An Advanced Intelligent Tourist Guide
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.70-73, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.7073
Abstract
A recommendation system is more important and helpful in both research and industry. This paper first examines the method of travel sequence recommendation. The proposed methodology is to design a system based on user’s point of interests. The whole procedure comprise of following: Pages are accessible to the users based on Google API. Based on the point of interest, all the results are retrieved. The proposed methodology is implemented using Google API keys to find places according to user’s point of interests. Three places API used here are place search, place text search and place details API. The technique is tried on self-made database comprising of user information, user’s feedback, country, state and city, spot and spot types. In this website, user can give feedback for the previously visited places
Key-Words / Index Term
Google API, Point of Interest, Recommendation
References
[1] V. W. Zheng, Y. Zheng, X. Xie, and Q. Yang, “Collaborative location and activity recommendations with GPS history data,” in Proc. 19th Int. Conf. World Wide Web , 2010, pp. 1029–1038. ,https://doi.org/10.1145/1772690.1772795.
[2] H. Yin, C. Wang, N. Yu, and L. Zhang, “Trip mining and recommendation from geo-tagged photos,” in Proc. IEEE Int. Conf. Multimedia Expo Workshops, 2012, pp. 540–545.
[3] AkshithaSivakumar and B Prabadevi, “Tour Recommendation Guide- Personalized travel sequence recommendation” in IOP Con- ference Series: Material Science and Engineering, vol. 263, Com- putation and Information Technology, 2017.
[4] Zahra Farzanyar and Nick Cercone, “Trip Pattern Mining Using Large Scale Geo-tagged Photos” in International Conference on Computer and Information Science and Technology, Paper no. 113, May 12, 2015.
[5] Y.Gao, J. Tang, R. Hong, Q. Dai, T. Chua, and R. Jain, “W2go: A travel guidance system by automatic landmark ranking,” in Proc. Int.Conf. Multimedia, 2010, pp. 123-132.
[6] Quan Yuan, Gao Cong, Aixin Sun School Of Computer Engineering, Nanyang Technological University, Singapore 639798, “Graph-based Point-of-interest Recommendation with Geographical and Temporal Influences”.
[7] T. Kurashima, T. Tezuka, and K. Tanaka, “Mining and visualizing local experiences from blog entries,” in Database and Expert Sys- tems Applications. New York, NY, USA: Springer, 2006, pp. 213– 222.
[8] Shuhui Jiang, XuemingQian, Member, IEEE, Tao Mei, Senior Member, IEEE and Yun Fu, Senior Member, IEEE “Personalized Travel Sequence Recommendation on Multi-Source Big Social Media” IEEE TRANSACTIONS ON BIG DATA, VOL. 2, NO. 1, JANUARY-MARCH 2016.
[9] H. Huang and G. Gartner, “Using trajectories for collaborative fil- tering–based POI recommendation,” Int. J. Data Mining, Modelling Manage., vol. 6, no. 4, pp. 333–346, 2014.
[10] P. Lou, G. Zhao, X. Qian, H. Wang, and X. Hou, “Schedule a rich sentimental travel via sentimental POI mining and recommenda-tion,” in Proc. 20th ACM Int. Conf. Multimedia Big Data, 2016, pp.33–40.
[11] Jie Bao, Yu Zheng, David Wilkie and Mohamed Mokbel “Recommendations in Location-based Social Networks: A Survey, Geoinformatica, 6 February 2015.
[12] Jiang Shuhui, Qian Xueming, Shen Jialie, Fu Yun and Mei Tao 2015, “Model- Based Collaborative Filtering for Personalized POI Recommendations” IEEE Trans. Multimedia 17 907-918.
Citation
R.H. Joshi, B.D. Deshpande, D.M. Gohane, R.S. Gautam, "An Advanced Intelligent Tourist Guide," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.70-73, 2020.
Implementation of College Management System
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.74-77, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.7477
Abstract
College Management System is an automated version of student management system. The modules that are managed in this college management system are student personal details, student academic details, student exam result details. These are managed by an administrator. In this college management system the administrator side is designed a web panel with web scraping, where as the student side is designed as Android app. College Management System as categorize into different modules. The following modules are Andhra University Student exam results automation, Certificate Vault designed for both admin and student as web application and Android app, Student complete profile/academic details along with digital study resources.
Key-Words / Index Term
Automated, Web Panel, Web Scraping, Android App, Digital study resources
References
[1] Ed Burnette , “Hello android Introducing Google`s Mobile Development Platform”, pp: 30-41, 178-192, ISBN: 10: 1-934356-56-5.
[2] Ashoke Kumar S, “Mastering Firebase for Android Development”, pp: 10-35, 70-75, ISBN: 9781788624251.
[3] Dawn Griffiths, “David Griffiths, Head first Kotlin: a brain-friendly guide”, pp: 300-308, ISBN: 9781491996669.
Citation
A. Suraj Kumar, Y. Naga Surya Kiran, P. Sirisha, CH. Srinivas, Sheik Gousia Begum, "Implementation of College Management System," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.74-77, 2020.
Survey on Customer Relationship Management Analytics
Survey Paper | Journal Paper
Vol.8 , Issue.5 , pp.78-85, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.7885
Abstract
With a rapidly growing customer base, it has become increasingly difficult for companies to manage and understand customer data, even with the assistance of Customer Relationship Management (CRM) platforms. The vast progress achieved in the field of Data Analytics has made it possible to extract meaningful information from raw customer data efficiently, using which well-informed decisions can be made to enhance customer relationships. This paper discusses the power of Data Analytics and CRM platforms working in unison, known as CRM Analytics. It covers the various applications of CRM Analytics and the key data mining techniques used by business organizations. A comparison between top CRM platforms is carried out and a case study on the latest cloud-based Salesforce CRM platform is presented
Key-Words / Index Term
CRM, Data Science, Data Analytics, CRM Analytics, Data Mining, Predictive Modeling, Salesforce
References
[1] Elgendy, N., & Elragal, A. (2014, July). Big data analytics: a literature review paper. In Industrial Conference on Data Mining (pp. 214-227). Springer, Cham.
[2] Sudhamsetti.Naveen, M.Venkataramana ,” Customer Relationship Management: Overview &Emerging Principles&Emerging Principles “, International Journal of Scientific and Research Publications, Volume 4, Issue 5, May 2014
[3] Bahari, T. F., & Elayidom, M. S. (2015). An efficient CRM-data mining framework for the prediction of customer behaviour. Procedia computer science, 46, 725-731.
[4] Maheswari, R. U., Mahesan, S. S., Tamilarasan, D., & Subramani, A. K. (2014). Role of data mining in CRM. International Journal of Engineering Research, 3(2), 75-78.
[5] Heni Bouhamed, "Covid-19 Cases and Recovery Previsions with Deep Learning Nested Sequence Prediction Models with Long Short-Term Memory (LSTM) Architecture," International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.2, pp.10-15, 2020
[6] Gončarovs, P. (2017). Data analytics in crm processes: A literature review. Information Technology and Management Science, 20(1), 103-108.
[7] Mujawar, S., & Joshi, A. (2015). Data analytics types, tools and their comparison. International Journal of Advanced Research in Computer and Communication Engineering, 4(2).
[8] Choudhury, M. M., & Harrigan, P. (2014). CRM to social CRM: the integration of new technologies into customer relationship management. Journal of Strategic Marketing, 22(2), 149-176.
[9] Mujitaba A. Tangaza, TijjaniMuhammad, & Baba Ali Ashemi, “A Literature Review of Customer Relationship Management from 2010 To 2014”, International Journal of Arts, Humanities and Management Studies Volume 04, No. 07, July 2018
[10] Prabha, D., & Subramanian, R. S. (2017, January). A survey on customer relationship management. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 1-5). IEEE.
[11] Stefanou, C. J., Sarmaniotis, C., & Stafyla, A. (2003). CRM and customer‐centric knowledge management: an empirical research. Business Process Management Journal.
[12] Torggler, M. (2009). The functionality and usage of CRM systems. environment, 41, 30-47.
[13] RumaPanda , Dr. A. N. Nandakumar, “A Survey of Customer Relationship Management”, International Journal of Innovative Research in Computer and Communication Engineering
[14] Baird, C. H., & Parasnis, G. (2011). From social media to Social CRM: reinventing the customer relationship. Strategy & Leadership.1087-8572
[15] Rababah, K., Mohd, H., & Ibrahim, H. (2011). Customer relationship management (CRM) processes from theory to practice: The pre-implementation plan of CRM system. International Journal of e-Education, e-Business, e-Management and e-Learning, 1(1), 22-27.
[16] Saha, L., Sahoo, L., & Routray, S. K. (2017). Survey on CRM Analytics in Telecommunication Industry. International Journal of Computer Trends and Technology (IJCTT), 45(1), 21-27.
[17] Farnaz Arab, Harihodin Selamat, Suhaimi Ibrahim, and Mazdak Zamani,” A Survey of Success Factors for CRM “,Proceedings of the World Congress on Engineering and Computer Science 2010 Vol II WCECS 2010, October 20-22, 2010
[18] Anshari, M., Almunawar, M. N., Lim, S. A., & Al-Mudimigh, A. (2019). Customer relationship management and big data enabled: Personalization & customization of services. Applied Computing and Informatics, 15(2), 94-101.
[19] Zerbino, P., Aloini, D., Dulmin, R., & Mininno, V. (2018). Big Data-enabled customer relationship management: A holistic approach. Information Processing & Management, 54(5), 818-846.
[20] Dursun, A., & Caber, M. (2016). Using data mining techniques for profiling profitable hotel customers: An application of RFM analysis. Tourism management perspectives, 18, 153-160.
[21] Han, J., Kamber, M., & Pei, J. (2011). Data mining concepts and techniques third edition. Morgan Kaufmann.
[22] Lin, K. W., & Chung, S. H. (2015). A fast and resource efficient mining algorithm for discovering frequent patterns in distributed computing environments. Future generation computer systems, 52, 49-58.
[23] Rakesh Kumar Saini, "Data Mining tools and challenges for current market trends-A Review," International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.2, pp.11-14, 2019
[24] Alok Singh Chauhan , "Enhancing Academic Decision making at Higher Educational Institutions using Classification and Clustering Techniques," International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.2, pp.39-44, 2020
[25] S. Janakiraman, K. Umamaheswari”A Survey on Data Mining Techniques for Customer Relationship Management”.
[26] M. Kasthuri,V. Shanthi, and E. Manigandan, “Customizing Clustering algorithm for Data mining in CRM”, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol.6, No.2, Mar- April 2016.
[27] Rohit Yadav, Dr. Jyoti Kharade,” Survey of Data Mining Tools and Techniques for Customer Relationship Management (CRM)”, International Journal for Research in Applied Science & Engineering Technology (IJRASET)
[28] Krishna, G. J., & Ravi, V. (2016). Evolutionary computing applied to customer relationship management: A survey. Engineering Applications of Artificial Intelligence, 56, 30-59.
[29] Wei, J. T., Lee, M. C., Chen, H. K., & Wu, H. H. (2013). Customer relationship management in the hairdressing industry: An application of data mining techniques. Expert Systems with Applications, 40(18), 7513-7518.
[30] Namrata Ghuse, Pranali Pawar, Amol Potgantwar, "An Improved Approch For Fraud Detection In Health Insurance Using Data Mining Techniques," International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.27-33, 2017
[31] Glazunova, E. Z., & Kovelskiy, V. V. Comparative Analysis of CRM-systems.
[32] Liu, W., Wang, Z., & Zhao, H. (2020). Comparative study of customer relationship management research from East Asia, North America and Europe: A bibliometric overview. Electronic Markets, 1-23.
[33] Starzyczná, H., Pellešová, P., & Stoklasa, M. (2017). The comparison of customer relationship management (CRM) in Czech small and medium enterprises according to selected characteristics in the years 2015, 2010 and 2005. Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 65(5), 1767-1777.
[34] De Madariaga, J. G. (2004). Customer relationship management (CRM): A comparative study between USA and Spain. Journal of International Information Management, 13(2), 2
[35] Kumar, Rakesh & Sharma, Yougeshwary & Agarwal, Sonu & Pragya, & Parashar, Bhanu. (2014). Extremely effective CRM Solution Using Salesforce. 10.13140/2.1.2519.9047.
[36] Rakesh Kumar, Kanishk Jain, Hitesh Maharwal, Neha Jain, Anjali Dadhich” Apache CloudStack: Open Source Infrastructure as a Service Cloud Computing Platform” IJAETMAS, Vol.1, Issue.2, July-2014, pg. 111-116; ISSN: 2349-3224.
[37] Rakesh Kumar, Neha Gupta, Shilpi Charu, Sunil Kumar Jangir ”Architectural Paradigms of Big Data”; National Conference on Innovation in Wireless Communication and Networking Technology - 2014;
Citation
Varun Vijayanand M., Deepamala N., "Survey on Customer Relationship Management Analytics," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.78-85, 2020.
A Survey on Cloud Computing Providers and Applications
Survey Paper | Journal Paper
Vol.8 , Issue.5 , pp.86-93, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.8693
Abstract
One of the most dominant technologies of today is cloud computing. This dominance is due to its potential to reduce costs while providing the services that are needed to carry out any business more efficiently and effectively. Cloud computing can be deployed universally in very little time. It offers flexibility as well as agility. This paper reviews the features and models of cloud computing. The different models of cloud are discussed in detail and comparison between them is used to understand the functionality and use of each. This paper also provides a comparison between the major cloud computing service providers. The three main cloud providers Amazon, Google, and Microsoft are compared against various features. This helps to understand the services and benefits of each provider. It also includes an overview of the challenges and limitations faced in the field of cloud computing and also the current scope of its application in various industries
Key-Words / Index Term
Cloud computing, Comparison, Challenges, Applications
References
[1] S.O. Kuyoro, F. Ibikunle, and O. Awodele, “Cloud computing security issues and challenges”, International Journal of Computer Networks, Vol. 3, No.5, pp. 247-255,2011.
[2] P. Srivastava, R. Khan, “A review paper on cloud computing”, International Journals of Advanced Research in Computer Science and Software Engineering, Vol. 8, No.6, pp. 17-20,2018.
[3] Y. Jadeja and K. Modi, “Cloud computing-concepts, architecture and challenges”. In 2012 International Conference on Computing, Electronics and Electrical Technologies , India , pp. 877-880,2012.
[4] P. Singh and E.A. Jain, “Survey paper on cloud computing”, International Journal of Innovations in Engineering and Technology, Vol. 3, No.4, pp. 84-89,2014.
[5] P. Kavya and E.D. Kavyashree, “Survey on cloud computing”, Journal of Computer Science and Engineering, Vol. 2, No.1, pp. 1-6,2017.
[6] M. Haris and R.Z. Khan, “A systematic review on cloud computing”, International Journal of Computer Sciences and Engineering, Vol. 6, No.11, pp. 632-639,2018.
[7] R. Piplode, P. Sharma and U.K. Singh, “Study of Threats, Risk and Challenges in Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 1, No.1, pp. 26-30,2013.
[8] M.O. Ahmad and R.Z. Khan, “The cloud computing: a systematic review”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, No.5, pp. 4060-4075,2015.
[9] S. Chhabra and V.S. Dixit, “Cloud computing: state of the art and security issues”, ACM SIGSOFT Software Engineering Notes, Vol. 40, No.2, pp. 1-11,2015.
[10] K. Kaur, “A review of cloud computing service models”, International Journal of Computer Applications, Vol. 140, No.7, pp. 15-18,2016.
[11] S. Patidar, D. Rane and P. Jain, “A survey paper on cloud computing”. In the Proceedings of the 2012 Second International Conference on Advanced Computing & Communication Technologies, India, pp. 394-398,2012.
[12] S. Sharma and S. Khan, “Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)”, International Journal of Scientific Research in Network Security and Communication, Vol. 7, No. 1, pp. 13-15,2019.
[13] S.K. Sowmya, P. Deepika and J. Naren, “Layers of cloud–iaas, paas, and saas: A survey”, International Journal of Computer Science and Information Technologies, Vol. 5, No.3, pp. 4477-4480,2014.
[14] L. Mohan, R. Pandey, S. Bisht and J. Pant, “A comparative study on SaaS, PaaS and IaaS Cloud Delivery Models in Cloud Computing”, International Journal on Emerging Technologies-NCETST, Vol. 8, No.1, pp. 158-160,2017.
[15] S. Bhardwaj, L. Jain and S. Jain, “Cloud computing: a study of infrastructure as a service (IAAS)”, International Journal of engineering and information Technology, Vol. 2, No.1, pp. 60-63, 2010.
[16] W. Dawoud, I. Takouna and C. Meinel, “Infrastructure as a service security: challenges and solutions”, In the Proceedings of the 7th International Conference on Informatics and Systems, Egypt, pp. 1-8, 2010.
[17] S. Bankar, "Cloud computing using Amazon Web Services (AWS)”, International Journal of Trend in Scientific Research and Development, Vol. 2, No.4, pp. 2156-2157,2018.
[18] S. Narula, A. Jain and Prachi, "Cloud computing security: Amazon Web Service", In the Proceedings of the 2015 Fifth International Conference on Advanced Computing & Communication Technologies, India, pp. 501-505,2015.
[19] G. Carutasu, M.A. Botezatu, C. Botezatu and M. Pirnau, “Cloud computing and Windows Azure”, In the Proceedings of the 2016 8th International Conference on Electronics, Computers and Artificial Intelligence, Romania, pp. 1-6,2016.
[20] N.M. Turab, A.A. Taleb and S.R. Masadeh, “Cloud computing challenges and solutions”, International Journal of Computer Networks & Communications, Vol. 5, No.5, pp. 209-216 ,2013.
[21] S. Bharti and N. Singh, “Load balancing issues and its solution in cloud computing: a review”, International Journal of Computers & Technology, Vol. 14, No.6, pp. 5803-5808,2015.
[22] S.G. Patel and S.D. Panchal, “QoS Parameters for Cloud Using Swarm Optimization Dynamic Load Balancing Algorithm”, International Journal of Scientific Research in Network Security and Communication, Vol. 7, No. 3, pp. 33-39,2019.
[23] P. Kumar and R.Kumar, “Issues and challenges of load balancing techniques in cloud computing: a survey”, ACM Computing Surveys, Vol. 51, No.6, pp. 1-35,2019.
[24] D. Puthal, B.P. Sahoo, S. Mishra and S. Swain, “Cloud computing features, issues, and challenges: a big picture”, In the Proceedings of the 2015 International Conference on Computational Intelligence and Networks, India, pp. 116-123,2015.
[25] P.S. Saluja and U. Dwivedi, “Survey paper on cloud computing: issues, challenges and outcomes”, IJCA Proceedings on National Conference on Contemporary Computing, Vol. NCCC 2016, No.3, pp. 8-10,2017.
[26] N. Bishnoi and A. Sehrawat, “Cloud: a new generation”, International Journal of Emerging Technologies in Computational and Applied Sciences, Vol. 4, No.4, pp. 430-437,2013.
[27] T. Desai, R. Patel and P. Patel, ”Cloud computing in education sector”, International Journal for Innovative Research in Science & Technology, Vol. 2, No.10, pp. 191-194,2016.
[28] S. Rajesh, “Analysis of Security in Cloud–Learning systems”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 5, No.1, pp. 36-40,2017.
[29] V.K. Choudhary, “Cloud computing and its applications: a review”, International Journal of Emerging Trends & Technology in Computer Science, Vol. 5, No. 4, pp. 20-27,2016.
Citation
Sukriti Yadav, Rakshith H.V., K. Badari Nath, "A Survey on Cloud Computing Providers and Applications," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.86-93, 2020.
Review of Time Series based Anomaly Detection Techniques
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.94-95, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.9495
Abstract
Time series comprise a big portion of real-world data. Time series analysis is one of the most useful tools for researchers and developers. Anomaly detection is one of the key areas of focus in time series. This paper aims to provide a concise and cogent review of the existing research on the topic. In this paper, some widely accepted views and definitions of time series and anomalies are presented. Then, the various methods of anomaly detection in time series are presented, outlining their underlying mechanism, essential features, advantages and drawbacks. Finally, some common trends and observations are summarized, along with a look on the future directions of the research
Key-Words / Index Term
Time series; anomaly detection; multivariate time series; deep learning; statistics
References
[1] Gómez, J.A., Jaraiz, M.D., Vega, M.A. and Sánchez, J.M. (2008). Optimization of Time Series Using Parallel, Adaptive, and Neural Techniques. In Optimization Techniques for Solving Complex Problems (eds A.Y. Zomaya, E. Alba, C. Blum, P. Isasi, C. León and J.A. Gómez). doi:10.1002/9780470411353.ch8
[2] A. Hosseini and M. Sarrafzadeh, "Unsupervised Prediction of Negative Health Events Ahead of Time," 2019 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI), Chicago, IL, USA, 2019, pp. 1-4.
[3] K. Golmohammadi and O. R. Zaiane, "Time series contextual anomaly detection for detecting market manipulation in stock market," 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA), Paris, 2015, pp. 1-10.
[4] Z. Ferdousi and A. Maeda, "Unsupervised Outlier Detection in Time Series Data," 22nd International Conference on Data Engineering Workshops (ICDEW`06), Atlanta, GA, USA, 2006, pp. x121-x121.
[5] L. Wei, E. Keogh and X. Xi, "SAXually Explicit Images: Finding Unusual Shapes," Sixth International Conference on Data Mining (ICDM`06), Hong Kong, 2006, pp. 711-720.
[6] H. Wu, "A survey of research on anomaly detection for time series," 2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, 2016, pp. 426-431.
[7] V. l. Gorokhov and D. V. Kholodnyak, "Nonparametric statistics in multivariate time series for cognitive anomaly detection," 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM), St. Petersburg, 2016, pp. 435-436.
[8] Whitehead. B, Hoyt. W. A, “Function approximation approach to anomaly detection in propulsion system test data”, Journal of Propulsion and Power, vol.11, no.5, pp. 1074-1076, May, 2015.
[9] Hawkins D.M. (1980) Introduction. In: Identification of Outliers. Monographs on Applied Probability and Statistics. Springer, Dordrecht
[10] Ruts. I, Rousseeuw.P, “Computing depth contours of bivariate point clouds”, Computational statistics and data analysis, Vol.23, No.1, pp.153-168, Jan, 1996
[11] Diheng Qu et al., "Statistical anomaly detection for link-state routing protocols," Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256), Austin, TX, USA, 1998, pp. 62-70.
[12] Knorr. E. M, Ng. R. T, “A unified notion of outliers: properties and computation”, Proceeding of the 3rd international conference on knowledge discovery and
data mining, Newport Beach, pp.219-222, Aug, 1997.
[13] Ramaswamy. S, Rastogi. R, Shim. K, “Efficient algorithms for mining outliers from large data sets”, Proceeding of the 2000 ACM SIGMOD international conference on management of data, New York, pp. 427-438, Jul, 2000.
[14] Dazhuo Zhou, “Clustering, similarity search and outlier detection in multivariate time series”, Tianjing University, Tianjing, 2008.
[15] Breunig, Markus M., et al. "LOF: identifying density-based local outliers." Proceedings of the 2000 ACM SIGMOD international conference on Management of data. 2000.
[16] Agyemang. M, Ezeife. C. I, “Large scale Mine. Algorithm for mining local outliers”, Proceeding of the 15th information resource management association international conference, New Orleans, pp.5-8, Apr, 2004.
[17] Papadimitriou. S, Kitagawa. H, Gibbons. P. B, “LOCI fast outlier detection using the local correlation ingral”, Technical report, pp.2-9, 2002.
[18] Hardin. J, Rocke. D. M, “Outlier detection in the multiple cluster Setting using the minimum covariance determinant estimator”, Computational Statistics and Data Analysis, Vol.44, No.4, pp.625-638, Apr, 2004.
[19] A. Jerome, T. Ishii and H. Chen, "Forecasting and Anomaly Detection on Application Metrics using LSTM," 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 2018, pp. 2221-2227.
[20] S. Hochreiter and J. Schmidhuber. “Long Short-Term Memory,” Neural Computation 9, 8 November 1997, 1735-1780.
[21] J. Shi, G. He and X. Liu, "Anomaly Detection for Key Performance Indicators Through Machine Learning," 2018 International Conference on Network Infrastructure and Digital Content (IC-NIDC), Guiyang, 2018, pp. 1-5.
[22] C. Feng, T. Li and D. Chana, "Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks," 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, 2017, pp. 261-272.
[23] T. Ergen and M. Kerpiççi, "A novel anomaly detection approach based on neural networks," 2018 26th Signal Processing and Communications Applications Conference (SIU), Izmir, 2018, pp. 1-4.
[24] J. Ma and S. Perkins, "Time-series novelty detection using one-class support vector machines," Proceedings of the International Joint Conference on Neural Networks, 2003., Portland, OR, 2003, pp. 1741-1745 vol.3.
[25] R. Madan and P. S. Mangipudi, "Predicting Computer Network Traffic: A Time Series Forecasting Approach Using DWT, ARIMA and RNN," 2018 Eleventh International Conference on Contemporary Computing (IC3), Noida, 2018, pp. 1-5.
[26] A. Nanduri and L. Sherry, "Anomaly detection in aircraft data using Recurrent Neural Networks (RNN)," 2016 Integrated Communications Navigation and Surveillance (ICNS), Herndon, VA, 2016, pp. 5C2-1-5C2-8.
[27] Asoke K. Nandi; Hosameldin Ahmed, "Decision Trees and Random Forests," in Condition Monitoring with Vibration Signals: Compressive Sampling and Learning Algorithms for Rotating Machines , IEEE, 2019, pp.199-224
[28] C. Pelletier, S. Valero, J. Inglada, G. Dedieu and N. Champion, "New iterative learning strategy to improve classification systems by using outlier detection techniques," 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, 2017, pp. 3676-3679.
[29] T. Radivilova, L. Kirichenko, D. Ageiev and V. Bulakh, "Classification Methods of Machine Learning to Detect DDoS Attacks," 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Metz, France, 2019, pp. 207-210
[30] S. D. D. Anton, S. Sinha and H. Dieter Schotten, "Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests," 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 2019, pp. 1-6.
[31] P. Yang and B. Huang, "KNN Based Outlier Detection Algorithm in Large Dataset," 2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing, Shanghai, 2008, pp. 611-613.
[32] T. T. Dang, H. Y. T. Ngan and W. Liu, "Distance-based k-nearest neighbors outlier detection method in large-scale traffic data," 2015 IEEE International Conference on Digital Signal Processing (DSP), Singapore, 2015, pp. 507-510.
[33] Asniar and K. Surendro, "Using data science for detecting outliers with k Nearest Neighbors graph," 2014 International Conference on ICT For Smart Society (ICISS), Bandung, 2014, pp. 300-304.
[34] L. Cai, N. F. Thornhill, S. Kuenzel and B. C. Pal, "Real-Time Detection of Power System Disturbances Based on k -Nearest Neighbor Analysis," in IEEE Access, vol. 5, pp. 5631-5639, 2017.
[35] D. Liu, J. Pang, B. Xu, Z. Liu, J. Zhou and G. Zhang, "Satellite Telemetry Data Anomaly Detection with Hybrid Similarity Measures," 2017 International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC), Shanghai, 2017, pp. 591-596.
[36] PC Mahalanobis, “On the generalised distance in statistics”, Proceedings of the National Institute of Sciences of India, 2, 49-55, 1936
[37] R. De Maesschalck, D. Jouan-Rimbaud, D.L. Massart, “The Mahalanobis distance”, Chemometrics and Intelligent Laboratory Systems, Volume 50, Issue 1, 2000, Pages 1-18, ISSN 0169-7439
[38] A. Abid, A. Kachouri, A. Ben Fradj Guiloufi, A. Mahfoudhi, N. Nasri and M. Abid, "Centralized KNN anomaly detector for WSN," 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), Mahdia, 2015, pp. 1-4.
[39] J. Kao and J. Jiang, "Anomaly Detection for Univariate Time Series with Statistics and Deep Learning," 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE), Yunlin, Taiwan, 2019, pp. 404-407.
[40] T. Kieu, B. Yang and C. S. Jensen, "Outlier Detection for Multidimensional Time Series Using Deep Neural Networks," 2018 19th IEEE International Conference on Mobile Data Management (MDM), Aalborg, 2018, pp. 125-134.
[41] M.A. Kramer, “Nonlinear principal component analysis using autoassociative neural networks”, AIChE Journal, 1991, 37: 233-243. doi:10.1002/aic.690370209
[42] M. Munir, S. A. Siddiqui, A. Dengel and S. Ahmed, "DeepAnT: A Deep Learning Approach for Unsupervised Anomaly Detection in Time Series," in IEEE Access, vol. 7, pp. 1991-2005, 2019.
[43] Chandola. V, “Anomaly detection for symbolic sequences and time series data”, The University of Minnesota, Minnesota, 2009.
[44] Naoya. T, Takehisa. Y, "Anomaly detection from multivariate time series with sparse representation", Proceeding of IEEE International Conference on Systems, Man and Cybernetics, San Diego, pp.2651-2656, Oct, 2014.
[45] Namrata Ghuse, Pranali Pawar, Amol Potgantwar, "An Improved Approch For Fraud Detection In Health Insurance Using Data Mining Techniques," International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.27-33, 2017
[46] R. Satraboyina, GK. Chakravarthi, "Discovery of Ranking Fraud Detection System for Mobile Apps", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.4, pp.7-10, 2016
[47] Priyanka R.R., Mahesh M., Pallavi S.S., Jayapala G., Pooja M.R., "Crop Protection by an alert Based System using Deep Learning Concept", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.6, pp.47-49, 2018
[48] N. SelvaKumar, M. Rohini, C. Narmada, M. Yogeshprabhu, "Network Traffic Control Using AI," International Journal of Scientific Research in Network Security and Communication, Vol.8, Issue.2, pp.13-21, 2020
Citation
Raghavendran R., Chaitra B.H., "Review of Time Series based Anomaly Detection Techniques," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.94-95, 2020.
Prediction of Polysemous Words in Sentiment Analysis: A Review
Review Paper | Journal Paper
Vol.8 , Issue.5 , pp.100-104, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.100104
Abstract
In the last some years, new methods of communication channels have appeared and become indifferent. These communication channels are the social networking sites which have experienced an exponential growth. During the translation or communication, the problem of polysemy may cause difficulties. Therefore, there is a dire need for sentiment analysis process which can automatically extract and detect the sentiments of data extracted from micro blogging sites. It requires efficient techniques to collect a large amount of social media data and extract meaningful information from them. This paper presents a document level lexicon-based approach to detect the sentiment polarity. So, we focused on pre-processing of data. Instead of removing all polysemy, it includes some polysemous words in the complete procedure of sentiment analysis. We use specific number of polysemy words there but in future we will focus on different words and enhance the accuracy of our documentation.
Key-Words / Index Term
Sentiment Analysis, polysemy, polarity, wordnet
References
[1] Udaya Raj Dhungana1, Subarna Shakya, Kabita Baral and Bharat Sharma (2014),” Word Sense Dissambiguation using WSD specific WordNet of Polysemy Words,” in International Journal on Natural Language Computing (IJNLC).
[2] Rice, D. R., & Zorn, C. (2013). Corpus-based dictionaries for sentiment analysis of specialized vocabularies. Proceedings of NDATAD, 98-115.
[3] M. Sinha, M. K. Reddy, P. Bhattacharyya, P. Pandey, and L. Kashyap, “Hindi word sense disambiguation,” Master’s thesis, Indian Institute of Technology Bombay, Mumbai, India, 2004.
[4] U. R. Dhungana and S. Shakya, “Word sense disambiguation in nepali language,” in The Fourth International Conference on Digital Information and Communication Technology and Its Application (DICTAP2014), Bangkok, Thailand, 2014, pp. 46–50.
[5] M. E. Lesk, “Automatic sense disambiguation using machine readable dictionaries: How to tell a pine cone from an ice cream cone,” in SIGDOC Conference, Toronto, Ontario, Canada, 1986.
[6] Kaur, J. (2016). A Review Paper on Twitter Sentiment Analysis Techniques. In International Journal for Research in Applied Science & Engineering Technology (IJRASET) (Vol. 4, No. 2016).
[7] Yih-Jeng LIN, Ming-Shing YU and Chin-Yu LIN (2010), A Combined Approach to the Polysemy Problems in a Chinese to Taiwanese TTS System, National Chung-Hsing University, Taichung. IEEE.
[9] Chauhan, C., & Sehgal, S. (2017, May). Sentiment analysis on product reviews. In Computing, Communication and Automation (ICCCA), 2017 International Conference on (pp. 26-31). IEEE.
[10] Astya, P. (2017, May). Sentiment analysis: Approaches and open issues. In Computing, Communication and Automation (ICCCA), 2017 International Conference on (pp. 154-158). IEEE.
[11] Kolkur, S., Dantal, G., & Mahe, R. (2015). Study of different levels for sentiment analysis. International Journal of Current Engineering and Technology, 5(2), 768Ű770.
[12] Ram, K.S.K., Araballi, S., BR, S., Shobha, G. (2014, December). Sentiment Analysis of Twitter Data. In International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) (Vol. 3 Issue 12, December 2014)
[13] Xiaohui Yu,Yang Liu, Jimmy Xiangji Huang, and Aijun An,,” Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain”, IEEE Trans.On knowledge and data engineering, vol. 24, no. 4, April 2012.
[14] Bhuta, S., Doshi, A., Doshi, U., & Narvekar, M. (2014, February). A review of techniques for sentiment analysis Of Twitter data. In Issues and challenges in intelligent computing techniques (ICICT), 2014 international conference on (pp. 583-591). IEEE.
[15] Mandal, S., & Gupta, S. (2016, December). A Lexicon-based text classification model to analyse and predict sentiments from online reviews. In Computer, Electrical & Communication Engineering (ICCECE), 2016 International Conference on (pp. 1-7). IEEE.
[16] Andrey Kapitanov, Ilona Kapitanova, Vladimir Troyanovskiy, Vladimir Ilyushechkin, Ekaterina Dorogova (2019), Clustering of Word Contexts as a Method of Eliminating Polysemy of Words, National Research University of Electronic Technology, Zelenograd, Moscow, Russia, IEEE.
[17] Mehto, A., & Indras, K. (2016, March). Data mining through sentiment analysis: Lexicon based sentiment analysis model using aspect catalogue. In Colossal Data Analysis and Networking (CDAN), Symposium on (pp. 1-7). IEEE.
[18] Pang, B., & Lee, L. (2008). Opinion mining and sentiment analysis. Foundations and Trends® in Information Retrieval, 2(1–2), 1-135.
[19] Shahare, F. F. (2017, June). Sentiment analysis for the news data based on the social media. In Intelligent Computing and Control Systems (ICICCS), 2017 International Conference on (pp. 1365-1370). IEEE.
[20] Ramteke, J., Shah, S., Godhia, D., & Shaikh, A. (2016, August). Election result prediction using Twitter sentiment analysis. In Inventive Computation Technologies (ICICT), International Conference on (Vol. 1, pp. 1-5). IEEE.
[21] Jain, A. P., & Dandannavar, P. (2016, July). Application of machine learning techniques to sentiment analysis. In Applied and Theoretical Computing and Communication Technology (iCATccT), 2016 2nd International Conference on (pp. 628-632). IEEE.
[22] Bhoir, P., & Kolte, S. (2015, December). Sentiment analysis of movie reviews using lexicon approach. In Computational Intelligence and Computing Research (ICCIC), 2015 IEEE International Conference on (pp. 1-6). IEEE.
Citation
Manisha Malik, Neetu Verma, "Prediction of Polysemous Words in Sentiment Analysis: A Review," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.100-104, 2020.
Information Delivery in Smart Home Automation Through Security Technique
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.105-109, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.105109
Abstract
This project’s motive is to construct a home automation system that uses any mobile device or any electric gadget to control the various home appliances. Smart home automation is very modern and developing field when it uses modern technologies such as Internet of Things (IoT). There are many existing smart home automation systems which includes automatic lights switch on and off, controlling the speed of fan, motion sensors, noise detectors, etc. Most of the electronic appliances which are included in the smart home appliances can be used or manipulated by any user which directly breaches the security of this system. This research mainly deals with the security of the appliances and better performance of the devices installed within the smart home
Key-Words / Index Term
Wi-Fi, HTTP, POST, GET, Raspberry Pi, Smart Home Automation, Security, Hashing, Encryption, Security
References
[1] en.wikipedia.org,” home_automation”
[2] w3schools,” http_methods.ref”
[3] tutorialspoint.com, “php_get_post”
[4] watelectronics.com,” know-all-about-raspberry-pi-board- technology”
[5] smarthome.com,” products-you-should-know-about”
[6] iconlabs.com,” security-smart-home”
[7] en.wikipedia.org,” Secure_Hash_Algoithms”
Citation
Suraj Rasal, Srijan, Vaibhav Kundu, Linika Labdhi, "Information Delivery in Smart Home Automation Through Security Technique," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.105-109, 2020.
Antitheft system for fuel detection using IoT
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.110-116, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.110116
Abstract
IoT has been a great area of research for providing excellence in area of designing smart cities and intelligent sys-tems. Fuel theft from standing vehicles is a major problem which can be very easily resolved using this technique. In this paper we have proposed a system for detection of fuel theft from vehicle using the concept of IoT as well as wireless sensor networks. The method has shown very good results as compared to other state of the art methods
Key-Words / Index Term
IoT, Wireless sensor network, smart homes, Internet protocol
References
[1] Aniket Shinde , Atharva Mane, PurveshSapkale, AmanrajSingh, Jyoti Deshmukh , Prof. FirojMulani ,”Vehicle Fuel Theft Detection Using 89C51, International Journal of Scientific Research and Engineering Development, Vol. 2 ,Issue 2, Mar –Apr 2019.
[2] P. Senthil Raja, B.G.Geetha,” Detection Of Fuel Theft In Heavy Vehicle”, Int J AdvEngg Tech, Vol. 8,Issue 2, April-June,2016, pp.757-765.
[3] M. Saravanan1, T. Krishnapriya, S.R. Lavanya3, P. Karthikeyan, “Fuel Level Indicator For Petrol Bunk Storage Tanks/Oil Industries”, International Research Journal of Engineering and Technology, Vol. 05, Issue: 10, Oct 2018.
[4] Sunil S, Saumya S, “Detection of GSM Based Accident Location, Vehicle Theft and Fuel Theft Using ARM Cortex M-3 Microcon-troller”, International Journal on Future Revolution in Computer Science & Communication Engineering , Vol. 4, Issue-4, April-2018.
[5] Nandini Hiremath , Mrunali Kumbhar1 and Aakriti Singh Pathania, “Embedded system based intelligent digital fuel Gauge”, International Journal of Electronics and Communication (IIJEC), vol. 2,March-April 2016.
Citation
P. Sharma, Komal, Akansha, Rajit, Niharika, "Antitheft system for fuel detection using IoT," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.110-116, 2020.
Real-Time Attendance Management System
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.117-122, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.117122
Abstract
The process of recording/managing attendance has been carried out since many decades. Typical process involves calling out the names of each participant serially which is manually noted down using pen-paper. We propose a secure, parallel, centralised and faster process of attendance management. A mobile application needs to be installed on the stakeholder’s smart phone. The organiser will start the process of attendance which will generate a unique code. The code is shared with the participants (students) which are required to input it on the application. The application will check for the physical presence of the participants using the GPS co-ordinates. The organiser will immediately get the report which is also stored in a central store which can be on premise or on the cloud. This application can also be configured as a SAAS (Software as a Service) offering where multiple organisations can use the same instance of the backend application as the separation is done at the class level
Key-Words / Index Term
GPS, Magic Code, React Native, Spring Boot, Android Application
References
[1] Freya. J. Vora, Pooja. L. Yadav, Rhea. P. Rai, Nikita. M. Yadav, Android Based Mobile Attendance System”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 6, Issue 2, February 2016.
[2]Vishwakarma R Ganesh “Android College Management System”, International Journal of Advanced Research In Computer Engineering & Technology (IJARCET) Volume 5, Issue 4, April 2016
[3] Rakhi Joshi1, V. V. Shete2, S. B. Somani3, “Android Based Smart Learning and Attendance Management System”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 6, June 2015
[4] Unnati A. Patel, Dr. Swaminaraya PriyaR.“Development of a Student Attendance Management System Using RFID and Face Recognition: A Review”, International Journal of Advanced Research in Computer Science and Management Studies, Volume 2, Issue 8, August 2014.
[5] Saurabh Kumar Jain, Uma Joshi, BhupeshKumar Sharma, “Attendance Management System” International School of Informatics and Management Jaipur
[6] M. S. Uddin, S. M. Allayear, N. C. Das, and F. A. Talukder, “A Location-Based Time and Attendance System,” Int. J. Comput. Theory Eng., vol. 6, no. 1, pp. 36–38, 2014.
[7] B. Soewito, F. L. Gaol, E. Simanjuntak, and F. E. Gunawan,
“Attendance system on Android smartphone,” ICCEREC 2015 - Int. Conf. Control. Electron. Renew. Energy Commun., pp. 208–211, 2015.
[8] S. Chandrasekaran and D. N. U. Maheswari, “Overview on Location Tracking For Authentication Using Smartphones,” in 2016 10th International Conference on Intelligent Systems and Control (ISCO), 2016, pp. 1–6.
[9] S. Sultana, A. Enayet, and I. J. Mouri, “A Smart, Location-Based Time and Attendance Tracking System using Android Application,” Int. J. Comput. Sci. Eng. Inf. Technol., vol. 5, no. 1, pp. 01–05, 2015.
[10] N. N. Shahade, P. A. Kawade, and S. L. Thombare, “Student Attendance Tracker System in Android,” Int. J. Eng. Appl. Technol. Student, no. C, pp. 119–124, 2013.
[11] M A Muchtar, Seniman, D. Arisandi, and S. Hashanah, “Attendance Fingerprint Identification System Using Arduino and Single Board Computer,” J. Phys. Conf. Ser., vol. 978, 2018.
[12] B. Soewito and E. W. Marciano Simanjuntak, “Efficiency Optimization of Attendance System With GPS and Biometric Method Using Mobile Devices,” Int. J. Commun. Inf. Technol., vol. 8, no. 1, pp. 5–9, 2014.
[13] B. Geetha and F. A. Ahmad, "Attendance System Using a Mobile Device: Face Recognition, GPS or Both?” Int. J. Adv. Electron. Comput. Sci., vol. 3, no. 8, 2016.
[13]S. Badhe, K. Chaudhari, S. Kale, and T. Mane, “Smart Attendance Management System,” in IJCA Proceedings on National Conference on Advancements in Computer & Information Technology, 2016, vol. 7, pp. 213–231.
[14] I. Ahmad et al., “Current technologies and location-based services,” in 2017 Internet Technologies and Applications (ITA), 2017, pp. 299–304.
[15] S. Badhe, K. Chaudhari, S. Kale, and T. Mane, “Smart Attendance Management System,” in IJCA Proceedings on National Conference on Advancements in Computer & Information Technology, 2016, vol. 7, pp. 213–231.
Citation
B.K. Sushravya, Swathi B., Kavali Meghana, H. Girisha, "Real-Time Attendance Management System," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.117-122, 2020.
Recent Trends in CAPTCHA Security and Bot Challenges
Review Paper | Journal Paper
Vol.8 , Issue.5 , pp.123-127, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.123127
Abstract
CAPTCHA is a security mechanism which is basically used to distinguish between human and bots in automated online systems. Here bot means software robots that are used for brute force attacks or webmail bombarding or DOS attack to the system. CAPTCHA is also useful for protected web services from various types of dynamic attacks every day. Generally, it is seen in online registration form for preventing spam applications. In this paper, we have studied the various types of CAPTCHA like picture CAPTCHA, video CAPTCHA, content CAPTCHA, sound CAPTCHA and their uses in present environments
Key-Words / Index Term
CAPTCHA; Security; Security by Bot Attack
References
[1] Korakakis, M., Magkos, E. and Mylonas, P. (2014): Automated CAPTCHA solving: An empirical comparison of selected techniques, Proceedings - 9th International Workshop on Semantic and Social Media Adaptation and Personalization, SMAP 2014, pp. 44–47.
[2] Barbole, B. A. and Surywanshi, S. (2015): A Survey on to Enhance Security Approach Using Discretized Centralization for CAPTCHA as Graphical Password, International Journal of Science and Research (IJSR), 4(11), pp. 826–830.
[3] Yan, J. and Ahmad, A. S. El (2008): A low-cost attack on a microsoft CAPTCHA, Proceedings of the ACM Conference on Computer and Communications Security, pp. 543–554.
[4] Soni, S. and Bonde, P. (2017): E-CAPTCHA : A Two Way Graphical Password based Hard AI Problem, (June), pp. 418–421.
[5] Chew N. and Tygar J. D. (2004): Image Recognition CAPTCHAs, UC Berkeley Computer Science Division technical report.
[6] Fidas, C. A., Avouris, N. M. and Voyiatzis, A. G. (2011): On the necessity of user-friendly CAPTCHA, Conference on Human Factors in Computing Systems - Proceedings, (May 2016), pp. 2623–2626.
[7] Newton, F. and Kouritzin, M. A. (2011): On grey levels in random CAPTCHA generation, Visual Information Processing XX, 8056(c), p. 80560U.
[8] Bursztein, E., Martin, M. and Mitchell, J. C. (2011): Text-based CAPTCHA strengths and weaknesses, Proceedings of the ACM Conference on Computer and Communications Security, 2011, pp. 125–137.
[9] Yan, J. and El Ahmad, A. S. (2008): Usability of CAPTCHAs or usability issues in CAPTCHA design, SOUPS 2008 - Proceedings of the 4th Symposium on Usable Privacy and Security, pp. 44–55.
[10] Siva Nagalakshmi, K., Prakash, P. S. and Prem Kumar, D. S. (2015): Confident Multi-Factor Authentication on web application via CAPTCHA Technologies, International Journal of Computer Engineering in Research Trends, 876(8), pp. 2349–7084.
[11] Jabed, M. and Ranjan, N. (2013): CAPTCHA Based on Human Cognitive Factor, International Journal of Advanced Computer Science and Applications, 4(11), pp. 144–149.
[12] Brodić, D., Amelio, A. and Draganov, I. R. (2017): Statistical Analysis of Dice CAPTCHA Usability, pp. 1–9.
[13] Abdullah Hasan, W. K. (2016): A Survey of Current Research on CAPTCHA, International Journal of Computer Science & Engineering Survey, 7(3), pp. 1–21.
[14] Amelio, A. et al. (2018): The {CAPTCHA} Samples Websit, {ERCIM} News, 2018(112), p. 2018.
[15] Kaur, K. and Behal, S. (2014): CAPTCHA and Its Techniques : A Review, International Journal of Computer Science and Information Technologies (IJCSIT), 5(5), pp. 6341–6344.
[16] Singh, V. and Pal, P. (2014): Survey of different types of CAPTCHA, International Journal of Computer Science and Information Technologies, 5(2), pp. 2242–2245.
[17] Roshanbin, N. (2014): Interweaving Unicode, Color, and Human Interactions to Enhance CAPTCHA Security.
[18] Yan, J. and El Ahmad, A. S. (2016): Usability Analysis of the Specific CAPTCHA Types, International Scientific Conference, pp. II-272–II-277.
Citation
Shivank Singh, Rahul Kumar Chawda, "Recent Trends in CAPTCHA Security and Bot Challenges," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.123-127, 2020.