Energy Optimization in Smart Grid using Tensor Decomposition
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.177-181, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.177181
Abstract
In India energy crisis has become one of the primary concern for its development and economic growth. The gap between power demand of users and its supply is incrementing day by day. Moreover, a large portion of the power plants depend on petroleum derivative and have the danger of being phased out in future. In this paper, we consider these issues by adjusting the power supply and demand, concentrating fundamentally on Disseminated Energy Resources (DER). During off peak hour’s residual energy from DER will be stored in the proposed storage arrangement. The proactive consumers (pro-summer) in the demand side will have the scope to sell this stored energy to the national grid during peak hours in a proposed smart bidirectional network. Finally, grid monitoring and metering interface with an advanced control mechanism has been developed, which is expected to increase the extendibility of the pro-summer to handle their energy usage and costs. We have proposed a mechanism known as Tensor Decomposition (TD), in which we combined the smart meter rating produced from different sources into single dimension using MATLAB and finally applied Principle Component Analysis (PCA) to determine the error rate as compared to that of actual rate. Result obtained after applied the TD mechanism over Smart Grid (SG) data set are encouraging as compared to other preexisting approaches.
Key-Words / Index Term
Smart Grid; Principle Component Analysis; Tensor Decomposition; Energy
References
[1]. Owais Khan, Kumaran Vijayasankar,Ramanuja Vedantham, Routing overhead optimization in smart grid networks", International Symposium on Power Line Communications and its Applications (ISPLC), pp. 1-5, 2015.
[2]. Lanchao Liu, Zhu Han, Multi-block ADMM for big data optimization in smart grid", International Conference on Computing, Networking and Communications (ICNC), pp. 1-5, 2015.
[3]. Foroogh Sedighi, Mahshid Helali Moghadam, Integration of heterogeneous data sources in smart grid based on summary schema model", 12th International Conference on Innovations in Information Technology (IIT), pp. 1-6, 2016.
[4]. Chan Loong Kwong, Chan Yan Tim, Leung Chun Kit, Ko Yik Yan, From great to excellence - approaching to total condition based management of power transformer under smart grid operations, 10th International Conference on Advances in Power System Control, Operation & Management (APSCOM 2015), pp. 1-6, 2015.
[5]. Jiajia Yang, Junhua Zhao, Fengji Luo, Fushuan Wen, Zhao Yang Dong, Decision Making for Electricity Retailers: A Brief Survey", IEEE Transactions on Smart Grid, PP(99), pp. 1-5, 2017.
[6]. Jozi, A., Pinto, T., Praa, I., Silva, F., Teixeira, B., Vale, Z, Wang and mendel’s fuzzy rule learning method for energy consumption forecasting considering the influence of environmental temperature", In: Global Information Infrastructure and Networking Symposium (IEEE-GIIS), pp. 1-6, 2016.
[7]. Iftikhar, N., Liu, X., Nordbjerg, F.E., Danalachi, S, A prediction-based smart meter data generator", In 19th IEEE International Conference on Network-Based Information Systems (NBiS), pp. 173-180., 2016.
[8]. Noda, T., Nagashima, T., Sekisue, T., Kabasawa, Y., Kato, S., Sekiba, Y., Tokuda, H., Kounoto, M, Standard models for smart grid simulations, In IEEE International on Power Electronics (IPEC-Hiroshima 2014-ECCE-ASIA), pp. 2175-2182 , 2014
[9]. Dong, Q., Yu, L., Song, W., Yang, J., Wu, Y., Qi, J, Fast distributed demand response algorithm in smart grid", IEEE/CAA Journal of Automatica Sinica, 4(2) , pp. 280-296, 2017.
[10]. Arrigoni, C., Bigoloni, M., Rochira, I., Bovo, C., Merlo, M., Ilea, V., Bonera, R, Smart distribution management system: Evolution of mv grids supervision & control systems", In IEEE AEIT International Annual Conference (AEIT), pp. 1-6 , 2016.
[11]. Chen, Q., Wang, F., Hodge, B.M., Zhang, J., Li, Z., Shahe-khah, M., Catalao, J.P, Dynamic price vector formation model based automatic demand response strategy for pv-assisted ev charging station" IEEE Transactions on Smart Grid, pp. , 2017.
[12]. Kulkarni, S.A., Mishra, B., Analysis of peak to average power reduction technique in presence of nonlinear distortion", International Conference & Workshop on Electronics & Telecommunication Engineering (ICWET 2016), pp. 1-5, 2016.
[13]. Agnetis, A., de Pascale, G., Detti, P., Vicino, A., Load scheduling for household energy consumption optimization", IEEE Transactions on Smart Grid, 4(4), pp. 2364-2373, 2013.
[14]. Raiei, S., Bakhshai, A., A review on energy efficiency optimization in smart grid", In: IECON 2012-38th Annual Conference on IEEE Industrial Electronics Society, pp. 5916-5919, 2012.
[15]. Dlamini, F., Nicolae, D., An approach to quantify the technical impact of power quality in medium voltage distribution systems", In IEEE International Conference on Power Electronics and Motion Control Conference (PEMC), pp. 315-321, 2016.
[16]. Goudarzi, H., Hatami, S., Pedram, M, Demand-side load scheduling incentivized by dynamic energy prices", In IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 351-356, 2011.
[17]. Yan, B., Fan, H., Luh, P.B., Moslehi, K., Feng, X., Yu, C.N., Bragin, M.A., Yu, Y, Grid integration of wind generation considering remote wind farms: hybrid markovian and interval unit commitment" IEEE/CAA Journal of Automatica Sinica, 4(2) , pp. 205-215, 2017.
[18]. Cardosa, M., Wang, C., Nangia, A., Chandra, A., Weissman, J, Exploring mapreduce efficiency with highly-distributed data", In Proceedings of the second international workshop of ACM on MapReduce and its applications, pp. 27-34, 2011.
Citation
Sweety Jain, Sudeep Tanwar, Pradeep Kumar Singh, "Energy Optimization in Smart Grid using Tensor Decomposition," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.177-181, 2017.
Inregration and Interelation of Bigdata With Cloud Computing: A Review
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.182-186, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.182186
Abstract
In this current era, Information technology opens the door through which human enters into the smart , developing society with modern services in all aspects of living as well as several areas of business, medical and scientific studies, engineering and resulting a massive and exponential growth of data. Handling this voluminous data with traditional information technology frame work becomes a challenging and time demanding task in terms of data collection, storage, retrieval, analysis and application. At the same time cloud computing becomes a powerful model for data processing, storing massive amount of data and perform complex computation. We need to influence cloud computing techniques and solutions to deal with big data problems. In this review paper we focus on integration of big data in cloud environment, a comprehensive description of big data and its features, cloud computing and its characteristics and the relationship between both technologies and challenges it’s facing.
Key-Words / Index Term
Big Data, Big Data Management Tools, Cloud Computing, Cloud Services, Cloud Issues
References
[1] Zikopoulos PC, Eaton C, DeRoos D, Deutsch T, Lapis G. Understanding big data.New York, NY: McGraw-Hill; 2012.
[2] Bell G, Hey T, Szalay “A. Beyond the data deluge”. Science 2009;323(5919):12978.
[3] Manyika J, Chui M, Brown B, Bughin J, Dobbs R, Roxburgh C, et al. Big data: the next frontier for innovation, competition, and productivity. MacKinsey Global Institute;2011.
[4] Big Data Research and Development Initiative, http://www.whitehouse.gov/sites/ default/files/microsites/ostp/big_data_press_release_final_2.pdf..
[5] Gupta R, Gupta H, Mohania M. “Cloud computing and big data analytics: what is new from databases perspective? Big data analytics. “Berlin, Heidelberg: Springer; 2012. p. 4261.
[6] Ibrahim Abaker Targio Hashem , Ibrar Yaqoob , Nor Badrul Anuar , Salimah Mokhtar , Abdullah Gani , Samee Ullah Khan “The rise of “big data” on cloud computing: Review and open research issues” ,
[7] “Big Data Processing in Cloud Computing Environments” Changqing Ji, Yu Li,Wenming Qiu, Uchechukwu Awada, Keqiu Li
[8] Charlotte Castelino1, Dhaval Gandhi, Harish G. Narula, Nirav H. Chokshi ”Integration of Big Data and Cloud Computing”
[9] Alberto Fernández, Sara del Río,Victoria López,Abdullah Bawakid,María J. del Jesus José M. Benítezand Francisco Herrera ”Big Data with Cloud Computing: an insight on the computing environment, MapReduce,and programming frameworks”.
[10] Big Data Technologies and Cloud Computing available at “http://scitechconnect.elsevier.com/big-data-technologies-and-cloud-computing-
Citation
T. Saha, K. Das , "Inregration and Interelation of Bigdata With Cloud Computing: A Review," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.182-186, 2017.
Review On Feature Selection Techniques in Data Mining
Review Paper | Journal Paper
Vol.5 , Issue.11 , pp.187-191, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.187191
Abstract
Feature selection is a data pre-processing technique specially used for classification problems. It aims at identifying the minimal reduct with less number of features without affecting the classification accuracy of the data set. Its goal is to choose a negligible subset of features as indicated by some sensible criteria with the goal that the first undertaking can be accomplished similarly well, if worse. By picking an insignificant subset of features, unimportant and repetitive features are evacuated by the paradigm. Rough set theory is a technique that has been used for feature selection. It is utilizing to find the basic relationship from the uproarious data, which is utilizing the discritization strategy on discrete-esteemed properties and proceeds with values quality. It depends on making the equalance classes with in the given data, every one of the data tupels are making an equalance classes are indiscernalbe with the regard of the properties depicting data. Though there is many rough set based approaches like quick reduct, relative reduct entropy based reduct, these approaches are able to identify a reduct set. This paper presents a survey on various methods and techniques of feature selection and its advantages and disadvantages.
Key-Words / Index Term
Feature selection, PSO, ACO, GA, Data mining
References
[1]. Bin Hu, Yongqiang Dai, Yun Su, Philip Moore, Xiaowei Zhang, Chengsheng Mao, Jing Chen,Lixin Xu “Feature Selection for Optimized High-dimensional Biomedical Data using an Improved Shuffled Frog Leaping Algorithm” IEEE 1545-5963 ©2016.
[2]. Jiye Liang, Feng Wang, Chuangyin Dang, Yuhua Qian “ A Group Incremental Approach to Feature Selection Applying Rough Set Technique” IEEE Transactions on knowledge and data engineering, vol. 26, No. 2 , February ©2014.
[3]. Xiaohui Lin, Huanhuan Song, Meng Fan, Weijie Ren, Lishuang Li, Weihong Yao “The Feature Selection Algorithm Based on Feature Overlapping and Group” IEEE International Conference on Bioinformatics and Biomedicine(BIBM) ©2016.
[4]. Guoqing Cui, Jie Yang, Masoumeh Zareapoor, Jiechen Wang “Unsupervised Feature Selection Algorithm Based on Sparse Representation” The 2016 3rd International Conference on System and Informatics (ICSAI 2016).
[5]. Hong Wang, Xingjian Jing, Ben Niu “Bacterial - Inspired Feature Selection Algorithm and Its Application in Fault Diagnosis of Complex Structures” IEEE © 2016
[6]. Hossam M. Zawbaa, E. Emary, B. PARV , Marwa Sharawi “Feature Selection Approach based on Moth-Flame Optimization Algorithm” IEEE Congress on Evolutionary Computation (CEC) ©2016
[7]. Qian Guo, Yanpeng Qu, Ansheng Deng, Longzhi Yang “A New Fuzzy-rough Feature Selection Algorithm for Mammographic Risk Analysis” 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) 2016
[8]. Sun jiongjiong,liu jun, wei xuguang “Feature Selection algorithm based on SVM” 35th Chinese Control Conference July 27-29, 2016
[9]. Chunyong Yin, Luyu Ma, Lu Feng, Jin Wang, Zhichao Yin “A Hybrid Feature Selection Algorithm” 4th International Conference on Advanced Information Technology and Sensor Application 2015
[10]. Kilho Shin, Tetsuji Kuboyama, Takako Hashimoto “Super-CWC and Super-LCC: Super Fast Feature Selection Algorithms” IEEE International Conference on Big Data(Big Data) 2015
[11]. H. Hannah Inbarania, Ahmad Taher Azarb, G. Jothic “Supervised hybrid feature selection based on PSO and rough sets for medical diagnosis” computer methods and programs in biomedicine 113(2014) 175 – 185.
Citation
S. Ramadass, M.Gunasekaran, "Review On Feature Selection Techniques in Data Mining," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.187-191, 2017.
Public Transport Tracking and its Issues
Review Paper | Journal Paper
Vol.5 , Issue.11 , pp.192-197, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.192197
Abstract
Public transport is a fast and convenient way of travel, but there are many issues related to it. Challenges in current public transport system are: how to estimate the exact arrival time of vehicle and real tracking of vehicle. Solution of these two problems directly save the user time and provide better management for scheduling of vehicles. Many proposal exist in the literature to address above mentioned issues. Keeping the need of intelligent transportation system, this paper provides comparative analysis of all the state-of-art existing proposals. Tracking the vehicles generally takes two types of data: historical, and real time data. For real time tracking of vehicles, Global Positioning System (GPS), sensors, Internet of Things (IoT) devices, etc are used. Due to generation of huge amount of data from IoT enabled devices present in transport system, kalman filtering, artificial neural network, data analytics and machine learning are also used for better scheduling of vehicles. In last section we provide the open issues and challenges that needs to be taken care while designing the Intelligent Transport System (ITS).
Key-Words / Index Term
Vehicle Tracking, ITS, GPS, Smart City, Historical data, Real time data, Sensor, IoT
References
[1]. “Brt (bus rapid transit). metro rapid.,” Accessed October 1, 2000.
[2]. Y. Zhou, L. Yao, Y. Chen, Y. Gong, and J. Lai, “Bus arrival time calculation model based on smart card data,” Transportation Research Part C: Emerging Technologies, vol. 74, pp. 81–96, 2017.
[3]. C. Bai, Z.-R. Peng, Q.-C. Lu, and J. Sun, “Dynamic bus travel time prediction models on road with multiple bus routes,” Computational intelligence and neuroscience, vol. 2015, p. 63, 2015.
[4]. H. Yu, R. Xiao, Y. Du, and Z. He, “A bus-arrival time prediction model based on historical traffic patterns,” in Computer Sciences and Applications (CSA), 2013 International Conference on, pp. 345–349, IEEE, 2013.
[5]. F. Li, Y. Yu, H. Lin, and W. Min, “Public bus arrival time prediction based on traffic information management system,” in Service Operations, Logistics, and Informatics (SOLI), 2011 IEEE International Conference on, pp. 336–341, IEEE, 2011.
[6]. B. Yu, W. H. Lam, and M. L. Tam, “Bus arrival time prediction at bus stop with multiple routes,” Transportation Research Part C: Emerging Technologies, vol. 19 , no. 6, pp. 1157–1170, 2011.
[7]. S. I.-J. Chien, Y. Ding, and C. Wei, “Dynamic bus arrival time prediction with artificial neural networks,” Journal of Transportation Engineering, vol. 128, no. 5 , pp. 429–438, 2002.
[8]. J. Weng, C. Wang, H. Huang, Y. Wang, and L. Zhang, “Real-time bus travel speed estimation model based on bus gps data,” Advances in Mechanical Engineering, vol. 8, no. 11, p. 1687814016678162, 2016.
[9]. W. Liu, J. Liu, H. Jiang, B. Xu, H. Lin, G. Jiang, and J. Xing, “Wilocator: Wifisensing based real-time bus tracking and arrival time prediction in urban environments,” in Distributed Computing Systems (ICDCS), 2016 IEEE 36th International Conference on, pp. 529–538, IEEE, 2016.
[10]. M. Zaki, I. Ashour, M. Zorkany, and B. Hesham, “Online bus arrival time prediction using hybrid neural network and kalman filter techniques,” International Journal of Modern Engineering Research, vol. 3, no. 4, pp. 2035–2041, 2013.
[11]. P. Zhou, Y. Zheng, and M. Li, “How long to wait?: predicting bus arrival time with mobile phone based participatory sensing,” in Proceedings of the 10th international conference on Mobile systems, applications, and services, pp. 379–392, ACM, 2012.
[12]. T. Zhu, F. Ma, T. Ma, and C. Li, “The prediction of bus arrival time using global positioning system data and dynamic traffic information,” in Wireless and Mobile Networking Conference (WMNC), 2011 4th Joint IFIP, pp. 1–5, IEEE, 2011.
[13]. B. Ferris, K. Watkins, and A. Borning, “Onebusaway: results from providing realtime arrival information for public transit,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1807–1816, ACM, 2010.
[14]. S. Maiti, A. Pal, A. Pal, T. Chattopadhyay, and A. Mukherjee, “Historical data based real time prediction of vehicle arrival time,” in Intelligent Transportation Systems (ITSC), 2014 IEEE 17th International Conference on, pp. 1837–1842 , IEEE, 2014.
[15]. J. Gong, M. Liu, and S. Zhang, “Hybrid dynamic prediction model of bus arrival time based on weighted of historical and real-time gps data,” in Control and Decision Conference (CCDC), 2013 25th Chinese, pp. 972–976, IEEE, 2013.
[16]. R. Padmanaban, K. Divakar, L. Vanajakshi, and S. Subramanian, “Development of a real-time bus arrival prediction system for indian traffic conditions,” IET intelligent transport systems, vol. 4, no. 3, pp. 189–200, 2010.
[17]. S. I.-J. Chien and C. M. Kuchipudi, “Dynamic travel time prediction with realtime and historic data,” Journal of transportation engineering, vol. 129, no. 6 , pp. 608–616, 2003.
Citation
Jitendra Oza, Zunnun Narmawala, Sudeep Tanwar, Pradeep Kr Singh, "Public Transport Tracking and its Issues," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.192-197, 2017.
DSS Query Optimization and Effect of Input Output / Communication Cost Metrics
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.198-203, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.198203
Abstract
Decision Support System (DSS) query is an important type of distributed query. It plays an imperious role in decision making practise. However, it ingest loads of Input Output (I/O), processing and communication assets. Here, a 3-Join DSS query has been optimized using entropy and restricted chromosome based DSS query optimizer (ERC_QO). A study is carried out to inspect the consequences of varying the ratio of I/O and communication costs over Total Costs (total system resources). It is perceived that by plummeting the I/O to communication costs ratio, the communication costs can be more commendably optimized. For a 3-Join DSS query, the communication costs have been reduced by 90% approximately. Moreover, the Total Costs of 3-Join DSS query is abridged by 2%.
Key-Words / Index Term
DSS query, Query Optimization, I/O costs, Communication Costs
References
[1] C. D. French. One Size Fits All- Database Arch. Don’t Work for DSS. ACM SIGMOD Newsletter1995:24-2:449-450.
[2] S. Elnaffar, P. Martin, Is it DSS or OLTP: Automatically identifying DBMS Workload, Journal of Intelligent Information System. 30(3) (2008) 249-271.
[3] M. T. Ozsu, V. Patrick, Principles of Distributed Database System, second ed., Pearson Education (chap. 1–6).
[4] SB Yao, AR Hevener. Query processing in DDS. IEEE Trans. Soft. Eng. 1979;5(3):177–87.
[5] Pelagatti G, S Ceri ,. Allocation of operations in distributed database access. IEEE Trans. Comp. 1982;31(2):119–29.
[6] T. M. Martin, K.H. Lam, Judy I Russel, An Evaluation of Site Selection Algorithms for Distributed Query Processing, The Computer Journal. 33(1) (1990) 61-70.
[7] K. Donald, The State of the Art in Distributed QP, ACM Computing Surveys. 32(4) (2000) 422–469.
[8] M. Sharma, G. Singh, R. Singh. “Design and Analysis of Stochastic DSS Query Optimizer in a Distributed Database System”. Egyptian Informatics Journal. doi:10.1016/j.eij.2015.10.003.
[9] M. Sharma, G. Singh, G. Singh, R. Singh, Analysis of DSS Queries in DDS using Exhaustive and GA, International Journal of Advanced Computing. 36(2) (2013) 1165-1174.
[10] M. Sharma, G. Singh, R. Singh and G Singh. 2015. “Analysis of DSS Queries using Entropy based Restricted Genetic Algorithm”. Applied Mathematics and Information Science. Vol. 9, Issue 5.
[11] M. Sharma. 2013. “Role and Working of GA in Computer Science”. International Journal of Computer Applications and Information Technology. 2013; 2(1): 27-32.
[12] S. Ender, C. Ahmat, An Evolutionary GA for optimization of Distributed Database Queries, The Computer Journal. 54(5) (2011) 717-725.
Citation
M. Sharma, G. Singh, R. Singh, "DSS Query Optimization and Effect of Input Output / Communication Cost Metrics," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.198-203, 2017.
Performance Analysis for Real Time Application Over LTE Network
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.204-211, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.204211
Abstract
Packet Scheduling in LTE network is the fundamental task on which the performance of LTE network depends. Scheduling is a process to allocate the resources to users. Radio resource management is used for resource allocation. Many scheduling algorithms have been designed and proposed for scheduling. Scheduling is performed in both direction uplink and downlink. The main aim of this paper is to analyze the performance of downlink scheduling algorithms for real time flow. Three schedulers,i.e, Modified Largest Weight Delay First , Exponential Proportional Fairness, and Proportional Fairness are used for scheduling for real time flow VIDEO and non real time flow VOIP. The performance of schedulers is analyzed in terms of packet loss ratio, throughput and delay parameters. The result shows that performances of PF scheduler are not appropriate for real time application.
Key-Words / Index Term
LTE architecture, RRM, PF, M-LWDF, EXP-PF
References
[1] Monika and Deepak Nandal, "Downlink Packet Scheduling Over LTE Network: A Review," International Journal for Research in Applied Science & Engineering Technology, Vol. 5, Issue VI, pp 2293-2297, June 2017.
[2] A. Dagar, Archana, and D. Nandal, “High performance Computing Algorithm Applied in Floyd Steinberg Dithering,” International Journal of Computer Applications., vol. 43, pp. 11–13, Apr. 2012.
[3] Ambreen Ahmad M. T. Beg and S.N. Ahmad, "Resource Allocation Algorithm in LTE: A Comparative Analysis," IEEE. 2015.
[4] Vallari Sharma, P.K. Sharma, “A survey On LTE Downlink Packet Scheduling,” International Journal Of Advanced Research in Computer and Communication Engineering. Vol. Issue 9, pp.7896-7899, Sep. 2014.
[5] AymanHajjawi, Mahamod Ismail, and Tito Yuwono, "Implementation of Three Scheduling Algorithm in Smart Grid Communication Over 4G Networks," International Conference on Space Science and Communication (Icon space), Langkawi, Malaysia, 10-12 Aug. 2015.
[6] F. Capozzi, G. Piro, L. A. Grieco, G. Boggia, and p. Boggia, “Downlink Packet Scheduling in LTE Cellular Networks: Key Design Issues and a Survey,” IEEE. Communication Surveys & Tutorials, Vol. 15, no. 2, Second Quarter 2013.
[7] Sindura Sara Palli, "A Thesis on LTE Downlink Scheduling Algorithm," published by Proquest.
[8] Pardeep Kumar, Sanjeev Kumar and ChetnaDabas, "Comparative Analysis of Downlink Scheduling Algorithm for a Cell Affected by Interference in LTE Network,” Springer, DOI.No. 10 1007/ s4075-016-076-x, 13- April 2013.
[9] Pardeep Kumar and Sanjeev Kumar, "Performance analysis of Downlink Packet scheduling algorithm in LTE networks,” Springer Science + Business Media Singapore 2016.
[10] P. Charanya, A. Pavithra, "Content Caching and Multicasting of 5G Hetrogeneous Cellular Wireless Networks", International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.61-66, 2017.
[11] Le Thanh Tuan, DaesungYoo, Hyungjoo Kim, GwangjuJin, Byungtae Jang, and Soong Hwan Ro, "The Modified Proportional Fair Packet Scheduling Algorithm for Multimedia Traffic in LTE System,” Springer-Verlag Berlin Heidelberg 2012.
[12] Davinder Singh and Preeti Singh, “Radio Resource Scheduling in 3GPP LTE: A Review,” International Journal of Engineering Trends and Technology (IJETT) – Volume 4, Issue 6, pp-2405-2411, June 2013
[13] P. Sengar, N. Bhardwaj, "A Survey on Security and Various Attacks in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.78-84, 2017.
[14] SamiaDardouri, RidhaBouallegue, “Comparative Study of Downlink Packet Scheduling for LTE Networks,” Springer Science + Business Media, New York, 21 Jan. 2015.
[15] BiswasParatapsinghSahoo, "Performance Comparison of Packet Scheduling Algorithm for Video Traffic in LTE Cellular Networks," International Journal of Mobile Networks Communication & Telematics," Vol. 3, No. 3, pp.9-17,June 2013
[16] V. Nandal and D. Nandal, “Maximizing Lifetime of Cluster-based WSN through Energy-Efficient Clustering Method,” International Journal of Computer Science & Management Studies, vol. 12, no. 3,pp 101-105, Sep. 2012.
[17] P. Yadav and D. Nandal, “Proposing new Equalizer of better performance than previous ones for MIMOOFDM Systems,” IJLTET, vol. 7, no. 3, pp. 524–530,September 2016
[18] V. Nandal and D. Nandal, “Energy Efficient, Multi-hop Routing scheme, within Network Aggregation for WSN,” International Journal of Computer Science & Management Studies, vol. 12, pp. 201–207, Jun. 2012.
[19] Giuseppe Piro, Luigi Alfredo Grieco, GennaroBoggia, Francesco Capozzi and PietroCamarda, “Simulating LTE Cellular System: An Open Source Framework,” IEEE Trns. Vehicular Technology, Oct. 2010.
Citation
Monika, Deepak Nandal, "Performance Analysis for Real Time Application Over LTE Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.204-211, 2017.
Using Data mining for Forecasting Public Healthcare Services in India: a case study of Punjab
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.212-216, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.212216
Abstract
A big benefit of using data mining and knowledge management techniques is to create a dynamic knowledge rich health care environment. The application of Knowledge Discovery in Databases (KDD) can be done by skilled employees with good knowledge of health care industry. Thus, meaningful patterns and strategic solutions can be developed while working with massive quantities of data which can help to improve the quality of healthcare services offered to patients. This function is particularly useful for Insurance companies, Physicians, Pharmaceutical companies and by the Government health planners and management personals for the formulation of effective policies. However, there are a many issues that arise while dealing with such massive data, especially how this data can be analyzed in a reliable manner. The basic aim of Health Informatics is to take medical data from the real world and from all levels of human existence to help advance our understanding of health care facilities, medicine and medical practices. In this paper, we explored the Health care data of one of the Northern State of India, Punjab, available with HMIS database, using Big Data tools and approaches, which help in answering several critical questions with respect to healthcare facilities, for effective utilization and policy formulation of resources available. Data of Indoor Patient Department (IPD) and Outdoor Patient Department (OPD) from 2010 to 2017 has been used to forecast the number of patients in advance for coming years, taking into consideration most efficient model based on the accuracy of the forecasts, so that the planning is done well in advance for providing better health care facilities for the forthcoming patients.
Key-Words / Index Term
Big Data, HMIS, Data mining, KDD, OPD, IPD, Time Series
References
[1]. Rajesh Kumar Sinha, “ Impact of Health Information Technology in Public Health”, Sri Lanka Journal of Bio-Medical Informatics 2010,1(4):223-36
[2]. Pushpalata Pujari and Jyoti Bala Gupta, “Exploiting Data Mining Techniques for Improving the Efficiency of Time Series data using SPSS-Clementine,” Journal of Arts, Science & Commerce, vol. 3, issue 2(3), pp.69-80, April 2012.
[3]. The NRHM website. [Online]. Available: http://nrhm.gov.in/
[4]. http://censusindia.gov.in/vital_statistics/SRS_Bulletins/SRS%20Bulletin%20-Sepetember%202014.pdf
[5]. Albert Orwa Akuno et al., “Statistical Models for Forecasting Tourists’ Arrival in Kenya,” Open Journal of Statistics, vol.5,
pp.60-65, Feb. 2015.
[6]. Labib Arafeh, “ A Modified Neurofuzzy Based Quality of eLearning Model (Modified SCeLQM)”, International Journal of Computer and Information Technology , Vol 03 , No. 06, November 2014.
[7]. P. Singh and V. Mansotra, "Data mining based Tools and Techniques in Public Health Care management: - A study",
in INDIACom2017, New Delhi, 2017, pp. 425- 29.
Citation
Parveen Singh, Vibhakar Mansotra, "Using Data mining for Forecasting Public Healthcare Services in India: a case study of Punjab," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.212-216, 2017.
A GUI Based Run-Time Analysis of Sorting Algorithms and their Comparative Study
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.217-221, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.217221
Abstract
The analysis of algorithms is a subject that has always arouses enormous inquisitiveness. It helps us to determine the efficient algorithm in terms of time and space consumed. There are valid methods of calculating the complexity of an algorithm. In general, a suitable solution is to calculate the run time analysis of the algorithm. The present study documents the comparative analysis of seven different sorting algorithms of data structures viz. Bubble sort, Selection sort, Insertion sort, Shell sort, Heap sort, Quick sort and Merge sort. The implementation is carried out in Visual Studio C# by creating a Graphical User Interface to calculate the running time of these seven algorithms.
Key-Words / Index Term
Algorithm, Complexity, Runing Time, Sorting, Data Structures
References
[1] S. K. Basu, “Design Methods and Analysis of Algorithms”, PHI Publication, India, 2005.
[2] Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, “Fundamentals of Computer Algorithms”, Universities Press Publication, India, 2009.
[3] ISRD Group, “Data Structures using C”, Tata McGraw-Hill Publication, India, 2006.
[4] R. S. Salaria, “Data Structures & Algorithms Using C”, Khanna Book Publication, India, 2012.
[5] Narasimha Karumanchi, “Data Structures and Algorithms Made Easy in Java”, CareerMonk Publication, India, 2015.
[6] The GeeksQuiz website. [Online].
Available: http://quiz.geeksforgeeks.org
[7] Sonal Beniwal and Deepti Grover, “Comparison of Various Sorting Algorithms: A review”, International Journal of Emerging Research in Management & Technology, Vol.2, Issue.5, pp.83-86, 2013.
[8] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein, “Introduction to Algorithms”, Prentice-Hall Publisher, India, 2001.
[9] Miraj Gul, Noorul Amin and M. Suliman, “An Analytical Comparison of Different Sorting Algorithms in Data Structure”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.5, Issue.5, pp.1289-1298, 2015.
[10] Yashavant Kanetkar, “Data Structures through C”, BPB Publication, India, 2010.
[11] Bremananth R, Radhika. V and Thenmozhi. S, “Visualization of Searching and Sorting Algorithms”, International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol.3, No.3, pp.633-641, 2009.
[12] Sanjoy Dasgupta, Christos Papadimitriou and Umesh Vazirani, “Algorithms”, Tata McGraw-Hill Publication, India, 2009.
[13] Narasimha Karumanchi, “Data Structures and Algorithms Made Easy”, CareerMonk Publication. India, 2011.
[14] Sourabh Shastri, “Studies on the Comparative Analysis and Performance Prediction of Sorting Algorithms in Data Structures”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, No. 5, pp. 1187-1190, 2014.
[15] Sourabh Shastri, Prof. Vibhakar Mansotra and Anand Sharma, “Sorting Algorithms and their Run-Time Analysis with C#”, International Journal of Computer Science and Information Technology & Security, Vol. 5, No.5, pp. 388-395, 2015.
Citation
Sourabh Shastri, Vibhakar Mansotra, Arun Singh Bhadwal, Monika Kumari, Avish Khajuria, Dalbir Singh , "A GUI Based Run-Time Analysis of Sorting Algorithms and their Comparative Study," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.217-221, 2017.
Hybrid Legal Intelligent System Using Fuzzy and Neural Networks
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.222-231, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.222231
Abstract
In this paper, we describe the implementation of Hybrid Intelligence system for Indian legal domain by using neural network and fuzzy technique. The objective of this research is to develop a legal expert system for auto-insurance, a domain within the Indian legal system. We have proposed legal reasoning system which basically integrates rule based and case based reasoning in a structured manner for critical task units in auto-insurance domain. The end user of the system can be the insurer as well as lawyer in order to take any legal actions. The system mainly handles three main functional blocks of auto-insurance claim processing: i) validation of rules and regulations of motor vehicle act, ii) verification of the ‘extent of damage’ attribute, and iii) analysing history legal cases for reference. The scope of this hybrid system is limited to validation and verification of auto-insurance claim processing pertaining to Indian legal system. All these functional blocks play important role in providing logical solution for claim compensation.
Key-Words / Index Term
Fuzzy Legal Expert System, Fuzzy Case Based Reasoning System, Hybrid Expert System, Hybrid Legal Intelligent System, Legal Intelligent System, Neural Network
References
[1] Kaoru Hirota, MingQiangXu, Yasufumi Takama and Hajime Yoshino, ”Implementation of Fuzzy Legal Expert System FLES”.
[2] William M.Bain,”Judge: A Case-based Reasoning System “.
[3] Kevin D Ashley,”Case-Based Models of Legal Reasoning in a Civil Law Context”.
[4] Walter G. Popp and Bernhard Schlink,” JUDITH, A COMPUTER PROGRAM TO ADVISE LAWYERS IN REASONING A CASE “
[5] L.Thorne McCarty, ”Reflections on TAXMAN: An Experiment in Artificial Intelligence and legal reasoning”
[6] John Zeleznikow,”Split-up: a web-based legal decision support system that advises upon the distribution of marital property
[7] Rissland, E.L., Skalak, D.B.:“CABARET: Statutory Interpretation in a Hybrid Architecture. International Journal of Man-Machine Studies (IJMMS)”
[8] George Vossos, John Zeleznikow and Daniel Hunter,
“The IKBALS project: Multi-modal reasoning in legal knowledge based systems by George Vossos, John Zeleznikow and Daniel Hunter”.
[9] James Popple, Eric McCreath,” SHYSTER-MYCIN: A Hybrid Legal Expert System by Thomas A.O’Callaghan”.
[10] Robert T.H.Chi and Melody Y.Kiang, “An Integrated Approach of Rule-Based and Case-Based Reasoning for decision support”.
[11] Piero P. Bonissone, Ramon Lopez de Mantaras, “Fuzzy Case-Based Reasoning Systems”.
[12] Kaoru Hirota, MingQiangXu, Yasufumi Takama and Hajime Yoshino,” Implementation of Fuzzy Legal Expert System FLES”.
[13] Pero Subasic , JURGEN HOLLATZ,” Analogy making in legal reasoning with neural networks and fuzzy logic”.
[14] MINGQIANG XU , KAORU HIROTA and HAJIME YOSHINO, “A fuzzy theoretical approach to case-based representation and inference in CISG”.
[15] Jim Prentzas, “Categorizing Approaches Combining Rule-Based and Case-Based Reasoning”.
[16] Jurgen Hollatz, “Analogy making in legal reasoning with neural networks and fuzzy logic”, Artificial Intelligence and Law 7: 289–301, 1999.
[17] Piero P. Bonissone, Ramon Lopez de Mantaras, F4.3 Fuzzy Case-Based Reasoning Systems
[18] Jang-Hee Yoo and Byoung-Ho Kang, “A Hybrid Approach to Auto-Insurance Claim Processing System”
[19] N B Bilgi, Dr. R V Kulkarni & Clive Spenser, “An Expert System using A Decision Logic Charting Approach for Indian Legal Domain With specific reference to Transfer of Property Act”
[20] Thomas Alexander O’Callaghan, A Hybrid Legal Expert System
[21] Mariana Maceiras Cabrera, Ernesto Ocampo Edye, “ Integration of Rule Based Expert Systems and Case Based Reasoning in an Acute Bacterial Meningitis Clinical Decision Support System”
[22] Gun Ho Lee,” Rule-based and case-based reasoning approach for internal audit of bank”, Knowledge-Based Systems 21 (2008) 140–147
[23] BING CHIANG JENG AND TING-PENG LIANG, “Fuzzy Indexing and Retrieval in Case-Based Systems”, Expert Systems with Applications, Vol. 8, No. 1, pp. 135-142, 1995
[24] J. Popple,”Legal expert systems: The inadequacy of a rule-based approach
[25] John Zeleznikow, Andrew Stranieri, “Using Machine Learning to construct legal knowledge based systems”
[26] Andrew Stranieri, John Zeleznikow, Mark Gawler, Bryn Lewis,” A hybrid rule - neural approach for the automation of legal reasoning in the discretionary domain of family law in Australia”.
[27] H. Prakken, A.J. Muntjewerff, A. Soeteman, Legal knowledge based systems JURIX 94 The Relation with Legal Theory”
[28] Hyung Lee-Kwang, Yoon-Seon Song and Keon-Myung Lee, similarity measure between fuzzy sets and between elements, Fuzzy Sets and Systems 62 (1994) 291-293
[29] Michael Aikenhead Follow, The Uses and Abuses of Neural Networks in Law, Santa Clara High Technology Law Journal
[30] H. Prakken, A.J. Muntjewerff, A. Soeteman, Legal knowledge based systems,JURIX 94, The Relation with Legal Theory
[31] NTT DOCOMO, A Precedent-based Legal Judgement System using Fuzzy Relational Database, Chapter in International Journal of Uncertainty Fuzziness and Knowledge-Based Systems • January 1995
[32] Jayanta Basak, Desmond Lim,”A Feasibility study on automating the automotive insurance claim processing”
Citation
S. Sridevi, P. Venkata Subba Reddy , "Hybrid Legal Intelligent System Using Fuzzy and Neural Networks," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.222-231, 2017.
Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.232-241, Nov-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i11.232241
Abstract
Without the dependence of any infrastructure or central administration to create a temporary network that includes a group of nodes and wireless hosts called as the Adhoc Mobile Network (MANET). Where multipath routing in MANET has been used primarily to transmit data without interruption. Everywhere, the routing technique is primarily considered to ensure the transmission of the message while being used in some protocols. But transmission security is one of the main disadvantages of this network. Therefore, use Secure Multipath Optimized Link State Routing Protocol (SMOLSR), which is a proactive approach to routing protocol-controlled tables, to improve efficiency, which primarily depends on multipoint relay selection (MPR). A new routing protocol for MANET is the progress of the OLSR, which integrates the multi-route strategy and the source routing control scheme. In this protocol, a Dijkstra adaptive algorithm (ADA) has been developed to estimate short-time path based multipath routing and create a control node using the hop in hop authentication model through the bidirectional authentication process (TWA). Initially, find a more limited path using the Dijkstra calculation to create a duplicate topology. In this way, delete the inner and third centers, look for a second more limited path using the Dijkstra calculation. This methodology is called a multi-Dijkstra algorithm. The main objective of the research work defining the quality of the link and the selection of the paths. The TWA process is performed for security to effectively transmit the message. If an interrupt occurs in the source-destination path, it automatically confirms the route to deliver the end-user message without loss of data. The transmitted message is well protected by a TWA process. The performance of the proposed SMOLSR protocol is compared with the many traditional protocols such as OLSR, AOMDV and CA-AOMDV. As a result, the results of the proposed SMOLSR protocol have surpassed that of other protocols.
Key-Words / Index Term
Multi-Point Relay (MPR), Two Way Authentication (TWA), Adaptive Dijkstra Algorithm (ADA)
References
[1] D. S. Dhenakaran and A. Parvathavarthini, "An overview of routing protocols in mobile ad-hoc network," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, 2013.
[2] P. Periyasamy and E. Karthikeyan, "Survey of current multipath routing protocols for mobile ad hoc networks," International Journal of Computer Network and Information Security, vol. 5, p. 68, 2013.
[3] H. Kaur, V. Sahni, and M. Bala, "A Survey of Reactive, Proactive and Hybrid Routing Protocols in MANET: A Review," network, vol. 4, pp. 498-500, 2013.
[4] M. Marimuthu and I. Krishnamurthi, "Enhanced OLSR for defense against DOS attack in ad hoc networks," journal of communications and networks, vol. 15, pp. 31-37, 2013.
[5] D. Natarajan and A. P. Rajendran, "AOLSR: hybrid ad hoc routing protocol based on a modified Dijkstra`s algorithm," EURASIP Journal on Wireless Communications and Networking, vol. 2014, p. 90, 2014.
[6] E. S. A. Ganie and M. N. Sharma, "Interference-Aware and Fault Tolerant Multipath Routing Protocols for Mobile Ad Hoc Networks," International Journal of Engineering Science, vol. 2524, 2016.
[7] C. B. Dutta and U. Biswas, "A novel blackhole attack for multipath AODV and its mitigation," in Recent Advances and Innovations in Engineering (ICRAIE), 2014, 2014, pp. 1-6.
[8] Vipul Kumar, Musheer Vaqar, "BLACK HOLE Attack: A New Detection Technique", International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.63-67, 2016.
[9] K. Somasundaram, "An Effective CBHDAP Protocol for Black Hole Attack Detection in Manet," Indian Journal of Science and Technology, vol. 9, 2016.
[10] P. Pavithra, "Averting Techniques of Black-Hole Attack–A Survey," Indian Journal of Science and Technology, vol. 9, 2016.
[11] M. S. A. A. Mahmood, D. T. M. Hasan, and M. S. D. S. Ibrahim, "Modified AODV routing protocol to detect the black hole attack in MANET," International Journal, vol. 5, 2015.
[12] R. Ahlawat and S. K. Chaturvedi, "A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET," International Journal of Computer Applications, vol. 80, 2013.
[13] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[14] M. K. P. Dubey and E. K. Barua, "A Review-Techniques to Mitigate Black/Gray Hole Attacks in MANET," Engineering Universe for Scientific Research and Management (EUSRM) Volume, vol. 6, 2014.
[15] C. She, P. Yi, J. Wang, and H. Yang, "Intrusion Detection for Black Hole and Gray Hole in MANETs," TIIS, vol. 7, pp. 1721-1736, 2013.
[16] S. Mandala, M. A. Ngadi, J. M. Sharif, M. S. M. Zahid, and F. Mohamed, "Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks," International Journal of Embedded Systems, vol. 7, pp. 296-305, 2015.
[17] A. Adnane, C. Bidan, and R. T. de Sousa Júnior, "Trust-based security for the OLSR routing protocol," Computer Communications, vol. 36, pp. 1159-1171, 2013.
[18] Vinita keer and Syed Imran Ali, "A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network", International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.54-58, 2016.
[19] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013
[20] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[21] S. Ali, S. A. Madani, and I. A. Khan, "Routing protocols for mobile sensor networks: A comparative study," arXiv preprint arXiv:1403.3162, 2014.
[22] R. K. Gujral, J. Grover, A. Anjali, and S. Rana, "Impact of transmission range and mobility on routing protocols over ad hoc networks," in Computing Sciences (ICCS), 2012 International Conference on, 2012, pp. 201-206.
[23] A. S. Otero and M. Atiquzzaman, "Adaptive localized active route maintenance mechanism to improve performance of voIP over ad hoc networks," 2011.
[24] A. Taha, R. Alsaqour, M. Uddin, M. Abdelhaq, and T. Saba, "Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function," IEEE Access, vol. 5, pp. 10369-10381, 2017.
Citation
Madgula Vijaya Bhaskar, G.A. Ramachandra, Y. Deepika, "Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.232-241, 2017.