Integer Optimisation for Dream 11 Cricket Team Selection
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.1-6, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.16
Abstract
In the recent years, Dream 11, a fantasy sports platform has taken the Indian gaming landscape into storm by raking in a valuation of 1 million USD. One of the important aspects of participating in a Dream 11 contest is team selection. Though Dream 11 hosts fantasy Cricket, Kabbadi, Football and Basketball in its platform, Fantasy Cricket has gained more users due to its popularity in India. Moreover, Cricket is one such sport that generates large volumes of data, and therefore provides many opportunities for data analysis. A Dream 11 user needs to select the right mix of players to maximize his/her points, and thereby win some cash rewards. The paper describes a retrospective approach to team selection using the real-world data collected from Player performances in the last 10 matches, to propose a Dream 11 Fantasy team for the upcoming match. The technique used is Integer Programming, implemented using the Gurobi library in Python. The team selection problem has also been analyzed through the lens of Markowitz Optimization, which is mostly used to select stocks in a financial portfolio. The concept of risk aversion has been applied to penalize inconsistent performances, as risk taking and risk averse users might want to bet on different odds for the same match.
Key-Words / Index Term
Integer Programming, Binary Optimisation, Team Selection, Cricket
References
[1] Lemmer HH. A measure for the batting performance incricket players.SAfr J Res Sport Phys Educ Recreation26(1):55–64, 2002
[2] Borooah, V. K., and Mangan, J E, “The„Bradman Class?: An Exploration of Some Issues in the Evaluation of Batsmenfor Test Matches, 1877–2006.”, Journal of Quantitative Analysis in Sports, 6 (3), Article 14, 2010.
[3] Kimber, A C and Hansford, A R, “A Statistical Analysis of Batting in Cricket,” Journal of Royal Statistical Society, 156, pp 443 –455, 1993.
[4] Damodaran, U, “Stochastic Dominance and Analysis of ODI Batting Performance: The Indian Cricket Team, 1989-2005,” Journal of Sports Science and Medicine, 5, pp 503 –508, 2006.
[5] Ovens M and Bukiet B. A mathematical modelling approachto one-day cricket batting orders.J Sports Sci Med5: 495–502.Preston I and Thomas J. Batting strategy in limited overscricket.Statistician49(1): 95–106, 2006
[6] Swartz TB, Gill PS, Beaudoin D and de Silva BM (2006). Opti-mal batting orders in one-day cricket.Comput Opns Res33:1939–1950, 2006
[7] Lemmer HH (2006). A measure of the current bowling performancein cricket.S Afr J Res Sport Phys Educ Recreation28(2): 91–103, 2006
[8] Lewis, A., “Extending the Range of Player-Performance Measures in One-Day Cricket,” Journal of Operational Research Society, 59, pp 729-742, 2008.
[9] Farhana Siddiqui, Hasan Phudinawala, Chetan Davale, Soham Pawar,” Innovative Idea for Playerelection usingSupport Vector Machine(SVM)” International Journal of Computer Sciences and Engineering, Vol. 7, Issue-4, pp.841-843, 2019
[10] C. Deep Prakash “A New Team Selection Methodology using Machine Learning and Memetic Genetic Algorithm for IPL-9”, International Journal ofElectronics, Electrical and Computational System Volume 5 –Issue.4, April 2016
[11] Sharp, Gary & Brettenny, Warren & Gonsalves, John & Lourens, Michelle & Stretch, R. Integer optimisation for the selection of a Twenty20 cricket team. Journal of the Operational Research Society. 62. 10.1057/jors.2010.122, 2011
[12] Ahmed, F., Deb, K., & Jindal, A. .Evolutionary multi-objective optimization and decision making approaches to cricket team selection.In Proceedings of the Second International Conference on Swarm, Evolutionary, and Memetic Computing. Berlin, Heidelberg: Springer-Verlaghttp://dx.doi.org/10.1007/978-3-642-27242-4_9, 2011
[13] K. Deb, S. Agrawal, A. Pratap, and T. Meyarivan. A fast and elitist multi-objective geneticalgorithm: NSGA-II.IEEE Transactions on Evolutionary Computation, 6(2):182–197, 2002.
[14] Nihar Patel, Mrudang Pandya,” IPL Player’s Performance Prediction” International Journal of Computer Sciences and Engineering, Vol. 7, Issue-5, pp.478-481, 2019
[15] Harsha Perera, Jack Davis & Tim B. Swartz Optimal lineups inTwenty20 cricket, Journal of Statistical Computation and Simulation,86:14,2888-2900,2016 DOI:10.1080/00949655.2015.1136629
[16] Taha HA (2003).Operations Research, An Introduction. 7th edn,Prentice Hall: Upper Saddle River, New Jersey
[17] Lakkaraju, P., and Sethi, S., “Correlating the Analysis of Opinionated Texts Using SAS®Text Analytics with Application of Sabermetrics to Cricket Statistics,” Proceedings of SASGlobal Forum 2012, 136, pp 1-10, 2012.
Citation
Saurav Singla, Swapna Samir Shukla, "Integer Optimisation for Dream 11 Cricket Team Selection," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.1-6, 2020.
A Simulative Study on the Performance of Load Balancing Techniques Over Varying Cloud Infrastructure Using Cloudsim
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.7-13, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.713
Abstract
Cloud computing is a recent evolution in computer technology. A cloud server has to deal with a lot of workload. So, the process of distributing load over the virtual machines or among the servers in a distributed cloud system is very important to get better performance. Before launching a cloud based application or a new load balancing policy in the cloud server, it is very difficult to know whether the performance will be good or not. Because testing an application or load balancing policy’s performance in Cloud for different workload in a repeatable manner under varying system and user configurations and requirements are very complex and expensive to achieve. So simulating the performance of an application or a load balancing policy is a good alternate. This paper is about simulating some existing load balancing approaches as well as a proposed improved load balancing approach and the comparison of the performance using CloudSim simulator.
Key-Words / Index Term
Cloud computing, workload, load balancing, simulation, CloudSim
References
[1] M. Armbrust, A. Fox, R. Griffith and A. Joseph, “Above the clouds: A Berkeley view of cloud computing,” Univ. California, Berkeley, Tech. Rep. UCB, pp. 07–013, 2009.
[2] Rajkumar Buyya, Rajiv Ranjan and Rodrigo N. Calheiros, “Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities”, In the Proceedings of the 2009 International Conference on High Performance Computing & Simulation, Leipzig, Germany, 2009.
[3] Soumya Ray and Ajanta De Sarkar, “Execution analysis of load balancing algorithms in cloud computing environment”, IJCCSA, Vol.2, No.5, October 2012
[4] A. K. R. Parveen Kumar, “An overview and survey of various cloud simulation tools,” in Journal of Global Research in Computer Science, vol. 5, no. 1, January 2014.
[5] R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. F. De Rose, and R. Buyya, “ CloudSim : A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms”, Software: Practice and Experience, 41(1): 2350, Wiley, January 2011
[6] D. R. M. P. Jain;, “Study and comparison of various cloud simulators available in the cloud computing,” in International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 9, September 2013.
[7] Soumya Ranjan Jena, Sudarshan Padhy, Balendra Kumar Garg, “Performance Evaluation of Load Balancing Algorithms on Cloud Data Centers”, International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March-2014
[8] Jasmin James and Dr. Bhupendra Verma, “Efficient VM load balancing algorithm for a cloud computing environment”, International Journal on Computer Science and Engineering (IJCSE), 2012.
[9] Srinivas Sethi, Anupama Sahu and Suvendu Kumar Jena, “Efficient load balancing in cloud computing using Fuzzy logic “, IOSRJEN, ISSN: 2250-3021 Volume 2, Issue 7, 2012.
[10] M. Randles, D. Lamb, and A. Taleb-Bendiab, “A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing”, Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, Perth, Australia, April 2010.
[11] Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, Cesar A. F. De Rose and Rajkumar Buyya, “CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms.” Published online 24 August 2010 in Wiley Online Library (wileyonlinelibrary.com).
Citation
Rafat Khan, "A Simulative Study on the Performance of Load Balancing Techniques Over Varying Cloud Infrastructure Using Cloudsim," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.7-13, 2020.
Multi-Class Sentiment Classification using Machine Learning and Deep Learning Techniques
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.14-20, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.1420
Abstract
With the rapid growth of usage of online social media platforms in daily life there has also been an increase in opinion mining or sentiment analysis to extract the user’s sentiments or views towards any topic. Twitter’s data or tweets has been the focus point among the researchers as it provides abundant data and in a wide variety of fields. While most of the study in this field has been in the extraction of polarity scores of the sentiments namely positive negative and neutral in a tweet, this paper focuses on extracting the real sentiments such as love, hate, worry, sadness and more out of the tweets. This paper proposes different machine learning and deep learning techniques such as Random Forest, Bi-directional LSTM, BERT and more to present a comparative analysis of the performance of different techniques and extract the sentiments with high accuracy. Tweets have been collected from the Crowdflower dataset and experimental findings reveal that the methodology comprising BERT produces the maximum accuracy followed by the methodology that comprises bi-directional LSTM and then the rest of the model follows.
Key-Words / Index Term
Sentiment Analysis, BERT, Bi-directional LSTM, Multi-class Classification, Random Forest, GloVe
References
[1] M. Bouazizi, T. Ohtsuki, “A pattern-based approach for multi-class sentiment analysis in Twitter”, IEEE Access, vol. 5, pp. 20617-20639, 2017.
[2] M. Bouazizi, T. Ohtsuki, “Sentiment analysis: From binary to multiclass classification: A pattern-based approach for multi-class sentiment analysis in Twitter”, In the Proceedings of 2016 IEEE International Conference on Communications (ICC), Malaysia, pp. 1-6, 2016.
[3] M.M. Madbouly, S.M. Darwish, R. Essameldin, “Modified fuzzy sentiment analysis approach based on user ranking suitable for online social networks”, IET software, Vol. 14, Issue 3, pp. 300-307, 2020.
[4] M. Bibi, W. Aziz, M. Almaraashi, I.H. Khan, M.S.A. Nadeem, N. Habib, “A Cooperative Binary-Clustering Framework Based on Majority Voting for Twitter Sentiment Analysis”, IEEE Access, Vol. 8, pp. 68580-68592, 2020.
[5] S.E. Saad, J. Yang, “Twitter sentiment analysis based on ordinal regression”, IEEE Access, Vol. 7, pp. 163677-163685, 2019.
[6] H. Rehioui, A. Idrissi, "New Clustering Algorithms for Twitter Sentiment Analysis", IEEE Systems Journal, Vol. 14, Issue 1, pp. 530-537, 2019.
[7] L. Wang, J. Niu, S. Yu, "SentiDiff: Combining textual information and sentiment diffusion patterns for Twitter sentiment analysis", IEEE Transactions on Knowledge and Data Engineering, Vol. 32, Issue 10, pp. 2026-2039, 2020.
[8] Z. Jianqiang, G. Xiaolin, Z. Xuejun, “Deep convolution neural networks for twitter sentiment analysis”, IEEE Access, Vol. 6, pp. 23253 - 23260, 2018.
[9] A.C. Pandey, D.S. Rajpoot, M. Saraswat, “Twitter sentiment analysis using hybrid cuckoo search method”, Information Processing & Management, Vol. 53, Issue 4, pp.764-779, 2017.
[10] U. Naseem, I. Razzak, K. Musial, M. Imran, "Transformer based deep intelligent contextual embedding for twitter sentiment analysis", Future Generation Computer Systems, Vol. 113, pp. 58-69, 2020.
[11] Y. AI. Amrani, M. Lazaar, KE. EI. Kadiri, “Random forest and support vector machine based hybrid approach to sentiment analysis", Procedia Computer Science, Vol. 127, pp. 511-520.
[12] J. Wang, L.C. Yu, K.R. Lai, X. Zhang, “Dimensional sentiment analysis using a regional CNN-LSTM model”, In the Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, Vol. 2: short papers, pp. 225-230, 2016.
[13] Y. Zhang, J. Wang, X. Zhang, “YNU-HPCC at SemEval-2018 Task 1: BiLSTM with attention based sentiment analysis for affect in tweets", In the Proceedings of the 12th International Workshop on Semantic Evaluation, China, pp. 273-278, 2018.
[14] A.A. Sharfuddin, M.N. Tihami, M.S. Islam, “A deep recurrent neural network with bilstm model for sentiment classification”, In the Proceedings of the 2018 IEEE International Conference on Bangla Speech and Language Processing (ICBSLP), Sylhet, Bangladesh, pp. 1-4, 2018.
[15] M. Jabreel, A. Moreno, “Target-dependent Sentiment Analysis of Tweets using a Bi-directional Gated Recurrent Unit”, In the 13th International Conference on Web Information Systems and Technologies (WEBIST), pp. 80-87, 2017.
[16] M. Munikar, S. Shakya, and A. Shrestha. "Fine-grained sentiment classification using bert." In the Proceedings of the 2019 IEEE International Conference on Artificial Intelligence for Transforming Business and Society (AITB), Kathmandu, Nepal, pp. 1-5, Vol. 1, 2019.
[17] D. G. Aggarwal, “Sentiment Analysis: An insight into Techniques, Application and Challenges”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp. 697-703, 2018.
[18] M.G. Huddar, S.S. Sannakki, V.S. Rajpurohit, “A Survey of Computational Approaches and Challenges in Multimodal Sentiment Analysis”, International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp. 876-883, 2019.
Citation
Saurav Singla, Vikash Kumar, "Multi-Class Sentiment Classification using Machine Learning and Deep Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.14-20, 2020.
An Improved Key Distribution Protocol Using Symmetric Key Cryptography
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.21-26, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.2126
Abstract
Due to the rapid growth in technology, the development and use of cryptosystems has become plays an important role in networked and distributed applications. To get the benefits of such applications, the principals will cooperate by exchanging information over an open networks such as the internet. A key distribution protocol is an essential component of any cryptosystem to generation and sharing of cryptographic keys between the principals involved in the network securely. In the current days, there are a number of key distribution protocols that have been developed and implemented. However, the most of such protocols were found to be prone to several attacks a long time after deployment. In this paper, the key distribution protocol is designed to improve the Nomaskd protocol. The two protocols are analyzed and verified by a formal verification tool called Scyther, the verification results show that the Nomaskd protocol does not fulfill the strong authentication goals, whereas the improved protocol fulfill these goals.
Key-Words / Index Term
Key distribution, Formal verification, Symmetric key cryptography, Nomaskd protocol, Scyther tool
References
[1] A.J. Menezes, P.C. Van Oorschot and S.A. Vanstone, "Handbook of Applied Cryptography", 5th Edition, CRC Press, Inc, United States, 2001.
[2] A. Aasarmya and S. Agarwal, "Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique", International Journal of Computer Sciences and Engineering,Vol.7, Issue.8, pp.39-43, 2019.
[3] S. Verma, R. Choubey and R. Soni, "An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security", International Journal of Emerging Technology and Advanced Engineering, Vol.2, No.7, pp.18-21, 2012.
[4] N. Srilatha, M. Deepthi and I.R. Reddy, "Robust Quantum Key Distribution Based on Two Level QDNA Technique to Generate Encrypted Key", International Journal of Computer Sciences and Engineering,Vol.5, Issue.2, pp.15-19, 2017.
[5] W. Diffie and M. Hellman, "New directions in cryptography", IEEE Transaction on Information Theory, Vol.22, Issue.6, pp.644-654, 1976.
[6] W. Stallings, "Cryptography and Network Security", principles and practices, 7th Edition, Pearson Prentice Hall, 2017.
[7] R.M. Needham and M.D. Schroeder, "Using encryption for authentication in large networks of computers", Communications of the ACM, Vol.21, Issue.12, pp.993-999, 1978.
[8] D. Otway and O. Rees, "Efficient and timely mutual authentication", ACM SIGOPS Operating Systems Review, Vol.21, Issue.1, pp.8-10, 1987.
[9] J. G. Steiner, B. C. Neuman, and J. I. Schiller, "Kerberos: An Authentication Service for Open Network Systems", USENIX Winter, pp.191-202, 1988.
[10] M. Burrows, M. Abadi and R. Needham, "A Logic of Authentication", Proceedings of the Royal Society of London Mathematical, Physical and Engineering Sciences, Vol.426, No.1871, pp.233-271, 1989.
[11] Shalini and M. Kushwaha, "Mutual Authentication and Secure Key Distribution in Distributed Computing Environment", International Journal of Advanced Research in Engineering and Technology (IJARET), Vol.11, Issue.5, pp.378-390, 2020.
[12] C. Cremers and S. Mauw, "Operational semantics and verification of security protocols", Springer Science & Business Media, 2012.
[13] D.E. Denning and G.M. Sacco,"Timestamps in key distribution protocols", Communications of the ACM, Vol.24, No.8, pp.533–536, 1981.
[14] K. Liu, J. Ye and Y. Wang, "The Security Analysis on Otway-Rees Protocol Based on BAN Logic", IEEE 4th International Conference on Computational and Information Sciences (ICCIS), Chongqing, China, pp.341-344, 2012.
[15] D. Dolev and A. Yao, "On the security of public key Protocols", IEEE Transactions on Information Theory, Vol. 29, No.12, pp.198-208, 1983.
[16] N. Dalal, J. Shah, K. Hisaria and D. Jinwala, "A Comparative Analysis of Tools for Verification of Security Protocols", Int. J. Communications, Network and System Sciences (IJCNS), Vol.3, Issue.10, pp.779-787, 2010.
[17] N. Kahya, N. Ghoualmi and P. Lafourcade, "Secure Key Management Protocol In Wimax", International Journal of Network Security & Its Application, Vol.4, No.6, 2012.
Citation
Yasser Ali Alahmadi, Saleh Noman Alassali, "An Improved Key Distribution Protocol Using Symmetric Key Cryptography," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.21-26, 2020.
Comparative Study of the Deep Learning Neural Networks on the basis of the Human Activity Recognition
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.27-32, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.2732
Abstract
The Human Activity Recognition using the Signal produced by the Sensors have a number of applications in field of the fitness and health. The Human activities are recorded with the help of the various types of the sensor embedded in a wearable device or in a smartphone. There are many research works have been done for the Human Activity Recognition using the machine-learning as well as deep-learning models, but there is requirement to find out that which model is more efficient for a specific dataset, for which the comparative study of the model comes in mind. In this research paper the comparative study of three most efficient Deep Learning models LSTM-RNN, GRU-RNN and CNN has been performed on the most famous dataset ‘Human Activity Recognition Using Smartphones Data Set’ present at UCI machine-learning repository. ‘LSTM-RNN’ is abbreviated for ‘Long Short-Term Memory-Recurrent Neural Network’ is an updated version of the recurrent neural network based on the concept of back-propagation, is capable of remembering the dependencies for comparatively longer time-span. ‘GRU-RNN’ is abbreviated for ‘Gated Recurrent Units-Recurrent Neural Network’ is also an updated version of the recurrent neural network based on the concept of back-propagation, with fewer parameters than LSTM-RNN. ‘CNN’ is abbreviated for ‘Convolutional Neural Network’ is a feed forward Neural network using Convolutional layers for feature-extraction and fully-connected layer for classification.
Key-Words / Index Term
Human Activity Recognition (HAR), LSTM-RNN, GRU-RNN, CNN
References
[1] S. S. Anju, K. V. Kavitha, “Performance Evolution of Varoius Machine Learning Technique for Human Activity Recognition using Smartphone”, Vol.7, Issue.8, pp.316-319, 2019.
[2] S. R. Ramammurthy, N. Roy, “Recent trends in machine learning for human activity recognition- A Survey”, Wiley Interdisciplinary Reviews: Data Minining and Knowledge Discovery, 2018, doi: 10. 1002/widm. 1254.
[3] S. Wan, Q. Lianyong, X. Xiolong, T. Chao, G. Zonhua, “Deep Learning Models for Real-time Human Recognition with Smartphones”, Mobile Networks and applications, 2019, doi: 10. 1007/S11036. 019- 01445- x.
[4] G.A. Kani, P. Geetha, A. Gomathi, “Human Activity recognition using deep learning with Ggradient Fused Handcrafted Features and Categorization based on Machine Learning Technique”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1-7, 2018.
[5] N. Geeta, E.S. Samundeeswari, “A Review on Human Activity Recognition System”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.825-829, 2018.
[6] M. Badshah, “Sensor-based Human Activity Recognition using Smartphones”, Sensors, 2019, doi: 10.31979/etd.8fjc-drpn.
[7] R. Dey, F.M. Salem, “Gate-Variants of Gated Recurrent Unit (GRU) Neural Networks”, journal of IEEE Acess,2017, doi: 10.1109/MWSAS.2017.8053243.
[8] W. Jiang, Z. Yin, and., “ Human activity recognition using wearable sensors by deep convolutional neural networks.”, In Proceedings of the 23rd ACM international conference on Multimedia (pp. 1307-1310), 2015.
[9] H. Cho, S.M. Yoon, “Divide and Conquer based 1D CNN Human Activity Recognition using test data Sharpening”, Sensors, 2018, 1055, doi:10.3390/s 18041005.
Citation
Saurav Singla, Anjali Patel, "Comparative Study of the Deep Learning Neural Networks on the basis of the Human Activity Recognition," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.27-32, 2020.
WSN Grid Formation to Tackle Packet Drop Ratio and Increase Energy Efficiency during Packet Transmission
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.33-39, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.3339
Abstract
Today sensing resources are widely increased in terms of nodes and it affects the Grid computing systems. This technology is used for predicting traffic and for road safety. These systems usually share resources and collaborate with sensing devices for processing data and propagate results. In this paper we proposed WSN based delay tolerance mechanism that considers cost matrix and dynamic delay tolerance. The allocation of resources depends critically on the cost associated with virtual machine. It considers exponential residency of VC and execution time along with bandwidth utilization. Bandwidth consumption and cost of execution is reduced greatly by the effect of proposed mechanism.
Key-Words / Index Term
WSN, Grid computing, delay tolerance, resource scheduling
References
[1] R. K. Naha, S. Garg, D. Georgakopoulos, P. P. Jayaraman, L. Gao, Y. Xiang, and R. Ranjan, “Fog computing: Survey of trends, architectures, requirements, and research directions,” IEEE Access, vol. 6, no. c, pp. 47980–48009, 2018.
[2] B. Brik, N. Lagraa, N. Tamani, and A. Lakas, “Renting out Grid Services in Mobile WSN,” Res. Gate, no. December, 2018.
[3] M. R. Jabbarpour, A. Marefat, A. Jalooli, and H. Zarrabi, “Correction to?: Grid-based WSN networks?: a taxonomy , survey , and conceptual hybrid architecture Could-based WSN networks?: a taxonomy , survey , and conceptual hybrid architecture,” Wirel. Networks, no. November, 2017.
[4] R. Yu, X. Huang, J. Kang, J. Ding, S. Maharjan, S. Gjessing, and Y. Zhang, “Cooperative resource management in Grid-enabled WSN networks,” IEEE Trans. Ind. Electron., vol. 62, no. 12, pp. 7938–7951, 2015.
[5] T. Mori, Y. Utsunomiya, X. Tian, and T. Okuda, “Queueing theoretic approach to job assignment strategy considering various inter-Arrival of job in fog computing,” 19th Asia-Pacific Netw. Oper. Manag. Symp. Manag. a World Things, APNOMS 2017, pp. 151–156, 2017.
[6] K. Zheng, H. Meng, P. Chatzimisios, L. Lei, and X. Shen, “An SMDP-Based Resource Allocation in WSN Grid Computing Systems,” IEEE Trans. Ind. Electron., vol. 62, no. 12, pp. 7920–7928, 2015.
[7] K. Zhang, Y. Mao, S. Leng, Q. Zhao, L. Li, and X. Peng, “Energy-efficient Offloading for Mobile Edge Computing in 5G Heterogeneous Networks,” IEEE Access, vol. 3536, no. c, pp. 1–10, 2016.
[8] W. Zhang, Z. Zhang, and H. Chao, “Cooperative Fog Computing for Dealing with Big Data in the Internet of Nodes?: Architecture and Hierarchical Resource Management,” IEEE Access, no. December, pp. 60–67, 2017.
[9] J. Fan, R. Li, and X. Zhang, “Research on delay tolerance strategy based on two level checkpoint server in autonomous WSN Grid,” Proc. 2017 IEEE 7th Int. Conf. Electron. Inf. Emerg. Commun. ICEIEC 2017, no. 61363079, pp. 381–384, 2017.
[10] Y. Sharma, B. Javadi, W. Si, and D. Sun, “Reliability and energy efficiency in Grid computing systems: Survey and taxonomy,” J. Netw. Comput. Appl., vol. 74, pp. 66–85, 2016.
[11] H. S. Y. Lin, “EAFR: An Energy-Ef?cient Adaptive File Replication System in Data-Intensive Clusters,” IEEE Trans. Parallel Distrib. Syst., pp. 1017–1030, 2017.
[12] B. Shrimali and H. Patel, “Performance Based Energy Efficient Techniques For VM Allocation In Grid Environment,” IEEE Access, pp. 477–486, 2017.
[13] H. . Z. D. . Zhao B.a Aydin, “Reliability-Aware dynamic voltage scaling for energy-constrained real-time embedded systems,” 26th IEEE Int. Conf. Comput. Des. 2008, ICCD, vol. 546244, pp. 633–639, 2008.
[14] H. M.-R. Mahdi Ghamkhari, “Energy and Performance Management of Green Data Centers: A Pro?t Maximization Approach,” IEEE Trans. Smart Grid, pp. 1017–1025, 2017.
[15] M. Salehi, M. K. Tavana, S. Rehman, S. Member, M. Shafique, and A. Ejlali, “Two-State Checkpointing for Energy-Efficient Delay Tolerance in Hard Real-Time Systems,” pp. 1–12, 2016.
[16] S. Ben Alla and A. Ezzati, “Hierarchical adaptive balanced energy efficient routing protocol (HABRP) for heterogeneous wireless sensor networks,” Ieee, 2011.
[17] P. Handa, B. Singh Sohi, and N. Kumar, “Energy efficient hybrid routing protocol for underwater acoustic sensor network,” 2016 Int. Conf. Electr. Electron. Optim. Tech., pp. 2573–2578, 2016.
[18] B. Mills, T. Znati, R. Melhem, K. B. Ferreira, and R. E. Grant, “Energy consumption of resilience mechanisms in large scale systems,” Proc. - 2014 22nd Euromicro Int. Conf. Parallel, Distrib. Network-Based Process. PDP 2014, pp. 528–535, 2014.
Citation
DazyKohli, Deepak, "WSN Grid Formation to Tackle Packet Drop Ratio and Increase Energy Efficiency during Packet Transmission," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.33-39, 2020.
Comparative Analysis of Transformer Based Pre-Trained NLP Models
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.40-44, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.4044
Abstract
Transformer based self-supervised pre-trained models have transformed the concept of Transfer learning in Natural language processing (NLP) using Deep learning approach. Self-attention mechanism made transformers more popular in transfer learning across a broad range of NLP tasks. Among such tasks, Sentiment analysis helps to identify people`s opinions towards a topic, product or service. In this project we analyse the performance of self-supervised models for Multi-class Sentiment analysis on a Non benchmarking dataset. We used BERT, RoBERTa, and ALBERT models for this study. These models are different in design but have the same objective of leveraging a huge amount of text data to build a general language understanding model. We fine-tuned these models on Sentiment analysis with a proposed architecture. We used f1-score and AUC (Area under ROC curve) score for evaluating model performance. We found the BERT model with proposed architecture performed well with the highest f1-score of 0.85 followed by RoBERTa (f1-score=0.80), and ALBERT (f1-score=0.78). This analysis reveals that the BERT model with proposed architecture is best for multi-class sentiment on a Non-benchmarking dataset.
Key-Words / Index Term
NLP, Transfer learning, Sentiment analysis, BERT, RoBERTa, ALBERT
References
[1] Ashish Vashwani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, ?ukasz Kaiser, Illia Polosukhin, “Attention is all you need”, 31st Conference on Neural Information Processing Systems, Long Beach, CA, USA pp.5998-6008, 2017.
[2] Jacob Devlin, Ming-Wei Chang, Kenton Lee, Kristina Toutanova, “BERT: Pre-training of deep bidirectional transformers for language understanding”, In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), Minneapolis, Minnesota, pp. 4171-4186.
[3] Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, Veselin Stoyanov, “Roberta: A robustly optimized bert pre training approaches”, 2019, arXiv preprint arXiv:1907.11692.
[4] Zhenzhong Lan, Mingda Chen, Sebastian Goodman, Kevin Gimpel,Piyush Sharma, Radu Soricut, “Albert: A lite bert for self-supervised learning of language representations”, 2019, arXiv preprint arXiv:1909.11942.
[5] Matthias Aßenmacher, Christian Heumann, “On the comparability of pre-trained language models”, CEUR Workshop Proceedings, Vol.2624.
[6] Cristóbal Colón-Ruiz, Isabel Segura-Bedmar, “Comparing deep learning architectures for sentiment analysis on drug reviews", Journal of Biomedical Informatics, Volume 110, 2020, 103539, ISSN 1532-0464.
[7] Thanapapas Horsuwan, Kasidis Kanwatchara, Peerapon Vateekul, Bonser Kijsirikul, "A Comparative Study of Pretrained Language Models on Thai Social Text Categorization", 2019, arXiv:1912.01580v1.
[8] Carlos Aspillaga, Andres Carvallo, Vladimir Araujo,"Stress Test Evaluation of Transformer-based Models in Natural Language Understanding Tasks", Proceedings of the 12th Conference on Language Resources and Evaluation (LREC 2020), European Language Resources Association (ELRA), Marseille, pp. 1882–1894, 2020.
[9] Vishal Shirsat, Rajkumar Jagdale, Kanchan Shende, Sachin N. Deshmukh, Sunil Kawale, “Sentence Level Sentiment Analysis from News Articles and Blogs using Machine Learning Techniques”, International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, 2019.
[10] Avinash Kumar1, Savita Sharma, Dinesh Singh, "Sentiment Analysis on Twitter Data using a Hybrid Approach", International Journal of Computer Sciences and Engineering, Vol.-7, Issue-5, May 2019.
Citation
Saurav Singla, Ramachandra N., "Comparative Analysis of Transformer Based Pre-Trained NLP Models," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.40-44, 2020.
Inductive Energy Harvesting for Monitoring Devices in Power Grid
Review Paper | Journal Paper
Vol.8 , Issue.11 , pp.45-47, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.4547
Abstract
Power grid is a network that delivers electricity from generating station to consumers. Grid efficiency and reliability can be increased by implementing real time monitoring of high voltage devices and transmission line. It helps in fault detection and hence avoids cascading failure initiated by a single fault. Real time monitoring is provided by low cost devices such as wireless sensor nodes. Wireless sensor nodes are battery operated devices and replacing theses batteries is one of the major drawback of it. These monitoring devices can be made self sustainable by harvesting varying magnetic field around high voltage devices and overhead transmission line. The amount of energy harvested by magnetic field harvester depends on magnetic core, field intensity, de-magnetization effect, and distance between harvester and magnetic field. This paper provides an overview of different magnetic field harvesting techniques employed in power grid.
Key-Words / Index Term
Wireless sensor node, Smart grid, magnetic field harvesters, real time monitoring
References
[1] A.Sen,S.Pal,R.Paul“The smart architecture of smart grid”International journal of Computer Science and Engineering vol.8,special Issue.1,pp.25-31,2020.
[2] Jue hou shaorong wang shuwei zhang “Design and Application of a CT-Based High-Reliability Energy Harvesting Circuit for Monitoring Sensors in Power System”IEEE Access vol. 7, pp.149039-149051,2019.
[3] Sheng Yuan ,Yi Huang ,Jiafeng Zhou ,Qian Xu “A High-Efficiency Helical Core for Magnetic Field Energy Harvesting” IEEETransactions on PowerElectronics Vol.32 , Iss.7,pp.5365 – 5376, 2017.
[4] Cheon-Yong Lim ,Yeonho Jeong, Keon-Woo Kim, Feel-Soon Kang“A High-Efficiency Power Supply from Magnetic Energy Harvesters” IEEE International Power Electroni Conference ,Japan, 2018
[5] Yuan Zhuang ,Chen Xu ,Chaoyun Song ,Anqi Chen ,Wei Lee “Improving Current Transformer-based Energy Extraction from AC Power Lines by Manipulating Magnetic Field” IEEE Transactions on Industrial Electronics Vol.67, issue.11, pp.9471-9479 2020 .
[6] Zheng Jun Chew , Tingwen Ruan ,Meiling Zhu “Power Management Circuit for Wireless Sensor Nodes Powered by Energy Harvesting: On the Synergy of Harvester and Load”IEEE Transactions on Power Electronics Vol.34 , Issue.9,pp.8671 – 8681, 2019.
[7] Wei Wang ,Xueliang Huang,Linlin Tan ,Junfeng Zhao “Hybrid wireless charging system for monitoring overhead 110 kV high-voltage power line equipment based on magnetoelectric conversion” IET Generation, Transmission & Distribution Vol.10 , Issue.,5 pp. 1199 – 1208,2016.
[8] Y. Zhuang C. Xu S. Yuan C. He A. Chen W. W. Lee J. Zhou Y. Huang“An Improved Energy Harvesting System on Power Transmission Lines” IEEE Wireless Power Transfer Conference (WPTC) ,Taiwan,2017.
[9] Awab A. Ali ,Syed Ahmed Ali Najafi , Okan Boler ,Yilmaz Sozer “Magnetic Field Energy Harvester and Management Algorithm for Power Tower Sensors”IEEE Energy Conversion Congress and Exposition (ECCE), USA,2018.
Citation
Pavana H., Rohini Deshpande, "Inductive Energy Harvesting for Monitoring Devices in Power Grid," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.45-47, 2020.
Designing Shopping Cart and Determining Fake Product Comments Using Multinomial NB
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.48-52, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.4852
Abstract
In these days, there are a lot of shopping websites and apps that are very good for people requirements in their daily lives. But the quality of the product is known to the customer with the help of the reviews or comments of previous users. Some product producers are doing fake actions on those comments. Hence we don’t know the right quality. Hence in this paper, I developed a shopping cart with simplicity and flexibility, user friendly. And it is incorporated with the safe comments. The admin can recognize the list of comments is of safe or unsafe. Here, multinomial naïve bayes technique is used for fake ones and python programming is used for shopping cart development. We can block the fake customer through customer credentials.
Key-Words / Index Term
flexibility, quality, admin, multinomial NB
References
[1] fengXu. Mixture of latent multinomial naive Bayes classifier., p. 4, 2018
[2] AmiliaFitr, V. Sentiment Analysis of Social Media Twitter with Case of Anti-LGBT Campaign in Indonesia using Naïve Bayes, Decision Tree, and Random Forest Algorithm. Information systems. 2018.
[3] Rubtsova, Y. Constructing a Corpus for Sentiment Classification Training. Software & Systems. 2018.
[4] Asatani, P. K. (2018). Text classification. World Symposium on Communication Engineering, WSCE 2018.
[5] Qin, F. Application and research of multi_label Naïve Bayes Classifier. https://ieeexplore.ieee.org/xpl/conhome/6338367/proceeding. IEEE. 2012.
[6] Uehara. An implementation of electronic shopping cart on the Web system using component-object technology. Proceedings Sixth International Workshop on Object-Oriented Real-Time Dependable Systems. IEEE. 2002.
[7] Karunarathna, K. . A Fully Functional Shopping Mall Application -- SHOPPING EYE. 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation. IEEE. 2014.
[8] ying, m. . A commodity search system for online shopping based on ontology and web mining. International Conference on Software Intelligence Technologies and Applications & International Conference on Frontiers of Internet of Things 2014. IEEE. 2014.
Citation
N. Bhargavi, "Designing Shopping Cart and Determining Fake Product Comments Using Multinomial NB," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.48-52, 2020.
Enhancing the Learning progress by using K-Mapping Mechanism in Artificial Intelligence
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.53-56, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.5356
Abstract
In the present computing era, the field of “Artificial Intelligence” play an important role in each and every sector. The major objective is to create a machine with intelligence in different level is a great challenge for researchers. Finding the solution for this issue and resultant effect is achieved in the direction of learning aspect. The most important element correlated with an “Artificial Intelligence Learning Entity” (AILE) is everlastingly entitled using a terminology “Learning Agent”. Every phases of an implementation in the learning agent applies cognitive theory in order to store as well as the knowledge representations. In this research work focus on enhancing, the learning progress or mechanism which will determine the level of intelligence in “Learning Agent”. It takes a problem statement for “Enhancing the Learning progress by using K-Mapping Mechanism in Artificial Intelligence”. The variable “K-means” various components that are linked with improve learning mechanism.
Key-Words / Index Term
Learning, Agent, intelligence and cognitive
References
[1] K. R. Scherer, “Emotions are emergent processes: they require a dynamic computational architecture.” Phil. Trans. of the Royal Society, Series B , vol. 364, pp. 3459–74, Dec. 2009.
[2] G. Schoner, “Dynamical systems approaches to cognition,” in Cambridge Handbook of Computational Psychology, R. Sun, Ed. Cambridge University Press, pp. 101–126, 2008.
[3] J. Bailenson, E. Pontikakis, I. Mauss, J. Gross, M. Jabon, C. Hutcherson, C. Nass, and O. John, “Real-time classi?cation of evoked emotions using facial feature tracking and physiological responses,” Int.Journal of Human-Computer Studies, vol. 66, no. 5, pp. 303–317, May 2008.
[4] Y. Sandamirskaya, “Dynamic neural fields as a step toward cognitive neuromorphic architectures.” Frontiers in Neuroscience, vol. 7, pp. 1–13. Art. 276, Jan. 2014.
[5] P. Lang, M. Bradley, and B. Cuthbert, “International Affective Picture System (IAPS): Affective ratings of pictures and instruction manual,” University of Florida, Tech. Rep., 2005.
[6] Deng, Zhenyun, Xiaoshu Zhu, Debo Cheng, Ming Zong,Shichao Zhang. "Efficient kNN classification algorithm for big data.",proceedings Neurocomputing 195 ,2016.
[7] Iyer, S. Jeyalatha,R. Sumbaly, “Diagnosis of Diabetes using Classification Mining Techniques”, IJDKP, Volume 5, pp. 1-14, 2015.
[8] Jasmina novakovic, “Experimental Study Of Using The K-Nearest Neighbour Classifier With Filter Methods,” in computer science and technology at varna, Bulgaria.
[9] Imandoust, Sadegh Bafandeh, Mohammad Bolandraftar. "Application of k-nearest neighbor (knn) approach for predicting economic events: Theoretical background." International Journal of Engineering Research and Applications 3.5 2013.
[10] Amir ali, “An Intuitive Guide of K-Nearest Neighbor with Practical”, Wavy AI Research Foundation in k-Nearest Neighbor.
[11] Arslan, Farrukh. "An Efficient K-Nearest Neighbor Algorithm to Determine SOP File System.", 2018.
[12] Shufeng chen , “K-Nearest Neighbor Algorithm Optimization in Text Categorization” IOP conference series, earth and environment sciences.
Citation
Adem Ali Kabo, "Enhancing the Learning progress by using K-Mapping Mechanism in Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.53-56, 2020.