Hybrid DES-RSA Model for the Security of Data over Cloud Storage
Research Paper | Journal Paper
Vol.11 , Issue.10 , pp.1-7, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.17
Abstract
Cloud computing is a novel business strategy. Over the past several years, the idea of cloud computing has matured, becoming one of the most rapidly expanding business concepts in the IT sector. The capacity of cloud computing to supply consumers with elastic, dependable, and reasonably priced services on demand has contributed to its meteoric rise in popularity in recent years. Since cloud computing provides users with scalable, on-demand services while requiring less investment in infrastructure. Client data and computations must be protected from both internal and external threats in order to allay fears that cloud computing is inherently insecure. This is due to the fact that cloud users get the required information from distant cloud servers that are not under the direct management of the data owners and that the data owners store their sensitive information on remote hosts. The client has the option of implementing security measures such as firewalls, VPNs, and other perimeter-based controls to safeguard their information. Data stored in the cloud raises privacy and security concerns since it is not located on the client`s premises. Therefore, data security is a major focus area in the cloud computing industry. To address these issues with cloud data security, we have developed solutions and strategies. Collectively, the models we`ve offered to ensure data security, privacy, and integrity constitute comprehensive principles for bolstering cloud data security. Cloud security risks and privacy issues, as well as the types of assaults and threats to which clouds are susceptible, are all addressed in the models. We`ve also solved the problem of how to store data on the cloud effectively. Additionally, we propose a general security model for cloud computing that might assist in satisfying its security requirements and safe guarding clouds from different hazardous behaviors.
Key-Words / Index Term
Cloud Computing, Cryptography, DES, RSA, Cloud Security, Authentication
References
[1] P. Yang, N. Xiong and J. Ren, "Data Security and Privacy Protection for Cloud Storage: A Survey," in IEEE Access, Vol.8, pp.131723-131740, 2020.
[2] P.K. & Aremu, Prof Sir Bashiru. (2020), Cloud Service Providers: An Analysis of Some Emerging Organizations and Industries, Srinivas & Paul Publication, India, pp.172-183, 2020.
[3] Kaja, Durga & Fatima, Yasmin & Mailewa, Akalanka. Data Integrity Attacks in Cloud Computing: A Review of Identifying and Protecting Techniques. International Journal of Research Publication and Reviews. pp.713-720, 2022.
[4] A. Bhargav, & Manhar, Advin. A Review on Cryptography in Cloud Computing. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. pp.225-230, 2020.
[5] S. A. Nooh, "Cloud Cryptography: User End Encryption," 2020 International Conference on Computing and Information Technology (ICCIT-1441), Tabuk, Saudi Arabia, 2020, pp.1-4, 2020.
[6] S. Kumar, G. Karnani, M. S. Gaur and A. Mishra, "Cloud Security using Hybrid Cryptography Algorithms," 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, pp.599-604, 2021.
[7] Duan, Qiang & Wang, Shangguang & Ansari, Nirwan. (2020). Convergence of Networking and Cloud/Edge Computing: Status, Challenges, and Opportunities. IEEE Network. pp.1-8, 2020.
[8] Bruno Guazzelli Batista, Carlos Henrique Gomes Ferreira, Danilo Costa Marim Segura, Dionisio Machado Leite Filho & Maycon Leone Maciel Peixoto, ‘A QoS-driven approach for cloud computing addressing attributes of performance and security’, Future Generation Computer Systems, Vol.68, pp.260-274, 2017.
[9] M Subha & Banu Uthaya, M 2014, ‘A survey on QoS ranking in cloud computing’, International Journal of Emerging Technology and Advanced Engineering, Vol.4, No.2, pp.293-300, 2014.
[10] Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil,A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends, Computers & Security, Vol.65, pp.29-49, 2017.
[11] P Natesan, RR Rajalaxmi, Gowrison & P Balasubramanie, 2017, ‘Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection’, International Journal of Pattern Programming, Vol.45, No.5, pp.1194-1213, 2017.
[12] Salman Iqbal, Laiha, Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman khan, Muhammad Khurram Khan & Kim-Kwang Raymond Choo 2016, ‘On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service’, International Journal of Network and Computer Applications, Vol.74, pp.98-120, 2016.
[13] Syed Asad Hussain, Mehwish Fatima, Atif Saeed, Imran Raza, Raja & Khurram Shahzad 2017, ‘Multilevel classification of security concerns in cloud computing’, Applied Computing and Informatics, Vol.13, No.1, pp.57-65, 2017.
[14] Dinh-Mao Bui, YongIk, Yoon, Eui-Nam, Huh, SungIk Jun & Sungyoung Lee 2017, ‘Energy efficiency for cloud computing system based on predictive optimization’, Journal of Parallel and Distributed Computing, Vol.102, pp.103-114, 2017.
[15] Durfi Ashraf & Sayiema Amin 2016, ‘Information hiding based on optimization technique for Encrypted Images’, International Research Journal of Engineering and Technology (IRJET), Vol.3, No.1, pp.1-6, 2016.
[16] A. Prabhu, & M Usha, ‘A Secured best data centre selection in cloud computing using encryption techniques’, International Journal of Business Intelligence and Data Mining, Vol.14, No.1/2, 2019.
Citation
Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi, "Hybrid DES-RSA Model for the Security of Data over Cloud Storage," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.1-7, 2023.
Machine Learning Algorithm for Fault Detetction In Three Phase Power Systems
Research Paper | Journal Paper
Vol.11 , Issue.10 , pp.8-14, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.814
Abstract
Machine learning (ML) finds extensive utility across diverse engineering domains, serving a myriad of purposes. Within the realm of power systems, traditional fault detection relies on relays and measurement equipment to pinpoint anomalies. These anomalies are subsequently categorized based on their characteristics. ML tools offer the prospect of crafting algorithms capable of forecasting these faults. This study entails the emulation of a power distribution system within software, employing machine learning algorithms to predict faults. The dependable and efficient operation of power systems stands as a pivotal factor in guaranteeing a constant power supply, thereby satisfying the requirements of contemporary society. Through the application of these methods, our aim is to create a more effective and precise fault detection algorithm tailored for three-phase power systems. This article delves into the intricacies linked with forecasting faults in power systems, provides an overview of pertinent ML methodologies, and delivers a case study that illustrates the efficacy of ML-driven intelligent fault prediction within real-world power system scenarios.
Key-Words / Index Term
Maine Learning, Fault, Power system, Algorithms, Fault detection, Prediction
References
[1] A. Firos, N. Prakash, R. Gorthi, M. Soni, S. Kumar and V. Balaraju, ”Fault Detection in Power Transmission Lines Using AI Model,” 2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS), Raichur, India, pp.1-6, 2023.
[2] Manojna, Sridhar H. S, Nikhil Nikhil, Anand Kumar, and Pratyay Amrit. Fault detection and classification in power system using machine learning. In 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), pp.1801– 1806, 2021.
[3] Nouha Bouchiba and Azeddine Kaddouri. Application of machine learning algorithms for power systems fault detection. In 2021 9th International Conference on Systems and Control (ICSC), pp.127–132, 2021.
[4] Nikola Markovic, Thomas Stoetzel, Volker Staudt, and Dorothea Kolossa. Hybrid fault detection in power systems. In 2019 IEEE International Electric Machines and Drives Conference (IEMDC), pp.911–915, 2019.
[5] Halil Alper Tokel, Rana Al Halaseh, Gholamreza Alirezaei, and Rudolf Mathar. A new approach for machine learning-based fault detection and classification in power systems. In 2018 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp.1–5, 2018.
[6] Rachna Vaish and U.D. Dwivedi. Comparative study of machine learning models for power system fault identification and localization. In 2021 4th International Conference on Recent Trends in Computer Science and Technology (ICRTCST), pp.110– 115, 2022.
[7] Akshay Ajagekar and Fengqi You. Quantum computing based hybrid deep learning for fault diagnosis in electrical power systems. Applied Energy, 303:117628, 2021
[8] Helon Vicente Hultmann Ayala, Didace Habineza, Micky Rakotondrabe, and Leandro dos Santos Coelho. Nonlinear black-box system identification through coevolutionary algorithms and radial basis function artificial neural networks. Applied Soft Computing, 87:105990, 2020
[9] Bilal, Millie Pant, Hira Zaheer, Laura Garcia-Hernandez, and Ajith Abraham. Differential evolution: A review of more than two decades of research. Engineering Applications of Artificial Intelligence, 90:103479, 2020
[10] Shahriar Rahman Fahim, Yeahia Sarker, Subrata K. Sarker, Md. Rafiqul Islam Sheikh, and Sajal K. Das. Self attention convolutional neural network with time series imaging based feature extraction for transmission line fault detection and classification. Electric Power Systems Research, 187:106437, 2020.
[11] Hassan Fathabadi. Novel filter based ann approach for shortcircuit faults detection, classification and location in power transmission lines. International Journal of Electrical Power and Energy Systems, 74: pp.374–383, 2016
[12] Hassan Fathabadi. Novel filter based ann approach for shortcircuit faults detection, classification and location in power transmission lines. International Journal of Electrical Power and Energy Systems, 74: pp.374–383, 2016
[13] O.A. Gashteroodkhani, M. Majidi, M. Etezadi-Amoli, A.F. Nematollahi, and B. Vahidi. A hybrid svm-tt transform-based method for fault location in hybrid transmission lines with underground cables. Electric Power Systems Research, 170: pp.205–214, 2019.
[14] Alireza Ghaedi, Mohammad Esmail Hamedani Golshan, and Majid Sanaye-Pasand. Transmission line fault location based on threephase state estimation framework considering measurement chain error model. Electric Power Systems Research, 178:106048, 2020.
[15] Mevludin Glavic. (deep) reinforcement learning for electric power system control and related problems: A short review and perspectives. Annual Reviews in Control, 48: pp.22–35, 2019.
[16] Sandeep Kumar Verma, Turendar Sahu, Manjit Jaiswal, (2019). A Deep Analysis and Efficient Implementation of Supervised Machine Learning Algorithms for Enhancing The Classification Ability of System. International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1094-1101, 2019.
[17] Harsh H. Patel, Purvi Prajapati, (2018). Study and Analysis of Decision Tree Based Classification Algorithms. International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.74-78, 2018.
Citation
Komal Porwal, "Machine Learning Algorithm for Fault Detetction In Three Phase Power Systems," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.8-14, 2023.
Survey-Based Intelligent Tutoring System (ITS) to Support Emotional and Sentiment Analysis in Education
Survey Paper | Journal Paper
Vol.11 , Issue.10 , pp.15-18, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.1518
Abstract
This article delves into the evolving landscape of education technology, with a particular focus on Intelligent Tutoring Systems (ITS). These systems have redefined the educational experience by harnessing the power of artificial intelligence and machine learning to deliver personalized and adaptive learning journeys. While traditional ITS prioritize academic performance, a burgeoning realm of research is exploring the integration of emotional and sentiment analysis into these systems. This article navigates this frontier, shedding light on a novel approach—the survey-based ITS. This innovative concept seeks to support emotional and sentiment analysis within the educational context, emphasizing its potential significance and transformative impact on the field of education. Moreover, this article acknowledges the pivotal role that emotional intelligence (EI) plays in a student`s holistic development and learning trajectory. EI encompasses a spectrum of abilities, including the capacity to recognize, comprehend, and regulate one`s own emotions, as well as those of others. In the educational milieu, cultivating emotional intelligence is essential for fostering a positive and effective learning environment. By seamlessly incorporating emotional analysis into Intelligent Tutoring Systems, educators can gain invaluable insights into students` emotional states, paving the way for more precise and empathetic support. In this regard, this article strives to unveil the multifaceted facets of emotional intelligence in education, underlining its profound significance and offering practical strategies for seamless integration.
Key-Words / Index Term
Emotional Intelligence, Education Technology, emotional Analysis.
References
[1]. Goleman, D. Emotional Intelligence: Why It Can Matter More Than IQ. Bantam, JOURNAL NAME: Psychology, Vol.4, No.4, April 17, 2013
[2]. Brackett, M. A., & Katulak, N. A. Emotional Intelligence in the Classroom: Skill-Based Training for Teachers and Students. In J. Ciarrochi, J. R. Forgas, & J. D. Mayer (Eds.), Emotional Intelligence in Everyday Life: A Scientific Inquiry. Psychology Press, pp.255-273, 2006.
[3]. Elias, M.J., & Arnold, H. The Educator`s Guide to Emotional Intelligence and Academic Achievement: Social-Emotional Learning in the Classroom. Corwin Press. pp.133-145, 2006.
[4]. Salovey, P., & Mayer, J. D. Emotional Intelligence. Imagination, Cognition and Personality, Vol.9, Issue.3, pp.185-211, 1990.
[5]. Durlak, J. A., Weissberg, R. P., Dymnicki, A. B., Taylor, R. D., & Schellinger, K. B. The Impact of Enhancing Students’ Social and Emotional Learning: A Meta-Analysis of School-Based Universal Interventions. Child Development, Vol.82, Issue.1, pp.405-432, 2011.
[6]. Zeidner, M., Roberts, R. D., & Matthews, G. The Science of Emotional Intelligence: Current Consensus and Controversies. European Psychologist, Vol.13, Issue.1, pp.64-78, 2008.
[7]. Brackett, M. A., Rivers, S. E., & Salovey, P. Emotional Intelligence: Implications for Personal, Social, Academic, and Workplace Success. Social and Personality Psychology Compass, Vol.5, Issue.1, pp.88-103, 2011.
[8]. Anderson, J. R., Corbett, A. T., Koedinger, K. R., & Pelletier, R. Cognitive tutors: Lessons learned. The Journal of the Learning Sciences, Vol.4, Issue.2, pp.167-207, 1995.
[9]. Hwang, G. J., & Chang, H. F. A formative assessment-based mobile learning approach to improving the learning attitudes and achievements of students. Computers & Education, Vol.56, Issue.4, pp.1023-1031, 2011.
[10]. Koedinger, K. R., Corbett, A. T., & Perfetti, C. The knowledge-learning-instruction framework: Bridging the science-practice chasm to enhance robust student learning. Cognitive Science, Vol.36, Issue.5, pp.757-798, 2012.
[11]. Van Lehn, K. The relative effectiveness of human tutoring, intelligent tutoring systems, and other tutoring systems. Educational Psychologist, Vol.46, Issue.4, pp.197-221, 2011.
[12]. Baker, R. S., D`Mello, S. K., Rodrigo, M. M. T., & Graesser, A. C. Better to be frustrated than bored: The incidence, persistence, and impact of learners’ cognitive–affective states during interactions with three different computer-based learning environments. International Journal of Human-Computer Studies, Vol.68, Issue.4, pp.223-241, 2010.
[13]. Ke, F., & Grabowski, B. Examining online teaching, cognitive, and social presence for adult students. Computers & Education, Vol.48, Issue.2, pp.89-113, 2007.
[14]. McLaren, B. M., DeLeeuw, K. E., & Mayer, R. E. Polysynchronous learning environments: A research framework for the intelligent classroom. Educational Psychology Review, Vol.23, Issue.3, pp.293-319, 2011.
[15]. Roschelle, J., Feng, M., & Murphy, R. F. Designing for more equitable participation: Implications from research on collaborative learning. IEEE Transactions on Learning Technologies, Vol.10, Issue.1, pp.28-41, 2017.
Citation
Lisha Yugal, Suresh Kaswan, B.S Bhatia, "Survey-Based Intelligent Tutoring System (ITS) to Support Emotional and Sentiment Analysis in Education," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.15-18, 2023.
Neuro Fuzzy Xavier Technique for optimization of Time Quantum in Scheduling Algorithm
Research Paper | Journal Paper
Vol.11 , Issue.10 , pp.19-28, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.1928
Abstract
We drop-shipped a novel Round Robin Neuro-Fuzzy System (RRNFS) model for the decision makers, based on neuro-fuzzy system for the processing of scheduling in a batch operating system. TS fuzzy model (Takagi & Sugeno, 1985) implemented in the RRNFS proposed model to identify the ideal Time Quantum. Our proposed RRNFS model takes two inputs: the total number of processes and the average burst time (ABT) of each process that is presented in the ready queue, fuzzifying the input values, activate the necessary rules of the proposed neuro fuzzy controller, and then determines the best Time Quantum for each process in the ready queue. Once Time quantum is calculated, every process will run on central processing unit as per the allocated Time quantum reduces the context switching, turnaround and waiting time. We bespoke the performance of the proposed model over date sets and compared our results with the classical round robin policy and modified round robin using fuzzy logic scheduling algorithms. We developed the neuro fuzzy technic for Xavier Normal function to minimize the error of the proposed model with the targeted time quantum.
Key-Words / Index Term
Neuro-fuzzy system (NFS), Time Quantum (TQ), Round robin (RR) scheduling, Ready queue (RQ), Xavier Normal function.
References
[1]. A. Silberschatz, P. B. Galvin, and G. Gagne, “Operating system principles,” Wiley India Edition, 7th edition, 2006. ISBN: 978-81-265-0962-1.
[2]. Y. A. Adekunle, Z. O. Ogunwobi, A. S. Jerry, B. T. Efuwape, S. Ebiesuwa, and J. P. Ainam, “A comparative study of scheduling algorithms for multiprogramming in real-time systems,” International Journal of Innovation and Scientific Research, Vol.12, No.1, pp.180-185, 2014. ISSN: 2351-8014.
[3]. N. Goel and R. B. Garg, “A comparative study of CPU scheduling algorithms,” arXiv preprint arXiv: 1307.4165, 2013. https://doi.org/10.48550/arXiv.1307.4165.
[4]. E. Kondili, C. C. Pantelides, and R. W. Sargent, “A general algorithm for short-term scheduling of batch operations—I. MILP formulation,” Computers & Chemical Engineering, Vol.17, No.2, pp.211-227, 1993. https://doi.org/10.1016/0098-1354(93)80015-F.
[5]. W. Li, K. Kavi, and R. Akl, “A non-preemptive scheduling algorithm for soft real-time systems,” Computers & Electrical Engineering, Vol.33, No.1, pp.12-29, 2007. https://doi.org/10.1016/j.compeleceng.2006.04.002.
[6]. C. Keerthanaa and M. Poongothai, “Improved priority-based scheduling algorithm for real-time embedded systems,” in 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp.1-7, 2016. DOI: 10.1109/ICCPCT.2016.7530188.
[7]. B. Nie, J. Du, G. Xu, H. Liu, R. Yu, and Q. Wen, “A new operating system scheduling algorithm,” in Advanced Research on Electronic Commerce, Web Application, and Communication: International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part I, Springer Berlin Heidelberg, pp.92-96, 2011. ISSN 1865-0929.
[8]. M. Hamayun and H. Khurshid, “An optimized shortest job first scheduling algorithm for CPU scheduling,” J. Appl. Environ. Biol. Sci, Vol.5, No.12, pp.42-46, 2015. ISSN: 2090-4274.
[9]. V. Chahar and S. Raheja, “Fuzzy based multilevel queue scheduling algorithm,” in 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.115-120, 2013. DOI: 10.1109/ICACCI.2013.6637156.
[10]. A. Moallemi and M. Asgharilarimi, “A fuzzy scheduling algorithm based on highest response ratio next algorithm,” in Innovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering, Springer Netherlands, pp.75-80. DOI: 10.1007/978-1-4020-8735-6_15.
[11]. A. Singh, P. Goyal, and S. Batra, “An optimized round robin scheduling algorithm for CPU scheduling,” International Journal on Computer Science and Engineering, Vol.2, No.7, pp.2383-2385, 2010. ISSN: 0975-3397.
[12]. B. Alam, “Finding time quantum of round robin CPU scheduling algorithm using fuzzy logic,” in 2008 International Conference on Computer and Electrical Engineering, pp.795-798, 2008. DOI: 10.1109/ICCEE.2008.89.
[13]. A. A. Aburas and V. Miho, “Fuzzy logic-based algorithm for uniprocessor scheduling,” in 2008 International Conference on Computer and Communication Engineering, pp.499-504, 2008. DOI: 10.1109/ICCCE.2008.4580654.
[14]. B. Alam, “Fuzzy Round Robin CPU Scheduling Algorithm,” J. Comput. Sci., Vol.9, No.8, pp.1079-1085, 2013.
[15]. L. Datta, “A new RR scheduling approach for real-time systems using fuzzy logic,” International Journal of Computer Applications, Vol.119, No.5, 2015.
[16]. S. Lim and S. B. Cho, “Intelligent OS process scheduling using fuzzy inference with user models,” in New Trends in Applied Artificial Intelligence: 20th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2007, Kyoto, Japan, June 26-29, 2007. Proceedings 20, Springer Berlin Heidelberg, pp.725-734, 2007. DOI: https://doi.org/10.1007/978-3-540-73325-6_72.
[17]. B. Granam and H. ElAarag, “Utilization of Fuzzy Logic in CPU Scheduling in Various Computing Environments,” in Proceedings of the 2019 ACM Southeast Conference, 2019. doi.org/10.1145/3299815.3314463.
[18]. M.S. Kalas, Nikita D. Deshpande, “Sepsis Detection in newborn infants - Diagnosis using fuzzy inference system- A Review”, International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.43-46, 2021. https://doi.org/10.26438/ijcse/v9i5.4346
[19]. M. Atique and M. S. Ali, “A novel adaptive neuro fuzzy inference system-based CPU scheduler for multimedia operating system,” in 2007 International Joint Conference on Neural Networks, pp.1002-1007, 2007. DOI: 10.1109/IJCNN.2007.4371095.
[20]. J. A. Trivedi and P. S. Sajja, “Improving efficiency of round robin scheduling using neuro fuzzy approach,” International Journal of Research and Reviews in Computer Science, Vol.2, No.2, pp.308, 2011.
[21]. Priya Nagargoje, Monali Baviskar, “Uncertainty Handling In Big Data Analytics: Survey, Opportunities and Challenges”, International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.59-63, 2021. https://doi.org/10.26438/ijcse/v9i6.5963
[22]. F. Benhammadi, Z. Gessoum, and A. Mokhtari, “CPU load prediction using neuro-fuzzy and Bayesian inferences,” Neurocomputing, Vol.74, No.10, pp.1606-1616, 2011. https://doi.org/10.1016/j.neucom.2011.01.009.
[23]. R. Sharma, A. K. Goel, M. K. Sharma, N. Dhiman, and V.N. Mishra, “Modified Round Robin CPU Scheduling: A Fuzzy Logic-Based Approach,” in Applications of Operational Research in Business and Industries: Proceedings of 54th Annual Conference of ORSI, Singapore: Springer Nature Singapore, 2023. https://doi.org/10.1007/978-981-19-8012-1_24.
[24]. X. Glorot and Y. Bengio, “Understanding the difficulty of training deep feedforward neural networks,” in Proceedings of the thirteenth international conference on artificial intelligence and statistics, pp.249-256, 2010.
[25]. D. Nauck, “Neuro-fuzzy systems: review and prospects,” in Proceedings of Fifth European Congress on Intelligent Techniques and Soft Computing (EUFIT’97), pp.1044-1053, 1997. URL: fuzzy.cs.uni-magdeburg.de/nauck.
[26]. A. Krogh, “What are artificial neural networks?” Nature biotechnology, Vol.26, No.2, pp.195-197, 2008. https://doi.org/10.1038/nbt1386.
[27]. R. Fullér, “Neural fuzzy systems,” ISSN 0358-5654, 1995.
[28]. C. T. Lin and C. G. Lee, “Neural fuzzy systems: a neuro-fuzzy synergism to intelligent systems,” Prentice-Hall, Inc., 1996. https://dl.acm.org/doi/abs/10.5555/230237.
[29]. M. N. M. Salleh, N. Talpur, and K. Hussain, “Adaptive neuro-fuzzy inference system: Overview, strengths, limitations, and solutions”, in Data Mining and Big Data: Second International Conference, DMBD 2017, Fukuoka, Japan, July 27–August 1, 2017, Proceedings 2, Springer International Publishing, pp.527-535, 2017. https://doi.org/10.1007/978-3-319-61845-6_52.
[30]. L. A. Zadeh, G. J. Klir, and B. Yuan, “Fuzzy sets, fuzzy logic, and fuzzy systems: selected papers,” Vol.6, World scientific, ISBN 9810224214.
Citation
Rajeev Sharma, Atul Kumar Goel, M.K. Sharma, "Neuro Fuzzy Xavier Technique for optimization of Time Quantum in Scheduling Algorithm," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.19-28, 2023.
Analysis of Data Engineering Techniques With Data Quality in Multilingual Information Recovery
Research Paper | Journal Paper
Vol.11 , Issue.10 , pp.29-36, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.2936
Abstract
It is very important for current businesses that use data that data engineering and data quality management work together. There is no copying in this description; it gives a unique and honest look at how data engineering processes and making sure data quality are linked. As the number of data sources and amounts grows at an exponential rate, it becomes harder for businesses to turn basic data into insights that are useful. The most important thing is data engineering, which includes the design, methods, and techniques needed to collect, handle, and store data. Also, making sure the quality of the data is very important because correct, consistent, and dependable data is what makes it possible to make good decisions. Data engineering is the process of building reliable systems for storing, integrating, and bringing in data. Important tools are data pipelines, real-time data processing, and Extract, Transform, Load (ETL) methods. Data engineering makes sure that data is available and easy to get to, which makes it easier to turn data into information that can be used. Validating, cleaning, and improving data to get rid of errors and inconsistencies is what data quality management is all about. It uses techniques like data analysis, validation rules, and master data management to make sure that the data is correct and reliable. Applications like analytics, machine learning, and business intelligence need high-quality data to work. Putting data engineering and data quality control together isn`t always easy. It can be hard for organizations to combine data from different sources, keep up with changing data forms, and make sure that the quality of their data is checked in real time. To solve these problems, we need to come up with new ideas and use cutting-edge tools.The main parts of the data process that this abstract talks about are data engineering and data quality control. Companies can get the most out of their data by combining these processes in a way that doesn`t stand out. Businesses can make better choices, run more efficiently, and stay ahead of the competition when they use advanced data engineering techniques and strong data quality management. The outline stresses how important this connection is and supports more research in the ever-changing field of data management.
Key-Words / Index Term
Data Quality, MIRACL, Data sets, Data Pipelines, Software Quality, Data Engineering
References
[1] Amin Abolghasemi, Suzan Verberne, and Leif Azzopardi. 2022. Improving BERTbased query-by-document retrieval with multi-task optimization. In European pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805, 2018.
[2] Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014.
[3] B Bharathi and GU Samyuktha. 2021. Machine learning based approach for sentiment Analysis on Multilingual Code Mixing Text. In Working Notes of FIRE 2021-Forum for Information Retrieval Evaluation (Online). CEUR. 2021.
[4] Zewen Chi, Li Dong, Furu Wei, Nan Yang, Saksham Singhal, Wenhui Wang, Xia Song, Xian-Ling Mao, Heyan Huang, and Ming Zhou. 2020. InfoXLM: An information-theoretic framework for cross-lingual language model pre-training. arXiv preprint arXiv:2007.07834, 2020.
[5] Hyung Won Chung, Thibault Fevry, Henry Tsai, Melvin Johnson, and Sebastian Ruder. 2020. Rethinking embedding coupling in pre-trained language models. arXiv preprint arXiv:2010.12821, 2020.
[6] Alexis Conneau, Kartikay Khandelwal, Naman Goyal, Vishrav Chaudhary, Guillaume Wenzek, Francisco Guzmán, Edouard Grave, Myle Ott, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Unsupervised cross-lingual representation learning at scale. arXiv preprint arXiv:1911.02116, 2019.
[7] Fabio Crestani, Mounia Lalmas, Cornelis J Van Rijsbergen, and Iain Campbell. 1998. “Is this document relevant?. . . probably” a survey of probabilistic models in information retrieval. ACM Computing Surveys (CSUR) 30, 4, pp.528–552, 1998.
[8] Dr.Naveen Prasadula “A Review of Literature on Analysis Of Data Engineering Techniques With Data Quality In Multilingual Information Recovery sharing”
[9] Pengcheng He, Xiaodong Liu, Jianfeng Gao, and Weizhu Chen. 2020. Deberta: Decoding-enhanced bert with disentangled attention. arXiv preprint arXiv:2006.03654, 2020.
[10] Sebastian Hofstätter, Sheng-Chieh Lin, Jheng-Hong Yang, Jimmy Lin, and Allan Hanbury. 2021. Efficiently teaching an effective dense retriever with balanced topic aware sampling. In Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp.113–122, 2021.
[11] Hiroshi Inoue. 2019. Multi-sample dropout for accelerated training and better generalization. arXiv preprint arXiv:1905.09788, 2019.
[12] Jeff Johnson, Matthijs Douze, and Hervé Jégou. 2019. Billion-scale similarity search with gpus. IEEE Transactions on Big Data 7, 3, pp.535–547, 2019.
[13] Edunov, Danqi Chen, and Wen-tau Yih. 2020. Dense passage retrieval for opendomain question answering. arXiv preprint arXiv:2004.04906, 2020.
[14] Alexis Conneau and Guillaume Lample. 2019. Cross-lingual language model pretraining. Advances in Neural Information Processing Systems 32, pp.7059–7069, 2019.
[15] Dong-Hyun Lee et al. 2013. Pseudo-label: The simple and efficient semisupervised learning method for deep neural networks. In Workshop on challenges in representation learning, ICML, Vol.3. 896, 2013.
[16] Jimmy Lin, Xueguang Ma, Sheng-Chieh Lin, Jheng-Hong Yang, Ronak Pradeep, and Rodrigo Nogueira. 2021. Pyserini: A Python Toolkit for Reproducible Information Retrieval Research with Sparse and Dense Representations. In Proceedings of the 44th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2021). pp.2356–2362, 2021.
[17] Sheng-Chieh Lin, Jheng-Hong Yang, and Jimmy Lin. 2021. In-batch negatives for knowledge distillation with tightly-coupled teachers for dense retrieval. In Proceedings of the 6th Workshop on Representation Learning for NLP (RepL4NLP2021). pp.163–173, 2021.
[18] Benjamin Marlin, Richard S Zemel, Sam Roweis, and Malcolm Slaney. 2012.Collaborative filtering and the missing at random assumption. arXiv preprint arXiv:1206.5267, 2012.
[19] S. Rangineni and D. Marupaka, “Data Mining Techniques Appropriate for the Evaluation of Procedure Information,” International Journal of Management, IT & Engineering, Vol.13, No.9, pp.12–25, 2023.
[20] S. Rangineni, “An Analysis of Data Quality Requirements for Machine Learning Development Pipelines Frameworks,” International Journal of Computer Trends and Technology, Vol.71, No.9, pp.16–27, 2023.
[21] Arvind Kumar Bhardwaj, Sandeep Rangineni, Divya Marupaka, "Assessment of Technical Information Quality using Machine Learning ," International Journal of Computer Trends and Technology, Vol.71, No.9, pp.33-40, 2023.
Citation
Sandeep Rangineni, Amit Bhanushali, Divya Marupaka, Srinivas Venkata, Manoj Suryadevara, "Analysis of Data Engineering Techniques With Data Quality in Multilingual Information Recovery," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.29-36, 2023.
A Systematic Literature Review of Proof of Work and Proof of Activity: Privacy and Performance
Research Paper | Journal Paper
Vol.11 , Issue.10 , pp.37-44, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.3744
Abstract
Censuses protocols is one of the blockchain framework architecture layer that is critical to the privacy of the technology. Therefore, any attempt to improve on privacy and Performance of blockchain technology will focus on the consensus layer. Understanding the consensus mechanism underly the layer is paramount. This paper focuses on two of the mainstream consensus mechanism; PoW and PoA with a comparison of the advantages and disadvantages of each of the consensus algorithm. The privacy of these algorithms has been evaluated based on the metrics selected from the existing literature. The paper used SLR research method. It consists of three activities: Planning, Execution, and reporting. The activities have several processes and steps that were undertaken. A total of 72 papers were selected for analysis and they were those published between 2019-2023. The review highlighted the wide range of application areas for PoW and PoA, including healthcare, IoT, and industry 4.0. However, PoW`s popularity seemed to decline due to the introduction of faster and more secure blockchain algorithms. Privacy was a common theme, with decentralization, strong encryption, mutability, and scalability being key factors discussed in various studies. Overall, the systematic literature review Future Directions: Future research on PoW should focus on addressing concerns related to diminishing algorithm rewards and incentives for participants. Scholars should put effort in development of more hybrid algorithms that combine PoW with other blockchain algorithms to overcome challenges and gain benefits. In addition, the authors propose that more studies to focus on improving performance of PoA and explore on defining more decentralized algorithms.
Key-Words / Index Term
Proof of Work, Proof of Stake, Proof Action, Privacy, Blockchain, performance
References
[1]. V. Neziri, I. Shabani, R. Dervishi, and B. Rexha, “Assuring Anonymity and Privacy in Electronic Voting with Distributed Technologies Based on Blockchain,” Applied Sciences (Switzerland), Vol.12, No.11, 2022. doi: 10.3390/app12115477.
[2]. S. Wadhwa, S. Rani, Kavita, S. Verma, J. Shafi, and M. Wozniak, “Energy Efficient Consensus Approach of Blockchain for IoT Networks with Edge Computing,” Sensors, Vol.22, No.10, 2022. doi: 10.3390/s22103733.
[3]. S. Bouraga, “A taxonomy of blockchain consensus protocols: A survey and classification framework,” Expert Syst Appl, Vol.168, 2021. doi: 10.1016/j.eswa.2020.114384.
[4]. I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, “Proof of activity: Extending bitcoin’s proof of work via proof of stake [extended abstract],” ACM SIGMETRICS Performance Evaluation Review, Vol.42, No.3, 2014.
[5]. B. Mi, Y. Weng, D. Huang, Y. Liu, and Y. Gan, “A novel PoW scheme implemented by probabilistic signature for blockchain,” Computer Systems Science and Engineering, Vol.39, No.2, 2021. doi: 10.32604/csse.2021.017507.
[6]. C. Pu, A. Wall, I. Ahmed, and K. K. R. Choo, “SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones,” in Proceedings - IEEE International Conference on Mobile Data Management, 2022. doi: 10.1109/MDM55031.2022.00033.
[7]. [7] A. A. Laghari, A. A. Khan, R. Alkanhel, H. Elmannai, and S. Bourouis, “Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs),” Electronics (Switzerland),Vol.12, No.3, 2023. doi:10.3390/electronics12030677.
[8]. C. W. Hsueh and C. T. Chin, “Toward Trusted IoT by General Proof-of-Work,” Sensors, Vol.23, No.1, 2023. doi: 10.3390/s23010015.
[9]. R. Xu and Y. Chen, “Fed-DDM: A Federated Ledgers based Framework for Hierarchical Decentralized Data Marketplaces,” in Proceedings - International Conference on Computer Communications and Networks, ICCCN, 2021. doi: 10.1109/ICCCN52240.2021.9522359.
[10]. H. H. M. Mahmoud, W. Wu, and Y. Wang, “Proof of learning: Two Novel Consensus mechanisms for data validation using Blockchain Technology in Water Distribution System,” in 2022 27th International Conference on Automation and Computing: Smart Systems and Manufacturing, ICAC 2022, 2022. doi: 10.1109/ICAC55051.2022.9911156.
[11]. K. Qian, Y. Liu, Y. Han, and K. Wang, “Performance Benchmarking and Optimization for IIoT-oriented Blockchain,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2021. doi: 10.1007/978-3-030-68884-4_33.
[12]. S. Bouraga, “A taxonomy of blockchain consensus protocols: A survey and classification framework,” Expert Syst Appl, Vol.168, 2021, doi: 10.1016/j.eswa.2020.114384.
[13]. T. Machacek, M. Biswal, and S. Misra, “Proof of X: Experimental insights on blockchain consensus algorithms in energy markets,” in 2021 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2021, 2021. doi: 10.1109/ISGT49243.2021.9372194.
[14]. L. Shi, T. Wang, J. Li, S. Zhang, and S. Guo, “Pooling is Not Favorable: Decentralize Mining Power of PoW Blockchain Using Age-of-Work,” IEEE Transactions on Cloud Computing, 2022, doi: 10.1109/TCC.2022.3226496.
[15]. W. Lv, N. Wang, X. Xie, and Z. Hong, “A Classification-Based Blockchain Architecture for Smart Home with Hierarchical PoW Mechanism,” Buildings, Vol.12, No.9, 2022, doi: 10.3390/buildings12091321.
[16]. I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, “Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake,” Cryptology ePrint Archive, Vol.452, No.3, 2014.
[17]. X. Chen, K. Nguyen, and H. Sekiya, “On the Latency Performance in Private Blockchain Networks,” IEEE Internet Things J, vol. 9, no. 19, 2022, doi: 10.1109/JIOT.2022.3165666.
[18]. A. Alrowaily, M. Alghamdi, I. Alkhazi, A. B. Hassanat, M. M. S. Arbab, and C. Z. Liu, “Modeling and Analysis of Proof-Based Strategies for Distributed Consensus in Blockchain-Based Peer-to-Peer Networks,” Sustainability, vol. 15, no. 2, 2023, doi: 10.3390/su15021478.
[19]. S. Pandey, Vanshika, Anshul, and R. K. Dwivedi, “A Secure Design of Healthcare System with Blockchain and Internet of Things (IoT),” in IDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings, 2023. doi: 10.1109/IDCIoT56793.2023.10053491.
[20]. S. Kaur, S. Chaturvedi, A. Sharma, and J. Kar, “A Research Survey on Applications of Consensus Protocols in Blockchain,” Security and Communication Networks, vol. 2021. 2021. doi: 10.1155/2021/6693731.
[21]. [21] L. Xiong, T. Peng, F. Li, S. Zeng, and H. Wu, “Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT,” IEEE Syst J, vol. 17, no. 1, 2023, doi: 10.1109/JSYST.2022.3221959.
[22]. [22] H. Yang, J. Shen, J. Lu, T. Zhou, X. Xia, and S. Ji, “A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/5781354.
[23]. M. S. Jalali, A. Landman, and W. J. Gordon, “Telemedicine, privacy, and information security in the age of COVID-19,” Journal of the American Medical Informatics Association, vol. 28, no. 3. Oxford University Press, pp.671–672, Mar. 01, 2021. doi: 10.1093/jamia/ocaa310.
[24]. H. Habibzadeh, B. H. Nussbaum, F. Anjomshoa, B. Kantarci, and T. Soyata, “A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities,” Sustainable Cities and Society, Vol.50, 2019. doi: 10.1016/j.scs.2019.101660.
[25]. N. Qamar, Y. Yang, A. Nadas, and Z. Liu, “Querying Medical Datasets while Preserving Privacy,” in Procedia Computer Science, Elsevier B.V., pp.324–331, 2016. doi: 10.1016/j.procs.2016.09.049.
[26]. R. Seigel, S. T. Lashway, M. M. K. Stein, and C. J. Rundell, “Telehealth and digital health privacy regulations,” in Diabetes Digital Health and Telehealth, 2022. doi: 10.1016/B978-0-323-90557-2.00020-0.
[27]. M. AbdulRaheem, J. B. Awotunde, C. Chakraborty, E. A. Adeniyi, I. D. Oladipo, and A. K. Bhoi, “Security and privacy concerns in smart healthcare system,” in Implementation of Smart Healthcare Systems using AI, IoT, and Blockchain, 2023. doi: 10.1016/b978-0-323-91916-6.00002-3.
[28]. W. Liang and N. Ji, “Privacy challenges of IoT-based blockchain: a systematic review,” Cluster Comput, Vol.25, No.3, 2022, doi: 10.1007/s10586-021-03260-0.
[29]. E. R. Weitzman and M. Floyd, “Privacy and diabetes digital technologies and telehealth services,” in Diabetes Digital Health and Telehealth, 2022. doi: 10.1016/B978-0-323-90557-2.00011-X.
[30]. A. D. Dhass, S. Raj Anand, and R. Krishna, “Implementation of Blockchain-Based Security and Privacy in Energy Management,” in Green Energy and Technology, 2021. doi: 10.1007/978-3-030-64565-6_18.
[31]. W. Wang et al., “A privacy protection scheme for telemedicine diagnosis based on double blockchain,” Journal of Information Security and Applications, Vol.61, 2021. doi: 10.1016/j.jisa.2021.102845.
[32]. F. J. de Haro-Olmo, Á. J. Varela-Vaca, and J. A. Álvarez-Bermejo, “Blockchain from the perspective of privacy and anonymisation: A systematic literature review,” Sensors (Switzerland), Vol.20, No.24, pp.1–21, Dec. 2020, doi: 10.3390/s20247171.
[33]. A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K. K. R. Choo, “Blockchain-Enabled Authentication Handover with Efficient Privacy Protection in SDN-Based 5G Networks,” IEEE Trans Netw Sci Eng, vol. 8, no. 2, 2021, doi: 10.1109/TNSE.2019.2937481.
[34]. H. A. Al Hamid, S. M. M. Rahman, M. Shamim Hossain, A. Almogren, and A. Alamri, “A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography,” IEEE Access, vol. 5, 2017, doi: 10.1109/ACCESS.2017.2757844.
[35]. G. Capece and F. Lorenzi, “Blockchain and healthcare: Opportunities and prospects for the ehr,” Sustainability (Switzerland), vol. 12, no. 22, 2020, doi: 10.3390/su12229693.
[36]. T. Frikha, A. Chaari, F. Chaabane, O. Cheikhrouhou, and A. Zaguia, “Healthcare and Fitness Data Management Using the IoT-Based Blockchain Platform,” J Healthc Eng, vol. 2021, 2021, doi: 10.1155/2021/9978863.
[37]. D. T. Myran et al., “Physician Health Care Visits for Mental Health and Substance Use during the COVID-19 Pandemic in Ontario, Canada,” JAMA Netw Open, vol. 5, no. 1, 2022, doi: 10.1001/jamanetworkopen.2021.43160.
[38]. K. Kumari and K. Saini, “Data handling & drug traceability: Blockchain meets healthcare to combat counterfeit drugs,” International Journal of Scientific and Technology Research, vol. 9, no. 3, 2020.
[39]. S. Mbunya, C. Asirwa, and D. Felker, “Telemedicine: Bridging the Gap Between Rural and Urban Oncologic Healthcare in Kenya,” J Glob Oncol, vol. 4, no. Supplement 2, 2018, doi: 10.1200/jgo.18.91500.
[40]. B. Yang and P. Y. Hsueh, “An socio-technical approach to securing health informatics,” Eur J Epidemiol, vol. 31, 2016.
[41]. A. O. Almagrabi, R. Ali, D. Alghazzawi, A. AlBarakati, and T. Khurshaid, “Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things,” Computers, Materials and Continua, vol. 68, no. 1, 2021, doi: 10.32604/cmc.2021.014753.
[42]. T. Ahmed, M. M. Al Aziz, and N. Mohammed, “De-identification of electronic health record using neural network,” Sci Rep, vol. 10, no. 1, 2020, doi: 10.1038/s41598-020-75544-1.
[43]. K. Azbeg, O. Ouchetto, and S. Jai Andaloussi, “BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security,” Egyptian Informatics Journal, vol. 23, no. 2, 2022, doi: 10.1016/j.eij.2022.02.004.
[44]. P. Krebs and D. T. Duncan, “Health app use among US mobile phone owners: A national survey,” JMIR mHealth and uHealth, Vol.3, No.4, 2015. doi: 10.2196/mhealth.4924.
[45]. S. Aggarwal, N. Kumar, M. Alhussein, and G. Muhammad, “Blockchain-Based UAV Path Planning for Healthcare 4.0: Current Challenges and the Way Ahead,” IEEE Netw, Vol.35, No.1, 2021, doi: 10.1109/MNET.011.2000069.
[46]. P. Esmaeilzadeh, “Use of AI-based tools for healthcare purposes: A survey study from consumers’ perspectives,” BMC Medical Informatics and Decision Making, Vol.20, No.1, 2020. doi: 10.1186/s12911-020-01191-1.
[47]. K. Wac, A. T. van Halteren, R. G. A. Bults, and T. H. F. Broens, “Context-aware QoS provisioning in an m-health service platform,” in International Journal of Internet Protocol Technology, 2007. doi: 10.1504/IJIPT.2007.012373.
[48]. C. M. Chen, Z. Chen, S. Kumari, and M. C. Lin, “LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things,” Sensors, Vol.22, No.14, 2022. doi: 10.3390/s22145401.
[49]. C. G. Kamotho and F. Bukachi, “Telemedicine is an effective way to manage cardiovascular disease in rural Kenya and to achieve universal healthcare,” Eur Heart J, Vol.41, no. Supplement_2, 2020. doi: 10.1093/ehjci/ehaa946.3485.
[50]. S. Subha and P. Perumal, “An analysis of a secure communication for healthcare system using wearable devices based on elliptic curve cryptography,” World Review of Science, Technology and Sustainable Development, Vol.18, No.1, 2022. doi: 10.1504/wrstsd.2022.10042352.
[51]. P. Perumal and S. Subha, “An analysis of a secure communication for healthcare system using wearable devices based on elliptic curve cryptography,” World Review of Science, Technology and Sustainable Development, Vol.18, No.1, 2022, doi: 10.1504/WRSTSD.2022.119327.
[52]. K. Sowjanya, M. Dasgupta, and S. Ray, “An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems,” in International Journal of Information Security, 2020. doi: 10.1007/s10207-019-00464-9.
[53]. P. Esmaeilzadeh and T. Mirzaei, “Comparison of consumers’ perspectives on different health information exchange (HIE) mechanisms: an experimental study,” Int J Med Inform, Vol.119, 2018. doi: 10.1016/j.ijmedinf.2018.08.007.
[54]. D. Puthal and S. P. Mohanty, “Proof of Authentication: IoT-Friendly Blockchains,” IEEE Potentials, Vol.38, No.1, 2019, doi: 10.1109/MPOT.2018.2850541.
[55]. Y. Su, K. Nguyen, and H. Sekiya, “Latency Evaluation in Ad-hoc IoT-Blockchain Network,” in WSCE 2022 - 2022 5th World Symposium on Communication Engineering, 2022. doi: 10.1109/WSCE56210.2022.9916023.
[56]. S. Alrubei, E. Ball, and J. Rigelsford, “Securing IoT-Blockchain Applications through Honesty-Based Distributed Proof of Authority Consensus Algorithm,” in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, 2021. doi: 10.1109/CyberSA52016.2021.9478257.
[57]. A. Ali et al., “An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network,” Sensors, Vol.22, No.2, 2022, doi: 10.3390/s22020572.
[58]. G. Sagirlar, J. D. Sheehan, and E. Ragnoli, “On the design of co-operating blockchains for IoT,” in Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020, 2020. doi: 10.1109/ICICT50521.2020.00093.
[59]. S. M. Alrubei, E. Ball, and J. M. Rigelsford, “The Use of Blockchain to Support Distributed AI Implementation in IoT Systems,” IEEE Internet Things J, Vol.9, No.16, 2022, doi: 10.1109/JIOT.2021.3064176.
[60]. A. Hakiri and B. Dezfouli, “Towards a Blockchain-SDN Architecture for Secure and Trustworthy 5G Massive IoT Networks,” in SDN-NFV Sec 2021 - Proceedings of the 2021 ACM International Workshop on Software Defined Networks and Network Function Virtualization Security, co-located with CODAYSPY 2021, 2021. doi: 10.1145/3445968.3452090.
[61]. C. Rupa, D. Midhunchakkaravarthy, M. K. Hasan, H. Alhumyani, and R. A. Saeed, “Industry 5.0: Ethereum blockchain technology based DApp smart contract,” Mathematical Biosciences and Engineering, Vol.18, No.5, 2021, doi: 10.3934/MBE.2021349.
[62]. S. Shyam, S. J. Devaraj, K. Ezra, J. Delattre, and G. K. Lynus, “Design and implementation of UWB-based cyber-physical system for indoor localization in an industry environment,” in Intelligent Edge Computing for Cyber Physical Applications, 2023. doi: 10.1016/b978-0-323-99412-5.00010-1.
[63]. Z. Ullah, B. Raza, H. Shah, S. Khan, and A. Waheed, “Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment,” IEEE Access, Vol.10, 2022, doi: 10.1109/ACCESS.2022.3164081.
[64]. Y. Supreet, P. Vasudev, H. Pavitra, M. Naravani, and D. G. Narayan, “Performance Evaluation of Consensus Algorithms in Private Blockchain Networks,” in Proceedings - 2020 International Conference on Advances in Computing, Communication and Materials, ICACCM 2020, 2020. doi: 10.1109/ICACCM50413.2020.9213019.
[65]. N. Lasla, L. Al-Sahan, M. Abdallah, and M. Younis, “Green-PoW: An energy-efficient blockchain Proof-of-Work consensus algorithm,” Computer Networks, Vol.214, 2022, doi: 10.1016/j.comnet.2022.109118.
Citation
Denis Wapukha Walumbe, John Gichuki Ndia, "A Systematic Literature Review of Proof of Work and Proof of Activity: Privacy and Performance," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.37-44, 2023.
Aanalysis on Impact of Social Media on Human Behaviour Due to Covid Vaccine Tweets
Research Paper | Journal Paper
Vol.11 , Issue.10 , pp.45-50, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.4550
Abstract
The Covid-19 outbreak has created a challenge for the whole of mankind and impacted everyday life worldwide. The pandemic had a devastating effect on many people. It also created anxiety, fear, and depression among people. To eradicate the disease, many scientists at major pharmaceutical companies and institutes working together to develop vaccine. Social media is one of the best platforms to discuss the latest trending topics and express your view about them. The Covid-19 Vaccine promotion across the world has created lots of discussion in Twitter, social media platforms where user love to express their feeling and opinion. However, due to lack of knowledge and understanding about Covid – 19 vaccines, it has created negative sentiments towards vaccine among few. Also, there has not been much research work done on in-depth analysis of people’s opinion or sentiment towards various vaccine and its brands. In this study will be using publicly available Covid-19 vaccine tweets to understand public opinion or feeling about various covid-19 vaccine brands. This research will be using publicly available Covid-19 vaccine tweets to understand public opinion or feeling about various Covid-19 vaccine brands. The study was conducted using publicly available datasets from online resource, Kaggle. The dataset contains 228207 tweets from Kaggle about the opinion for Covid-19 vaccines during 12 December 2020 to 24 November 2021. After the extraction, vaccine sentiments identified across all brands. After identification of sentiments, accuracy be evaluated based on prediction using various metrics. This research will find the difference in public opinion on Covid-19 vaccines. Understanding the sentiments and public opinions towards vaccine will help health agencies to increase positive awareness about covid-19 vaccine across world.
Key-Words / Index Term
Covid-19 Vaccine, Corona Vaccine, Sentiment Analysis, Twitter Sentiments, Machine Learning, Deep Learning
References
[1] Fuyong Zhang, Wang Yi, Liu Shigang, Wang Hua. Decision-based evasion attacks on tree ensemble classifiers. World Wide Web; 23(5):2957–77, 2020.
[2] Vohra, S., & Teraiya, J. (2013). A Comparative Study of Sentiment Analysis Techniques. International Journal of Information, Knowledge and Research in Computer Engineering, 2(2), pp.313-317, 2013.
[3] Machine Learning & its Applications Outsource to India, 2020.
[4] Jain, A. P., & Dandannavar, P. (2016). Application of machine learning techniques to sentiment analysis. Second International Conference on Applied and Theoretical Computing and Communication Technology (ICATccT), 1(1). pp.628–632, 2016. DOI: https://doi.org/10.1109/ICATCCT.2016.7912076
[5] Chakraborty K, Bhatia S, Bhattacharyya S, Platos J, Bag R, Hassanien AE. Sentiment Analysis of COVID-19 tweets by Deep Learning Classifiers—A study to show how popularity is affecting accuracy in social media. Appl Soft Comp. 2020;97:106754. https://doi.org/10.1016/j.asoc.2020.106 754 PMid:33013254 PMCid:PMC7521435
[6] Praveen SV, Ittamalla R. General public’s attitude toward governments implementing digital contact tracing to curb COVID-19–a study based on natural language processing. Int J Per Comp Comm. 2020. https://doi.org/ 10.1108/IJPCC-09-2020-0121
[7] Chen Y, Yuan J, You Q, Luo J. Twitter sentiment analysis via bi-sense emoji embedding and attention-based LSTM. In Proceedings of the 26th ACM international conference on Multimedia, pp.117-125, 2018. https://doi.org/ 10.1145/3240508.3240533
[8] Reddy DM, Reddy DN. Twitter Sentiment Analysis using Distributed Word and Sentence Representation. arXiv preprint arXiv:1904.12580. 2019
[9] Hasan A, Moin S, Karim A, Shamshirband S. Machine learning-based sentiment analysis for twitter accounts. Math Comp App. 2018;23(1):11. https://doi.org/10.3390/ mca23010011
[10] Xue J, Chen J, Chen C, Zheng C, Li S, Zhu T. Public discourse and sentiment during the COVID 19 pandemic: Using Latent Dirichlet Allocation for topic modeling on Twitter. PloS one. 2020;15(9):e0239441. https://doi.org/10.1371/journal.pone .0239441 PMid:32976519 PMCid:PMC7518625
[11] Sanders AC, White RC, Severson LS, Ma R, McQueen R, Paulo HCA, Bennett KP. Unmasking the conversation on masks: Natural language processing for topical sentiment analysis of COVID-19 Twitter discourse. medRxiv, 2020-08. 2021. https://doi.org/10.1101/2020.08.28.20183863
[12] Gupta P, Kumar S, Suman RR, Kumar V. Sentiment Analysis of Lockdown in India During COVID-19: A Case Study on Twitter. IEEE Trans Comp Soc Sys. 2020. https://doi.org/10.1109/TCSS.2020.3042446
[13] Das S, Kolya AK. Predicting the pandemic: sentiment evaluation and predictive analysis from large-scale tweets on Covid-19 by deep convolutional neural network. Evol Intell. 2021:1-22. https://doi.org/10.1007/s12065-021-00598-7 PMid:33815622 PMCid:PMC8007226
[14] Gambino OJ, Calvo H, García-Mendoza CV. Distribution of emotional reactions to news articles in twitter. In Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018). 2018.
[15] Shahriar, K.T., Islam, M.N., Anwar, M.M. and Sarker, I.H., (2022) COVID-19 analytics: Towards the effect of vaccine brands through analyzing public sentiment of tweets. Informatics in Medicine Unlocked, [online] 31February, p.100969, 2022. Available at: https://doi.org/10.1016/j.imu.2022.100969
Citation
Jatin Panjavani, "Aanalysis on Impact of Social Media on Human Behaviour Due to Covid Vaccine Tweets," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.45-50, 2023.
A Review on Enhancing Data Quality for Optimal Data Analytics Performance
Review Paper | Journal Paper
Vol.11 , Issue.10 , pp.51-58, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.5158
Abstract
This intellectual researches into the realm of data quality and its profound impact on data analytics. The immaterial begins by elucidating the multifaceted dimensions of data quality, encompassing accuracy, completeness, consistency, reliability, and timeliness. Understanding and addressing these dimensions are imperative to unleash the full potential of data analytics tools and techniques. Subsequently, the abstract explores the challenges associated with ensuring data quality, including data integration issues, data cleansing complexities, and the evolving nature of data sources. Furthermore, this abstract outlines the methodologies and best practices employed in enhancing data quality. Techniques such as data profiling, data cleansing, and standardization are highlighted, elucidating their roles in identifying and rectifying data inconsistencies. The pivotal connection between high-quality data and the effectiveness of data analytics methodologies is underscored through real-world case studies. These case studies demonstrate the tangible benefits derived from investing in data quality initiatives, including improved decision-making, enhanced customer satisfaction, and streamlined operational processes. Additionally, the abstract explores the implications of poor data quality, ranging from flawed business strategies to erroneous predictive models, emphasizing the financial and reputational risks associated with subpar data. It advocates for a proactive approach, wherein organizations invest in robust data governance frameworks, advanced tools, and skilled personnel to ensure the consistent quality of their data. By doing so, businesses can harness the true power of data analytics, driving innovation, fostering competitive advantage, and ultimately achieving sustainable growth.
Key-Words / Index Term
Data Quality, Data Analytics, Data Governance, Data Cleansing, Machine Learning, Artificial Intelligence, Software Testing
References
[1] Smith, J., Johnson, A., & Brown, K. (2018). Data Quality Dimensions: A Review of the State of the Art, 2018.
[2] Wang, L., Zhang, Q., & Zhang, W. (2019). Data Cleansing and Profiling Techniques: A Comprehensive Review, 2019.
[3] Chen, S., Liu, Y., & Wang, H. (2020). Enhancing Data Quality through Predictive Analytics: A Machine Learning Approach, 2020.
[4] Li, X., Zhou, H., & Ma, L. (2021). Real-time Data Quality Management in the Era of Big Data: Challenges and Solutions, 2021.
[5] Gupta, R., & Aggarwal, N. (2017). Ethical Considerations and Challenges in Data Quality Enhancement through Analytics, 2017.
[6] Dr.Naveen Prasadula (2023) “Review of Literature on A Review On Enhancing Data Quality For Optimal Data Analytics Performance”, 2023.
[7] Ajah, I.A. and Nweke, H.F. (2019). Big Data and Business Analytics: Trends, Platforms, Success Factors and Applications, Big Data and Cognitive Computing, Vol.3, Issue.32, pp.1-30, 2019.
[8] Ali, A., Qadir, J., Rasool, R., Sathiaseelan, A., Zwitter, A., and Crowcroft, J. (2016). Big Data for Development: Applications and Techniques, Big Data Analytics, Vol.1, Issue.2, pp.1-24, 2016.
[9] A.B. (2016). Gamifying Recruitment, Selection, Training, and Performance Management: Game- thinking in Human Resource Management, In Gangadharbatla, H., and Davis, D.Z. (Eds), Emerging Research and Trends in Gamification, 140-165, Hershey: IGI Global, 2016.
[10] Bartlett, C.A. and Ghoshal, S. (2011). Building Competitive Advantage through People, MIT Sloan Management Review, Vol.84, Issue.2, pp.34-45, 2011.
[11] Beringer, C., Jonas, D. and Kock, A. (2013). Behaviour of Internal Stakeholders in Project Portfolio Management and its Impact on Success, International Journal of Project Management, Vol.31, Issue.6, pp.830-846, 2013.
[12] Cristobal, J.R.S. (2017). Complexity in Project Management, CENTERIS International Conference on Project Management, Barcelona, Spain, pp.8-10, November 2017.
[13] Demirkan, H. and Dal, B. (2014). Big Data, Big Opportunities, Big Decisions, Harvard Business Review Turkish Edition, March, pp.28-30, 2014.
[14] Dr.Naveen Prasadula (2023) “Big data applications in operations/supply-chain management: A literature review. Computers and Industrial Engineering”, 2023.
[15] Agar, M. (1980). Getting better quality stuff: Methodological competition in an interdisciplinary niche. Urban Life, Vol.9, Issue.1, pp.34-50, 1980.
[16] Ahmadov, Y., & Helo, P. (2018). A cloud based job sequencing with sequence-dependent setup for sheet metal manufacturing. Annals of Operations Research, 270(1-2), pp.5-24, 2018.
[17] Yunusa-kaltungo, A.; Sinha, J.K. Effective vibration-based condition monitoring (eVCM) of rotating machines.J. Qual. Maint. Eng., 23, pp.279–296, 2017.
[18] Akter, S., Wamba, S. F., Gunasekaran, A., Dubey, R., & Childe, S. J. (2016). How to improve firm performance using big data analytics capability and business strategy alignment? International Journal of Production Economics, 182, pp.113-131, 2016.
[19] Albey, E., Norouzi, A., Kempf, K. G., & Uzsoy, R. (2015). Demand modeling with forecast evolution: an application to production planning. IEEE Transactions on Semiconductor Manufacturing, Vol.28, Issue.3, pp.374-384, 2015.
[20] Alexander, L. W. and 2Cheryl A. (2015). Big Data Driven Supply Chain Management?: A Game Changer. American Journal of Economics and Business Administration, February, pp.1–9, 2015. https://doi.org/10.3844/ajebasp.2015.60.67
[21] Dr.Naveen Prasadula (2022). Understanding big data analytics capabilities in supply chain management: Unravelling the issues, challenges, and implications for practice. Transportation Research Part E: Logistics and Transportation Review, 114, pp.416-436, 2022.
[22] Arya, V., Sharma, P., Singh, A. and De Silva, P.T.M. (2017), “An exploratory study on supply chain analytics applied to spare parts supply chain”, Benchmarking, Vol. 24, No.6, pp.1571-1580, 2017.
[23] Ayyildiz, E., & Gumus, A. T. (2021). Interval-valued Pythagorean fuzzy AHP method-based supply chain performance evaluation by a new extension of SCOR model: SCOR 4.0. Complex & Intelligent Systems, 7(1), pp.559-576, 2021.
[24] Azadian, F., Murat, A., & Chinnam, R. B. (2015). Integrated production and logistics planning: Contract manufacturing and choice of air/surface transportation. European Journal of Operational Research, 247(1), pp.113-123, 2015.
[25] S. Rangineni and D. Marupaka, “Data Mining Techniques Appropriate for the Evaluation of Procedure Information,” International Journal of Management, IT & Engineering, Vol.13, No.9, pp.12–25, Sep. 2023.
[26] S. Rangineni, “An Analysis of Data Quality Requirements for Machine Learning Development Pipelines Frameworks,” International Journal of Computer Trends and Technology, Vol.71, No.9, pp.16–27, 2023.
[27] Arvind Kumar Bhardwaj, Sandeep Rangineni, Divya Marupaka, "Assessment of Technical Information Quality using Machine Learning ," International Journal of Computer Trends and Technology, Vol.71, No.9, pp.33-40, 2023.
Citation
Sandeep Rangineni, Amit Bhanushali, Manoj Suryadevara, Srinivas Venkata, Kiran Peddireddy, "A Review on Enhancing Data Quality for Optimal Data Analytics Performance," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.51-58, 2023.
Evaluating VGG-16 Performance in Brain Tumor Detection: A Comprehensive Review
Research Paper | Journal Paper
Vol.11 , Issue.10 , pp.59-63, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.5963
Abstract
This comprehensive examination deeply explores the evaluation of the VGG-16 architecture in the critical and significant domain of brain tumor detection, which holds utmost importance in the field of medical image analysis. The study meticulously and thoroughly evaluates the strengths and weaknesses of the VGG-16 model, taking into account its pivotal role as a deep learning model specifically crafted for this crucial medical application A comprehensive and meticulous evaluation is conducted to offer a thorough and all-encompassing assessment of the effectiveness of VGG-16 in precisely identifying brain tumors. This entails a meticulous and detailed exploration of diverse datasets, methodologies, and benchmarking metrics. The significant findings obtained from this extensive analysis shed crucial light on the immense potential of the VGG-16 model in the field of brain tumor detection, while also highlighting its inherent limitations and areas that could be enhanced. These invaluable observations have been demonstrated to be extremely advantageous for both individuals conducting research and professionals working in the field of medical image analysis. It is of utmost significance to acknowledge that this analysis ultimately underscores the crucial significance of continuous research initiatives directed towards enhancing the efficacy of VGG-16 specifically in the domain of brain tumor detection. The ultimate objective of these endeavors is to formulate healthcare solutions that are more precise and efficient, thereby greatly benefiting patients requiring such interventions.
Key-Words / Index Term
Brain diseases, Proposed Method, Artificial Neural Networks, Tumor, Necrosis, Anisotropic Diffusion
References
[1] N Van . Porz, "Multi-modalodal glioblastoma segmentation: Man versus machine", PLOS ONE, Vol.9, pp.e96873, 2014.
[2]J.L. Marroquin, B.C. Vemuri, S. Botello and F. Calderon, ?An accurate and efficient Bayesian method for automatic segmentation of brain MRI,? Proceedings of the 7th European Conference on Computer Vision, London, UK, August 2002.
[3] M.G DiBono and M. Zorzi, ?Decoding cognitive states from fMRI data using support vector regression,? Psychology Journal, 2008.
[4] S. Bauer, R. Wiest, L.-P. Nolte and M. Reyes, "A survey of MRI based medical image analysis for brain tumor studies", Phys. Med. Biol., Vol.58, No.13, pp.R97-R129, 2013.
[5] Z. Shi, L. He, T.N.K Suzuki, and H. Itoh, ?Survey on Neural Networks used for Medical Image Processing,? International Journal of Computational Science, 2009.
[6] V.B Padole and D.S. Chaudhari, ?Detection of Brain Tumor in MRI Images Using Mean Shift Algorithm and Normalized Cut Method,? International Journal of Engineering and Advanced Technology, June 2012.
[7] L. Weizman, "Automatic segmentation, internal classification, and follow-up of optic pathway gliomas in MRI", Med. Image Anal., Vol.16, no.1, pp.177-188, 2012.
[8].Meenakshi, R & Anandhakumar, P 2012, ?Brain Tumor identification in MRI with BPN Classifier and Orthonormal Operators‘, European Journal of Scientific Research, Vol.85, no.4, pp.559-569, 2012.
[9] Manoj K Kowear and Sourabh Yadev, “Brain tumor detection and segmentation using histogram thresholding”, International Journal of engineering and Advanced Technology, April 2012.
[10] Rajesh C. patil, A.S. Bhalchandra, “Brain tumor extraction from MRI images Using MAT Lab”, IJECSCSE, ISSN: 2277-9477, Vol.2, Issue.1, pp.1-4, 2012.
[11] Vinay Parmeshwarappa, Nandish S, “A segmented morphological approach to detect tumor in brain images”, IJARCSSE, ISSN: 2277 128X , Vol.4, Issue.1, January 2014.
Citation
Sajid Faysal Fahim, Nayem Mollah, Nusrat Sultana, Md. Mohshiu Islam Khan, "Evaluating VGG-16 Performance in Brain Tumor Detection: A Comprehensive Review," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.59-63, 2023.
Analyzing a WhatsApp Conversation for both Textual Contents and Emotional Sentiments
Research Paper | Journal Paper
Vol.11 , Issue.10 , pp.64-70, Oct-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i10.6470
Abstract
WhatsApp, one of the most widely used instant messaging applications, has transformed the way people communicate globally. It presents an overview of WhatsApp chat analysis, a burgeoning field that leverages the vast amount of textual data generated through WhatsApp with the help of this platform users now have a convenient way to connect with their social networks, professional networks, and commercial partners. This give an analysis of the WhatsApp group data in order to determine the degree of participation and involvement among the group`s members. Additionally, it requires analyzing the most active day in the group, the quantity of messages sent on that date, the most active user overall, the list of active admins in the group, the overall user count, the quantity of posts made by each user in the group, and the most frequently used term on the platform. The analysis was able to demonstrate the level of participation of the various people on the specified WhatsApp group.
Key-Words / Index Term
WhatsApp Chat, Sentiment Analysis, Stream lit, Nature Language Processing, NMF, Emotion Analysis, Vader
References
[1]. Ravishankara K, Dhanush, Vaisakh, Srajan I S, “International Journal of Engineering Research & Technology (IJERT)”, ISSN: 2278-0181, May, Vol.9 Issue.5, 2020.
[2]. Dr. D. Lakshminarayanan, S. Prabhakaran, “Dogo Rangsang Research Journal”, UGC Care Group I Journal, July, Vol.10, Issue.7, No.12, 2020.
[3]. Chetashri Bhadane, Hardi Dalal and Heenal Doshi, ”Sentiment Analysis-Measuring Opinions”, International Conference on Advanced Computing Technologies and Applications (ICACTA), Vol.45, pp.808–814, 2015.
[4]. S. Patil, "WhatsApp Group Data Analysis with R," International Journal of Computer Applications, November, Vol.154, No.4, pp.0975 – 8887, 2016.
[5]. Sangeeta Rani “SENTIMENT ANALYSIS AND TOPIC MODELLING ON TWITTER FOR CLEAN INDIA MISSION “ Indian Journal of Computer Science and Engineering (IJCSE), Sep-Oct, Vol.12, No.5, 2021.
[6]. C. Montag, K. B?aszkiewicz, R. Sariyska, B. Lachmann, I. Andone, B. Trendafilov, M. Eibes and A. Markowetz, "Smartphone usage in the 21st century: who is active on WhatsApp?," 4 August 2015. [Online]Available:https://bmcresnotes.biomedcentral.com/articles/10.1186/s13104- 015-1280-z. [Accessed 12 March 2019].
[7]. Aharony, N., T., G., The Importance of the WhatsApp Family Group: An Exploratory Analysis. “Aslib Journal of Information Management”, Vol.68, Issue.2, pp.1-37, 2016.
[8]. Dr. D. Lakshminarayanan, S. Prabhakaran, “Dogo Rangsang Research Journal”, UGC Care Group I Journal, July, Vol.10, Issue.7, No.12, 2020.
[9]. Neetu Anand ,Tapas Kumar”Text and Emotion Analysis of Twitter Data”, Journal of Computer Science and Engineering (IJCSE), Jun, Vol.5, Issue.6, 2017.
[10]. D.Radha, R. Jayaparvathy, D. Yamini, “Analysis on Social Media Addiction using Data Mining Technique”, International Journal of Computer Applications (0975 – 8887).
[11]. Xing Fang and Justin Zhan, “Sentiment Analysis Using Product Review Data”, Journal of Big Data, Springer, pp.1-14, 2015.
[12]. .Hemalatha, G. P Saradhi Varma, Dr. A. Govardhan. "Preprocessing the Informal Text for efficient Sentiment Analysis", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). July – August, Vol.1, Issue.2, pp.58-61, 2012.
[13]. Xia Hu, Jiliang Tang, Huiji Gao and Huan, Liu, ” Unsupervised Sentiment Analysis with Emotional Signals”, Proceedings of the 22nd International Conference on World Wide Web, WWW’13, ACM, pp.607-617, 2013.
Citation
Vineethalakshmi Boyapati, Jyothireddy Dronadula, Smilysrinidhi Gollapati, Udayasri Bodapati, Shakeelahmed Md, "Analyzing a WhatsApp Conversation for both Textual Contents and Emotional Sentiments," International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.64-70, 2023.