Detecting Human Emovere through Data Mining
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.64-69, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.6469
Abstract
With the growth of the Internet community, textual data has proven to be the main tool of communication in human-human interaction. This communication is constantly evolving towards the goal of making it as human and real as possible. One way of humanizing such interaction is to provide a framework that can recognize the emotions present in the communication or the emotions of the involved users in order to enrich user experience. The use of social networking sites is one of the approaches for putting views of user. Proposed emotion detector system takes a text document or audio and the emotion word ontology as inputs and produces the scores of six emotion classes (i.e. happy, sad, fear, surprise, anger and disgust) as the output; for twitter data as input the extracted tweets are categorized in to positive, negative and neutral tweets.
Key-Words / Index Term
Human-Computer Interaction; Textual Emotion Recognition; speech analysis; twitter analysis; Emotion Word Ontology
References
[1] Protégétool,www.protege.stanford.edu/NicuSebea, Ira Cohenb, Theo Geversa, and Thomas S. Huangc“Multimodal Approaches for Emotion Recognition: A Survey”, USA
[2] http://sail.usc.edu/~kazemzad/emotion_in_text_cgi/DAL_app/index.php?overall=bad&submit_evaluation=Submit+Query”.
[3] www.wikipedia.org/Shiv NareshShivhare, SarithaKhethawat, “Emotion Detection from Text”, Second International Conference on Computer Science, Engineering and Applications (CCSEA-2012), May 26-27, Delhi, India, ISBN: 978-1-921987-03-8. 2012.
[4] R Cowie, E. Douglas-Cowie “Emotion recognition in Human-Computer Interaction” in IEEE Signal Processing Magazine volume 18(1), 2001.
[5] Chun-Chieh Liu, Ting-Hao Yang, Chang-Tai Hsieh, Von-WunSoo, “Towards Text-based Emotion Detection: A Survey and Possible Improvements”, in International Conference on Information Management and Engineering, 2009.
[6] Parrott, W.G, “Emotions in Social Psychology,” in Psychology Press, Philadelphia 2001.
[7] Haxby J V, Hoffman and Gobbini M I 2002 Human neural system for face recognition and social communication Biol. Pyschiatry51pp 59-67.
[8] Ekman P 2015 an Argument for Basic Emotion International Journal of Cognition and Emotion 6.
Citation
P. Rani, M.V. Jagannatha Reddy, K.S.M.V. Kumar, Sreedhar S.B., "Detecting Human Emovere through Data Mining," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.64-69, 2020.
A Framework for Classification of Vocal Disorders without Clinical Intervention
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.70-73, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.7073
Abstract
Voice disorders are abnormal characteristic of sound produced by larynx involving pitch, intensity, loudness. Nowadays Voice disorders are one among rapidly spreading diseases. Disordered quality of voice could also be a symptom for laryngeal diseases. The goal of this work is to build a model to identify the types of voice disorders that includes Normal, Dysphonia, Stammering and Vocal palsy. To deal with this classification problem, Machine learning classifier Support Vector Machine (SVM) is used. The results are evaluated in terms of accuracy, sensitivity, specificity and ROC based on the features extracted using Mel Frequency Cepstral Coefficients (MFCCs), they are the cepstral representation of audio clip.
Key-Words / Index Term
Voice disorders, Machine Learning, Classification, SVM, MFCC
References
[1] N. Souissi and A. Cherif, “Dimensionality reduction for voice disorders identification system based on mel frequency cepstral coefficients”, In the Proceedings of the 2015 7th International Conference on Modelling, Identification and Control, pp. 1-6, 2015.
[2] Byron D. Erath, Matias Zanartu, Kelly C. Stewart, Michael W. Plesniak, David E. Sommer, Sean D. Peterson, “A review of lumped-element models of voiced speech”, Speech Communication Publisher, US, pp. 667-690, 2013.
[3] Arias-Londoño JD, Godino-Llorente JI, Markaki M, Stylianou Y, “On combining information from modulation spectra and mel-frequency cepstral coefficients for automatic detection of pathological voices”, Logoped Phoniatr Vocol, 2011 Jul, pp. 36(2):60-9.
[4] Edwin L, Kendig, Robert W. Wilmott, Victor Chernick, “Disorders of the Respiratory Tract in Children”, Elsevier Health Sciences Publisher, 2012.
[5] K. Hajian-Tilaki, “Receiver operating characteristic (roc) curve analysis for medical diagnostic test evaluation”, Caspian journal of internal medicine, vol. 4, no. 2, p. 627, 2013.
[6] S. C. Costa, B. G. Aguiar Neto and J. M. Fechine, "Pathological voice discrimination using cepstral analysis, vector quantization and Hidden Markov Models", 2008 8th IEEE International Conference on BioInformatics and BioEngineering, Athens, 2008, pp. 1-5.
[7] Fathima Kunhi Mohamed, Lajish V.L, et al. “Nonlinear Speech Analysis and Modeling for Vowel Recognition”, 6th International Conference On Advances In Computing & Communications, 2016, Cochin, India.
[8] Galindo, Gabriel E, et al, “Modeling the pathophysiology of phonotraumatic vocal hyperfunction with a triangular glottal model of the vocal folds”. Journal of Speech, Language, and Hearing Research, Vol. 60 2452–2471, 2017
[9] J. I. Godino-Llorente, P. Gomez-Vilda and M. Blanco-Velasco, "Dimensionality Reduction of a Pathological Voice Quality Assessment System Based on Gaussian Mixture Models and Short-Term Cepstral Parameters", in IEEE Transactions on Biomedical Engineering, vol. 53, no. 10, pp. 1943-1953, 2006.
[10] Wu, Huiyi, et al. "A deep learning method for pathological voice detection using convolutional deep belief networks", Interspeech 2018.
[11] K. Umapathy, S. Krishnan, V. Parsa and D. G. Jamieson, "Discrimination of pathological voices using a time-frequency approach", in IEEE Transactions on Biomedical Engineering, vol. 52, no. 3, pp. 421-430, March 2005.
[12] T. Marciniak, R. Weychan, S. Drgas, A. Dabrowski, and A. Krzykowska, “Speaker recognition based on short polish sequences”, in Signal Processing Algorithms, Architectures, Arrangements, and Applications Conference Proceedings (SPA), 2010. IEEE, 2010, pp. 95–98.
[13] M. S. Hossain, “Patient state recognition system for healthcare using speech and facial expressions”, Journal of medical systems, vol. 40, no. 12, p. 272, 2016.
[14] International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256).
[15] Gourish Malage, Kiran Kumari Patil, “A Voice based Farmer Information System”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol.7, Issue.6, pp.220-224,2019.
[16] Sujitha Perumal, Mohammed Saqib Javid, “Voice Enabled Smart Home Assistant for Elderly”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol.7, Issue.11, pp. 30-37, 2019.
[17] M. Mat Baki, G. Wood, M. Alston, P. Ratcliffe, G. Sandhu, J. Rubin, and M. Birchall, “Reliability of operavox against multidimensional voice program (mdvp)”, Clinical Otolaryngology, vol. 40, no. 1, pp. 22–28, 2015.
Citation
Arpitha M.S., Nagarathna, "A Framework for Classification of Vocal Disorders without Clinical Intervention," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.70-73, 2020.
Study of Spatial Domain and Frequency Domain Approach for Fingerprint Based Gender Classification
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.74-78, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.7478
Abstract
Each person’s fingerprint structure is unique and is developed for biometric authentication systems than others because fingerprints have advantages such as: feasible, differ from each other (distinct), permanent, accurate, reliable and acceptable all over the world for security and person identity. Fingerprints are considered legitimate proofs of evidence in courts of law all over the world. Fingerprint based gender classification can be studied using spatial domain and frequency domain approach. Spatial domain approach uses ridge related parameters like ridge count, ridge density, ridge width, ridge thickness to valley thickness ratio. Frequency domain approach do not work on physical parameters related to ridge, but work on measuring parameters like frequency and region parameters of an image. This paper compares one method of spatial domain approach and one method of frequency domain approach in terms of processing time, accuracy, simplicity in calculations and compatibility with other methods.
Key-Words / Index Term
Fingerprint, gender classification, spatial domain, frequency domain, ridge parameters, measuring parameters
References
[1] P.Gnanasivam & Dr. S. Muttan “Estimation of Age Through Fingerprints Using Wavelet Transform and Singular Value Decomposition” International Journal of Biometrics and Bioinformatics (IJBB), Volume (6) : Issue (2) : pp 58-67. 2012.
[2] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, “Handbook of Fingerprint Recognition”, first ed., Springer, New York, 2003.
[3] Pankanti, S. Prabhakar, and A. K. Jain, “On the individuality of fingerprints,” IEEE Trans. Pattern Anal. Mach. Intell.”, vol. 24, no. 8, pp.1010–1025, Aug. 2002.
[4] Rijo Jackson, Tom T.Arulkumaran “Fingerprint Based Gender Classification Using 2D Discrete Wavelet Transforms and Principal Component Analysis” International Journal of Engineering Trends and Technology- Volume4 Issue2- 2013.
[5] S. S. Gornale et al., American International Journal of Research in Science, Technology, Engineering & Mathematics, 1(1), June-August, pp. 46-50, 2013.
[6] Samta Gupta et al, “Fingerprint Based Gender Classification Using Discrete Wavelet Transform & Artificial Neural Network” International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 1289-1296 © 2014.
[7] Mrs.Kavita Tewari, Mrs.Renu L. Kalakoti, VESIT, International Technological Conference-2014 (I-TechCON), Jan. 03 – 04, 2014.
[8] Ritu Kaur, Susmita Ghosh Mazumdar, “Fingerprint Based Gender Identification Using Frequency Domain Analysis”, International Journal of Advances in Engineering & Technology, March 2012.
[9] Gordon Mendenhall, Thomas Mertens “Fingerprint Ridge Count” The American Biology Teacher, Volume 51, No.4, April 1989.
[10] Pallavi Chand et al , “A Novel Method for Gender Classification Using DWT and SVD Techniques”, Int.J.Computer Technology & Applications, Vol 4 (3),445-449.
[11] Ramanjit KAUR, Rakesh K. GARG, “Determination Of Gender Differences From Fingerprint Ridge Density In Two Northern Indian Populations”, Problems of Forensic Sciences, vol. LXXXV, 5–10, 2011.
[12] Ritu Kaur, Susmita Mazumdar, “ A Study on Various Methods of Gender Identification Based on Fingerprints”, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 4, April 2012).
[13] Komal Ramteke and Sunita Rawat, Lossless Image Compression LOCO-R Algorithm for 16 bit Image, 2nd National Conference on Information and Communication Technology (NCICT), pp. 11-14, 2011.
[14] Ramteke, S., Dongare, R. and Ramteke, K., "Intrusion detection system for cloud network using fc-ann algorithm", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, No. 4, (2013).
[15] A. V. Bhad, K. Ramteke, "Content Based Image Retrieval a Comparative Based Analysis for Feature Extraction Approach", International Conference on Advances in Computer Engineering and Applications (ICACEA) Ghaziabad, 2015.
[16] Rajiv Dharaskare, MM Goswami, “Intelligent Multipath Routing protocol for Mobile ad-hoc network” International Journal of computer science and Applications, Vol. 2, Issue 2, Nov 2009.
Citation
A.V. Anjikar, K. Ramteke, S. Chauvan, "Study of Spatial Domain and Frequency Domain Approach for Fingerprint Based Gender Classification," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.74-78, 2020.
An Advanced Target Detection Model for Slow Moving Smaller Target in the Coastal Area
Review Paper | Journal Paper
Vol.8 , Issue.1 , pp.79-83, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.7983
Abstract
Sea clutter in marine surveillance radar makes the task of detecting small targets a very challenging problem In this paper, a better model is been proposed for slow moving smaller target detection. This model initially starts with signal preprocessing to remove the basic noise then a technique called Hanning-Weighted Window Function (HWWF) assisted Time series analysis model with Spatio-Temporal Fourier Transform (STFT) for Time-Frequency analysis is applied, then a space-Time Adaptive Processing (STAP) technique with adaptive weight and filter will be applied to perform small moving target detection under sea clutter, then at last an enhanced Antenna-Pulse-Pair Selection (APS) with Space Spectrum Correlation Coefficient (SSCC) estimation, which has been further processed for the optimal Antenna-Impulse Pair Selection that approximates clutter covariance matrix to achieve enhanced Signal-to-Clutter plus Noise Ratio (SCNR) to achieve computationally efficient STAP for moving target detection This model is proposed for multiple (moving) sea-target detection in sea clutter and jamming probable environment. The overall proposed model will be developed based on impulse radar setup using MATLAB tool Thus, it is well suited for slow moving small target detection under sea clutter for efficient coastal surveillance purposes.
Key-Words / Index Term
Moving Target Detection, Sea-Clutter Environment, STFT, Hanning Weighted Window Analysis; Hanning-Weighted Overlapped Time-Series Analysis, Impulse Radar, Space Time Adaptive Process, Clutter-Suppression, Antenna, Pulse Pair Selection, Coastal Surveillance
References
[1] H. W. Melief, H. Greidanus, P. van Genderen, and P. Hoogeboom, “Analysis of sea spikes in radar sea clutter data,” IEEE Transactions on Geoscience and Remote Sensing, vol. 44, no. 4, pp. 985–993, 2006.
[2] S. Panagopoulos and J. J. Soraghan, “Small-target detection in sea clutter,” IEEE Transactions on Geoscience and Remote Sensing, vol. 42, no. 7, pp. 1355–1361, 2004.
[3] A. Parthiban, J. Madhavan, P. Radhakrishna, D. Savitha, and L. S. Kumar, “Modeling and simulation of radar sea clutter using K-distribution,” in Proceedings of the International Conference on Signal Processing and Comm. (SPCOM ’04), pp. 368–372, Bangalore, India, December 2004.
[4] Y. Norouzi, F. Gini, M. M. Nayebi, and M. Greco, “Noncoherent radar CFAR detection based on goodness-of-fit tests,” IET Radar, Sonar & Navigation, vol. 1, no. 2, pp. 98– 105, 2007.
[5] K. Siddiq and M. Irshad, “Analysis of the cell averaging CFAR in weibull background using a distribution approximation,” in Proceedings of the 2nd International Conference on Computer, Control and Communication (IC4 ’09), pp. 1–5, Karachi, Pakistan, February 2009.
[6] L. Jingsheng, W. Wenguang, S. Jinping, and M. Shiyi, “Chaosbased target detection from sea clutter,” in Proceedings of the IET International Radar Conference, pp. 1–4, Guillin, China, April 2009.
[7] Kabakchiev, K., Daniel, L., Gashinova, M., et al.: ‘Radar parameters influence on the clutter in maritime forward scatter radar’. 2014 11th European Radar Conf., Rome, Italy, 8–10, pp. 113– 116, October 2014.
[8] G. Davidson and H. D. Griffiths, “Wavelet detection of low observable targets within sea clutter,” in Proc. IEE Conf. Radar 2002, IEEE Conf. Publ., vol. 490, Edinburgh, U.K., , pp. 238–242, 2002
[9] H. W. Melief, H. Greidanus, P. van Genderen, and P. Hoogeboom, “Analysis of sea spikes in radar sea clutter data,” IEEE Transactions on Geoscience and Remote Sensing, vol. 44, no. 4, pp. 985–993, 2006
[10] S. Panagopoulos and J. J. Soraghan, “Small-target detection in sea clutter,” IEEE Transactions on Geoscience and Remote Sensing, vol. 42, no. 7, pp. 1355–1361, 2004.
[11] A. Parthiban, J. Madhavan, P. Radhakrishna, D. Savitha, and L. S. Kumar, “Modeling and simulation of radar sea clutter using K-distribution,” in Proceedings of the International Conference on Signal Processing and Comm. (SPCOM ’04), pp. 368–372, Bangalore, India, December 2004.
[12] Y. Norouzi, F. Gini, M. M. Nayebi, and M. Greco, “Noncoherent radar CFAR detection based on goodness-of-fit tests,” IET Radar, Sonar & Navigation, vol. 1, no. 2, pp. 98– 105, 2007
[13] Ward, J.: ‘Space-time adaptive processing for airborne radar’. Tech. Rept., ESC-TR-94-109, Lincoln Laboratory, December 1994
[14] Klemm, R.: ‘Principles of space-time adaptive processing’ (The Institution of Electrical Engineers, 2002).
[15] Melvin, W.: ‘A STAP overview’, IEEE Aerosp. Electron. Sys. Mag., , 19, (1), pp. 19–35, 2004.
[16] Guerci, J., Goldstein, J., Reed, I.: ‘Optimal and adaptive reduced-rank STAP’, IEEE Trans. Aerosp. Electron. Syst., , 36, (2), pp. 647–663, 2000.
[17] V. Duk, L. Rosenberg and B. W. Ng, "Target Detection in Sea-Clutter Using Stationary Wavelet Transforms," in IEEE Transactions on Aerospace and Electronic Systems, vol. 53, no. 3, pp. 1136-1146, June 2017.
[18] Aboutanios, E., Mulgrew, B.: ‘Hybrid detection approach for STAP in heterogeneous clutter’, IEEE Trans. Aerosp. Electron. Syst., , 46, (3), pp. 1021–1033, 2010.
[19] Degurse, J.-F., Savy, L., Marcos, S.: ‘Reduced-rank STAP for target detection in heterogeneous environments’, IEEE Trans. Aerosp. Electron. Syst., 50, pp. 1153–1162, 2014.
[20] Aboutanios, E., Mulgrew, B.: ‘Heterogeneity detection for hybrid STAP algorithm’. Radar Conf., 2008. RADAR’08, pp. 1–4, May 2008.
[21]Bidon, S., Besson, O., Tourneret, J.-Y.: ‘Knowledge-aided STAP in heterogeneous clutter using a hierarchical Bayesian algorithm’, IEEE Trans. Aerosp. Electron. Syst., 47, pp. 1863–1879, 2011.
[22]Yang, Z., de Lamare, R., Li, X.: ‘Sparsity-aware space-time adaptive processing algorithms with l1-norm regularisation for airborne radar’, IET Signal Process., 6, (5), pp. 413–423, 2012.
[23]Yang, Z., De Lamare, R., Li, X.: ‘L1-regularized STAP algorithms with a generalized sidelobe canceler architecture for airborne radar’, IEEE Trans. Signal Process., 60, pp. 674–686, 2012.
[24] Ward, J.: ‘Space-time adaptive processing with sparse antenna arrays’. Thirty-Second Asilomar Conf. on Signals, Systems & Computers, 1998, vol. 2, pp. 1537–1541, 1998.
[25]J. Croney, A. Woroncow and H. Salt, "Detection of surface targets in sea clutter by shipborne radar," in Electronics Letters, vol. 5, no. 24, pp. 619-621, 27 November 1969.
[26]M. Rodriguez-Blanco and V. Golikov, "Multiframe GLRT-Based Adaptive Detection of Multipixel Targets on a Sea Surface," in IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 9, no. 12, pp. 5506-5512, Dec. 2016.
[27]G. Hennessey, H. Leung, A. Drosopoulos and P. C. Yip, "Sea-clutter modeling using a radial-basis-function neural network," in IEEE Journal of Oceanic Engineering, vol. 26, no. 3, pp. 358-372, July 2001.
[28]S. Haykin and T. K. Bhattacharya, "Modular learning strategy for signal detection in a nonstationary environment," in IEEE Transactions on Signal Processing, vol. 45, no. 6, pp. 1619-1637, June 1997.
[29]J. Gao, Z. Lin and W. An, "Infrared Small Target Detection Using a Temporal Variance and Spatial Patch Contrast Filter," in IEEE Access, vol. 7, pp. 32217-32226, 2019.
[30]P. M. Baggenstoss, "On the Equivalence of Hanning-Weighted and Overlapped Analysis Windows Using Different Window Sizes," in IEEE Signal Processing Letters, vol. 19, no. 1, pp. 27-30, Jan. 2012.
[31] Li and Y. -. Lin, "Receiver window designs for radio frequency interference suppression in DMT systems," in IET Signal Processing, vol. 3, no. 1, pp. 33-39, January 2009.
[32] J. Gao, Z. Lin and W. An, "Infrared Small Target Detection Using a Temporal Variance and Spatial Patch Contrast Filter," in IEEE Access, vol. 7, pp. 32217-32226, 2019.
[33] P. M. Baggenstoss, "On the Equivalence of Hanning-Weighted and Overlapped Analysis Windows Using Different Window Sizes," in IEEE Signal Processing Letters, vol. 19, no. 1, pp. 27-30, Jan. 2012.
[34] Li and Y. -. Lin, "Receiver window designs for radio frequency interference suppression in DMT systems," in IET Signal Processing, vol. 3, no. 1, pp. 33-39, January 2009.
[35] J. Carretero-Moya, J. Gismero-Menoyo, A. Asensio-Lopez and A. Blanco-del-Campo, "Application of the radon transform to detect small-targets in sea clutter," in IET Radar, Sonar & Navigation, vol. 3, no. 2, pp. 155-166, April 2009.
[36] P. Shui, D. Li and S. Xu, "Tri-feature-based detection of floating small targets in sea clutter," in IEEE Transactions on Aerospace and Electronic Systems, vol. 50, no. 2, pp. 1416-1430, April 2014.
[37] V. Duk, L. Rosenberg and B. W. Ng, "Target Detection in Sea-Clutter Using Stationary Wavelet Transforms," in IEEE Transactions on Aerospace and Electronic Systems, vol. 53, no. 3, pp. 1136-1146, June 2017.
[38] G. Xiong, C. Xi, D. Li and W. Yu, "Cross Correlation Singularity Power Spectrum Theory and Application in Radar Target Detection Within Sea Clutters," in IEEE Transactions on Geoscience and Remote Sensing, vol. 57, no. 6, pp. 3753-3766, June 2019.
Citation
Rajesh B., Udayarani V., Jayaramaiah G.V., "An Advanced Target Detection Model for Slow Moving Smaller Target in the Coastal Area," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.79-83, 2020.
A Survey on Congestion Control Techniques for Ad Hoc Routing Protocol in VANET
Survey Paper | Journal Paper
Vol.8 , Issue.1 , pp.84-89, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.8489
Abstract
A Vehicular Ad-Hoc Network uses moving cars as nodes to create a mobile network. VANET turns every participating car into a wireless router and allow cars to connect and create a wide range network. VANETs are developed for increasing the driving safety and comfort of automotive end users. It can provide wide variety of services such as Intelligent Transportation System (ITS) e.g. safety applications. Many of safety applications built in VANETs are required real-time communication with high reliability. The main issues are to avoid deterioration of communication channels in dense traffic network. VANET protocols have to face high challenges due to dynamically changing topologies. Many of studies suggested that suitable congestion control algorithms are required to provide efficient operation of a network. However, all congestion control algorithms are not applicable to event-driven safety messages. This paper discusses various existing congestion control algorithms in different congested scenarios. The effectiveness of congestion control algorithm is evaluated through the simulations using Network Simulator-2 (NS2).
Key-Words / Index Term
Ad-Hoc Network, VANET, Congestion Control, Routing Protocol, AODV, Network Simulator-2
References
[1] Jing Zuo et.al, “Performance Evaluation of Routing Protocol in VANET with Vehicle-node Density”, IEEE Sixth International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), September 2010, pp 1-4.
[2]John G. Proakis and Masoud Salehi, “Fundamentals of Communication Systems”, Prentice Hall; 1 edition, December 2004.
[3] Shwetha. A and Sankar. P, “Queue Management Scheme to Control Congestion in A Vehicular Based Sensor Network”, IEEE,June 2018.
[4] Bhushan Vidhale and S.S. Dorle, “Performance Analysis of Routing Protocols in Realistic Environment for Vehicular Ad Hoc Networks”, IEEE Twenty first International Conference on Systems Engineering, August 2011, pp 267-272.
[5] Jordan T. Willis, Arunita Jaekel and Ikjot Saini, “Decentralized Congestion Control Algorithm for Vehicular Networks Using Oscillating Transmission Power”, IEEE, April 2017.
[6] Hesham El-Sayed, Gokulnath Thandavarayan, Sharmi Sankar and Ishtiaque Mahmood, “An Infrastructure Based Congestion Detection and Avoidance Scheme for VANETs”, IEEE, December 2017.
[7] Forough Goudarzi And Hamid Asgari, “Non-Cooperative Beacon Rate and Awareness Control for VANETs”, IEEE, August 2017.
[8] N. Balon, and J. Guo, “Increasing Broadcast Reliability in Vehicular Ad Hoc Networks”, Third ACM International Workshop on Vehicular Ad Hoc Networks VANET, pp. 104-105, 2006.
[9] A. Aaron and J. Weng, “Performance Comparison of Ad-hoc Routing Protocols for Networks with Node Energy Constraints”, IEEE INFOCOM, February 2004
[10]C. Perkins and P. Bhagwat, “Highly dynamic destination sequenced distance-vector routing for mobile computers”, Computer Communication Review, pp 234-244, October 1994.
[11]T. Clausen et.al, "Optimized Link State Routing Protocol (OLSR)," RFC 3626 (Experimental), IETF, October 2003.
[12]Mustapha Younes Taleb, Salah Merniz and Saad Harous, “Congestion Control Techniques in VANETs: A Survey” IEEE, 20 July 2017.
[13]Swati Sharma, Manisha Chahal and Sandeep Harit, “Transmission Rate-based Congestion Control in Vehicular Ad Hoc Networks”, IEEE, February 2019.
[14]Ashish Patil, Deeksha M., N. Shekar V. Shet and Muralidhar Kulkarni, “Transmit Data Rate Control based Decentralized Congestion Control Mechanism for VANETs”, IEEE, March 2019.
[15]P Sailaja, Banoth Ravi and Jaisingh T, “Performance analysis of AODV and EDAODV routing protocol under congestion control in VANETs”, IEEE, September 2018
[16]Zhanxu Cao, Kai Shi, Qingfeng Song and Jinsong Wang, “Analysis of Correlation Between Vehicle Density and Network Congestion in VANETs”, IEEE, July 2017.
[17]Mohammed Erritali and Bouabid El Ouahidi, “Performance evaluation of ad hoc routing protocols in VANET”, Third international journal on advanced computer science and application, pp 33-40, July 2013
Citation
Priyanka Mangal, Amit Kumar Sariya, "A Survey on Congestion Control Techniques for Ad Hoc Routing Protocol in VANET," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.84-89, 2020.
Security of Quick Response Code
Survey Paper | Journal Paper
Vol.8 , Issue.1 , pp.90-92, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.9092
Abstract
QR (Quick Response) Codes and the way they will be wont to attack each human interaction and automatic systems. Because the encoded data is meant to be code solely, some individuals cannot distinguish between a legitimate and a maliciously manipulated QR code. Whereas humans may fall for phishing attacks, automatic readers square measure possibly susceptible to SQL injections and command injections. Our contribution consists of Associate in Nursing Associate in Nursing lysis of the QR Code as an attack vector, showing totally different attack methods from the attackers purpose of read and exploring their potential consequences.
Key-Words / Index Term
Security, QR Code, DES Algorithm, Protocols
References
[1] A. Lewko, A. Sahai, B. Waters, ”Revocation Systems with Very Small Private Keys” , Proc. IEEE Symposium on Security and Privacy 2010, pp. 273–285, 2017.
[2] A. Boldyreva, V.Goyal, V. Kumar, ”Identity-Based Encryption with Efficient Revocation” Proc. ACM Conference on Computer and Communications Security 2008, pp. 417–426, 2017.
[3] International standard ISO/IEC 18004, “Information technology Automatic identification and data capture techniques Bar code symbology QR Code‖”, Reference number - ISO/IEC 18004:2000(E), First edition 2000-06-15.
[4] HenrykBlasinski, “Per-colorant- channel color barcodes for mobile applications an interference cancellation framework”, IEEE Transactions on Image Processing, vol. 22, no. 4, April 2013.
[5] A. Sankara Narayanan, “QR codes and security solutions‖, International Journal of Computer Science and Telecommunication” , Volume 3, Issue 7, July 2012.
[6] KamonHomkajorn, MahasakKetcham, and SartidVongpradhip, “A technique to remove scratches from QR code images” , International Conference on Computer and Communication Technologies (ICCCT`2012), May 26-27, 2012.
[7] Kuan-Chieh Liao, “A novel user authentication scheme based on QR-code” , Journal of networks, vol. 5, no. 8, August 2010.
Citation
K. Ravikumar, R. Geetha, "Security of Quick Response Code," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.90-92, 2020.
A Survey on Twitter Dataset Using Sentiment Analysis
Survey Paper | Journal Paper
Vol.8 , Issue.1 , pp.93-97, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.9397
Abstract
Social networking sites like twitter have millions of people share their thoughts day by day as tweets. As tweet is characteristic short and basic way of expression.There are a number of social networking sites and interrelated mobile applications, and some more are still rising. An enormousquantity of data is generated by these sites daily and this data can be used as a source for differentexamination purposes. People interrelate with each other; share their ideas, opinions, interests and personal information. These user tweet are used for finding the sentiments and also add financial, commercial and social values. though, due to the enormous quantity of user-generated information, analyzing the information manually is an expensive method. Increasing sentiment analysis activity, challenges are being added every day. Automated analytical methods are needed to extract views transmitted in user remarks. Opinion mining is the computational analysis of views transmitted in natural language for decision-making purposes. Preprocessing data play a vital role in getting accurate sentiment analysis results. Extracting opinion target words provide fine-grained analysis on the customer twwets. The labeled data required for training a classifier is expensive and hence to overcome, This paper shows opinion mining analysis types and techniques used to perform extraction of opinions from tweets. A Comparative study on the different techniques and approaches of opinion mining twitter data are dealt with in this survey paper.
Key-Words / Index Term
Sentiment Analysis, Opinion Mining, Social Media, Twitter Data
References
[1] Aaron Smith. 2018. Social Media Use in 2018. Retrieved February 25, 2018, from, http://www.pewinternet.org/2018/03/01/social-media-use-in-2018
[2] Mohammad, Saif M., ParinazSobhani, and Svetlana Kiritchenko. "Stance and sentiment in tweets." ACM Transactions on Internet Technology (TOIT) 17, no. 3: 26, 2017.
[3] Alengadan, BletyBabu, and Shamsuddin S. Khan. "Modified aspect/feature based opinion mining for a product ranking system." In 2018 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC), pp. 1-5. IEEE, 2018.
[4] Rajam, K., and R. Jemina Priyadarsini. "A Survey on Diagnosis of Thyroid Disease Using Data Mining Techniques." IJCSMC 5, no. 5: 354-358, 2016.
[5] Sindhuja, D., and R. Jemina Priyadarsini. "A survey on classification techniques in data mining for analyzing liver disease disorder." International Journal of Computer Science and Mobile Computing 5, no. 5: 483-488, 2016.
[6] Giftson, D. Osmond Niranjan, and R. Jemina Priyadarshini. "An Extensive Analysis On Various Clustering Algorithm In Data Mining."International Journal of Computer Science and Mobile Computing, Vol.5 Issue.5, pg. 273-277, May- 2016.
[7] Lisa Branz and Patricia Brockmann. “Poster: Sentiment Analysis of Twitter Data: Towards Filtering, Analyzing and Interpreting Social Network Data”. In DEBS ’18: The 12th ACM International Conference on Distributed and Event-based Systems, June 25–29, 2018.
[8] Singh, Prabhsimran, Ravinder Singh Sawhney, and Karanjeet Singh Kahlon. "Sentiment analysis of demonetization of 500 & 1000 rupee banknotes by the Indian government." ICT Express 4, no. 3 (): 124-129, 2018.
[9] Vamshi, Krishna B., Ajeet Kumar Pandey, and Kumar AP Siva. "Topic Model-Based Opinion Mining and Sentiment Analysis." In 2018 International Conference on Computer Communication and Informatics (ICCCI), pp. 1-4. IEEE, 2018.
[10] Fang, Xing, and Justin Zhan. "Sentiment analysis using product review data." Journal of Big Data 2, no. 1: 5, 2015
[11] Gautam, Geetika, and Divakar Yadav. "Sentiment analysis of Twitter data using machine learning approaches and semantic analysis." In 2014 Seventh International Conference on Contemporary Computing (IC3), pp. 437-442. IEEE, 2014.
[12] Neethu, M. S., and R. Rajasree. "Sentiment analysis in twitter using machine learning techniques." In 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1-5. IEEE, 2013.
[13] Gupta, B., Negi, M., Vishwakarma, K., Rawat, G. and Badhani, P.. Study of Twitter sentiment analysis using machine learning algorithms on Python. International Journal of Computer Applications, 165(9), pp.0975-8887, 2017.
[14] Anupkant, S., PVM Seravana Kumar, NayaniSateesh, and D. Bhanu Mahesh. "Opinion mining on author`s citation characteristics of scientific publications." In 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC), pp. 348-351. IEEE, 2017.
[15] Perera, I. K. C. U., and H. A. Caldera. "Aspect based opinion mining on restaurant reviews." In 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA), pp. 542-546. IEEE, 2017.
[16] Angelpreethi, A., and S. Britto Ramesh Kumar. "An enhanced architecture for feature based opinion mining from product reviews." In 2017 World Congress on Computing and Communication Technologies (WCCCT), pp. 89-92. IEEE, 2017.
[17] Hnin, Cho Cho, NawNaw, and Aung Win. "Aspect Level Opinion Mining for Hotel Reviews in Myanmar Language." In 2018 IEEE International Conference on Agents (ICA), pp. 132-135. IEEE, 2018.
[18] Zvarevashe, Kudakwashe, and OludayoO.Olugbara. "A framework for sentiment analysis with opinion mining of hotel reviews." In 2018 Conference on Information Communications Technology and Society (ICTAS), pp. 1-4. IEEE, 2018.
Citation
B. Nagajothi, R. Jemima Priyadarsini, "A Survey on Twitter Dataset Using Sentiment Analysis," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.93-97, 2020.
Wireless Sensor Network in Precision Agriculture
Survey Paper | Journal Paper
Vol.8 , Issue.1 , pp.98-101, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.98101
Abstract
Wireless sensor Network is a self-organizing Network. WSN can be deployed in various environments for monitoring purpose. WSN has major applications on health monitoring, military surveillance, weather monitoring, agriculture, etc. In recent decade wireless sensor network implemented in agriculture field are encouraged in many researches. WSN in precision agriculture help to measure different environmental factors such as humidity, temperature, soil moisture, PH value of soil,etc. This precision agriculture helps to enhance the crop quality.Utilizing wireless sensor technologies and management tools can help to identify various diseases in crops, excess usage of pesticides, etc. This paper proposes the efficient use of sensor network in precision agriculture to help the farmers. This paper presents agricultural field where the sensors are used and the different types of sensors used in precision agriculture, also it suggests the environmental factors influencing agriculture.
Key-Words / Index Term
Green House Management System (GHMS), Arduino Uno,WMSN, PA,GIS
References
[1] Ravi Kishore Kodali, NisheethRawat and Lakshmi Boppana,, ” WSN Sensors for Precision Agriculture”, 2014 IEEE Region 10 Symposium, India, pp. 651-655, 2014.
[2] Rajinder Kumar, Nagaraj V Dharwadkar,” A Wireless Sensor Network Based Low Cost and Energy Efficient Frame Work for Precision Agriculture”,2017 International Conference on Nascent Technologies in the Engineering Field (ICNTE-2017), India, ISBN No: 978-1-5090-2795-8, 2017.
[3] Mohamed Rawidean Mohd Kassim, Ibrahim Mat, Ahmad NizarHarun,” Wireless Sensor Network in Precision Agriculture Application”, 2014 IEEE, Malaysia, pp.1-5. 2014.
[4] K.Indumathi, R. Hemalatha,S.Aasha Nandhini and S. Radha,” Intelligent Plant Disease Detection System Using Wireless Multimedia Sensor Networks”, 2017 IEEE, pp.1607-1611, 2017.
[5] Ibrahim Mat, Mohamed Rawidean, AhamadNizarHarun, Ismail Mat Yusoff, “IOT in Precision Agriculture Applications Using Wireless Moisture Sensor Networks”, IEEE Conference on Open Systems (ICOS), Malaysia, pp.24-29, 2016.
[6] Rahim Khan, IhsanAli, Muhammad Zakarya , Mushtaq Ahmad ,”Technology-Assisted Decision Support System for Efficient Water Utilization: A Real-Time Testbed for Irrigation Using Wireless Sensor Networks”, IEEE Access, pp.25686-25697, 2018.
[7] S. AashaNandhini, R. Hemalatha,S.Radha,K. Indumathi, “Web Enabled Plant Disease Detection System for Agricultural Applications Using WMSN “, Wireless Personal Communication, December 2017.
[8] V. Parashar, ”Use of ICT in Agriculture”, Volume 4, International Journal Res. Network Security and Communication, Vol-4, Issue-5, pp.8-11, 2016.
Citation
P. Jasmine Lizy, N. Chenthalir Indra, "Wireless Sensor Network in Precision Agriculture," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.98-101, 2020.
Review on Project Management Tools
Review Paper | Journal Paper
Vol.8 , Issue.1 , pp.102-106, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.102106
Abstract
Project management involves with effective plans and systematically organization of work. It includes defining the project objectives, making schedules and assigning tasks, in order to accomplish a successful goal. There are many tools that make project management more effective and efficient. The development of software for an improved business process, the construction of a building or bridge, the relief effort after a natural disaster, the expansion of sales into a new geographic market — all are projects. Project management, is the application of knowledge, skills, tools, and techniques to project activities to meet the project requirements.
Key-Words / Index Term
Project Management, WBS, HOQ
References
[1] Christelle Scharff, “Guiding Global Software Development Projects using Scrum and Agile with Quality Assurance”, IEEE-CS Conference on Software Engineering Education and Training (CSEE&T), ISBN: 978-1-4577-0349-2, May 2011, pp. 274 – 283.
[2] Demetrios Sarantis, Yannis Charalabidis and Dimitris Askounis, “A Goal Oriented and Knowledge Based eGovernment Project Management Platform”, IEEE 43rd Hawaii International Conference on System Sciences (HICSS), ISBN: 978-1-4244-5509-6, January 2010, pp. 1 – 13.
[3] Carstens, D. S., Richardson, G. L., & Smith, R. B. “Project management tools and techniques: A practical guide” CRC Press, 2016.
[4] Lock, D. “Project Management”, Gower Publishing, Eighth edition, 2003.
[5] Tuman, G.J.”Development and implementation of effective project management information and control systems”, in Cleland, D.I. & King, W.R. (eds.) Project management handbook. New York: Van Nostrand Reinhold Co., 495-532, 1983.
[6] Turner, J.R “The handbook of project-based management: improving the processes for achieving strategic objectives”, 2nd ed. London : McGraw-Hill, 1999.
[7] Wideman, R.M. “Project Management Body of Knowledge”, Project Management Institute, Upper Darby, PA, Glossary of Terms, 22, 1987.
[8] Capers Jones, “Software Project Management Practices: Failure versus Success”, Crosstalk – The Journal of Defense Software Engineering, Oct 2004.
[9] Margo Visitacion, "Project Portfolio Management", Forrester’s Ultimate Consumer Panel, March 13, 2006.
[10] Kastor A. and Sirakoulis, K. , “The effectiveness of resource levelling tools for resource constraint project scheduling problem”, International Journal of Project Management, doi:10.1016/j.ijproman.2008.08.006., 2008.
Citation
Bindia Tarika, "Review on Project Management Tools," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.102-106, 2020.
Improving Efficiency of Dust Removal from Surfaces to Maximize Output of Photovoltaic Cells
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.107-114, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.107114
Abstract
The series of experiments documented in this paper was aimed at determining, analyzing and comparing different solar panel cleaning systems. Output in all experiments was measured in terms of Potential Difference, Current and Power. Readings were taken under three circumstances: (i) when the solar panel was clean, (ii) when a measured amount of material was deposited on it, and (iii) after cleaning action was performed. It was observed and concluded through performed experiments that (i) Of materials used (talcum, dust, sawdust, and leaves), dust was most difficult to remove and led to a maximum drop in the overall output of solar panel after cleaning action was performed, (ii)Dust particles are charged in nature and stick to solar panel screens, rendering current mechanical cleaning methods inefficient, and (iii) Electrodynamic sheet comprising of Indium Tin Oxide improved efficiency to up to 98% whereas other methods witnessed a power drop to a maximum of 25% of original power output, making it better than mechanical cleaning methods by a significant margin.
Key-Words / Index Term
Photovoltaic Cells, Dust Removal Efficiency, Mechanical Cleaning of Solar Panels, Electrodynamic Sheet, Indium Tin Oxide
References
[1] M. K. Mazumder, R. Sharma, A. S. Biris, J. Zhang, C. Calle & M. Zahn.,”Self-Cleaning Transparent Dust Shields for Protecting Solar Panels and Other Devices. Particulate Science and Technology”; 2007.
[2] Calle CI, McFall JL, Buhler CR, et al. “Dust particle removal by electrostatic and dielectrophoretic forces with applications to NASA exploration missions” Proceedings of the ESA annual meeting on electrostatics, Paper O1; 2008.
[3] Jones, TB., Electromechanics of Particles, Cambridge University Press, Cambridge, 1995
Citation
Sancia Sehdev, Manya Gureja, Mandeep Sukhija, "Improving Efficiency of Dust Removal from Surfaces to Maximize Output of Photovoltaic Cells," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.107-114, 2020.