MAHO: Modified Ant Honey Bee Optimization Algorithm for Load Balancing in Cloud Environment
Research Paper | Journal Paper
Vol.8 , Issue.7 , pp.122-131, Jul-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i7.122131
Abstract
Cloud computing mainly does not focus on local resource instead; it uses shared computing resources applications or resources. It has emerged as a new type of computing for accessing present network, managing computer resources and managing distributed computing across the network in order to achieve high degree of precision and reliability various challenges needs to be addressed. One of the challenges in cloud computing is load balancing. Load balancing is important due to the fact that it allows achieving balance in the load by distributing it across the system to all its nodes. Cloud environment allows various ways to achieve load balancing. This includes managing the load on CPU, network load and the load capacity of storage. The greatest impact of balancing the load in cloud computing environment is that it has higher satisfaction of the users as well as it utilizes the resources efficiently. Proper load balancing support substantial improvement of the system, building a fault tolerant system by creating backup and increase flexibility of the system so that it adapts the modification. In cloud computing, there are various algorithms to achieve load balancing and these algorithms behave differently with its some advantages and disadvantages. In this paper we present an Modified Ant Honey Bee based optimization algorithm (MAHO) to achieve load balancing. The results are analyzed with existing load balancing algorithm based on make span metrics
Key-Words / Index Term
Cloud computing; Load balancing; Static Load balancing; Dynamic Load balancing; Algorithms; Load balancer; Load balancing metrics
References
[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, ?Above the Clouds: A Berkeley View of Cloud Computing?, EECS Department, University of California, Berkeley, Technical Report No., UCB/EECS-2009-28, pages 1-23, February 2009.
[2] Wang, S.C., Yan, K.Q., Liao, W.P. and Wang, S.S., 2010, July. Towards a load balancing in a three-level cloud computing network. In 2010 3rd international conference on computer science and information technology (Vol. 1, pp. 108-113). IEEE.
[3] Nidhi Jain Kansal, Inderveer Chana, ?Cloud Computing Techniques: A Step Towards green Computing?,IJCSI,Vol. 9, Issue 1, January 2012.
[4] A. Bhadani, and S. Chaudhary, ?Performance evaluation of web servers using central load balancing policy over virtual machines on cloud?, Proceedings of the Third Annual ACM Bangalore Conference (COMPUTE), January 2010.
[5] G. Pallis, ?Cloud Computing: The New Frontier of Internet Computing?, IEEE Journal of Internet Computing, Vol. 14, No. 5, September/October 2010, pages 70-73.
[6] J. Baliga, R. W. A. Ayre, K. Hinton, and R. S. Tucker, ?Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport?, Proceedings of the IEEE, Vol. 99, No. 1, January 2011, pages 149-167.
[7] R. Mata-Toledo, and P. Gupta, ?Green data center: how green can we perform?, Journal of Technology Research, Academic and Business Research Institute, Vol. 2, No. 1, May 2010, pages 1-8.
[8] Ishfaq Ahmad, Arif Ghafoor, ?Semi-Distributed Load Balancing for Massively Parallel Multicomputer Systems?, 1991.
[9] David Escalnte and Andrew J. Korty, ?Cloud Services: Policy and Assessment?, EDUCAUSE Review, Vol. 46, July/August 2011.
[10] Parin. V. Patel, Hitesh. D. Patel, Pinal. J. Patel, ?A Survey on Load Balancing in Cloud Computing? IJERT, Vol. 1, Issue 9, November 2012.
[11] Ali M Alakeel, ?A Guide to Dynamic Load Balancing in Distributed Computer Systems?, International Journal of Computer Science and Network Security, Vol. 10 No. 6, June 2010.
[12] Ram Prasad Padhey, P. Goutam Prasad Rao, ?Load Balancing in Cloud Computing Systems?, Department of Computer Science and Engineering, National Institute of Technology, May 2011.
[13] Abhijit A Rajguru, S.S. Apte, ?A Comparative Performance Analysis of Load Balancing Algorithms In Distributed Systems Using Qualitative Parameters?, International Journal of Recent Technology and Engineering, Vol. 1, Issue 3, August 2012
[14] Rajani Sajjan,? Load Balancing and its Algorithms in Cloud Computing: A Survey?, JCSE International Journal of Computer Sciences and Engineering, Volume-5, January 2017.
[15] Aarti Vig, Rajendra Singh Kushwah and Shivpratap Singh Kushwah, ?An Efficient distributed Approach for Load Balancing in Cloud Computing?, 2015 International Conference on Computational Intelligence and Communication Networks.
[16] Anurag, K., Rakesh, K., Rupesh, K. and Prashant, Y.. ?SLA driven load balancing for web applications in cloud computing environment.? 2011
[17] Borja Sotomayor, Ruben S. Montero, Ignacio M. Llorente, and Ian Foster, ?An Open Source Solution for Virtual Infrastructure Management in Private and Hybrid Clouds?, IEEE Internet Computing, July, 2009.
[18] Shridhar G.Domanal and G.Ram Mohana Reddy,?Load Balancing in Cloud Computing Using Modified Throttled Algorithm ?, 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[19] SuchitaKhare, Asst. Prof. Shatendra Dubey, ?An Efficient Load Balancing in Public Cloud using Priority based SJF Scheduling?, International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 1834
[20] Medhat A. Tawfeek, Ashraf E1-SiSi,Arnabi E.KeshK,Fawzy A.Torkey,?Cloud Task Scheduling Based on Ant Colony Optimization?.978-1-4799-0080-0/13@2013 IEEE.
[21] Nishant, K. P. Sharma, V. Krishna, C. Gupta, KP. Singh, N. Nitin and R. Rastogi, "Load Balancing of Nodes in Cloud Using Ant Colony Optimization." In proc. 14th International Conference on Computer Modelling and Simulation (UKSim), IEEE, pp: 3-8, March 2012.
[22] Dharmesh Kashyap, Jaydeep Viradiya, ?A Survey of Various Load Balancing Algorithms In Cloud Computing?, International Journal of Scientific & Technology Research, Vol. 3, Issue 11, November 2014
[23] Zhang Z. and Zhang X. ?A Load Balancing Mechanism Based on Ant Colony and Complex Network Theory in Open Cloud Computing Federation?, 2nd International Conference on Industrial Mechatronics and Automation, 240-243, 2010
[24] Dhinesh B. L.D , P. V. Krishna, ?Honey bee behavior inspired load balancing of tasks in cloud computing environments?, in proc. Applied Soft Computing, volume 13, Issue 5, May 2013.
[25] Ganesh, Amal, M. Sandhya, and Sharmila Shankar. "A study on fault tolerance methods in Cloud Computing." In Advance Computing Conference (IACC), 2014 IEEE International, pp. 844-849. IEEE, 2014.
[26] Sushil Kumar, Deepak Singh Rana and Sushil Chandra Dimri, ?Fault Tolerance and Load Balancing algorithm in Cloud Computing: A survey?, International Journal of Advanced Research in Computer and Communication Engineering, July 2015.
[27] Pandey, Suraj, Linlin Wu, SiddeswaraMayura Guru, and Rajkumar Buyya. "A particle swarm optimization-based heuristic for scheduling workflow applications in cloud computing environments." In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, pp. 400-407. IEEE, 2010.
[28] Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, Cesar A. F. De Rose and Rajkumar Buyya, ?CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms?, Software practice and experience, August, 2010.
[29] Rathore, M., Rai, S. and Saluja, N.,. ?Load balancing of virtual machine using honey bee galvanizing algorithm in cloud.? IJCSIT, 6(4), pp.4128-4132. 2015
Citation
Tony Bayan, Priyanka Sarma, "MAHO: Modified Ant Honey Bee Optimization Algorithm for Load Balancing in Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.122-131, 2020.
Unsheathing input to SAT solver from logic circuit in DIMAC format
Research Paper | Journal Paper
Vol.8 , Issue.7 , pp.132-135, Jul-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i7.132135
Abstract
Satisfiability probability(SAT) solvers are algorithms that take well-formed formulas and return true if satisfiable and false otherwise. They are significantly useful in various tasks in-circuit verification and have prominent importance in various fields such as automated verification, Electronic Design Automation (EDA) which include formal checking of equivalence, artificial intelligence planning, and so on. The input to these SAT solvers is generally accepted in DIMAC CNF (conjunctive normal form), which is a textual representation of the equation in CNF form. Most verification tasks are commenced from a description of problem instances at the logic circuit level, deducing DIMAC CNF format from the given logic circuit could be tedious and time-consuming if done manually as the conversion includes complex formulas. This paper aims to present an effective code that could easily convert any given logic circuit to DIMAC CNF format just by selecting gate and proper variable names to operate upon according to the heuristic presented by a logic circuit. The output thus formed could be directly given as input to any SAT solver that uses DIMAC format readily, abating time and conversion efforts. The final part of the paper also demonstrates an example for the acyclic circuit and compares the result of generated output to manually derived formula for the same circuit on various parameters
Key-Words / Index Term
DIMAC, CNF, SAT solvers, input generator
References
[1] C Gomes, H Kautz, A Sabharwal, B Selman. "Satisfiability Solvers"2008.https://www.cs.cornell.edu/gomes/pdf/2008_gomes_knowledge_satisfiability.pdf
[2] A.Gilles, S Laurent. "Predicting Learnt Clauses Quality in Modern SAT Solvers". IJCAI International Joint Conference on Artificial Intelligence., pp 399-404 2009.
[3] F Zhaohui, Y Yinlei, M Sharad ." Considering Circuit Observability Don?t Care in CNF Satisfiability". DATE?05, Mar 2005, Munich, Germany. pp.1108-1113. ?hal-00181279?
[4] R Klimek, K Grobler-Dębska, E Kucharska . "System for automatic generation of logical formulas". MATEC Web of Conferences.,pp 252:03005,2019;.
[5] S Gopalakrishnan, V Durairaj, P Kalla. "Integrating CNF and BDD based SAT solvers". Eighth IEEE International High-Level Design Validation and Test Workshop; 2003.
[6] A Smith ." Diagnosis of combinational logic circuits using Boolean satisfiability". Ottawa: Library and Archives Canada = Bibliothèque et Archives Canada; 2005.
[7] N E?n, N S?rensson ." Translating Pseudo-Boolean Constraints into SAT". Journal on Satisfiability, Boolean Modeling, and Computation. pp 2(1-4):1-26.,2006.
[8] Ifat Jahangir, Anindya Das, Masud Hasan, ?Facile Algebric Representation of a Novel Quaternary Logic?.International Journal of Computer Sciences and Engineering Vol.4 Issue 5,pp 1-15, 2016.
Citation
Vaishnavi Thorve, "Unsheathing input to SAT solver from logic circuit in DIMAC format," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.132-135, 2020.
A Survey of Fog Computing Architecture and Its Applications
Survey Paper | Journal Paper
Vol.8 , Issue.7 , pp.136-141, Jul-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i7.136141
Abstract
Now days we can observe that so many advancements are happening in the technologies and new Generations using various programs, software and applications are progressively complicated and needs lower latency requirements. So that clients would be able to get to these applications and information from anyplace at any time without any delay. Cloud computing is one of these technologies designed to deliver computer resources platforms and other various computing facilities. In this on ?demand services are provided to the users through the Internet. But network dependency, data security issues, lower bandwidth, variation of cost, location-awareness are some limitations that we are facing with cloud computing. To overcome inherent problems of this popular computing paradigm fog computing has come up as a promising framework to provide flexible and adaptable resources adjacent to network. Fog computing is generally an idea of a distributed network that brings the cloud services that are communication, computation and storage near upon edge devices and users. It is used to improve efficiency and Real-time processing of data. The major objective of fog computing is to shorten the particular data that should be delivered to the cloud for processing, study, storage and computational purpose. And at the present moment, fog computing appears to be the most alternate available that can handle all client requirements
Key-Words / Index Term
fog computing, cloud services, Real-time processing, distributed network
References
[1] Jabril Abdelaziza, Mehdi Addab *, Hamid Mcheick, ?An architectural model of fog computing?.
[2] Ranesh Kumar Naha, Saurabh Garg , and Andrew Chan,? Fog Computing Architecture: Survey and Challenges?.
[3] Naha RK, Garg S, Georgakopoulos D, ?Fog Computing: A Survey of Trends, Its Architectures and Research Directions requirements?.
[4] Bishal Ranjan Swain1* , Jeevan Jyoti Sahoo2 , Ashutosh Prasad3 , D. Thamizh Selvam4 ? Rise of Fluid Computing: A Collective Effort Of Mist, Fog and Cloud?.
[5] Kalpit G. Soni1* , Hiren Bhatt2 , Dhaval Patel3 ?Fog Computing: A Look on Present Scenario and Hopes for Future Research? .
Citation
Mehnaz Bano , "A Survey of Fog Computing Architecture and Its Applications," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.136-141, 2020.
Survey for Vehicle Number Detection Technique
Review Paper | Journal Paper
Vol.8 , Issue.7 , pp.142-145, Jul-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i7.142145
Abstract
There are very large number of vehicles in India as it is very densely populated country across world. So, there is a need of detecting vehicles accurately using traffic management system. This system detects the image of the number plate of a vehicle from video using video processing with raspberry pi and the number is extracted using different methods and algorithms. The system is applicable for entrances of gates in colleges and highly restricted areas. When any vehicle passes by the system the video is captured and then video is converted into images. In this review paper for number plate recognition of vehicles we had discussed various techniques that were used in to achieve recognition
Key-Words / Index Term
Vehicle Number Plate Recognition
References
[1]. Salau, A.O.; Yesufu, T.K.; Ogundare, B.S.; ?Vehicle plate number localization using a modified GrabCut algorithm?, Journal of King Saud University ? Computer and Information Sciences, 2019
[2]. Kukreja, A.; Bhandari, S.; Bhatkar, S.; Chavda, J.; Lad, S.; ?International Research Journal of Engineering and Technology?, International Research Journal of Engineering and Technology, vol: 4, pp: 1825-1831, 2017.
[3]. Bailmare, S.H.; Gadicha, A.B.; ?A Review paper on Vehicle Number Plate Recognition (VNPR) Using Improved Character Segmentation Method?, International Journal of Scientific and Research Publications, vol: 3, pp:1-3, 2013
[4]. Kumar, K.K; Sailaja, S.; Khadheer, S.; Viswajith, K.; ?Automatic Number Plate Recognition System?, Indian Journal of Science and Technology, vol: 10, pp: 77967, 2017.
[5]. Gaikwad, D.Y.; Borole, P.B.; ?AReview Paper on Automatic Number Plate Recognition (ANPR) System?, International Journal of Innovative Research in Advanced Engineering, vol: 1, pp: 88-92, 2014.
[6]. Bagade, J.V.; Kamble, M.; Pardeshi, K.; Punjabi, B.; Singh, R.; ?Automatic Number Plate Recognition System: Machine Learning Approach?, IOSR Journal of Computer Engineering, pp: 34-39. 2016.
[7]. Goyal, A.; Bhatia, R.; ?Automated Car Number Plate Detection System to detect far number plates?, IOSR Journal of Computer Engineering, vol: 18, pp: 34-40, 2016.
[8]. Patel, C.; Shah, D.; Patel, A.; ?Automatic Number Plate Recognition System (ANPR): A Survey?, International Journal of Computer Applications, vol: 69, pp: 21-33, 2013.
Citation
Ramneek Kaur, Supreet Kaur, "Survey for Vehicle Number Detection Technique," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.142-145, 2020.
Reducing Energy Wastage Implementation in Wireless Sensor Network
Review Paper | Journal Paper
Vol.8 , Issue.7 , pp.146-154, Jul-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i7.146154
Abstract
A wireless sensor network ( WSN) contains a series of detector clients for local measurements in a region focuses on ecological information. The crux of the issue is: "How can you prolong your network life for such a long time?" "A major challenge in WSN is therefore to maximize the grid experience by minimizing energy. The sensors can not be easily recharged or replaced as a result of their ad-hoc preparation in hazardous environments. As energy efficiency is one of the hottest subjects in wireless sensor networks, we will investigate important techniques for energy maintenance in the sensor network. This article focuses primarily on the most efficient energy-saving technologies for tariff cycling systems and also on Information-Aimed strategies for enhancing energy quality. Finally, we should review some of the latest sensor network communication protocols
Key-Words / Index Term
Wireless sensor networks, energy maintenance, task cycling, information-aime
References
[1] F.Akyildiz,W.Su,Y.Sankarasubramaniam and E. Cayirci, "Wireless Sensor Networks: a Survey", Computer Networks ,Vol 38, 2002.
[2] M. Ilyas and I. Mahgoub "Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems," Proceedings of the CRC Press, 2005.
[3] J.Chang, L.Tassiulas, "Energy conserving routing in wireless ad hoc networks", Nineteenth International Annual Joint Conference of the IEEE Computer and Communications Societies , 2000.
[4] Y. Xu, J. Heidemann, D. Estrin, "Geography-informed energy maintenance for ad hoc", ACM MobiCom, 2001.
[5] M.Zorzi,R.R. Rao, "Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Energy and Latency Performance",IEEE Transactions Mobile Computing,2003.
[6] B.Chen,K.Jamieson,H.Balakrishnan, R. Morris,"Span: an energyefficient coordination algorithm for topology maintenance in ad hoc wireless networks", ACM Wireless Networks, 2002.
[7] C. Schurgers,V.Tsiatsis,M.B.Srivastava,"STEM: topology management for energy efficient sensor networks", IEEE Aerospace Conference", 2002.
[8] G.Anastasi,M.Coti,M.Frrancesco,A.Passarella, "Energy maintenance in wireless sensor networks: A survey", Elsever, Ad Hoc Network ,2009.
[9] I.Demirkol,C.Ersoy,F.Alag?z, "MAC Protocols for Wireless Sensor Networks: A Survey", IEEE Communications Magazine,April,2006.
[10] A.Bachir, Mischa Dohler,T.Watteyne,K.Leung, "MAC Essentials for Wireless Sensor Networks", IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 12, 2010.
[11] M.C.Vuran,O.B.Akan,I.F.Akyildiz,"Spatio-temporal correlation: theory and applications for wireless sensor networks", Computer Networks Journal,2004 .
[12] D.Chu,A.Deshpande,J.M.Hellerstein,W.Hong,"Approximate Information collection in sensor networks using probabilistic models",22nd International Conference on Information Engineering ,2007.
[13] D.Tulone, S. Madden, "PAQ: time series forecasting for approximate query answering in sensor networks", 3rd European Conference on Wireless Sensor Networks ,2008.
[14] E.Fasolo,M.Rossi, J.Widmer, M. Zorzi,"In-network aggregation techniques for wireless sensor networks: a survey", IEEE Wireless Communications, 2007.
[15] F.Bouabdallah,N.Bouabdallah,R.Boutaba,"On Balancing Energy Consumption in Wireless Sensor Networks",IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.58, 2009.
[16] M.Ilyas, I.Mahgoub, "Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems", in: Proceedings of the CRC Press, London, Washington, D.C, 2005.
[17] M.Dong, K.Yung,W. Kaiser,"Low Power Signal Processing Architectures for Network Microsensors", International Symposium on Low Power Electronics and Design,pp.173?177, 1997.
[18] Manju Bhardwaj, "Faulty Link Detection in Cluster based Energy Efficient Wireless Sensor Networks," International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.1-8, 2017
[19] P.Casari,A. Marcucci, M. Nati, C. Petrioli, M. Zorzi,"A detailed simulation study of geographic random forwarding (GeRaF) in wireless sensor networks", Proc. of Military Communications Conference 2005,Vol. 1,pp. 59-68, 17-20 , 2005.
[20] A.Cerpa, D.Estrin, " ASCENT: Adaptive Self-Configuring sensor Networks Topologies", IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.3, 2004.
[21] X.Yang,N.Vaidya,"A Wakeup Scheme for Sensor Networks : Achieving Balance between Energy Saving and End-to-end Delay",the IEEE Real-Time and Embedded Technology and Applications Symposium, pp.19-26, 2004.
[22] T. Armstrong, "Wake-up Based Power Management in Multi-hop Wireless Networks," Technical Report, University of Toronto, 2005,http://www.eecg.toronto.edu/~trevor/Wakeup/survey.pdf.
[23] Y. Xu,J. Heidemann, D. Estrin,"Geography-informed Energy Maintenance for Ad Hoc",Proc. ACMMobiCom 2001, pp.70 ? 84. , 2001.
[24] T. Dheepak, S. Neduncheliyan, "Low Power Distributed MAC Protocol Against Various Kinds Of Attacks By Using Traffic Analysis Methodology," International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.1-7, 2018
[25] Wassim Aissaoui, Raik Aissaoui, "Drone of Gafsa: A Wind-powered UAV as Flying RSU in VANET", International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.3, pp.6-12, 2020
[26] V.Rajendran,K.Obracza,J.J.Garcia-Luna Aceves,"Energy-efficient, Collision-free Medium Access Control for Wireless Sensor Networks",ACM SenSys 2003, November 2003.
[27] J. Polastre, J. Hill, D. Culler, "Versatile Low Power Media Access for Sensor Networks", the Second ACM Conference on Embedded Networked Sensor Systems (SenSys), 2004.
[28] W. Ye,J.Heidemann,D.Estrin,"Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks", IEEE/ACM Transactions on Networking, Vo.12, Issue: 3, pp. 493- 506, 2004.
[29] T. V. Dam and K. Langendoen, "An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks",The First ACM Conference on Embedded Networked Sensor Systems, November 2003.
[30] S.H.Yang, H.W.Tseng, E.H.K.Wu and G. H.Chen, "Utilization Based Duty Cycle Tuning MA Protocol for Wireless Sensor Networks",IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM ,2005.
[31]L.Campelli,A.Capone,M.Cesana,"A Receiver Oriented MAC Protocol for Wireless Sensor Networks",Mobile Adhoc and Sensor Systems,IEEE Internatonal Conference ,2007.
[32]I.Rhee, A.Warrier, M.Aia et al,"Z-MAC: a Hybrid MAC for Wireless Sensor Networks", IEEE/ACM Transactions, pp.511 ? 524,2008.
[33] S.Cho, K.Kanuri, J.Cho,J.Lee,S.-D.June,"Dynamic Energy Efficient TDMA-based MAC Protocol for Wireless Sensor Networks",Autonomic and Autonomous Systems and International Conference on Networking and Services,pp.48 ? 48, 2005.
[34] A.El-Hoiydi,J.Decotignie,"Low power downlink mac protocols for infrastructure wireless sensor networks",ACM Mobile Networks and Applications,pp.675?690,2005.
[35] R.Muller,G.Alonso,"Efficient Sharing of Sensor Networks," in Mobile Adhoc and Sensor ,IEEE International Conference, Vancouver, pp. 109-118, 2006.
[36] R Muller,G. Alonso,"Shared queries in sensor networks for multiuser support," Department of Computer Science, ETH Zurich,2006.
[37] M.Tang,J.Cao,N. K. Chilamkurti, "TAMPA: Tabu Search-Based Multiple Queries Optimization for Wireless Sensor Networks," in IEEE Wireless Communications,2007.
[38] H. y` Yang, W.-C. Peng, and C.-H. Lo,"Optimizing Multiple InNetwork Aggregate Queries in Wireless Sensor Networks",12th International Conference on Informationbase Systems for Advanced Application , 2007.
Citation
Bhuvan Chandra Joshi, Narendra Pal Singh, "Reducing Energy Wastage Implementation in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.146-154, 2020.
Abusive Language Detection and Characterization of Twitter Behavior
Research Paper | Journal Paper
Vol.8 , Issue.7 , pp.155-161, Jul-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i7.155161
Abstract
Abusive language refers to an insult or vulgarity which harass or deceive the target. Social media is a famous platform for the people to express their opinions publicly and to interact with other people in the world. Some of them may misuse their freedom of speech to bully others through abusive language. This will leads to the need for detecting abusive speech. Otherwise, it may severely impact the user?s online experience. It may be a time-consuming task if the detection and removal of such offensive material are done manually. Also, human supervision is unable to deal with large quantities of data. Therefore automatic abusive speech detection has become essential to be addressed effectively. For detecting abusive speech, context accompanying abusive speech is very useful. In this work, abusive language detection in online content is performed using Bidirectional Recurrent Neural Network (BiRNN) method. Here the main objective is to focus on various forms of abusive behaviors on Twitter and to detect whether a speech is abusive or not. The results are compared for various abusive behaviors in social media, with Convolutional Neural Netwrok (CNN) and Recurrent Neural Network (RNN) methods and proved that the proposed BiRNN is a better deep learning model for automatic abusive speech detection
Key-Words / Index Term
text classification, abusive language, BiRNN, deep learning, natural language processing
References
[1] A.M. Founta, C. Djouvas, D. Chatzakou, I. Leontiadis, J. Blackburn, G. Stringhini, A. Vakali, M. Sirivianos and N. Kourtellis, "Large scale crowdsourcing and characterization of twitter abusive behavior?, In Twelfth International AAAI Conference on Web and Social Media, USA, 2018
[2] P. Badjatiya, S. Gupta, M. Gupta, and V. Varma, ?Deep learning for hate speech detection in tweets?, In Proceedings of the 26th International Conference on World Wide Web Companion, Australia, pp. 759-760, 2017.
[3] B. Gamback, and U.K. Sikdar, ?Using convolutional neural networks to classify hate-speech?, In Proceedings of the first workshop on abusive language online, Canada, pp. 85-90, 2017. ISBN 978-1-945626-66-1.
[4] J.H. Park, and P. Fung, ?One-step and two-step classification for abusive language detection on twitter?, In Proceedings of the First Workshop on Abusive Language Online, Canada, pp. 41?45, 2017.
[5] J. Pavlopoulos, P. Malakasiotis, and I. Androutsopoulos, ?Deep learning for user comment moderation?, In Proceedings of the First Workshop on Abusive Language Online, Canada, pp, 25?35, 2017.
[6] D. Kumar, R. Cohen, and L. Golab, 2019, ?Online abuse detection: the value of preprocessing and neural attention models?, In Proceedings of the Tenth Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis, USA, pp. 16-24, 2019.
[7] Y. Lee, S. Yoon, and K. Jung, ?Comparative Studies of Detecting Abusive Language on Twitter?, Proceedings of the Second Workshop on Abusive Language Online, Belgium, pp. 101?106, 2018.
[8] F.J. Ordonez, and D. Roggen, ?Deep convolutional and lstm recurrent neural networks for multimodal wearable activity recognition?, Sensors, Vol.16(1), pp. 115, 2016.
[9] A. Anand, T. Chakraborty, and N. Park, ?We used neural networks to detect clickbaits: You won?t believe what happened next!?, In European Conference on Information Retrieval, Springer, Berlin, pp. 541-547, 2017.
[10] J. Pennington, R. Socher, and C.D. Manning, ?Glove: Global vectors for word representation?, In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), Qatar, pp. 1532-1543, 2014.
[11] T. Mikolov, K. Chen, G. Corrado, and J. Dean, ?Efficient estimation of word representations in vector space?, International Conference on Learning Representations (ICLR), USA, 2013.
[12] W. McKinney, ?pandas: a foundational Python library for data analysis and statistics?, Python for High Performance and Scientific Computing, San Francisco, pp. 1-9, 2011.
[13] C. D. Manning, M. Surdeanu, J. Bauer, J. R. Finkel, S. Bethard, and D. McClosky, ?The Stanford CoreNLP natural language processing toolkit.?, In Proceedings of 52nd annual meeting of the association for computational linguistics: system demonstrations, Maryland, pp. 55-60, 2014.
[14] K.M. Hermann, T. Kocisky, E. Grefenstette, L. Espeholt, W. Kay, M. Suleyman, and P. Blunsom, ?Teaching machines to read and comprehend?, In Advances in neural information processing systems, Canada, pp. 1693-1701, 2015.
[15] D.P. Kingma, and L.J. Ba, ?Adam: A method for stochastic optimization?, International Conference on Learning Representations (ICLR), USA, 2015.
[16] G. E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever, and R. R. Salakhutdinov, ?Improving neural networks by preventing co-adaptation of feature detectors?, CoRR, abs/1207.0580, 2012.
Citation
Dincy Davis, Reena Murali, Remesh Babu K.R., "Abusive Language Detection and Characterization of Twitter Behavior," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.155-161, 2020.
Handwritten Digit Recognition Using Support Vector Machine
Research Paper | Journal Paper
Vol.8 , Issue.7 , pp.162-165, Jul-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i7.162165
Abstract
Computer Vision and Machine Learning are two domains that are upcoming and helpful in the modern era. Computer Vision is a science that is designed to try to make a computer as good as a human. Machine Learning helps improve computer vision by training it to improve every time it is used. This paper presents a model of Support Vector Machine (SVM) with the AdaBoost classifier, which has proven results in recognizing different types of patterns. In this model, SVM is used as a recognizer. This model automatically extracts features from the raw images and generates predictions. The results are subject to experiments conducted on the well-known MNIST digit database
Key-Words / Index Term
Computer Vision, Machine Learning, Classifier, SVM, Digit Recognition
References
[1] Hayder M. Albeahdili, Haider A. Alwzwazy, Naz E. Islam.? Robust Convolutional Neural Networks for Image Recognition?. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 11, 2015
[2] Fabien Lauer, Ching Y. Suen, and G?erard Bloch ?A trainable feature extractor for handwritten digit recognition‖?, Journal Pattern Recognition, Elsevier, 40 (6), pp.1816-1824, 2007.
[3] Sherif Abdel Azeem, Maha El Meseery, Hany Ahmed,? Online Arabic Handwritten Digits Recognition ?, Frontiers in Handwriting Recognition (ICFHR), 2012
[4] Kumar, R., Goyal, M.K., Ahmed, P. and Kumar, A., 2012, December. Unconstrained handwritten numeral recognition using majority voting classifier. In Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on (pp. 284-289). IEEE.
[5] Kopr inkova Hristova, V.M.P., Villa, G.P.A.E. and Kasabov, B.A.N., Artificial Neural Networks and Machine Learning?ICANN 2013.
[6] Hu D, Research and application of handwritten numeral recognition method, SM thesis, University of Nanchang, Nanchang, China. 2012
[7] Neera Saxena, Qasima Abbas Kazmi, Chandra Pal and O.P. Vyas, Employing Neocognitron Neural Network Base Ensemble Classifiers to Enhance Efficiency of Classification in Handwritten Digit Datasets. D.C. Wyld, et al. (Eds): CCSEA 2011, CS & IT 02, pp. 408?416, 2011.
[8] Nibaran Das, Ram Sarkar, Subhadip Basu, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu: A genetic algorithm-based region sampling for selection of local features in handwritten digit recognition application. Appl. Soft Comput. (ASC) 12(5):1592-1606, 2012.
[9] ?ngelo Cardoso, Andreas Wichert: Handwritten digit recognition using biologically inspired features. Neurocomputing (IJON) 99:575-580, 2013.
[10] Chang Liu, Tao Yan, WeiDong Zhao, et al., Incremental Tensor Principal Component Analysis for Handwritten Digit Recognition, Mathematical Problems in Engineering, vol. 2014, Article ID 819758, 10 pages, 2014
[11] You Qian, Wang Xichang, Zhang Huaying, Sun Zhen, Liu Jiang, Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature, 3rd Int. Conf. Multimedia Technology, 2013
[12] B.Scholkopf, C.Burges,V.Vapnik, Extracting support data for a given task, First International Conf. Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA, 1995
[13] B.Scholkopf, P.Simard, A.Smola, V.Vapnik, Prior knowledge in support vector kernels, Advances in Neural Information Processing Systems, vol. 10, MITPress, pp.640?646, 1998.
[14] P.Simard, Y.Le Cun,J. S.Denker, Efficient pattern recognition using a new transformation distance, in: Advances In Neural Information Processing Systems, vol.5, Morgan Kaufmann, pp.50?58, 1993.
[15] Xiao-Xiao Niu, Ching Y. Suen: A novel hybrid CNN-SVM classifier for recognizing handwritten digits. Pattern Recognition (PR) 45(4):1318-1325 , 2012
Citation
Aditya Naik, Vijay Gaikwad, "Handwritten Digit Recognition Using Support Vector Machine," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.162-165, 2020.
A Survey for Various Techniques of Image Enhancement
Survey Paper | Journal Paper
Vol.8 , Issue.7 , pp.166-169, Jul-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i7.166169
Abstract
Image Enhancement is one of the important and tough techniques in digital image processing. The main objective of image enhancement is to find out the hidden details in an image. Image Enhancement improves the quality of image for human presentation. Contrast increment, elimination of noise and blurring and enlightenment of details are examples of enhancement operation. Image enhancement is basically divided into two main categories such as spatial domain and Frequency domain. In this paper we discuss and compare these two techniques with their related techniques. Thus, the contribution of this paper is to various image enhancement techniques
Key-Words / Index Term
Image Enhancement
References
[1]. Guo, Y.; Ke, X.; Ma, J.; Zhang, J.; ?A Pipeline Neural Network for Low-Light Image Enhancement?, IEEE Access, Vol: 7, pp: 13737-13744, 2019.
[2]. Zhou, J.; Zhang, D.; Zou, P.; Zhang, W.; Zhang, W.; ?Retinex-Based Laplacian Pyramid Method for Image Defogging?, IEEE Access, Vol: 7, pp: 122459-122472, 2019.
[3]. Mei, Y.; Ning, Y.; ?Multilayer Fusion and Chunk-Based Transmittance Estimation for Natural Hazy Image Enhancement?, IEEE Access, Vol: 7, pp: 118269-118277, 2019.
[4]. Ma, F.; Chai, J.; Wang, H.; ?Two-Dimensional Compact Variational Mode Decomposition-Based Low-Light Image Enhancement?, IEEE Access, Vol: 7, pp: 136299-136309, 2019.
[5]. Li, D.; Zhang, L.; Sun, C.; Yin, T.; Liu, C.; Yang, J.; ?Robust Retinal Image Enhancement via Dual-Tree Complex Wavelet Transform and Morphology-Based Method?, IEEE Access, Vol: 7, pp: 47303-47316, 2019.
[6]. Aladem, M.; Baek, S.; Rawashdeh, S.A.; ?Evaluation of Image Enhancement Techniques for Vision-Based Navigation under Low Illumination?, Journal of Robotics, Vol: 2019, pp: 1-16, 2019.
[7]. Sharma, A.; Marriboyina, V.; Gupta, K.; ?A novel underwater Image Enhancement technique?, International Journal of Innovative Technology and Exploring Engineering, Vol: 8, Issue: 6, pp: 693-698, 2019.
[8]. Rani, G.R.R.; Samson, C.; ?A Survey on Image Enhancement Techniques?, International Journal of Computational Engineering Research, Vol: 9, Issue: 3, pp: 1-4, 2019.
Citation
Abinasi Singh, Rachhpal Singh, "A Survey for Various Techniques of Image Enhancement," International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.166-169, 2020.