink node or we can say base station for communication. When there is a traffic in between the communication then the source node can change their base station or sink node. This mechanism is shown in further results.
Key-Words / Index Term
Mobile data offloading, HetNets, Queuing Theory, Incentive Schemes, Request Routing
References
[1] Apostolaras, A., Iosifidis, G., Chounos, K., Korakis, T. and Tassiulas, L., 2014, December. C2M: Mobile data offloading to mesh networks. In 2014 IEEE Global Communications Conference (pp. 4877-4883). IEEE.
[2] Ajith, A. and Venkatesh, T.G. Mobile Data Offloading for Streaming-Class Traffic with QoS Guarantee. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 7(4), pp.26-42, 2015.
[3] Andrews, J.G., Singh, S., Ye, Q., Lin, X. and Dhillon, H.S. An overview of load balancing in HetNets: Old myths and open problems. IEEE Wireless Communications, 21(2), pp.18-25, 2014.
[4] Chen, Y., Zhang, J., Zhang, Q. and Jia, J. A reverse auction framework for access permission transaction to promote hybrid access in femtocell network. In INFOCOM, 2012 Proceedings IEEE, pp. 2761-2765, March 2012, IEEE.
[5] Iosifidis, G., Gao, L., Huang, J. and Tassiulas, L., 2013, May. An iterative double auction for mobile data offloading. In Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), 2013 11th International Symposium on (pp. 154-161). IEEE.
[6] Arnold, O., Richter, F., Fettweis, G. and Blume, O. Power consumption modeling of different base station types in heterogeneous cellular networks. In 2010 Future Network & Mobile Summit, pp. 1-8, 2010 June. IEEE.
[7] Detti, A., Pisa, C., Salsano, S. and Blefari-Melazzi, N., Wireless Mesh Software Defined Networks (wmSDN). In WiMob, pp. 89-95, October 2013.
[8] Benyamina, D., Hafid, A. and Gendreau, M., Wireless mesh networks design—A survey. IEEE Communications surveys & tutorials, 14(2), pp.299-310, 2012.
[9] Benyamina, D., Hafid, A., Hallam, N., Gendreau, M. and Maureira, J.C., A hybrid nature-inspired optimizer for wireless mesh networks design.Computer Communications, 35(10), pp.1231-1246, 2012.
[10] Akyildiz, I.F. and Wang, X., 2005. A survey on wireless mesh networks.IEEE Communications magazine, 43(9), pp.S23-S30.
[11] Pathak, P.H. and Dutta, R., A survey of network design problems and joint design approaches in wireless mesh networks. IEEE Communications surveys & tutorials, 13(3), pp.396-428, 2011.
[12] Akyildiz, I.F., Wang, X. and Wang, W., Wireless mesh networks: a survey. Computer networks, 47(4), pp.445-487, 2005.
[13] Jun, J. and Sichitiu, M.L., MRP: Wireless mesh networks routing protocol. Computer Communications, 31(7), pp.1413-1435, 2008.
[14] Fdida, S., Friedman, T. and Parmentelat, T., 2010. OneLab: An open federated facility for experimentally driven future internet research. In New Network Architectures (pp. 141-152).Springer Berlin Heidelberg.
[15] Kazdaridis, G., Keranidis, S., Fiamegkos, A., Korakis, T., Koutsopoulos, I. and Tassiulas, L., Dynamic Frequency Selection through Collaborative Reporting in WLANs.
Citation
Shubham Pathania, Jatinder Singh Saini, "A Mechanism for Mobile Data Offloading to Wireless Mesh Networks," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.65-70, 2020.
Analysing COVID- 19 Cases by Eliminating False Negatives and False Positives through Machine Learning Approach
Research Paper | Journal Paper
Vol.8 , Issue.10 , pp.71-74, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.7174
Abstract
Novel coronavirus (COVID-19 or 2019-nCoV) pandemic which doesn’t have neither a clinically proven vaccine nor drugs. As the No. of Cases Increasing Day by Day, the public was panicking. In the process of increasing Number of Tests, Some Rapid tests are also Taking place. If you take these rapid tests into consideration, where we are getting false results like False Positives, True Positives which results in a panic among the people who have tested. Due to these false results, the public was in a panic situation. To avoid that panic among the public, we define machine learning approach to predict the COVID where it represents False Positive rate, and True Positive rate through ROC(Receiver Operating Characteristic) curve and, we also get a Confusion Matrix which visually represents True Negatives, False Positives, False Negatives and True positives and it also generates a new dataset from a given dataset, by eliminating them without sampling using clinical spectrum data of ‘SARS-Cov-2 exam result’.
Key-Words / Index Term
Logistic Regression, ROC (Receiver Operating Characteristic) Curves, Confusion Matrix
References
[1] Jay Furst-“False-negative COVID-19 test results may lead to a false sense of security”. Source: mayo clinic
[2] Steven Woloshin, M.D., Neeraj Patel, B.A., and Aaron S. Kesselheim, M.D., J.D., M.P.H.-“False Negative Tests for SARS-CoV-2 Infection — Challenges and Implications, Journal published on June 5, 2020, in The New England Journal of medicine”.
[3] John Wiley& sons “Machine Learning: Hands-on for Developers and Technical Professionals”
[4] Lin Jia Kewen Li?Yu Jiang Xin Guo Ting zhao, "Prediction and analysis of Coronavirus Disease", Populations and Evolution, 2020.
[5] Sanjib Halder “A Mathematical Model to Forecast & Compare Covid-19 Outbreak in Male & Female using Polynomial Regression Analysis”-IJCSE ,vol.8,issued on 5,May 2020.
[6] Saroj S. Date “Forecasting novel Covid-19 confirmed cases in India using Machine Learning Methods” –IJCSE, vol.8, issued on 6,June 2020.
Citation
M. Vennela, G. Lavanya Devi, P.R.S. Naidu, "Analysing COVID- 19 Cases by Eliminating False Negatives and False Positives through Machine Learning Approach," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.71-74, 2020.
Effective Parking Management System Based On Search and Occupy Algorithem Using Arduino UNO
Research Paper | Journal Paper
Vol.8 , Issue.10 , pp.75-79, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.7579
Abstract
This paper describes an approach to overcome a situation of monitoring and managing a parking area using arduino based effective parking management system. With the rapid increasing of cars the need to find available parking space in the most efficient manner, to avoid traffic congestion in a parking area become difficult. This paper aimed at develop a effective car parking management system that is more cost effective and user friendly existing system, confusion free and easy parking. The main purpose of effective parking system is to reduce time to locate the parking areas, hence it reduce fuel consumption. The system counts the number of cars in any parking places and checks if there’s any vacancy. The first phase aimed at making cars datable in the parking lot through the use of sensor used for searching the unoccupied parking facility. The discussed system will be able to reduce the problems which are arising due to unavailability of a reliable, efficient and modern parking system, while the economic analysis technique will help in analyzing the project feasibility.
Key-Words / Index Term
Arduino UNO, infrared sensor, LCD display, Servo motor, proteus professional
References
[1] Mr. Vedant Chikhale, Mr. Raviraj Gharat, Ms. Shamika Gogate, Mr. Roshan Amireddy, “Smart Car Parking Using Arduino Microcontroller ,” International Journal of New Technology and Research (IJNTR), Volume.3, Issue.6, June 2017 .
[2] Suvarna Nandyal, Sabiya Sultana , Sadaf Anjum, “Smart Car Parking System using Arduino UNO,” International Journal of Computer Applications, Volume.169,issue No.1, July 2017.
[3] Simple Batra, “IoT-Future Smart Systems,” International Journal of Computer Sciences and Engineering” Vol.6, Issue no.5, May 2018.
[4] V. Manideep Goud1, B. Srinivas Rao2, “Smart Car Parking System based on RFID,” International Journal of Computer Sciences and Engineering, Vol..7, Issue no.8, Aug 2019.
[5] Kusay F.Tabatabaie, Sadeer D. Abdulameer, “Applying Arduino For Controlling Car Parking System,” Journal of Applied Computer Science Methods, vol. 15, no. 2, July 2019.
[6] Himani Malik1, Gourav Nagpal, “Smart Parking Using Internet of Things”, International Educational Applied Research Journal, volume. 03, issue. 09, sep 2019.
[7] Mohammed Omar BA. Sabbea, Muhammed Irfan, Saeed Karama Altamimi, Saeed Mabkhot Saeed, A. H. M. Almawgani, Hisham Alghamdi,“Design and Development of a Smart Parking System,” journal of automation and control engineering vol. 6, issue no. 2, december 2018.
[8] Shruthi Mudaliar, Shreya Agali , Sujay Mudhol , Chaitanya K Jambotkar, “Iot Based Smart Car Parking System”,( IJSART),volume.05, issue .01,january 2019.
[9] J. Cynthia, C. Bharathi Priya, P. A. Gopinath , “iot Based Smart Parking Management System,” International Journal of Recent Technology And Engineering, (IJRTE), volume.7, issue.4, november 2018.
[10] Fei-Yue Wang, Liu-Qing Yang, Fellow, Jian Yang, “ Urban Intelligent Parking system based on Parallel Theory”, IEEE-ICNC, 2016.
[11] .Shubham Kumar, Deepak Rasaily , Mohit Mukhia, Aarfin Ashraf “Biometric Attendance System using Microcontroller” International Journal of Engineering Trends and Technology (IJETT) Volume. 32 ,issueNumber.06, pp. 306-308, February 2016.
[12] Shweta Chanda, Deepak Rasaily, Prerna Khulal “Design and Implementation of a Digital Code Lock using Arduino” International Journal of Engineering Trends and Technology (IJETT) Volume. 32 ,issue Number.05, pp. 213-215, February 2016.
[13] suman Poudyal, Rajena Pradhan, Deepak Rasaily, Sabina Sharma, Tenzing Sherpa, Mukesh Kumar Sharma, Abishek Pradhan “Wi-Fi Based Scrolling Digital Display With RTC using Arduino” 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)2019.
[14] Donald Rai, Nitesh Kumar, Deepak Rasaily, Pravin Gurung, Tenzing Wangmu Tamang, Chandan Chettri, Palman Kami, Ganden Bhutia “Arduino-GSM Interfaced Secure and Smart Cabin for Smart Office” 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT) 2019.
[15] Ashis Rai, Manjil Rai, Nisha Jogi, Bikash Rai, Shahil Rai, Deepak Rasaily “Low Cost Laser Light Security System in Smart Home” 2019 International Conference on Innovative Sustainable Computational Technologies (CISCT) Year: 2019.
[16] Yashal Dorzee Lepcha, Deepak Rasaily, Jigmee Sherpa “Design of Electronic Voting Machine using Microcontroller” International Journal of Engineering Trends and Technology (IJETT), Volume.32, Number.5,February 2016.
Citation
Robin Chettri, Deepak Rasaily, Shyam Chhinal, Bikash Rai, Gulsan Sharma, Greacy Lepcha, "Effective Parking Management System Based On Search and Occupy Algorithem Using Arduino UNO," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.75-79, 2020.
80386: A Beginning of 32-bit Microprocessor by Intel
Research Paper | Journal Paper
Vol.8 , Issue.10 , pp.80-82, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.8082
Abstract
We do have a general idea about the history of microprocessors. The microprocessor has evolved over the years; from the; ‘first single-chip’ microprocessor introduced by Intel-the INTEL 4004, that was a 4-bit microprocessor to the recent 64-bit microprocessors. History has it; Intel has been a leader in technology innovation. Intel has given some of the biggest contributions to the evolution of microprocessors. One such salient microprocessor introduced by Intel was the Intel 80386, which is also known as i386 or 386. 386 was the first 32-bit microprocessor launched in October 1985 that brought along the feature of virtual mode.
Key-Words / Index Term
32-bit microprocessors, virtual, 3rd gen, intel, x86 family, 386
References
[1] Sameera A’amer Abdul-Kader, “Emulation of the microprocessor intel 80386”, Diyala Journal of Engineering Sciences, Vol.2, No.1, pp. 13-34, 2009.
[2] Barry B. Brey, “Intel Microprocessors”, Pearson Prentice Hall, Ohio, pp. 677-718, 1987.
[3] Sen-Cuo Ro, Sheau-Chuen Her, “i386/i486 Advanced Programming”, Springer Publishing Co Inc., U.S., pp. 54-196, 1993.
[4] Tiwari, R. Sam, and S. Shaikh, "Analysis and prediction of churn customers for telecommunication industry," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 218-222. doi: 10.1109/I-SMAC.2017.8058343
[5] S. Navadia, P. Yadav, J. Thomas and S. Shaikh, "Weather prediction: A novel approach for measuring and analyzing weather data," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 414-417, doi: 10.1109/I-SMAC.2017.8058382
[6] Vidhi Tiwari, Pratibha Adkar “Implementation of IoT in Home Automation using android application” IsroSet-Journal (IJSRCSE), Vol.7, Issue.2, pp.11-16, Apr-2019
[7] A. Fasiku, Ayodeji Ireti, B. Olawale, Jimoh Babatunde, C. Abiola Oluwatoyin B., "Comparison of Intel Single-Core and Intel Dual-Core Processor Performance", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.1-9, 2013
[8] M. Sora, J. Talukdhar, S. Majumder, P.H Talukdhar, U. Sharmah, "Word level detection of Galo and Adi language using acoustical cues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.10-13, 2013
[9] Manish Mishra, Piyush Shukla, Rajeev Pandey, "Assessment on different tools used for Simulation of routing for Low power and lossy Networks (RPL)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.4, pp.26-32, 2019
[10] Neha N. Badwaik, Achal J. Wakade, SudhaShrikanth “Underground Cable Fault Detection System by Using IoT” Journal (IJSRNSC), Vol.8, Issue.1, pp.25-28, Feb-2020
Citation
Anas Sayed, Shaikh Mohd Ashfaque, "80386: A Beginning of 32-bit Microprocessor by Intel," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.80-82, 2020.
Cloud Based Requirements Management Tools Should Be Selected on the Basis of Project Requirements
Review Paper | Journal Paper
Vol.8 , Issue.10 , pp.83-88, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.8388
Abstract
Requirements engineering plays an important role in coordinating with various stakeholders / customer expectations and ensures developers build applications that meets virtually all stakeholder / customer requirements. Appropriate requirements management tool results in a better solution for the organizations` defined problem. Handling several thousands of requirements needs a Requirements management tool, so handling is a daunting task. This paper discusses the web-based requirements management tool that can easily trace requirements, online tender management, bug and defect, use cases and related information throughout the project`s planning and development process. It has the centralized database; the solution can be updated from solitary consign. It can be easily used with any software development processes including, Waterfall, Spiral and Agile. This paper considers six leading Web based Requirements Management tools; IRIS Business Architect, ACCOMPA, JAMA Contour, Gatherspace, AgileSpecs, Blueprint, ReQtest, Orcanos and CASE Spec. It discusses their features including collaboration, History, Tracking, and Comments for Requirements, Status Reporting, Traceability, and Centralized database, Import /Export Data, Summary Reports and User Defined Attributes. Besides this, the paper also focuses on Project management attributes; regaining project control, reduce project risks, and decrease failure costs.
Key-Words / Index Term
requirements;requirements mangement tools, waterfall, spiral, agile
References
[1] M. Hoffmann, N. Kuhn, M. Weber, and M. Bittner, “Requirements for requirements management tools,” in RE ’04: Proceedings of the 12th IEEE International Conference on Requirements Engineering, Washington, DC, USA, p.p. 301–308, 2004.
[2] M. U. Bokhari and S. T. Siddiqui, “A Comparative study of software requirements tools for secure software Development”, BVICAM?S International Journal of IT (BIJIT), 2 (2), 207-216, 2010.
[3] Hélène Gaspard-Boulinc, Stéphane Conversy “Usability Insights for Requirements Engineering Tools: A User Study with Practitioners in Aeronautics”, In Requirements Engineering Conference (RE), 2017 IEEE 25th International, Lisbon, Portugal, Portugal, September 2017.
[4] S. T. Siddiqui, “Needs, Types and Benefits of Requirements Management Tools”, International Journal of Trends in Computer Science, Volume 2, Issue 11, 2013. ISSN: 7462 – 8452.
[5] D. M. Alghazzawi, M. U. Bokhari, and H. S. A. Hamatta. “Selecting Appropriate Requirements Management Tool for Developing Secure Enterprises Software”, International Journal of Information Technology and Computer Science (IJITCS), 6(4), 49-55, 2014.
[6] C. Schwaber, and P. Sterpe, “Selecting the Right Requirements Management Tool – Or Maybe None whatsoever”, Forrester Research, Inc., Sep 28, 2007.
[7] M. U. Bokhari, “Metrics for Requirement Engineering and Automated Requirement Tools”, In: Proceedings of the 5th National Conference; INDIACom-2011, New Delhi ISSN 0973-7529 ISBN 978-93-80544-00-7, Feb 2011.
[8] [Online] aligned. Available online at: http://www.aligned.ch/
[9] [Online] Caliber. Available online at: https://community.microfocus.com/borland/define/caliber_-_requirements_management/
[10] [Online] aNimble. Available online at: https://sourceforge.net/projects/nimble/
[11] [Online] reqview. Available online at: https://www.reqview.com/features.html
[12] [Online] Codebeamer. Available online at: https://codebeamer.com
[13] [Online] Cognition. Available online at: https://cognition.us/features/
[14] [Online] Cradle. Available online at: https://www.threesl.com
[15] Available online at: http://www.softwaretestinghelp.com/requirements-management-tools/
[16] Available online at: http://makingofsoftware.com/resources/list-of-rm-tools
[17] Sandhya Satyarthi, and Dhirendra Pandey. "Framework for Requirement Management using Requirement Traceability", International Journal 8, no. 5 (2017).
[18] [Online] Architect. Available online at: http://biz-architect.com/
[19] [Online] Accompa. Available online at: www.accompa.com
[20] [Online] Jama. Available online at: www.jama.com
[21] [Online] Jama. Available online at: http://techcrunch.com/2013/08/19/jama-software-13m.
[22] [Online] Gatherspace. Available online at: http://www.gatherspace.com/
[23] [Online] AgileSpecs. Available online at: www.agileSpecs.com
[24] [Online] Blueprint. Available online at: www.blueprint.com
[25] [Online] Casespec. Available online at: http://casespec.net/features
[26] S. T. Siddiqui, “Comparative Study and Design of Software Requirement Tools for Secure Software Development”, Ph. D Thesis, Department of Computer Science, A. M. U., Aligarh, India, 2014.
[27] M. U. Bokhari and S. T. Siddiqui, “TSSR: A Proposed Tool for Secure Software Requirement Management”, International Journal of Information Technology and Computer Science (IJITCS), 7(1), 1, 2014.
[28] S. T. Siddiqui, “Software Tools Required to develop GIS Applications: An Overview”, in Proc. Int. Conference on Advanced Computing and Communication Technologies (ACCT 12), IEEE, p.p. 51-56, Jan. 2012.
[29] M. U. Bokhari, "BTSSR-Bokhari Tool for Secure Software Requirements (TSSR) Management: A novel tool.", BZM journal 1(2), 62-71.
[30] K. Sagar and A. Saha, “A systematic review of software usability studies”, Int. j. inf. tecnol. Springer Singapore, 2017.
[31] [Online] https://thedigitalprojectmanager.com/requirements-management-tools/
[32] Shams Tabrez Siddiqui, “Significance of Security Metrics in Secure Software Development”, International Journal of Applied Information System, Volume 12, Number 6, 2017.
[33] S. T. Siddiqui, and M. U. Bokhari, “M. Web Based Requirements Management Tools for Software Development: A Study”, 2017.
[34] R.Z.,Khan and M.O, Ahmad, “Load Balancing Challenges in Cloud Computing: A Survey”. In: Lobiyal D., Mohapatra D., Nagar A., Sahoo M. (eds) Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering, vol 396. 2016. Springer, New Delhi. https://doi.org/10.1007/978-81-322-3589-7_3
[35] [Online] https://reqtest.com/?r=rmt
[36] F.Masood, A.R.Faridi, "An Overview of Distributed Ledger Technology and its Applications", International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.422-427, 2018.
[37] [Online] https://www.guru99.com/requirement-management-tools.html
[38] [Online].https://www.orcanos.com/compliance/products/requirements-management/?r=rmt.
[39] M.Haris, R.Z. Khan, "A Systematic Review on Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.632-639, 2018.
Citation
Shams Tabrez Siddiqui, Md Oqail Ahmad, Mohammad Shuaib, S. Gulzar Ahmed Rizvi, "Cloud Based Requirements Management Tools Should Be Selected on the Basis of Project Requirements," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.83-88, 2020.
A Review on Issues and Benefits of Ethical Hacking
Review Paper | Journal Paper
Vol.8 , Issue.10 , pp.89-93, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.8993
Abstract
The condition of security on the web is extremely poor. Hacking is an action in which, an individual adventures the shortcoming in a framework for self-benefit or delight. Privately owned sectors often make newer and bigger amounts of their simple targets and applications, for example, electronic business, showcasing and database access to the Internet, at that point crackers consider the opportunity to be a better chance to access sensitive information. These actions of crackers in order to get sensitive information is caught by an white cap cracker who is also called an ethical hacker and Moral hacking is an indistinguishable action which plans to discover and redress the shortcoming and vulnerabilities in a framework. Moral hacking portrays the way toward hacking a system in a moral way, in this way with well-meaning plans. In This paper, hacking types with its different phase and ethical hackings techniques are discussed. Major problem in ethical hacking is to understand the insider issues. The usage of white-top software engineers limit dangers and additionally screen the conduct of moral programmers.
Key-Words / Index Term
Component, Formatting, Style, Styling, Insert
References
[1] Brijesh Pandey Alok Singh & Lovely Balani “Ethical Hacking Tools, Techniques and Approaches” 2015.
[2] Nicholson, Scott. "How ethical hacking can protect organisations from a greater threat." Computer Fraud & Security 2019, no. 5 15-19, 2019.
[3] B. Smith ; W. Yurcik ; D. Doss, “Ethical hacking: the security justification redux” In the Proceeding of : IEEE 2002 International Symposium on Technology and Society (ISTAS`02). Social Implications of Information and Communication Technology, USA, 2002.
[4] Prakash Chandra Behera and Chinmaya Dash, “Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System”, Volume 4, Special Issue9, pp.54-61. 2015.
[5] Georg, Thomas, Burmeister Oliver, and Low Gregory. "Issues of Implied Trust in Ethical Hacking." The ORBIT Journal 2, no. 1 :pp. 1-19, 2018.
[6] Akanksha Bansal and Monika Arora. "Ethical hacking and social security." Radix International Journal of Research in Social Science, volume 1, issue 11, pp.1-16, 2012.
[7] Dr. V SUBHASHINI (2014) `ETHICAL HACKING AND LEGAL SYSTEMS`, International Journal of Emerging Technology in Computer Science & Electronics , 11( 4 –NOVEMBER 2014.), pp. 1-6 [Online]. Available at: (Accessed: 10th January 2020).
[8] Cheng P, “A Security Architecture for Internet Protocol”, IBM Systems Journal no-1 1998.
[9] Endicott-Popovsky, B. (2003). Ethics and teaching information assurance. IEEE Security & Privacy .
[10] RD. Hartley, “Ethical Hacking: Teaching Students to Hack”, EastCarolina University, http://www.techspot.com/news/21942- universityoffers-ethical-hacking-course.html, , 2002.
[11] Logan and Clarkson, Is it Safe? Information Security Education: Are We Teaching a Dangerous Subject?, Proceedings of the 8th Colloquium for Information Systems Security Education, West Point, NY, 2004
[12] SA. Saleem, Ethical Hacking as a risk management technique, ACM New York, NY, USA, 2006.
[13] C.C. Palmer, “Ethical hacking”, IBM systems journal, volume 40, issue 3, pp. 769–780 , March 2001.
[14] N.B. Sukhai, “Hacking And Cybercrime”, AT&T, 2005.
Citation
Aniket Kamat, Shuchita Beri, Mayank Kothari, "A Review on Issues and Benefits of Ethical Hacking," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.89-93, 2020.
The Recommender System for Smart E-Learning System Using Big Data: A Survey
Survey Paper | Journal Paper
Vol.8 , Issue.10 , pp.94-99, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.9499
Abstract
Recommender systems utilize the opinions of a residential district of users. It assists individuals for the reason that the community more effectively identifies the content of great interest from a set that is potentially overwhelming. The instructor provides an online course which consists of the learning materials, self-quiz, and learning path in a virtual classroom. Typical learners study course material and do self-quiz so that you can evaluate their knowledge. The essential thing that is important to the success learners relates to the standard of the educational materials that are not only be determined by given materials by the instructor but additionally be determined by other learners’ recommendations. Recommender systems have now been a helpful tool to recommend items in a lot of online systems, including e-learning. However, not much research has been done to gauge the learning effects regarding the learners if they use e-learning with a recommender system. Instead, most of the researchers were concentrating on the recommender system precision in forecasting the learner’s recommendation as opposed to the knowledge gain. The detailed literature review is presented by the various researchers in the Recommender Systems for the Smart E-Learning environment in this survey article.
Key-Words / Index Term
E-Learning, Education, Recommender System, Big Data Analytics, Machine Learning
References
[1] Anshari, Muhammad, Yabit Alas, and Lim Sei Guan. "Developing online learning resources: Big data, social networks, and cloud computing to support pervasive knowledge." Education and Information Technologies Vol.21, Issue 6 ,pp. 1663-1677 , 2016
[2] Shen, Liping, Minjuan Wang, and Ruimin Shen. "Affective e-learning: Using “emotional” data to improve learning in pervasive learning environment." Journal of Educational Technology & Society Vol.12, Issue 2 ,pp. 176-189, 2009
[3] Picciano, Anthony G. "The evolution of big data and learning analytics in American higher education." Journal of asynchronous learning networks Vol.16, Issue.3 ,pp. 9-20,2012
[4] Reyes, Jacqueleen A. "The skinny on big data in education: Learning analytics simplified." TechTrends Vol.59, Issue .2 , pp,75-80, 2015.
[5] Macfadyen, Leah P., et al. "Embracing big data in complex educational systems: The learning analytics imperative and the policy challenge." Research & Practice in Assessment Vol.9 , pp.17-28 ,2014
[6] Prinsloo, Paul, and Sharon Slade. "Big data, higher education and learning analytics: Beyond justice, towards an ethics of care." Big data and learning analytics in higher education. Springer, Cham, pp. 109-124. 2017
[7] Udupi, Prakash Kumar, Puttaswamy Malali, and Herald Noronha. "Big data integration for transition from e-learning to smart learning framework." 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC). IEEE, 2016.
[8] Chaffai, Abdelmajid, Larbi Hassouni, and Houda Anoun. "Real-time analysis of students activities on an e-learning platform based on apache spark." (IJACSA) International Journal of Advanced Computer Science and Applications Vol.8,Issue. 7 ,pp. 101-109 , 2017
[9] Anshari, Muhammad, et al. "Online Learning: trends, issues and challenges in the Big Data Era." Journal of0 e-Learning and Knowledge Society Vol. 12.Issue .1, 2016.
[10] Birjali, Marouane, Abderrahim Beni-Hssane, and Mohammed Erritali. "Learning with big data technology: The future of education." International Afro-European Conference for Industrial Advancement. Springer, Cham, 2016.
[11] Huda, Miftachul, et al. "Innovative teaching in higher education: the big data approach." TOJET 2016.
[12] Khan, Samiya, Kashish A. Shakil, and Mansaf Alam. "Educational intelligence: applying cloud-based big data analytics to the Indian education sector." 2016 2nd international conference on contemporary computing and informatics (IC3I). IEEE, 2016.
[13] Santos, Olga C. "Emotions and personality in adaptive e-learning systems: an affective computing perspective." Emotions and personality in personalized services. Springer, Cham, pp.263-285 , 2016
[14] Huba, Mikuláš, and Štefan Kozák. "From E-learning to Industry 4.0." 2016 International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2016.
[15] Jin, Sung-Hee, and Y. Kim. "Learning activities and learning behaviors for learning analytics in e-learning environments." Educational Technology International Vol.17.,Issue 2 pp.175-202, 2016
[16] Gudivada, Venkat N., et al. "Cognitive analytics: Going beyond big data analytics and machine learning." Handbook of statistics. Vol. 35. Elsevier, pp.169-205 , 2016
[17] Ducange, Pietro, et al. "Educational big data mining: how to enhance virtual learning environments." International Joint Conference SOCO’16-CISIS’16-ICEUTE’16. Springer, Cham, 2016.
[18] Mahboob, Tahira, Sadaf Irfan, and Aysha Karamat. "A machine learning approach for student assessment in E-learning using Quinlan`s C4. 5, Naive Bayes and Random Forest algorithms." 2016 19th International Multi-Topic Conference (INMIC). IEEE, 2016.
[19] Murugananthan, V., and B. L. ShivaKumar. "An adaptive educational data mining technique for mining educational data models in elearning systems." Indian Journal of Science and Technology Vol.9, Issue. 3 pp. 1-5 , 2016
[20] Umbleja, Kadri, and Manabu Ichino. "Predicting Students’ Behavior During an E-Learning Course Using Data Mining." International Conference on Interactive Collaborative Learning. Springer, Cham, 2016.
[21] Dwivedi, Surabhi, and VS Kumari Roshni. "Recommender system for big data in education." 2017 5th National Conference on E-Learning & E-Learning Technologies (ELELTECH). IEEE, 2017.
[22] Appalla, Padmaja, Venu Madhav Kuthadi, and Tshilidzi Marwala. "An efficient educational data mining approach to support e-learning." Wireless Networks Vol.23 , Issue .4 , pp.1011-1024. 2017
[23] Vyas, Madhav S., and Reshma Gulwani. "Predictive analytics for E learning system." 2017 International Conference on Inventive Systems and Control (ICISC). IEEE, 2017.
[24] Tashtoush, Yahya M., et al. "Adaptive e-learning web-based English tutor using data mining techniques and Jackson`s learning styles." 2017 8th International Conference on Information and Communication Systems (ICICS). IEEE, 2017.
[25] El Fouki, Mohammed, Noura Aknin, and K. Ed El. Kadiri. "Intelligent Adapted e-Learning System based on Deep Reinforcement Learning." Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems. 2017.
[26] Rao, NV Krishna, N. Mangathayaru, and M. Sreenivasa Rao. "Evolution and prediction of radical multi-dimensional e-learning system with cluster-based data mining techniques." 2017 International Conference on Trends in Electronics and Informatics (ICEI). IEEE, 2017.
[27] Tian, Feng, Qinghua Zheng, and Kuo-Ming Chao. "Current and future of technologies and services in smart e-learning." ,Springer pp. 1-3. 2020
[28] Cerezo, Rebeca, et al. "Process mining for self-regulated learning assessment in e-learning." Journal of Computing in Higher Education Vol. 32.Issue.1,pp.. 74-88.2020
[29] Moubayed, Abdallah, et al. "Student Engagement Level in e-learning Environment: Clustering Using K-means." American Journal of Distance Education pp. 1-20.2020
[30] Razzaque, Anjum, and Allam Hamdan. "Internet of Things for Learning Styles and Learning Outcomes Improve e-Learning: A Review of Literature." Joint European-US Workshop on Applications of Invariance in Computer Vision. Springer, Cham, 2020
[31] Vinutha K.N and K.S.Sampada “Survey of Automated Recommender System for Web Application”,s International Journal of Computer Science and Engineering Vol.4 , Issue 3, pp. 36-39, 2016.
Citation
M. Murugeswari, S. Vimala, "The Recommender System for Smart E-Learning System Using Big Data: A Survey," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.94-99, 2020.
Statistical Modeling for Sentiment Classification: A Review
Review Paper | Journal Paper
Vol.8 , Issue.10 , pp.100-105, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.100105
Abstract
Sentiment classification is the process of using NLP, statistics, or machine learning methods to extract, identify, or otherwise characterize the sentiment content of a text unit. Based on a sample of tweets, how are people responding to this ad campaign/product release/news item? There are several application of opinion mining such as on business intelligence, Politics/political science, Law/policy making, Sociology, Psychology etc. By use of digital platform administration can collect response from consumer and by means of applying opinion mining technique a useful information from user collected data. In this paper we have given a brief review over different work done in the field of sentiment classification and given tabular comparison among different opinion classification technique based on accuracy.
Key-Words / Index Term
TPR,FNR,ML,NL,SVM ANN
References
[1] B. Vamshi Krishna, Ajeet Kumar Pandey and A. P. Siva Kumar Feature Based Opinion Mining and Sentiment Analysis Using Fuzzy Logic Springer 2018.
[2] Y. Wang, J. Zhang Keyword Extraction from Online Product Reviews Based on Bi-Directional LSTM Recurrent Neural Network IEEE 2017.
[3] Sandra Garcia Esparza , Michael P. O’Mahony, Barry Smyth Mining the real-time web: A novel approach to product recommendation Elsevier 2011.
[4] Isa Maks , Piek Vossen A lexicon model for deep sentiment analysis and opinion mining applications Elsevier 2012.
[5] Rodrigo Moraes, João Francisco Valiati, Wilson P. Gavião Neto Document-level sentiment classification: An empirical comparison between SVM and ANN Elsevier 2013.
[6] Tarik S. Zakzouk Comparing text classifiers for sports news Elsevier 2012.
[7] Ngoc Phuong Chau, Viet Anh Phan, Minh Le Nguyen Deep Learning and Sub-Tee Mining for Document Level Sentiment Classification KSE 2016.
[8] Ivo Danihelka et. al. Associative Long Short-Term Memory arXiv 2016.
Citation
Varsha Pal, Akshay Varkale, "Statistical Modeling for Sentiment Classification: A Review," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.100-105, 2020.
A Survey on Feature Selection in Microarray Data: Methods, Algorithms and Challenges
Survey Paper | Journal Paper
Vol.8 , Issue.10 , pp.106-116, Oct-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i10.106116
Abstract
In biomedical researches a massive amount of data are produced day after day, using machine learning algorithms to discover the knowledge is very important in early diagnosis, prevention and treatment, as well as drug development. Biomedical data like DNA microarray suffers from curse of dimensionality phenomenon, since there are a huge number of features (genes) with high ambiguity. Feature selection is still a hot topic which cares about reducing the high of dimensionality by applying different techniques. Different contributions are conducted with new models, frameworks, methodologies and algorithms aiming to dissolve the curse of dimensionality problem and produce more meaningful and reliable data. The objective of this study is to explain the concept of feature selection, its methods, the algorithms and techniques that have been recently used in microarray data and the most popular microarray datasets were used. Moreover, the challenges that can appear when selecting more informative and non-redundant features from high dimensional datasets.
Key-Words / Index Term
Feature Selection, Filter Method, Wrapper Method, Hybrid Method, DNA microarray, Metaheuristic
References
[1] R. K. Bania and A. Halder, "R-Ensembler: A greedy rough set based ensemble attribute selection algorithm with kNN imputation for classification of medical data," Computer Methods and Programs in Biomedicine, vol. 184, p. 105122, 2020.
[2] L. Venkataramana, S. G. Jacob, R. Ramadoss, D. Saisuma, D. Haritha, and K. Manoja, "Improving classification accuracy of cancer types using parallel hybrid feature selection on microarray gene expression data," Genes & genomics, vol. 41, pp. 1301-1313, 2019.
[3] B. Remeseiro and V. Bolon-Canedo, "A review of feature selection methods in medical applications," Computers in biology and medicine, p. 103375, 2019.
[4] K. Tadist, S. Najah, N. S. Nikolov, F. Mrabti, and A. Zahi, "Feature selection methods and genomic big data: a systematic review," Journal of Big Data, vol. 6, p. 79, 2019.
[5] K. Zheng, X. Wang, B. Wu, and T. Wu, "Feature subset selection combining maximal information entropy and maximal information coefficient," Applied Intelligence, pp. 1-15, 2019.
[6] N. Sánchez-Maroño, O. Fontenla-Romero, and B. Pérez-Sánchez, "Classification of Microarray Data," in Microarray Bioinformatics, ed: Springer, 2019, pp. 185-205.
[7] A. Alonso-Betanzos, V. Bolón-Canedo, L. Morán-Fernández, and B. Seijo-Pardo, "Feature Selection Applied to Microarray Data," in Microarray Bioinformatics, ed: Springer, 2019, pp. 123-152.
[8] S. Sayed, M. Nassef, A. Badr, and I. Farag, "A nested genetic algorithm for feature selection in high-dimensional cancer microarray datasets," Expert Systems with Applications, vol. 121, pp. 233-243, 2019.
[9] J. Li, K. Cheng, S. Wang, F. Morstatter, R. P. Trevino, J. Tang, et al., "Feature selection: A data perspective," ACM Computing Surveys (CSUR), vol. 50, p. 94, 2018.
[10] E. Hoseini and E. G. Mansoori, "Unsupervised feature selection in linked biological data," Pattern Analysis and Applications, vol. 22, pp. 999-1013, 2019.
[11] Y. Huo, L. Xin, C. Kang, M. Wang, Q. Ma, and B. Yu, "SGL-SVM: A novel method for tumor classification via support vector machine with sparse group Lasso," Journal of Theoretical Biology, vol. 486, p. 110098, 2020.
[12] A. K. Shukla, D. Tripathi, B. R. Reddy, and D. Chandramohan, "A study on metaheuristics approaches for gene selection in microarray data: algorithms, applications and open challenges," Evolutionary Intelligence, pp. 1-21, 2019.
[13] N. AlNuaimi, M. M. Masud, M. A. Serhani, and N. Zaki, "Streaming Feature Selection Algorithms for Big Data: A Survey," Applied Computing and Informatics, 2019.
[14] X. H. Han, D. A. Li, and L. Wang, "A Hybrid Cancer Classification Model Based Recursive Binary Gravitational Search Algorithm in Microarray Data," Procedia Computer Science, vol. 154, pp. 274-282, 2019.
[15] M. Ghosh, S. Begum, R. Sarkar, D. Chakraborty, and U. Maulik, "Recursive memetic algorithm for gene selection in microarray data," Expert Systems with Applications, vol. 116, pp. 172-185, 2019.
[16] X. Zheng, W. Zhu, C. Tang, and M. Wang, "Gene selection for microarray data classification via adaptive hypergraph embedded dictionary learning," Gene, vol. 706, pp. 188-200, 2019.
[17] Y. Zhang, Q. Zhang, Z. Chen, J. Shang, and H. Wei, "Feature assessment and ranking for classification with nonlinear sparse representation and approximate dependence analysis," Decision Support Systems, vol. 122, p. 113064, 2019.
[18] M. Sun, K. Liu, Q. Wu, Q. Hong, B. Wang, and H. Zhang, "A novel ECOC algorithm for multiclass microarray data classification based on data complexity analysis," Pattern Recognition, vol. 90, pp. 346-362, 2019.
[19] L. Sun, X.-Y. Zhang, Y.-H. Qian, J.-C. Xu, S.-G. Zhang, and Y. Tian, "Joint neighborhood entropy-based gene selection method with fisher score for tumor classification," Applied Intelligence, vol. 49, pp. 1245-1259, 2019.
[20] S. Kiliçarslan, K. Adem, and M. Çelik, "Diagnosis and Classification of Cancer Using Hybrid Model Based on ReliefF and Convolutional Neural Network," Medical Hypotheses, p. 109577, 2020.
[21] G. Agapito, "Computer Tools to Analyze Microarray Data," in Microarray Bioinformatics, ed: Springer, 2019, pp. 267-282.
[22] J. Chaki and N. Dey, "Pattern analysis of genetics and genomics: a survey of the state-of-art," Multimedia Tools and Applications, pp. 1-32, 2019.
[23] A. Sharma and R. Rani, "C-HMOSHSSA: Gene selection for cancer classification using multi-objective meta-heuristic and machine learning methods," Computer methods and programs in biomedicine, vol. 178, pp. 219-235, 2019.
[24] M. A. Al-Betar, O. A. Alomari, and S. M. Abu-Romman, "A TRIZ-inspired bat algorithm for gene selection in cancer classification," Genomics, 2019.
[25] M. Mafarja, A. A. Heidari, H. Faris, S. Mirjalili, and I. Aljarah, "Dragonfly algorithm: theory, literature review, and application in feature selection," in Nature-Inspired Optimizers, ed: Springer, 2020, pp. 47-67.
[26] C. Kang, Y. Huo, L. Xin, B. Tian, and B. Yu, "Feature selection and tumor classification for microarray data using relaxed Lasso and generalized multi-class support vector machine," Journal of theoretical biology, vol. 463, pp. 77-91, 2019.
[27] J. Ge, X. Zhang, G. Liu, and Y. Sun, "A Novel Feature Selection Algorithm Based on Artificial Bee Colony Algorithm and Genetic Algorithm," in 2019 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), 2019, pp. 131-135.
[28] C. Tang, L. Cao, X. Zheng, and M. Wang, "Gene selection for microarray data classification via subspace learning and manifold regularization," Medical & biological engineering & computing, vol. 56, pp. 1271-1284, 2018.
[29] S. Bakhshandeh, R. Azmi, and M. Teshnehlab, "Symmetric uncertainty class-feature association map for feature selection in microarray dataset," International Journal of Machine Learning and Cybernetics, vol. 11, pp. 15-32, 2020.
[30] S. A. Medjahed, T. A. Saadi, A. Benyettou, and M. Ouali, "Kernel-based learning and feature selection analysis for cancer diagnosis," Applied Soft Computing, vol. 51, pp. 39-48, 2017.
[31] A. K. Shukla and D. Tripathi, "Identification of potential biomarkers on microarray data using distributed gene selection approach," Mathematical biosciences, vol. 315, p. 108230, 2019.
[32] M. Alirezanejad, R. Enayatifar, H. Motameni, and H. Nematzadeh, "Heuristic filter feature selection methods for medical datasets," Genomics, 2019.
[33] M. J. Rani and D. Devaraj, "Two-Stage Hybrid Gene Selection Using Mutual Information and Genetic Algorithm for Cancer Data Classification," Journal of medical systems, vol. 43, p. 235, 2019.
[34] A. K. Shukla, P. Singh, and M. Vardhan, "A hybrid gene selection method for microarray recognition," Biocybernetics and Biomedical Engineering, vol. 38, pp. 975-991, 2018.
[35] J. Xie, M. Hao, W. Liu, and Y. Lin, "Fused variable screening for massive imbalanced data," Computational Statistics & Data Analysis, vol. 141, pp. 94-108, 2020.
[36] A. K. Shukla, P. Singh, and M. Vardhan, "A two-stage gene selection method for biomarker discovery from microarray data for cancer classification," Chemometrics and Intelligent Laboratory Systems, vol. 183, pp. 47-58, 2018.
[37] P. Lopez-Garcia, A. D. Masegosa, E. Osaba, E. Onieva, and A. Perallos, "Ensemble classification for imbalanced data based on feature space partitioning and hybrid metaheuristics," Applied Intelligence, vol. 49, pp. 2807-2822, 2019.
[38] Y. He, J. Zhou, Y. Lin, and T. Zhu, "A class imbalance-aware Relief algorithm for the classification of tumors using microarray gene expression data," Computational Biology and Chemistry, vol. 80, pp. 121-127, 2019.
[39] M. Ghosh, S. Adhikary, K. K. Ghosh, A. Sardar, S. Begum, and R. Sarkar, "Genetic algorithm based cancerous gene identification from microarray data using ensemble of filter methods," Medical & biological engineering & computing, vol. 57, pp. 159-176, 2019.
[40] S. Ramírez?Gallego, I. Lastra, D. Martínez?Rego, V. Bolón?Canedo, J. M. Benítez, F. Herrera, et al., "Fast?mRMR: Fast Minimum Redundancy Maximum Relevance Algorithm for High?Dimensional Big Data," International Journal of Intelligent Systems, vol. 32, pp. 134-152, 2017.
[41] S. H. Bouazza, K. Auhmani, A. Zeroual, and N. Hamdi, "Selecting significant marker genes from microarray data by filter approach for cancer diagnosis," Procedia Computer Science, vol. 127, pp. 300-309, 2018.
[42] W. Andaru, I. Syarif, and A. R. Barakbah, "Feature selection software development using artificial bee colony on dna microarray data," in 2017 International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC), 2017, pp. 6-11.
[43] M. Allam and M. Nandhini, "Optimal feature selection using binary teaching learning based optimization algorithm," Journal of King Saud University-Computer and Information Sciences, 2018.
[44] S. K. Baliarsingh, S. Vipsita, and B. Dash, "A new optimal gene selection approach for cancer classification using enhanced Jaya-based forest optimization algorithm," Neural Computing and Applications, pp. 1-18, 2019.
[45] M. A. Basir, M. S. Hussin, and Y. Yusof, "Ideal Combination Feature Selection Model for Classification Problem based on Bio-Inspired Approach," in Computational Science and Technology, ed: Springer, 2020, pp. 585-593.
[46] L. Zhang, W. Zhou, B. Wang, Z. Zhang, and F. Li, "Applying 1-norm SVM with squared loss to gene selection for cancer classification," Applied Intelligence, vol. 48, pp. 1878-1890, 2018.
[47] X. Huang, L. Zhang, B. Wang, F. Li, and Z. Zhang, "Feature clustering based support vector machine recursive feature elimination for gene selection," Applied Intelligence, vol. 48, pp. 594-607, 2018.
[48] M. S. M. Prince, A. Hasan, and F. M. Shah, "An Efficient Ensemble Method for Cancer Detection," in 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), 2019, pp. 1-6.
[49] T. Gangavarapu and N. Patil, "A novel filter–wrapper hybrid greedy ensemble approach optimized using the genetic algorithm to reduce the dimensionality of high-dimensional biomedical datasets," Applied Soft Computing, vol. 81, p. 105538, 2019.
[50] T. Ragunthar and S. Selvakumar, "A wrapper based feature selection in bone marrow plasma cell gene expression data," Cluster Computing, vol. 22, pp. 13785-13796, 2019.
[51] P. Singh, A. Shukla, and M. Vardhan, "Hybrid approach for gene selection and classification using filter and genetic algorithm," in 2017 International Conference on Inventive Computing and Informatics (ICICI), 2017, pp. 832-837.
[52] K. Passi, A. Nour, and C. K. Jain, "Markov blanket: Efficient strategy for feature subset selection method for high dimensional microarray cancer datasets," in 2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2017, pp. 1864-1871.
[53] D. Utami and Z. Rustam, "Gene selection in cancer classification using hybrid method based on Particle Swarm Optimization (PSO), Artificial Bee Colony (ABC) feature selection and support vector machine," in AIP Conference Proceedings, 2019, p. 020047.
[54] T. Umamaheswari and P. Sumathi, "Enhanced firefly algorithm (EFA) based gene selection and adaptive neuro neutrosophic inference system (ANNIS) prediction model for detection of circulating tumor cells (CTCs) in breast cancer analysis," Cluster Computing, vol. 22, pp. 14035-14047, 2019.
[55] S. Singla, P. Ghosh, and U. Kumari, "Breast Cancer Detection using Genetic Algorithm with Correlation based Feature Selection: Experiment on Different Datasets," International Journal of Computer Sciences and Engineering, vol. 7, pp. 406-410, 2019.
[56] Y. Prasad, K. Biswas, and M. Hanmandlu, "A recursive PSO scheme for gene selection in microarray data," Applied Soft Computing, vol. 71, pp. 213-225, 2018.
[57] V. J. M. Praveena, "Particle Swarm Optimization based Feature Selection with Evolutionary Outlay-Aware Deep Belief Network Classifier (PSO-EOA-DBNC) for High Dimensional Datasets," International Journal of Computer Sciences and Engineering, vol. 7, pp. 61-69, 2019.
Citation
Khadija Abdullah Uthman, Fadl Mutaher Ba-Alwi, Suad Mohammed Othman, "A Survey on Feature Selection in Microarray Data: Methods, Algorithms and Challenges," International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.106-116, 2020.