Professional Documents
Culture Documents
V5i1 PDF
V5i1 PDF
ISSN : 2456-3307
Published By
i
Advisory/Editorial Board
Associate Editor
ii
• Prof. Sundeep Singh
Mississauga, Ontario, Canada
• Dr. Froilan Mobo. MOBO, DPA, MBA, MSCS, LPT
Computer and Social Sciences, Carl Balita Review Center : Olongapo City, Zambales,
Philippin
• Dr. Vaibhav Sundriyal
Department of Computer Engineering, Old Dominion University research
Foundation, USA (Phd in Computer Engineering from Iowa State University, USA)
• Dr. Katarzyna Pietrucha-Urbanik
Faculty of Civil and Environmental Engineering, Rzeszow University of Technology,
Poland
• Indrasen Poola
Data Scientist & Artificial Intelligence - Industry Consultant & Professional
Researcher, Palo Alto Networks, Santa Clara, CA, USA
• Dr. Mohd Muntjir
Information Technology Department, College of Computers and Information
Technology, Taif University, Al-Hawiya, Taif, Kingdom of Saudi Arabia
• Vaibhav Sundriyal
Research Scientist, Old Dominion University research Foundation, USA
• Dr. Elsadig Gamaleldeen
Assistant Professor, Omdurman Ahlia University, Sudan
• SK. Saidhbi
Assistant Professor, Department of Information Systems, University of Gondar,
Ethiopia
iii
• Dr. R. Gayathri
Assistant Professor, Department of ECE, Annamalai University, Chidambaram, Tamil
Nadu, India.
• Dr. R. Reka
Professor & Head, Department of Computer Science & Engineering, Annai
Mathammal Sheela Engineering College, Tamil Nadu, India
• Dr. Nilamadhab Mishra
Post Graduate Teaching & Research Department, School of Computing, Debre Berhan
University, Ethiopia, India
• Dr. S. Ramkumar
Department of Computer Applications, Kalasalingam University, Krishnankoil,
Sirivilliputhur, Palani, Dindugal, Tamil Nadu, India
• G. Naveen Balaji
Department of ECE, SNS College of Technology, SNS Kalvi Nagar, Vazhiyampalyam
Pirivu, Coimbatore
• Dr. G. Rajkumar
Department of Computer Applications, N. M. S. S.Vellaichamy Nadar College,
Madurai, Tamilnadu, India
• Prof. Sagar Bhilaji Shinde
E & TC Engineering Department, JSPM, Narhe Technical Campus, Pune,
Maharashtra, India
• Prof Sarita Dhawale
HOD, Computer Science Department, Ashoka Education Foundation’s, Ashoka
Center for Business and Computer Studies, ACBCS, Nashik, India
• Prof. Umesh Sehgal
Associate Professor, GNA University, Phagwara, Punjab, India
• Prof. Vaishali Kalaria
Information Technology, RKU, Rajkot, Gujarat, India
• Prof. H. B. Jethva
Computer Enginering, L. D. College of Engineering, Ahmedabad, Gujarat, India
• Prof. Bakul Panchal
Information Technology, L. D. College of Engineering, Ahmedabad, Gujarat, India
• Prof. Bhavesh Prajapati
Computer Science, Government MCA College Maninagar, Ahmedabad, Gujarat, India
• Dr. Syed Umar
Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India
• Prof. S. Jagadeesan
Computer Science, Nandha Engineering College Erode, Tamil Nadu, India
• Prof. Joshi Rahul Prakashchandra
Information Technology, Parul Institute of Engineering & Technology, Vadodara,
Gujarat, India
iv
• Dr. Aftab Alam Tyagi
Department of Mathematics, SRM University NCR Campus, Uttar Pradesh, India
• Prof (Dr.) Umesh Kumar
Department of Science & Technology, Govt. Women’s Polytechnic, Ranchi,
Jharkhand, India
• Dr. N. Pughazendi
Computer Science and Engineering, Panimalar Engineering College Chennai,
Tamilnadu, India
• Sachin Narendra Pardeshi
Department of Computer Engineering, R.C.Patel Institute of Technology, Shirpur,
Maharashtra, India
• Dr. Bangole Narendra Kumar
Department of Computer Science and Systems Engineering, Sree Vidyanikethan
Engineering College, Tirupati, Andhra Pradesh, India
• Dr. Dhananjaya Reddy
M.Sc.(Maths),M.Sc.(Stat), M.Phil.(Maths), M.phil. (Statistics), B.Ed., PhD Department
of Mathematics,Government Degree College, Puttur, Chittoor, Andhra Pradesh, India
• Dr. Ajitesh Singh Baghel
Department of Computer Science, Awadhesh Pratap Singh University, Rewa, Madhya
Pradesh, India
• Dr. Dharmaraj K Veer
Director, UGC-INFLIBNET SOUL Co-Ordinator, Maharashtra & Goa Region,
Knowledge Resource Center, Dr. Babasaheb Ambedkar Marathwada University,
Aurangabad, Maharashtra, India
• Rakesh Oruganti
Assistant Professor Jayamukhi Institite of Technology and Science, Chennaraopet
Mandal, Narsampet, Nekkonda Rd, Arshanapally, Telangana, India
• Dr. M. Ramesh Kumar
Associate Professor/Project Coordinator, Department of Computer Science and
Engineering, VSB College of Engineering Technical Campus, Coimbatore, Tamilnadu,
India
• Dr. Ikvinderpal Singh
Department of Computer Science & Applications, Trai Shatabdi GGS Khalsa
College,Amritsar, Punjab, India
• Dr. Kshitij Shinghal
Associate Professor & Dean Academics, Department of Electronics & Communication,
MIT, Moradabad, Uttar Pradesh, India
• Udit Narayan Bera
Department of Electronics and Communication Engineering, St. Aloysius Institute of
Technology, Jabalpur, Madhya Pradesh, India
v
• Dr. Nageswara Rao Moparthi
Department of Computer Science and Engineering, Velagapudi Ramakrishna
Siddhartha Engineering College, Andhra Pradesh, India
• Dr. Sharad Gangele
Professor and Head, Department of Computer Science & Application, RKDF
University, Bhopal, Madhya Pradesh, India
• Dr. K. Praveen Kumar
Associate Professor and Vice-Principal in Chaitanya Institute of Technology and
Science, Kishanpura, Hanamkonda, Telangana, India
• Dr. B. Bazeer Ahamed
Associate Professor, Department of Computer Science & Engineering, Balaji Institute
of Technology and Science, Warangal, Telagana, India
• Dr. Anil Kumar Dubey
Associate Professor & Deputy HOD (Academics), Computer Science, Poornima
Institute of Engineering & Technology, Jaipur, Rajasthan, India
• Dr. Yogesh M. Rajput
College of Computer Science and Information Technology (COCSIT), Ambajogai
Road, Latur, Maharashtra, India
• Dr. K. Umapathy
Associate Professor, ECE, SCSVMV University, Kanchipuram, Tamil Nadu, India
• K. Gutnadha Gupta
Assistant Professor of Computer Science and Enineering, Sri Indu College of
Engineering and Technology, Hyderabad, Telangana, India
• Namrata Singh
Computer Science and Engineering, Abes Engineering College, Ghaziabad, Uttar
Pradesh, India
• Dr. K. Nehru
Professor, Electronics and Communication Engineering Department, Institute of
Aeronautical Engineering, Hyderabad, Telangana, India
• Dr. Radha Mothukuri
Assistant Professor, Department of Computer Science and Engineering, KL
University, Vaddeswaram, Guntur, Andhra Pradesh, India
• Dr. K. R. Ananth
Department of MCA, Velalar College of Engineering and Technology, Erode,
Tamilnadu, India
• Rydhm Beri
Assistant Professor, PG Department of Computer Science, BBK DAV College for
Women, Amritsar, Punjab, India
• S. Kannadhasan
Department of Electronics and Communication Engineering, Tamilnadu Polytechnic
College, Austinpatti, Madurai, Tamil Nadu, India
vi
• Vishal Kanjariya
Assistant Professor, Information Technology Department, Birla Vishvakarma
Mahavidyalaya (BVM), Engineering College, Vallabh Vidyanagar, Managed by
Charutar Vidyamandal, Anand, Gujarat, India
• Dhairya J. Vyas
Assistant Professor, EC Department, Sigma Institute of Engineering, Vadodara,
Gujarat, India
• Arpana Mahajan
Assistant Professor, Computer Department, Sigma Institute of Engineering, Vadodara,
Gujarat, India
• Dr. M. Anjan Kumar
Associate Professor, CSE Department, Vivekananda Institute of Technology &
Science, Karimnagar, Telangana, India
• Dr. A. Vamshi Krishna Reddy
Assistant Professor, Centre for Environment, Institute of Science & Technology,
Jawaharlal Nehru Technological University, Hyderabad, Telangana, India
• Dr. Ashok Koujalagi
Assistant Professor & Postdoctoral Researcher, P. G. Department of Computer
Science, Basaveshwar Science College, Bagalkot, Karnataka, India
• Dr. C. S. KanimozhiSelvi
Professor, Computer Science and Engineering, Kongu Engineering College,
Perundhurai, Erode, Tamil Nadu, India
• Dr. Mukhdeep Singh Manshahia
Assistant Professor (Computing), Department of Mathematics, Punjabi University,
Patiala, Punjab, India
• Dr. Nageswara Rao Moparthi
Department of Computer Science and Engineering, Velagapudi Ramakrishna
Siddhartha Engineering College, Andhra Pradesh, India
• Dr. Parshuram Singh
Associate Professor, Dean, HOD (Physics), Mahaveer Institute of Technology &
Science, MITS-Jadan (A Unit of Vidhya Jyothi Trust, Chennai & Pali), NH-14, Raniya
Bera, Jadan, Pali, Rajasthan, India
• Dr. S. Sasikala
Associate Professor, Department of Computer Applications, Hindusthan College of
Arts and Science, Coimbatore, Tamil Nadu, India
• Dr. G. Maria Priscilla
Professor & Head, Department of Computer Science, Sri Ramakrishna Colleges of Arts
and Science (formerly SNR Sons College), Coimbatore, Tamil Nadu, India
• Dr. M. Jayakameswaraiah
Assistant Professor, Department of CSA, Reva University, Bangalore, Karnataka, India
vii
• Kishor Kumar Gajula
Research & Development Head, Newzen Infotech, Hyderabad, Telangana, India
• Mallavolu Malleswararao
Associate Professor & HOD, Department of Electrical & Electronics Engineering,
RISE Prakasam Group of institutions, Ongole, Andhra Pradesh, India
• Radha Mothukuri
Assistant Professor, Department of Computer Science and Engineering, QIS Institute
of Technology, Ongole, Andhra Pradesh, India
• Prof. S. Raja
Assistant Professor and Research and Development Coordinator, Department of ECE,
Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamilnadu, India
• Dr. J. Viji Gripsy
Assistant Professor, Department of Computer Science, PSGR Krishnammal College for
Women, Peelamedu, Coimbatore, Tamil Nadu, India
• Dr. Dickson S
Assistant Professor of Mathematics, Vivekanandha Educational Institutions
Tiruchengode, Tamil Nadu, India
• Dr. Ranjana Rajnish
Assistant Professor, Amity Institute of Information Technology(AIIT), Amity
University, Lucknow, Uttar Pradesh, India
• Dr. Nirajkumar C. Mehta
Associate Professor, Institute of Technology and Management Universe, Vadodara.
Gujarat, India
• Pulla Reddy Mekala
Southern Region Farm Machinery Training & Testing Institute, Tractor Nagar,
Garladinne, Anantapur (Dist.), Andhra Pradesh, India
• Dr. Rahul Saha
Division of Research and Development, Lovely Professional University, Punjab, India
• Deepak Jain
Department of Computer Science and Engineering, University of Kota, Rajasthan,
India
• Dr. S. Srithar
Assistant Professor, Computer Science and Engineering, RVS College of Engineering
and Technology, Coimbatore, Tamil Nadu, India
Associate Editor
viii
• Dr. Sheshang D. Degadwala
Head of Computer Department, Sigma Institute of Engineering, Vadodara, Gujarat,
India
Email : sheshang.cs.engg@sigma.ac.in
• Dr. K. Senthil Kannan
Dean Research, Vice Principal & Research Scientist EDAYATHANGUDY GS PILLAY
Arts and Science College Nagapattinam Tamil Nadu, India
Email : senthilkannan@egspec.org
ix
• Dr. Katarzyna Pietrucha-Urbanik
Faculty of Civil and Environmental Engineering, Rzeszow University of Technology,
Poland
• Indrasen Poola
Data Scientist & Artificial Intelligence - Industry Consultant & Professional
Researcher, Palo Alto Networks, Santa Clara, CA, USA
• Dr. Mohd Muntjir
Information Technology Department, College of Computers and Information
Technology, Taif University, Al-Hawiya, Taif, Kingdom of Saudi Arabia
• Vaibhav Sundriyal
Research Scientist, Old Dominion University research Foundation, USA
• Dr. Elsadig Gamaleldeen
Assistant Professor, Omdurman Ahlia University, Sudan
• SK. Saidhbi
Assistant Professor, Department of Information Systems, University of Gondar,
Ethiopia
x
• Dr. S. Ramkumar
Department of Computer Applications, Kalasalingam University, Krishnankoil,
Sirivilliputhur, Palani, Dindugal, Tamil Nadu, India
• G. Naveen Balaji
Department of ECE, SNS College of Technology, SNS Kalvi Nagar, Vazhiyampalyam
Pirivu, Coimbatore
• Dr. G. Rajkumar
Department of Computer Applications, N. M. S. S.Vellaichamy Nadar College,
Madurai, Tamilnadu, India
• Prof. Sagar Bhilaji Shinde
E & TC Engineering Department, JSPM, Narhe Technical Campus, Pune,
Maharashtra, India
• Prof Sarita Dhawale
HOD, Computer Science Department, Ashoka Education Foundation’s, Ashoka
Center for Business and Computer Studies, ACBCS, Nashik, India
• Prof. Umesh Sehgal
Associate Professor, GNA University, Phagwara, Punjab, India
• Prof. Vaishali Kalaria
Information Technology, RKU, Rajkot, Gujarat, India
• Prof. H. B. Jethva
Computer Enginering, L. D. College of Engineering, Ahmedabad, Gujarat, India
• Prof. Bakul Panchal
Information Technology, L. D. College of Engineering, Ahmedabad, Gujarat, India
• Prof. Bhavesh Prajapati
Computer Science, Government MCA College Maninagar, Ahmedabad, Gujarat, India
• Dr. Syed Umar
Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India
• Prof. S. Jagadeesan
Computer Science, Nandha Engineering College Erode, Tamil Nadu, India
• Prof. Joshi Rahul Prakashchandra
Information Technology, Parul Institute of Engineering & Technology, Vadodara,
Gujarat, India
• Dr. Aftab Alam Tyagi
Department of Mathematics, SRM University NCR Campus, Uttar Pradesh, India
• Prof (Dr.) Umesh Kumar
Department of Science & Technology, Govt. Women’s Polytechnic, Ranchi,
Jharkhand, India
• Dr. N. Pughazendi
Computer Science and Engineering, Panimalar Engineering College Chennai,
Tamilnadu, India
xi
• Sachin Narendra Pardeshi
Department of Computer Engineering, R.C.Patel Institute of Technology, Shirpur,
Maharashtra, India
• Dr. Bangole Narendra Kumar
Department of Computer Science and Systems Engineering, Sree Vidyanikethan
Engineering College, Tirupati, Andhra Pradesh, India
• Dr. Dhananjaya Reddy
M.Sc.(Maths),M.Sc.(Stat), M.Phil.(Maths), M.phil. (Statistics), B.Ed., PhD Department
of Mathematics,Government Degree College, Puttur, Chittoor, Andhra Pradesh, India
• Dr. Ajitesh Singh Baghel
Department of Computer Science, Awadhesh Pratap Singh University, Rewa, Madhya
Pradesh, India
• Dr. Dharmaraj K Veer
Director, UGC-INFLIBNET SOUL Co-Ordinator, Maharashtra & Goa Region,
Knowledge Resource Center, Dr. Babasaheb Ambedkar Marathwada University,
Aurangabad, Maharashtra, India
• Rakesh Oruganti
Assistant Professor Jayamukhi Institite of Technology and Science, Chennaraopet
Mandal, Narsampet, Nekkonda Rd, Arshanapally, Telangana, India
• Dr. M. Ramesh Kumar
Associate Professor/Project Coordinator, Department of Computer Science and
Engineering, VSB College of Engineering Technical Campus, Coimbatore, Tamilnadu,
India
• Dr. Ikvinderpal Singh
Department of Computer Science & Applications, Trai Shatabdi GGS Khalsa
College,Amritsar, Punjab, India
• Dr. Kshitij Shinghal
Associate Professor & Dean Academics, Department of Electronics & Communication,
MIT, Moradabad, Uttar Pradesh, India
• Udit Narayan Bera
Department of Electronics and Communication Engineering, St. Aloysius Institute of
Technology, Jabalpur, Madhya Pradesh, India
• Dr. Nageswara Rao Moparthi
Department of Computer Science and Engineering, Velagapudi Ramakrishna
Siddhartha Engineering College, Andhra Pradesh, India
• Dr. Sharad Gangele
Professor and Head, Department of Computer Science & Application, RKDF
University, Bhopal, Madhya Pradesh, India
• Dr. K. Praveen Kumar
Associate Professor and Vice-Principal in Chaitanya Institute of Technology and
Science, Kishanpura, Hanamkonda, Telangana, India
xii
• Dr. B. Bazeer Ahamed
Associate Professor, Department of Computer Science & Engineering, Balaji Institute
of Technology and Science, Warangal, Telagana, India
• Dr. Anil Kumar Dubey
Associate Professor & Deputy HOD (Academics), Computer Science, Poornima
Institute of Engineering & Technology, Jaipur, Rajasthan, India
• Dr. Yogesh M. Rajput
College of Computer Science and Information Technology (COCSIT), Ambajogai
Road, Latur, Maharashtra, India
• Dr. K. Umapathy
Associate Professor, ECE, SCSVMV University, Kanchipuram, Tamil Nadu, India
• K. Gutnadha Gupta
Assistant Professor of Computer Science and Enineering, Sri Indu College of
Engineering and Technology, Hyderabad, Telangana, India
• Namrata Singh
Computer Science and Engineering, Abes Engineering College, Ghaziabad, Uttar
Pradesh, India
• Dr. K. Nehru
Professor, Electronics and Communication Engineering Department, Institute of
Aeronautical Engineering, Hyderabad, Telangana, India
• Dr. Radha Mothukuri
Assistant Professor, Department of Computer Science and Engineering, KL
University, Vaddeswaram, Guntur, Andhra Pradesh, India
• Dr. K. R. Ananth
Department of MCA, Velalar College of Engineering and Technology, Erode,
Tamilnadu, India
• Rydhm Beri
Assistant Professor, PG Department of Computer Science, BBK DAV College for
Women, Amritsar, Punjab, India
• S. Kannadhasan
Department of Electronics and Communication Engineering, Tamilnadu Polytechnic
College, Austinpatti, Madurai, Tamil Nadu, India
• Vishal Kanjariya
Assistant Professor, Information Technology Department, Birla Vishvakarma
Mahavidyalaya (BVM), Engineering College, Vallabh Vidyanagar, Managed by
Charutar Vidyamandal, Anand, Gujarat, India
• Dhairya J. Vyas
Assistant Professor, EC Department, Sigma Institute of Engineering, Vadodara,
Gujarat, India
xiii
• Arpana Mahajan
Assistant Professor, Computer Department, Sigma Institute of Engineering, Vadodara,
Gujarat, India
• Dr. M. Anjan Kumar
Associate Professor, CSE Department, Vivekananda Institute of Technology &
Science, Karimnagar, Telangana, India
• Dr. A. Vamshi Krishna Reddy
Assistant Professor, Centre for Environment, Institute of Science & Technology,
Jawaharlal Nehru Technological University, Hyderabad, Telangana, India
• Dr. Ashok Koujalagi
Assistant Professor & Postdoctoral Researcher, P. G. Department of Computer
Science, Basaveshwar Science College, Bagalkot, Karnataka, India
• Dr. C. S. KanimozhiSelvi
Professor, Computer Science and Engineering, Kongu Engineering College,
Perundhurai, Erode, Tamil Nadu, India
• Dr. Mukhdeep Singh Manshahia
Assistant Professor (Computing), Department of Mathematics, Punjabi University,
Patiala, Punjab, India
• Dr. Nageswara Rao Moparthi
Department of Computer Science and Engineering, Velagapudi Ramakrishna
Siddhartha Engineering College, Andhra Pradesh, India
• Dr. Parshuram Singh
Associate Professor, Dean, HOD (Physics), Mahaveer Institute of Technology &
Science, MITS-Jadan (A Unit of Vidhya Jyothi Trust, Chennai & Pali), NH-14, Raniya
Bera, Jadan, Pali, Rajasthan, India
• Dr. S. Sasikala
Associate Professor, Department of Computer Applications, Hindusthan College of
Arts and Science, Coimbatore, Tamil Nadu, India
• Dr. G. Maria Priscilla
Professor & Head, Department of Computer Science, Sri Ramakrishna Colleges of Arts
and Science (formerly SNR Sons College), Coimbatore, Tamil Nadu, India
• Dr. M. Jayakameswaraiah
Assistant Professor, Department of CSA, Reva University, Bangalore, Karnataka, India
• Kishor Kumar Gajula
Research & Development Head, Newzen Infotech, Hyderabad, Telangana, India
• Mallavolu Malleswararao
Associate Professor & HOD, Department of Electrical & Electronics Engineering,
RISE Prakasam Group of institutions, Ongole, Andhra Pradesh, India
• Radha Mothukuri
Assistant Professor, Department of Computer Science and Engineering, QIS Institute
of Technology, Ongole, Andhra Pradesh, India
xiv
• Prof. S. Raja
Assistant Professor and Research and Development Coordinator, Department of ECE,
Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamilnadu, India
• Dr. J. Viji Gripsy
Assistant Professor, Department of Computer Science, PSGR Krishnammal College for
Women, Peelamedu, Coimbatore, Tamil Nadu, India
• Dr. Dickson S
Assistant Professor of Mathematics, Vivekanandha Educational Institutions
Tiruchengode, Tamil Nadu, India
• Dr. Ranjana Rajnish
Assistant Professor, Amity Institute of Information Technology(AIIT), Amity
University, Lucknow, Uttar Pradesh, India
• Dr. Nirajkumar C. Mehta
Associate Professor, Institute of Technology and Management Universe, Vadodara.
Gujarat, India
• Pulla Reddy Mekala
Southern Region Farm Machinery Training & Testing Institute, Tractor Nagar,
Garladinne, Anantapur (Dist.), Andhra Pradesh, India
• Dr. Rahul Saha
Division of Research and Development, Lovely Professional University, Punjab, India
• Deepak Jain
Department of Computer Science and Engineering, University of Kota, Rajasthan,
India
• Dr. S. Srithar
Assistant Professor, Computer Science and Engineering, RVS College of Engineering
and Technology, Coimbatore, Tamil Nadu, India
xv
CONTENT
Sr. No Article/Paper Page No
Automatic Tool for Prediction of Type of Cancer Risk and Recommendations
1 01-08
Pallavi Mirajkar, Dr. G. Prasanna Lakshmi
Movie Recommended System by Using Collaborative Filtering
2 09-15
Bheema Shireesha, Navuluri Madhavilatha, Chunduru Anilkumar
Comparison and an Improved Validation Optimistic Approach for Concurrency
3 Control 16-21
Monika Patel, Dr. Dhiren B Patel
Airline Data Analysis
4 22-29
Navuluri Madhavilatha, Bheema Shireesha, Chunduru Anilkumar
Li-Fi the Next Generation of Wireless Communication through Visible Light
Communication (VLC) Technology
5 30-37
Imran Siddique, Muhammad Zubair Awan, Muhammad Yousaf Khan, Azhar
Mazhar
Demand Supply Oriented Taxi Suggestion System for Vehicular Social
6 Networks with Fuel Charging Mechanism 38-44
Selvi C, Keerthana D
Aspect Ranking Technique for Efficient Opinion Mining using Sentiment
7 Analysis : Review 45-49
Prof. Sonali D. Borase, Prof. Prasad P. Mahale
Big Data Anonymization in Cloud using k-Anonymity Algorithm using Map
8 Reduce Framework 50-56
Anushree Raj, Rio G L D'Souza
Improvement of Privacy and Security in Hybrid Cloud with Attribute Group
9 Based Access Control 57-62
Kayalvili S, Sowmitha V
Survey on Factors Determining the Share Price Movement in Indian Stock
10 Market - A Big Data Approach 63-69
Nitha K. P., Dr. S. Sivakumari
Enhancing Privacy Preserving Query Retrieval Using Locality Sensitive
11 Hashing 70-73
Archana M.S, K.Deepa
Enhanced Security for Dynamic Multi Keyword Ranked Search Using Greedy
12 Best First Search 74-78
Bibin Baby, Sharmila Banu
13 Cyber Security, Challenges, Some Practical Solutions 79-87
xvi
Y. V. Sai Bharadwaj, Sai Bhageerath Y.V, Prof. Y.V.S.S.S.V. Prasada Rao
Prediction of Fish Yields in Lakes and Reservoirs from simple Empirical Models
14 using Artificial Neural Network (ANN) : An Review 88-100
D. Karunakaran, M. Balakrishnan
Evolving Cryptographic Approach for Enhancing Security of Resource
15 Constrained Mobile Device Outsourced Data in Cloud Computing 101-106
K. Kaviya, K. K. Shanthini, Dr. M. Sujithra
Semantic Web Search Engines : A Comparative Survey
16 107-115
Anita Kumari, Dr. Jawahar Thakur
Image Dehazing Technique Based On DWT Decomposition and Intensity
17 Retinex Algorithm 116-122
Sunita Shukla, Prof. Silky Pareyani
Data Extraction in Malignant Environments
18 123-130
Amith Manda, Dr. R. P. Ramkumar
Diagnosis of Various Thyroid Ailments using Data Mining Classification
19 Techniques 131-136
Umar Sidiq, Dr. Syed Mutahar Aaqib, Dr. Rafi Ahmad Khan
Analysis of An Indoor Air Quality Antenna for Asthma Management in
20 Children 137-142
N. Vijayalakshmi, J. G. Rohini
Home Automation using Google Voice Assistance with Raspberry Pi
21 143-146
Undra Narasimha Babu, S. N. Sreekanth
Sentiment Analysis of movie reviews using Microsoft Text Analytics and
Google Cloud Natural Language API
22 147-150
S Jaswanth Sai Chowdary, Sk Waseem Farooq, Sk Abubakar Siddique, S
Dinesh
Blockchain and its Role in the Internet of Things (IoT)
23 151-157
Tanweer Alam
A Review on Various Payment and Billing Techniques
24 Alka D. Aswar, Diksha M. Chhipane, Dipali C. Sontakke, Pallavi P. Onkar, 158-162
Snehal S. Helonde, Prof. S. V. Sonekar
Finite/Infinite Queueing Models Performance Analysis in Optical Switching
25 Network Nodes 163-170
Waleed M. Gaballah
Improving Central and Remote Access Units in Cloud Based Wi-Fi Network for
26 Better Client and Service 171-179
R. Kavitha, G.Sathiyabama
27 Effective Prediction for Rock Burst Dataset Using Classification Algorithms 180-184
xvii
with Particle Swarm
Sadesh S, Banupriya GK
Enhancement in the Lifetime of Wireless Sensor Network
28 185-190
Bhumika Yadav, Ram Neresh Sharma
A Review Paper on IoT Based Smart Irrigation System
29 Anjali Dokhande, Chetna Bomble, Rakshanda Patil, Puja Khandekar, Nayan 191-196
Dhone, Prof. Chandrashekhar Gode
Marg-Sudhar : Pothole Reporting System Using Android Smart Phone
30 Riya Agrawal, Payal Patel, Yash Telang, Ankita Bhandarkar, Irfan Mushtaq, 197-202
Dr. S. V. Sonekar
Smart Meals
31 Shivali Singh, Aishwarya Narnaware, Kirtikumar Jain, Kash Patel, Prof. S 203-206
Dhawale
A Review on Different Face Recognition Techniques
32 Aishwarya Admane, Afrin Sheikh, Sneha Paunikar, Shruti Jawade, Shubhangi 207-213
Wadbude, Prof. M. J. Sawarkar
A Survey on Various Bio-Metric Techniques and its Application for Child Care
33 Shanon Paul, Payal Ramteke, Sugam Sangai, Minakshee Shende, Aafreen 214-220
Qureshi, Prof. Umesh Samarth
Liver Cancer Detection
34 221-228
L. S. Rohith Anand, B. Shannmuka, R. Uday Chowdary, K. Satya Sai Krishna
Emotion Detection using Facial expressions with Transfer Learning
35 Sairama Geetanand, Shaik Nazeer Basha, Sajja Nageswara Rao, Rayudu 229-234
Srinivas
A Review on Various Algorithms for Student Performance Prediction
37 Mayuri S. Dongre, Neha S.Vidya, Vanita D. Telrandhe, Shweta R. Chaudhari, 235-239
Anup A. Umrikar, Prof. Prachiti V. Adghulkar
E-Toll System Using RFID
38 Ankita Bambole, Shrishti Thakur, Suvidha Ramteke, Sneha Borkar, Hitesh 240-243
Kasturi, Prof. M. M. Baig
A Review on Indoor Navigation Systems and Technologies for Guiding the
Users
39 244-250
Meenakshi D. Dhobale, Pooja S. Verma, Pushpa R. Joshi, Jyotsna K. Tekade,
Swati Raut
A Review Study on Online Job Portal
40 Aafreen Khan, Anirudha Wankhade, Priyanka Pakhide, Sagar Meshram, Prof. 251-255
Sonali Zunke
41 Voice Based Navigation System for the Blind People 256-259
xviii
N. Vijayalakshmi, K. Kiruthika
Data Encryption Key Sharing Using Image Pixel Color Value
42 260-265
Vijay Gokul Koli, Raj Kumar Paul
A Review on Prediction of Diabetic Retinopathy Using Data Mining
43 Algorithms 266-272
Kajal Sanjay Kothare, Prof. Kalpana Malpe
A Review on Predicting User Behaviour through Session Using Web Mining
44 Veena Moharle, Sonali Waghade, Divyani Dhoke, Sheetal Kolhe, Snehal 273-277
Narule, Prof. Merajul Haque
Elimination of Impulse Noise using Mean Median filter for Image Enhancement
45 278-288
Trupti Arun Jangale, Raj Kumar Paul
E - Tax Information System
46 289-291
M. Florence Dayana, B. Vinithamani
Children Tracking Classification Control Using Android
47 292-295
M. Juno Isabel Susinthra, S. Praveena
Voice Based Information Sharing System for Visually Impaired People
48 296-298
R. Gomathijayam, A. Jenifer
A Review on Big Data Analytics Via Social Media
49 299-302
T. K. Anusuya, A. Preethi
Automatic Railway Gate Control System Using RFID with High Speed Alerting
50 System 303-306
M. Florence Dayana, R. Bhuvaneshwari
Design of Robot for Scrambling on Tree and Clutching Fruit Using Foundary
51 Design 307-311
V. Manochithra, S. Karthika
Spinal Muscular Atrophy Type B Awareness And Symptoms Prediction Using
52 3d Segmentation Process In Mri Images 312-318
V. Manochithra, G. Sumithra
A Survey of Telemedicine Services using Datamining
53 319-321
T. K. Anusuya, P. Maharajothi
Medical Product Verify and Complaint Management System for Ngo's
54 322-326
R. Gomathijayam, J. Ayeesha Parveen
A Survey on Child Safety Wearable Device to Prevent Child Trafficking Using
55 Arduino 327-333
Elakiya M., S. Radhika
Bus Notification System Using Crowdsourcing
56 334-339
B. Harshini Reddy, K. Jhansi Rani, M.Vaishnavi
57 An Extension to Traditional Qwerty Cryptographic Method 340-342
xix
V. Vennila, S. Umamaheswari
A Review on Hadoop Eco System for Big Data
58 343-348
Anushree Raj, Rio D'Souza
A Novel Approach on Prevention of a Mobile Exploration in Machine Using AI
59 349-356
J. Antony Daniel Rex, S. Dinakaran, S. Muthukumaran
Tuition Plus+ For Managing Tuition Class Data
60 Bharat Dhak, Prachi P. Paunikar, Simran S. Khan, Snehal S. Ramteke, 357-362
Yashkumar R. Jais, Priya R. Gupta
Heikin-Ashi Transformation and Vix Index data for Stock Market Index
61 Prediction and It's Effects 363-365
Nishchal Sharma, Dr. Chaman Singh Chauhan
Factors Affecting the Successful Implementation of Cloud and IoT - A Study on
62 IT and Business Leaders 366-396
Jipson George Thoomkuzhy, Dr. Mohammed Nazeh
Development of Remote Operated Agri Vehicle
63 397-403
Juno Isabel Susinthra M, K. Gayadri
Adblock Usage in Web Advertisement
64 404-408
V. Santhi, S. Abirami
Smart-Home Automation Using IoT-Based Sensing and Monitoring Platform
65 409-413
R. Sugantha Lakshmi, P. Karthika, A. Rajalakshmi, M. Sathya
Anticipated Security Model for Session Transfer and Services Using OTP
66 414-418
J. Jose Merlin, A. Prathipa, G. Ramyadevi, P. Radhika
Managing university defined Study material by using Online Portal
67 419-421
Neha Bitodkar, Prof. Aniket Bhoyar, Suraj Chavhan, Priyanka Wahane
A Review on Car Collision Avoidance System based on Interpretation of
Vehicle Event Data Recorder
68 422-428
Prof. Tejal Irkhede, Rohit Kashayp, Nikhil Kumar, Vivek Ranjan, Manish
Kumar
A Review on Online Medical Drug Tracking
69 Swati Hedau, Ankita Shegaonkar, Amruta Aknurwar, Devyani Vaidya, Mehul 429-432
Sahu, Prof. Jogi John
A Survey on Secure User Data Transaction using Attribute - Based Encryption
Scheme over Cloud Data
70 433-437
Navin Sethiya, Hrishikesh Patel, Akshay Harshe, Alekh Gaigole,
Harshvardhan Donadkar, Prof. Priya Karemore
Accessing Network Using Secure Android Applications
71 438-442
R. Gomathyjayam, R. Thilakavathi
72 Web Site Ranking Feedback System 443-447
xx
Shaik Muzammil, Sai Kiran Yerramaneni
IoT Based Heart Attack Early Prediction
73 Shweta Gajbhiye, Bharati Vyas, Shrushti Shrikhande, Anshika Janbandhu, 448-451
Komal Nagpure, Mrunali Agashe
Shakti : An Android App for Mapping of Crime against Women
74 Diksha Ingle, Pritee Dhale, Priyanka Palsapure, Sagar Pazare, Dhawal 452-455
Chimurkar, Niket Farfad, Prof. Prasanna Lohe
Robust Video Data Hiding in Forbidden Zone
75 Ruchika S. Bhambore, Ashwini B. Gurudeo, Shital B. Borkar, Pallavi G. Thul, 456-461
Chanchala V. Udepurkar, Prof. Anup Bhange
The Internet-of-Things (IoT) Security : A Technological Perspective and
Review
76 462-482
Dr. Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani Mohamed Hassan,
Nikhat Akhtar
Secure Micro Payment Using Physical Unclonable Function
77 483-486
M. Jalasri, S. Nalini, N. Magesh Kumar, J. Elumalai
Reversible Data Hiding in Homomorphic Encrypted Domain by Monitoring
78 Ciphertext Group 487-490
V. Santhi, M. Abinaya
A Review : Venue Booking System
79 Shruti N. Ghule, Harish M. Mohurle, Akshay P. Shegaonkar, Zeba Parvin 491-494
Abdual Saleem, Pradhnya S. Borkar
A Review on IOT Based Garbage Monitoring System
80 Himanshu Gupta, Amit Chaturkar, Abhay Bagde, Hritik Raj, Ankur Hemane, 495-500
Prof. Prerana Deshmukh
A Survey on Rice Crop Yield Prediction in India Using Improved Classification
81 Technique 501-507
Kolin Sukhadia, M. B. Chaudhari
A Review on Various Road Safety Systems
82 Chandrashekhar Rathod, Sneha Wakde, Roshan Punwatkar, Rupesh Sharma, 508-513
Rupal Patil, Prof. Rohan Kokate
Review on Various Tools and Techniques for Plagiarism Detection
83 Kedar Bhujade, Tushar Bhandirge, Rohan Khobragade, Saurabh Shelare, 514-518
Jayprakash Shukla, Prof. R. S. Thakur
An Elementary Study on Various Techniques Involved in Face Recognition
84 Systems : A Review 519-525
Payal Maken
85 E Return Tool 526-530
xxi
Pooja Aher, Manish Kirnapure, Shubhangi Nemade, Tejaswita Shrivastava,
Lulkaran Chohale
IoT Based LPG Gas Leakage Detector
86 Prof. Pranay Meshram, Nancy Shukla, Stuti Mendhekar, Renuka Gadge, 531-534
Shivani Kanaskar
Machine learning algorithm for Cyber Security - A Review
87 535-545
Mohammad Asif, Pratap M. Mohite, Prof. P. D. Satya
Analysis and Importance of Deep Learning for Video Aesthetic Assessments
88 546-554
Manish Bendale, Madhura V. Phatak, Dr. Nitin N. Pise
xxii
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2019 IJSRCSEIT | Volume 5 | Issue 1 | ISSN : 2456-3307
DOI : https://doi.org/10.32628/CSEIT1838116
ABSTRACT
Cancer can begin in any part of the body and can spread to other parts also. It is uncontrollable and it has many
types. In the proposed thesis research paper, a tool for prediction of type of cancer risk with five different
cancer diagnosis and recommendations is presented. For recognizing cancer disease number of tests ought to be
required from the patient. But using data mining techniques these test can be diminished. Indeed, an accurate
prediction of cancer is very difficult task for medical practitioner and it is also high concern to the patients so
that better treatment can be given and it will also increase the survival time of the patients. Our findings
suggested that suitable prediction tool can effectively reduce the several tests for diagnosing cancer and
prediction accuracy thereby increasing the technical possibility of early detection of cancer. The main features
of the tool comprise a balance between the number of necessary inputs and prediction performance, being
portable, and it empowers the automatic development of the cancer risk prediction tool in cancer disease.
Keywords : Prediction Tool, Cancer, Data Mining, Automation, Integration.
CSEIT1838116 | Received : 28 Dec 2018 | Accepted : 03 Jan 2019 | January-February -2019 [ 5 (1) : 01-08 ]
01
Pallavi Mirajkar, Dr. G. Prasanna Lakshmi Int J S Res CSE & IT. January-February-2019 ; 5(1) : 01-08
that may be identified with patient’s details. Based on paper work is very helped to the cancer research
result, system automatically demonstrates the result center and hospitals to prevent the Non Small Cell
to specific doctors for specific test/ treatment. Lung Cancer.
II. LITERATURE REVIEW Arpit Bansal et, al.(2017) have proposed technique for
a modification in K-Means Clustering Algorithm. In
Fan Wang et.al (2018) worked on predictor to proposed modification, the K-Means clustering will
precisely predict six breast cancer cell types using vanish off the two most important drawbacks of K-
gene expression. They identified 308 predictors of Means clustering that are accuracy level and
breast cancer cell types using machine learning. calculation time consumed in clustering the dataset.
They found that mixture of protein coding genes and Although when they have also used small datasets
long non-coding RNAs are superior predictors these two factors accuracy level and calculation time
compared to when the two sets of transcripts are may not matter much but when they used large
treated independently. They have also shown that datasets that have trillions of records, then little
predictors constrained to a particular cell type dispersion in accuracy level will matter a lot and can
provide as better prognostic markers for the relevant lead to a disastrous situation, if not handled properly,
patient subtype. Author has stated that the breast it can be stated that proposed modification can be
cancer cell type predictors are also related with more extended to achieve the full accuracy level up
patient survivability and therefore have clinical to 100%, with very little time and with more quality
significance. clusters.
Subrata Kumar Mandal (2017) have applied different R.Senkamalavalli and Dr.T.Bhuvaneswari (2017) have
techniques such as data cleaning, feature selection, proposed novel algorithm was experimented on the
feature extraction, data discretization and Breast cancer database. It has been proved that
classification for predicting breast cancer as perfectly. proposed approach achieved a very high accuracy
They stated that Logistic Regression Classifier gives rate than the existing methods. They also
the maximum accuracy with reduced subset of demonstrated a certain level of accuracy in the
features and time complexity of proposed algorithm is classifier, and for finding accurate results there must
least compared to other two classifiers. be sufficient preprocessing of data done. They have
also demonstrated accuracy in diagnosing breast
R.Kaviarasi, Dr.A.Valarmathi (2017) has applied two cancer disease using the K-means classifier, adaboost
types of clustering. The hierarchical clustering is and Support Vector Machines.
produced dendrogram results are produced using
Euclidean distance and Ward.D linkage. The K- Sumalatha.G, Archana.S (2017) has analyzed cancer
Means clustering are produced WSS values against patient data using ZeroR method and J48 algorithm
number of cluster K values. The proposed method of data mining techniques. They stated that proposed
finally validate to the two type of clustering fit values. cancer risk prediction system may give easy and a
The validation measurement result is helped to the cost effective approach for screening cancer and may
distance are measured in two clustering values. The play a significant role in earlier diagnosis process for
results are helped to at the beginning of Non Small different types of cancer. Proposed system can also be
Cell Lung Cancer prevention through human way of used as a source of record with detailed patient
life handled risk factors characteristics. The proposed
Store Computed
Score 4.4 System Architecture
The proposed cancer risk prediction tool is developed
Display Results using various web technologies such as HTML, CSS
and Java Script. It is suitable for several platforms and
Fig. 1 Working of Cancer prediction system is distributable through an application store, just like
other applications. The proposed tool is developed
IV. METHODS AND MATERIAL using Angular JS which wraps the HTML/JavaScript
app into a native container which can access the
4.1 Methodology device functions of multiple platforms. When the
Collected data is prepared to fit into the developed medical practitioner submits the values for multiple
tool appropriately. Here converse about the entire queries, the data is sent over the HTML POST
procedure (collection of data to significant pattern) of method. The data is inserted into a Postgre SQL
prediction of different types of cancer risk level. innodb database and, for each new registration. The
proposed tool generates new XML file for each type
4.2 Data Collection of cancer. For the health care industry, cancer
Collection of data for the developed prediction tool prediction applications yielded new boundaries in
has been done from different diagnostic centers providing better care and treatments to patients.
which contain both male female data of different ages Furthermore, it is building a revolution in the way
and from the various non-patients those who want to data is managed and made available [21]. The
Sends
Queries
Updates
Queries
Uses
Gender Responses
Male 76
Female 93
Total 169
Table 1
VI. CONCLUSION
Pradesh, India
ABSTRACT
Recommendation system helps people in decision making an item/person. Recommender systems are now
pervasive and seek to make profit out of customers or successfully meet their needs. Companies like Amazon
use their huge amounts of data to give recommendations for users. Based on similarities among items, systems
can give predictions for a new item’s rating. Recommender systems use the user, item, and ratings information
to predict how other users will like a particular item. In this project, we attempt to under- stand the different
kinds of recommendation systems and compare their performance on the Movie Lens dataset. Due to large size
of data, recommendation system suffers from scalability problem. Hadoop is one of the solutions for this
problem.
Keywords : Hadoop, Collaborative filtering, Machine Learning, HDFS, RSSI
I. INTRODUCTION then the user will simply stop using it. This has led to
a high emphasis by tech companies on improving
Recommendations system is a type of information their recommendation systems. However, the
filtering system which attempts to predict the problem is more complex than it seems. For
preferences of a user, and make suggests based on recommendation, our proposed system uses
these preferences. There are a wide variety of collaborative filtering machine learning algorithm.
applications for recommendation systems. These have Collaborative filtering (CF) is a machine learning
become increasingly popular over the last few years algorithm which is widely used for recommendation
and are now utilized in most online platforms that we purpose. Collaborative filtering finds nearest neighbor
use. The content of such platforms varies from movies, based on the similarities. The metric of collaborative
music, books and videos, to friends and stories on filtering is the rating given by the user on a particular
social media platforms, to products on e-commerce item. Different users give different ratings to items.
websites, to people on professional and dating Users, who give almost same rating to items, are the
websites, to search results returned on Google [1]. nearest neighbors. In case of User based collaborative
Due to the advances in recommender systems, users filtering, based on the ratings given by the users,
constantly expect good recommendations. They have nearest neighbors has been find. Item based
a low threshold for services that are not able to make collaborative filtering predicts the similarity among
appropriate suggestions. If a music streaming app is items. To recommend an item, items which are liked
not able to predict and play music that the user likes, by the user in his past have been found. Item which is
CSEIT19511| Received : 01 Jan 2018 | Accepted : 03 Jan 2019 | January-February -2019 [ 5 (1) : 09-15 ]
09
Bheema Shireesha, Navuluri Madhavilatha, Chunduru Anilkumar Int J S Res CSE & IT. January-February-2019 ; 5(1) : 09-15
similar to those items has been recommended [2]. measurements and analysis were made. The
Internet contains a huge volume of data for remaining part of this report is as follows: Related
recommendation purpose. Due to size of data, if Works, Measurement Setup, Proposed Work,
recommendation computation has been done in single Measurements Analysis, Results, Discussions, Future
system, then performance may degrade, and we Work.
cannot find an efficient solution. Hence we require
distributed environment so that computation can be II. RELATED WORK
increased and performance of recommendation
system gets improve .My goal is to apply a 2.1 Collaborative Filtering
collaborative filtering algorithm in a rating website
that collects users’ information, such as location and In the collaborative filtering algorithm, the system
gender, item’s information, such as category and has a recorded set of items and users and how the
description, as well as ratings for items by users. There users rated those items. Then algorithm is used to
are many algorithms that could be applied on data to predict the rating for a user who has not rated the
predict a user preference. User-based, Item-based, and item yet. A rating for an item can be predicted from
Model-based methods are ways of predicting a user the ratings given to the item by users who are similar
preference. The number of users, items, or clusters in in taste to the given user. The traditional collaborative
each one respectively will determine the function filtering algorithms include User-based, Item-based,
performance [3]. However, the most well-known and and Model based methods. To explain how these
common one is User-based Collaborative Filtering. In methods works we are going to use the following
this algorithm, we predict an item’s rate for a user by notations [6]. “Let U be a set of N users and I a set of
collecting information about this user and similar M items. The traditional collaborative filtering
users. algorithms include User-based, Item-based, and
Model based methods. To explain how these methods
Machine Learning: works we are going to use the following notations.
Applying machine learning in real-time using “Let U be a set of N users and I a set of M items. Vui
Collaborative Filtering. Parsing data retrieved from a denotes the rating of user u U on item i I, and SI
database and predicting user preference. Evaluating stands for the set of items that user u has rated”.
different approaches of recommender systems. What I
was trying to do was to build a system that collects 2.2 User Based Collaborative Filtering
information and then uses the stored data in a In this method, we predict the user behavior against a
machine learning algorithm [4]. Predicting users’ certain item using the weighted sum of deviations
preferences using data may give more accurate results from mean ratings of users that previously rated this
than any algorithm that does not use previous data. item and the user mean rate. The weight that we
Most systems like Amazon, eBay, and others suggest previously mentioned can be calculated using Pearson
things to users based on similarities among users, Correlation according to the following formula:
items, or both. This will make those systems more
personalized and efficient from a user’s perspective.
Commercial and trading systems gain trust and profits
The prediction formula is stated as below:
using such systems if they successfully predict what
users want at what time and where. The datasets were
created and averaged [5]. The corresponding
3.2 Definition 2
2.3 Model-Based Collaborative Filtering
In this method, the system will use an unsupervised Collaborative Filtering: Collaborative Filtering
learning method to partition the space and then techniques make recommendations for a user based
classify the users using a similarity metric to a on ratings and preferences data of many users. The
segment or a cluster. To avoid having large clusters, main underlying idea is that if two users have both
systems use different methods to generate more small liked certain common items, then the items that one
practical clusters. This process starts with an initial set user has liked that the other user Search Engine
of clusters that contains only one user, and then Architecture.
repeatedly assigns users to these clusters based on a
similarity metric. Limiting features may become 3.3 Definition 3
necessary to reduce clustering complexity. The system
will create vectors for each segment and match the Content Based Recommendation: Content Based
user to the vector. Nonetheless, the user may be Recommendation algorithm takes into account the
classified as belonging to more than one cluster with a likes and dislikes of the user and generates a User
measure of similarity strength . Profile. For generating a user profile, we take into
account the item profiles (vector describing an item)
and their corresponding user rating. The user profile
is the weighted sum of the item profiles with weights
being the ratings user rated. Once the user profile is
generated, we calculate the similarity of the user
profile with all the items in the dataset, which is
III. PRELIMINARIES
calculated using cosine similarity between the user
profile and item profile. Advantages of Content Based
3.1 Defination1
approach is that data of other users is not required and
the recommender engine can recommend new items
Recommended system: A recommendation system is a
which are not rated currently, but the recommender
type of information filtering system which attempts to
algorithm doesn’t recommend the items outside the
predict the preferences of a user, and make suggests
category of items the user has rated.
based on these preferences. There are a wide variety
of applications for recommendation systems. These
IV. PROPOSED APPROACH
have become increasingly popular over the last few
years and are now utilized in most online platforms
4.1 Proposed System
that we use [7]. The content of such platforms varies
from movies, music, books and videos, to friends and
For recommendation, our proposed system uses
stories on social media platforms, to products on
collaborative filtering machine learning algorithm.
ecommerce websites, to people on professional and
Collaborative filtering (CF) is a machine learning
dating websites, to search results returned on Google.
algorithm which is widely used for recommendation
purpose. Collaborative filtering finds nearest neighbor
based on the similarities. The metric of collaborative implementations, consult the Breese etc. All paper
filtering is the rating given by the user on a particular and/or our code.
item. Different users give different ratings to items.
Users, who give almost same rating to items, are the Item-based collaborative filtering is a model-based
nearest neighbors. In case of User based collaborative algorithm for making recommendations. In the
filtering, based on the ratings given by the users, algorithm, the similarities between different items in
nearest neighbors has been find. Item based the dataset are calculated by using one of a number of
collaborative filtering predicts the similarity among similarity measures, and then these similarity values
items. To recommend an item, items which are liked are used to predict ratings for user-item pairs not
by the user in his past have been found. Item which is present in the dataset. The system will search group
similar to those items has been recommended. for users by using k-means to find the distance
Internet contains a huge volume of data for between users, the group of users and clustering of
recommendation purpose. Due to size of data, if users. The system clustering with the k- means
recommendation computation has been done in single algorithms by measuring the distance of each data
system, then performance may degrade, and we point from the center of the 10 groups by using
cannot find an efficient solution. Euclidean distance and calculated information will be
stored in the database.
Hence we require distributed environment so that
computation can be increased and performance of 4.2 User Based CF
recommendation system gets improve. My goal is to
apply a collaborative filtering algorithm in a rating The dataset is firstly loaded into Hadoop distributed
website that collects users’ information, such as file system (HDFS). Then we perform User-based CF
location and gender, item’s information, such as using Mahout [9]. We take rating matrix, in which
category and description, as well as ratings for items each row represents user and column represents item,
by users. There are many algorithms that could be corresponding row-column value represents rating
applied on data to predict a user preference. User- which is given by a user to an item. Absence of rating
based, Item-based, and Model-based methods are value indicates that user has not rated the item yet.
ways of predicting a user preference [8]. The number There are many similarity measurement methods to
of users, items, or clusters in each one respectively compute nearest neighbors. We have used Pearson
will determine the function performance. However, correlation coefficient to find similarity between two
the most well-known and common one is User-based users [10]. Hadoop is used to calculate the similarity.
Collaborative Filtering. In this algorithm, we predict The output of the Hadoop Map phase i.e. userid and
an item’s rate for a user by collecting information corresponding itemid are passed to reduce phase. In
about this user and similar users. reduce phase, output has been generated and sorted
according to userid. Output again has been stored in
Memory-based algorithms approach the collaborative HDFS.
filtering problem by using the entire database. As
described by Breese et. al , it tries to find users that 4.3 Item Based CF
are similar to the active user (i.e. the users we want to
make predictions for), and uses their preferences to 3.2 Item Based CF Dataset is loaded into HDFS, then
predict ratings for the active user. This page will talk using Mahout we performs Item based CF. Past
about the general ideas; for specific equations and information of the user, i.e. the ratings they gave to
the global average value adjusted for the user bias and Collaborative filtering is the most successful and
movie bias. popular algorithm in the recommender system’s field.
It helps customers to make a better decision by
The adjusted average rating is given by recommending interesting items. Even though this
ri j = lobalav + (uav(i)ij) + (mav(j)ij) algorithm is the best, it suffers from poor accuracy
and high running time. To solve these problems, this
The user bias is given by the difference between the paper proposed a recommendation approach based on
average user rating and the global average rating. The user clustering by using the Euclidian distance to
movie bias is given by the difference between the calculate two users to cluster dataset. This method
average movie rating and the global average rating. combines clustering and neighbors’ vote to generate
Consider the following example which demonstrates predictions. In the future there may be techniques,
the working of the adjusted average method. fuzzy c-means in the group stages of the first system
to provide a more effective segmentation.
5.2 Dateset:
For experiment, we have used MovieLens dataset of VII. REFERENCES
size 1M. The dataset contains 10000054 ratings and
95580 tags applied to 10681 movies by 71567 users. [1]. A Survey of Collaborative Filtering
There are three files, movies.dat, ratings.dat and Techniques;https://www.hindawi.com/journa
tags.dat. Ratings data file has at least three columns; ls/aai/2009/421425/.,2017, Vol. 13(7).
those are UserId, given by user to movie. [2]. Google News Personalization: Scalable
Online Collaborative Filtering; Das et al;
5.3 Result Analysis: https://www2007.org/papers/paper570.pdf
For movie recommendation, important factor is the [3]. Intro to Recommender Systems:
list of recommended items as soon as possible. Since Collaborative
we are using Hadoop, speedup and efficiency varies as Filtering;http://blog.ethanrosenthal.com/2015
number of nodes varies. To analyze this we have /11/02/intro-to-collaborative -filtering/"
obtained the number of movies which are [4]. Zhan J, Hsieh CL, Wang IC, Hsu TS, Liau CJ,
recommended as threshold changes, Speedup and Wang DW. Privacy-preserving collaborative
efficiency according to number of nodes. recommender systems. IEEE Transactions on
Systems, Man, and Cybernetics, Part C
VI. FUTURE WORK AND CONCLUSION (Applications and Reviews).
[5]. Gong S. A collaborative filtering
Most obvious ideas is to add features to suggest movies recommendation algorithm based on user
with common actors, directors or writers. In addition, clustering and item clustering. Journal of
movies released within the same time period could Software. 2010; 5(7):745-52.
also receive a boost in likelihood for recommendation. [6]. Manvi SS, Nalini N, Bhajantri LB.
Similarly, the movies total gross could be used to Recommender system in ubiquitous
identify a user’s taste in terms of whether he/she commerce. In international conference on
prefers large release blockbusters, or smaller indie electronics computer technology 2011 (pp.
films. However, the above ideas may lead to over 434-8). IEEE.
fitting, given that a user’s taste can be highly varied, [7]. Pu P, Chen L, Hu R. A user-centric
and we only have a guarantee that 20 movies evaluation framework for recommender
ABSTRACT
Concurrency Control entails the synchronization of accesses to the distributed database, such that the integrity
of the database is maintained. Devising an efficient concurrency control technique is challenging. There is a
need for improvised concurrency control technique to coordinate the simultaneous execution of transactions in
a multi-processing database system. Traditionally, concurrency control techniques are locking, timestamp
ordering and optimistic. These techniques have been evaluated by analytical modeling. In this undertaken work,
the analytical modeling has been investigated and evaluated. The concurrency control in order to improve
optimistic validation method with the traditional techniques, a new technique has been proposed.
Keywords : DBMS, DDBMS, Concurrency, Lock Maintenance, Restart Overhead, Abort Ratio, Deadlock
Possibility
CSEIT19517 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 16-21 ]
16
Monika Patel, Prof. Dr. Dhiren B. Patel et al. Int J S Res CSE & IT. January-February-2019 ; 5(1) : 16-21
II. RELETED WORK transaction releases its locks after phase 1 of the
protocol.
Traditionally, concurrency control techniques have
been divided into three categories – locking, A lock manger in different servers set their locks
timestamp ordering and optimistic. Concurrency independently of one another. It is possible that
control techniques have been evaluated by analytical different servers may impose different ordering on
modeling. Kung and Robinson have the first to transactions. Consider the following interleaving of
develop the Optimistic Concurrency Control. transactions T1 and T2 at servers X and Y [8].
unrestricted. A transaction reads the values of a set of value updated only when it does not affect the
objects and assigns them to a set of local variables. consistency of the database. If updating of transaction
2. Compute: The transaction calculates a set of values not making database inconsistent, then transaction is
for data objects called the write set. These values are updated to the database and it is recorded in the
assigned to a set of matching local variables. Thus, all successfully completed transaction table, and if
writes after calculation take place on a transaction’s updating of transaction makes database inconsistent
copy of the objects of the database. then updated values removed from the temporary
3. Validate: The transaction’s local read set and write memory and it is recorded in the roll backed
set are validated against a set of committed transaction table. Finally, all the transactions are
transactions. recorded in the transaction log table.
4. Commit and Write: If the transaction succeeds in
validation, it is considered committed in the system In this work, an Improved Optimistic Validation
and is assigned a timestamp, otherwise the Method has been proposed, to improve the optimistic
transaction is rolled back or restarted at either the method. In this method, all the transactions are
compute phase or the read phase. If a transaction executed without restriction and when they need to
succeeds in the validation phase, its write set is made update the database, they have to pass the validation
global and the values of the write set become values test but in the improved method read transaction
of entities in the database at each node. does not go for validation check, so it decreases the
possibilities of restart or abort the transaction.
III. PROPOSED WORK
The major problem with optimistic method was
Model for Concurrent Execution in Distributed when one transaction go for validation, due to some
Databases reason it gets aborted because the resources used by
this transaction is also used by any other transaction
The below Fig 1. Shows the basic model for so there is the possibility of conflict. Once the
concurrent execution in distributed databases. transaction is aborted it gets the same timestamp and
Distributed databases mean there are multiple users starts execution, but it can also happen that the same
who are accessing data from various sites and it may resources used by the other transaction and so that
happen that two or more than two users accessing the transaction again gets aborted.
same data at the same time, at this situation problem
comes. When transaction gets aborted several times and does
not get finished or does not get the chance to execute,
The model shows the basic multiuser environment which means the transaction is in the condition of
with concurrent transactions and it’s after results. starvation. Starvation is the situation where
Assume n numbers of transactions are simultaneously transaction doesn’t get the fair chance to execute.
accessing the same database and executed the
numbers of operations in the one transaction. That
means several updates, read, delete operations are
going to be performed on the single database at time.
As soon as transaction starts its execution database
program identify the table and column in which data
is going to be read from or written into. Transaction
IV. RESULTS
The above table shows the comparison between three
The Improved Optimistic Validation Method gives methods with some common criteria. Method 3 is
optimum performance when the system has improved method, developed during this research
minimum conflict ratio and the transactions are read work. If we look into the table, method 3 has been
in most cases. The proposed method does not disturb improved in two parameters – Validation for read
read transaction, increases the execution of transactions and starvation for execution.
transaction. The additional feature has been added of
the starvation. Due to the abort ratio, sometime one V. CONCLUSION
of the transactions is not able to perform and gets
aborted many times, in that case proposed method The Improved Optimistic Validation Method solves
helps the transaction to execute with different above discussed problems in the field of concurrency
conditions. control. The proposed method provides non-locking
algorithm for the transaction execution. It reduces
Comparison of ORDER, Optimistic and Improved the overhead of lock acquisition and lock releases.
Optimistic Validation Method The improved method uses no locks, meets no
deadlock leads to minimum abort ratio.
In this section of chapter, we will compare the
methods which are previously developed and new The assumption was made that, proposed method
one. The comparison criteria have been selected as suits to the environment having minimum conflict.
per the need of the database environment. We will And the most of the transaction has read operation to
compare three methods listed below in the Table 2. perform. The main aim to develop this method is to
improve the efficiency and transaction execution
Method 1: ORDER speed.
Method 2: Optimistic Method
Method 3: Improved Optimistic Validation Method The Improved Optimistic Validation Method
provides the direct access of the data without any
locking. In the method each transaction gets the
timestamp which is the real arrival time of the
transaction. There are three phases of the method:
Operational phase, Validation Phase, and Update [8]. G. Coulouris, J. Dollimore and T. Kindberg T.
phase. Distributed Systems Concepts and Design,
published by Pearson Education Limited 2005.
Limitations and Future Enhancements [9]. Morris R., Wong W., Performance analysis of
locking and optimistic concurrency control
The Improved Optimistic Validation Method is algorithms, May 1985.
efficient to work with the system having minimum [10]. M. Mohamed, M. Badawy, A. El-Sayed., Survey
conflicts, at the same time the proposed method may on Concurrency Control Techniques,
not sufficient in the case where possibility of conflict Communications on Applied Electronics (CAE)
is very high and number of write transactions is high. – ISSN : 2394-4714 Foundation of Computer
A method can be developed, which can control over Science FCS, New York, USA,2016
write transactions using locking concept. A new
method can be derived to enhance proposed method Cite this article as :
the way, read transactions should not be disturbed.
Monika Patel, Dr. Dhiren B Patel, "Comparison and
VI. REFERENCES an Improved Validation Optimistic Approach for
Concurrency Control", International Journal of
[1]. B. Bhargava, Concurrency Control in Database Scientific Research in Computer Science, Engineering
Systems, IEEE Transaction on Knowledge and and Information Technology (IJSRCSEIT), ISSN :
Data Engineering, JANUARY/FEBRUARY 2456-3307, Volume 5 Issue 1, pp. 16-21, January-
1999. February 2019.
[2]. A. Thomasian, Concurrency Control: Methods, Available at doi :
Performance, and Analysis, ACM Computing https://doi.org/10.32628/CSEIT19517
Surveys, March 1998. Journal URL : http://ijsrcseit.com/CSEIT19517
[3]. H. T. Kung, J. T. Robinson, On Optimistic
Methods for Concurrency Control, ACM
Transactions on Database Systems, Vol 6, No. 2,
June 1981.
[4]. P. L. Lehman, AND S. B. Yao, Efficient locking
for concurrent operations on B-trees. Submitted
for publication.
[5]. R. Shrinivasan, Network-Aided Concurrency
Control in Distributed Databases, January 2002.
[6]. S. Ceri, G. Pelagatti, Distributed Databases
Principals and Systems, McGraw-Hill
International Edition, 1985.
[7]. A. Thomasian, Distributed Optimistic
Concurrency Control Methods for High
Performance Transaction Processing, IEEE
Transaction on Knowledge and Data
Engineering, VOL. 10, NO. 1, January/February
1998.
In the contemporary world, Data analysis is a challenge in the era of varied inters disciplines through there is a
specialization in the respective disciplines. In other words, effective data analytics helps in analyzing the data of
any business system. Flight delays hurt airlines, airports, and passengers. Their prediction is crucial during the
decision-making process for all players of commercial aviation. The goal of our project is to get monthly wise
statistics of airline data and taking particular airport as target we are further analyzing the data to get the
hourly statistics. And also we are finding out the most popular source-destination pairs and calculating the
average delays at every airport. The data for this project comes from the stat-computing.org website. In
particular, in the year 2008 data 70,09,728 titles recorded there which includes information on the Origin,
Destination, Month, Year, DayofWeek, DayofMonth, DepDelay, ArvDelay, DepTime, ArvTime and a few other
less interesting variables. Conveniently, you can export the data directly as a csv file.
Keywords : Machine Learning, Data Mining, Big Data, Statistics, Data Visualization, Data Analytics, ASCII, SRS,
GNU
I. INTRODUCTION Data:
Data is a set of values of qualitative or quantitative
The goal of our project is to get monthly wise variables. It can representation of facts as text,
statistics of airline data and taking particular airport numbers, graphics, images, sound or video. Raw data,
as target we are further analyzing the data to get the also known as primary data, is collected from a source.
hourly statistics. And also we are finding out the If a scientist sets up a computerized thermometer
most popular source-destination pairs and calculating which records the temperature of a chemical mixture
the average delays at every airport [1]. The data for in a test tube every minute, the list of temperature
this project comes from the statcomputing.org readings for every minute, as printed out on a
website in particular, in the year 2008 data 70,09,728 spreadsheet or viewed on a computer screen is "raw
titles recorded there which includes information on data" [2]. Raw data can be input to a computer
the Origin, Destination, Month, Year, DayofWeek, program or used in manual procedures such as
DayofMonth, DepDelay, ArvDelay, DepTime, analyzing statistics from a survey. The term "raw
ArvTime and a few other less interesting variables. data" can refer to the binary data on electronic
Conveniently, you can export the data directly as a storage devices, such as hard disk drives (also referred
csv file. to as "low-level data"). All software is divided into
two general categories: data and programs. Programs
CSEIT19514 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 22-29 ]
22
Navuluri Madhavilatha et al. Int J S Res CSE & IT. January-February-2019 ; 5(1) : 22-29
are collections of instructions for manipulating data. between variables. Once you find these insights, you
Strictly speaking, data is the plural of datum, a single validate the findings by applying the detected
piece of information. In practice, however, people patterns to new subsets of data. The ultimate goal of
use data as both the singular and plural form of the data mining is prediction [5]. Data Science is an
word [3]. The term often used to distinguish binary umbrella that contain many other fields like Machine
machine-readable information from textual human- learning, Data Mining, big Data, statistics, Data
readable information. For example, some applications visualization, data analytics etc.
make a distinction
II. METHODS AND MATERIAL
R provides a wide variety of statistical (linear and R is designed around a true computer language, and it
nonlinear modelling, classical statistical tests, time- allows users to add additional functionality by
series analysis, classification, clustering etc) and defining new functions. For computationally-
graphical techniques, and is highly extensible [6]. intensive tasks, C, C++ and FORTRAN code can be
The S language is often the vehicle of choice for linked and called at run time. Advanced users can
research in statistical methodology, and R provides an write C code to manipulate R objects directly. Many
Open Source route to participation in that activity. users think of R as a statistics system. We prefer to
think of it of an environment within which
One of R’s strengths is the ease with which well- statistical techniques are implemented. R can be
designed publication-quality plots can be produced, extended (easily) via packages. There are about eight
including mathematical symbols and formulae packages supplied with the R distribution and many
where needed. Great care has been taken over the more are available through the CRAN family of
defaults for the minor design choices in graphics, but Internet sites covering a very wide range of modern
the user retains full control. statistics. R has its own Latex-like documentation
format, which is used to supply comprehensive
R is available as Free Software under the terms of documentation, both on-line in a number of formats
the Free Software Foundation’s GNU General Public and in hardcopy.
License in source code form. It compiles and runs on
a wide variety of UNIX platforms and similar systems 3.3 R Studio
(including FreeBSD and Linux), Windows and MacOS.
R Studio is an integrated development environment
3.2 The R Environment (IDE) for the R programming language. Some of its
features include: Customizable workbench with all of
R is an integrated suite of software facilities for data the tools required to work with R in one place
manipulation, calculation and graphical display. It (Console, source, plots, workspace, help, history, etc.).
includes an effective data handling and storage Syntax highlighting editor with code completion.
facility, a suite of operators for calculations on arrays,
in particular matrices, a large, coherent, integrated Execute code directly from the source editor (line,
collection of intermediate tools for data analysis, selection, or file). Full support for authoring Sweave
graphical facilities for data analysis and display either and TeX documents.
on-screen or on hardcopy, and a well-developed,
simple and effective programming language which Runs on all major platforms (Windows, Mac, and
includes conditionals, loops, user-defined recursive Linux) and can also be run as a server, enabling
functions and input and output facilities[7]. The term multiple users to access the R Studio IDE using a web
“environment” is intended to characterize it as a fully browser.
planned and coherent system, rather than an
incremental accretion of very specific and inflexible
tools, as is frequently the case with other data
analysis software.
IV. System Design graph we can conclude that most number of flights
(627931) are running in July month. And second
most number of flights (616090) are running in
March month.
Indy as Origin:-
V. Experimental Results
Indy as Destination:
From the below graph we can conclude that more
number of flights are arriving Indy airport in the
month of July and the less number of flights in the
month of November.
5.2.4 Hourly wise statistics of Indy airport 5.3 Source to Destination airport pairs
Indy as Origin:- Here we are going to take a look at the most and
From the below graph we can conclude that more least popular airport-pairs based on the flights
number of flights are leaving the Indy airport in the operating in between them (Means one as Origin
duration of 6am – 7am and the less number of flights and another as Destination).
in the duration of 12am –
4 am in a day. 5.3.1 Most Popular
Indy as Destination:- These are the top 6 airport pairs with max number
From the below graph we can conclude that more of flights running between them. In these SFO to
number of flights are arriving the Indy airport in the LAX stands first with 13788 running.
duration of 10am – 11am and the less number of
flights in the duration of 2am. 5.3.2 Least Popular
These are the least 6 airport pairs with minimum
number of flights running between them.
VIII. REFERENCES
ABSTRACT
Li-Fi stands for Light-Fidelity. This technology is very new and was proposed by the German physicist Harald
Haas in 2011. Light based communication system is the backbone of the future of the communication system.
Li-Fi is a wireless technology that uses light emitting diodes (LEDs) for transmission of data. The development
of the wireless communication leads to advance research in LiFi technology. The term Li-Fi states to visible
light communication (VLC) technology that uses as medium to deliver high-speed communication in a fashion
similar to Wi-Fi. Li-Fi comprises a wide range of frequencies and wavelengths, from the Infrared through
visible and down to the Ultraviolet spectrum. The immense use of Li-Fi may solve some bottleneck of data
transmission in Wi-Fi technology. With the innovation in technology and the number of users, the existing
radio-wave spectrum fails to accommodate this need. To resolve the issues of scalability, availability and
security, we have come up with the concept of transmitting data wirelessly through light using visible light
communication (VLC) technology. This paper objective is to study and describe the LiFi technology. The
improvement of the wireless communication leads to advance research in LiFi technology through Visible
Light Communications (VLC) Technology.
Keywords : Visible Light Communications (VLC), Light Emitting Diodes (LEDs), Radio Frequency (RF),
Infrared (IR), Remotely Operated Vehicles (ROVs), Line of Sight (LOS).
CSEIT1838108 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 30-37 ]
30
Imran Siddique et al. Int J S Res CSE & IT. January-February-2019 ; 5(1) : 30-37
modulation of data to optics and the optical technological communication at ultra-high speed
communication channel as shown in Fig -3: greater that of current wireless systems One of the
goals of researchers is to allow 100 megabits of data
transference per second (Mbps) in offices and homes
by modulation of light from promoted lighting
systems. If it is developed correctly, the possibility
exists that many of the problems associated with
present day infrared, radio wave and microwave
communications systems could be at least partially
Fig -1: Visible Light Communication (VLC) Systems resolved, and a more biologically friendly system
[6]
made existing to industries and the general public.
Fig -3: Block diagram of a VLC architecture [5] The Gamma rays cannot be used as they could
be dangerous [10].
C. LED (LIGHT EMITTING DIODE) VLC X-rays has related health issues.
TECHNOLOGY Ultraviolet light is good for place without
people, but otherwise dangerous for the human
LED (Light Emitting Diode) Visible Light body.
Communications (VLC) systems are familiar as Infrared, due to eye safety regulation, can only
creating a possible valuable addition to future be with low power [10].
generations of technology, which have the potential Radio waves penetrate through the walls so they
to utilize light for the purposes of advanced arises security issues.
Hence we left with the only the visible- “Light ✓ A good silicon photodiode, as a receiving
Spectrum”. element.
B. DISADVANTAGES OF LI-FI
and controlling the traffic struck and increasing Difference between LIFI and WIFI
accident ratios in developing countries. The LED car
lights can alert drivers when other vehicles are too Parameters Li-Fi Wi-Fi
close via LiFi technology. Transmitter LED Antenna
Frequency band 1000 times 2.4 GHz
C. Better Replacement for Other Technologies
of THz
Standard IEEE 802.15.xx IEEE 802.11xx
Li-Fi uses Visible Light Communication Technology No of users Under The Depend on
(VLC) Instead of Radio Waves. So, it can be easily All over Lamp.(LEDs) access Point.
Data Bits Radio waves
installed at those places where Bluetooth, Infrared,
Transmission
Wi-Fi can’t work properly.
Topology Point to Point Point to
Multipoint
D. Underwater Applications Communicat Based on Visible Based on Radio
ion Light Frequency
Li-Fi can even work underwater where Wi-Fi fails Communication Communication
completely, if the cables of the Remotely Operated (VLC).
Vehicles (ROVs) which operate at a long distance Availability Anywhere, Limited
from the surface are replaced with light (LEDs), available in
which is water-logged then it is easier to access the Airplanes and
internet [16]. Underwater
Power Less More
Consumptio
E. Exclusive Medical Applications
n
Environment Low Medium
Wi-Fi cannot be installed at Hospitals/Operation Impact
Theatres/Medical Laborites as these radio waves can Cost Low High
interfere with the Cellphones/Tablets PC which can Bandwidth Unlimited Limited
block the signals for monitoring equipments thus
proving hazardous to the patient’s health. Usage of G. Industrial Automation
Li-Fi provides more advanced monitoring techniques
and operation strategies. Anywhere in industrial areas data has to be
transmitted, Li-Fi is capable of interchanging slip
F. Cheaper Internet in Aircrafts rings, sliding contacts and short cables, such as
Industrial Ethernet. Due to the real time capability of
The passengers travelling in aircrafts have to Li-Fi, it is also an alternative to common industrial
prescribes to put their electronic devices in the Flight Wireless standards.
Mode or No Internet Mode, because in an aircraft as
these signals may interfere with the navigation H. Safety Environments
signals. So, Wi-Fi is practically impossible in this
scenario.Li-Fi can easily provide high speed Internet In explosion risk environments, the use of electrical
via every light source such as overhead reading LEDs equipment, including mobile phones, is generally
present inside the airplane. greatly restricted. The use of Li-Fi to pass data will
simplify the configuration of data networks in such
environments, and can permit new systems to [3] R.Mallika@Pandeeswari; “Survey of (LI-FI) Light
enhance security in these environments [19]. Fidelity” ,2nd Year-IT, Department of Information
Technology, Mepco Schlenk Engineering College
V. CONCLUSION [International Conference on Emerging Trends in
Applications of Computing (ICETAC 2K17)
Li-Fi is the trend of today and near future. It is one of http://www.ijetjournal.org ISSN: 2395-1303]
[4] Mr. Korde S. K; “Review Paper on Li-Fi (Light
the cheapest and efficient modes of data transfer. It
Fidelity)”
surely can replace the traditional Wi-Fi networks and
[Vol-2 Issue-3 2016 IJARIIE-ISSN (O)-2395-4396]
can further be extended to different platforms to
[5] Taner Cevik and Serdar Yilmaz; “An Overview Of
make it easily accessible and portable which will thus
Visible Light Communication Systems”
cater to the growing demands of the increasing
[International Journal of Computer Networks &
population. One of limitation however is that it only
Communications (IJCNC) Vol.7, No.6, November
works in direct line of sight (LOS) but this would
2015]
solve the problems like the shortage of radio- [6] Adam Böcker, Viktor Eklind Daniel Hansson, Philip
frequency bandwidth and allow internet (WI-FI) to Holgersson, Jakob Nolkrantz & Albin Severinson;
be used in places and situations where it cannot be “An implementation of a visible light
used currently like the hospitals or aircrafts. There communication system based on LEDs”
are billions of light bulbs worldwide, they just need [Department of Signals and Systems CHALMERS
to be replaced with LEDs ones that transmit data. UNIVERSITY OF TECHNOLOGY Gothenburg,
Visible Light Communication (VLC) is very cheaper Sweden 2015]
to Wi-Fi because it uses light rather than radio- [7] Roma Jain, Pallavi Kale, Vidya kandekar, Pratiksha
frequency signals. Kadam; “Wireless Data Communication Using Li-Fi
Technology” [DOI 10.4010/2016.846 ISSN 2321
VI. ACKNOWLEDGEMENTS 3361 © 2016 IJESC]
[8] Jon Mundy and Sacha Kavanagh; “What is Li-Fi?”
The authors would like to thank “Afro Asian Institute, [https://5g.co.uk]
Lahore” Affiliated with Government College [9] Mr. Prashant T Rayrikar; “Wi-Fi Technology Vs Li-
University Faisalabad (GCUF) for the support Fi Technology” [IRJET e-ISSN: 2395 -0056 Volume:
03 Issue: 05 | May-2016 p-ISSN: 2395-0072]
provided to Carry the research work presented in this
[10] Ekta, Ranjeet Kaur; “Light Fidelity (LI-FI)-A
paper.
Comprehensive Study” [International Journal of
VII.REFERENCES
Computer Science and Mobile Computing, Vol.3
Issue.4, April- 2014]
[11] Abhishek Gupta Swayanshu Shanti Pragnya; “The
[1] Roma Jain, Pallavi Kale, Vidya kandekar, Pratiksha
Future Technology LiFi” [IJSRD - International
Kadam; “Wireless Data Communication Using Li-Fi
Journal for Scientific Research & Development| Vol.
Technology” [ISSN 2321 3361 © 2016 IJESC]
4, Issue 08, 2016, ISSN (online): 2321-0613]
[2] Imran Siddique & Muhammad Zubair Awan; “An
[12] Dinesh Khandal, Sakshi Jain; “Li-Fi (Light Fidelity):
innovation in Mobile Communication Technology”
The Future Technology in Wireless
[International Journal of Research e-ISSN: 2348-
Communication” [International Journal of
6848, p-ISSN: 2348-795X Volume 05 Issue 23,
Information & Computation Technology. ISSN
December 2018]
0974-2239 Volume 4, Number 16 (2014), pp. ©
About Authors:
Imran Siddique
Imran Siddique received his B.Sc.
degree in Computer Engineering
from Bahauddin Zakariya
University Multan, Pakistan and
pursuing his MS in Electrical
Data mining depends on large-scale taxi traces is an important research concepts. A vital direction for analyzing
taxi GPS dataset is to suggest cruising areas for taxi drivers. The project first investigates the real-time demand-
supply level for taxis, and then makes an adaptive tradeoff between the utilities of drivers and passengers for
different hotspots. This project constructs a recommendation system by jointly considering the profits of both
drivers and passengers. At last, the qualified candidates are suggested to drivers based on analysis. The project
also provides a real-time charging station recommendation system for EV taxis via large-scale GPS data mining.
By combining each EV taxi‟s historical recharging actions and real-time GPS trajectories, the present
operational state of each taxi is predicted. Based on this information, for an EV taxi requesting a
recommendation, recommend a charging station that leads to the minimal total time before its recharging starts.
Keywords : Vehicular Social Networks, Hotspot location, Trajectory data mining, Supply-demand level,
Electronic Vehicle.
CSEIT19515 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 38-44 ]
38
Selvi C, Keerthana D Int J S Res CSE & IT. January-February-2019 ; 5(1) : 38-44
driving traffic to their several websites. The appliance However, various vary of novel applications, coming
of those sites has unfold to business homes that together transport networks, exploiting quality
started victimization the Social Networking sites as a pattern, socially aware recommendation systems on
platform to market their services and build whole the roads area unit a number of the factors towards
awareness. These social networking websites kind the whom the analysis community has shown concrete
most tool of social media promoting. The foremost interest. Finally, they bestowed some open analysis
ordinarily used websites Twitter and Face book. The issue for future direction.
main objectives of the Taxi Recommendation square
measure B. Vehicular Social Networks: Enabling Smart
Mobility
To specialize in a way to maximize drivers‟ profits In this article stressed the importance of high-
whereas high the profit of passengers. potency and reliable transmissions in VSNs for
To value 2 completely different levels of Demand sensible cities. Significantly, we tend to study a case
offer that square measure appropriate for busy on traffic anomaly detection for VSNs by mechanical
(peak) days and traditional operating days. phenomenon knowledge analysis. They believed that
To provides a time period charging station VSNs can draw in depth attentions and analysis
recommendation system for taxis. efforts within the close to future because the
To calculate waiting time beside the gap for the integrations of data technology and social network
recharging stations. services become additional compacted. Though VSNs
II. RELATED WORKS will be considered the mixing of social networks and
IoVs to enhance the standard of life for voters, the
A. Vehicular Social Networks: A Survey avenues of VSN studies aren't flat, and plenty of open
problems are still ahead.
Considered social networking in an exceedingly
transport environment; the authors investigated the C. Energy-Latency Trade-Off For Energy-Aware
possible applications of VSNs and communication Offloading In Mobile Edge Computing Networks
design. VSNs enjoy the social behaviors and quality
of nodes to develop novel recommendation systems In this paper, single and multi-cell MEC network
and route coming up with. Further, they gave an eventualities are thought-about at an equivalent time..
outline of various recommendation systems and path In terms of the mixed number nonlinear drawback
coming up with protocols supported crowd sourcing (MINLP) for computation offloading and resource
and cloud-computing with future analysis directions. allocation, we tend to propose AN reiterative search
They bestowed a progressive literature review on rule combining interior penalty operate with D.C.
socially-aware applications of VSNs, information (the distinction of 2 convex functions/sets)
dissemination, and quality modeling. Further, they programming (IPDC) to search out the optimum
mentioned the various communication protocols resolution. The residual energy of good devices‟
style and information dissemination techniques to battery is introduced into the definition of the
deal with the present gap between VSNs and ancient coefficient issue of energy consumption and latency.
ad-hoc networks that is that the terribly 1st issue to Numerical results show that the projected rule will
be thought-about by the analysis community to get lower total price (i.e., the weighted add of energy
understand the construct of VSNs in public accepted. consumption and execution latency) examination
with the baseline algorithms and also the energy-
aware coefficient issue is of nice significance to keep a tradeoff between the driver‟s and passengers‟
up the life of good mobile devices. utilities.
Input: The pick-up events timestamp sequence Input: Available taxi’s current time curtime and location curloc,
Tp = {pe1,pe2,··· ,pen} candidate hotspots set H
Output: The estimated waiting time w for the hotspot Output: The recommended hotspot
1: λ ← n−1 pen−pe1; 1: MaxScore ← 0,MaxId ← 0;
2: Initiaize the passenger arrival events timetamp sequence 2: U ← ø,w ← ø;
Ta = {ae1,ae2,··· ,aen}; 3: Tracing trajectory and computing the driver’s recent spent
3: for i = 1 to n do time on each hotspots ST = {st1,st2,··· ,stn};
4: if i = 1 then 4: for hi in H do
5: aei = random(0,pei); 5: d ← getManhattandis(curloc,hi.core);
6: // Uniform distribution 6: V ← (hi.revenue−βhi.searchingtime−γd) ;
7: else 7: ε ← sti ∑k stk ;
8: aei = aei−1 + random(0,pei −aei−1); 8: U ∪(V + ε);
9: // Truncated exponential distribution with λ 9: w∪hi.waitingtime;
10: end if 10: end for
11: end for 11: Evaluate real-time demand-supply level α based on curtime
12: w ← 0; using previousAlgorithm
13: for i = 1 to n do 12: for U∗ i , w∗ i corresponding to each hotspot do
14: w + (pei −aei); 14: score ← (1−α)U∗ i + αw∗ i ;
15: end for expected waiting time w. 15: if score > MaxScore then
16: MaxScore ← score;
17: MaxId ← i;
3) Demand-Supply Level Evaluation 18: end if
19: end for
The following algorithm is used for demand supply 20: return recommended hotspot hMaxId.
represented as a set of elements. In every iteration, The finding seat available between two location and
each element is updated by following two "greatest" average of seat counting Time details as followed:
values. The first one is the greatest solution (fitness)
AVERAGE TIME CALCULATION PSO-
it has achieved so far. (The fitness value is and stored.) NPSO
This value is call pBest. Another" greatest" value that
100
is tracked by the particle swarm optimizer is the
80
greatest value, obtained so far by any element in the
AVG Time
60 PSO
population. This greatest value is a overall best and 40 NPSO
called gBest. 20
0
v[ ] = v[ ] + c1 * rand() * (pbest[ ] - present[ ]) + c2 * rand() * 1 2 3 4 5
(gbest[ ] - present[ ]) + (( c3 * rand()) + a[t])) + (( c4 * rand( )) - Vehicle
s[t])) - (a)present[ ] = present[ ] + v [ ] - (b)
where, a[t]=v[ ]+ pbest+ gbest
a[t]=v[ ]- pbest- gbest
Fig 2. Average Time Calculation PSO- N-PSO
v[ ] is the element velocity, present[ ] is the current element
(solution),
rand ( ) is a random number between (0,1); c1, c2 are learning Example:
factors usually c1 = c2 = 2. Number of Seat Count, C
Number of Distances, D
IV. ARCHITECURE Total Number of Vehicle TV
Total Number of distances TD
N number of Iteration N
VI. CONCLUSION
ABSTRACT
Opinion mining, also called sentiment analysis, is the field of study that analyses people’s opinions, sentiments,
evaluations, appraisals, attitudes, and emotions towards entities such as products, services, organizations,
individuals, issues, events, topics, and their attributes. Even though facts still play a very important role when
information is sought on a topic, opinions have become increasingly important as well. Opinions expressed in
blogs and social networks are playing an important role influencing everything from the products people buy to
the presidential candidate they support. Thus, there is a need for a new type of search engine which will not
only retrieve facts, but will also enable the retrieval of opinions. Such a search engine can be used in a number
of diverse applications like product reviews to aggregating opinions on a political candidate or issue. This paper
consist review works have been designed for opinion mining by using classification and ranking techniques.
Keywords : Sentiment Analysis, Opinion Mining, POS, Ranking Algorithm, Feature Selection Method,
Semantic Orientation.
I. INTRODUCTION
Sentiment analysis, also called opinion mining, is the reach opinions/sentiments regarding a particular
process of extracting subjective information, such as topic, product, event or individual. Sentiment
opinions, sentiments and attitudes in the source analysis process can be modelled as a classification
materials towards an entity. It is an interdisciplinary problem. Sentiment analysis can be conducted at
research field that combines tools and techniques different levels of detail. Based on the levels,
from natural language processing, text mining and sentiment analysis can be broadly divided into three
computational linguistics [1]. Opinions are important main levels: document level, sentence-level and
factors and influencers of the decision-making aspect-level sentiment analysis [3]. Document-level
process. The determination of people’s opinions sentiment classification aims to determine the overall
toward a particular event can be extremely important sentiment orientation of an entire document, such as
in several fields, such as management sciences, a review text, assuming that each document contains
political science, economics and other disciplines of information regarding a single entity. Sentence-level
social sciences [2]. The Web provides a rich and sentiment analysis aims to identify subjective and
progressively expanding source of information to objective sentences. In sentence-level sentiment
CSEIT183812 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 45-49 ]
45
Prof. Sonali D. Borase, Prof. Prasad P. Mahale,. Int J S Res CSE & IT. January-February-2019 ; 5(1) : 45-49
analysis, the sentiment orientation of subjective accordingly. Each file form target domain is assigned
sentences is also identified.[6] The classification of score on which basis it is classified as positive or
review documents at document or sentence level of negative. Each word has weight assigned to it.
granularity does not fully reveal the opinions Summation of weights of words in each sentence
regarding different features of a particular entity. gives score to sentence. Then addition of all sentence
Hence, aspect-level sentiment analysis concerns the score is nothing but score of file. On the basis of this,
classification of sentiments by focusing on the file is classified. Clustering helps in reducing
particular features/aspects of entities. mismatch between domain specific words of source
and target domains. Two sets of lexicons are extracted
II. LITERATURE SURVEY as an output with polarity which is compared with
SentiWordNet..[1]
Blenty proposed algorithm works on word level. POS
tagged words are extracted from pre-processing steps
are used. Each word acts as feature. Algorithm is Pre-processing of dataset
executed for total number of features provided in
input dataset. According to this weight words are
classified into two categories. Classified words are
having POS tag, polarity tag, and weight value. From Apply classifier on dataset.
this list, common and uncommon words are picked
and used for bipartite graph clustering.
assign lexical categories to the words in text. The feature candidates are identified by POS tags and
feature and opinion pairs, the parser from previous only the features which are stored in the domain
step are analysed and generate all possible ontology are valid. Maximum Entropy modelling for
information components from them. The extracted prediction of feature and opinion pairs in a different
pairs from dependency relation can contain which way it has been used so far, using weights for both to
are relevant or not. Therefore, maximum entropy emphasize the importance of each one of them in the
model is used to predict opinion-relevant product relation of feature and opinion pairing task.
feature or not by choosing the class with the highest Maximum entropy model is used to predict which
conditional probability p according to this model. feature word should be related with the opinion
Domain ontology to get the domain related features word with maximum probability.[3]
and to define the synonym set for features. Product
Table 1: Summery
Deshmukh et al proposed method collected data from identifying polarity of each aspect n finally the
site that provides with reviews on electronic gadgets product itself. Modify Naivè Bayes model to create
and gives the respective user reviews. Pre-processing an aspect ranking algorithm which eventually will
phase on data through Natural Language processing is rank the products where this step calculates the
done and then feature/aspect list is displayed. weight of features from reviews. [2]
Extracting nouns as features and adjectives as
opinions. Next step is Enhanced Aspect Identification Zhang et al proposed system in which given the
and Opinion Word Extraction In this technique High consumer reviews of a particular product, we first
frequency aspects are ranked and the corresponding identify aspects in the reviews by a shallow
opinion words for the aspects are extracted for dependency parser and then analyse consumer
opinions on these aspects via a sentiment classifier. measures like Information gain-based feature ranking
System develop a probabilistic aspect ranking is a filter-based feature selection method, which is
algorithm, which effectively exploits the aspect widely utilized in text mining domain. The second is
frequency as well as the influence of consumers’ Chi-squared feature ranking evaluates the merit of
opinions given to each aspect over their overall each feature individually with the chi-squared
opinions on the product in a unified probabilistic statistical measure. Next is Information gain is a
model. The overall opinion in a review is generated biased measure towards features with high values.
based on a weighted aggregation of the opinions on Similar to gain ratio, the symmetrical uncertainty
specific aspects, where the weights essentially coefficient aims to eliminate the bias of information
measure the degree of importance of these aspects. A gain towards the attributes with higher values.
probabilistic regression algorithm is developed to Pearson correlation coefficient is used to measure the
infer the importance weights by incorporating aspect correlation between two attributes. Relief algorithm
frequency and the associations between the overall is a filter-based method that uses a feature relevance
opinion and the opinions on specific aspects. In order criterion to rank the features. Proposed genetic rank
to evaluate the proposed product aspect ranking aggregation-based feature selection model uses Filter-
framework. A product aspect ranking framework to based feature selection methods can obtain different
automatically identify the important aspects of rankings for the same data set. The aggregation of
products from numerous consumer reviews. A several different feature rankings may be beneficial
probabilistic aspect ranking algorithm to infer the to obtain an enhanced ranking of the features. The
importance of various aspects by simultaneously proposed method models the feature selection as a
exploiting aspect frequency and the influence of rank aggregation problem and the feature rankings
consumers’ opinions given to each aspect over their obtained by different filter-based methods are
overall opinions on the product.[4]. combined. Given a set of rankings of the same
candidate sets, the rank aggregation seeks to find a
Aytug at al evaluated Feature selection is the process single better ranking from these multiple rankings.
of obtaining an appropriate feature subset from the The rank aggregation problem can be modelled as an
data set so that the classification optimization problem where the objective is to
obtain a final ranking that is the closest to the all
Algorithms can deal efficiently with high- individual ranking lists. [5]
dimensional feature spaces. Feature selection
methods aim to eliminate irrelevant or redundant III. CONCLUSION
features and to reduce the training time required to
build a classification model Feature selection method This paper give brief information on Opinion Mining
can be broadly divided into two groups: filter-based and the recent literature review putting light on the
and Wrapper-based feature selection methods. steps involved in Opinion Mining. Opinion Mining is
the field of study that tracks the mood or attitude of
Filter-based methods evaluate the usefulness of people towards a particular product or topic. It helps
features based on heuristics/evaluation metrics, to find the product with best quality, which is
whereas wrapper-based methods select the features predicted based on the user reviews. It is also used for
based on the performance of a machine learning recommendation system and business intelligence.
algorithm to optimize the predictive performance. There are many challenges and future developments
System evaluated the different individual filter-based possible in Opinion Mining approach like short
length and irregular structure of the content such as Cite this article as :
named entity recognition, parsing. Opinion mining is
to find the opinion of a person from sentences and Prof. Sonali D. Borase, Prof. Prasad P. Mahale,
then classify them on the basis of polarity. Opinion "Aspect Ranking Technique for Efficient Opinion
mining helps people to know the semantic Mining using Sentiment Analysis : Review ",
orientation for a product by classifying it as positive, International Journal of Scientific Research in
negative or neutral. Computer Science, Engineering and Information
Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
IV. REFERENCES 5 Issue 1, pp. 45-49, January-February 2019.
Available at doi :
[1]. J. Deshmukh and A. Tripathy, "Entropy based https://doi.org/10.32628/CSEIT183812
classifier for cross-domain opinion mining", Journal URL : http://ijsrcseit.com/CSEIT183812
Applied Computing and Informatics, vol. 14,
no. 1, pp. 55-64, 2018.
[2]. B. Alengadan and S. Khan, "Modified
Aspect/Feature Based Opinion Mining for a
Product Ranking System", 2018 IEEE
International Conference on Current Trends in
Advanced Computing (ICCTAC), pp. 1-5, 2018.
[3]. D. Nyaung and T. Lai Thein, "Feature-Based
Summarizing and Ranking from Customer
Reviews", International Journal of Computer
and Information Engineering, vol. 9, no. 3, pp.
734-739, 2015.
[4]. Zheng-Jun Zha, Jianxing Yu, Jinhui Tang,
Meng Wang and Tat-Seng Chua, "Product
Aspect Ranking and Its Applications", IEEE
Transactions on Knowledge and Data
Engineering, vol. 26, no. 5, pp. 1211-1224,
2014.
[5]. A. Onan and S. Korukoglu, "A feature selection
model based on genetic rank aggregation for
text sentiment classification", Journal of
Information Science, vol. 43, no. 1, pp. 25-38,
2016.
[6]. B. Liu, "Sentiment Analysis and Opinion
Mining," Synthesis Lectures on Human
Language Technologies, vol. 5, no. 1, pp. 1-167,
May 2012
ABSTRACT
Anonymization techniques are enforced to provide privacy protection for the data published on cloud. These
techniques include various algorithms to generalize or suppress the data. Top Down Specification in k
anonymity is the best generalization algorithm for data anonymization. As the data increases on cloud, data
analysis becomes very tedious. Map reduce framework can be adapted to process on these huge amount of Big
Data. We implement generalized method using Map phase and Reduce Phase for data anonymization on cloud
in two different phases of Top Down Specification.
Keywords: Anonymization, Big Data in cloud, k-Anonymity, Map Reduce, Privacy Preserving
CSEIT19516 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 50-56 ]
50
Anushree Raj, Rio G L D'Souza Int J S Res CSE & IT. January-February-2019 ; 5(1) : 50-56
Generalization is the most common method to make Sensitive Attribute: Attribute or data that an
the data anonymous to provide the privacy. In this individual is sensitive about revealing.
paper we discuss on data anonymization technique in
section II and then show the implementation using There are two main ways through which k-
Map Reduce in section III. Anonymity can be achieved:
Bottom Up Generalization: In Bottom-Up
II. DATA ANONYMIZATION Generalization strategy, the data is initialized to its
current state and generalizations are carried out over
Data anonymizaton is a deep study, broadly adopted attribute values until k-Anonymity is not violated
for privacy preserving in data publishing. [16].
Anonymization techniques highly focus on data
security in public cloud [11]. The main feature of Top Down Specialization: In Top-Down
anonymization techniques is hiding few key data to Specialization strategy, all the attribute values are
maintain data privacy. Data can further be processed initialized to the root value of the hierarchy tree [17].
to achieve necessary information by analysing it. The The specialization is carried out iteratively over the
simple way of preserving privacy is by removing all attribute values, until the k-Anonymity is violated.
those information, which will directly link to data of Top Down Specification
an individual. This process s referred to
anonymization [12]. There are many approaches to Let D be a data set to which the anonymization
gain data anoymization, such as k-Anonymity, l- technique is applied. R denotes the records in the
Diversity and t-Closeness which helps to make the data set. Let A be the attributes, which can identify N
data more private and anonymous, to protect data individuals through Ai where 1 ≤ i ≤ N, k is the
access from any third party users. anonymity parameter used in the anonymization
levels. Anonymization levels are the single
k- Anonymity: mapreduce job execution level from multiple
k-Anonymity is used to hide some key information of mapreduce jobs. The domain values are represented
the users in a database of k users. Then the attackers by the taxonomy tree [18],[21]. Q determines the
can make sure there are only k users but cannot quasi identifier. A record can contain any N number
interpret the information of an individual user in of Quasi Identifiers, Qi ϵ R, 1 ≤ i ≤ N. the sensitive
particular [13], [14]. This method is used to values are denoted by S. In Top Down Specification, a
anonymize the quasi-identifiers to provide privacy to data set is anonymized through specialization
the data. The main aim of k-Anonymity is to make operations. The domain values are replaced with all
each record indistinguishable from at least k-1 other its sub domain values.
records. k-Anonymity assigns properties in specific
ways [15]. The k anonymity data attributes are of In Top Down Specialization, a hierarchy tree is used
three types to represent the attribute values which is initiated by
a root value. The specialization performed iteratively
Key Attribute: Attribute which can identify n over the attribute values, till the k - anonymization is
individual directly. satisfied. The specialization is performed by
Quasi - identifier: Attribute which can be linked with substitution of the parent attribute value by its child
external information to identify an individual. value in taxonomy tree. For example, the patient
record of a hospital is anonymized and published for
NAME AGE SEX EDUCATION PROFESSION Figure 3. Taxonomy tree for Sex
SAM 34 M MASTER BUSINESS
FUNG 45 M DOCTRATE DOCTOR Table 2. Anonymized data
SONA 53 F MASTER PRINCIPAL
RAFI 25 M BACHELORS HR NAM SE PROFESSI
ZAMA 37 F MASTERS MANAGER AGE EDUCATION
E X ON
ALICE 28 F BATCHELORS BUSINESS
[1- AN GRADUATE
BOB 52 M DOCTRATE PROFESSOR * BUSINESS
34] Y SCHOOL
[35- AN GRADUATE
The specialization is performed by replacing the * DOCTOR
49] Y SCHOOL
parent attribute value by its child value in Taxonomy
[50- AN GRADUATE PRINCIPA
Tree *
63] Y SCHOOL L
[1- AN
TAXONAMY TREES AND QUASI IDENTIFIERS * BACHELORS HR
34] Y
[35- AN GRADUATE MANAGE
*
49] Y SCHOOL R
[1- AN
* BACHELORS BUSINESS
34] Y
[50- AN GRADUATE PROFESS
*
63] Y SCHOOL OR
values can be of any data type or length, or gathered by enterprises and government agencies.
combinations of multiple types (one integer, a string Such data is subjected to, be abused by internal and
of characters, two integers and a double, etc); they external adversaries. Many anonymization
are simply treated as byte strings by the library. A techniques came into existence. They are k-
key-value pair always has a key; its value may be Anonymity, l-Diversity, t-Closeness and m-Privacy.
NULL. Key-value pairs are stored within a These privacy preserving data mining algorithms
MapReduce object. A user program may create one or cannot work for big data analytics, as such data is
more MapReduce objects to implement an algorithm computed using MapReduce programming paradigm
[21]. Various MapReduce operations (map, reduce, in cloud computing environment. MapReduce is used
etc) are invoked on an object and its key-value pairs; to control the parallel processing power of cloud
key-value pairs can also be passed between and computing infrastructure. In this paper, we proposed
combined across objects. algorithms which are used to parallelize k-
Anonymity using MapReduce programming
Conceptually the map and reduce functions supplied paradigm with Hadoop. First, we studied k-
by the user have associated types. Anonymity model and its usefulness in anonymizing
map (k1,v1) → list(k2,v2) data. We implemented the Top Down Specialization,
reduce (k2,list(v2)) → list(v2) a generalization method on k-anonymity so as to
anonymize the original data. We then implemented
Map Reduce approach involves the following four algorithms that could parallelize k-Anonymity using
steps: Map Reduce framework. The proposed algorithm is
capable of anonymizing big data in order to support
1. Map processors, assigns the K1 input Key value, privacy preserving. In future, we can propose an
and provides the processor with all the input data algorithm using MapReduce programming towards
associated with that key value. efficiently anonymizing big data for preserving
2. Run the user provided Map() exactly once for privacy.
each key value, generating output organized by
key values K2. V. REFERENCES
3. Reduce processors, assigns the K2 key value with
all the Map generated data associated with that [1] L. Hsiao-Ying and W.G. Tzeng, “A Secure
key value. Erasure Code-Based Cloud Storage System with
4. Run the user provided Reduce () exactly once for Secure Data Forwarding,” IEEE Trans. Parallel
each K2 key value produced by the Map and Distributed Systems, vol. 23, no. 6, pp.
5. Produce the final output –The Map Reduce 9951003, 2012.
system collects all the reduce output and sorts it [2] D. Zissis and D. Lekkas, "Addressing Cloud
by K2 to produce final outcome Computing Security Issues," Future Generation
Computer Systems, vol. 28, no. 3,pp. 583-
IV. CONCLUSION 592,2011.
[3] RuilinLiu, Hui Wang, ”Privacy –Preserving
Privacy is very important to protect the sensitive data Data Publishing “ IEEE ,2010.
from the attacker. To provide data privacy the [4] B.C.M. Fung, K. Wang, and P.S. Yu,
anonymization methods may be used. The data "Anonymizing Classification Data for Privacy
mining activities utilize huge amount of data Preservation," IEEE Trans. Knowledge and
Data Eng., vol. 19, no. 5, pp. 711-725, May Systems, Volume 10 Issue 5, October 2002,
2007. Pages 571 - 588
[5] X. Xiao and Y. Tao, "Anatomy: Simple and [15] Meyerson A and Williams R, On the
Effective Privacy Preservation." Proc. 32nd complexity of optimal k-anonymity. In
Int'l Conf. Very Large Data Bases (VLDB'06), PODS04: Proceedings of the twenty fourth
pp. 139-150,2006. ACM SIGMOD-SIGACT-SIGART symposium
[6] K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, on Principles of database systems, pages 223–
"Incognito: Efficient Full-Domain K- 228, 2004
Anonymity," Proc. ACM SIGMOD Infl Conf. [16] Ke Wang, Philip S. Yu, Sourav Chakraborty,
Management of Data (SIGMOD '05), pp. 49-60, "Bottom-Up Generalization: A Data Mining
2005. Solution to Privacy Protection", Fourth IEEE
[7] K. LeFevre, D. l DeWitt, and R. Ramakrishnan, International Conference on Data Mining,
"Mondrian Multidimensional K-Anonymity," 2004. ICDM '04 .. Pages 249 – 256
Proc. 22nd Int'! Conf. Data Eng. (ICDE '06), [17] Xuyun Z, Laurence T Yang ,”A scalable Two
2006. phase Top Down Specialization Approach for
[8] 1 Xu, W. Wang, 1 Pei, X. Wang, B. Shi, and A. Data Anonymization using Map Reduce on
W. Fu. , "Utility-based anonymization using cloud“, IEEE Transaction on Parallel and
local recoding ", In ACM SIGKDD, 2006. Distributed Systems ,TPDSSI-2012.
[9] S.Yu, ”Anonymizing Classification Data for [18] Zhang X, Yang LT, Liu C, Chen J. A scalable
Privacy Preservation“. IEEE Transactions on two‑phase top‑down specialization approach
Knowledge and Data Engineering ,vol 19 no 5 for data anonymization using MapReduce on
,2007 cloud. IEEE Trans Parallel Distrib Syst.
[10] Benjamin C.M Fung, Ke Wang, Philip S.Yu 2014;25(2):363–73
“Top Down Specialization for Information and [19] Jefrey Dean and Sanjay Ghernawat “Map-
Privacy Preservation”. Reduce: Simplified Data Processing on Large
[11] Bayardo R and Agrawal R, Data privacy Clusters” Google,Inc.2004
through optimal k-anonymization. In ICDE05: [20] J. Dean and S. Ghemawat, "Mapreduce:
The 21st International Conference on Data Simplified Data Processing on Large Clusters,"
Engineering, pages 217– 228, 2005. Comm. ACM, vol. 51, no. 1, pp. 107-113,2008
[12] HIPAA 2012 “k-anonymity : A model for [21] Al‑Zobbi M, Shahrestani S, Ruan C.
Protecting Privacy “ International Journal Sensitivity‑based anonymization of big data. In:
Uncertain Fuzz .vol 10 ,no,5 pp 557-570 ,2002. Local computer networks work‑ shops (LCN
[13] Ciriani, S. De Capitani di Vimercati, S. Foresti, workshops), 2016 IEEE 41st Conference on.
and P. Samarati, "k-Anonymity Data Mining: A IEEE; 2016. p. 58–64
Survey", Springer US, Advances in Information [22] Al‑Zobbi M, Shahrestani S, Ruan C.
Security (2007) Implementing a framework for big data
[14] Latanya Sweeney, School of Computer Science, anonymity and analytics access control. In:
Carnegie Mellon University, Pittsburgh, Trustcom/BigDataSE/ICESS, 2017 IEEE. IEEE;
Pennsylvania, "Achieving k-anonymity privacy 2017. p. 873–80.
protection using generalization and [23] Al‑Zobbi M, Shahrestani S, Ruan C.
suppression", International Journal of Multi‑dimensional sensitivity‑based
Uncertainty, Fuzziness and Knowledge-Based anonymization method for big data. In: Elk‑
Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve
scalable services on-demand. Outstanding security requirements arising from this means of data storage and
management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption
system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data
outsourcing systems require flexible access control approach Problems arises when sharing confidential
corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be
defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in
Multi-Authority environment.
Keywords:ABE-Attribute Based Encryption, Authority, Fine Grained, Outsourcing, Dual Encryption.
the users, so, user identities staypersonal to the AA B. Persona: An Online Social Networkwith User-
outside the domain, which is able to enhance privacy Defined Privacy
and security. Here, once the user ought to requests
associate attribute secret key, if the attributes square These network help users share in order with their
measuresituated outside the domain, the request by friends. However, users entrust thesocial network
the supply AA within the domain to the target AA is provider with such personal information as sexual
employedinstead of by requests by users themselves. preferences, supporting and religious views, phone
numbers, occupations, identities of friends, and
II. RELATED WORKS photographs. Although sites over privacy controls
that let users restrict how their data is viewed by
A. AData Outsourcing Architecture Combining other users, sites provide inadequate controls to
Cryptography and Access Control restrict data sharing with shared affiants or
application developers.
The recent adoption and diffusion of the information
out-sourcing paradigm, whereverknowledge house C. Fuzzy Identity-Based Encryption
owners store their knowledge on external servers,
there are increasing general demands and issues for In this paper, discussed the use fullness of using
knowledge confidentiality. Besides well-known risks biometric s in Identity-Based and then discuss their
of confidentiality and privacy breaks, threats to out- contributions. Using biometrics in Identity- Based
sourced knowledgeembody improper use of Encryption in many situations, using biometric–based
information: the server may use substantial individuality in an IBE system has a number of
components of a setof knowledge gathered and important advantages over “standard” IBE. In
arranged by the information owner, doubtless standard Identity-Based Encryption scheme a user
harming the information owner's marketplace for with a positive identity, for example, “Bob Smith”,
any professional duct or service that comes with that will need to go to an authority to obtain the private
assortmentof data. The projected novel access key corresponding to the identity. In that process the
management model and design that eliminates the user will need to “prove” to the authority that he is
necessity for a reference monitor and depends on indeed entitled to this identity. That will typically
cryptography to make sure confidentiality of involve presenting supplementary documents or
knowledgehold on a server. Knowledgearea unit credentials. Typically, there exists a trade-off
encrypted because theknowledge owner stores them between a system that is expensive in this step and
on associate in nursing external server. one that is less reliable.
Authorizations and codingarea
unitunitedthereforepermitting access D. Mediated Cipher text-Policy Attribute-Based
managementsocial control to be outsourced besidethe Encryption and Its Application
information. The nice advantage is that the
information owner, whereas specifying the policy, Distributed data systems needversatile access
wants not b econcerned in its social control. management models thattranscend discretionary,
necessary and role-based access management. On the
opposite hand, the present trend of service-based data
systems and storage outsourcing needenhanced
protection of knowledgetogether with access
managementways that area unit cryptographically control can be achieved by dual encryption method
implemented. The conception of Attribute-Based which takes advantage of the attribute-based
coding (ABE) fulfills the samenecessities. It provides encryption and discerning group key distribution in
a chicmanner of encrypting knowledgesuch the each attribute group. This work demonstrates how to
encryptor defines the attribute set that the apply the proposed mechanism to securely manage
decryptorhas topossesso as to decrypt the cipher- the outsourced data. The analysis results point to that
text. . A secret key holder willdecipher the cipher the proposed system is efficient and protected in the
text if the attributes related to his secret key satisfy data outsourcing systems.
the access policy related to the cipher text. In these
schemes, a ciphertext is related toassociate in nursing The concept of attribute-based encryption (ABE) is a
access policy and therefore the user secret promising approach that fulfills these requirements.
keysrelated toa collection of attributes. ABE features a device that enables an entrance
control over encrypted data using access policies and
III. METHODOLOGY qualified attributes among private keys and cipher
texts. Especially, cipher text-policy ABE (CP-ABE)
1. EXISTING WORK provides a scalable way of encrypting data such that
the encryption defines the attribute set that the
When the system is set up, the public key of each AA decryptor needs to have classify to decrypt the cipher
and the basic parameters are distributed, which text.
simplifies the process of trust establishment. The key
issuing protocol for privacy only needs to use the 2. PROPOSED WORK
public key of AA to realize the trust between AA.
Present data outsourcing systems require supple Attribute Group - Based Encryption is managed.
access control approaches. In many cases, it is It adapts a dual encryption approach to overcome
attractive to provide differentiate access services such the user access control problem.
that data access policy are defined over user Multiple attribute groups are included and data is
attributes or roles. Some of the most difficult issues in distributed among them. User privileges may be
data outsourcing scenario are the enforcement of varying for data maintained by different attribute
union policies and the support of policy updates. groups.
Cipher text-policy attribute-based encryption is a The data owner maintains all the membership
hopeful cryptographic solution to these issues for lists to enable the direct user management in
enforces access control policies defined by a data more than one place.
owner on outsourced information. Keys are assigned randomly and independently
from each other. But group key mechanism is
But, the problem of applying the attribute-based common for users in single group
encryption in an outsourced architecture introduces All the data is maintained by more authority
several challenges with regard to the attribute and groups.
user revocation. So the project also proposes an access
control mechanism using cipher text-policy attribute-
based encryption to enforce right to use control
policies with well-organized element and user
revocation capability. The fine-grained way in
e) Encryption
a) Trusted Key Pair
Encrypt the text using public key for the purpose of
The trusted key pair created in the application for other users not knows the given message. So, the
further process, following key generate the public unrestricted key is extract using get key grasp button
key and master key, for the purpose of encrypt and displayed in the label control, the message is
the message and group key is created. These entered in the textbox manage then the given
information are generate by form command encrypted communication is display in the label
button event and showed in the multiline text control. The encrypted message saved in the
mode. These key saved in the relevance using application using creates cipher text and save
save authority key event. command button event.
It contains details such as attribute id, attribute It is used to retrieve the plain data in the application.
names are entered by user in the textbox controls, The specified cipher text is entered the data is
and saved by the save command button. The showed to the user. In these module user
delete button is used is used to delete the specific characteristics number and nobody texts are selected
record and close command button is user to from the combo box control, group identity is display
terminate the current modules. in the label controls. The significance is decrypted in
the cipher text grid view control using the decrypt
c) User Creation authority button occurrence.
Used to create the client facts for accessing the The following Table describes experimental result for
attribute with privilege level. The client id, user proposed system secure attribute selection analysis.
first name and passwords are enter by user in the The table contains number of time slot interval and
textbox control these details are saved by the save given attribute to calculate average numbers of
command button event. The delete button is used selection attribute details are shown.
is used to delete the specific record and close
Ratio [%]
0.8
SELECTION
0.6
16 82.42 83.13 ATTRIBUTE
0.4 SELECTION (AS)
24 86.66 84.67 0.2
0
30 88.13 89.78 1 3 5 7 9 11
Number of Attribute
32 80.44 82.66
38 78.33 80.21 Fig 1.2 Attribute selection- Ratio Analysis
42 87.22 89.76
46 79.22 80.65 VII. CONCLUSION
ABSTRACT
The aim of investors of any stock is to earn reasonable returns. This paper presents a framework on share price
movement and investigates the factors determining and predicting the share prices in Indian stock market through
big data approach. This study is also trying to focus on the fundamental factors, technical factors and sentimental
factors that stimulate the share price movement. The methodology used mainly focuses on the implications of the
theory of financial markets and features affecting the share price movement. Stock market is one of the burning
areas where data is growing day by day. Big data Analytics is a very promising area and buzzword for the next
generation information technologies. Because of the heterogeneity and other complexities of data, big data
architecture and design, is needed which specifically deals with the stock market data and analyze the heterogeneous
data for the future prediction of the market. Variety and large Volume of factors exists. Moreover, the velocity with
which data generates and the effect of them in the share price movement emphasizes, role of big data in predicting
the share prices in Indian Stock Market.
Keywords : Stock Market, Big Data, Stock valuation model, Technical, Fundamental and Sentimental Factors
CSEIT1838116 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 63-69 ]
63
Nitha K. P., Dr. S. Sivakumari Int J S Res CSE & IT. January-February-2019 ; 5(1) : 63-69
after tax of the company for any financial year associated with the matching price chart of the
after payment of preference dividend. The equity security. Technical indicators offer many uses such
shareholders are the sole appellants to the net as confirm the trends, generate buy/ sell signals,
earnings of the corporation after making forecast the trend of future prices. Technical
payment of dividend to the preference analysis is a technique, which gives an idea about
shareholders. The significance of this ratio flows future share prices of selected companies in which
from the fact that higher the earnings per share we invest. Based on the knowledge of technical
the more is the scope for a higher rate of analysis one can predict the perfect investment
dividend and of retained earnings, to build up decision of the stock market. By using the nominal
the internal power of the company. pointers, the future market of securities will know
3) Dividend per share (DPS): Dividend is the in which stock to invest. The more accurate
portion of the profit after tax, which is prediction of stock prices of selected companies the
distributed to the shareholders for their investor to carry out fundamental analysis of stock
investment bearing risk in the company. It has a prices, they can predict of future trend of stock
significant influence on the market price of the prices.
share. DPS shows how much the company has
paid out as dividend. It refers to the actual 1) Moving Averages: Most visual aids shows a lot of
amount of dividend (gross) declared per share. discrepancy in price movement. This can make it
The net profit after taxes belong to shareholders difficult for traders to get an idea of a security’s
but the income that they really receive is the overall trend. One simple method traders use to
amount of earnings distributed and paid as cash combat this is to apply moving averages. A
dividend. moving average is the average price of a security
4) Price Earnings Ratio (P/E ratio): This ratio over a set amount of time. They smooth a data
enables an investor to make appropriate series and made it easier to spot tendencies,
calculation of the time required to cover the something that is especially helpful in volatile
investment in a company’s stock. P/E ratio markets.
expresses the relationship between the market 2) Simple Moving Average (SMA): A simple moving
price of a company’s share and its earnings per average is formed by computing the average
share. It indicates the extent to which the (mean) price of a security over a specified
earnings of each share are covered by its price number of periods. For example: a10 day moving
average(SMA) is taken as the closing prices for
B. TECHNICAL FACTORS the last 10 days added together and dividing the
total by 10.
Technical indicators are mathematical formulas 3) Exponential Moving Average (EMA): Exponential
that, when applied to security prices clearly flash moving average is the moving average that is
either buy or sell indications. Price data includes formed by applying weight to the recent price
any combination of the open, high, low, or close changes.
over a period and most of the indicators use only the
closing prices, technical indicators are usually EM A(c) = ((price(c) EM A (p) ∗ K) + EM A (p))(1)
shown in a graphical form above or below a
security’s price chart for the analysis. Once shown Where c=current, p=previous
in graphical form, an indicator can then be
The formula for the smoothing constant K is: polarity” sentiment classification looks, for
instance, at emotional states such as “angry,”
K = 2/ (1 + N) (2) ”sad,” and “happy.”
Where, N = number of periods for EMA Existing methods applied to extract the sentiment
4) Relative Strength Index (RSI) : The relative analysis, which grouped mainly into four
strength index (RSI) is an extremely useful categories: keyword spotting, lexical affinity,
oscillating momentum indicator that was statistical methods, and concept-level techniques.
developed by J. Welles Wilder and is one of the Keyword spotting categorizes text based on the
presence of unambiguous affect words such as
most widely used indicators in technical analysis.
happy, sad, afraid, and bored. Lexical affinity
RSI oscillates between zero and 100. The most
detects an affect words and assigns a probable
popular is the 14 days RSI where the RSI is
affinity to particular emotions. Statistical
calculated based on 14 days values. Traditionally methods has control on elements from machine
the stock is considered to be over bought when learning such as latent semantic analysis, support
RSI is above 70 and over sold when RSI is below vector machines, “bag of words” and Semantic
30. Signals can also be generated by looking for Orientation Point-wise Mutual Information.
divergences and central line crossovers. The
basic formula is: Concept-level approaches leverage on elements
from knowl- edge representation such as
RSI = 100[100/(1 + RS)] (3) ontologies and semantic networks and, hence, are
also able to detect semantics that are expressed in
Where, RS = average of upward price change over a a subtle manner, e.g., through the analysis of
select number of days / average of downward price concepts that do not explicitly convey relevant
change over the same number of days information, but which are implicitly linked to
other concepts that do so.The main data sources
C. SENTIMENTAL FACTORS for the sentimental analysis are taken from
Twitter as they provide an API to extract the
Sentiment analysis extracts subjective tweet data from the site. The following features
information in source materials with the help of capture useful characteristic of Twitter and
natural language processing, text analysis and writers for opinion retrieval.
computational linguistics. Sentiment analysis
aims to determine the attitude of a speaker or a II. METHODS FOR STOCK MOVEMENT
writer with respect to some topic or the overall PREDICTION
contextual polarity of a document. The
elementary job in sentiment analysis is to The Support Vector Machine (SVM) been
categorize the feelings of a given text in the recognized as being able to efficiently handle
document, sentence, and the feature/aspect level high dimensional data and has shown to perform
of the expressed opinion in a document, or a well on many classification and clustering
sentence or an entity feature/aspect is positive, techniques
negative, or neutral. Advanced, “beyond 1) Price only: In this method, only past data or
prices predicts the stock movement. The
data.iii) Last part of the architecture is to attain its Stock market is affected by all information. As per
goal, the prediction of the stock price. the efficient market hypothesis, stock market must
react on all of the information. Small and Middle
News and Information flows from any corner have class investors have not such type of resources to
impact on investment. Every second data generated know all happenings instantaneously and take their
for the market and its format is different from positions respectively. Loss fear factor had been
previous dataset. To store and integrate these playing a crucial role for the small and middle class
temporal data for the stock market is the biggest population and that is why they are keeping
challenge. In current scenario, cost required for these distance from the market. Easy availability of this
data is affordable by few big investors. Investors from integrated data from all corners of the globe is the
third and fourth world countries have acute scarcity key issue.
of resources. Big data architecture with latest
technologies will provide easy access of information Due to temporal nature of the data required in the
flow; it is relatively affordable to all investors. Little, stock market, big data architecture ,being
and slow access of information became big reason for implemented in such a way that all data must be
the big loss in the market for small investors. All updated and integrated on timely basis and reports
information need would be integrated very fast and should be generated based on the current
provide information to the small and medium information. To achieve efficient market hypothesis,
investors at very reasonable & affordable cost. these information must reach all participates of the
market. Due to shared resources and other above
Traditional database will not be able to handle and dis- cussed benefits of big data technologies, small
integrate this type of heterogeneous, temporal, investors too have equal opportunity to access
unstructured and dynamic data stored at different excess relevant data. This will increase participation,
places, so a new architecture is required for the participation will increase more investments,
integration of the heterogeneous database. Data will investments will increase more stable market with
not be available at one place or one database and it market hypothesis, more realistic market hypothesis
is in the different format too. It requires an will lead to more accurate prediction of the market
integrated mechanism which provides all temporal and finally it leads to stable and mature market.
data at one place and easy to process for the
decision-making process in desired format. Cloud based big data engine is used to integrate
different heterogeneous and unstructured data. Cloud
based technology will provide all analytical services
to the clients at reasonable costs. Distributed file
systems like HDFS (Hadoop Distributed File System)
and parallel processing in the cloud will increase
efficiency in the processing of data with quick
response. Big data integration will affect greatly on
the growing markets like India. There is no need to
store same data repeatedly. Intermediaries and other
interested parties gain benefits by two ways. First,
Fig. 1. Big Data Analysis Pipeline Architecture they can get data without wasting time and cost as
per their own desired format. Secondly, they exploit
the benefit of other existing assistances of Big or from Tweets for Event Prediction, ,
cloud computing like SaaS, PaaS, and IaaS for International Conference on Intelligent
forecasting the share prices. A model developed based Computing, Communication & Convergence.
on the framework of big data analytics along with the Procedia Computer Science pp: 84 89,July 2015
blend of the fundamental, Technical and Sentimental [7]. Raghavendra Kune1,Pramod Kumar
factors will surely be a promising model for the Konugurthi1, Arun Agarwal,Raghavendra Rao
accurate prediction of stock prices in Indian stock Chillarige and Rajkumar Buyya "The anatomy
market. of Big Data Computing", SOFTWARE:
PRACTICE AND EXPERIENCE,Wiley Online
IV. REFERENCES Library (wileyonlinelibrary.com). DOI:
10.1002/spe.2374,9 October 2015
[1]. V. Sandhiya, T.Revathi, A.Jayashree, A.Ramya, [8]. Dr B Charumathi and Suraj E S "An Artificial
S.Sivasankari "Stock Mar- ket Prediction on Neural Network Approach on Improving
Bigdata Using Machine Learning Algorithm", Relative Valuation Accuracy for Bank Stocks in
Inter- national Journal of Engineering Science India Asian Research Journal of Business
and Computing,Volume 7 Issue No.4,April Management Issue 2 (Vol. 3) Issn: 2321-
2017 9246,2015
[2]. Rupawari Jadhav, M. S. Wakode "Survey : [9]. Kavitha S, Raja Vadhana P, Nivi A N "BIG
Sentiment Analysis of Twitter Data for Stock DATA ANALYTICS IN FINANCIAL
Market Prediction", International Journal of MARKET", IJRET: International Journal of
Advanced Research in Computer and Research in Engineering and
Communication Engineering,Vol. 6, Issue 3, Technology,Volume: 04 Issue: 02 - Feb-2015
March 2017. [10]. Aditya Bhardwaja, Yogendra Narayanb,
[3]. Venkata Sasank Pagolu,Kamal Nayan Reddy Vanrajc, Pawana, Maitreyee Duttaa Sentiment
Challa,Ganapati Panda,Babita Majhi "Sentiment Analysis for Indian Stock Market Prediction
Analysis of Twitter Data for Predicting Stock Using Sensex and Nifty, , 4th International
Market Movements", International conference Conference on Eco-friendly Computing and
on Signal Processing, Communication, Power Communication Systems. Procedia Computer
and Embedded System (SCOPES)- 2016 Science 70 (2015) pp: 85-91
[4]. Varunesh Nichante, Prof. Sulabha Patil "A [11]. Krishna Kumar Singh, Priti Dimri, Krishna
Review: Analysis of stock market by using big Nand Rastogi "The Impli- cations of Big Data in
data analytic technology", International Journal Indian Stock Market", International Journal of
on Recent and Innovation Trends in Computer Applications, Volume 99,Issue:5,
Computing and Communication,Volume: 4 August 2014
Issue: 1,ISSN: 2321-8169,January 2016 [12]. Dr B Charumathi and Suraj E S "Comparing
[5]. Aparna Nayak, M. M. Manohara Pai and Stock Valuation Models for Indian Bank Stocks
Radhika M. PaiPrediction Mod- els for Indian International Journal of Accounting and
Stock Market, , Twelfth International Multi- Taxation, Vol. 2, No. 2, pp. 111-127,June 2014
Conference on Information Processing-2016 [13]. Carson Kai-Sang Leung,Richard Kyle
(IMCIP-2016),pp : 441-449 MacKinnon,Yang Wang "A Ma- chine
[6]. P.G Preethia,V. Umab ,Ajit kumar ,Temporal Learning Approach for Stock Price
Sentiment Analysis and Causal Rules Extraction
ABSTRACT
The usage of smart phones is tremendously increasing day by day. Due to this, Location Based Services (LBS)
attracted considerably and becomes more popular and vital in the area of mobile applications. On the other
hand, the usage of LBS leads to potential threat to user’s location privacy. In this paper, the famous LBS provide
information about points of interest (POI) in spatial range query within a given distance. For that, a more
efficient and an enhanced privacy-preserving query solution for location based, Efficient Privacy-Location
Query (EPLQ) is proposed along with Locality Sensitive Hashing (LSH) reduces the dimensionality of high
dimensional data. Experiments are conducted extensively and the results show the efficiency of the proposed
algorithm EPLQ in privacy preserving over outsourced encrypted data in spatial range queries. The proposed
method performs in spatial range queries and similarity queries of privacy preserving.
Keywords: Location Based Services, points of interest, Efficient Privacy-Location Query, NICT
CSEIT1838110 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 70-73 ]
70
Archana M.S., K. Deepa Int J S Res CSE & IT. January-February-2019 ; 5(1) : 70-73
about the client is one of few parameters that are III. DESIGN GOAL
clear and genuinely simple to quantify and utilize.
This is connected to the term Location-Aware It is very challenging to propose a privacy preserving
Services that may be characterized as context-aware query for implementing LBS over the encrypted
services that use the location of the client to embrace location data. Enhancing Processing of Query (EPQ)
the conduct of the services. It is a unique way of enables the cloud server to perform query processing
Location Based Services in a most broad sense as its without exposing client’s location details. EPQ can
services are connected with location data. insist on a client location coordinate query as per
client’s present location. Practically, the LBS
II. RELATED WORKS
application is mainly developed for the user who
used to search his point of interest such as searching
M. Gruteser et al investigates a complimentary
hotels nearest to him. In this work, the user query is
approach that concentrates on the principle of
secured with the keyword and encrypted. This will
minimal collection. In this approach location-based
accurately identify the requested location and the
services collect and use only de-personalized data
distance between the target locations are classified
that is practically anonymous data. But query
and ranking will be given. Our system provides a
encryption is not done and database is not outsourced.
multiuser environment as any number of users can
log at a time. The following are the three main
M. F. Mokbel introduces Casper; a novel framework
processes of our proposed work.
in which mobile users can entertain location based
services without the need to disclose their private
1. To propose a LBS query scheme which is more
location information. Per query privacy and multi-
efficient and privacy preserving to protect the
location query are absent and inefficient in handling
location data and the user’s request. For this, a
frequent attack are some of the drawbacks of this
hybrid encryption technique to encrypt the
work.
outsourced location data is proposed. This scheme
R Shokri et al proposed an approach that protects the
also supports multiuser cloud environment.
location privacy. In this approach, the mainstream
✓ System Construction Module
approach to protecting the location-privacy of mobile
✓ LBS User Module
users in location-based services (LBSs) is to alter the
✓ LBS Provider Module
users' actual locations in order to reduce the location
✓ Dimensionality Reduction Module – Locality
information exposed to the service provider. This
Sensitive Hashing
method is inefficient in terms of handling frequent
✓ Spatial Range Query For Privacy Preserving
attacks. M. E. Andres et al.
increased. Here, we apply locality sensitive hashing location based queries,” IEEE Transactions on
to reduce dimensionality thereby supporting k- Knowledge and Data Engineering, vol. 26,no.5,
nearest neighbor search. pp. 1200-1210, 2014.
[8]. L. Sweeney, "Achieving k-anonymity privacy
VI. REFERENCES protection using generalization and
suppression,” International Journal of
[1]. Statista, "Number of location-based service Uncertainty, Fuzziness and Knowledge-Based
users in the United States from2013 to 2018 (in Systems, vol. 10,no. 5, pp. 571-588, 2002.
millions),” Statista; 2017.
https://www.statista.com/statistics/436071/locat Cite this article as :
ion-based- service-users-usa
[2]. K. Xie, X. Ning, X.Wang et al., "Recover Archana M.S, K.Deepa , "Enhancing Privacy
corrupted data in sensornetworks: a matrix Preserving Query Retrieval Using Locality Sensitive
completion solution,” IEEE Transactions on Hashing", International Journal of Scientific Research
Mobile Computing, vol. 16, no. 5, pp. 1434- in Computer Science, Engineering and Information
1448, 2017. Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
[3]. M. Li, H. Zhu, Z. Gao et al., "All your Location 5 Issue 1, pp. 70-73 , January-February 2019.
are belong to us: breaking mobile social Available at doi :
networks for automated user location tracking,” https://doi.org/10.32628/CSEIT1838110
in Proceedings of the 15th ACM International Journal URL : http://ijsrcseit.com/CSEIT1838110
Symposium on Mobile Ad Hoc Networking and
Computing, MobiHoc 2014, pp. 43-52, USA,
August 2014.
[4]. J. Shao, R. Lu, and X. Lin, "FINE: a fine-grained
privacy preserving location-based
serviceframework for mobile devices,” in
Proceedings of the IEEE INFOCOM, pp. 244-
252, IEEE, Ontario, Canada, May 2014.
[5]. G. Ghinita, P. Kalnis, A. Khoshgozaran, C.
Shahabi, and K.-Tan, "Private queries in
location based services: anonymizers are not
necessary,” in Proceedings of the
ACMSIGMOD International Conference on
Management of Data (SIGMOD ’08), pp. 121-
132, ACM, 2008.
[6]. B. Gedik and L. Liu, "Protecting location
privacy with personalized k-anonymity:
architecture and algorithms,” IEEE
Transactions on Mobile Computing, vol. 7, no.
1, pp. 1- 18, 2008.
[7]. R. Paulet, M. G. Kaosar, X. Yi, and E. Bertino,
"Privacy preserving and content-protecting
ABSTRACT
Today, due to the enormous growth of data technology in cloud computing, the data owners are stimulated to
outsource their data in data management to reduce cost and for the convenient. Data confidentiality, in general,
can be obtained by encrypting the data before it is outsourced. The client stores the encrypted data to the cloud
using Searchable encryption schemes and applies keyword search techniques over cipher text domain. But the
main problem in outsourcing is the lack of security and privacy for the sensitive data. So, to overcome this, for
privacy requirement, the sensitive data can be encrypted before it is outsourced. Various methods were
proposed to preserve the privacy and to provide security to the cloud data which are encrypted. Here in this
paper, we proposed a tree-based search method over the encrypted datain the cloud that supports dynamic
operation and multi-keyword ranked search. Clearly, the commonly used “inverse document frequency (IDF)
term frequency (TF)” model and the vector space method are joined in the query generation and index creation
to give multi-keyword ranked search. To get high search efficiency, a tree-type index structure, “Greedy Best-
first Search” algorithm is proposed based on the tree- index.
Keywords : Cloud Computing, Security, Multi Keyword Search, Greedy Best First Search, Inverse Document
Frequency, Term Frequency
CSEIT1838111 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 74-78 ]
74
Bibin Baby, Sharmila Banu Int J S Res CSE & IT. January-February-2019 ; 5(1) : 74-78
are widely used on the plaintext records, cannot be vector space model supporting solidified and
immediately implemented at the encrypted records. particular document look. The searchable file is
Downloading all of the statistics from the cloud and fabricated utilizing Multidimensional B tree. Its
decrypt regionally is impractical. On the opposite, limitations are the likeness rank score of the record
greater sensible unique motive solutions, including vector completely relies on upon the kind of the
searchable encryption (SE) schemes have made report Jiadi [7] proposed this pursuit utilizing two
unique contributions in phrases of performance, round searchable encryption (TRSE). The withdrawal
capability and safety. and restricting is utilized to diminish figure content
size, still the key size is too extensive. The
II. RELATED WORKS correspondence elevated will be high, if the
scrambled trapdoor's size is too vast. It doesn't make
This section discusses the literature survey of various powerful searchable file redesign. These are some of
papers related to Multi-keyword ranked search over the drawbacks of this method.
encrypted cloud data in cloud. It describes the
research work already done by the authors III. PROPOSED METHODOLOGY
corresponding to searchable encryption in cloud
computing. In this section, the Dynamic Multikeyword Ranked
Search for Plaintext (DMRSP)method is explained for
Qin Liu [3] proposed the pursuit that gives catch implementing our proposed method. Based on the
phrase protection, information protection and vector space model and Best First tree based indexing,
semantic secure by open key encryption. The main DMRSP is constructed. Apart from this, a secure
drawback of this system is the correspondence and search scheme, Simple DMRS (SDMRS) is also
computational expense for encryption and decoding explained.
is more. Cong Wang [4] proposed seek which
unravels preparing overhead, information and 3.1 Index Construction using Best First Search
catchphrase security, least correspondence and .
calculation aeronautical. The information proprietor
The search algorithm, Best-first search explores
assemble list alongside the catchphrase recurrence
a graph by increasing the most likely node chosen as
based importance scores for documents. Butit doesn't
per the specified rule.
play out numerous catch phrase seeks and Minimal
overhead in record building. C Wang et al [5] Judea Pearl explains best-first search as calculating
proposed that searchable encryption idea agree to the the promise of node ‘n’ by a "heuristic evaluation
client to solidly search for over scrambled function. It may depend on the depiction of n, the
information through watchwords without first goal and the information gathered. It also collects
applying decoding on it. But this system is too slow in additional knowledge about the problem domain.
processing the request and is not suitable for huge A priority queue is the efficient way of selecting the
volume of data. best candidate.
1. If the heuristic of successor is best, then the For achieving this, we need to visit all nodes before
successor is put at the front of the queue and we reach the destination. Since priority queue uses
restarts the loops. Max or Min heap, insert and delete operations takes
O(log n).So the performance of the algorithm highly
2. or else, insert the successor into the queue
depends on evaluation function or the cost is
designed.
The algorithm for Best first search is explained below
for the following fig. 3.1 IV. RESULT DISCUSSION
4.1 Precision
In the proposed method, dummy keywords affects
Fig. 3.1 Best First Search Tree the search precision. Search Precision can be defined
1. We start from source S and search for destination as
Ith node using Best First search with the given cost.
2. P and Q initially contains S Pkd=kd’= k wherekd’ = top k- documents
3. Remove S and process unvisited neighbors of S to To obtain higher precision, the very small standard
pq deviation σ is set as the random variable for ∑ 𝜀𝑣
4. Now pq contains {A, C, B} (C is put before B
because C has lesser cost) Table 4.1 Storage Consumption of Index Tree
5. Remove A from pq and process unvisited neighbors
of A to pq.
6. Now pq now contains {C, B, E, D} Size of the
1000 2000 3000 4000 5000
dictionary
7. Remove C from pq and process unvisited neighbors
of C to pq. GDFS (MB) 78 151 230 335 400
8. Now pq contains {B, H, E, D}
BFS (MB) 72 137 210 297 380
9. Remove B from pq and process unvisited neighbors
of B to pq.
10. Now pq contains {H, E, D, F, G}
From the above table it is clearly noted that, the
11. Remove H from pq.
memory occupied by Best first search is very less
12 Now return I
compared to the greedy depth first search.
results. This test is repeated 16 times and the average privacy preserving keyword searching for cloud
precision obtained is 93%. The below table gives the storage services,' Journal of Networks and
precision percentage obtained for multi-keyword Computer Applications, vol. 35, no. 3, pp. 927–
V. CONCLUSION AND FUTURE WORK Enabling secure and efficient ranked keyword
search over outsourced cloud data, IEEE
A tree-based search method is proposed over the Transactions on Parallel and Distributed
encrypted data in the cloud that supports dynamic Systems, vol. 23, issue 8, (2012) August, pp.
(IDF)” model and the vector space model are cloud data,' in Proc. of ICDCS'10, 2010.
combined in the index creation and query generation [4]. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, YT,
structure is constructed and for that a “Best First similarity-based ranking, In Proceedings of the
Search” algorithm is proposed based on this tree 8th ACM SIGSAC symposium on Information,
index. The secure kNN algorithm is utilized to computer and communications security, (2013),
encrypt the index and query vectors, and meanwhile pp. 71-82.
ensure accurate relevance score calculation between [5]. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou,
encrypted index and query vectors. From the results, "Privacy-Preserving Multi-Keyword Ranked
it is clearly states that the special structure, tree- Search over Encrypted Cloud Data,' in IEEE
based index can easily achieve sub-linear search time Transactions on Parallel and Distributed
and compact with the insertion and deletion of Systems, vol. 25, no. 1, pp. 222–233, 2014.
documents. Due to the tree-based index, the search [6]. Yu, Jiadi& Lu, Peng& Zhu, Yanmin&Xue,
complexity of the proposed work is basically kept to Guangtao& Li, Minglu. (2013). Towards Secure
logarithmic. The proposed scheme, in practice, can Multi-Keyword Top-k Retrieval over
Encrypted Cloud Data. IEEE Transactions on
ABSTRACT
Cybercrime continues to surge without a slowdown in sight. The cyber security threat continues to worsen. In
the first half of 2018, the number of cyber breaches soared over 140% from a year earlier, leading to 33 billion
compromised data records worldwide. Cyber Security news such as Marriott hack in Nov 2018 is dominating
headlines and becoming a serious headache for business leaders. Malicious outsiders sparked more than half of
the 944 breaches and accounted for roughly 80% of stolen, compromised or lost records. Identity theft
continues to lead data breach types, but financial access incidents are escalating in severity as well. The United
States continues to be the favorite target, and data breaches at major US enterprises continue to grab the
headlines. In 2018, the most notable breaches have occurred at Adidas, FedEx, Jason’s Deli, Macy’s, Under
Armour, Nordstrom’s and the most popular Facebook. [1].
Keywords : Cyber Security, Quantum Computing, Crypto-Agility, Phishing, Cyber Insurance, Phishing attack,
JDLR, Emotional Blackmail, CCO, TalkTalk Data Breach
CSEIT19519 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 79-87 ]
79
Y. V. Sai Bharadwaj Int J S Res CSE & IT. January-February-2019 ; 5(1) : 79-87
concerns are targeted phishing attacks against 2. Ensure you have a proper backup system.
employees, advanced persistent threats, ransom ware, And make sure it is easy to access in case you
denial-of-service attacks and the proliferation of need to restore one piece of the system rather
employees allowed to use their own mobile devices. than the entire system. Enterprise-level cloud
systems can help.
Malware of all types is a huge problem. It is 3. Examine all the entry points into your system
becoming more difficult to combat as cyber-attackers and consider where they are vulnerable.
get more adept at developing software that can evade These include all your workstations,
traditional detection and employ more sophisticated communications and mobile devices as well
malware. For small and medium businesses, one as employee access cards, the internet and
breach often puts a victim out of business. That’s cameras.
because 54% of all cyber-attacks cause financial 4. Assess your system threats. These include
damages exceeding $500,000, the 2018 Cisco SMB client lists, passwords, data logs, backups and
cyber security report shows. That price tag along emails, and anyone who specifically has
with a damaged reputation are hard to survive. If access to the system, including customers and
they do survive, they still face significant system vendors.
downtime that averaged eight hours or more in the 5. Put a prevention system in place to defend
last year. Further, such companies often lack the IT against intruders. Put yourself in the place of
talent, budget and technologies to prevent, uncover the cyber attacker and consider the possible
and respond to an attack. ways the attacker could access your system
and steal your data. If your internal IT staff
2.2. Prevention of Cyber Theft : isn’t experienced enough to handle, entrust a
third-party firm, because the prevention
Unsurprisingly, there is no easy solution – and none
system must cover physical and digital
is likely within the near future – to prevent data
security.
breaches. But all businesses, especially small and
medium sized companies can become better prepared III. Quantum Cryptography: The next-generation of
and more adept at protecting against cyber-crime. secure data transmission
3.1. Issue:
Here are five actions concerning cyber security in
Quantum Computing will render much of today's
small and medium-sized companies that can be taken
encryption unsafe. But Quantum Cryptography could
to become more security-conscious:
be the solution. China has recently successfully tested
– for the first time – its quantum communications
1. Conduct a security audit. Learn how secure
system, which cannot be hacked. [3].
your network and other security systems are,
where vulnerabilities exist and how to
3.2. How does quantum cryptography work ?.
resolve them. If you consider cybersecurity
insurance — currently the fastest-growing
Quantum cryptography provides a secure method for
insurance — or have coverage from a
generating and distributing secret keys between two
business insurer, the insurer can usually refer
parties via an optical network. This is achieved by
you to resources to assist in the audit.
capitalising on the inherent unpredictability in the
state of particles – such as photons or electron – to
generate the random numbers needed for be resolved at the click of a button. Crypto-agility has
cryptographic applications. The technology then never been more important to ensure businesses can
harnesses this to create and share a secret digital key confidently protect themselves and their customers
that can be used to encrypt or authenticate from hackers. This is why organisations must invest
information via streams of encoded single photons, in a credible technology to automate the tracking of
which are sent through an optical communication certificates; it is no longer feasible to do this
network. manually, there are simply too many certificates to
track. Companies focusing too much on protecting
3.3. The arrival of quantum cryptography : usernames and passwords and not enough on
machine identities.
The arrival of quantum computing will ultimately
render much of today’s encryption unsafe. The 4.3. A future-proof solution :
current consensus that public key encryption is an
Google’s decision to distrust Symantec certificates
essential part of data security is starting to be
doesn’t need to be the end of the world. If companies
questioned in the face of new attack strategies –
are able to manage all their machine identities
which is subsequently driving uptake of robust
centrally and automate the process, it will enable
quantum cryptography solutions and services to
crypto-agility and ensure they can migrate quickly
deliver better data security. As a result, the global
when a flaw or vulnerability is discovered. By doing
quantum cryptography market is forecast to grow
so, companies can insulate themselves against the
from USD 285.7 Million in 2017 to USD 943.7
volatility of the CA market, protect their reputation
Million by 2022, a Compound Annual Growth Rate and ensure business continuity for online services.
(CAGR) of 27 per cent according to Research and
Markets. In reality, however, as things stand today V. What is phishing ?
quantum cryptography is not quite so close to
mainstream fruition.
The word ‘phishing’ was invented as a homophone of
IV. Crypto-agility: the key to ensuring long term ‘fishing’ as it involves creating a bait to lure
website security victims. Typically it involves an email; although
4.1. Issue : sometimes a telephone call – called Vishing – or a
In the age of the internet, you simply cannot afford text – called Smishing. These emails are often
to do business without being online, and keeping credible enough to deceive the recipient into clicking
your website secure should be a top priority [4]. on a link which could then release malware – viruses,
worms, Trojans or bots – onto the recipient’s
4.2. Crypto-agility to the rescue : computer or take the victim to a fake website.
This is why organisations need crypto-agility – i.e.
the ability to manage machine identities in real-time. 5.1. How to protect against phishing :
Crypto-agility enables businesses to quickly identify
The following are the tips against phishing.
and replace certificates in bulk when security events
or business needs call for it. Currently, many
organisations take days or even weeks to find and
replace certificates, which isn’t conducive to ensuring
5.1.1. Never, ever follow suspect links
security. By automating the process, this process can
There is no 100% guaranteed way to detect phishing If attachments with unknown file extensions (or PDF
but, if there is the slightest suspicion that the email files) suddenly appear as an e-mail attachment, it is a
may be fraudulent, do not click on any links it clear indication that something is wrong – especially
contains. Always enter the sender’s website address if you haven’t had any previous dealings with the
(not the link in the email) directly into your browser. sender.
Be warned if the part after the ‘at’ sign @ in an email Most companies address their customers by name.
address doesn’t match the purported sender; for But if the name is missing, misspelt or if there is no
example, if ‘PayPal’ sends you an email name at all and it just says something like ‘Hey’ or
from paypal@emails.com or the URL is misspelled ‘Dear Customer’, it could be an indication that this is
as www.paypa1.com or something similar. This is a a fake email.
(fake) website owned by a cyber squatter. Some of
the most well-known companies in the world have 5.1.7. Trust is good but control is better
website impersonators including Facebook, Google,
DropBox and PayPal. By regularly checking your bank statements, you can
mitigate any potentially serious consequences of a
5.1.3. Don’t give in to emotional blackmail phishing attack. Any suspicious or unknown
transactions should be reported directly to the bank
Phishing mails almost always contain the same kind or credit card company immediately.
of content and requests. Sometimes, they ask you to
update your user account or password. But 5.1.8. Keep yourself up-to-date on current scams
sometimes they use psychology to get you to react:
the notification of a big lottery win, an offer to take Take the time to read up regularly on ways to protect
part in a once-in-a-lifetime business opportunity or, your digital safety. If you hear that a service provider
an appeal for a donation to a charity. has been hacked, be sure to follow their instructions
and change your password.
5.1.4. Banks never want to know this
5.1.9. Only use secure websites
There are some things that your bank will never ever
ask you. They don’t want your passwords or PINs to When conducting online transactions, go directly to
be sent by e-mail or text; they don’t want you to the website. If the special offer is genuine, it will be
authorise the transfer of funds to a new account; and available on the website. Look for a sign that the site
they don’t want you to meet a bank representative at is secure, such as a white padlock icon on the
your home to collect cash, bank cards or anything browser’s status bar or a “https” URL (where the “s”
else. stands for “secure”).
ensure that you are blocking new viruses and The following are the cyber security trends and issues
spyware. (more stringent regulation, creations of new roles
etc.,) the world can expect in 2019: [ 6 ].
5.1.11. Click in haste, repent at leisure
6.1. Cyber security regulations improvement
Many phishing e-mails put pressure on you to act
quickly or else, they threaten, something bad will
happen or you will miss out on something very
We need to see a continuing improvement in the
important. A ‘bank‘ might warn you that your
relevant regulations as apply to cyber security. The
account will be closed unless you act quickly; or a
dynamic and fast-moving nature of cyber security
company might tell you that you have won a major
outpaces regulation which is far too slow and clumsy
cash prize, but only if you can claim it in the next 24
to be of any benefit and might actually hinder
hours. Don’t act in haste. Take your time to satisfy
security by building a culture of compliance with
yourself that the message is genuine.
regulations and a false sense of security against
enemies who are agile, motivated, and clever.
5.1.12. Genuine messages don’t make threats
vulnerabilities are exposed — could there be a repeat the Deep Web, in order to successfully hide and to
of the Mirai Botnet in 2019?. Indeed, the next communicate with other criminals.
generation of AI-powered attacks will be crafty
enough to emulate the behaviours of specific users to 6.8. Breaches will get more complicated and harder to
fool even skilled security personnel.This might beat
include the ability to craft complex and bespoke Cybercriminals will look to grow their malicious
phishing campaigns that will successfully fool even activities using malicious code in ever more devious
the most threat-conscious among us. ways.Such a ransomware variant has already been
discovered using an innovative system to increase
6.5. Attackers will continue to target consumer infections: the software turns victims into attackers
devices by offering a pyramid scheme-style discount.If the
Ransomware is a recognised problem for companies victim passes on a link to the malware and two or
of all shapes and sizes, epitomised by the large scale more people install this file and pay, the original
WannaCry attack that decimated the UK’s National victim has their files decrypted for free.
Health Service (NHS) and organisations around the
world. In 2019 and beyond, will we start to see 6.9. Cyber risk insurance will become more common
consumers being targeted across a range of connected This type of insurance will increasingly become part
objects? This is a likely scenario, with examples of operational risk strategy however, the insurance
coming out of child predators targeting IoT devices in industry needs to tailor products specific to client
toys (designed for children). Attackers might even needs and not just provide blanket cover as
target the smart TV in your house via a ransomware extensions to existing risks. As the industry evolves
attack that would require you to pay a fee to unlock we might see cyber insurance covering for loss of
it. reputation and trust with their customers, loss of
future revenue from negative media or other
6.6. Attackers will become bolder, more commercial exposure, and improvement costs for security
less traceable infrastructure or system upgrades.
connection between the board and the rest of the 7.3. Raise awareness, stay vigilant :
company. Awareness should always underpin your prevention
plan. SMEs are often targeted as the way in for
financial attacks through phishing or impersonation
with the aim to extract financial data or currency.
VII. Cyber security prevention plan :
This is often due to it being easier to take advantage
of human behaviour to target specific individuals
While there is no simple, singular solution to combat
who may not have had the right training. Whether
hack attacks and deter criminals, a layered
it’s lack of awareness or just lazy decisions, they need
prevention plan is crucial. There are five main steps
to be properly trained on the risks and repercussions,
that a company should take to prevent serious
along with potential hacking tricks as the majority of
damage from a cyber attack. They are as follows. [ 7 ]
malware still requires a human action to initiate it.
7.1. Assess your current cyber hygiene :
companies improve their cyber hygiene. It’s an help protect the network and users from would be
essential requirement for any business bidding on attacks such as anti-virus, anti-spam and business
government contracts, but it’s beneficial for any grade firewalls. Businesses should always invest in a
company, as it’s believed to reduce the risk of an layered defence strategy, as the more comprehensive
attack by up to 80%. It results in a certification which the set up is, the less chance an attack will succeed as
demonstrates a commitment to protecting business it has to pass through the various layers. Avoid free
and stakeholder data from threats – crucial for products and solutions which claim that they can
building customer trust. The scheme covers all keep malware off your PC. Windows Defender, for
essential controls such as firewalls, malware instance, doesn’t stop adware or Potentially
prevention and up-to-date software. Unwanted Programs (PUP) and doesn’t possess the
accuracy and effectiveness that more sophisticated
7. 2. Good housekeeping : prevention tools do. Paid-for prevention tools are a
small price to pay for the reassurance of digital safety.
There’s no replacement for the basics. Updates and
The cost of a hack to a business would be much more
patching should be performed regularly —
than the cost of the prevention technology.
WannaCry, the ransomware that caused chaos across
the world, exploited unpatched Windows systems to
7.5. Better safe than sorry :
spread malware. Businesses should steer away from
legacy systems like Windows XP, as these no longer While it’s important to be proactive, businesses need
receive updates and are especially vulnerable to a recovery plan in place in the event of a disaster or
attack. Get in the habit of conducting regular routine any downtime. A staggering 60% of businesses that
maintenance and audits, and seek a service provider encounter an attack go out of business in their first
if necessary, which can use specialist software to year, because of attacks to their network and users.
block ransomware strains. While the big dogs like the NHS, Sony and Equifax
dominate the headlines when they suffer attacks, it’s
the Small & Medium Enterprises (SMEs) that are
secretly suffering the worst due to factors such as the
human element and not prioritising investments, as claim while operations are down and sales are halted.
mentioned above. There could be consequential damages if this causes
supply chain issues with its partners who are not
Under General Data Protection Regulation (GDPR) receiving necessary component parts, thereby leading
legislation, you must have a plan in place to be able to third party claims. That's why cyber insurance can
to restore data, whether it’s a cyber attack, file be a smart precaution for any size business.
corruption or simple data loss, otherwise you risk
non-compliance. IT continuity is the bread and 8.1. What is cyber insurance?
butter of so many businesses, and you must make
Cyber insurance generally covers your business'
sure that you have a backup and business continuity
liability for a data breach involving sensitive
plan to prepare, should the worst happen. Seek
customer information, such as Social Security
Disaster Recovery as a Service (DRaaS) to protect
numbers, credit card numbers, account numbers,
critical business data and get operational again after a
health records etc., General liability insurance covers
disaster.
bodily injuries and property damage resulting from
your products, services or operations. Cyber
While there is not a simple, singular solution to
insurance is often excluded from a general liability
combat hack attacks and deter criminals, a layered
policy.
prevention plan is crucial. Follow these steps, and
data misuse and abuse can be minimised, while still
8.2. Cyber insurance coverage :
enabling your business to take advantage of the
The cyber insurance covers the following.
growing opportunities the internet can harness.
your employees regarding phishing and spam emails. Cite this article as :
These act as an entryway for malware, so one should:
Y. V. Sai Bharadwaj, Sai Bhageerath Y.V, Prof.
• Use reliable, well-known security and antivirus Y.V.S.S.S.V. Prasada Rao, "Cyber Security,
software Challenges, Some Practical Solutions", International
• Make sure devices update automatically Journal of Scientific Research in Computer Science,
• Don’t click on email attachments from an Engineering and Information Technology
unknown source (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
• Don’t add people to your social media network 79-87, January-February 2019.
unless you know them Available at doi :
• Don’t use apps or software from free sites – Buy https://doi.org/10.32628/CSEIT19519
them from the official website instead Journal URL : http://ijsrcseit.com/CSEIT19519
• Routinely change passwords, making sure they
contain a unique combination of numbers and
letters (in both upper and lower case)
• Don’t use old, unsupported browsers
X. REFERENCES
ABSTRACT
Prediction of reservoir yield is an important for fisheries managers to use appropriate scientific management
practices to increase the fishery production. Many mathematical or applied mathematics and Artificial Neural
Networks models were developed to predict fish production forecast of reservoirs. Ecology of reservoirs is
dynamic, extraordinarily advanced and nonlinear in nature. There are several drivers have an effect on the
fisheries, both internal and external environmental parameters. Many researchers have assessed fish yield
potential based on leaner models using multiple linear regressions. Accurate modelling to predict fish yield of
the reservoirs and lakes helps to understand behaviour of the system and managers can formulate appropriate
management practices to improve fish yield. This paper provides an in-depth review on existing model
developed from simple empirical estimation to high-level non-linear model for assessing fishery potential of
lakes and reservoirs.
Keywords : Fish Yields, Artificial Neural Network, MEI, CPUE, EBP, Automata Networks
CSEIT195110 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 88-100 ]
88
D. Karunakaran, M. Balakrishnan Int J S Res CSE & IT. January-February-2019 ; 5(1) : 88-100
Ecology of reservoirs is dynamic, very complex and calculated (Wijayaratne and Amarasinghe, 1984;
nonlinear in nature. There are many drivers Nissanke et al., 2000) and (Hasan et al., 2001)
influencing the fisheries both internal and external predicted fish yield based on chlorophyll-a, Secchi
environmental parameters. Many researchers have depth and morpho-edaphic index in Bangaladesh.
tried to assess fish yield potential based on leaner
models by using multiple linear regression analysis
techniques (Jowett, 1993). These empirical models Others have found that phytoplankton production
are capable of solving many linear problems, but can predict fish yield more accurately (Oglesby,
some time it cannot give accurate results when 1977) or total phosphorus and macro benthos
relationships among the variables are non-linear in biomass/mean depth found to be the best predictors
nature. Advance tools like neural network, fuzzy of fish yield better than MEI (Hanson and
logic, wavelet transform and genetic algorithm will Legget,1982). Surface area alone or Lake Shoreline
give better and accurate results for non-linear development is useful predictor variables of fishyield
problems. in North American lakes (Youngs and Heimbuch,
1982). Hrbacek (1969) found that significant
II. PREDICTION OF FISH YIELD USING correlation between primary production and carp
EMPIRICAL MODEL yield in European ecosystems. Melack (1976) and
Toews and Griffith (1979) reported that primary
Many researchers predicated fish yields in lakes and production is an estimator of fish yield. Stocking
reservoirs for the last 70 years using simple empirical densities of fingerlings in inland reservoirs can be
estimation. Rawson (1952) demonstrated the first calculated based on estimation of potential fish
model to estimate fish yields of lakes based on mean production using morpho-edaphic index (MEI)
depth. Some others also tried to assess fish yield (Welcomme, 1976). Surface area can alone be the
potential from biotic and morphometric parameters best predictor of fish yield reported by researchers
(Hayes, 1957; Northcote and Larkin, 1956). Ryder from North American lakes (Youngs and Heimbuch,
(1965) improves existing estimation further by 1982).
developing morpho-edapic index (MEI) by using total
dissolved solids or conductivity/depth using 23 Models have been developed using reservoir depth,
temperate lakes. Later many researchers used other volume and area for estimation of fishery yield
dependent variables such as lake surface area, (Rawson, 1952; Jenkins and Morais, 1971; Moreau
temperature and other parameters along with MEI and De Silva, 1991). Downing et al., (1990) reported
for prediction of fish yields in lakes and reservoirs in annual phytoplankton production correlated (r2=
many countries. (e.g. Toews & Griffith, 1979; Jenkins, 0.79) than MEI, total phosphorus concentration and
1982; Schlesinger & Reglier, 1982; Machena & Fair, macro benthos biomass/mean depth, were the best
1986). Ryder (1965) applied this method in Canada. univariate predictors of fish yield (r2= 0.84 and r2=
Matuszek (1978) used mean depth and total dissolved 0.48, respectively). Hanson and Leggett (1982)
solids concentration of large North America lakes. reported catchment land use patterns are key
Morpho-edaphic index along with soci-economic parameters for fish yield prediction of reservoir (De
variables such as numbers of fisher men, boat and Silva et al., 2001). Rawson (1938) grouped lake
effort are used to predict yield of African lakes productivity parameters in three groups i.e climatic,
(Henderson and Welcomme, 1974). Maximum morphometric, and edaphic
Sustainable fish yield of Sri Lanka reservoirs were
network is highly popular because of similarity in Mediterranean Sea using ANN. The input variables
biological systems and has anability to learn from are biomass/abundance ratio, depth of the water
experiences and improving its performance. It is a column, latitude and longitude, and
very powerful tool for modelling non-linear and monthlysampling of675 sample stations of North
complex, imprecise and noisy data. It has an ability to Aegean Sea.Error back-propagation (EBP) algorithm
manipulate large amounts of data and generalize is used to learn the network.
results.
Baran, Pet.al.(1996) developed stochastic models to
A. Prediction of Fish Yields in Lakes and Reservoirs predict trout population density or biomass on a
using Artificial Neural Network mesohabitat scale using neural networks.
Backpropagation algorithm was used to train habitat
ANN have been used in many ecological modeling, variables width, gradient, mean depth, coefficient of
phytoplankton production (Scardi, 1996), fish species variation of depth, mean bottom velocity, coefficient
richness prediction (Brosse, Set al., 1998), and of variation of bottom velocity, froude number, area
prediction of density and biomass of various fish of cover, area of shelter, pool deep water area and
populations (Baran et al., 1996; Lek et al., 1996a,b; elevation. The result shows that the back propagation
Mastrorilloet. al., 1997). Many authors have reported neural network estimatedmore accuratelythan the
that ANN predicts more accurate than multi leaner multiple regression.
regression (Ehrman et al .1996; Leket. al. 1996b;
Scardi1996). Brosse, S. et. al. (1999) predicted fish spatial
occupancy and abundance in a mesotrophic reservoir
Laë, R., Lek, S., & Moreau, J. (1999) predicted fish using Artificial Neural Network.The input databased
yield of African lakes using Artificial neural networks on 306 observations collected using electrofishing.
using six input variables such as catchment area, The relationships between physical parameters and
maximum area, fishing effort, conductivity, depth, the abundance fish species are studied. Eight
altitude and latitude. The structure of the feed independent environmental variables depth, distance
forward neural network is six input neuron with one from the bank, slope of the bottom, flooded
hidden layer of five neurons, sigmoid functions, and vegetation cover, percentage of boulders, percentage
backpropagation algorithm for the training of the of pebbles, percentage of gravel and percentage of
ANNs. The result shows that correlation coefficients mud are used to quantify fish density. Structure of
between the estimated and observed values were the network is feed-forward with eight input neurons,
significantly very high. one hidden layer with 10 nodes with bias and
Zhang, H., & Zimba, P. V. (2017) developed multi- aoutput layer (8-10-1). The network was trained
layer neural networks to assess effects of estuarine using back-propagation algorithm to predict
freshwater fluxes on fish abundanceusing artificial accurately with minimum error.
neural network. The predictor variable consists of
inflow, evaporation, precipitation and annual catch Scardi, M., et.al (2008) evaluated ecological integrity
rate of fish species of Nueces Estuary. The network of streams and rivers using an expert system based
was trained using Levenberg-Marquardt back fish assemblage model. Twenty-seven environmental
propagation algorithm. Maravelias, C. D., Haralabous, parameters along with fish assemblage composition of
J., & Papaconstantinou, C. (2003) predicted 63 locations in Latium streams and rivers were used
distributions of demersal fish species in the in this study. Neural network was trained using most
popular error back-propagation algorithm. Aoki, I., maximum depth, shoreline perimeter, elevation, total
and Komatsu, T. (1997) predicted the winter catch of dissolved solids, pH, summer stratification (0, 1) and
young Japanese sardine (Sardinopsmelanostictus) littoral-zone predator (0, 1). Artificial neural
from climatic, hydrological and biological parameters networks predicted accurately abundance as well as
in the Joban-Boso Seas of the Pacific coast of central occurrence of fish species.
Japan using neural network. A feed-forward three
layers an input, hidden and an output layer is used. Kılıç, H., et. al (2007) developed ANN models to
Predictor variables are hydrological and biotic predict primary production of reservoir by using
parameters. Hydrological parameters consist of preprocessing technique of an Automata Networks
southern limit of the Oyashio, path type of Kuroshio, (AN) to find suitable variables for subsequent ANN
northern limit of the Kuroshio Extension, sea surface modeling. The AN based preprocessing followed by a
temperature in the northeastern sea area of Japanand ANN application predicted primary productivity
sea surface temperature in the fishing ground. accurately using Chl-a. The correlation coefficient as
Zooplankton, climatic southern oscillation index, far high as 0.83 and RMSE was as low as 2.69g/l was
east zonal index and east sea index are biological achieved withdouble hidden layer structure with 10
parameters. The network trained by back- neurons.
propagation algorithm to predictchanges in the
sardine abundance. Kuo, J. T., Hsieh, M. H., Lung, W. S., & She, N. (2007)
predict reservoir water quality using Artificial Neural
Joy, M. K., & Death, R. G. (2004) developed Network with back-propagation algorithm. The input
predictive model and spatial mapping of decapod variables are dissolved oxygen (DO), total phosphorus
assemblages using combination of GIS and neural (TP), chlorophyll-a (Chl-a), and secchi disk depth
networks. Single hidden-layer feed forward multi- (SD). Results show that correlation coefficients
layer perceptron trained by back propagation error between predicted values and measured data are 0.7
algorithm are used in this network. Catchment area, with reasonable accuracy.
average catchment elevation, elevation upstream end
of reach, average catchment slope, average annual IV. CONCLUSION
catchment rainfall, average catchment air
temperature, estimated river flow, reach length, Prediction of reservoir and lakes fish yield is the
latitude, stream order, catchment rainfall, distance important factor for the fishery managers to improve
from the coast, lake catchment area, catchment land the decision-making processes of reservoir fishery
use proportion and catchment geology proportions management and use appropriate management
(surface rock) are input variables. The decapod was practices to enhance the fish production. There is
predicted with high degree of accuracy from extensive literature available over the past decade on
geospatial landscapepredictor variables. prediction of fish yield in reservoir and lakes both in
linear and non-linear models. Many authors reported
Olden, J. D., & Jackson, D. A. (2001). Developed fish– that Artificial Neural Network model is giving high
habitat models for nine fish species using Artificial level of accuracy than Multilinear Regression Model.
Neural Networks. The study was conducted using
data of 128 lakes from the Madawaska river drainage
and 32 lakes from the Oxtongue river drainage of
Canada. The habitat input variables are area,
neural networks to modelling nonlinear [47]. Natarajan, A.V., 1977.Fifth Workshop of AICP
relationships in ecology. Ecological modelling, on Ecology and Fisheries of Freshwater
90(1), 39-52. Reservoirs. Ukai, 7-8 September, 1977.
[38]. Liang, Y., Melack, J. M., & Wang, J. (1981). [48]. Natarajan, A.V., 1979. Ecosystem oriented
Primary production and fish yields in Chinese approach for reservoir fisheries development in
ponds and lakes. Transactions of the American India. Souvenir on the ICAR Golden Jubilee
Fisheries Society, 110(3), 346-350. Year, CIFRI, Barrackpore, West Bengal, Part I,
[39]. Machena, C., & Fair, P. (1986). Comparison of 107-111.
fish yields from prediction models between [49]. Nissanka, C., Amarasinghe, U. S., & De Silva, S.
Lakes Tanganyika and Kariba. Hydrobiologia, S. (2000). Yield predictive models for Sri Lankan
137(1), 29-32. reservoir fisheries. Fisheries Management and
[40]. Maravelias, C. D., Haralabous, J., & Ecology, 7(5), 425-436.
Papaconstantinou, C. (2003). Predicting [50]. Northcote, T. G., & Larkin, P. A. (1956). Indices
demersal fish species distributions in the of productivity in British Columbia lakes.
Mediterranean Sea using artificial neural Journal of the Fisheries Board of Canada, 13(4),
networks. Marine ecology progress series, 255, 515-540.
249-258. [51]. Nürnberg, G. K. (1996). Trophic state of clear
[41]. Matuszek, J. E. (1978). Empirical predictions of and coloured, soft-and hard water lakes with
fish yields of large North American lakes. special consideration of nutrients, anoxia,
Transactions of the American Fisheries Society, phytoplankton and fish. Lake and Reservoir
107(3), 385-394. Management, 12(4), 432-447
[42]. McConnell, W. J., Lewis, S., & Olson, J. E. [52]. Oglesby, R. T. (1977). Relationships of fish yield
(1977). Gross photosynthesis as an estimator of to lake phytoplankton standing crop,
potential fish production. Transactions of the production, and morphoedaphic factors. Journal
American Fisheries Society, 106(5), 417-423. of the Fisheries Board of Canada, 34(12), 2271-
[43]. Mehrotra, S. N., &Jhingran, A. G. (1986). 2279.
Evaluation of limnological characteristics and [53]. Olden, J. D., & Jackson, D. A. (2001). Fish–
trophic status of Gulariya Reservoir. Proc. Nat. habitat relationships in lakes: gaining predictive
Acad. Sci. India, 53, 204-210 and explanatory insight by using artificial neural
[44]. Melack, J. M. (1976). Primary productivity and networks. Transactions of the American
fish yields in tropical lakes. Transactions of the Fisheries Society, 130(5), 878-897.
American Fisheries Society, 105(5), 575-580. [54]. Peters, R.H. (1986). The role of prediction in
[45]. Moreau, J., & De Silva, S. S. (1991). Predictive limnology.Limnol.Oceanogr. 31: 1143-1159.
fish yield models for lakes and reservoirs of the [55]. Quiros, R. (1990). Predictors of relative fish
Philippines, Sri Lanka and Thailand (No. 319). biomass in lakes and reservoirs of Argentina.
Food & Agriculture Org. Canadian Journal of Fisheries and Aquatic
[46]. Natarajan, A.V., 1976. Ecology and state of Sciences, 47(5), 928-939.
fishery development in some of the man made [56]. Raju, M. M., Srivastava, R. K., Bisht, D., Sharma,
reservoirs of India. In: Symposium on the H. C., & Kumar, A. (2011). Development of
development and utilisationof Inland Fishery artificial neural-network-based models for the
resources, Colombo, 27-29 October 1976. simulation of spring discharge. Advances in
Artificial Intelligence, 2011.
[57]. Ramakrishnaiah, M., & Sarkar, S. K. (1982). S.H. Abidi, N.K. Thakur, R.S. Birader and L.
Plankton productivity in relation to certain Shenoy.(eds.) Vision on Indian Fisheries of 21st
hydrobiological factors in Konar reservoir Century. Central Institute of Fisheries
(Bihar). Journal of the Inland Fisheries Society Education, Bombay.
of India, 14(1), 58-68. [68]. Toews, D. R., & Griffith, J. S. (1979). Empirical
[58]. Ramakrishniah, M. (1990, October). estimates of potential fish yield for the Lake
Morphodrainage index, a fish yield predictor for Bangweulu system, Zambia, Central Africa.
Indian reservoirs. In 2nd Asian Reservoir Transactions of the American Fisheries Society,
Workshop, Hangzhou, PR China (pp. 15-19). 108(3), 241-252.
[59]. Rawson, D. S. (1952). Mean depth and the fish [69]. Unni, K.S., 1993.Limnology of Central Indian
production of large lakes. Ecology, 33(4), 513- lakes, reservoirs and ponds – a review. In:
521. Mishra, P.C. and Trivedy, R.K. (eds.). Ecology
[60]. Rempel, R. S., & Colby, P. J. (1991). A and pollution of Indianlakes and reservoirs.
statistically valid model of the morphoedaphic Ashish Publishing House, New Delhi.
index. Canadian Journal of Fisheries and Aquatic [70]. Vollenweider, R.A., 1969.A manual on methods
Sciences, 48(10), 1937-1943. for measuring primary productivity in aquatic
[61]. Rigler, F. H. (1982). Recognition of the possible: environment. IBP Hand Book No. 12. Blackwell
an advantage of empiricism in ecology. Canadian ScientificPub., U.K. 213 pp.
Journal of Fisheries and Aquatic Sciences, 39(9), [71]. Weimin, M., Liu, J., Li, Z., Xie, S., Vass, K.K.,
1323-1331. Sugunan, V.V., Pradhan, G.B., Amarasinghe,
[62]. Ryder, R. A. (1965). A method for estimating the U.S., Weerakoon, D.E.M. and Jutagate, T., 2006.
potential fish production of north‐temperate Status of Reservoir Fisheries in Five Asian
lakes. Transactions of the American Fisheries Countries.
Society, 94(3), 214-218 [72]. Welcomme, R. L. (1976). Approaches to
[63]. Ryder, R. A. (1982). The morphoedaphic resource evaluation and management in tropical
index—use, abuse, and fundamental concepts. inland waters. In FAO, Rome (Italy). Fisheries
Transactions of the American Fisheries Society, Dept. Indo-Pacific Fisheries Council.
111(2), 154-164. Symposium on the Development and Utilization
[64]. Ryder, R. A., Kerr, S. R., Loftus, K. H., &Regier, of Inland Fishery Resources. Colombo (Sri
H. A. (1974). The morphoedaphic index, a fish Lanka). 27 Oct 1976.
yield estimator—review and evaluation. Journal [73]. Welcomme, R.L.,1972. The inland waters of
of the Fisheries Board of Canada, 31(5), 663-688. Africa. FAO, CIFA Technical Paper, 1, 117pp.
[65]. Scardi, M. (1996). Artificial neural networks as Publ. FAO, Rome.
empirical models for estimating phytoplankton [74]. Wijeyaratne, M. J. S., &Amarasinghe, U. S.
production. Marine Ecology Progress Series, 139, (1987). Estimation of maximum sustainable fish
289-299. yield and stocking densities of fish fingerlings in
[66]. Schlesinger, D. A., & Regier, H. A. (1982). fresh water lakes and reservoirs.
Climatic and morphoedaphic indices of fish [75]. Wijeyaratne, M. R. S., &Amarasinghe, U. S.
yields from natural lakes. Transactions of the (1984). Estimations of maximum sustainable fish
American Fisheries Society, 111(2), 141-150. yields and stocking densities of inland reservoirs
[67]. Sinha, M. 1999. Vision of inland fisheries of of Sri Lanka. Journal of the National Aquatic
India of twenty first century. p. 154-168. In: Resources Agency, 31, 65-72.
ABSTRACT
Mobile cloud computing in the increasing popularity among users of mobile device enables to store their data in
cloud. Security is the major concern when the sensitive information is stored and transferred across the internet.
It is essential to make sure that the data is secured and protected. In this paper, we discussed the problem of
privacy of data with reducing the resources usage. Moreover, mobile cloud computing has limitations in
resources such as power energy, processor, Memory and storage. Cryptography ensures the confidentiality,
authentication, availability, and integrity of the data. This is done through cryptographic algorithms such as
Data Encryption Standard (DES), Blowfish and Advanced Encryption Standard (AES). The experimental results
evaluated and compared the performance of the encryption algorithms. The performance metrics used are
encryption and decryption time, CPU and Memory utilization. Evaluation results showed a significant
improvement in reducing the resources, amongst all the techniques, choosing a suitable encryption algorithm
based on different parameters that are best fit to the future user requirements is considered.
Keywords : Mobile Cloud Computing, Blowfish, AES, Security, Privacy, Mobile Device.
I. INTRODUCTION
CSEIT195111 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 101-106 ]
101
K. Kaviya Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 101-106
allocate hardware resources to users in an efficient, can/cannot access the data. The principle of
quick, and smooth way. The supervisor software confidentiality specifies that only the sender and
layer contains the system software to manage the the intended recipient should be able to access
cloud hardware resources. The system software the contents of a message.
permits application software to run and utilize Integrity: The integrity mechanism ensures that
underlying resources in an efficient way.In the the contents of the message remain the same
context of mobile cloud security, cloud providers when it reaches the intended recipient as sent by
should ensure reliability and availability by the sender. It is defined as the rightness of data
integrating security technologies MCC satisfies stored in the cloud. The alterations between two
limitations of resource constrained devices by updates of a record violate the data integrity.
allocating cloud services for the purpose of Security: In the traditional file systems data was
application executions and data storage. So, whenever stored within boundaries, but cloud data is stored
we talk about the security in MCC, it is necessary to outside the boundaries of an organization, say,
consider the security and privacy issues. and third-party storage using strong encryption
techniques.
To secure the mobile cloud environment, several Authentication: Authentication mechanisms help
issues need to be considered regarding the data to establish proof of identities. This process
security, data integrity, data confidentiality, ensures that the origin of the message is correctly
authentication, authorization, network security, data identified.
violation issues etc. A secure framework is essential Non- repudiation: Non-repudiation does not
to protect sensitive data of mobile users with minimal allow the sender of a message to refute the claim
performance degradation. The proposed scheme uses of not sending the message.
data encryption to protect sensitive data leakage. Access Control: Access Control specifies and
When user’s data is transmitted to and stored on controls who can access the process.
cloud, it creates many possibilities of unauthorized Availability: The principle of availability states
access of data either during transmission or from that resources should be available to authorized
storage devices. There are many cryptographic parties all the times.
algorithms to deal with security, but the selection
must be taken by considering security as well as III. CRYPTOGRAPHY
performance improvement, especially in the case of
resource constrained devices. Cryptography is a method of protecting information
and communications with codes so that only those
II. SECURITY ISSUES for whom the information is intended can read and
process it. Cryptography refers to secure information
Data Storage: Cloud storage providers manage the and communication techniques derived from
data in multiple copies across many independent mathematical concepts and a set of rule-based
locations calculations called algorithms to transform messages
Confidentiality: Confidentiality can be defined as in ways that are hard to decipher. Security has always
the sensitive data not being disclosed to been an important term in all the fields. As the paper
unauthorized process, devices and person. A is discussing on cloud storage systems, the proposed
cloud service provider knows where the user’s methodology considers the security required to the
public or private data is located and who data that is stored on the cloud. Cryptography has
come up as a solution to this security issue. block size. It includes 64 bits key that contains 56 bits
Cryptography is classified into symmetric are directly utilized by the algorithm as key bits and
cryptography, asymmetric cryptography and hashing. are randomly generated. The DES algorithm
processes the 64 bits input with an initial
Types of Cryptography permutation, 16 rounds of the key and the final
permutation. The DES was initially considered as a
Secret Key Cryptography: When the same key is strong algorithm, but today the large amount of data
used for both encryption and decryption, DES, and short key length of DES limits its use.
Triple DES, AES, Blow Fish RC5 etc., may be the
examples of such encryption, then that Advanced Encryption Standard (AES)
mechanism is known as secret key cryptography.
Public Key Cryptography: When two different The algorithm explains about by AES is a secret-key
keys are used, that is one key for encryption and algorithm which means of the same key is used for
another key for decryption, RSA, Elliptic Curve both encrypting and decrypting the data. This is one
etc., may be the examples of such encryption, reason why it has a comparably small number of
then that mechanism is known as public key rounds. AES encryption is fast and flexible. It can be
cryptography. implemented on various platforms especially in small
Hash Algorithms where the input data (message) devices. All the operations in this algorithm involve
is recreated from the hash value (message complete bytes for effective implementation. Three
digest/digest) examples include: MD5, SHA, different key lengths such as 128, 192 and 256 block
MD2, MD4, MD6.SHA-256, SHA-512, SHA-1, size are supported by AES.
Whirlpool etc.
Table 4.1 Comparison of Symmetric Algorithms
algorithms. It uses the key length range up to 32-448- CPU Time = I * CPI * T, where I = number of
and 64-bits block. Blowfish algorithm employed 16 instructions in program, CPI = average cycles per
rounds for the encryption process. Each round instruction and T = clock cycle time.
contains a key dependent permutation and key- and CPU Time = I * CPI / R, where R = 1/T the clock rate,
data dependent substitution. Data Encryption T or R are usually published as performance measures
involves the iteration of a simple function of 16 times. for a processor, I requires special profiling software
Each round contains a key dependent permutation and CPI depends on many factors (including
and data dependent substitution. Sub key Generation memory).
involves converts the key up to 448 bits long to 4168
bits. Blowfish is very suitable algorithm for the Performance Calculation
platform of smart phones because of its high security
level and high speed. Seconds/Program = (Instructions/Program) x
(Clocks/Instruction) x (Seconds/Clock)
V. PERFORMANCE EVALUATION METRICS
Memory Consumption Calculation
CPU Time Calculation Total Memory - (Free + Buffers + Cached) = current
total memory usage
Figure 5.2 CPU and Memory comparisons for Encryption and Decryption
ABSTRACT
Search engines play important role in the success of the Web. Search engine helps the users to find the relevant
information on the internet. Due to many problems in traditional search engines has led to the development of
semantic web. Semantic web technologies are playing a crucial role in enhancing traditional search, as it work
to create machines readable data and focus on metadata. However, it will not replace traditional search engines.
In the environment of semantic web, search engine should be more useful and efficient for searching the
relevant web information. It is a way to increase the accuracy of information retrieval system. This is possible
because semantic web uses software agents; these agents collect the information, perform relevant transactions
and interact with physical devices. This paper includes the survey on the prevalent Semantic Search Engines
based on their advantages, working and disadvantages and presents a comparative study based on techniques,
type of results, crawling, and indexing.
Keywords : Semantic Web, Semantic Search Engines, Intelligent Search
I. INTRODUCTION which synchronies and arranges all the data over the
web in a disciplined manner.
The web is a medium for accessing a great variety of So moving from current web to semantic web
information stored in different parts of the world. particularly depends on enhancement of knowledge
Information is mostly in the form of unstructured and overcome the current web issues. Semantic search
data. As the data on the web grows at explosive rates, plays an important role because it intelligently
it has lead to several problems such as increased understands the content and give smart and relevant
difficulty of finding relevant information, extracting results according to the quires. Traditional search
useful knowledge. engines get the answers syntactically accurate but
larger in amount. However, semantic engines provide
Conventional web search engines like Google and accurate information in terms of well-defined
yahoo return thousands of results for users quires expressions. The main aim of semantic web is to lift
because they do not understand the exact meaning of the capacity of users and software agents to find
quires. They uses keyword based search approach, documents, information and knowledge from the web
thus new technology “Semantic Web” comes into and make the content to machine and human
existence, which works on the semantics (meaning) of readable. This is possible by adding the semantic layer
queries. Semantic web offers a smarter web services to the current web.
CSEIT195115 | Received : 10 Jan 2019 | Accepted : 22 Jan 2019 | January-February -2019 [ 5 (1) : 107-115 ]
107
Anita Kumari, Dr. Jawahar Thakur Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 107-115
The organization of this document is as follows. In pyramid. The research provides deep
Section 2 (Literature Survey), literature survey is Understanding of five main semantic search
explained with comparative study. In Section 3 engines based on comparative analysis that may
(Keyword Based Search), keyword based search help for future work for semantic web in general
engines and the limitations are discussed. Semantic and for semantic search engines in particular.
web, approaches to semantic web and few search 4) Nikhil CHITRE [8], analyses the semantic search
engines (Hakia, Falcons, Swoogle, DuckDuckGO and engines generation into the intelligent web. Their
Knigne) and comparison on these search engines are focus is on finding the difference between the
discussed in Section 4(Semantic Web Search) based traditional and semantic search engines. Explains
on few parameters. Section 5 (Conclusion) concludes the various techniques and advantages of few
the paper by providing a summary of all reported important semantic web search engines that has
work in semantic web search. been developed so far.
5) Yi Jin Zhuying Lin, Hongwei Lin [9], states that
II. LITERATURE SURVEY search engines plays important role in success of
web; search engine helps any internet user to
There is significant literature work that has been rapidly find relevant information. Architecture
done on semantic web area. Various authors and of semantic search engine is explained and how
researchers have contributed very well in this area. elements of semantic search engine are used in
performing the fundamental task of information
1) Vidhi Shah1, Akshat Shah [5], concluded that retrieval is explained. An improved algorithm
searching the internet today is a challenge and based on TFIDF algorithm is also proposed.
semantic search engine enhances the traditional 6) Kyumars Sheykh Esmaili, Hassan Abolhassani
web search engines. They discuss various [10], presents a categorization scheme for web
semantic search engines and present a search engines. For each category, components
comparison based on the approaches. are explained according to a proposed general
2) G.Anuradha, G.Sudeepthi et al [6], presents a brief architecture and various approaches are used in
survey of the existing literature regarding these components also represented. It should note
intelligent semantic web search engine that some of these engines are constructed
technologies. Also, review their characteristics through a portal and therefore they have not
respectively. They concluded that existing individual names.
techniques have limitations particularly in terms 7) Ranjana Jain, Neelam Duhan el at [11], states that
of time response, accuracy of results, importance web 2.0 search engines are unable to present
of the results and relevancy of results. An direct answers against the users fired query. Web
efficient semantic web search engines should 3.0 is semantic web using RDF format
meet out these challenges efficiently and organization information in more structure form,
compatibility with global standards of web which helps the semantic search engines to
technology. present results in a more direct way. Also include
3) Maliha Majid Qureshi, Bibi Assma [7], presents these semantic search engines, review their
the semantic search engines and broad survey to working, and compare them based on few factors.
analyze the semantic search engines has done. 8) Jyoti Chaurasia, Jagdish Raikwal[12], states that
Comparative analysis of the semantic search semantic web technology plays an crucial role in
engines has done based on Factors cited in the enhancing traditional web search. They proposed
a semantic search engine based on ontology. An difference between the keyword based and
algorithm is also introduced to overcome the semantic based search engines.
various challenges in the fields of unstructured 10) G.Madhu1 and Dr. A. Govardhan [14], presents a
data using semantic web technology and provide brief survey of the existing literature regarding
the complete description. intelligent semantic search technologies. Review
9) Ankita Malve , P.M. Chawan [13], concluded that their characteristics respectively. In addition, the
semantic based search engine have more issues within the reviewed intelligent semantic
advantages over keyword based search engine in search methods and engines are concluded based
terms of accuracy of getting results. Search on four perspectives differentiations between
process in semantic search engine is based on designers and users’ perceptions, static knowledge
semantics of queries. It provides assurance to user structure, low precision and high recall and lack
to get accurate and relevant results based on of experimental tests.
meaning of word. They also include the basic
TABLE I
COMPARISONS BASED ON LITERATURE SURVEY
III. KEYWORD BASED SEARCH • Low value of Recall and current Precision
parameters.
Search Engines are used to find the information on • More network congestion because multiple
the internet and getting results in less time but it crawlers try to crawl the same web pages form
lacks the existence of the semantic structure so it web servers.
becomes difficult for the machine to understand the • Polysemy words:- engines do not differentiate
meaning of the terms and expressions provided by between the same spelled words having different
the users. As the results, search engines returns the meaning hence give irrelevant pages.
ambiguous data sets. The survey indicate that user do • Stemming: - also these search engines don not
not find the accurate results in the first set of URLs differentiate between the singular and plural
returned because of the increased size of the links on words. Hence may produce the confusion while
the web pages. Because sometime one word has searching a query.
several meanings and several words have same • Synonymy: - it is the problem of understanding
meaning, in this case user will not get the result what the different spelled words with the same
he wanted to search [13]. Semantic web is developed meaning and it produce the confusion while
to overcome the following limitations of the current searching.
web search:- • Lack of semantic understanding [6][13][12].
• These engines are based on the occurrence of IV. SEMANTIC WEB SEARCH
words in the documents, so it is difficult to get
A. Semantic Web
the relevant results.
• Lack of proper semantic structure according to
It is an extension to WWW and international
the representation of information.
certified standard by W3C, which aims in handling
•
mostly unstructured data. It describes the 3) The Third approach focus on natural language
relationship between things and properties of things. understanding.
The main idea of semantic web is to add the metadata 4) The Fourth approach makes use of ontology to
into the current web pages to improve the represent the knowledge about a Particular
description of online resources. domain and expand quires [6][8].
1) SWOOGLE: - It is a crawler-based indexing and 4) KNGINE: - It is intelligent search engine and the
retrieval system for semantic web documents result is divided into either web results or image
(SWD). It uses the crawler to discover the RDF results. They are preceded by the information
and HTML documents. It extracts metadata and about the “concepts”. For instance, attempting to
computes relations between documents. Swoogle find a town can be preceded by using statistics
is also a content-based search engine that used to about the metropolis, nearby points of interest,
analyse, discover, and index the knowledge from activities, climate and hotels. It provides the high
the web. It is based on the page rank algorithm degree of related data to the user’s queries. It
and OWL language [11]. analyze the main keywords from the users
2) HAKIA:- It is a meaning based search engine that queries and form the relations between them and
works on matching the meaning rather than return results. It is a question-answer engine that
keyword match. The searching capacity of this understands the questions and tries to answer
engine is not limited to single keyword; you can with the help of natural language processing and
search sentences, a phrases or questions. This machine learning [8][6].
engine gets the results using equivalent terms. 5) DUCKDUCKGO: -“The search engine that does
Hakia engine essentially builds around mainly not track you” it is a feature rich search engine
three evolving technologies i.e., Sense that gives many reasons to put Google away. It
Repository, Query Indexing Technique and focuses on maintaining user privacy and
Semantic Ranking algorithm [8][6][11]. therefore does not store any personalized search
3) FALCONS: - It is a keyword based ontology results. This engine guaranty that they does not
search engines. It is develop around the concept store users IP address, does not users login
sharing and ontology reusing. It display the information. This engine only uses cookies to
required information on snippets, therefore user maintain the privacy of the users. It is a semantic
does not need to explore the pages. This engine search technology based search engine that
provides the best user interface. This engine presents relevant match or concept match for
integrates these two terms i.e., Concept-Level- example if a user searches for a keyword that has
Search and Ontology- Level-Search by more than one connotation, it gives you the
recommending ontology and allows filtering the options to choose what you were originally
concepts using ontology’s. Through this simple searching for along with the disambiguate
process user can easily find the ontology’s that outcome. This engine has the most important
satisfy their need within a few seconds [11]. property that it provides users privacy which
Google does not give [8][6][10].
TABLE II
COMPARISONS BETWEEN DIFFERENT SEMANTIC SEARCH ENGINES
LIMITATIONS 1.Poor indexing of 1.This engine 1.URL 1.Does not 1.It provides itself an
documents, does not rank Canonization, provides option of privacy but
2.Poor response the objects 2.Privacy silent mode they are just as
time for find according to Session IDS, option. opaque as Google is,
queries. query. 3.Does not since they don’t
index open source their
everything, code, how do you
4.Need other know they are not
search engines tracking you?
too,
5.Contains
virtual content
and dynamic
content.
[8]. Chitre, Nikhil. "Semantic Web Search Engine." Cite this article as :
International Journal 4.7 (2016).
[9]. Jin, Yi, Zhuying Lin, and Hongwei Lin. "The Anita Kumari, Dr. Jawahar Thakur, "Semantic Web
research of search engine based on semantic Search Engines : A Comparative Survey",
web." International Symposium on Intelligent International Journal of Scientific Research in
Information Technology Application Computer Science, Engineering and Information
Workshops. IEEE, 2008. Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
[10]. Esmaili, Kyumars Sheykh, and Hassan 5 Issue 1, pp. 107-115, January-February 2019.
Abolhassani. "A categorization scheme for Available at doi :
semantic web search engines." Computer https://doi.org/10.32628/CSEIT195115
Systems and Applications, 2006. IEEE Journal URL : http://ijsrcseit.com/CSEIT195115
International Conference on.. IEEE, 2006.
[11]. Jain, Ranjna, Neelam Duhan, and A. K. Sharma.
"Comparative study on semantic search
engines." International Journal of Computer
Applications, ISSN (2015): 0975-8887.
[12]. Chaurasia, Jyoti, and Jagdish Raikwal.
"Enhanced Semantic Web Retrieval Technique:
Domain Ontology." International Journal of
Computer Applications 119.16 (2015).
[13]. Malve, Ankita, and P. M. Chawan. "A
Comparative Study of Keyword and Semantic
based Search Engine." (2015): 11156-11161.
[14]. Madhu, G., Dr A. Govardhan, and Dr TV
Rajinikanth. "Intelligent semantic web search
engines: a brief survey." arXiv preprint
arXiv:1102.0831 (2011).
2Assistant Professor, Gyan Ganga College of Technology Jabalpur, Madhya Pradesh, India
ABSTRACT
Conventional designs use multiple image or single image to deal with haze removal. The presented paper uses
median filer with modified co-efficient (16 adjacent pixel median) and estimate the transmission map and
remove haze from a single input image. The median filter prior(co-efficient) is developed based on the idea that
the outdoor visibility of images taken under hazy weather conditions seriously reduced when the distance
increases. The thickness of the haze can be estimated effectively and a haze-free image can be recovered by
adopting the median filter prior and the new haze imaging model. Our method is stable to image local regions
containing objects in different depths. Our experiments showed that the proposed method achieved better
results than several state-of-the-art methods, and it can be implemented very quickly. Our method due to its
fast speed and the good visual effect is suitable for real-time applications. This work confirms that estimating
the transmission map using the distance information instead the color information is a crucial point in image
enhancement and especially single image haze removal.
Keywords : AF: Adaptive filter, AHE: Adaptive Histogram Equalization, LOE: Lightness Order Error
CSEIT195121 | Received : 10 Jan 2019 | Accepted : 23 Jan 2019 | January-February -2019 [ 5 (1) : 116-122 ]
116
Sunita Shukla, Prof. Silky Pareyani Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 116-122
comes to the image dehazing problem, a dehazing Then the haze-free image could be estimated:
model called Atmospheric Scattering Model is widely ( )
( )
used in ( ( ) )
I (x) =J (x)t(x) + A(1-t(x))
where is usually a small constant (0.001) in order to
where I(x) represents the hazy image, and J(x) avoid division by zero.
denotes the origin haze-free image(also called scene
radiance). A is the airlight which is the global light in Proposed an algorithm which combines the merits of
the atmosphere while t(x) denotes scene transmission transform color space algorithm and wavelet
function (0<t(x)<1). t(x) usually correlates with the transform algorithm.
scene depth. When the observed object is further
away from the camera, it’s more affected by the haze. First, the RGB image is converted to the HSI color
As a result, t(x) is closer to zero when the object space, Then histogram equalization is applied to
depth in the scene is greater. In the dehazing process, intensity component I to enhance the contrast of
the goal is to estimate the A (airlight) and construct image and the segmentation
the most optimal transmission function t(x).
Input Median R
Original Filter G
Image
B
Histogram Equalization
DWT
HH HL LH LL
Retinex
Algorithm
IDWT
Dehazed
Image
Exponential enhancement algorithm is applied to Let input image is x which is a RGB image
saturation component S, and then the intensity First Histogram Equalization need to be done
component I is divided into high and frequency sub-
( )
bands with wavelet transform and then Retinex
algorithm is applied to the low-frequency sub-band
( ) ( )
to reduce the effect of haze and adjust image ( )
√( ) ( )( )
luminance, a fuzzy enhancement algorithm is applied
to high-frequency sub-band to achieve the
enhancement and de-noising for the image details. (
( )
Finally, utilize the inverse wavelet transform to Let ‘img’ is the HSI image and its intensity block is of
reconstruct the I component and then the 3x3 is as below, and the intensity need to enhance
reconstructed component I will be synthesized with with K coefficient
H and S components to get a clear RGB image, and
the proposed algorithm is represented by following
flowchart [ ]
Pixel intensity A B C D e
Pixel value f1 f2 f3 f4 f5
Cumulative F1/9
probability
CP*k K*F1/9
{ } { } { } { }
Floor Na=
rounding floor(K*F1/9) [{ } ] [{ } ]
[{ } ] [{ } ]
[ ] ( ) ∑ ( ) ( )
( ) ∑ ( ) ( )
is the intensity frame of HSI image of MxN DWT
applied on ‘I’
Table 1 below shows the symlet type 4 HPF and LPF ( )
filter coefficients. Proposed work use ‘sym4’ type ( )
wavelet for decomposition of Cover image, figure 1
below shows HPF and LPF decomposition using
DWT.
Retinex let (x,y) are the pixels coordinates of ‘p’ in accelerate the processing speed, a fast single image
space domain then W is the reflection component dehazing method has to be developed in near future
and Z illumination component then which will be based on the atmospheric scattering
model and gray projection. our future method will
( ) ( ) ( ) have transmission map is estimated roughly using
minimum filtering which is based on dark channel
( ) ∑ ∑ ( ) ( )
prior and refined with fast average filtering. The gray
( ) projection method is adopted to obtain the
( )
atmospheric light. The subsection mechanism is
designed to avoid the high light of sky region in
Where c is Gaussian scale and is a constant that
recovered image, and Weber-Fechner Law is
makes F(x, y) equal to 1.
employed for color compensation in restored image. a
( ) ( )* ( ) ( )+
optimized approach is planned to be develop in near
( ) ( ( ))
future, in which the transmission map is roughly
( ( )) ( ( )
obtained with DCP and processed with a fast average
( ))
( ) ( ) filtering to improve the running speed. By gray
projection, the atmospheric light is obtained. And
Let (u,v) are the pixels coordinates of ‘q’ in space after the restoration of haze-free image, the intensity
domain compensation is employed to increase the visual
effect. The designed algorithm must achieve satisfied
( ) result with a computation cost.
( )
∑ { ( ) ( ) }
is the relative order difference
Table 2 LOE comparison for Building image changing when the homogeneity of RGB channels
have a big difference. The results obtains for the
Author/ Journal/Year LOE for Image of thesis work are better in terms of LOE and SNR then
Building available works.
Yuhei Kudo / IEEE 2018 1.932
Proposed 0.838019
V. REFERENCES
ABSTRACT
Deliberate or inadvertent escape of classified data is undoubtedly one among the premier extreme security
dangers that associations look inside the advanced period. The risk right now stretches out to the private lives:
an abundance of private information is out there to interpersonal organizations and great telephone providers
and is in a roundabout way exchanged to undependable outsider and fourth gathering applications. amid this
work, a bland data genealogy structure LIME (Data Lineage in the Malicious Environment), is utilized for data
stream over different elements that take two trademark, guideline parts (i.e., proprietor and buyer). It
characterizes the exact security ensures required by such a data heredity component toward recognizable proof
of a blameworthy substance, and decide the disentangling non-denial and trustworthiness suspicions. At that
point create and break down a totally special dependable data exchange convention between two substances
among noxious surroundings by expanding upon unmindful exchange, solid watermarking, and mark natives.
At long last, an exploratory investigation to exhibit the helpfulness of convention what's more, apply structure
to the important data run projections of learning outsourcing and the informal organizations. In general,
LIME(Data Lineage in the Malicious Environment),lineage structure for information exchange, to be a key
advance towards accomplishing responsibility by plan.
Keywords: Classified Data, LIME, Trademark, Malicious Environment, Micro Benchmarking, Pairing Based
Cryptography, GNU
CSEIT195116 | Received : 15 Jan 2019 | Accepted : 25 Jan 2019 | January-February -2019 [ 5 (1) : 123-130 ]
123
Amith Manda, Dr. R. P. Ramkumar. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 123-130
extraction much easy as the impostor can now easily outcome .Amid this distribution the prerequisite for
transfer the data. general answerability instrument in learning
exchange is demonstrated which may specially go
We as a consumer find many apps on internet and we with confirmable measures and control the condemn
knowingly handle our data to the respective blameworthy. This philosophy of identification is
organizations but is our data really safe in the hands named as learning root. Endeavors are made by
of the organization, what if any employee of the numerous associations to utilize learning source
fellow organization decides to make a step that ruins inside the type of watermarking or including of false
the organizations name, what if any employee information or data in specially appointed way has
wantedly access your data and misuses it. The answer not been that flourishing.
to that problem is represented in the following work
which will determine the guilty entity with proof II. EXISTING SYSTEM
and held for explanation if any data extraction occurs.
There are few safety mechanisms such associate In the digital era, data outflow during intentional
secret writing of valuable data, however it's a exposures, or un-intentional damage by untruthful
proactive measure that cannot verify the info leak staff and harmful external entities, always provide
once it happens. Once the intruder decrypts the serious threats to organizations. it's not laborious to
information then there's no potential live which will believe that this is simply the edge of an iceberg, as in
prevent the info leak of the personal data and most cases information of knowledge outflow go
business data by any desired measures. Following are unreported thanks to concern of loss of client
few measures that we often see and there are a confidence or restraining penalties huge amount of
number of situations where the event is determined. digital data can be derived at nearly no price and
might be unfold through the net in terribly short
1. We should take facebook for instance wherever we time to boot, the risk of obtaining or getting caught
can see assortment of outsiders that approaches our for information outflow or the extraction is very low,
insight, if any outsider is experienced in learning spill as there square measure presently nearly no
it winds up impractical to call attention to or see that answerableness mechanisms. For these reasons, the
wherever extremely the data was misused as there matter of information loss has reached a replacement
square measure a few outsiders advertised. dimension these days.
2. Consultancies have all the valuable data of
representatives/applicants caning to seek out work 2.1 Disadvantages
which outsider contracts another outsider then all Even with access management mechanisms,
the three organizations will right now approach the wherever access to sensitive information is restricted,
individual information then it may turn out to be a malicious approved user will publish the valuable
horrendously difficult to undeniably relate one the information as soon as he receives it. Primitives like
three partnerships for learning spill, in each the coding provide protection solely as long because the
circumstances witnesses can either don't target the info of interest is encrypted, however once the
exact learning safety or the intruder may attentively recipient decrypts a message, nothing will stop him
reveal classified data which cannot be tied to any of from publication the decrypted content. Therefore it
the handlers. At times there comes experience the looks not possible to stop information outpouring
explanatory procedures however it's horribly proactively.
expensive and it also doesn't create a terribly sensible
2. View all the files details usage of the Cox calculation is utilized for vigorous
3. View the attacked files picture and set the negative factor, which decides the
4. View Download history quality of the watermark, to a estimation of 0.1.Now
3.3 Auditor execute the explore different avenues regarding
Auditor has capability to access, manage or monitor diverse parameters to examine the execution. The
the transferred knowledge or data beneath the sender and beneficiary piece of the convention will
entrustment of information of owner, auditor has be executed in a similar program, i.e., don't break
experience and capabilities that a standard user down system sending, yet just computational
doesn't have, for occasionally auditing the outsourced execution.
knowledge. This audit service is considerably
necessary for digital forensics and credibleness in 4.2 PBC (Pairing Based Cryptography)
Web and performs the subsequent operations
1.View image/file details Blending based cryptography is a generally youthful
2. View Attacked files territory of cryptography that rotates around a
3. Block or unblock an attacker certain capacity with exceptional properties.
4. View messages from a consumer
The PBC (Pairing-Based-Cryptography) library is a
3.4 Data Consumer free C library based on the GMP library that plays
The net user of an Organization encompasses a great out the numeric activities and fundamental matching
quantity of data to be stored in servers and have the based on cryptosystems.
permissions to access and manipulate and keep image
and its data. The PBC library is planned to be the foundation of
executions of matching based cryptosystems, in this
The consumer can search information and accessing manner speed and portability are key objectives. It
the image data if he's approved and performs the provides schedules by comparing it to the elliptic
subsequent operations bend era, elliptic bend number juggling and blending
1.View all the files calculation. Due to the GMP library, in spite of being
2. Download a file composed in C, pairings times are shabby. On a 1GHz
3. Send download request Pentium III:
4. Send message to the auditor
• Fastest matching is 11ms
IV. TECHNIQUES USED • Short matching is 31ms
4.1 Micro Benchmarking The API is sufficiently dynamic that the PBC library
The execution of the convention is done in as a will be used despite of the fact that the associated
proof-of-idea and to determine its result. For the researcher has exclusively a rudimentary
unaware exchange sub-convention is executed to the comprehension of pairings. There’s no must be
convention utilizing the PBC library, which itself constrained to get some answers concerning elliptic
makes utilization of the GMP library. For marks BLS bends or a significant measure of collection
plot is executed, likewise utilizing the PBC library. hypothesis. (The base necessity is a few information
For symmetric encryption a usage of AES from the of cyclic gatherings and properties of the blending.)
Crypto++ library is utilized. For watermarking a
The PBC library can likewise be utilized to construct concerning once every year. Since variant about six,
customary cryptosystems. GMP is appropriated beneath the twin licenses,
wildebeest LGPL v3 and wildebeest GPL v2. These
licenses make the library freed to utilize, share, and
enhance, and allow you to kick the bucket the
outcome. The wildebeest licenses offer flexibilities,
Fig 1. Two party one round key agreement protocol however conjointly set firm limitations on the use
with without non programs. GMP's primary target
3.3 The GNU Multiple Precision Arithmatic Library stages are Unix-type frameworks, reminiscent of
GMP is attentively designed to be fast for small GNU/Linux, Solaris, HP-UX, waterproof OS
operands as well as for large operands. The speed is X/Darwin, BSD, AIX, and so on. It is additionally
accumulated by use of adequate words as basic celebrated internationally to figure on Windows in
arithmatic type, by use of quick algorithms, with each 32-bit furthermore, 64-bit mode.
immensely advanced assembly code for the most
familiar inner loops for a lot of CPUs, by a general 3.4 BLS Scheme
insistence on speed. In cryptography, the Boneh– Lynn– Shacham (BLS)
signature topic allows a client to confirm that an
GMP could be a free library for subjective accuracy endorser is bona fide. The subject uses a straight
number juggling, in task on marked whole numbers, blending for confirmation, Associate in nursing
objective numbers, and gliding point numbers. marks square measure segments of an elliptic bend
there's no sensible cutoff to the accuracy aside from group. working in Associate in Nursing elliptic bend
those verifiable by the available memory inside the bunch gives some safeguard against list math assaults
machine GMP keeps running on. GMP highlights a (with the proviso that such assaults square measure
made arrangement of capacities, and furthermore the still achievable inside the objective bunch of the
capacities have a regular interface. The fundamental matching), allowing shorter marks than FDH marks
target applications for GMP are cryptography for an indistinguishable level of security. Marks made
applications and investigation, web security by the BLS signature subject square measure
applications, unadulterated science frameworks, normally talked as short marks, BLS short marks, or
process unadulterated arithmetic examination, and so just BLS marks. The mark subject is undeniably
forth. secure.
named the "Cox– Zucker machine" by Charles inside the archive, this can be not an inconsequential
Schwartz in 1984. assignment.
V. RESULTS
VII.REFERENCES
Fig 2. A message request from a non guilty consumer [1]. "Chronology of data breaches,"
http://www.pri"acyrights.org/data-breach.
VI. CONCLUSION AND FUTURE ENHANCEMENT [2]. "Data breach cost,"
http://www.symantec.com/about/news/release/
We are blessing LIME, a model for capable data article.jsp?prid=2011030801
exchange over different elements. We tend to plot [3]. "Pri"acy rights clearinghouse,"
teaming up parties, their interrelationships and give a http://www.pri"acyrights.org.
solid inner portrayal for a data exchange convention [4]. "Electronic Pri"acy Information Center (EPIC),"
utilizing a novel blend of negligent exchange, strong http://epic.org, 1994.
watermarking and computerized marks. We have a [5]. "Facebook in Pri"acy Breach,"
tendency to demonstrate its rightness and show that http://online.wsj.com/article/SB1000142405270
it's feasible by giving little seat checking comes about. 2304772804575558484075236968.html.
By introducing a general relevant structure, we have [6]. "Offshore outsourcing,"
a tendency to present answerableness as right on time http://www.computerworld.com/s/article/1099
as inside the style area of a data exchange foundation. 38/Offshore outsourcing cited in Florida data
Despite the fact that LIME doesn't effectively prevent leak.
data release, it presents responsive answerableness. [7]. A. Mascher-Kampfer, H. Stogner, and A. Uhl,
Along these lines, it'll deflect vindictive gatherings "Multiple re-watermarking scenarios," in
from unseaworthy individual reports and can Proceedings of the 13th International
energize legitimate (however reckless) gatherings to Conference on Systems, Signals, and Image
ABSTRACT
Classification is one of the most considerable supervised learning data mining technique used to classify
predefined data sets the classification is mainly used in healthcare sectors for making decisions, diagnosis
system and giving better treatment to the patients. In this work, the data set used is taken from one of
recognized lab of Kashmir. The entire research work is to be carried out with ANACONDA3-5.2.0 an open
source platform under Windows 10 environment. An experimental study is to be carried out using classification
techniques such as k nearest neighbors, Support vector machine, Decision tree and Naïve bayes. The Decision
Tree obtained highest accuracy of 98.89% over other classification techniques.
Keywords : Thyroid disease, K-Nearest Neighbor, Support Vector Machine, Decision Tree, Naïve Bayes.
hypothyroidism has weight gain, tiredness, weakness, neuro fuzzy method emplaced in ESTDD system for
feeling cold etc. One of the most common cause thyroid diseases diagnosis and achieved 95.33% of
occurred due to hyperthyroidism is graves’ disease [3]. accuracy. ESTDD is one of significant tool for
The underestimated thyroid disease causes thyroid endocrinologists or students studying endocrinology
storm and myxedema which may lead to death [12]. for testing their knowledge by comparing their
In this research work, a classification model is predictions with ESTDD[21].
trained using classification algorithms like K-nearest
neighbor (KNN),support vector machine (SVM), In year 2009, Temurtas performed diagnosis of
decision tree (DT) and Naïve bayes (NB) for the thyroid diseases with the help of artificial neural
diagnosis of thyroid diseases. The Decision Tree network with 3-fold and 10-fold cross-validation
outperformed over other techniques. approaches were used to estimate the performance of
the used neural networks. In this work highest
The rest of the paper is followed as: - Section 2 accuracy of 94.81% was achieved [12].
represents related work in diagnosis of thyroid
diseases. Section 3 contains dataset and methods. In year 2011, EsinDogantekin et al. worked on
Section 4 represents the results and discussion. Wavelet Support Vector Machine (WSVM) with
Section 5 contains conclusion and at last references Generalized Discriminant Analysis (GDA) methods
are mentioned. for diagnosis of thyroid diseases and achieved 91.86%
classification accuracy [22].
II. RELATED WORK
K.Saravana Kumar et al in 2014, proposed KNN and
By studying literature, it seems that several SVM classification methods for the diagnosis of
classification methods have been developed for thyroid disease. They showed that the prediction
thyroid diseases diagnosis. In year 2002, Ozyilmaz et accuracy of KNN and SVM are 96.34% and 94.43%
al in [14] showed that feed forward neural network respectively [1].
could be successfully used for diagnosis of thyroid
diseases. In this work, three architectures of MLP, In year 2017 MP Gopinath proposed SVM, FKNN
RBF and CSFNN were used and achieved accuracy and Decision tree for the diagnosis of thyroid diseases.
89.80%, 79.08% and 91.14% respectively. This work The SVM obtained highest classification accuracy of
shows CSFNN gives the best classification accuracy 96.30% over other techniques [23].
and takes less training times than all other algorithms.
III. DATASET AND METHODS
In 2007, Polat et al. studied on the artificial immune-
recognition system (AIRS) classification method for The dataset used in this investigate work is a clinical
diagnosis of thyroid diseases and achieved 81% dataset. The dataset was taken from one of the
classification accuracy. On the other hand AIRS with leading diagnostic lab in Kashmir. The dataset
Fuzzy weighted pre-processing was classified and contains the record of 807 patients of almost all age
showed the accuracy of 85.00% .This means AIRS groups. Out of 807 patients (224 Males and 583
with fuzzy outperformed than AIRS [15]. Females) 553 belongs to normal, 218 belongs to
hypothyroidism and 36 belongs to hyperthyroidism.
In year 2008, keles et al. proposed an expert system The dataset has 6 attributes as: age, gender, TSH, T3,
for thyroid disease diagnosis (ESTDD) and using T4 and added classification attribute for indication of
normal or hyperthyroidism or hypothyroidism. Table hyper plane is generally done, that has largest
1 shows the description of dataset. distance to the closest training data point of any class
(so-called functional margin), since in general the
greater the margin the smaller the generalization
Table 1. Attributes used in our dataset. error of the classifier [19].
System implementation
The thyroid dataset has three output categories. First
one is Normal, second one is hypothyroidism and
third one is hyperthyroidism. The thyroid dataset of
five input attributes Age, Gender, TSH, T3 and T4 is
Figure 2. Accuracy comparison of classifiers
supplied to the classifiers of KNN, SVM, Decision
Tree and Naïve bayes in PYTHON to classify the data.
Study Method Highest
The performance of each classifier is evaluated in
Accuracy
terms of accuracy as shown in figure 1.
Ozyılmaz and MLPNN with BP 91.14%
Yıldırım [14 ] (3×FC)
Data mining MLPNN with FBP
classification Performance
techniques measure (3×FC)
RBF
KNN (3×FC)
CSFNN
Thyroid Accuracy
dataset SVM (3×FC)
Polat et al. [15 ] AIRS 85.00%
Decision
Tree
(10×FC)
AIRS with Fuzzy
(10×FC)
Naïve
Bayes weighted
preprocessing
keles et al. [21] ESTDD 95.33%
F. Temurtas [12 ] MLNN with LM 94.81%
Figure 1. Thyroid disease prediction process (3×FC)
PNN (3×FC)
IV. RESULTS AND DISCUSSION LVQ (3×FC)
MLNN with LM
(10×FC) [1].K.Saravana Kumar, Dr. R. ManickaChezian,
PNN "Support Vector Machine and K- Nearest Neighbor
(10×FC) Based Analysis for the Prediction of Hypothyroid.
LVQ International Journal of Pharma and Bio
(10×FC) Sciences",volume - 2,Issue - 5,page no-(447-453),2014
EsinDogantekinet GDA-WSVM 91.86% .
al.[22] [2].http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3
MP SVM 96.30% 169866/(accessed dec 2015)
Gopinath.[23] FKNN [3].G. Zhang, L.V. Berardi, An investigation of neural
Decision Tree networks in thyroid function diagnosis, Health Care
Our study KNN 98.89% Manage. Sci. (1998)
(10×FC) [4].Xia C, Hsu W (2006) BORDER: efficient
computation of boundary points. In: IEEE, 2006
SVM
(10×FC) [5].Available from: http://en.wikipedia.org.Last
DT accessed on Dec24].
(10×FC) [6].Apte & S.M. Weiss, Data Mining with Decision
NB Trees and Decision Rules, T.J. Watson Research
(10×FC) Center,
http://www.research.ibm.com/dar/papers/pdf/fgcsapt
Table-2 shows the highest classification accuracy ewe issue_with_cover.pdf, (1997).
obtained by our method over other methods used for [7].Roychowdhury S (2014) DREAM: diabetic
the diagnosis of thyroid diseases. retinopathy analysis using machine learning. In:
IEEE, 2014
V. CONCLUSION [8].Chetty N, Vaisla KS, Patil N (2015) An improved
method for disease prediction using fuzzy approach.
The work has been done using classification data In: IEEE, 2015
mining techniques for the diagnosis of thyroid disease. [9].S. Sathiya Keerthi, Olivier Chapelle, Dennis
For this purpose, K nearest neighbor, Support vector DeCoste "Building Support Vector Machines with
machine, Decision tree and Naive Bayes classifiers Reduced Classifier Complexity" Journal of Machine
have been used. The Decision Tree classifier Learning Research, Vol: 7, PP 1493- 515, January -
outperformed over other classifiers. However, if we (2006).
merge it with any other classification technique such [10].Shen X, Lin Y (2004) Gene expression data
as neural network, then the result might be even classification using SVM-KNN classifier". In: IEEE,
better as compared to what we got with the current 2004
study. [11].www.anaconda.com.
[12].F. Temurtas, "A comparative study on thyroid
disease diagnosis using neural networks," Expert
Systems with Applications, vol. 36, 2009, pp. 944-
949.
VI. REFERENCES
[13].G. H. John and P. Langley, "Estimating International Journal of Pure and Applied
Continuous Dis-tributions in Bayesian Classifiers," Mathematics Volume 117 No. 7 2017, 53-63.
Proceedings of the 11th Conference on Uncertainty Cite this article as :
in Artificial Intelligence, San Francisco, 1995, pp.
338-345. Umar Sidiq, Dr. Syed Mutahar Aaqib, Dr. Rafi
[14].Ozyılmaz, L., Yıldırım, T. (2002). Diagnosis of Ahmad Khan, "Diagnosis of Various Thyroid
thyroid disease using artificial neural network Ailments using Data Mining Classification
methods. In Proceedings of ICONIP’02 9th Techniques", International Journal of Scientific
international conference on neural information Research in Computer Science, Engineering and
processing (pp. 2033-2036). Singapore: Orchid Information Technology (IJSRCSEIT), ISSN : 2456-
Country Club. 3307, Volume 5 Issue 1, pp. 131-136, January-
[15].Polat, K., Sahan, S., & Gunes, S. (2007). A novel February 2019.
hybrid method based on artificial immune Available at doi :
recognition system (AIRS) with fuzzy weighted https://doi.org/10.32628/CSEIT195119
preprocessing for thyroid disease diagnosis. Expert Journal URL :http://ijsrcseit.com/CSEIT195119
Systems with Applications, 32, 1141-1147.
[16].Sehgal MSB, Gondal I (2014) K-ranked
covariance based missing values estimation for
microarray data classification. In: IEEE, 2004
[17].Bonner A (2004) Comparison of discrimination
methods for peptide classification in tandem mass
spectrometry. In: IEEE, 2004
[18].HalifeKodaz et al. Medical application of
information gain based artificial immune recognition
system (AIRS): Diagnosis of thyroid disease.
[19].Joel Jacob et al. "Diagnosis of Liver Disease Using
Machine Learning Techniques". (IRJET) Volume: 05
Issue: 04 | Apr-2018
[20].K. Pavya et al. "Diagnosis of Thyroid Disease
Using Data Mining Techniques: A Study". (IRJET)
Volume: 03 Issue: 11 | Nov -2016.
[21].Keles, A., and Keles, A., ESTDD: Expert system
for thyroid diseases diagnosis. Expert Syst. Appl.
34(1):242-246, 2008.
[22]. Dogantekin, E., Dogantekin, A., and Avci, D.,
An expert system based on generalized discriminant
analysis and wavelet support vector machine for
diagnosis of thyroid diseases. Expert Syst. Appl.
38(1):146-150, 2011.
[23].M.P.Gopinath "Comparative Study on
Classification Algorithm for Thyroid Data Set".
The extensive of diseases related with Indoor Air Quality (IAQ) usually referred to as Sick Building Syndrome
(SBS) and Building Related Illness (BRI) has generated concern for technological approach in monitoring and
analysis of the quality of air in confine environments. In line with “prevention is better than cure” mantra, such
monitoring system is necessary for timely awareness of quality of surrounding air so as to take preventive
action not only at the individual level, but also aid prompt diagnosis by the medical personnel. Motivated by
the need for an affordable, simple and efficient indoor air quality device for general use at homes, offices and
other related confine environment, a sensor node with capability for wireless sensor networking is presented in
this study. The proposed device incorporates: sensors to measure major air quality indices: odor, carbon
monoxide, dust, humidity, and temperature, LED indicators for prompt visual status alert, memory device (SD
card) for off-line data access, and wireless capability for remote data transfer in applications such as web and
mobile-apps interfacing. The performance of the system is evaluated in a laboratory scale indoor environment.
The results show effectiveness of the system in capturing the air-quality status and providing timely
information for proactive action.
Keywords : Indoor Air Quality, Sick Building Syndrome, Building Related Illness, wireless capability, mobile-
apps.
I. INTRODUCTION has called for a pro-active solution proportionate to
the advances in the related technological. SBS and
The alarming rate of indoor-air quality related BRI are related and can be defined as sickness and
diseases commonly referred to as Sick Building discomfort experience by occupants due to poor
Syndrome (SBS) and Building Related Illness (BRI) indoor air environment with no specific causes
CSEIT195120 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 137-142]
137
N. Vijayalakshmi, J. G. Rohini Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 137-142
identify but related to amount of time spent inside. was explored and analyzed in comparison to
Symptoms such as headaches, sore throats, itchy eyes, acceptable standard set by ASHRAE [7]. In [8], the
breathing difficulties, lung cancer, asbestosis, indoor air parameters variation with respect to
mesothelioma, asthma, skin irritation and allergic microclimate condition and impact of outdoor
reactions are among the reported health effect of environment was investigated and reported with
poor air environment according to medical report reference to large museum exhibition halls for a
and study [1-6]. According to the World Health period of one year. The study showed the differences
Organization (WHO), 4.3 million people a year die in indoor microclimate in air-conditioned rooms and
from the exposure to household air pollution [4]. The non-air conditioned ones in the same building. In
problems are been compounded with the increasing addition, external conditions were reported to have a
amount of time people spend in a confine significant impact on the indoor air parameters. On
environment - either in home or in offices or in car, the other hand, at the system level, the pace of
or malls or in school-, and the increasing potential of research work on monitoring systems for IAQ is
air pollution due to cooking using solid fuels, driven by the dynamic rate of sensors and computing
smoking in and around buildings, poor ventilation, technologies advancement. Several studies have been
dust, humidity and temperature. For instance, it has reported in this direction [9-15]. A wireless
been reported that people spend a substantial monitoring system incorporating temperature,
proportion of their time in buildings [5]. In the arid humidity, CO and CO2 sensors for HVAC control
region (MENA) most people spend 90% of their time and IAQ monitoring is presented in [13]. An
indoors [1,2]. In response to these problems, research ATMega88 with a transceiver was adopted in the
studies have been directed to (i) qualitative study for the implementation, sample performance
monitoring and analysis of indoor air quality, results was presented to justify the success of the
including guidelines on IAQ [4] and (ii) development study. Sneha and Sandeep [10] presented an
of sensor node (monitoring system) for quantitative embedded system model for air quality monitoring
monitoring of the IAQ for several applications. For incorporating a LCD display unit to help an allergic
instance, assessment of indoor air quality pollutants patient aware of its environment. No real-life data
in the offices and their potential negative effect in results presented in the study. Hybrid sensor system
Dubai were carried out in [1] using both quantitative with both stationary and mobile sensors is reported
and qualitative techniques. In that study, the in [15] for accurate tracking of air pollutant.
concentration levels of specific indoor air quality Meanwhile, apart from the fact that no single system
indicators (e.g. TVOC, Ozone, Carbon Monoxide, exists that addresses all the pollutants nor
Carbon Dioxide, Relative Humidity and Temperature) incorporates all the performance requirements for a
given situation and environment, most of the IAQ designated as follows: Green: indicates clean, Yellow:
devices are either expensive, thereby hindering indicates moderate, and Red: indicates danger. This is
affordability for general use, or lack simplified data to provide easy and prompt status information for the
presentation for a common end users. Hence, the end users for timely proactive action
current study proposes a wireless sensor node for
IAQ monitoring with simplicity of indication Apart from the cost and power consumption
(situation alert), affordability, easy of modification which are aimed to be low cost and low power,
and maintenance, and yet provides opportunity of respectively, the choice of the sensors stated above is
being fixed located at a place or used as a mobile based on characteristic of the local environment, and
hand-held device (i.e. mobility option). In addition, it common potential pollutant-generator indoor
is aimed to serve as a base for further research on the activities such as
ongoing IAQ data monitoring and analysis, and IAQ • Tobacco smoking,
wireless sensor networks applications suitable for the • Traditional charcoal-based air freshener
emerging Internet of Things (IoT). • Dust (penetration from outside dusty air, poorly
maintained HVAC systems, etc.)
The subsequent sections provide the essential of IAQ • Cooking gas leakage
followed by the design and development of the • Sewage pipe leakage
proposed system, result, discussion and further study. • Ambient thermal influence
The conclusion of the study is presented at the last
section.
II. METHODOLOGY
power supply. The three LEDs status alert are their concentration exceeded the Occupational
Exposure Level (OEL) specified by appropriate Thermal anemometer, Direct-reading dust sampler,
regulations/standards. The types and composition of and microbial sampling [16]. It is noted that, (i) there
the indoor air pollutants depends on ambient outside is no single instrument to sample all the pollutants
air condition and nature of the confined environment which necessitates the need for localized device for a
(be it residential, office, markets/malls, sport center given situation, (ii) some of the testing and sampling
etc.). methods are only interpretable by IAQ professionals,
thereby limits their direct adoption and benefits to
Essentially for a given indoor environment, the IAQ the occupants (general users) and (iii) affordability in
issues involved identification of potential pollutants, terms of cost still remains an obstacle towards
their sources, health concerns, standards/regulations widespread adoption of IAQ monitoring system for
in respect of their OEL, monitoring and preventive preventive maintenance and safety. These issues have
measures to minimize human exposure, and initiating led to dynamic research and development of different
corrective action when necessary. Among the major types of air testing/sampling instruments to meet the
and common parameters in IAQ are Carbon demands for timely and informative monitoring of
monoxide, Carbon dioxide, Dust/particulates, Volatile the ambient indoor air condition in line with the
Organic Compounds (VOCs), Formaldehyde, state-of-the-art technology.
Methane, and temperature/Humidity for thermal
comfort. Others are Benzene, Nitrogen dioxide, III. RESULTS, DISCUSSION AND FUTURE STUDY
Sulfur dioxide, Radon etc. [16]. Table 1 gives the
summary of the sources, effects and standards of the The results of both web data transmission and real-
common IAQ parameters while the detailed can be time data monitoring show the successful
obtained in the literatures [4, 16]. implementation of the proposed IAQ-WSN. The web
data interface of Fig. 1 provides the detail
With respect to the management of IAQ issues (such information on the status of the air parameters and
as monitoring, prevention and control) the core working condition of the device. This is aimed at
requirement is air quality sampling and testing with providing remote data access for occupants and
the aid of appropriate instruments. Specific health officers for timely preventive action. The
procedures have been proposed and reported in the results of Fig. 5 show the effectiveness of the node in
sampling and measurements of different types of air monitoring the pollutant in real-time. All the
contaminants. The common types of instrument are: pollutants data were captured almost at the same time,
direct-reading Colorimetric Tubes, Direct-reading (around 6000seconds) based on the simultaneous
Portable monitors, Air samplers, Smoke tube, injection of the materials in the enclosure. This
provides a qualitative performance of the design and [2]. Jennifer Bell, “Sick buildings are leading to
development of the proposed IAQ-WSN. Future sick UAE office workers, doctors say”, The
study is expected to conduct quantitative analysis and Nation, UAE, Spetember 12, 2016.
benchmark the system performance with standard / http://www.thenational.ae/uae/health/sick-
industrial IAQ sensors. In addition, network of the buildings-are-leading-to-sickuae- office-
nodes is to be developed with appropriate routing to workers-doctors-say. accessed date: 1/10/2017.
cover large indoor environment or complete building. [3]. Khawaja Mohammad Hassan, Sick Building
Syndrome: The killer within, The Khaleej
IV. CONCLUSION times,
http://www.khaleejtimes.com/article/2011011
The design and development of a wireless sensor 5/ARTICLE/3011 59995/1002, Filed on
node for Indoor Air Quality monitoring system was January 16, 2011, accessed date: 10/12/2017.
presented in this project. The evaluation results of [4]. World Health Organization (WHO),
both web data transmission and real-time data “Guidelines for Indoor Air Quality: Selected
monitoring show the successful implementation of Pollutants”.WHO,2010.http://www.euro.who.
the proposed IAQ-WSN. Future study is expected to int/__data/assets/pdf_file/0009/128169/e94535.
conduct quantitative analysis and benchmark the pdf.
system performance with standard / industrial IAQ [5]. HS. Brightman and N. Moss. Sick building
sensors. In addition, network of the nodes is to be syndrome studies and the compilation of
developed with appropriate routing to cover large normative and comparative values. Indoor Air
indoor environment or complete building. Quality Handbook. Editors: J. D. Spengler, J. F.
McCarthy, and J. M. Samet, New York:
V. REFERENCES McGraw-Hill, 2001.
[6]. US Environmental Protection Agency
[1]. Hanan Ahmad Ibrahim, Indoor Air Quality in (USEPA). Indoor air quality tools for schools
UAE Office Buildings and Their Effects on Communications guide. http://www.epa.gov,
occupants’ Health, Comfort, Productivity and accessed date: 10/12/2017
Performance”, Master thesis, Faculty of [7]. ASHRAE: The American Society of Heating,
Engineering and IT MSc Sustainable Design of Refrigerating and Air- Conditioning
the Built Environment, The British University Engineers. https://www.ashrae.org. accessed
in Dubai, May 2015. date: 10/12/2017.
Pradesh, India
2Associate Professor, Department of ECE, Siddartha Educational Academy Group of Institutions, Gollapalli,
Andhra Pradesh, India
ABSTRACT
Home automation popular in day to day to number of advantages. In previous and current we monitor the
home appliances remotely by emails or text messages. This paper gives an innovative idea of controlling the
home appliance using with Google voice assistance by using the Raspberry Pi. As a server system Internet of
Things (IoT) links smart objects to the internet. It can enable exchange of data in a more secure way. Rapid
adaptations of Smart City and Internet of Things technologies are assisting in urban planning to ensure
sustainable cities and lifestyles. Life is made simpler and more productive through IOT. As the Wi-Fi hotspots
are increasingly becoming common in the recent times, the existing infrastructure can be used to develop a
cost-effective solution to enable the existing appliances with IOT Raspberry Pi is single board computer (SBC)
is proposed in this paper to Raspberry pi known as a Single Board Computer (SBC) is proposed in this paper to
reach these goals. The voice commands will give to Raspberry PI using Google voice assistance. These
commands will control the any appliances or devices at home. This will provide a better communication in
automated home as compared to normal homes.
Keywords: IoT, WI-FI, Raspberry Pi.
CSEIT195132 | Received : 15 Jan 2019 | Accepted : 30 Jan 2019 | January-February -2019 [ 5 (1) : 143-146 ]
143
Undra Narasimha Babu, S. N. Sreekanth et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 143-146
a more extensive perspective. This will bolster the used as a piece of equipment wanders, and for an
interconnectivity of countless homes for better asset extensive part of the things that your work zone PC
usage in more extensive zone. does, like spreadsheets, word-getting ready and
diversions. It likewise plays superior quality video.
II. EXISTING SYSTEM We need to see it being utilized by kids everywhere
throughout the world to figure out how PCs
In the existing system, home appliances are function, how to control the electronic world around
controlled through Bluetooth, Zigbee and other them, and how to program.
devices. But they are limited to certain area. To
overcome this problem, we are moving to the
proposed system.
BLOCK DIAGRAM
SOFTWARE COMPONENTS
a) Raspbian OS
WORKING PRINCIPLE
APPLICATIONS
➢ Used in homes,
➢ offices,
➢ industrial areas etc.,
ADVANTAGES
.
➢ Smart and secure.
Figure 6 : Relay ➢ Controlling home appliances from anywhere
in the world.
VII.REFERENCES
ABSTRACT
Sentiment analysis is focused on the extraction of emotions and opinions of the people towards a particular
topic from a structured, semi-structured or unstructured textual data. In this paper we focus our task of
sentiment analysis on The Movie DB (TMDB) database which is an online database and contains information of
movies, television shows and video games including cast, crew and reviews. We examine the sentiment
expression to classify the polarity of the movie review on a scale of 1(highly disliked) to 5(highly liked) and
perform feature extraction and ranking and use these features to train our multilabel classifier to classify the
movie review into its correct label.We will collect the reviews for various movies and perform classification on
them. The classification for the reviews are done based on score obtained for the text. We are using two
approaches to generate scores for the reviews. These approaches are Microsoft cognitive services and Google
cloud natural language API.Finally we are able to generate the scores and can classify them based on movie
reviews.
Keywords : Sentiment Analysis, TMDB database, Microsoft cognitive services, Google cloud natural language
API, classification
I. INTRODUCTION websites are not formal reviews but are rather very
informal and are unstructured form of grammar.
Now a days Internet has become a huge Cyber Opinions expressed in movie reviews give a very true
Database which hosts gigantic amount of data which reflection of the emotion that is being conveyed. The
is created and consumed by the users. The database presence of such a great use of sentiment words to
has been growing at an exponential rate giving rise to express the review inspired us to derive an approach
a new industry filled with it, in which users express to classify the polarity of the movie using these
their opinions across channels such as Rotten sentiment words. Sentiment Analysis is the process of
Tomatoes, Facebook, Twitter, and Foursquare. computationally identifying and categorizing
Opinions which are being expressed in the form of opinions expressed in a piece of text, especially in
reviews provide an opportunity for new explorations order to determine whether the writer's attitude
to find collective likes and dislikes of cyber towards a particular topic, product, etc. is positive,
community. One such domain of reviews is the negative, or neutral. Sentiment Analysis is a
domain of movie reviews which affects everyone technology that will be very important in the next
from writers, users, film critics to the production few years. With opinion mining, we can distinguish
company. The movie reviews being posted on the poor content from high quality content. With
CSEIT195130 | Received : 15 Jan 2019 | Accepted : 30 Jan 2019 | January-February -2019 [ 5 (1) : 147-150 ]
147
S Jaswanth Sai Chowdary et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 147-150
prediction of the polarity of the document. We Cite this article as : S Jaswanth Sai Chowdary, Sk
would also like to extend this technique on other Waseem Farooq, Sk Abubakar Siddique, S Dinesh,
domains of opinion mining like television shows, "Sentiment Analysis of movie reviews using
political discussion forums etc. Microsoft Text Analytics and Google Cloud Natural
Language API", International Journal of Scientific
V. REFERENCES Research in Computer Science, Engineering and
Information Technology (IJSRCSEIT), ISSN : 2456-
[1] Sahu, T. P., & Ahuja, S. (2016). Sentiment 3307, Volume 5 Issue 1, pp. 147-150, January-
analysis of movie reviews: A study on feature February 2019. Available at doi :
selection & classification algorithms. 2016 https://doi.org/10.32628/CSEIT195130
International Conference on Microelectronics, Journal URL : http://ijsrcseit.com/CSEIT195130
Computing and Communications
(MicroCom).DOI:10.1109/microcom.2016.752258
3
[2] Magdum, S. S., &Megha, J. V. (2017). Mining
online reviews and tweets for predicting sales
performance and success of movies. 2017
International Conference on Intelligent
Computing and Control
Systems(ICICCS).DOI:10.1109/iccons.2017.82507
38
[3] https://developers.themoviedb.org/3/movies/get-
movie-reviews
[4] https://azure.microsoft.com/en-
in/services/cognitive-services/text-analytics/
[5] https://cloud.google.com/natural-language/
[6] Topal, K., & Ozsoyoglu, G. (2016). Movie review
analysis: Emotion analysis of IMDb movie
reviews. 2016 IEEE/ACM International
Conference on Advances in Social Networks
Analysis and Mining
(ASONAM).DOI:10.1109/asonam.2016.7752387
ABSTRACT
Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed,
public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block
is linked to its previous blocks. Every block has the cryptographic hash code, previous block hash, and its data.
The transactions in BC are the basic units that are used to transfer data between IoT nodes. The IoT nodes are
different kind of physical but smart devices with embedded sensors, actuators, programs and able to communicate
with other IoT nodes. The role of BC in IoT is to provide a procedure to process secured records of data through
IoT nodes. BC is a secured technology that can be used publicly and openly. IoT requires this kind of technology
to allow secure communication among IoT nodes in heterogeneous environment. The transactions in BC could
be traced and explored through anyone who are authenticated to communicate within the IoT. The BC in IoT
may help to improve the communication security. In this paper, I explored this approach, its opportunities and
challenges.
Keywords : Blockchain, Internet of Things (IoT), Cryptography, Security, Communication.
I. INTRODUCTION other and every device has its previous device address.
The blockchain and IoT together work in the
The IoT is growing exponentially year by year with its framework of IoT and Cloud integration. In the future,
aim in 5G technologies, like Smart Homes and Cities, the BC would revolutionize the IoT communication
e-Health, distributed intelligence etc. but it has [1]. The goals of BC and IoT integration could be
challenges in security and privacy. The IoT devices are summarized as follows.
connected in a decentralized approach. So, it is very
complex to use the standard existing security
techniques in the communication among IoT nodes.
The BC is a technology the provide the security in
transactions among the IoT devices. It provides a
decentralize, distribute and publicly available shared
ledger to store the data of the blocks that are processed
and verified in an IoT network. The data stored in the
public ledger is managed automatically by using the
Peer-to-peer topology. The BC is a technology where
transactions fired in the form of a block in the BC
among IoT nodes. The blocks are linked with each
Figure 1 : Blockchains and IoT
CSEIT195137 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 151-157 ]
151
Tanweer Alam Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 151-157
i) Decentralized framework: This approach is similar in exchanging a document with privacy without storing
IoT and BC. It is removed the centralized system and any information on the time-stamping service. The
provide the facility of a decentralized system. It idea of blockchains comes from [3] but the first
improves the failure probability and performance of blockchains were presented by Satoshi Nakamoto in
the overall system. 2008. He presented a paper where the blocks were
ii) Security: In the BC, the transactions among nodes added in a chain and form a blockchain [4]. In the
are secured. It is a very novel approach for secure article [5], the authors presented the “IoTChain” for
communication. BC allows IoT devices to authentication of information exchanged between two
communicate with each other in a secure way. nodes in an IoT network. They have presented an
iii) Identification: In IoT, all the connected devices are algorithm to exchange the information in IoT and
uniquely identified with a unique ID. Every block in blockchains (fig 2) [5]. In this paper, authors are
BC is also uniquely identified. So, BC is a trusted focused on the authorization part of the security in the
technology that provides uniquely identified data IoTChain framework.
stored in public ledger.
iv) Reliability: IoT nodes in BC have the capabilities to
authenticate the information passed in the network.
The data is reliable because it is verified by the miners
before entering in BC. Only verified blocks can enter
in the BC.
v) Autonomous: In BC, all IoT nodes are free to
communicate with any node in the network without
the centralized system.
vi) Scalability: In BC, the IoT devices will Figure 2 : IoT Chain framework
communicate in high-available, a distributed
intelligence network that connects with destination In the article [6], the authors explored the cloud and
device in a real-time and exchange information. MANET framework to connect the smart devices in
the internet of things and provide communication
The rest of the paper is summarized as follows: section security. In the article [7], authors represent a very
1 represents the introduction of the paper, section 2 nice framework called internet-cloud framework, it is
represents the literature survey, section 3 introduces a good idea to provide secure communication to the
the role of BC in IoT, section 4 represents the IoT devices. In the article [8], the authors provide a
opportunities of the integrated approach, section 5 middleware framework in the cloud-MANET
represents the challenges and section 6 represents the architecture for accessing data among the IoT devices.
conclusion. Article [9,10] represents the reliability in the
communication among IoT nodes. The articles
II. LITERATURE SURVEY [11,12,13,14,15] are providing the mobility models for
communication in 5G networks. In the article [16], the
The security and privacy in the communication among fuzzy logic-based mobility framework is explained for
IoT devices paid too much attention in the year of communication security. In the article [17], a nice
2017 and 2018. Several papers are published during the survey on blockchains and IoT done by the researchers.
year 2017 and 2018. In the year of 1990, Stuart Haber They present the idea of the security in the BC-IoT to
and W. Scott Stornetta were written an article [3] on develop the IoT apps with the power of BCs.
III. THE ROLE OF BC IN IoT publicly accessed, privacy is low to high and the
transferable identities while in a centralized database,
The IoT enables the connected physical things to the properties are centralized trust model, low in
exchange their information in the heterogeneous security, low publicly accessed, privacy is high and
network [18]. The IoT could be divided into the non-transferable identities. From the above properties,
following sections. the blockchain is more advanced than the centralized
1. Physical Things: The IoT provide the unique id for storage.
each connected thing in the network. The physical
things are able to exchange data with other IoT nodes.
2. Gateways: The gateways are the devices work
among physical things and the cloud to ensure that the
connection is established and security provided to the
network.
3. Networking: it is used to control the flow of data and
establish the shortest route among the IoT nodes.
4. Cloud: It is used to store and compute the data.
The BC is a chain of verified and cryptographic blocks (a)
of transactions held by the device connected in a
network. The blocks data are stored in the digital
ledger that is publicly shared and distributed. The BC
provides secure communication in IoT network. The
blockchain can be a private, public or consortium with
different properties. The following table represents
the differentiation among all kind of blockchains.
Decentralized
Determining
Efficiency
Reading
a. IOTA: The IOTA is the new platform for the devices can communicate in the network and every
blockchain and IoT called Next generation block of the transaction will first verify by the miners
blockchains. This platform facilitates the high data then they can enter in the BC.
integrity, high performance of transactions and high 2. Reduce the Cost: This approach will reduce the cost
validity of blocks with using fewer resources. It because it communicates directly without the third
resolves the limitations of blockchains [19]. party. It eliminates all the third-party nodes between
b. IOTIFY: It provides web-based internet of things the sender and the receiver. It provides direct
solution to minimize the limitations of blockchains communication.
technology in the form of custom apps [20].
c. iExec: It is an open source blockchain based tool. It
facilitates your apps the decentralized cloud Trust
advantages [21].
d. Xage: It is the secure blockchain platform for IoT to Risk Management Cost Reduction
The IoT and blockchains are increasing the business Financial Services Time Reduction
VII. ACKNOWLEDGMENT
Challenges
in BC-IoT This research is supported by Deanship of Scientific
Interoperability Lack of Skills
Research, Islamic University of Madinah, Kingdom of
Saudi Arabia. The grant number is 10/40.
Discovery and
Privacy
Integration VIII. REFERENCES
Figure 5 : Challenges in BC-IoT [1]. Reyna, Ana, et al. "On blockchain and its
integration with IoT. Challenges and
4. Discovery and Integration: Actually, BC is not opportunities." Future Generation Computer
designed for IoT. It is a very challenging task for the Systems (2018). DOI:
connected devices to discover another device in BC https://doi.org/10.1016/j.future.2018.05.046
and IoT. So, IoT nodes can discover each other but [2]. Zheng, Zibin, et al. "Blockchain challenges and
they can be unable to discover and integrate the BC opportunities: A survey." International Journal
with another device. of Web and Grid Services 14.4 (2018): 352-375.
5. Privacy: The ledger is distributed publicly to every DOI:
connected node. They can see the ledger transactions. https://doi.org/10.1504/IJWGS.2018.095647
So, privacy is also a challenging task in the integrated [3]. Haber, Stuart, and W. Scott Stornetta. "How to
approach. time-stamp a digital document." Conference on
the Theory and Application of Cryptography. [12]. Alam, Tanweer, Parveen Kumar, and Prabhakar
Springer, Berlin, Heidelberg, 1990. Singh. "SEARCHING MOBILE NODES USING
[4]. Nakamoto, Satoshi. "Bitcoin: A peer-to-peer MODIFIED COLUMN MOBILITY MODEL.",
electronic cash system." (2008). International Journal of Computer Science and
[5]. Alphand, Olivier, et al. "IoTChain: A blockchain Mobile Computing, (2014).
security architecture for the Internet of Things." [13]. Alam, Tanweer, and B. K. Sharma. "A New
Wireless Communications and Networking Optimistic Mobility Model for Mobile Ad Hoc
Conference (WCNC), 2018 IEEE. IEEE, 2018. Networks." International Journal of Computer
[6]. Alam T, Benaida M. The Role of Cloud-MANET Applications 8.3 (2010): 1-4. DOI:
Framework in the Internet of Things (IoT). https://doi.org/10.5120/1196-1687
International Journal of Online Engineering [14]. Singh, Parbhakar, Parveen Kumar, and Tanweer
(iJOE). 2018;14(12):97-111. DOI: Alam. "Generating Different Mobility Scenarios
https://doi.org/10.3991/ijoe.v14i12.8338 in Ad Hoc Networks.", International Journal of
[7]. Alam T, Benaida M. CICS: Cloud–Internet Electronics Communication and Computer
Communication Security Framework for the Technology, 4(2), 2014
Internet of Smart Devices. International Journal [15]. Sharma, Abhilash, Tanweer Alam, and Dimpi
of Interactive Mobile Technologies (iJIM). 2018 Srivastava. "Ad Hoc Network Architecture
Nov 1;12(6):74-84. DOI: Based on Mobile Ipv6 Development." Advances
https://doi.org/10.3991/ijim.v12i6.6776 in Computer Vision and Information
[8]. Alam, Tanweer. "Middleware Implementation Technology (2008): 224.
in Cloud-MANET Mobility Model for Internet [16]. Alam, Tanweer. "Fuzzy control based mobility
of Smart Devices", International Journal of framework for evaluating mobility models in
Computer Science and Network Security, 17(5), MANET of smart devices." ARPN Journal of
2017. Pp. 86-94 Engineering and Applied Sciences 12, no. 15
[9]. Tanweer Alam, "A Reliable Communication (2017): 4526-4538.
Framework and Its Use in Internet of Things [17]. Conoscenti, Marco, Antonio Vetro, and Juan
(IoT)", International Journal of Scientific Carlos De Martin. "Blockchain for the Internet
Research in Computer Science, Engineering and of Things: A systematic literature review."
Information Technology (IJSRCSEIT), Volume Computer Systems and Applications (AICCSA),
3, Issue 5, pp.450-456, May-June.2018 URL: 2016 IEEE/ACS 13th International Conference
http://ijsrcseit.com/CSEIT1835111 of. IEEE, 2016.
[10]. Alam, Tanweer. (2018) "A reliable framework [18]. Gubbi, Jayavardhana, et al. "Internet of Things
for communication in internet of smart devices (IoT): A vision, architectural elements, and
using IEEE 802.15.4." ARPN Journal of future directions." Future generation computer
Engineering and Applied Sciences 13(10), 3378- systems 29.7 (2013): 1645-1660. DOI:
3387 https://doi.org/10.1016/j.future.2013.01.010
[11]. Alam, Tanweer, Arun Pratap Srivastava, [19]. https://www.iota.org
Sandeep Gupta, and Raj Gaurang Tiwari. [20]. https://iotify.org
"Scanning the Node Using Modified Column [21]. https://iex.ec/overview
Mobility Model." Computer Vision and [22]. https://xage.com
Information Technology: Advances and [23]. https://www.i-scoop.eu/blockchain-distributed-
Applications 455 (2010). ledger-technology/blockchain-iot
[24]. https://www.statista.com/statistics/647523/worl
dwide-bitcoin-blockchain-size
Organizations have been compelled to change the manner in which they lead business to react to the ongoing
changes occurring both at the worldwide, provincial and at the national dimension. The motivation behind this
examination was to explore through an overview the electronic billing and payment framework. The premise
of the issue in regards to electronic billing and payment framework that the exploration examine planned to
investigate was talked about dependent on two research destinations; to set up the advantages acknowledged
with the dispatch electronic billing and payment, and to survey difficulties in the execution of electronic billing
and payment.
Keywords : Electronic Billing, Payment System, E-Billing, Online Payment
CSEIT195138 | Received : 25 Jan 2019 | Accepted : 03 Feb 2019 | January-February -2019 [ 5 (1) : 158-162 ]
158
Alka D. Aswar et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 158-162
the KPLC organize prompting power outages and a portrayal of the information which is filtered and
drop in the nature of administration. deciphered for data. Scanner tag is littler, lighter and
more affordable. The standardized identification must
With the progression in innovation, there are be in the immediate viewable pathway to be perused
different new advances or frameworks that outcome by scanner tag scanner. Scanner tag have no
in the smart billing and stock administration of the perused/compose capacities thus they can't contain
obtained things to spare the time required for the data for example, item expiry date and so on. The
billing and furthermore stock or stock administration scanner tags can be effectively repeated and produced
[1] [2]. The bill is created naturally when the user those outcomes in less security. In the event that the
distinguishes item tag and the data put away with the scanner tag is tore, harmed there's no real way to
tag. The data can be the item name and the expense examine the item.
of the item. The stock administration should be
possible by creating and interfacing the product with
these innovations. At the point when the user
peruses data from the label, it shows the expense and
amount of the item which is being acquired by the
client. After checkout, the bought things are
deducted from the fundamental database server
which deals with the stock and amount. These new
advances are as a rule exceptionally valuable in
Fig (1). Barcode
today’s life by diminishing the heaps of endeavours
and human work. There are numerous such
The standardized tag based information gathering
advancements like Barcode, QR Code, RFID, OCR.
framework can be regularly included any of the
The innovations utilized in current billing
segments like Barcode scanner; scanner tag based
framework. In this investigation, we talk about the
portable PC, standardized tag printers, scanner tag
different existing system for smart or e-billing.
name, standardized tag information accumulation
programming and so on. The PC looks into the cost
II. Review of Literature
in an ace database (the cost of an item isn't in the
standardized tag!), subtracts it from the store stock,
A. Scanner Tag
and ascertains the change. The product additionally
Scanner tag is otherwise called the Auto ID
makes reports with respect to stock dimensions,
(Automatic Identification). It was designed in the
demonstrates what items are the most and least
mid-1970s. The scanner tag was made to help huge
famous, makes statistic provides details regarding
retail locations and markets process their
singular items and clients, and tracks substantially
merchandise. The standardized identification
more. The way to the entire framework is exact
innovation is very effective for the administration
revealing of the item bought. Clerks are innately
and data refreshing in the PCs [1]. Standardized tag is
questionable and moderate. Barcoding is not one or
one of the recognizable business models. It is utilized
the other. Standardized identification benefits in
for examining the things at grocery store for
information exactness, consistency and effectiveness.
checkouts [2]. The standardized tag peruser is utilized
Standardized identification is utilized in Retail
to distinguish the tag on things and recognizes the
Operations, Receiving and dispatching Operations,
item and related data. Scanner tag result in a visual
resource the executives, producing tasks, Office and At the point when QR code is checked it connects to
Customer Service Applications and Warehousing and plain content, picture, website pages and interactive
so forth. Standardized identifications are estimated by media, maps areas or anything that can be gotten to
the width of the thin bar and are recorded in mils, or over the web. QR code generator is required to make
1/1000 inch. A 15 Mil standardized identification, for a QR code in which the required data is entered. A
example, has a restricted bar that is 15/1000 inches viable QR code ought to be created utilizing 40-80
wide. Further, "calm zones," or clear spaces to one characters and least of 2cm wide. The more
side and right of standardized identification images, characters result in the debased picture. QR code
are incorporated to safeguard the scanner tag can be enables us to choose the activities we need the clients
perused. to take. The QR code is ISO standard, advertise
demonstrated and totally quantifiable. QR codes
B. QR Code enable the normal individual to decipher the QR
code by examining and perused by a camera-prepared
A QR code is Quick Response code. This code is a 2D Smartphone when you’ve downloaded a scanner
standardized identification bringing about higher application [3].
speed at disentangling substance. The Japanese
company Denso-Wave made the QR code for C. OCR (Optical Character Recognition)
following reason in 1994. QR Codes utilize a 2
dimensional network so as to store information. The OCR is an innovation that empowers you to change
more lines and sections the more information it holds. over various kinds of archives, for example, checked
It underpins the mistake rectification. The code can paper reports, PDF records or pictures caught by an
be examined utilizing cell phone camera or QR advanced camera into editable and accessible
peruser and QR code peruser programming. There information. Albeit Optical Character Recognition
are 4 diff dimension of mistake redress low mid-range (OCR) filtering innovation has expanded quickly
quality high. The most elevated amount of mistake throughout the years, there are constraints with
rectification can re-establish up to 30% of a respect to the source materials and character
degenerate document. designing. Content from a source with a text
dimension of under 12 will result in more mistakes.
OCR additionally requires a spell checking editing
and reformatting for the ideal format. There are
numerous components that will influence the OCR,
for example, shapes, little messages, hazy duplicates,
scientific recipes, shaded paper, and written by hand
massage.
D. RFID
separation without the viewable pathway. RFID they need to hang tight in the line for longer time.
bolster the immense measure of one of a kind ids that The thought which is proposed utilizing RFID
helps in making the one of a kind labels for innovation will conquer the issue and it gets the
everything. It permits contactless identification of the undertaking less demanding. The joined impacts of
items utilizing the radio recurrence. RFID label simple and adaptable usage, secure transmission of
arrangement is less compelled as it doesn't require record data, and diminished debate offer the
viewable pathway. It has most extreme and more accompanying advantages for all. It will spare time,
grounded read go. RFID bolsters the read/compose vitality and labor of Customer, Owner and provider.
memory capacity and it can hold substantial measure There are numerous advances which are right now
of information under a special identifier. The being utilized for billing frameworks in general stores.
unfriendly conditions, for example, dust, substance, The choice of the innovation relies on the execution,
physical harm don't influence on RFID without a proficiency and QoS of the innovation in regards to
doubt. This innovation has three sections: a filtering specific undertaking and condition.
reception apparatus, a handset with a decoder to
translate the information and a transponder (RFID IV.REFERENCES
tag) pre-set with data. RFID labels can be perused at a
quicker rate as they roughly can peruse 40 RFID [1] T. Sriram, K. Vishwanatha Rao, S. Biswas and
labels at same time. RFID contain abnormal amounts B. Ahmed "Applications of barcode technology
of security; information can be encoded, secret key in automated storage and retrieval systems",
ensured or set to incorporate an "execute" highlight Industrial Electronics, Control, and
to evacuate information for all time [4]. Instrumentation, 1996., Proceedings of the
1996 IEEE IECON 22nd International
The Tag or Transponder gets recognized by the Conference on, vol. 1, pp.641 -646
Reader or Interrogator when it goes inside the [2] Alistair Milne “The Rise and Success of the
receiving wire extend and the distinguished novel id Barcode: some lessons for Financial Services”
is sent to the Computer or server. feb 2013
[3] Andrew Kerry-Bedell IT‟s in Conservation
III.Comparative Analysis Consultants. Mobile: 07899 741939 email:
a.kb@live.co.uk
http://www.kbstconsulting.co.uk/QR/images/Q
R.pdf
[4] Mandeep Kaur, Manjeet Sandhu, Neeraj Mohan
and Parvinder S. Sandhu “RFID Technology
Principles, Advantages, Limitations & Its
Applications” International Journal of
Computer and Electrical Engineering, Vol.3,
No.1, February, 2011
[5] Abwao, V. (2012). Information Technology
The payment of bill by remaining in long line is a
Applications in Business Management within
monotonous factor when individuals need to buy
Kenyan Companies; A Survey of Selected
items from shops. In spite of the fact that individuals
Insurance Firms in Nairobi, Unpublished MBA
can pay immediately utilizing electronic cash office,
Thesis, University of Nairobi.
ABSTRACT
In optical switching networks, optical information (packets/bursts) that are forwarded from an optical switch to
another through the network could entering a queue of a certain length in each node and may be waiting inside
this node before it will be transmitted to the next node. Various queueing models have been widely applied as
the main tool in optical switching networks for modeling and performance evaluation analysis of the switching
nodes. In this paper, studying the performance analysis of an optical switching node is discussed at Finite and
Infinite queueing models to have the optimum queueing model for optical core node switch design. The
waiting delay time, the average expected number of optical packets and the loss probability of packets in the
optical switch are estimated at variable traffic loads and different wavelength channels.
Keywords : Queueing Models, Optical Switching Network, Finite Queue, Infinite Queue, Blocking Probability
CSEIT195128 | Received : 25 Jan 2019 | Accepted : 03 Feb 2019 | January-February -2019 [ 5 (1) : 163-170 ]
163
Waleed M. Gaballah Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 163-170
For this, our work first presents some specific capacity. In finite queue, the optical arrivals that
queueing models overview that can be used in optical attempt to enter the full-occupied system are denied
switching networks, at section 2. The infinite and entry or blocked.
finite queueing models’ numerical analysis is
obtained in section 3. Finally, conclude in section 4. Table 1 represents the main differences between
Finite and Infinite queueing models.
II. Queueing Models in Optical Switches
TABLE I
FINITE VS. INFINITE QUEUEING MODELS
At the optical switches, the arriving optical
information traffic request some specific amount of Infinite Queueing
Finite Queueing Model
resources such as; circuit, bandwidth, wavelength Model
channel, etc. to be served. The most common M/M/w/m M/M/w
queueing models assume that the optical information The arrival rate The arrival rate is not
traffic inter-arrival and service times follow the depends on the number affected by the number
exponential distribution or equivalently follow a of served and waiting of packets being served
Poisson distribution process with Markovian or packets in the system. and waiting.
memoryless properties [7]. A commonly used Limited buffer capacity. Unlimited buffer
shorthand notation, called Kendall’s notation [8], for capacity.
such queue models describes the arrival process, Faster and has lower Packets waiting long
service distribution, the number of servers and the average number of times in the buffer.
buffer size (waiting line). The complete notation waiting packets in the
expressed as (a/b/c/d) where, Arrival process/service system.
distribution/ number of servers/waiting line. There is a packet loss No packet loss
probability. probability.
In optical switching networks, the commonly used
characters for the first two positions in the shorthand III. Infinite/Finite Queueing Models Performance
notations are M (Markovian – Poisson for the arrival Analysis
or Exponential for the service time). The third
positions used for the number of the output optical In this section, a numerical performance analysis of
wavelength channels w. The fourth position indicates infinite and finite queueing models in the optical
the switch queueing size m and it's usually not used switching node are represented. This analysis study
in infinity waiting room buffers. aimed to determine the suitable queuing model for
enhancement of an optical switch performance,
There are single server queueing models such as which queueing model has low loss probability,
M/M/1 and M/M/1/w, and multiple server's systems which one is faster and has lesser number of optical
such as M/M/w, M/M/w/m, and M/M/w/w systems packets in the optical switch system serviced and
[9]. There is an infinite queue system such as M/M/w, waiting for service. In our analysis taking in
where the optical traffic arrivals are hold waiting for consideration the effect of the number of optical
service and not affected by the number of packets switch wavelength channels w whether at Infinite
already on the queue because there is unlimited model M/M/w or Finite one M/M/w/m. The queueing
buffer size. In addition, there is a finite queue system models are used at suitable average arrival rate
such as M/M/w/m, which has a limited buffer
packet/sec and average service rate µ packets/sec wavelengths (servers), w = 1, 2, 8, 16, 32. In Fig. 1,
values. the service rate per channel is constant µ = 1
The performance parameters that measured are: packet/time unit. While at figures 2 to 4, the entire
- The average number of optical packets resident in switching capacity wµ is kept constant by µ = 1/w
the system Ls packets. packets/time unit, which gives = λ becomes
- The average number of optical packets waiting in independent on w.
the queue Lq packets.
- The average time of optical packets spend in the From Fig. 1 it is clear that for a lower offered load,
system (the average switch queueing delay time) the mean time in the system is very low and equal to
Ws sec. 1/µ = 1 time unit. As the load increases, in the M/M/1
- The average time of optical packets waiting in the queue, the mean total time in the optical switch
queue (the average waiting time to serviced) Wq increases greatly and increased slightly as the number
sec. of wavelengths w increased. At the M/M/32 queue,
- The blocking probability of optical packets PB (at the mean total time in the system only has a slightly
finite queueing models). increment. Therefore, as the number of wavelengths
increased the queue has a superior performance than
In this analysis, the waiting time in the system Ws
M/M/1 queue.
established at two different cases [10]. First, if it is
considered that the service rate per channel is
constant µ = 1 packet/sec, which gives = λ/w. Later, 4
M/M/1
Average waiting time in the switch Ws time unit
Wq2( )
Average waiting time in the switch Ws time unit
M/M/1 Wq3( )
0.1
Wq4( )
M/M/2
40 Wq5( )
Ws1( ) M/M/8 w =1
Ws2( )
M/M/16 0.05 w =2
30 M/M/32 w =8
Ws3( ) w = 16
w = 32
Ws4( ) 0
20 0 0.2 0.4 0.6 0.8 1
Ws5( )
Offered Load
10
optical switch with an adequately chosen number of Figure 5. Average number of packets in the system
wavelengths is the better choice. vs. the offered load of M/M/w/m with different
switch buffer size m and w = 8 wavelengths
B. Finite Queueing Models
20
Wq3( )
number, the more load can be buffered and that may 0
Wq4( )
increase the mean optical packets number in the m=8
m = 16
system (switch filling) Ls, Fig. 5. Therefore, it is − 20
m = 32
increasing the waiting time in the queue and in the m = 64
system Wq and Ws, figures 6 and 7 respectively. 1 1.2 1.4 1.6 1.8
Offered Load
Average number of packets in the switch Ls (packets)
− 27
110 different switch buffer size m at =
− 41
pk1( ) 110
− 55
pk2( ) 110
− 69
pk3( ) 110 100
(packets)
− 13 9
110
1 1.2 1.4 1.6 1.8 Ls3( )
Offered Load
Ls4( )
1 m=8
Figure 8. Packets blocking probability PB in the m =16
m = 32
system vs. the offered load of M/M/w/m with m = 64
different switch buffer size m and w = 8 wavelengths 0.1
20 40 60
Average number of wavelengths w
For the special case m = w at queue model M/M/w/w,
no loads can wait for service, such that no waiting Figure 10. Average number of packets in the switch
time in the queue, Wq = 0. In this case, all loads that vs. Average number of wavelengths for M/M/w/m
cannot be served immediately become blocked, and with different switch buffer size m at =
consequently, these systems are commonly called loss
systems.
Average waiting time in the queue Wq time
40
Wq2( )
from 9 to 12 show the performance of M/M/w/m
unit
Wq3( )
switching system over the number of provided 0
Wq4( )
wavelengths w. This study at high load = 2, at m=8
different system size m values (m = 8, 16, 32, 64), and − 20
m = 16
m = 32
constant system capacity wμ = 1. m = 64
20 40 60
Average waiting time in the switch Ws time unit
100
Average number of wavelengths w
Ws4( ) 40
m=8
m = 16
20
m = 32
m = 64
0
0 20 40 60
−4
110
Blocking Probability of the switch PB
− 36 0.1
110
Figure 12. Packets blocking probability PB in the Figure 13. Packet blocking probability PB in the
system vs. average number of wavelengths w of system vs. the offered load of M/M/w/w at different
M/M/w/m with different switch buffer size m at = servers and =
Again, for m = w no waiting space exists, and thus, It is clear that as the load increases, the blocking
the waiting time in the queue Wq equal zero in case probability also increases at low traffic and saturated
of M/M/8/8. In addition that the queue M/M/8/8 at high traffic. However, as the number of
gives the better performance, less average number of wavelength channels increases, the blocking
packets and low waiting time in the system. However, probability decreases because the incoming traffic has
the strong reduction of the blocking probability PB is a more chance to be serviced.
gained from the implicit queue size increase.
IV.CONCLUSION
Then, on finite queueing optical switches, the
blocking probability decreases at increasing the Optical switching network node performance
number of wavelengths (servers). analysis was done with Finite and Infinite queueing
models to indicate the optimum model at optical
Finally, Fig. 13 investigates the switch blocking switch design. Queue delay time, expected number of
probability PB for the M/M/w/w model at different packets in the system and blocking probability are
number of wavelength channels w = 8, 16, 32. The the main parameters in the analysis to demonstrate
switch performance illustrated at different traffic the optical switch performance. At Infinite queueing
loads = 0 to 2. model, two different analysis cases were used to
represent the wavelength channel number impact on
the optical switch node performance. First analysis
was considered a constant service rate per channel
which is preferred if the costs of using more
wavelengths switch less. However, fixed switching
capacity analysis is better at lower wavelength
number. For Finite queueing model, impact of the
system size on the optical switch declared at high
traffic loads. As the system buffer size increases, with [5] Lisong Xu, Harry G. Perros and G. N. R., “A
a constant wavelength number, the more load can be Queueing Network Model of an Edge Optical
buffered and that may increase the mean optical Burst Switching Node,” in INFOCOM 2003.
packets number in the system. Therefore, it is Twenty-Second Annual Joint Conference of the
increasing the waiting time in the queue and in the IEEE Computer and Communications. IEEE
system. Also, the switching blocking probability PB is Societies, 2003, pp. 2019–2029.
heavily decreases. [6] Kumar, OS Sunish, C. S. Jaison, Indu Reena
Varughese and V. K. J., “The Analysis of M/M/r
As the number of wavelength channels increased Queuing Model for Fiber Delay Lines to
with fixed queue buffer size, the blocking probability Resolve BLP in OBS Networks,” In Emerging
increased due to the switch buffer capacity lowered Research Areas and 2013 International
until it reaches zero at M/M/w/w queueing system. Conference on Microelectronics,
At M/M/w/w queue system, it is faster and has less Communications and Renewable Energy
waiting packets in the switch, while it has high (AICERA/ICMiCR), 2013 Annual International
blocking probability due to no queue buffer. At this Conference, 2013, pp. 1–3.
model, as the number of wavelength channels [7] Bolch Gunter, Stefan Greiner, Hermann de
increases, the blocking probability decreases due to Meer, and Kishor S. Trivedi, Queueing
that the incoming traffic has a more chance to networks and Markov chains: modeling and
serviced. Therefore, using M/M/w/w queueing performance evaluation with computer science
system can be modelled well at optical switching applications, John Wiley & Sons, 2006.
nodes under a certain predefined number of [8] Harchol-Balter, Performance modeling and
wavelengths to lower the blocking probability design of computer systems: queueing theory in
problem. action, Cambridge University Press, 2013.
[9] Zukerman M., “Introduction to queueing
V. REFERENCES theory and stochastic teletraffic models,”
arXiv:1307.2968, 2018.
[1] Van Do, Tien, et al., eds., Queueing Theory and [10] Bhat, U. Narayan. An introduction to queueing
Network Applications, Springer International theory: modeling and analysis in applications,
Publishing, 2016. Birkhäuser, 2015.
[2] E. Yue, Wuyi, Quan-Lin Li, Shunfu Jin, and
Zhanyou Ma, “Queueing Theory and Network Cite this article as :
Applications,” in 12th International Waleed M. Gaballah, "Finite/Infinite Queueing
Conference, QTNA 2017, 2017. Models Performance Analysis in Optical Switching
[3] Thomopoulos, Nick T., Fundamentals of Network Nodes", International Journal of Scientific
Queuing Systems: Statistical Methods for Research in Computer Science, Engineering and
Analyzing Queuing Models, Springer Science & Information Technology (IJSRCSEIT), ISSN : 2456-
Business Media, 2012. 3307, Volume 5 Issue 1, pp. 163-170, January-
[4] Zhu, Xiaoming, and Joseph M. Kahn, February 2019. Available at doi :
"Queueing models of optical delay lines in https://doi.org/10.32628/CSEIT195128
synchronous and asynchronous optical packet- Journal URL : http://ijsrcseit.com/CSEIT195128
switching networks," Optical Engineering, vol.
42, no. 6, pp. 1741-1748, 2003.
People show attention to cloud computing since it is efficient and scalable. But maintaining the stability of
processing so many jobs in the cloud computing environment with load balancing is a very difficult problem
and receives much attention by researchers. Load balancing in cloud computing platform has performance
impact also. Good load balancing makes cloud computing more efficient and increases user satisfaction. This
paper introduces a better load balance model for public cloud based on cloud partitioning concept with a switch
mechanism to choose various strategies in different situations. The algorithm applies game theory to load
balancing strategy and improves the efficiency in the public cloud environment. MCC is a concept which aims
to mitigate these limitations by extending the capabilities of smart devices by employing cloud services, as
required. In MCC both the data storage and processing occur external to the mobile device, while in cloud
computing it is usually only the data storage which is external. In this following a some of these architectures as
categorized in augmented execution, elastic partitioned/modularized applications, application mobility, ad-hoc
mobile cloud and add a fifth category; cyber foraging. This system addresses whether MCC techniques can be
used to extend the capabilities of resource-constrained mobile-devices to provide the illusion of infinite, elastic
resources on demand. The existing system limitations of mobile-devices, and identified five key limited
resources as being CPU, memory, battery, data usage and time. In this research explored existing solutions for
these limitations and identified offloading computation and storage from the device as a possible solution.
Keywords : Mobility, Load Balancing, MCC, Cyber Foraging
CSEIT195118 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 171-179 ]
171
R. Kavitha, G. Sathiyabama Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 171-179
in mobile cloud computing. this taxonomy supported facilitate building a lot of powerful mobile
the key problems during this space, and discusses the applications.
various approaches taken to tackle these problems. To
conclude the paper with a assessment and challenges 3. HanQi , Abdullah Gani
that haven't nevertheless been absolutely met, and Mobile Cloud Computing (MCC) which mixes mobile
highlight directions for future work. computing and cloud computing, has become one
The increasing usage of mobile computing is clear by amongst the trade buzz words and a serious
the study by Juniper analysis, that states that the discussion thread within the IT world since 2009. As
buyer and enterprise marketplace for cloud-based MCC continues to be at the first stage of development,
mobile applications is anticipated to rise to $9.5 it's necessary to understand a radical understanding
billion. In recent years, applications targeted at of the technology so as to entails the direction of
mobile devices have started changing into plentiful future analysis. With the latter aim, this paper
with applications in numerous classes like presents a review on the background and principle of
amusement, health, games, business, social MCC, characteristics, recent analysis work, and
networking, travel and news. The recognition of future analysis trends. a quick account on the
those ar evident by browsing through mobile app background of MCC: from mobile computing to
transfer centers like Apple’s iTunes or Nokia’s Ovi cloud computing is given and so followed with a
suite. discussion on characteristics and up to date analysis
work. It then analyses the options and infrastructure
2. Dejan Kovachev, Yiwei Cao and Ralf Klamma of mobile cloud computing.
Cloud computing is an rising construct combining
several fields of computing. the inspiration of cloud 4.Preeti Garg, Dr. Vineet Sharma
computing is that the delivery of services, computer Describes a cloud computing extremely climbable
code and process capability over the net, reducing computing resources are equipped as associate outer
price, increasing storage, automating systems, service through net on pay-as-usability basis. Portio
decoupling of service delivery from underlying analysis estimates that mobile subscribers can reach
technology, and providing flexibility and quality of half dozen.5 billion by the tip of 2012, 6.9 billion by
knowledge. However, the particular realization of the tip of 201 three. thanks to increasing use of
those edges is much from being achieved for mobile mobile devices the necessity of cloud computing in
applications and open several new analysis queries. In mobile devices arise, that gave birth to Mobile Cloud
order to higher perceive the way to facilitate the Computing (MCC). Mobile Cloud Computing refers
building of mobile cloud-based applications, they to associate infrastructure wherever processing and
need surveyed existing add mobile computing storage will happen faraway from mobile device.
through the prism of cloud computing principles. The Mobile devices don't have to have massive storage
given definition of mobile cloud computing and capability and powerful electronic equipment speed.
supply an outline of the results from this review, Thanks to storing information on cloud there's
specially, models of mobile cloud applications. To associate issue of information security. as a result of
focus on analysis challenges within the space of the chance related to information storage several IT
mobile cloud computing. To conclude with professionals aren't showing their interest towards
recommendations for a way this higher Mobile Cloud Computing. This paper[10] explores: (i)
understanding of mobile cloud computing will The thought of Mobile Cloud Computing and
problems associated in it (ii) Security of information
hold on in cloud with varied mechanisms (iii) resource utilization while maintaining affordable
projected a attainable answer to supply quality of service. However, such a goal cannot be
confidentiality, access management similarly as achieved while not economical resource management.
integrity of information. The most physical resources, like processor cores and
I/O devices, are shared among virtual machines
5.Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis exploitation time slicing and are often scheduled
Describe a mobile applications are becoming flexibly supported priority, allocating an acceptable
increasingly ubiquitous and provide ever richer quantity of main memory to virtual machines is
functionality on mobile devices. Meanwhile, such tougher. Totally different applications have different
devices often enjoy strong connectivity with more memory needs. Even one application shows varied
powerful machines ranging from laptops and operating set sizes throughout its execution. A best
desktops to commercial clouds. This paper presents memory management strategy below a virtualized
the design and implementation of Clone Cloud, a environment therefore has to dynamically alter
system that automatically transforms mobile memory allocation for every virtual machine that
applications to benefit from the cloud. The system is more needs a prediction model that forecasts its host
a flexible application partitioned and execution physical memory wants on the fly. This paper
runtime that enables unmodified mobile applications introduces Memory Balancer (MEB) that dynamically
running in an application-level virtual machine to monitors the memory usage of every virtual machine,
seamlessly off-load part of their execution from accurately predicts its memory wants, and
mobile devices into device clones operating in a sporadically reallocates host memory. MEB uses 2
computational cloud. Clone Cloud uses a effective memory predictors that, severally, estimate
combination of static analysis and dynamic profiling the number of memory accessible for reclaiming
to partition applications automatically at a fine while not a notable performance drop, and extra
granularity while optimizing execution time and memory needed for reducing the virtual machine
energy use for a target computation and paging penalty. The advantage of this study is that
communication environment. During runtime, the swap usage from the OS performance statistics
application partitioning is achieved by migrating a and posts the swap usage statistics to the central
thread from the mobile device at a chosen point to information storage. The limitation of this study is
the clone in the cloud, executing there for the residue reducing overhead while up prediction accuracy.
of the partition, and re-integrating the migrated
thread back to mobile. Their evaluation shows that 7.Weizhe Zhang et al
Clone Cloud can adapt application partitioning to Cloud computing emerges as a brand new computing
different environments, and can help some paradigm involved by each domain and trade.
applications achieve as much as a 20x execution Resource management of multiple virtual machines is
speed- up and a 20-fold reduce of energy spent on that the core of Infrastructure as a Service.
mobile. Specializing in the mainframe resources, the aim of
this paper is to extend the QoS of net service by
6.Weiming Zhao properly planning the mainframe resource across the
Virtualization primarily enables multiple operating virtual machines. The authors of this study formulate
systems and applications to run on one physical pc by the mainframe planning of multiple virtual machines
multiplexing hardware resources. A key motivation into an whole number programming drawback. Then,
for applying virtualization is to enhance hardware a worldwide regulation algorithmic rule supported
utility optimization theory is planned. It principally The administrator selects a minimum and a most
consists of 4 parts: the monitor, the regulator, the information measure limit. The primary pre-copy
native effectiveness of management and therefore the spherical transfers pages at the minimum information
international effectiveness of management. The measure. Every resultant spherical counts the
regulator is within the Xen virtual machines’ monitor. quantity of pages dirtied within the previous
The monitor, native effectiveness of management and spherical, and divides this by the length of the
therefore the net server are settled in DomainU’s previous spherical to calculate the soiling rate. The
interior. The international effectiveness of information measure limit for consecutive spherical is
management is created of the worldwide utility then determined by adding a relentless increment to
generating module and global optimizing and finding the previous round’s soiling rate have by trial and
module, realized in the Domain0. Monitor: the most error determined that 50Mbit/sec may be a
role of monitor is to discover an internet server QoS appropriate worth. It terminates pre-copying once
metrics, in the text it means that the typical latency the calculated rate is bigger than the administrator’s
of net. In their experimental environment Apache chosen most, or once but 256KB remains to be
module was developed for the Apache server to transferred. By integration live OS migration into the
record period of time server latency. Additionally, we Xen virtual machine monitor we tend to alter speedy
have a tendency to monitor the changes of the system movement of interactive workloads at intervals
resources. It’s principally to try to do some tests for clusters and knowledge centers. The dynamic
proc CPUinfo, and procure the condition of the network-bandwidth adaptation permits migration to
system mainframe etc. proceed with stripped-down impact on running
services, whereas reducing total time period to below
8. Christopher Clark et al discernible thresholds. Feature of this study is
Migrating software package instances across distinct moving the contents of a VM’s memory from one
physical hosts may be a useful gizmo for directors of physical host to a different is approached in any
knowledge centers and clusters: It permits a clean range of how. And also the limitation may be a live
separation between hardware and computer code, service it's vital that this transfer happens in a very
and facilitates fault management, load equalization, manner that balances the necessities of minimizing.
and low-level system maintenance. By finishing up
the bulk of migration whereas OSes still run, atuhors 9. Albert M.K. Cheng et al
reach spectacular performance with stripped-down Describe a Virtualization technology recently
service downtimes; the study demonstrate the becomes a hot analysis topic once more in each
migration of entire OS instances on a artifact cluster, business and teachers. Some physical hardware like
recording service downtimes as low as 60ms. And processors and I/O devices area unit shared among
also the author shows that that our performance is virtual machines victimization time slicing, however
adequate to create live migration a sensible tool even the memory resource management is comparatively
for servers running interactive hundreds. During this sophisticated. Light-weight memory management
paper, the look choices for migrating OSes running design for multiple virtual machines is projected, and
services with aliveness constraints, specializing in it includes a mix of self adjustment and global-
knowledge center and cluster environments is taken adjustment policies, each of that collaborate with one
into account. another to boost the memory potency. IC module: it
consists of 2 parts: Virtual Machine Collector (VMC)
and Physical Machine Collector (PMC). VMC is
PM module: it's the core of the system. If the These Paper describes the choices to synchronize the
resource is decent, memory sizes area unit adjusted offline folder contents to the online. Word
by the VMs themselves that is named self-adjustment. documents, surpass worksheets and alternative files is
Otherwise, the global-adjustment is activated for the designated and uploaded to the online application.
complete memory management consistently. Additionally, they'll be reborn into bytes and saved
Following area unit the benefits of this study: Self- within the info provided within the net server
adjustment is running as a daemon method once the location. In anyplace, the administrator will read the
OS of a particular domain starts. contents within the server choose a file and transfer
to the system where the administrator is functioning.
10. Tudor-Ioan Salomie, Gustavo dancer, Timothy Likewise, the files are uploaded from the online page
Roscoe additionally. The windows application is wont to
Describes a program like databases and language transfer the content from the online website to the
runtimes usually manage memory themselves to use native machine. So the applying synchronizes the
application information out of stock to the OS. online content and windows content. The applying
Historically deployed on dedicated machines, they're acts like content storage also as document version
designed to be statically designed with memory manager.
comfortable for peak load. In virtualization
eventualities (cloud computing, server consolidation), Likewise, all the documents square measure keep in
however, static peak provisioning of RAM to info additionally with the name, the system from that
applications dramatically reduces the potency and it's uploaded, the information and time of uploading
cost-saving edges of virtualization. also because the original file copy is additionally
unbroken within the server. The files uploaded from
III. METHODOLOGY the system in foreign places apart from the native
workplace if presents within the information
EXISTING WORK processing system, then the administrator are
intimated specified some files gift within the
The existing system introduces a load balance model information processing system isn't downloaded to
for the public cloud based on the cloud partitioning the native system. This helps the administrator to
concept with a switch mechanism to choose different synchronize the document expeditiously. The system
strategies for different situations, then after creating is implemented with the following methods:
all partitioning load balancing will starts to the all
node, these are main drawback.
Processes on mobile devices area unit offloaded to the In Ad-hoc Mobile Cloud, the given task by a mobile
cloud so as to beat good device limitations, like node, the method execution is happened within the
process power, battery life and memory. During this shopper if the server is unavailable. Ad-hoc mobile
module thought-about the restricted Memory-Client/ cloud may be a set of mobile devices that replace the
Excessive Memory-Server. the first practicality cloud infrastructure by providing their computation
outsourcing (intensive computation is offloaded), resources to different devices. Mobile devices have
background augmentation (processes that don't need storage, procedure power, battery power and sensing
user interaction area unit offloaded), inject capabilities, that provides a chance for exploiting the
augmentation (changes within the execution path collective power of those devices. This is often
may be offloaded), hardware augmentation particularly helpful in things wherever there's very
(augmentation of underlying platform) Association little or no affiliation to the network, restricted
augmentation through multiplicity (running multiple power (short vary communications consume less
parallel copies of an application to create optimum energy).
decisions).
3.4 APPLICATION MOBILITY
The computationally overpriced tasks area unit full to
an online service containing image of the device, Application quality relies on the idea of method
whereas straightforward tasks area unit unbroken on migration, whereby processes may be paused,
the device. Once the net service in cloud task transferred to a distinct machine and seamlessly
completes the execution, results area unit integrated resumed. The distinction between this and increased
back to the mobile node. Execution is that in application quality, migration
will occur between completely different underlying
3.2 ELASTIC/PARTIONED MODULARIZED mobile architectures. The applying quality, one
APPLICATIONS method is dead in client/ different method is
processed within the server that is Cloud choice
Some of the processes are dealt in shopper and based mostly. it's engineered on a distributed filing
remaining process area unit are dealt from the server. system, that support the transmission of state from
one web site to a different, and also the modification to figure effectively in each non-public and public
in state from suspend to resume or contrariwise. The cloud.
purchaser’s area unit that internets suspend / resume
have association asynchronous dependence on the Furthermore, to gauge a best help in document
network, whereas purchasers would historically be management, the application become helpful if the
synchronously captivated with the network. below enhancements square measure created in
future. If the appliance is meant as internet service, it
3.5 CYBER FORAGING may be integrated in several internet sites. Non-
synchronized documents may be alerted to
The process or the given task of a node is partly dead synchronize. the appliance is developed specified on
in an un-trusted server. It's a way whereby proximate top of aforementioned enhancements may be
offered resources (called surrogates) area unit used integrated with current method.
for remote execution of applications. These resources
area unit dynamically discovered and used V. REFERENCES
notwithstanding the servers don't seem to be
expressly trustworthy by the user. Surrogates area [1]. N. Fernando, S. W. Loke, and W. Rahayu,
unit supported 2 main premises; un-trusted and "Mobile cloud computing: A survey," Future
unmanaged. This reduces the overall price of Generation Computer Systems, vol. 29, no. 1,
possession and maintenance and so encourages their pp. 84-106, 2015.
broad adoption. The offload tasks to a distant server [2]. D. Kovachev, Y. Cao, and R. Klamma, "Mobile
area unit supported many factors together with cloud computing: a comparison of application
computation quality, network strength, and device models," arXiv preprint arXiv:1107.4940, 2012.
capability and information neighborhood. [3]. [H. Qi and A. Gani, "Research on mobile cloud
computing: Review, trend and perspectives," in
IV. CONCLUSION Digital Information and Communication
Technology and it’s Applications (DICTAP),
Through this analysis, the information management 2012 Second International Conference on .
method becomes straightforward. All the regular IEEE, 2012, pp. 195-202
activities square measure assigned to them through [4]. Preeti Garg, Dr. Vineet Sharma, "Secure Data
browser interface. The administrator will read the Storage In Mobile Cloud Computing ," in
contents within the server choose a file and transfer Computer Communications Workshops
to the system where the administrator is functioning. (INFOCOM WKSHPS), 2011 IEEE Conference
Likewise, the files may be uploaded from the online on . IEEE, 2014, pp. 1060-1065.
page additionally terribly straightforward manner. [5]. Byung-Gon Chun , Sunghwan Ihm, Petros
The new system eliminates the difficulties within the Maniatis, "Securing elastic applications on
existing system. It’s developed in a very easy manner. mobile devices for cloud computing," in
The system is incredibly quick and any dealings may Proceedings of the 2009 ACM workshop on
be viewed or retaken at any level. Error messages Cloud computing security . ACM, 2016, pp.
square measure given at every level of input of 127-134
individual stages. Several of the tested practices and [6]. Weiming Zhao, "Dynamic Memory Balancing
technologies for managing trust relationships in for Virtual Machines ", 2016 14th International
ancient enterprise IT environments may be extended Conference on Modelling and Simulation
ABSTRACT
Rock burst and Slope Stability is one of the common failures in hard rock mining and civil construction. This
study focuses on the prediction of rock burst and Slope Stability classification with case instances using cloud
models and attribution weight. First, cloud models are introduced briefly related to the rock burst and Slope
Stability classification problem. Then, the attribution weight method is presented to quantify the contribution
of each rock burst and Slope Stability indicator for classification. In addition, analysis and prediction of slope
stability is of great importance in geotechnical engineering. With the development of economics, the number
of slopes is increasing and landslides caused by slope instability have become one of the three major geological
disasters in the world along with earthquakes and volcanoes. To reduce or prevent landslide damage, slope
stability analysis and stabilization are required. However, accurately predicting slope stability is challenging
because of the complexity of slope structures and the difficulty to determine the precise input data associated
with key geotechnical parameters the proposed methodology PSO feature extraction preserves important
distance relationships, such as : The Random forest, Naive Bayes of each object of the original dataset. This
leads to preservation of any mining operation that depends on the ordering of distances between objects, such
as Random forest, Naive Bays -search, SVM, J.48 and MLP classification, as well as many visualization
techniques. In particular, it establishes a restricted isometric property, i.e., tight bounds on the
contraction/expansion of the original distances.
Keywords: Raspberry Pi, USB Camera, Motor Driver, Motor, LCD Display, Road Side Speed Sign Controlling.
CSEIT195122 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 180-184 ]
180
Sadesh S, Banupriya GK Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 180-184
Interactive mining at multiple levels of abstraction XIAO FAN and KAN WANG [2] In the field of
It is difficult to know what can be discovered within nuclear engineering, deterministic and stochastic
database. The Data mining process should be methods are used to solve radiation transport
interactive. Database containing a huge amount of problems. To solve the transport equation for the
data, appropriate sampling techniques can be used to average particle behavior and also contain
facilitate interactive data exploration. [9] uncertainties associated with the discretization of the
independent variables such as space, energy and
Pattern evaluation angle of the transport equation and can admit
It can uncover thousands of patterns. Many of the solutions that exhibit non - physics features. The
patterns discovered may be uninteresting to the given Monte Carlo method obtains s results by simulating
user they present common knowledge or lacking individual particles and recording some aspects of
novelty. their average behavior. This method enables detailed,
explicit geometrical, energy and angular
Handling noisy or incomplete data representations and hence is considered the most
The data stored in a database may reflect noise such accurate method presently available for solving
as exceptional cases or incomplete data objects. The complex radiation transport problems. One of the
accuracy can be poor. Data cleaning and data analysis difficulties associated with Monte Carlo method is
method is used to handle the noisy data. the amount of computer time required to obtain
sufficient precision in the simulations.
II. LITERATURE SURVEY
QIANG YANG AND PING- AN DU [3] To present a
CHUN'AN TANG AND JOHN A. HUDSON [1] he novel approach for determining the weights of
subject of rock failure has been studied in a decision makers (DMs) based on rough group
coordinated way since the 1960s.It can be studied by decision in multiple attribute group decision-making
examination of natural rock formations that have (MAGDM) problems. At first, we construct a rough
been stressed and strained over geological time, by group decision matrix from all DMs’ decision
laboratory experiments on the rock samples in situ matrixes on the basis of rough set theory. The second
experiments takes place, and by observing the results process we derive a positive ideal solution (PIS)
of rock excavation and loading during engineering founded on the average matrix of rough group
construction. In this book, rock failure mechanisms decision, and negative ideal solutions (NISs) founded
explanations and illustrations are given. Over the on the lower and upper limit matrixes of rough group
years, there have been three main developmental decision. After that we obtain the weight of each
phases supporting rock engineering design: analysis group member and priority order of alternatives by
based on elasticity theory; the use of rock mass using relative closeness method, which depends on
classification systems; and computer modeling. The the distances from each individual group member’
elasticity theory approach is more useful because it decision to the PIS and NISs. Comparisons with
enables the stresses around circular and elliptical existing methods and an on-line business manager
holes to be determined, although the approach is with the selection example, the proposed method
most useful for deep excavations where the rock show that it can provide more insights into the
behavior is essentially elastic. subjectivity and vagueness of DMs’ evaluations and
selections.
MATTHIJS J. WARRENS [4] The kappa coefficient, ZONG- XIAN ZHANG [7] are two missions for rock
denoted by κ, is widely used as a descriptive statistic mechanics to accomplish in mining engineering: (1)
for summarizing the cross-classification of two to destroy rock efficiently; (2) to make rock
variables with the same unordered categories. structures safe. The missions are completed and
Originally proposed as a measure of agreement mining operations are well managed, best mining
between two raters classifying subjects into mutually results should be achieved. For accomplishments of
exclusive categories, Cohen’s κ has been applied to the two missions, rock mechanics faces following
square cross-classifications encountered in challenges: (1) how to make drilling, crushing and
psychometrics, educational measurement, grinding more efficiently, in particular for grinding
epidemiology, diagnostic imaging, map comparison, whose energy efficiency is less than 1%; (2)now how
and content analysis. The popularity of Co- hen’s κ to make full use of explosive energy and destroy rock
has led to the development of many extensions, effectively; (3) how to manage, reduce and finally
including multi-rater kappas, kappas for groups of predict seismic events and rock bursts; (4) how to the
raters, and weighted kappas. The value of κ is 1 when develop various mining methods; (5) how to reduce
perfect agreement between the two observers occurs, borehole damage in deep mines or in the mines with
0 when agreement is equal to that expected under high in - situ stresses; (6) how to increase ore
independence, and negative when agreement is less recovery and decrease dilution; (7) how to improve
than expected by chance. mining safety; (8) how to make rock support de signs
more scientifically. All these challenges will be
YU ZHOU AND TINGLING WANG [5] Rock burst is analyzed in this paper. In addition, few topics such as
one of main engineering geological problems greatly rock mass classification, environment protection and
threatening the safety of construction. Prediction of the effects of loading rates, temperatures, and cyclic
rock burst is always to important for the safety of loading on mining engineering will be discussed.
workers and equipments in tunnels. Here in this
paper, PNN-based rock burst prediction model is III. METHODOLOGY
proposed to determine whether rock burst will
happen in the underground rock projects and how NORMALIZATION PROCESS
much the intensity of rock burst.
It is the process of classify data into an associated
ZAOBAO LIU and JIANFU SHAO [6] Rock burst is table it also eliminates redundancy and increases the
one of the common failures in hard rock mining and reliability which improves output of the query. For
civil construction. It focuses on the prediction of rock normalizing a database, we divide the dataset into
burst classification with the case instances using tables and establish relationships between the
cloud models and attribution weight. At first, the tables.The dataset normalization can essentially be
cloud models are introduced briefly related to the defined as the practice of optimizing table structures.
rock burst classification problem. Now, the Optimization is accomplished with the result of a
attribution weight method is presented to quantify thorough investigation of the various pieces of data
the contribution of each rock burst indicator for that will be stored within the database, in particular
classification. This approach is implemented to concentrating upon how this data is interrelated
predict the classes of rock burst intensity for the 164
rock burst instances collected.
y=x-(min(x)) / (max(x)-min(x))
FEATURE SELECTION
heuristic search, meta-heuristic methods and [8]. Tan P.-N., Steinbach M. and Kumar V.,
methods that use artificial neural network. The "Introduction to Data Mining", Addison
future methodology is used to analyze the Rock Burst Wesley, 2006
dataset region into separable compartments i.e. Rock [9]. Weber.M, Welling.M, and Perona.P.
Burst dataset etc. However, the method requires "Unsupervised Learning of Models for
further improvement mostly regarding feature Recognition
selection of the Rock Burst dataset into multiple
components: renal cortex, renal column, renal Cite this article as :
medulla and renal pelvis. Apart from that, this is
planned to expand the database on which the system Sadesh S, Banupriya GK, "Effective Prediction for
will be tested. And also, the proposed method in this Rock Burst Dataset Using Classification Algorithms
project can be employed for detecting the Rock Burst with Particle Swarm", International Journal of
dataset Geo-graphical in future with the Rock Burst Scientific Research in Computer Science, Engineering
dataset and classification of the Geo-graphical. and Information Technology (IJSRCSEIT), ISSN :
2456-3307, Volume 5 Issue 1, pp. 180-184, January-
V. REFERENCES February 2019. Available at doi :
https://doi.org/10.32628/CSEIT195122
[1]. Akay M.F. "Support vector machines combined Journal URL : http://ijsrcseit.com/CSEIT195122
with feature selection for breast cancer
diagnosis" (2009) Expert Systems with
Applications, 36 (2 PART 2) , pp. 3240-3247.
[2]. Cristianini N and Shawe-Taylor J., "An
Introduction to Support Vector Machines and
Other Kernel-based Learning Methods",
Cambridge University Press, 2000.
[3]. Fergus.R, Fei-Fei.L, Perona.P, and Zisserman.A.
"Learning Object Categories from Google’s
Image Search".
[4]. Han, Jiawei; Kamber, Micheline (2001). Data
mining: concepts and techniques. Morgan
Kaufmann. p. 5. ISBN 978-1-55860-489-6.
[5]. Han, Kamber, Pei, Jaiwei, Micheline, Jian (June
9, 2011). Data Mining: Concepts and
Techniques (3rd ed.). Morgan Kaufmann. ISBN
978-0-12-381479-1.
[6]. Pal S.K. and Mitra P, "Pattern Recognition
Algorithms for Data Mining", CRC Press, 2004.
[7]. R language and environment Hornik, Kurt
(November 26, 2015). "R FAQ". The
Comprehensive R Archive Network. 2.1 What
is R. Retrieved 2015-12-06.
Technology changes every day and everyone wants to add more comfort in our life but some technologies
increase the safety. Wireless Sensors are one of the technologies which increase the safety in our life in some
manner. Wireless sensors are used in remote areas where human cannot survive to collect results of atmosphere,
temperature and pressure. All the technical devices are work on electricity/battery and in remote area it is
impossible to change batteries or provide continues power supply to sensors that is why we want to increase
the lifetime of wireless sensor network in this paper. In this paper we are explaining our approach which is
developed by us to increase the lifetime of wireless sensor network as well as we are comparing its results to
some other technologies which are already present now a days.
Keywords : EES Scheme, LBM, REAR, Hybrid, Network Topology, Routing, Random Event Model
CSEIT195140 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 185-190 ]
185
Bhumika Yadav, Ram Neresh Sharma Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 185-190
For every set of simulation I consider 500 random Random event launch sequence
events. The attributes of events such as start and end
time etc are generated randomly and stored in a file Other Parameters
as an input to simulator. In performance evaluation
comparison in EES with 50 events in the simulation,
my experiment has higher occurrence rate because I
am considering the 500 random events are put into
launce sequence during one simulation. The coverage
are for each event varies from 6m to 30m in the
network and the duration of the event varies from 1
unit time to maximum 3000 unit time in the system.
The actual duration of an event will depend on Algorithm
specific application and the time may vary in
millisecond, or in several minutes or in several hours. LBM can be represented as
• S = the set of all sensors in the network
In each time interval many events can start, many • pfinal = (Xs, Ys) the final position of the sink node
can end or many can continue. To define each time • ptentative = (X’s, Y’s) the tentative position of the
unit of the simulation the simulator uses a timeline, sink node (for finding routes)
event file access, read Startn and Endn of every event • pi = (xi, yi) the position of sensor node 𝑠𝑠𝑖𝑖∈𝑆𝑆.
and place them into corresponding sequence of • bi = Total number of bits transmitted by sensor node
launch for every time interval. When the simulation 𝑠𝑠𝑖𝑖∈𝑆𝑆.
start simulation process and the simulation reach the • wi = Total number of bits generated by sensor node
time interval then it will generate pop event in the 𝑠𝑠𝑖𝑖∈𝑆𝑆 .
sequence and perform start or end activities. • dij = distance from node si to node sj
• cij = cost of edge e(i& j)
• dmax = maximum transmission range of a sensor
node
• rij = 1 if and only if node si transmits its data
directly to node sj
Algorithm 1:-
Step 1: Calculate tentative sink position ptentative =
(X’s, Y’s
Based on EES [51], use equations (3) and (4) to • Metric 1: First sensor node depletes energy
compute values for X’s and Y’s • Metric 2: 10% of total sensors depletes energy
Step 2: Calculate paths • Metric 3: Network becomes disconnected, i.e.
Use Dijkstra’s algorithm [52] to compute the path at least one sensor node cannot find a valid
from each sensor 𝑠𝑠𝑖𝑖∈𝑆𝑆 to sink node at (X’s, Y’s) path to route data back to the sink
Step 3: Determine load on each sensor node
Load on node-
Step 4: Calculate final sink position
Result Analysis and Performance Fig 3 – Network Lifetime in network with 200
sensors
I am comparing 4 different strategies in our
comparisons
1. Location based sink placement (EES)
2. Load based sink placement (LBM)
3. Residual Energy aware routing (REAR)
4. Hybrid approach that combines both LBM
and REAR (Hybird).
For each network size, we generated 5 different Fig 4 – Network Lifetime in network with 500
random topologies, and tested each topology with 5 sensors
sets of random events sequences. So, the results Comparison of lifetimes for grid topologies
reported for the random networks are averages from
the 25 runs. As mentioned earlier, different
researchers have used different metrics to measure
the lifetime of a wireless sensor network. In our
simulations, we have taken the following commonly
used metrics to measure network lifetime:
Fig 5 – Network Lifetime in grid with 100 sensors Fig 8 – Network lifetime under different maximum
transmission range in network with 200 sensors
ABSTRACT
Automation of farm activities can transform agricultural domain from being manual and static to intelligent and
dynamic leading to higher production with lesser human supervision. This paper proposes an automated
irrigation system which monitors and maintains the desired soil moisture content via automatic watering.
Microcontroller ATMEGA328P on arduino uno platform is used to implement the control unit. The setup uses
soil moisture sensors which measure the exact moisture level in soil. This value enables the system to use
appropriate quantity of water which avoids over/under irrigation. IOT is used to keep the farmers updated
about the status of sprinklers. Information from the sensors is regularly updated on a App using WiFi modem
through which a farmer can check whether the water sprinklers are ON/OFF at any given time. Also, the
sensor readings are transmitted to a Thing speak channel to generate graphs for analysis.
Keywords : Irrigation System, Soil Moisture Sensor, Temperature Sensor, Humidity Sensor, IOT, Android
CSEIT195155 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 191-196 ]
191
Anjali Dokhande et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 191-196
A. Moisture Measurement This stage is called as the field limit. Void spaces are
currently loaded with water and air parcels (Fig. 1(b)).
Soil is comprised of blend of segments including Each harvest has a Critical Soil Moisture Deficit level,
mineral and natural particles, with water and air enabling soil to dry out past this level, water pulling
making up the spaces in the middle. Soil can be from edit can't occur, diminishing the yield. Advance
essentially characterized into following 4 classes: more water expulsion from soil lead little holding of
water by soil particles much firmly on account of
surface strain impact for the yield to remove this is
said to be as withering point as appeared in figure 1(c).
The accessible water limit is the measure of water a
dirt can make accessible to plants, by and large
It is encouraged to break down soil to reason its
characterized as the contrast between measure of
classification. Every classification has distinctive
water put away in a dirt at field limit and the measure
properties henceforth their water holding limit
of water put away in the dirt at the lasting shrinking
changes from one sort to the next. As water invades
point. Plants get the vast majority of water from the
soil, it begins to fill the hole between the void spaces
upper part of the root zone.
in the middle of soil particles (Fig. 1(a)), when every
one of the spaces are totally immersed with the water,
The term viable root zone alludes to about the upper
the state is known as immersion point. This state goes
portion of the root zone profundity, where around 70%
on for brief time. With time overabundance water
of harvests water is taken up.
permeates descending through water profile because
of gravitational power. At same time narrow activity
give inverse power to gravity and give adjusted
condition so descending development of water is
ruined.
methodology for moisture estimation is assessing moisture sensor (VH400) in the perspective of
assortment in dielectric steady [7]. Dielectric electromagnetic estimation and second is soil
unfaltering of water is (~80) high when appeared temperature sensor (DS1822). The recorded data was
differently in relation to dry soil (2-3). In [8] secured locally in the memory chip and was moreover
assortment of the dielectric was assessed as an transmitted to the web. The system is controlled
assortment in the capacitor using capacitor and capable and thoroughly wears down sun controlled
resistor interface. The response is generally immediate essentialness. The promising delayed consequence of
which is required in case of exactness agriculture. S. S. around 90% water saving was viewed. P. Bhosale and
Mathurkar and D. S. Chaudhari [9] showed a model in V. Dixit made atmosphere monitoring structure. They
perspective of moisture, temperature and humidity used a broad assortment of sensors for monitoring
sensor. All of the sensors were balanced for the specifically ecological temperature and humidity
straight response. The standard purpose of the (SHT1x), Soil temperature (LM35), Radiation and
structure is to develop an exact system which can be sunshine, soil moisture (gypsum square in perspective
utilized in real estate and offer preferences to the of the resistive framework), wind speed and course
farmer. (anemometer) and rainfall. In control board, PIC
microcontroller was used. The total data was secured
An epic method to manage design automated in memory card amassing and was also sent to the
irrigation system is the use of Plant water weight remote customer by methods for the GSM module.
examination. It is overcome selection of optical and IR Powerful usage of water was practiced through this
pictures of plant overhang. This particular enrollment structure [12].
speaks to a couple of challenges as no anticipated
essential segment or right organizing can be found IV. PROPOSED METHODOLOGY
from the data pictures. X. Wang et al [10] developed
an Automatic Cross-Correlation course of action Nowadays agricultural field is facing lot of problems
count which uses the information of smart picture due to lack of water resources. In order to help the
structure yet clears out the effect of picture shading farmers to overcome the difficulties, smart irrigation
and power in the relationship method and thusly system has been used. In this system, various sensors
achieves a pleasing enlistment result. They similarly such as pH, soil moisture and DHT11 are connected to
realized capable computation approach which can the input pins of Arduino microcontroller. The sensed
fundamentally diminish the estimation eccentrics of values from the sensors are displayed in LCD. If the
the ACC count while keeping up needed exactness. sensed value goes beyond the threshold values set in
Game plan control was also improved by accepting N- the program, the pump will be automatically switched
maxima procedure in the control point count. ON/OFF by the relay circuit and it is connected to the
Preliminary comes about showed that the proposed driver circuit which helps to switch the voltage. The
system defeated each and every other procedure for farmer will be intimated about the current field
region-based methods. J. Gutierrez et al [11] executed condition through Wi-Fi module and also updated in
amazingly capable automated system with remote the web page. By using this system, the farmer can
sensor arrange. The remote interface was given access the details about the condition of the field
through the GPRS module (MTSMC-G2-SP). The anywhere at any time.
structure has two information parameters at first is
V. COMPONENTS USED
• Wi-Fi Module
• Soil Moisture Sensor The ESP8266 Wi-Fi module is a self-contained SOC
Soil Moisture sensor is used to measure the moisture (System on Chip) with integrated TCP/IP
content present in the soil. When the soil moisture (Transmission Control Protocol/Internet Protocol)
value read by the sensor is above the threshold value, protocol stack that can give any microcontroller
low level (0V) will be the digital output and if it is access to any Wi-Fi network. Each ESP8266 module
below the threshold level, high level (5V) will be the comes preprogrammed meaning, it can be simply
digital output. The digital pin is used to directly read hooked up to Arduino device to get Wi-Fi ability. This
current soil moisture value to see if it is above module has a powerful enough on-boarding process
threshold or not. The threshold voltage can be and high storage capacity that allows it to be
regulated with help of potentiometer. integrated with the sensors and other application
specific devices.
VI. APPLICATION
ABSTRACT
Marg-Sudhar: Pothole Reporting System is a mobile application for detecting and reporting road condition.
Dangerous road surface conditions are major distractions for safe and comfortable transportation and therefore
road damage needs to be reported by locality. Data can be gathered by clicking image to identify potholes and
other severe road surface anomalies using geotagging technique and upload on the server.
Keywords : Potholes, GPRS, Geotagging, Road Maintainance, Strategy i.e. Click, "Report" and "Fix".
CSEIT195153 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 197-202 ]
197
Riya Agrawal et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 197-202
The pothole information obtained from pothole Fig. 2. Pothole detection system and its application
reporting system is sent to server and can be applied
to a pothole alert service and road management Application has been implemented on following
system. All uploaded information are shown as a list android features:
view on client side. Also, the obtained pothole
information is provided to Road Management System. • For designing part various activities and their
components are used.
III. IMPLEMENTATION • Communication between activities has been
implemented using Intent object. Intent is an
Marg-Sudhar has been implemented using following messaging object use to request an action from
technologies (1) Android (2) Java (3) SQL (4) another app component.
Geotagging (5) Web Technologies. • Components registration, is an entry point
through which the system or a user can enter into
(1) Android: app.
• Also, various background services rights has been
Android studio is the IDE for google’s Android OS used.
build on JetBrains’ InteliJ IDEA software and • This application needs various build app access
designed specifically for android development. The rights such as: Storage, Camera, Data access,
following features are provided in the current stable Internet access, GPRS access.
version: Gradel-Based build support, Android-specific • Data is Authenticated due to security purpose at
refactoring and quick fixes, template-based vizards to various point such as at time of login.
create common android designs and components, a
rich layout editor that allows user to drag-and-drop (2) Java:
UI components, build-in support for google cloud
platform, enabling integration with firebase cloud Java is an object-oriented, class-based, concurrent,
messaging and google app engine. secured and general-purpose computer-programming
language.
(4) Geotagging:
IV. WORKING
IX. ACKNOWLEDGEMENT
Smart Meals
Shivali Singh1, Aishwarya Narnaware1, Kirtikumar Jain1, Kash Patel1, Prof. S Dhawale2
1Department of Computer Science Engineering, Rashtrasant Tukadoji Maharaj Nagpur University,
Nagpur, Maharashtra, India
2 Professor, Department of Computer Science Engineering, J D College of Engineering and Management,
Nagpur, Maharashtra, India
ABSTRACT
Online business, also known as e-commerce or electronic commerce, refers to transaction and the activities that
have been performed by the customers and seller over the business is facilitated by the web based technologies.
Online food delivery system is one of the most popular online business products. Customers are able to view
and select their favourite food from the list, add to the cart, choose the delivery types, make payments and the
order is complete.
Keywords : Automated Food Ordering System, Dynamic Database Management, Global Positioning System
CSEIT195152 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 203-206 ]
203
Shivali Singh et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 203-206
Now the verification of the customer details will be shortest path. In this project through .NET
done to see that whether it is valid or invalid. So for technology we have created login page, checking our
this we have to contact the credit card company. password and through MySQL we created database.
After this if we find all the details correct in all After login our site will show variety of nearby hotels
means then the order is placed successfully. But if through which a customer can order the meals.
given details mismatch then the order will be
cancelled. In the future research, we suggest adding more
variable for routing optimization process such as type
Now, the last step is to make the product ready and vehicle, the size of food packages, holiday session the
get the delivery. driver license type owned by delivery service and the
maximum capacity of the vehicle type. These
ADVANTAGES additional variables will add the complexity to our
application. This system can also enhance to produce
• Online Ordering and easy to use for all. an online system by adding the email notification
• Freedom for demanding food. feature for order confirmation with official receipt.
• Food available on decided places.
• Remove time consumption. VI. ACKNOWLEDGMENT
• Meal comes with good packing.
• Hygiene has first priority. Special Thanks to our Head of Department CSE/IT
• Hassle-free food preparation. Prof Prasanna Lohe , for his valuable suggestions and
encouragement.
FLOW DIAGRAM
VII.REFERENCES
ABSTRACT
Face recognition has been a quickly developing, testing and intriguing region progressively applications. An
extensive number of face recognition calculations have been produced in a decade ago. In this paper an
endeavor is made to survey an extensive variety of techniques utilized for face recognition exhaustively. This
incorporate PCA, LDA, ICA, SVM, Gabor wavelet delicate registering instrument like ANN for recognition and
different cross breed blend of this systems. This audit examines every one of these techniques with parameters
that difficulties face recognition like illumination, pose variation, facial expressions.
Keywords: Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Face Recognition,
Independent, Component Analysis (ICA), Artificial Neural Networks (ANN)
CSEIT195159 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 207-213 ]
207
Aishwarya Admane et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 207-213
II. FACE RECOGNITION ALGORITHMS LDA is more touchy than PCA and ICA on fractional
impediments, however PCA is less delicate to halfway
A. Principal Component Analysis (PCA) impediments contrasted with LDA and ICA. PCA is
PCA otherwise called Karhunen-Loeve technique is utilized as a measurement lessening method in [12]
one of the famous strategies for include determination and for demonstrating articulation disfigurements in
and measurement lessening. Recognition of human [13].
faces utilizing PCA was first done by Turk and
Pentland [8] and recreation of human faces was A recursive calculation for figuring the discriminant
finished by Kirby and Sirovich [9]. The recognition highlights of PCA-LDA method is presented in [14].
technique, known as eigenface strategy characterizes This technique focuses on testing issue of figuring
an element space which lessens the dimensionality of separating vectors from an incrementally arriving
the first information space. This diminished high dimensional information stream without
information space is utilized for recognition. In any processing the comparing covariance grid and without
case, poor separating power inside the class and huge knowing the information ahead of time. The proposed
calculation are the outstanding basic issues in PCA incremental PCA-LDA calculation is exceptionally
technique. This restriction is overwhelmed by Linear proficient in memory utilization and it is extremely
Discriminant Analysis (LDA). LDA is the most productive in the estimation of first premise vectors.
predominant calculations for highlight choice in This calculation gives an adequate face recognition
appearance based techniques [9]. achievement rate in correlation with extremely
acclaimed face recognition calculations, for example,
Be that as it may, numerous LDA based face PCA and LDA. Two appearance– based systems, for
recognition framework initially utilized PCA to lessen example, Modified PCA (MPCA) and Locality
measurements and after that LDA is utilized to boost Preserving Projections (LPP) are consolidated in [15]
the separating energy of highlight determination. The to give a high face recognition rate. PCA is utilized as
reason is that LDA has the little specimen measure a component extraction strategy in [16]. These
issue in which dataset chose ought to have bigger component vectors are thought about utilizing
examples per class for good segregating highlights Mahalanobis separations for basic leadership. Tensor
extraction. Accordingly executing LDA based Multilinear PCA approach is proposed in [17]
straightforwardly brought about poor extraction of which removes highlight specifically from the tensor
separating highlights. In the proposed strategy [10] portrayal as opposed to the vector portrayal. This
Gabor channel is utilized to channel frontal face technique demonstrates a superior execution in
pictures and PCA is utilized to decrease the correlation with the outstanding strategies in separate
measurement of separated component vectors and changing situations.
after that LDA is utilized for highlight extraction. The
exhibitions of appearance based factual techniques, for PCA can outflank over numerous different systems
example, PCA, LDA and ICA are tried and looked at when the span of database is little. In proposed
for the recognition of hued faces pictures in [11]. PCA calculation [18] the database was sub grouped utilizing
is superior to LDA and ICA under various a few highlights of enthusiasm for faces. Just a single
illumination variations however LDA is superior to of the acquired subgroups was given by PCA to
ICA. recognition. Notwithstanding the great aftereffects of
PCA, this system has the inconvenience of being Another face recognition technique in light of PCA,
computationally costly and complex with the LDA and neural system were proposed in [21]. This
expansion in database estimate, since every one of the technique comprises of four stages:
pixels in the picture are important to get the portrayal
used to coordinate the information picture with all i. Preprocessing
others in the database. ii. Dimension lessening utilizing PCA
iii. include extraction utilizing LDA
Diverse dimensionality diminishment methods, for iv. grouping utilizing neural system.
example, PCA, Kernel PCA, LDA, Locality
safeguarding Projections and Neighborhood Blend of PCA and LDA were utilized for enhancing
Preserving inserting were chosen and connected so as the capacity of LDA when a couple of tests of pictures
to decrease the loss of grouping execution due to were accessible and neural classifier was utilized to
changes in facial appearance. The execution of diminish number misclassification caused by not-
recognition while utilizing PCA and in addition LDA directly distinguishable classes. The proposed strategy
for dimensionality diminishment is by all accounts was tried on Yale face database. Exploratory outcomes
parallel as far as precision. However, it was watched on this database showed the viability of the proposed
that LDA requires long time for preparing more technique for face recognition with less
number of numerous face pictures notwithstanding misclassification in examination with past strategies.
for little databases. In the event of Locality Preserving
Projections (LPP) and NPE techniques, the An alternate approach for face recognition was
recognition rate was less if expanding number of face proposed in [22] which limit calculation time while
pictures were utilized when contrasted with that of accomplishing higher discovery precision. PCA was
PCA and KPCA strategies. The proposed technique utilized to decrease the measurement separating a
[19] gave significant enhancements on account of component vector. GRNN utilized as a capacity
illumination variations, PCA and bit PCA are the best estimate system to identify whether the information
entertainers. picture contains a face or not and if existed then
reports about its introduction. The proposed
Altered PCA calculation for face recognition were framework had demonstrated that GRNN can perform
proposed in [20], this strategy depended on superior to back propagation calculation and give
diminishing the impact of eigenvectors related with some answer for better regularization.
the expansive eigen esteems by normalizing the
component vector component by its comparing B. Support Vector Machine (SVM)
standard deviation. The reenactment comes about Support Vector Machines (SVM) are a standout
demonstrate that the proposed strategy brings about a amongst the most valuable systems in grouping issues.
superior execution than customary PCA and LDA One clear case is face recognition. Be that as it may,
approaches and the computational cost continues as SVM can't be connected when the component vectors
before as that of PCA and significantly less than that characterizing tests have missing sections. A grouping
of LDA. calculation that has effectively been utilized as a part
of this structure is the all-known Support Vector
Machines (SVM) [23], which can be connected to the
first appearance space or a subspace of it acquired in This approach depended on the exhibitions of a firmly
the wake of applying an element extraction technique segregating optical connection strategy alongside the
[24] [25] [26]. The benefit of SVM classifier over heartiness of the ICA show. Independent component
customary neural system is that SVMs can accomplish analysis (ICA) demonstrate had started enthusiasm for
better speculation execution. looking for a direct change to express an arrangement
of arbitrary factors as straight mixes of factually
C. Independent Component Analysis (ICA) independent source factors [36]. ICA gave a more
Independent component analysis (ICA) is a strategy intense information portrayal than PCA as its
for finding basic elements or components from objective was that of giving an independent instead of
multivariate (multidimensional) measurable uncorrelated picture deterioration and portrayal. A
information. There is have to execute face recognition quick incremental primary non Guassian headings
framework utilizing ICA for facial pictures having analysis calculation called IPCA_ICA was proposed in
face introductions and distinctive illumination [37].This calculation figures the key components of an
conditions, which will give better outcomes as arrangement of picture vectors incrementally without
contrasted and existing frameworks [27] [28] [29] . evaluating the covariance grid and in the meantime
What recognizes ICA from different strategies is that, change these important components to the
it searches for component that is both measurably independent bearings that amplify the non-
independent and non-gaussian [27]. The ICA is like Guassianity of the source. IPCA_ICA is extremely
visually impaired source detachment issue [30] that effective in the estimation of the main premise vectors.
comes down to finding a straight portrayal in which PCA_ICA makes higher normal progress rate than
the components are measurably independent. The Eigenface, the Fisherface and FastICA strategies.
correlation of face recognition utilizing PCA and ICA
on FERET database with various classifiers [31] [32] III. CONCLUSIONS
were talked about and discovered that the ICA would
be advised to recognition rate as contrasted and PCA This paper has endeavored to survey significant
with factually independent premise pictures and number of papers to cover the current advancement
furthermore with measurably independent in the field of face recognition. Introduce think about
coefficients. Face recognition utilizing ICA with uncovers that for upgraded face recognition new
extensive revolution edges with poses and variations calculation needs to advance utilizing half and half
in illumination conditions was proposed in [33]. A strategies for delicate figuring apparatuses, for
novel subspace technique called successive line example, ANN, SVM, SOM may yields better
segment independent component analysis for face execution. The rundown of references to give more
recognition is proposed in [34]. In ICA each face itemized comprehension of the methodologies
picture is changed into a vector before figuring the portrayed is enrolled. We apologize to specialists
independent components. RC_ICA decreases face whose critical commitments may have been neglected.
recognition blunder and dimensionality of recognition
subspace ends up noticeably littler. A novel system for
face recognition consolidated the independent
component analysis (ICA) demonstrate with the
optical connection procedure was proposed in [35].
[20]. Lin Luo, M.N.S. Swamy, Eugene I. Plotkin, ―A Applications‖ Neural Networks Research Centre
Modified PCA algorithm for face recognition‖, Helsinki University of Technology P.O. Box
Proceedings of IEEE 2003 5400, FIN-02015 HUT, Finland, Neural
[21]. A. Hossein Sahoolizadeh, B. Zargham Heidari, Networks, 13(4-5):411-430, 2000
and C. Hamid Dehghani,‖ A New Face [31]. Bruce A. Draper, Kyungim Baek, Marian
Recognition Method using PCA, LDA and Stewart Bartlett, ―Recognizing faces with PCA
Neural Network‖, International Journal of and ICA‖, Computer Vision and Image
Electrical and Electronics Engineering 2:8 2008 Understanding 91 (2003) 115-137.
[22]. Feroz Ahmed Siddiky, Mohammed Shamsul [32]. Jian Yang, David Zhang, Jing-yu Yang, ―Is ICA
Alam,Tanveer Ahsan and Mohammed Saifur Significantly Better than PCA for Face
Rahim,‖An Efficient Approach to Rotation Recognition?‖ Proceedings of the Tenth IEEE
Invariant Face detection using PCA,Generalized International Conference on Computer Vision
Regression Neural network and Mahalanobis (ICCV’05) 1550- 5499/05.
Distance by reducing Search space‖,Proceedings [33]. Kailash J. Karande, Sanjay N.Talbar,‖ Face
Of IEEE 2007 Recognition under Variation of Pose and
[23]. Vapnik. Statistical Learning Theory. JohnWiley Illumination using Independent Component
and Sons, New York, 1998. Analysis‖, ICGST-GVIP, ISSN 1687-398X,
[24]. E. Osuna, R. Freund, and F. Girosit. Training Volume (8), Issue (IV), December 2008
support vector machines: an application to face [34]. Quanxue Gao , LeiZhang, DavidZhang,‖
detection. Proc. of CVPR, pages 130–136, 1997. Sequential row–column independent
[25]. B. Heisele, T. Serre, and T. Poggio. A component analysis for face recognition‖,
componentbased framework for face detection Elsevier 2008
and identification. IJCV, 74(2):167–181, 2007. [35]. A. Alfalou and C. Brosseau,‖ A New Robust and
[26]. Q. Tao, D. Chu, and J. Wang. Recursive support Discriminating Method for Face Recognition
vector machines for dimensionality reduction. Based on Correlation Technique and
IEEE Trans. NN, 19(1):189–193, 2008. Independent Component Analysis Model‖,
[27]. Marian Stewart Bartlett, Javier R. Movellan, Optics Letters 36 (2011) 645-647
Terrence J. Sejonowski, ―Face Recognition by [36]. P. Comon, ―Independent component analysis:
Independent Component Analysis‖, IEEE a new concept?‖, Signal Process. 3, 287-314
Transactions on Neural Networks, vol-13, No- (1994).
6,November 2002, PP 1450- 1464. [37]. Issam Dagher and Rabih Nachar,‖Face
[28]. Pong C.Yuen, J.H.Lai, ―Face representation Recognition Using IPCA-ICA algorithm‖, IEEE
using independent component analysis‖, Pattern Transactions On Pattern Analysis and Machine
Recognition 35 (2002) 1247-1257. Intelligence, VOL. 28, NO. 6, JUNE 2006
[29]. Tae-Kyun Kim, Hyunwoo Kim, Wonjum [38]. Arindam Kar, Debotosh Bhattacharjee, Dipak
Hwang, Josef Kittler, ―Independent component Kumar Basu, Mita Nasipuri, Mahantapas
analysis in a local facial residue space for face Kundu,‖ High Performance Human Face
recognition‖, Pattern Recognition 37 (2004) Recognition using Independent High Intensity
[30]. Aapo Hyvärinen and Erkki Oja ―Independent Gabor Wavelet Responses: A Statistical
Component Analysis: Algorithms and Approach‖, International Journal of Computer
ABSTRACT
With various developing applications requiring biometric acknowledgment of children (e.g., following tyke
immunization plans, recognizing missing children and counteracting infant swaps in emergency clinics),
exploring the worldly solidness of biometric acknowledgment precision for children is critical. The diligence of
acknowledgment precision of three of the most ordinarily utilized biometric qualities (fingerprints, face and iris)
has been examined for grown-ups. Notwithstanding, the industriousness of biometric acknowledgment
precision has not been concentrated methodicallly for children in the age gathering of 0-4 years. Given that
youthful children are regularly uncooperative and don't fathom or adhere to directions, as we would see it,
among all biometric modalities, fingerprints are the most suitable for perceiving children. This is principally in
light of the fact that it is simpler to catch fingerprints of youthful children contrasted with other biometric
attributes, e.g., iris, where a tyke needs to gaze straightforwardly towards the camera to start iris catch. In this
report, we detail our drive to explore the perseverance of unique finger impression acknowledgment for
children.
Keywords : Bio-Metric, Fingerprint, Child Identification
CSEIT195160 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 214-220 ]
214
Shanon Paul et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 214-220
child fingerprints gathered by VaxTrac in Benin: (I) immunizations obtained, $50 will never go into the
upsample the obtained unique finger impression arm of a tyke in need"3. Accordingly, the kid death
picture to encourage particulars extraction, (ii) rates keep on being high in the low-salary and
coordinate the question print against formats made creating nations.
from every enlistment impression and wire the
match scores, (iii) intertwine the match scores of II. RELATED WORK
the thumb and forefinger, and (iv) refresh the
display with fingerprints procured over various A powerful inoculation program needs to monitor
sessions. which babies and little children have been
vaccinated and how frequently they have gotten
The United Nations Children's Fund (UNICEF's) the required sponsor shots from birth to 4 years old
"2013 Progress Report on Committing to Child (Fig. 1 demonstrates the UNICEF prescribed
Survival: A Promise Renewed" [2] makes reference vaccination plan for newborn children; for CDC
to that while more children currently make due suggested timetable for children up to 6 years see
past their fifth birthday celebration than at any [1]). In creating nations, regularly, there are no
other time, the poorest countries still lose an national distinguishing proof projects which can be
extensive number of children to immunization- utilized to recognize children all through the
preventable illnesses. The 2011 Grand Challenges in vaccination schedule4. This brings up the
Global Health Explorations Round 7 issued by the accompanying issue: can fingerprints, or, so far as
Bill and Melinda Gates Foundation [4] states that that is concerned some other biometric
"every year roughly 25 million babies don't get the methodology, be utilized to distinguish children
vital immunizations1, and in any event, 2.4 million from birth to 4 years old.
children bite the dust from antibody preventable
sicknesses."
framework, the left and right thumb prints of both The connection-based techniques utilized in spatial
the kid and his mom are gathered. In the event that or in the recurrence area associate two unique mark
the kid's fingerprints can't be coordinated effectively, pictures to process the similitude between them.
mother's fingerprints are utilized for building
up/confirming the youngster's personality. While A tale way to deal with unique mark arrangement
VaxTrac does not report the coordinating exactness and coordinating was proposed by Arun Ross et.al
of children's fingerprints, they notice that they [10]. The list of capabilities utilized in this strategy
constantly end up utilizing the mother's fingerprints was an edge include map. A lot of Gabor channels
for this reason in light of the fact that coordinating pre-tuned to a particular recurrence were utilized to
children's fingerprints flops frequently 5. Proceeded catch the neighborhood edge qualities at different
with endeavors are, thusly, expected to propel the introductions and concentrate the nearby edge
unique finger impression innovation, both detecting attributes. The convolution was performed in the
innovation just as coordinating calculation behind recurrence space. A standard deviation picture that
the versatile immunization library framework. In caught the variety in the edge quality at different
this paper, we present the underlying consequences introductions was developed utilizing the separated
of our progressing study on utilizing fingerprints to pictures. The edge highlight map was acquired
perceive newborn children and little children. utilizing standard deviation picture. A 2D connection
of the edge highlight maps of the question picture
III. LITERATURE SURVEY and format was resolved to produce a coordinating
score.
Countless for programmed unique finger impression
coordinating have been proposed in the writing. Two Karthik Nandakumar and Anil K. Jain [11] proposed a
given fingerprints are thought about by a connection based unique mark matcher that used the
coordinating calculation and return either a level of nearby relationship of districts around the details to
closeness (additionally called coordinating score) or assess the level of comparability between two unique
an acknowledgment/dismissal choice. This finger impression pictures. Particulars focus and the
workgroup the unique finger impression coordinating related edge focuses were separated from the layout
methodologies into connection based, particulars and the inquiry unique finger impression pictures.
based methodologies, and non-details include based, This technique utilized Procrustes examination to get
for example, edge shape, surface data and so forth. a decent gauge of comparing edge bends to adjust the
The motivation behind the study is to break down inquiry to the layout. The two pictures were
those calculations and talk about the execution improved utilizing a bank of Gabor channels of
assessment. various introductions. The standardized cross
correlation was processed to decide the nature of the
The current unique finger impression particulars coordinate. A database comprising of
acknowledgment frameworks utilize methods unique finger impression impressions of 160 clients
dependent on the neighborhood and worldwide were utilized to assess this technique.
element portrayals of the unique mark pictures, for
example, details, edge shape, surface data and so on. A Robust Fingerprint Matching Algorithm for
Verification dependent on connection was
introduced by Abdullah Cavusoglu et. al [12]. They
utilized a fluctuation based division technique to
fragment the unique mark picture. Neighborhood the connection between's edges of neighboring
edge introduction was resolved to utilize Sobel particulars that shows the similarity of regions in the
administrators. The strategy used to discover the middle of the two comparing particulars sets were
Reference point depended on the differential entirety processed. The item rule was utilized to join the
of sine estimations of the headings of the pixels quantity of coordinated particulars sets,
situated on a specific sweep. The proposed calculation neighborhood connection score and edge relationship
determined 12 distinctive cross connections score that spoke to an all-out aggregate of
dependent on certain span esteems from the coordinating zones in two fingerprints. The proposed
reference point for both the info and format pictures coordinating calculation recognized real coordinated
and found an all-out total to decide if the pictures details and impostor coordinated particulars in this
relate to a similar unique finger impression. The manner enhancing the coordinating precision.
proposed calculation was assessed on an open space
database. Haiyun Xu et.al [15] exhibited a novel technique for
unearthly details portrayal for unique finger
Koichi Ito et.al [13] proposed a proficient unique impression check. The ghostly particulars spoke to
mark acknowledgment calculation utilizing the stage detail set as a settled length include vector and
parts in 2D Discrete Fourier Transforms of the depended on the move, scale, and revolution
pictures. They utilized Phase-Only Correlation (POC) properties of the two-dimensional (2-D) ceaseless
capacity and Band-Limited Phase-Only Correlation
(BLPOC) capacity to decide the stature and area of Fourier change. The two details portrayal techniques
the crest from stage attributes in Fourier space, which utilized for particulars coordinating were Location-
gave the comparability measure and the translational Based Spectral Minutiae and Orientation-Based
uprooting between the pictures separately. The Spectral Minutiae. To lessen the higher frequencies, a
revolution and the removal between the enlisted Gaussian low-pass channel was connected on the
unique mark and the information finger impression range. Two coordinating calculations were exhibited.
pictures were standardized utilizing BLPOC work. The relationship of two ghostly pictures (direct
The covered locale of the two pictures was removed coordinating) was picked as a comparability score.
lastly the coordinating score is assessed as the The second calculation is the Fourier– Mellin
entirety of the most elevated two pinnacles. The coordinating, in
execution of their calculation was assessed on a
database comprising of 330 unique finger impression which the extent of the Fourier change of the
pictures. particulars range was taken to compute the likeness
score. The proposed calculations were assessed on
Jiang Li et.al [14] depicted a unique mark three unique finger impression databases. A basic
coordinating calculation that consolidates minutia relationship based unique mark confirmation
based coordinating strategy with relationship-based framework was proposed by Asker M. Bazen et.al
coordinating technique. Minutia based coordinating [16]. The proposed framework specifically utilized
calculation was utilized to separate the rundown of the more extravagant dark scale data of the
coordinated minutia sets from the two unique mark fingerprints.
pictures. Relationship of the nearby neighborhood
districts around each coordinating details pair that Suitable trademark layouts were chosen in the
speaks to the neighborhood likeness and furthermore essential unique mark and their relating positions in
the info unique finger impression were resolved. The [2]. Committing to child survival: A promise
format was moved over the whole unique finger renewed.
impression picture and the area where the separation http://www.unicef.org/lac/Committing to Child
is insignificant was picked as the relating position of Survival APR 9 Sept 2013.pdf.
the layout in the info finger impression. The data of [3]. Vaccines and immunizations.
all layout sets was converged to get the ultimate http://www.cdc.gov/vaccines
choice. The proposed framework execution was /vacgen/whatifstop.htm.
assessed on pictures from four diverse unique mark [4]. F. Galton. Finger prints of young children.
databases comprising of 880 fingerprints altogether. British Association for the Advancement of
Science, 1899.
IV. CONCLUSIONS [5]. C. Gottschlich, T. Hotz, R. Lorenz, S.
Bernhardt, M. Hantschel, and A. Munk.
Current biometric information catch and Modeling the growth of fingerprints improves
acknowledgment arrangements cook essentially to matching for adolescents. IEEE Transactions on
grown-ups (more than 16 years old). National ID Information Forensics and Security, 6(3):1165–
programs, for example, India's Aadhaar program, 1169, Sept 2011.
order catching fingerprints and iris pictures of people [6]. P. M. Corby, T. Schleyer, H. Spallek, T. C. Hart,
who are 5 years old or more established. There is R. J. Weyant, A. L. Corby, and W. A. Bretz.
currently a developing requirement for creating Using biometrics for participant identification
capacities to perceive exceptionally youthful children in a research study: a case report. J. Am.
(from infant to 4 years of age) in light of biometrics. Medical Informatics Assoc., 13(2):233–235,
For biometric acknowledgment to be fruitful, 2006.
uniqueness and constancy properties of a biometric [7]. S. Tiwari, A. Singh, and S. K. Singh. Intelligent
characteristic should be fulfilled for the number of method for face recognition of infant.
inhabitants in intrigue. While these two central International Journal of Computer
fundamentals of biometrics have been researched for Applications, 52(4):36–50, 2012.
the three essential biometric characteristics [8]. S. Bharadwaj, H. Bhatt, R. Singh, M. Vatsa, and
(fingerprints, face, and iris) of the grown-up populace, S. Singh. Face recognition for newborns: A
there is no thorough examination led to explore the preliminary study. In 4th IEEE BTAS, pages 1–
perseverance of biometric acknowledgment 6, Sept 2010.
(longitudinal investigation) for children. In this [9]. D.Weingaertner, O. R. P. Bellon, L. Silva, and
examination, we will likely research the tirelessness M. N. Cat. Newborn’s biometric identification:
of unique mark acknowledgment for children in the Can it be done? In VISAPP (1), pages 200– 205,
age gathering of 0-4 years. 2008.
[10]. Arun Ross, James Reisman and Anil Jain,
V. REFERENCES (2002), “Fingerprint Matching Using Feature
Space Correlation”, Biometric Authentication.
[1]. 2014 recommended immunizations for children Springer Berlin Heidelberg, pp. 48-57.
from birth through 6 years old. [11]. Karthik Nandakumar and Anil K. Jain ,(2004),
http://www.cdc.gov/vaccines/ “Local Correlation- based Fingerprint
parents/downloads/parentver- sch-0-6yrs.pdf. Matching”, Conference proceeding of
ABSTRACT
Machine learning techniques play an important role in building predictive models by learning from Electronic
Health Records (EHR). Predictive models building from Electronic Health Records still remains as a challenge
as the clinical healthcare data is complex in nature and analysing such data is a difficult task. This paper
proposes prediction models built using random forest ensemble by using three different classifiers viz. J48, C4.5
and Naïve Bayes classifiers. The proposed random forest ensemble was used for classifying four stages of liver
cancer. Using a feature selection method the reliable features are identified and this subset serves as input for
the ensemble of classifiers. Further a majority voting mechanism is used to predict the class labels of the liver
cancer data. Experiments were conducted by varying the number of decision trees generated using the J48, C4.5
and Naïve Bayes classifiers and compared with the classification made using decision stump and Adaboost
algorithms.
Keywords : Ensemble, Feature Selection, C4.5, J48 and Random Forest
CSEIT183818 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 221-228 ]
221
L. S. Rohith Anand et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 221-228
electronic health records. Section 3 explains the constraint projection for mutli-label ensemble. They
overall architecture of proposed system. Section 4 have adopted boosting methods to construct a multi-
reports the experimental results. Section 5 concludes label ensemble to increase the generalization ability
the paper. [6].
II. RELATED WORK Jia Zhua et. al. (2015) employed multiple classifier
systems (MCS) to improve the accuracy of disease
This section discusses the existing methods for pre- detection for Type-2 Diabetes Mellitus. Multi
processing, feature extraction, boosting methods such classifier system performs worse when design is not
as adaptive boosting. Aydin et. al. (2009) investigated proper [7]. They have proposed a dynamic weighted
the various factors involved on ensemble voting scheme for multiple classifier decision
construction using a wide variety of learning combination. Yan Li et. al. (2015) stated data mining
algorithms, data sets and evaluation criteria [5]. They framework for distributed healthcare information
have provided the idea of subset selection to the level based on privacy preserving constraints [8]. Neesha
of discriminating whether the discrimination is Jothi et. al. (2015) surveyed the data mining
applicable or not at the level of classifier.Ping Li et. al. techniques and has classified the articles have
(2013) surveyed about supervisedmulti-label suggested data mining plays important role in
classification and proposed variable pairwise medical diagnosing for predicting diseases [9].
Based on the literature survey carried out a proposed system and how limitations in existing
comparative analysis of the ensemble of classification system is resolved.
methods, the data sets used for experiments by
different researchers, the number of iterations for III. PROPOSED WORK
which the experiments were conducted and the
metrics used for measuring the classification accuracy The proposed architecture is shown in Figure 1. The
are tabulated in the table given below. Electronic health records contain features like patient
id, status, age, sex, hepato, ascites, edema, billi,
From the above table the conclusion drawn is an cholestrol, albumin etc. The data considered have to
ensemble of C4.5, J48 and Naïve Bayes classifier with be clinically transformed i.e. to make it suitable for
majority voting scheme was not studied and hence further processing. The clinical transformation step is
this work focusses on building a predictive model also identified as preprocessing step.
based on building a random forest using these three
classifiers. The proposed system has been compared The unprocessed has null values, irrelevant values
with the existing decision stump and Adaboost and noisy values. These data errors would lead to
algorithms. The next section discusses about the misclassification and hence need to be clinically
transformed. The missing data in the considered
dataset is imputed with values computed using mode The proposed system with its role and advantages is
function. discussed. The experimental result analysis of the
proposed work has been discussed in the next section.
After pre-processing of data, for classifying instances
under Random forest, three subsets from the datasets IV. RESULTS AND DISCUSSION
are generated. The subset will be generated
considering three features like platelet count, alkaline Experiment Results
phosphate and cholesterol values.
The proposed system is implemented using Java and
The random forests are built using three classification Weka tool. The liver cancer dataset having 500
algorithms namely C4.5, J48 and Naïve Bayes. There instances and breast cancer dataset are used for the
are many voting mechanisms followed for ensemble experiments. The ensemble of classifiers is used for
of classifiers, here we are using majority vote method classifying these datasets on which voting is
to perform voting with different classifiers. Here the performed.
output will be the final outcome of the majority of
classifiers Pre-processing
Figure 1 shows the architecture of proposed system. In this module, pre-processing of data is done. The
dataset which we have contains null values,
irrelevant values and noisy values. As missing values
in the dataset lead to misprediction of the final result,
the dataset is pre-processed by filling missed values
on basis of mode function. The dataset without pre-
processing which contains irrelevant values is shown
below in figure 2.
Figure 1. Architecture of Proposed System The dataset is preprocessed to fill missing and
irrelevant values as shown in figure 3
Feature selection
Performance Evaluation
Subset Generation
For classifying instances under Random forest, Figure 6. Comparison of J48 Random forest classifier
generate three subsets from the datasets. Subset will at different stages
be generated considering some features as first,
middle and last stages as shown in figure 5.
ABSTRACT
The use of machines to perform different tasks is constantly increasing in society. Providing machines with
perception can lead them to perform a great variety of tasks. Machine perception requires that machines understand
about their environment. Recognizing facial emotions will thus help in this regard. We use the TensorFlow library
and the Inception model and apply transfer-learning for our dataset to retrain the model. We then identify the facial
emotions: happiness, sadness, anger, surprise, disgust and neutral.
Keywords: Deep learning, TensorFlow, Inception, Transfer Learning, Convolutional neural networks.
CSEIT195150 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 229-234 ]
229
Sairama Geetanand et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 229-234
and the ones that don‟t suit the emotion are removed. part of ImageNet Large Sale Visual Recognition
The current dataset of images we used contain 2192 challenge 2014. It can classify almost every day-to-day
images for the six emotions : Happy, Sad, Angry, objects. The architecture of the Inception is briefly
Surprise, Disgust, Neutral. described in . Inception consists of 22 layers. The
penultimate layer is called as “Bottlenecks”. The final
B. TensorFlow layer is called as softmax layer. This is the layer that
can be retrained to classify the required image group.
Tensor Flow (TF) [2] is an open source software library We retrained it to classify 6 emotions: neutral, happy,
for machine learning written in Python and C++. The sad, surprise, disgust and anger. There are 3 metrics.
main reason behind it is that TF was developed by Training accuracy describes the accuracy of the
Google Brain Team. Google has already been using TF inception model in classifying the images on which it
to improve some tasks on several products. These tasks was trained. Validation accuracy describes the accuracy
include speech recognition in Google Now, search of the model in classifying the images that are not part
features in Google Photos, and the smart reply feature of the training dataset. Cross entropy is the loss
in Inbox by Gmail. Some design decision in TF have function. It describes the error rate.
lead to this framework to be early adopted by a big
community. One of them is the ease of going from
prototype to production. There is no need to compile or
to modify the code to use it on a product. Then, the Fig.1: The 3 metrics: Train accuracy, Class entropy,
framework is not only thought as a research tool, but as Validation accuracy
a production one. Another main design aspect is that
there is no need to use different API when working on D. Implementation
CPU or GPU. Moreover, the computations can be
deployed over desktops, servers and mobile devices. A Once we are sure that inception is correctly installed
key component of the library is the data flow graph. and is working correctly we retrain the model for our
The sense of expressing mathematical computations dataset like so. Modern object recognition models have
with nodes and edges is a TF trademark. Nodes are millions of parameters and can take weeks to fully train.
usually the mathematical operations, while edges define Transfer learning is a technique that shortcuts a lot of
the input / output association between nodes. The this work by taking a fully-trained model for a set of
information travels around the graph as a tensor, a categories like ImageNet, and retrains from the existing
multidimensional array. Finally, the nodes are allocated weights for new classes. We retrained the final layer
on devices where they are executed asynchronously or from scratch, while leaving all the others untouched.
in parallel when all the resources are ready. How is it done?
V. REFERENCES
Data in educational institutions are growing progressively along these lines there is a need of progress this
tremendous data into helpful data and information utilizing data mining. Educational data mining is the zone of
science where diverse techniques are being produced for looking and investigating data and this will be
valuable for better comprehension of understudies and the settings they learned. Classification of data objects in
view of a predefined learning of the articles is a data mining and information administration procedure utilized
as a part of collection comparable data questions together. Decision Tree is a valuable and well known
classification method that inductively takes in a model from a given arrangement of data. One explanation
behind its prominence comes from the accessibility of existing calculations that can be utilized to assemble
decision trees. In this paper we will survey the different ordinarily utilized decision tree calculations which are
utilized for classification. We will likewise contemplating how these decision tree calculations are appropriate
and valuable for educational data mining and which one is ideal.
Keywords : Educational data mining (EDM), Classification, Dropout Prediction, Selection Failure
CSEIT195167 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 235-239 ]
235
Mayuri S. Dongre et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 235-239
of measurements, data perception, and computational amid this stage the tree is recursively parcelled till
displaying. every one of the data things have a place with a
similar class name. Tree pruning is done is a base up.
As we examined over the new territory of center for It is utilized to enhance the forecast and classification
the specialists is EDM. In introduce the vast majority exactness of the calculation by limiting over-fitting.
of the procedures was produced for the educational Over-fitting in decision tree calculation brings about
data mining, which foresee the disappointment and misclassification mistake. Tree pruning is less
dropout understudies. Be that as it may, a large entrusting contrasted with the tree development
portion of the examination on the use of EDM to stage as the preparation data set is filtered just once.
determine the issues of understudy disappointment In this examination we will audit Decision tree
and drop-outs has been connected principally to the calculations executed, recognize the ordinarily
particular instance of advanced education and all the utilized calculations.
more particularly to on the web or separation
instruction. Less almost no data about particular II. RELATED WORK
research on basic and optional instruction has been Decision tree is a vital strategy for both acceptance
found, and what has been discovered uses just research and data mining, which is basically utilized
measurable strategies, not DM methods. Along these for display classification and expectation. ID3
lines, there is a need to proposed Educational data calculation is the most broadly utilized calculation in
mining system that is attainable for rudimentary and the decision tree up until this point. Through
optional instruction. outlining on the fundamental thoughts of decision
tree in data mining. ID3 calculation is a forerunner of
Classification can be depicted as a regulated learning C4.5 calculation and it was produced by a data
calculation in the machine learning process. It mining software engineering scientist Ross Quinlan
relegates class marks to data objects in light of earlier in 1983.It is utilized to build a decision tree by testing
information of class which the data records have a every hub's trait of tree in top-down way. ID
place. In classification a given arrangement of data calculation performs property choice component
records is partitioned into preparing and tests data utilizing Entropy and Information Gain idea. A
sets. The preparation data set is utilized as a part of decision tree is an essential method for data mining
building the classification display, while the test data and inductive realizing, which is generally used to
record is utilized as a part of approving the model. frame classifiers and expectation models [2].
The model is then used to order and foresee new
arrangement of data records that is not the same as C4.5 is a standout amongst the most exemplary
both the preparation and test data sets. Decision tree classification calculations on data mining. Decision
calculation is a data mining enlistment methods that Trees a Decision Tree is a helpful and prevalent
recursively segments a data set of records utilizing classification procedure that inductively takes in a
profundity first voracious approach or expansiveness model from a given arrangement of data. One
initially approach until the point when every one of explanation behind its fame originates from the
the data things have a place with a specific class. The accessibility of existing calculations that can be
tree structure is utilized as a part of arranging obscure utilized to manufacture decision trees [3].
data records. Decision tree classification system is
performed in two stages: tree building and tree CART is Classification and relapse trees. It was
pruning. Tree building is done in top-down way. It is presented by Breiman in 1984. It fabricates the two
classifications and regressions trees. The classification classification and for recognition of connection
tree development via CART. It depends on paired between factors [16].
part of the characteristics. It is additionally in view of
Hunt's model of decision tree development. It The present decision tree calculations likewise
additionally can be executed serially by Breiman et al. contrast in their capacity to deal with various sorts of
It utilizes gini record part measure for choosing the data, and by a wide margin the most exceptional
part quality. Pruning is finished by utilizing a calculation of the gathering is C4.5. C4.5 depends on
segment of the preparation data set in truck. This Quinlan's prior work with ID3 and is equipped for
approach utilizes both numeric and clear cut taking care of ceaseless data, data with missing
properties for building the decision tree and has in- esteems, and even has worked in ventures for
constructed highlights that arrangement with missing rearranging the resultant decision tree. Another
qualities [11]. purpose for the ubiquity of decision trees is that they
are regularly interpretable by human analyzers. The
The fundamental distinction between CART, ID3 and structure of a decision tree gives thinking to each
C4.5 is the manner by which the parceling of data is statement of class esteem, and it is trusted that this
performed. Truck utilizes the Gini list to choose the thinking is anything but difficult to understand.
part quality, though ID3 and C4.5 utilize an
estimation of data pick up and the data pick up The classifier is tried first to group inconspicuous
proportion. data and for this reason coming about decision tree is
utilized. C4.5 calculation takes after the standards of
SLIQ is the Supervised Learning in Ques approach. It ID3 calculation. Also C5.0 calculation takes after the
was presented by Mehta et al in 1996. It is a quick, tenets of calculation that is the vast decision tree can
adaptable decision tree calculation that can be see as an arrangement of guidelines which is
executed in serial and parallel example. It does not straightforward. C5.0 calculation gives the recognize
depend on Hunt's calculation for decision tree on clamor and missing data. Issue of over fitting and
classification. It segments a preparation data set mistake pruning is tackled by the C5 calculation. In
recursively. It utilizes expansiveness first ravenous classification procedure the C5 classifier can envision
procedure that is coordinated with pre-sorting which properties are important and which are not
method amid the tree building stage [17]. applicable in classification [5]
1Department of Computer Science and Engineering, JD College of Engineering and Management, Nagpur,
Maharashtra, India
2Assistant Professor, Department of Computer Science and Engineering, JD College of Engineering and
ABSTRACT
ETS (E-Toll System) is an electronic Toll Tax collection system by which we can collect the toll charges using
RFID card detection and scanning.These RFID Cards are related to the respective vehicle holders.This project
hence, reducing common problems like traffic congestion, Pollution caused due to vehicles, Time dilemma,
requirement of labours etc. Makes it effective to collect the required amount of charge from the driver. There
will be an RFID tag implemented on every vehicle. Whenever vehicle passes through the toll plaza RFID
reader with the help of sensors will detect tag and the required amount will be deducted. Driver don’t need to
stop to pay the money ,and this RFID card is used to track & bill the vehicle owner through a payment gateway.
Keywords : Electronic Toll Collection, RFID, XAMPP, Vehicle, Tag.
CSEIT195166 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 240-243 ]
240
Ankita Bambole et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 240-243
V. DATABASE
In this report, the conclusion that came out is that, to Ankita Bambole, Shrishti Thakur, Suvidha Ramteke,
implement modern system of toll collection new Sneha Borkar, Hitesh Kasturi, Prof. M. M. Baig, "E-
technique RFID came into light. The RFID safety is Toll System Using RFID", International Journal of
key important o this project. Scientific Research in Computer Science, Engineering
This project is reliable and easy way to pay toll as and Information Technology (IJSRCSEIT), ISSN :
compared to manual one. 2456-3307, Volume 5 Issue 1, pp. 240-243, January-
February 2019.
Project is all about automated toll system which will Journal URL : http://ijsrcseit.com/CSEIT195166
overcome disadvantages of current toll system. Our
project helps driver to pass through toll without
stopping his vehicle to pay the toll tax. RFID tag on
each vehicle will be detected by RFID reader and
amount will be deducted. Open Road Tolling
System[2] and Automated Toll system[3] these are
two previously implemented projects similar to our
project. We have studied them and we are trying to
overcome disadvantages of these two. The project if
implemented by government then toll system will be
fully automated and one who is passing through toll
don’t need to wait for a long time this will also
reduce pollution, traffic and accidents.
VII. REFERENCES
ABSTRACT
GPS is in actuality the main answer for outdoor positioning, no unmistakable arrangement has so far risen for
indoor positioning notwithstanding the business hugeness. Along these lines, the principal point is to grow
ongoing indoor following framework and utilizing cell phone sensors to give dependable and precise indoor
localization. Indoor navigation is a vital empowering innovation for application, for example, finding a
gathering room in a place of business, security exit amid a crisis or focused on the retail commercial in a
shopping center. Utilizing this thought, an application can be made and by methods for that application, we are
handling indoor navigation utilizing continuous navigation. The android application gives mindfulness,
straightforwardness to discover your direction, commercial and effortlessness. To give solid indoor navigation
to business structures like shopping centers, enterprises, universities, hospitals, inns. In this paper, we give an
order and arrangement of the current indoor positioning systems and distinguish some conceivable zones of
improvements.
Keywords : Indoor Navigation, Pedestrian Navigation, GPS, Object Tracking, Location Based Services
CSEIT195165 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 244-250 ]
244
Meenakshi D. Dhobale et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 244-250
considered and coordinate them with the client II. LITERATURE REVIEW
prerequisites, which must be broke down and
portrayed decisively for every application. In Scientists and organizations have made considerable
addition, the estimations of the execution parameters commitments to the theme of Indoor Positioning
are not univocally definable since they thus rely systems and conditions. Indoor Positioning zone is
upon different factors and conditions. Consequently, brimming with valuable commitments. In this
it is important to locate the correct exchange off segment, we talk about the diverse indoor conditions
among execution parameters, client necessities, and and the best in the class of indoor positioning systems.
natural conditions so as to plan a modified
arrangement. A. Fixed Indoor Positioning
In an outside situation, the Global Positioning System Normal design of Fixed IPS systems is having settled
(GPS) works productively in positioning and focusing number of Base Stations (BS), which is the
on various sorts of substances. It has been utilized in fundamental PC that gets every one of the signs from
numerous outdoor applications for limiting the diverse hubs and ascertains the directions of the
individuals, autos, just as different items. Be that as it objective article utilizing the parameters sent from
may, GPS comes up short on a similar dimension of the sensor hubs. All BS are required to be introduced
effectiveness when utilized inside indoor situations. in settled areas inside the building. In addition, a
This issue is because of the presence of hindrances Wireless Sensor arranges including the sensor hubs
that can debilitate the flag of the GPS (e.g., building are required. In this structure, the sensor hubs are in
engineering, dividers) where the presence of various charge of proliferating the flag got from a portable
gear can cause a commotion in the GPS transmitted station to the base station just as doing the basic
flag. count of the goal or time of transmissions. This
conduct relies upon the structure of the framework.
Pedersen [1] proposed a miniaturized scale The third principle segment of the settled indoor
positioning procedure that ought to be actualized positioning engineering is the cell phones or labels
inside the indoor condition so as to position and track conveyed by individuals or joined to target objects.
objects. He expressed that this procedure would fill in These labels give a novel recognizable proof to each
as a trade for the GPS positioning framework. item or individual. Along these lines, blunders will be
Furthermore, Fhelelboom [2] found that a remote restricted. Next, we list every remote innovation
neighbourhood (WLAN) can be utilized inside any with the systems, which are produced dependent on
indoor condition to position objects. this innovation. Elements of IPS are talked about in
[3].
In this paper, we audit the distinctive positioning
conditions, the diverse systems connected for every a. Infrared Positioning Systems
condition and the calculations utilized inside every
framework. We indicate two situations for These systems utilize infrared flags so as to transmit
positioning individuals and articles inside an indoor signals from sensor hubs to the BS. A standout
domain. Every one of these situations has its very amongst the most well-known infrared positioning
own difficulties, which specialists attempted in the systems is the dynamic identifications created by
past to moderate by proposing a few arrangements AT&T Cambridge [4]. In this framework, clients
throughout the most recent ten years. convey an ID card furnished with an infrared LED.
The infrared LED sends a special code at regular and its directions. Cricket utilizes the Time
intervals. Moreover, there are infrared sensors Difference of Arrivals (TDOA) credit so as to figure
introduced on a roof and if the IR identification is the directions of the objective item. That is by
inside six meters, the sensor can peruse the code. The ascertaining the contrast between the Radio
BS gets the information from the IR sensors Frequency flag Time Arrival and the ultrasonic flag
occasionally. At last, the BS can assemble a guide of Time Arrival. The Difference of the season of the
each identification area utilizing the data recovered landing of the two signs is determined to utilize
from the sensors. Dynamic Badges have for the most conditions since the Radio Frequency is a lot quicker
part four directions, WITH, LOOK, NOTIFY, and than sound. At that point, the TDOA is equivalent to
HISTORY, every one of which gives an alternate the separation the flag went over the speed of the flag.
capacity. For instance, WITH demonstrates the The Cricket framework is professed to give a
identifications that exists in the sensor region, LOOK precision of up to 2 cm. Be that as it may, when
is utilized to search for an identification by a sensor, confronting NLOS blunder, the Cricket framework
NOTIFY is utilized to tell the BS when the does not give an exact computation of the facilitate.
identification is found and HISTORY demonstrates
the identifications positions over a specific timeframe. Popa [8] proposes joining Cricket with Inertial
Navigation sensors. This blend gives a superior
b. Ultrasonic Positioning Systems precision and relief of NLOS blunder as guaranteed
by Popa. That is on the grounds that Inertial
Ultrasonic reference points are utilized more Navigation sensors have a more extensive inclusion
frequently than infrared innovation. Ultrasonic and their flag isn't influenced by the NLOS mistake.
systems give increasingly exact positions to objects.
Ultrasonic based systems are more exact than Radio c. RF Positioning Systems
Frequency based systems, as we will find in the talk
area. Nevertheless, Ultrasonic systems need a settled The for the most part utilized remote innovation is
structure of the framework [5]. Radio Frequency (RF). This is because of the minimal
effort and the high scope of inclusion of the systems
Instances of the systems created dependent on created dependent on RF innovation. Some RF based
Ultrasonic innovation are the Active Bats [6] created systems that we will examine in this paper are
by AT&T Cambridge as well. This framework has a RADAR, Spot-On, LANDMARC, and UWB systems.
comparative structure to the dynamic identifications.
LANDMARC framework [9] depends on Radio
The Crickets framework [7] created by the Frequency signs and RFID labels. LANDMARC
Massachusetts Institute of Technology (MIT) is decreases the expense of utilizing RFID per users by
another outstanding ultrasonic based indoor lessening the quantity of per users and utilizing
positioning framework. The Cricket framework has reference labels. These reference labels have a well-
two kinds of hubs, signals, and audience members. known area and they transmit to the per users the
Reference points' areas are settled and they are area of the objective items. LANDMARC is a decent
connected to the roof while the audience members framework however its exactness is 1-2 meters.
are appended to the objective items and individuals.
Guides send intermittent data to the BS containing its Guang [10] gave a component to enhance the
ID, scope of inclusion or physical space related to it execution and exactness of LANDMARC. This
and estimation the bearing of development. The Project onto way, (iii) Find the objective position,
constraint in this framework is that the sensor on the and (iv) Compute the direction point.
protective cap must be coordinated to the bearing of
the person on foot's development. Woodman [19] proposed a Bat framework. Bat
framework utilizes a foot-mounted inertial unit for
Another methodology given by Robertson [17], he Pedestrian Dead Reckoning and a Wifi innovation to
proposes utilizing foot-mounted inertial sensors position people on foot inside a multi-story building.
which give the person on foot dead retribution. He Bat framework utilizes molecule channel calculation
gave a framework called FootSlam. This framework which is Bayesian channels. Woodman proposed an
utilizes a foot mounted Inertial Measurement Unit adjustment calculation to address the float in inertial
(IMU). In addition, it assembles a 2D guide of the estimations with the person on foot development.
working with no earlier information of the structure Woodman's calculation helps in assessing the
of the building. The learning of all client expectation situation of the person on foot at time k when
assists with shaping the guide of the building and knowing his situation at time k-1.
managing the client through it. Notwithstanding, the
more occasions places are visited inside the building Shao [20] talks about a relative region; he executed
the better data or guide worked in respects of that self-ruling people on foot in a 3D domain. He
put. Recreation results demonstrate a precision of 1-2 demonstrated how his self-sufficient people on foot
meters. associate inside nature and how they fabricate maps
of the earth. He characterized the maps as
Fischer [18] recommends utilizing Ultrasound Topological guide, recognition guide and way outline.
reference points to give better precision and less The topological guide speaks to the ecological
heading mistakes in Pedestrian Dead Reckoning. His districts and the bolts speak to the openness between
methodology joins Ultrasonic and PDR. The PDR them. The discernment maps include stationary
calculation contains two sorts of stages inside the articles, which are the nearby items. Where the
means, a positioning stage, and a swing stage. Fischer versatile articles are the worldwide items. At long last,
saw there are likewise two kinds of mistakes that can the way maps can be either framework, which is for
happen inside PDR, these blunders are the heading short way mapping (e.g., seat) or Quadtree which are
blunder and the separation blunder. As examined for long way arranging. Shao's maps technique for his
before, the heading is the bearing of the development; independent people on foot may be extremely
in this way, the heading blunder is the mistake valuable whenever utilized for walker direction
happens in the appeared of the walker. The through indoor positioning.
separation blunder as expressed by Fischer has fewer
events. Fischer's framework is connected primarily to III.CONCLUSION
the safeguard group specialist on call. The framework
functions as pursues; the specialists on call put the In this paper, we have surveyed indoor positioning
ultrasonic sensors on their way as they continue systems, the standards of positioning and calculations
inside the building. PDR framework is utilized to get utilized in different conditions. We talked about the
the area of the people on foot. Be that as it may, difficulties that can be confronted when planning an
ultrasonic sensors influence the modifications so as to indoor positioning framework, expounded on various
lessen the heading mistake. His calculation has four arrangements proposed to beat these difficulties and
stages (I) Estimate the individual's position, (ii) given a conceivable zone of utilization and
improvement inside indoor positioning systems. We Workshop on Software Technologies for Future
saw Indoor Positioning is a tremendous zone with Embedded Systems.
numerous applications and numerous enhancements [9] Lionel M.NI, Yunhao Liu, Iu Cho Lau,
to be conveyed. As referenced before in this paper, Abhıshek P. Patil; LANDMARC: Indoor
explores inside indoor positioning could be Location Sensing Using Active RFID
increasingly valuable whenever conveyed for people [10] Guang-yao Jin, Xiao-yi Lu, Myong-Soon Park.
on foot positioning since the exactness came to isn't 2006. An Indoor Location Mechanism Using
as precise as the precision came to in settled indoor Active RFID. Proceedings of the IEEE
positioning. International Conference on Sensor Networks,
Ubiquitous and Trustworthy Computing.
IV.REFERENCES [11] Lijan Jiang, Lim Nam Hoe, Lay Leong Loon.
2010. Integrated UWB and GPS Location
[1] Solrun Furuholt Pedersen, "Micro Positioning". Sensing System In Hospital Environment. IEEE
Master Thesis. ITEM NTNU, Jun 15, 2014. International Conference of Sensor Networks.
[2] Fhelelboom, Zuher. "Equipment tracking and [12] Tilch, S. Mautz, R. 2010. Current investigations
security systems for hospitals". Master Thesis at the ETH Zurich in optical indoor
Universitiy Teknology Malaysia. May, 2017. positioning. IEEE Positioning Navigation and
[3] I. Guvenc, C.-C. Chong, “A Survey on TOA Communication (WPNC) conference.
Based WirelessLocalization and NLOS [13] S. Beauregard and H. Haas. Pedestrian dead
Mitigation Techniques”, IEEE Communications reckoning: A basis for personal positioning. In
Surveys and Tutorials, vol. 11, no. 3, 2009, Proceedings of the 3rd Workshop on
Pages: 107-124. Positioning, Navigation and Communication,
[4] R.Want, A.Hopper, V.Falcao and J.Gibbons; 2006.
The active Badge location system, ACM [14] V. Fox, J. Hightower, L. Lin, D. Schulz, and G.
Transactions on Information systems Vol. 40, Borriello, “Bayesian filtering for location
No. 1, pp. 91-102, January 2012. estimation,” IEEE Pervasive Computing, vol. 2,
[5] Hazas, M., Hopper, A; A Novel Broadband no. 3, pp. 24–33, 2003.
Ultrasonic Location System for Improved [15] Matthies, L. H., Szeliski, R., and Kanade, T.
Indoor Positioning, IEEE Transactions on (1989). Kalman filter-based algorithms for
mobile Computing, Vol. 5, No. 5, May 2006. estimating depth from image sequences.
[6] Michael Popa, Junaid Ansari, Janne Riihij¨arvi, International Journal of Computer Vision, 3,
and Petri M¨ah¨onen. 2008. Combining 209–236.
Cricket System and Inertial Navigation for [16] Beauregard, S., (2006). A Helmet-Mounted
Indoor Human Tracking. WCNC proceedings. Pedestrian Dead Reckoning System.
[7] Priyantha, N. B; The cricket indoor location Proceedings of IFAWC2006, TZI University
system: PhD Thesis, Massachusetts Institute of Bremen, Germany, pp. 79-89
Technology. 199 p, June 2005. [17] Robertson, P., Angermann, M, Krach, B.,
[8] Fukuju, Y.; Minami, M.; Morikawa, H.; Simultaneous Localization and Mapping for
Aoyama, T.; Dolphin. 2003. An autonomous Pedestrians using only Foot-Mounted Inertial
indoor positioning system in ubiquitous Sensors. In Proc. Ubi Comp 2009, ACM (2009)
computing environment, in Proc of the IEEE 93-96.
ABSTRACT
Gaining information and explicit job skills have turned into the fundamental destinations for understudies in
the colleges. Learning is important to settle on educated choices, particularly, in a basic circumstance. Learning
and information the executives in any organization are pivotal to give it an aggressive edge in the present
testing and globalized condition. In this paper we present the plan of different on-line recruitment framework,
that enables businesses to post their job advertisements, which job searcher can allude to, when searching for
jobs. This job portal can catch job prerequisites dependent on industry needs.
Keywords: Knowledge Sharing, Web Portal, Job Portal, Online Recruitment.
CSEIT195175 | Received : 01 Feb 2019 | Accepted : 09 Feb 2019 | January-February - 2019 [ 5 (1) : 251-255 ]
251
Aafreen Khan et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 251-255
educational modules vitae (CV) of candidates, and different arrangements they need to make. Securing
contact the jobseekers who are qualified, on the web. all accessible position opening is a principle venture
Today, the Internet has turned out to be one of the at in the job-chasing process.
key strategies for landing data identifying with
position opening. Substantial foundations, similar to The Internet is presently an incredible asset that
colleges incorporate data on vocation prospects in jobseekers can utilize. Today, numerous locales
their sites, which are likewise connected to publicize job positions to be filled by individuals with
recruitment locales. specific skills in different fields. The Internet assumes
an essential job in the region of human asset
II. LITERATURE REVIEW arranging and advancement. Most arranging and
advancement organizations are currently utilizing PC
A. Job Procurement: Old and New Ways innovation and the Internet for staff recruitment. It
Job looking for more often than not includes ought to be noticed that despite the fact that the
distinctive approaches to search for jobs, for example, Internet has encouraged the procedure of job chasing,
through close to home contacts, direct phone calls to it has not supplanted the conventional techniques,
businesses, job organization office, filtering on the totally.
web job postings, and so on [3]. Prior to the Internet,
turned out to be generally utilizes as a strategy for B. Significance of Job Portals
looking for jobs; jobseekers invested a heap of energy
utilizing different strategies to search for job In the period of innovation, the Internet has
openings. Today, jobseekers utilize online techniques, turned into the principle wellspring of data for
which are extremely advantageous and spare a great jobseekers. Extensive partnerships, foundations, and
deal of time. Galanaki [5] records the accompanying colleges incorporate data on vocation prospects on
strategies to be the conventional (old) routes for their sites. As per a review, 70% of the workforce
recruitment: utilizes sites or portals on the Internet to look for jobs
in France. These sites or portals give an internet
• Employment recruitment offices searcher to get to data on job openings [7].
• Job fairs
• Advertising in the broad communications, for Sulaiman and Burke [8] found that most businesses
example, papers are quick to utilize online recruitment strategies for
• Advertisement in TV and radio getting staff. He referenced that online recruitment
• Management Consultants strategies can recognize the best candidates. That is
• Existing worker contacts the motivation behind why progressively created
• Schools universities or colleges understudies nations, for example, Malaysia have begun to utilize
administrations office online job portal as one of the vital method to enlist
• Workers or expert referrals individuals to fill job opening. An examination done
in 2006, found that 21% of web clients in the EU
These old jobs looking for techniques are utilized the web to look for jobs or to send job
excessively moderate, distressing, testing and applications. In 2007, this had expanded to 67% for
furthermore need quality [6]. What's more, the jobless individuals [5].
candidates need to consider the expense and the
measure of time to get the data they need, and
Most organizations distribute their job opening on individuals approach the job data from anywhere on
their site, or utilize online jobsites. These techniques the planet, while with the paper, data is spread at
result in incredible sparing in expenses. Mochol and nearby dimension. One key part of job portal is the
Nixon [9] expressed that the utilization of semantic expense. Organizations spend less to distribute or
web innovation gives advertise straightforwardness, publicize job opportunities on the portals or sites,
higher speed of acquisition yet decreased exchange when contrasted with the utilization of other media,
cost. Today, the Internet is utilized for an expansive for example, paper or job fairs. Besides, online
number of business exchanges. Individuals observe recruitment is quick, and spares time. Once the
the Internet to be a compelling specialized apparatus. managers transfer the job opening on the portal, the
In a report in 2005, it was discovered that 90% of jobseekers can see it and send in their resume.
jobseekers in Germany utilize the web to search for
jobs. A purpose behind this high rate of Internet is Along these lines, cost and efficient are two
that candidates are youthful and very qualified and noteworthy points of interest of job portals. Ganalaki
utilize the web a great deal, and numerous [5], refered to in Rosita and Nadianatra (2007),
organizations distributed their job openings on the expressed that the Internet is an instrument without
web and through their portal. fringes, and is an amazing strategy to come to an
around the world gathering of people.
Job portals are the beginning stage of jobseekers
while scanning for jobs. In this way, some job portals C. Highlights of Job Portals
charge businesses high expenses to distribute data on
job opportunities. Regardless of this, numerous One of the approaches to enhance work portability
businesses still keep on publicizing or distribute data is to give online job offer administrations. Online job
on job openings hands on portal, however portals can help jobseekers as they contain all
constrained to minimize expenses. Numerous required data about accessible opening in a solitary
businesses still trust that a jobseeker will visit job point. Such portals upgrade effectiveness in job
portals while hunting down job opening [10]. recruitment as candidates can coordinate their
capabilities and skills to the prerequisites of bosses.
A great job portal can likewise bolster learning
sharing among the individuals. The quantity of For the most part, looking for jobs on the web
online job portals keeps on expanding. It is trusted includes a procedure of data gathering in light of the
that seventy-five percent of individuals who are fact that the jobseeker accumulates data contained in
looking for jobs, utilize the web and on the web the job portals, amid the inquiry [11]. A great job
portals. Gangle [4] expressed that online recruitment portal imparts data and encounters to its
has the accompanying points of interest: bosses can individuals/clients. This spare time and endeavours
distinguish an extensive number of qualified job and better choices can be made [12]. Job openings
searchers and get their data effectively. It implies that necessities can be coordinated to a candidate's
organizations or organizations can broaden the capability and skills. Along these lines, job portals
inquiry area, subsequently, they have better prospect return the exact matches as well as return the most
of choosing the most qualified applicants. Web gives comparable match. The individuals from the
managers an approach to draw in a higher number of European Commission (EC) expressed that online job
applicants, particularly, the individuals who satisfy portals ought to have very comparable attributes. The
the job necessities. With online recruitment, attributes included are:
• An online accessible database of positions for job portals to have the necessary information for the
searcher; offices to send cvs to the site; students. Fig. 1 shows the schema of the proposed job
• Email alarms of jobs which coordinate the clients web portal, in illustrating the relationship between
profile; the students and the faculty, and the unemployed
• Additional guidance, for instance, about working graduates and the potential employers.
in remote nations or profession direction;
• The capacity to oversee job applications; Nowadays, most modern universities web portals
• Businesses must be able to distribute and oversee provide information and services to achieve various
job positions, look through the CV database; goals and to improve the quality of education with
• Have online contact with potential jobseekers. these services. Based on information from the
literature review, as well as the students’
III.Discussion and Analysis requirements identified from the survey, a job portal
should be develop. The portal should be a knowledge
Analysis of the data collected from the survey sharing system for the students to create a better
indicates that most of students are not satisfied with academic environment for their studies.
the current faculty portal. The respondents said that
they have problem to get the needed information IV.CONCLUSION
when they are looking for a job. In addition, there is
not enough information and resources related to help In perspective of the prior discoveries, the invalid
them. The students looking for a proper Job want a speculation expressing that there is no huge contrast
knowledge sharing system to get such information in the respondents' assessment on the viability of the
and help them in their decisions. created Online Job Recruitment System regarding
execution, dependability, security, and cost-adequacy
Base the development of the new web portal should was acknowledged. It is inferred that the created
on the feedback from the survey and the programming was successful in choosing qualified
requirements of the students. In recent years, the candidates inside a shorter timeframe. Subsequently,
structure of university portals has changed from static it would turn into a noteworthy supporter of the
information to dynamic and transaction mode. It is value contract. It is additionally inferred that
very important for the faculty to provide the students Performance, Reliability, Security, and Cost-
with online access to different services and adequacy could be used as criteria in assessing web
transactions such as online enrolment, course support recruitment programming.
and job information. Suresh Ram stated that 70% of
students, who finished their studies at tertiary level In light of the ends drawn, it is prescribed that the
education, could not find a job. This shows how product is actualized in the organization. After
important it is to have access to the right information execution, it is recommended that the effect of the
to find a job. It is important for the universities that framework on the recruitment procedures is resolved
provide information to jobless graduates on the jobs and that the adjustments in the recruitment forms
or career opportunities. with the presentation of the online recruitment
programming be examined. It is proposed that
Sulaimun and Burke [8] emphasized that it is reviews on the client experience, reception or non-
necessary for the universities to pay more attention selection of the product, and mistakes submitted in
to their knowledge management system or web
utilizing the product be directed and that the [8] N. Sulaiman and M. Burke, “A case analysis of
Usability model of FURPS be surveyed. knowledge sharing implementation and job
searching in Malaysia,” International Journal of
As far as an upgrade of the product, it is Information Management, 2009.
unequivocally prescribed that an online test is joined [9] M. Mochol, H. Wache, and L. Nixon,
in the recruitment and that additional security “Improving the accuracy of job search with
highlights, for example, the dimension of access semantic techniques,” in Proc. Business
grouped by the situation in the organization likewise Information Systems, 10th International Conf.,
be fused in the product. BIS 2007, Poznan, Poland, April 25-27, 2007,
Springer, pp. 301-313.
V. REFERENCES [10] M. Mansourvar, Development of a Job Web
Portal to Capture Industry’s Needs, 2011.
[1] J. Dorn and T. Naz, “Integration of Job portals [11] A. Weber and H. Mahringer, “Choice and
by Meta-search,” in Proc. 3rd International success of job search methods,” Empirical
Conf. on Interoperability for Enterprise Economics, vol. 35, no. 1, pp. 153-178, 2008.
Software and Applications, Funchal, Portugal, [12] M. Mansourvar and N. B. M. Yasin,
2007, pp. 401-412. “Knowledge portal: a tool to capture university
[2] S. Bsiri, M. Geierhos, and C. Ringlstetter, requirements,” in Proc. 2011 International
“Structuring job search via local grammars,” Conf. on Graphic and Image Processing,
Advances in Natural Language Processing and International Society for Optics and Photonics,
Applications, pp. 201, 2008. October 2011, pp. 82850F-82850F.
[3] M. Mansourvar and N. Y. Mohd, “Web portal
as a knowledge management system in the Cite this article as :
universities,” World Academy of Science,
Engineering and Technology, vol. 70, pp. 968- Aafreen Khan, Anirudha Wankhade, Priyanka
974, 2010. Pakhide, Sagar Meshram, Prof. Sonali Zunke, "A
[4] M. Gangle, “The only way is up? Employment Review Study on Online Job Portal", International
protection and job mobility among recent Journal of Scientific Research in Computer Science,
entrants to European labour markets,” Engineering and Information Technology
European Sociological Review, vol. 19, pp. 429, (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
2007. 251-255, January-February 2019.
[5] E. Galanki, “The decision to recruit online: a
descriptive study,” Career Development
International, vol. 7, pp. 243-251, 2002.
[6] S. Mauno, U. Kinnunen, and M. Ruokolainen,
“Job demands and resources as antecedents of
work engagement: A longitudinal study,”
Journal of Vocational Behavior, vol. 70, 2007,
pp. 149-171.
[7] A. Doyle, Internet Your Way to a New Job:
How to Really Find a Job Online, Happy about,
2008.
This main aim of this project to provide voice-based navigation system for blind people using voice recognition
module and it is intended to provide overall measures object detection and real time assistance via Global
Positioning System (GPS) and ultrasonic sensors. This project aims at the development of an Electronic
Travelling Aid (ETA) kit to help the blind people to find obstacle free path. This ETA is fixed to the stick of the
blind people. When the object is detected near to the blinds stick it alerts them with the help of vibratory
circuit. The blind person will give the destination’s name as the input to voice recognition module. GPS module
continuously receives the latitude and longitude of the current location. GPS compares it with the destination’s
latitude and longitude. The blind person receives the pronounced directions which he needs to follow to reach
his destination.
Keywords : Global Positioning System, Electronic Travelling Aid, Navigation System, Latitude and Longitude.
CSEIT195158 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 256-259 ]
256
N. Vijayalakshmi, K. Kiruthika Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 256-259
reliable. Another major factor is the cost of such also in case of an emergency, the location of the blind
products. Since they are already paying for person can be sent to a relative or friend via SMS.
treatments or other nursing cares, the price of the
product should be in the range that is reasonable. II. METHODOLOGY
Other feature of these products should be the
durability. The users might not be able to charge the
system. So, appropriate measure should be taken for
it.
high costs and relatively poor levels of user sensors. Information and Automation (ICIA),
satisfaction associated with existing electronic 2010 IEEE International Conference on June
systems. So we tried to develop a low cost and user 2010
friendly system for blind people with greatest [7]. Baranski, P.; Polanczyk, M.; Strumillo, P.; A
possible accuracy. This method offers innovative remote guidance system for the blind. e-Health
solutions in order to replace the conventional Networking Applications and Services
methods of guiding visually impaired person. Also, it (Healthcom), 2010 12th IEEE International
can be easily applied anywhere where it can handle Conference .
places like mall, airports etc. In this project we have
used ARM processor which contains more memory Cite this article as :
and its operating speed is high. We guide or navigate
the blind people using voice. N. Vijayalakshmi, K. Kiruthika, "Voice Based
Navigation System for the Blind People",
V. REFERENCES International Journal of Scientific Research in
Computer Science, Engineering and Information
[1]. Amit Kumar,Rusha Patra, M. Manjunatha, J. Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
Mukhopadhyay and A. K. Majumdar An 5 Issue 1, pp. 256-259, January-February 2019.
electronic travel aid for navigation of visually Available at doi :
impaired Communication Systems and https://doi.org/10.32628/CSEIT195158
Networks (COMSNETS), 2011 Third Journal URL : http://ijsrcseit.com/CSEIT195158
International conference on 4-8 jan 2011.
[2]. Shamsi, M.A.; Al-Qutayri, M.; Jeedella, J.; Blind
assistant navigation system Biomedical
Engineering (MECBME), 2011 1st Middle East
Conference on 21-24 Feb. 2011
[3]. Calder, David J.; Curtin .An obstacle signaling
system for the blind ,Digital Ecosystems and
Technologies Conference (DEST), 2011
Proceedings of the 5th IEEE International
Conference on 30 June 2011
[4]. Dunai, L.; Fajarnes, G.P.; Praderas, V.S.; Garcia,
B.D.; Lengua,I.L.; Real-time Assistance
prototype- a new Navigation Aid for Blind
people, IECON 2010 - 36th Annual Conference
on IEEE Industrial Electronics Society
[5]. Shang Wenqin; Jiang Wei; Chu Jian; A machine
vision based navigation system for the blind
China Computer Science and Automation
Engineering (CSAE), 2011 IEEE International
Conference on 10-12 June 2011
[6]. Hashino, S.; Ghurchian, R.; A blind guidance
system for street crossings based on ultrasonic
ABSTRACT
Security is required to transmit confidential information over the network. Security is also demanding in wide
range of applications. Cryptographic algorithms play a vital role in providing the data security against
malicious attacks. Massage communication over internet facing problems like data security, copyright control,
data size capacity, authentication etc. A new idea is to apply reversible data encoding algorithms images by
wishing to remove the embedded data after data receiving with the help of image pixel color value.
Keywords: Network Security, Cryptographic Algorithms, Image Pixel, Data Encryption, Public-Key
Cryptosystem, Encryption, Decryption
CSEIT195161 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 260-265 ]
260
Vijay Gokul Koli, Raj Kumar Paul Int J Sci Res CSE & IT. January-February-2019; 5(1) : 260-265
requires pair of key for communicating with any side, the customer representatives only see the
number of other parties. It is beauty of this names list.
scheme. Once someone obtains a key pair, he can
When operation is needed, software installed on
communicate with anyone else. They have done
the customer representatives’ computer or cell
implementation of RSA algorithm efficiently using
phone were decrypt the data and send them to the
two public key pairs and using some mathematical
call center directly without touching the
logic rather than sending the e value directly as a
representatives.
public key.
compromises the security of the systems. Law of In RSA computation is lengthy and some less
physics is used in Quantum computing for secure. This paper[5] present a new algorithm to
communication. In cryptography and key presents the modified form of new RSA algorithm
distribution quantum theorems and principles are in order to boost up the speed of the
applied. In this paper[3], new model for quantum implementation of RSA algorithm during data
key distribution are introducing among three exchange across the network world. In this method
parties or more where there is a trusted center that keys are stored offline before the process start.
providing the necessary secret information of Thus, the speed of process increased as compared
clients to securely communicate to each other. to original RSA method.
To compare the bases, classical channel is used by Enhancing the Security of The RSA Cryptosystem
quantum key distribution protocols BB84, B92 and
ERP.
This paper [6] increases the security of the RSA
Loop-based RSA Key Generation Algorithm using algorithm, this enhancement use randomized
String Identity parameter to change every encrypted message
block such that even if the same message is sent
more than once the encrypted message block is look
This paper [4] propose i-RSA algorithm that is focus
different. This paper suggests that how to use
on key generation algorithm. user identity is
randomized parameters in the encrypt the data to
Enhancement of this algorithm. it can be used as a
make RSA. By this enhancement it makes the RSA
public key, such as email address. The key
semantically more secure. Means an attacker cannot
certificates are used to authenticate the user's key
distinguish two encryptions from each other, even
pair. So certificate does work as important role in
if the attacker knows (or has chosen) the
secure communication but to issue the certificate is
corresponding plaintexts (original message). In this
a big challenge and it also increases the overhead
Work comparison between the modified RSA and
due to the increasing cost. For public key Previous
the basic RSA version introduced. Enhancement
algorithm has successful used email identity, but all
can easily be implemented on this Work. Also other
type of email can’t be used as a public key. So the
attacks are presented by this paper, also how to
propose i-RSA algorithm that can produces 66.6%
speed up the RSA encryption and decryption
compared to previous algorithm (46.67%) email can
process is an important issue for the RSA
be a string public key. in key generation looping
implementation.
process is the main differences between i- RSA and
previous algorithm, to get new value of p and q Here, RSA is more secure and it may be more
parameter, when value of k is equal to 1, then stronger by applying some techniques. Here They
looping process can stop, and the email can be a have seen that all authors are talking about many
public key. Detail explanations of i-RSA algorithm methods but no one is talking about image pixel for
in propose algorithm section. security purpose. So theyF can add image pixel
technique to make more powerful RSA
algorithm.
Modified RSA Cryptosystem Based on Offline
Storage and Prime Number
Encryption {
If(i==P_id)
After generating public key, before sharing to other Px=im(p_id);
people’s sender can be use an image that already
}
have in receiver side. First of all select an image that
already have all receivers then select any pixel color (11) E=Px+e.
value of that image. Then add that color value with (12) Public key to transmit = {E,P_id,n}.
e and save in E. now it doesn’t need to share actual (13) Message (M) Cipher text- C = M^e mod n.
value of e. now it share E and position of that pixel Decryption
in image.
60
IV. CONCLUSION
Time in Seconds
50
40
V. REFERENCES
ABSTRACT
The risking components of diabetic retinopathy (DR) were examined broadly in the past investigations, yet it
stays obscure which chance variables were more connected with the DR than others. On the off chance that we
can distinguish the DR related hazard factors all the more precisely, we would then be able to practice early
avoidance systems for diabetic retinopathy in the most high-chance populace. The motivation behind this
examination to study and consider the different predicting mechanisms for the DR in diabetes mellitus utilizing
data mining techniques including the support vector machines, decision trees, artificial neural networks, and
logistic regressions.
Keywords : Data Mining, Artificial neural fuzzy interference system, K-Nearest-Neighbor (KNN), Machine
Learning (ML), Support Vector Machines, Decision Trees
CSEIT195179 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 266-272 ]
266
Kajal Sanjay Kothare, Prof. Kalpana Malpe Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 266-272
retinopathy is the most regular reason for new vision with NPDR. However, when they created
instances of visual deficiency among grown-ups PDR with vitreous drain, they lost the vision all of a
matured 20– 74 years [2]. Around 21% of the sudden. Prior to vision misfortune, photocoagulation
recently determined patients to have type 2 diabetes can evade drain of PDR and diminished vision
(T2D) were likewise found to have co-bleak state of misfortune. In spite of the fact that instruction of
DR, though 60% of the patients with a ceaseless intricacy of T2D in our consideration unit is normal
history of 20 years of T2D were determined to have routine training for patients with T2D, the absence of
diabetic retinopathy [3]. About 20– 40% of patients knowledge is by all accounts the significant reason.
in T2D had diabetic retinopathy and 8% of patients
in T2D had locate compromising diabetic retinopathy One of the significant hazard factors inspected in a
(STDR) in United States [4]. In 2009, Prevalence of pooled examination from populace based
the diabetic retinopathy and poor vision/visual investigations around the globe was the long span of
impairment in Taiwanese patients with T2D were diabetes [8]. Other hazard factors distinguished in
8.91 and 0.62%, separately [5]. this investigation were abnormal state haemoglobin
A1C (HbA1C) and hypertension [8]. As indicated by
There are a few medicines for DR., To begin with, the UKPDS, the rate of diabetic retinopathy is
it is critical to immediately allude patients with any intently connected with the expanding length of T2D,
dimension of macular edema, extreme NPDR, or any and lower dimension of HbA1c can diminish the
PDR to an ophthalmologist who is proficient and danger of experiencing DR in these patients [9]. In
experienced in the administration and treatment of any case, it was seen in clinical practice that a few
diabetic retinopathy [2]. What's more, laser patients with long haul controlled HbA1c levels still
photocoagulation ought to be considered for eyes have dangers experiencing diabetic retinopathy in
with clinically critical macular edema, especially T2D [10]. This proposes the HbA1C level isn't the
when the focal point of the macula is included or main significant hazard factor, and different factors,
unavoidably undermined [6]. Hostile to vascular for example, hypertension, high blood glucose, and
endothelial development factor (against VEGF) length of diabetes may have conceivably played
treatment is additionally demonstrated for diabetic incomplete jobs in the improvement of diabetic
macular edema [2]. retinopathy in T2D. There were realized hazard
components of diabetic retinopathy, for example,
To limit the chances of visual misfortune or the long span of diabetes, poor glycaemic control,
new beginning of visual deficiency of diabetic hypertension, and hyperlipidaemia.
retinopathy, current rules of Taiwan diabetic
association proposes that the screening of fundus In the end, the most well-known hazard factor found
examination in patients with T2D should be by each bit of observational the proof is the term of
performed every year, and performed all the more diabetes. Poor glycaemic control drives a high fasting
much of the time in patients with diabetic glucose level, high, postprandial glucose, and high
retinopathy. It is noticed that the screening rate was HbA1C. Every one of the three previously mentioned
low, for there was just 28.9% of patients with T2D parameters advise diverse parts of diabetes and should
had eye fundus examination in Taiwan in 2009 [7]. all be considered.
One conceivable clarification for the low screening
rate might be that patients with T2D couldn't care
less about retinopathy when they have an ordinary
S.Sagar Imambi and T.Sudha [21] have connected Calculated relapse estimates the connection
content mining classification systems on the between the absolute ward variable and at least one
accessible clinical information to anticipate the autonomous factors by assessing probabilities. The
hazard factor of DR. They demonstrated that first expect a calculated capacity and the second a
moderately brief length of the case the executives standard typical dissemination work. The chances of
initiated before the beginning of clinically the reliant variable measuring up to a case are
recognizable retinopathy, essentially diminish the proportional to the exponential capacity of the direct
danger of creating retinopathy in patients with sort 2 relapse articulation. This shows how the rationale
diabetes. The objective was to build up an adaptable fills in as a connection work between the likelihood
and hearty clinical report classification framework and the direct relapse articulation. We additionally
that could be connected in extensive doctor's facility joined stepwise choice to choose discriminative
settings to encourage the doctors, with the goal that highlights in strategic relapse.
they can direct the patients effectively and diminish
the vision misfortune. SVM classifier is a machine learning calculation
proposed by Vapnik dependent on basic hazard
Hayrettin Evirgen, Menduh Çerkezi [22], have minimization rule of insights learning hypothesis. It
utilized Naive Bayes classification calculation to very well may be utilized to take care of classification
examine the genuine dataset so as to assembled and relapse issues. As a forecast of diabetic
prescient framework for DR. A sum of 385 diabetes retinopathy is a paired classification issue, SVM
patients' information was utilized to prepare the would be helpful for our motivation. During the time
expectation framework. With cross-approval creators spent model improvement, we utilize outspread
demonstrated that gullible Bayes calculation can be premise work (RBF) as the bit work in SVM.
utilized for diabetic retinopathy forecast with an
enhanced precision of 89%. An artificial neural Network is a group of
measurable learning models propelled by organic
III. MACHINE LEARNING ALGORITHMS TO neural systems and are utilized to evaluate or inexact
PREDICT DIABETIC RETINOPATHY capacities that can rely on countless and are
commonly obscure. ANNs are for the most part
DR expectation can be viewed as a multi-class exhibited as frameworks of interconnected neurons
classification issue. We consolidated choice trees, which send messages to one another. Positioned
calculated relapse, fake neural systems, and bolster forecast execution of choice trees dependent on 2-
vector machines to anticipate DR. The SAS year, 10-year, and a 15-year term of diabetes be
Enterprise Miner adaptation 12.1 programming of tuned dependent on experience, making neural nets
was utilized to produce expectation models. versatile to sources of info and fit for learning.
diabetic retinopathy from highlight extraction. In angiographic and other retinal characteristics at
this paper condensed perspective of different baseline: ETDRS report no. 19", Early treatment
information mining methods is displayed which diabetic retinopathy study research group. Arch
demonstrates that KNN and SVM have given the best Ophthalmol. 1995; 113(9):1144–55.
correctnesses. This survey paper can go about as an [7] Chang TJ, Jiang YD, Chang CH, Chung CH, Yu
asset for the future scientists for the forecast of NC, Chuang LM. Accountability, utilization and
diabetic retinopathy utilizing information mining providers for diabetes management in Taiwan,
procedures. This will likewise be helpful for scientists 2000–2009: an analysis of the National Health
to get a diagram of this zone so as to grow Insurance database. J Formos Med Assoc.
increasingly proficient calculations. 2012;111(11):605–16. Tsao et al. BMC
Bioinformatics 2018, 19(Suppl 9):283 Page 120 of
V. REFERENCES 121
[8] Yau JW, Rogers SL, Kawasaki R, Lamoureux EL,
[1] Chew EY, Klein ML, Ferris FL 3rd, Remaley NA, Kowalski JW, Bek T, Chen SJ, Dekker JM,
Murphy RP, Chantry K, Hoogwerf BJ, Miller D., Fletcher A, Grauslund J, et al. Global prevalence
"Association of elevated serum lipid levels with and major risk factors of diabetic retinopathy.
retinal hard exudate in diabetic retinopathy. Diabetes Care. 2012; 35(3):556–64.
Early treatment diabetic retinopathy study [9] UK Pospective Diabetes Study Group. Tight
(ETDRS) report", 22. Arch Ophthalmol. 2016; blood pressure control and risk of macrovascular
114(9):1079–84. and microvascular complications in type 2
[2] American Diabetes Association. Standards of diabetes: UKPDS 38. UK Prospective Diabetes
medical care in diabetes–2014. Diabetes Care. Study Group. BMJ. 1998; 317(7160):703–13.
2014;37(Suppl 1):S14–80. [10] Kowall B, Rathmann W. HbA for diagnosis of
[3] Fong DS, Aiello L, Gardner TW, King GL, type 2 diabetes. Is there an optimal cut point to
Blankenship G, Cavallerano JD, Ferris FL 3rd, assess high risk of diabetes complications, and
Klein R, "American Diabetes A. Retinopathy in how well does the 6.5% cut-off perform?
diabetes. Diabetes Care", 2004;27(Suppl 1):S84–7. Diabetes Metab Syndr Obes. 2013; 6:477–91.
[4] Kempen JH, O'Colmain BJ, Leske MC, Haffner [11] Hosseini SM, Maracy MR, Amini M, Baradaran
SM, Klein R, Moss SE, Taylor HR, Hamman RF. HR. A risk score development for diabetic
"The prevalence of diabetic retinopathy among retinopathy screening in Isfahan-Iran. J Res Med
adults in the United States", Arch Ophthalmol. Sci. 2009;14(2):105–10.
2004; 122(4):552–63. [12] Aspelund T, Thornorisdottir O, Olafsdottir E,
[5] Huang YY, Lin KD, Jiang YD, Chang CH, Chung Gudmundsdottir A, Einarsdottir AB, Mehlsen J,
CH, Chuang LM, Tai TY, Ho LT, Shin SJ. Einarsson S, Palsson O, Einarsson G, Bek T, et al.
"Diabetes-related kidney, eye, and foot disease in Individual risk assessment and information
Taiwan: an analysis of the nation wide data for technology to optimise screening frequency for
2000-2009", J Formos Med Assoc. 2012; diabetic retinopathy. Diabetologia.
111(11):637–44. 2011;54(10):2525–32.
[6] Early Treatment Diabetic Retinopathy Study [13] Semeraro F, Parrinello G, Cancarini A, Pasquini
Research Group. "Focal Photocoagulation L, Zarra E, Cimino A, Cancarini G, Valentini U,
treatment of diabetic macular edema. Costagliola C. Predicting the risk of diabetic
Relationship of treatment effect to fluorescein
retinopathy in type 2 diabetic patients. J [21] S. Sagar Imambi and T. Sudha - Building
Diabetes Complicat. 2011;25(5):292–7. Classification System to Predict Risk factors of
[14] Dr. Karim Hashim Al-Saedi, Dr. Razi Jabur Al- Diabetic Retinopathy Using Text mining, (IJCSE)
Azawi, Rasha Asaad Kamil, - Design and International Journal on Computer Science and
Implementation System to Measure the Impact Engineering Vol. 02, No. 07, 2010, 2309-2312
of Diabetic Retinopathy Using Data Mining [22] Hayrettin Evirgen, Menduh Çerkezi- Prediction
Techniques, International Journal of Innovative and Diagnosis of Diabetic Retinopathy using
Research in Electronics and Communications Data Mining
(IJIREC) Volume 4, Issue 1, 2017, PP 1-6 Technique,ijaedu.ocerintjournals.org/tojsat/issue
[15] Abhilash Bhaisare, Sagar Lachure, Amol Bhagat, /22642/241874, Sep, 2014
Jaykumar Lachure - Diabetic Retinopathy
Diagnosis Using Image Mining, International Cite this article as :
Research Journal of Engineering and Technology
(IRJET), Volume: 03, Issue: 10, Oct -2016 Kajal Sanjay Kothare, Prof. Kalpana Malpe, "A
[16] K. R. Ananthapadmanaban and G. Parthiban. - Review on Prediction of Diabetic Retinopathy Using
Prediction of Chances - Diabetic Retinopathy Data Mining Algorithms", International Journal of
using Data Mining Classification Techniques. Scientific Research in Computer Science, Engineering
Indian Journal of Science and Technology, Vol and Information Technology (IJSRCSEIT), ISSN :
7(10), 1498–1503, October 2014 2456-3307, Volume 5 Issue 1, pp. 266-272, January-
[17] M. Usman Akram, Shehzad Khalid, Shoab A. February 2019.
Khan - Identification and classification of Journal URL : http://ijsrcseit.com/CSEIT195179
microaneurysms for early detection of diabetic
retinopathy, Pattern Recognition, Vol. 46, No. 1,
2013, pp. 107–116.
[18] Vimala Balakrishnan , Mohammad R. Shakouri
and Hooman Hoodeh - Integrating association
rules and case-based reasoning to predict
retinopathy, Maejo Int. J. Sci. Technol. 2012,
6(03), 334-343, ISSN 1905-7873
[19] M. Tamilarasi and Dr. K. Duraiswamy -A Survey
for Automatic Detection of Non- Proliferative
Diabetic Retinopathy, International Journal of
Innovative Research in Computer and
Communication Engineering, Vol. 2, Issue 1,
January 2014
[20] Ramon Casanova , Santiago Saldana, Emily Y.
Chew, Ronald P. Danis, Craig M. Greven,
Walter T. Ambrosius - Application of Random
Forests Methods to Diabetic Retinopathy
Classification Analyses, Published: June 18,
2014https://doi.org/10.1371/journal.pone.009858
7
ABSTRACT
Web usage mining is driving examination zone in Web Mining worried about the web client's behavior.
Weblog mining is one of the ongoing regions of research in Data mining. Web Usage Mining turns into an
imperative perspective in the present time because the amount of information is persistently expanding. We
manage the web server logs which keep up the historical backdrop of page demands. Web log records are the
documents, which contain total data about the clients, peruse exercises on the web server Web mining is the
utilization of information mining strategies to find designs from the World Wide Web. This paper gives a
consideration on Web usage mining to anticipate the behavior of web clients dependent on web server log
records. Clients utilizing web pages, a successive access way's and continuous access pages, joins are put away in
web server log records. Contingent on the recurrence of clients visiting each page mining is performed. By
finding the session of the client we can break down the client behavior when spending on a specific page. Web
log alongside the distinction of the client catches their perusing behavior on a website and talking about with
respect to the behavior from the investigation of various algorithms and diverse strategies.
Keywords : Knowledge Sharing, Web Portal, Job Portal, Online Recruitment.
CSEIT195180 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 273-277 ]
273
Veena Moharle et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 273-277
out of IP address of the asking for customer, date and algorithms for playing out every one of these
time of the demand, asking for technique utilized, procedures [1].
status code, the asked for the record, and so forth. It
is conceivable to sort the arrangement of snap Anshul Bhargav and Munish Bhargav likewise the
exercises into sessions, and after that utilization them individuals from IEEE proposed edge work for web
for further investigation to get the predicted client usage mining. The edge work is to perform client’s
behaviour. Breaking down clients' Web watching characterization dependent on found examples and to
behaviours is one of the essential and testing research discover the qualities of clients. The casing work
subjects of Web usage mining. On the off chance that comprises of three principal steps: pre-processing,
clients' advantages can be naturally recognized from design disclosure and client arrangement. The pre-
clients' Web log information, they can be utilized for processing stage incorporates log document cleaning,
data suggestion and showcasing which are valuable client ID and session recognizable proof. The
for the two clients and Web webpage engineers. example disclosure process finds a new example from
Research for dissecting Web log information has the informational collection. In the client
been finished by numerous specialists in the field of arrangement process, every client is grouped by his
Web usage mining; finding incessant examples of log or her attributes. The groupings depend on nation-
information. The principle motivation behind the based arrangement, site section based order and
investigation of the client's visit record is to break access time-based characterization [2].
down the client's most worried about the outcomes
from the mining results. By breaking down the client S. S. Patil and H.P Khandagale proposed subjective
access to assets of the time, recurrence, etc., alter the client demonstrate which determine the foreseen
structure and plan of the site to anticipate that more usage behaviour dependent on the examples found in
clients should remain and better serve clients. Client past pre-processing, stage. The edge work
behaviour investigation has turned into another incorporates information cleaning, client
examination hotspot. recognizable proof, session distinguishing proof, way
finish, exchange ID and example revelation and
The work of this research mainly contemplates the extraction forms. Way culmination alludes to
weblog Mining technology in client behaviour creating rules for missing references dependent
investigation and assembles the client premium available structure, referrer, and other heuristic data.
model dependent on the client premium data, lastly By breaking down the found example, the behavior
draws the client's advantage. of the client is recognized and route refreshes are
given in the web page [3].
II. LITERATURE REVIEW
Virendra R. Rathod and Govind V. Patel proposed an
G. Neelima and Dr. Sireesha Rodda individuals from edge work dependent on FCM grouping and Markov
IEEE have proposed a thought for anticipating client show for foreseeing client behaviour utilizing weblog.
behavior through sessions utilizing weblog mining. Subsequent to pre-processing fluffy c implies (FCM)
They manage web server logs of NCSA normal log calculation is connected for example disclosure and
record design for mining. The proposed methodology examination. Markov demonstrate is utilized to next
comprises of information handling, client page expectation and better web page forecast
distinguishing proof and session recognizable proof precision. Fluffy c implies bunching calculation gives
procedures. They are utilizing three unique the preferred outcome over k-implies grouping.
Fluffy c implies bunching is a standout amongst the client's advantage dependent on the M5 display tree
most generally utilized fluffy grouping algorithms [4]. to break down the explanatory occasions.
In this exploration [5] propose the structure and In this examination [9], we present the "errand trail"
usage of a half and half framework by consolidating a to comprehend client seek behaviours. We
few information mining methods to catch the client's characterize an errand to be a nuclear client data
web perusing behavior. Client route sessions that need, while an assignment trail speaks to all client
speak to the association with a given website are exercises inside that specific undertaking, for
utilized to develop Hypertext Probability Grammar example, question reformulations, URL clicks. he
(HPG). Break down the HPG with the idea chain of considers investigations and correlations with assess
command show and apply the network bunching the viability of undertaking trails in a few inquiry
procedure to separate the usual portrayal of client applications: determining client fulfillment,
route behavior. anticipating client seek premiums, and
recommending related questions. Analyses on
This paper [6] portrays a technique for clearing up expansive scale datasets of a business internet
clients' interests dependent on an examination of the searcher demonstrate that:
site-catchphrase diagram. The technique is for (1) Task trail performs superior to anything session
removing sub-diagrams speaking to clients' primary and question trails in determining client
advantages from a website Keyword chart. It is fulfillment;
produced from increased Web crowd estimation (2) Task trail builds web page utilities of end clients
information (Weblog information). Our contrasting with session and inquiry trails;
commitments are 1) Web structure mining strategy (3) Task trails are equivalent to question trails yet
(PageRank) is appropriate for assessing the more touchy than session trails in estimating
characteristics of chose sub-diagrams and 2) two sorts distinctive positioning capacities;
of information (destinations and catchphrases) can be (4) Query terms from a similar assignment are more
spoken to and handled in a similar way utilizing a topically predictable to one another than
webpage catchphrase diagram. Our technique is basic question terms from various undertakings;
and it has capacities of separating sub-diagrams (5) Query proposal dependent on errand trail is a
identified with clients' principle advantages. Our decent supplement of question recommendations
work is required to give bits of knowledge for dependent on session trail and navigate
preparing boisterous heterogeneous chart structures. bipartitely.
This investigation of work [8] for the most part The discoveries in this paper check the need for
presents the technique for weblog mining, which can removing errand trails from web look logs and
find the method of web pages by burrowing web log improve applications in hunt and suggestion
records. By dissecting and investigating the standards frameworks.
of weblog records, we can recognize the potential
clients of the website and enhance the nature of data III.Discussion and Analysis
administrations to clients. In the phase of client
behaviour investigation, this examination investigates Research for breaking down Web log information has
the distinctions in client perusing behaviour in been finished by numerous analysts in the field of
various sorts of access occasions and figures the Web usage mining; finding regular examples of log
information, demonstrating clients' route designs, At present, there is no standard meaning of session in
grouping clients of explicit Web webpage, and the International scholarly network. The meaning of
finding client networks. the session made by W3C Union is that it's a point of
confinement set of pages produced by clients' one or
A. Web Log Mining a few demand click. In the Weblog, the demand
records have a place with the clients who have
Web Usage Mining is the use of information mining distinctive IP addresses positively not in a similar
strategies to find intriguing usage designs from Web session. A client may peruse a similar site a few times
information to comprehend and better serve the and the time interim between each peruse
requirements of Web-based applications. Usage moderately expansive, at that point that is not in a
information catches the character or beginning of similar session. Session distinguishing proof's
Web clients alongside their perusing behaviour at a undertaking is to partition clients' peruse records into
Web webpage. a suitable session. We in every case initially do
distinctive presumptions on the client's perusing
behaviour on the customer, and after that distinguish
the session. These sessions can be utilized as a piece
of info information in grouping, bunching,
expectation and different errands. In light of a
uniform settled timeout, a conventional session
recognizable proof calculation is utilized.
A server log is a log document (or a few records) Web usage mining is without a doubt one of the
consequently made and kept up by a server rising regions of research and imperative sub-space of
comprising of a rundown of exercises it performed. information mining and its systems. So as to take the
Web server logs are utilized to bunch web clients full favourable position of web usage mining and its
having comparative interests. It is likewise everything methods, it is essential to do pre-
characterized as adjusting administrations and data processing stage proficiently and viable. This paper
which was accessible on a website to the necessities endeavours to convey territories of pre-processing,
and the desires for an objective client, the dynamic including information purifying, session ID, client
client; the personalization undertaking by might recognizable proof. When the pre-processing stage is
profit by the information picked up from an all around performed, we can apply information
investigation of the client's navigational behaviour mining strategies like bunching, affiliation, order and
joined with different highlights which are curious to so on for utilization of web usage mining, for
a Web setting, to be specific its structure and content example, business insight, web-based business, e-
[10]. learning, personalization, and so on. Weblog mining
is one of the ongoing regions of research in Data
B. Session Identification mining. Web Usage Mining turns into an imperative
perspective in the present time in light of the fact
that the amount of information is ceaselessly
expanding. We manage the web server logs which
keep up the historical backdrop of page demands Efficient Web Mining Algorithm for Web Log
Weblog record examination started with the reason Analysis: E-Web Miner ",1st International
to offer to Web webpage directors an approach to Conference on Recent Advances in Information
guarantee sufficient transfer speed and server ability Technology (RAIT) 2012
to their association. By examining these logs, it is [8] Xipei Luo, Jing Wang, Qiwei Shen, Jingyu
conceivable to find different sorts of learning, which Wang, Qi Qi ,"User Behavior Analysis Based on
can be connected behavior investigation of clients. User Interest by Web Log Mining ", 27th
International Telecommunication Networks
V. REFERENCES and Applications Conference (ITNAC),2017
[9] Zhen Liao, Yang Song, Yalou Huang, Li-wei
[1] G. Neelima , Dr. Sireesha Rodda, “Predicting He, Qi He,"Task Trail: An Effective
user behavior through sessions using the web Segmentation of User Search Behavior",IEEE
log mining”, Conference on Advances in Transactions on Knowledge and Data
Human Machine Interaction (HMI), R. L. Engineering,2014.
Jalappa Institute of Technology, Doddaballapur, [10] C., Ventura, S., Zafra, A., de Bra, P.: Applying
Bangalore, India, March 2016. Web usage mining for personalizing hyperlinks
[2] Anshul Bhargav , Munish Bhargav, “Pattern in Web-based adaptive educational systems
discovery and users classification through web (received January 8, 2009) (received in revised
usage mining”, International Conference on form May 4, 2009) (accepted May 4, 2009)
Control Instrumentation, Communication and
Computational Technologies, IEEE 2014.
[3] S. S. Patil, H. P. Khandagale, “Survey paper on
enhancing web navigation usability using web
usage mining techniques”, International journel
of modern trends inenginnering and
research.2016.
[4] Virendra R. Rathod and Govind V Patel,
“Prediction of user behaviour using web log
mining in web usage mining”, International
journel of computer application vol. 139- No. 8,
April 2016.
[5] . M. -S. Kao, T. Ozyer, R. Alhajj,"Hybrid
approach for predicting the behavior of Web
users", IEEE International Conference on
Information Reuse and Integration, Conf, 2005.
[6] Tsuyoshi Murata, Kota Saito,"Extracting Users'
Interests from Web Log Data ",
IEEE/WIC/ACM International Conference on
Web Intelligence (WI 2006 Main Conference
Proceedings) (WI'06)
[7] Mahendra Pratap Yadav, Pankaj Kumar
Keserwani, Shefalika Ghosh Samaddar,"An
ABSTRACT
In this method, we've got introduced a new technique for the improvement of gray scale images, when images
are corrupted by salt and pepper noise that's additionally referred to as an impulse noise. Our suggested
phenomena show a better output for Medium density impulse noise as compare to the opposite renowned
filters like standard Median Filter (SMF), a decision based mostly Median Filter (DBMF) and modified decision
based Median Filter (MDBMF), Nonlinear filter (NLF) and so on. Our projected technique worked on two steps,
within the beginning is that the detection of noisy pixels and within the second step is that the removal of
noisy pixels. For detection of noisy constituent apply condition pixels values lies in between 0 to 255 it noisy
it's noisy free pixels. In our second step that's the removal of noisy pixel recommended technique that's replaces
the noisy pixel by alpha trimmed mean median value. Different grayscale pictures are tested via proposed
technique. The experimental result shows higher Peak Signal to Noise ratio (PSNR) values and with higher
visual and human perception.
Keywords : Gray Scale, Impulse Noise, Trimmed Mean, Median, Unsymmetricness
CSEIT195169 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 278-288 ]
278
Trupti Arun Jangale, Raj Kumar Paul Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 278-288
centre part is that the constituent of interest. once signal, the foremost obvious window is simply the
the mask is affected starting from the left-top corner primary few preceding and following entries,
of theimagetothe right-bottom corner, it performs whereas for 2nd (or higher-dimensional) signals like
some mathematics operations whereas not images, additional complicated window patterns are
discriminating any constituent. potential (such as "box" or "cross" patterns). Note that
if the window has associate degree odd range of
Detection followed by Filtering:- entries, then the median is easy to define: It's simply
This type of filtering involves two steps. In the center price on balance the entries within the
commencement it identifies screeching pixels and in window are sorted numerically. For an excellent
second step it filters those pixels. Here in addition a range of entries, there's quite one potential median.
mask is affected across the image and a number of
mathematics operations unit of measurement 1-D median Filter:-In 1D median filter, we have a
distributed to look at the screeching pixels. Then tendency to take into account the filtering window
filtering operation is performed exclusively on those slippy over a 1D array (either horizontal or vertical)
pixels that unit of measurement found to be of pixels. Assume the 5 pixels presently within the
screeching inside the previous step, keeping the non- windows are:
noisy intact.
Mean filter:-
Mean filtering may be a easy, intuitive and simple to Where the center picture element with price two
implement technique of smoothing images, i.e. hundred is associate isolated picture element and it's
reducing the quantity of intensity variation between out-of-range (noise). The median of those 5 values is
one pel and also the next. It's usually accustomed cut found by sorting the values (in either ascending or
back noise in images. The thought of mean filtering is falling order). the center price is that the median:
just to interchange every pel price in a picture with
the mean (`average') price of its neighbours, as well The original picture element price two hundred is
as itself. This has the impact of eliminating pel values replaced by the median a hundred and ten.
that square measure atypical of their surroundings.
Thearithmeticmean filter may be a terribly easy one 2-D median Filter:
and is calculated as follows: Replace every pel by the
typical of pels during a sq. window close this pixel
Median filter:-
The median filter is often accustomed scale back
noise in a picture, somewhat just like the mean filter.
However, it usually will a much better job than the
mean filter of protective helpful detail within the
image. the most plan of the median filter is to run Neighbouring pixel values = 115,119,120,123,
through the signal entry by entry, commutation 124,125,126,127,150
every entry with the median of close entries. The Median value = 124.
pattern of neighbours is named the "window", that Figure 2 (a) : Selection of filtering window of 2-D
slides, entry by entry, over the whole signal. For 1D
Copy the window matrix (3 by 3) into Table 1 Filtering window of size 3x3
an array and sort it. Column 1 Column 2 Column 3
Row 1 Z1 Z2 Z3
Row 1 Z4 Z5 Z6
Find the median element. Here 5th
element (total elements are 9, middle Row 3 Z7 Z8 Z9
element will be 5).
Different blocks are shown for different steps. At the
starting there is filtering window of size 3x3 has been
Place 5th element into the output selected and calculated gray value of pixels according
matrix. Do the process for the to the strength of intensity of every pixel.
complete input matrix ALGORITHM
We have develop the trouble-free algorithm in which Select a target image - [x] = imread(‘Test image.jpeg’)/
we execute the noise finding and noise removal for the read of image
Mean Filtering (MUTMMF), will next part of this the image, Y means the original image, 𝑌̂ shows the
report. Shows the result and simulation. de-noised image.
Graphic User Interface (GUI) in MATLAB:-
III. RESULT
In this preceding section, the image Tool GUI and
Mean Square Error (MSE): Measure GUI (Graphic User Interface) will be
introduced. Both of them were developed with the
The mean square error (MSE) dealings the value Matlab tool GUIDE (GUI Design Environment). In
modify or can say the changes to pixel intensity this GUI part shows the whole phenomena of
values between the original image (Xi)and de-noised proposed work like that image selection, impulse
image (Yj) and is given by noise addition, removal of noise and edges
preservation of the images in this research, in a user-
1 𝑁−1
𝑀𝑆𝐸 = ∑ (𝑋𝐽 ̅𝑗 )2
−𝑌 (5.1) friendly environment. First of all, the images are
𝑁 𝑗−0
selected by clicking the browse and Select Images. A
The MSE has been widely used to quantify image browser will appear afterwards to allow the user to
quality and when used alone, it does not correlate select the images, which can be any of the following
strongly sufficient with perceptual excellence. It file formats:
should be use therefore, with other quality check
parameter like SNR, PSNR, RMSEand visual Layout implementation of image enhancement based
perception. fusion techniques is done by following steps.
Peak signal-to-noise ratio (PSNR): ▪ First create simple Graphical User Interface (GUI)
window.
The PSNR is computed as - ▪ Second add impulse noise with the help of
𝑆2 imnoise command in this GUI.
PSNR=10log10 (𝑀𝑆𝐸 ) (5.2)
▪ Third step apply our proposed method that is
removal of noise.
Where 𝑆 is the maximum intensity in the original
▪ Fourth stepcalculated the image enhancement
image. The pear signal to noise ratio is higher for a
parameters like peak signal to noise ratio, mean
good resultant image and poorer for a reduced quality
square error, mean absolute error.
image. It calculate image reliability, that is, nearer
▪ Fifth step shows edges preservation of tested
the transformed image resembles the original
image.
image.In this proposed work on the source of our
▪ Sixth step graphical representation of PSNR and
image dimension 255×255, we mentioned peak signal
MSE values of the images. There are two
to noise ration and mean square error are as follows:
important push button design in this GUI these
are RESET and END.
The PSNR is expressed as:
(255)2
𝑃𝑆𝑁𝑅 = 10 𝑙𝑜𝑔10 (5.3)
(𝑀𝑆𝐸)
Where MSE acronym of Mean Square Error stands
for image enhancement factor, 𝑚 × 𝑛 is the size of
TABLE 4 CALCULATED PSNR OF PROPOSED In the figure 5 put side by side our proposed method
ALGORITHM FOR LENA IMAGE visual results compare with different algorithms they
are - median filter,adaptive median filter, decision
based algorithms, modified decision based
unsymmetric trimmed median filter, Non-linear
Filter algorithm. This method is tested on the ‘Lena’
image of size 256×256 in the 80% noise density ‘Lena’
image result with our planned algorithm. Shown
plotsof PSNR values of different noise. Our proposed
method provide a good result in low and medium
noise density.
(a)Original Image (b) 70% Noise (c) MF (d) AMF (e) PSMF (f) DBA
[2] Fundamentals of Digital Image Processing, S. [12] A. Ben Hamza, P. Luque, J. Martinez, and R.
Annadurai, R. Shammugalakshmi, Pearson Roman, “Removing noise and preserving
Education India. details with relaxed median filters,” J. Math.
[3] Castleman Kenneth R, Digital Image Imag. Vision, vol. 11, no. 2, pp. 161–177, Oct.
Processing, Prentice Hall, NewJersey, 1979 1999.
[4] T.A. Nodes and N.C. Gallagher, Jr., “The [13] V. Strela. “Denoising via block Wiener
output distribution of median type filters,” filtering in wavelet domain”. In 3rd European
IEEE Trans. Communication., 32(5): 532-541, Congress of Mathematics, Barcelona, July
1984. 2000. BirkhäuserVerlag.
[5] A.K.Jain,Fundamentals of digital image [14] S. Zhang and M. A. Karim, “A new impulse
processing. Prentice-Hall, 1989. detector for switching median filters,” IEEE
[6] David L. Donoho and Iain M. Johnstone., Signal Process. Lett., vol. 9, no. 11, pp. 360–
“Adapting to unknown smoothness via 363, Nov. 2002.
wavelet shrinkage”, Journal of the American [15] T. Yahagi. "A Random-valued Impulse
Statistical Association, vol.90, no432, NoiseDetector Using Level Detection", 2005
pp.1200-1224, December 1995. National IEEEInternational Symposium on Circuits
Laboratory, July 27, 2001. and Systems, 2005.
[7] H. Hwang and R. A. Hadded, “Adaptive [16] K. S. Srinivasan. "A New Fast and Efficient
median filter: New algorithms and results,” Decision-Based Algorithm for Removal of
IEEE Trans. Image Process., vol. 4, no. 4, pp. High-Density Impulse Noises", IEEE Signal
499–502, Apr. 1995. Processing Letters, 3/2007
[8] E. Abreu and S.K. Mztra,” A Signal- [17] JafarRamadhan Mohammed. "An Improved
Dependent Rank Ordered Mean (Sd-Rom) MedianFilter Based on Efficient Noise
Filter –ANew Approach For Removal Of Detection for HighQuality Image
Impulses From Highly Corrupted Images”, 0- Restoration", 2008 Second Asia
7803-2431- 5/95$ 4.000 1995 IEEE. InternationalConference on Modelling &
[9] R. Yang, L. Yin, M. Gabbouj, J. Astola, and Y. Simulation (AMS).
Neuvo, “Optimal weighted median filters [18] V.R. Vijaykumar. "Detail preserving median
understructural constraints,” IEEE Trans. basedfilter for impulse noise removal in
Signal Processing vol. 43, pp. 591–604, Mar. digital images",2008 9th International
1995. Conference on Signal Processing.
[10] Scott E Umbaugh, Computer Vision and [19] S. Saudia. "Salt & pepper impulse detection
Image Processing, Prentice HallPTR, New andmedian based regularization using
Jersey, 1998. Adaptive Median Filter", TENCON 2008 -
[11] Zhou Wang and David Zhang, “Progressive 2008 IEEE Region 10 Conference, 11/2008
Switching Median Filter for the Removal of [20] DENG Xiuqin, XIONG Yong PENG Hong , A
Impulse Noise from Highly Corrupted new kind of weighted median filtering
Images", IEEE Transactions On Circuits And algorithm used for image Processing,
Systems—Ii: Analog And Digital Signal International Symposium on Information
Processing, Vol. 46, No. 1, January 1999. Science and Engieering, 2008.
ABSTRACT
For that purpose, we are developing this application, which can collect the tax information from different
authorities based on the house no’s and owner name by using Web Services and stores the data in our own
database. For getting the information, regarding taxes citizens need to register first. The bill is calculating on
different modes like annual, half-yearly, quarterly etc. By using the user, id and password citizens can log into
the system and collect the necessary information from the home page. For this every user need to provide his
house no and owner name. By clicking on the search button, they will get their own.
Keywords: E- TAX, Web Services
CSEIT195145 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 289-291 ]
289
M. Florence Dayana, B. Vinithamani. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 289-291
Web Services taxpayers who are using the e-tax system. With these
Citizen Bill Information limitations the result of our study gives an insight to
The system interface is going to show the Bill e-tax quality evaluation criteria in an emerging
information of different authorities. The bills mainly economy like Nigeria and also provide the basis for
going to these types further research in these areas.
Water Bills
Electricity Bills VII. REFERENCES
Property Taxes
These interfaces also show the [1]. Productivity of the Nigerian Tax System: 1970-
Pending Bills 1990 AERC Research Paper 67. Nairobi: African
Penalties Economic Research Consortium. Black. (1999).
Due Dates Black’s Law Dictionary (Seventh Edition). West
Group. Centers for Medicare and Medicaid
V. CONCLUSION Services Office of Information Service. (2008,
March 27).
[2]. Selecting a development approach. United States
It has been a great pleasure for me to work on this
Department of Health and Human Services (HHS).
exciting and challenging project. This project proved
Clarke, J. M. (1998).
good for me as it provided practical knowledge of not
[3]. Automated test generation from a Behavioral
only programming in ASP.NET andC#.NET web-
Model. Pacific Northwest Software Quality
based application and no some extent Windows
Conference. IEEE Press. Federal Republic of
Application and SQL Server, but also about all
Nigeria. (1997).
handling procedure. It also provides knowledge about
[4]. Report of the Vision 2010 Committee. Abuja,
the latest technology used in developing web enabled Nigeria. Federal Republic of Nigeria. (2002).
application and client server technology that will be [5]. Personal Income Tax Act 1993(1993 No. 104):
great demand in future. This will provide better [6]. Operation of Pay as You Earn (PAYE) Regulations
opportunities and guidance in future in developing 2002 Official Gazette. Federal Ministry of Finance
projects independently. Abuja. Geoffrey, E. (2004).
[7]. Global Business Information Technology: An
VI. FUTURE ENHANCEMENT Integrated Systems Approach. Pearson Education.
Grady. (2005).
This paper examines the taxpayers’ e-tax system [8]. Unified Modelling Language User Guide the
implementation by validating the psychometric Second Edition. Addison-Wesley. International
properties and using the instrument validated for e- Organization for Standardization. (2015, February
tax service evaluation criteria in the context of 26).
Nigeria. It is concluded that all the six variables,
Cite this article as :
compatibility, complexity, reliability, affordability, M. Florence Dayana, B. Vinithamani, "E - Tax
ease of use and tangible are important in the Information System", International Journal of Scientific
evaluation of e-tax system implementation. The items Research in Computer Science, Engineering and
used should enable the tax authority to bench mark Information Technology (IJSRCSEIT), ISSN : 2456-3307,
their routine and plan for enhancement. The first Volume 5 Issue 1, pp. 289-291, January-February 2019.
limitation of these study is small sample size and the Available at doi : https://doi.org/10.32628/CSEIT195145
population been limited to only self-employed Journal URL : http://ijsrcseit.com/CSEIT195145
ABSTRACT
Children tracking system based on android terminals is proposed. Recently, all over the world crime against the
children in the age of 14 to 17 years is more popular. Parent’s always worry about their children whenever they
are outside from the home. In this paper, the proposed system consists of two sides out of them one is parent
module and another is the child module. The child module consists of ARM7 Microcontroller (LPC 2148), GPS
(Global Positioning System), GSM (Global System for Mobile Communication) and voice chip where the parent
module consists of android mobile phone. This paper gives the information about missing child from school
campus. There are two android mobile phones for the safety of the both modules. The system tracking the child
from source to destination i.e. from home to school or anywhere.
Keywords : ARM Based Children Tracking System, arm7microcontroller, GSM, GPS and Android Mobile
Phone.
CSEIT195154 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 292-295 ]
292
M. Juno Isabel Susinthra, S. Praveena Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 292-295
devices. Therefore, research areas on data collection, among different apps, which increase the difficulty in
analysis and patterns learning are becoming rich monitor single flow between an app and the
discussion area, especially with all the cheap features operating system. The proposed platform only tracks
and technological advances available on phones data flows but not control flows. Data flows are the
allowing for a variety of users experiences and usage. explicit flowing of data through the apps. Control
The framework architecture proposed in is built upon flows are the implicit flowing of data that require
using mobile phone sensing and the cloud computing. analytical analysis.
The paper discussed the different challenges with
gathering data techniques using mobile and EXISTING PROCESS
unexpected environment (mobile context), as well as,
the privacy issues on gathering personal information Android terminals have wireless LAN and Bluetooth
from a third-party application. The study discussed device. It results in lack of individual attention
the three different scales mobile sensing considered towards the children. It offers less security. Studies
beneficial on: individual, group, and community data conducted by Cyber Travel Tips, showed that in
gathering. The scalability feature of gathering Malaysia, missing children are basically classified into
individual behaviour to learn from community two categories. The first category is disappearance,
patterns may help improve communities in social, which includes running away from home. Children
healthy and environmental studies. The study also tracking system is also developed on mobile ad hoc
explained the two sensing paradigms: participatory networks. System developed in says that in GPS
sensing, which involves users who lunch sensors system and tag-based system, each parent cannot
manually, and opportunistic sensing, where sensors obtain group information on the vicinity of the child.
automatically collect data. The main focus of the A self -configurable new generation children tracking
introduced work in is about understanding how system. Hiroshima City Children Tracking System is
personal data travels through selected third-party a safety support system for children based on ad hoc
applications. The authors raised the issue about network technologies. Field experiments have been
violating privacy barriers when applications access conducted in cooperation with an elementary school
the personal information by only ask for users’ in Hiroshima. In this paper, propose a new
permissions to access the data with no explanation of generation child tracking system which is based on
how the data will be used. The research proposed a experiences and findings of the field experiments for
monitoring platform based on Android mobile phone Hiroshima children tracking system. Existing
to track the data flow through 30 selected technologies, however, are not powerful to prevent
applications. After testing the proposed the platform, crimes against children and helpful parent ‘s since it
the research concluded that 20 apps miss used the is difficult to take information of children as a group.
users’ private data and 15 apps used users’ locations to
support marketing services. The main challenges in PROPOSED METHODOLOGY
monitoring the use of mobile apps include the
shortage of Smartphone used data as a resource The children information is transmitted and received
constrained, as well as, the dynamic nature of data using GSM technology. The child module acts as a
flow using mobile devices. This dynamicity causes transmitter which includes ARM7 microcontroller
another context-based challenge because data could (lpc 2148), GSM module, GPS module and voice chip
be sent at any time and any place. Further, mobile as well as android mobile phone. The receiver
apps allow for across sharing data and information module includes Android mobile phone and
monitoring database. The position of the moving defining the location of their children (indoor or
child is tracked by is tracked by GPS and is sent to outdoor) and to give the safety distance for each child.
ARM7 microcontroller. This controller forwards the
GPS data (latitude and longitude) to GSM board. Detection of Safety Distance When parent starts the
GSM will in turn send the position of the moving system, she/he should select where they stay; indoor
child to two receivers. It allows the parent to get or outdoor; in order to calculate the distance between
their child ‘s location. them and each child. Indoor option limit child range
to 3m by reducing child transmitter source so signal
III. RESULTS AND DISCUSSION attenuated will not be detected. But if parent selects
outdoor option, distance will be calculated by taking
IMPLEMENTATION RESULTS child and parent locations from GPS chips. Child
module will send its GPS reading to parent module
which calculates distance and compares it with
distance threshold; this threshold value should be
entered by parent after selecting outdoor option.
IV.CONCLUSION
falling into a swimming pool, leaving in a hot car, Cite this article as :
leaving behind gas heater. The flexibility of the
designed system makes it easy to add new sensors for M. Juno Isabel Susinthra, S. Praveena, "Children
any child. Tracking Classification Control Using Android",
International Journal of Scientific Research in
VI.REFERENCES Computer Science, Engineering and Information
Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
[1] Druin A., "The role of children in the design of 5 Issue 1, pp. 292-295, January-February 2019.
new technology", Behavior and Information Available at doi :
Technology", vol21, No.1,pp1-25, 2002. https://doi.org/10.32628/CSEIT195154
[2] Morris Williams, Owain Jones, Constance Journal URL : http://ijsrcseit.com/CSEIT195154
Fleuriot and Lucy Wood, "Children and emerging
wireless Technologies", Conference on Human
Factors in Computing systems, 2005.
[3] Deborah L. Ruf, "Losing Our Minds", 2005, Great
Potential Press, Inc.
[4] Stephen S. Intill, James W. Davis and Aaron F.
Bobick, "Real-Time Closed-World Tracking",
Proceedings of the IEEE Computer Sciety
Conference on Computer Vision and Pattern
Recognition, pp. 697-703, June 1997.
[5] GregoryT.FRENCH "Understanding the GPS,
1996
[6] Katin Michael, "The Emerging Ethics of Human
Centric GPS Tracking and Monitoring",
International Conference on Mobile Business
(ICM'06), 2006.
[7] A. (Angela) Canny, Anne E. Green and Malcolm
J. Maguire, "Keeping Track", Published 2001, The
Policy Press.
[8] PIC16F87XA Datasheet 28/40-Pin Enhanced
Flash
[9] Lovine, John, “PIC Microcontroller Project
Book“, Mc Graw-Hill, 2004
ABSTRACT
In today’s world communication has become so easy due to integration of communication technologies
with internet. However, the visually challenged people find it very difficult to utilize this technology
because of the fact that using them requires visual perception. Even though many new advancements have
been implemented to help them use the computers efficiently no naïve user who is visually challenged can
use this technology as efficiently as a normal naïve user can do that is unlike normal users they require
some practice for using the available technologies. This paper aims at developing an email system that will
help even a naïve visually impaired person to use the services for communication without previous
training. The system will not let the user make use of keyboard instead will work only on mouse operation
and speech conversion to text. Also this system can be used by any normal person also for example the
one who is not able to read. The system is completely based on interactive voice response which will make
it user friendly and efficient to use.
Keywords : Visually Challenged People, IVR, Speech to Text Converter, Mouse Click Event, Screen
Reader
CSEIT195163 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 296-298 ]
296
R. Gomathijayam, A. Jenifer Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 296-298
2019[4]. It is also estimated that there are a total of perception. Even though many new advancements
340.2 million smart phone users in India in the year have been implemented to help them use the
2017 [5]. This makes emails the most used kind of computers efficiently no naïve user who is visually
communication. The prevailing email systems don’t challenged can use this technology as efficiently as a
give any means of feedback or Talkback service. The normal naïve user can do that is unlike normal users
most common mail services that we tend to use in they require some practice for using the available
our day to day life cannot be used by visually technologies.
challenged people. This is as a result of they do not
offer any facility in order that the person in front will IV. PROPOSED METHODOLOGY
listen the content of the screen. As they cannot
visualize what is already present on screen they The proposed system relies on voice command based
cannot build out where to click in order to perform system unlike the existing mail systems. The most
the required operations. For a visually impaired important thing that has been kept in mind while
person employing a computer or smart phone system developing the proposed system is accessibility. A
for the first time isn't that convenient as it is for a system is accessible solely if it may be used
standard user even though it is user friendly. Though expeditiously by all varieties of individuals whether
there are several screen readers offered then also or not disabled. The current systems do not offer this
these individuals face some minor difficulties. Screen accessibility. Therefore the system we are developing
readers speak out whatever content is there on the is completely different from the current system.
screen and to perform the particular actions the Unlike current system that emphasizes a lot on user
person will have to use keyboard shortcuts because friendliness of traditional users, our system focuses a
mouse location cannot be detected by the screen lot on user friendliness of all varieties of individuals
readers. This means 2 things; one that the user cannot as well as normal people visually impaired individuals.
make use of mouse pointer as it is fully inconvenient The complete system is primarily based on speech to
if the pointer location cannot be derived and second text commands. Once using this system the
that user should be versed with the keyboard on application will be prompting the user to speak
wherever each and every key is placed. A user who is specific commands to avail respective services and if
new to computer will therefore not use this service as the user wants to access the respective services then
they're not conscious of the key locations. Also there he/she needs to speak that command.
are some difficulties faced by visually impaired
people when using smartphone systems. All these are V. IMPLEMENTATION RESULTS
some drawbacks of the present system that we are
going to overcome within the application we are
developing.
in Speech Recognition API is used for this purpose keyboard usage is eliminated. The user solely has to
hence using this input is provided to different follow the directions given by the system and use
modules of the system as intended user cannot voice commands consequently to get the several
manually enter the data required. services offered. Other than this the user may have to
Text-To-Speech is used for conversion from text to be requested to feed info through voice inputs
speech. It is used to Speak menu to the user which whenever required.
can be used to provide list of available options a
particular user can do on a given module or page. It is VII.FUTURE ENHANCEMENT
also used to read message that is been received by the
intended user. As intended user cannot directly read. Voice could be extended to image attachments and
ResponsiveVocic.js is API that is used for conversion other options such as indentation, fonts etc., that are
of Text to speech. available with normal E-Mail.
Php Mailer and PhP-IMAP PhP Mailer is a library
which is provided by PhP which can be used to send VIII. REFERENCES
e-mail. PhP Mailer is used in proposed system which
is used to send emails. In order to extract the mails [1]. T. Shabana, A.Anam, A.Rafiya, K.Aisha, “Voice
from the system Php Imap is used to fetch the user’s based Email System for Blinds”, “IJARCCE”, Jan
mail from the IMAP server. 2015.
Knuth-Morris-Pratt Algorithm Pattern Matching is [2]. P. Ingle, Harshada Kanade, Arti Lanke, “Voice
very key component when it comes to searching mail based Email System for Blind”, “IJRSCSE”,
in inboxes. System provides three ways to search by 2016.
keyword, date and today’s date out of search by [3]. Jagtap Nilesh, Pawan Alai, Chavan Swapnil,
keyword requires KMP for pattern matching. Given a “Voice based System in Desktop and Mobile
string ‘S’, the problem of string matching deals with devices for blind people”, “IJETAE”, Feb 2014.
finding whether a pattern ‘p’ occurs in ‘S’ and if ‘p’ [4]. Prof Umesh A Patil, Pranouti Patil, “A survey
does occur then returning position in ‘S’ where ‘p’ on voice based mails system for physically
occurs. Knuth, Morris and Pratt proposed a linear impaired peoples”, “IJIRCCE”, Jan 2016.
time algorithm for the string matching problem as
compared to other approaches. Cite this article as:
ABSTRACT
Analytics is very important in all fields in order to make decisions over certain facts. Social media analytics is
the process of collecting information from various social media platforms, websites and blogs. These analytics is
done to make effective business conclusions. The usage of social media has become the latest trend in today’s
world. Social data analytics is not about just collecting likes and comments shared by individuals but it has
become the platform for many trademarks to bring out promotion. Applications such as marketing, elections
widely used social data to make predictive decisions. Some of the approaches followed are forming hypothesis,
getting deep into the data, mapping events etc. These analytics can also be done in applications such as business,
Change in amendments, Education, Demonetization etc. The challenges faced are metrics formed by social
media should reach the right people, unstructured data being difficult to priestship paper discusses about the
model, theme, performance evaluation, advantages and disadvantages under literature survey.
Keywords : Social Media, Insights, Datasets, Analysis, Challenges
CSEIT195149 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 299-302 ]
299
T. K. Anusuya, A. Preethi Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 299-302
LITERATURE SURVEY Big data is nothing but huge amount of data which
cannot be processed using traditional methods. The
A. Can Twitter save lives? A Broad scale study on data to be processed may bestructured, unstructured
Visual Social Media Analytics for Public Safety or semi structured. These data come from various
Theme: According to Dennis Thom et al. presents sources such as sensor data, transactional data,
that nowadays the social media is being used for cameras, microphones and lot more of resources. On
commercial purpose rather than safety. The paper these large data sets analytics is performed in order to
gives a clear understanding on the crisis intelligence obtain undiscovered insights. Based on facts,
field study via Twitter data during the flood on everyday terabytes of data are being generated and
German 2013. Scatter Blogs systems was introduced now it has come up to zeta data. All social media
to implement other techniques. The second phase platforms in which billions of users are connected
sketched out a system based on the feedback about generate huge data which can be of any type such as
Scatter Blogs and a comparison is made between both text, images, audio, video, gif, etc.
the systems. B. Big Data Analytics in Healthcare
Theme: Based on the field of healthcare Big Data PROPOSED METHODOLOGY
analytics and its benefits with the methodologies
used and its outcomes and the challenges faced are It has been observed that each paper has used
discussed here according to Wullianallur Raghupathi different techniques which have their own pros and
et al. C. Big Social Data Analytics for Public Health: corns. The techniques overall used are Scatter Blogs,
Face book Engagement and Performance Theme: SoLoMo, IBM Big Insights each used for a purpose
analysis of Facebook data using unsupervised learning such as analysis, storage, streaming real time data etc.
indicates recent tendency of user engagement in We have decided to take the positive features of all
public health has been increased as observed by the algorithms, tools and techniques used in the
Nadia Straton et al. D. SoLoMo analytics for Telco Big above discussed papers. The social Media analytics is
Data monetization Theme: The reference has the main resource to perform analysis. It is actually
observed that the world can be accessed using the the process of developing informative tools to collect
mobile internet. This has helped widely in Business. and summarize the data. The usage of social media
The algorithms and technologies used in this paper has been evolving more as the days pass by. It has
are used to find out the insights with the help of been used for many positive as well asnegative usage.
social, location and mobile data of the individual. E. It all depends upon the attitude of the users.
Impact of Demonetization on Indian Economy Facebook, YouTube and Twitter are in the first, third
Theme: India has the highest rate of currencies. 87% and tenth position on account of the usage. In general
of the currencies are rotating in the form of Rs.500 the analysis process comprises of three stages Capture,
and Rs.1000. These currencies become the source of Understand and Present. Topic modeling is also one
income either by working under organizations or of the important techniques being used in above
through illegal enterprise. This paper by Dr. Pratap papers. Hence Social media analytics is highly used in
Singh et al. presents the impacts after the process of the analysis that is performed on demonetization.
demonetization occurred in India.
III. RESULTS AND DISCUSSION the API (Application Programming Interface) of the
respective platform. Sometimes it is requested to pay
in order to retrieve the data as they might keep their
resources secure. The next step processes it to
perform analysis on the retrieved data. This process
can also make use of R studio and flume platform to
store the data and perform analysis. The outcome is
derived in any of the formats such as Graph, line or
pie chart.
VI.REFERENCES
ABSTRACT
The main objective of this paper is to avoid the railway accidents happening at the level crossings. In India
railway is the major mode of the transportations and it is the cheapest way for travelling. So there are more
numbers of rail users. And it is not easy to stop railway anywhere to prevent accident or for any other reason.
Due to that there are major drawbacks of that. At present manned system is available at level crossings. Hence,
many accidents occur at such crossings, since there is no one to take care of the functioning of the railway gate
when a train approaches the crossing. The objective of this paper is to manage the control system of railway
gate using the microcontroller. This model includes IR sensors, RFID, LCD, buzzer, light led, motor driver and
microcontroller PIC16F877A. In the automatic railway gate control system, at the level crossing the arrival of
the train is detected by the IR sensor and RFID placed near to the gate. In case of RFID it detects only arrival of
train. Hence, the time for which it is closed is less compared to the manually operated gates and reduces the
human labour. As the entire system is automated errors occurring due to manual operation are prevented
because the accuracy of automated operation is more than the manned operation.
Keywords : Automatic Railway Gate, IR Sensors, RFID, PIC 16F877A, Motor Driver, Level Crossing.
I. INTRODUCTION the train by both sides. RFID is also used for the
detection of specific train only. RFID consisting of
We can’t take care of ours while in running by less tag and reader. Tag is given to the train and it will be
Railways being the cheapest mode of transportation read by that RFID reader only. When reader reads
are preferred over all the other means. But there are that tag which is placed on train then the gate will be
so many accidents happening at the manned control closed. When the last carriage of train passes having
level crossings. This is mainly due to the carelessness tag then the gate will be opened. LCD will display
in manual operations or lack of workers. This project information for the road users. This process Reduces
utilizes two pairs of IR sensor and RFID placed at the the traffic and time for which users have to for long
either sides of gate. Each pair of sensor consist of a time at level crossing.
transmitter and receiver, in our case light emitting
diode is used as a transmitter and a p-n junction
photodiode is used as receiver. It detects the arrival of
CSEIT195147 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 303-306 ]
303
M. Florence Dayana, R. Bhuvaneshwari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 303-306
Concept
At the present, India having world’s largest railway
network which having manned gate control system.
Over hundreds of railways running on track every
day. It is definitely impossible to stop the running
train at immediate in some critical situation or
emergency arises. Train accidents having serious
drawbacks in terms of loss of human life, injury,
damage to Railway property. This model uses
automatic control or operation of gate and reduces
the human labors. The concept of the model is to
control the railway gate using microcontroller
PIC16F877A. Figure 1. Block Diagram of System
ABSTRACT
The advancement in nature has prompted the presentation of very effective organic systems. Emulating these
instruments offers gigantic possibilities for the change of our life and the apparatuses we utilize. Nowadays, the
robot is biggest mechanism that is used for each and every process as it has the gripper assembly designed uses a
flexible casing which grasps the tree trunk of almost all diameter within the predefined range, basically it uses
passive compliance. This mechanism can be used for climbing trees which are almost height like coconut trees
and poles. The main drawback is being slow and there is a possibility of damaging the tree trunk. Hence this
system propose a new tree climbing mechanism for multi tree climbing robot that can be used to climb trees
that are almost straight and height.
Keywords : Robot, Grippers, Climbing trees, Clutching
CSEIT195141 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 307-311 ]
307
V. Manochithra, S. Karthika Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 307-311
These models using inch worm mechanism are pesticide sprayer, weed remover or some harvesting
continuous in their motion and can maneuver in mechanism can be mounted on the Robot. With
complex tree environments involving multiple these attachments this robot can act as harvesting or
branches. Next common type of design is wheeled maintenance equipment by the farmers.
robot where in instead of grippers wheels are used for
climbing up. The robot engulfs the tree and locks Coconut picking is a tough, arduous work. The
against it and as the motor rotates, it moves up. The farmers in popular coconut cultivating countries are
sizes of these robots are comparable to the diameter facing severe shortage of skilled workers for
of tree. These models are suitable for trees with harvesting. In recent years, the number of coconut
straight and plain trunks. tree climbers has declined sharply, as those men who
do this rigorous job of climbing 30 to 80 feet high
The main drawback is it being slow and there is a above the ground, bare handed or with the aid of a
possibility of them damaging the tree trunk. Hence rope, have broken away from their traditional role to
most of the models are slow, less agile, have less load take-up better paid jobs. Since the Green Revolution
carrying capacity. As a result, we propose a tree of the late 1960s, the harvesting of coconuts today
climbing mechanism that can be used to climb trees has little changed from how it used to be done for
that are almost straight, like coconut trees and poles generations. The job of coconut picking, which is
with greater agility. The main locomotion of the perceived as risky and unglamorous, does not attract
robot is caused due to the two motors which youngsters either, even though the remuneration is
facilitates simultaneous motion of two consecutive fairly good in local standards. Though there exist few
links. tree climbing machines today, by any measure,
climbing for coconuts is hard work. Not only does a
climber have to scale the tree and reach out among
the fronds and cut the coconut, but they also have to
instinctively learn which nuts are ripe enough to be
harvested. Besides, those few climbers who still
remain in the business of coconut picking, claims
higher wages.
V. LOCOMOTION OF ROBOT
IV. METHODOLOGY
There are three types of motion. These are classified
In traditional harvesting method on reaching the top as continuous, discrete and serpentine. As we get
of a coconut tree, the climber taps the nut in the closer to continuum type, energy consumption is
lowermost bunch with its harvesting knife to test its reduced and speed is increased. But it is difficult to
maturity. If he is satisfied, he cuts the bunch at the achieve continuous motion, so discrete form is
base of the stalk when it drops down to the ground. followed in the construction.
The climber also cleans the crown and removes the
dry leaves, sheaths and spathes. In some places where First, the bot is attached to the tree trunk with the
the trees are not tall, cutting the coconut bunches help of grippers which grips on to the tree trunk and
with a knife, attached to a long bamboo pole, does provides adequate friction such that it does not slip.
the harvesting. The motors used for climbing overcome the moments
caused by its weight.
❖ Ease of use - They wanted use of the robot to be
something that could be easily learned, so it The movement takes place as follows:
would not slow down ALB inspection rate.
❖ Work safe - They wanted the system to have fail 1. First the arm with first motor will hold the tree.
safes implemented to ensure no potential harm 2. Then the link with second motor will release the
to USDA operators in the field. grip and the whole setup will rotate about motor
❖ Minimal damage to tree - They did not want the one as shown in figure.
robot to inflict any serious harm on the tree it 3. After half a rotation, the arm with second motor
was climbing. will grip the tree and the process continues. Once
❖ Navigation around branches - They needed to the robot reaches the topmost point of the tree
robot to be able to find its way around branches, trunk, the whole body is gripped on to the trunk
so inspections could be complete. without any further movement, i.e., the body is
grounded, thereafter miscellaneous action like
harvesting or maintenance work can be
performed.
ABSTRACT
Spinal muscular atrophy (SMA) describes a group of disorders associated with spinal motor neuron loss. In this
review we provide an update regarding the most common form of SMA, proximal or 5q SMA, and discuss the
contemporary approach to diagnosis and treatment. Electromyography and muscle biopsy features of
denervation were once the basis for diagnosis, but molecular testing for homozygous deletion or mutation of
the SMN1 gene allows efficient and specific diagnosis. In combination with loss of SMN1, patients retain
variable numbers of copies of a second similar gene, SMN2, which produce reduced levels of the survival motor
neuron (SMN) protein that are insufficient for normal motor neuron function. Despite the fact that the
understanding of how ubiquitous reduction of SMN protein leads to motor neuron loss remains incomplete,
several promising therapeutics are now being tested in early phase clinical trials. This proposed model
investigates the symptoms and scans readings from the initial MRI scan images of babies with mutation
progress and SMN proteins formation benchmark values for this particular disorder SMA and further this
segmented parameters are acquitted into the K-means clustering technique that predict the report with the
disorder symptoms with MSE (mean square error) values that helps the babies in future to take prevention
measures to overcome this problem.
Keywords : Spinal Muscular, K-Means Clustering, Neuron, Disorder Symptoms, MRI Images.
I. INTRODUCTION legs first and then the arms and, in due time, they
will become quadriplegic and even more disabilities
Spinal Muscular Atrophy (SMA) is a progressive can follow including speech impairment. Assistive
neuromuscular disorder. Usually, this condition is Technology support for people with such disabilities
considered genetically induced with no known cure often requires identification of the best residual
to date. Children are born with the condition and muscular function so that this can be utilized as a
develop muscular weakness progressively as they means of voluntary control.
grow. The weakness ultimately encompasses the
whole muscular function rendering the limbs Spinal muscular atrophy (SMA) refers to a group of
dysfunctional or paralyzed. Many children with SMA, inherited diseases of the motor nerves that cause
if they do not have the weakness from the beginning, muscle weakness and atrophy (wasting). The motor
will start having the disease manifesting itself on the nerves arise from the spinal cord and control the
CSEIT195142 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 312-318 ]
312
V. Manochithra, G. Sumithra Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 312-318
muscles that are used for activities such as breathing, muscles at disease duration of >10 years compared to
crawling, walking, head and neck control, and disease duration of ≤10 years. Longitudinal follow-up
swallowing. SMA is a rare disorder affecting of four patients with two MRI studies eight years
approximately 1 out of every 10,000 individuals apart showed evidence of slow progression. Clinical-
worldwide. radiological comparison revealed a good correlation
for most of the muscles. This muscle MRI study in a
SMA affects muscles throughout the body. In the relatively large number of patients showed a specific
most common types, weakness in the legs is generally pattern of involvement in SMA 3b and revealed that
greater than in the arms. Sometimes feeding, muscle MRI can be an objective and powerful tool in
swallowing, and respiratory function (e.g., breathing, showing disease progression with implications for
coughing, and clearing secretions) can be affected. clinical trials.
When the muscles used for breathing and coughing
are affected and weakened, this can lead to an Clinical Features Of SMA
increased risk for pneumonia and other respiratory
infections, as well as breathing difficulty during sleep. Since only α motor neurons are lost progressively,
The brain’s cognitive functions and the ability to feel only motor function is compromised and sensory
objects and pain are not affected. People with SMA neurons are unaffected. This loss of function leads to
are generally grouped into one of four types (I, II, III, weakness and to progressive symmetrical atrophy of
IV) based on their highest level of motor function or the proximal voluntary muscles of the legs, arms and,
ability. sometimes, the trunk, as the disease progresses. A
number of unusual clinical features are observed in
There are only a few reported muscle magnetic SMA. One of these is the distribution of muscle
resonance imaging (MRI) studies of genetically- weakness, which is more compatible with a
confirmed spinal muscular atrophy (SMA). The aim myopathic disorder than with a neurogenic
of this study was to search for the presence of disorder.12 Proximal muscles are more involved than
selective muscle involvement and of disease distal muscles, legs are more affected than arms and
progression by MRI in SMA 3b. MRI of proximal arms are more affected than the face anddiaphragm.8,
upper and lower extremities was performed on a 1.5- 12 In other words, muscle weakness and atrophy does
Tesla MR scanner using conventional T1 and T2 not have a homogeneous distribution. The severity of
weighted axial images in twenty-two patients with muscle weakness is related to age at onset and
genetically-confirmed SMA. Patients had detailed children with the most severe form of the disease
clinical examinations within one month of the (Type I SMA) can appear normal at birth, but present
radiological investigation. MRI revealed a selective muscle weakness few months later. Furthermore, the
involvement of muscles. Triceps, iliopsoas and clinical course followed by SMA patients.
quadriceps femoris were the most affected muscles.
In contrast, biceps brachii, deltoid and gluteus Who survive beyond childhood demonstrates that
maximus were well-preserved. Gracilis, short head of loss of muscle strength is normally most evident at
biceps femoris, semimembranosus, and Sartorius and diseases onset and that, after this, residual muscle
adductor long us were also relatively spared. Slow, power can remain stable for months or years.
but definite progression with a predictable sequence
and magnitude was documented. Median MRI grade II. LITERATURE SURVEY
was higher (worse) usually by one grade in the
One of the major challenges facing researchers poses an extra challenge precisely due to their
engaged in the study of neurodegenerative and complicated genetics. An attractive alternative would
neuron development diseases is to explain why therefore be to address these issues in diseases with a
defects in ubiquitously expressed proteins have such simple Mendelian inheritance pattern. Spinal
a selective effect on the nervous system and its muscular atrophy provides researchers studying
constituent cell types. Explaining the molecular neurodegenerative diseases with this opportunity.
mechanisms underlying the disease phenotypes has This review highlights why (1) SMA might be
been hampered by their multifactorial nature and considered a prototypical neurodegenerative disease
high incidence of sporadic cases. Alzheimer’s disease, in which to address certain general questions facing
Parkinson’s disease, and amyotrophic lateral sclerosis the field, and (2) why a thorough understanding of
(ALS) are among the most common this disorder might shed light on the mechanisms
neurodegenerative diseases in humans and good that have a specific effect on the development, health,
examples of disorders that exemplify these challenges. survival, and causes of motor neuron degeneration,
Two less common neurological diseases which are which ultimately leads to a disease phenotype.
monogenic in origin but are the result of defects in Proximal spinal muscular atrophy, commonly
ubiquitously expressed proteins involved in referred to as SMA, is a common autosomal recessive
housekeeping functions are Rett syndrome and 5q neuromuscular disease that affects the anterior horn
spinal muscular atrophy (SMA). cells of the spinal cord, resulting in atrophy of the
proximal muscles of the limbs and trunk. There are
The former is characterized by mutations in the gene numerous other forms of spinal muscular atrophy
encoding methyl – CpG binding protein 2 (MeCP2), which share certain characteristics with proximal
which likely regulates gene expression and chromatin SMA; however, they are genetically distinct and
structure; the latter by a deficit of the survival of often affect different subsets of neurons and muscle.
motor neurons (SMN) protein, whose best They include autosomal dominant forms of the
characterized function is in snRNP biogenesis and disease (Sambuughin et al., 1998; Van der Vleuten et
pre-mRNA splicing. Yet, despite the apparent need al., 1998), X-linked forms (La Spada et al., 1991;
for these proteins in all tissues, Rett syndrome, a Kobayashi et al., 1995), recessive forms that affect the
prototypical neurodevelopment disorder, is distal muscles (Viollet et al., 2002), and a severe form
characterized by a specific defect in maintaining of SMA (SMARD) with respiratory distress
proper function of post mitotic neurons in the (Grohmann et al., 2001) (Table 1).
forebrain, hippocampus, and brainstem, while SMA
has a particularly profound effect on lower motor After cystic fibrosis, SMA is the most common
neurons. autosomal recessive disorder in humans, with a
carrier frequency of approximately 1 in 35 and
This begs the question: do the proteins implicated in therefore an incidence of 1 in 6000 in the human
these diseases have functions in neurons other than population. It is also the most common genetic cause
their proposed housekeeping roles? Do they modulate of infant mortality. Despite the high incidence of the
downstream pathways specific to the tissues affected? disease in the human population, SMA has gained
Alternatively, are neuronal cells simply more relatively little attention among researchers studying
susceptible than other tissues to genetic, biochemical, neurodegenerative diseases. However, it has a
and environmental insults? Answering these fascinating biology, which includes two major players:
questions using multifactorial diseases as paradigms the highly homologous SMN1 and SMN2 genes.
III. METHODOLOGY
Nadu, India
2M.Sc Computer Science, Department of Computer Science, Bon Secours College for Women, Thanjavur, Tamil
Nadu, India
ABSTRACT
The transfer of the medical care services to the patient, rather than the transport of the patient to the medical
services providers is aim of the project. This is achieved by using web-based applications including Modern
Medical Informatics Services which is easier, faster and less expensive. The required system implements the
suitable informatics and electronics solutions efficiently for the Tele-medicine care. We proposed an approach
to manage different multimedia medical databases in the telemedicine system. In order to be efficiently and
effectively manage, search, and display database information, we define an information package for both of
doctor and patient as a concise data set of their medical information from each visit. The methodology for
accessing various types of medical records will be provided, also we will design two web-based interfaces, high-
quality data and display for many medical service purposes.
Keywords: Datamining, Telemedicine, Medical Services, Databases.
CSEIT1183818 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 319-321 ]
319
T. K. Anusuya, P. Maharajothi Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 319-321
rural areas and medical centers [16][18],this web management services, namely—
database
subsystem is not included in a PACS. fragmentation, data distribution, websites clustering,
distributed caching, and database scalability.
II. LITERATURE SURVEY
IV. PROPOSED METHODOLOGY
Recently, many researchers have focused on
designing web medical database management systems Our approach integrates three enhanced computing
that satisfy certain performance levels. Such services techniques namely, database fragmentation,
performance is evaluated by measuring the amount of network sites clustering and fragments allocation.
relevant and irrelevant data accessed and the amount We propose an estimation model to compute
of transferred medical data during transactions’ communications cost which helps in finding cost-
processing time. The medication reminder effective data allocation solutions. We perform both
synchronization system provides a patient with external and internal evaluation of our integrated
medications as prescribed by medical staff. In approach.
addition, medical staff can remotely send messages to
the system in order to change the medication In our proposed system we develop a fragmentation
schedules or device configuration settings embedded computing service technique by splitting
in the medication reminder. The proposed system telemedicine database relations into small disjoint
supports the OMA (open mobile alliance) DS (data fragments. This technique generates the minimum
synchronization) protocol, which was originally number of disjoint fragments that would be allocated
proposed as a DS standard protocol that synchronizes to the web servers in the data distribution phase. This
data between mobile devices and a central server. In in turn reduces the data transferred and accessed
this study, the OMA DS protocol is redefined and through different websites and accordingly reduces
extended to transmit the patient’ s medication status the communications cost.
data and the device configuration data.
V. IMPLEMENTATION RESULTS
III. EXISTING PROCESS
ABSTRACT
Today’s world belongs to information technology. Information is worthwhile only if, it can be accessed at the
right time, by the right person & is useful for the purpose defined. The purpose of Medical Product Complaint
Management System (MPCMS) is to provide their prescription details and complaint registration easier one.
This is an important tool to control and effectively manage the entire operation of patient details management
and complaint registration in a very efficient manner and take it to the path of growth. The System deals with
the collection of patient details and the prescription details and outputting it to the user through web
application. The prescription details are stored into the database and when the user logs into the system they
can view their prescription details. The user has been given a login to view the details and he can able to
register the complaint in case of severe problems occurred due to the wrong prescription of medicines. The
complaint will be submitted and it will be viewed by the NGO. The NGO is having separate login to view the
complaints and he will be given the authority to accept/reject the complaint.
Keywords : Medical Product, Complaints, NGO, Prescription, Patient, MPCMS (Medical Product Complaint
Management System).
CSEIT195171 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 322-326 ]
322
R. Gomathijayam, J. Ayeesha Int J Sci Res CSE & IT. January-February-2019 ; 5(1) 322-326
investigations are carried out. Carrying out number his login. The online storage can be implemented
of tests and making the results available promptly is using cloud computing which provides a shared and
very crucial for assessing the patient's medical status secured access to all the resources shared. If a
and deciding on the further course of action. patient is currently admitted then that patient’s
Patient’s medical record data is critical for the current status (whether he is undertaking tests or in
analysis and research purposes and therefore it has OPD etc.). Doctors can have this customized version
to be stored and manipulated in an efficient manner. of application on their tablets based on their
This data includes patient history, observation, speciality that can give them all the patient details
diagnosis and therapeutic conclusions along with in hand which can help manage their schedule by
the tests details and serves as a source of prioritizing each patient.
information for any analysis and research. The
purpose for this storing the medical data is for Doctor can also send pictures and videos of a
utilizing the patient’s medical information and uses patient’s condition to other doctors for expert
it for analysis thereby improving patient care. opinion if required; doctors can give online
prescriptions to pharmacy directly specific to
When the user logs into the system, he can view all particular patient with their patient id. We can
his medical data through ‘medical prescription develop this application using android programming,
details module’. Since the data are stored in case of android programming being open source the entire
severe problems after the treatment, the user can OS is open for usage and extension. Every person
register the complaint as he has the electronic proof. can view the website and should be able to register
Further if the concerned doctor is not available and him/her providing all the necessary details required ,
if there comes the need to take care of the person by the system will provide a Patient’s ID to the patient
some other doctor he can make use of the stored and further actions can be taken based on the this
proof instead of searching the prescriptions and patient ID .A patient can take the appointments
medical data from the form. Even if third party tries online and know the availability of the doctor.
to login / alter the data he will be prompted to the Notifications about regular health check-ups and
error page as there were strong validations in the vaccinations can be sent to the patients and doctors.
system. Website also contains page for online journals
II. LITERATURE SURVEY which include all the latest medical advances and
also medical breakthroughs, unique cases for study
A. Functional Description of Online Medical and videos featuring several surgeries and research.
Management System Using Modern The user can also check for tips. Using web
Technologies: Priyanka Patil, Sruthi technology it can be easy to provide all the above
Kunhiraman, Rohini Temkar, VES Institute of functionalities and making the management of
Technology, Chembur, Mumbai patients efficient.
analysis to identify the flaws in the service causes of online complaints; (2) seek effective ways
standards, in the complaint handling procedure of handling customer complaints by examining
itself, and the finer points which help to formulate different product types; and (3) provide guidelines
resolution methods. When major key problems for successful e-CRM. 1000 customer complaints
persist, complaints may spread across a range of from three different publicized e-business customer
company activity, from operational employee service centres and 500 complaints from online
performance to managerial handling of both policy feedback systems were analyzed in this study. The
and practice. A poorly managed and/or designed research findings suggest that e-businesses should (1)
complaint system will inevitably impact on the provide excellent online customer services because
company's profit and loss status, through excessive customer service is the most important factor in
expenditures, damage to market reputation and online customer satisfaction; (2) respond to
declining income. As the ultimate goal of a customers' requests/complaints quickly because the
company is to content customers, acquire an response speed is more important in online
efficient profit margin, and have a long-lasting customer satisfaction than offline; and (3) employ
relationship with customers and improving market strategies that are appropriate for the product
shares. They should handle the complaints within category in question.
complaint management system and this system
alone must be under the monitoring of customer D. A Multimedia Medical Report Management
relationship management system. The aim of this System:
study is to identify these irregularities and to
The goal of the MrBrAQue (Medical Report Browse
propose a strategy to minimize them. For improving
and Query) project is to develop a system that
reliability of the company we benefited from failure
enables effective management of a large collection
mode and effect analysis technique (FMEA) which
of multimedia documents. The tools for consulting
lets preventive analysis of failures that may
the report collection are presented in this paper.
compromise credibility of the company. As a
Our proposal is based on a paradigm, which we call
methodology model set of 30 questionnaires have
orthogonal navigation that allows a user to
been assigned for this reason and a case study of an
dynamically build a hypermedia network of
airline has been chosen. Ultimately, using, 5-point
documents by means of queries over the document
likert scale and SPSS software, we were managed to
collection
administer the data and conclude the results.
model makes full use of legacy applications and is • Less Time constraint for registering complaints.
flexible for future extensions. Experiment shows • Once the complaint is accepted, the patient can
that real-time, intelligent performances and register the case so that they can be given some
efficiency of operation are obviously improved. fund in return to the mistakes done.
F. Clinical Database Management Software
(CDMS) for medical, diagnostic and research
centres:
[2] Handling e-complaints in customer complaint qualitative system, Faed, A., DEBII, Curtin
management system using FMEA as a Univ. of Technol., Perth, WA, Australia
qualitative system - Faed, A. ; DEBII, Curtin
Cite this article as :
Univ. of Technol., Perth, WA, Australia
[3] A multimedia medical report management
R. Gomathijayam, J. Ayeesha Parveen, "Medical
system ,Merialdo, P. ; Dipartimento di Inf. e
Product Verify and Complaint Management System
Autom., Rome Univ., Italy ; Sindoni, G.
for Ngo's", International Journal of Scientific
[4] Functional Description of Online Medical
Research in Computer Science, Engineering and
Management System Using Modern
Information Technology (IJSRCSEIT), ISSN : 2456-
Technology - Priyanka Patil, Sruthi
3307, Volume 5 Issue 1, pp. 322-326, January-
Kunhiraman, Rohini Temkar,VES Institute of
February 2019. Available at doi :
Technology, Chembur, Mumba
https://doi.org/10.32628/CSEIT195171
[5] Handling e-complaints in customer complaint
Journal URL : http://ijsrcseit.com/CSEIT195171
management system using FMEA as a
Chennai, India
2 Assistant Professor, Department of Computer Science and Engineering, RMK Engineering College,
Chennai, India
ABSTRACT
Currently a child’s security is a crucial space of concern. This paper is developed to rectify the troubles parents
relating to their child security. In keeping with a story from 2014, about 135,000 kids are calculable to be
trafficked in India annually. Trafficked children are sold-out into slavery, domestic slavery, beggary, and
therefore the sex trade. This paper provides the conception of sensible wearable devices for our little ones. And
to stop kid trafficking. One amongst the most precedence over this device is that it provides us the tracing
details of our little ones. And it doesn’t require a smart phone or a technician person to know and use it. The
motive of this device is to assist find their kids with none difficulties. At the moment there are several tracking
device that helps us to note our children’s activity with ease and additionally notice the kid using Wi-FI and
Bluetooth. However Wi-Fi and Bluetooth seem to be unpredictable medium of communication between the
parent and kid. So the main focus of the paper is to possess an SMS text enabled communication between the
child’s wearable and also the parent because the GSM mobile communication is nearly present everyplace. The
parents will send a text with specific keywords like “LOCATION” “TEMPERATURE” “UV” “SOS” “BUZZ” ETC.
The tracking device can reply back providing the correct location of the kid and it will navigate through google
maps. So this paper provides parents with a way of security for his or her kid in today’s world.
Keywords : Child Safety Wearable Device, Arduino, Trafficked children, Lynceus2Market, RFID, MASS, RSSI,
DCC, ATNAC
CSEIT195191 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 327-333 ]
327
Elakiya M., S. Radhika Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 327-333
location of the fishing boats through a new Ultra low-power UWB-RFID system for precise
technology using radio waves. location-aware applications
Ultra low-power radio-frequency identification
(RFID) tag with preciseness localization is commonly
the sanctioning technology for location-aware
detector applications. The RFID tag could be a
transmitter comprising of a micro-controller board
and a UWB impulse radio board. Power saving and
precision localization is achieved by improvement of
the circuit style for immoderate short pulses further
as system design and operation.
This technology will be provided with SME –driven S. Nasrin and P. 1. Radcliffe, "Novel protocol allows
market segments of smoke alarm, fire detection DIY home automation," Telecommunication
systems, life saving equipment, emergency Networks and Applications Conference (ATNAC),
management decision support systems and assistive Novel Protocol Enables DIY Home Automation.
search and rescue equipment.
In this paper, we tend to describe a brand new design
Y. Zhou, C.L. Law and J. Xia, “Ultra low-power for a home automation system that is constructed on
UWB-RFID system for precise location-aware novel network protocols.
applications,” in Wireless Communications and
Networking Conference Workshops (WCNCW), pp. The new system permits a user or home-owner to
154–158, April 2012. buy off the shelf devices and management them by a
computer or mobile device terribly} very easy Objective measures of response throughout these
manner. phases could facilitate determine kids in danger for
The system does not require expert configuration or a anxiety, we tend to propose an alternate technology,
central controller therefore the cost will be an inertial measurement unit (IMU), that permits
significantly reduced. The key enabling technology non-invasive activity of the movements related to
that makes this possible is an XML definition threat response.
Of the device capabilities, show needs, and
management signals. Internet of Things: a definition & taxonomy: Bruno
Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe
Md Imdadul Hoque,1,* Abdullah Al Amin,1 Md Wary and Nizar Kheir
Jumshadur Rahaman,1 and Mohammad Hossam-E-
Haider1 1Electrical Electronic & Communication Internet of Things: a definition & taxonomy
Engineering Department Military Institute of Science
and Technology, Dhaka, Bangladesh The Internet of Things (IOT) has varied fields of
Designing and Performance analysis of GSM/GPS application including health care, resource
based mostly heavier-than-air craft following Device management, asset tracking, etc. depending on the
utilization case, varied technologies like RFID,
Low flying aircrafts are always powerful to trace Wireless sensing element Network (WSN) or smart
because of the radar horizon limitation. However an Objects is used. With each of these comes a specific
aircraft is often to be tracked for the security purpose vision of what the IoT and connected objects are and
.The combination of world Positioning System (GPS) – to our information – there's no global image of the
and international System for Mobile IoT.
Communications (GSM) also can perform the duty
satisfactorily. During this work, two GSM networks Jun Zheng David Simplot-Ryl Chatschik Bisdikian
were utilized to trace low flying aircrafts in several Hussein T. Mouftah
routes. The device style is projected basing on the
experimental results of chase. GUEST EDITORIAL – THE INTERNET OF THINGS
Ellen W. McGinnis*, Ryan S. McGinnis*, Member, The growth of the internet shows no signs of
IEEE, Maria Muzik, Jessica Hruschak, Nestor L. retardation down and it steady becomes the cause of
Lopez-Duran, Noel C. Perkins, Kate Fitzgerald, a brand new pervasive paradigm in computing and
Katherine L. Rosenblum communications. This new paradigm enhances the
standard internet into a smart net of Things (IoT)
Movements indicate threat response phases in created around intelligent interconnections of
children at-risk for anxiety numerous objects within the physical world, like
vehicles, cell phones, habitats, and habitat occupants.
Temporal phases of threat response similarly as It utilizes affordable information gathering and
Potential Threat (Anxiety), Acute Threat (Startle, dissemination devices, like sensors and RFID tags,
Fear), and Post-threat Response Modulation area unit that facilitate fast interactions among the objects
referred to as underlying markers of tension themselves as well because the objects and persons in
disorders. anyplace and at any time. IoT isn't a mere extension
of today’s net or an online of net systems.
ChildGuard: A Child-Safety Monitoring System A wireless modem behaves like a dial-up modem.
Zhigang Gao, Hongyi Guo, Yunfeng Xie, and Yanjun The main distinction between them is that dial-up
Luo Hangzhou Dianzi University Huijuan Lu and Ke electronic equipment sends and receives information
Yan China Jiliang University. through a set telephone line whereas wireless
electronic equipment sends and receives information
ChildGuard: A Child-Safety Monitoring System through radio waves.
The ChildGuard system exploits mobile devices to The operating of GSM electronic equipment relies on
observe the period of time movement of commands.
unsupervised children. It additionally sends
reminders and alarms to kids and notifies guardians C. LCD
of abnormities in a child’s routine. for instance, two
typical measures embody hiring manned guards or LCD (Liquid Crystal Display) screen is associate
using video surveillance, but guards aren’t practical electronic show module and notices a large vary of
or affordable when it involves monitoring kids, and applications.
video surveillance systems typically have blind zones.
to that end, ChildGuard may be a security A 16x2 {lcd liquid crystal display |LCD| digital display
methodology for observation kids that uses present |alphanumeric display} display is incredibly basic
computing devices, like smartphones or wearable module and is extremely unremarkably employed in
devices—which are growing in each quality and varied devices and circuits.
performance.
These modules area unit most popular over seven The sensors contain two in contact with an
phases and alternative multi segment LEDs. electrolyte.
The reasons being: LCDs are economical; easily The electrodes are usually invented by fixing a high
programmable. extent valuable on to the porous hydrophobic
membrane.
G. ARDUINO IDE:
Most of the daily commuters of RTC face problems to know the exact time of arrival of a bus to a particular stop.
The time of arrival of bus depends on many factors like traffic, condition of a bus, climate etc. So it is very
tough for a person waiting for a bus without knowing whether it has left or not from a particular stop. So here
we are providing a solution for this problem by using latest technologies like an Android Application. The
solution is that we want to develop an ANDROID APP[1] which gives the notification of a bus arrival in a
particular route for a particular stop. The backbone of our application is using CROWDSOURCING. It is
nothing but taking the help of some people to help other people. The passengers who have seen or boarded the
bus can report the bus location along with an image of bus with the help of our app. Then this location will be
sent as a notification to all other commuters in that particular route. The commuters who have missed the bus
from the stops through which the bus has already passed, can go with an alternative option and the other
commuters waiting at the stops to which bus has to arrive can wait accordingly. This helps in saving our
precious time which many of us wasting it in waiting for a bus. In this way our application helps the daily
commuters to know the location of a bus and saves their precious time.
Keywords : Crowd Sourcing, Androidapp, Notification, Location
CSEIT195192 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 334-339 ]
334
B. Harshini Reddy et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 334-339
commuters waiting at the stops to which bus has to Initial review which is organized is for proving that
arrive can wait accordingly. This helps in saving our problem regarding buses being late to bus stops exists.
precious time which many of us wasting it in waiting At the same time, we assessed the level of significant
for a bus. In this way our application helps the daily of the problem. We observed the expected arrival
commuters to know the location of a bus and saves time to each bus stop for a period of time for two
their precious time. weeks. The result of the observation is that most of
the time the bus failed to arrive at the bus stop as
II. LITERATURE SURVEY they are scheduled to arrive. Furthermore, we had
got a shocking observation result that is sometime the
For any enterprise or task, the initial phase would be bus skipped its trip and causing the passengers to wait
literature survey concerning with formerly issued for the next bus that might arrive an hour later.
journals. Prior to decision making, a thorough Sometimes the bus arrives late at the first bus stop for
patrons review regarding journals is done in a more than fifty minutes. It is causing the passengers
sequence manner. Complete knowledge and in that entire route to be delayed and arrive at late to
interpretation concerning the enterprise would be their workplaces. Also, the problem even happens
the main principle of this literature review. It also during peak hours where most of the passengers will
helps us lay a firm base for upcoming tasks. be rushing to their workplaces. These observation
Research which is undergone serves as guideline and results successfully proved that our problem
citation to the enterprise. Once the literature analysis statement is valid and these problems have to be
is done, we should be in a position to write to such a solved urgently for the benefit of the city and the bus
degree that manifests our experience and observation passengers. The second study is via survey. The main
regarding that particular domain and realize principal aim of this survey is to help understand the current
subject which are pertinent for the project. It’s demand and acceptance for our proposed solution in
important to have an idea about the one’s that can be the market. In order to understand the culture of the
ignored and must be in a position to predict end passengers, the problems faced by the passengers, and
result. the need of our proposed system, and the present
By summing up wholly, undeniably the intention of condition of public transportation we conducted a
literature survey is to find out the oversight survey by distributing hundred survey forms to the
pertaining to a task. The SMS Based Forecasting passengers who travel frequently through these
System of Public Transport Arrival Time[5]. public transportation.
After issue being identified and then coming up with According to our survey results the majority of the
suitable solving methodology we organized some commuters of the public transportation are
research concerning bus passengers stating our issue workforce and students who use this for travelling to
explanation, also explaining our recommended their respected workplaces daily. Also the most
solution. Three main segments are concentrated in common and major problem that is that the buses
our analysis. They are: usually do not arrive to the bus stops according to
1. Demonstrate as well as appraise the importance their scheduled time. Due this problem there is an
regarding issue description . inconvenience caused to the passengers and they are
2. The ultimatum and necessity of suggested end forced to wait for unpredictable frame of time.
result must be recognized and understood. Majority of the passengers who took part in survey
3.Providing the issue description demonstrated is reported that a SMS system which gives updates
correct, extract and analyse it. about the whereabouts and the arrival timings of the
bus would be a better solution for their problems. off. The methods used in this system are
Based on the this survey results and the information onPause(),onResume(),onKeyDown() and
obtained we are very positive that our proposed onDestroy().The Post-configuration process is
solution would be accepted by the bus passengers. managed by onDestroy() and onKeyDown() which
The current status of the problems faced by the makes the usage convenient.
passengers is very high. Thus we derived some
hypotheses to help us to understand the factors The implemented modules in this system are:-
which are affecting the bus’s arrival time. These
hypotheses are extremely important for us to 1. Bus Unit
understand the parameters involved in this system. 2. Central Control Unit
Based on the result of the hypotheses, we are able to 3. Client-Side Application
understand the possible causes of bus delays and this
The bus unit consists of GPS which tracks the co-
information will provide great assistant.
ordinates such as latitude, longitude and other
attributes of that particular location and send s it to
This report is a survey which helps the passengers to
the server. The GPS is free to use i.e.., no subscription
overcome the difficulties they are facing in their
fee is required. The GPS has the capability to
daily transportation. This helps to conserve time
receive information about these locations from three
which in very important. This not only saves the
satellites and calculates the position based on this
time but also it helps to form an advance transport
information. There are three different types of
system.
transceivers in GPS such as Data Loggers, Data
pullers and Data Pushers .Based on the application,
There are many resources present which gives us the
the appropriate transceiver will be chosen to gather
information regarding the bus numbers and its details.
the information and track the position. The GPS
In this review we get advance information like
attached to sends the information to the servers at
vacant seats, location of the bus, estimated time of
regular intervals of time. This information is received
arrival and departure to a particular place which can
by the device from the servers.
be viewed by the travellers.Gradual advancement of
bus systems reaches demands pertaining to various
The received data is analysed by the servers .The GPS
areas. Main motto of the application is to have a
antenna is connected to the right jack and fixes it’s
comfortable, simple and accessible bus facility that
position to receive signals in the appropriate places
uplifts the usage of public transport system.
.There is a slot allocated for a SIM card, the GSM
towers helps in receiving messages from different
III. PROPOSED METHODOLOGY
users and respond to them. The positive and negative
wires are connected to 12V or 24V vehicle power
This model consists of four parts. Each and every
system [4]. The tracker device is turned on to receive
individual model is divided based on their
the signals from the satellite hence thus enabling the
functionalities. The main activity of our application
device to receive the latitude and longitude values of
perform major tasks which include Pre-configuration
the position of the bus. At any point of time the GPS
and Instantiation methods. It consists information
receiver gives us the location values. The coordinates
about the total distance between the two locations
of the bus along with the timestamp is present in the
and also about the previous and current location. The
bus unit, these values are compared with the previous
status of the GPS is also examined whether it's on or
coordinates if there is any distinction then the new and the elements which are in correspondence with
co-ordinate values are updated and will be sent to the the stack are integrated in a tight manner to provide
server over the Internet[4]. the convenient and proper execution frame for
mobile devices.
The location details of the bus are saved in a
particular format with few attributes such as As per the advancement of the technology the
Latitudinal position, longitudinal position, ID and Android is developed for the touch screen devices
timestamp etc. Every bus has a unique ID which like mobile devices and tablets. This android is an
helps to identify different buses easily. Every bus has operating system developed by Google. The android
a different identification number called as ID. Server is based on the Linux kernel[6] whereas the
in this system takes an important role and performs Android's user interface is based on direct
major functions. Here the server stores and maintains manipulation with the help of human touches that
the complete information. The server also performs help to perform actions on the screen and also to give
actions like a gateway between the user and the bus input[5]. In extension to the devices Google added
module. The overall information about the routes, Android TV, Android Wear etc. with an exclusive
arrival time, department time are stored in the new user interfaces. The complication of the mobile
database. world has completely been reduced with the use of
Android. The unimaginable features are implemented
The final user can only view the application which is and high quality phones are made easily with the
an interactive web based module. Here the help of this Android OS.
application provides different services to remote
users. The user module requires two inputs that is the
current location point and the end location point. As
the user requests the server, it sends the list the buses
available in that location. Ones the bus is selected it
shows the real time location and time of that
particular bus on screen.
Figure 2. Screen 2 of bus notification system Figure 4. Login for bus notification system
Figure 3. Registration for bus notification system Figure 5. Location accessing for bus notification
system
ABSTRACT
Cryptography comes from the Greek word kryptos which means hidden. The aim of our research is to provide
secrecy for the data during transmission. In this we discuss about the qwerty cipher algorithm, its merits and
demerits. The existing qwerty algorithm is based on the use of a keyboard which is not much secured. We have
proposed an enhancement to the existing algorithm by using a diagonalized qwerty algorithm which is more
secure and highly difficult for the intruder to understand or decrypt the cipher text, even if it is decrypted the
result would be gibberish.
Keywords : Transmission, Intruder, Decrypt, Cipher, Gibberish.
I. INTRODUCTION
Traditional ciphers consist of substitution or
Cryptography is the strongest tool used for secret transposition techniques [2] [3]. In Substitution
writing which is controlling against the security ciphers, replace letters in the plain text with other
threats [6]. The study of encoding and decoding is letters or symbols keeping the order as same. It maps
called as cryptography [1]. In cryptography, a cipher plain text elements into cipher text elements [4].
is an algorithm consists of well-defined steps for
performing encryption or decryption. In encryption
ABCDEFGHIJKLMNOPQRSTUVWXY
process, the original plain text is coded into the Z
cipher text and in the decryption process; the plain
ZYXWVUTSRQPONMLKJIHGFEDCB
text is restored from the cipher text [2]. We need a A
strong encryption algorithm in order to encrypt the
plain text into cipher text [7]. The sender and Fig 2. Substitution Cipher
receiver must have obtained the secret key in a
secure fashion and must keep the key secure. The In Transposition ciphers, keep all of the original
process of encryption and decryption are shown letters intact, but mix up their order [5]. It transposes
below systematically the position of plain text elements.
Transposition cipher hides the message by
rearranging the order. Transposition cipher, just
reorder the letters [8]. A character in the first
Fig 1. Encryption and Decryption process position of plaintext may appear at 12th position in
CSEIT195151 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 340-342 ]
340
V. Vennila, S. Umamaheswari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 340-342
Encryption Technique:
A S D F G H J K L
Plain text: SUN RISES IN THE EAST
Key: QWERTY
Cipher text: MGY DHMCM HY EPC CLME Z X C V B N M
VI. REFERENCES
Fig 7. Representation of qwerty keyboard
[1]. ”Transformation of plain Text with two
V. EXAMPLE FOR DIAGONALIZED QWERTY ciphers”,(Rajani Bala,Swapnika saxena,Sonal
CIPHER beniwal), Volume 3, Issue 5, May 2013.
[2]. “Implementation of Ceasar Cipher with Rail
Encryption Algorithm: Fence for Enhancing Data Security”,(Ajit Singh,
Plain text: CRYPTOGRAPHY IS MY FAVOURITE Aarti Nandal, Swati Malik), Volume 2, Issue 12
SUBJECT , December 2012.
Key: DIAGONALIZED QWERTY [3]. “An Extension to Traditional Playfair
Cipher text: IKZTPFQKBTWZ CN DZ OBLFXKCPJ Cryptographic Method”( Ravindra Babu, Uday
NXAEJIP Kumar, Vinay Babu, Aditya, Komuraiah),
Volume 17, No.5, March 2011.
Decryption Algorithm: [4]. “An Improved Ceasar Cipher
Cipher text: IKZTPFQKBTWZ CN DZ OBLFXKCPJ Algorithm”,(Ochoche Abraham,
NXAEJIP GaniyO.Shefiu), Volume 2, Issue-5,1198-1202.
Key: DIAGONALIZED QWERTY [5]. "Alpha-Qwerty Cipher: An Extended Vigenere
Plain text: CRYPTOGRAPHY IS MY FAVOURITE Cipher”( Khalid Imam Rahmani,Neeta
SUBJECT Wadhwa, Vaibhv Malhotra), Volume 3, No.3,
May, 2012.
VI. ADVANTAGES [6]. William Stalling “Network Security Essentials
(Applications and Standards)”, Pearson
This diagonalized qwerty cipher has various Education, 2004 .
advantages over simple cipher. It is more difficult to [7]. Atul Kahate (2009), Cryptography and Network
cryptanalyze. The result cannot be easily Security, second edition, McGraw-Hill.
reconstructed. Brute force attack cannot crack the [8]. William Stallings, Cryptography and Network
code. Overcome all the limitations of the qwerty Security, 5th impression, 2008.
cipher.
Cite this Article : V. Vennila, S. Umamaheswari, "An Extension to Traditional Qwerty Cryptographic Method", International
Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307,
Volume 5 Issue 1, pp. 340-342, January-February 2019. Available at doi : https://doi.org/10.32628/CSEIT195151
Journal URL : http://ijsrcseit.com/CSEIT195151
ABSTRACT
In this era of information age, a huge amount of data generates every moment through various sources. This
enormous data is beyond the processing capability of traditional data management system to manage and
analyse the data in a specified time span. This huge amount of data refers to Big Data. Big Data faces numerous
challenges in various operations on data such as capturing data, data analysis, data searching, data sharing, data
filtering etc. HADOOP has showed a big way of various enterprises for big data management. Big data hadoop
deals with the implementation of various industry use cases. To master the Apache Hadoop, we need to
understand the hadoop eco system and hadoop architecture. In this paper we brief on the Hadoop architecture
and hadoop eco system.
Keywords: Big Data, Hadoop architecture, Hadoop eco system components, HDFS, MapReduce.
CSEIT195172 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 343-348 ]
343
Anushree Raj, Rio D’Souza Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 343-348
used to keep the distributed system functioning HCatalog works like a key component of Hive and it
together as a single unit, using its synchronization, enables the users to store their data in any format
serialization and coordination goals. For and any structure.
simplicity's sake Zookeeper can be thought of as a file HCatalog is a table storage management tool for
system where we have znodes that store data instead Hadoop that exposes the tabular data of Hive
of files or directories storing data. Zookeeper is metastore to other Hadoop applications. It enables
a Hadoop Admin tool used for managing the jobs in users with different data processing tools (Pig,
the cluster. MapReduce) to easily write data onto a grid [7].
HCatalog ensures that users don’t have to worry
ZooKeeper is a centralized service for maintaining about where or in what format their data is stored.
configuration information, naming, providing This is a small tutorial that explains just the basics of
distributed synchronization, and providing group HCatalog and how to use it.
services. ZooKeeper is simple, distributed, reliable,
and fast [11]. IV. CONCLUSION
• maintaining configuration information: It
maintains cluster configuration info which is Apache Hadoop is the most popular and powerful big
shared across all the nodes in the cluster. data tool, Hadoop provides world’s most reliable
• naming: Zookeeper can be used as naming storage layer – HDFS, a batch Processing engine –
service, so that one node in the cluster can find MapReduce and a Resource Management Layer –
another node in the large cluster ex: 1000 node YARN [11]. HADOOP is a highly scalable storage
cluster platform, because it can store and distribute very
• providing distributed synchronization: We can large data sets across hundreds of inexpensive servers
also use zookeeper for solving distributed that operate in parallel. Unlike traditional relational
synchronization problems in the cluster by using database systems (RDBMS) that can't scale to process
locks, Queues etc. large amounts of data, Hadoop enables businesses to
• providing group services: Zookeeper also helps in run applications on thousands of nodes involving
group service with the selection of a master in thousands of terabytes of data. HADOOP also offers a
the cluster (Leader election process). cost-effective storage solution for businesses'
exploding data sets. Hadoop enables businesses to
ZooKeeper can work in replicated mode as well as easily access new data sources and tap into different
standalone mode types of data (both structured and unstructured) to
generate value from that data [13]. This means
HCatalog: businesses can use Hadoop to derive valuable
HCatalog is a table storage management tool for business insights from data sources. A key advantage
Hadoop. It exposes the tabular data of Hive of using Hadoop is its fault tolerance. When data is
metastore to other Hadoop applications. It enables sent to an individual node, that data is also replicated
users with different data processing tools (Pig, to other nodes in the cluster, which means that in the
MapReduce) to easily write data onto a grid. It event of failure, there is another copy available for
ensures that users don’t have to worry about where use.
or in what format their data is stored [3].
ABSTRACT
This paper deals with a low cost solution to problem avoidance for a mobile machine using just a single Artifical
Intelligennce. It allows the machine to navigate smoothly in an unknown environment, avoiding collisions,
without having to stop in front of problems. The problem avoidance process is made up of three distinct stages -
the mapping algorithm, the core problem avoidance algorithm, and the steering algorithm. The mapping
algorithm takes the raw Artifical Intelligennce readings and processes them to create higher resolution maps
from the wide-angle Artifical Intelligennce. The problem avoidance algorithm is based on the potential field
theory which considers the machine to be a test charge that is repelled by all the problems around it, and
which moves in the direction of the resultant of the forces acting on it. An algorithm which steers a mobile
machine based on the differential drive system is also discussed.
Keywords : Mobile Machine, Problem Avoidance, Autonomous Navigation, Ultrasonic Range Sensor.
CSEIT195186 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 349-356 ]
349
J.Antony Daniel Rex et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 349-356
have a range of upto 30m, and are very accurate, Beyond the range value, there may be problems
having an angular resolution of upto 0.25. somewhere along the arc, but it is not certain at
which positions the problems are present.
However, they are very expensive compared to other Figure 1 shows the next sensor reading, which is
sensors of these, the ultrasonic range sensor was obtained after rotating the sensor through a certain
found most suitable for our requirement because of angle, say 5. This reading, with a range value of 1.2m
its low cost and ranging capability. covers angles -10 to +20. After obtaining this reading,
we are certain that there is no problem between
II. MAPPING these angles for a range of 1.2m. Thus, in the
overlapping region, the larger distance value is
An ultrasonic range sensor detects the range of an chosen over the smaller one.
object in front of it by sending a short burst of
ultrasonic waves, and measuring the time taken for If a subsequent overlapped reading is smaller than the
the echo to be received. These sensors typically have existing value, then we have to consider the ‘age’ of
a wide beam angle of 15 to 30 As a result, the cone the existing information. If the existing large range
gets wider with increasing distance from the value is very recent, then the overlapped area is taken
transmitter. This increases the uncertainty in the to have the larger range, because it can be assumed
spatial dimensions of the problem. Most mobile that no object moved into the intersecting area
machines which use ultrasonic range finders for between the two scans. If the existing large range
problem avoidance have 12 or 24 sensors in a ring value is old, then the smaller value is taken, because
around the machine, to cover all directions. This is the machine may have moved within that time, or a
not very cost-effective, and moreover, all of them moving problem may have appeared.
cannot be triggered at once due to crosstalk and
interference problems. A maximum of 4 sensors Using this technique, the accuracy of the ultrasonic
which are at 90 to each other can be triggered at a range information can be greatly improved upto the
time. Our solution was to use a single sensor mounted step size of the stepper motor. However, there are
on a stepper motor to pan the sensor across 180. This some cases where the information is still not accurate.
can be expanded to 4 sensors mounted at 90 to each Consider the case gap between problems A and B can
other on the stepper motor for maximum scanning never be detected by the sensor at that distance.
speed and full coverage. Such a setup also provides Once the machine moves closer to these problems,
the flexibility to perform fine scanning of an area for the gap can be detected.
a more accurate map of the environment, with an
angular resolution of the minimum step size of the IV. PROBLEM AVOIDANCE
stepper motor, as opposed to the 30 resolution of the
sensor. All mobile machines feature some kind of problem
avoidance. The algorithm could be as simple as
III. MACHINE SCANNING ALGORITHM stopping if an problem is detected in front of it. This
is common in track-following machines, where the
A single range reading from the sensor implies that machine follows a pre-determined track. Another
the area in a 30 sector in front of it with a radius of solution is wall-following, in which the machine
the range value contains no problems. A reading of a moves alongside a wall at a fixed distance, following
range of 1m. This reading covers angles -15 to +15. the contour of the wall till it reaches its destination.
[2] “Sensory based motion planning”-IEEE Computer Networking, Wireless and Mobile
transactions on Machineics & Automation- Communications. Vol No – 3, Issue No - 1, pp.
Kamon Ishay. 245-256.
[3] A.S.Syed Navaz, C.Prabhadevi & [11] A.S.Syed Navaz, H.Iyyappa Narayanan &
V.Sangeetha”Data Grid Concepts for Data R.Vinoth.” Security Protocol Review Method
Security in Distributed Computing” January Analyzer (SPRMAN)”, August – 2013,
2013, International Journal of Computer International Journal of Advanced Studies in
Applications, Vol 61 – No 13, pp 6-11. Computers, Science and Engineering, Vol No –
[4] A.S.Syed Navaz, V.Sangeetha & C.Prabhadevi, 2, Issue No – 4, pp. 53-58.
“Entropy Based Anomaly Detection System to [12] A.S.Syed Navaz, G.M. Kadhar Nawaz &
Prevent DDoS Attacks in Cloud” January 2013, B.Karthick.” Probabilistic Approach to Locate a
International Journal of Computer Mobile Node in Wireless Domain”, April –
Applications, Vol 62 – No 15, pp 42-47. 2014, International Journal of Computer
[5] Y. Kim, H. Shin, and H. Cha, “Y-mac: An Engineering and Applications, Vol No – 6, Issue
energy-efficient multichannel mac protocol for No – 1, pp.41-49.
dense wireless sensor networks,” in IPSN ’08, [13] S. Gandham, Y. Zhang, and Q. Huang,
April 2008, pp. 53–63. Distributed time-optimal scheduling
[6] A.S.Syed Navaz, A.S.Syed Fiaz, C.Prabhadevi, forconvergecast in wireless sensor networks,”
V.Sangeetha & S.Gopalakrishnan “Human Computer Networks, vol. 52, no. 3, pp. 610–
Resource Management System” Jan – Feb 2013, 629, 2008.
International Organization of Scientific [14] A.S.Syed Navaz & G.M. Kadhar Nawaz, “Ultra
Research Journal of Computer Engineering, Vol Wideband on High Speed Wireless Personal
8, Issue 4, pp. 62-71. Area Networks” August – 2014, International
[7] A.S.Syed Navaz, S.Gopalakrishnan & R.Meena Journal of Science and Research, Vol No – 3,
“Anomaly Detections in Internet Using Issue No – 8, pp.1952-1955.
Empirical Measures” February 2013, [15] A.S.Syed Navaz & Dr.G.M. Kadhar Nawaz &
International Journal of Innovative Technology A.S.Syed Fiaz “Slot Assignment Using FSA and
and Exploring Engineering, Vol 2 – Issue 3. pp. DSA Algorithm in Wireless Sensor Network”
58-61. October – 2014, Australian Journal of Basic and
[8] “Problem detection based on qualitative Applied Sciences, Vol No –8, Issue No –16,
&quantitative 3d reconstruction-IEEE pp.11-17.
transaction on pattern analysis and [16] A.S.Syed Navaz & A.S.Syed Fiaz, “Load
intelligence”-Zhang-Zhonggei. Balancing in P2P Networks using Random
[9] A.S.Syed Navaz, M.Ravi & T.Prabhu, Walk Algorithm” March – 2015, International
“Preventing Disclosure of Sensitive Knowledge Journal of Science and Research, Vol No – 4,
by Hiding Inference” February 2013, Issue No – 3, pp.2062-2066.
International Journal of Computer [17] Qiao Li, Baihai Zhang, Lingguo Cui, Zhun Fan,
Applications, Vol 63 – No 1. pp. 32-38. V. Vasilakos Athanasios, Epidemics on small
[10] A.S.Syed Navaz , T.Dhevisri & Pratap worlds of tree-based wireless sensor networks,
Mazumder “Face Recognition Using Principal Journal of Systems Science and Complexity
Component Analysis and Neural Networks“ December 2014, Volume 27, Issue 6, pp 1095-
March -2013, International Journal of 1120.
[18] A.S.Syed Navaz, J.Antony Daniel Rex, S.Jensy and Research, Vol No - 5, Issue No - 1, pp.1581-
Mary. “Cluster Based Secure Data Transmission 1584.
in WSN” July – 2015, International Journal of [26] A.S.Syed Fiaz, N.Asha, D.Sumathi & A.S.Syed
Scientific & Engineering Research, Vol No - 6, Navaz “Data Visualization: Enhancing Big Data
Issue No - 7, pp. 1776 – 1781. More Adaptable and Valuable” February –
[19] Ricardo Severino, Nuno Pereira, Eduardo 2016, International Journal of Applied
Tovar, Dynamic cluster scheduling for cluster- Engineering Research, Vol No - 11, Issue No -
tree WSNs, Springer, Vol.3, No.493, 2014. 4, pp.–2801-2804.
[20] A.S.Syed Navaz, J.Antony Daniel Rex, P.Anjala [27] W. Song, F. Yuan, and R. LaHusen, “Time-
Mary. “An Efficient Intrusion Detection optimum packet scheduling for many-to-one
Scheme for Mitigating Nodes Using Data routing in wireless sensor networks,” in MASS
Aggregation in Delay Tolerant Network” ’06, pp. 81–90.
September – 2015, International Journal of [28] A.S.Syed Navaz & Dr.G.M. Kadhar Nawaz
Scientific & Engineering Research, Vol No - 6, “Flow Based Layer Selection Algorithm for
Issue No - 9, pp. 421 – 428. Data Collection in Tree Structure Wireless
[21] A.S.Syed Navaz, P.Jayalakshmi, N.Asha. Sensor Networks” March – 2016, International
“Optimization of Real-Time Video Over 3G Journal of Applied Engineering Research, Vol
Wireless Networks” September – 2015, No - 11, Issue No - 5, pp.–3359-3363.
International Journal of Applied Engineering [29] A.S.Syed Navaz & Dr.G.M. Kadhar Nawaz
Research, Vol No - 10, Issue No - 18, pp. 39724 “Layer Orient Time Domain Density Estimation
– 39730. Technique Based Channel Assignment in Tree
[22] M.Ravi & A.S.Syed Navaz. “Development of Structure Wireless Sensor Networks for Fast
Mail Tracking System” October – 2015, Data Collection” June - 2016, International
International Journal of Innovative Research in Journal of Engineering and Technology, Vol No
Computer and Communication Engineering, - 8, Issue No - 3, pp.–1506-1512.
Vol No - 3, Issue No - 10, pp.9757-9762. [30] M.Ravi & A.S.Syed Navaz "Rough Set Based
[23] S.Jensy Mary, A.S Syed Navaz & J.Antony Grid Computing Service in Wireless Network"
Daniel Rex, “QA Generation Using Multimedia November - 2016, International Research
Based Harvesting Web Information” November Journal of Engineering and Technology, Vol No
– 2015, International Journal of Innovative - 3, Issue No - 11, pp.1122– 1126.
Research in Computer and Communication [31] A.S.Syed Navaz, N.Asha & D.Sumathi “Energy
Engineering, Vol No - 3, Issue No - 11, Efficient Consumption for Quality Based Sleep
pp.10381-10386. Scheduling in Wireless Sensor Networks”
[24] A.S Syed Navaz & A.S.Syed Fiaz “Network March - 2017, ARPN Journal of Engineering
Intelligent Agent for Collision Detection with and Applied Sciences, Vol No - 12, Issue No - 5,
Bandwidth Calculation” December – 2015, pp.–1494-1498.
MCAS Journal of Research, Vol No – 2, pp.88- [32] N. Lai, C.King, and C. Lin, “On Maximizing the
95, ISSN: 2454-115X. throughput of convergecast in wireless sensor
[25] A.S Syed Navaz & K.Durairaj “Signature networks,” in GPC ’08, pp. 396– 408.
Authentication Using Biometric Methods” [33] A.S.Syed Fiaz, K.S.Guruprakash & A.S.Syed
January – 2016, International Journal of Science Navaz “Prediction of Best Cloud Service
Provider using the QoS Ranking Framework”
ABSTRACT
Tuition Plus+ is a website and a web-based application provides a simple interface for maintenance of a student
records and information. It is used by educational institution like tuitions or colleges which can manage
student’s records easily. Tuition Plus website deals with different modules like registration, organization,
Subjects, Course, Batches, Student, Account, Enquiry and Report Module. It tracks all the details of a student
from a day to day course. It will also track all the students fees structure like installments. These will be
available through a secure, online interface embedded in the Tuition Plus website. It will also have registration
details, batch execution details, students’ details in all aspects, the various academic notifications to the staff and
students updated by the tuition organisation
Keywords : Tuition Plus+, DFD, OTP
CSEIT195197 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 357-362 ]
357
Bharat Dhak et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 357-362
will have the authority to update or edit the easy and interactive manner which provides facilities
information of student as well as the information of like online registration and profile creation of
their organisation. Student login will help the student’s thus reducing paper work and automating
students to see their own data, fees structure, etc. the record generation process in an educational
organization, which will also save the time of a
[1]Previously, the Tuition relied heavily on paper student. This website also provides a common
records for this initiative. While paper records are a platform for registering their organization online that
traditional way of managing student data there are is why the need of making separate website by
several drawbacks to this method. Like when a investing money will reduce.
student's wants to register for a particular course then
it must have to visit the particular tuition class and III. PROPOSED SYSTEM
register themselves. It takes a very long time to
convey the information to the student. Paper records The purpose is to design a Tuition Plus+ website,
are difficult to manage and track. The physical which contains up to date information of an
exertion required to retrieve, alter, and re-file the educational organization that should improve
paper records are all non-value added activities. This efficiency of a tuition record management and about
system provides a simple interface for the a different courses that they will provide to the
maintenance of student information. It can be used student.
by educational institutes or colleges to maintain the
records of students easily. Achieving this objective is OBJECTIVES
difficult using a manual system as the information is
scattered, can be redundant and collecting relevant • Provide the online interface for a student’s
information may be very time consuming. All these information, courses, fees structure, etc.
problems are solved using Tuition Plus+. The paper • Increase the efficiency of tuition record
focuses on presenting information in an easy and management.
interact manner which provides facilities like online • Decrease time required to access and
registration and profile creation of student’s thus delivered records.
reducing paper work and automating the record • To make a system more secure.
generation process in an educational institution. • Decrease time spent on non-value added
tasks.
II. RELATED WORK
SYSTEM DESIGN
The existing system is web based student information
management is also good but that have certain
A. DATA FLOW DIAGRAM
drawback like these existing website is only for a
Data Flow Diagram shows the graphical
college but our system is for all educational
representation of the flow of Tuition Plus+. It shows
institution .Also the existing system does not provide
the visualization of processing of data. It shows how
any information about a fees structure but that is
users of the Tuition Plus+ will interact with the
included in our system .
system. DFD contains the different modules that can
be viewed as a function that is used to transform the
The purpose is to design a Tuition Plus+ website that,
these website focuses on presenting information in an
a. Registration Module
b. Organization Setting Module
c. Subject Module
d. Course Module
e. Batch Module
f. Student Module
g. Account Module
h. Enquiry Module
i. Report Module
There are two different login because both the users
have different level of authorization to the system.
Merchants have the authority to access the data of
the students in their organization whereas users have
the authority to access their own data.
A. Registration Module
branches of their organization by clicking manage batch for subjects one or more subjects all students in
branch tab. It will set company as default primary that batch will show in batch list.
branch user can change primary branch. User can allocate batch to one student from student’s
profile.
C. Subject Module
It has two options batch for course and batch for
Merchant Login have the authentication to add subjects.
subject that are taught in their organization. User can 1) Batch for course:
create subjects from add button in subject It will show all batches, which have all
module.Once subjects are created user can create subjects of that course.
course through course panel. User can edit or delete 2) Batch for subjects:
subjects. Add subject for particular branch, which are It will show batch for every subjects of that
already created from organization setting. User can course.
select more than one branch to assign same subject in
multiple branches. F. Student Module
Batch module has two steps to create batch In account, module user can manage fees, duration,
1) Create batch: tax and discount for courses.
2) This tab includes basic information about In this student, can able to pay in three different
batch name, batch capacity, start date, end ways:
date, start time, end time. A. Onetime payment
3) Batch subjects B. Instalment payment
In batch subjects user have to assign one or C. Monthly payment
more subjects in batch with trainer name In Payment Management, tab user can manage
subject start and end time, start and end date. course payment methods, instalment amount and
User can edit batch or can view batch. schedule of instalment.
1) One Time :
View batch In Onetime, payment method complete fees
It will show all details fill during batch creation. User should be paid at a time.
can add more subjects after creating batch from 2) Installment:
assign subject’s button. In Batch student, tab user can In installment user can create any number of
assign multiple students to single batch for separate installments and can schedule duration foe
subjects or for all subjects. After assigning students to that installment
ABSTRACT
This paper performs a comprehensive analysis of Vix Index data with Heikin Ashi Transformation of stock
index Neural Network Learning. It has been demonstrated that Heikin Ashi Transformation can improve the
learning effect of Neural Network and the effect can also be filter out if volume weights are also considered.
This paper introduces another improvement beside using volume-weighted data. Instead volatility index is used
as an input and its effect for neural network learning process is analyzed.
Keywords : Heikin Ashi Transformation, Vix Data, Neural Network, Stock Market Analysis, Time series
filtering
CSEIT195195 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 363-365 ]
363
Nishchal Sharma, Dr. Chaman Singh Chauahn Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 363-365
Some Researchers [2] have demonstrated the HA-Close = (Ocurrent + Hcurrent +Lcurrent+Ccurrent)/ 4
importance of availability of favorable methods for HA-Open = (HA-OpenPrev + HA-ClosePrev) / 2
finance managers and incorporating many systems HA-High = Maximum of the Hcurrent , HA-Open or HA-Close
for portfolio management. Such connection of HA-Low = Minimum of the LCurrent , HA-Open or HA-Close
selection of technology and company is vital [3] for a
finance driven system. Artificial Neural network has Using Vix Data:
been a very important learning system [4] and it has
provided a definite edge for it’s user. The effect of Vix is a volatility index and tracks volatility measured
neural network and genetic algorithm has been as per the options of stock index. Since the value of
researched [5] and found to be very effective. Neural Vix may very between some fraction value, it is
network for trend determination [6] and optimized converted between [0,1.0] using inversion.
neural network [7] are a few key methods to work
with. Many researchers have incorporated hybrid A 2 hidden layer ANN is used with configuration
models [8] and had early success. Generating buy and 5,6,3,1. The choice of structure of ANN is quite
sell signal using deep neural network [9] as well as a subjective. This setup given relatively stable results.
self organizing rule based system [10] perform very Again test data is converted into 2 sets. One is for
well. Effect and result of ANN on NASDAQ learning and other for test results.
Composite [11] and results are inline with
expectations. III. RESULTS AND DISCUSSION
II. METHODS AND MATERIAL A Plot of Prediction by ANN and its original value
provides us with an absolute error. This absolute
Heikin-Ashi is widely used in candlestick charts. In error is plotted against Vix data and results are
Japanese, Heikin means “average” and “Ashi” means compared.
“pace”. Since it is based on candlestick patterns. We
give a brief intro to candlesticks. A candlestick Mean Average Error 11.87130668
Mean error when Vix is above 19 14.00708243
describes trade information of a given time period.
Mean Error when Vix is below 16 8.658732212
Every candlestick has 4 values Open, High, Low and
Close. These values represent the value at which
stock or index candle opened, highest value of stock,
lowest value of stock and closing value of the stock in
that time period. Heikin-Ashi transforms these 4
values using following formulas to create new
candlesticks. New Candlestick produces simpler and
smoother candlestick for analysis.
Transformation rules:
Let Ocurrent, Hcurrent , Lcurrent, Ccurrent represents current
open, high, low, close values.
Let OPrev, HPrev, LPrev, CPrev represents Previous
day/period open, high, low, close values. These results clearly show an increase in error rate
Then Heikin-Ashi values (HA) are calculated as:-
when Vix is High. A vix above 19 causes a spike in [8]. "A hybrid stock trading framework integrating
error rate. Also a lower level of vix causes low error technical analysis with machine learning
rate. However variation in lower level of vix is not techniques - ScienceDirect."
linear with the error rate. This phenomenon can’t be [9]. "A Deep Neural-Network Based Stock Trading
explained and a further study might be needed. System Based on Evolutionary Optimized
Technical Analysis Parameters - ScienceDirect."
IV.CONCLUSION [10]. "Establishing Rules for Self-Organizing
Systems-of-Systems - ScienceDirect."
[11]. "Stock market index prediction using artificial
It is clear that Vix data may be an indication of
neural network - ScienceDirect."
volatility of underlying system and the noise may
increase during high period of volatility which affect
the learning capability of ANN but it is also clear that Cite this article as :
there is a still a disconnect between vix and stock
market movement and a further research might be Nishchal Sharma, Dr. Chaman Singh Chauhan,
needed. "Heikin-Ashi Transformation and Vix Index data for
Stock Market Index Prediction and It's Effects ",
V. REFERENCES International Journal of Scientific Research in
Computer Science, Engineering and Information
[1]. "Stock Market Volatility and Learning - ADAM Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
5 Issue 1, pp. 363-365, January-February 2019.
- 2016 - The Journal of Finance - Wiley Online
Available at doi :
Library."
https://doi.org/10.32628/CSEIT195195
[2]. "Data | Free Full-Text | Current Core Journal URL : http://ijsrcseit.com/CSEIT195195
Competencies Trend of Small to Medium
Enterprises (SMEs) in China—A Concurrent
Comprehensive Evaluation and Active Learning
Study of Newly Listed Chinese Stocks from
2015 through 2017."
[3]. "The contribution of technology selection to
core competencies - ScienceDirect."
[4]. "Using artificial neural network models in stock
market index prediction - ScienceDirect."
[5]. "Application of artificial neural network for the
prediction of stock market returns: The case of
the Japanese stock market - ScienceDirect."
[6]. "Predicting stock and stock price index
movement using Trend Deterministic Data
Preparation and machine learning techniques -
ScienceDirect."
[7]. "Predicting the Direction of Stock Market
Index Movement Using an Optimized Artificial
Neural Network Model."
The Internet of Things (IoT) is turning into the following Internet-related transformation. It enables billions of
gadgets to be associated and speak with one another to share data that enhances the nature of our day-by-day
lives. Then again, Cloud Computing gives on-request, helpful and versatile system get to which makes it
conceivable to share computing assets, without a doubt, this, thus, empowers dynamic information integration
from different information sources. There are numerous issues hindering the fruitful implementation of both
Cloud and IoT. The integration of Cloud Computing with the IoT is the best path on which to defeat these
issues. The huge number of assets accessible on the Cloud can be greatly helpful for the IoT, while the Cloud
can acquire attention to enhance its impediments with true protests in a more powerful and dispersed way. This
paper gives to the various factors that affect the integration of the Cloud into the IoT by featuring the
integration advantages and implementation challenges. This paper mainly focus on a study which was
conducted on various IT and business leaders.
Keywords : Cloud, IoT, CIO, SLA, QoS
CSEIT195185 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 366-396 ]
366
Jipson George Thoomkuzhy, Dr. Mohammed Nazeh. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 366-396
will play out its typical farthest point concerning a like way identified with fearless quality: an
given time distribution under a given strategy of organization that is on 24x7 yet goes continually
conditions. A cloud will be more dependable on the isolated is futile. As cloud organizations and
off chance that it is more denounce tolerant and applications wind up being even more amazing and
more adaptable to propelling conditions. It is difficult more dependent on the covered cloud mastermind, it
to have a cloud that is totally free from sorrows or twists up continuously hard rapidly perceiving and
dissatisfaction safe [Garrison, 2012]. Different kinds managing issues. Weights can ascend out of an
of dissatisfactions are interleaved in the passed on individual organization, and furthermore from the
computing condition, for example, flood bafflement, collaboration of various parts and mechanized
timeout dissatisfaction, asset missing dissatisfaction, structures over spread frameworks and server farms,
coordinate dissatisfaction, equipment dissatisfaction, acknowledging issues that set aside a long
programming frustration, and database opportunity to be settled.
disillusionment.
c. Scalability:
The boundless idea of cloud computing is Lee and Kim showed programming centred
uncommonly fundamental yet hard to isolate on the procedures for ensuring the high versatility of
grounds that cloud computing is comprised of the administrations in Cloud Computing. [Lee and Kim,
blend of different factors, for example, wide-zone 2006] High flexibility under high administration
frameworks, heterogeneous programming/adapt parts, loads seeks nothing out of pocket; it very well may be
and so on. There are different confused trades among ensured by grasping some versatility confirmation
the various parts of cloud computing. Thusly, the designs. The most broadly perceived conventional
standard quality models that are depicted for arrangement is to simply incorporate the required
unadulterated programming/outfit or regular resources. Nevertheless, as they propose in the paper,
frameworks cannot be connected with the surveying diverse plans can ensure high adaptability or
of cloud unwavering quality [Pocatine, 2010]. The adaptability.
downtime of the cloud server develop negatively
affects the cloud advantage enduring quality. There is always some cost drew in with running
Surveying and re-designing undeterred quality in versatility ensuring plans, for instance, the expense of
coursed computing is not so much direct errand. additional CPU and memory. The adaptability
Notwithstanding these, two or three contraptions are expanded through such plans should be with respect
utilized to overview and overhaul the cloud to the expense of applying the plans. That is, cost-
advantage consistency. reasonability should be considered in ensuring
flexibility. Administrations should give the level of
b) Availability the esteem decided in their SLAs. Administrations
High transparency is, at last, the colossal vessel of the with palatable flexibility should not to encounter the
cloud. It encapsulates the probability of wherever evil impacts of significant degradation of QoS.
and at whatever direct access toward organizations, Adaptability affirmation designs should ensure that
mechanical congregations, and information and is the administrations satisfy the confinements of meeting
connecting with the effect of dreams of a future with the immaterial edge of their QoS properties
organizations with no physical workplaces, generally [Collinchau, 2013]. From this, two convincing
speaking organizations with totally arranged and programming centreed plans can be resolved:
joined IT frameworks. Transparency or openness is in advantage replication and administration
data remains the commitment of the data a cloud setting, this test is befuddled by the circled
proprietor/outsourcer and scattered computing thought of fogs and the possible nonattendance of
professional organizations are not plainly subject for supporter care over where data is secured and who
data misfortune or fines or other lawful. Like PC has or can approach.
security programs, cloud security consolidates a
practically identical general concern. Data Framework Integrity: the cloud requires security
orchestrated in an open cloud and applications against deliberate subversion or mischief of the value
running in an open cloud may encounter specific of a cloud. Inside a cloud, there are accomplices:
security exposures than would be the situation in an endorsers, providers, and a combination of chiefs.
on region energized condition. The capacity to fragment get to rights to each one of
these social occasions, while monitoring harmful
Right when an association purchases into a cloud, attacks, is a key normal for keeping up cloud
each one of the data created and arranged will reliability. In a cloud setting, any nonappearance of
physically abide in premises had and worked by a porousness into a cloud's frameworks makes it more
provider. In this extraordinary situation, the troublesome for endorsers of checking the
fundamental issue is whether a supporter can obtain uprightness of cloud-encouraged applications. Cloud
an attestation that a provider is executing the computing administrations use the Internet as a
equivalent or proportionate controls as for what the transmission medium and change data development
endorser would have completed. The going with resources into administrations for end-customers,
issues develop when an endorser is endeavoring to including programming administrations, figuring
ensure scope for these controls: Compliance stage administrations, change organize
necessities, regarding data that an endorser is a administrations, and crucial structure leasing.
significance to move to a cloud, may call for specific
levels and granularities of audit logging, the time of Vaquero and Lindner prescribed that cloud
cautions, activity declaring, and data support. For computing could be described as the joining of virtual
encryption of data still, the quality of the encryption resources according to customer necessities,
figuring suite, the key administration plots a provider adaptably solidifying resources including hardware,
reinforces, and the number of keys for each datum change stages, and diverse applications to make
proprietor (individual or shared keys) should be administrations [Faisal, 2011]. The novel features of
known by the data proprietors. Data arranged in an cloud computing join the capacity of customer data in
open cloud and applications running in an open the cloud and the nonattendance of any prerequisite
cloud may experience particular security exposures for programming foundation on the client side. For
than would be the circumstance in an on-area whatever timeframe that the customer can interface
encouraged condition. with the Internet, most of the gear resources in the
cloud can be used as a client-side structure. When in
Data Privacy: Security watches out for the protection doubt, cloud-computing applications ask for driven,
of data for specific components, for instance, giving distinctive administrations as demonstrated by
endorsers or others whose data is taken care of in a customer requirements, and expert communities
structure. Assurance passes on authentic and chance charge by metered time, instances of usage, or
concerns and should be viewed as a particular test portrayed period.
and also a legal and good concern. Guaranteeing
insurance in any handling system is a specific test; in
The use of passwords as an affirmation strategy is in a remote server requires a costly expense of
even more outstanding to general customers, yet transmission and capacity. To alleviate the expense of
messages sent by the customer are weak against the transmission and capacity, it is required to partition
covert record by software engineers who might then IoT data into two sorts of data; one is put away in
have the capacity to use the data in the message to edge systems and the other is put away in cloud
sign into the administration as the customer. systems. The impact of Edge computing is uncovered
with the treatment of IoT data in edge systems.
Additionally, the One-Time Password (OTP)
approval system fluctuates from a great many people As of not long ago, most system hardware, for
gatherings' beginning of a secret word. By far, most example, switches, passages, and switches simply
grasp a mystery word to be a watchword picked by forward data conveyed from other system gadgets,
the customer to be critical and can be used repeatedly. not to peruse the substance or change them. In light
The complement of OTP, in any case, is the single- of end-to-end communication, data is recognized and
use nature of the mystery key. In the wake of getting continue at a last relating hub. This is a common use
affirmation from the customer, the structure side of cloud computing a customer service
must make an ensured transmission channel to communication. Be that as it may, in the IoT
exchange data with the customer. The Secure environment, some IoT data will be exchanged to a
Attachments Layer (SSL) is a run of the mill strategy cloud system and some IoT data will be conveyed to
for building secure channels, primarily using RSA an edge hub/haze hub. The primary purpose behind
encryption to transmit the secret keys required for this partition is to give constant preparing and
the opposite sides to encode and unravel data security upgrade. Despite the fact that there are
transmitted between them [Zheng, 2009]. Consistent numerous new advancements to diminish the
methodologies for guaranteeing customer data join postpone time and transmission time, it is difficult to
encryption going before a capacity, customer ensure ongoing handling. The commonplace utilize
approval strategies before capacity or recuperation, instance of this necessity is the Industrial Internet
and building secure channels for data transmission. and savvy processing plant. What's more, despite the
These security systems commonly require fact that, there are control capacities to give security,
cryptography figurings and propelled stamp the more fundamental decision is that not to uncover
techniques, as illuminated underneath. Ordinary data the private data to open systems. On the off chance
encryption systems fuse symmetric and Hilter kilter that we separate IoT data into private data and non-
cryptography computations. private data and keep private data inside an edge
organize, not to uncover them in an open system, it
e) Capacity will diminish numerous feeble purposes of security.
As huge IoT sensors, IoT actuators, and IoT gadgets
are associated with the Internet, IoT data volume In the event that we consider new difficulties of IoT
from these things are required to increment administrations, the enormous volume of IoT data, as
dangerously. Also, it is normal that a significant well as the gigantic number of IoT things, can be a
number of these high volumes of IoT data are created basic issue. Despite the fact that we recognize this
and additionally devoured inside edge systems, not to future issue, Internet design initially has the capacity
navigate through cloud systems. As of recently, of scalability and it will alleviate the scalability issue
primarily IoT data produced IoT things are moved in the IoT environment. In any case, we can't assess
and gathered in a remote server and to store IoT data the quantity of IoT things later on and we can't
ensure the Internet engineering still manage the interviewees avowed that execution issues are caused
scalability issue in the IoT environment. Edge generally by the low web association the adopters
computing will isolate the scalability area into edge have in there. In like way, little organizations should
systems and outside system (e.g., cloud systems) and ensure to have a snappy Web association which
this partition of scalability space can give a more would reduce inaction (Marston et al., 2011). As
effective approach to handle the enormous number of demonstrated by Thurman (2008), execution is one of
IoT things. Since Edge computing can deal with IoT the troubles of cloud advancement execution
data in an edge zone and store the IoT data in an contiguous data security, data affirmation, and
edge/haze hub, and continue IoT data on the off availability. There are challenges in grasping
chance that it is required, it can likewise isolate the conveyed computing advancement. Key execution
administration area into two sections. Edge obstacles are application quality (i.e. application
Computing can focus on the administration of IoT execution likewise, versatility), application faithful
things in an edge zone and collaborate with the quality (i.e. persevering administrations) and data
administration of other outside systems. security and insurance concern (i.e. illegitimate
access of organization data, security bursts) (Benlien
f) Throughput et al., 2009). In this manner, execution is a factor for
Throughput implies the execution of errands by a organizations who wish to get Cloud courses of
figuring administration or contraption over a specific action and use them capably.
period. It checks the proportion of completed clash
with time exhausted and may be used to evaluate the g) Lower costs
execution of a processor, memory and also In cloud computing, setting up an organization as a
framework trades. Throughput was considered to utility, and giving figuring as an organization to
evaluate the benefit of PC processors. This was, clients is a piece of the real work. One of the
generally, registered with respect to bunch beguiling and fundamental cost issues in cloud
occupations or assignments consistently and computing is the capacity to pay for the favorable
countless consistently. A couple of backups measure a position, in the viewpoint of necessities, keeping
structure's general throughput by evaluating the total away from the significant costs for PC frameworks
and unusualness of work, the number of synchronous purchases (Armbrust, 2009). Consequently, cost
customers and application/system responsiveness. sufficiency is another basic factor bearing
Additionally, for arranging trades, throughput is organizations should note while tolerating spread
evaluated by discovering the proportion of data computing. The organizations of today dependably
traded between zones in the midst of a foreordained filter for approaches to manage cut expense or
period, overall occurring as bits consistently (bps), additional cash. Organizations need to spend a critical
which has created to bytes consistently (Bps), piece of their wage on the IT foundation, while
kilobytes consistently (Kbps), megabytes consistently under 10% of their servers can be incredibly used,
(Mbps) and gigabytes consistently (Gbps). accomplishing an essential maltreatment of cash. Also,
these servers should be supplanted respectably at
The physical zone of the data can influence the standard intervals and ought to be kept up and
execution of the system if it is arranged in another bit administrated; expanding its aggregate cost practices
of the world. In this way, Cloud plans may significantly (Marston et al., 2011). Cost perfect
comprehend the postponement in the administration conditions are the most grounded driver influencing
(Kim et al., 2009). Concurring the result consider the
IT chiefs' impression of SaaS openings (Benlian et. al, Organizations can in like manner immensely
2011). diminish their help costs (Miller, 2009). This implies
both gear and programming upkeep.
Above all, cloud computing enables organizations to
decrease their gear costs (Miller, 2009). While using According to Miller (2009 p. 26), organizations are
cloud administrations, organizations never again "never again compelled to what a singular work
require intense and high-evaluated PCs to run region PC can do" and now can "perform
applications inside the cloud. This starts with the supercomputing – like assignments utilizing the
lessened requirements for a dealing with power and vitality of countless and servers." Thus they can
storage space (Miller, 2009). Not in any way like perform more conspicuous errands and augmentation
standard programming, for running cloud has by and large their benefit and capability. On the
applications had PCs required less memory. They other hand, from a provider`s perspective, the basic
moreover can be with minimal hard plates in light of cash sparing favorable circumstances for the vendors
the way that there isn't foundation programming. are the foreseen employments and the more broad
Therefore, organizations can diminish costs by customer base (Goncalves and Ballon, 2011).
procuring lower-esteemed PCs. Since using cloud Disseminated computing cuts down legitimate
computing, organizations don't have to do high expenses and empowers an association to offload
interests in the IT system. This especially concerns three sorts of organization (Rosenthal et al., 2009).
the greater organizations (Miller, 2009). Instead of
putting a colossal proportion of trade out an extensive III. SURVEY AND TOOLS USED FOR THE SURVEY
number of extreme servers, the IT divisions of those
organizations can use the cloud` figuring vitality to The survey was conducted using online methods. The
supplant or improve the internal preparing resources. survey attempted to explore the major challenges
Plant administrator (2009) states, as Armbrust at al. faced by CIOs in cloud computing and IoT based
(2009), that organizations don't have to manage the organizations from various industries. This study was
zeniths and the nonpeak times in figuring power asks conducted on IT and business leaders/professionals
for any more drawn out by getting new equipment, from various countries across the globe. A sample size
the apex figuring demands are dealt with by cloud of 405 was used for this survey. Since the target
servers. Cloud computing furthermore prompts cut population is unknown the baseline was of 385 has to
down programming costs. be maintained. The sample size of 405 was used in
order to have an effective result after excluding the
Organizations never again need to buy disconnect errors. A website named e-mailmeform.com was used
programming packs for each PC (Miller, 2009). Or to create an online survey. It is a paid services based
maybe, a particular application is gotten to simply by portal which provides survey setup services. This has
the laborers using that application. Moreover, this in security features like one response from one
like manner infers saved the expense of presenting computer and one response from one IP address.
and keeping up that item on each PC. Another item These sort of security features would help to avoid
related cash sparing preferred standpoint is that duplicate submissions resulting in improved quality
organizations don't have to pay for an item refresh in responses. A total of 40 questions were asked to the
order to have the latest variations of the applications respondents and the results were captured and
(Miller, 2009). As all applications are in the cloud, correlated using the IBM SPSS statistical tool.
they are redesigned thusly by the provider.
Fig 3 : Education
Fig 9.
Fig 13
Fig 17
Fig 15
Fig 21
Fig 19
As showed in the data computed above, exactly 79
As showed in the data computed above, exactly 96 respondents out of the total number of people who
respondents out of the total number of people who responded, which is 405 in number, strongly agreed
responded, which is 405 in number, strongly agreed with the fact stating CIO should be able to answer
with the fact stating CIO should be able to answer how an IT solution is beneficial to the company.
how an IT solution is beneficial to the company. Following this wise, a whopping number of 209
Following this wise, a whopping number of 201 respondents, representing 51.6 percent of the total
respondents, representing 51.9 percent of the total respondents also did agree though not strongly with
respondents also did agree though not strongly with the fact stated above. Meanwhile, very few
the fact stated above. Meanwhile, very few respondents, about 31 in number and accounting for
respondents, about 18 in number and accounting for 7.7 percent of the total respondents, disagreed that as
4.4 percent of the total respondents, disagreed that as a CIO, the cloud/ IoT platform is up and working at
a CIO, we have taken enough measures to backup all the times. Only five of these respondents who
and store data to be easily retrieved during disagreed, strongly expressed their own disagreement
emergencies. Only five of these respondents who while about 81 of the remainder participants went
disagreed, strongly expressed their own disagreement neutral and indeterminate on the matter.
while about 76 of the remainder participants went
neutral and indeterminate on the matter.
Fig 23
As showed in the data computed above, exactly 98 Fig 25
respondents out of the total number of people who
responded, which is 405 in number, strongly agreed As showed in the data computed above, exactly 84
with the fact stating CIO should be able to answer respondents out of the total number of people who
how an IT solution is beneficial to the company. responded, which is 405 in number, strongly agreed
Following this wise, a whopping number of 192 with the fact stating CIO should be able to answer
respondents, representing 47.4 percent of the total how an IT solution is beneficial to the company.
respondents also did agree though not strongly with Following this wise, a whopping number of 213
the fact stated above. Meanwhile, very few respondents, representing 51.6 percent of the total
respondents, about19 in number and accounting for respondents also did agree though not strongly with
4.7 percent of the total respondents, disagreed that as the fact stated above. Meanwhile, very few
a CIO, Our cloud platform experiences minimum respondents, about 11 in number and accounting for
downtime. Only four of these respondents who 2.7 percent of the total respondents, disagreed that as
disagreed, strongly expressed their own disagreement a CIO, our cloud and IoT platforms are prepared to
while about 92 of the remainder participants went withstand server failures. Only two of these
neutral and indeterminate on the matter. respondents who disagreed, strongly expressed their
own disagreement while about 95 of the remainder
participants went neutral and indeterminate on the
matter.
Fig 29:
Fig 30b
Fig 32
Fig 31: Our cloud and IoT platform does not collapse
Fig 33: We keep making improvements to the IoT
or slow down while being used by multiple users
and cloud platform to ensure higher scalability
Fig 34 Fig 36
In accordance with the computed data computed in In accordance with the computed data computed in
Fig.33 and 34, the number of people who responded Fig.35 and 36, the number of people who responded
to the notion stating that as CIOs We keep making to the notion stating that as CIOs our systems can
improvements to the IoT and cloud platform to handle multiple application requests arising at the
ensure higher scalability, was 405. About 112 of these same time, was 405. About 104 of these respondents
respondents representing 27.7 percent of the total representing 25.7 percent of the total respondents
respondents strongly agreed with this notion, while strongly agreed with this notion, while 213
203 respondents accounting for a whopping 50.1 respondents accounting for a whopping 52.6 percent
percent of the total respondents did agree but not of the total respondents did agree but not strongly
strongly with this notion. However, a few number of with this notion. However, a few number of
respondents, not more than eleven in number did respondents, not more than eleven in number did
disagree with the notion, with about 79 respondents disagree with the notion, with only two more
representing 19.5 percent of the total respondents respondent strongly disagreeing. About 75
were neutral as concerns this notion respondents representing 17.5 percent of the total
respondents were neutral as concerns this notion
Fig 40
Fig 38 In accordance with the computed data computed in
Fig.39 and 40, the number of people who responded
In accordance with the computed data computed in to the notion stating that as CIOs We have adequate
Fig.37 and 38, the number of people who responded safeguards for different interconnected devices to
to the notion stating that as CIOs Our cloud and IoT avoid data theft or breach of privacy, was 405. About
platforms have been designed to match up with the 139 of these respondents representing 34.3 percent of
changing business objectives, was 405. About 102 of the total respondents strongly agreed with this notion,
these respondents representing 25.2 percent of the while 182 respondents accounting for a whopping
total respondents strongly agreed with this notion, 44.9 percent of the total respondents did agree but
while 202 respondents accounting for a whopping not strongly with this notion. However a few number
49.9 percent of the total respondents did agree but of respondents, not more than 9 in number did
not strongly with this notion. However, a few disagree with the notion, with only three more
number of respondents, not more than thirteen in respondent strongly disagreeing. About 72
number did disagree with the notion, with only four respondents representing 17.8 percent of the total
more respondent strongly disagreeing. About 84 respondents were neutral as concerns this notion
respondents representing 20.7 percent of the total
respondents were neutral as concerns this notion
In accord to the data computed in Fig.41 and 42a, the In accord to the data computed in Fig.42b and 43, the
number of people who responded to the notion number of people who responded to the notion
stating that as CIOs We have adequate safeguards for stating that as CIOs We constantly monitor our cloud
different interconnected devices to avoid data theft and IoT platforms to identify potential security
or breach of privacy, was 405. About 116 of these threats, was 405. About 121 of these respondents
respondents representing 28.6 percent of the total representing 29.9 percent of the total respondents
respondents strongly agreed with this notion, while strongly agreed with this notion, while 185
176 respondents accounting for a whopping 43.5 respondents accounting for a whopping 45.7 percent
percent of the total respondents did agree but not of the total respondents did agree but not strongly
strongly with this notion. However, a few number of with this notion. However, a few number of
respondents, not more than 10 in number did respondents, not more than 16 in number did
disagree with the notion, with only three more disagree with the notion, with only three more
respondent strongly disagreeing. About 100 respondent strongly disagreeing. About 80
respondents representing 24.7 percent of the total respondents representing 22.0 percent of the total
respondents were neutral as concerns this notion respondents were neutral as concerns this notion.
Fig 47
Fig 45
In accord to the data computed in Fig.46 and 47, the
In accord to the data computed in Fig.44 and 45, the number of people who responded to the notion
number of people who responded to the notion stating that as CIOs Our cloud and IoT platforms are
stating that as CIOs We regularly update and improve designed to make optimal use of existing resources,
our data safety mechanisms to counter novel means was 405. About 116 of these respondents representing
of breach to network security, was 405. About 114 of 28.6 percent of the total respondents strongly agreed
these respondents representing 28.1 percent of the with this notion, while 202 respondents accounting
total respondents strongly agreed with this notion, for a whopping 49.9 percent of the total respondents
while 190 respondents accounting for a whopping did agree but not strongly with this notion. However,
46.9 percent of the total respondents did agree but a few number of respondents, not more than 7 in
not strongly with this notion. However, a few number did disagree with the notion, with only one
number of respondents, not more than ten in number more respondent strongly disagreeing. About 79
did disagree with the notion, with only two more respondents representing 19.5 percent of the total
respondent strongly disagreeing. About 89 respondents were neutral as concerns this notion.
respondents representing 22.0 percent of the total
respondents were neutral as concerns this notion.
Fig 4 Fig 51
In accord to the data computed in Fig.48 and 49, the In accord to the data computed in Fig.50 and 51, the
number of people who responded to the notion number of people who responded to the notion
stating that as CIOs We constantly track the stating that as CIOs We undertake capacity planning
resources used up by our cloud and IoT products and much before the implementation of cloud and IoT
take steps to minimize resource loss, was 405. About based technologies, was 405. About 105 of these
104 of these respondents representing 25.7 percent of respondents representing 25.9 percent of the total
the total respondents strongly agreed with this notion, respondents strongly agreed with this notion, while
while 203 respondents accounting for a whopping 203 respondents accounting for a whopping 50.1
50.1 percent of the total respondents did agree but percent of the total respondents did agree but not
not strongly with this notion. However, a few strongly with this notion. However, a few number of
number of respondents, not more than 12 in number respondents, not more than 10 in number did
did disagree with the notion, with only four more disagree with the notion, with only a single more
respondent strongly disagreeing. About 82 respondent strongly disagreeing. About 86
respondents representing 20.2 percent of the total respondents representing 21.2 percent of the total
respondents were neutral as concerns this notion. respondents were neutral as concerns this notion.
Fig 50: We undertake capacity planning much before Fig 52: We are constantly innovating means to reduce
the implementation of cloud and IoT based resource use and improve productivity
technologies
Fig 55
Fig 57 Fig 59
In congruence to the data computed in Fig.56 and 57, In congruence to the data computed in Fig.58 and 59,
the number of people who responded to the notion the number of people who responded to the notion
stating that as CIOs We allocate only required stating that as CIOs our cloud and IoT based
resources to cloud or IoT platforms to avoid losses, applications can process maximum tasks in a given
was 405. About 99 of these respondents representing unit of time, was 405. About 105 of these respondents
24.4 percent of the total respondents strongly agreed representing 25.9 percent of the total respondents
with this notion, while 205 respondents accounting strongly agreed with this notion, while 192
for a whopping 50.6 percent of the total respondents respondents accounting for a whopping 47.4 percent
did agree but not strongly with this notion. However, of the total respondents did agree but not strongly
a few number of respondents, not more than 13 in with this notion. However, a few number of
number did disagree with the notion, with only one respondents, not more than 13 in number did
more respondent strongly disagreeing. About 87 disagree with the notion, with only two more
respondents representing 21.5 percent of the total respondent strongly disagreeing. About 93
respondents were neutral as concerns this notion. respondents representing 23.0 percent of the total
respondents were neutral as concerns this notion.
Fig 61 Fig 63
In congruence to the data computed in Fig.60 and 61, In congruence to the data computed in Fig.62 and 63,
the number of people who responded to the notion the number of people who responded to the notion
stating that as CIOs We make sure we respond to the stating that as CIOs We do our best to achieve
requests of every user within minimum possible time, maximum transactions per second, was 405. About
was 405. About 107 of these respondents representing 112 of these respondents representing 27.7 percent of
26.4 percent of the total respondents strongly agreed the total respondents strongly agreed with this notion,
with this notion, while 199 respondents accounting while 193 respondents accounting for a whopping
for a whopping 49.1 percent of the total respondents 47.7 percent of the total respondents did agree but
did agree but not strongly with this notion. However, not strongly with this notion. However, a few
a few number of respondents, not more than 11 in number of respondents, not more than 11 in number
number did disagree with the notion, with only five did disagree with the notion, with only two more
more respondent strongly disagreeing. About 83 respondent strongly disagreeing. About 87
respondents representing 20.5 percent of the total respondents representing 21.5 percent of the total
respondents were neutral as concerns this notion. respondents were neutral as concerns this notion.
Fig 64b
Fig 66
In congruence to the data computed in Fig.64 and
64b, the number of people who responded to the In congruence to the data computed in Fig.65 and 66,
notion stating that as CIOs our throughput has been the number of people who responded to the notion
consistently improving over the years, was 405. stating that as CIOs We are constantly on the lookout
About 107 of these respondents representing 26.4 for new mechanisms to improve our throughput, was
percent of the total respondents strongly agreed with 405. About 109 of these respondents representing
this notion, while 197 respondents accounting for a 26.9 percent of the total respondents strongly agreed
whopping 48.6 percent of the total respondents did with this notion, while 198 respondents accounting
agree but not strongly with this notion. However, a for a whopping 48.9 percent of the total respondents
few number of respondents, not more than 13 in did agree but not strongly with this notion. However,
number did disagree with the notion, with only three a few number of respondents, not more than 12 in
more respondent strongly disagreeing. About 85 number did disagree with the notion, with only a
respondents representing 21.0 percent of the total single more respondent strongly disagreeing. About
respondents were neutral as concerns this notion. 85 respondents representing 21.0 percent of the total
respondents were neutral as concerns this notion.
d. Lower Costs
Fig 68 Fig 70
In congruence to the data computed in Fig.67 and 68, In congruence to the data computed in Fig.69 and 70,
the number of people who responded to the notion the number of people who responded to the notion
stating that as CIOs our cloud and IoT platforms offer stating that As cloud based programs can be accessed
integrated data storage solutions, hereby helping anywhere, it saves logistics and data transfer costs,
reduce data storage costs, was 405. About 99 of these was 405. About 109 of these respondents representing
respondents representing 24.4 percent of the total 26.9 percent of the total respondents strongly agreed
respondents strongly agreed with this notion, while with this notion, while 195 respondents accounting
204 respondents accounting for a whopping 50.4 for a whopping 48.1 percent of the total respondents
percent of the total respondents did agree but not did agree but not strongly with this notion. However,
strongly with this notion. However, a few number of a few number of respondents, not more than 12 in
respondents, not more than 14 in number did number did disagree with the notion, with about 5
disagree with the notion, with about 3 more more respondent strongly disagreeing. About 84
respondent strongly disagreeing. About 85 respondents representing 20.7 percent of the total
respondents representing 21.0 percent of the total respondents were neutral as concerns this notion.
respondents were neutral as concerns this notion.
Fig 72 Fig 74
In congruence to the data computed in Fig.71 and 72, In congruence to the data computed in Fig.73 and
the number of people who responded to the notion 764, the number of people who responded to the
stating As our cloud and IoT technologies can be notion stating that Cloud and IoT based technologies
expanded for large number of users, the cost of in reduction of server maintenance, power and other
additional infrastructure is saved, was 405. About 115 costs, was 405. About 106 of these respondents
of these respondents representing 28.4 percent of the representing 26.2 percent of the total respondents
total respondents strongly agreed with this notion, strongly agreed with this notion, while 189
while 191 respondents accounting for a whopping respondents accounting for a whopping 46.7 percent
47.2 percent of the total respondents did agree but of the total respondents did agree but not strongly
not strongly with this notion. However, a few with this notion. However, a few number of
number of respondents, not more than 19 in number respondents, not more than 16 in number did
did disagree with the notion, with about 4 more disagree with the notion, with about 6 more
respondent strongly disagreeing. About 76 respondent strongly disagreeing. About 88
respondents representing 18.8 percent of the total respondents representing 21.7 percent of the total
respondents were neutral as concerns this notion. respondents were neutral as concerns this notion.
Fig 73: Cloud and IoT based technologies in reduction Fig 75: Cloud based data backup saves the cost of
of server maintenance, power and other costs retrieving lost data during system crashes or natural
calamities
The results shows that the new role of the CIO has
resulted in successful implementation of cloud and
IoT based technologies. The study also states that the
Fig 76
most of the companies cloud and IoT platforms has
less chance of failure and they are set up in such a
In congruence to the data computed in Fig.75 and 76,
way that they have adequate methods for recovery.
the number of people who responded to the notion
To have the best availability and reliability most of
stating that Cloud based data backup saves the cost of
the cloud infrastructures are using effective tools to
retrieving lost data during system crashes or natural
address the issues which can give higher confidence
calamities, was 405. About 117 of these respondents
rate to the cloud adopters. The confirmation from IT
representing 28.9 percent of the total respondents
and business leaders states that they have taken the
strongly agreed with this notion, while 188
necessary measure to backup and store data to be
respondents accounting for a whopping 46.4 percent
easily retrieved during emergencies. The results
of the total respondents did agree but not strongly
shows that the availability of the cloud is high with
with this notion. However, a few number of
minimal downtime and server failures. The
respondents, not more than 14 in number did
infrastructure is designed with enough redundancy so
disagree with the notion and about 83 respondents
that resiliency is achieved in case of failures. The
representing 20.5 percent of the total respondents
automated backup mechanisms are helping the
were neutral as concerns this notion.
organizations from any data loss.
that any change in the business environment can be Moreover, the result analysis unveiled that the
effectively addressed by the cloud infrastructures. overall experience and/or exposure, and the industry
This also gives a learning to the companies sector of one’s present organization plus his/her
implementing and adopting cloud to make sure that background education status goes a long way in the
they are doing the required business forecasting and successful implementation of Cloud-IoT based
planning for designing the cloud and IoT technologies. Also, it became obviously necessary
infrastructures. A poor planning in this area can that cloud-based data back-up saves the cost of
negatively affect the future business of any retrieving lost data during system crashes or any
organization. So the organizations has to give utmost natural calamity, as well as helps in the reduction of
importance to match up with the environmental server maintenance, power and other costs. It is
changes in the business. The organizations are important that as cloud & IoT technologies are being
concerned about the security of their infrastructures expanded to be accessible by large number of users,
and they are doing the best possible measures to the cost of all additional infrastructures is being
safeguard their infrastructure. The organizations are saved. The results also reveals that as cloud-based
constantly monitoring their cloud and IoT platforms programs are being accessed anywhere, it saves
to identify any potential security threats that would logistics and data transfer costs much more
impact their business. From this study it gives a importantly. It proved that cloud & IoT platforms
reference that there is huge scope for research in offer integrated data storage solutions, thereby
scalability and security aspects of the cloud and IoT. helping to reduce data storage costs in the
Assessing the scalability and security of cloud-IoT atmosphere of its successful implementation.
technologies, including its capacity, throughput and
additional lower costs, it is concluded that the In the same vein, as business leaders willing to
targeted successful implementation of cloud-IoT successfully implement and integrate cloud
based technologies will be very much easier to technologies, it is necessary to achieve maximum
accomplish by improving cloud throughputs transaction per seconds and respond to the requests
frequently by looking out for newer operating of each user within the shortest possible timeframe,
mechanisms. thus enhancing good customer satisfaction and
service. It is also quite important to allocate only the
The analysis of the capacity and throughput required resources to cloud-IoT based platforms to
parameters states that the organizations are showing avoid critical losses. As business and IT leaders, it
more interest in optimizing the existing resources. becomes essential to constantly innovate, thus
The organizations implementing the cloud and IoT improving productivity while minimising the use of
has to prepare a roadmap of the capacity well in scarce resources and eliminating unnecessary errors.
advance before the implementation of cloud and IoT. It is also essential to indulge in capacity planning and
A proper planning would help the organizations to tracking of the available resources. Furthermore, it
optimise the resources when the volume of will do the company good to update data-safety
transactions increases in the infrastructure. An mechanisms frequently, and checking any breach in
architects and designers also need to consider the network security or security threats, as a way of
chances of error rates and do the required resource enhancing optimal usage of resources, i.e, network
planning to avoid any losses. The results of this study security and data security. In addition, cloud
states that there is huge scope for research in the area technologies can multi-task in terms of application
of digital optimization. requests without slowing down, and it is built to
accommodate changing business objectives [3]. Pocatilu, P., Alecu, F., &Vetrici, M. (2010).
(flexibility). Measuring the efficiency of cloud computing
for e-learning systems. Wseas transactions on
The cloud-IoT platforms should be able to withstand
computers, 9(1), 42-51.
server failures, endure power outages, network
[4]. Deka Ganesh Chandra & Dutta Borah Malaya,
failures and any form of environmental damage one
(2012), Role of Cloud Computing in Education,
again. These and many more will surely enhance the
ICCEET, Pg: 832-836.
reliability, availability, scalability, security, capacity,
[5]. Dong, B., Zheng, Q., Qiao, M., Shu, J., & Yang,
throughput and cut operating costs of cloud-Iot based
J. (2009). BlueSky cloud framework: an e-
technologies in the quest of its successful
learning framework embracing cloud
implementation and integration. The execution was
computing. In Cloud Computing (pp. 577-582).
another issue that was recognized as a factor. The
Springer Berlin Heidelberg.
discoveries recommended it needs thought in light of
[6]. Faisal A. Alshuwaier, Abdullah A. Alshwaier,
the fact that receiving Cloud services could influence
Ali M. Areshey (2011), Applications of Cloud
the system execution and accessibility of the services
Computing in Education.
is outside of the business control. Likewise, security
[7]. Feng, D. G., Zhang, M., Zhang, Y., & Xu, Z.
was distinguished as the best mechanical test. The
(2011). Study on cloud computing security.
discoveries contradicted that by recommending that
Journal of Software, 22(1), 71-83.
substantial organizations have their very own
[8]. Fox, A., Griffith, R., Joseph, A., Katz, R.,
foundation that needs thought and it would be less
Konwinski, A., Lee, G., ... &Stoica, I. (2009).
demanding for little organizations to receive cloud
Above the clouds: A Berkeley view of cloud
services as a result of the moderately little set-up
computing. Dept. Electrical Eng. and Comput.
expense. Considering the constraints to the
Sciences, University of California, Berkeley,
exploration of this examination a proposal for further
Rep. UCB/EECS, 28, 13.
research can be made. With the end goal to address
[9]. Hailu, A. (2012). Factors influencing cloud-
these issues, a further research could be made
computing technology adoption in developing
utilizing a quantitative technique that could look at a
countries (Doctoral dissertation, Capella
bigger example of the populace.
University).
[10]. Chen, Y., & Kunz, T. (2016, April).
VI. REFERENCES
Performance evaluation of IoT protocols under
a constrained wireless access network. In
[1]. Iosup, A., Ostermann, S., Yigitbasi, M. N.,
Selected Topics in Mobile & Wireless
Prodan, R., Fahringer, T., &Epema, D. (2011).
Networking (MoWNeT), 2016 International
Performance analysis of cloud computing
Conference on (pp. 1-7). IEEE.
services for many-tasks scientific computing.
[11]. Collinchau. (2013, August 19). 7 performance
IEEE Transactions on Parallel and Distributed
metrics for measuring cloud ROI within HP
systems, 22(6), 931-945.
Cloud Management. Micro Focus. Retrieved 19
[2]. The cloud service industry’s 10 most critical
October 2018 from
metrics. Guiding Metrics. Retrieved 19
https://community.softwaregrp.com/t5/IT-
February 2018 from
Operations-Management-ITOM/7-
https://guidingmetrics.com/content/cloud-
performance-metrics-for-measuring-cloud-
services-industrys-10-most-critical-metrics
ROI-within-HP-Cloud/ba-
p/300699#.Wopi1INua01
[12]. Frey, S., Reich, C., &Lüthje, C. (2013,
September). Key performance indicators for
cloud computing SLAs. In The Fifth
International Conference on Emerging
Network Intelligence, EMERGING (pp. 60-64).
ABSTRACT
An agricultural mechanism or agri mechanism could be a mechanism deployed for agricultural functions. The
most space of application of robots in agriculture is seeding robots square measure designed to exchange human
labour. The agricultural business is behind alternative complementary industries in victimization robots as a
result of the kind of jobs concerned in agriculture are not any and dig. This project strives to develop a
mechanism capable of activity operations like automatic seeding and dig. It additionally provides manual
management once needed and keeps tabs on the wetness with the assistance of wetness sensors. Then main part
here is that the microcontroller that supervises the whole method.
Keywords : Agri Vehicle, GPS based Remote Controlled Robot, Zigbee, Raspberry Pi, Global Positioning
System, UART, LM35
I. INTRODUCTION environmental factors which in turns helps to
monitor the system. Monitoring environmental
Agriculture is considered as the basis of life for the factors is not enough and complete solution to
human species as it is the main source of food grains improve the yield of the crops. There are number of
and other raw materials. It plays vital role in the other factors that affect the productivity to great
growth of country’s economy. It also provides large extent. These factors include attack of insects and
ample employment opportunities to the people. pests which can be controlled by spraying the crop
Growth in agricultural sector is necessary for the with proper insecticide and pesticides. Secondly,
development of economic condition of the country. attack of wild animals and birds when the crop grows
Unfortunately, many farmers still use the traditional up. There is also possibility of thefts when crop is at
methods of farming which results in low yielding of the stage of harvesting. Even after harvesting, farmers
crops and fruits. But wherever automation had been also face problems in storage of harvested crop. So, in
implemented and human beings had been replaced order to provide solutions to all such problems, it is
by automatic machineries, the yield has been necessary to develop integrated system which will
improved. Hence there is need to implement modern take care of all factors affecting the productivity in
science and technology in the agriculture sector for every stages like; cultivation, harvesting and post
increasing the yield. Most of the papers signifies the harvesting storage. This paper therefore proposes a
use of wireless sensor network which collects the system which is useful in monitoring the field data as
data from different types of sensors and then send it well as controlling the field operations which
to main server using wireless protocol. The collected provides the flexibility. The paper aims at making
data provides the information about different agriculture smart using automation and IoT
CSEIT195177 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 397-403 ]
397
Juno Isabel Susinthra M, K. Gayadri Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 397-403
technologies. The highlighting features of this paper sensing and control irrigation system using
includes smart GPS based remote controlled robot to distributed wireless sensor network aiming for
perform tasks like; weeding, spraying, moisture variable rate irrigation, real time in field sensing,
sensing, bird and animal scaring, keeping vigilance, controlling of a site-specific precision linear move
etc. Secondly, it includes smart irrigation with smart irrigation system to maximize the productivity with
control based on real time field data. Thirdly, smart minimal use of water was developed by Y. Kim. The
warehouse management which includes temperature system described details about the design and
maintenance, humidity maintenance and theft instrumentation of variable rate irrigation, wireless
detection in the warehouse. Controlling of all these sensor network and real time in field sensing and
operations will be through any remote smart device control by using appropriate software. The whole
or computer connected to Internet and the operations system was developed using five in field sensor
will be performed by interfacing sensors, Wi-Fi or stations which collects the data and send it to the
ZigBee modules, camera and actuators with micro- base station using global positioning system (GPS)
controller and raspberry pi. where necessary action was taken for controlling
irrigation according to the database available with the
II. METHODS AND MATERIAL system. The system provides a promising low cost
wireless solution as well as remote controlling for
The newer scenario of decreasing water tables, drying precision irrigation. In the studies related to wireless
up of rivers and tanks, unpredictable environment sensor network, researchers measured soil related
present an urgent need of proper utilization of water. parameters such as temperature and humidity.
To cope up with this use of temperature and moisture Sensors were placed below the soil which
sensor at suitable locations for monitoring of crops is communicates with relay nodes by the use of
implemented in. An algorithm developed with effective communication protocol providing very low
threshold values of temperature and soil moisture can duty cycle and hence increasing the life time of soil
be programmed into a microcontroller-based gateway monitoring system. The system was developed using
to control water quantity. The system can be microcontroller, universal asynchronous receiver
powered by photovoltaic panels and can have a transmitter (UART) interface and sensors while the
duplex communication link based on a cellular- transmission was done by hourly sampling and
Internet interface that allows data inspection and buffering the data, transmit it and then checking the
irrigation scheduling to be programmed through a status messages. The drawbacks of the system were its
web page. The technological development in cost and deployment of sensor under the soil which
Wireless Sensor Networks made it possible to use in causes attenuation of radio frequency (RF) signals.
monitoring and control of greenhouse parameter in
precision agriculture. After the research in the III. RESULTS AND DISCUSSION
agricultural field, researchers found that the yield of
agriculture is decreasing day by day. However, use of
technology in the field of agriculture plays important
role in increasing the production as well as in
reducing the extra man power efforts. Some of the
research attempts are done for betterment of farmers
which provides the systems that use technologies Fig 1. System Overview
helpful for increasing the agricultural yield. A remote
In the present system, every node is integration with with AVR microcontroller. Motion detector will
different sensors and devices and they are detect the motion in the room when security mode
interconnected to one central server via wireless will be ON and on detection of motion, it will send
communication modules. The server sends and the alert signal to user via Raspberry pi and thus
receives information from user end using internet providing theft detection.
connectivity. There are two modes of operation of
the system; auto mode and manual mode. In auto
mode system takes its own decisions and controls the
installed devices whereas in manual mode user can
control the operations of system using android app or
PC commands.
Node 1:
Node1 is GPS based mobile robot which can be
controlled remotely using computer as well as it can
be programmed so as to navigate autonomously Fig 3.
within the boundary of field using the Co-ordinates Node 2
given by GPS module. Temperature sensor and Humidity sensor senses the
temperature and humidity respectively and if the
value crosses the threshold then room heater or
cooling fan will be switched ON/OFF automatically
providing temperature and humidity maintenance.
Node2 will also controls water pump depending upon
the soil moisture data sent by node3.
Node 3:
Node3 is a smart irrigation node with features like;
Smart control of water pump based on real time field
data i.e. automatically turning on/off the pump after
Fig 2. attaining the required soil moisture level in auto
Node 1 mode, switching water pump on/off remotely via
The Remote controlled robot have various sensors mobile or computer in manual mode, and continuous
and devices like camera, obstacle sensor, siren, cutter, monitoring of soil moisture.
sprayer and using them it will perform tasks like; Hardware used:
Keeping vigilance, Bird and animal scaring, Weeding, a) AVR Microcontroller At mega 16/32:
and Spraying The microcontroller used is, Low-power AVR® 8-bit
Node 2: Microcontroller, having 8K Bytes of In-System Self-
Node2 will be the warehouse. It consists of motion programmable Flash program memory,
detector, light sensor, humidity sensor, temperature Programmable Serial USART, 8-channel, 10-bit ADC,
sensor, room heater, cooling fan altogether interfaced 23 Programmable I/O Lines.
d) SinaProg:
SinaProg is a Hex downloader application with AVR
Dude and Fuse Bit Calculator. This is used to
download code/program and to set fuse bits of all
AVR based microcontrollers.
e) Raspbian Operating System:
Raspbian operating system is the free and open
source operating system which Debian based and
optimized for Raspberry Pi. It provides the basic set
of programs and utilities for operating Raspberry Pi.
Fig 4. It comes with around 35,000 packages which are pre-
In node3, moisture sensor transmits the data using compiled software that are bundled in a nice format
HT12E Encoder IC and a RF transmitter. The for hustle free installation on Raspberry Pi.It has
transmitted data is received by node2 and there it is good community of developers which runs the
processed by microcontroller in order to control the discussion forms and provides solutions to many
operation of water pump. relevant problems. However, Raspbian OS is still
under consistent development with an main focus on
Burned in the microcontroller in order to perform improving the performance and the stability of as
desired operations. This software directly provides many Debian packages as possible.
.hex file which can be easily burned into the
microcontroller. V. EXPERIMENTATION AND RESULTS
b) Proteus 8 Simulator:
Proteus 8 is one of the best simulation software for
various circuit designs of microcontroller. It has
almost all microcontrollers and electronic
components readily available in it and hence it is
widely used simulator. It can be used to test programs
and embedded designs for electronics before actual
hardware testing. The simulation of programming of
microcontroller can also be done in Proteus.
Simulation avoids the risk of damaging hardware due
to wrong design.
c) Dip Trace: Fig 5. Experimental setup for Node1
Dip race is EDA/CAD software for creating schematic
As shown in figure 5, experimental setup for node1
diagrams and printed circuit boards. The developers
consists of mobile robot with central server, GPS
provide multi-lingual interface and tutorials
module, camera and other sensors. All sensors are
(currently available in English and 21 other
successfully interfaced with microcontroller and the
languages). Dip Trace has 4 modules: Schematic
microcontroller is interfaced with the raspberry
Capture Editor, PCB Layout Editor with built-in
pi.GPS and cameras are also connected to raspberry
shape-based auto router and 3D Preview & Export,
pi. Test results shows that the robot can be controlled
Component Editor, and Pattern Editor.
remotely using wireless transmission of PC
commands to R-Pi.R-Pi forwards the commands to As shown in above figure, node3 consists of a
microcontroller and microcontroller gives signals to moisture sensor connected to HT12E. Moisture
motor driver in order to drive the Robot.GPS module sensor transmits the data using HT12E Encoder IC
provides the co-ordinates for the location of the robot and a RF transmitter to the Node2 where it is
processed by microcontroller and accordingly water
pump is switched ON/OFF.
VI. CONCLUSION
VIII. REFERENCES
Web users are increasingly turning to ad blockers to avoid ads, which are often perceived as annoying or an
invasion of privacy. While there has been significant research into the factors driving ad blocker adoption and
the detrimental effect to ad publishers on the Web, the resulting effects of ad blocker usage on Web users’
browsing experience is not well understood. To approach this problem, we conduct a retrospective natural field
experiment using Firefox browser usage data, with the goal of estimating the effect of ad blocking on user
engagement with the Web. We focus on new users who installed an ad blocker after a baseline observation
period, to avoid comparing different populations. Their subsequent browser activity is compared against that of
a control group, whose members do not use ad blockers, over a corresponding observation period, controlling
for prior baseline usage. In order to estimate causal effects, we employ propensity score matching on a number
of other features recorded during the baseline period. In the group that installed an ad blocker, we find
significant increases in both active time spent in the browser (+28% over control) and the number of pages
viewed (+15% over control), while seeing no change in the number of searches. Additionally, by reapplying the
same methodology to other popular Firefox browser extensions, we show that these effects are specific to ad
blockers. We conclude that ad blocking has a positive impact on user engagement with the Web, suggesting
that any costs of using ad blockers to users’ browsing experience are largely drowned out by the utility that
they offer.
Keywords: AdBlockPlus, Unblock Origin, Trivial Algorithm.
CSEIT195178 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 404-408 ]
404
V. Santhi, S. Abirami Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 404-408
developed and IT solutions became more available, Adaptive filtering of advertisements on web pages
the manner in which advertisements were shown on We presented a method to dynamically create custom
websites also developed. filters to avoid downloading unwanted URLs with
minimal interaction with the user, using a weighted-
II. LITERATURE SURVEY majority type algorithm. Both the standalone
extension (AdBlockLearner) and the test driver
Native Advertising and its Effects on Online (AdBlockLearnerTest) are available in [2], including
Advertising Native Advertising and its Effects on source code and documentation. They are compatible
Online Advertising According to Financial Times with most versions of Mozilla Firefox.
Limited (2013), the digital revolution has made many
business models obsolete and advertising companies Adblocking and Counter-Blocking: A Slice of the
see this as a welcome change. Online social Arms Race Adblocking tools like Adblock Plus
networking and internal structural changes in the continue to rise in popularity, potentially threatening
media market have changed how online advertising the dynamics of advertising revenue streams. In
is done. This change has many concurrent forms and response, a number of publishers have ramped up
implications, and the most apparent of them might be efforts to develop and deploy mechanisms for
the change in the various strategies and tactics detecting and/or counter-blocking adblockers (which
companies are adapting in response to said changes; we refer to as anti-adblockers), effectively escalating
mainly advertising online in the form of native the online advertising arms race. In this paper, we
advertising; while one company is inhibiting media develop a scalable approach for identifying third-
profitability in its current form, at the same time party services shared across multiple websites and use
furthering the its corporate sponsors' agenda to it to provide a first characterization of antiadblocking
promote and implement native advertising-or "non- across the Alexa Top-5K websites. We map websites
intrusive" advertising-as the norm of online that perform anti-adblocking as well as the entities
advertising. Abstract According to Financial Times that provide anti-adblocking scripts. We study the
Limited (2013), the digital revolution has made many modus operandi of these scripts and their impact on
business models obsolete and advertising companies popular adblockers. We find that at least 6.7% of
see this as a welcome change. Online social websites in the Alexa Top-5K use anti-adblocking
networking and internal structural changes in the scripts, acquired from 12 distinct entities – some of
media market have changed how online advertising which have a direct interest in nourishing the online
is done. This change has many concurrent forms and advertising industry.
implications, and the most apparent of them might be
the change in the various strategies and tactics Green Mining : Energy Consumption of
companies are adapting in response to said changes; Advertisement Blocking Methods
mainly advertising online in the form of native Extending battery life on mobile devices has become
advertising; while one company is inhibiting media an important topic recently due to the increasing
profitability in its current form, at the same time frequency of smartphone adoption. A primary
furthering the its corporate sponsors' agenda to component of smart phone energy consumption is
promote and implement native advertising-or "non- the apps that run on these devices. Many apps have
intrusive" advertising-as the norm of online embedded advertising and web browser apps will
advertising. show ads that are embedded on webpages. Other
researchers have found that advertising libraries and
advertisements tend to increase power usage. But is determinants concerning users blocking
the converse true? If we use advertisement-blocking advertisements and IT tools. The paper refers to this
software will we consume less energy, or will the and systematizes knowledge in the scope of types of
overhead of ad-blocking consume more energy? This online advertisements and methods for blocking
study seeks to determine the effects of advertisements them using an adblock, and it identifies reasons and
on energy consumption, and the effects of attempts to main categories of reasons for users blocking
block the advertisements. We compared different advertisements.
methods of blocking advertisements on an Android
mobile phone platform and compared the power PROPOSED METHODOLOGY
efficiency of these methods. We found many cases
where ad-blocking software or methods resulted in The research presented in the paper was confronted
increased power use. with results of an analysis of application of ad blocks.
The obtained results will facilitate conducting further,
Blocking online advertising-A state of the art. more thorough research. Considerations included in
the paper can constitute a set of recommendations for
Compared with online advertising industry, there is publishers displaying advertisements on websites and
an even faster increase of ad blocker usage, which they can be useful for drawing conclusions and
influence badly on publishers’ and advertisers’ preparing guidelines for projects supporting
business. Thus more and more companies initialize sustainable development in the scope of online
their counter-ad blocking strategies, in which advertising.
customers choose to either disable their ad blockers
or leave without seeing the content. There are also
companies which abandon their counter-ad blocking
strategies after conducting them for a while due to
insufficient understanding of users’ ad blocking
behavior. In this study, we employed a quasi-
experiment framework and collected a large-size data
with the cooperation with Forbes Media. We aim to
identify factors influencing ad blocker usage.
Furthermore, we will model the interaction effects
among user profile, online behavior patterns, device
features on ad blocker usage propensity. Our study
contributes the literature of understanding ad blocker Connecting Network and Data Exchanging: -
usage by evaluating those principles using big amount
of real-world data. Computer network that interconnects computers or
systems within a large-scale network among internet
III. METHODS AND MATERIAL networks, it connects individual computer terminals,
mobile devices, and computer networks to the
EXISTING PROCESS Internet, enabling users to access Internet services,
Research concerning users blocking advertisements such as email and the software application. Network
constitutes a new research area both in the scope of computer devices that originate, route and terminate
analysis of collected data regarding that topic, the data are called network nodes. Nodes can include
hosts such as personal computers, phones, servers as Nodes Protected from Ad Block:-
well as networking hardware. Two such devices are Using metropolis sampler makes it more security for
said to be networked together when one device is Internet activity to be traced back to the user during
able to exchange data information with the other the visits of Web sites, online posts, and other
device, whether or not they have a direct connection communication forms. It intended to protect the
to each other. personal privacy of users, as well as their freedom
and ability to conduct confidential communication
Ad Block occurred (i.e. Ad Block Software):- by keeping their Internet activities from being
monitored. Assuming the networks is fully
Malicious software, is any software used to disrupt trustworthy, the system node must provide the
computer operation, gather sensitive information, or means to properly authenticate to connect other
gain access to private computer systems. Malware is nodes. Other nodes may impersonate trusted
defined by its malicious intent, acting against the computers, thus requiring system authentication. The
requirements of the computer user, and does not nodes and user may be trusted but within an
include software that causes unintentional harm due untrustworthy environment.
to some deficiency. The term badware is sometimes
used, and applied to both true (malicious) malware IV. RESULTS AND DISCUSSION
and unintentionally harmful software. During the
data transferring or downloading Computer users CONCLUSIONS
often download malware (i.e. malicious software) to The paper shows the reasons for using adblock
their computer by unknowingly visiting a malicious programs and presents the current most popular
webpage hosting a drive-by download attack, programs of that type as well as their characteristics.
clicking on a malicious link included in email, Apart from aforementioned, a survey study was
opening an attachment which includes an exploit, conducted involving a group of Polish internet users,
and destroy the data. which shows that they actively and consciously block
the display of advertisements in their web browsers.
Detecting, Blocking using Check Sum and Metropolis In this study we show how to adblock software
Sampler:- technologies are applied in Polish environment. We
discover a strong desire to block advertisements and
Anti-malware software is computer software used to well known ways to do this. Also in Poland there are
prevent, detect and remove the virus software. But many adapted solutions to improve adblock accuracy
the malware (i.e. malicious software) occurred during and coverage.
download the software or clicking the malware link
in spite of clicking the e-mail unknowingly it affects FUTURE ENHANCEMENT
entire system. Check sum algorithm was originally Future directions of research will concern the
developed to detect malware based on the priority of problem of intrusiveness of advertisements and ways
other kinds of malware during the data processing. for decreasing it. As it was mentioned in the paper,
And encounter based algorithm is used to block the users are not against advertisements being
malware (i.e. malicious software). Metropolis Sampler displayed—they oppose the way in which they
algorithm is to block and encounter the malware. To appear on their screen, e.g. by suddenly covering the
prevent the nodes and against to filtered the thread. viewed content. Further research will be also aimed
And it is recover the data in a large scale systems. at a quantitative analysis regarding elements blocked
V. REFERENCES
To comfort the living conditions within of a human his home, she can use home monitoring and automation
are utilized. The standards of human’s comfort in homes can be categorized into several types. Among these
categories, the most significant ones are the thermal comfort, which is related to temperature and humidity,
followed by the visual comfort, related to colors and light, and hygienic comfort, associated with air quality.We
are proposing a system to monitoring the paremeters range which will increase the comfortness of the
human.Additionally,we incorporate the smart home technique which controls the home appliances by
intelligent automatic execution of commands after analyzing the collected data. Automation can be
accomplished by using the Internet of Things (IoT). This gives the inhabitant accesses to certain data in the
house and the ability to control some parameters remotely. We propose the complete design of an IoT based
sensing and monitoring system for smart home automation. That uses the EmonCMS platform for collecting
and Visualizing monitored data and remote controlling of home appliances and devices. The selected platform
is very flexible and user-friendly. The sensing of different variables inside the house is conducted using the
NodeMCU-ESP8266 microcontroller board, which allows real-time data sensing, processing and
uploading/downloading to/from the EmonCMS cloud server.
Keywords : IOT, CMS, Humidity, Air Quality, Temperature
CSEIT195190 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 409-413 ]
409
R. Sugantha Lakshmi et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 409-413
Cable broadband, DSL, Bluetooth and wireless ZigBee modules due to their low power and cost
technologies provide a way to have a home efficiency.
networked for devices to communicate with each
other as well as internet. These technologies either D. GSM Based Home Automation System
wired or wireless provide foundation on which smart A smart home automation system implemented by
home will operate. using Global System for Mobile communication
(GSM). The hardware architecture of the system
II. LITERATURE SURVEY consists of GSM modem, PIC16F887 microcontroller
and smartphone. The system used a GSM modem to
A. Bluetooth based home automation system control electric appliances through SMS request.
Home automation systems using smartphone, PIC16F887 microcontroller interfaced with a GSM
Arduino board and Bluetooth technology are secured modem and it is used to read and decode the received
and low cost. A Bluetooth based home automation SMS to execute the specific command.
system proposed by R.Piyare and M.Tazil. The
hardware architecture of this system consists of the F. EnOcean based home automation system
Arduino BT board and a cell phone, the The EnOcean is newly developing energy harvesting
communication between Arduino BT board and cell technology used in transportation, building and home
phone is wirelessly using Bluetooth technology. The automation systems. EnOcean’s technology is
Arduino BT board has a range of 10 to 100 meters, 3 productively in logistics as well as in the industry due
Mbps data rate and 2.4 GHz bandwidth. to energy efficiency and easily installing device
anywhere for users ease which significantly save the
B. Voice recognition based home automation installation cost up to 40%. Moreover EnOcean’s
Voice recognition based home automation system devices utilize 315 MHz band and it provides
proposed and implemented by a researcher. The convenient ways for home automation system.
hardware architecture of this system consists of
Arduino UNO and smartphone. The wireless III. EXISTING PROCESS
communication between the smartphone and the
Arduino UNO is done through Bluetooth technology. Smart home technology has the potential of bringing
Android OS has a built-in voice recognizing feature benefits to modern households and their inhabitants.
which is used to develop a smartphone application Yet, ever since its early development, it has been
which has ability to control the home appliances struggling to reach mass consumer adoption. Privacy
from user voice command. and security, trust issues, reliability, and price are just
some of the challenges smart home technology is
C. ZigBee Based Wireless Home Automation System facing. In addition, literature suggests that there is an
ZigBee based wireless home automation system has evident gap between the functionalities offered by
also been studied, it consists of three main modules, smart devices and users’ needs. Investigating these
handheld microphone module, central controller potential adoption challenges in some more detail, we
module and appliance controller module. Handheld conducted an interview study with existing smart
microphone module use ZigBee protocol and central home technology users. Results show that privacy
controller module are based on PC. In this system, and security are still the most prominent hindering
Microsoft speech API is used as a voice recognition factors, and that the often insufficient
application, wireless network is established using RF interoperability of devices becomes an ever-growing
concern. Also, smart home devices are consistently humidity, luminosity, and air quality (i.e. CO2 and
perceived as complex and expensive, and lack dust levels). Usually, the term “Big Data” is often
perceived value and trustworthiness. associated with IoT and refers to the large number
data collected from a large number of sensors and
IV. PROPOSED METHODOLOGY devices to be processed, which is the case here. In
fact, depending on the number of sensors and the
As mentioned earlier, the monitored parameters in measurement-sampling rate, a large number of data
homes are selected to ensure a smart, efficient and might be generated and transmitted through the
comfortable living conditions. Therefore, one hub is internet to the cloud server, which should be able to
made to measure temperature, humidity, light handle such large amount of data communication and
intensity, proximity, and CO2 levels. This hub can be archiving.
placed in each room of the house, and preferably at a
high level above the ground and below the ceiling. B. Data Transmission
Collected data can be processed and used to control Transmitting data between devices and controllers is
smart devices such as smart LEDs and A/Cs. The done using one or more communication technologies.
schematics of the proposed design. It comprises These include Bluetooth, ZigBee, Wi-fi, Ethernet or
mainly sensors, processor, user interface, and data GSM. Bluetooth and ZigBee are commonly used for
communication and transmission links. in-home data transmission and control and provide
the link between the sensors and the central
processing unit. These data communication
technologies are popular because of their low power
consumption, and simplicity to implement.
Furthermore, IoT requires the use of either Wi-fi or
Ethernet to connect to the internet. While Ethernet
is by far faster than Wi-fi connection, the high data
rate is not essential for home automation applications.
Additionally, Wi-fi has the advantage of mobility,
making it more widespread in most systems. Wi-fi
technology consumes more energy than alternatives
such as Bluetooth or ZigBee. The power consumption
can be reduced by lowering the frequency of data
V. IMPLEMENTATION RESULTS uploading.
Internet security is a branch of computer sciences often involving browser security, network security,
applications and operating systems to keep the internet as a secure channel to exchange information by
reducing the risk and attacks. There are a number of studies that have been conducted in this field resulting in
the development of various security models to achieve internet security. However, periodic security reports and
previous studies prove that the most secure systems are not immune from risk and much effort is needed to
improve internet security. This paper proposed a simple security model to improve internet applications
security and services protections, specified access control, cryptographic, cookies and session managements,
defense programing practices, care for security from early stage on development life cycle, use hardware
authentication techniques in access control, then propose cryptographic approach by mix MD5 with Based64,
consider session and cookies types and ways to keep it secure. Additionally, these practices discussed the most
important web security vulnerability and access control weakness and how to overcome such weaknesses,
proposed an approach to measure, analyze and evaluate security project according to software quality standard
ISO 25010 by using Liker scale, finally ended by case study. The effort of this paper represents a set of
techniques and tips that should be applied within each web application development process to maintain its
security.
Keywords : Combinationarial Optimization Identification, Public Key Infrastructure, Partial Forward Secrecy.
CSEIT195198 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 414-418 ]
414
J. Jose Merlin et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 414-418
information and data maintained by corporation's application development process to maintain its
servers and government agencies, safety from easily security.
distributed malicious software, and computer crimes. Security Issues for Web-Based Applications: Issues
On the other hand, software security has become a And Solutions For The Safe Transfer Of Clinical
quality attribute used to measure the quality of Trials Data Over The Internet When building any
software according to standards such as ISO software web-based application, the issue of security is always
quality standard 25010. a concern. When the application is designed to allow
the sharing of clinical trials data across the Internet,
II. LITERATURE SURVEY security becomes one of the major topics. This paper
describes what approach iBiomatics, a SAS company,
Proposed Security Model For Web Based has taken in the construction of their biometrics
Applications And Services Portal. The paper presents a basic overview of
Internet security is a branch of computer sciences security for an Internet based application, describes
often involving browser security, network security, what security features were built into the application,
applications and operating systems to keep the what software tools were used to implement various
internet as a secure channel to exchange information aspects of the security model, and how the actual
by reducing the risk and attacks. There are a number hardware configuration can be a critical piece of the
of studies that have been conducted in this field overall security of a web based application.
resulting in the development of various security Securing Frame Communication in Browsers
models to achieve internet security. However, Many web sites embed third-party content in frames,
periodic security reports and previous studies prove relying on the browser’s security policy to protect
that the most secure systems are not immune from them from malicious content. Frames, however, are
risk and much effort is needed to improve internet often insufficient isolation primitives because most
security. This paper proposed a simple security model browsers let framed content manipulate other frames
to improve internet applications security and services through navigation. We evaluate existing frame
protections, specified access control, cryptographic, navigation policies and advocate a stricter policy,
cookies and session managements, defense which we deploy in the open source browsers. In
programming practices, care for security from early addition to preventing undesirable interactions, the
stage on development life cycle, use hardware browser’s strict isolation policy also hinders
authentication techniques in access control, then communication between cooperating frames. We
propose cryptographic approach by mix MD5 with analyze two techniques for inter-frame
Based64, consider session and cookies types and ways communication. The first method, fragment
to keep it secure. Additionally, these practices identifier messaging, provides confidentiality without
discussed the most important web security authentication, which we repair using concepts from
vulnerability and access control weakness and how to a well-known network protocol. The second method,
overcome such weaknesses, proposed an approach to post Message, provides authentication, but we
measure, analyze and evaluate security project discover an attack that breaches confidentiality. We
according to software quality standard ISO 25010 by modify the post Message API to provide
using Likert scale, finally ended by case study. The confidentiality and see our modifications
effort of this paper represents a set of techniques and standardized and adopted in browser
tips that should be applied within each web implementations.
Protecting Browsers From Dns Rebinding Attacks the secret key or password shared between two users.
DNS rebinding attacks subvert the same-origin policy The main goal of password-based authenticated key
of browsers, converting them into open network exchange protocols is to restrict the adversary to this
proxies. Using DNS rebinding, an attacker can case only. The existing system consider that
circumvent organizational and personal firewalls, password-based authenticated key exchange in the
send spam email, and defraud pay-per-click three-party scenario, in which the users trying to
advertisers. We evaluate the cost effectiveness of establish a secret do not share a password between
mounting DNS rebinding attacks, finding that an themselves but only with a trusted server. In this
attacker requires less than $100 to hijack 100,000 IP existing system the key exchange between three
addresses. We analyze defenses to DNS rebinding authenticated users so, that the privacy of the system
attacks, including improvements to the classic “DNS is failed to overcome. Since we want to trust as little
pinning,” and recommend changes to browser plug- as possible the third party, we develop a new notion
ins, firewalls, and Web servers. Our defenses have called key privacy which roughly means that, even
been adopted by plug-in vendors and by a number of though the server’s help is required to establish a
open-source firewall implementations. session key between two users in the system, the
server should not be able to gain any information on
Assessment of Access Control Systems the value of that session key.
Adequate security of information and information
systems is a fundamental management responsibility. IV. PROPOSED METHODOLOGY
Nearly all applications that deal with financial,
privacy, safety, or defense include some form of A secure 2-party password-based key exchange is a
access control. Access control is concerned with 2PAKE protocol where the parties use their password
determining the allowed activities of legitimate users, in order to derive a common session key that will be
mediating every attempt by a user to access a used to build secure channels. Several practical
resource in the system. In some systems, complete schemes can be used in the instantiation of the 2-
access is granted after successful authentication of the party password-based key exchange of our generic
user, but most systems require more sophisticated construction. In these proposed system, instead of
and complex control. In addition to the exchange the password the owner going to send the
authentication mechanism (such as a password), link to get that particular data and in user side by
access control is concerned with how authorizations using that link they can retrieve that data easily.
are structured. In some cases, authorization may Once the user make logout means they cannot again
mirror the structure of the organization, while in enter into the system. The link can be used only once.
others it may be based on the sensitivity level of
various documents and the clearance level of the user V. IMPLEMENTATION RESULTS
accessing those documents. This publication explains
some of the commonly used access control services Search engine recognized
available in information technology systems. Search engine indexing collects, parses, and
stores data to facilitate fast and accurate information
III. EXISTING PROCESS retrieval. Index design incorporates interdisciplinary
concepts from linguistics, cognitive psychology,
Password-based authenticated key exchange is mathematics, informatics, and computer science. An
protocols which are designed to be secure even when alternate name for the process in the context
of search engines designed to find web pages on the industry-specific vertical search engines. SEO differs
Internet is web indexing. from local search engine optimization in that the
Popular engines focus on the full-text indexing of latter is focused on optimizing a business' online
online, natural language documents. Media presence so that its web pages will be displayed by
types such as video and audio and graphics are also search engines when a user enters a local search for
searchable. its products or services. The former instead is more
focused on national or international searches.
Meta search engines reuse the indices of other
Authentication
services and do not store a local index, whereas
An authentication module is a plug-in that collects
cache-based search engines permanently store the
user information such as a user ID and password, and
index along with the corpus. Unlike full-text indices,
compares the information against entries in a
partial-text services restrict the depth indexed to
database. If a user provides information that meets
reduce index size. Larger services typically perform
the authentication criteria, the user is validated and,
indexing at a predetermined time interval due to the
assuming the appropriate policy configuration,
required time and processing costs, while agent-
granted access to the requested resource. If the user
based search engines index in real time.
provides information that does not meet the
authentication criteria, the user is not validated and
denied access to the requested resource. OpenSSO
Enterprise is deployed with a number of
authentication modules.
Session Handling
A web session is a sequence of network HTTP request
and response transactions associated to the same user.
Modern and complex web applications require the
retaining of information or status about each user for
the duration of multiple requests.
User preference
Optimized search results
Understanding user preference settings. Completing
Search engine optimization (SEO) is the process of
the user preferences pages enables the system
affecting the online visibility of a website or a web
to use the field values that you specify as the default
page in a web search engine's unpaid results—often data that appears on various inquiry pages. ... This
referred to as "natural", "organic", or "earned" results.
enables default values to be set by user ID; the
In general, the earlier (or higher ranked on the
user can override the defaults when running an
search results page), and more frequently a website
inquiry.
appears in the search results list, the more visitors it
will receive from the search engine's users; these Temporary User Restriction
visitors can then be converted into To ensure a consistent user experience, we monitor
customers.[1] SEO may target different kinds of the level of requests to the my hr toolkit system from
search, including image search, video user accounts. If an abnormally high frequency of
search, academic search,[2] news search, and requests is detected, an escalating blocking process is
deployed
E-learning system is very much popular in today`s digital era due to which one can easily get access to the
required information or knowledge. Due to online learning there are several solutions to a single problem is
available as the internet has grown in the largest manner. Even the online learning is changing the load of
traditional classrooms. E-learning provides an integrated environment where access to particular information
can be found at one place in various forms. The proposed technique is for creating an E-learning system with an
integrated environment for students of higher education. So that, they are able to get access to an appropriate
solutions for the particular question asked in an university examination. The system will provide free access to
the study material for students simply by logging in. This will be creating an integrated library for each subject
and create model answer section for questions related to the subject. This will help student to learn subject
easily, the question and their answer that can be asked in the university examination.
Keywords: Raspberry pi, USB camera, motor driver, motor, LCD display, road side speed sign controlling
CSEIT1951106 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 419-421 ]
419
Neha Bitodkar et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 419-421
without any confusion as there are several solutions Author : Yogesh Deshpande , Samit Bhattacharya,
are available online for a single solution. Pradeep Yammiyavar
Description: This paper focuses on analyzing the
III. LITERATURE REVIEW ability of children`s for adopting e-learning
environment in comparison with traditional
Title 1 : Implementation of E-learning on full stack classrooms. Online learning can be an additional tool
concept for the school environment to get more knowledge
Author: Nitish Kumar, Chaitali Alhat, Rupali about the particular subject.
Bachhav
Description : The designed system provides materials IV. PROPOSED SYSTEM
in different formats. It can be in the form of videos,
pdf etc. Their purpose is to provide an open free The proposed system will be a beneficiary product for
course which provides access to the material after the the students of university and will get a complete
registration process is completed. This system focuses access to all the material related to their syllabus
on interactive learning between the students and the designed by university.
proffesors.
Title 2: Open educational resource : opportunities The system is designed using Bootstrap, CSS and PHP.
and challenges for Indian higher education. Mysql database is used for storing the login ID as well
Author : Dr. Indrajeet Dutta as the data of the user. The system will allow students
Description : This paper gives information about the for complete study of subjects due to the question
opportunities and challenges for Indian higher answer section is available. Question papers will be
education related with open educational resources. available on the subjects along with their model
This paper gives the detailed information about the answer.
several online courses started by the govt. such as
NMECIT, NKN, SHAKSHAT, NPTEL, EKLAVYA, The designed system contains information in
OSCAR E-GRID etc. This papers says that the different formats. It will also contain information in
opportunities can be increased as students can hear the form of video lectures and e-books. The system is
the lectures from international proffesors. branch wise and semester wise separated according to
Title 3 : Role of consortia for effective use of e- the university.
resources in Higher education : A practical approach Data Flow Diagram:
in Indian liabraries.
Author: Sunil Goria
Description : This paper says that in the last decade
the liabraries of higher education and the research
institutes are using the e-resources. In consortium
mode, one can be able to access the journals in Indian
libraries using e-resources. This paper focuses on
increasing use of e-resources.
Title 4: A behavioural approach to modelling Indian
children`s ability of adopting to e-learning
environment.
In this work, after login the study material will be Neha Bitodkar, Prof. Aniket Bhoyar, Suraj Chavhan,
available for the students. This is a beneficiary Priyanka Wahane, "Managing university defined
product for the students. University syllabus will be Study material by using Online Portal", International
available on this website along with related material Journal of Scientific Research in Computer Science,
such as question answer set, video lectures, model Engineering and Information Technology
answer, e-books, notes.It will help the students for (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
complete learning of subjects designed by university. 419-421, January-February 2019.
Due to E-learning one can access this information Journal URL : http://ijsrcseit.com/CSEIT1951106
form anywhere at anytime.
VI. REFERENCES
Maharashtra, India
ABSTRACT
According to the World Health Organization (WHO), in excess of a million people on the planet pass on
consistently by virtue of vehicle accidents. Notwithstanding care cause, this issue is up 'til now growing due to
rider's poor practices, for instance, tank driving, speed driving, riding without sufficient rest, riding with no top
protection, etc. The Event Data Recorder (EDR) or vehicle 'black box' is a standout amongst the most valuable
instruments accessible to crash Reconstructionist. For vehicles outfitted with this innovation, and when the
recorders fill in as planned, the EDR gives crash agents significant data that in numerous examples could not be
gathered. In this paper, we present the issues related to accident detections and some existing systems for
prevention of accidents.
Keywords : Car Accidents, Road Safety, Public Health, Black Box, Event Data Recorder
CSEIT1951107 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 422-428 ]
422
Prof. Tejal Irkhede et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 422-428
The investigation demonstrates that amid the most The mishap examination includes the investigation of
recent ten years, street unplanned fatalities in India accident scenes and the documentation of all
have expanded at the rate of 5% every year while the fundamental and accessible data of every segment
number of inhabitants in the nation has expanded (for example a human, vehicle, and street condition).
just at the rate of 1.4% every year. Because of this, Mishap reproduction is characterized by Baker and
casualty chance, street inadvertent passings per Fricke as[11]"… the endeavors to decide from
100,000 individuals, has expanded from 7.9 in 2003 to whatever data is accessible, how the mishap
11.2 in 2013. Casualty hazard in India isn't just happened". Mishap reproduction approach works in
fourfold than that in a portion of the created nations, reverse from the proof of the accident examination
for example, the United Kingdom and Sweden yet in and the remaining parts of the collide with
addition as yet expanding quickly. It is likewise investigating the situation of previously (pre-crash),
discovered that the conveyance of street coincidental amid (crash) and after the accident (post-crash). The
passings and wounds shifts as per age, sexual successive investigation of final products to the
orientation, month and time. Among individuals of underlying state of the events can build up "how" and
all age gatherings, individuals of monetarily dynamic "why" a specific sort of accident happens. Arithmetic
age gathering of 30-59 years is the most powerless. and Newtonian material science are connected in this
Nonetheless, on the off chance that we analyze sexual investigation. It tends to be expressed that crash
orientation insightful fatalities and accidents, we recreation returns to explore the contributory
found that the guys represented 85.2% all things elements and additionally causes behind the accident
considered and 82.1% of all wounds in 2013. event dependent on major and minor physical pieces
of information abandoned at the accident scene.
Besides, street accidents are generally higher in
May-June and December-January, which The strategies of accident reproduction, direction,
demonstrates that extraordinary climate, impacts the and harm based investigation by utilizing material
event of street accidents. Accidents remain generally science streamline the assurance of numerous vital
steady and high amid 9 AM - 9 PM and variable yet parameters of accident events. In addition, to acquire
low amid mid-night and early hours of the day. In a dependable end, itemized data incorporating the
any case, this does not infer that daytime driving is framework segments should be completely explored.
more hazardous than evening time driving. The The data important for reproduction begins with the
investigation additionally attempts to discover the accident scene [12]. The responses to the inquiries of
reason shrewd conveyance of street accidents. 'why', 'what', 'when' and 'how' should lead the
recreation procedure to develop the genuine situation
There are a few variables in charge of accidents yet of the pre-crash, crash, and post-crash. Capturing of
the drivers' blame is observed to be the most essential imperative pieces of information and recording of the
one; drivers' blame represented 78% of all-out accident scene assumes an essential job in the
accidents in 2013. The recognizable proof of elements reproduction. Damage data from tenant restorative
influencing street crashes got from the accident reports can be checked with the direction of the
examination and remaking has not been directed by inhabitants found inside the included vehicles at the
and by in the Asian nations. The objective of this scene. In this way, a "receptive outlook" insightful
examination was to start this street wellbeing practice frame of mind is extremely urgent to scan for all the
in Thailand by tending to the auspicious requirement point-by-point data from the scene.
for a top to bottom investigation of street accidents.
this manner gadgets wound up intended for both the were included to ensure airbags deployed when they
cars.This is a stage for crisis salvage which will work were supposed to.
ideally so as to lessen the brilliant time of entry of
rescuers if there should arise an occurrence of street Over the years, as electronics got cheaper, smaller
accidents, when each microsecond checks. Our paper and smarter, event data recorders became capable of
plans to introduce an innovation consequently doing more than simply monitoring airbags.
identifying the mishap and an equipment GPS beacon Automakers realized the devices could be used to
dependent on GSM/GPS innovation illuminating at provide information about the seriousness of an
the event of mishap with adequate subtleties like accident, and if a car was being operated properly
accurate area and time at which mishap occurred and when a crash occurred. Based on a separate NHTSA
alongside that the voice was recorded for two or regulation passed in 2012, if a vehicle today does
three minutes when the mishap occurs.This paper have an event data recorder, it must track 15 specific
build up a correspondence between the control data points, including speed, steering, braking,
station and the unit introduced in vehicles. Vehicles acceleration, seatbelt use, and, in the event of a crash,
will have GPS/GSM empowered following modules force of impact and whether airbags deployed.
and will be followed progressively utilizing cell
systems. The product installed in the microcontroller Depending on the automaker and car model, an event
will control the different activities of the gadget by data recorder may capture many more functions,
observing waveform from the vibration sensor. In the though car companies are not required to disclose
event of mishap the gadget will send an alarm exactly what those are. The language many use to
message alongside area data from GPS module to explain black boxes in owner's manuals also is
control station utilizing GSM arrange. It is a purposely general to cover technology updates and to
thorough and viable answer for the poor salvage save space.
reaction in the event of mishap. The mishap detailing
can naturally discover an auto collision; scan for the Put everything the devices do in an owner's guide
spot and after that send the fundamental data to the and "instead of one paragraph, you'd have potentially
salvage office covering topographical directions and another 20 or 30 pages. That really wouldn't be
the time and conditions in which a car crash realistic," says Richard Ruth, a black box equipment
occurred. At the server end, a control capacity will trainer, expert witness and consultant who worked at
remove important data and store it in a database, to Ford Motor Co. for 33 years, including a stint
which mishap data from models will be surveyed evaluating event data recorders and other safety
progressively. Our framework joins propelled equipment. "It's not going to change whether or not
equipment plan and refined control innovation into a you're going to buy the car."
conservative, dependable bundle.
Most event data recorders are programmed to record
III. DECODING CAR'S BLACK BOX data in a continuous loop, writing over information
again and again until a vehicle is in a front-end
A. How Black Boxes Work collision or other crash. When an accident occurs,
Event data recorders are not actually black boxes but the device automatically saves up to 5 seconds of data
tiny microcomputer chip sets. In most vehicles, they from immediately before, during and after an
are part of the airbag control module, and originally incident.
Today, practically every major automaker selling cars police and other law enforcement agencies that are
in the United States builds event data recorders into investigating an accident, insurance companies
new vehicles. The exceptions are Volkswagen (which looking into a claim, lawyers representing parties in
auto industry watchers say is preparing for the car-crash lawsuits and accident reconstruction
NHTSA regulation to kick in), Ferrari and Maserati. consultants working for any of the above.
Traffic accident analysis consultant Harris Technical
Services maintains a list of car makes and models In states with no black box laws on the books, "state
from 1994-2014 with event data recorders. troopers could get the data without a subpoena if
there was a fatality," says Tom Kowalick, a self-taught
The NHTSA rule, which the agency has been black box expert who chairs an event data recorder
working on for years, was supposed to take effect standards working group that's part of the Institute of
September 1, 2014. However, auto industry insiders Electrical and Electronics Engineers. Kowalick also
say the agency is still reviewing more than 1,000 wrote some of the black box information on the
comments it received about the proposed regulation, NHTSA Web site. "If they want to grab it, there's
making that implementation date unrealistic. A nobody saying they can't."
NHTSA representative declined to comment on the
delay. To rectify that situation, 15 states have passed EDR
B. Getting Black Box Data regulation over the past decade. Under the theory
Black box data is difficult and expensive to get to, and that car owners have privacy rights, many of the state
interpreting it takes special training. Extracting the laws require automakers to notify new-car buyers
data after an accident involves using a data-retrieval that vehicles contain black boxes, such as in the
tool kit that consists of hardware, software and a owner's manual. State laws also spell out the
cable that plugs into a car's on board diagnostics port. conditions under which police or other parties can
That is the same port mechanics use to identify obtain EDR information without an owner's consent,
engine problems and insurance companies tap as the such as with a court order; for dispatching emergency
basis for use-based insurance policies. Crash data personnel; diagnosing, servicing or repairing the
retrieval tool kits are not cheap, running $2,000- vehicle; or probable cause in an accident. The
$10,000 and up, not including training costs. National Council of State Legislatures maintains an
updated list of state EDR laws.
It follows that since drivers own their cars or trucks,
they own data the vehicles generate, including black Black boxes have become a battleground in states
box data. But because it's so difficult and costly to such as California, where earlier this year, insurance
extract, it's virtually impossible for average car companies and automakers lined up on opposite sides
owners to do it on their own — assuming that they of a black box data protection bill that would have
even want to. required automakers to let car owners block or opt
out of recording vehicle information. The bill didn't
Who else can access the information is a point of make it out of the state Senate Transportation
contention. Automakers would like the right to Committee after heavyweights including the Alliance
access the information for numerous reasons of Automobile Manufacturers opposed it.
including safety, to make sure systems work the way
they should and to check for defects. Other parties Earlier in 2014, two U.S. senators introduced a
that want a black box's car crash data can include bipartisan bill that would provide some of the same
protections on a national level. The Driver Privacy turned off. No one can hack into something without
Act explicitly states that a black box's data can't be Internet access." Even if someone could break in,
retrieved by anyone other than vehicle owners specifically in an effort to get data from an event data
without their consent and protects any personally recorder, the devices have access codes that need
identifiable information. By April 2014, the bill had authorized commands to work, he says.
collected 23 co-sponsors and been approved by the
Senate Commerce Committee. As of July 2014, In addition, car companies use threat modeling and
however, no further action had been taken. simulated attacks to test security and to help design
controls that protect data, says Wade Newton,
C. Black Boxes, Privacy and Security communications director for the Alliance of
Meanwhile, electronic privacy advocates worry about Automobile Manufacturers, an auto industry trade
a related car-data security issue: that a car's diagnostic group that represents 12 large car companies. "From
port, through which black box data streams, isn't bumper to bumper, automakers use proven security
secure enough to withstand hacking, and therefore techniques to help prevent unauthorized access to
poses a danger. Security experts and "white-hat" software," he says.
hackers already are testing how to break into the
ports to show how vulnerable they are. They are IV. CONCLUSION
publicly sharing the results, as in a video called "How
to Hack a Car." The analysis shows that the distribution of road
accidental deaths and injuries in India varies
Kowalick, a longtime black box data privacy advocate, according to age, gender, month and time. It is found
started a company to sell a diagnostic port lock that that the economically active age group is the most
he invented. The $30 AutoCyb lock, which he vulnerable population group. In general, males face
markets on his company Web site, is inserted into the higher fatality and accident risk than their female
diagnostics port to turn off access and prevent counterparts. Moreover, road accidents are relatively
unwelcome parties from getting to the data or higher in May-June and December-January which
interfering with car systems. "Every car in America shows that extreme weather influences the
can be hacked," he says. "The diagnostic link occurrence of road accidents. Accidents are relatively
connector is unsecure. All you have to do is set up constant and high during 9 AM to 9 PM and variable
access to the vehicle and have the right tool." but low during mid-night and early hours of the day.
There are several factors responsible for accidents but
However, Ruth, the EDR consultant and former Ford drivers’ fault is the most important factor; drivers’
executive, maintains a physical lock couldn't stop a fault accounted for 78% of total accidents, 76.5% of
black box expert or mechanic from bypassing the total injuries and 73.7% of total fatalities in 2013.
diagnostics port and obtaining the data another way. Automatic vehicle accident detection and reporting
He also dismisses the notion that hackers would be System using black box is is the need of the hour. The
interested in information. framework should be placed in moving vehicle to
detect accident and report to In Case of Emergency
"What would the incentive be?" he asks. "I think it's (ICE). The black box will records the voice of victim
an over-reaction. For all practical purposes, the after the accident occurs which will be used for
owner controls physical access. There's no Internet further investigation.
port on the car that's live, especially when the car's
[5] Yong-Kul Ki ,Jin-Woo Kim and Doo-Kwon Baik," Ranjan, Manish Kumar, "A Review on Car Collision
Avoidance System based on Interpretation of Vehicle
A Traffic Accident Detection Model using
Event Data Recorder ", International Journal of Scientific
Metadata Registry ",Conference on Software
Research in Computer Science, Engineering and
Engineering Research, Management and
Information Technology (IJSRCSEIT), ISSN : 2456-3307,
Applications, 2006 ppno: 0-7695-2656-X. Volume 5 Issue 1, pp. 422-428, January-February 2019.
[6] “Providing Accident Detection in Vehicular Journal URL : http://ijsrcseit.com/CSEIT1951107
Networks Through OBD-II Devices and Android-
based Smartphones”Juan Carlos Cano,Jorge
Zaldivar, Carlos T. Calafate, Pietro Manzoni in
5th IEEE Workshop On User Mobility and
Vehicular Networks 2011 pp no : 978-1-61284-
928-7.
[7] "Method of Freeway Incident Detection Using
wireless Positioning,"H. Ru-fu,L. Chuan-zhi, Y.E.
Hong-wu, in Proceedings of the IEEE
International Conference on Automation and
Logistics, 2008, pp. 2801 -2804.
[8] "GPS-free terrain-based vehicle tracking on road
networks," Jerath, K.; Brennan, S.N., American
Control Conference (ACC), 2012, pp.307, 311,
27-29 June 2012
[9] "An accident detection system on highway
through CCTV with calogero-mosersystem,Jung
ABSTRACT
Recently, there is an enormous increment in online looking for changed wares like fabric, adornments and the
closeout of medicines have been expanded by means of the online/web. The online following of medicine is one
of the innovation headways that is going to make a colossal interest in the up and coming days. Despite the fact
that it is helpful to get them, there is a high danger of self-medicine and abuse of drugs, particularly that go
under calendar H and X. In this article, we have examined in insight concerning online pharmacy, its focal
points, and drawbacks contrast among online and neighborhood pharmacy, and certain measures to keep away
from the abuse of e-pharmacy.
Keywords : Drug Tracking, Online Pharmacies, Laws of Pharmacy, Prescription
CSEIT1951108 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 429-432 ]
429
Swati Hedau et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 429-432
There are numerous obvious dangers of purchasing (1) Legitimate Internet pharmacy sites giving
medicine over the Internet. These incorporate simple fantastic pharmacy administrations as indicated by
access to unlawful or unapproved drugs, medicine confirmation principles, and
offered without a solution, and drugs promoted with
phony wellbeing claims [5]. Additionally, it reroutes (2) Illegitimate online drug stores that are not
the conventional protections i.e., noteworthy confirmed and may not consent to national or global
cooperation with medicinal services experts (doctor expert benchmarks and directions.
as well as drug specialist) and subsequently putting
shoppers in danger [6]. Additionally, the greatest II. LITERATURE REVIEW
hazard that online drug stores present is to the
patient's wellbeing through fake and unacceptable A. Laws of Pharmacy
prescriptions [7]. According to Supreme Court statement, except in
emergency cases, doctor cannot consult through
Despite various potential dangers of buying meds phone. As far as India is concerned, there are no
online, there are a few evident advantages. Getting dedicated e-health and telemedicine laws in India.
medicines through the Internet is basic and There are no well-defined dedicated laws for online
advantageous as going forward and backward from a pharmacies. The laws applicable are:
traditional pharmacy had turned out to be extremely • Drug and Cosmetics Act 1940,
troublesome. Drugs can be requested whenever of • Drugs and Cosmetic Rules 1945,
day or on the other hand night and medicine could • Pharmacy Act 1948,
be dispatched by an online pharmacy medium-term • Indian Medical Act 1956 and
to his front entryway, thus sparing time and stress. • Laws related to e-commerce are defined under
What's more, utilizing online drug stores manages the Information Technology Act, 2000.
customers with more protection than the customary
specialist or pharmacy visit. Online drug stores are
especially engaging for those with ailments they wish B. Role Of Prescription
to keep private, as they don't require any immediate Online pharmacies will promote drug abuse, drug
human cooperation. misuse, self-medication, etc. Self-medication is a
rampant practice in India, and online sale of drugs
In past, the best-specialized technique for doctors would only encourage it.
in choices identifying with the drug for drug • Any medication taken without the supervision
specialists to disseminate medicines was written by of doctors may be dangerous and even
hand remedy. Presently it is being supplanted by potentially life-threatening.
electronic solution organize usually known as e- • A prescription issued by a doctor cannot be re-
pharmacy/online pharmacy. Online drug stores are used randomly. There is a danger that
organizations that move pharmaceutical scheduled drugs can be re-ordered and misused
arrangements that incorporate solution just drugs, on by the consumer.
the Internet by means of online requesting and mail • The D&C Act 1940, and the D&C Rules 1945
conveyance. Online drug stores can be arranged has guidelines on the sale of Schedule H and
fundamentally as: Schedule X drugs. These can be sold only on
prescription, and there are specific rules,
including for labeling and bar coding.
Schedule X drugs include narcotics and pain relievers. Patients can take steps to ensure that
psychotropic substances. Chances of drug abuse and they use prescription medications appropriately by:
addiction are higher with the Schedule X category. • Never change a dosing regimen without first
Schedule X drugs require meticulous storage and discussing it with the doctor
dispensing records. The prescription has to be in • Never using another person’s prescription,
duplicate and one copy of which is to be retained by and never giving his or her prescription
the licensed pharmacist for 2 years. medications to others.
• Storing prescription stimulants, sedatives, and
C. Comparison Of Local Pharmacy And Online opioids safely patients should properly
Pharmacy discard unused or expired medications
Price: The prices for medications from an online Schedule H and schedule X drugs cannot be sold
pharmacy are less because there is no particular without prescription because it is easy for local
production unit, there is no physical store for the pharmacy stores to verify the authencity of a
medications storage and dispensing, and the company prescription, as it contains details like registration
has a large network of retailers to draw from, or a number of medical practitioner and name of the
combination of factors. hospital and there is no such checking by online
Convenience: Prescription can be submitted at any stores.
time, there is no need to rush to the pharmacy during • According to the report of high-level
business hours and do not have to wait in any long government the physicians should digitally
lines. However, there are also disadvantages. If it is sign committee since doctor’s prescription is
not the same website every time, one may not be mandatory for purchasing drugs, online
aware of any potential drug interactions, it can be pharmacies will need to mandatorily display
difficult to find someone to answer any specific the portal link on their homepage for
questions about medications. authencity verification by patients or
Local pharmacies are small independently owned customers and the prescriptions.
business rather than a pharmacy within one of the • In certain countries like United States,
large chains and they have staff during regular England, Sweden, Denmark and Finland have
business hours, and many also have an online accurate, regular, and systematic plans to use
counterpart as well. The large chains do use locals for electronic prescription system, and health
a large portion of their workforce. ministry of these countries was responsible
Pharmacist is responsible for dispensing the right for coordinating and leading the electronic
medicines and even counseling a patient about side- health.
effects and dosage. In the online space, where the • It is suggested to use experiences and
medicines are delivered at the patient’s home, there is programs of the leading countries to design
no possibility of an interaction between a patient and and develop the electronic prescription
a pharmacist. systems.
D. Measures To Be Taken To Avoid The Misuse Of
Online Pharmacy III. CONCLUSION
Before preventing the misuse of online pharmacy,
patients should stop the nonmedical use of Despite the fact that online pharmacy is more
prescription drugs like stimulants, sedatives or opiod subject than nearby pharmacy particularly in remote
regions, it ought to be planned to build up standards
ABSTRACT
Cloud computing is an innovation which utilizes the Internet to store, oversee, and register the information, as
opposed to a nearby server or a PC. Clients can access the cloud condition wherever they need on
compensation for each utilization way. Transferring of delicate information on un-believed servers in the cloud
is a testing assignment. Established encryption procedures are utilized when the re-appropriating of
information in the cloud to give access control and secrecy. Access control instruments are not doable in the
cloud as a result of the absence of adaptability, versatility, and fine-grained access control. As an option, So,
Attribute-Based Encryption (ABE) procedures are acquainted in the cloud with increment the security and
adaptability. Attribute-based encryption is an open key cryptographic strategy in which the private key and
figure content are based on the attributes. ABE involves IBE, KP-ABE, and CP-ABE. In Identity-Based
Encryption (IBE) the mystery key and the attributes are based on the character of the client. In Ciphertext-
Policy Attribute-Based Encryption (CP-ABE) a mystery key is gotten from the arrangement of attributes and
the access strategy is defined over the universe of attributes inside the framework. In Key Policy – Attribute-
Based Encryption (KP – ABE) the figure content is related to the arrangement of attributes and the mystery key
is based on the access structure. This paper is a study of all ABE strategies and specialty an evaluation table
about ABE keys job in cloud condition.
Keywords : Attribute-Based Encryption, Attributes Revocation, Fine-Grained Access Control, Keywords Search,
Mobile Cloud Storage.
CSEIT1951110 | Received : 10 Feb 2019 | Accepted : 21 Feb 2019 | January-February -2019 [ 5 (1) : 433-437 ]
433
Navin Sethiya et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 433-437
Versatility is the capacity of a cloud to direct scale IT 2. Integrity: It will keep unapproved clients from
assets as required by the cloud purchaser or cloud changing the information which is put away or
supplier. Estimated usage addresses the limitations of transmitted in the cloud.
a cloud stage to screen the utilization of its IT assets,
in a general sense by cloud buyers. Flexibility alludes 3. Availability: It enables the information to be
to excess IT assets inside a similar cloud or over accessible and usable amid an explicit timeframe.
various clouds. Three regular cloud conveyance
models are generally utilized and set up: 4. Scalability: Capability to deal with the clients
Infrastructure-as-a-Service (IaaS), Platform-as-a- included the system powerfully with no disturbance
Service (PaaS), Software-as-a-Service (SaaS). IaaS of administration.
conveyance demonstrates involved framework driven
IT assets that can be accessed and oversaw through 5. Client revocation: If the client leaves the system
cloud benefit based interfaces and instruments. PaaS the plan should disavow his access rights from the
relies upon the current condition that makes a lot of system straightforwardly. Something else, the client
apparatuses used to help the whole applications. SaaS can't utilize the information put away and the access
gives reusable cloud benefit generally accessible to is repudiated.
the scope of cloud buyers. Essentially, three sorts of
cloud arrangement models are the open cloud, 6. User revocation: Users can decode the encoded
private cloud, and third-party cloud. The open cloud information with their very own attributes since the
is claimed by an outsider cloud which is accessible by attributes are identified with polynomial arbitrary
everybody in the cloud condition. Private cloud is encryption work.
possessed by a solitary association where limits are
defined. The third party cloud is a mix of open and 7. Access Tree: Based on the attributes, the access tree
private cloud models. is produced. The access tree is included hubs. The leaf
hubs are spoken to as attributes and the middle of the
Cloud computing is a sort of distributive computing road hubs are spoken to utilizing doors likes AND,
that speaks to the usage models for remotely OR, and so on.
provisioning versatile and estimated assets [12]. At II. LITERATURE REVIEW
the point when the business information is moved to
the cloud, at that point the security issue will ascend, By expecting the believed cloud service provider
as information security ends up imparted to the cloud gives security additionally to the expansive measure
specialist organization. Fundamental wordings of delicate and significant information put away. ABE
utilized in the cloud will be: cloud supplier gives the calculations can be utilized for securing the
cloud-based IT assets. Cloud buyer utilizes the cloud- confidentiality of the put away information and
based IT assets. Cloud examiner assesses the security furthermore ABE gives the access control instrument
controls, protection effects, and execution. Central to information on the cloud. In cloud condition,
security terms important to cloud computing are: information confidentiality is imperative to shield
against insider assault, crash assault and refusal of
1. Confidentiality: It enables approved gatherings to administration assault. This area gives the current
access the information or assets that is it confines the attribute based encryption components in cloud
unapproved access to information in travel and condition.
storage.
ABE was presented by Sahai and Waters [2] in 2005. intended for one to numerous correspondences.
It is an open key based one to numerous encryption Decoding should be possible just when the attribute
that enables client to scramble and decode the set fulfills the client's access structure. It bolsters
information based on client attributes. The mystery access control conspire.
key and figure content are subject to the client
attributes. The decoding of ciphertext is conceivable Disadvantages:
just if the arrangement of attributes of client key Information proprietor can't choose who can decode
matches with the attributes of ciphertext. Decoding the encoded information. It can just pick graphic
should be possible just when the quantity of attributes for the information. It isn't appropriate for
coordinating keys is equivalent to the referenced broadcasting applications in light of the fact that the
limit level. ABE calculation comprise of four stages: information proprietor needs to confide in the key
Setup, key age, encryption and unscrambling. Crash backer.
obstruction is a pivotal highlights of ABE. A rival that
holds numerous keys can access the information if 3. Expressive Key Policy ABE (EKP-ABE)
the individual key matches. It is the all-inclusive variant of KP-ABE, the non-
monotonic access structures [5] are utilized. Non-
Drawbacks: monotonic access structure utilizes repudiated doors,
For encryption, the Data proprietor needs to utilize for example, NOT in the access structure. It is
each approved client's open key so it expands the increasingly adaptable to limit the unapproved use of
calculation overhead. This strategy is confined in information.
light of the fact that it utilizes access of monotonic
attributes to control client's access to the framework. Disadvantage:
The overhead is expanded on account of negative
1. Identity Based Encryption (IBE) attributes which isn't pertinent to the encoded
It was proposed by Shamir in 1984[3].In Identity information.
Based Encryption (IBE) the mystery key and the
attributes are based on the identity of the client. For 4. Ciphertext Policy ABE (CP-ABE)
instance, email id be the identity of the client. It is a turn around the form of KP-ABE [6]. In CP-
Believed third party will create the private key. ABE, the ciphertext is related with an access
structure and client's private key is based on set of
Drawback: attributes. A client can unscramble the ciphertext just
In the event that the believed third party gets traded whenever set of attributes related with clients private
off, there is no security for the framework. The client key fulfills the access policy related with the
protection can't be saved utilizing IBE. ciphertext. CP-ABE is more anchored even the
believed the third party is imperiled.
2. Key Policy Attribute Based Encryption (KP-ABE)
It was proposed by Goyal et al. [4]. Each client is Disadvantage:
assigned with some access tree over the arrangement
of attributes. Ciphertexts are based on the CP-ABE doesn't fulfilled undertaking needs of the
arrangement of attributes and the private key is based access control component. Decoding keys underpin
on the monotonic access structure that controls client attributes that are sorted out intelligently as a
which ciphertexts a client can decode. This is solitary set.
5. Hierarchical Attribute Based Encryption (HABE) The FHABE conspire is turned out to be secure under
The HABE was proposed by Wang et al. [7]. This the standard suspicion.
model comprises of a root ace that relates to the
confided in third party, different space ace in which 8. Ciphertext policy Weighted ABE (CPWABE)
top dimension area aces compares to various venture This plan assigns [10] load to the attributes based on
clients and various clients that relates to all work the inclination defined in the access control structure.
force in an undertaking. This plan client's Clients will have appointed the load to their
hierarchical age of keys. It utilizes randomized attributes. The information proprietor will encode
polynomial time calculation. It underpins anchored the information based on the attributes. The private
access control, adaptability and completely key is based on the weighted access structure and the
designation. It can share the ensured information for decryption [11] is conceivable just when the
clients in a cloud in an endeavor situation. It bolsters ciphertext and the weighted attribute matches with
intermediary reencryption conspire. the weighted access structure. It takes care of the key
Disadvantages: escrow issue by utilizing weighted attributes.
It is extremely hard to actualize continuously Drawback:
condition. A similar attribute will be utilized by Cost of computation is increased.
numerous area aces.
III. CONCLUSIONS
6. Multiple Authority ABE (MAABE)
This strategy utilizes numerous experts and the client This paper abridges different attribute-based
attributes are dispersed to different specialists. encryption systems for information security in cloud
Suppose [8] it comprises of N multiple attribute condition. Security will be the essential factor to be
experts and one focal specialist. The information can tended to. The storage cost of the figure writings,
be decoded by the client under attribute set an and time of encryption and unscrambling to be
unscrambling keys for an attribute set Au. It enables diminished. Based on the qualities like fine-grained
any free experts to disseminate private keys and to access control, adaptability and adaptability in cloud
deal with flawed or lost specialists. computing we can infer that FH-WABE performs
well superior to the next attribute encryption
Disadvantages: strategies.
Trouble in muti-expert plan is it expects specialist's to
keep up disjoint arrangements of attributes. IV. REFERENCES
7. File Hierarchy Attribute Based Encryption (FH- [1]. Muhammad Yasir Shabir, Asif Iqbal, Zahid
ABE) Mahmood and Ataullah Ghafoor, Analysis of
This strategy utilizes record progressive system based Classical Encryption Techniques in Cloud
encryption strategies. The documents are scrambled Computing, IEEE Tsinghua Science &
based on the layered access structure. Both figure Technology, Vol.21, February 2016.
content storage and time expenses of encryption are [2]. A.Sahai and B.Waters, Fuzzy identity based
saved [9]. encryption, in Proc. Advances in Cryptology –
Eurocrypt, 2005, pp.457-473.
Disadvantage: [3]. Adi Shamir. Identity-based cryptosystems and
signature schemes, in Proc. of CRYPTO 84 on
Advances in cryptology, pages 47–53. Attribute based data sharing scheme revisited
SpringerVerlag New York, Inc., 1985. in cloud computing, IEEE Transactions on
[4]. V.Goyal, O.Pandey, A.Sahai and B.Waters, information forensics and security, Vol.11, No.8,
Attribute based encryption for fine grained August 2016.
access control of encrypted data, in proc. ACM [13]. G.K.Sandhia, G.K.Bhaskar, secure data sharing
conf. computer and communications, 2006. using attribute based encryption in cloud
[5]. J.Bethencourt, A.Sahai, and B.Waters, computing, Journal of Chemical &
Ciphertext policy attribute based encryption, in Pharmaceutical Sciences, Vol.9, December 2016.
proc. IEEE symposium security and privacy,
2007. Cite this article as :
[6]. K.Meena,S.Vinodhini, T.Pallavi & R.Vasugi,”
Surveillance Based Gcm Home Security System Navin Sethiya, Hrishikesh Patel, Akshay Harshe, Alekh
Gaigole, Harshvardhan Donadkar, Prof. Priya Karemore, "A
Using Object Motion Detection”,International
Survey on Secure User Data Transaction using Attribute -
Innovative Research Journal of Engineering Based Encryption Scheme over Cloud Data", International
and Technology,pp.44-47,2016. Journal of Scientific Research in Computer Science,
[7]. S.Rifki, Y.Park, and S.Moon, A fully secure Engineering and Information Technology (IJSRCSEIT),
ISSN : 2456-3307, Volume 5 Issue 1, pp. 433-437, January-
ciphertext policy attribute based encryption
February 2019.
with a tree-based access structure, Journal of Journal URL : http://ijsrcseit.com/CSEIT1951110
Information Science and Engineering, Vo.31,
pp.247-265,2015.
[8]. G.Wang, Q.Liu and J.Wu, Hierarchical
attribute based encryption for fine grained
access control in cloud storage services, in Proc.
ACM conf. computer and communication
security, 2010.
[9]. K.Yang, X.Jia, K.Ren and B.Zhang, Dac-Macs:
Effective data access control for multiauthority
cloud storage systems, in Proc. Of IEEE
Infocom, 2013.
[10]. Shulan Wang, Junwei Zhou, Joseph K.Liu,
Jianping Yu, Jianyong Chen and Weixin Xie,
An efficient file hierarchy attribute based
encryption scheme in cloud computing, IEEE
Transactions on information forensics and
security, Vol. 11, No.6, June 2016.
[11]. Ximeng Liu, Jiafeng Ma, Jinbo Xiong, Qi Li, Jun
Ma, Ciphertext – policy weighted attribute
based encryption for fine grained access control,
International conference on Intelligent
networkings and collaborative systems, 2013.
[12]. Shulan Wang, Kaitai Liang, Joseph K.Liu,
Jianyong Chen, Jianping Yu, Weixin Xie,
ABSTRACT
Security plays a vital role in today’s mobile world. There are security issues like sniffing of data while accessing
information through open channel. Proper security measures can help to deal with the common security
threats faced by mobile phone users such as data protection, privacy, application and personal information
security. Cryptographic techniques play an important role in protecting communication links and data, since
access to data can be limited to those who hold the proper key. This paper discusses a method to securely access
information in a network by an android mobile application using AES cryptographic technique. The paper
describes a new key sharing algorithm, based on the symmetric key management, for faster and efficient
encryption of data that is suitable for use in a mobile device.
Keywords : Cognitive Radio Networks, Primary User, Secondary Users.
CSEIT195164 | Received : 08 Feb 2019 | Accepted : 21 Feb 2019 | January-February -2019 [ 5 (1) : 438-442 ]
438
R. Gomathyjayam, R. Thilakavathi Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 438-442
the trustworthiness of an entity. Trust is the detection and energy based detection algorithms.
expectation of one entity about the action of another. Coherent sensor is an optimal linear detector for
Reputation and trust have been adapted to wireless known primary signals in presence of white Gaussian
communication Network it can solve many problems noise. However, detector implementation requires.
in the Networks. Demodulation of received signals for achieving the
optimal gains.
Combinationarial Optimization dentification
Algorithm (Coi) Agent-Based Trust Calculation
The COI (Combinationarial Optimization The author (yenumula B.Reddy et al., 2011) is
Identification Algorithm) to defend against such proposed agent based approach algorithm. The
attacks .Cooperative Spectrum sensing has been Cooperation in wireless sensor networks to detect the
shown good performance in improving the accuracy malicious node without any Infrastructure is a recent
of primary user detection .zhenquiri et al., 2013 trend in research. The current models need more
proposed a modified Design an attack model,called storage, Computation, security tools and
cooperative attack in which an attacker injects self- communication requirements. The fail wireless
consistent false data to multiple sensors sensor Network due to limitation of resources. The
simultaneously. A theorem that the center node of a proposed agent based approach eliminates the
cognitive radio network may face uncertainties under computations in the sensor nodes with appropriate
a cooperative attack, especially in the case when a trust factor. The proposed approach uses an agent
large portion of sensors are compromised. A modified based collaborative concept ensure the trust in the
COI algorithm to deal with cooperative attacks. Our successive node in the Path. The proposed agent
algorithm is a good scheme to complement IRIS for based framework uses reputation of neighboring node
cooperative attacks, and can be flexibly adjusted to as part of trust calculation in its successive node.
fulfill the detection delay requirement. Intensively
evaluate our algorithm through simulation, with the Sophisticated Detection Methods
results validating its performance. The original COI is The Spectrum scarcity is becoming a major issue for
an approach for identifying multiple instances of bad service providers interested in either deploying new
data in power system state estimation. The essential services or enhancing the capacity for existing
idea is to construct a partial decision tree using the applications. The author (Amir Ghasemi et al.,2007)is
branch-and-bound method to obtain a feasible proposed that Recent Measurements suggest that
solution with the minimum number of bad data. many portions of the licensed (primary) spectrum
remain unused for significant periods of time.
Clustered Based Algorithms Sensing-based access incurs a very low infrastructure
The spectrum sensing methods can be distributed in cost and is backward compatible with the legacy
three categories i.e. transmitter, receiver. (Dr. Talat primary systems.
Altaf et al.,2013) is propose cluster based algorithms
is based spectrum sensing and interference- III. EXISTING PROCESS
temperature based detection algorithms. From these,
transmitter detection based methods are a preferred The T-CSS (Traditional collaborative spectrum
way of sensing for presence/absence of spectral holes. sensing) protocol delays in data transmission and
These methods can be implemented through various unaware of secondary user selection for licensed
techniques including coherent detection, feature bandwidth and interference occur in unlicensed
ABSTRACT
We all search on google for something and get the results in the form of different websites with some
description. We generally click on first or second website links if results are not found we go down on google
page. The website ranking is given by search engines by different criteria. Last website won’t be seen by none
of the people in most cases and first website will be having a great market compared to last website. So we need
to help the last website to be moved up in results and help in generating revenue and have good rank on
searching by giving feedback. This system will provide the difference between the first website and last website
on the google results and will provide the feedback to the last website like content, links, images used by first
website which helps the last website to be used in his webpage. This system is user friendly which is built on
HTML as front end and Python flask as back end and used python package beautiful soup to parse HTML data
and to automate browser behaviour with python. This system is done on web mining which has three
categories firstly web content mining in which we scan the web pages and get to know the links, text, images
used. Secondly web usage mining in which reports are generated after analysis which contain the details of text,
images, links. Finally the web structure mining states that structural summary of website.
Keywords : Beautiful Soup Package, Web Crawling, Feedback, Python- Flask, Searching Results, Web Mining,
Website
CSEIT195135 | Received : 01 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 443-447 ]
443
Shaik Muzammil, Sai Kiran Yerramaneni Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 443-447
by the proposed method. Relevant Web pages are provided to webpage to increase its rank with respect
fetched and displayed irrespective of keyword to first page.
matching.
A. Implementation
Web Content Mining (WCM) concerns with retrieval
of information from WWW in a structured form and
thereby indexes the information for quick retrieval.
It is the process to extract useful information from
web documents contents. The documents consist of
images, audio, video, text files, structured records etc.
Figure 2 : Search bar to search queries
WCM technique is used on web documents and the
results page obtained from a search engine.
Here we can search for anything we get the weblinks
what the google has described in the google search.
II. METHODS AND MATERIAL
Algorithm
checked query. Which helps the others who are International Conference on Advances in
designing the web page what to put in the webpage Computer Engineering, IEEE, 2010
and how the content resides on webpage. For the [8]. Frank McSherry "A Uniform Approach to
future work, consider the SEO tools and machine Accelerated PageRank Computation", ACM,
learning techniques for ranking the web page ranking 2005
not by factors.
ABSTRACT
Heart attack is most common disease that engulfs the patient’s precious life. This disease attacks a man so in a
flash that it barely gets treated. Many systems that detect heart attack came into the picture but they do have
many flaws. Some system does not work properly in cold weather and other doesn’t give accuracy. To have a
solution for Heart attack utilization of IoT and sensor system could be beneficial. Heart Attack Early Prediction
System predicts the Heart rate and accordingly sends the notification to the patient’s doctor and acquaintances.
Keywords : Heart Attack, IoT (Internet Of Things), Health Parameters, Heart Disease Prediction, Oximeter,
Heart rate sensor, Android App.
CSEIT1951120 | Received : 12 Feb 2019 | Accepted : 24 Feb 2019 | January-February -2019 [ 5 (1) : 448-451 ]
448
Shweta Gajbhiye et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 448-451
IOT is the network of devices such as vehicles and et al. The models are trained and validated against a
home appliances that contain electronics, software, test dataset. Classification Matrix Methods are used
sensors, actuators, and connectivity that allows to evaluate the effectiveness of the models. Neural
these things to connect, interact and exchange data. Network is Difficult to understand. The system has
Embedded with the technology, these devices can 89.9 percent accuracy according to the Research[3].
communicate and interact through internet, and
they can be remotely monitored and controlled. Distributed computing has been incorporated in a
health care framework. The creators have
• Sensor Technology introduced a cloud-based keen healthcare
The capacity to recognize changes in the physical monitoring framework (CIHMS) for giving
status of things is additionally fundamental for restorative input to a patient through the cloud.
chronicle changes in the earth. In such manner, Albeit cell phones are constantly viewed as a
sensors assume an urgent job in overcoming any promising instrument to screen and deal with the
issues between the physical and virtual universes, patient's own health status, these gadgets have some
and empowering things to react to changes in their innate restrictions in calculation or information
physical condition. Sensors gather information concentrated undertakings. ECG monitoring system
from their condition, producing data and bringing contains WI-FI Bluetooth and Zigbee. ECG signs
issues to light about setting. For instance, sensors in were gathered and were transmitted to the IOT
an electronic coat can gather data about changes in cloud utilizing WI-FI. This information were send
outer temperature and the parameters of the coat to the family of the patient [4].
can be balanced in like manner.
Remote health care framework for monitoring
II. REVIEW OF LITERATURE electrocardiographic and temperature information
has been introduced in [5]. The framework
Milan Kumari et al. fathom cardiovascular disease comprises of three modules, in particular, an
dataset utilizing diverse information mining equipment module, Bluetooth module, and show
calculations, for example, Support Vector Machine, module. The equipment module is utilized for
Artificial neural systems (ANNs), Decision Tree, and information securing. The Bluetooth module is
RIPPER classifier. The creators break down the utilized for information transmission. At long last,
execution of these calculations through a few the information is shown by utilizing the
factual investigation factors, for example, presentation module. The obtained clinical
affectability, specificity, exactness, mistake rate. A information is sent to a database server by utilizing
choice emotionally supportive network for GPRS or Wi-Fi.
conclusion of Congenital Heart. Using data mining
and artificial neural networks ,the system predicts The exhibitions of the framework have been tried
Heart disease with nearly 100% accuracy. [1] on various patients and it typical arrhythmia
database.
Niti Guru et al. [2] connected a neural system for
forecast of heart disease, circulatory strain and has been discovered that the introduced framework
sugar. A model Intelligent Heart Disease Prediction is extremely useful for the doctors[5].
System (IHDPS) in view of information mining
procedures is introduced by Sellappan Palaniappan
A walking framework for monitoring the physical Heart Attack Early Prediction System could contain
restoration patients has been accounted for in [6]. Arduino board and a Wi-Fi module. The Heart Beat
The framework comprises of a multi-sensor-based sensor can begin detecting heart rate readings. If the
monitoring gadget, a cell phone with customer Heart beat will be above 120 bpm then the patient
application, an administration situated engineering will be in the danger situation. If the oxygen level
based server arrangement, and an application. The will be below 80 bpm then again, the patient will be
framework has been tried in a controlled condition considered in the dangerous situation. Likewise,
comprising of some healthy volunteers and some with the utilization of Wi-Fi module it will transmit
congestive heart disappointment patients. The test the information over web. The framework will
outcomes demonstrate that the introduced begin monitoring the heart rate of patient and
framework can identify and screen congestive heart instantly the heart rate goes above or beneath as far
disappointment and it can send criticism to the as possible the framework will send notification on
attendants for patient development [6]. the Android Application.
Ongoing universal health care framework for notification in the Android Application. An android
monitoring ECG motions by utilizing cell phone has application will track the heartbeat of specific
been exhibited in [7]. By utilizing this framework, patient and screen it effectively and give the crisis
the client can screen his ECG flag. The creators message on odds of Heart Attack.
have introduced a calculation for unusual heartbeat
detection and irregular heartbeat check delineate). III. CONCLUSION
The execution of the introduced framework has
been assessed against the MIT-BIH It has It has Heart disease is one of the major cause that leads to
been accounted for that the framework can death and early prediction of heart disease is very
distinguish at a top with a win rate of 97.8 percent important for every one. Garmin is a smart watch
and it is additionally ready to recognize strange and it predicts the heart attack but it does not work
heartbeat condition with a win rate of 78.9 percent. accurately in cold weather. Fit Bit is another
An unavoidable healthcare framework empowering alternative but even it has many flaws i.e. while the
self-administration for constant the introduced tracker is charging, patient cannot move and it is
framework in [8] comprises of patient health expensive too.Heart Attack Early Prediction System
monitoring framework, status logging, and social has many pros Over the existing solutions. It takes
sharing of the recorded data. The framework has two inputs i.e. Pulse rate and oxygen level of the
been executed by a cell phone, a wearable multi- patient to have the accuracy. It transmits the
detecting gadget contains pulse sensor and Notifications to the patients doctor and
temperature sensor, an administration situated acquaintances.
engineering for correspondence, and smaller scale
blogging administrations. The framework has been IV. REFERENCES
tried on 16 patients. The test outcomes demonstrate
that the introduced framework is anything but [1]. Milan Kumari, Sunila Godara, Comparative
difficult to learn and advantageous to use by endless Study of Data Mining Classification Methods
patients. in Cardiovascular Disease Prediction, IJCST
Vol. 2, Issue 2, June 2011.
[2]. Niti Guru, Anil Dahiya, Navin Rajpal, Cite this article as :
Decision Support System for Heart Disease
Diagnosis Using Neural Network, Delhi Shweta Gajbhiye, Bharati Vyas, Shrushti
Business Review, Vol. 8, No. 1, January-June Shrikhande, Anshika Janbandhu, Komal Nagpure,
2007. Mrunali Agashe, "IoT Based Heart Attack Early
[3]. Sellappan Palaniappan, Rafiah Awang, Prediction", International Journal of Scientific
Intelligent Heart Disease Prediction System Research in Computer Science, Engineering and
Using Data Mining Technique, 978-1-4244- Information Technology (IJSRCSEIT), ISSN : 2456-
1968-5/08/25.00 2008 IEEE. 3307, Volume 5 Issue 1, pp. 448-451, January-
[4]. http://www.nlm.nih.gov/medlineplus/magazi February 2019.
ne/issues/winter11 Journal URL : http://ijsrcseit.com/CSEIT1951120
[5]. Bourouis, A., Feham, M., and Bouchachia,
A.(2011), Ubiquitous Mobile Health
Monitoring System for Elderly (UMHMSE),
International Journal of Computer Science
and Information Technology, Vol.2, No. 3,
June, pp. 74-82
[6]. Yuce, M. R.(2010) Implementation of
wireless body area networks for healthcare
systems, Sensor and Actuators A:Physical,
Vol. 162, No. 1, July, pp. 116-129
[7]. Lei Clifton, David A. Clifton, Marco A. F.
Pimentel, Peter J. Watkinson, and Lionel
Tarassenko (2014), Predictive Monitoring of
Mobile Patients by Combining Clinical
Observations with Data From Wearable
Sensors, IEEE Journal of Biomedical and
Health Informatics, Vol. 18, No. 3, May , pp.
722-730
[8]. Parane, K.A., Patil, N.C. ; Poojara, S.R. ;
Kamble, T.S(2014) Cloud based Intelligent
Healthcare Monitoring System, In the
proceedings of International Conference on
Issues and Challenges in Intelligent
Computing Techniques (ICICT), February 7-
8, Ghaziabad, Indian, pp. 697-701
ABSTRACT
Women biggest issue we are facing today. Many apps have been developed to provide safety to women through
Android phones. Many of the times government conduct different awareness events for stopping crime against
women. But that's not enough; there are various kinds of crimes women are facing today. Now it's time to aid
the roots of these crimes. This paper presents Shakti, an Android Application for mapping of crime against
women. This will help the government to identify which crime has the highest frequency in a particular area
and can implement an appropriate campaign for aiding its root cause. In case of an emergency, the victim can
send its location along with a help message just by clicking the volume button 5 times. Also, the victim can
reach-out to NGO for help. Shakti will feel like having family power with you at any time.
Keywords : Android, Women, Crime, Mapping, Location, Help message, NGO.
I. INTRODUCTION that the government runs for helping the victims are
appreciable. How about not letting any women be a
From past years, it has been recorded that the graph victim? For this, a study is needed for every area and
of crime against women has risen. Though the list of the type of crime occurring most frequently.
NGO's, Women Empowerment campaigns, safety
applications, and more steps for the safety of women "Dowry" can be aided with a literate society.
has continuously risen with time, the crime graph is "Domestic Violence" needs a little work on the
still incrementing. There are various government mindset of the family; in-laws. "Rape" and "Sexual
bodies as well as private organizations working for Assault" can be stopped if the females are equipped
women empowerment and helping the victims. But with right safety tools, and self-defense training.
the call of today is to find the root cause of these
crimes and treat it accordingly. Rape, Sexual assault, A. Existing Systems:
Domestic violence, Dowry, these are major of the As a part of a literature survey, we investigated some
crime list. Everyone is talking about empowering applications that offer the same or similar services for
women, blaming society. What is making a society Android and other platforms. The aim is to see how
guilty? Is its people with narrow thinking and evil these applications work and to see how they can be
minds, and these are the causes of illiteracy, lack of improved.
life values, in short- the mindset of people.
The existing women safety apps:
In everyday Newspaper, some areas are in headlines Women Safety: This app is offered by Awesome Apps
for "Rape" and Sexual "Assault cases". Some areas are Inc. Released on 28th Aug 2015. With just a tap of a
in the headline for "Domestic Violence". The projects button, the app sends an e-mail to preconfigured
CSEIT1951119 | Received : 12 Feb 2019 | Accepted : 24 Feb 2019 | January-February -2019 [ 5 (1) : 452-455 ]
452
Diksha Ingle et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 452-455
email ID(s) along with your location and a link to Limitation : You to keep this women safety app
Google Map. The app also captures 2 pics, one with always running in the background which can drain
front camera and the other with the back camera, the battery of your phone. It does not show every
and a video or audio clip and uploads it to our server. area of information. It gets crashed in cases.
A link to the pic, audio or video is emailed to a
preconfigured email Id(s). redEye - Women Safety: This is a very useful app for
women safety. It does not need any additional action
Limitation: It is not useful in case of emergency. Also, by the user in any emergency situations. The app
there is an issue in managing phone numbers. Also, itself let your dear ones know that you are in danger
the panic message has no notification, so no use if the through an alert alarm. In this app, the user will
other sees it later. choose the source and the destination. The redEye
app then keeps tracking you. If the app finds that the
Raksha, A Women's Safety App: This app is offered user's path has deviated or the user is idle in the same
by Portal Perfect, released on 27th May 2018. This place for a configured duration, then the app will
app understands the worries and problems of dear trigger the alert. Once you reach your destination
ones, be it your child, mother, daughter, sister or safely you can manually disable the app.
wife. By using this application you can check their
current location. The special feature of this app is Limitation: This app only allows 2500 uses per day by
"Are you in trouble" button. all users. More than 5000 people have downloaded
the app, so only half or less than half users are able to
Limitation: The emergency messages are not able to use the app.
send. It also failed working many times.
Here, we introduce an android app that ensures the
My Safetipin: Personal Safety & Women Safety App. safety of women. It reduces the risk and helps us in
This app gives safety scores to an area and helps you need by identifying the location of a person who is in
to get alerts when you enter in an unsafe area. It danger.
helps in finding the safest route for you. You can also
choose the alternate safe location when you give II. PROPOSED SYSTEM
Google maps the access of this women safety app.
SafetiPin collects primary data on Women Safety in For the need of surveying various areas and
public spaces at night, on a number of parameters. implementing appropriate programs in that area to
• Lighting diminish the roots of crime against women, we have
• Visibility: Are there ‘eyes on the street'. Can developed an android application SHAKTI. In today's
others see you world android phone is a basic thing which everyone
• Diversity: Presence of women and children carries, with SHAKTI in your android phone women
around now will feel secure and protected all the time.
• Crowd: How densely crowded is the area Following are the features of our Android application:
• Public Transport: How close it is The user will rate a type of crime for their particular
• Walk Path: Is there a proper place to walk area. This data will be graphically represented on our
• Security: Are police or private security nearby. website.
• Openness: Can you see all around
• Feeling: How safe do you feel
In cases when the victim is unable to report against (2)Server Side: Data entered by the users (members
crime to the police, the victim can complain to the registered, crime reported, etc.) via the app is
social NGO through this application. uploaded to the web server, the crime details for
The user will save three contacts of three family various areas will be graphically represented on the
members. Whenever the user feels any danger like website and complaint is sent via text message to
crime coming its way, the user can press volume key registered NGO for further processing and
of its Android phone five times and an emergency authenticity. Also, admins get all the privileges
message for help will be delivered to their family through this server.
members along with the location URL through GPS.
Family members will also be notified if the victim's BLOCK DIAGRAM
phone battery is below 20%.
Shakti: An Android app for mapping of crime against
women is implemented into two modules: (1) Client-
side, (2) Server Side.
Next, the users need to enter three family members Shakti android application is being implemented
contact number with an emergency message. In the using the following technologies: (1) Android (2) Java
situation of any crime, the user will have to press the (3) SQL (4) Cloud (5) Web Technologies (6) Database
volume button five times. Saved emergency message (7) GPS
will be forwarded to the saved contact numbers along
with the victim's location through GPS. (1)Android: Android is the most widely used mobile
OS motorized by Linux kernel. This is the first
The user can also ask for help to the NGO directly complimentary platform which is robust and is
through our application. expected to gain much popularity. It was developed
by Google team and allows writing managed code in
In cases if the user’s mobile battery drains below 20%, the Java language. The current system is developed
the app will send an alert message to the dear ones. on the basis of android platform. Android utilizes a
Also user can set a secret code in the app. When the custom virtual machine that was designed to
dear ones want to reach the user, they will send this optimize memory and hardware resources in a smart
secret code as a text message and they will phone. Android does not differentiate between the
automatically get the users mobile location through phone’s core applications and third-party applications.
GPS . Any application that is built will definitely have
equal access to a phone’s capabilities providing users
with a broad spectrum of applications and services (2) different areas. Thus, the social bodies working for
Java: Java is an object-oriented, class-based, the security of women can implement an aid to those
concurrent, secured and general-purpose computer- areas to halt the crimes.
programming language.
V. ACKNOWLEDGEMENT
After front-end elements are finalized java classes
and packages are used to make them work. First, and foremost we would like to thank God for
the wonderful opportunities and challenges he has
(3) SQL: Structured Query Language or SQL is a given to us. We express our sincere gratitude to our
standard Database language which is used to create, guide Prof. Prasanna Lohe, Head, Department of
maintain and retrieve the relational database. It is Computer Science and Engineering for his valuable
particularly used to work with structured data where contribution in fulfilling the requirement related to
there is a relation associated within the data itself. the project and for providing his valuable guidance,
(4) Cloud: Cloud storage involves stashing data on patience and for encouraging us to do our best.
hardware in a remote physical location, which can be
accessed from any device via the internet. Clients Cite this article as :
send files to a data server maintained by
a cloud provider instead of (or as well as) storing it on Diksha Ingle, Pritee Dhale, Priyanka Palsapure, Sagar
their own hard drives. Pazare, Dhawal Chimurkar, Niket Farfad, Prof.
(5) Web Technologies: The data collected in this Prasanna Lohe, "Shakti : An Android App for
android women safety application we be displayed Mapping of Crime against Women", International
using website. Journal of Scientific Research in Computer Science,
(6) Database: A database is an organized collection of Engineering and Information Technology
data, generally stored and accessed electronically (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
from a computer system where databases are more 452-455, January-February 2019.
complex they are often develop using formal design Journal URL : http://ijsrcseit.com/CSEIT1951119
and modeling techniques.
Android comes with in-built SQLite database. SQLite
supports all the relational database features.
(7) GPS: GPS or Global Positioning System is a
satellite navigation system that furnishes location and
time information in all climate conditions to the user.
GPS is used for navigation in planes, ships, cars and
trucks also. The system gives critical abilities to
military and civilian users around the globe. GPS
provides continuous real time, 3-dimensional
positioning, navigation and timing worldwide.
IV. CONCLUSION
2Assistant Professor, Department of Computer Technology, KDK College of Engineering, Nagpur, Maharashtra,
India
ABSTRACT
Video data hiding is yet a vital research subject because of the structure complexities included. As of late, there
are loads of frameworks are present. The general population designed a substantial thing to ensure the data and
there are bunches of hiding procedures are to be developed for security reason. In any case, that strategies can
be hack by unapproved clients is downside in existing frameworks so that propose the new framework for
example Data hiding behind the video utilizing forbidden zone and selective embedding. We propose another
video data hiding technique that makes utilization of eradication amendment ability of Repeat Accumulate
codes and prevalence of Forbidden Zone Data Hiding. This framework makes utilization of redress capacity of
duplication store codes and favorable position of forbidden zone data hiding is utilized. In this examination the
encryption and decoding method is utilized to give the security key. Without that key, nobody can see the first
data. This system is utilized to shield the database from unapproved and the dangerous powers .It has
substantial deletion ability of data hiding.
Keywords: Data Hiding, Forbidden Zone, Quantization Index Modulation [QIM], Repeat Accumulate Codes,
Selective Embedding
I. INTRODUCTION
Consequently, video data hiding keeps on
Data hiding is the way toward embedding data into establishing a functioning examination region. Data
a host medium. When all is said in done, visual and hiding in video arrangements is performed in two
real media are favored because of their wide nearness noteworthy ways: bitstream-level and data-level. In
and the resilience of human perceptual frameworks bitstream-level, the redundancies inside the present
included. pressure measures are misused. Ordinarily, encoders
have different alternatives amid encoding and this
In spite of the fact that the general structure of the opportunity of choice is appropriate for control with
data hiding process does not rely upon the host media the point of data hiding. In any case, these strategies
type, the strategies change contingent upon the idea exceptionally depend on the structure of the
of such media. For example, picture and video data bitstream; henceforth, they are very delicate, as in
hiding share numerous regular focuses; be that as it much of the time they can't endure any organization
may, video data hiding requires progressively transformation or transcoding, even with no
complex structures because of the extra fleeting noteworthy loss of perceptual quality. Subsequently,
measurement. this sort of data hiding techniques is by and large
CSEIT1951123 | Received : 15 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 456-461 ]
446
Ruchika S. Bhambore. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 456-461
proposed for delicate applications, for example, utilize the BCH code to expand blunder amendment
verification. capacity. The creators perform 3D interleaving so as
to dispose of the nearby burst of mistakes. Also, they
Then again, data-level techniques are increasingly propose a worldly synchronization procedure to
strong to assaults. Subsequently, they are reasonable adapt to fleeting assaults, for example, outline drop,
for a more extensive scope of utilization. addition, and rehash. In this paper, we propose
Notwithstanding their delicacy, the bitstream-based another square based selective embedding type data
techniques are as yet alluring for data hiding hiding structure that exemplifies Forbidden Zone
applications. For example, the excess in square size Data Hiding (FZDH) and RA codes as per an extra
choice of H.264 encoding is misused for hiding data. fleeting synchronization instrument. FZDH is a down
In another methodology, the quantization parameter to earth data hiding strategy, which it appeared to be
and DCT (Discrete Cosine Transform) coefficients are better than the traditional Quantization Index
changed in the bitstream-level. In any case, the vast Modulation
majority of the video data hiding techniques use
uncompressed video data. Sarkar proposes a high (QIM) .RA codes are as of now utilized in picture
volume change area data hiding in MPEG-2 videos. and video data hiding because of their vigor against
They apply QIM to low-recurrence DCT coefficients eradication. Vigor permits taking care of
and adjust the quantization parameter dependent on desynchronization among embedder and decoder
MPEG-2 parameters. that happens because of the distinctions in the chose
coefficients. So as to join outline synchronization
Besides, they differ the embedding rate contingent markers, we segment the squares into two gatherings.
upon the sort of the casing. Therefore, inclusions and One gathering is utilized for edge marker embedding
eradications happen at the decoder, which causes and the other is utilized for message bits.
desynchronization. They use Repeat Accumulate (RA)
codes so as to withstand deletions. Since they adjust By methods for basic standards connected to the
the parameters as per the sort of casing, each edge is edge markers, we present a specific dimension of
handled independently RA codes are as of now power against casing drop, rehash, and creepy crawly
connected in picture data hiding. Versatile square assaults. We use precise RA codes to encode message
choice outcomes in desynchronization and they use bits and edge marker bits.
RA codes to deal with eradication. Additions and
deletions can be additionally taken care of by Each piece is related to a square living in a gathering
convolutional codes. The creators use convolutional of casings. Irregular interleaving is performed
codes at embedder. In any case, the weight is put on spatiotemporally; thus, reliance on nearby attributes
the decoder. Different parallel Viterbi decoders are is diminished. Host flag coefficients utilized for data
utilized to address desynchronization mistakes. In hiding are chosen at four phases. In the first place,
any case, it is seen that such a plan is effective when outline determination is performed. Casings with an
the quantity of chose host flag tests is significantly adequate number of squares are chosen. Next, just
less than the absolute number of host flag tests. 3-D some foreordained low-recurrence DCT coefficients
DWT space is utilized to conceal data. They use LL are allowed to conceal data. At that point, the normal
subband coefficients and don't play out any versatile vitality of the square is relied upon to be more
determination. In this way, they don't utilize blunder prominent than a foreordained limit. In the last stage,
redress codes strong to eradication. Rather, they the vitality of every coefficient is contrasted with
another edge. The unselected squares are marked as non-covering, which can be accomplished by
eradication and they are not handled. For each utilizing a base quantizer and moving its recreation
chosen square, there exists a variable number of focuses relying upon m, like Dither Modulation. A
coefficients. These coefficients are utilized to install run of the mill embedding capacity that utilizes a
and unravel a solitary message bit by utilizing the uniform quantizer. we need to consider that the In
multi-dimensional type of FZDH that utilizes cubic the unrivaled field, the hiding advancement, for
cross-section as its base quantizer. example, least critical bit(LSB) extra, is done in the
predominant field, while change space techniques;
II. LITERATURE REVIEW conceal data in another area, for example, wavelet
space. Least noteworthy piece (LSB) is the
The writing review is the most critical advance in the unassuming type of Steganography. LSB depends on
product improvement process. Before building up the infusing data in the littlest huge piece of pixels,
device it is important to decide the time factor, which data to a minor change on the spread picture,
economy n organization quality. When these things r which is not noticeable to the human eye. Since this
fulfilled, ten following stage is to figure out which strategy can be effectively part, it is more fragile to
working framework and language can be utilized for assaults. LSB framework effectively affects the
building up the instrument. When the software arithmetical data of picture like a histogram.
engineers begin assembling the instrument, the
developers need a great deal of outside help. This Safeguards could be the alarm of a shrouded
help can be acquired from senior software engineers, correspondence by simply testing the Histogram of a
from a book or from sites. Before building the picture. A decent answer for reject this deformity
framework the above thought r considered for was LSB indistinguishable. LSB Identical was an
building up the proposed framework. Forbidden incredible advance forward in Steganography
Zone Data Hiding (FZDH) is presented in [8]. The strategies and numerous others get plans from it.
technique relies upon the Forbidden Zone (FZ) idea, Downsides of Existing System are that the strategy
which is characterized as the host flag go where no given in Existing framework is effectively broken.
change is permitted amid data hiding process. The measure of the put-away data is little.
So as to satisfy the prerequisite of common Building up a steganography system that is fit for
prohibition, the reproduction purposes of the hiding data in a video le lies at the core of this
quantizers that are recorded by various m ought to be undertaking, and it is alluring that the resultant
arrangement is as secure as could be expected under We talk about parts of our underlying examination,
the circumstances. Lithe plan strategies enable us to which included a wide examination of steganography
assess and enhance our executed systems as we (utilizing sound, picture and video compartments).
advance. Moreover, our overview of the writing and The understanding given by this exploration in
our starter explore (see A.2) yielded incredibly uenced the plan choices that pursue.
constrained data on the best way to plan and execute
a video steganography arrangement of this nature. In Steganography and Steganalysis are in a ceaseless
light of this, coordinated advancement would enable fight. At whatever point a decent steganography
us to roll out considerable improvements to the system is built up, another Steganalysis method is
structure and execution anytime something that can likewise created endeavouring to overcome it
only with significant effort be accomplished with Steganalysis is the workmanship and exploration of
other programming designing models. identifying mystery messages shrouded utilizing
steganography. Once there is proof that a message is
concealed, the objective of steganography is crushed
regardless of whether the message was not separated.
In spite of the fact that steganography methods may
clearly straightforward to the human eyes, assaults on
them are yet conceivable. Any embedding procedure
definitely leaves follows in the stego-item and
modifies a portion of its properties, which present
irregular attributes and some debasement as far as
quality. Consequently, Steganalysis can be arranged
into two classes: inactive Steganalysis and dynamic
Steganalysis. Aloof Steganalysis distinguishes the
nearness or nonappearance of shrouded message or
recognizes the embedding calculation utilized. While
dynamic Steganalysis change, extricate or obliterate
the concealed message or concentrate a portion of its
traits, for example, message length.
It is at this crossroads that we might want to bring up In the first step, frame selection is completed and the
that our exploration has been considerably more test a selection of frames are managed block-wise. For
than we could have predicted. Our decision of a each block, only a first bit is hidden. After obtaining
coordinated improvement process has been a 88 DCT of the block, energy check is performed on
demonstrated gift on various events. While most of the coefficients that are predefined in a mask. Selected
this section will report the structure and execution of proficient of variable length are used to hide data bit
our last arrangement, we will likewise feature how m. m is a supporter of message bits or frame
our plan and usage have changed with the emphases. synchronization markers. Message sequence of each
Being in contact at the last phase of usage has been an group is obtained by using RA encryptions for T
unpredictable procedure and a few essential exercises consecutive frames. Each block is assigned to one of
have been learned en route. these groups at the start. After the inverse convert
host frame is obtained. Decoder is the dual of the
In this paper, we proposed another video data [1] Ersin Esen, A. Aydin Alatan,\Robust Video Data
hiding structure that makes utilization of deletion Hiding Using Forbidden Zone Data Hiding And
redressability of RA codes and prevalence of FZDH. Selective Embedding ",IEEE ,VOL. 21, NO. 8,
The strategy is likewise powerful to outline control AUGUST 2011.
assaults through casing synchronization markers. To [2] K.Mohan, S.E.Neelakandan \Secured Robust
begin with, we thought about FZDH and QIM as the Video Data Hiding Using Symmetric Encryption
data hiding strategy for the proposed structure. We Algorithms ", IJIRE ,VOL.6,DECEMBER 2012
saw that FZDH is better than QIM, particularly for [3] R. Ravi Kumar V., Kesav Kumar \Selective
low embedding mutilation levels. The structure was Embedding and Forbidden Zone Data Hiding for
tried with MPEG-2, H.264 pressure, scaling and Strong Video Data Thrashing ",IJETT ,VOL.
casing rate transformation assaults. Ordinary 4,SEPTEMBER 2013
framework parameters are accounted for mistake-free [4] Mr.Sudheer Adepu, Mr.P. Ashok , Dr.C.V.Guru
translating. The outcomes show that the structure Rao \A Security Mechanism for Video Data
can be effectively used in video data hiding hiding " ,IJCTT,VOL.4, August 2013
applications. For example, Tardos fingerprinting, [5] Resoju Omprakash and D. Jyothi \Block Based
which is a randomized development of double unique Adaptive Videodata Hiding Technique", IJMSTH,
mark codes that are ideal against agreement assault, 2012
can be utilized inside the proposed structure with the [6] Mr. Mritha Ramalingam \Stego Machine Video
accompanying settings. The length of the Tardos Steganography using Modified LSB Algorithm ",
unique mark is AC2 0 In 1 ε1, where A will be an World Academy of Science, Engineering and
element of false positive likelihood (ε1), false Technology,2011
negative likelihood, and the greatest size of the [7] W. Bender D. Gruhl,N. Morimoto,A. Lu,
colluder alliance, (Co). We likewise analyzed the \Techniques for data hiding ", IBM SYSTEMS
proposed structure against the standard JOURNAL, VOL.35, NOS 3 and 4, 1996
watermarking technique, JAWS, and a later
quantization-based strategy. The outcomes Cite this article as : Ruchika S. Bhambore, Ashwini B.
demonstrate a huge predominance over JAWS and a Gurudeo, Shital B. Borkar, Pallavi G. Thul, Chanchala
V. Udepurkar, Prof. Anup Bhange, "Robust Video
practically identical execution with. The analyses
Data Hiding in Forbidden Zone", International
likewise revealed insight into conceivable
Journal of Scientific Research in Computer Science,
enhancements for the proposed technique. To begin Engineering and Information Technology
with, the system includes various edges (T0, T1, and (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
T2), which are resolved physically. 456-461, January-February 2019.
Journal URL : http://ijsrcseit.com/CSEIT1951123
The scope of these limits can be examined by
utilizing a preparation set. At that point, a few
heuristics can be derived for the legitimate choice of
these edge esteems. Moreover, joining of the human
visual framework based spatiotemporally adjustment
of data hiding technique parameters as in stays as a
future bearing.
ABSTRACT
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a
variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the
Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s’
Internet wave connected 1.2 billion subscribers while the 2000s’ mobile wave connected another 2.4 billion.
Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of
data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid,
and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast
across several industry verticals along with increases in the number of interconnected devices and diversify of
IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many
challenges to overcome. The Internet of Things combines actual and virtual anywhere and anytime, fascinate
the attention of both constructor and hacker. Necessarily, leaving the devices without human interference for a
long period could lead to theft and IoT incorporates many such things. In this paper, we are briefly discussing
technological perspective of Internet of Things security. Because, the protection was a major concern when just
two devices were coupled. In this context, security is the most significant of them. Today scenario, there are
millions of connected devices and billions of sensors and their numbers are growing. All of them are expected
secure and reliable connectivity. Consequently, companies and organizations adopting IoT technologies require
well-designed security IoT architectures.
Keywords : Internet of Things (IoT), Sybil Attack, IoT Authentication, IoT Trust, IoT Protocols, IoT Security
CSEIT195193 | Received : 12 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 462-482 ]
462
Dr. Yusuf Perwej et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 462-482
Internet of Things today is consolidation of data, and exposed to attacks by malicious opponent [1]. An
responding to the collected data in a useful way [3]. invasion may compromise an IoT device and use it as
While connecting all our things to the Internet will a platform for launching invasion on other IoT
permit us to advantage insight into our lives and devices. IoT security introduces technological
environment, we can potentially permit others to defiance at the device, network and platform level.
advantage the same insight if security is not managed Therewith, there is the process challenge of
correctly. A couple of security anxiety on a single organizing the security technologies in an end-to-end
device like as a mobile phone can swiftly turn to 60 manner. One thing is certain, when evaluating
or 70 anxiety when considering multiple IoT devices security necessity is that, then IoT is still very much a
in an interconnected business or home. In light of the work in progress. This paper provides an overview of
significance of what IoT devices have access to, it is Internet of Things (IoT) stage in section 2. We are
an essential to understand their security peril [1]. briefly discussing Internet of Things (IoT) threats in
section 3, and in section 4, we describe Internet of
The Internet of Things (IoT) [4] enables everywhere Things scheme. We categorize the reliance in section
communication between various devices. From 5. In section 6, we discuss public key infrastructures
entering patient details to watch post-surgery, from in Internet of Things. In section, 7 and 8 Internet of
parking vehicles to tracking vehicles, from childcare Things design thought for digital certificates and
to elder care, from smart cards to near field cards, protocols. In the last section discuss guidelines for
sensors are making their impendence felt. Sensors secure the IoT devices.
play an important role in the IoT as well. In spite of,
the functionality and operations of the IoT heavily II. INTERNET OF THINGS (IoT) STAGE
depend on the underlying network connectivity
structure. In the opinion of Gartner [5], it is required The IoT requires five stages, from data collection to
that the number of Internet connected devices will data delivery to the end [1] users on or off demand, as
increase from around 28 billion to 50 billion by 2020. shown in figure 1.
In spite of the IoT features everywhere
communication [6] among all kinds of electronic
devices, it inevitably raises security concerns due to
seamless infiltration and automated integration
among all sorts of applications. The IoT works across
miscellaneous networks and standards. Security and
privacy are considered the most important IoT
challenges [7]. In particular, no network is free from
security threats and vulnerabilities. Each of the IoT
layers is uncovered to various types of threats. In the
opinion of Gartner [8] security and risk, concerns
will continue to be the greatest hindrance to IoT
adoption. The market for IoT distinguished security Figure 1. The Internet of Things (IoT) Stage
solutions will dramatically expand in 2017 as current
security providers aggressively retool present In the upstanding stage, sensors collect data from the
capabilities to address IoT security risks IoT devices environment or object under measurement and turn
have often limited resources and may be more it into useful data [9]. Actuators can also intervene to
modify the physical conditions that generate the data. security problems. In the future, maybe around the
The thing may be a constant body (body sensors or year 2020 with IPv6 and the 5G network, billions of
RFID tags) or a dynamic vehicle (sensors and chips) miscellaneous things will be part of the IoT. Privacy
[10]. The actuating and sensing stage involucre and security will be the major factors of worry at that
everything from legacy industrial devices to robotic time [12]. IoT security threats and attacks will
camera systems, water-level detectors, heart rate escalate as the IoT devices become everyday events.
monitors, accelerometers, and air quality sensors. In The security threat is high enough for Gartner to
the secondly data collected on stage first should be estimate spending on IoT security is required to reach
stored and making it obtainable for analysis. If the near $600 million in 2018. In this [13] report,
thing has its own local memory, data can be stored prophecy that 30% of attacks in enterprises will
[7]. The different technologies are appropriate for include IoT. In this section, we are discussing
this purpose, depending on the scenario. The high security problems in three dimensions, components,
performance storage solutions are suggested for based on stage, and architecture.
companies performing data analysis with the
distributed system Hadoop. Normally, IoT 3.1 The Components Based Incursion
components are installed with low memory and low
processing potential [1]. The cloud takes over the As a technology, IoT is peerless since it has a role to
answerability for storing the data in the case of play in consumer, industrial worlds and enterprise.
stateless devices. In the thirdly stage, IoT analyzes The things are diverse in nature, communicating
the data stored in the cloud DCs and provides sensitive data over a distance [13]. The Internet of
intelligent services for work and life in hard actual Things (IoT) is extremely heterogeneous, highly
time as well as analyzing and responding to queries, dynamic, always available, [7] and consequently
then IoT also handle things. The IoT proposal for always vulnerable to attack. Apart from attenuation,
intelligent processing and control services to all stealing, loss, violation, and disaster, data can also be
things homogeneously. In the fourth, data [1] concocted and modified by compromised sensors.
transmission happen in all stage for instance sensors, The figure 2 shows the types of attacks at the
RFID tags [10], processors to controllers, devices, DCs component level in IoT.
to processing units, and end users. In the fifth stage,
delivery of processed data to things on time without
errors or transformation is a sensitive task that must
always accomplish.
3.2 The Stage Based Incursion needed to make sure connected devices on the IoT
can be trusted to be what they intend to be.
The diversify kind of attacks on the five stages of IoT. Accordingly, each IoT device needs a distinctive
Data effusion, sovereignty, [14] violation, and identity that can be authenticated when the device
authentication are the major concerns in the data effort to connect to a main server or gateway. With
perception phase. this distinctive identity in place [15], IT system
administrators can track every device throughout its
3.2.1 Data Effusion lifecycle, communicate securely with it, and inhibit it
from executing detrimental processes. If a device
The data is a precious resource, and if recent events shows unforeseen behavior, administrators can
surrounding the allegations against (for instance, simply revoke its perquisite [16]. In addition, it is
Cambridge Analytica) demonstrate anything, it is compulsory to verify that the data do not change
that you cannot always trust companies to manage during transit. Data authentication could endow
such data responsibly. Specifically, device originality and integrity.
manufacturers are in a prime position to potentially
abuse [14] IoT generating data. Data effusion can be 3.2.4 Data Mislay
internal or external, intentional or unintentional,
authorized or spiteful, involving hardware or Data mislay considered a primus risk for the Internet
software. Data effusion is a solemn threat to of Things. The data mislay dissimilar from data
reliability. As the cloud data move from one renter to effusion in that the latter is a sort of revenge taking
several other renter of the cloud, there is a sedate risk action on the employer or administrator. Data mislay
of data effusion. is losing the work accident due to hardware or
software, lack of success and natural calamity.
3.2.2 Data Sovereignty
3.2.5 Attack on Availability
Internet of Things (IoT) connections growing from 9
billion in 2017 to 24 billion by 2020, it is vital to The Internet of Things continues to increase, which
understand the potential influence data sovereignty in turn spread your organization’s attack surface.
will play for organizations collecting and sharing Many types of attacks have been on every side for a
customer’s individual information. International very long time. What is new is the scale and relative
organizations are now often moving big data across naivety of attacks in the Internet of Things the
borders for analysis and consolidation [2]. Data millions of devices that are a potential sufferer to
sovereignty is the idea that information which has traditional style cyber-attacks, but on a much huge
been transformed and stored in binary digital form is scale and often with limited, if any shield [17]. IoT is
subject to the laws of the country in which it is all about connecting and networking devices that up
located. The IoT encloses all things across the globe until now not on a mandatory basis been connected.
and is hence responsible to sovereignty. This means that all of those devices, whether it is
your new connected sensor or your connected
3.2.3 Data Authentication vehicle, are creating a new entry point in the
network and here upon posing an increasing security
The data can be perceived from any device at any and privacy hazard. In this context, denial of service
moment. The powerful IoT device authentication is (DoS) attack happens when a service that would
usually work is not available. There can be many of vicinal gets formed and these new vicinal [19] are
factors for unavailability, but it generally refers to an all from other end of wormhole tunnel and not in
infrastructure that cannot cope due to capacity transmission range of node therefore, during the
overload [18]. In a Distributed Denial of Service attack lots of control packets are going to exchange
(DDoS) attack, a huge number of systems spitefully from one end of the tunnel to the other in that
attack one target. This is often done via a botnet, vicinal advertisement. Wormhole attack is very
where many devices are programmed to entreaty a strange and arduous to identify. The figure 3 shows
service at the same time. the wormhole attack on IoT.
The wormhole attacks considered as the grievous The man-in-the-middle concept is where an attacker
attacks during IoT routing. In this attack, tunnel is or hacker is looking to intervene and violation
established between two nodes and the packet is communications between two distinct systems. It can
forwarded among each other. These distant spiteful be a hazardous attack because it is one where the
nodes make believe that they are very close to each attacker secretly intercepts [21] and transmits
other so that vicinal nodes forward packets via them. messages between two parties when they are under
If wormhole attack is triggered in the more number
detected by the fusion center, which means that the arduous endeavor. On the physical level, device
attack is eventually in futile. From the protector enclosures are frequently not tamper proof devices
point of view, inferring attacks using all feedbacks can be unlocked and their hardware can be accessed
might treat the topological attack as a fabled alarm, via investigate and pin headers [45]. The device
since only a small subset of nodes are targeted. On central processing units (CPUs) are low-cost
the other hand, inferring attacks using only a few components that frequently have no sophisticated
feedbacks might tolerate from information means to protect their code, data, and tokens for
insufficiency and therefore fabled to detect the external access. This permits an attacker to clone
presence of attacks [40]. Accordingly, there exists a entire devices or manipulate software and data. If the
balance point at which both attacker and defender device is brought into service in an unsupervised
are contented with their own master plan, which is environment, it may be accessed and frame up by a
precisely the notion of Nash equilibrium in game malicious third party without information. Besides,
theory. As an outcome, the game payoff at game IoT devices are frequently based on low-power
equilibrium can be used to study the robustness of a hardware and may only be able to process tokens
network. with a low complexity. This can have an implication
on the robustness of a token, as it can be
V. INTERNET OF THINGS (IoT) RELIANCE reengineered or recovered through a brute force
attack. As an outcome of this, any faith management
The Internet of Things (IoT) can deliver important system for IoT deployments must have the ability to
advantage to our society and economy, enabling dynamically withdraw faith of individual devices.
superior health services, cleaner and secure societies, When faith and security credentials given out at the
more dexterous industries and [41] stimulating new time of manufacturing or deployment, a device is
businesses. On the other hand, data is a sensitive seen as initially honest. A network wide update
subject and customers and end users are wary of mechanism will ideally incorporate a smooth and
sharing data for apprehension that it will fall into the effective patching process, which contains robust
hands of criminals, or using in ways they consider integrity and authenticity examine, minimize service
inappropriate [42]. Faith is the oxygen, which will outages, and permits for a version withdraw if
breathe life into the internet of things. Industry needed.
necessity to show data is secure and that it is properly
treated [43]. Faith and security are based on tokens or 5.2 Secure Key Storage
credentials, provided by a faith management
infrastructure, which are embedded in and The secure storage provision to increase the
potentially shared between devices. The aim of this robustness of reliance tokens used both within an IoT
section is to investigate frameworks that ensure faith system and within its reliance management
as well as communication security between nodes in infrastructure [46]. Passive keystores endow a means
an IoT deployment [44]. to securely save and retrieve credentials cryptographic
operations are carried out [10] outside these stores by
5.1 Reliance and Security from a Device Point of the device’s CPU. Active keystores in contrast, permit
View the internal execution of cryptographic operations
through an application program interface (API), so
IoT devices are vulnerable in many sides, so the credentials are never disclosed.
providing and maintaining faith and security is an
5.3 Reliance and Security from a Network Point of the number one users of the Internet and necessity to
View digital identities for secure operation. As enterprises
seek to transform their business models to stay
During the operation of a network, devices set up competitive, swift adoption of IoT technologies is
stable or unstable communication links with other creating increasing demand for Public Key
peers. These links can be either point-to point or Infrastructures (PKIs) to confer digital certificates for
incorporate a group of nodes. From a device’s point of the increase number of devices and the software and
view, the challenge [47] is to validate the authenticity firmware they run [49]. The secure IoT deployments
and authority of the other peer and to set up a secure need not only faith the devices to be authentic, but
communication link to keep away from attack also faith that the data they collect is real and not
scenarios. For this objective, reliance tokens are changed. If one cannot fault the IoT devices and the
interchange and validated or new session tokens bring data, there is no point in collecting, running
into being. The promise of data integrity, optionally analytics, and executing decisions based on the
in combination with data confidentiality through [48] information gathered.
encryption, provides trustworthiness in the data a
node sends or receives. Data integrity and 6.1 The PKIs Elements
confidentiality provide a foundation to deal with the
principal attack vectors of interception, A public key infrastructure confers the revocation,
transformation and disruption. The data secrecy is distribution, revocation and verification of public
generally conferred through symmetric encryption keys used for public key encryption, and enables
with the advanced encryption standard algorithm as a linking of identities with public key certificates. The
de facto industry standard often implemented directly public key infrastructure describes the policies, the
in hardware. While data integrity confers through procedure, the hardware, the software, and the
message authentication codes or cryptographic hashes people that are used to handle digital certificates [50].
that are attached to the data payload [48]. The peer This means the process of creating, distributing,
authenticity belonging to the problem of how a peer handle, storing, and revoking certificates are all
can validate another peer’s identity before a encapsulate under PKI. The PKI also mention to the
communication link is established. Peer authenticity associations we make with a public key to a person,
can go hand in hand with system availability. For or a public key to a device. It is based on faith, and a
instance, denial-of-service (DoS) way attacks are certificate authority creates this faith. This key
typically external attacks, so the ability to qualify and management lifecycle starts with the creation of a
if necessary to discard data or connection requests [14] key [51]. We make up one's mind on a distinctive
at an early stage can help to reduce such attacks. Proof strength of the key, which would be a certain
of authorization provides commitment that a peer has number of bits, and we make up one's mind what
the authority to communicate with another peer and cipher we would like to use to create the key. Now,
conduct a few actions. we are discussing the PKI elements.
and other existence. Generally known as certificate typically through online certificate status protocol
authorities (CA), these entities provide promise about services.
the parties identified in a PKI certificate. Each CA
keeps going its own root CA, for use only by the CA. 6.1.4 The Central Directories
The certification authority browser forum, also called
a CA & browser forum, is an industry coalition The central directories protect location in which are
founded in 2005 and whose members contain [51] stored and index keys [50]. The central directories
CAs, browser software publishers and other system make certificates accessible to other entities. Since
contributor, who use X.509 digital certificates for other data, such as policies or CRLs necessity to be
authentication and encryption. The CAs forms the published as well, central directories store and make
backbone and the faith anchors of a PKI. They all these data accessible. They are frequently
problem certificates and, in many cases, repeal status executing as lightweight directory access protocol
data regarding the certificates they problem, and servers.
publish both types of products.
6.1.5 The Time Stamping Authorities
6.1.2 The Registration Authorities
When the date and time of the phenomena is
The registration authorities (RAs) act as the front end recorded, we say that it is time stamped. A digital
of certification authorities. A registration authority, camera will record the time and date of a photo being
often called a subordinate CA, problem PKI taken, a computer will record the time and date of a
certificates. The registration authorities are certified document being saved and emended. These are all
by a root certificate authority and authorized to issue instances of a timestamp. Timestamps are essential for
certificates for distinguished uses permitted by the keeping records on when information is being
root. That they are accountable for identifying and reciprocity, created, or destroyed online. In many
authenticating entities that request certificates, and situations, these records are simply utilitarian for us
then dispatching certificate requests to CAs and to know about. However, in some situations, a
routing back the certificate(s) to the implore entity. timestamp is more valuable. The time stamping
In some instance, RAs are just a unique component of authorities are characterized by their ability to
CAs. problem PKI based believable timestamps. Believable
time stamping is a process that keeps track of the
6.1.3 The Validation Authorities creation and alteration of data. This data can be a
program or a document. This process is done in a
A certificate database stores information about trouble free manner and recorded so that no one cans
controversy certificates. Therewith, to the certificate alteration the data, including the owner, without
itself, the database includes validity period and the being informed and it assurance the integrity of the
status of each PKI certificate. The validation data.
authorities (VAs) permit for the validation of
certificates. Validating a certificate in fact comprises 6.1.6 The Certificate Revocation Authorities
many steps for instance; possibly acquire certificates,
verifying signatures, checking the revocation status. A certificate revocation list (CRL) contains digital
It’s normally supposed that VAs only provides certificates that have been invalidated by the
services in connection to check revocation status, emanate certificate authority before their scheduled
expiration date and should no longer be believed. The The connected IoT endpoints share coequal security
CRLs is a type of blacklist and are used by different requirements [47]. A faithful or device identity,
endpoints, including web browsers, to confirm confirm applications and data secured in motion and
whether a certificate is valid and trustworthy. In at rest. These needs translate to authentication,
general, invalidate duties are carried out by a signature and encryption [52]. The industrial sector
dedicated service that belongs to each certificate has placed greater trust on digital certificates for IoT
authority. While either the number of issuing system elements such as controls, applications,
certificates is high, or the complexity of invalidate sensors, devices, switches, and data [23]. The
procedures increases, or so does the number and countless commercial operations, systems and
diversification [51] of CAs, specialized authorities, infrastructure are before controlled through the
CRAs, come to play, whereby a single, centralized Internet. Many devices that use the sensors and
CRA can replace equivalent invalidate services on actuators should follow particular policy and proxy
multiple CAs. When a web browser makes a rules for authentication to authorize the sensors to
connection to a site using TLS, the web server's public their information [53]. Meantime, low cost
digital certificate is investigated for anomalies or solutions in this field have not been conferred as
difficulty, part of this process involves investigating much as needed. At the present, if we want to confer
that the certificate are not catalogued in a certificate the security for the sensors we have to use high-cost
revocation list. These investigate are arduous steps in solutions, which is a dispute with the primary goal of
any certificate-based transaction because they permit IoT to provide lightweight protocols. The need for
a user to calibrate the identity of the owner of the particular commitment and related controls is greatly
site and discover whether the CAs still considers the increased for both industrial and consumer-driven
digital certificate believable. IoT devices. The security is very critical, and one of
the key distinctions between an enterprise PKI and
6.2 The IoT Challenges in PKIs an IoT PKI is the necessity for protecting data and
safe authentication at multiple endpoints. In this
PKI for IoT needs to be dissimilar than an enterprise context, digital certificates are an increasingly famous
PKI. The majority of devices collect transmit and has solution for signing, encryption and authentication.
at least one piece of private, confidential or
proprietary information [47]. Some devices will 6.4 Need the IoT Device Authentication
cross-unencrypted network and cloud services with
varying security levels and requirements. Some The powerful IoT device authentication is needed to
devices will be physically inaccessible. Other devices make sure connected devices on the IoT can be
may be attractive to impersonate in order to [14] gain believed to be what they purport to be. Accordingly,
access to IoT system resources. Comprehension the each IoT device needs a distinctive identity that can
following difficult situation can help organizations be authenticated, when the device effort to connect to
plan certificate policies upon which the PKI a central server. With this distinctive ID in place, IT
environment will be based. system administrators can track each device via its
lifecycle, communicate securely with it, and inhibit it
6.3 In the IoT Authentication, Integrity & from executing detrimental processes. If devices,
Confidentiality manifest unforeseen behavior, administrators can
simply revoke its prerogative.
6.5 Need the IoT Device Connected Trouble Freely certificate policy the suitable amount of promise so
that relying parties know why the certificate is
To trouble freely participate in the IoT, each considered faith, as well as to understand what the
connected device needs a distinctive identity even device is authorized to do and not to do.
before it has an IP address. This digital credential
establishes the root of faith for the device’s entire VII. TERNET OF THINGS (IoT) DESIGN IDEA
lifecycle, from initial design to deployment to FOR DIGITAL CERTIFICATES
freedom from work. The every device a distinctive
identity using the powerful cryptographic processing, In a digital identity certificate, both its owner and the
key shielding, and key management available. A CA that signed the certificate must be distinctively
digital certificate is injected into every device enable identified. While there will be a comparatively small
to firstly, authentication of each device introduced to number of CAs, there is a need for a scalable naming
the organization’s architecture. Secondly, verification scheme appropriate for billions of nodes. In the design
of the integrity of the operating system and idea, device identifier establishment plans can be
applications on the device level. Thirdly, secure based on a different technique. These techniques
communications between devices, gateway, and incorporate either a hierarchical identifier, the
cloud. Lastly, authorized software and firmware encoding of extra information, unsystematic data, and
updates, based on approved code. the use of cryptographic operations [54]. In the design
idea, certificate validity the X.509 certificates have a
6.6 The PKI Security Guarantee in the IoT limited life span, which is enciphered in the validity
field [55]. The field accommodates the two date’s
The guarantee in the PKI space can be defined as the notAfter and notBefore, both accommodates a
amount of confidence that a person or system has timestamp in the UTCTime encoding format.
that the identity being introduced in a certificate in Investigation the validity of a certificate requires
fact be suited to the device. Maintaining specific access to actual time [56], and since low cost
levels of guarantee across millions of deployed device oscillators found in embedded, systems have an
identities is no trivial task. Risks must be important drift in the order of up to many. Seconds
comprehensible and mitigation plans established and per day, the use of time synchronization protocols
executed. The IoT system may incorporate millions of like network time protocol or precision time protocol
diverse connected devices sharing data to complete should be believed. In the design idea, the public key
various tasks, it makes sense that peril be inclined to cryptosystems confer pairs of keys, whereby the
be greater for an IoT system than for an enterprise public encryption key dissimilar from the secret
use case. The higher IoT peril’s profile, the PKI decryption key [51]. Such cryptosystems are at the
environment needed to issue believe certificates core of PKI, as they confer a means to digitally, the
across the system endpoints warrants very careful hash value of a digital certificate using a CA’s private
security planning to make sure a distinctly defined key; provide a means to confirm the integrity of a
level of promise for device authentication. The digital certificate, through decoding the already. The
reliability promise applies to both enterprise and IoT encoded hash value using a CA’s public key and
PKIs and various use cases may rely on varying levels comparing it with the hash value calculated over the
of promise. Some use cases need to define, detailed presented certificate; and permit a device to digitally
and strict promise requirements, while others may sign or decrypt information. In the design idea, hash
require less definition. Organizations must define in functions are one-way functions that modify a bit
string of variable length into a fixed-length hash value. scenarios, a number of technologies have been
They are utilizing to digital signs a certificate [57]. In developed to achieve information privacy and security
the hash, functions have four essential mathematical objective, such as transport layer security, which
and algorithmic characteristic, first they should have a could also make better the confidentiality and
small computational complexity, second irreversible integrity of the IoT.
“one-way” functions, third infeasible to alter an input
without changing the hash and fourth it must be 8.1 In IoT Secure Device Provisioning and
infeasible to find two dissimilar inputs with the same Authentication Using Azure
hash. There are a number of various future-proof hash
algorithms in use, most particularly SHA-2 and SHA- The security token technique provides authentication
3 with customizable hash lengths of between 224 and for every call made by the device to the IoT hub by
512 bits. associating the symmetric key to each call. The X.509-
based authentication permits authentication of an IoT
VIII. INTERNET OF THINGS (IoT) PROTOCOLS device at the physical layer as part of the TLS
FOR ACCESS NETWORKS connection establishment [60]. The security token-
based method can be used without the X.509
The Internet of Things (IoT) goal to make better our authentication, which is a less safe pattern. The
lives by increasing the interconnectivity of an preference between the two techniques is primarily
increased variety of embedded computing devices dictated by how safe the device authentication needs
using components of existing Internet infrastructure to be, and availability of safe storage of the device. IoT
[1]. This will permit for communications between hub uses security tokens to authenticate devices and
sensors in cars, laptops, factory, home appliances, services to keep away from sending keys on the
mobile phones, machineries, and many other devices network. Besides, security tokens are limited in time
that are already capable of network access through validity and scope. Azure IoT SDKs automatically
existing protocols such as 3G, Wi-Fi, Bluetooth [58], generate tokens without need any special
and ZigBee. The IoT scenarios remain a challenge, configuration [61]. Some scenarios need the user to
mainly due to the large number of miscellaneous generate and use security tokens outright. These
devices as well as data exchanged via insecure scenarios contain the direct use of the AMQP, MQTT,
connections. Moreover, the concepts of security are and HTTP surfaces, or the implementation of the
extended not only to device-to-device token service pattern.
communications, but also to network aspects. As an
example, many hackers create fake networks (termed After each IoT hub has a recognize registry that can
botnets) to steal data and user privacy information. be used to create per-device resources in the service,
Normally, various security requirements should be like as a queue that contains in flight cloud-to-device
addressed to promise network, and data security. First, messages, and to permit access to the device facing
confidentiality is essential to limit network access and endpoints. The IoT hub identity registry provides safe
data only to authorized users. Second, data integrity storage of device identities and security keys for a
and authentication should be promise so that solution. Independent or groups of device identities
messages are triumphantly transmitted and are can be added to a permit list, or a block list, enabling
reliable to the receiver. In the end, data complete control over device access. The use of a
authentication and availability should be provided, as device-based X.509 certificate and its associated
well as detection of malicious interloper [59]. In IoT private and public key pair permits extra
authentication at the physical layer. The private key close to the gateway and negotiator, propagation
is stored securely in the device and is not detectable delays can be ignored. In addition, for the
outside the device. The X.509 certificate contains unidirectional case, the security keys have a valid
information about the device, like as device time interval sufficiently long to transmit one or more
identification, and other organizational details. A packets and to absorb possible retransmissions or any
signature of the certificate is originated by using the other undesirable latency.
private key. Internet connection between the IoT
device and IoT hub is secured using the transport IX. GUIDELINES FOR SECURE THE INTERNET OF
layer security standard. Azure provides for IoT THINGS DEVICES
transport layer security standard, namely TLS 1.2,
TLS 1.1, and TLS 1.0, in this order. The Internet of Things is comprised of an
indiscriminately diverse range of device types from
8.2 The Secure Access to Unidirectional Data in IoT small to huge, from simple to complex, from
consumer gadgets to state of the art systems found in
The unidirectional devices cannot perform any safe DoD, [1] utility and industrial and manufacturing
procedure for secure key exchange with the systems. IoT devices face the same types of privacy
negotiator. The transmitter just sends a message and security problem that many traditional end-user
without any feedback, that is, it lapses to receive any devices face. There are approx six million new things
signal, and is equipped with an internal clock, which being connected every day in 2016, as we head
is supposed not to be on the mark. Then, a toward more than 22 billion by 2020, according to
nonspecific non-IP unidirectional terminal runs the Gartner [5]. End users do not have the technical
following move to send data to the gateway and specialist to assess the privacy and security
negotiator in a safe way. In the first move, it implications of any particular IoT device, or they may
generates the encryption key locally, based on the lack interest in doing so [63]. The subscribers already
time measured by a local clock. In the second move, have trouble identifying and troubleshooting the
it creates the message and encrypts it with the devices that are currently connected to their home
generated key, this message includes the payload and networks [64]. IoT devices will worsen these
any other data to be used to make better security. In circumstances, as subscribers connect an increasingly
the third move, it computes the hash values using the wide variety of devices to their home networks. The
message text and the generated key and attaches consumer will likely lose track of what devices are
them to the message. At the end move, it sends the connected to the Internet over time, which will make
message to the gateway and negotiator. defend them even more challenging. In this section,
we are discussing guidelines for secure the IoT
8.3 The Secure Access to Bidirectional Data in IoT
devices.
For bidirectional terminals, the negotiator can 9.1 Don’t Connect Your Devices Unless You Necessity
periodically broadcast its clock timing in a dedicated
message, and its identification in the plain part of the The first step is to consider what functionality you
message. The terminals can align their local clocks to necessity from the device. In view of the, your TV or
the gateway and negotiator terminal, and then fridge can connect to the internet, doesn’t mean you
generate the security keys in accordance with the surely want to hook it up. Take a good look at the
algorithm already described [62]. Since devices are
features it offers and learn precisely what internet sent through email or SMS before access is permitted.
connectivity brings before you connect. When used properly, two-factor authentication can
halt the bad people obtain access to your accounts
9.2 To Secure Communications Using Encrypted and taking control of your IoT devices.
Protocols
9.5 Using the Latest Firmware
Encryption practices of IoT devices are lower and
unsafe. A small number devices use encrypted If you want to make sure you have the latest security
communications as part of their beginning patches and diminish the possibility of a successful
configuration. Instead, most use ordinary web attack, then you need to keep your firmware fully
protocols that communicate across the Internet in updated. Vulnerabilities and exploits will be
plain text, which makes them simple targets for extricated as they emerge, so your IoT devices and
hackers keep an eye on network traffic to identify your router need to be frequently updated. Automate
debility. At the very least, all webs, traffic should be this wherever possible or set a schedule to investigate
using HTTPS [65], transport layer security, secure file for updates every two months or so.
transfer protocol, DNS security extensions, and other
secure protocols for communications with 9.6 During Processing Using a Encrypt Data
management stations and across the Internet.
Therewith, devices that connect to mobile apps or Infrequently the party processing the data should not
other remote gateways should use encrypted be able to read the data or the computational
protocols as well as encrypt data stored on flash outcome. The operational data while they are in
drives. encrypted form. For instance, identical encryption is
a form of encryption that permits computations to be
9.3 Block Incoming Traffic When Possible carried out on cipher-text, thus generating an
encrypted outcome that, when decrypted, matches
The several IoT devices ship with open ports to the outcome of operations performed on the plain
support management functions rather than the text.
standard functionality available through a user
interface. Even some passwords allow telnet access 9.7 Create Impressive and Inoffensive Password
with only an IP address. Afterwards, the point here is Policies
to decrease your attack surface as much as feasibly
possible. That might mean perfectly blocking all Most network infrastructure needs the administrator’s
incoming traffic with a firewall. However, in other default password to be altered when first accessed. In
cases, that will mean only keeping open which TCP spite of that, most devices, like as home routers,
and UDP ports you necessity. network printers, and sensors, lack strong
authentication and access technique. Furthermore,
9.4 Two-Factor Authentication the concept of using multifactor authentication using
a diversity of mechanisms to log in besides an easy
Supposing any of your devices offer two-factor
password, such as with an SMS code sent to a cell
authentication, use it. Two-factor authentication is
phone is a rarity in the IoT world. Actually, some IoT
an extra security layer on top of a device password
devices do not need any authentication. A subscriber
that need secondary authentication a one-time code
can navigate with a web browser to a specific IP
address and control the device’s configuration and read up on the provider’s privacy policy and look for
operation. commitment about encryption and data safety.
9.8 Investigate if Physical Access Assents Intrusion 9.12 Put IoT Devices on Their Personal Firewalled
and Monitored Network
It is obliged to understand how your attack surface
dissimilar in the case that a hacker is remote versus, When it comes to linked consumer grade IoT devices
when they are corporeally in the office location. in the enterprise, you need to take a proactive
There are a number of attached devices that are procedure. You want to have them segmented away
vulnerable subsequently doing a hard reset. If there and rear a firewall. You can block incoming traffic to
are any, consider locking them away, when feasible. it so people cannot attack from the inboard and you
can handle and monitor it closely.
9.9 Decrease Data Granularity
9.13 Disable UPnP Characteristics
disconnections. Failover design is especially vital for its potential lapse points, as well as the IoT and Cloud
IoT devices that involve user protection, like as video platform used for handling and storage of data. Many
monitoring, door lock mechanisms, and simpler IoT devices have no computing power and
environmental monitors and alarms. These devices communicate with a gateway and the idea should be
should have manual overrides or particular functions given to choosing a remote monitoring service or IoT
for disconnected operations. service platform.
function can be a real difficulty. Not only will it not control for all objects in the physical world commonly
work when the network is very slow, but it may also called as IoT. The Internet of Things opens up a new
be synchronized sensitive data or offering another universe of connected and intelligent devices that can
potential route into your home and make sure you work together to provide virtually unlimited
capabilities, and the majority of these new capabilities
will be personalized. Much of the value of the IoT Technology,” International Transaction of
comes from the capability to customize products and Electrical and Computer Engineers System
services to a client individually and immediately, (ITECES), USA, ISSN (Print): 2373-1273 ISSN
necessity. The analysts have a prophecy that (Online): 2373-1281, Vol. 4, No. 1, page 26-38,
hundreds of thousands of new IoT services will May 2017, DOI: 10.12691/iteces-4-1-4.
connect billions of new IoT devices over the next [4]. Luigi Atzori, Antonio Iera, and Giacomo
decade. Industry and academia are both Morabito. The internet of things: A survey.
concentrating on moving ahead in attempts to Computer Networks, 54(15):2787–2805, 2010.
improve usability, maintainability, and security via [5]. Gartner Inc. Press Release (2014)
standardization and development of best practices. http://www.gartner.com/newsroom/id/2905717
The Internet of Things (IoT) embodies the [6]. G. Wu, S. Talwar, K. Johnsson,N. Himayat, and
convergence of the physical and virtual worlds. It is K. D. Johnson, “M2M: from mobile to embedded
the important nexus between data-oriented internet,” IEEE Communications Magazine, vol.
applications and device-oriented sensor networks 49, no. 4, pp. 36–43, 2011.
facilitated by Internet technologies. The biggest [7]. L. Atzori, A. Iera, and G. Morabito, “The
challenges to the IoT will come in securing sensitive internet of things: a survey,” Computer
information from unauthorized access as well as Networks, vol. 54, no. 15, pp. 2787–2805, 2010.
authorizing access to only the information we're [8]. Gartner Inc., “Hype cycle for the internet of
comfortable disclose. This paper provides an things 2017,” Technical report, July 2017.
overview of Internet of Things (IoT) threats, scheme [9]. V. Karagiannis, P. Chatzimisios, F. Vazquez-
and faith. Afterwards, we are briefly discussing Gallego, J. Alonso-Zarate, "A survey on
public key infrastructures and guidelines for secure application layer protocols for the internet of
the IoT devices. things", Transaction on IoT and Cloud
Computing, vol. 3, no. 1, pp. 11-17, 2015.
XI. REFERENCES [10]. Xiaolin Jia, Quanyuan Feng, Taihua Fan,
Quanshui L. , ”RFID technology and its
[1]. Yusuf Perwej, Mahmoud A. AbouGhaly, Bedine applications in Internet of Things (IoT)”, 2nd
K. Hani Ali M. Harb, “An Extended Review on International Conference on Consumer
Internet of Things (IoT) and Its Promising Electronics, Communications and Networks
Applications”, Communications on Applied (CECNet), IEEE, Yichang, China, April 2012
Electronics (CAE), ISSN: 2394-4714, Foundation [11]. Nasser S. A., Andrew J., Olga A.,” Internet of
of Computer Science FCS, New York, USA, Things Security: A Review of Risks and Threats
Volume 9, Number 26, Pages 8– 22, Feb 2019, to Healthcare Sector ”, IEEE International
DOI: 10.5120/cae2019652812 Conference on Internet of Things (iThings) and
[2]. Yusuf Perwej, “An Experiential Study of the Big IEEE Green Computing and Communications
Data,” International Transaction of Electrical (GreenCom) and IEEE Cyber, Physical and
and Computer Engineers System (ITECES), USA, Social Computing (CPSCom) and IEEE Smart
ISSN (Print): 2373-1273 ISSN (Online): 2373- Data (SmartData), Exeter, UK, June 2017
1281, Vol. 4, No. 1, page 14-25, March 2017, [12]. Wei Z., Yan Jia., Anni P., Yuqing Z., Peng
DOI:10.12691/iteces-4-1-3. L.,”The Effect of IoT New Features on Security
[3]. Nikhat Akhtar, Firoj Parwej, Dr. Yusuf Perwej, and Privacy: New Threats, Existing Solutions,
“A Perusal of Big Data Classification and Hadoop
and Challenges Yet to Be Solved”, IEEE Internet [22]. Elisa Bertino, Nayeem Islam,” Botnets and
of Things Journal, June 2018 Internet of Things Security ”. Computer, IEEE,
[13]. J. Gubbia, R. Buyya, S. Marusic, M. Palaniswami, Volume 50 , Issue 2, Feb 2017
"Internet of Things (IoT): A vision architectural [23]. A. Mohsen Nia and N. K. Jha, “A Comprehensive
elements and future directions" in Future Study of Security of Internet-of-Things,” IEEE
Generation Computer Systems, Elsevier, vol. 29, Transactions on Emerging Topics in Computing,
pp. 1645-1660, 2013. vol. PP, no. 99, p. d, 2016.
[14]. R. H. Weber, "Internet of Things New security [24]. Kuan Zhang, Xiaohui Liang, Rongxing Lu,
and privacy challenges", Computer Law & Xuemin Shen,” Sybil Attacks and Their Defenses
Security Review, vol. 26, no. 1, pp. 23-30, Jan. in the Internet of Things”, IEEE Internet of
2010. Things Journal , Volume 1 , Issue 5 , Oct. 2014
[15]. M. O. Lehtonen, F. Michahelles, E. Fleisch, [25]. Ian G. Harris,” Social Engineering Attacks on the
"Trust and Security in RFID-Based Product Internet of Things ”, September 7, 2016
Authentication Systems", IEEE Systems Journal, [26]. L. Atzori, A. Iera, G. Morabito, "The Internet of
vol. 1, no. 2, pp. 129-144, Dec. 2007. Things: A survey", Comput. Netw., vol. 54, no.
[16]. Yusuf Perwej, Kashiful H., Uruj J., Firoj Perwej, 15, pp. 2787-2805, 2010.
“Block ciphering in KSA, A major breakthrough [27]. E. Haselsteiner and K. Breitfuß, “Security in
in cryptography analysis in wireless networks” Near Near Field Communication (NFC)
International Transactions in Mathematical Strengths,” Semiconductors, vol. 11, no. 71, p.
Sciences and Computer, India, ISSN-0974-5068, 71, 2006.
vol. 2, No. 2, pages 369-385, July-December [28]. Seo JW, Lee SJ,”A study on the detection of
2009 DDoS attack using the IP Spoofing”, J Korea Inst
[17]. G. Gan, Z. Lu, J. Jiang, "Internet of Things Inf Secur Crytol 25(1):147-153, 2015
Security Analysis", 2011 International [29]. D. Miessler, “Securing the Internet of Things:
Conference on Internet Technology and Mapping Attack Surface Areas Using the
Applications, pp. 1-4, Aug. 2011. OWASP IoT Top 10.
[18]. I. Gudymenko, K. B. Pfitzmann, K. Tietze, [30]. G. Hernandez, O. Arias, D. Buentello, and Y. Jin,
"Privacy implications of the internet of things" “Smart Nest Thermostat : A Smart Spy in Your
in Constructing Ambient Intelligence, Springer, Home,” Black Hat USA, pp. 1–8, 2014.
pp. 280-286, 2012 [31]. Pin-Yu Chen, Shin-Ming Cheng, and Kwang-
[19]. Marianne Azer, Sherif El-Kassas, Magdy El- Cheng Chen. Optimal control of epidemic
Soudani, “A full of the Wormhole Attack”, information dissemination over networks. IEEE
International Journal of Computer Science and Trans. Cybern., 44(12):2316–2328, December
Information Security, 2009. 2014.
[20]. Kelly Jackson, “Hacker’s Choice: Top Six [32]. Pin-Yu Chen and Shin-Ming Cheng. Sequential
Database Attacks. defense against random intentional attacks in
[21]. Ş. Okul ; M. Ali Aydın,” Security Attacks on IoT complex networks. Phys. Rev. E, 91:022805,
”, International Conference on Computer February 2015.
Science and Engineering (UBMK), IEEE, [33]. Shan C, Hui X, Da L, et al. A Vision of IoT:
Antalya, Turkey, Oct. 2017 Applications, Challenges, and Opportunities
With China Perspective{J}. IEEE Internet of
Things Journal, 1(4), 349-359, 2014
[34]. Pin-Yu Chen and Alfred O. Hero. Assessing and [44]. J. Guo, R. Chen, "A Classification of Trust
safeguarding network resilience to nodal attacks. Computation Models for Service-Oriented
IEEE Commun.Mag., 52(11):138–143,November Internet of Things Systems", IEEE International
2014. Conference on Services Computing (SCC), pp.
[35]. D. Quercia and S. Hailes, “Sybil attacks against 324-331, June 2015.
mobile users: Friends and foes to the rescue,” in [45]. Ie yuan, Xiaoyong li,” A Reliable and
Proc. IEEE IEEE Conf. Comput. Commun. Lightweight Trust Computing Mechanism for
(INFOCOM), 2010, pp. 336–340. IoT Edge Devices Based on Multi-Source
[36]. W. Chang, J. Wu, C. Tan, and F. Li, “Sybil Feedback Information Fusion”, special section
defenses in mobile social networks,” in Proc. on security and trusted computing for industrial
IEEE Conf. Global Commun. (GLOBECOM), internet of things, volume 6, May 16, 2018
2013, pp. 1–6. [46]. P. Porambage, C. Schmitt, P. Kumar, A. Gurtov,
[37]. Pin-Yu Chen and Kwang-Cheng Chen. M. Ylianttila, "Two-phase authentication
Intentional attack and fusion-based defense protocol for wireless sensor networks in
strategy in complex networks. In Proc. IEEE distributed IoT applications", Proc. IEEE
Global Telecommunications Conference Wireless Commun. Netw. Conf. (WCNC), pp.
(GLOBECOM), pages 1–5, December 2011. 2728-2733, Sep. 2014
[38]. Pin-Yu Chen, Shin-Ming Cheng, and Kwang- [47]. E Vasilomanolakis, J Daubert, M Luthra, V
Cheng Chen. Information fusion to defend Gazis, A Wiesmaier, P. Kikiras, "On the Security
intentional attack in internet of things. IEEE and Privacy of Internet of Things Architectures
IoT-J., 1(4):337–348, August 2014. and Systems", 2015 International Workshop on
[39]. J. Tian, W. Zhao, R. Du, and Z. Zhang, “A New Secure Internet of Things (SIoT), pp. 49-57, Sep
Data Fusion Model of Intrusion Detection- 2015
IDSFP,” in Parallel and Distributed Processing [48]. Chen, D., Chang, G. R., Sun, D. W., Li, J. J., Jia.
and Applications, vol. 3758 of Lecture Notes in J., and Wang. X. W.,”TRM-IoT: A Trust
Computer Science, pp. 371–382, Springer Berlin Management Model Based on Fuzzy Reputation
Heidelberg, Berlin, Heidelberg, 2005. for Internet of Things”, Computer Science and
[40]. Martin Osborne and Ariel Rubinstein. A Course Information Systems.,1207-28, October 2010
in Game Theory. MIT, Cambridge, MA, 1999. [49]. Michael Schukat, Pablo Cortijo,” Public key
[41]. S. Sicari, A. Rizzardi, L. A. Grieco, A. Coen- infrastructures and digital certificates for the
Porisini, "Security privacy and trust in Internet Internet of things”, 26th Irish Signals and
of Things: The road ahead", Computer Systems Conference (ISSC),IEEE, Carlow,
Networks, vol. 76, pp. 146-164, Jan. 2015. Ireland, June 2015
[42]. T. Eder, D. Nachtmann, D. Schreckling, "Trust [50]. Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin
and Reputation in the Internet of Things", Yang, "Security and Trust in Digital Rights
Conference Seminar (SS2013) - Real Life Management: A Survey", International Journal
Security (5827HS), Dec. 2013. of Network Security, vol. 9, no. 3, pp. 247-263,
[43]. Z. Yan, P. Zhang, A. V. Vasilakos, "A survey on 2009.
trust management for Internet of Things", [51]. Younggyo Lee, Jeonghee Ahn, Seungjoo Kim,
Journal of Network and Computer Applications, Dongho Won, "A PKI System for Detecting the
vol. 42, pp. 120-134, Jan. 2014. Exposure of a User's Secret Key Public Key
Infrastructure Springer Berlin, Heidelberg", vol. [60]. Borislav S. Đorđević, Slobodan P. Jovanović,
4043, pp. 248-250, June 2006. Valentina V. Timčenko, ” Cloud Computing in
[52]. Yun-kyung Lee, Hong-il Ju, Jee-hye User, Amazon and Microsoft Azure platforms:
authentication mechanism using authentication Performance and service comparison ”, 22nd
server in homnetwork Advanced Telecommunications Forum Telfor
Communication Technology, pp. 504-506, 2006. (TELFOR),IEEE, Belgrade, Serbia, Nov. 2014
[53]. Gianmarco Baldini, Trevor Peirce, Maria Chiara [61]. R. Tudoran, A. Costan, G. Antoniu, L. Bougé, "A
Tallachini, "Internet of Things: IoT Governance performance evaluation of azure and nimbus
European Research Cluster on the Internet of clouds for scientific applications", Proceedings of
Things, Jan. 2014 the 2nd International Workshop on Cloud
[54]. M. Bauer, P. Chartier, K. Moessner, Catalogue of Computing Platforms, pp. 4, 2012.
IoT Naming, Addressing and discovery schemes [62]. R. Giuliano, A. Neri, and D. Valletta, “End-to-
in IERC projects V1.7, IERC-AC2-D1, 2013. end secure connection in heterogeneous
[55]. AS. Wazan, R. Laborde, F. Barrère, A. Benzekri, networks for critical scenarios”, WIFS 2012,
"Validating X. 509 certificates based on their Proc. of the 2012 IEEE Intl. Workshop on
quality", Young Computer Scientists 2008. Information Forensics and Security, pp. 264–
ICYCS 2008. The 9th International Conference 269, Tenerife, Spain.
for IEEE, pp. 2055-2060, November 2008. [63]. Ka-Ping Yee, "Aligning security and usability."
[56]. J. Shannon, H. Melvin, A. G. Ruzzelli, Dynamic IEEE Security & Privacy 2.5, pp 48-55, 2004
flooding time synchronization protocol for [64]. Rebecca E. Grinter, et al., "The work to make a
WSNs, IEEE GLOBECOM, 2012. home network work." ECSCW 2005. Springer
[57]. P. Camion, J. Patarin, "The knapsack hash Netherlands, 2005
function proposed at Crypto'89 can be broken", [65]. A. P. Castellani, M. Gheda, N. Bui, M. Rossi, and
Adv. in Cryptology Proc. Eurocrypt'91, pp. 39- M. Zorzi, "Web Services for the Internet of
53, 1991. Things through CoAP and EXI," in IEEE RWFI,
[58]. Yusuf Perwej, Kashiful H., Uruj J., Sharad S., Kyoto, Japan, Jun. 2011
“Some drastic improvements found in the
analysis of routing protocol for the Bluetooth Cite this article as :
technology using scatternet” International
Conference on Computing, Communications Dr. Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani
and Information Technology Applications Mohamed Hassan, Nikhat Akhtar, "The Internet-of-
(CCITA-2010), Ubiquitous Computing and Things (IoT) Security : A Technological Perspective
Communication Journal (UBICC) Seoul, South and Review ", International Journal of Scientific
Korea, ISSN Online 1992-8424, ISSN Print 1994- Research in Computer Science, Engineering and
4608, Volume CCITA-2010, Number 5, pages Information Technology (IJSRCSEIT), ISSN : 2456-
86-95, 2010 3307, Volume 5 Issue 1, pp. 462-482, January-
[59]. J. Granjal, E. Monteiro, J. Sá Silva, "Security for February 2019. Available at doi :
the Internet of Things: A survey of existing https://doi.org/10.32628/CSEIT195193
protocols and open research issues", IEEE Journal URL : http://ijsrcseit.com/CSEIT195193
Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294-
1312, 3rd Quart. 2015
In online aggressors regularly go for taking such client information. In these situations, malware that can take
card information when they are perused by the gadget has thrived. This framework gives secure micro-
payment and enhances date approaches in terms of security. In proposed system, utilize two principle capacities
PUF (Physical Unclonable Function) and FRoDo(Fraud Resilient Device for Off-Line Micro-Payments). These
two can be given security to installment process and client account. These produce double encryption to
protect the system from attackers. In proposed system gives more security for transaction.
Keywords : Mobile Secure Payment, Architecture, Protocols, Advance Encryption, Fraud-Resilience
CSEIT195199 | Received : 12 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 483-486 ]
483
M. Jalasri et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 483-486
Vendor
FRoDo
Activate the
User
Generate
Private Key For Generate Binary
User Code for Account
FRoDo Login Number
Check Availability
Balance
Request Sent to
Fig. 4. Payment request
PUF
User
User Database User Login Enter the Payment Encrypted Cash
Registration
Amount
Vendor Login
In cryptography, (Advance Encryption Standard)AES
Payment Verification Identity and Coin
Element Verification Cash decryption
is broadly embraced and upheld in both equipment
Waiting for PUF Activate the
View Vendor
Verification Vendor
PUF
has not been discovered practically. A degree of
Fig. 4. Architecture Diagram for secure micro ‘future-proofing’ allowed by AES which has
payment using physical unclonable function. flexibility of key length.
The Rivest-Shamir-Adleman(RSA) public key In any case, similarly with respect to DES, the AES
cryptography algorithm which is used to encrypt a security is guaranteed just in the event that it is
message. The RSA algorithm performs public key effectively actualized and great key administration is
encryption and digital signatures. utilized.
1. Represent the message as a whole number in the
vicinity of 0 and (n-1). Huge messages can be E. PUF PROCESS:
separated into various squares. Each piece would then
be spoken to by a whole number in a similar range. Heart of FRoDO proposal lies a read-once strong
2. Encrypt the message by raising it to the eth physical unclonable function. In fig.5 PUF check
control modulo n. The outcome is a ciphertext vendors details involved in payment and activate the
message C. vendors.
3. To unscramble ciphertext message C, raise it to
another power d modulo n
D. PAYMENT REQUEST
Fig. 5. Puf process
After activation user login into account to gives
payment request in fig. 4. Enter the required In payment verification PUF check both Identity and
payment and Check the availability of payment for Coin Element. After verification payment decrypted
customer requirement. Required amount encrypted using public key and the payment transaction
using key and after payment request goes to PUF completed successfully and whole transaction will be
secure. Finally receives the Private Response, the last [2]. D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk,
step only requires the coin just read to be validated. and S. Devadas, “Extracting secret keys from
Then, the whole payment transaction can be integrated circuits,” IEEE Trans. Very Large Scale
Integr. Syst., vol. 13, no. 10, pp. 1200–1205, Oct.
authorized and committed.
2005.
[3]. G. Hong and J. Bo, “Forensic analysis of skimming
IV. CONCLUSION
devices for credit fraud detection”, 2nd IEEE Int.
Conf. Inf. Financial Eng., Sep. 2010
Security analysis shows proposed system does not [4]. P. Choi and D. K. Kim, “Design of security enhanced
impose trustworthiness assumptions.Further, it is also TPM chipagainst invasive physical attacks”,IEEE Int.
the first solution in the literature where no customer Symp. Circuits Syst., pp. 1787–1790,2012.
device data attacks can be exploited to compromise [5]. W. Chen, G. Hancke, K. Mayes, Y. Lien, and J.-H.
the system This has been accomplished basically by Chiu, “Using 3G network components to enable NFC
utilizing a novel erasable PUF engineering and a mobile transactions and authentication”, IEEE Int.
Conf. Progress Informat. Comput., Dec. 2010, vol. 1,
novel convention outline. Furthermore, our proposal
pp. 441–448.
has been thoroughly discussed and compared against
[6]. V. C. Sekhar and S. Mrudula, “A complete secure
the state of the art. Our investigation demonstrates
customer centric anonymous payment in a digital
that it is the main suggestion that appreciates every ecosystem”, Int. Conf. Comput., Electron. Elect.
one of the properties required to a safe small scale Technol., 2012, pp. 1049–1054.
installment arrangement, while likewise presenting [7]. V. Daza, R. Di Pietro, F. Lombardi, and M. Signorini,
adaptability while thinking about the installment “FORCE: Fully off-line secure credits for mobile
medium (kinds of advanced coins). micro payments”, 11th Int. Conf. Security
Cryptography, 2014, pp. 125–136.
Finally, some open issues have been identified that [8]. S. Golovashych, “The technology of identification
and authentication of financial transactions. from
are left as future work. Specifically, examining the
smart cards to NFC-terminals”, IEEE Intell. Data
likelihood to enable computerized change to be spent
Acquisition Adv. Comput. Syst., Sep. 2005, pp. 407–
over various disconnected exchanges while keeping
412.
up a similar level of security and ease of use. In [9]. Slava Gomzin, “Hacking Point of Sale: Payment
FRoDO, develop to access money without standard Application Secrets, Threats, and Solutions,
coin element. In future, try to enhance the capability Computing & Technology 1st ed. New York, NY,
of the AES algorithm to a generate private key and USA: Wiley, 2014.
create more security for Electronic payments. [10]. Meng-Day Yu, Srinivas Devadas “Secure and robust
Another approach will involve smarter error correction for physical unclonablefunctions”,
implementation of secure offline transfer of money IEEE Design & Test of Computers , vol. 27, no. 1, pp.
48–65, Jan. 2010.
by using PUF.
ABSTRACT
Since few years, a new problem is trying to combine in a single step, compression, encryption and data hiding.
So far, few solutions have been proposed to combine image encryption and compression for example. Nowadays,
a new challenge consists to embed data in encrypted images. Since the entropy of encrypted image is maximal,
the embedding step, considered like noise, is not possible by using standard data hiding algorithms. A new idea
is to apply reversible data hiding algorithms on encrypted images by wishing to remove the embedded data
before the image decryption. Recent reversible data hiding methods have been proposed with high capacity,
but these methods are not applicable on encrypted images. In this paper we propose an analysis of the local
standard deviation of the marked encrypted images in order to remove the embedded data during the
decryption step. We have applied our method on various images, and we show and analyze the obtained results.
Keywords: Standard Data Hiding, Embedding Images
CSEIT1951102 | Received : 12 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 487-490 ]
487
V. Santhi et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 487-490
extraction the image quality should be maintained Reversible data hiding is a technique to embed
just like the original image. But the image which is additional message into some distortion-unacceptable
obtained contains some distortions. With regards to cover media, such as military or medical images, with
distortion in image, Kalker and Williams established a eversible way so that the novel cover content can
a rate-distortion copy for RDH, through which they be perfectly restored after extraction of the hidden
showed the rate-distortion bounds of RDH for message. As an effective and popular means for
without memory covers and proposed a recursive privacy fortification, encryption changes the ordinary
code development which, however, does not move signal into incomprehensible data, so that the general
towards the bound. Another promising strategy for signal processing typically takes place before
RDH is histogram shift (HS), in which the space is encryption or after decryption.
saved where data can be embedded by shifting the
bins of histogram of gray values. In this process, the However, in some circumstances that a content
embedding of data is done in three steps. Step1. The owner does not trust the supplier, the ability to
histogram is drawn. Step2. The peak point is taken influence the encrypted data when maintaining the
into consideration. Step3. The whole image is plain content secret is needed. When the secret data
scanned row by row. After these steps, the image is to be broadcasted are encrypted, a supplier without
scanned again. If the greyscale value 154 is any information of the cryptographic key may
encountered, then the embedded data sequence is compress the encrypted data due to the limited
checked & we get the marked image. Finally, the data channel resource. Some attempts on RDH in
extraction is done. To get the original quality of the encrypted images have been made. Zhang divided the
cover, the process of histogram shift is applied again. encrypted image into numerous blocks. By spinning
The original cover is then obtained back. Basically, LSBs of the half of pixels in every block, space can be
data hiding is the process to hide the data into some created for the embedded bit. The data extraction and
covering media i.e. it is the concatenation of two image recovery proceed by finding which part has
blocks of data, first is the embedding data & second is been spinned in one block. This process can be
the covering media. But in most of the cases the grasped with the help of spatial correlation in
covering media gets distorted after the data is decrypted image.
embedded & the covering media is not inverted back
to its original form after data is removed from it. Hong et al. ameliorated Zhang’s method at the
Some reversible data hiding methods use the concept decryption side by further making use of the spatial
of differential expansion transform which is based on correlation using a different estimation equation and
haar wavelet transform. Another concept used is the side match method to gain much lower error rate.
histogram shift. The differential expansion is the These two methods explained above rely on spatial
difference between two neighbouring pixels for correlation of original image to extract data. That is,
hiding one bit of data. In this process, the histograms the encrypted image should be decrypted first before
are drawn first. Then the peak values are taken into data extraction.
consideration. Then two peak values are considered
& difference is calculated. Then according to the Zhang et al. recovered the recursive code
result the bit by bit data is embedded into the image. development for binary covers and proved that this
In this way the distortion analysis is done & it is development can gain the rate-distortion bound as
helpful to remove the distortion in the covering long as the compacting algorithm reaches entropy,
media & to get the original cover back. which launches the correspondence between data
People are always looking around’ when vacationing Furthermore there may be some services which are
for the cheapest venues for celebration’s and arrange not provided by the wedding hall owner, so for that
bookings in advance to guarantee their stay for the the user has to inquiry and get there services from a
period of their celebration. However these activities third party, such services can be like decoration of
generally require individuals to do the bulk of the hall, orchestra, photographer etc. So in he proposed
search and booking. This is not only time consuming system we aim to gather the entire venue for all types
exercise, but can be frustrating and costly as well. of function and also the services. By this user will
have much more options under one roof.
The objective of the system is to reserve a venue for
functions, parties, weddings, meetings etc., user can
CSEIT1951118 | Received : 12 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 491-494 ]
491
Shruti N. Ghule et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 491-494
II. LITERATURE SURVEY people are viewing it and more and more people are
queuing.
“LARS: A Location-Aware Recommender System”
authored by Justin J. Levandoski ,Mohamed Sarwat, In [4] the author tells about Position based Services
Ahmed Eldawy, Mohamed F. Mokbel contains a which offers many benefits to the mobile consumers
position alert recommender structure that uses to recover the information about their current
position-based ratings to generate references. LARS position and manner that data to get more useful
achieves Customer rating positions through user information near to their position. With the help of
partitioning, a technique that influences GPS in phones and through Net Services using GPRS,
recommendations with ratings spatially close to Position based Facilities can be fulfilled on Android
querying users in a manner that maximizes system based smart phones to provide these value-added
scalability while not sacrificing recommendation services like handset profiling, scheduling alarms.
quality. Position based services are a general class of
computer program level services used to include
“Position Detection and Tracking System” published specific controls for position and time data as control
by Mahesh Kadibagil, and Dr. H S Guruprasad features in computer programs.
proposed a Self-directed location recognition and
tracking method which enhances the correctness of III. PROPOSED
finding friends and family member’s locations by
using GPS and typical web technology. This design The main aim of the proposed concept is to develop a
includes a mobile client, a repository, a web client web application that will allow the user to search and
and a map service. The mobile user is used to book the menu. The application should be able to
discover location and conduct a notification SMS to provide a platform for venues providers to showcase
user when his/her friends or family members come their services. There should be the options for
nearby the user’s zone of path. This location material disbursing auto discount for existing customers. The
can be sent to the server and the same information application should provide details of all booked
can be achieved and observed using the web venues with dates and user can query if they want to.
consumer by other customers. Following fig1. shows work flow VBS which has two
parts service provider (venue owner) and second is
In [3] the author wants to convey that with user having their own functionality of booking venue
the hasty improvement of Internet, people's day-to- or registering the venue.
day life has basically been attached from the Internet.
After the Internet, without resolution, whether
entities or industries, both clients and industrialists,
are made on the network of expectation, this new
expectation is to get through the network of the
greatest things the inexpensive, most practical to find
the fastest information, the most money-making
products to sell up. As people's lives are getting better,
it comes with many lifestyle changes. As the film are Fig1. Work Flow of VBS
still the same and has not changed predilections and
as more and more film are churned out more an more
• Admin
Admin can add, update the categories in which a
venue will be added. He/ She can manage all the
functionality related to user and venue owner.
The admin acts as a intermediate between this
two modules.
• Booking
The booking module will handle the booking
functionality also it manages all functions related
to the enquiries of different venues and
availability of dates according to bookings.
Fig 2. DFD for Customer • Category
Above data flow diagram(DFD) i.e. fig2 will show This module will used to saving the categories
how user can interact with the application by sign in, from admin module. It contains different
sign up, searching venues etc. categories related to venues which can be decided
by venue owner according to his / her venue.
• Discount
This module will handle the functionality related
with discount. It provides discounts to the
existing user which will decided by venue owner.
• Gateway
This is the dummy implementation of gateway
for payments. It would be the full payment to
owner or some amount of down payment.
• Messages
This will used for showing and storing the
Fig 3. DFD for Venue Owner inquiry messages. This is basically act as enquiry
Fig3 will show how venue owner can interact with section where user can ask their inquiries related
the application by registering their venues and to venues.
provide various services as per their venue. • User
The user module will provide functionality for
This application will consists of following modules. signup and login etc. This will be customer
1) Admin Module section.
2) Booking Module • Venue
3) Category Module The venue module will used for showing and
4) Discount Module managing the venues which are registered and
5) Payment Gateway their information and services provided by venue
6) Inquiry Module owner.
7) Customer Module • DAO
8) Venue Owner Module Data access object will used for managing the
Following information shows functionality of database connectivity
different modules.
The proposed system will be implanted as a web Pages 196-199 July 16-17, 2011 IEEEComputer
based application on J2EE platform of Java with Society Washington, DC, USA ©2011 ISBN:978-
MySQL as database. 0-7695-4443-4 10.1109/ISCCS.2011.61
[4]. VEDANG MOHOLKAR,PRATHAMESH
Thus we have been able to design a venue booking HULE,MANDAR KHULE,SUMIT SAURABH
system and have been able to carry on partial computer department,pvpit,pune,India
implementation as. “AUTOMATED LOCATION BASED
SERVICES”, International Journal of Advanced
IV. CONCLUSION Research in Computer Science and Software
Engineering, Volume 4, Issue 2, February 2014
In this paper we discuss about managing different ISSN: 2277 128 X.
venues according to user need. It helps user to book
venues as per their requirements. It can be different Cite this article as :
halls, lawns, meeting rooms etc. The user can show
their interest by booking venues. This application Shruti N. Ghule, Harish M. Mohurle, Akshay P.
will overcome the problem of previous system in Shegaonkar, Zeba Parvin Abdual Saleem, Pradhnya S.
which all the work were done manually. It gives Borkar, "A Review : Venue Booking System",
better results by booking venues directly without International Journal of Scientific Research in
visiting the venue. Computer Science, Engineering and Information
Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
V. REFERENCES 5 Issue 1, pp. 491-494, January-February 2019.
Available at doi :
[1]. Justin J. Levandoski ; Mohamed Sarwat ; Ahmed https://doi.org/10.32628/CSEIT1951118
Eldawy ; Mohamed F. Mokbel “LARS: A Journal URL : http://ijsrcseit.com/CSEIT1951118
Location-Aware Recommender System” ICDE
'12 Proceedings of the 2012 IEEE 28th
International Conference on Data Engineering
Pages 450-461 April 01 - 05, 2012 IEEE
Computer Society Washington, DC, USA ©2012
ISBN: 978-0-7695-4747-3 10.1109/ICDE.2012.54
[2]. MAHESH KADIBAGIL PG SCHOLAR, DEPT.
OF ISE, DR. H S GURUPRASAD PROFESSOR
AND HEAD, DEPT. OF CSE, BMSCE,
BANGALORE, INDIA POSITION DETECTION
AND TRACKING SYSTEM IRACST -
International Journal of Computer Science and
Information Technology & Security (IJCSITS),
Vol. 4, No. 3,June 2014
[3]. BO HANG “DESIGN AND IMPLEMENTATION
OF CINEMA ONLINE BOOKING SYSTEM”,
ISCCS ‘ 11 Proceedings of the 2011 International
Symposium on Computer Science and Society,
Ordinarily, in our city, we see that the garbage bins or dustbins put at open spots are over-burden. It makes
unhygienic conditions for individuals just as grotesqueness to that place leaving a terrible stench. To dodge
every single such circumstance we are going to execute a venture called IoT Based Smart Garbage and Waste
Collection Bins. As the populace is expanding step by step, the earth ought to be spotless and sterile. In a large
portion of the urban areas, the flooded garbage bins are making an unhygienic situation. This will additionally
prompt the emerging of various kinds of maladies. This will corrupt the way of life. To beat these circumstances
a productive savvy squanders collection framework must be created. As the extent of IoT is creating step by
step successful techniques can be discovered effectively. Different plans were proposed and have points of
interest just as drawbacks. This paper is a review dependent on Smart Waste Collection System dependent on
IoT.
Keywords : Internet of Things, Smart Garbage Monitoring, Smart City, Microcontroller
CSEIT1951103 | Received : 13 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 495-500 ]
495
Himanshu Gupta et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 495-500
Things a suitable alternative for a decent number of developing and populated urban communities as it
urban communities. contains contaminants which result in flimsiness,
issue and uneasiness to the biological system.
The board of waste is a major testing issue in urban Numbness and absence of neatness are ruining nature.
regions for the greater part of the nations all through The correct waste expulsion and the executives are
the world and is seen in a large portion of the incredibly viable to improve the wellbeing and
creating nations than in the created nations. A prosperity of the city's populace.
productive administration of waste is a prerequisite
for keeping up a perfect and green condition as there The primary objective of this paper is to take a shot at
is increment in a wide range of squanders tossed by natural issues because of ill-advised waste transfer
numerous spots like mechanical, agrarian, home and unravel them for better wellbeing and
waste, and so on. Squander collection and reusing is cleanliness of the general population. The proposed
done through different innovations. Collection of framework fits into the classification of IoT
data is huge and unwieldy. The present development connected to outer and open situations and it satisfies
in country with vast local location and an interest for the accompanying essential prerequisites of IoT
modernization in the city makes a testing administrations:
undertaking for waste administration individuals [5].
• Unwavering quality: Communication is crucial in
India especially creates around 1, 33,760 tons of IoT for administration provisioning, connected to
Municipal strong waste (MSW) the executives every the outside and open condition. Dependable and
day, of which roughly 91,152 tones are gathered, and solid correspondence is required arranged by
a colossal entirety of cash is spent on collection [6]. completing correspondence between gadgets as
World waste generation is relied upon to be roughly this sort of IoT has an extensive administration
27 billion tons for each year by 2050, 33% of which space. Consequently, the receptacle utilized in
will originate from Asia, with significant the proposed framework associated with one
commitments from China and India [7]. Squander age another, in light of a remote work arranges
in urban regions of India will be 0.7 kg per individual (WMN), giving dependability.
every day in 2025, around four to multiple times • Portability: IOT gadgets might be required to
higher than in 1999 [8]. move in the external environment. The proposed
framework works with a battery rather than the
II. MOTIVATION AND BACKGROUND changeless power source, bringing about an
extraordinary dimension of versatility. The
In the previous history, since the human populace versatility of the framework is secured with a
thickness and dimensions of misuse of characteristic power-based power supply.
assets were less, the measure of strong waste created • Administration Continuity: Data communications
was noteworthy. Be that as it may, the expansion in and administrations ought to be directed
the populace in this day and age has expanded the flawlessly whenever and any area in IoT with an
garbage. To keep nature spotless and solid, there is a extensive administration space. Bins are situated
necessity of legitimate garbage transfer. Inappropriate at the customary space of separation to guarantee
garbage transfer raises contamination, medical the administration progression.
problems, different dangers and in result it influences • Client Convenience: The presentation of IoT has
nature. Contamination extremely influences the improved client comfort. For client facilitate, the
proposed framework lessens the method postpone Another technique [10], there are different
the time of the existing garbage gathering dustbins situated all through the city or the Campus.
frameworks, which empowers clients to set free These dustbins are furnished with ease implanted
their garbage without a long pause and auspicious gadget which helps in following the dimension of the
end of filled bins. garbage bins and a one of a kind ID will be
• Vitality Efficiency: IoT connected to outer and accommodated each dustbin in the city so it is
open conditions depends on a dependable on the anything but difficult to recognize which garbage
framework and requires versatility, causing a lot container is full. The undertaking module is isolated
of vitality utilization. To take care of this issue, into two sections Transmitter area and recipient
the sensors work utilizing vitality proficient segment. Here in the transmitter segment we are
procedures, expanding their battery lifetimes. utilizing 8051 microcontrollers, RF Transmitter and
sensors these are appended to the dustbin. Where
III. LITERATURE REVIEW
sensor is utilized to identify the dimension in the
dustbin whether the dustbin is full or void.
The garbage the executives in urban communities
must be successfully and productively actualized. The
Another strategy [11] is that, when the garbage
different recommendations were advanced and some
achieves the edge level ultrasonic sensor will trigger
of them effectively actualized. Be that as it may, it
the GSM modem which will constantly alarm the
can't be considered as a powerful one. Therefore, an
required expert until the garbage in the dustbin is
overview was done among various proposition and
squashed. When the dustbin is squashed, individuals
this review paper incorporates study among various
can reuse the dustbin. At customary interims dustbin
strategies for Waste Collection System dependent on
will be squashed. In this strategy, GSM 900A modem
IoT.
is utilized to send the messages.
framework utilizes ultrasonic sensors put over the partition from wrong dimension estimation and are
bins to identify the garbage level and contrast it and interfaced with the microcontroller.
the garbage bins profundity. The framework makes
utilization of AVR family microcontroller, LCD To distinguish awful stench a gas sensor is set at the
screen, Wi-Fi modem for sending information and a base of the dustbin and is adjacent to interfaced with
signal. the controller to remember it off the waste filled in
the dustbin. The two sensors send the signs to the
In paper [15] guarantees the cleaning of dustbins controller. Arduino accumulates information gotten
soon when the garbage level achieves its most by the gatherer and trade nearby page through the
extreme. In his administration framework IOT as the Ethernet shield.
working in the field for arranged radio-recurrence
distinguishing proof (RFID), following the collection
vehicle, Dustbin observing and other developing
detecting advancements.
ABSTRACT
India is an agricultural country. Agriculture is the important contributor to the Indian economy. There are
many classification techniques like Support Vector Machine(SVM), LADTree, Naïve Bayes, Bayesnet, K Nearest
Neighbour(KNN), Locally Weighted Learning(LWL) on rice crop production datasets. They have some
drawbacks like low accuracy and more errors. To achieve more significant result, To increase classification
accuracy and reducing classification errors, our research uses classification method Bayesnet based adaboost
will be proposed in work. Rice crop yield depend on environment’s parameters like Rainfall, minimum
temperature, average temperature, Maximum temperature, Vapour Pressure, potential evapotranspiration,
reference crop evapotranspiration, cloud cover, wet day frequency for the kharif season. our dataset containing
these environmental parameters for accurate prediction of Rice crop yield.
Keywords : AdaBoost Technique, BayesNet Classifier, Rice Crop Yield Prediction, Kharif Season
CSEIT1951122 | Received : 15 Feb 2019 | Accepted : 26 Feb 2019 | January-February -2019 [ 5 (1) : 501-507]
501
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
crop cultivation data and weather data using data Regression AdaBoost (Adaptive Boosting), Support
mining methods[14]. Vector Machine Regression and a Modified
Nonlinear Regression (MNR) equation and then
There are many classification techniques like Support comparing the modified equation with the other
Vector Machine(SVM), Naïve Bayes, BayesNet, K three methods to check its accuracy For Aus and
NearestNeighbour (KNN), Locally Weighted Boro Rice our modified Nonlinear Regression
Learning(LWL), LAD Tree are applied on rice crop equation not only yields better RMSE, MSE and MAE
production datasets. The provision of accurate and values, it also has the highest Rsquare value, which
timely information can assist farmers to make the proves that the MNR equation is the best fit for this
best decision for their cropping situations This could study. this study also proves that weather conditions
benefit them to attain greater crop productivity[42]. play very vital role in predicting the yield. In [2],
This study examines the application of machine author used classifiers for research are J48, LWL,
learning for the prediction of rice crop yield. The LAD Tree and IBK. The experimental results showed
current study use the most rice producing that J48, LADTree achieved the highest accuracy,
states(Haryana, Punjab, Tamilnadu, Andhra Pradesh, sensitivity and specificity. In [3], author used
Bihar). The dataset parameters are state name, district classifiers were BayesNet and NaiveBayes. The results
name, crop year, Rainfall, minimum temperature, showed that the performance of BayesNet was much
average temperature, maximum temperature, vapour better compared with NaiveBayes for the dataset. In
pressure, reference opevapo transpiration, [4], proposed approach builds a model to predict the
Potential evapotranspiration, diurnal temperature weather parameters applying Neural Networks, then
range, area, production, yield, class. The dataset was estimates the rice yields applying Support Vector
then sorted on the basis of yield to classify the Regression. In [5], The authors have used pre-
records in to low, moderate and high. The low yield processed data that was clustered using k-means
was from 0. 1 to 1 tonnes/hectare, moderate from 1 to clustering algorithm. The association rule mining
2 tonnes/hectare and high from 2 to 5 process will apply on clustered data to find the rules.
tonnes/hectare. The training phase ends with number of generated
rules. In the testing phase, the yield value is predicted
The further document is as follows. In Section 2 based on the generated rules. The parameters
(Literature Survey), the literature review done on considered for research were precipitation, minimum
Rice Crop Yield Prediction, Bayesnet Method, temperature, reference crop evapotranspiration
AdaBoost method and Rice Crop. In Section 3 average temperature, maximum temperature.
(Conclusion) conclusion derived based on literature production, area and yield for the Kharif season
survey. including months from June to November.
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
502
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
November) for the years 1998 to 2002. In this Nigeria. The climate data used was for a period of 36
research WEKA tool is used. A Multilayer Perceptron years from 1980 to 2015. This study[14] describes the
Neural Network was implemented as ANN. Cross role of data mining in Agriculture and crop yield
validation method was used to validate data. In [8], prediction. This paper also describes Groundnut crop
The proposed method uses yield and weather data yield prediction analysis and Naive Bayes Method.
collected from United States Department of This Study [15] describes multi-model heterogeneous
Agriculture. The parameters in the dataset are rainfall, ensemble approach. This study [16] examine the
humidity, temperature, yield and. regression-based introduction about Bayesian network, Directed
algorithms to predict the crop yield. These were acyclic graph, Conditional Probability table. This
multivariate polynomial regression, support vector study [17] examine various data mining classification,
machine regression and random forest. support clustering and association rule mining technique.
vector machine regression to obtain the best possible This study [18] examine detail information about
results for predicting the crop yield. In [9], The naïve bayes classification technique. This study [19]
prominent classification methods in this study are the examine Bayesian network classification technique,
Support VectorMachine(SVM) and Naive Bayes. In structure learning technique, parameter learning
this paper, AdaSVM and AdaNaive are the proposed technique. This study[20] examine various adaptive
ensemble model use to project the crop production Learning Algorithms for Bayesian Network Classifiers.
over a period of time. This ensemble model is This study[21] examine Bayesian Network Classifiers
compared with Naive Bayes and SVM methods. in Weka. This study[22] examine the introduction
accuracy and the classification error are two about bayesian approach to Probability and Statistics.
parameters used for output predictions. The finding This study[23] examine bayesian method for
yields that AdaSVM and AdaNaive are agreeable than constructing probabilistic networks from databases.
SVM and Naive Bayes for the data set analyzed. In they focus on constructing Bayesian belief networks.
this study[10], regression based adaptive boosting This study[24] examine the overview of rice crop
prediction model is presented, There are three coastal yield prediction. Examines Different data mining
districts belonging to Odisha are located in India techniques utilized for foreseeing rice crop yield. In
using the datasets of Rabi and Kharif seasons. This this study[25], there is overview of rice crop yield
study experiments on weak regressors, such as: SVR prediction. This paper Examines Different data
regression, linear, lasso, ridge proposes strong mining techniques utilized for foreseeing rice crop
predictors by avoiding the shortcomingss of yield. In this study[26], rice yield prediction is
individual weak regressors. In [11] study examines performed by back propagation algorithm. In this
the variations of climate variables and rice yield and study[27], there is Comparative Study of
examines the relationships using multiple linear Classification Algorithms for Forecasting Rainfall.
regression, principal component analysis, and support This study[28] examine Modeling Rainfall Prediction
vector machine (SVM) analysis in southwest Nigeria. Using Data Mining Method: A Bayesian Approach
In this study[12], Adaptive boosting of weak data mining method for modeling rainfall prediction.
regressors for forecasting of crop production In [29], Rice Crop Yield Forecasting of Tropical Wet
considering climatic variability. In this study[13] and Dry Climatic Zone of India using data mining
examines the variations of climate variables and rice Techniques is applied. For data set results show that
yield and quantifies the relationships using multiple J48 and LADTree achieved the highest accuracy,
linear regression, principal component analysis, and sensitivity and specificity. Classification by LWL
support vector machine (SVM) analysis in southwest classifier displayed the lowest accuracy, sensitivity
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
503
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
and specificity results. In [30], This study presents an Accuracy is highest in case of Soybean. A study by
analysis using data mining techniques for estimating [37] has applied association rules for Tamilnadu. Rice
the future yield prediction in tea cultivation with crop yield predicted using regression analysis,
climatic change trends observed in last 30 years experiment implemented in MATLAB tool. Yield
(1977-2006). The patterns of crop production in predicted from Annual Rainfall, Area under
response to the climatic (rainfall, temperature, Cultivation, and Food Price Index. Relationship
relative humidity, evaporation and sunshine) effect established between AR, AUC and FPI[38]. A study
across the four tea growing regions (South Bank, [39] described literature review in tabular form. Some
North Bank, Upper Assam and Cachar) of Assam research study only summarized the data mining
were developed using Multiple Linear Regression techniques for crop yield prediction. Support Vector
(MLR) technique. Machine, Random Forest, Neural Network, REPTree,
Bagging, Bayes algorithm described in the study [40].
The tea production estimation equations developed These classifiers used for Soybean Crop Yield
for the regions were validated for the future yield Prediction and results are compared. Bagging
prediction (2007, 2009 and 2010) and were found to algorithm gives maximum accuracy for soybean crop
be significant. yield prediction among REPTree, Random Forest,
Neural Network, SMO classifiers. Bayesian modelling
A study by [31] has done Crop Yield Prediction of used for wheat crop yield prediction using small
Wheat Using Fuzzy C Means Clustering and Neural dataset[41]. A study also identified drought related
Network. A research work [32] has implemented agronomic factors that significantly affect the
artificial neural networks (ANNs) for predicting crop variation in the rain fed wheat yield and relative
yields for an agricultural region in Nepal. In research, importance of these factors.
Agricultural data was collected from paddy field
cultivation in the Siraha district, an eastern region in Applications
Nepal. climatic parameters are rainfall, maximum
temperature and minimum temperature, fertilizer use Predicts crop yield production of rice for most Rice
were also used as input values. The result shows that producing states, India.
the trained neural network produced a minimum Predicting productivity of crop in various climatic
error. In [33] researcher has implemented neural conditions can help farmer and other partners in
networks for rice yield prediction in mountainous essential basic leadership as far as agronomy and
regions. A study by [34] reaching review of research product decision. It also helps to increase the yield of
devoted to applications of machine learning in crop.
agrarian generation frameworks. The review reports
the application of machine learning techniques with III. PERFORMANCE EVALUATION METRICS
artificial neural networks, Bayesian networks,
support vector machines and k-means. In [35], Accuracy: It is defined as the overall success rate of
researchers predict Rice Production in Phimai the classifier.
District, Thailand Decision Support System Using Accuracy = (TP + TN) / (TP + FP + FN + TN).
Artificial Neural Network. A study by [36] Where, True Positive (TP) depicts the number of
implemented C 4. 5 Algorithm to predict yield of instances where system detects for condition when it
crops like paddy, maize, wheat, soybean. Interactive is really present[1].
web pages developed for crop yield prediction.
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
504
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
505
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
506
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
[28]. V. B. Nikam and B. B. Meshram, "Modeling [36]. Veenadhari, B. Misra, and C. D. Singh, "Machine
Rainfall Prediction Using Data Mining Method: A learning approach for forecasting crop yield based
Bayesian Approach", Fifth International on climatic parameters, " 2014 Int. Conf. Comput.
Conference on Computational Intelligence, Commun. Informatics Ushering Technol.
Modelling and Simulation, Seoul, 2013, pp. 132- Tomorrow, Today, ICCCI 2014, pp. 1-5, 2014.
136. [37]. E. Manjula, S. Djodiltachoumy, ” A Model for
[29]. Niketa Gandhi, Leisa J. Armstrong, “Rice Crop Prediction of Crop Yield”, International Journal
Yield Forecasting of Tropical Wet and Dry of Computational Intelligence and Informatics,
Climatic Zone of India using data mining Vol. 6: No. 4, March 2017, pp.298-305.
Techniques”, 2016 IEEE International Conference [38]. Sellam and E. Poovammal, "Prediction of Crop
on Advances in Computer Applications (ICACA) Yield using Regression Analysis, " vol. 9, no.
[30]. Rupanjali D. Baruah, R.M. Bhagat, Sudipta Roy, October, 2016.
L.N. Sethi, ”Use of Data Mining Technique for [39]. B. H. Dhivya, R. Manjula, S. B. S, and R.
Prediction of Tea Yield in the Face of Climate Madhumathi, "A Survey on Crop Yield Prediction
Change of Assam, India”, 2016 International based on Agricultural Data, " pp. 4177-4183, 2017.
Conference on Information Technology, pp. 265- [40]. Savla and A. Mandholia, "Survey of classification
269. algorithms for formulating yield prediction
[31]. Akanksha Verma, Aman Jatain, Shalini Bajaj, ” accuracy in precision agriculture, " 2015.
Crop Yield Prediction of Wheat Using Fuzzy C [41]. Yildirak, Z. Kalaylioglu, and A. Mermer,
Means Clustering and Neural Network”, "Bayesian estimation of crop yield function :
International Journal of Applied Engineering drought based wheat prediction model for tigem
Research ISSN 0973-4562 Volume 13, Number 11 farms, " Environ. Ecol. Stat., vol. 22, no. 4, pp.
(2018) pp. 9816-9821. 693-704, 2015.
[32]. Tirtha Ranjeet, Leisa Armstrong, ” An Artificial [42]. Mrs. K. E. Eswari, Ms. L.Vinitha, ” Crop Yield
Neural Network for Predicting Crops Yield in Prediction in Tamil Nadu using Baysian
Nepal”, Proceedings of AFITA 2014 - Copyright Network”, International Journal of Intellectual
ASICTA Inc, pp. 376-386. Advancements and Research in Engineering
[33]. B. J I , Y. SUN, S.YANG, J. WAN1, ” Artificial Computations, Volume-6, Issue-2, pp.1572-1576.
neural networks for rice yield prediction in [43]. Niketa Gandhi, Owaiz Petkar, Leisa J. Armstrong,
mountainous regions”, Journal of Agricultural "Rice Crop Yield Prediction Using Artificial
Science (2007), pp. 249–261. Neural Networks", 2016 IEEE International
[34]. Ankita Bissa, Meena Kushwaha , Mayank Patel, Conference on Technological Innovations in ICT
”A Survey of Machine Learning Appliacations In For Agriculture and Rural Development (TIAR
Decision Making To Improve Farming”, 2016), pp.105-110
International Journal of Computer Sciences and
Engineering, Vol.-6, Issue-9, Sept. 2018, pp. 669- Cite this article as : Kolin Sukhadia, M. B. Chaudhari, "A
683. Survey on Rice Crop Yield Prediction in India Using
[35]. Saisunee Jabjone, Sura Wannasang, ” Decision Improved Classification Technique ", International Journal
Support System Using Artificial Neural Network of Scientific Research in Computer Science, Engineering
and Information Technology (IJSRCSEIT), ISSN : 2456-
to Predict Rice Production in Phimai District,
3307, Volume 5 Issue 1, pp. 501-507, January-February
Thailand”, International Journal of Computer and
2019.
Electrical Engineering, Vol. 6, No. 2, April 2014,
Available at doi : https://doi.org/10.32628/CSEIT1951122
pp. 162-166.
Journal URL : http://ijsrcseit.com/CSEIT1951122
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
507
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2019 IJSRCSEIT | Volume 5 | Issue 1 | ISSN : 2456-3307
DOI : 10.32628/CSEIT1951131
The Safe System (SS) approach to road safety emphasizes safety-by-design through ensuring safe vehicles, road
networks, and road users. With a strong motivation from the World Health Organization (WHO), this
approach is increasingly adopted worldwide. Considerations in SS, however, are made for the medium-to-long
term. Our interest in this work is to complement the approach with a short-to-medium term dynamic
assessment of road safety. Toward this end, we introduce a novel, cost-effective Internet of Things (IoT)
architecture that facilitates the realization of a robust and dynamic computational core in assessing the safety of
a road network and its elements. In doing so, we discuss about the various existing mechanisms for road safety.
Keywords : Internet of Things, Smartphone, Road Safety, Arduino, G-Sensor, Accelerometer
CSEIT1951131 | Received : 01 Feb 2019 | Accepted : 16 Feb 2019 | January-February -2019 [ 5 (1) : 508-513 ]
508
Chandrashekhar Rathod et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 508-513
vehicles in no honking zone–controlling unwanted cushioned impact at a speed of more than 30 km/h,
disturbances in horn prohibited zone such as with lower speeds resulting in either death or serious
hospitals, public libraries ,courts, schools, etc., injury [1, 2]. The objective of the SS approach is that
the three model elements should be designed and
The Safe System (SS) approach to transport networks monitored to proactively prevent deadly speeds from
originated with the “Safe Road Transport System” happening and allow for a reduced emergency
model developed by the Swedish Transport Agency. response time in the event of an accident.
In its essence, the approach migrates from the view
that accidents are largely and automatically the Elements of the SS approach are as follows.
driver’s fault to a view that identifies and evaluates
the true causes for accidents. Through the (1) Safe Vehicle. Emphasis on vehicle safety is
categorization of safety into the safety of three verified through mandated regulatory testing and
elements (vehicle, road, and road user), SS minimizes rating, as well as technologies such as electronic
fatalities and injuries by controlling speeds and stability control. Beyond this, enforced checks (e.g.,
facilitating prompt emergency response. The model upon license renewals) combined with on the road
has been widely adopted since its introduction and is reporting work to review the status of vehicle safety.
currently motivated by the WHO as a basis for road
safety planning, policy-making, and enforcement. (2) Safe Road. The assessment of road (or road
network) safety is multifaceted. Road inspection
enables clear and direct observation of the state of the
road and assesses the need for repairs or
modifications. The structure of the road network is
amenable to safety assessment through partitioning
into what is called “Traffic Analysis Zones (TAZs)”
[4]. In addition, considerations for crash data and
other supporting data offer further insights into
general safety assessment.
such characterization rises substantially as the Anto bennet et al., [13] had proposed that a review
findings of crash report analysis in cities typically on an Embedded System in Passenger Car for Road
note a critical dependence on either driver behavior Safety using GPS and GSM.GPS Receiver gets the
or driver awareness [8]. A great need is further location information from satellite in the form of
established in these studies for innovative latitude and longitude. The system can be
mechanisms to instill safe driving at the licensing and interconnected with the alcohol detection and alert
post-licensing stages. the owner on his mobile phone.
II. LITERATURE REVIEW Anto bennet et al., [14] had proposed that a review
on Alcohol Detection and Accident Avoidance Using
Pramodshelke et al. [9] had proposed that a review on locking With Tracking. This system will detect
Arduino Based embedded System in Car for Road drunker driver by alcohol sensor through driver
Safety using RFID .In this work when the RFID tag is breathe fitted on steering in front of driver ,the
detected by the RFID reader the speed of the motor message is sent to the police through GSM system
reduces in specified areas and it avoids accidents. and provides GPS base system to track those cars.
Ch . Sonali Shankar et al., [10] had proposed that a III. RELATED WORK
review on Arduino based Embedded System in
Passenger Car for Road Safety .In this work the sound Many countries around the world ban the use of
of the horn stops and speed is also reduced when the hand-held devices while driving, including the
RFID tag is detected by the RFID reader. United States, Canada, Germany, Israel, Greece,
Norway, and more. While smartphones can be a
Deepa et al., [11] had proposed that a review on dangerous distraction, correct use of cell phone apps
Embedded System in Passenger Car for Road can reduce risk and promote safer driving behavior.
Safety.in this work the proposed features are Apps used with hands-free devices can monitor
automatic collision notification that gives notification distractions, protect young drivers, call for help when
to the victim’s relative, red light traffic control makes needed, and prevent speeding. Following are few Top
sure the vehicle doesn’t break signal, speed control Road Safety Apps.
alters speed in different zones, horn control prevents
honking in horn prohibited zone, alcohol detection Kruzr – Driving Assistant for Distracted Driving
detects drunk driving and vehicle security is used to Kruzr Road Safety App Kruzr is a free android-based
prevent theft Suhas Katkar et al., [12] had proposed app that detects when you’re driving and
that a review on An Embedded System In passenger automatically screens incoming calls and messages.
Car For Road Safety. This project is designed to Kruzr tells senders you’re on the road and will
inform about an accident or theft that has occurred to respond later. Don’t worry, you won’t miss critical
the vehicle, to the family members of the travelling calls. Kruzr automatic driving assistant allows urgent
persons and concerned authorities. Anto bennet et al., calls to proceed, while less important calls and
had proposed that a review on An Embedded System messages can be retrieved later.
in Passenger Car for Road Safety using GPS and GSM.
This work is designed to inform about an accident Safely Home – Detects Accidents
that is occurred to a vehicle to the family members of Safety Home Road Safety App Safely Home is a free
the travelling persons. Android app that automatically detects road accidents
without any human intervention. If you’re in an such as “Driving right now, will get back to you
accident, the app notifies your emergency contacts. shortly”.
Safely Home includes a “Save a Life” feature to help
injured accident victims get help quickly. The app Fleetsafer
also provides traffic updates, and GPS-guided Fleetsafer is aimed at employers who want to reduce
Roadside Assistance for mechanical problems. the risk of employee liability for accidents on the job.
The app appears on company-issued tablets and
Drive Mode: Safe Driving App smartphones. It detects the driving state and
Drive Mode Road Safety app Drive Mode is an automatically puts the device into safe mode. Only
Android app that includes a voice-control option for emergency calls may be made.
streamlined interfacing with your favorite
applications, as well as simple swipe or tap MamaBear
functionality. With Drive Mode voice control, MamaBear Family Safety is a free app for Android
drivers can easily access navigation, music and and Apple devices. Recognized as the “Best Parenting
messaging apps. App” in 2017 by Mumi Family Awards, MamaBear
Drive Mode can be setup to launch when you start provides parental alerts for speeding, and provides
driving. The app will ignore calls and messages in GPS locations for young drivers. MamaBear also
“Do Not Disturb” mode, send text message auto allows parents to monitor their child’s text messages,
replies, or you can choose to reply to calls and social media, and arrival and departure times at
messages using seamless voice commands, and much locations away from home.
more.
Drive Safely Pro Road Safety App
AT&T DriveMode The DriveSafe.ly app is designed to prevent distracted
ATT Road Safety App driving accidents by providing hands-free access to
AT&T Drive Mode is a free app for Android and emails and text messages. Powered by a text-to-
Apple users and is available on all carriers. This app speech program, Drive Safe.ly Pro converts messages
silences incoming messages when the GPS detects in 27 languages. The app reads text messages and
you are driving 15mph or faster, and turns off when emails aloud in real time, allowing drivers to keep
you drop below 15 mph for two or three minutes. It their hands on the wheel and eyes on the road.
offers you a list of up to five contacts you can call
hands-free. Parents of young drivers can receive In this system, various sensors such as soil moisture,
alerts if the app is turned off. AT&T Drive Mode is DHT11 sensors are connected to the input pins of
also available in Spanish. arduino microcontroller. The sensed values from the
sensors are displayed in LCD. If the sensed value goes
iBolt Dock’n Drive beyond the threshold values set in the program, the
iBolt Road Safety App The iBOLT Dock’n Drive app pump will be automatically switched ON/OFF by the
requires the use of an iBolt docking station. This relay circuit and it is connected to the driver circuit
Android-based app provides automated answering of which helps to switch the voltage. The farmer will be
incoming calls. The “It Can Wait” feature places intimated about the current field condition through
incoming text messages on hold while the phone is GSM module and also updated in the web page. By
docked. Messages are delivered to the phone when using this system, the farmer can access the details
it’s not docked. You can set the auto reply message, about the condition of the field anywhere at any time.
ABSTRACT
Being a developing issue, plagiarism is commonly described as literature theft and academic dishonest nature in
the writing, and it must be avoided and adhere to the moral standards. Plagiarism occur in scholastics, paper
publication, music, work of art developing quickly, so the recognizing plagiarism is essential. While the most
recent couple of year’s plagiarism detection tools have been utilized predominantly in research conditions,
refined plagiarism programming and instruments are presently quickly rising. In this paper, we give an outline
of various plagiarism programming and apparatuses to take care of the plagiarism issue. We propose an element
classification conspire that can be utilized to examine plagiarism discovery programming and plagiarism
recognition instruments. This plan depends on the product's general qualities, devices qualities, and apparatuses
property.
Keywords : Plagiarism Detection, Plagiarism Types, Plagiarism Techniques, Plagiarism Algorithms
CSEIT1951129 | Received : 15 Feb 2019 | Accepted : 26 Feb 2019 | January-February -2019 [ 5 (1) : 514-518 ]
514
Kedar Bhujade et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 514-518
plagiarism on these reports was distinguished and institutions such as Ohio University, Umass Boston
the results were checked. and Trinity College Dublin.
assignment at the same time during the last 12 years. document is mark as plagiarism document and
This has made the instructors to give careful similarity percentage is calculated.
consideration on finding the plagiarism. In this way,
they constructed a discovery device for plagiarism.
This device had the full range of tools to help
administrator to manage the work of the research
facility. To quantify the similarities between two
assignments, they used four comparability criteria.
was shown how the problem of plagiarism can be Plagiarism in Programming Assignments,” IEEE
addressed using different techniques and tools. In this Transactions on Education, vol. 51, no. 2, pp.
paper, we have seen that different software and tools 174-183, 2008.
are available to check plagiarism. Comparison of [7]. Hermann M., Frank K., and Bilal Z.,
software and tools has shown that they still have no “Plagiarism -A Survey,” Universal Computer
software and tool that can detect that the document Science, vol. 12, no. 8, pp. 1050-1084, 2006.
has been plagiarized at 100 percent, since each [8]. Jinan F., Alkhanjari Z., Mohammed S., and
software and tool has advantages and limitations Alhinai R., “Designing a Portlet for Plagiarism
according to the features and performance described Detections within a Campus Portal,” Journal of
in the table. However, this software has limitations, Science, vol. 1, no. 1, pp. 83-88, 2005.
tools that have a significant impact on the success of [9]. Nathaniel G., Maria P., and Yiu N., “Nowhere
plagiarism detection. We also presented our proposed to Hide: Finding Plagiarized Documents Based
to the detection of plagiarism. on Sentence Similarity,” in Proceedings of
IEEE/WIC/ACM
[10]. International Conference on Web Intelligence
VI. REFERENCES and Intelligent Agent Technology, NSW, pp.
690-696, 2008.
[1]. P. OGR, “What is Plagiarism?”, [On Line]
http://www.plagiarism.org/,Retrieved Nov. 15, Cite this article as :
2010
[2]. C. Lyon, R. Barrett, and J. Malcolm, “Plagiarism Kedar Bhujade, Tushar Bhandirge, Rohan
is Easy, but also easy to detect.” Cross- Khobragade, Saurabh Shelare, Jayprakash Shukla,
Disciplinary Studies in Plagiarism, Fabrication, Prof. R. S. Thakur , "Review on Various Tools and
and Falsification, 2006. Techniques for Plagiarism Detection", International
[3]. L. Romans, G. Vita, and G. Janis, “Computer- Journal of Scientific Research in Computer Science,
based plagiarism detection methods and tools: Engineering and Information Technology
an overview,” the 2007 international (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
conference on Computer systems and 514-518, January-February 2019.
technologies. 2007, ACM: Bulgaria. Journal URL : http://ijsrcseit.com/CSEIT1951129
[4]. S. Mann and Z. Frew, “Similarity and
originality in code: plagiarism and normal
variation in student assignments,” the 8th
Australian conference on computing education,
2006.
[5]. Allan K., Kevin A., and Bruce B., “An
Automated System for Plagiarism Detection
Using the Internet,” in Proceedings of World
Conference on Educational Multimedia,
Hypermedia and Telecommunications,
Chesapeake, pp. 3619-3625, 2004.
[6]. Francisco R., Antonio G., Santiago R., Jose L.,
Pedraza M., and Manuel N., “Detection of
Face recognition has now become one of the interesting fields of research and has received a substantial
attention of researchers from all over the world. Face recognition techniques has been mostly used in the
discipline of image analysis, image processing, etc. One of the face recognition techniques is used to develop a
face recognition system to detect a human face in an image. In face recognition system a digital image with a
human face is given as an input which extracts the significant features of face such as (eyes, nose, chin, cheeks,
etc) to recognize a face in a digital image which is an exhausting task. Security of information is very salient
feature and is difficult to achieve. Security cameras are present in offices, universities, banks, ATMs, etc. All
these security cameras are embedded with face recognition systems. There are various algorithms which are
used to solve this problem. This paper provides an overview of various techniques which are often used for this
face recognition in a face recognition system. This paper is divided into five parts, first section concludes
various face detection techniques, second section describes about image processing ,third section have details
about face recognition techniques, fourth section describes various classification methods and last section
concludes all of these sections.
Keywords : Face Recognition, Face Detection, Features Extraction, Pre-Processing
CSEIT1951116 | Received : 15 Feb 2019 | Accepted : 27 Feb 2019 | January-February -2019 [ 5 (1) : 519-525 ]
519
Payal Maken Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 519-525
Face recognition system basically consists of Each year new techniques are developing for this
following blocks: purpose.
B. Facial detection
It basically means locating a face in a given image.
C. Image processing
Images are cropped to avoid facial image remains and
Figure 2. Detecting a face in an image
images are converted into black and white and then
There are number of techniques for detecting a face
to gray images.
in an image.
D. Facial recognition
1. Voila Jones face detection
It means to extract the features of a face (eyes, nose,
This technique was given by Paul Viola and Michael
etc) and make a template of it.
Jones. It is also known as haar cascade algorithm, this
E. Verification algorithm detect a face in an image on the basis of
System recognizes a given individual and gives a various features like eyes, nose, upper body, lower
decision. body. A system is designed by giving input some faces
and some non-faces and training a classifier. This
F. Validation
classifier is known as haar cascade classifier. Now a
In this system compares a given individual face with
cascade classifier is something that tells what we have
faces in the database to identify a given face.
to look in an image for detecting a face. For example,
if we are distinguishing whether a person is
overweight or not, then weight is the feature that is
to be considered not their age or skin color [1]. So we
basically train a classifier to detect a face. The data is
Figure1. Block diagram of face recognition system then stored in a file in the system. By referring to
Figure 1 shows the block diagram of face recognition that trained data one can detect a face.
system. Nevertheless ample work has been done on This algorithm includes following:
face recognition problem, but still not any work is up • Haar features
to the mark for the implementation point of view. • Integral image
b. Integral image
In an integral image the value at pixel (x, y) is the
sum of pixels above and to the left of (x, y).
C. Face recognition
Face recognition primarily means extracting the
features from face i.e. eyes, nose, chin, etc. Various
techniques which are used for this purpose are
following:
4. Filtering or smoothing
Filtering or smoothing is done to enhance the quality
of the image by the removal of the noise (blurring,
poor resolution, etc) from the image.
Median filter: Filtering set the value of Figure 10. Face images to Eigen faces
the output pixel as the median of all the In Eigenfaces the first principal component shows the
neighborhood pixels that is taken as input. Other most dominant feature of the dataset and each
filters replace the pixels values by mean and succeeding component in turn shows the next
average value: dominant component.
a. Take the median value of pixels in a window in
the neighborhood.
Median= sort all the pixels in an increasing
order, take the middle one.
b. Replace the pixel value with the median value.
To reduce the calculations that are needed for finding separable and produces the good results even under
the principal components, the dimensionality of the varying illumination conditions and images with
original dataset is reduced before they are calculated. different poses and expressions.
Since each preceding components how less features
and more noise, only few first principal components
are selected and rest of the last are discarded.
D. Verification/Validation
Verification and validation is the process of
Figure13. Weighted sum of Eigen faces recognizing an individual.
So, PCA reduces the number of values (from M to K) 1. Distance-wise classification
needed to recognize a face.
Once the features are extracted from face recognition
2. Linear Discriminant Analysis or Fisher Faces techniques, it is then to classify whether the test face
LDA is also known as Fisher faces. LDA is derived belongs to the training set or not. It is done by
from Fisher’s Linear Discriminant (FLD) technique. It measuring the distance between the training dataset
is considered as a classical technique in pattern and the image. If the distance is minimum, the test
recognition. It is used to find a linear combination of image is verified and the person is recognized.
features which separate two or more classes into 2. K-Nearest neighbor
objects [5]. Data is assumed to be uniformly
In this method, nearest neighbor is searched, and if
distributed in each class. It is used to convert the
maximum number of neighbors belongs to one class,
training samples into bases vectors. Linear
we can classify test image to that class. With
combination that is obtained using FLD is known as
increases k value, the classification rate decreases.
Fisher faces while in PCA it is known as Eigen faces.
LDA is preferred over PCA because it groups the 3. Neural Networks
classes into projected faces that can be linearly
It is mostly used because of its similarities with the [4]. A. Sengupta and P. Mondal, “Estimating The
human brain. Neural networks make the mapping of Age Of Human Face In Image Processing Using
the images with the person’s expressions. Matlab,” vol. 4, no. 3, pp. 10899–10902, 2015.
[5]. M. N. S. Zainudin et al., “Face Recognition
III. CONCLUSION using Principle Component Analysis ( PCA )
and Linear Discriminant Analysis ( LDA ),” no.
The research in face recognition has been an exciting 05, 2012.
area and it will keep attracting many engineers and
scientists for many years in this field. In this paper Cite this article as :
different techniques that can be used in face
recognition are discussed. It also gives the whole Payal Maken, "An Elementary Study on Various
concept of face recognition system. According to this Techniques Involved in Face Recognition Systems : A
literature survey, Viola Jones gives real time Review", International Journal of Scientific Research
performance for face detection. Skin detection in Computer Science, Engineering and Information
technique also works well. Image preprocessing is Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
necessary to reduce the noise from the images and to 5 Issue 1, pp. 519-525, January-February 2019.
give better recognition rate. PCA and LDA works Available at doi :
better for features extraction. Among PCA and ICA, https://doi.org/10.32628/CSEIT1951116
ICA uses high order statistics. Neural networks, k- Journal URL : http://ijsrcseit.com/CSEIT1951116
nearest neighbor techniques and Distance-wise
classification methods are used for further
recognition and classification. Combining all these
techniques, a face recognition application or system
can be developed.
IV. REFERENCES
E Return Tool
Pooja Aher*, Manish Kirnapure, Shubhangi Nemade, Tejaswita Shrivastava, Lulkaran Chohale
Department of computer science and Engineering, Priyadarshini J.L. College of Engineering, Nagpur,
Maharashtra, India
ABSTRACT
Every organization has need to pay salary to their employees, this work is done every month. Each and every
organization has to maintain the record monthly for future use. Now a day as we know the countries goes
become digit so this work is also performed digitally. This project E RETURN TOOL involves everything
regarding to employee payment and related to salary tax. This also includes delivering of taxes to the
government and also keep track of employee payments. This tool will facilitate to the employers to pre-validate
the ECR and also carry out amendments in the ECR file before uploading on Unified Portal. The return tool has
member wise details of wages and the contributions including basic details for the new and existing members’
return Tools also maintain the record of EPF member. Employer can check monthly or yearly details of every
EPF member. When a company hires its first employee it started its e return tool. In the United States, every
new employee must be reported to the state along with a completed W-4 tax form. The W-4 determines how
many allowances the employee qualifies for when calculating the federal income tax that should be withheld
from each check. Generally, the employee has to pay income tax depending upon their dependents.
Keywords : E Return Tool, ECR, EPF, EPFO, SME
CSEIT1951132 | Received : 15 Feb 2019 | Accepted : 28 Feb 2019 | January-February -2019 [ 5 (1) : 526-530 ]
526
Pooja Aher et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 526-530
II. METHODS AND MATERIAL Form 5 are mandatory. In case a member has exited,
you can enter the date of exit and in such case the
E Return Tool software does a lot of the heavy lifting reason for exit will become mandatory. There are
of salary management for you. Like outsourced some additional details which also can be filled up.
payroll services, this software requires very little These details may become helpful later when
input from the employer, just employee wage member applies for claim. However, they are not
information and days. All of the tricky calculations mandatory.
and withholdings are calculated by the software,
which receives automatic updates every time tax laws D. Salary Information
are changed. The software can also fill out
This module taking the input from employer like
employment tax forms for you and remind you when
number of days and rate. Basis of that input it
to file them.
calculate the employee deduction and stored their
record in database
Module
E. Summery:
A. Registration:
This screen after the entry of the Return Month takes
Registration is first module that is authentication to
you to the actual data entry/upload screen for the
user means in Registration module software create
monthly return. This screen also displays the
the username and password
summary, account wise and month wise of the
already entered/uploaded wage details. In this
B. Log-in:
complete summery will be recorded in the form of
This is the screen where you have to enter your user A/c 1, A/c 2, A/c 10, A/c 21, A/c 22, Month, Year and
id and password for login. You have come here after total. The screen will ask you to enter in the Return
selecting an added establishment from the earlier Month and Return Year fields.
screen. The screen at top shows the Establishment ID
you have selected. In case you have selected a wrong F. Monthly Return:
establishment from the list, if multiple establishments
In this module EPF details is recorded and the based
have been added, please click BACK instead of login.
on this details EPF return fill in Unified Portal. This
It will take you back to the first screen for selecting
screen is to be used for entry of wages for each
the correct establishment.
member for a month.
b. Report:
i. Form 5:
In this module Form 5 is generated between pf range
or between Joining date. Form 5 is nothing but the
complete basic information of employee.
ABSTRACT
Gas leakage is a major problem in the industrial sector, in residential locations etc. One of the preventive
methods to stop the incident related to the gas leak is to install a gas leak detection kit at vulnerable locations.
The goal of this paper is to propose a system that can detect, alert and automatically control gas leaks. In
particular, a gas sensor has been used which has a high sensitivity to gases such as propane and butane together
with LPG. There is an alarm that is triggered once the LPG has been detected. The gas leakage system consists
of a Wi-Fi module that alerts the user by sending an SMS message.
Keywords : LPG gas, IoT (Internet of Things)
CSEIT1951128 | Received : 15 Feb 2019 | Accepted : 28 Feb 2019 | January-February -2019 [ 5 (1) : 531-534 ]
531
Prof. Pranay Meshram et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 531-534
tell the consumer by sending text messages to the Arduino is an open-source electronics platform based
registered mobile phone and informing people in on easy-to-use hardware and software. It
your home by activating the alarm including the has 14 digital input/output pins (of which 6 can be
alarm and the message display the message on the used as PWM outputs), 6 analog inputs, a 16 MHz
LCD screen to take required action. quartz crystal, a USB connection, a power jack, an
ICSP header and a reset button. Arduino boards are
WHAT IS IoT? able to read inputs - light on a sensor and turn it into
an output - turning on an LED, activating buzzer and
From homes and industries to enterprises, Internet
WiFi module for sending SMS. You can tell your
of Things have become commonplace in all walks of
board what to do by sending a set of instructions to
life. Connecting everything and everyone, IoT is
the microcontroller on the board. To do so you use
making the world smarter and better than ever
the Arduino programming language (based
before. However, this is just the beginning.
on Wiring), and the Arduino Software (IDE), based
Unlocking the full potential of Internet of Things
on Processing.
requires that businesses understand the
opportunities for value creation and systematically
Gas Sensor (Mq5) :
address the underlying challenges.
Generally, semiconductor sensors are used to detect
Internet of Things (IoT) is an ecosystem of connected LPG gas. MQ5 semiconductor sensor is used in this
physical objects that are accessible through the system. Sensitive material of MQ-5 gas sensor is SnO2,
internet. The ‘thing’ in IoT could be a person with a which with lower conductivity in clean air. When
heart monitor or an automobile with built-in-sensors, the target combustible gas exist. The sensor
i.e. objects that have been assigned an IP address and conductivity increases along with the rising gas
have the ability to collect and transfer data over a concentration. MQ-5 gas sensor has high sensitivity
network without manual assistance or intervention. to Propane, Butane and LPG, also response to Natural
The embedded technology in the objects helps them gas. The sensor could be used to detect different
to interact with internal states or the external combustible gas, especially Methane; it is with low
environment, which in turn affects the decisions cost and suitable for different application. The MQ-5
taken. Devices and objects with built in sensors are can detect gas concentrations anywhere from 200 to
connected to an Internet of Things platform, which 10000 ppm. The sensor's output is an analog
integrates data from the different devices and applies resistance.
analytics to share the most valuable information with
applications built to address specific needs. WI-FI Module :
The WI-FI technology is radio wireless networking
These powerful IoT platforms can pinpoint exactly technology. It is mainly used for communication
what information is useful and what can safely be purpose. In this project, the WI-FI system is used to
ignored. This information can be used to detect communicate with the user. When the gas leakage
patterns, make recommendations, and detect possible occurs, the microcontroller stops the leakage and
problems before they occur. alerts the surroundings. Then, the information about
the leakage has to be informed to the user. For this
II. METHODS AND MATERIAL purpose, WIFI is used. Using WI-FI, a warning is sent
to the user. The method of communication is
Arduino Kit : asynchronous serial communication. The
corresponding code has to be loaded into the is connected to the Arduino kit. As soon as the gas
microcontroller, to which WI-FI is connected. level has exceeded this threshold value, the LED
lights up and the system warns the environment by
Buzzer: sending out a sound that is issued by the buzzer. At
It most commonly consists of a number of switches or the same time, the sound is sent via a WiFi module to
sensors connected to a control unit that determines if the user's mobile phone in order to inform the user of
and which button was pushed or a preset time has the loss. The user can avoid dangerous events such as
lapsed, and usually illuminates a light on the fire with the help of an exhaust fan.
appropriate button or control panel, and sounds a
warning in the form of a continuous or intermittent SYSTEM SENSO INDICATI FEATURE
buzzing or beeping sound. R ON
ARM Based MQ-6 Inform GSM
III. LITERATURE SURVEY Gas through Module is
Monitoring SMS used to
To overcome the issue of LPG leakage, many system System notify the
has been propossed. Gas leak detection is the process user
of identifying potentially hazardous gas leaks by Hazardous MQ- LCD Detects the
means of various sensors [2]. Several designs of LPG gas detection 4,MQ-7 Displays concentrati
detection and alert system have been proposed in the using arduino on
literature. Apeh et al. designed kitchen gas leakage Gas leakage MQ-2 Wireless Sends the
detection and automatic gas shut off system [3]. detector built Module informatio
T.Soundaryaet al. presented the cylinder LPG gas on n through
leakage detection system [4]. Wireless and GSM microcontroll wireless
technology [5] based gas detectors have also been ers module
proposed. This paper presents a LPG leakage IOT Based Electron Through Customer
detection and alert system to avoid fire accidents and real time ic sensor Social can check
to provide house safety. monitoring media the
gas detection previous
IV. PROPOSED SYSTEM system data and
determine
The proposed system uses the Arduino kit with an at which
integrated microcontroller. This Arduino kit forms condition
the core of our proposed system. Arduino is emergency
connected to other components that complement the occurred
system. These components are the MQ5 sensor, the
Gas leakage MQ-5 Through Notify the
LED light, the buzzer and the WiFi module. The
detection and buzzers and user
system uses an MQ5 gas sensor to detect LP gas. A
monitoring alarms through
threshold value (180 ppm for the proposed system) is
using IoT alarms
set in the MQ5 sensor. The sensor continuously
detects the surrounding atmosphere. For this
continuous air evaluation, the 5V power supply is
supplied to the Arduino via an AC adapter. A buzzer
in April 2013.
[5] Online Monitoring of Green House Gas
Leakage inIndustries Angel College of
Engineering and Technology, Tirupur, Tamil
Nadu, India. In DecJan, 2014.
[6] Development of Movable Gas Tanker Leakage
Detection Using Embedded System
Mr.S.B.Patil, Dr.A.J.Patil Dec 2012.
VI. REFERENCES
ABSTRACT
The computer networks are exposed to increasingly safety threats. With new kinds of attacks appearing usually,
growing flexible and adaptive protection-oriented strategies is a severe undertaking. In this context, anomaly-
primarily based community intrusion detection techniques are a precious era to guard target structures and
networks in opposition to malicious sports. Threats the internets are posing higher threat on IDS safety of
statistics. The primary concept is to utilize auditing programs to extract an in-depth set of capabilities that
describe each network connection or host session and practice statistics mining applications to learn rules that
correctly capture the behavior of intrusions and normal activities. Now Intrusion Detection has end up the
priority and on the crucial assignment of statistics protection administrators. A device deployed in a network is
at risk of numerous assaults and desires to be blanketed towards assaults. Intrusion detection machine is a
necessity of these days’ information safety area. It performs a vital function in detection of anomalous site
visitors in a community and indicators the network administrators to manage such visitors. The painting
supplied in this thesis is an attempt to locate such visitor’s anomalies in the networks through generating and
reading the site visitors float information.
Keywords : IDS (Intrusion Detection System), HIDS (Host Based Intrusion Detection System), ML (Machine
Learning), NIDS(Network Based Intrusion Detection System)
CSEIT1951141 | Received : 20 Feb 2019 | Accepted : 28 Feb 2019 | January-February -2019 [ 5 (1) : 535-545 ]
535
Mohammad Asif et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 535-545
IDS product becomes launched in 1991, with a ✓ It must impose a minimal overhead at the
relative handful emerging within the subsequent half system wherein it is walking; with a view to no
of dozen years. Then, inside the remaining couple of longer intervene with its ordinary operation.
years, the sphere underwent explosive increase. Even ✓ It needs to be capable of being configured in
after the obvious failure of numerous early releases, step with the security policies of the gadget this
there nevertheless remains at the least seventeen is being monitored.
extant products that claim to provide powerful ✓ It ought to be able to adapt to changes in device
intrusion detection in a networked environment. and person conduct over the years (e.g., new
Given this recent growth, and the reported improved applications being mounted, customers
utility of corporate assets to these products [1, 2, and converting from one hobby to another or new
3], the time has come for a complete assessment of assets being to be had those purpose
the subject. modifications in gadget aid utilization patterns).
✓ Anomalies are deviations from everyday
Intrusion detection structures try to discover laptop consumer behavior. Misuses, alternatively, are
misuse. Misuse is the overall performance of an recognized patterns of attack [5]. at the same
motion that isn't always favored by the machine time as misuse styles are frequently easier to
proprietor; one that doesn't comply with the device’s process and locate, it is frequently the paradox
ideal use and/or security coverage. IDSs mechanically patterns with a purpose to help to discover
examine online person hobby for forbidden (i.e., problems. As misuses are recognized styles of
invalid) and anomalous (i.e., strange, inconsistent) assault, the detection machine tends to fail
conduct. they're primarily based on the speculation whilst novel assault techniques are
that monitoring and reading community implemented. Detection of anomaly patterns is
transmissions, machine audit information, software computationally pricey due to the overhead of
audit data, device configuration, facts files, and keeping track of, and possibly updating several
different information can locate misuse. This record machine profile metrics, because it need to be
encompasses widespread portions of information, tailor-made gadget to device, and every now
effective analysis calls for detection1 specialized and and then even used to a person, due to the
constantly honed expertise, and at the least close to reality conduct styles and gadget usage vary
real-time of misuse is frequently important. significantly.
In [4], the subsequent characteristics are identified as ✓ Different IDSs had been designed to do
suited for IDS: dispensed collection and analysis of records. A
✓ It needs to run constantly with minimal human hierarchical device is defined in [6], and [7]
supervision. describes a cooperative gadget without a central
✓ It has to be fault tolerant in the sense that it has authority. these structures clear up maximum
to be capable of recover from gadget crashes, of the problems mentioned except for the
both unintended or because of malicious reconfiguration or adding skills to the IDS,
activity. Upon startup, the IDS have to be which aren't described in either of the 2
capable of recovering its previous country and designs.
resume its operation unaffected.
✓ The boom of the net has added excellent
✓ It ought to face up to subversion. The IDS need
benefits to society at the identical time the
to be able to screen itself and stumble on if it's
growing attacks on the IT Infrastructure are
been modified by way of an attacker.
getting an increasing number of serious issues The growth of Internet has brought great benefits to
and wishes to be addressed. Together with the the society at the same time the growing attacks on
growth of the internet, attacks also are growing the IT Infrastructure are becoming an increasingly
in parallel. serious issue and needs to be addressed. Along with
✓ Host-based intrusion detection system pursuits the growth of Internet attacks are also growing in
at detecting the intrusions at the host stage. parallel. In earlier days, the attacker should have a
They function in my opinion at each host of the good knowledge about the target infrastructure and
community. Consequently, they are able to knowledge on the Network, Operating Systems &
operate on distinctive type and quantity of Applications. Whereas today there are lots of open
records on the equal time. The host-based tools available in the Internet which can trigger
machine is dependent on the host operating automated attacks.
system. Any vulnerability inside the host-
primarily based OS can weaken the integrity of
the host-primarily based.
of Petya the usage of Eternal Blue exploit and this consideration as the collection deviation from
was aimed to create disruption alternatively to normal profile sequence. thus, this device works
generate income. [9] offline the use of previously accrued information
and implements the view desk set of rules for
We located that there are many benefits of gaining knowledge of software profiles significantly.
C4.5algorithms for special attacks occurs on your Duan et al. [12] have concentrated on identifying
dataset and C4.5 will detect the R2L and U2R compromised machines which can be recruited to
attacks and the neural network is the use of for hit upon junk mail zombies. An method SPOT is
detecting the DOS and Probe attacks and many proposed to experiment sequentially outgoing
greater. In this, we are the usage of four algorithms. messages by means of enforcing SPRT (Sequential
The primary one is okay-manner clustering and the possibility Ratio check). This method quick
second steps are fuzzy good judgment 1/3 steps are estimates whether a number is compromised or not.
SVM and the remaining and very last step is C4.5. figuring out compromised machines using malware
The blessings of all this set of rules are to detect the contamination device is said via Bot hunter [13].
assaults from the datasets. After that, it will
examine it with the SVM and C4.5 classifiers to This machine has massive no of steps that allow
find out how many attacks are coming about in the intrusion detection alarms correlation caused using
dataset at the same time as transferring the dataset inbound visitors with outgoing message trade
from supply to destination. [8] sample consequences. Bot Sniffer [14] explained in
his paintings approximately compromised device
This center also evolved a subsequent-era traits which might be a uniform temporal-spatial
mechanism which includes audit profiles of conduct for detecting zombies. This approach
person’s and may monitor the modern-day identifies zombies by using combining flows based
reputation of the consumer, if any change takes totally on server connections and searching flows
place with person’s hobby as compared with audit with comparable conduct respectively. Kumar and
profile of person then it will generate an alarm. Goyal [15] have explained implements genetic
algorithms in dataset training to categories the
Haystack [10] later developed a framework to labels that are smurf attacked and achieves a low
estimate an intrusion detection approach based false high-quality ratio of 0.2%. in addition,
totally on person and anomaly strategies. Six paintings were completed through Abdullah [16]
varieties of intrusion have been detected and and co-people elaborated intrusion detection class
people include the masquerade assaults, malicious regulations using genetic algorithms. Intrusion
use, leakage, carrier denial, the unauthorized detection policies the usage of genetic algorithms
consumer’s wreck-ins try, and get admission to becomes also the have a look at made through
control of a protection system. The source fire Ojugo et al. [17]. This approach uses health
developed suggests a community-based intrusion characteristic for estimating the rules. system
detection and prevention mechanism referred to as learning strategies are also applied to hit upon the
snicker machine that is an open supply. Forrest [11] intrusion. current device mastering strategies
in 1996 created an ordinary profile based on (artificial Neural Networks - ANN) for intrusion
studying the call sequences between intrusion detection was described by way of Roshani group
detection and protection in opposition to a human [18]. Gaikwad et al [19] added a technique based on
machine. An assault on this device is taken into fuzzy clustering and ANN approach.
algorithm of data mining class methods. Those is k- placed into the space. These points denote the
means primary group centroids.
2. The data are assigned to the group that is
K-means Clustering Algorithm: - adjacent to
the centroid.
Clustering, primarily based on distance 3. The positions of all the K centroids are
measurements carried out on items, and classifying recalculated
gadgets (invasions) into clusters. not like type, as soon as all the data are assigned.
classification because there may be no information 4. Repeat steps 2 and 3 until the centroid
about the label of studying statistics is an unattended unchanged.
getting to know system. For anomalous detection, we
will use welding and in-intensity evaluation to guide This consequence within the partition of facts into
the identity model. Dimension of distance or groups. The preprocessed dataset partition is
similarity performs a critical function in collecting achieved the usage of the ok-means set of rules
observations into homogeneous corporations. with k value as 5. due to the fact we have the
dataset that contains regular and 4 assault
Jacquard affinity size, the longest not unusual order categories which include DoS, Probe, U2R, R2L.
scale (LCS), is vital that the occasion is to evoke the
scale to decide if regular or odd. Euclidean distance is
about two vectors X and Y in space Euclidean n-
dimensions, the size of the distance widely used for
vector area. Euclidean distance can be defined
because the rectangular root of the whole difference
of the same vector dimension. Subsequently,
grouping and category algorithms want to be
[15] Goyal, A. and Kumar, C. .GA-NIDS: A Genetic for detecting network intrusion and misuse.
Algorithm based Network Intrusion Detection Computers and Security, 12(3):235-248, May
System, Electrical Engineering and Computer 1993.
Science, North West University, Technical [23] S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan,
Report;2008.Feb. 2008. L. T. Heberlein, C. Ho, K. N. Levitt, B.
[16] Abdullah, B., Abd-algafar I., Salama G. I. and Mukherjee, S. E. Smaha, T. Grance, D. M. Teal,
Abd-alhafez A. Performance Evaluation of a and D. Mansur. DIDS (Distributed Intrusion
Genetic Algorithm BasedApproach to Network Detection System) - Motivation, Architecture,
Intrusion Detection System, Proceedings of and an early Prototype. In Proceedings of the
13th International Conference on Aerospace 14th National Computer Security Conference,
Sciences andAviation Technology (ASAT-13), pages 167-176, October 1991.
Military Technical College, Cairo, Egypt, [24] Biswanath Mukherjee, Todd L. Heberlein, and
2009;1-5. Karl N. Levitt. Network intrusion detection.
[17] Ojugo, A. A., Eboka, A. O., Okanta, O. E., Yora, IEEE Network, 8(3):26-41, May/June 1994.
R. E. and Aghware, F. O.Genetic Algorithm [25] Thomas H. Ptacek and Timothy N. Newsham.
Rule-Based IntrusionDetection System Insertion, evasion, and denial of service:
(GAIDS), Journal of Emerging Trends in Eluding network intrusion detection. Technical
Computing and Information Sciences, report, Secure Networks, Inc., January 1998.
3(8);2012; 1182 – 1194. [26] S. Staniford-Chen, S. Cheung, R. Crawford, M.
[18] Roshani Gaidhane, Vaidya, C. and Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee,
Raghuwanshi, M. Survey.Learning Techniques R. Yip, and D. Zerkle. GrIDS: A graph based
for Intrusion Detection System intrusion detection system for large networks.
(IDS),International Journal of Advance In Proceedings of the 19th National
Foundation and Research in Computer Information Systems Security Conference,
(IJAFRC) Feb 2014. ISSN 2348 – 4853, volume 1, pages 361-370. National Institute of
2014;1(2). Standards and Technology, October 1996.
[19] Gaikwad, Sonali Jagtap, D.P. Kunal Thakare [27] Gregory B. White, Eric A. Fisch, and Udo W.
and Vaishali Budhawant. Anomaly Based Pooch. Cooperating security managers: A peer
Intrusion Detection System UsingArtificial based intrusion detection system. IEEE
Neural Network and fuzzy clustering., Network, pages 20-23, January/February 1996.
International Journal of Engineering Research [28] Review Paper on Shallow Learning and Deep
& Technology (IJERT), ISSN:2278-0181, Learning Methods for Network security Afzal
November- 2012; 1(9). Ahmad1*, Mohammad Asif2, Shaikh Rohan Ali
[20] L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, 3 (page: -52) 2018
J. Wood, and D. Wolber. A Network [29] Youssef Ahmed and Ahmed Emam, “Network
SecurityMonitor. In Proceedings of the IEEE Intrusion Detection Using Data Mining and
Symposium on Research in Security and Network Behavior Analysis”, International
Privacy, May 1990. Journal of Computer Science & Information
[21] R. Heady, G. Luger, A. Maccabe, and M. Technology (IJCSIT) Vol 3, No 6, Dec 2011.
Servilla. The Architecture of a Network Level [30] X. Wu, V.Kumar, Ross Quinlan, Joydeep
Intrusion Detection System. Technical report, Ghosh, Qiang Yang, Hiroshi Motoda, Geoffrey
University of New Mexico, Department of J. McLachlan, Angus Ng, Bing Liu, Philip S. Yu,
Computer Science, August 1990. Zhi-Hua Zhou, Michael Steinbach, David J.
[22] Judith Hochberg, Kathleen Jackson, Cathy Hand, and Dan Steinberg, “Top 10 algorithms
Stallings, J. F. McClary, David DuBois, and in data mining”, Survey Paper(2008).
Josephine Ford. NADIR: An automated system
Authors Profile
Deep Learning is one of the active analysis topic obtaining a great deal of analysis attention recently. This
increase in analysis interest is driven by several area as that are being worked on like machine-based reality
finding, good over-seeing, sensory activity recognition, online learning, world of advertisement, text analysis
and so on. Videos have specific characteristics that make their method unique. Visual aesthetic typically:
Remember what they see, understand and learn rather than what they hear. This paper principally emphasizes
deep learning on basics of automatic video aesthetic assessments.
Keywords : Video Aesthetics, Preprocessing Techniques, Feature Extraction, Deep Learning, Applications.
CSEIT1951100 | Received : 20 Feb 2019 | Accepted : 28 Feb 2019 | January-February -2019 [ 5 (1) : 546-554 ]
546
Manish Bendale et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 546-554
Deep learning is a part of machine learning Aesthetics assessment is a subjective field [4] because
technology which has ability to learn and mimic the individual preferences differ according to personal
working principal of human brain. To mimic the taste too, thus what may be pleasing to one person
brain working structure the deep learning technology may not be pleasing to the other. Therefore different
required more number of datasets [3]. communities define aesthetics differently, based on
psychological and emotional aspects [8].
There is a different types of media aesthetics visions,
video aesthetics is one of the aesthetics, due to the
increasing in the popularization of high quality smart
phones, the videos and image aesthetics are in great
demands. In the current market the videos are
playing important role in various fields like,
advertisement, video conferencing, industrial
representation etc. Previous works done using
machine learning approaches, also called as
handcrafted method in which, feature extraction 2.3 Comparisons of Deep Learning with previous
were a common ways and methods for aesthetic method about Video Aesthetic Assessment
analysis. CNN is recently used method to solve
critical and complex problems as state-of-arts All the present system is based on the handcrafted
approaches [4]. methodologies as we find in literature. Hand-crafted
feature for images and videos aesthetics is good
feature extractors based on user preferences
2.2 Which are the features that can be identified?
algorithms, to design this features required a
considerable amount of engineering skill and domain
Many other specific photographic rules can be sued expertise. The main limitation is the excessive time
to discover particular aesthetic of videos by directly consumption and the accuracies of aesthetic
measuring physiological facts. This understanding assessments. There are many researches done on the
and captured information is used to processed and image aesthetics using hand crafted as well as deep
extract meaningful information from the gathered learning methods [16].
data. In the earlier research, aesthetics was defined
by Handcrafted and learned features [6]. Video aesthetics using deep learning, there exists a
scope for future research as this field is less explored
[19]. The table (table 1) shows the difference
The aesthetic quality of images and videos are judged
between the hand crafted and deep learning
by their low, middle and high level properties. The
technology:
low level properties of an image are that of color,
texture, edges and intensity [7]. The middle level
Deep Learning
property is the object in the image or video. And the Handcrafted Method
Method
high level properties are the photographic rules,
Handcrafted features Deep learning
mainly comprising of the Rules of Thirds (RoT),
judge by commonly method work on
Visual Balance (VB), Diagonal Dominance (DD),
established highly and accurate
Simplicity and the Depth of Field (DoF) [7].
photographic rules, feature extractions 2.4 Areas of Deep Learning related to video aesthetic
mainly low and middle by using hidden assessments
level features. layer concept. • Detecting and recognizing aesthetic information
This is sequential step- This is parallel Aesthetics is a study that relates to the relationship
by-step method and method using hidden between the mind and emotions in assessing beauty
time consuming to layers concept and [8]. The aim of aesthetics analysis is to define the
extract and classification required less amount science in assessing the aspects of arts and beauty
of features. of time. sought in images and videos. Human brain thinking
This method require This method structure begins with gathering information from
engineering skills and depends on the different environment which take fact about users
human experience and amount of dataset to psychology and understanding with behavior. The
do not need large train the network for fact gathered are of the form of features which are
dataset to train network. accuracy. contains in a video and this features used to perceive
Backpropagation is not Backpropagation is people understanding behind videos beauty. For
allowed to correct the main advantage of example, a camera might take pictures of the any
final results. CNN. object; Then human mind start its working and
Classification done at Allow to use more identify the object position, color contrast between
once only. fully connected layer foreground and background, Depth of Field, and etc.
for classification. • Psychology in machine
Another area within video aesthetic computing is
Table 1. Difference between the handcrafted and that the design of procedure systems to exhibit either
deep learning method. innate robust mind psychological powers or that is in
a position of as definitely acting the part of
There are the many researcher working on the deep aesthetics. An additional helpful move involving
learning to improve more accurate result in different computers based mostly on current technology based
field also. In the today life, the video aesthetic is the powers, is that the simulation of aesthetic in taking
important multimedia application. Many field use the pleasure in communication agents to boost
video for improver the selling quantity of the interactivity between human like and machine like
products. So, the video aesthetic is self-increasing communications. Thinking ability in machines could
area of aesthetic and in the future, it will go on the be connected with define states connected with
great demand. The deep learning provides a good forward development (or exist without of forward
opportunity for the video aesthetic assessment to development) of a pc primarily based learning
improve the aesthetic time and the accuracy of video system supported rules [8].
aesthetic editing. In this method, we deploy the
2.5 Another applications related to video aesthetic
multiple method of photography on the neural
network and extract the good feature using the Consider online-learning applications based on
hidden layer of neural network. computers wherein computing the users feelings can
be used to adjust the conference learning, content
can be more polished and tasteful form may be used
while teaching when a learner is uninterested, or
paused. Human Psychological being healthy,
suggestions behind aesthetic, can help to the users, 2.6 Different Algorithms Employed by Researchers
based on current emotion behind video beauty by In the work on regression and classifying video
computing applications when working out a aesthetic, the most frequently used classifier
particular user’s state of feelings [9]. algorithms are Artificial Neural Networks (ANN),
Deep Neural Network, Hidden Markov Models
Visual aesthetic has possible applications in human
(HMMs), Gaussian Mixture Model (GMM), Support
computer interaction, now a day human computer
Vector Machines (SVM), k-nearest neighbor (k-NN),
interaction is varying area in different fields. Many
and Decision Tree Algorithms. Numerous studies
researchers are working on gesture technology, in
have decisively showed that choosing the acceptable
which camera capture the video of moving body
classifier will meaningfully improve the performance
gesture and according to movement of gesture the
of the system.
machine will understand, what action required on
the basis of gesture. Virtual reality is also a greater Below gives a brief description about algorithm:
area in human computer interaction, which shows
• K-NN – Classification prediction by defining the
the 3D video and create environment according to
object in the feature space, and comparing this
human psychology and emotion at the time of
object with “k” nearest neighbors. In which the
interactions.
majority vote predict the classification of
gathered data.
Video aesthetics in Advertisements [10]: Now a day,
• GMM – it is a probabilistic based model used for
the increasing in the population the requirement of
signifying and classification of the presence of
the peoples goes on high demand. Due to renewed
sub part within the whole pats. Every sub part is
and changing consumer demands and the rapidly
outlined exploitation the mixture distribution
developing technological factors, companies need to
which permits for classification of explanations
search of new strategies to make a difference in
into the sub-parts [27].
their products. As competition increased marketers
• SVM – is used to binary linear classification and
started to focus on new approaches for product to
it is also used for regression, which selects in the
attract consumers' perception and attention. One of
two (or more) different classes, each input may
the most effective ways of differentiating is using
fall into this class [28].
video aesthetics.
• ANN – is a mathematical model, which has
In gamming area a mistake that’s unfortunately only ability to mimic brain structure of working
too common within the gaming business, is to lump process, it is enthused by biological neural
video graphics and video aesthetics together as if they networks that can work and extract feature
were the same factor. This, unnecessary to say, is similar to human mind [29].
false. The distinction becomes obvious once one • Decision Tree algorithms – are supported
compares, as an example, a heavily artificial, cartoon succeeding a decision tree throughout that the
game that aims for realism specially else. The leaves of the tree represent the classification
former’s video aesthetic, despite its presumptively result, and branches represent the conjunction
smaller budget and scope, can possibly hold up longer of consecutive features that lead to the
than the latter’s. classification [30].
Video aesthetic is also being applied to the growth • HMMs – An applied mathematics markov model
of communicative technologies for use by people during which the conditions and state
[10]. transitions are unobtainable for the observation.
In its place, the series of outputs dependent on recognize and classify by the deep learning method
the states are visible [31]. to predict accurate results.
assessments. The frame conversion and the shots Detection Method for Art Images”, IEEE
detection is help to understand the characteristics Photonics Journal ( Volume: 9, Issue: 6, Dec.
of video motion to good shot quality of videos. In 2017
the future, the feature extraction and the [7]. Roberto Gallea, Edoardo Ardizzone, and
classification both using the deep learning to take Roberto Pirrone, “Automatic Aesthetic Photo
more accurate result on aesthetics. Many editor are Composition”, Image Analysis and Processing –
working on the animation work in the videos, using ICIAP 2013: 17th International Conference,
deep learning we can modify and get the better Naples, Italy, September 9, 2013.
result over that videos. The video transmission is [8]. Stephen Groening, “Introduction: The
based on the video size, so we can use the deep Aesthetics of Online Videos”, The Aesthetics of
learning base aesthetic video transmission with less Online Videos, June 2016,
size and high aesthetic assessments. DOI: http://dx.doi.org/10.3998/fc.13761232.004
0.201
[9]. christos tzelepis, eftichia mavridaki, vasileios
V. REFERENCES
mezaris, ioannis patras, “Video aesthetic quality
assessment using kernel support vector
[1]. Dhiraj Joshi, Ritendra Datta, Elena
machine with isotropic gaussian sample
Fedorovskaya, Quang-Tuan Luong, James Z.
uncertainty (ksvm-igsu)”, IEEE Int. Conf. On
Wang, Jia Li, and Jiebo Luo, “Aesthetics and
Image Processing (Icip 2016), Phoenix, Az, Usa.
Emotions in Images”, IEEE Signal Processing
[10]. Jun-Ho Choi, Jong-Seok Lee, “Automated
Magazine, Volume: 28, Issue: 5, Sept. 2011
Video Editing for Aesthetic Quality
[2]. Xin Lu, Zhe Lin, Hailin Jin, Jianchao Yang, and
Improvement”, 23rd ACM international
James. Z. Wang, “Rating Image Aesthetics using
conference on Multimedia, Brisbane, Australia
Deep Learning ”, IEEE Transactions on
— October 26 - 30, 2015
Multimedia, Volume: 17, Issue: 11, Nov. 2015
[11]. Anselm Brachmann, Christoph Redies,
[3]. Yubin Deng, Chen Change Loy, and Xiaoou
“Computational and Experimental Approaches
Tang, “Image Aesthetic Assessment”, IEEE
to Visual Aesthetics”, Front. Comput.
Signal Processing Magazine, Digital Object
Neurosci., 14 November 2017 |
Identifier 10.1109/MSP.2017.2696576, 11 July
https://doi.org/10.3389/fncom.2017.00102.
2017.
[12]. Aarushi Gaur, “Ranking Images Based on
[4]. Yubin Deng, Chen Change Loy, and Xiaoou
Aesthetic Qualities”, Submitted for the Degree
Tang, “Image Aesthetic Assessment: An
of Doctor of Philosophy from the University of
Experimental Survey”, arXiv:1610.00838v2
Surrey, April 2015.
[cs.CV] 20 Apr 2017.
[13]. Loris Nanni, Stefano Ghidoni, Sheryl Brahna,
[5]. Ritendra Datta Dhiraj Joshi Jia Li James Z.
“Handcrafted vs. non-handcrafted features for
Wang, “Studying Aesthetics in Photographic
computer vision classification”, Elsevier Journal
Images Using a Computational Approach”,
on Pattern Recognition 71 (2017) 158–172,
Computer Science, vol 3953. Springer, Berlin,
2017.
Heidelberg, ECCV 2006
[14]. Hsin-Ho Yeh, Chun-Yu Yang, Ming-Sui Lee,
[6]. Chongke Bi ,Ye Yuan, Ronghui Zhang , Yiqing
and Chu-Song Chen, “Video Aesthetic Quality
Xiang,Yuehuan Wang, and Jiawan Zhang, “A
Assessment by Temporal Integration of Photo-
Dynamic Mode Decomposition Based Edge
[33]. https://medium.com/machine-learning-in-
practice/deep-learnings-permanent-peak-on-
gartner-s-hype-cycle-96157a1736e
[34]. NadineKrefetz , streaming media
https://www.streamingmedia.com/Authors/683
7-Nadine-Krefetz.htm
ABSTRACT
Cancer can begin in any part of the body and can spread to other parts also. It is uncontrollable and it has many
types. In the proposed thesis research paper, a tool for prediction of type of cancer risk with five different
cancer diagnosis and recommendations is presented. For recognizing cancer disease number of tests ought to be
required from the patient. But using data mining techniques these test can be diminished. Indeed, an accurate
prediction of cancer is very difficult task for medical practitioner and it is also high concern to the patients so
that better treatment can be given and it will also increase the survival time of the patients. Our findings
suggested that suitable prediction tool can effectively reduce the several tests for diagnosing cancer and
prediction accuracy thereby increasing the technical possibility of early detection of cancer. The main features
of the tool comprise a balance between the number of necessary inputs and prediction performance, being
portable, and it empowers the automatic development of the cancer risk prediction tool in cancer disease.
Keywords : Prediction Tool, Cancer, Data Mining, Automation, Integration.
CSEIT1838116 | Received : 28 Dec 2018 | Accepted : 03 Jan 2019 | January-February -2019 [ 5 (1) : 01-08 ]
01
Pallavi Mirajkar, Dr. G. Prasanna Lakshmi Int J S Res CSE & IT. January-February-2019 ; 5(1) : 01-08
that may be identified with patient’s details. Based on paper work is very helped to the cancer research
result, system automatically demonstrates the result center and hospitals to prevent the Non Small Cell
to specific doctors for specific test/ treatment. Lung Cancer.
II. LITERATURE REVIEW Arpit Bansal et, al.(2017) have proposed technique for
a modification in K-Means Clustering Algorithm. In
Fan Wang et.al (2018) worked on predictor to proposed modification, the K-Means clustering will
precisely predict six breast cancer cell types using vanish off the two most important drawbacks of K-
gene expression. They identified 308 predictors of Means clustering that are accuracy level and
breast cancer cell types using machine learning. calculation time consumed in clustering the dataset.
They found that mixture of protein coding genes and Although when they have also used small datasets
long non-coding RNAs are superior predictors these two factors accuracy level and calculation time
compared to when the two sets of transcripts are may not matter much but when they used large
treated independently. They have also shown that datasets that have trillions of records, then little
predictors constrained to a particular cell type dispersion in accuracy level will matter a lot and can
provide as better prognostic markers for the relevant lead to a disastrous situation, if not handled properly,
patient subtype. Author has stated that the breast it can be stated that proposed modification can be
cancer cell type predictors are also related with more extended to achieve the full accuracy level up
patient survivability and therefore have clinical to 100%, with very little time and with more quality
significance. clusters.
Subrata Kumar Mandal (2017) have applied different R.Senkamalavalli and Dr.T.Bhuvaneswari (2017) have
techniques such as data cleaning, feature selection, proposed novel algorithm was experimented on the
feature extraction, data discretization and Breast cancer database. It has been proved that
classification for predicting breast cancer as perfectly. proposed approach achieved a very high accuracy
They stated that Logistic Regression Classifier gives rate than the existing methods. They also
the maximum accuracy with reduced subset of demonstrated a certain level of accuracy in the
features and time complexity of proposed algorithm is classifier, and for finding accurate results there must
least compared to other two classifiers. be sufficient preprocessing of data done. They have
also demonstrated accuracy in diagnosing breast
R.Kaviarasi, Dr.A.Valarmathi (2017) has applied two cancer disease using the K-means classifier, adaboost
types of clustering. The hierarchical clustering is and Support Vector Machines.
produced dendrogram results are produced using
Euclidean distance and Ward.D linkage. The K- Sumalatha.G, Archana.S (2017) has analyzed cancer
Means clustering are produced WSS values against patient data using ZeroR method and J48 algorithm
number of cluster K values. The proposed method of data mining techniques. They stated that proposed
finally validate to the two type of clustering fit values. cancer risk prediction system may give easy and a
The validation measurement result is helped to the cost effective approach for screening cancer and may
distance are measured in two clustering values. The play a significant role in earlier diagnosis process for
results are helped to at the beginning of Non Small different types of cancer. Proposed system can also be
Cell Lung Cancer prevention through human way of used as a source of record with detailed patient
life handled risk factors characteristics. The proposed
Store Computed
Score 4.4 System Architecture
The proposed cancer risk prediction tool is developed
Display Results using various web technologies such as HTML, CSS
and Java Script. It is suitable for several platforms and
Fig. 1 Working of Cancer prediction system is distributable through an application store, just like
other applications. The proposed tool is developed
IV. METHODS AND MATERIAL using Angular JS which wraps the HTML/JavaScript
app into a native container which can access the
4.1 Methodology device functions of multiple platforms. When the
Collected data is prepared to fit into the developed medical practitioner submits the values for multiple
tool appropriately. Here converse about the entire queries, the data is sent over the HTML POST
procedure (collection of data to significant pattern) of method. The data is inserted into a Postgre SQL
prediction of different types of cancer risk level. innodb database and, for each new registration. The
proposed tool generates new XML file for each type
4.2 Data Collection of cancer. For the health care industry, cancer
Collection of data for the developed prediction tool prediction applications yielded new boundaries in
has been done from different diagnostic centers providing better care and treatments to patients.
which contain both male female data of different ages Furthermore, it is building a revolution in the way
and from the various non-patients those who want to data is managed and made available [21]. The
Sends
Queries
Updates
Queries
Uses
Gender Responses
Male 76
Female 93
Total 169
Table 1
VI. CONCLUSION
Pradesh, India
ABSTRACT
Recommendation system helps people in decision making an item/person. Recommender systems are now
pervasive and seek to make profit out of customers or successfully meet their needs. Companies like Amazon
use their huge amounts of data to give recommendations for users. Based on similarities among items, systems
can give predictions for a new item’s rating. Recommender systems use the user, item, and ratings information
to predict how other users will like a particular item. In this project, we attempt to under- stand the different
kinds of recommendation systems and compare their performance on the Movie Lens dataset. Due to large size
of data, recommendation system suffers from scalability problem. Hadoop is one of the solutions for this
problem.
Keywords : Hadoop, Collaborative filtering, Machine Learning, HDFS, RSSI
I. INTRODUCTION then the user will simply stop using it. This has led to
a high emphasis by tech companies on improving
Recommendations system is a type of information their recommendation systems. However, the
filtering system which attempts to predict the problem is more complex than it seems. For
preferences of a user, and make suggests based on recommendation, our proposed system uses
these preferences. There are a wide variety of collaborative filtering machine learning algorithm.
applications for recommendation systems. These have Collaborative filtering (CF) is a machine learning
become increasingly popular over the last few years algorithm which is widely used for recommendation
and are now utilized in most online platforms that we purpose. Collaborative filtering finds nearest neighbor
use. The content of such platforms varies from movies, based on the similarities. The metric of collaborative
music, books and videos, to friends and stories on filtering is the rating given by the user on a particular
social media platforms, to products on e-commerce item. Different users give different ratings to items.
websites, to people on professional and dating Users, who give almost same rating to items, are the
websites, to search results returned on Google [1]. nearest neighbors. In case of User based collaborative
Due to the advances in recommender systems, users filtering, based on the ratings given by the users,
constantly expect good recommendations. They have nearest neighbors has been find. Item based
a low threshold for services that are not able to make collaborative filtering predicts the similarity among
appropriate suggestions. If a music streaming app is items. To recommend an item, items which are liked
not able to predict and play music that the user likes, by the user in his past have been found. Item which is
CSEIT19511| Received : 01 Jan 2018 | Accepted : 03 Jan 2019 | January-February -2019 [ 5 (1) : 09-15 ]
09
Bheema Shireesha, Navuluri Madhavilatha, Chunduru Anilkumar Int J S Res CSE & IT. January-February-2019 ; 5(1) : 09-15
similar to those items has been recommended [2]. measurements and analysis were made. The
Internet contains a huge volume of data for remaining part of this report is as follows: Related
recommendation purpose. Due to size of data, if Works, Measurement Setup, Proposed Work,
recommendation computation has been done in single Measurements Analysis, Results, Discussions, Future
system, then performance may degrade, and we Work.
cannot find an efficient solution. Hence we require
distributed environment so that computation can be II. RELATED WORK
increased and performance of recommendation
system gets improve .My goal is to apply a 2.1 Collaborative Filtering
collaborative filtering algorithm in a rating website
that collects users’ information, such as location and In the collaborative filtering algorithm, the system
gender, item’s information, such as category and has a recorded set of items and users and how the
description, as well as ratings for items by users. There users rated those items. Then algorithm is used to
are many algorithms that could be applied on data to predict the rating for a user who has not rated the
predict a user preference. User-based, Item-based, and item yet. A rating for an item can be predicted from
Model-based methods are ways of predicting a user the ratings given to the item by users who are similar
preference. The number of users, items, or clusters in in taste to the given user. The traditional collaborative
each one respectively will determine the function filtering algorithms include User-based, Item-based,
performance [3]. However, the most well-known and and Model based methods. To explain how these
common one is User-based Collaborative Filtering. In methods works we are going to use the following
this algorithm, we predict an item’s rate for a user by notations [6]. “Let U be a set of N users and I a set of
collecting information about this user and similar M items. The traditional collaborative filtering
users. algorithms include User-based, Item-based, and
Model based methods. To explain how these methods
Machine Learning: works we are going to use the following notations.
Applying machine learning in real-time using “Let U be a set of N users and I a set of M items. Vui
Collaborative Filtering. Parsing data retrieved from a denotes the rating of user u U on item i I, and SI
database and predicting user preference. Evaluating stands for the set of items that user u has rated”.
different approaches of recommender systems. What I
was trying to do was to build a system that collects 2.2 User Based Collaborative Filtering
information and then uses the stored data in a In this method, we predict the user behavior against a
machine learning algorithm [4]. Predicting users’ certain item using the weighted sum of deviations
preferences using data may give more accurate results from mean ratings of users that previously rated this
than any algorithm that does not use previous data. item and the user mean rate. The weight that we
Most systems like Amazon, eBay, and others suggest previously mentioned can be calculated using Pearson
things to users based on similarities among users, Correlation according to the following formula:
items, or both. This will make those systems more
personalized and efficient from a user’s perspective.
Commercial and trading systems gain trust and profits
The prediction formula is stated as below:
using such systems if they successfully predict what
users want at what time and where. The datasets were
created and averaged [5]. The corresponding
3.2 Definition 2
2.3 Model-Based Collaborative Filtering
In this method, the system will use an unsupervised Collaborative Filtering: Collaborative Filtering
learning method to partition the space and then techniques make recommendations for a user based
classify the users using a similarity metric to a on ratings and preferences data of many users. The
segment or a cluster. To avoid having large clusters, main underlying idea is that if two users have both
systems use different methods to generate more small liked certain common items, then the items that one
practical clusters. This process starts with an initial set user has liked that the other user Search Engine
of clusters that contains only one user, and then Architecture.
repeatedly assigns users to these clusters based on a
similarity metric. Limiting features may become 3.3 Definition 3
necessary to reduce clustering complexity. The system
will create vectors for each segment and match the Content Based Recommendation: Content Based
user to the vector. Nonetheless, the user may be Recommendation algorithm takes into account the
classified as belonging to more than one cluster with a likes and dislikes of the user and generates a User
measure of similarity strength . Profile. For generating a user profile, we take into
account the item profiles (vector describing an item)
and their corresponding user rating. The user profile
is the weighted sum of the item profiles with weights
being the ratings user rated. Once the user profile is
generated, we calculate the similarity of the user
profile with all the items in the dataset, which is
III. PRELIMINARIES
calculated using cosine similarity between the user
profile and item profile. Advantages of Content Based
3.1 Defination1
approach is that data of other users is not required and
the recommender engine can recommend new items
Recommended system: A recommendation system is a
which are not rated currently, but the recommender
type of information filtering system which attempts to
algorithm doesn’t recommend the items outside the
predict the preferences of a user, and make suggests
category of items the user has rated.
based on these preferences. There are a wide variety
of applications for recommendation systems. These
IV. PROPOSED APPROACH
have become increasingly popular over the last few
years and are now utilized in most online platforms
4.1 Proposed System
that we use [7]. The content of such platforms varies
from movies, music, books and videos, to friends and
For recommendation, our proposed system uses
stories on social media platforms, to products on
collaborative filtering machine learning algorithm.
ecommerce websites, to people on professional and
Collaborative filtering (CF) is a machine learning
dating websites, to search results returned on Google.
algorithm which is widely used for recommendation
purpose. Collaborative filtering finds nearest neighbor
based on the similarities. The metric of collaborative implementations, consult the Breese etc. All paper
filtering is the rating given by the user on a particular and/or our code.
item. Different users give different ratings to items.
Users, who give almost same rating to items, are the Item-based collaborative filtering is a model-based
nearest neighbors. In case of User based collaborative algorithm for making recommendations. In the
filtering, based on the ratings given by the users, algorithm, the similarities between different items in
nearest neighbors has been find. Item based the dataset are calculated by using one of a number of
collaborative filtering predicts the similarity among similarity measures, and then these similarity values
items. To recommend an item, items which are liked are used to predict ratings for user-item pairs not
by the user in his past have been found. Item which is present in the dataset. The system will search group
similar to those items has been recommended. for users by using k-means to find the distance
Internet contains a huge volume of data for between users, the group of users and clustering of
recommendation purpose. Due to size of data, if users. The system clustering with the k- means
recommendation computation has been done in single algorithms by measuring the distance of each data
system, then performance may degrade, and we point from the center of the 10 groups by using
cannot find an efficient solution. Euclidean distance and calculated information will be
stored in the database.
Hence we require distributed environment so that
computation can be increased and performance of 4.2 User Based CF
recommendation system gets improve. My goal is to
apply a collaborative filtering algorithm in a rating The dataset is firstly loaded into Hadoop distributed
website that collects users’ information, such as file system (HDFS). Then we perform User-based CF
location and gender, item’s information, such as using Mahout [9]. We take rating matrix, in which
category and description, as well as ratings for items each row represents user and column represents item,
by users. There are many algorithms that could be corresponding row-column value represents rating
applied on data to predict a user preference. User- which is given by a user to an item. Absence of rating
based, Item-based, and Model-based methods are value indicates that user has not rated the item yet.
ways of predicting a user preference [8]. The number There are many similarity measurement methods to
of users, items, or clusters in each one respectively compute nearest neighbors. We have used Pearson
will determine the function performance. However, correlation coefficient to find similarity between two
the most well-known and common one is User-based users [10]. Hadoop is used to calculate the similarity.
Collaborative Filtering. In this algorithm, we predict The output of the Hadoop Map phase i.e. userid and
an item’s rate for a user by collecting information corresponding itemid are passed to reduce phase. In
about this user and similar users. reduce phase, output has been generated and sorted
according to userid. Output again has been stored in
Memory-based algorithms approach the collaborative HDFS.
filtering problem by using the entire database. As
described by Breese et. al , it tries to find users that 4.3 Item Based CF
are similar to the active user (i.e. the users we want to
make predictions for), and uses their preferences to 3.2 Item Based CF Dataset is loaded into HDFS, then
predict ratings for the active user. This page will talk using Mahout we performs Item based CF. Past
about the general ideas; for specific equations and information of the user, i.e. the ratings they gave to
the global average value adjusted for the user bias and Collaborative filtering is the most successful and
movie bias. popular algorithm in the recommender system’s field.
It helps customers to make a better decision by
The adjusted average rating is given by recommending interesting items. Even though this
ri j = lobalav + (uav(i)ij) + (mav(j)ij) algorithm is the best, it suffers from poor accuracy
and high running time. To solve these problems, this
The user bias is given by the difference between the paper proposed a recommendation approach based on
average user rating and the global average rating. The user clustering by using the Euclidian distance to
movie bias is given by the difference between the calculate two users to cluster dataset. This method
average movie rating and the global average rating. combines clustering and neighbors’ vote to generate
Consider the following example which demonstrates predictions. In the future there may be techniques,
the working of the adjusted average method. fuzzy c-means in the group stages of the first system
to provide a more effective segmentation.
5.2 Dateset:
For experiment, we have used MovieLens dataset of VII. REFERENCES
size 1M. The dataset contains 10000054 ratings and
95580 tags applied to 10681 movies by 71567 users. [1]. A Survey of Collaborative Filtering
There are three files, movies.dat, ratings.dat and Techniques;https://www.hindawi.com/journa
tags.dat. Ratings data file has at least three columns; ls/aai/2009/421425/.,2017, Vol. 13(7).
those are UserId, given by user to movie. [2]. Google News Personalization: Scalable
Online Collaborative Filtering; Das et al;
5.3 Result Analysis: https://www2007.org/papers/paper570.pdf
For movie recommendation, important factor is the [3]. Intro to Recommender Systems:
list of recommended items as soon as possible. Since Collaborative
we are using Hadoop, speedup and efficiency varies as Filtering;http://blog.ethanrosenthal.com/2015
number of nodes varies. To analyze this we have /11/02/intro-to-collaborative -filtering/"
obtained the number of movies which are [4]. Zhan J, Hsieh CL, Wang IC, Hsu TS, Liau CJ,
recommended as threshold changes, Speedup and Wang DW. Privacy-preserving collaborative
efficiency according to number of nodes. recommender systems. IEEE Transactions on
Systems, Man, and Cybernetics, Part C
VI. FUTURE WORK AND CONCLUSION (Applications and Reviews).
[5]. Gong S. A collaborative filtering
Most obvious ideas is to add features to suggest movies recommendation algorithm based on user
with common actors, directors or writers. In addition, clustering and item clustering. Journal of
movies released within the same time period could Software. 2010; 5(7):745-52.
also receive a boost in likelihood for recommendation. [6]. Manvi SS, Nalini N, Bhajantri LB.
Similarly, the movies total gross could be used to Recommender system in ubiquitous
identify a user’s taste in terms of whether he/she commerce. In international conference on
prefers large release blockbusters, or smaller indie electronics computer technology 2011 (pp.
films. However, the above ideas may lead to over 434-8). IEEE.
fitting, given that a user’s taste can be highly varied, [7]. Pu P, Chen L, Hu R. A user-centric
and we only have a guarantee that 20 movies evaluation framework for recommender
ABSTRACT
Concurrency Control entails the synchronization of accesses to the distributed database, such that the integrity
of the database is maintained. Devising an efficient concurrency control technique is challenging. There is a
need for improvised concurrency control technique to coordinate the simultaneous execution of transactions in
a multi-processing database system. Traditionally, concurrency control techniques are locking, timestamp
ordering and optimistic. These techniques have been evaluated by analytical modeling. In this undertaken work,
the analytical modeling has been investigated and evaluated. The concurrency control in order to improve
optimistic validation method with the traditional techniques, a new technique has been proposed.
Keywords : DBMS, DDBMS, Concurrency, Lock Maintenance, Restart Overhead, Abort Ratio, Deadlock
Possibility
CSEIT19517 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 16-21 ]
16
Monika Patel, Prof. Dr. Dhiren B. Patel et al. Int J S Res CSE & IT. January-February-2019 ; 5(1) : 16-21
II. RELETED WORK transaction releases its locks after phase 1 of the
protocol.
Traditionally, concurrency control techniques have
been divided into three categories – locking, A lock manger in different servers set their locks
timestamp ordering and optimistic. Concurrency independently of one another. It is possible that
control techniques have been evaluated by analytical different servers may impose different ordering on
modeling. Kung and Robinson have the first to transactions. Consider the following interleaving of
develop the Optimistic Concurrency Control. transactions T1 and T2 at servers X and Y [8].
unrestricted. A transaction reads the values of a set of value updated only when it does not affect the
objects and assigns them to a set of local variables. consistency of the database. If updating of transaction
2. Compute: The transaction calculates a set of values not making database inconsistent, then transaction is
for data objects called the write set. These values are updated to the database and it is recorded in the
assigned to a set of matching local variables. Thus, all successfully completed transaction table, and if
writes after calculation take place on a transaction’s updating of transaction makes database inconsistent
copy of the objects of the database. then updated values removed from the temporary
3. Validate: The transaction’s local read set and write memory and it is recorded in the roll backed
set are validated against a set of committed transaction table. Finally, all the transactions are
transactions. recorded in the transaction log table.
4. Commit and Write: If the transaction succeeds in
validation, it is considered committed in the system In this work, an Improved Optimistic Validation
and is assigned a timestamp, otherwise the Method has been proposed, to improve the optimistic
transaction is rolled back or restarted at either the method. In this method, all the transactions are
compute phase or the read phase. If a transaction executed without restriction and when they need to
succeeds in the validation phase, its write set is made update the database, they have to pass the validation
global and the values of the write set become values test but in the improved method read transaction
of entities in the database at each node. does not go for validation check, so it decreases the
possibilities of restart or abort the transaction.
III. PROPOSED WORK
The major problem with optimistic method was
Model for Concurrent Execution in Distributed when one transaction go for validation, due to some
Databases reason it gets aborted because the resources used by
this transaction is also used by any other transaction
The below Fig 1. Shows the basic model for so there is the possibility of conflict. Once the
concurrent execution in distributed databases. transaction is aborted it gets the same timestamp and
Distributed databases mean there are multiple users starts execution, but it can also happen that the same
who are accessing data from various sites and it may resources used by the other transaction and so that
happen that two or more than two users accessing the transaction again gets aborted.
same data at the same time, at this situation problem
comes. When transaction gets aborted several times and does
not get finished or does not get the chance to execute,
The model shows the basic multiuser environment which means the transaction is in the condition of
with concurrent transactions and it’s after results. starvation. Starvation is the situation where
Assume n numbers of transactions are simultaneously transaction doesn’t get the fair chance to execute.
accessing the same database and executed the
numbers of operations in the one transaction. That
means several updates, read, delete operations are
going to be performed on the single database at time.
As soon as transaction starts its execution database
program identify the table and column in which data
is going to be read from or written into. Transaction
IV. RESULTS
The above table shows the comparison between three
The Improved Optimistic Validation Method gives methods with some common criteria. Method 3 is
optimum performance when the system has improved method, developed during this research
minimum conflict ratio and the transactions are read work. If we look into the table, method 3 has been
in most cases. The proposed method does not disturb improved in two parameters – Validation for read
read transaction, increases the execution of transactions and starvation for execution.
transaction. The additional feature has been added of
the starvation. Due to the abort ratio, sometime one V. CONCLUSION
of the transactions is not able to perform and gets
aborted many times, in that case proposed method The Improved Optimistic Validation Method solves
helps the transaction to execute with different above discussed problems in the field of concurrency
conditions. control. The proposed method provides non-locking
algorithm for the transaction execution. It reduces
Comparison of ORDER, Optimistic and Improved the overhead of lock acquisition and lock releases.
Optimistic Validation Method The improved method uses no locks, meets no
deadlock leads to minimum abort ratio.
In this section of chapter, we will compare the
methods which are previously developed and new The assumption was made that, proposed method
one. The comparison criteria have been selected as suits to the environment having minimum conflict.
per the need of the database environment. We will And the most of the transaction has read operation to
compare three methods listed below in the Table 2. perform. The main aim to develop this method is to
improve the efficiency and transaction execution
Method 1: ORDER speed.
Method 2: Optimistic Method
Method 3: Improved Optimistic Validation Method The Improved Optimistic Validation Method
provides the direct access of the data without any
locking. In the method each transaction gets the
timestamp which is the real arrival time of the
transaction. There are three phases of the method:
Operational phase, Validation Phase, and Update [8]. G. Coulouris, J. Dollimore and T. Kindberg T.
phase. Distributed Systems Concepts and Design,
published by Pearson Education Limited 2005.
Limitations and Future Enhancements [9]. Morris R., Wong W., Performance analysis of
locking and optimistic concurrency control
The Improved Optimistic Validation Method is algorithms, May 1985.
efficient to work with the system having minimum [10]. M. Mohamed, M. Badawy, A. El-Sayed., Survey
conflicts, at the same time the proposed method may on Concurrency Control Techniques,
not sufficient in the case where possibility of conflict Communications on Applied Electronics (CAE)
is very high and number of write transactions is high. – ISSN : 2394-4714 Foundation of Computer
A method can be developed, which can control over Science FCS, New York, USA,2016
write transactions using locking concept. A new
method can be derived to enhance proposed method Cite this article as :
the way, read transactions should not be disturbed.
Monika Patel, Dr. Dhiren B Patel, "Comparison and
VI. REFERENCES an Improved Validation Optimistic Approach for
Concurrency Control", International Journal of
[1]. B. Bhargava, Concurrency Control in Database Scientific Research in Computer Science, Engineering
Systems, IEEE Transaction on Knowledge and and Information Technology (IJSRCSEIT), ISSN :
Data Engineering, JANUARY/FEBRUARY 2456-3307, Volume 5 Issue 1, pp. 16-21, January-
1999. February 2019.
[2]. A. Thomasian, Concurrency Control: Methods, Available at doi :
Performance, and Analysis, ACM Computing https://doi.org/10.32628/CSEIT19517
Surveys, March 1998. Journal URL : http://ijsrcseit.com/CSEIT19517
[3]. H. T. Kung, J. T. Robinson, On Optimistic
Methods for Concurrency Control, ACM
Transactions on Database Systems, Vol 6, No. 2,
June 1981.
[4]. P. L. Lehman, AND S. B. Yao, Efficient locking
for concurrent operations on B-trees. Submitted
for publication.
[5]. R. Shrinivasan, Network-Aided Concurrency
Control in Distributed Databases, January 2002.
[6]. S. Ceri, G. Pelagatti, Distributed Databases
Principals and Systems, McGraw-Hill
International Edition, 1985.
[7]. A. Thomasian, Distributed Optimistic
Concurrency Control Methods for High
Performance Transaction Processing, IEEE
Transaction on Knowledge and Data
Engineering, VOL. 10, NO. 1, January/February
1998.
In the contemporary world, Data analysis is a challenge in the era of varied inters disciplines through there is a
specialization in the respective disciplines. In other words, effective data analytics helps in analyzing the data of
any business system. Flight delays hurt airlines, airports, and passengers. Their prediction is crucial during the
decision-making process for all players of commercial aviation. The goal of our project is to get monthly wise
statistics of airline data and taking particular airport as target we are further analyzing the data to get the
hourly statistics. And also we are finding out the most popular source-destination pairs and calculating the
average delays at every airport. The data for this project comes from the stat-computing.org website. In
particular, in the year 2008 data 70,09,728 titles recorded there which includes information on the Origin,
Destination, Month, Year, DayofWeek, DayofMonth, DepDelay, ArvDelay, DepTime, ArvTime and a few other
less interesting variables. Conveniently, you can export the data directly as a csv file.
Keywords : Machine Learning, Data Mining, Big Data, Statistics, Data Visualization, Data Analytics, ASCII, SRS,
GNU
I. INTRODUCTION Data:
Data is a set of values of qualitative or quantitative
The goal of our project is to get monthly wise variables. It can representation of facts as text,
statistics of airline data and taking particular airport numbers, graphics, images, sound or video. Raw data,
as target we are further analyzing the data to get the also known as primary data, is collected from a source.
hourly statistics. And also we are finding out the If a scientist sets up a computerized thermometer
most popular source-destination pairs and calculating which records the temperature of a chemical mixture
the average delays at every airport [1]. The data for in a test tube every minute, the list of temperature
this project comes from the statcomputing.org readings for every minute, as printed out on a
website in particular, in the year 2008 data 70,09,728 spreadsheet or viewed on a computer screen is "raw
titles recorded there which includes information on data" [2]. Raw data can be input to a computer
the Origin, Destination, Month, Year, DayofWeek, program or used in manual procedures such as
DayofMonth, DepDelay, ArvDelay, DepTime, analyzing statistics from a survey. The term "raw
ArvTime and a few other less interesting variables. data" can refer to the binary data on electronic
Conveniently, you can export the data directly as a storage devices, such as hard disk drives (also referred
csv file. to as "low-level data"). All software is divided into
two general categories: data and programs. Programs
CSEIT19514 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 22-29 ]
22
Navuluri Madhavilatha et al. Int J S Res CSE & IT. January-February-2019 ; 5(1) : 22-29
are collections of instructions for manipulating data. between variables. Once you find these insights, you
Strictly speaking, data is the plural of datum, a single validate the findings by applying the detected
piece of information. In practice, however, people patterns to new subsets of data. The ultimate goal of
use data as both the singular and plural form of the data mining is prediction [5]. Data Science is an
word [3]. The term often used to distinguish binary umbrella that contain many other fields like Machine
machine-readable information from textual human- learning, Data Mining, big Data, statistics, Data
readable information. For example, some applications visualization, data analytics etc.
make a distinction
II. METHODS AND MATERIAL
R provides a wide variety of statistical (linear and R is designed around a true computer language, and it
nonlinear modelling, classical statistical tests, time- allows users to add additional functionality by
series analysis, classification, clustering etc) and defining new functions. For computationally-
graphical techniques, and is highly extensible [6]. intensive tasks, C, C++ and FORTRAN code can be
The S language is often the vehicle of choice for linked and called at run time. Advanced users can
research in statistical methodology, and R provides an write C code to manipulate R objects directly. Many
Open Source route to participation in that activity. users think of R as a statistics system. We prefer to
think of it of an environment within which
One of R’s strengths is the ease with which well- statistical techniques are implemented. R can be
designed publication-quality plots can be produced, extended (easily) via packages. There are about eight
including mathematical symbols and formulae packages supplied with the R distribution and many
where needed. Great care has been taken over the more are available through the CRAN family of
defaults for the minor design choices in graphics, but Internet sites covering a very wide range of modern
the user retains full control. statistics. R has its own Latex-like documentation
format, which is used to supply comprehensive
R is available as Free Software under the terms of documentation, both on-line in a number of formats
the Free Software Foundation’s GNU General Public and in hardcopy.
License in source code form. It compiles and runs on
a wide variety of UNIX platforms and similar systems 3.3 R Studio
(including FreeBSD and Linux), Windows and MacOS.
R Studio is an integrated development environment
3.2 The R Environment (IDE) for the R programming language. Some of its
features include: Customizable workbench with all of
R is an integrated suite of software facilities for data the tools required to work with R in one place
manipulation, calculation and graphical display. It (Console, source, plots, workspace, help, history, etc.).
includes an effective data handling and storage Syntax highlighting editor with code completion.
facility, a suite of operators for calculations on arrays,
in particular matrices, a large, coherent, integrated Execute code directly from the source editor (line,
collection of intermediate tools for data analysis, selection, or file). Full support for authoring Sweave
graphical facilities for data analysis and display either and TeX documents.
on-screen or on hardcopy, and a well-developed,
simple and effective programming language which Runs on all major platforms (Windows, Mac, and
includes conditionals, loops, user-defined recursive Linux) and can also be run as a server, enabling
functions and input and output facilities[7]. The term multiple users to access the R Studio IDE using a web
“environment” is intended to characterize it as a fully browser.
planned and coherent system, rather than an
incremental accretion of very specific and inflexible
tools, as is frequently the case with other data
analysis software.
IV. System Design graph we can conclude that most number of flights
(627931) are running in July month. And second
most number of flights (616090) are running in
March month.
Indy as Origin:-
V. Experimental Results
Indy as Destination:
From the below graph we can conclude that more
number of flights are arriving Indy airport in the
month of July and the less number of flights in the
month of November.
5.2.4 Hourly wise statistics of Indy airport 5.3 Source to Destination airport pairs
Indy as Origin:- Here we are going to take a look at the most and
From the below graph we can conclude that more least popular airport-pairs based on the flights
number of flights are leaving the Indy airport in the operating in between them (Means one as Origin
duration of 6am – 7am and the less number of flights and another as Destination).
in the duration of 12am –
4 am in a day. 5.3.1 Most Popular
Indy as Destination:- These are the top 6 airport pairs with max number
From the below graph we can conclude that more of flights running between them. In these SFO to
number of flights are arriving the Indy airport in the LAX stands first with 13788 running.
duration of 10am – 11am and the less number of
flights in the duration of 2am. 5.3.2 Least Popular
These are the least 6 airport pairs with minimum
number of flights running between them.
VIII. REFERENCES
ABSTRACT
Li-Fi stands for Light-Fidelity. This technology is very new and was proposed by the German physicist Harald
Haas in 2011. Light based communication system is the backbone of the future of the communication system.
Li-Fi is a wireless technology that uses light emitting diodes (LEDs) for transmission of data. The development
of the wireless communication leads to advance research in LiFi technology. The term Li-Fi states to visible
light communication (VLC) technology that uses as medium to deliver high-speed communication in a fashion
similar to Wi-Fi. Li-Fi comprises a wide range of frequencies and wavelengths, from the Infrared through
visible and down to the Ultraviolet spectrum. The immense use of Li-Fi may solve some bottleneck of data
transmission in Wi-Fi technology. With the innovation in technology and the number of users, the existing
radio-wave spectrum fails to accommodate this need. To resolve the issues of scalability, availability and
security, we have come up with the concept of transmitting data wirelessly through light using visible light
communication (VLC) technology. This paper objective is to study and describe the LiFi technology. The
improvement of the wireless communication leads to advance research in LiFi technology through Visible
Light Communications (VLC) Technology.
Keywords : Visible Light Communications (VLC), Light Emitting Diodes (LEDs), Radio Frequency (RF),
Infrared (IR), Remotely Operated Vehicles (ROVs), Line of Sight (LOS).
CSEIT1838108 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 30-37 ]
30
Imran Siddique et al. Int J S Res CSE & IT. January-February-2019 ; 5(1) : 30-37
modulation of data to optics and the optical technological communication at ultra-high speed
communication channel as shown in Fig -3: greater that of current wireless systems One of the
goals of researchers is to allow 100 megabits of data
transference per second (Mbps) in offices and homes
by modulation of light from promoted lighting
systems. If it is developed correctly, the possibility
exists that many of the problems associated with
present day infrared, radio wave and microwave
communications systems could be at least partially
Fig -1: Visible Light Communication (VLC) Systems resolved, and a more biologically friendly system
[6]
made existing to industries and the general public.
Fig -3: Block diagram of a VLC architecture [5] The Gamma rays cannot be used as they could
be dangerous [10].
C. LED (LIGHT EMITTING DIODE) VLC X-rays has related health issues.
TECHNOLOGY Ultraviolet light is good for place without
people, but otherwise dangerous for the human
LED (Light Emitting Diode) Visible Light body.
Communications (VLC) systems are familiar as Infrared, due to eye safety regulation, can only
creating a possible valuable addition to future be with low power [10].
generations of technology, which have the potential Radio waves penetrate through the walls so they
to utilize light for the purposes of advanced arises security issues.
Hence we left with the only the visible- “Light ✓ A good silicon photodiode, as a receiving
Spectrum”. element.
B. DISADVANTAGES OF LI-FI
and controlling the traffic struck and increasing Difference between LIFI and WIFI
accident ratios in developing countries. The LED car
lights can alert drivers when other vehicles are too Parameters Li-Fi Wi-Fi
close via LiFi technology. Transmitter LED Antenna
Frequency band 1000 times 2.4 GHz
C. Better Replacement for Other Technologies
of THz
Standard IEEE 802.15.xx IEEE 802.11xx
Li-Fi uses Visible Light Communication Technology No of users Under The Depend on
(VLC) Instead of Radio Waves. So, it can be easily All over Lamp.(LEDs) access Point.
Data Bits Radio waves
installed at those places where Bluetooth, Infrared,
Transmission
Wi-Fi can’t work properly.
Topology Point to Point Point to
Multipoint
D. Underwater Applications Communicat Based on Visible Based on Radio
ion Light Frequency
Li-Fi can even work underwater where Wi-Fi fails Communication Communication
completely, if the cables of the Remotely Operated (VLC).
Vehicles (ROVs) which operate at a long distance Availability Anywhere, Limited
from the surface are replaced with light (LEDs), available in
which is water-logged then it is easier to access the Airplanes and
internet [16]. Underwater
Power Less More
Consumptio
E. Exclusive Medical Applications
n
Environment Low Medium
Wi-Fi cannot be installed at Hospitals/Operation Impact
Theatres/Medical Laborites as these radio waves can Cost Low High
interfere with the Cellphones/Tablets PC which can Bandwidth Unlimited Limited
block the signals for monitoring equipments thus
proving hazardous to the patient’s health. Usage of G. Industrial Automation
Li-Fi provides more advanced monitoring techniques
and operation strategies. Anywhere in industrial areas data has to be
transmitted, Li-Fi is capable of interchanging slip
F. Cheaper Internet in Aircrafts rings, sliding contacts and short cables, such as
Industrial Ethernet. Due to the real time capability of
The passengers travelling in aircrafts have to Li-Fi, it is also an alternative to common industrial
prescribes to put their electronic devices in the Flight Wireless standards.
Mode or No Internet Mode, because in an aircraft as
these signals may interfere with the navigation H. Safety Environments
signals. So, Wi-Fi is practically impossible in this
scenario.Li-Fi can easily provide high speed Internet In explosion risk environments, the use of electrical
via every light source such as overhead reading LEDs equipment, including mobile phones, is generally
present inside the airplane. greatly restricted. The use of Li-Fi to pass data will
simplify the configuration of data networks in such
environments, and can permit new systems to [3] R.Mallika@Pandeeswari; “Survey of (LI-FI) Light
enhance security in these environments [19]. Fidelity” ,2nd Year-IT, Department of Information
Technology, Mepco Schlenk Engineering College
V. CONCLUSION [International Conference on Emerging Trends in
Applications of Computing (ICETAC 2K17)
Li-Fi is the trend of today and near future. It is one of http://www.ijetjournal.org ISSN: 2395-1303]
[4] Mr. Korde S. K; “Review Paper on Li-Fi (Light
the cheapest and efficient modes of data transfer. It
Fidelity)”
surely can replace the traditional Wi-Fi networks and
[Vol-2 Issue-3 2016 IJARIIE-ISSN (O)-2395-4396]
can further be extended to different platforms to
[5] Taner Cevik and Serdar Yilmaz; “An Overview Of
make it easily accessible and portable which will thus
Visible Light Communication Systems”
cater to the growing demands of the increasing
[International Journal of Computer Networks &
population. One of limitation however is that it only
Communications (IJCNC) Vol.7, No.6, November
works in direct line of sight (LOS) but this would
2015]
solve the problems like the shortage of radio- [6] Adam Böcker, Viktor Eklind Daniel Hansson, Philip
frequency bandwidth and allow internet (WI-FI) to Holgersson, Jakob Nolkrantz & Albin Severinson;
be used in places and situations where it cannot be “An implementation of a visible light
used currently like the hospitals or aircrafts. There communication system based on LEDs”
are billions of light bulbs worldwide, they just need [Department of Signals and Systems CHALMERS
to be replaced with LEDs ones that transmit data. UNIVERSITY OF TECHNOLOGY Gothenburg,
Visible Light Communication (VLC) is very cheaper Sweden 2015]
to Wi-Fi because it uses light rather than radio- [7] Roma Jain, Pallavi Kale, Vidya kandekar, Pratiksha
frequency signals. Kadam; “Wireless Data Communication Using Li-Fi
Technology” [DOI 10.4010/2016.846 ISSN 2321
VI. ACKNOWLEDGEMENTS 3361 © 2016 IJESC]
[8] Jon Mundy and Sacha Kavanagh; “What is Li-Fi?”
The authors would like to thank “Afro Asian Institute, [https://5g.co.uk]
Lahore” Affiliated with Government College [9] Mr. Prashant T Rayrikar; “Wi-Fi Technology Vs Li-
University Faisalabad (GCUF) for the support Fi Technology” [IRJET e-ISSN: 2395 -0056 Volume:
03 Issue: 05 | May-2016 p-ISSN: 2395-0072]
provided to Carry the research work presented in this
[10] Ekta, Ranjeet Kaur; “Light Fidelity (LI-FI)-A
paper.
Comprehensive Study” [International Journal of
VII.REFERENCES
Computer Science and Mobile Computing, Vol.3
Issue.4, April- 2014]
[11] Abhishek Gupta Swayanshu Shanti Pragnya; “The
[1] Roma Jain, Pallavi Kale, Vidya kandekar, Pratiksha
Future Technology LiFi” [IJSRD - International
Kadam; “Wireless Data Communication Using Li-Fi
Journal for Scientific Research & Development| Vol.
Technology” [ISSN 2321 3361 © 2016 IJESC]
4, Issue 08, 2016, ISSN (online): 2321-0613]
[2] Imran Siddique & Muhammad Zubair Awan; “An
[12] Dinesh Khandal, Sakshi Jain; “Li-Fi (Light Fidelity):
innovation in Mobile Communication Technology”
The Future Technology in Wireless
[International Journal of Research e-ISSN: 2348-
Communication” [International Journal of
6848, p-ISSN: 2348-795X Volume 05 Issue 23,
Information & Computation Technology. ISSN
December 2018]
0974-2239 Volume 4, Number 16 (2014), pp. ©
About Authors:
Imran Siddique
Imran Siddique received his B.Sc.
degree in Computer Engineering
from Bahauddin Zakariya
University Multan, Pakistan and
pursuing his MS in Electrical
Data mining depends on large-scale taxi traces is an important research concepts. A vital direction for analyzing
taxi GPS dataset is to suggest cruising areas for taxi drivers. The project first investigates the real-time demand-
supply level for taxis, and then makes an adaptive tradeoff between the utilities of drivers and passengers for
different hotspots. This project constructs a recommendation system by jointly considering the profits of both
drivers and passengers. At last, the qualified candidates are suggested to drivers based on analysis. The project
also provides a real-time charging station recommendation system for EV taxis via large-scale GPS data mining.
By combining each EV taxi‟s historical recharging actions and real-time GPS trajectories, the present
operational state of each taxi is predicted. Based on this information, for an EV taxi requesting a
recommendation, recommend a charging station that leads to the minimal total time before its recharging starts.
Keywords : Vehicular Social Networks, Hotspot location, Trajectory data mining, Supply-demand level,
Electronic Vehicle.
CSEIT19515 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 38-44 ]
38
Selvi C, Keerthana D Int J S Res CSE & IT. January-February-2019 ; 5(1) : 38-44
driving traffic to their several websites. The appliance However, various vary of novel applications, coming
of those sites has unfold to business homes that together transport networks, exploiting quality
started victimization the Social Networking sites as a pattern, socially aware recommendation systems on
platform to market their services and build whole the roads area unit a number of the factors towards
awareness. These social networking websites kind the whom the analysis community has shown concrete
most tool of social media promoting. The foremost interest. Finally, they bestowed some open analysis
ordinarily used websites Twitter and Face book. The issue for future direction.
main objectives of the Taxi Recommendation square
measure B. Vehicular Social Networks: Enabling Smart
Mobility
To specialize in a way to maximize drivers‟ profits In this article stressed the importance of high-
whereas high the profit of passengers. potency and reliable transmissions in VSNs for
To value 2 completely different levels of Demand sensible cities. Significantly, we tend to study a case
offer that square measure appropriate for busy on traffic anomaly detection for VSNs by mechanical
(peak) days and traditional operating days. phenomenon knowledge analysis. They believed that
To provides a time period charging station VSNs can draw in depth attentions and analysis
recommendation system for taxis. efforts within the close to future because the
To calculate waiting time beside the gap for the integrations of data technology and social network
recharging stations. services become additional compacted. Though VSNs
II. RELATED WORKS will be considered the mixing of social networks and
IoVs to enhance the standard of life for voters, the
A. Vehicular Social Networks: A Survey avenues of VSN studies aren't flat, and plenty of open
problems are still ahead.
Considered social networking in an exceedingly
transport environment; the authors investigated the C. Energy-Latency Trade-Off For Energy-Aware
possible applications of VSNs and communication Offloading In Mobile Edge Computing Networks
design. VSNs enjoy the social behaviors and quality
of nodes to develop novel recommendation systems In this paper, single and multi-cell MEC network
and route coming up with. Further, they gave an eventualities are thought-about at an equivalent time..
outline of various recommendation systems and path In terms of the mixed number nonlinear drawback
coming up with protocols supported crowd sourcing (MINLP) for computation offloading and resource
and cloud-computing with future analysis directions. allocation, we tend to propose AN reiterative search
They bestowed a progressive literature review on rule combining interior penalty operate with D.C.
socially-aware applications of VSNs, information (the distinction of 2 convex functions/sets)
dissemination, and quality modeling. Further, they programming (IPDC) to search out the optimum
mentioned the various communication protocols resolution. The residual energy of good devices‟
style and information dissemination techniques to battery is introduced into the definition of the
deal with the present gap between VSNs and ancient coefficient issue of energy consumption and latency.
ad-hoc networks that is that the terribly 1st issue to Numerical results show that the projected rule will
be thought-about by the analysis community to get lower total price (i.e., the weighted add of energy
understand the construct of VSNs in public accepted. consumption and execution latency) examination
with the baseline algorithms and also the energy-
aware coefficient issue is of nice significance to keep a tradeoff between the driver‟s and passengers‟
up the life of good mobile devices. utilities.
Input: The pick-up events timestamp sequence Input: Available taxi’s current time curtime and location curloc,
Tp = {pe1,pe2,··· ,pen} candidate hotspots set H
Output: The estimated waiting time w for the hotspot Output: The recommended hotspot
1: λ ← n−1 pen−pe1; 1: MaxScore ← 0,MaxId ← 0;
2: Initiaize the passenger arrival events timetamp sequence 2: U ← ø,w ← ø;
Ta = {ae1,ae2,··· ,aen}; 3: Tracing trajectory and computing the driver’s recent spent
3: for i = 1 to n do time on each hotspots ST = {st1,st2,··· ,stn};
4: if i = 1 then 4: for hi in H do
5: aei = random(0,pei); 5: d ← getManhattandis(curloc,hi.core);
6: // Uniform distribution 6: V ← (hi.revenue−βhi.searchingtime−γd) ;
7: else 7: ε ← sti ∑k stk ;
8: aei = aei−1 + random(0,pei −aei−1); 8: U ∪(V + ε);
9: // Truncated exponential distribution with λ 9: w∪hi.waitingtime;
10: end if 10: end for
11: end for 11: Evaluate real-time demand-supply level α based on curtime
12: w ← 0; using previousAlgorithm
13: for i = 1 to n do 12: for U∗ i , w∗ i corresponding to each hotspot do
14: w + (pei −aei); 14: score ← (1−α)U∗ i + αw∗ i ;
15: end for expected waiting time w. 15: if score > MaxScore then
16: MaxScore ← score;
17: MaxId ← i;
3) Demand-Supply Level Evaluation 18: end if
19: end for
The following algorithm is used for demand supply 20: return recommended hotspot hMaxId.
represented as a set of elements. In every iteration, The finding seat available between two location and
each element is updated by following two "greatest" average of seat counting Time details as followed:
values. The first one is the greatest solution (fitness)
AVERAGE TIME CALCULATION PSO-
it has achieved so far. (The fitness value is and stored.) NPSO
This value is call pBest. Another" greatest" value that
100
is tracked by the particle swarm optimizer is the
80
greatest value, obtained so far by any element in the
AVG Time
60 PSO
population. This greatest value is a overall best and 40 NPSO
called gBest. 20
0
v[ ] = v[ ] + c1 * rand() * (pbest[ ] - present[ ]) + c2 * rand() * 1 2 3 4 5
(gbest[ ] - present[ ]) + (( c3 * rand()) + a[t])) + (( c4 * rand( )) - Vehicle
s[t])) - (a)present[ ] = present[ ] + v [ ] - (b)
where, a[t]=v[ ]+ pbest+ gbest
a[t]=v[ ]- pbest- gbest
Fig 2. Average Time Calculation PSO- N-PSO
v[ ] is the element velocity, present[ ] is the current element
(solution),
rand ( ) is a random number between (0,1); c1, c2 are learning Example:
factors usually c1 = c2 = 2. Number of Seat Count, C
Number of Distances, D
IV. ARCHITECURE Total Number of Vehicle TV
Total Number of distances TD
N number of Iteration N
VI. CONCLUSION
ABSTRACT
Opinion mining, also called sentiment analysis, is the field of study that analyses people’s opinions, sentiments,
evaluations, appraisals, attitudes, and emotions towards entities such as products, services, organizations,
individuals, issues, events, topics, and their attributes. Even though facts still play a very important role when
information is sought on a topic, opinions have become increasingly important as well. Opinions expressed in
blogs and social networks are playing an important role influencing everything from the products people buy to
the presidential candidate they support. Thus, there is a need for a new type of search engine which will not
only retrieve facts, but will also enable the retrieval of opinions. Such a search engine can be used in a number
of diverse applications like product reviews to aggregating opinions on a political candidate or issue. This paper
consist review works have been designed for opinion mining by using classification and ranking techniques.
Keywords : Sentiment Analysis, Opinion Mining, POS, Ranking Algorithm, Feature Selection Method,
Semantic Orientation.
I. INTRODUCTION
Sentiment analysis, also called opinion mining, is the reach opinions/sentiments regarding a particular
process of extracting subjective information, such as topic, product, event or individual. Sentiment
opinions, sentiments and attitudes in the source analysis process can be modelled as a classification
materials towards an entity. It is an interdisciplinary problem. Sentiment analysis can be conducted at
research field that combines tools and techniques different levels of detail. Based on the levels,
from natural language processing, text mining and sentiment analysis can be broadly divided into three
computational linguistics [1]. Opinions are important main levels: document level, sentence-level and
factors and influencers of the decision-making aspect-level sentiment analysis [3]. Document-level
process. The determination of people’s opinions sentiment classification aims to determine the overall
toward a particular event can be extremely important sentiment orientation of an entire document, such as
in several fields, such as management sciences, a review text, assuming that each document contains
political science, economics and other disciplines of information regarding a single entity. Sentence-level
social sciences [2]. The Web provides a rich and sentiment analysis aims to identify subjective and
progressively expanding source of information to objective sentences. In sentence-level sentiment
CSEIT183812 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 45-49 ]
45
Prof. Sonali D. Borase, Prof. Prasad P. Mahale,. Int J S Res CSE & IT. January-February-2019 ; 5(1) : 45-49
analysis, the sentiment orientation of subjective accordingly. Each file form target domain is assigned
sentences is also identified.[6] The classification of score on which basis it is classified as positive or
review documents at document or sentence level of negative. Each word has weight assigned to it.
granularity does not fully reveal the opinions Summation of weights of words in each sentence
regarding different features of a particular entity. gives score to sentence. Then addition of all sentence
Hence, aspect-level sentiment analysis concerns the score is nothing but score of file. On the basis of this,
classification of sentiments by focusing on the file is classified. Clustering helps in reducing
particular features/aspects of entities. mismatch between domain specific words of source
and target domains. Two sets of lexicons are extracted
II. LITERATURE SURVEY as an output with polarity which is compared with
SentiWordNet..[1]
Blenty proposed algorithm works on word level. POS
tagged words are extracted from pre-processing steps
are used. Each word acts as feature. Algorithm is Pre-processing of dataset
executed for total number of features provided in
input dataset. According to this weight words are
classified into two categories. Classified words are
having POS tag, polarity tag, and weight value. From Apply classifier on dataset.
this list, common and uncommon words are picked
and used for bipartite graph clustering.
assign lexical categories to the words in text. The feature candidates are identified by POS tags and
feature and opinion pairs, the parser from previous only the features which are stored in the domain
step are analysed and generate all possible ontology are valid. Maximum Entropy modelling for
information components from them. The extracted prediction of feature and opinion pairs in a different
pairs from dependency relation can contain which way it has been used so far, using weights for both to
are relevant or not. Therefore, maximum entropy emphasize the importance of each one of them in the
model is used to predict opinion-relevant product relation of feature and opinion pairing task.
feature or not by choosing the class with the highest Maximum entropy model is used to predict which
conditional probability p according to this model. feature word should be related with the opinion
Domain ontology to get the domain related features word with maximum probability.[3]
and to define the synonym set for features. Product
Table 1: Summery
Deshmukh et al proposed method collected data from identifying polarity of each aspect n finally the
site that provides with reviews on electronic gadgets product itself. Modify Naivè Bayes model to create
and gives the respective user reviews. Pre-processing an aspect ranking algorithm which eventually will
phase on data through Natural Language processing is rank the products where this step calculates the
done and then feature/aspect list is displayed. weight of features from reviews. [2]
Extracting nouns as features and adjectives as
opinions. Next step is Enhanced Aspect Identification Zhang et al proposed system in which given the
and Opinion Word Extraction In this technique High consumer reviews of a particular product, we first
frequency aspects are ranked and the corresponding identify aspects in the reviews by a shallow
opinion words for the aspects are extracted for dependency parser and then analyse consumer
opinions on these aspects via a sentiment classifier. measures like Information gain-based feature ranking
System develop a probabilistic aspect ranking is a filter-based feature selection method, which is
algorithm, which effectively exploits the aspect widely utilized in text mining domain. The second is
frequency as well as the influence of consumers’ Chi-squared feature ranking evaluates the merit of
opinions given to each aspect over their overall each feature individually with the chi-squared
opinions on the product in a unified probabilistic statistical measure. Next is Information gain is a
model. The overall opinion in a review is generated biased measure towards features with high values.
based on a weighted aggregation of the opinions on Similar to gain ratio, the symmetrical uncertainty
specific aspects, where the weights essentially coefficient aims to eliminate the bias of information
measure the degree of importance of these aspects. A gain towards the attributes with higher values.
probabilistic regression algorithm is developed to Pearson correlation coefficient is used to measure the
infer the importance weights by incorporating aspect correlation between two attributes. Relief algorithm
frequency and the associations between the overall is a filter-based method that uses a feature relevance
opinion and the opinions on specific aspects. In order criterion to rank the features. Proposed genetic rank
to evaluate the proposed product aspect ranking aggregation-based feature selection model uses Filter-
framework. A product aspect ranking framework to based feature selection methods can obtain different
automatically identify the important aspects of rankings for the same data set. The aggregation of
products from numerous consumer reviews. A several different feature rankings may be beneficial
probabilistic aspect ranking algorithm to infer the to obtain an enhanced ranking of the features. The
importance of various aspects by simultaneously proposed method models the feature selection as a
exploiting aspect frequency and the influence of rank aggregation problem and the feature rankings
consumers’ opinions given to each aspect over their obtained by different filter-based methods are
overall opinions on the product.[4]. combined. Given a set of rankings of the same
candidate sets, the rank aggregation seeks to find a
Aytug at al evaluated Feature selection is the process single better ranking from these multiple rankings.
of obtaining an appropriate feature subset from the The rank aggregation problem can be modelled as an
data set so that the classification optimization problem where the objective is to
obtain a final ranking that is the closest to the all
Algorithms can deal efficiently with high- individual ranking lists. [5]
dimensional feature spaces. Feature selection
methods aim to eliminate irrelevant or redundant III. CONCLUSION
features and to reduce the training time required to
build a classification model Feature selection method This paper give brief information on Opinion Mining
can be broadly divided into two groups: filter-based and the recent literature review putting light on the
and Wrapper-based feature selection methods. steps involved in Opinion Mining. Opinion Mining is
the field of study that tracks the mood or attitude of
Filter-based methods evaluate the usefulness of people towards a particular product or topic. It helps
features based on heuristics/evaluation metrics, to find the product with best quality, which is
whereas wrapper-based methods select the features predicted based on the user reviews. It is also used for
based on the performance of a machine learning recommendation system and business intelligence.
algorithm to optimize the predictive performance. There are many challenges and future developments
System evaluated the different individual filter-based possible in Opinion Mining approach like short
length and irregular structure of the content such as Cite this article as :
named entity recognition, parsing. Opinion mining is
to find the opinion of a person from sentences and Prof. Sonali D. Borase, Prof. Prasad P. Mahale,
then classify them on the basis of polarity. Opinion "Aspect Ranking Technique for Efficient Opinion
mining helps people to know the semantic Mining using Sentiment Analysis : Review ",
orientation for a product by classifying it as positive, International Journal of Scientific Research in
negative or neutral. Computer Science, Engineering and Information
Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
IV. REFERENCES 5 Issue 1, pp. 45-49, January-February 2019.
Available at doi :
[1]. J. Deshmukh and A. Tripathy, "Entropy based https://doi.org/10.32628/CSEIT183812
classifier for cross-domain opinion mining", Journal URL : http://ijsrcseit.com/CSEIT183812
Applied Computing and Informatics, vol. 14,
no. 1, pp. 55-64, 2018.
[2]. B. Alengadan and S. Khan, "Modified
Aspect/Feature Based Opinion Mining for a
Product Ranking System", 2018 IEEE
International Conference on Current Trends in
Advanced Computing (ICCTAC), pp. 1-5, 2018.
[3]. D. Nyaung and T. Lai Thein, "Feature-Based
Summarizing and Ranking from Customer
Reviews", International Journal of Computer
and Information Engineering, vol. 9, no. 3, pp.
734-739, 2015.
[4]. Zheng-Jun Zha, Jianxing Yu, Jinhui Tang,
Meng Wang and Tat-Seng Chua, "Product
Aspect Ranking and Its Applications", IEEE
Transactions on Knowledge and Data
Engineering, vol. 26, no. 5, pp. 1211-1224,
2014.
[5]. A. Onan and S. Korukoglu, "A feature selection
model based on genetic rank aggregation for
text sentiment classification", Journal of
Information Science, vol. 43, no. 1, pp. 25-38,
2016.
[6]. B. Liu, "Sentiment Analysis and Opinion
Mining," Synthesis Lectures on Human
Language Technologies, vol. 5, no. 1, pp. 1-167,
May 2012
ABSTRACT
Anonymization techniques are enforced to provide privacy protection for the data published on cloud. These
techniques include various algorithms to generalize or suppress the data. Top Down Specification in k
anonymity is the best generalization algorithm for data anonymization. As the data increases on cloud, data
analysis becomes very tedious. Map reduce framework can be adapted to process on these huge amount of Big
Data. We implement generalized method using Map phase and Reduce Phase for data anonymization on cloud
in two different phases of Top Down Specification.
Keywords: Anonymization, Big Data in cloud, k-Anonymity, Map Reduce, Privacy Preserving
CSEIT19516 | Received : 01 Jan 2019 | Accepted : 10 Jan 2019 | January-February -2019 [ 5 (1) : 50-56 ]
50
Anushree Raj, Rio G L D'Souza Int J S Res CSE & IT. January-February-2019 ; 5(1) : 50-56
Generalization is the most common method to make Sensitive Attribute: Attribute or data that an
the data anonymous to provide the privacy. In this individual is sensitive about revealing.
paper we discuss on data anonymization technique in
section II and then show the implementation using There are two main ways through which k-
Map Reduce in section III. Anonymity can be achieved:
Bottom Up Generalization: In Bottom-Up
II. DATA ANONYMIZATION Generalization strategy, the data is initialized to its
current state and generalizations are carried out over
Data anonymizaton is a deep study, broadly adopted attribute values until k-Anonymity is not violated
for privacy preserving in data publishing. [16].
Anonymization techniques highly focus on data
security in public cloud [11]. The main feature of Top Down Specialization: In Top-Down
anonymization techniques is hiding few key data to Specialization strategy, all the attribute values are
maintain data privacy. Data can further be processed initialized to the root value of the hierarchy tree [17].
to achieve necessary information by analysing it. The The specialization is carried out iteratively over the
simple way of preserving privacy is by removing all attribute values, until the k-Anonymity is violated.
those information, which will directly link to data of Top Down Specification
an individual. This process s referred to
anonymization [12]. There are many approaches to Let D be a data set to which the anonymization
gain data anoymization, such as k-Anonymity, l- technique is applied. R denotes the records in the
Diversity and t-Closeness which helps to make the data set. Let A be the attributes, which can identify N
data more private and anonymous, to protect data individuals through Ai where 1 ≤ i ≤ N, k is the
access from any third party users. anonymity parameter used in the anonymization
levels. Anonymization levels are the single
k- Anonymity: mapreduce job execution level from multiple
k-Anonymity is used to hide some key information of mapreduce jobs. The domain values are represented
the users in a database of k users. Then the attackers by the taxonomy tree [18],[21]. Q determines the
can make sure there are only k users but cannot quasi identifier. A record can contain any N number
interpret the information of an individual user in of Quasi Identifiers, Qi ϵ R, 1 ≤ i ≤ N. the sensitive
particular [13], [14]. This method is used to values are denoted by S. In Top Down Specification, a
anonymize the quasi-identifiers to provide privacy to data set is anonymized through specialization
the data. The main aim of k-Anonymity is to make operations. The domain values are replaced with all
each record indistinguishable from at least k-1 other its sub domain values.
records. k-Anonymity assigns properties in specific
ways [15]. The k anonymity data attributes are of In Top Down Specialization, a hierarchy tree is used
three types to represent the attribute values which is initiated by
a root value. The specialization performed iteratively
Key Attribute: Attribute which can identify n over the attribute values, till the k - anonymization is
individual directly. satisfied. The specialization is performed by
Quasi - identifier: Attribute which can be linked with substitution of the parent attribute value by its child
external information to identify an individual. value in taxonomy tree. For example, the patient
record of a hospital is anonymized and published for
NAME AGE SEX EDUCATION PROFESSION Figure 3. Taxonomy tree for Sex
SAM 34 M MASTER BUSINESS
FUNG 45 M DOCTRATE DOCTOR Table 2. Anonymized data
SONA 53 F MASTER PRINCIPAL
RAFI 25 M BACHELORS HR NAM SE PROFESSI
ZAMA 37 F MASTERS MANAGER AGE EDUCATION
E X ON
ALICE 28 F BATCHELORS BUSINESS
[1- AN GRADUATE
BOB 52 M DOCTRATE PROFESSOR * BUSINESS
34] Y SCHOOL
[35- AN GRADUATE
The specialization is performed by replacing the * DOCTOR
49] Y SCHOOL
parent attribute value by its child value in Taxonomy
[50- AN GRADUATE PRINCIPA
Tree *
63] Y SCHOOL L
[1- AN
TAXONAMY TREES AND QUASI IDENTIFIERS * BACHELORS HR
34] Y
[35- AN GRADUATE MANAGE
*
49] Y SCHOOL R
[1- AN
* BACHELORS BUSINESS
34] Y
[50- AN GRADUATE PROFESS
*
63] Y SCHOOL OR
values can be of any data type or length, or gathered by enterprises and government agencies.
combinations of multiple types (one integer, a string Such data is subjected to, be abused by internal and
of characters, two integers and a double, etc); they external adversaries. Many anonymization
are simply treated as byte strings by the library. A techniques came into existence. They are k-
key-value pair always has a key; its value may be Anonymity, l-Diversity, t-Closeness and m-Privacy.
NULL. Key-value pairs are stored within a These privacy preserving data mining algorithms
MapReduce object. A user program may create one or cannot work for big data analytics, as such data is
more MapReduce objects to implement an algorithm computed using MapReduce programming paradigm
[21]. Various MapReduce operations (map, reduce, in cloud computing environment. MapReduce is used
etc) are invoked on an object and its key-value pairs; to control the parallel processing power of cloud
key-value pairs can also be passed between and computing infrastructure. In this paper, we proposed
combined across objects. algorithms which are used to parallelize k-
Anonymity using MapReduce programming
Conceptually the map and reduce functions supplied paradigm with Hadoop. First, we studied k-
by the user have associated types. Anonymity model and its usefulness in anonymizing
map (k1,v1) → list(k2,v2) data. We implemented the Top Down Specialization,
reduce (k2,list(v2)) → list(v2) a generalization method on k-anonymity so as to
anonymize the original data. We then implemented
Map Reduce approach involves the following four algorithms that could parallelize k-Anonymity using
steps: Map Reduce framework. The proposed algorithm is
capable of anonymizing big data in order to support
1. Map processors, assigns the K1 input Key value, privacy preserving. In future, we can propose an
and provides the processor with all the input data algorithm using MapReduce programming towards
associated with that key value. efficiently anonymizing big data for preserving
2. Run the user provided Map() exactly once for privacy.
each key value, generating output organized by
key values K2. V. REFERENCES
3. Reduce processors, assigns the K2 key value with
all the Map generated data associated with that [1] L. Hsiao-Ying and W.G. Tzeng, “A Secure
key value. Erasure Code-Based Cloud Storage System with
4. Run the user provided Reduce () exactly once for Secure Data Forwarding,” IEEE Trans. Parallel
each K2 key value produced by the Map and Distributed Systems, vol. 23, no. 6, pp.
5. Produce the final output –The Map Reduce 9951003, 2012.
system collects all the reduce output and sorts it [2] D. Zissis and D. Lekkas, "Addressing Cloud
by K2 to produce final outcome Computing Security Issues," Future Generation
Computer Systems, vol. 28, no. 3,pp. 583-
IV. CONCLUSION 592,2011.
[3] RuilinLiu, Hui Wang, ”Privacy –Preserving
Privacy is very important to protect the sensitive data Data Publishing “ IEEE ,2010.
from the attacker. To provide data privacy the [4] B.C.M. Fung, K. Wang, and P.S. Yu,
anonymization methods may be used. The data "Anonymizing Classification Data for Privacy
mining activities utilize huge amount of data Preservation," IEEE Trans. Knowledge and
Data Eng., vol. 19, no. 5, pp. 711-725, May Systems, Volume 10 Issue 5, October 2002,
2007. Pages 571 - 588
[5] X. Xiao and Y. Tao, "Anatomy: Simple and [15] Meyerson A and Williams R, On the
Effective Privacy Preservation." Proc. 32nd complexity of optimal k-anonymity. In
Int'l Conf. Very Large Data Bases (VLDB'06), PODS04: Proceedings of the twenty fourth
pp. 139-150,2006. ACM SIGMOD-SIGACT-SIGART symposium
[6] K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, on Principles of database systems, pages 223–
"Incognito: Efficient Full-Domain K- 228, 2004
Anonymity," Proc. ACM SIGMOD Infl Conf. [16] Ke Wang, Philip S. Yu, Sourav Chakraborty,
Management of Data (SIGMOD '05), pp. 49-60, "Bottom-Up Generalization: A Data Mining
2005. Solution to Privacy Protection", Fourth IEEE
[7] K. LeFevre, D. l DeWitt, and R. Ramakrishnan, International Conference on Data Mining,
"Mondrian Multidimensional K-Anonymity," 2004. ICDM '04 .. Pages 249 – 256
Proc. 22nd Int'! Conf. Data Eng. (ICDE '06), [17] Xuyun Z, Laurence T Yang ,”A scalable Two
2006. phase Top Down Specialization Approach for
[8] 1 Xu, W. Wang, 1 Pei, X. Wang, B. Shi, and A. Data Anonymization using Map Reduce on
W. Fu. , "Utility-based anonymization using cloud“, IEEE Transaction on Parallel and
local recoding ", In ACM SIGKDD, 2006. Distributed Systems ,TPDSSI-2012.
[9] S.Yu, ”Anonymizing Classification Data for [18] Zhang X, Yang LT, Liu C, Chen J. A scalable
Privacy Preservation“. IEEE Transactions on two‑phase top‑down specialization approach
Knowledge and Data Engineering ,vol 19 no 5 for data anonymization using MapReduce on
,2007 cloud. IEEE Trans Parallel Distrib Syst.
[10] Benjamin C.M Fung, Ke Wang, Philip S.Yu 2014;25(2):363–73
“Top Down Specialization for Information and [19] Jefrey Dean and Sanjay Ghernawat “Map-
Privacy Preservation”. Reduce: Simplified Data Processing on Large
[11] Bayardo R and Agrawal R, Data privacy Clusters” Google,Inc.2004
through optimal k-anonymization. In ICDE05: [20] J. Dean and S. Ghemawat, "Mapreduce:
The 21st International Conference on Data Simplified Data Processing on Large Clusters,"
Engineering, pages 217– 228, 2005. Comm. ACM, vol. 51, no. 1, pp. 107-113,2008
[12] HIPAA 2012 “k-anonymity : A model for [21] Al‑Zobbi M, Shahrestani S, Ruan C.
Protecting Privacy “ International Journal Sensitivity‑based anonymization of big data. In:
Uncertain Fuzz .vol 10 ,no,5 pp 557-570 ,2002. Local computer networks work‑ shops (LCN
[13] Ciriani, S. De Capitani di Vimercati, S. Foresti, workshops), 2016 IEEE 41st Conference on.
and P. Samarati, "k-Anonymity Data Mining: A IEEE; 2016. p. 58–64
Survey", Springer US, Advances in Information [22] Al‑Zobbi M, Shahrestani S, Ruan C.
Security (2007) Implementing a framework for big data
[14] Latanya Sweeney, School of Computer Science, anonymity and analytics access control. In:
Carnegie Mellon University, Pittsburgh, Trustcom/BigDataSE/ICESS, 2017 IEEE. IEEE;
Pennsylvania, "Achieving k-anonymity privacy 2017. p. 873–80.
protection using generalization and [23] Al‑Zobbi M, Shahrestani S, Ruan C.
suppression", International Journal of Multi‑dimensional sensitivity‑based
Uncertainty, Fuzziness and Knowledge-Based anonymization method for big data. In: Elk‑
Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve
scalable services on-demand. Outstanding security requirements arising from this means of data storage and
management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption
system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data
outsourcing systems require flexible access control approach Problems arises when sharing confidential
corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be
defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in
Multi-Authority environment.
Keywords:ABE-Attribute Based Encryption, Authority, Fine Grained, Outsourcing, Dual Encryption.
the users, so, user identities staypersonal to the AA B. Persona: An Online Social Networkwith User-
outside the domain, which is able to enhance privacy Defined Privacy
and security. Here, once the user ought to requests
associate attribute secret key, if the attributes square These network help users share in order with their
measuresituated outside the domain, the request by friends. However, users entrust thesocial network
the supply AA within the domain to the target AA is provider with such personal information as sexual
employedinstead of by requests by users themselves. preferences, supporting and religious views, phone
numbers, occupations, identities of friends, and
II. RELATED WORKS photographs. Although sites over privacy controls
that let users restrict how their data is viewed by
A. AData Outsourcing Architecture Combining other users, sites provide inadequate controls to
Cryptography and Access Control restrict data sharing with shared affiants or
application developers.
The recent adoption and diffusion of the information
out-sourcing paradigm, whereverknowledge house C. Fuzzy Identity-Based Encryption
owners store their knowledge on external servers,
there are increasing general demands and issues for In this paper, discussed the use fullness of using
knowledge confidentiality. Besides well-known risks biometric s in Identity-Based and then discuss their
of confidentiality and privacy breaks, threats to out- contributions. Using biometrics in Identity- Based
sourced knowledgeembody improper use of Encryption in many situations, using biometric–based
information: the server may use substantial individuality in an IBE system has a number of
components of a setof knowledge gathered and important advantages over “standard” IBE. In
arranged by the information owner, doubtless standard Identity-Based Encryption scheme a user
harming the information owner's marketplace for with a positive identity, for example, “Bob Smith”,
any professional duct or service that comes with that will need to go to an authority to obtain the private
assortmentof data. The projected novel access key corresponding to the identity. In that process the
management model and design that eliminates the user will need to “prove” to the authority that he is
necessity for a reference monitor and depends on indeed entitled to this identity. That will typically
cryptography to make sure confidentiality of involve presenting supplementary documents or
knowledgehold on a server. Knowledgearea unit credentials. Typically, there exists a trade-off
encrypted because theknowledge owner stores them between a system that is expensive in this step and
on associate in nursing external server. one that is less reliable.
Authorizations and codingarea
unitunitedthereforepermitting access D. Mediated Cipher text-Policy Attribute-Based
managementsocial control to be outsourced besidethe Encryption and Its Application
information. The nice advantage is that the
information owner, whereas specifying the policy, Distributed data systems needversatile access
wants not b econcerned in its social control. management models thattranscend discretionary,
necessary and role-based access management. On the
opposite hand, the present trend of service-based data
systems and storage outsourcing needenhanced
protection of knowledgetogether with access
managementways that area unit cryptographically control can be achieved by dual encryption method
implemented. The conception of Attribute-Based which takes advantage of the attribute-based
coding (ABE) fulfills the samenecessities. It provides encryption and discerning group key distribution in
a chicmanner of encrypting knowledgesuch the each attribute group. This work demonstrates how to
encryptor defines the attribute set that the apply the proposed mechanism to securely manage
decryptorhas topossesso as to decrypt the cipher- the outsourced data. The analysis results point to that
text. . A secret key holder willdecipher the cipher the proposed system is efficient and protected in the
text if the attributes related to his secret key satisfy data outsourcing systems.
the access policy related to the cipher text. In these
schemes, a ciphertext is related toassociate in nursing The concept of attribute-based encryption (ABE) is a
access policy and therefore the user secret promising approach that fulfills these requirements.
keysrelated toa collection of attributes. ABE features a device that enables an entrance
control over encrypted data using access policies and
III. METHODOLOGY qualified attributes among private keys and cipher
texts. Especially, cipher text-policy ABE (CP-ABE)
1. EXISTING WORK provides a scalable way of encrypting data such that
the encryption defines the attribute set that the
When the system is set up, the public key of each AA decryptor needs to have classify to decrypt the cipher
and the basic parameters are distributed, which text.
simplifies the process of trust establishment. The key
issuing protocol for privacy only needs to use the 2. PROPOSED WORK
public key of AA to realize the trust between AA.
Present data outsourcing systems require supple Attribute Group - Based Encryption is managed.
access control approaches. In many cases, it is It adapts a dual encryption approach to overcome
attractive to provide differentiate access services such the user access control problem.
that data access policy are defined over user Multiple attribute groups are included and data is
attributes or roles. Some of the most difficult issues in distributed among them. User privileges may be
data outsourcing scenario are the enforcement of varying for data maintained by different attribute
union policies and the support of policy updates. groups.
Cipher text-policy attribute-based encryption is a The data owner maintains all the membership
hopeful cryptographic solution to these issues for lists to enable the direct user management in
enforces access control policies defined by a data more than one place.
owner on outsourced information. Keys are assigned randomly and independently
from each other. But group key mechanism is
But, the problem of applying the attribute-based common for users in single group
encryption in an outsourced architecture introduces All the data is maintained by more authority
several challenges with regard to the attribute and groups.
user revocation. So the project also proposes an access
control mechanism using cipher text-policy attribute-
based encryption to enforce right to use control
policies with well-organized element and user
revocation capability. The fine-grained way in
e) Encryption
a) Trusted Key Pair
Encrypt the text using public key for the purpose of
The trusted key pair created in the application for other users not knows the given message. So, the
further process, following key generate the public unrestricted key is extract using get key grasp button
key and master key, for the purpose of encrypt and displayed in the label control, the message is
the message and group key is created. These entered in the textbox manage then the given
information are generate by form command encrypted communication is display in the label
button event and showed in the multiline text control. The encrypted message saved in the
mode. These key saved in the relevance using application using creates cipher text and save
save authority key event. command button event.
It contains details such as attribute id, attribute It is used to retrieve the plain data in the application.
names are entered by user in the textbox controls, The specified cipher text is entered the data is
and saved by the save command button. The showed to the user. In these module user
delete button is used is used to delete the specific characteristics number and nobody texts are selected
record and close command button is user to from the combo box control, group identity is display
terminate the current modules. in the label controls. The significance is decrypted in
the cipher text grid view control using the decrypt
c) User Creation authority button occurrence.
Used to create the client facts for accessing the The following Table describes experimental result for
attribute with privilege level. The client id, user proposed system secure attribute selection analysis.
first name and passwords are enter by user in the The table contains number of time slot interval and
textbox control these details are saved by the save given attribute to calculate average numbers of
command button event. The delete button is used selection attribute details are shown.
is used to delete the specific record and close
Ratio [%]
0.8
SELECTION
0.6
16 82.42 83.13 ATTRIBUTE
0.4 SELECTION (AS)
24 86.66 84.67 0.2
0
30 88.13 89.78 1 3 5 7 9 11
Number of Attribute
32 80.44 82.66
38 78.33 80.21 Fig 1.2 Attribute selection- Ratio Analysis
42 87.22 89.76
46 79.22 80.65 VII. CONCLUSION
ABSTRACT
The aim of investors of any stock is to earn reasonable returns. This paper presents a framework on share price
movement and investigates the factors determining and predicting the share prices in Indian stock market through
big data approach. This study is also trying to focus on the fundamental factors, technical factors and sentimental
factors that stimulate the share price movement. The methodology used mainly focuses on the implications of the
theory of financial markets and features affecting the share price movement. Stock market is one of the burning
areas where data is growing day by day. Big data Analytics is a very promising area and buzzword for the next
generation information technologies. Because of the heterogeneity and other complexities of data, big data
architecture and design, is needed which specifically deals with the stock market data and analyze the heterogeneous
data for the future prediction of the market. Variety and large Volume of factors exists. Moreover, the velocity with
which data generates and the effect of them in the share price movement emphasizes, role of big data in predicting
the share prices in Indian Stock Market.
Keywords : Stock Market, Big Data, Stock valuation model, Technical, Fundamental and Sentimental Factors
CSEIT1838116 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 63-69 ]
63
Nitha K. P., Dr. S. Sivakumari Int J S Res CSE & IT. January-February-2019 ; 5(1) : 63-69
after tax of the company for any financial year associated with the matching price chart of the
after payment of preference dividend. The equity security. Technical indicators offer many uses such
shareholders are the sole appellants to the net as confirm the trends, generate buy/ sell signals,
earnings of the corporation after making forecast the trend of future prices. Technical
payment of dividend to the preference analysis is a technique, which gives an idea about
shareholders. The significance of this ratio flows future share prices of selected companies in which
from the fact that higher the earnings per share we invest. Based on the knowledge of technical
the more is the scope for a higher rate of analysis one can predict the perfect investment
dividend and of retained earnings, to build up decision of the stock market. By using the nominal
the internal power of the company. pointers, the future market of securities will know
3) Dividend per share (DPS): Dividend is the in which stock to invest. The more accurate
portion of the profit after tax, which is prediction of stock prices of selected companies the
distributed to the shareholders for their investor to carry out fundamental analysis of stock
investment bearing risk in the company. It has a prices, they can predict of future trend of stock
significant influence on the market price of the prices.
share. DPS shows how much the company has
paid out as dividend. It refers to the actual 1) Moving Averages: Most visual aids shows a lot of
amount of dividend (gross) declared per share. discrepancy in price movement. This can make it
The net profit after taxes belong to shareholders difficult for traders to get an idea of a security’s
but the income that they really receive is the overall trend. One simple method traders use to
amount of earnings distributed and paid as cash combat this is to apply moving averages. A
dividend. moving average is the average price of a security
4) Price Earnings Ratio (P/E ratio): This ratio over a set amount of time. They smooth a data
enables an investor to make appropriate series and made it easier to spot tendencies,
calculation of the time required to cover the something that is especially helpful in volatile
investment in a company’s stock. P/E ratio markets.
expresses the relationship between the market 2) Simple Moving Average (SMA): A simple moving
price of a company’s share and its earnings per average is formed by computing the average
share. It indicates the extent to which the (mean) price of a security over a specified
earnings of each share are covered by its price number of periods. For example: a10 day moving
average(SMA) is taken as the closing prices for
B. TECHNICAL FACTORS the last 10 days added together and dividing the
total by 10.
Technical indicators are mathematical formulas 3) Exponential Moving Average (EMA): Exponential
that, when applied to security prices clearly flash moving average is the moving average that is
either buy or sell indications. Price data includes formed by applying weight to the recent price
any combination of the open, high, low, or close changes.
over a period and most of the indicators use only the
closing prices, technical indicators are usually EM A(c) = ((price(c) EM A (p) ∗ K) + EM A (p))(1)
shown in a graphical form above or below a
security’s price chart for the analysis. Once shown Where c=current, p=previous
in graphical form, an indicator can then be
The formula for the smoothing constant K is: polarity” sentiment classification looks, for
instance, at emotional states such as “angry,”
K = 2/ (1 + N) (2) ”sad,” and “happy.”
Where, N = number of periods for EMA Existing methods applied to extract the sentiment
4) Relative Strength Index (RSI) : The relative analysis, which grouped mainly into four
strength index (RSI) is an extremely useful categories: keyword spotting, lexical affinity,
oscillating momentum indicator that was statistical methods, and concept-level techniques.
developed by J. Welles Wilder and is one of the Keyword spotting categorizes text based on the
presence of unambiguous affect words such as
most widely used indicators in technical analysis.
happy, sad, afraid, and bored. Lexical affinity
RSI oscillates between zero and 100. The most
detects an affect words and assigns a probable
popular is the 14 days RSI where the RSI is
affinity to particular emotions. Statistical
calculated based on 14 days values. Traditionally methods has control on elements from machine
the stock is considered to be over bought when learning such as latent semantic analysis, support
RSI is above 70 and over sold when RSI is below vector machines, “bag of words” and Semantic
30. Signals can also be generated by looking for Orientation Point-wise Mutual Information.
divergences and central line crossovers. The
basic formula is: Concept-level approaches leverage on elements
from knowl- edge representation such as
RSI = 100[100/(1 + RS)] (3) ontologies and semantic networks and, hence, are
also able to detect semantics that are expressed in
Where, RS = average of upward price change over a a subtle manner, e.g., through the analysis of
select number of days / average of downward price concepts that do not explicitly convey relevant
change over the same number of days information, but which are implicitly linked to
other concepts that do so.The main data sources
C. SENTIMENTAL FACTORS for the sentimental analysis are taken from
Twitter as they provide an API to extract the
Sentiment analysis extracts subjective tweet data from the site. The following features
information in source materials with the help of capture useful characteristic of Twitter and
natural language processing, text analysis and writers for opinion retrieval.
computational linguistics. Sentiment analysis
aims to determine the attitude of a speaker or a II. METHODS FOR STOCK MOVEMENT
writer with respect to some topic or the overall PREDICTION
contextual polarity of a document. The
elementary job in sentiment analysis is to The Support Vector Machine (SVM) been
categorize the feelings of a given text in the recognized as being able to efficiently handle
document, sentence, and the feature/aspect level high dimensional data and has shown to perform
of the expressed opinion in a document, or a well on many classification and clustering
sentence or an entity feature/aspect is positive, techniques
negative, or neutral. Advanced, “beyond 1) Price only: In this method, only past data or
prices predicts the stock movement. The
data.iii) Last part of the architecture is to attain its Stock market is affected by all information. As per
goal, the prediction of the stock price. the efficient market hypothesis, stock market must
react on all of the information. Small and Middle
News and Information flows from any corner have class investors have not such type of resources to
impact on investment. Every second data generated know all happenings instantaneously and take their
for the market and its format is different from positions respectively. Loss fear factor had been
previous dataset. To store and integrate these playing a crucial role for the small and middle class
temporal data for the stock market is the biggest population and that is why they are keeping
challenge. In current scenario, cost required for these distance from the market. Easy availability of this
data is affordable by few big investors. Investors from integrated data from all corners of the globe is the
third and fourth world countries have acute scarcity key issue.
of resources. Big data architecture with latest
technologies will provide easy access of information Due to temporal nature of the data required in the
flow; it is relatively affordable to all investors. Little, stock market, big data architecture ,being
and slow access of information became big reason for implemented in such a way that all data must be
the big loss in the market for small investors. All updated and integrated on timely basis and reports
information need would be integrated very fast and should be generated based on the current
provide information to the small and medium information. To achieve efficient market hypothesis,
investors at very reasonable & affordable cost. these information must reach all participates of the
market. Due to shared resources and other above
Traditional database will not be able to handle and dis- cussed benefits of big data technologies, small
integrate this type of heterogeneous, temporal, investors too have equal opportunity to access
unstructured and dynamic data stored at different excess relevant data. This will increase participation,
places, so a new architecture is required for the participation will increase more investments,
integration of the heterogeneous database. Data will investments will increase more stable market with
not be available at one place or one database and it market hypothesis, more realistic market hypothesis
is in the different format too. It requires an will lead to more accurate prediction of the market
integrated mechanism which provides all temporal and finally it leads to stable and mature market.
data at one place and easy to process for the
decision-making process in desired format. Cloud based big data engine is used to integrate
different heterogeneous and unstructured data. Cloud
based technology will provide all analytical services
to the clients at reasonable costs. Distributed file
systems like HDFS (Hadoop Distributed File System)
and parallel processing in the cloud will increase
efficiency in the processing of data with quick
response. Big data integration will affect greatly on
the growing markets like India. There is no need to
store same data repeatedly. Intermediaries and other
interested parties gain benefits by two ways. First,
Fig. 1. Big Data Analysis Pipeline Architecture they can get data without wasting time and cost as
per their own desired format. Secondly, they exploit
the benefit of other existing assistances of Big or from Tweets for Event Prediction, ,
cloud computing like SaaS, PaaS, and IaaS for International Conference on Intelligent
forecasting the share prices. A model developed based Computing, Communication & Convergence.
on the framework of big data analytics along with the Procedia Computer Science pp: 84 89,July 2015
blend of the fundamental, Technical and Sentimental [7]. Raghavendra Kune1,Pramod Kumar
factors will surely be a promising model for the Konugurthi1, Arun Agarwal,Raghavendra Rao
accurate prediction of stock prices in Indian stock Chillarige and Rajkumar Buyya "The anatomy
market. of Big Data Computing", SOFTWARE:
PRACTICE AND EXPERIENCE,Wiley Online
IV. REFERENCES Library (wileyonlinelibrary.com). DOI:
10.1002/spe.2374,9 October 2015
[1]. V. Sandhiya, T.Revathi, A.Jayashree, A.Ramya, [8]. Dr B Charumathi and Suraj E S "An Artificial
S.Sivasankari "Stock Mar- ket Prediction on Neural Network Approach on Improving
Bigdata Using Machine Learning Algorithm", Relative Valuation Accuracy for Bank Stocks in
Inter- national Journal of Engineering Science India Asian Research Journal of Business
and Computing,Volume 7 Issue No.4,April Management Issue 2 (Vol. 3) Issn: 2321-
2017 9246,2015
[2]. Rupawari Jadhav, M. S. Wakode "Survey : [9]. Kavitha S, Raja Vadhana P, Nivi A N "BIG
Sentiment Analysis of Twitter Data for Stock DATA ANALYTICS IN FINANCIAL
Market Prediction", International Journal of MARKET", IJRET: International Journal of
Advanced Research in Computer and Research in Engineering and
Communication Engineering,Vol. 6, Issue 3, Technology,Volume: 04 Issue: 02 - Feb-2015
March 2017. [10]. Aditya Bhardwaja, Yogendra Narayanb,
[3]. Venkata Sasank Pagolu,Kamal Nayan Reddy Vanrajc, Pawana, Maitreyee Duttaa Sentiment
Challa,Ganapati Panda,Babita Majhi "Sentiment Analysis for Indian Stock Market Prediction
Analysis of Twitter Data for Predicting Stock Using Sensex and Nifty, , 4th International
Market Movements", International conference Conference on Eco-friendly Computing and
on Signal Processing, Communication, Power Communication Systems. Procedia Computer
and Embedded System (SCOPES)- 2016 Science 70 (2015) pp: 85-91
[4]. Varunesh Nichante, Prof. Sulabha Patil "A [11]. Krishna Kumar Singh, Priti Dimri, Krishna
Review: Analysis of stock market by using big Nand Rastogi "The Impli- cations of Big Data in
data analytic technology", International Journal Indian Stock Market", International Journal of
on Recent and Innovation Trends in Computer Applications, Volume 99,Issue:5,
Computing and Communication,Volume: 4 August 2014
Issue: 1,ISSN: 2321-8169,January 2016 [12]. Dr B Charumathi and Suraj E S "Comparing
[5]. Aparna Nayak, M. M. Manohara Pai and Stock Valuation Models for Indian Bank Stocks
Radhika M. PaiPrediction Mod- els for Indian International Journal of Accounting and
Stock Market, , Twelfth International Multi- Taxation, Vol. 2, No. 2, pp. 111-127,June 2014
Conference on Information Processing-2016 [13]. Carson Kai-Sang Leung,Richard Kyle
(IMCIP-2016),pp : 441-449 MacKinnon,Yang Wang "A Ma- chine
[6]. P.G Preethia,V. Umab ,Ajit kumar ,Temporal Learning Approach for Stock Price
Sentiment Analysis and Causal Rules Extraction
ABSTRACT
The usage of smart phones is tremendously increasing day by day. Due to this, Location Based Services (LBS)
attracted considerably and becomes more popular and vital in the area of mobile applications. On the other
hand, the usage of LBS leads to potential threat to user’s location privacy. In this paper, the famous LBS provide
information about points of interest (POI) in spatial range query within a given distance. For that, a more
efficient and an enhanced privacy-preserving query solution for location based, Efficient Privacy-Location
Query (EPLQ) is proposed along with Locality Sensitive Hashing (LSH) reduces the dimensionality of high
dimensional data. Experiments are conducted extensively and the results show the efficiency of the proposed
algorithm EPLQ in privacy preserving over outsourced encrypted data in spatial range queries. The proposed
method performs in spatial range queries and similarity queries of privacy preserving.
Keywords: Location Based Services, points of interest, Efficient Privacy-Location Query, NICT
CSEIT1838110 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 70-73 ]
70
Archana M.S., K. Deepa Int J S Res CSE & IT. January-February-2019 ; 5(1) : 70-73
about the client is one of few parameters that are III. DESIGN GOAL
clear and genuinely simple to quantify and utilize.
This is connected to the term Location-Aware It is very challenging to propose a privacy preserving
Services that may be characterized as context-aware query for implementing LBS over the encrypted
services that use the location of the client to embrace location data. Enhancing Processing of Query (EPQ)
the conduct of the services. It is a unique way of enables the cloud server to perform query processing
Location Based Services in a most broad sense as its without exposing client’s location details. EPQ can
services are connected with location data. insist on a client location coordinate query as per
client’s present location. Practically, the LBS
II. RELATED WORKS
application is mainly developed for the user who
used to search his point of interest such as searching
M. Gruteser et al investigates a complimentary
hotels nearest to him. In this work, the user query is
approach that concentrates on the principle of
secured with the keyword and encrypted. This will
minimal collection. In this approach location-based
accurately identify the requested location and the
services collect and use only de-personalized data
distance between the target locations are classified
that is practically anonymous data. But query
and ranking will be given. Our system provides a
encryption is not done and database is not outsourced.
multiuser environment as any number of users can
log at a time. The following are the three main
M. F. Mokbel introduces Casper; a novel framework
processes of our proposed work.
in which mobile users can entertain location based
services without the need to disclose their private
1. To propose a LBS query scheme which is more
location information. Per query privacy and multi-
efficient and privacy preserving to protect the
location query are absent and inefficient in handling
location data and the user’s request. For this, a
frequent attack are some of the drawbacks of this
hybrid encryption technique to encrypt the
work.
outsourced location data is proposed. This scheme
R Shokri et al proposed an approach that protects the
also supports multiuser cloud environment.
location privacy. In this approach, the mainstream
✓ System Construction Module
approach to protecting the location-privacy of mobile
✓ LBS User Module
users in location-based services (LBSs) is to alter the
✓ LBS Provider Module
users' actual locations in order to reduce the location
✓ Dimensionality Reduction Module – Locality
information exposed to the service provider. This
Sensitive Hashing
method is inefficient in terms of handling frequent
✓ Spatial Range Query For Privacy Preserving
attacks. M. E. Andres et al.
increased. Here, we apply locality sensitive hashing location based queries,” IEEE Transactions on
to reduce dimensionality thereby supporting k- Knowledge and Data Engineering, vol. 26,no.5,
nearest neighbor search. pp. 1200-1210, 2014.
[8]. L. Sweeney, "Achieving k-anonymity privacy
VI. REFERENCES protection using generalization and
suppression,” International Journal of
[1]. Statista, "Number of location-based service Uncertainty, Fuzziness and Knowledge-Based
users in the United States from2013 to 2018 (in Systems, vol. 10,no. 5, pp. 571-588, 2002.
millions),” Statista; 2017.
https://www.statista.com/statistics/436071/locat Cite this article as :
ion-based- service-users-usa
[2]. K. Xie, X. Ning, X.Wang et al., "Recover Archana M.S, K.Deepa , "Enhancing Privacy
corrupted data in sensornetworks: a matrix Preserving Query Retrieval Using Locality Sensitive
completion solution,” IEEE Transactions on Hashing", International Journal of Scientific Research
Mobile Computing, vol. 16, no. 5, pp. 1434- in Computer Science, Engineering and Information
1448, 2017. Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
[3]. M. Li, H. Zhu, Z. Gao et al., "All your Location 5 Issue 1, pp. 70-73 , January-February 2019.
are belong to us: breaking mobile social Available at doi :
networks for automated user location tracking,” https://doi.org/10.32628/CSEIT1838110
in Proceedings of the 15th ACM International Journal URL : http://ijsrcseit.com/CSEIT1838110
Symposium on Mobile Ad Hoc Networking and
Computing, MobiHoc 2014, pp. 43-52, USA,
August 2014.
[4]. J. Shao, R. Lu, and X. Lin, "FINE: a fine-grained
privacy preserving location-based
serviceframework for mobile devices,” in
Proceedings of the IEEE INFOCOM, pp. 244-
252, IEEE, Ontario, Canada, May 2014.
[5]. G. Ghinita, P. Kalnis, A. Khoshgozaran, C.
Shahabi, and K.-Tan, "Private queries in
location based services: anonymizers are not
necessary,” in Proceedings of the
ACMSIGMOD International Conference on
Management of Data (SIGMOD ’08), pp. 121-
132, ACM, 2008.
[6]. B. Gedik and L. Liu, "Protecting location
privacy with personalized k-anonymity:
architecture and algorithms,” IEEE
Transactions on Mobile Computing, vol. 7, no.
1, pp. 1- 18, 2008.
[7]. R. Paulet, M. G. Kaosar, X. Yi, and E. Bertino,
"Privacy preserving and content-protecting
ABSTRACT
Today, due to the enormous growth of data technology in cloud computing, the data owners are stimulated to
outsource their data in data management to reduce cost and for the convenient. Data confidentiality, in general,
can be obtained by encrypting the data before it is outsourced. The client stores the encrypted data to the cloud
using Searchable encryption schemes and applies keyword search techniques over cipher text domain. But the
main problem in outsourcing is the lack of security and privacy for the sensitive data. So, to overcome this, for
privacy requirement, the sensitive data can be encrypted before it is outsourced. Various methods were
proposed to preserve the privacy and to provide security to the cloud data which are encrypted. Here in this
paper, we proposed a tree-based search method over the encrypted datain the cloud that supports dynamic
operation and multi-keyword ranked search. Clearly, the commonly used “inverse document frequency (IDF)
term frequency (TF)” model and the vector space method are joined in the query generation and index creation
to give multi-keyword ranked search. To get high search efficiency, a tree-type index structure, “Greedy Best-
first Search” algorithm is proposed based on the tree- index.
Keywords : Cloud Computing, Security, Multi Keyword Search, Greedy Best First Search, Inverse Document
Frequency, Term Frequency
CSEIT1838111 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 74-78 ]
74
Bibin Baby, Sharmila Banu Int J S Res CSE & IT. January-February-2019 ; 5(1) : 74-78
are widely used on the plaintext records, cannot be vector space model supporting solidified and
immediately implemented at the encrypted records. particular document look. The searchable file is
Downloading all of the statistics from the cloud and fabricated utilizing Multidimensional B tree. Its
decrypt regionally is impractical. On the opposite, limitations are the likeness rank score of the record
greater sensible unique motive solutions, including vector completely relies on upon the kind of the
searchable encryption (SE) schemes have made report Jiadi [7] proposed this pursuit utilizing two
unique contributions in phrases of performance, round searchable encryption (TRSE). The withdrawal
capability and safety. and restricting is utilized to diminish figure content
size, still the key size is too extensive. The
II. RELATED WORKS correspondence elevated will be high, if the
scrambled trapdoor's size is too vast. It doesn't make
This section discusses the literature survey of various powerful searchable file redesign. These are some of
papers related to Multi-keyword ranked search over the drawbacks of this method.
encrypted cloud data in cloud. It describes the
research work already done by the authors III. PROPOSED METHODOLOGY
corresponding to searchable encryption in cloud
computing. In this section, the Dynamic Multikeyword Ranked
Search for Plaintext (DMRSP)method is explained for
Qin Liu [3] proposed the pursuit that gives catch implementing our proposed method. Based on the
phrase protection, information protection and vector space model and Best First tree based indexing,
semantic secure by open key encryption. The main DMRSP is constructed. Apart from this, a secure
drawback of this system is the correspondence and search scheme, Simple DMRS (SDMRS) is also
computational expense for encryption and decoding explained.
is more. Cong Wang [4] proposed seek which
unravels preparing overhead, information and 3.1 Index Construction using Best First Search
catchphrase security, least correspondence and .
calculation aeronautical. The information proprietor
The search algorithm, Best-first search explores
assemble list alongside the catchphrase recurrence
a graph by increasing the most likely node chosen as
based importance scores for documents. Butit doesn't
per the specified rule.
play out numerous catch phrase seeks and Minimal
overhead in record building. C Wang et al [5] Judea Pearl explains best-first search as calculating
proposed that searchable encryption idea agree to the the promise of node ‘n’ by a "heuristic evaluation
client to solidly search for over scrambled function. It may depend on the depiction of n, the
information through watchwords without first goal and the information gathered. It also collects
applying decoding on it. But this system is too slow in additional knowledge about the problem domain.
processing the request and is not suitable for huge A priority queue is the efficient way of selecting the
volume of data. best candidate.
1. If the heuristic of successor is best, then the For achieving this, we need to visit all nodes before
successor is put at the front of the queue and we reach the destination. Since priority queue uses
restarts the loops. Max or Min heap, insert and delete operations takes
O(log n).So the performance of the algorithm highly
2. or else, insert the successor into the queue
depends on evaluation function or the cost is
designed.
The algorithm for Best first search is explained below
for the following fig. 3.1 IV. RESULT DISCUSSION
4.1 Precision
In the proposed method, dummy keywords affects
Fig. 3.1 Best First Search Tree the search precision. Search Precision can be defined
1. We start from source S and search for destination as
Ith node using Best First search with the given cost.
2. P and Q initially contains S Pkd=kd’= k wherekd’ = top k- documents
3. Remove S and process unvisited neighbors of S to To obtain higher precision, the very small standard
pq deviation σ is set as the random variable for ∑ 𝜀𝑣
4. Now pq contains {A, C, B} (C is put before B
because C has lesser cost) Table 4.1 Storage Consumption of Index Tree
5. Remove A from pq and process unvisited neighbors
of A to pq.
6. Now pq now contains {C, B, E, D} Size of the
1000 2000 3000 4000 5000
dictionary
7. Remove C from pq and process unvisited neighbors
of C to pq. GDFS (MB) 78 151 230 335 400
8. Now pq contains {B, H, E, D}
BFS (MB) 72 137 210 297 380
9. Remove B from pq and process unvisited neighbors
of B to pq.
10. Now pq contains {H, E, D, F, G}
From the above table it is clearly noted that, the
11. Remove H from pq.
memory occupied by Best first search is very less
12 Now return I
compared to the greedy depth first search.
results. This test is repeated 16 times and the average privacy preserving keyword searching for cloud
precision obtained is 93%. The below table gives the storage services,' Journal of Networks and
precision percentage obtained for multi-keyword Computer Applications, vol. 35, no. 3, pp. 927–
V. CONCLUSION AND FUTURE WORK Enabling secure and efficient ranked keyword
search over outsourced cloud data, IEEE
A tree-based search method is proposed over the Transactions on Parallel and Distributed
encrypted data in the cloud that supports dynamic Systems, vol. 23, issue 8, (2012) August, pp.
(IDF)” model and the vector space model are cloud data,' in Proc. of ICDCS'10, 2010.
combined in the index creation and query generation [4]. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, YT,
structure is constructed and for that a “Best First similarity-based ranking, In Proceedings of the
Search” algorithm is proposed based on this tree 8th ACM SIGSAC symposium on Information,
index. The secure kNN algorithm is utilized to computer and communications security, (2013),
encrypt the index and query vectors, and meanwhile pp. 71-82.
ensure accurate relevance score calculation between [5]. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou,
encrypted index and query vectors. From the results, "Privacy-Preserving Multi-Keyword Ranked
it is clearly states that the special structure, tree- Search over Encrypted Cloud Data,' in IEEE
based index can easily achieve sub-linear search time Transactions on Parallel and Distributed
and compact with the insertion and deletion of Systems, vol. 25, no. 1, pp. 222–233, 2014.
documents. Due to the tree-based index, the search [6]. Yu, Jiadi& Lu, Peng& Zhu, Yanmin&Xue,
complexity of the proposed work is basically kept to Guangtao& Li, Minglu. (2013). Towards Secure
logarithmic. The proposed scheme, in practice, can Multi-Keyword Top-k Retrieval over
Encrypted Cloud Data. IEEE Transactions on
ABSTRACT
Cybercrime continues to surge without a slowdown in sight. The cyber security threat continues to worsen. In
the first half of 2018, the number of cyber breaches soared over 140% from a year earlier, leading to 33 billion
compromised data records worldwide. Cyber Security news such as Marriott hack in Nov 2018 is dominating
headlines and becoming a serious headache for business leaders. Malicious outsiders sparked more than half of
the 944 breaches and accounted for roughly 80% of stolen, compromised or lost records. Identity theft
continues to lead data breach types, but financial access incidents are escalating in severity as well. The United
States continues to be the favorite target, and data breaches at major US enterprises continue to grab the
headlines. In 2018, the most notable breaches have occurred at Adidas, FedEx, Jason’s Deli, Macy’s, Under
Armour, Nordstrom’s and the most popular Facebook. [1].
Keywords : Cyber Security, Quantum Computing, Crypto-Agility, Phishing, Cyber Insurance, Phishing attack,
JDLR, Emotional Blackmail, CCO, TalkTalk Data Breach
CSEIT19519 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 79-87 ]
79
Y. V. Sai Bharadwaj Int J S Res CSE & IT. January-February-2019 ; 5(1) : 79-87
concerns are targeted phishing attacks against 2. Ensure you have a proper backup system.
employees, advanced persistent threats, ransom ware, And make sure it is easy to access in case you
denial-of-service attacks and the proliferation of need to restore one piece of the system rather
employees allowed to use their own mobile devices. than the entire system. Enterprise-level cloud
systems can help.
Malware of all types is a huge problem. It is 3. Examine all the entry points into your system
becoming more difficult to combat as cyber-attackers and consider where they are vulnerable.
get more adept at developing software that can evade These include all your workstations,
traditional detection and employ more sophisticated communications and mobile devices as well
malware. For small and medium businesses, one as employee access cards, the internet and
breach often puts a victim out of business. That’s cameras.
because 54% of all cyber-attacks cause financial 4. Assess your system threats. These include
damages exceeding $500,000, the 2018 Cisco SMB client lists, passwords, data logs, backups and
cyber security report shows. That price tag along emails, and anyone who specifically has
with a damaged reputation are hard to survive. If access to the system, including customers and
they do survive, they still face significant system vendors.
downtime that averaged eight hours or more in the 5. Put a prevention system in place to defend
last year. Further, such companies often lack the IT against intruders. Put yourself in the place of
talent, budget and technologies to prevent, uncover the cyber attacker and consider the possible
and respond to an attack. ways the attacker could access your system
and steal your data. If your internal IT staff
2.2. Prevention of Cyber Theft : isn’t experienced enough to handle, entrust a
third-party firm, because the prevention
Unsurprisingly, there is no easy solution – and none
system must cover physical and digital
is likely within the near future – to prevent data
security.
breaches. But all businesses, especially small and
medium sized companies can become better prepared III. Quantum Cryptography: The next-generation of
and more adept at protecting against cyber-crime. secure data transmission
3.1. Issue:
Here are five actions concerning cyber security in
Quantum Computing will render much of today's
small and medium-sized companies that can be taken
encryption unsafe. But Quantum Cryptography could
to become more security-conscious:
be the solution. China has recently successfully tested
– for the first time – its quantum communications
1. Conduct a security audit. Learn how secure
system, which cannot be hacked. [3].
your network and other security systems are,
where vulnerabilities exist and how to
3.2. How does quantum cryptography work ?.
resolve them. If you consider cybersecurity
insurance — currently the fastest-growing
Quantum cryptography provides a secure method for
insurance — or have coverage from a
generating and distributing secret keys between two
business insurer, the insurer can usually refer
parties via an optical network. This is achieved by
you to resources to assist in the audit.
capitalising on the inherent unpredictability in the
state of particles – such as photons or electron – to
generate the random numbers needed for be resolved at the click of a button. Crypto-agility has
cryptographic applications. The technology then never been more important to ensure businesses can
harnesses this to create and share a secret digital key confidently protect themselves and their customers
that can be used to encrypt or authenticate from hackers. This is why organisations must invest
information via streams of encoded single photons, in a credible technology to automate the tracking of
which are sent through an optical communication certificates; it is no longer feasible to do this
network. manually, there are simply too many certificates to
track. Companies focusing too much on protecting
3.3. The arrival of quantum cryptography : usernames and passwords and not enough on
machine identities.
The arrival of quantum computing will ultimately
render much of today’s encryption unsafe. The 4.3. A future-proof solution :
current consensus that public key encryption is an
Google’s decision to distrust Symantec certificates
essential part of data security is starting to be
doesn’t need to be the end of the world. If companies
questioned in the face of new attack strategies –
are able to manage all their machine identities
which is subsequently driving uptake of robust
centrally and automate the process, it will enable
quantum cryptography solutions and services to
crypto-agility and ensure they can migrate quickly
deliver better data security. As a result, the global
when a flaw or vulnerability is discovered. By doing
quantum cryptography market is forecast to grow
so, companies can insulate themselves against the
from USD 285.7 Million in 2017 to USD 943.7
volatility of the CA market, protect their reputation
Million by 2022, a Compound Annual Growth Rate and ensure business continuity for online services.
(CAGR) of 27 per cent according to Research and
Markets. In reality, however, as things stand today V. What is phishing ?
quantum cryptography is not quite so close to
mainstream fruition.
The word ‘phishing’ was invented as a homophone of
IV. Crypto-agility: the key to ensuring long term ‘fishing’ as it involves creating a bait to lure
website security victims. Typically it involves an email; although
4.1. Issue : sometimes a telephone call – called Vishing – or a
In the age of the internet, you simply cannot afford text – called Smishing. These emails are often
to do business without being online, and keeping credible enough to deceive the recipient into clicking
your website secure should be a top priority [4]. on a link which could then release malware – viruses,
worms, Trojans or bots – onto the recipient’s
4.2. Crypto-agility to the rescue : computer or take the victim to a fake website.
This is why organisations need crypto-agility – i.e.
the ability to manage machine identities in real-time. 5.1. How to protect against phishing :
Crypto-agility enables businesses to quickly identify
The following are the tips against phishing.
and replace certificates in bulk when security events
or business needs call for it. Currently, many
organisations take days or even weeks to find and
replace certificates, which isn’t conducive to ensuring
5.1.1. Never, ever follow suspect links
security. By automating the process, this process can
There is no 100% guaranteed way to detect phishing If attachments with unknown file extensions (or PDF
but, if there is the slightest suspicion that the email files) suddenly appear as an e-mail attachment, it is a
may be fraudulent, do not click on any links it clear indication that something is wrong – especially
contains. Always enter the sender’s website address if you haven’t had any previous dealings with the
(not the link in the email) directly into your browser. sender.
Be warned if the part after the ‘at’ sign @ in an email Most companies address their customers by name.
address doesn’t match the purported sender; for But if the name is missing, misspelt or if there is no
example, if ‘PayPal’ sends you an email name at all and it just says something like ‘Hey’ or
from paypal@emails.com or the URL is misspelled ‘Dear Customer’, it could be an indication that this is
as www.paypa1.com or something similar. This is a a fake email.
(fake) website owned by a cyber squatter. Some of
the most well-known companies in the world have 5.1.7. Trust is good but control is better
website impersonators including Facebook, Google,
DropBox and PayPal. By regularly checking your bank statements, you can
mitigate any potentially serious consequences of a
5.1.3. Don’t give in to emotional blackmail phishing attack. Any suspicious or unknown
transactions should be reported directly to the bank
Phishing mails almost always contain the same kind or credit card company immediately.
of content and requests. Sometimes, they ask you to
update your user account or password. But 5.1.8. Keep yourself up-to-date on current scams
sometimes they use psychology to get you to react:
the notification of a big lottery win, an offer to take Take the time to read up regularly on ways to protect
part in a once-in-a-lifetime business opportunity or, your digital safety. If you hear that a service provider
an appeal for a donation to a charity. has been hacked, be sure to follow their instructions
and change your password.
5.1.4. Banks never want to know this
5.1.9. Only use secure websites
There are some things that your bank will never ever
ask you. They don’t want your passwords or PINs to When conducting online transactions, go directly to
be sent by e-mail or text; they don’t want you to the website. If the special offer is genuine, it will be
authorise the transfer of funds to a new account; and available on the website. Look for a sign that the site
they don’t want you to meet a bank representative at is secure, such as a white padlock icon on the
your home to collect cash, bank cards or anything browser’s status bar or a “https” URL (where the “s”
else. stands for “secure”).
ensure that you are blocking new viruses and The following are the cyber security trends and issues
spyware. (more stringent regulation, creations of new roles
etc.,) the world can expect in 2019: [ 6 ].
5.1.11. Click in haste, repent at leisure
6.1. Cyber security regulations improvement
Many phishing e-mails put pressure on you to act
quickly or else, they threaten, something bad will
happen or you will miss out on something very
We need to see a continuing improvement in the
important. A ‘bank‘ might warn you that your
relevant regulations as apply to cyber security. The
account will be closed unless you act quickly; or a
dynamic and fast-moving nature of cyber security
company might tell you that you have won a major
outpaces regulation which is far too slow and clumsy
cash prize, but only if you can claim it in the next 24
to be of any benefit and might actually hinder
hours. Don’t act in haste. Take your time to satisfy
security by building a culture of compliance with
yourself that the message is genuine.
regulations and a false sense of security against
enemies who are agile, motivated, and clever.
5.1.12. Genuine messages don’t make threats
vulnerabilities are exposed — could there be a repeat the Deep Web, in order to successfully hide and to
of the Mirai Botnet in 2019?. Indeed, the next communicate with other criminals.
generation of AI-powered attacks will be crafty
enough to emulate the behaviours of specific users to 6.8. Breaches will get more complicated and harder to
fool even skilled security personnel.This might beat
include the ability to craft complex and bespoke Cybercriminals will look to grow their malicious
phishing campaigns that will successfully fool even activities using malicious code in ever more devious
the most threat-conscious among us. ways.Such a ransomware variant has already been
discovered using an innovative system to increase
6.5. Attackers will continue to target consumer infections: the software turns victims into attackers
devices by offering a pyramid scheme-style discount.If the
Ransomware is a recognised problem for companies victim passes on a link to the malware and two or
of all shapes and sizes, epitomised by the large scale more people install this file and pay, the original
WannaCry attack that decimated the UK’s National victim has their files decrypted for free.
Health Service (NHS) and organisations around the
world. In 2019 and beyond, will we start to see 6.9. Cyber risk insurance will become more common
consumers being targeted across a range of connected This type of insurance will increasingly become part
objects? This is a likely scenario, with examples of operational risk strategy however, the insurance
coming out of child predators targeting IoT devices in industry needs to tailor products specific to client
toys (designed for children). Attackers might even needs and not just provide blanket cover as
target the smart TV in your house via a ransomware extensions to existing risks. As the industry evolves
attack that would require you to pay a fee to unlock we might see cyber insurance covering for loss of
it. reputation and trust with their customers, loss of
future revenue from negative media or other
6.6. Attackers will become bolder, more commercial exposure, and improvement costs for security
less traceable infrastructure or system upgrades.
connection between the board and the rest of the 7.3. Raise awareness, stay vigilant :
company. Awareness should always underpin your prevention
plan. SMEs are often targeted as the way in for
financial attacks through phishing or impersonation
with the aim to extract financial data or currency.
VII. Cyber security prevention plan :
This is often due to it being easier to take advantage
of human behaviour to target specific individuals
While there is no simple, singular solution to combat
who may not have had the right training. Whether
hack attacks and deter criminals, a layered
it’s lack of awareness or just lazy decisions, they need
prevention plan is crucial. There are five main steps
to be properly trained on the risks and repercussions,
that a company should take to prevent serious
along with potential hacking tricks as the majority of
damage from a cyber attack. They are as follows. [ 7 ]
malware still requires a human action to initiate it.
7.1. Assess your current cyber hygiene :
companies improve their cyber hygiene. It’s an help protect the network and users from would be
essential requirement for any business bidding on attacks such as anti-virus, anti-spam and business
government contracts, but it’s beneficial for any grade firewalls. Businesses should always invest in a
company, as it’s believed to reduce the risk of an layered defence strategy, as the more comprehensive
attack by up to 80%. It results in a certification which the set up is, the less chance an attack will succeed as
demonstrates a commitment to protecting business it has to pass through the various layers. Avoid free
and stakeholder data from threats – crucial for products and solutions which claim that they can
building customer trust. The scheme covers all keep malware off your PC. Windows Defender, for
essential controls such as firewalls, malware instance, doesn’t stop adware or Potentially
prevention and up-to-date software. Unwanted Programs (PUP) and doesn’t possess the
accuracy and effectiveness that more sophisticated
7. 2. Good housekeeping : prevention tools do. Paid-for prevention tools are a
small price to pay for the reassurance of digital safety.
There’s no replacement for the basics. Updates and
The cost of a hack to a business would be much more
patching should be performed regularly —
than the cost of the prevention technology.
WannaCry, the ransomware that caused chaos across
the world, exploited unpatched Windows systems to
7.5. Better safe than sorry :
spread malware. Businesses should steer away from
legacy systems like Windows XP, as these no longer While it’s important to be proactive, businesses need
receive updates and are especially vulnerable to a recovery plan in place in the event of a disaster or
attack. Get in the habit of conducting regular routine any downtime. A staggering 60% of businesses that
maintenance and audits, and seek a service provider encounter an attack go out of business in their first
if necessary, which can use specialist software to year, because of attacks to their network and users.
block ransomware strains. While the big dogs like the NHS, Sony and Equifax
dominate the headlines when they suffer attacks, it’s
the Small & Medium Enterprises (SMEs) that are
secretly suffering the worst due to factors such as the
human element and not prioritising investments, as claim while operations are down and sales are halted.
mentioned above. There could be consequential damages if this causes
supply chain issues with its partners who are not
Under General Data Protection Regulation (GDPR) receiving necessary component parts, thereby leading
legislation, you must have a plan in place to be able to third party claims. That's why cyber insurance can
to restore data, whether it’s a cyber attack, file be a smart precaution for any size business.
corruption or simple data loss, otherwise you risk
non-compliance. IT continuity is the bread and 8.1. What is cyber insurance?
butter of so many businesses, and you must make
Cyber insurance generally covers your business'
sure that you have a backup and business continuity
liability for a data breach involving sensitive
plan to prepare, should the worst happen. Seek
customer information, such as Social Security
Disaster Recovery as a Service (DRaaS) to protect
numbers, credit card numbers, account numbers,
critical business data and get operational again after a
health records etc., General liability insurance covers
disaster.
bodily injuries and property damage resulting from
your products, services or operations. Cyber
While there is not a simple, singular solution to
insurance is often excluded from a general liability
combat hack attacks and deter criminals, a layered
policy.
prevention plan is crucial. Follow these steps, and
data misuse and abuse can be minimised, while still
8.2. Cyber insurance coverage :
enabling your business to take advantage of the
The cyber insurance covers the following.
growing opportunities the internet can harness.
your employees regarding phishing and spam emails. Cite this article as :
These act as an entryway for malware, so one should:
Y. V. Sai Bharadwaj, Sai Bhageerath Y.V, Prof.
• Use reliable, well-known security and antivirus Y.V.S.S.S.V. Prasada Rao, "Cyber Security,
software Challenges, Some Practical Solutions", International
• Make sure devices update automatically Journal of Scientific Research in Computer Science,
• Don’t click on email attachments from an Engineering and Information Technology
unknown source (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
• Don’t add people to your social media network 79-87, January-February 2019.
unless you know them Available at doi :
• Don’t use apps or software from free sites – Buy https://doi.org/10.32628/CSEIT19519
them from the official website instead Journal URL : http://ijsrcseit.com/CSEIT19519
• Routinely change passwords, making sure they
contain a unique combination of numbers and
letters (in both upper and lower case)
• Don’t use old, unsupported browsers
X. REFERENCES
ABSTRACT
Prediction of reservoir yield is an important for fisheries managers to use appropriate scientific management
practices to increase the fishery production. Many mathematical or applied mathematics and Artificial Neural
Networks models were developed to predict fish production forecast of reservoirs. Ecology of reservoirs is
dynamic, extraordinarily advanced and nonlinear in nature. There are several drivers have an effect on the
fisheries, both internal and external environmental parameters. Many researchers have assessed fish yield
potential based on leaner models using multiple linear regressions. Accurate modelling to predict fish yield of
the reservoirs and lakes helps to understand behaviour of the system and managers can formulate appropriate
management practices to improve fish yield. This paper provides an in-depth review on existing model
developed from simple empirical estimation to high-level non-linear model for assessing fishery potential of
lakes and reservoirs.
Keywords : Fish Yields, Artificial Neural Network, MEI, CPUE, EBP, Automata Networks
CSEIT195110 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 88-100 ]
88
D. Karunakaran, M. Balakrishnan Int J S Res CSE & IT. January-February-2019 ; 5(1) : 88-100
Ecology of reservoirs is dynamic, very complex and calculated (Wijayaratne and Amarasinghe, 1984;
nonlinear in nature. There are many drivers Nissanke et al., 2000) and (Hasan et al., 2001)
influencing the fisheries both internal and external predicted fish yield based on chlorophyll-a, Secchi
environmental parameters. Many researchers have depth and morpho-edaphic index in Bangaladesh.
tried to assess fish yield potential based on leaner
models by using multiple linear regression analysis
techniques (Jowett, 1993). These empirical models Others have found that phytoplankton production
are capable of solving many linear problems, but can predict fish yield more accurately (Oglesby,
some time it cannot give accurate results when 1977) or total phosphorus and macro benthos
relationships among the variables are non-linear in biomass/mean depth found to be the best predictors
nature. Advance tools like neural network, fuzzy of fish yield better than MEI (Hanson and
logic, wavelet transform and genetic algorithm will Legget,1982). Surface area alone or Lake Shoreline
give better and accurate results for non-linear development is useful predictor variables of fishyield
problems. in North American lakes (Youngs and Heimbuch,
1982). Hrbacek (1969) found that significant
II. PREDICTION OF FISH YIELD USING correlation between primary production and carp
EMPIRICAL MODEL yield in European ecosystems. Melack (1976) and
Toews and Griffith (1979) reported that primary
Many researchers predicated fish yields in lakes and production is an estimator of fish yield. Stocking
reservoirs for the last 70 years using simple empirical densities of fingerlings in inland reservoirs can be
estimation. Rawson (1952) demonstrated the first calculated based on estimation of potential fish
model to estimate fish yields of lakes based on mean production using morpho-edaphic index (MEI)
depth. Some others also tried to assess fish yield (Welcomme, 1976). Surface area can alone be the
potential from biotic and morphometric parameters best predictor of fish yield reported by researchers
(Hayes, 1957; Northcote and Larkin, 1956). Ryder from North American lakes (Youngs and Heimbuch,
(1965) improves existing estimation further by 1982).
developing morpho-edapic index (MEI) by using total
dissolved solids or conductivity/depth using 23 Models have been developed using reservoir depth,
temperate lakes. Later many researchers used other volume and area for estimation of fishery yield
dependent variables such as lake surface area, (Rawson, 1952; Jenkins and Morais, 1971; Moreau
temperature and other parameters along with MEI and De Silva, 1991). Downing et al., (1990) reported
for prediction of fish yields in lakes and reservoirs in annual phytoplankton production correlated (r2=
many countries. (e.g. Toews & Griffith, 1979; Jenkins, 0.79) than MEI, total phosphorus concentration and
1982; Schlesinger & Reglier, 1982; Machena & Fair, macro benthos biomass/mean depth, were the best
1986). Ryder (1965) applied this method in Canada. univariate predictors of fish yield (r2= 0.84 and r2=
Matuszek (1978) used mean depth and total dissolved 0.48, respectively). Hanson and Leggett (1982)
solids concentration of large North America lakes. reported catchment land use patterns are key
Morpho-edaphic index along with soci-economic parameters for fish yield prediction of reservoir (De
variables such as numbers of fisher men, boat and Silva et al., 2001). Rawson (1938) grouped lake
effort are used to predict yield of African lakes productivity parameters in three groups i.e climatic,
(Henderson and Welcomme, 1974). Maximum morphometric, and edaphic
Sustainable fish yield of Sri Lanka reservoirs were
network is highly popular because of similarity in Mediterranean Sea using ANN. The input variables
biological systems and has anability to learn from are biomass/abundance ratio, depth of the water
experiences and improving its performance. It is a column, latitude and longitude, and
very powerful tool for modelling non-linear and monthlysampling of675 sample stations of North
complex, imprecise and noisy data. It has an ability to Aegean Sea.Error back-propagation (EBP) algorithm
manipulate large amounts of data and generalize is used to learn the network.
results.
Baran, Pet.al.(1996) developed stochastic models to
A. Prediction of Fish Yields in Lakes and Reservoirs predict trout population density or biomass on a
using Artificial Neural Network mesohabitat scale using neural networks.
Backpropagation algorithm was used to train habitat
ANN have been used in many ecological modeling, variables width, gradient, mean depth, coefficient of
phytoplankton production (Scardi, 1996), fish species variation of depth, mean bottom velocity, coefficient
richness prediction (Brosse, Set al., 1998), and of variation of bottom velocity, froude number, area
prediction of density and biomass of various fish of cover, area of shelter, pool deep water area and
populations (Baran et al., 1996; Lek et al., 1996a,b; elevation. The result shows that the back propagation
Mastrorilloet. al., 1997). Many authors have reported neural network estimatedmore accuratelythan the
that ANN predicts more accurate than multi leaner multiple regression.
regression (Ehrman et al .1996; Leket. al. 1996b;
Scardi1996). Brosse, S. et. al. (1999) predicted fish spatial
occupancy and abundance in a mesotrophic reservoir
Laë, R., Lek, S., & Moreau, J. (1999) predicted fish using Artificial Neural Network.The input databased
yield of African lakes using Artificial neural networks on 306 observations collected using electrofishing.
using six input variables such as catchment area, The relationships between physical parameters and
maximum area, fishing effort, conductivity, depth, the abundance fish species are studied. Eight
altitude and latitude. The structure of the feed independent environmental variables depth, distance
forward neural network is six input neuron with one from the bank, slope of the bottom, flooded
hidden layer of five neurons, sigmoid functions, and vegetation cover, percentage of boulders, percentage
backpropagation algorithm for the training of the of pebbles, percentage of gravel and percentage of
ANNs. The result shows that correlation coefficients mud are used to quantify fish density. Structure of
between the estimated and observed values were the network is feed-forward with eight input neurons,
significantly very high. one hidden layer with 10 nodes with bias and
Zhang, H., & Zimba, P. V. (2017) developed multi- aoutput layer (8-10-1). The network was trained
layer neural networks to assess effects of estuarine using back-propagation algorithm to predict
freshwater fluxes on fish abundanceusing artificial accurately with minimum error.
neural network. The predictor variable consists of
inflow, evaporation, precipitation and annual catch Scardi, M., et.al (2008) evaluated ecological integrity
rate of fish species of Nueces Estuary. The network of streams and rivers using an expert system based
was trained using Levenberg-Marquardt back fish assemblage model. Twenty-seven environmental
propagation algorithm. Maravelias, C. D., Haralabous, parameters along with fish assemblage composition of
J., & Papaconstantinou, C. (2003) predicted 63 locations in Latium streams and rivers were used
distributions of demersal fish species in the in this study. Neural network was trained using most
popular error back-propagation algorithm. Aoki, I., maximum depth, shoreline perimeter, elevation, total
and Komatsu, T. (1997) predicted the winter catch of dissolved solids, pH, summer stratification (0, 1) and
young Japanese sardine (Sardinopsmelanostictus) littoral-zone predator (0, 1). Artificial neural
from climatic, hydrological and biological parameters networks predicted accurately abundance as well as
in the Joban-Boso Seas of the Pacific coast of central occurrence of fish species.
Japan using neural network. A feed-forward three
layers an input, hidden and an output layer is used. Kılıç, H., et. al (2007) developed ANN models to
Predictor variables are hydrological and biotic predict primary production of reservoir by using
parameters. Hydrological parameters consist of preprocessing technique of an Automata Networks
southern limit of the Oyashio, path type of Kuroshio, (AN) to find suitable variables for subsequent ANN
northern limit of the Kuroshio Extension, sea surface modeling. The AN based preprocessing followed by a
temperature in the northeastern sea area of Japanand ANN application predicted primary productivity
sea surface temperature in the fishing ground. accurately using Chl-a. The correlation coefficient as
Zooplankton, climatic southern oscillation index, far high as 0.83 and RMSE was as low as 2.69g/l was
east zonal index and east sea index are biological achieved withdouble hidden layer structure with 10
parameters. The network trained by back- neurons.
propagation algorithm to predictchanges in the
sardine abundance. Kuo, J. T., Hsieh, M. H., Lung, W. S., & She, N. (2007)
predict reservoir water quality using Artificial Neural
Joy, M. K., & Death, R. G. (2004) developed Network with back-propagation algorithm. The input
predictive model and spatial mapping of decapod variables are dissolved oxygen (DO), total phosphorus
assemblages using combination of GIS and neural (TP), chlorophyll-a (Chl-a), and secchi disk depth
networks. Single hidden-layer feed forward multi- (SD). Results show that correlation coefficients
layer perceptron trained by back propagation error between predicted values and measured data are 0.7
algorithm are used in this network. Catchment area, with reasonable accuracy.
average catchment elevation, elevation upstream end
of reach, average catchment slope, average annual IV. CONCLUSION
catchment rainfall, average catchment air
temperature, estimated river flow, reach length, Prediction of reservoir and lakes fish yield is the
latitude, stream order, catchment rainfall, distance important factor for the fishery managers to improve
from the coast, lake catchment area, catchment land the decision-making processes of reservoir fishery
use proportion and catchment geology proportions management and use appropriate management
(surface rock) are input variables. The decapod was practices to enhance the fish production. There is
predicted with high degree of accuracy from extensive literature available over the past decade on
geospatial landscapepredictor variables. prediction of fish yield in reservoir and lakes both in
linear and non-linear models. Many authors reported
Olden, J. D., & Jackson, D. A. (2001). Developed fish– that Artificial Neural Network model is giving high
habitat models for nine fish species using Artificial level of accuracy than Multilinear Regression Model.
Neural Networks. The study was conducted using
data of 128 lakes from the Madawaska river drainage
and 32 lakes from the Oxtongue river drainage of
Canada. The habitat input variables are area,
neural networks to modelling nonlinear [47]. Natarajan, A.V., 1977.Fifth Workshop of AICP
relationships in ecology. Ecological modelling, on Ecology and Fisheries of Freshwater
90(1), 39-52. Reservoirs. Ukai, 7-8 September, 1977.
[38]. Liang, Y., Melack, J. M., & Wang, J. (1981). [48]. Natarajan, A.V., 1979. Ecosystem oriented
Primary production and fish yields in Chinese approach for reservoir fisheries development in
ponds and lakes. Transactions of the American India. Souvenir on the ICAR Golden Jubilee
Fisheries Society, 110(3), 346-350. Year, CIFRI, Barrackpore, West Bengal, Part I,
[39]. Machena, C., & Fair, P. (1986). Comparison of 107-111.
fish yields from prediction models between [49]. Nissanka, C., Amarasinghe, U. S., & De Silva, S.
Lakes Tanganyika and Kariba. Hydrobiologia, S. (2000). Yield predictive models for Sri Lankan
137(1), 29-32. reservoir fisheries. Fisheries Management and
[40]. Maravelias, C. D., Haralabous, J., & Ecology, 7(5), 425-436.
Papaconstantinou, C. (2003). Predicting [50]. Northcote, T. G., & Larkin, P. A. (1956). Indices
demersal fish species distributions in the of productivity in British Columbia lakes.
Mediterranean Sea using artificial neural Journal of the Fisheries Board of Canada, 13(4),
networks. Marine ecology progress series, 255, 515-540.
249-258. [51]. Nürnberg, G. K. (1996). Trophic state of clear
[41]. Matuszek, J. E. (1978). Empirical predictions of and coloured, soft-and hard water lakes with
fish yields of large North American lakes. special consideration of nutrients, anoxia,
Transactions of the American Fisheries Society, phytoplankton and fish. Lake and Reservoir
107(3), 385-394. Management, 12(4), 432-447
[42]. McConnell, W. J., Lewis, S., & Olson, J. E. [52]. Oglesby, R. T. (1977). Relationships of fish yield
(1977). Gross photosynthesis as an estimator of to lake phytoplankton standing crop,
potential fish production. Transactions of the production, and morphoedaphic factors. Journal
American Fisheries Society, 106(5), 417-423. of the Fisheries Board of Canada, 34(12), 2271-
[43]. Mehrotra, S. N., &Jhingran, A. G. (1986). 2279.
Evaluation of limnological characteristics and [53]. Olden, J. D., & Jackson, D. A. (2001). Fish–
trophic status of Gulariya Reservoir. Proc. Nat. habitat relationships in lakes: gaining predictive
Acad. Sci. India, 53, 204-210 and explanatory insight by using artificial neural
[44]. Melack, J. M. (1976). Primary productivity and networks. Transactions of the American
fish yields in tropical lakes. Transactions of the Fisheries Society, 130(5), 878-897.
American Fisheries Society, 105(5), 575-580. [54]. Peters, R.H. (1986). The role of prediction in
[45]. Moreau, J., & De Silva, S. S. (1991). Predictive limnology.Limnol.Oceanogr. 31: 1143-1159.
fish yield models for lakes and reservoirs of the [55]. Quiros, R. (1990). Predictors of relative fish
Philippines, Sri Lanka and Thailand (No. 319). biomass in lakes and reservoirs of Argentina.
Food & Agriculture Org. Canadian Journal of Fisheries and Aquatic
[46]. Natarajan, A.V., 1976. Ecology and state of Sciences, 47(5), 928-939.
fishery development in some of the man made [56]. Raju, M. M., Srivastava, R. K., Bisht, D., Sharma,
reservoirs of India. In: Symposium on the H. C., & Kumar, A. (2011). Development of
development and utilisationof Inland Fishery artificial neural-network-based models for the
resources, Colombo, 27-29 October 1976. simulation of spring discharge. Advances in
Artificial Intelligence, 2011.
[57]. Ramakrishnaiah, M., & Sarkar, S. K. (1982). S.H. Abidi, N.K. Thakur, R.S. Birader and L.
Plankton productivity in relation to certain Shenoy.(eds.) Vision on Indian Fisheries of 21st
hydrobiological factors in Konar reservoir Century. Central Institute of Fisheries
(Bihar). Journal of the Inland Fisheries Society Education, Bombay.
of India, 14(1), 58-68. [68]. Toews, D. R., & Griffith, J. S. (1979). Empirical
[58]. Ramakrishniah, M. (1990, October). estimates of potential fish yield for the Lake
Morphodrainage index, a fish yield predictor for Bangweulu system, Zambia, Central Africa.
Indian reservoirs. In 2nd Asian Reservoir Transactions of the American Fisheries Society,
Workshop, Hangzhou, PR China (pp. 15-19). 108(3), 241-252.
[59]. Rawson, D. S. (1952). Mean depth and the fish [69]. Unni, K.S., 1993.Limnology of Central Indian
production of large lakes. Ecology, 33(4), 513- lakes, reservoirs and ponds – a review. In:
521. Mishra, P.C. and Trivedy, R.K. (eds.). Ecology
[60]. Rempel, R. S., & Colby, P. J. (1991). A and pollution of Indianlakes and reservoirs.
statistically valid model of the morphoedaphic Ashish Publishing House, New Delhi.
index. Canadian Journal of Fisheries and Aquatic [70]. Vollenweider, R.A., 1969.A manual on methods
Sciences, 48(10), 1937-1943. for measuring primary productivity in aquatic
[61]. Rigler, F. H. (1982). Recognition of the possible: environment. IBP Hand Book No. 12. Blackwell
an advantage of empiricism in ecology. Canadian ScientificPub., U.K. 213 pp.
Journal of Fisheries and Aquatic Sciences, 39(9), [71]. Weimin, M., Liu, J., Li, Z., Xie, S., Vass, K.K.,
1323-1331. Sugunan, V.V., Pradhan, G.B., Amarasinghe,
[62]. Ryder, R. A. (1965). A method for estimating the U.S., Weerakoon, D.E.M. and Jutagate, T., 2006.
potential fish production of north‐temperate Status of Reservoir Fisheries in Five Asian
lakes. Transactions of the American Fisheries Countries.
Society, 94(3), 214-218 [72]. Welcomme, R. L. (1976). Approaches to
[63]. Ryder, R. A. (1982). The morphoedaphic resource evaluation and management in tropical
index—use, abuse, and fundamental concepts. inland waters. In FAO, Rome (Italy). Fisheries
Transactions of the American Fisheries Society, Dept. Indo-Pacific Fisheries Council.
111(2), 154-164. Symposium on the Development and Utilization
[64]. Ryder, R. A., Kerr, S. R., Loftus, K. H., &Regier, of Inland Fishery Resources. Colombo (Sri
H. A. (1974). The morphoedaphic index, a fish Lanka). 27 Oct 1976.
yield estimator—review and evaluation. Journal [73]. Welcomme, R.L.,1972. The inland waters of
of the Fisheries Board of Canada, 31(5), 663-688. Africa. FAO, CIFA Technical Paper, 1, 117pp.
[65]. Scardi, M. (1996). Artificial neural networks as Publ. FAO, Rome.
empirical models for estimating phytoplankton [74]. Wijeyaratne, M. J. S., &Amarasinghe, U. S.
production. Marine Ecology Progress Series, 139, (1987). Estimation of maximum sustainable fish
289-299. yield and stocking densities of fish fingerlings in
[66]. Schlesinger, D. A., & Regier, H. A. (1982). fresh water lakes and reservoirs.
Climatic and morphoedaphic indices of fish [75]. Wijeyaratne, M. R. S., &Amarasinghe, U. S.
yields from natural lakes. Transactions of the (1984). Estimations of maximum sustainable fish
American Fisheries Society, 111(2), 141-150. yields and stocking densities of inland reservoirs
[67]. Sinha, M. 1999. Vision of inland fisheries of of Sri Lanka. Journal of the National Aquatic
India of twenty first century. p. 154-168. In: Resources Agency, 31, 65-72.
ABSTRACT
Mobile cloud computing in the increasing popularity among users of mobile device enables to store their data in
cloud. Security is the major concern when the sensitive information is stored and transferred across the internet.
It is essential to make sure that the data is secured and protected. In this paper, we discussed the problem of
privacy of data with reducing the resources usage. Moreover, mobile cloud computing has limitations in
resources such as power energy, processor, Memory and storage. Cryptography ensures the confidentiality,
authentication, availability, and integrity of the data. This is done through cryptographic algorithms such as
Data Encryption Standard (DES), Blowfish and Advanced Encryption Standard (AES). The experimental results
evaluated and compared the performance of the encryption algorithms. The performance metrics used are
encryption and decryption time, CPU and Memory utilization. Evaluation results showed a significant
improvement in reducing the resources, amongst all the techniques, choosing a suitable encryption algorithm
based on different parameters that are best fit to the future user requirements is considered.
Keywords : Mobile Cloud Computing, Blowfish, AES, Security, Privacy, Mobile Device.
I. INTRODUCTION
CSEIT195111 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 101-106 ]
101
K. Kaviya Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 101-106
allocate hardware resources to users in an efficient, can/cannot access the data. The principle of
quick, and smooth way. The supervisor software confidentiality specifies that only the sender and
layer contains the system software to manage the the intended recipient should be able to access
cloud hardware resources. The system software the contents of a message.
permits application software to run and utilize Integrity: The integrity mechanism ensures that
underlying resources in an efficient way.In the the contents of the message remain the same
context of mobile cloud security, cloud providers when it reaches the intended recipient as sent by
should ensure reliability and availability by the sender. It is defined as the rightness of data
integrating security technologies MCC satisfies stored in the cloud. The alterations between two
limitations of resource constrained devices by updates of a record violate the data integrity.
allocating cloud services for the purpose of Security: In the traditional file systems data was
application executions and data storage. So, whenever stored within boundaries, but cloud data is stored
we talk about the security in MCC, it is necessary to outside the boundaries of an organization, say,
consider the security and privacy issues. and third-party storage using strong encryption
techniques.
To secure the mobile cloud environment, several Authentication: Authentication mechanisms help
issues need to be considered regarding the data to establish proof of identities. This process
security, data integrity, data confidentiality, ensures that the origin of the message is correctly
authentication, authorization, network security, data identified.
violation issues etc. A secure framework is essential Non- repudiation: Non-repudiation does not
to protect sensitive data of mobile users with minimal allow the sender of a message to refute the claim
performance degradation. The proposed scheme uses of not sending the message.
data encryption to protect sensitive data leakage. Access Control: Access Control specifies and
When user’s data is transmitted to and stored on controls who can access the process.
cloud, it creates many possibilities of unauthorized Availability: The principle of availability states
access of data either during transmission or from that resources should be available to authorized
storage devices. There are many cryptographic parties all the times.
algorithms to deal with security, but the selection
must be taken by considering security as well as III. CRYPTOGRAPHY
performance improvement, especially in the case of
resource constrained devices. Cryptography is a method of protecting information
and communications with codes so that only those
II. SECURITY ISSUES for whom the information is intended can read and
process it. Cryptography refers to secure information
Data Storage: Cloud storage providers manage the and communication techniques derived from
data in multiple copies across many independent mathematical concepts and a set of rule-based
locations calculations called algorithms to transform messages
Confidentiality: Confidentiality can be defined as in ways that are hard to decipher. Security has always
the sensitive data not being disclosed to been an important term in all the fields. As the paper
unauthorized process, devices and person. A is discussing on cloud storage systems, the proposed
cloud service provider knows where the user’s methodology considers the security required to the
public or private data is located and who data that is stored on the cloud. Cryptography has
come up as a solution to this security issue. block size. It includes 64 bits key that contains 56 bits
Cryptography is classified into symmetric are directly utilized by the algorithm as key bits and
cryptography, asymmetric cryptography and hashing. are randomly generated. The DES algorithm
processes the 64 bits input with an initial
Types of Cryptography permutation, 16 rounds of the key and the final
permutation. The DES was initially considered as a
Secret Key Cryptography: When the same key is strong algorithm, but today the large amount of data
used for both encryption and decryption, DES, and short key length of DES limits its use.
Triple DES, AES, Blow Fish RC5 etc., may be the
examples of such encryption, then that Advanced Encryption Standard (AES)
mechanism is known as secret key cryptography.
Public Key Cryptography: When two different The algorithm explains about by AES is a secret-key
keys are used, that is one key for encryption and algorithm which means of the same key is used for
another key for decryption, RSA, Elliptic Curve both encrypting and decrypting the data. This is one
etc., may be the examples of such encryption, reason why it has a comparably small number of
then that mechanism is known as public key rounds. AES encryption is fast and flexible. It can be
cryptography. implemented on various platforms especially in small
Hash Algorithms where the input data (message) devices. All the operations in this algorithm involve
is recreated from the hash value (message complete bytes for effective implementation. Three
digest/digest) examples include: MD5, SHA, different key lengths such as 128, 192 and 256 block
MD2, MD4, MD6.SHA-256, SHA-512, SHA-1, size are supported by AES.
Whirlpool etc.
Table 4.1 Comparison of Symmetric Algorithms
algorithms. It uses the key length range up to 32-448- CPU Time = I * CPI * T, where I = number of
and 64-bits block. Blowfish algorithm employed 16 instructions in program, CPI = average cycles per
rounds for the encryption process. Each round instruction and T = clock cycle time.
contains a key dependent permutation and key- and CPU Time = I * CPI / R, where R = 1/T the clock rate,
data dependent substitution. Data Encryption T or R are usually published as performance measures
involves the iteration of a simple function of 16 times. for a processor, I requires special profiling software
Each round contains a key dependent permutation and CPI depends on many factors (including
and data dependent substitution. Sub key Generation memory).
involves converts the key up to 448 bits long to 4168
bits. Blowfish is very suitable algorithm for the Performance Calculation
platform of smart phones because of its high security
level and high speed. Seconds/Program = (Instructions/Program) x
(Clocks/Instruction) x (Seconds/Clock)
V. PERFORMANCE EVALUATION METRICS
Memory Consumption Calculation
CPU Time Calculation Total Memory - (Free + Buffers + Cached) = current
total memory usage
Figure 5.2 CPU and Memory comparisons for Encryption and Decryption
ABSTRACT
Search engines play important role in the success of the Web. Search engine helps the users to find the relevant
information on the internet. Due to many problems in traditional search engines has led to the development of
semantic web. Semantic web technologies are playing a crucial role in enhancing traditional search, as it work
to create machines readable data and focus on metadata. However, it will not replace traditional search engines.
In the environment of semantic web, search engine should be more useful and efficient for searching the
relevant web information. It is a way to increase the accuracy of information retrieval system. This is possible
because semantic web uses software agents; these agents collect the information, perform relevant transactions
and interact with physical devices. This paper includes the survey on the prevalent Semantic Search Engines
based on their advantages, working and disadvantages and presents a comparative study based on techniques,
type of results, crawling, and indexing.
Keywords : Semantic Web, Semantic Search Engines, Intelligent Search
I. INTRODUCTION which synchronies and arranges all the data over the
web in a disciplined manner.
The web is a medium for accessing a great variety of So moving from current web to semantic web
information stored in different parts of the world. particularly depends on enhancement of knowledge
Information is mostly in the form of unstructured and overcome the current web issues. Semantic search
data. As the data on the web grows at explosive rates, plays an important role because it intelligently
it has lead to several problems such as increased understands the content and give smart and relevant
difficulty of finding relevant information, extracting results according to the quires. Traditional search
useful knowledge. engines get the answers syntactically accurate but
larger in amount. However, semantic engines provide
Conventional web search engines like Google and accurate information in terms of well-defined
yahoo return thousands of results for users quires expressions. The main aim of semantic web is to lift
because they do not understand the exact meaning of the capacity of users and software agents to find
quires. They uses keyword based search approach, documents, information and knowledge from the web
thus new technology “Semantic Web” comes into and make the content to machine and human
existence, which works on the semantics (meaning) of readable. This is possible by adding the semantic layer
queries. Semantic web offers a smarter web services to the current web.
CSEIT195115 | Received : 10 Jan 2019 | Accepted : 22 Jan 2019 | January-February -2019 [ 5 (1) : 107-115 ]
107
Anita Kumari, Dr. Jawahar Thakur Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 107-115
The organization of this document is as follows. In pyramid. The research provides deep
Section 2 (Literature Survey), literature survey is Understanding of five main semantic search
explained with comparative study. In Section 3 engines based on comparative analysis that may
(Keyword Based Search), keyword based search help for future work for semantic web in general
engines and the limitations are discussed. Semantic and for semantic search engines in particular.
web, approaches to semantic web and few search 4) Nikhil CHITRE [8], analyses the semantic search
engines (Hakia, Falcons, Swoogle, DuckDuckGO and engines generation into the intelligent web. Their
Knigne) and comparison on these search engines are focus is on finding the difference between the
discussed in Section 4(Semantic Web Search) based traditional and semantic search engines. Explains
on few parameters. Section 5 (Conclusion) concludes the various techniques and advantages of few
the paper by providing a summary of all reported important semantic web search engines that has
work in semantic web search. been developed so far.
5) Yi Jin Zhuying Lin, Hongwei Lin [9], states that
II. LITERATURE SURVEY search engines plays important role in success of
web; search engine helps any internet user to
There is significant literature work that has been rapidly find relevant information. Architecture
done on semantic web area. Various authors and of semantic search engine is explained and how
researchers have contributed very well in this area. elements of semantic search engine are used in
performing the fundamental task of information
1) Vidhi Shah1, Akshat Shah [5], concluded that retrieval is explained. An improved algorithm
searching the internet today is a challenge and based on TFIDF algorithm is also proposed.
semantic search engine enhances the traditional 6) Kyumars Sheykh Esmaili, Hassan Abolhassani
web search engines. They discuss various [10], presents a categorization scheme for web
semantic search engines and present a search engines. For each category, components
comparison based on the approaches. are explained according to a proposed general
2) G.Anuradha, G.Sudeepthi et al [6], presents a brief architecture and various approaches are used in
survey of the existing literature regarding these components also represented. It should note
intelligent semantic web search engine that some of these engines are constructed
technologies. Also, review their characteristics through a portal and therefore they have not
respectively. They concluded that existing individual names.
techniques have limitations particularly in terms 7) Ranjana Jain, Neelam Duhan el at [11], states that
of time response, accuracy of results, importance web 2.0 search engines are unable to present
of the results and relevancy of results. An direct answers against the users fired query. Web
efficient semantic web search engines should 3.0 is semantic web using RDF format
meet out these challenges efficiently and organization information in more structure form,
compatibility with global standards of web which helps the semantic search engines to
technology. present results in a more direct way. Also include
3) Maliha Majid Qureshi, Bibi Assma [7], presents these semantic search engines, review their
the semantic search engines and broad survey to working, and compare them based on few factors.
analyze the semantic search engines has done. 8) Jyoti Chaurasia, Jagdish Raikwal[12], states that
Comparative analysis of the semantic search semantic web technology plays an crucial role in
engines has done based on Factors cited in the enhancing traditional web search. They proposed
a semantic search engine based on ontology. An difference between the keyword based and
algorithm is also introduced to overcome the semantic based search engines.
various challenges in the fields of unstructured 10) G.Madhu1 and Dr. A. Govardhan [14], presents a
data using semantic web technology and provide brief survey of the existing literature regarding
the complete description. intelligent semantic search technologies. Review
9) Ankita Malve , P.M. Chawan [13], concluded that their characteristics respectively. In addition, the
semantic based search engine have more issues within the reviewed intelligent semantic
advantages over keyword based search engine in search methods and engines are concluded based
terms of accuracy of getting results. Search on four perspectives differentiations between
process in semantic search engine is based on designers and users’ perceptions, static knowledge
semantics of queries. It provides assurance to user structure, low precision and high recall and lack
to get accurate and relevant results based on of experimental tests.
meaning of word. They also include the basic
TABLE I
COMPARISONS BASED ON LITERATURE SURVEY
III. KEYWORD BASED SEARCH • Low value of Recall and current Precision
parameters.
Search Engines are used to find the information on • More network congestion because multiple
the internet and getting results in less time but it crawlers try to crawl the same web pages form
lacks the existence of the semantic structure so it web servers.
becomes difficult for the machine to understand the • Polysemy words:- engines do not differentiate
meaning of the terms and expressions provided by between the same spelled words having different
the users. As the results, search engines returns the meaning hence give irrelevant pages.
ambiguous data sets. The survey indicate that user do • Stemming: - also these search engines don not
not find the accurate results in the first set of URLs differentiate between the singular and plural
returned because of the increased size of the links on words. Hence may produce the confusion while
the web pages. Because sometime one word has searching a query.
several meanings and several words have same • Synonymy: - it is the problem of understanding
meaning, in this case user will not get the result what the different spelled words with the same
he wanted to search [13]. Semantic web is developed meaning and it produce the confusion while
to overcome the following limitations of the current searching.
web search:- • Lack of semantic understanding [6][13][12].
• These engines are based on the occurrence of IV. SEMANTIC WEB SEARCH
words in the documents, so it is difficult to get
A. Semantic Web
the relevant results.
• Lack of proper semantic structure according to
It is an extension to WWW and international
the representation of information.
certified standard by W3C, which aims in handling
•
mostly unstructured data. It describes the 3) The Third approach focus on natural language
relationship between things and properties of things. understanding.
The main idea of semantic web is to add the metadata 4) The Fourth approach makes use of ontology to
into the current web pages to improve the represent the knowledge about a Particular
description of online resources. domain and expand quires [6][8].
1) SWOOGLE: - It is a crawler-based indexing and 4) KNGINE: - It is intelligent search engine and the
retrieval system for semantic web documents result is divided into either web results or image
(SWD). It uses the crawler to discover the RDF results. They are preceded by the information
and HTML documents. It extracts metadata and about the “concepts”. For instance, attempting to
computes relations between documents. Swoogle find a town can be preceded by using statistics
is also a content-based search engine that used to about the metropolis, nearby points of interest,
analyse, discover, and index the knowledge from activities, climate and hotels. It provides the high
the web. It is based on the page rank algorithm degree of related data to the user’s queries. It
and OWL language [11]. analyze the main keywords from the users
2) HAKIA:- It is a meaning based search engine that queries and form the relations between them and
works on matching the meaning rather than return results. It is a question-answer engine that
keyword match. The searching capacity of this understands the questions and tries to answer
engine is not limited to single keyword; you can with the help of natural language processing and
search sentences, a phrases or questions. This machine learning [8][6].
engine gets the results using equivalent terms. 5) DUCKDUCKGO: -“The search engine that does
Hakia engine essentially builds around mainly not track you” it is a feature rich search engine
three evolving technologies i.e., Sense that gives many reasons to put Google away. It
Repository, Query Indexing Technique and focuses on maintaining user privacy and
Semantic Ranking algorithm [8][6][11]. therefore does not store any personalized search
3) FALCONS: - It is a keyword based ontology results. This engine guaranty that they does not
search engines. It is develop around the concept store users IP address, does not users login
sharing and ontology reusing. It display the information. This engine only uses cookies to
required information on snippets, therefore user maintain the privacy of the users. It is a semantic
does not need to explore the pages. This engine search technology based search engine that
provides the best user interface. This engine presents relevant match or concept match for
integrates these two terms i.e., Concept-Level- example if a user searches for a keyword that has
Search and Ontology- Level-Search by more than one connotation, it gives you the
recommending ontology and allows filtering the options to choose what you were originally
concepts using ontology’s. Through this simple searching for along with the disambiguate
process user can easily find the ontology’s that outcome. This engine has the most important
satisfy their need within a few seconds [11]. property that it provides users privacy which
Google does not give [8][6][10].
TABLE II
COMPARISONS BETWEEN DIFFERENT SEMANTIC SEARCH ENGINES
LIMITATIONS 1.Poor indexing of 1.This engine 1.URL 1.Does not 1.It provides itself an
documents, does not rank Canonization, provides option of privacy but
2.Poor response the objects 2.Privacy silent mode they are just as
time for find according to Session IDS, option. opaque as Google is,
queries. query. 3.Does not since they don’t
index open source their
everything, code, how do you
4.Need other know they are not
search engines tracking you?
too,
5.Contains
virtual content
and dynamic
content.
[8]. Chitre, Nikhil. "Semantic Web Search Engine." Cite this article as :
International Journal 4.7 (2016).
[9]. Jin, Yi, Zhuying Lin, and Hongwei Lin. "The Anita Kumari, Dr. Jawahar Thakur, "Semantic Web
research of search engine based on semantic Search Engines : A Comparative Survey",
web." International Symposium on Intelligent International Journal of Scientific Research in
Information Technology Application Computer Science, Engineering and Information
Workshops. IEEE, 2008. Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
[10]. Esmaili, Kyumars Sheykh, and Hassan 5 Issue 1, pp. 107-115, January-February 2019.
Abolhassani. "A categorization scheme for Available at doi :
semantic web search engines." Computer https://doi.org/10.32628/CSEIT195115
Systems and Applications, 2006. IEEE Journal URL : http://ijsrcseit.com/CSEIT195115
International Conference on.. IEEE, 2006.
[11]. Jain, Ranjna, Neelam Duhan, and A. K. Sharma.
"Comparative study on semantic search
engines." International Journal of Computer
Applications, ISSN (2015): 0975-8887.
[12]. Chaurasia, Jyoti, and Jagdish Raikwal.
"Enhanced Semantic Web Retrieval Technique:
Domain Ontology." International Journal of
Computer Applications 119.16 (2015).
[13]. Malve, Ankita, and P. M. Chawan. "A
Comparative Study of Keyword and Semantic
based Search Engine." (2015): 11156-11161.
[14]. Madhu, G., Dr A. Govardhan, and Dr TV
Rajinikanth. "Intelligent semantic web search
engines: a brief survey." arXiv preprint
arXiv:1102.0831 (2011).
2Assistant Professor, Gyan Ganga College of Technology Jabalpur, Madhya Pradesh, India
ABSTRACT
Conventional designs use multiple image or single image to deal with haze removal. The presented paper uses
median filer with modified co-efficient (16 adjacent pixel median) and estimate the transmission map and
remove haze from a single input image. The median filter prior(co-efficient) is developed based on the idea that
the outdoor visibility of images taken under hazy weather conditions seriously reduced when the distance
increases. The thickness of the haze can be estimated effectively and a haze-free image can be recovered by
adopting the median filter prior and the new haze imaging model. Our method is stable to image local regions
containing objects in different depths. Our experiments showed that the proposed method achieved better
results than several state-of-the-art methods, and it can be implemented very quickly. Our method due to its
fast speed and the good visual effect is suitable for real-time applications. This work confirms that estimating
the transmission map using the distance information instead the color information is a crucial point in image
enhancement and especially single image haze removal.
Keywords : AF: Adaptive filter, AHE: Adaptive Histogram Equalization, LOE: Lightness Order Error
CSEIT195121 | Received : 10 Jan 2019 | Accepted : 23 Jan 2019 | January-February -2019 [ 5 (1) : 116-122 ]
116
Sunita Shukla, Prof. Silky Pareyani Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 116-122
comes to the image dehazing problem, a dehazing Then the haze-free image could be estimated:
model called Atmospheric Scattering Model is widely ( )
( )
used in ( ( ) )
I (x) =J (x)t(x) + A(1-t(x))
where is usually a small constant (0.001) in order to
where I(x) represents the hazy image, and J(x) avoid division by zero.
denotes the origin haze-free image(also called scene
radiance). A is the airlight which is the global light in Proposed an algorithm which combines the merits of
the atmosphere while t(x) denotes scene transmission transform color space algorithm and wavelet
function (0<t(x)<1). t(x) usually correlates with the transform algorithm.
scene depth. When the observed object is further
away from the camera, it’s more affected by the haze. First, the RGB image is converted to the HSI color
As a result, t(x) is closer to zero when the object space, Then histogram equalization is applied to
depth in the scene is greater. In the dehazing process, intensity component I to enhance the contrast of
the goal is to estimate the A (airlight) and construct image and the segmentation
the most optimal transmission function t(x).
Input Median R
Original Filter G
Image
B
Histogram Equalization
DWT
HH HL LH LL
Retinex
Algorithm
IDWT
Dehazed
Image
Exponential enhancement algorithm is applied to Let input image is x which is a RGB image
saturation component S, and then the intensity First Histogram Equalization need to be done
component I is divided into high and frequency sub-
( )
bands with wavelet transform and then Retinex
algorithm is applied to the low-frequency sub-band
( ) ( )
to reduce the effect of haze and adjust image ( )
√( ) ( )( )
luminance, a fuzzy enhancement algorithm is applied
to high-frequency sub-band to achieve the
enhancement and de-noising for the image details. (
( )
Finally, utilize the inverse wavelet transform to Let ‘img’ is the HSI image and its intensity block is of
reconstruct the I component and then the 3x3 is as below, and the intensity need to enhance
reconstructed component I will be synthesized with with K coefficient
H and S components to get a clear RGB image, and
the proposed algorithm is represented by following
flowchart [ ]
Pixel intensity A B C D e
Pixel value f1 f2 f3 f4 f5
Cumulative F1/9
probability
CP*k K*F1/9
{ } { } { } { }
Floor Na=
rounding floor(K*F1/9) [{ } ] [{ } ]
[{ } ] [{ } ]
[ ] ( ) ∑ ( ) ( )
( ) ∑ ( ) ( )
is the intensity frame of HSI image of MxN DWT
applied on ‘I’
Table 1 below shows the symlet type 4 HPF and LPF ( )
filter coefficients. Proposed work use ‘sym4’ type ( )
wavelet for decomposition of Cover image, figure 1
below shows HPF and LPF decomposition using
DWT.
Retinex let (x,y) are the pixels coordinates of ‘p’ in accelerate the processing speed, a fast single image
space domain then W is the reflection component dehazing method has to be developed in near future
and Z illumination component then which will be based on the atmospheric scattering
model and gray projection. our future method will
( ) ( ) ( ) have transmission map is estimated roughly using
minimum filtering which is based on dark channel
( ) ∑ ∑ ( ) ( )
prior and refined with fast average filtering. The gray
( ) projection method is adopted to obtain the
( )
atmospheric light. The subsection mechanism is
designed to avoid the high light of sky region in
Where c is Gaussian scale and is a constant that
recovered image, and Weber-Fechner Law is
makes F(x, y) equal to 1.
employed for color compensation in restored image. a
( ) ( )* ( ) ( )+
optimized approach is planned to be develop in near
( ) ( ( ))
future, in which the transmission map is roughly
( ( )) ( ( )
obtained with DCP and processed with a fast average
( ))
( ) ( ) filtering to improve the running speed. By gray
projection, the atmospheric light is obtained. And
Let (u,v) are the pixels coordinates of ‘q’ in space after the restoration of haze-free image, the intensity
domain compensation is employed to increase the visual
effect. The designed algorithm must achieve satisfied
( ) result with a computation cost.
( )
∑ { ( ) ( ) }
is the relative order difference
Table 2 LOE comparison for Building image changing when the homogeneity of RGB channels
have a big difference. The results obtains for the
Author/ Journal/Year LOE for Image of thesis work are better in terms of LOE and SNR then
Building available works.
Yuhei Kudo / IEEE 2018 1.932
Proposed 0.838019
V. REFERENCES
ABSTRACT
Deliberate or inadvertent escape of classified data is undoubtedly one among the premier extreme security
dangers that associations look inside the advanced period. The risk right now stretches out to the private lives:
an abundance of private information is out there to interpersonal organizations and great telephone providers
and is in a roundabout way exchanged to undependable outsider and fourth gathering applications. amid this
work, a bland data genealogy structure LIME (Data Lineage in the Malicious Environment), is utilized for data
stream over different elements that take two trademark, guideline parts (i.e., proprietor and buyer). It
characterizes the exact security ensures required by such a data heredity component toward recognizable proof
of a blameworthy substance, and decide the disentangling non-denial and trustworthiness suspicions. At that
point create and break down a totally special dependable data exchange convention between two substances
among noxious surroundings by expanding upon unmindful exchange, solid watermarking, and mark natives.
At long last, an exploratory investigation to exhibit the helpfulness of convention what's more, apply structure
to the important data run projections of learning outsourcing and the informal organizations. In general,
LIME(Data Lineage in the Malicious Environment),lineage structure for information exchange, to be a key
advance towards accomplishing responsibility by plan.
Keywords: Classified Data, LIME, Trademark, Malicious Environment, Micro Benchmarking, Pairing Based
Cryptography, GNU
CSEIT195116 | Received : 15 Jan 2019 | Accepted : 25 Jan 2019 | January-February -2019 [ 5 (1) : 123-130 ]
123
Amith Manda, Dr. R. P. Ramkumar. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 123-130
extraction much easy as the impostor can now easily outcome .Amid this distribution the prerequisite for
transfer the data. general answerability instrument in learning
exchange is demonstrated which may specially go
We as a consumer find many apps on internet and we with confirmable measures and control the condemn
knowingly handle our data to the respective blameworthy. This philosophy of identification is
organizations but is our data really safe in the hands named as learning root. Endeavors are made by
of the organization, what if any employee of the numerous associations to utilize learning source
fellow organization decides to make a step that ruins inside the type of watermarking or including of false
the organizations name, what if any employee information or data in specially appointed way has
wantedly access your data and misuses it. The answer not been that flourishing.
to that problem is represented in the following work
which will determine the guilty entity with proof II. EXISTING SYSTEM
and held for explanation if any data extraction occurs.
There are few safety mechanisms such associate In the digital era, data outflow during intentional
secret writing of valuable data, however it's a exposures, or un-intentional damage by untruthful
proactive measure that cannot verify the info leak staff and harmful external entities, always provide
once it happens. Once the intruder decrypts the serious threats to organizations. it's not laborious to
information then there's no potential live which will believe that this is simply the edge of an iceberg, as in
prevent the info leak of the personal data and most cases information of knowledge outflow go
business data by any desired measures. Following are unreported thanks to concern of loss of client
few measures that we often see and there are a confidence or restraining penalties huge amount of
number of situations where the event is determined. digital data can be derived at nearly no price and
might be unfold through the net in terribly short
1. We should take facebook for instance wherever we time to boot, the risk of obtaining or getting caught
can see assortment of outsiders that approaches our for information outflow or the extraction is very low,
insight, if any outsider is experienced in learning spill as there square measure presently nearly no
it winds up impractical to call attention to or see that answerableness mechanisms. For these reasons, the
wherever extremely the data was misused as there matter of information loss has reached a replacement
square measure a few outsiders advertised. dimension these days.
2. Consultancies have all the valuable data of
representatives/applicants caning to seek out work 2.1 Disadvantages
which outsider contracts another outsider then all Even with access management mechanisms,
the three organizations will right now approach the wherever access to sensitive information is restricted,
individual information then it may turn out to be a malicious approved user will publish the valuable
horrendously difficult to undeniably relate one the information as soon as he receives it. Primitives like
three partnerships for learning spill, in each the coding provide protection solely as long because the
circumstances witnesses can either don't target the info of interest is encrypted, however once the
exact learning safety or the intruder may attentively recipient decrypts a message, nothing will stop him
reveal classified data which cannot be tied to any of from publication the decrypted content. Therefore it
the handlers. At times there comes experience the looks not possible to stop information outpouring
explanatory procedures however it's horribly proactively.
expensive and it also doesn't create a terribly sensible
2. View all the files details usage of the Cox calculation is utilized for vigorous
3. View the attacked files picture and set the negative factor, which decides the
4. View Download history quality of the watermark, to a estimation of 0.1.Now
3.3 Auditor execute the explore different avenues regarding
Auditor has capability to access, manage or monitor diverse parameters to examine the execution. The
the transferred knowledge or data beneath the sender and beneficiary piece of the convention will
entrustment of information of owner, auditor has be executed in a similar program, i.e., don't break
experience and capabilities that a standard user down system sending, yet just computational
doesn't have, for occasionally auditing the outsourced execution.
knowledge. This audit service is considerably
necessary for digital forensics and credibleness in 4.2 PBC (Pairing Based Cryptography)
Web and performs the subsequent operations
1.View image/file details Blending based cryptography is a generally youthful
2. View Attacked files territory of cryptography that rotates around a
3. Block or unblock an attacker certain capacity with exceptional properties.
4. View messages from a consumer
The PBC (Pairing-Based-Cryptography) library is a
3.4 Data Consumer free C library based on the GMP library that plays
The net user of an Organization encompasses a great out the numeric activities and fundamental matching
quantity of data to be stored in servers and have the based on cryptosystems.
permissions to access and manipulate and keep image
and its data. The PBC library is planned to be the foundation of
executions of matching based cryptosystems, in this
The consumer can search information and accessing manner speed and portability are key objectives. It
the image data if he's approved and performs the provides schedules by comparing it to the elliptic
subsequent operations bend era, elliptic bend number juggling and blending
1.View all the files calculation. Due to the GMP library, in spite of being
2. Download a file composed in C, pairings times are shabby. On a 1GHz
3. Send download request Pentium III:
4. Send message to the auditor
• Fastest matching is 11ms
IV. TECHNIQUES USED • Short matching is 31ms
4.1 Micro Benchmarking The API is sufficiently dynamic that the PBC library
The execution of the convention is done in as a will be used despite of the fact that the associated
proof-of-idea and to determine its result. For the researcher has exclusively a rudimentary
unaware exchange sub-convention is executed to the comprehension of pairings. There’s no must be
convention utilizing the PBC library, which itself constrained to get some answers concerning elliptic
makes utilization of the GMP library. For marks BLS bends or a significant measure of collection
plot is executed, likewise utilizing the PBC library. hypothesis. (The base necessity is a few information
For symmetric encryption a usage of AES from the of cyclic gatherings and properties of the blending.)
Crypto++ library is utilized. For watermarking a
The PBC library can likewise be utilized to construct concerning once every year. Since variant about six,
customary cryptosystems. GMP is appropriated beneath the twin licenses,
wildebeest LGPL v3 and wildebeest GPL v2. These
licenses make the library freed to utilize, share, and
enhance, and allow you to kick the bucket the
outcome. The wildebeest licenses offer flexibilities,
Fig 1. Two party one round key agreement protocol however conjointly set firm limitations on the use
with without non programs. GMP's primary target
3.3 The GNU Multiple Precision Arithmatic Library stages are Unix-type frameworks, reminiscent of
GMP is attentively designed to be fast for small GNU/Linux, Solaris, HP-UX, waterproof OS
operands as well as for large operands. The speed is X/Darwin, BSD, AIX, and so on. It is additionally
accumulated by use of adequate words as basic celebrated internationally to figure on Windows in
arithmatic type, by use of quick algorithms, with each 32-bit furthermore, 64-bit mode.
immensely advanced assembly code for the most
familiar inner loops for a lot of CPUs, by a general 3.4 BLS Scheme
insistence on speed. In cryptography, the Boneh– Lynn– Shacham (BLS)
signature topic allows a client to confirm that an
GMP could be a free library for subjective accuracy endorser is bona fide. The subject uses a straight
number juggling, in task on marked whole numbers, blending for confirmation, Associate in nursing
objective numbers, and gliding point numbers. marks square measure segments of an elliptic bend
there's no sensible cutoff to the accuracy aside from group. working in Associate in Nursing elliptic bend
those verifiable by the available memory inside the bunch gives some safeguard against list math assaults
machine GMP keeps running on. GMP highlights a (with the proviso that such assaults square measure
made arrangement of capacities, and furthermore the still achievable inside the objective bunch of the
capacities have a regular interface. The fundamental matching), allowing shorter marks than FDH marks
target applications for GMP are cryptography for an indistinguishable level of security. Marks made
applications and investigation, web security by the BLS signature subject square measure
applications, unadulterated science frameworks, normally talked as short marks, BLS short marks, or
process unadulterated arithmetic examination, and so just BLS marks. The mark subject is undeniably
forth. secure.
named the "Cox– Zucker machine" by Charles inside the archive, this can be not an inconsequential
Schwartz in 1984. assignment.
V. RESULTS
VII.REFERENCES
Fig 2. A message request from a non guilty consumer [1]. "Chronology of data breaches,"
http://www.pri"acyrights.org/data-breach.
VI. CONCLUSION AND FUTURE ENHANCEMENT [2]. "Data breach cost,"
http://www.symantec.com/about/news/release/
We are blessing LIME, a model for capable data article.jsp?prid=2011030801
exchange over different elements. We tend to plot [3]. "Pri"acy rights clearinghouse,"
teaming up parties, their interrelationships and give a http://www.pri"acyrights.org.
solid inner portrayal for a data exchange convention [4]. "Electronic Pri"acy Information Center (EPIC),"
utilizing a novel blend of negligent exchange, strong http://epic.org, 1994.
watermarking and computerized marks. We have a [5]. "Facebook in Pri"acy Breach,"
tendency to demonstrate its rightness and show that http://online.wsj.com/article/SB1000142405270
it's feasible by giving little seat checking comes about. 2304772804575558484075236968.html.
By introducing a general relevant structure, we have [6]. "Offshore outsourcing,"
a tendency to present answerableness as right on time http://www.computerworld.com/s/article/1099
as inside the style area of a data exchange foundation. 38/Offshore outsourcing cited in Florida data
Despite the fact that LIME doesn't effectively prevent leak.
data release, it presents responsive answerableness. [7]. A. Mascher-Kampfer, H. Stogner, and A. Uhl,
Along these lines, it'll deflect vindictive gatherings "Multiple re-watermarking scenarios," in
from unseaworthy individual reports and can Proceedings of the 13th International
energize legitimate (however reckless) gatherings to Conference on Systems, Signals, and Image
ABSTRACT
Classification is one of the most considerable supervised learning data mining technique used to classify
predefined data sets the classification is mainly used in healthcare sectors for making decisions, diagnosis
system and giving better treatment to the patients. In this work, the data set used is taken from one of
recognized lab of Kashmir. The entire research work is to be carried out with ANACONDA3-5.2.0 an open
source platform under Windows 10 environment. An experimental study is to be carried out using classification
techniques such as k nearest neighbors, Support vector machine, Decision tree and Naïve bayes. The Decision
Tree obtained highest accuracy of 98.89% over other classification techniques.
Keywords : Thyroid disease, K-Nearest Neighbor, Support Vector Machine, Decision Tree, Naïve Bayes.
hypothyroidism has weight gain, tiredness, weakness, neuro fuzzy method emplaced in ESTDD system for
feeling cold etc. One of the most common cause thyroid diseases diagnosis and achieved 95.33% of
occurred due to hyperthyroidism is graves’ disease [3]. accuracy. ESTDD is one of significant tool for
The underestimated thyroid disease causes thyroid endocrinologists or students studying endocrinology
storm and myxedema which may lead to death [12]. for testing their knowledge by comparing their
In this research work, a classification model is predictions with ESTDD[21].
trained using classification algorithms like K-nearest
neighbor (KNN),support vector machine (SVM), In year 2009, Temurtas performed diagnosis of
decision tree (DT) and Naïve bayes (NB) for the thyroid diseases with the help of artificial neural
diagnosis of thyroid diseases. The Decision Tree network with 3-fold and 10-fold cross-validation
outperformed over other techniques. approaches were used to estimate the performance of
the used neural networks. In this work highest
The rest of the paper is followed as: - Section 2 accuracy of 94.81% was achieved [12].
represents related work in diagnosis of thyroid
diseases. Section 3 contains dataset and methods. In year 2011, EsinDogantekin et al. worked on
Section 4 represents the results and discussion. Wavelet Support Vector Machine (WSVM) with
Section 5 contains conclusion and at last references Generalized Discriminant Analysis (GDA) methods
are mentioned. for diagnosis of thyroid diseases and achieved 91.86%
classification accuracy [22].
II. RELATED WORK
K.Saravana Kumar et al in 2014, proposed KNN and
By studying literature, it seems that several SVM classification methods for the diagnosis of
classification methods have been developed for thyroid disease. They showed that the prediction
thyroid diseases diagnosis. In year 2002, Ozyilmaz et accuracy of KNN and SVM are 96.34% and 94.43%
al in [14] showed that feed forward neural network respectively [1].
could be successfully used for diagnosis of thyroid
diseases. In this work, three architectures of MLP, In year 2017 MP Gopinath proposed SVM, FKNN
RBF and CSFNN were used and achieved accuracy and Decision tree for the diagnosis of thyroid diseases.
89.80%, 79.08% and 91.14% respectively. This work The SVM obtained highest classification accuracy of
shows CSFNN gives the best classification accuracy 96.30% over other techniques [23].
and takes less training times than all other algorithms.
III. DATASET AND METHODS
In 2007, Polat et al. studied on the artificial immune-
recognition system (AIRS) classification method for The dataset used in this investigate work is a clinical
diagnosis of thyroid diseases and achieved 81% dataset. The dataset was taken from one of the
classification accuracy. On the other hand AIRS with leading diagnostic lab in Kashmir. The dataset
Fuzzy weighted pre-processing was classified and contains the record of 807 patients of almost all age
showed the accuracy of 85.00% .This means AIRS groups. Out of 807 patients (224 Males and 583
with fuzzy outperformed than AIRS [15]. Females) 553 belongs to normal, 218 belongs to
hypothyroidism and 36 belongs to hyperthyroidism.
In year 2008, keles et al. proposed an expert system The dataset has 6 attributes as: age, gender, TSH, T3,
for thyroid disease diagnosis (ESTDD) and using T4 and added classification attribute for indication of
normal or hyperthyroidism or hypothyroidism. Table hyper plane is generally done, that has largest
1 shows the description of dataset. distance to the closest training data point of any class
(so-called functional margin), since in general the
greater the margin the smaller the generalization
Table 1. Attributes used in our dataset. error of the classifier [19].
System implementation
The thyroid dataset has three output categories. First
one is Normal, second one is hypothyroidism and
third one is hyperthyroidism. The thyroid dataset of
five input attributes Age, Gender, TSH, T3 and T4 is
Figure 2. Accuracy comparison of classifiers
supplied to the classifiers of KNN, SVM, Decision
Tree and Naïve bayes in PYTHON to classify the data.
Study Method Highest
The performance of each classifier is evaluated in
Accuracy
terms of accuracy as shown in figure 1.
Ozyılmaz and MLPNN with BP 91.14%
Yıldırım [14 ] (3×FC)
Data mining MLPNN with FBP
classification Performance
techniques measure (3×FC)
RBF
KNN (3×FC)
CSFNN
Thyroid Accuracy
dataset SVM (3×FC)
Polat et al. [15 ] AIRS 85.00%
Decision
Tree
(10×FC)
AIRS with Fuzzy
(10×FC)
Naïve
Bayes weighted
preprocessing
keles et al. [21] ESTDD 95.33%
F. Temurtas [12 ] MLNN with LM 94.81%
Figure 1. Thyroid disease prediction process (3×FC)
PNN (3×FC)
IV. RESULTS AND DISCUSSION LVQ (3×FC)
MLNN with LM
(10×FC) [1].K.Saravana Kumar, Dr. R. ManickaChezian,
PNN "Support Vector Machine and K- Nearest Neighbor
(10×FC) Based Analysis for the Prediction of Hypothyroid.
LVQ International Journal of Pharma and Bio
(10×FC) Sciences",volume - 2,Issue - 5,page no-(447-453),2014
EsinDogantekinet GDA-WSVM 91.86% .
al.[22] [2].http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3
MP SVM 96.30% 169866/(accessed dec 2015)
Gopinath.[23] FKNN [3].G. Zhang, L.V. Berardi, An investigation of neural
Decision Tree networks in thyroid function diagnosis, Health Care
Our study KNN 98.89% Manage. Sci. (1998)
(10×FC) [4].Xia C, Hsu W (2006) BORDER: efficient
computation of boundary points. In: IEEE, 2006
SVM
(10×FC) [5].Available from: http://en.wikipedia.org.Last
DT accessed on Dec24].
(10×FC) [6].Apte & S.M. Weiss, Data Mining with Decision
NB Trees and Decision Rules, T.J. Watson Research
(10×FC) Center,
http://www.research.ibm.com/dar/papers/pdf/fgcsapt
Table-2 shows the highest classification accuracy ewe issue_with_cover.pdf, (1997).
obtained by our method over other methods used for [7].Roychowdhury S (2014) DREAM: diabetic
the diagnosis of thyroid diseases. retinopathy analysis using machine learning. In:
IEEE, 2014
V. CONCLUSION [8].Chetty N, Vaisla KS, Patil N (2015) An improved
method for disease prediction using fuzzy approach.
The work has been done using classification data In: IEEE, 2015
mining techniques for the diagnosis of thyroid disease. [9].S. Sathiya Keerthi, Olivier Chapelle, Dennis
For this purpose, K nearest neighbor, Support vector DeCoste "Building Support Vector Machines with
machine, Decision tree and Naive Bayes classifiers Reduced Classifier Complexity" Journal of Machine
have been used. The Decision Tree classifier Learning Research, Vol: 7, PP 1493- 515, January -
outperformed over other classifiers. However, if we (2006).
merge it with any other classification technique such [10].Shen X, Lin Y (2004) Gene expression data
as neural network, then the result might be even classification using SVM-KNN classifier". In: IEEE,
better as compared to what we got with the current 2004
study. [11].www.anaconda.com.
[12].F. Temurtas, "A comparative study on thyroid
disease diagnosis using neural networks," Expert
Systems with Applications, vol. 36, 2009, pp. 944-
949.
VI. REFERENCES
[13].G. H. John and P. Langley, "Estimating International Journal of Pure and Applied
Continuous Dis-tributions in Bayesian Classifiers," Mathematics Volume 117 No. 7 2017, 53-63.
Proceedings of the 11th Conference on Uncertainty Cite this article as :
in Artificial Intelligence, San Francisco, 1995, pp.
338-345. Umar Sidiq, Dr. Syed Mutahar Aaqib, Dr. Rafi
[14].Ozyılmaz, L., Yıldırım, T. (2002). Diagnosis of Ahmad Khan, "Diagnosis of Various Thyroid
thyroid disease using artificial neural network Ailments using Data Mining Classification
methods. In Proceedings of ICONIP’02 9th Techniques", International Journal of Scientific
international conference on neural information Research in Computer Science, Engineering and
processing (pp. 2033-2036). Singapore: Orchid Information Technology (IJSRCSEIT), ISSN : 2456-
Country Club. 3307, Volume 5 Issue 1, pp. 131-136, January-
[15].Polat, K., Sahan, S., & Gunes, S. (2007). A novel February 2019.
hybrid method based on artificial immune Available at doi :
recognition system (AIRS) with fuzzy weighted https://doi.org/10.32628/CSEIT195119
preprocessing for thyroid disease diagnosis. Expert Journal URL :http://ijsrcseit.com/CSEIT195119
Systems with Applications, 32, 1141-1147.
[16].Sehgal MSB, Gondal I (2014) K-ranked
covariance based missing values estimation for
microarray data classification. In: IEEE, 2004
[17].Bonner A (2004) Comparison of discrimination
methods for peptide classification in tandem mass
spectrometry. In: IEEE, 2004
[18].HalifeKodaz et al. Medical application of
information gain based artificial immune recognition
system (AIRS): Diagnosis of thyroid disease.
[19].Joel Jacob et al. "Diagnosis of Liver Disease Using
Machine Learning Techniques". (IRJET) Volume: 05
Issue: 04 | Apr-2018
[20].K. Pavya et al. "Diagnosis of Thyroid Disease
Using Data Mining Techniques: A Study". (IRJET)
Volume: 03 Issue: 11 | Nov -2016.
[21].Keles, A., and Keles, A., ESTDD: Expert system
for thyroid diseases diagnosis. Expert Syst. Appl.
34(1):242-246, 2008.
[22]. Dogantekin, E., Dogantekin, A., and Avci, D.,
An expert system based on generalized discriminant
analysis and wavelet support vector machine for
diagnosis of thyroid diseases. Expert Syst. Appl.
38(1):146-150, 2011.
[23].M.P.Gopinath "Comparative Study on
Classification Algorithm for Thyroid Data Set".
The extensive of diseases related with Indoor Air Quality (IAQ) usually referred to as Sick Building Syndrome
(SBS) and Building Related Illness (BRI) has generated concern for technological approach in monitoring and
analysis of the quality of air in confine environments. In line with “prevention is better than cure” mantra, such
monitoring system is necessary for timely awareness of quality of surrounding air so as to take preventive
action not only at the individual level, but also aid prompt diagnosis by the medical personnel. Motivated by
the need for an affordable, simple and efficient indoor air quality device for general use at homes, offices and
other related confine environment, a sensor node with capability for wireless sensor networking is presented in
this study. The proposed device incorporates: sensors to measure major air quality indices: odor, carbon
monoxide, dust, humidity, and temperature, LED indicators for prompt visual status alert, memory device (SD
card) for off-line data access, and wireless capability for remote data transfer in applications such as web and
mobile-apps interfacing. The performance of the system is evaluated in a laboratory scale indoor environment.
The results show effectiveness of the system in capturing the air-quality status and providing timely
information for proactive action.
Keywords : Indoor Air Quality, Sick Building Syndrome, Building Related Illness, wireless capability, mobile-
apps.
I. INTRODUCTION has called for a pro-active solution proportionate to
the advances in the related technological. SBS and
The alarming rate of indoor-air quality related BRI are related and can be defined as sickness and
diseases commonly referred to as Sick Building discomfort experience by occupants due to poor
Syndrome (SBS) and Building Related Illness (BRI) indoor air environment with no specific causes
CSEIT195120 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 137-142]
137
N. Vijayalakshmi, J. G. Rohini Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 137-142
identify but related to amount of time spent inside. was explored and analyzed in comparison to
Symptoms such as headaches, sore throats, itchy eyes, acceptable standard set by ASHRAE [7]. In [8], the
breathing difficulties, lung cancer, asbestosis, indoor air parameters variation with respect to
mesothelioma, asthma, skin irritation and allergic microclimate condition and impact of outdoor
reactions are among the reported health effect of environment was investigated and reported with
poor air environment according to medical report reference to large museum exhibition halls for a
and study [1-6]. According to the World Health period of one year. The study showed the differences
Organization (WHO), 4.3 million people a year die in indoor microclimate in air-conditioned rooms and
from the exposure to household air pollution [4]. The non-air conditioned ones in the same building. In
problems are been compounded with the increasing addition, external conditions were reported to have a
amount of time people spend in a confine significant impact on the indoor air parameters. On
environment - either in home or in offices or in car, the other hand, at the system level, the pace of
or malls or in school-, and the increasing potential of research work on monitoring systems for IAQ is
air pollution due to cooking using solid fuels, driven by the dynamic rate of sensors and computing
smoking in and around buildings, poor ventilation, technologies advancement. Several studies have been
dust, humidity and temperature. For instance, it has reported in this direction [9-15]. A wireless
been reported that people spend a substantial monitoring system incorporating temperature,
proportion of their time in buildings [5]. In the arid humidity, CO and CO2 sensors for HVAC control
region (MENA) most people spend 90% of their time and IAQ monitoring is presented in [13]. An
indoors [1,2]. In response to these problems, research ATMega88 with a transceiver was adopted in the
studies have been directed to (i) qualitative study for the implementation, sample performance
monitoring and analysis of indoor air quality, results was presented to justify the success of the
including guidelines on IAQ [4] and (ii) development study. Sneha and Sandeep [10] presented an
of sensor node (monitoring system) for quantitative embedded system model for air quality monitoring
monitoring of the IAQ for several applications. For incorporating a LCD display unit to help an allergic
instance, assessment of indoor air quality pollutants patient aware of its environment. No real-life data
in the offices and their potential negative effect in results presented in the study. Hybrid sensor system
Dubai were carried out in [1] using both quantitative with both stationary and mobile sensors is reported
and qualitative techniques. In that study, the in [15] for accurate tracking of air pollutant.
concentration levels of specific indoor air quality Meanwhile, apart from the fact that no single system
indicators (e.g. TVOC, Ozone, Carbon Monoxide, exists that addresses all the pollutants nor
Carbon Dioxide, Relative Humidity and Temperature) incorporates all the performance requirements for a
given situation and environment, most of the IAQ designated as follows: Green: indicates clean, Yellow:
devices are either expensive, thereby hindering indicates moderate, and Red: indicates danger. This is
affordability for general use, or lack simplified data to provide easy and prompt status information for the
presentation for a common end users. Hence, the end users for timely proactive action
current study proposes a wireless sensor node for
IAQ monitoring with simplicity of indication Apart from the cost and power consumption
(situation alert), affordability, easy of modification which are aimed to be low cost and low power,
and maintenance, and yet provides opportunity of respectively, the choice of the sensors stated above is
being fixed located at a place or used as a mobile based on characteristic of the local environment, and
hand-held device (i.e. mobility option). In addition, it common potential pollutant-generator indoor
is aimed to serve as a base for further research on the activities such as
ongoing IAQ data monitoring and analysis, and IAQ • Tobacco smoking,
wireless sensor networks applications suitable for the • Traditional charcoal-based air freshener
emerging Internet of Things (IoT). • Dust (penetration from outside dusty air, poorly
maintained HVAC systems, etc.)
The subsequent sections provide the essential of IAQ • Cooking gas leakage
followed by the design and development of the • Sewage pipe leakage
proposed system, result, discussion and further study. • Ambient thermal influence
The conclusion of the study is presented at the last
section.
II. METHODOLOGY
power supply. The three LEDs status alert are their concentration exceeded the Occupational
Exposure Level (OEL) specified by appropriate Thermal anemometer, Direct-reading dust sampler,
regulations/standards. The types and composition of and microbial sampling [16]. It is noted that, (i) there
the indoor air pollutants depends on ambient outside is no single instrument to sample all the pollutants
air condition and nature of the confined environment which necessitates the need for localized device for a
(be it residential, office, markets/malls, sport center given situation, (ii) some of the testing and sampling
etc.). methods are only interpretable by IAQ professionals,
thereby limits their direct adoption and benefits to
Essentially for a given indoor environment, the IAQ the occupants (general users) and (iii) affordability in
issues involved identification of potential pollutants, terms of cost still remains an obstacle towards
their sources, health concerns, standards/regulations widespread adoption of IAQ monitoring system for
in respect of their OEL, monitoring and preventive preventive maintenance and safety. These issues have
measures to minimize human exposure, and initiating led to dynamic research and development of different
corrective action when necessary. Among the major types of air testing/sampling instruments to meet the
and common parameters in IAQ are Carbon demands for timely and informative monitoring of
monoxide, Carbon dioxide, Dust/particulates, Volatile the ambient indoor air condition in line with the
Organic Compounds (VOCs), Formaldehyde, state-of-the-art technology.
Methane, and temperature/Humidity for thermal
comfort. Others are Benzene, Nitrogen dioxide, III. RESULTS, DISCUSSION AND FUTURE STUDY
Sulfur dioxide, Radon etc. [16]. Table 1 gives the
summary of the sources, effects and standards of the The results of both web data transmission and real-
common IAQ parameters while the detailed can be time data monitoring show the successful
obtained in the literatures [4, 16]. implementation of the proposed IAQ-WSN. The web
data interface of Fig. 1 provides the detail
With respect to the management of IAQ issues (such information on the status of the air parameters and
as monitoring, prevention and control) the core working condition of the device. This is aimed at
requirement is air quality sampling and testing with providing remote data access for occupants and
the aid of appropriate instruments. Specific health officers for timely preventive action. The
procedures have been proposed and reported in the results of Fig. 5 show the effectiveness of the node in
sampling and measurements of different types of air monitoring the pollutant in real-time. All the
contaminants. The common types of instrument are: pollutants data were captured almost at the same time,
direct-reading Colorimetric Tubes, Direct-reading (around 6000seconds) based on the simultaneous
Portable monitors, Air samplers, Smoke tube, injection of the materials in the enclosure. This
provides a qualitative performance of the design and [2]. Jennifer Bell, “Sick buildings are leading to
development of the proposed IAQ-WSN. Future sick UAE office workers, doctors say”, The
study is expected to conduct quantitative analysis and Nation, UAE, Spetember 12, 2016.
benchmark the system performance with standard / http://www.thenational.ae/uae/health/sick-
industrial IAQ sensors. In addition, network of the buildings-are-leading-to-sickuae- office-
nodes is to be developed with appropriate routing to workers-doctors-say. accessed date: 1/10/2017.
cover large indoor environment or complete building. [3]. Khawaja Mohammad Hassan, Sick Building
Syndrome: The killer within, The Khaleej
IV. CONCLUSION times,
http://www.khaleejtimes.com/article/2011011
The design and development of a wireless sensor 5/ARTICLE/3011 59995/1002, Filed on
node for Indoor Air Quality monitoring system was January 16, 2011, accessed date: 10/12/2017.
presented in this project. The evaluation results of [4]. World Health Organization (WHO),
both web data transmission and real-time data “Guidelines for Indoor Air Quality: Selected
monitoring show the successful implementation of Pollutants”.WHO,2010.http://www.euro.who.
the proposed IAQ-WSN. Future study is expected to int/__data/assets/pdf_file/0009/128169/e94535.
conduct quantitative analysis and benchmark the pdf.
system performance with standard / industrial IAQ [5]. HS. Brightman and N. Moss. Sick building
sensors. In addition, network of the nodes is to be syndrome studies and the compilation of
developed with appropriate routing to cover large normative and comparative values. Indoor Air
indoor environment or complete building. Quality Handbook. Editors: J. D. Spengler, J. F.
McCarthy, and J. M. Samet, New York:
V. REFERENCES McGraw-Hill, 2001.
[6]. US Environmental Protection Agency
[1]. Hanan Ahmad Ibrahim, Indoor Air Quality in (USEPA). Indoor air quality tools for schools
UAE Office Buildings and Their Effects on Communications guide. http://www.epa.gov,
occupants’ Health, Comfort, Productivity and accessed date: 10/12/2017
Performance”, Master thesis, Faculty of [7]. ASHRAE: The American Society of Heating,
Engineering and IT MSc Sustainable Design of Refrigerating and Air- Conditioning
the Built Environment, The British University Engineers. https://www.ashrae.org. accessed
in Dubai, May 2015. date: 10/12/2017.
Pradesh, India
2Associate Professor, Department of ECE, Siddartha Educational Academy Group of Institutions, Gollapalli,
Andhra Pradesh, India
ABSTRACT
Home automation popular in day to day to number of advantages. In previous and current we monitor the
home appliances remotely by emails or text messages. This paper gives an innovative idea of controlling the
home appliance using with Google voice assistance by using the Raspberry Pi. As a server system Internet of
Things (IoT) links smart objects to the internet. It can enable exchange of data in a more secure way. Rapid
adaptations of Smart City and Internet of Things technologies are assisting in urban planning to ensure
sustainable cities and lifestyles. Life is made simpler and more productive through IOT. As the Wi-Fi hotspots
are increasingly becoming common in the recent times, the existing infrastructure can be used to develop a
cost-effective solution to enable the existing appliances with IOT Raspberry Pi is single board computer (SBC)
is proposed in this paper to Raspberry pi known as a Single Board Computer (SBC) is proposed in this paper to
reach these goals. The voice commands will give to Raspberry PI using Google voice assistance. These
commands will control the any appliances or devices at home. This will provide a better communication in
automated home as compared to normal homes.
Keywords: IoT, WI-FI, Raspberry Pi.
CSEIT195132 | Received : 15 Jan 2019 | Accepted : 30 Jan 2019 | January-February -2019 [ 5 (1) : 143-146 ]
143
Undra Narasimha Babu, S. N. Sreekanth et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 143-146
a more extensive perspective. This will bolster the used as a piece of equipment wanders, and for an
interconnectivity of countless homes for better asset extensive part of the things that your work zone PC
usage in more extensive zone. does, like spreadsheets, word-getting ready and
diversions. It likewise plays superior quality video.
II. EXISTING SYSTEM We need to see it being utilized by kids everywhere
throughout the world to figure out how PCs
In the existing system, home appliances are function, how to control the electronic world around
controlled through Bluetooth, Zigbee and other them, and how to program.
devices. But they are limited to certain area. To
overcome this problem, we are moving to the
proposed system.
BLOCK DIAGRAM
SOFTWARE COMPONENTS
a) Raspbian OS
WORKING PRINCIPLE
APPLICATIONS
➢ Used in homes,
➢ offices,
➢ industrial areas etc.,
ADVANTAGES
.
➢ Smart and secure.
Figure 6 : Relay ➢ Controlling home appliances from anywhere
in the world.
VII.REFERENCES
ABSTRACT
Sentiment analysis is focused on the extraction of emotions and opinions of the people towards a particular
topic from a structured, semi-structured or unstructured textual data. In this paper we focus our task of
sentiment analysis on The Movie DB (TMDB) database which is an online database and contains information of
movies, television shows and video games including cast, crew and reviews. We examine the sentiment
expression to classify the polarity of the movie review on a scale of 1(highly disliked) to 5(highly liked) and
perform feature extraction and ranking and use these features to train our multilabel classifier to classify the
movie review into its correct label.We will collect the reviews for various movies and perform classification on
them. The classification for the reviews are done based on score obtained for the text. We are using two
approaches to generate scores for the reviews. These approaches are Microsoft cognitive services and Google
cloud natural language API.Finally we are able to generate the scores and can classify them based on movie
reviews.
Keywords : Sentiment Analysis, TMDB database, Microsoft cognitive services, Google cloud natural language
API, classification
I. INTRODUCTION websites are not formal reviews but are rather very
informal and are unstructured form of grammar.
Now a days Internet has become a huge Cyber Opinions expressed in movie reviews give a very true
Database which hosts gigantic amount of data which reflection of the emotion that is being conveyed. The
is created and consumed by the users. The database presence of such a great use of sentiment words to
has been growing at an exponential rate giving rise to express the review inspired us to derive an approach
a new industry filled with it, in which users express to classify the polarity of the movie using these
their opinions across channels such as Rotten sentiment words. Sentiment Analysis is the process of
Tomatoes, Facebook, Twitter, and Foursquare. computationally identifying and categorizing
Opinions which are being expressed in the form of opinions expressed in a piece of text, especially in
reviews provide an opportunity for new explorations order to determine whether the writer's attitude
to find collective likes and dislikes of cyber towards a particular topic, product, etc. is positive,
community. One such domain of reviews is the negative, or neutral. Sentiment Analysis is a
domain of movie reviews which affects everyone technology that will be very important in the next
from writers, users, film critics to the production few years. With opinion mining, we can distinguish
company. The movie reviews being posted on the poor content from high quality content. With
CSEIT195130 | Received : 15 Jan 2019 | Accepted : 30 Jan 2019 | January-February -2019 [ 5 (1) : 147-150 ]
147
S Jaswanth Sai Chowdary et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 147-150
prediction of the polarity of the document. We Cite this article as : S Jaswanth Sai Chowdary, Sk
would also like to extend this technique on other Waseem Farooq, Sk Abubakar Siddique, S Dinesh,
domains of opinion mining like television shows, "Sentiment Analysis of movie reviews using
political discussion forums etc. Microsoft Text Analytics and Google Cloud Natural
Language API", International Journal of Scientific
V. REFERENCES Research in Computer Science, Engineering and
Information Technology (IJSRCSEIT), ISSN : 2456-
[1] Sahu, T. P., & Ahuja, S. (2016). Sentiment 3307, Volume 5 Issue 1, pp. 147-150, January-
analysis of movie reviews: A study on feature February 2019. Available at doi :
selection & classification algorithms. 2016 https://doi.org/10.32628/CSEIT195130
International Conference on Microelectronics, Journal URL : http://ijsrcseit.com/CSEIT195130
Computing and Communications
(MicroCom).DOI:10.1109/microcom.2016.752258
3
[2] Magdum, S. S., &Megha, J. V. (2017). Mining
online reviews and tweets for predicting sales
performance and success of movies. 2017
International Conference on Intelligent
Computing and Control
Systems(ICICCS).DOI:10.1109/iccons.2017.82507
38
[3] https://developers.themoviedb.org/3/movies/get-
movie-reviews
[4] https://azure.microsoft.com/en-
in/services/cognitive-services/text-analytics/
[5] https://cloud.google.com/natural-language/
[6] Topal, K., & Ozsoyoglu, G. (2016). Movie review
analysis: Emotion analysis of IMDb movie
reviews. 2016 IEEE/ACM International
Conference on Advances in Social Networks
Analysis and Mining
(ASONAM).DOI:10.1109/asonam.2016.7752387
ABSTRACT
Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed,
public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block
is linked to its previous blocks. Every block has the cryptographic hash code, previous block hash, and its data.
The transactions in BC are the basic units that are used to transfer data between IoT nodes. The IoT nodes are
different kind of physical but smart devices with embedded sensors, actuators, programs and able to communicate
with other IoT nodes. The role of BC in IoT is to provide a procedure to process secured records of data through
IoT nodes. BC is a secured technology that can be used publicly and openly. IoT requires this kind of technology
to allow secure communication among IoT nodes in heterogeneous environment. The transactions in BC could
be traced and explored through anyone who are authenticated to communicate within the IoT. The BC in IoT
may help to improve the communication security. In this paper, I explored this approach, its opportunities and
challenges.
Keywords : Blockchain, Internet of Things (IoT), Cryptography, Security, Communication.
I. INTRODUCTION other and every device has its previous device address.
The blockchain and IoT together work in the
The IoT is growing exponentially year by year with its framework of IoT and Cloud integration. In the future,
aim in 5G technologies, like Smart Homes and Cities, the BC would revolutionize the IoT communication
e-Health, distributed intelligence etc. but it has [1]. The goals of BC and IoT integration could be
challenges in security and privacy. The IoT devices are summarized as follows.
connected in a decentralized approach. So, it is very
complex to use the standard existing security
techniques in the communication among IoT nodes.
The BC is a technology the provide the security in
transactions among the IoT devices. It provides a
decentralize, distribute and publicly available shared
ledger to store the data of the blocks that are processed
and verified in an IoT network. The data stored in the
public ledger is managed automatically by using the
Peer-to-peer topology. The BC is a technology where
transactions fired in the form of a block in the BC
among IoT nodes. The blocks are linked with each
Figure 1 : Blockchains and IoT
CSEIT195137 | Received : 05 Jan 2019 | Accepted : 18 Jan 2019 | January-February -2019 [ 5 (1) : 151-157 ]
151
Tanweer Alam Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 151-157
i) Decentralized framework: This approach is similar in exchanging a document with privacy without storing
IoT and BC. It is removed the centralized system and any information on the time-stamping service. The
provide the facility of a decentralized system. It idea of blockchains comes from [3] but the first
improves the failure probability and performance of blockchains were presented by Satoshi Nakamoto in
the overall system. 2008. He presented a paper where the blocks were
ii) Security: In the BC, the transactions among nodes added in a chain and form a blockchain [4]. In the
are secured. It is a very novel approach for secure article [5], the authors presented the “IoTChain” for
communication. BC allows IoT devices to authentication of information exchanged between two
communicate with each other in a secure way. nodes in an IoT network. They have presented an
iii) Identification: In IoT, all the connected devices are algorithm to exchange the information in IoT and
uniquely identified with a unique ID. Every block in blockchains (fig 2) [5]. In this paper, authors are
BC is also uniquely identified. So, BC is a trusted focused on the authorization part of the security in the
technology that provides uniquely identified data IoTChain framework.
stored in public ledger.
iv) Reliability: IoT nodes in BC have the capabilities to
authenticate the information passed in the network.
The data is reliable because it is verified by the miners
before entering in BC. Only verified blocks can enter
in the BC.
v) Autonomous: In BC, all IoT nodes are free to
communicate with any node in the network without
the centralized system.
vi) Scalability: In BC, the IoT devices will Figure 2 : IoT Chain framework
communicate in high-available, a distributed
intelligence network that connects with destination In the article [6], the authors explored the cloud and
device in a real-time and exchange information. MANET framework to connect the smart devices in
the internet of things and provide communication
The rest of the paper is summarized as follows: section security. In the article [7], authors represent a very
1 represents the introduction of the paper, section 2 nice framework called internet-cloud framework, it is
represents the literature survey, section 3 introduces a good idea to provide secure communication to the
the role of BC in IoT, section 4 represents the IoT devices. In the article [8], the authors provide a
opportunities of the integrated approach, section 5 middleware framework in the cloud-MANET
represents the challenges and section 6 represents the architecture for accessing data among the IoT devices.
conclusion. Article [9,10] represents the reliability in the
communication among IoT nodes. The articles
II. LITERATURE SURVEY [11,12,13,14,15] are providing the mobility models for
communication in 5G networks. In the article [16], the
The security and privacy in the communication among fuzzy logic-based mobility framework is explained for
IoT devices paid too much attention in the year of communication security. In the article [17], a nice
2017 and 2018. Several papers are published during the survey on blockchains and IoT done by the researchers.
year 2017 and 2018. In the year of 1990, Stuart Haber They present the idea of the security in the BC-IoT to
and W. Scott Stornetta were written an article [3] on develop the IoT apps with the power of BCs.
III. THE ROLE OF BC IN IoT publicly accessed, privacy is low to high and the
transferable identities while in a centralized database,
The IoT enables the connected physical things to the properties are centralized trust model, low in
exchange their information in the heterogeneous security, low publicly accessed, privacy is high and
network [18]. The IoT could be divided into the non-transferable identities. From the above properties,
following sections. the blockchain is more advanced than the centralized
1. Physical Things: The IoT provide the unique id for storage.
each connected thing in the network. The physical
things are able to exchange data with other IoT nodes.
2. Gateways: The gateways are the devices work
among physical things and the cloud to ensure that the
connection is established and security provided to the
network.
3. Networking: it is used to control the flow of data and
establish the shortest route among the IoT nodes.
4. Cloud: It is used to store and compute the data.
The BC is a chain of verified and cryptographic blocks (a)
of transactions held by the device connected in a
network. The blocks data are stored in the digital
ledger that is publicly shared and distributed. The BC
provides secure communication in IoT network. The
blockchain can be a private, public or consortium with
different properties. The following table represents
the differentiation among all kind of blockchains.
Decentralized
Determining
Efficiency
Reading
a. IOTA: The IOTA is the new platform for the devices can communicate in the network and every
blockchain and IoT called Next generation block of the transaction will first verify by the miners
blockchains. This platform facilitates the high data then they can enter in the BC.
integrity, high performance of transactions and high 2. Reduce the Cost: This approach will reduce the cost
validity of blocks with using fewer resources. It because it communicates directly without the third
resolves the limitations of blockchains [19]. party. It eliminates all the third-party nodes between
b. IOTIFY: It provides web-based internet of things the sender and the receiver. It provides direct
solution to minimize the limitations of blockchains communication.
technology in the form of custom apps [20].
c. iExec: It is an open source blockchain based tool. It
facilitates your apps the decentralized cloud Trust
advantages [21].
d. Xage: It is the secure blockchain platform for IoT to Risk Management Cost Reduction
The IoT and blockchains are increasing the business Financial Services Time Reduction
VII. ACKNOWLEDGMENT
Challenges
in BC-IoT This research is supported by Deanship of Scientific
Interoperability Lack of Skills
Research, Islamic University of Madinah, Kingdom of
Saudi Arabia. The grant number is 10/40.
Discovery and
Privacy
Integration VIII. REFERENCES
Figure 5 : Challenges in BC-IoT [1]. Reyna, Ana, et al. "On blockchain and its
integration with IoT. Challenges and
4. Discovery and Integration: Actually, BC is not opportunities." Future Generation Computer
designed for IoT. It is a very challenging task for the Systems (2018). DOI:
connected devices to discover another device in BC https://doi.org/10.1016/j.future.2018.05.046
and IoT. So, IoT nodes can discover each other but [2]. Zheng, Zibin, et al. "Blockchain challenges and
they can be unable to discover and integrate the BC opportunities: A survey." International Journal
with another device. of Web and Grid Services 14.4 (2018): 352-375.
5. Privacy: The ledger is distributed publicly to every DOI:
connected node. They can see the ledger transactions. https://doi.org/10.1504/IJWGS.2018.095647
So, privacy is also a challenging task in the integrated [3]. Haber, Stuart, and W. Scott Stornetta. "How to
approach. time-stamp a digital document." Conference on
the Theory and Application of Cryptography. [12]. Alam, Tanweer, Parveen Kumar, and Prabhakar
Springer, Berlin, Heidelberg, 1990. Singh. "SEARCHING MOBILE NODES USING
[4]. Nakamoto, Satoshi. "Bitcoin: A peer-to-peer MODIFIED COLUMN MOBILITY MODEL.",
electronic cash system." (2008). International Journal of Computer Science and
[5]. Alphand, Olivier, et al. "IoTChain: A blockchain Mobile Computing, (2014).
security architecture for the Internet of Things." [13]. Alam, Tanweer, and B. K. Sharma. "A New
Wireless Communications and Networking Optimistic Mobility Model for Mobile Ad Hoc
Conference (WCNC), 2018 IEEE. IEEE, 2018. Networks." International Journal of Computer
[6]. Alam T, Benaida M. The Role of Cloud-MANET Applications 8.3 (2010): 1-4. DOI:
Framework in the Internet of Things (IoT). https://doi.org/10.5120/1196-1687
International Journal of Online Engineering [14]. Singh, Parbhakar, Parveen Kumar, and Tanweer
(iJOE). 2018;14(12):97-111. DOI: Alam. "Generating Different Mobility Scenarios
https://doi.org/10.3991/ijoe.v14i12.8338 in Ad Hoc Networks.", International Journal of
[7]. Alam T, Benaida M. CICS: Cloud–Internet Electronics Communication and Computer
Communication Security Framework for the Technology, 4(2), 2014
Internet of Smart Devices. International Journal [15]. Sharma, Abhilash, Tanweer Alam, and Dimpi
of Interactive Mobile Technologies (iJIM). 2018 Srivastava. "Ad Hoc Network Architecture
Nov 1;12(6):74-84. DOI: Based on Mobile Ipv6 Development." Advances
https://doi.org/10.3991/ijim.v12i6.6776 in Computer Vision and Information
[8]. Alam, Tanweer. "Middleware Implementation Technology (2008): 224.
in Cloud-MANET Mobility Model for Internet [16]. Alam, Tanweer. "Fuzzy control based mobility
of Smart Devices", International Journal of framework for evaluating mobility models in
Computer Science and Network Security, 17(5), MANET of smart devices." ARPN Journal of
2017. Pp. 86-94 Engineering and Applied Sciences 12, no. 15
[9]. Tanweer Alam, "A Reliable Communication (2017): 4526-4538.
Framework and Its Use in Internet of Things [17]. Conoscenti, Marco, Antonio Vetro, and Juan
(IoT)", International Journal of Scientific Carlos De Martin. "Blockchain for the Internet
Research in Computer Science, Engineering and of Things: A systematic literature review."
Information Technology (IJSRCSEIT), Volume Computer Systems and Applications (AICCSA),
3, Issue 5, pp.450-456, May-June.2018 URL: 2016 IEEE/ACS 13th International Conference
http://ijsrcseit.com/CSEIT1835111 of. IEEE, 2016.
[10]. Alam, Tanweer. (2018) "A reliable framework [18]. Gubbi, Jayavardhana, et al. "Internet of Things
for communication in internet of smart devices (IoT): A vision, architectural elements, and
using IEEE 802.15.4." ARPN Journal of future directions." Future generation computer
Engineering and Applied Sciences 13(10), 3378- systems 29.7 (2013): 1645-1660. DOI:
3387 https://doi.org/10.1016/j.future.2013.01.010
[11]. Alam, Tanweer, Arun Pratap Srivastava, [19]. https://www.iota.org
Sandeep Gupta, and Raj Gaurang Tiwari. [20]. https://iotify.org
"Scanning the Node Using Modified Column [21]. https://iex.ec/overview
Mobility Model." Computer Vision and [22]. https://xage.com
Information Technology: Advances and [23]. https://www.i-scoop.eu/blockchain-distributed-
Applications 455 (2010). ledger-technology/blockchain-iot
[24]. https://www.statista.com/statistics/647523/worl
dwide-bitcoin-blockchain-size
Organizations have been compelled to change the manner in which they lead business to react to the ongoing
changes occurring both at the worldwide, provincial and at the national dimension. The motivation behind this
examination was to explore through an overview the electronic billing and payment framework. The premise
of the issue in regards to electronic billing and payment framework that the exploration examine planned to
investigate was talked about dependent on two research destinations; to set up the advantages acknowledged
with the dispatch electronic billing and payment, and to survey difficulties in the execution of electronic billing
and payment.
Keywords : Electronic Billing, Payment System, E-Billing, Online Payment
CSEIT195138 | Received : 25 Jan 2019 | Accepted : 03 Feb 2019 | January-February -2019 [ 5 (1) : 158-162 ]
158
Alka D. Aswar et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 158-162
the KPLC organize prompting power outages and a portrayal of the information which is filtered and
drop in the nature of administration. deciphered for data. Scanner tag is littler, lighter and
more affordable. The standardized identification must
With the progression in innovation, there are be in the immediate viewable pathway to be perused
different new advances or frameworks that outcome by scanner tag scanner. Scanner tag have no
in the smart billing and stock administration of the perused/compose capacities thus they can't contain
obtained things to spare the time required for the data for example, item expiry date and so on. The
billing and furthermore stock or stock administration scanner tags can be effectively repeated and produced
[1] [2]. The bill is created naturally when the user those outcomes in less security. In the event that the
distinguishes item tag and the data put away with the scanner tag is tore, harmed there's no real way to
tag. The data can be the item name and the expense examine the item.
of the item. The stock administration should be
possible by creating and interfacing the product with
these innovations. At the point when the user
peruses data from the label, it shows the expense and
amount of the item which is being acquired by the
client. After checkout, the bought things are
deducted from the fundamental database server
which deals with the stock and amount. These new
advances are as a rule exceptionally valuable in
Fig (1). Barcode
today’s life by diminishing the heaps of endeavours
and human work. There are numerous such
The standardized tag based information gathering
advancements like Barcode, QR Code, RFID, OCR.
framework can be regularly included any of the
The innovations utilized in current billing
segments like Barcode scanner; scanner tag based
framework. In this investigation, we talk about the
portable PC, standardized tag printers, scanner tag
different existing system for smart or e-billing.
name, standardized tag information accumulation
programming and so on. The PC looks into the cost
II. Review of Literature
in an ace database (the cost of an item isn't in the
standardized tag!), subtracts it from the store stock,
A. Scanner Tag
and ascertains the change. The product additionally
Scanner tag is otherwise called the Auto ID
makes reports with respect to stock dimensions,
(Automatic Identification). It was designed in the
demonstrates what items are the most and least
mid-1970s. The scanner tag was made to help huge
famous, makes statistic provides details regarding
retail locations and markets process their
singular items and clients, and tracks substantially
merchandise. The standardized identification
more. The way to the entire framework is exact
innovation is very effective for the administration
revealing of the item bought. Clerks are innately
and data refreshing in the PCs [1]. Standardized tag is
questionable and moderate. Barcoding is not one or
one of the recognizable business models. It is utilized
the other. Standardized identification benefits in
for examining the things at grocery store for
information exactness, consistency and effectiveness.
checkouts [2]. The standardized tag peruser is utilized
Standardized identification is utilized in Retail
to distinguish the tag on things and recognizes the
Operations, Receiving and dispatching Operations,
item and related data. Scanner tag result in a visual
resource the executives, producing tasks, Office and At the point when QR code is checked it connects to
Customer Service Applications and Warehousing and plain content, picture, website pages and interactive
so forth. Standardized identifications are estimated by media, maps areas or anything that can be gotten to
the width of the thin bar and are recorded in mils, or over the web. QR code generator is required to make
1/1000 inch. A 15 Mil standardized identification, for a QR code in which the required data is entered. A
example, has a restricted bar that is 15/1000 inches viable QR code ought to be created utilizing 40-80
wide. Further, "calm zones," or clear spaces to one characters and least of 2cm wide. The more
side and right of standardized identification images, characters result in the debased picture. QR code
are incorporated to safeguard the scanner tag can be enables us to choose the activities we need the clients
perused. to take. The QR code is ISO standard, advertise
demonstrated and totally quantifiable. QR codes
B. QR Code enable the normal individual to decipher the QR
code by examining and perused by a camera-prepared
A QR code is Quick Response code. This code is a 2D Smartphone when you’ve downloaded a scanner
standardized identification bringing about higher application [3].
speed at disentangling substance. The Japanese
company Denso-Wave made the QR code for C. OCR (Optical Character Recognition)
following reason in 1994. QR Codes utilize a 2
dimensional network so as to store information. The OCR is an innovation that empowers you to change
more lines and sections the more information it holds. over various kinds of archives, for example, checked
It underpins the mistake rectification. The code can paper reports, PDF records or pictures caught by an
be examined utilizing cell phone camera or QR advanced camera into editable and accessible
peruser and QR code peruser programming. There information. Albeit Optical Character Recognition
are 4 diff dimension of mistake redress low mid-range (OCR) filtering innovation has expanded quickly
quality high. The most elevated amount of mistake throughout the years, there are constraints with
rectification can re-establish up to 30% of a respect to the source materials and character
degenerate document. designing. Content from a source with a text
dimension of under 12 will result in more mistakes.
OCR additionally requires a spell checking editing
and reformatting for the ideal format. There are
numerous components that will influence the OCR,
for example, shapes, little messages, hazy duplicates,
scientific recipes, shaded paper, and written by hand
massage.
D. RFID
separation without the viewable pathway. RFID they need to hang tight in the line for longer time.
bolster the immense measure of one of a kind ids that The thought which is proposed utilizing RFID
helps in making the one of a kind labels for innovation will conquer the issue and it gets the
everything. It permits contactless identification of the undertaking less demanding. The joined impacts of
items utilizing the radio recurrence. RFID label simple and adaptable usage, secure transmission of
arrangement is less compelled as it doesn't require record data, and diminished debate offer the
viewable pathway. It has most extreme and more accompanying advantages for all. It will spare time,
grounded read go. RFID bolsters the read/compose vitality and labor of Customer, Owner and provider.
memory capacity and it can hold substantial measure There are numerous advances which are right now
of information under a special identifier. The being utilized for billing frameworks in general stores.
unfriendly conditions, for example, dust, substance, The choice of the innovation relies on the execution,
physical harm don't influence on RFID without a proficiency and QoS of the innovation in regards to
doubt. This innovation has three sections: a filtering specific undertaking and condition.
reception apparatus, a handset with a decoder to
translate the information and a transponder (RFID IV.REFERENCES
tag) pre-set with data. RFID labels can be perused at a
quicker rate as they roughly can peruse 40 RFID [1] T. Sriram, K. Vishwanatha Rao, S. Biswas and
labels at same time. RFID contain abnormal amounts B. Ahmed "Applications of barcode technology
of security; information can be encoded, secret key in automated storage and retrieval systems",
ensured or set to incorporate an "execute" highlight Industrial Electronics, Control, and
to evacuate information for all time [4]. Instrumentation, 1996., Proceedings of the
1996 IEEE IECON 22nd International
The Tag or Transponder gets recognized by the Conference on, vol. 1, pp.641 -646
Reader or Interrogator when it goes inside the [2] Alistair Milne “The Rise and Success of the
receiving wire extend and the distinguished novel id Barcode: some lessons for Financial Services”
is sent to the Computer or server. feb 2013
[3] Andrew Kerry-Bedell IT‟s in Conservation
III.Comparative Analysis Consultants. Mobile: 07899 741939 email:
a.kb@live.co.uk
http://www.kbstconsulting.co.uk/QR/images/Q
R.pdf
[4] Mandeep Kaur, Manjeet Sandhu, Neeraj Mohan
and Parvinder S. Sandhu “RFID Technology
Principles, Advantages, Limitations & Its
Applications” International Journal of
Computer and Electrical Engineering, Vol.3,
No.1, February, 2011
[5] Abwao, V. (2012). Information Technology
The payment of bill by remaining in long line is a
Applications in Business Management within
monotonous factor when individuals need to buy
Kenyan Companies; A Survey of Selected
items from shops. In spite of the fact that individuals
Insurance Firms in Nairobi, Unpublished MBA
can pay immediately utilizing electronic cash office,
Thesis, University of Nairobi.
ABSTRACT
In optical switching networks, optical information (packets/bursts) that are forwarded from an optical switch to
another through the network could entering a queue of a certain length in each node and may be waiting inside
this node before it will be transmitted to the next node. Various queueing models have been widely applied as
the main tool in optical switching networks for modeling and performance evaluation analysis of the switching
nodes. In this paper, studying the performance analysis of an optical switching node is discussed at Finite and
Infinite queueing models to have the optimum queueing model for optical core node switch design. The
waiting delay time, the average expected number of optical packets and the loss probability of packets in the
optical switch are estimated at variable traffic loads and different wavelength channels.
Keywords : Queueing Models, Optical Switching Network, Finite Queue, Infinite Queue, Blocking Probability
CSEIT195128 | Received : 25 Jan 2019 | Accepted : 03 Feb 2019 | January-February -2019 [ 5 (1) : 163-170 ]
163
Waleed M. Gaballah Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 163-170
For this, our work first presents some specific capacity. In finite queue, the optical arrivals that
queueing models overview that can be used in optical attempt to enter the full-occupied system are denied
switching networks, at section 2. The infinite and entry or blocked.
finite queueing models’ numerical analysis is
obtained in section 3. Finally, conclude in section 4. Table 1 represents the main differences between
Finite and Infinite queueing models.
II. Queueing Models in Optical Switches
TABLE I
FINITE VS. INFINITE QUEUEING MODELS
At the optical switches, the arriving optical
information traffic request some specific amount of Infinite Queueing
Finite Queueing Model
resources such as; circuit, bandwidth, wavelength Model
channel, etc. to be served. The most common M/M/w/m M/M/w
queueing models assume that the optical information The arrival rate The arrival rate is not
traffic inter-arrival and service times follow the depends on the number affected by the number
exponential distribution or equivalently follow a of served and waiting of packets being served
Poisson distribution process with Markovian or packets in the system. and waiting.
memoryless properties [7]. A commonly used Limited buffer capacity. Unlimited buffer
shorthand notation, called Kendall’s notation [8], for capacity.
such queue models describes the arrival process, Faster and has lower Packets waiting long
service distribution, the number of servers and the average number of times in the buffer.
buffer size (waiting line). The complete notation waiting packets in the
expressed as (a/b/c/d) where, Arrival process/service system.
distribution/ number of servers/waiting line. There is a packet loss No packet loss
probability. probability.
In optical switching networks, the commonly used
characters for the first two positions in the shorthand III. Infinite/Finite Queueing Models Performance
notations are M (Markovian – Poisson for the arrival Analysis
or Exponential for the service time). The third
positions used for the number of the output optical In this section, a numerical performance analysis of
wavelength channels w. The fourth position indicates infinite and finite queueing models in the optical
the switch queueing size m and it's usually not used switching node are represented. This analysis study
in infinity waiting room buffers. aimed to determine the suitable queuing model for
enhancement of an optical switch performance,
There are single server queueing models such as which queueing model has low loss probability,
M/M/1 and M/M/1/w, and multiple server's systems which one is faster and has lesser number of optical
such as M/M/w, M/M/w/m, and M/M/w/w systems packets in the optical switch system serviced and
[9]. There is an infinite queue system such as M/M/w, waiting for service. In our analysis taking in
where the optical traffic arrivals are hold waiting for consideration the effect of the number of optical
service and not affected by the number of packets switch wavelength channels w whether at Infinite
already on the queue because there is unlimited model M/M/w or Finite one M/M/w/m. The queueing
buffer size. In addition, there is a finite queue system models are used at suitable average arrival rate
such as M/M/w/m, which has a limited buffer
packet/sec and average service rate µ packets/sec wavelengths (servers), w = 1, 2, 8, 16, 32. In Fig. 1,
values. the service rate per channel is constant µ = 1
The performance parameters that measured are: packet/time unit. While at figures 2 to 4, the entire
- The average number of optical packets resident in switching capacity wµ is kept constant by µ = 1/w
the system Ls packets. packets/time unit, which gives = λ becomes
- The average number of optical packets waiting in independent on w.
the queue Lq packets.
- The average time of optical packets spend in the From Fig. 1 it is clear that for a lower offered load,
system (the average switch queueing delay time) the mean time in the system is very low and equal to
Ws sec. 1/µ = 1 time unit. As the load increases, in the M/M/1
- The average time of optical packets waiting in the queue, the mean total time in the optical switch
queue (the average waiting time to serviced) Wq increases greatly and increased slightly as the number
sec. of wavelengths w increased. At the M/M/32 queue,
- The blocking probability of optical packets PB (at the mean total time in the system only has a slightly
finite queueing models). increment. Therefore, as the number of wavelengths
increased the queue has a superior performance than
In this analysis, the waiting time in the system Ws
M/M/1 queue.
established at two different cases [10]. First, if it is
considered that the service rate per channel is
constant µ = 1 packet/sec, which gives = λ/w. Later, 4
M/M/1
Average waiting time in the switch Ws time unit
Wq2( )
Average waiting time in the switch Ws time unit
M/M/1 Wq3( )
0.1
Wq4( )
M/M/2
40 Wq5( )
Ws1( ) M/M/8 w =1
Ws2( )
M/M/16 0.05 w =2
30 M/M/32 w =8
Ws3( ) w = 16
w = 32
Ws4( ) 0
20 0 0.2 0.4 0.6 0.8 1
Ws5( )
Offered Load
10
optical switch with an adequately chosen number of Figure 5. Average number of packets in the system
wavelengths is the better choice. vs. the offered load of M/M/w/m with different
switch buffer size m and w = 8 wavelengths
B. Finite Queueing Models
20
Wq3( )
number, the more load can be buffered and that may 0
Wq4( )
increase the mean optical packets number in the m=8
m = 16
system (switch filling) Ls, Fig. 5. Therefore, it is − 20
m = 32
increasing the waiting time in the queue and in the m = 64
system Wq and Ws, figures 6 and 7 respectively. 1 1.2 1.4 1.6 1.8
Offered Load
Average number of packets in the switch Ls (packets)
− 27
110 different switch buffer size m at =
− 41
pk1( ) 110
− 55
pk2( ) 110
− 69
pk3( ) 110 100
(packets)
− 13 9
110
1 1.2 1.4 1.6 1.8 Ls3( )
Offered Load
Ls4( )
1 m=8
Figure 8. Packets blocking probability PB in the m =16
m = 32
system vs. the offered load of M/M/w/m with m = 64
different switch buffer size m and w = 8 wavelengths 0.1
20 40 60
Average number of wavelengths w
For the special case m = w at queue model M/M/w/w,
no loads can wait for service, such that no waiting Figure 10. Average number of packets in the switch
time in the queue, Wq = 0. In this case, all loads that vs. Average number of wavelengths for M/M/w/m
cannot be served immediately become blocked, and with different switch buffer size m at =
consequently, these systems are commonly called loss
systems.
Average waiting time in the queue Wq time
40
Wq2( )
from 9 to 12 show the performance of M/M/w/m
unit
Wq3( )
switching system over the number of provided 0
Wq4( )
wavelengths w. This study at high load = 2, at m=8
different system size m values (m = 8, 16, 32, 64), and − 20
m = 16
m = 32
constant system capacity wμ = 1. m = 64
20 40 60
Average waiting time in the switch Ws time unit
100
Average number of wavelengths w
Ws4( ) 40
m=8
m = 16
20
m = 32
m = 64
0
0 20 40 60
−4
110
Blocking Probability of the switch PB
− 36 0.1
110
Figure 12. Packets blocking probability PB in the Figure 13. Packet blocking probability PB in the
system vs. average number of wavelengths w of system vs. the offered load of M/M/w/w at different
M/M/w/m with different switch buffer size m at = servers and =
Again, for m = w no waiting space exists, and thus, It is clear that as the load increases, the blocking
the waiting time in the queue Wq equal zero in case probability also increases at low traffic and saturated
of M/M/8/8. In addition that the queue M/M/8/8 at high traffic. However, as the number of
gives the better performance, less average number of wavelength channels increases, the blocking
packets and low waiting time in the system. However, probability decreases because the incoming traffic has
the strong reduction of the blocking probability PB is a more chance to be serviced.
gained from the implicit queue size increase.
IV.CONCLUSION
Then, on finite queueing optical switches, the
blocking probability decreases at increasing the Optical switching network node performance
number of wavelengths (servers). analysis was done with Finite and Infinite queueing
models to indicate the optimum model at optical
Finally, Fig. 13 investigates the switch blocking switch design. Queue delay time, expected number of
probability PB for the M/M/w/w model at different packets in the system and blocking probability are
number of wavelength channels w = 8, 16, 32. The the main parameters in the analysis to demonstrate
switch performance illustrated at different traffic the optical switch performance. At Infinite queueing
loads = 0 to 2. model, two different analysis cases were used to
represent the wavelength channel number impact on
the optical switch node performance. First analysis
was considered a constant service rate per channel
which is preferred if the costs of using more
wavelengths switch less. However, fixed switching
capacity analysis is better at lower wavelength
number. For Finite queueing model, impact of the
system size on the optical switch declared at high
traffic loads. As the system buffer size increases, with [5] Lisong Xu, Harry G. Perros and G. N. R., “A
a constant wavelength number, the more load can be Queueing Network Model of an Edge Optical
buffered and that may increase the mean optical Burst Switching Node,” in INFOCOM 2003.
packets number in the system. Therefore, it is Twenty-Second Annual Joint Conference of the
increasing the waiting time in the queue and in the IEEE Computer and Communications. IEEE
system. Also, the switching blocking probability PB is Societies, 2003, pp. 2019–2029.
heavily decreases. [6] Kumar, OS Sunish, C. S. Jaison, Indu Reena
Varughese and V. K. J., “The Analysis of M/M/r
As the number of wavelength channels increased Queuing Model for Fiber Delay Lines to
with fixed queue buffer size, the blocking probability Resolve BLP in OBS Networks,” In Emerging
increased due to the switch buffer capacity lowered Research Areas and 2013 International
until it reaches zero at M/M/w/w queueing system. Conference on Microelectronics,
At M/M/w/w queue system, it is faster and has less Communications and Renewable Energy
waiting packets in the switch, while it has high (AICERA/ICMiCR), 2013 Annual International
blocking probability due to no queue buffer. At this Conference, 2013, pp. 1–3.
model, as the number of wavelength channels [7] Bolch Gunter, Stefan Greiner, Hermann de
increases, the blocking probability decreases due to Meer, and Kishor S. Trivedi, Queueing
that the incoming traffic has a more chance to networks and Markov chains: modeling and
serviced. Therefore, using M/M/w/w queueing performance evaluation with computer science
system can be modelled well at optical switching applications, John Wiley & Sons, 2006.
nodes under a certain predefined number of [8] Harchol-Balter, Performance modeling and
wavelengths to lower the blocking probability design of computer systems: queueing theory in
problem. action, Cambridge University Press, 2013.
[9] Zukerman M., “Introduction to queueing
V. REFERENCES theory and stochastic teletraffic models,”
arXiv:1307.2968, 2018.
[1] Van Do, Tien, et al., eds., Queueing Theory and [10] Bhat, U. Narayan. An introduction to queueing
Network Applications, Springer International theory: modeling and analysis in applications,
Publishing, 2016. Birkhäuser, 2015.
[2] E. Yue, Wuyi, Quan-Lin Li, Shunfu Jin, and
Zhanyou Ma, “Queueing Theory and Network Cite this article as :
Applications,” in 12th International Waleed M. Gaballah, "Finite/Infinite Queueing
Conference, QTNA 2017, 2017. Models Performance Analysis in Optical Switching
[3] Thomopoulos, Nick T., Fundamentals of Network Nodes", International Journal of Scientific
Queuing Systems: Statistical Methods for Research in Computer Science, Engineering and
Analyzing Queuing Models, Springer Science & Information Technology (IJSRCSEIT), ISSN : 2456-
Business Media, 2012. 3307, Volume 5 Issue 1, pp. 163-170, January-
[4] Zhu, Xiaoming, and Joseph M. Kahn, February 2019. Available at doi :
"Queueing models of optical delay lines in https://doi.org/10.32628/CSEIT195128
synchronous and asynchronous optical packet- Journal URL : http://ijsrcseit.com/CSEIT195128
switching networks," Optical Engineering, vol.
42, no. 6, pp. 1741-1748, 2003.
People show attention to cloud computing since it is efficient and scalable. But maintaining the stability of
processing so many jobs in the cloud computing environment with load balancing is a very difficult problem
and receives much attention by researchers. Load balancing in cloud computing platform has performance
impact also. Good load balancing makes cloud computing more efficient and increases user satisfaction. This
paper introduces a better load balance model for public cloud based on cloud partitioning concept with a switch
mechanism to choose various strategies in different situations. The algorithm applies game theory to load
balancing strategy and improves the efficiency in the public cloud environment. MCC is a concept which aims
to mitigate these limitations by extending the capabilities of smart devices by employing cloud services, as
required. In MCC both the data storage and processing occur external to the mobile device, while in cloud
computing it is usually only the data storage which is external. In this following a some of these architectures as
categorized in augmented execution, elastic partitioned/modularized applications, application mobility, ad-hoc
mobile cloud and add a fifth category; cyber foraging. This system addresses whether MCC techniques can be
used to extend the capabilities of resource-constrained mobile-devices to provide the illusion of infinite, elastic
resources on demand. The existing system limitations of mobile-devices, and identified five key limited
resources as being CPU, memory, battery, data usage and time. In this research explored existing solutions for
these limitations and identified offloading computation and storage from the device as a possible solution.
Keywords : Mobility, Load Balancing, MCC, Cyber Foraging
CSEIT195118 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 171-179 ]
171
R. Kavitha, G. Sathiyabama Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 171-179
in mobile cloud computing. this taxonomy supported facilitate building a lot of powerful mobile
the key problems during this space, and discusses the applications.
various approaches taken to tackle these problems. To
conclude the paper with a assessment and challenges 3. HanQi , Abdullah Gani
that haven't nevertheless been absolutely met, and Mobile Cloud Computing (MCC) which mixes mobile
highlight directions for future work. computing and cloud computing, has become one
The increasing usage of mobile computing is clear by amongst the trade buzz words and a serious
the study by Juniper analysis, that states that the discussion thread within the IT world since 2009. As
buyer and enterprise marketplace for cloud-based MCC continues to be at the first stage of development,
mobile applications is anticipated to rise to $9.5 it's necessary to understand a radical understanding
billion. In recent years, applications targeted at of the technology so as to entails the direction of
mobile devices have started changing into plentiful future analysis. With the latter aim, this paper
with applications in numerous classes like presents a review on the background and principle of
amusement, health, games, business, social MCC, characteristics, recent analysis work, and
networking, travel and news. The recognition of future analysis trends. a quick account on the
those ar evident by browsing through mobile app background of MCC: from mobile computing to
transfer centers like Apple’s iTunes or Nokia’s Ovi cloud computing is given and so followed with a
suite. discussion on characteristics and up to date analysis
work. It then analyses the options and infrastructure
2. Dejan Kovachev, Yiwei Cao and Ralf Klamma of mobile cloud computing.
Cloud computing is an rising construct combining
several fields of computing. the inspiration of cloud 4.Preeti Garg, Dr. Vineet Sharma
computing is that the delivery of services, computer Describes a cloud computing extremely climbable
code and process capability over the net, reducing computing resources are equipped as associate outer
price, increasing storage, automating systems, service through net on pay-as-usability basis. Portio
decoupling of service delivery from underlying analysis estimates that mobile subscribers can reach
technology, and providing flexibility and quality of half dozen.5 billion by the tip of 2012, 6.9 billion by
knowledge. However, the particular realization of the tip of 201 three. thanks to increasing use of
those edges is much from being achieved for mobile mobile devices the necessity of cloud computing in
applications and open several new analysis queries. In mobile devices arise, that gave birth to Mobile Cloud
order to higher perceive the way to facilitate the Computing (MCC). Mobile Cloud Computing refers
building of mobile cloud-based applications, they to associate infrastructure wherever processing and
need surveyed existing add mobile computing storage will happen faraway from mobile device.
through the prism of cloud computing principles. The Mobile devices don't have to have massive storage
given definition of mobile cloud computing and capability and powerful electronic equipment speed.
supply an outline of the results from this review, Thanks to storing information on cloud there's
specially, models of mobile cloud applications. To associate issue of information security. as a result of
focus on analysis challenges within the space of the chance related to information storage several IT
mobile cloud computing. To conclude with professionals aren't showing their interest towards
recommendations for a way this higher Mobile Cloud Computing. This paper[10] explores: (i)
understanding of mobile cloud computing will The thought of Mobile Cloud Computing and
problems associated in it (ii) Security of information
hold on in cloud with varied mechanisms (iii) resource utilization while maintaining affordable
projected a attainable answer to supply quality of service. However, such a goal cannot be
confidentiality, access management similarly as achieved while not economical resource management.
integrity of information. The most physical resources, like processor cores and
I/O devices, are shared among virtual machines
5.Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis exploitation time slicing and are often scheduled
Describe a mobile applications are becoming flexibly supported priority, allocating an acceptable
increasingly ubiquitous and provide ever richer quantity of main memory to virtual machines is
functionality on mobile devices. Meanwhile, such tougher. Totally different applications have different
devices often enjoy strong connectivity with more memory needs. Even one application shows varied
powerful machines ranging from laptops and operating set sizes throughout its execution. A best
desktops to commercial clouds. This paper presents memory management strategy below a virtualized
the design and implementation of Clone Cloud, a environment therefore has to dynamically alter
system that automatically transforms mobile memory allocation for every virtual machine that
applications to benefit from the cloud. The system is more needs a prediction model that forecasts its host
a flexible application partitioned and execution physical memory wants on the fly. This paper
runtime that enables unmodified mobile applications introduces Memory Balancer (MEB) that dynamically
running in an application-level virtual machine to monitors the memory usage of every virtual machine,
seamlessly off-load part of their execution from accurately predicts its memory wants, and
mobile devices into device clones operating in a sporadically reallocates host memory. MEB uses 2
computational cloud. Clone Cloud uses a effective memory predictors that, severally, estimate
combination of static analysis and dynamic profiling the number of memory accessible for reclaiming
to partition applications automatically at a fine while not a notable performance drop, and extra
granularity while optimizing execution time and memory needed for reducing the virtual machine
energy use for a target computation and paging penalty. The advantage of this study is that
communication environment. During runtime, the swap usage from the OS performance statistics
application partitioning is achieved by migrating a and posts the swap usage statistics to the central
thread from the mobile device at a chosen point to information storage. The limitation of this study is
the clone in the cloud, executing there for the residue reducing overhead while up prediction accuracy.
of the partition, and re-integrating the migrated
thread back to mobile. Their evaluation shows that 7.Weizhe Zhang et al
Clone Cloud can adapt application partitioning to Cloud computing emerges as a brand new computing
different environments, and can help some paradigm involved by each domain and trade.
applications achieve as much as a 20x execution Resource management of multiple virtual machines is
speed- up and a 20-fold reduce of energy spent on that the core of Infrastructure as a Service.
mobile. Specializing in the mainframe resources, the aim of
this paper is to extend the QoS of net service by
6.Weiming Zhao properly planning the mainframe resource across the
Virtualization primarily enables multiple operating virtual machines. The authors of this study formulate
systems and applications to run on one physical pc by the mainframe planning of multiple virtual machines
multiplexing hardware resources. A key motivation into an whole number programming drawback. Then,
for applying virtualization is to enhance hardware a worldwide regulation algorithmic rule supported
utility optimization theory is planned. It principally The administrator selects a minimum and a most
consists of 4 parts: the monitor, the regulator, the information measure limit. The primary pre-copy
native effectiveness of management and therefore the spherical transfers pages at the minimum information
international effectiveness of management. The measure. Every resultant spherical counts the
regulator is within the Xen virtual machines’ monitor. quantity of pages dirtied within the previous
The monitor, native effectiveness of management and spherical, and divides this by the length of the
therefore the net server are settled in DomainU’s previous spherical to calculate the soiling rate. The
interior. The international effectiveness of information measure limit for consecutive spherical is
management is created of the worldwide utility then determined by adding a relentless increment to
generating module and global optimizing and finding the previous round’s soiling rate have by trial and
module, realized in the Domain0. Monitor: the most error determined that 50Mbit/sec may be a
role of monitor is to discover an internet server QoS appropriate worth. It terminates pre-copying once
metrics, in the text it means that the typical latency the calculated rate is bigger than the administrator’s
of net. In their experimental environment Apache chosen most, or once but 256KB remains to be
module was developed for the Apache server to transferred. By integration live OS migration into the
record period of time server latency. Additionally, we Xen virtual machine monitor we tend to alter speedy
have a tendency to monitor the changes of the system movement of interactive workloads at intervals
resources. It’s principally to try to do some tests for clusters and knowledge centers. The dynamic
proc CPUinfo, and procure the condition of the network-bandwidth adaptation permits migration to
system mainframe etc. proceed with stripped-down impact on running
services, whereas reducing total time period to below
8. Christopher Clark et al discernible thresholds. Feature of this study is
Migrating software package instances across distinct moving the contents of a VM’s memory from one
physical hosts may be a useful gizmo for directors of physical host to a different is approached in any
knowledge centers and clusters: It permits a clean range of how. And also the limitation may be a live
separation between hardware and computer code, service it's vital that this transfer happens in a very
and facilitates fault management, load equalization, manner that balances the necessities of minimizing.
and low-level system maintenance. By finishing up
the bulk of migration whereas OSes still run, atuhors 9. Albert M.K. Cheng et al
reach spectacular performance with stripped-down Describe a Virtualization technology recently
service downtimes; the study demonstrate the becomes a hot analysis topic once more in each
migration of entire OS instances on a artifact cluster, business and teachers. Some physical hardware like
recording service downtimes as low as 60ms. And processors and I/O devices area unit shared among
also the author shows that that our performance is virtual machines victimization time slicing, however
adequate to create live migration a sensible tool even the memory resource management is comparatively
for servers running interactive hundreds. During this sophisticated. Light-weight memory management
paper, the look choices for migrating OSes running design for multiple virtual machines is projected, and
services with aliveness constraints, specializing in it includes a mix of self adjustment and global-
knowledge center and cluster environments is taken adjustment policies, each of that collaborate with one
into account. another to boost the memory potency. IC module: it
consists of 2 parts: Virtual Machine Collector (VMC)
and Physical Machine Collector (PMC). VMC is
PM module: it's the core of the system. If the These Paper describes the choices to synchronize the
resource is decent, memory sizes area unit adjusted offline folder contents to the online. Word
by the VMs themselves that is named self-adjustment. documents, surpass worksheets and alternative files is
Otherwise, the global-adjustment is activated for the designated and uploaded to the online application.
complete memory management consistently. Additionally, they'll be reborn into bytes and saved
Following area unit the benefits of this study: Self- within the info provided within the net server
adjustment is running as a daemon method once the location. In anyplace, the administrator will read the
OS of a particular domain starts. contents within the server choose a file and transfer
to the system where the administrator is functioning.
10. Tudor-Ioan Salomie, Gustavo dancer, Timothy Likewise, the files are uploaded from the online page
Roscoe additionally. The windows application is wont to
Describes a program like databases and language transfer the content from the online website to the
runtimes usually manage memory themselves to use native machine. So the applying synchronizes the
application information out of stock to the OS. online content and windows content. The applying
Historically deployed on dedicated machines, they're acts like content storage also as document version
designed to be statically designed with memory manager.
comfortable for peak load. In virtualization
eventualities (cloud computing, server consolidation), Likewise, all the documents square measure keep in
however, static peak provisioning of RAM to info additionally with the name, the system from that
applications dramatically reduces the potency and it's uploaded, the information and time of uploading
cost-saving edges of virtualization. also because the original file copy is additionally
unbroken within the server. The files uploaded from
III. METHODOLOGY the system in foreign places apart from the native
workplace if presents within the information
EXISTING WORK processing system, then the administrator are
intimated specified some files gift within the
The existing system introduces a load balance model information processing system isn't downloaded to
for the public cloud based on the cloud partitioning the native system. This helps the administrator to
concept with a switch mechanism to choose different synchronize the document expeditiously. The system
strategies for different situations, then after creating is implemented with the following methods:
all partitioning load balancing will starts to the all
node, these are main drawback.
Processes on mobile devices area unit offloaded to the In Ad-hoc Mobile Cloud, the given task by a mobile
cloud so as to beat good device limitations, like node, the method execution is happened within the
process power, battery life and memory. During this shopper if the server is unavailable. Ad-hoc mobile
module thought-about the restricted Memory-Client/ cloud may be a set of mobile devices that replace the
Excessive Memory-Server. the first practicality cloud infrastructure by providing their computation
outsourcing (intensive computation is offloaded), resources to different devices. Mobile devices have
background augmentation (processes that don't need storage, procedure power, battery power and sensing
user interaction area unit offloaded), inject capabilities, that provides a chance for exploiting the
augmentation (changes within the execution path collective power of those devices. This is often
may be offloaded), hardware augmentation particularly helpful in things wherever there's very
(augmentation of underlying platform) Association little or no affiliation to the network, restricted
augmentation through multiplicity (running multiple power (short vary communications consume less
parallel copies of an application to create optimum energy).
decisions).
3.4 APPLICATION MOBILITY
The computationally overpriced tasks area unit full to
an online service containing image of the device, Application quality relies on the idea of method
whereas straightforward tasks area unit unbroken on migration, whereby processes may be paused,
the device. Once the net service in cloud task transferred to a distinct machine and seamlessly
completes the execution, results area unit integrated resumed. The distinction between this and increased
back to the mobile node. Execution is that in application quality, migration
will occur between completely different underlying
3.2 ELASTIC/PARTIONED MODULARIZED mobile architectures. The applying quality, one
APPLICATIONS method is dead in client/ different method is
processed within the server that is Cloud choice
Some of the processes are dealt in shopper and based mostly. it's engineered on a distributed filing
remaining process area unit are dealt from the server. system, that support the transmission of state from
one web site to a different, and also the modification to figure effectively in each non-public and public
in state from suspend to resume or contrariwise. The cloud.
purchaser’s area unit that internets suspend / resume
have association asynchronous dependence on the Furthermore, to gauge a best help in document
network, whereas purchasers would historically be management, the application become helpful if the
synchronously captivated with the network. below enhancements square measure created in
future. If the appliance is meant as internet service, it
3.5 CYBER FORAGING may be integrated in several internet sites. Non-
synchronized documents may be alerted to
The process or the given task of a node is partly dead synchronize. the appliance is developed specified on
in an un-trusted server. It's a way whereby proximate top of aforementioned enhancements may be
offered resources (called surrogates) area unit used integrated with current method.
for remote execution of applications. These resources
area unit dynamically discovered and used V. REFERENCES
notwithstanding the servers don't seem to be
expressly trustworthy by the user. Surrogates area [1]. N. Fernando, S. W. Loke, and W. Rahayu,
unit supported 2 main premises; un-trusted and "Mobile cloud computing: A survey," Future
unmanaged. This reduces the overall price of Generation Computer Systems, vol. 29, no. 1,
possession and maintenance and so encourages their pp. 84-106, 2015.
broad adoption. The offload tasks to a distant server [2]. D. Kovachev, Y. Cao, and R. Klamma, "Mobile
area unit supported many factors together with cloud computing: a comparison of application
computation quality, network strength, and device models," arXiv preprint arXiv:1107.4940, 2012.
capability and information neighborhood. [3]. [H. Qi and A. Gani, "Research on mobile cloud
computing: Review, trend and perspectives," in
IV. CONCLUSION Digital Information and Communication
Technology and it’s Applications (DICTAP),
Through this analysis, the information management 2012 Second International Conference on .
method becomes straightforward. All the regular IEEE, 2012, pp. 195-202
activities square measure assigned to them through [4]. Preeti Garg, Dr. Vineet Sharma, "Secure Data
browser interface. The administrator will read the Storage In Mobile Cloud Computing ," in
contents within the server choose a file and transfer Computer Communications Workshops
to the system where the administrator is functioning. (INFOCOM WKSHPS), 2011 IEEE Conference
Likewise, the files may be uploaded from the online on . IEEE, 2014, pp. 1060-1065.
page additionally terribly straightforward manner. [5]. Byung-Gon Chun , Sunghwan Ihm, Petros
The new system eliminates the difficulties within the Maniatis, "Securing elastic applications on
existing system. It’s developed in a very easy manner. mobile devices for cloud computing," in
The system is incredibly quick and any dealings may Proceedings of the 2009 ACM workshop on
be viewed or retaken at any level. Error messages Cloud computing security . ACM, 2016, pp.
square measure given at every level of input of 127-134
individual stages. Several of the tested practices and [6]. Weiming Zhao, "Dynamic Memory Balancing
technologies for managing trust relationships in for Virtual Machines ", 2016 14th International
ancient enterprise IT environments may be extended Conference on Modelling and Simulation
ABSTRACT
Rock burst and Slope Stability is one of the common failures in hard rock mining and civil construction. This
study focuses on the prediction of rock burst and Slope Stability classification with case instances using cloud
models and attribution weight. First, cloud models are introduced briefly related to the rock burst and Slope
Stability classification problem. Then, the attribution weight method is presented to quantify the contribution
of each rock burst and Slope Stability indicator for classification. In addition, analysis and prediction of slope
stability is of great importance in geotechnical engineering. With the development of economics, the number
of slopes is increasing and landslides caused by slope instability have become one of the three major geological
disasters in the world along with earthquakes and volcanoes. To reduce or prevent landslide damage, slope
stability analysis and stabilization are required. However, accurately predicting slope stability is challenging
because of the complexity of slope structures and the difficulty to determine the precise input data associated
with key geotechnical parameters the proposed methodology PSO feature extraction preserves important
distance relationships, such as : The Random forest, Naive Bayes of each object of the original dataset. This
leads to preservation of any mining operation that depends on the ordering of distances between objects, such
as Random forest, Naive Bays -search, SVM, J.48 and MLP classification, as well as many visualization
techniques. In particular, it establishes a restricted isometric property, i.e., tight bounds on the
contraction/expansion of the original distances.
Keywords: Raspberry Pi, USB Camera, Motor Driver, Motor, LCD Display, Road Side Speed Sign Controlling.
CSEIT195122 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 180-184 ]
180
Sadesh S, Banupriya GK Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 180-184
Interactive mining at multiple levels of abstraction XIAO FAN and KAN WANG [2] In the field of
It is difficult to know what can be discovered within nuclear engineering, deterministic and stochastic
database. The Data mining process should be methods are used to solve radiation transport
interactive. Database containing a huge amount of problems. To solve the transport equation for the
data, appropriate sampling techniques can be used to average particle behavior and also contain
facilitate interactive data exploration. [9] uncertainties associated with the discretization of the
independent variables such as space, energy and
Pattern evaluation angle of the transport equation and can admit
It can uncover thousands of patterns. Many of the solutions that exhibit non - physics features. The
patterns discovered may be uninteresting to the given Monte Carlo method obtains s results by simulating
user they present common knowledge or lacking individual particles and recording some aspects of
novelty. their average behavior. This method enables detailed,
explicit geometrical, energy and angular
Handling noisy or incomplete data representations and hence is considered the most
The data stored in a database may reflect noise such accurate method presently available for solving
as exceptional cases or incomplete data objects. The complex radiation transport problems. One of the
accuracy can be poor. Data cleaning and data analysis difficulties associated with Monte Carlo method is
method is used to handle the noisy data. the amount of computer time required to obtain
sufficient precision in the simulations.
II. LITERATURE SURVEY
QIANG YANG AND PING- AN DU [3] To present a
CHUN'AN TANG AND JOHN A. HUDSON [1] he novel approach for determining the weights of
subject of rock failure has been studied in a decision makers (DMs) based on rough group
coordinated way since the 1960s.It can be studied by decision in multiple attribute group decision-making
examination of natural rock formations that have (MAGDM) problems. At first, we construct a rough
been stressed and strained over geological time, by group decision matrix from all DMs’ decision
laboratory experiments on the rock samples in situ matrixes on the basis of rough set theory. The second
experiments takes place, and by observing the results process we derive a positive ideal solution (PIS)
of rock excavation and loading during engineering founded on the average matrix of rough group
construction. In this book, rock failure mechanisms decision, and negative ideal solutions (NISs) founded
explanations and illustrations are given. Over the on the lower and upper limit matrixes of rough group
years, there have been three main developmental decision. After that we obtain the weight of each
phases supporting rock engineering design: analysis group member and priority order of alternatives by
based on elasticity theory; the use of rock mass using relative closeness method, which depends on
classification systems; and computer modeling. The the distances from each individual group member’
elasticity theory approach is more useful because it decision to the PIS and NISs. Comparisons with
enables the stresses around circular and elliptical existing methods and an on-line business manager
holes to be determined, although the approach is with the selection example, the proposed method
most useful for deep excavations where the rock show that it can provide more insights into the
behavior is essentially elastic. subjectivity and vagueness of DMs’ evaluations and
selections.
MATTHIJS J. WARRENS [4] The kappa coefficient, ZONG- XIAN ZHANG [7] are two missions for rock
denoted by κ, is widely used as a descriptive statistic mechanics to accomplish in mining engineering: (1)
for summarizing the cross-classification of two to destroy rock efficiently; (2) to make rock
variables with the same unordered categories. structures safe. The missions are completed and
Originally proposed as a measure of agreement mining operations are well managed, best mining
between two raters classifying subjects into mutually results should be achieved. For accomplishments of
exclusive categories, Cohen’s κ has been applied to the two missions, rock mechanics faces following
square cross-classifications encountered in challenges: (1) how to make drilling, crushing and
psychometrics, educational measurement, grinding more efficiently, in particular for grinding
epidemiology, diagnostic imaging, map comparison, whose energy efficiency is less than 1%; (2)now how
and content analysis. The popularity of Co- hen’s κ to make full use of explosive energy and destroy rock
has led to the development of many extensions, effectively; (3) how to manage, reduce and finally
including multi-rater kappas, kappas for groups of predict seismic events and rock bursts; (4) how to the
raters, and weighted kappas. The value of κ is 1 when develop various mining methods; (5) how to reduce
perfect agreement between the two observers occurs, borehole damage in deep mines or in the mines with
0 when agreement is equal to that expected under high in - situ stresses; (6) how to increase ore
independence, and negative when agreement is less recovery and decrease dilution; (7) how to improve
than expected by chance. mining safety; (8) how to make rock support de signs
more scientifically. All these challenges will be
YU ZHOU AND TINGLING WANG [5] Rock burst is analyzed in this paper. In addition, few topics such as
one of main engineering geological problems greatly rock mass classification, environment protection and
threatening the safety of construction. Prediction of the effects of loading rates, temperatures, and cyclic
rock burst is always to important for the safety of loading on mining engineering will be discussed.
workers and equipments in tunnels. Here in this
paper, PNN-based rock burst prediction model is III. METHODOLOGY
proposed to determine whether rock burst will
happen in the underground rock projects and how NORMALIZATION PROCESS
much the intensity of rock burst.
It is the process of classify data into an associated
ZAOBAO LIU and JIANFU SHAO [6] Rock burst is table it also eliminates redundancy and increases the
one of the common failures in hard rock mining and reliability which improves output of the query. For
civil construction. It focuses on the prediction of rock normalizing a database, we divide the dataset into
burst classification with the case instances using tables and establish relationships between the
cloud models and attribution weight. At first, the tables.The dataset normalization can essentially be
cloud models are introduced briefly related to the defined as the practice of optimizing table structures.
rock burst classification problem. Now, the Optimization is accomplished with the result of a
attribution weight method is presented to quantify thorough investigation of the various pieces of data
the contribution of each rock burst indicator for that will be stored within the database, in particular
classification. This approach is implemented to concentrating upon how this data is interrelated
predict the classes of rock burst intensity for the 164
rock burst instances collected.
y=x-(min(x)) / (max(x)-min(x))
FEATURE SELECTION
heuristic search, meta-heuristic methods and [8]. Tan P.-N., Steinbach M. and Kumar V.,
methods that use artificial neural network. The "Introduction to Data Mining", Addison
future methodology is used to analyze the Rock Burst Wesley, 2006
dataset region into separable compartments i.e. Rock [9]. Weber.M, Welling.M, and Perona.P.
Burst dataset etc. However, the method requires "Unsupervised Learning of Models for
further improvement mostly regarding feature Recognition
selection of the Rock Burst dataset into multiple
components: renal cortex, renal column, renal Cite this article as :
medulla and renal pelvis. Apart from that, this is
planned to expand the database on which the system Sadesh S, Banupriya GK, "Effective Prediction for
will be tested. And also, the proposed method in this Rock Burst Dataset Using Classification Algorithms
project can be employed for detecting the Rock Burst with Particle Swarm", International Journal of
dataset Geo-graphical in future with the Rock Burst Scientific Research in Computer Science, Engineering
dataset and classification of the Geo-graphical. and Information Technology (IJSRCSEIT), ISSN :
2456-3307, Volume 5 Issue 1, pp. 180-184, January-
V. REFERENCES February 2019. Available at doi :
https://doi.org/10.32628/CSEIT195122
[1]. Akay M.F. "Support vector machines combined Journal URL : http://ijsrcseit.com/CSEIT195122
with feature selection for breast cancer
diagnosis" (2009) Expert Systems with
Applications, 36 (2 PART 2) , pp. 3240-3247.
[2]. Cristianini N and Shawe-Taylor J., "An
Introduction to Support Vector Machines and
Other Kernel-based Learning Methods",
Cambridge University Press, 2000.
[3]. Fergus.R, Fei-Fei.L, Perona.P, and Zisserman.A.
"Learning Object Categories from Google’s
Image Search".
[4]. Han, Jiawei; Kamber, Micheline (2001). Data
mining: concepts and techniques. Morgan
Kaufmann. p. 5. ISBN 978-1-55860-489-6.
[5]. Han, Kamber, Pei, Jaiwei, Micheline, Jian (June
9, 2011). Data Mining: Concepts and
Techniques (3rd ed.). Morgan Kaufmann. ISBN
978-0-12-381479-1.
[6]. Pal S.K. and Mitra P, "Pattern Recognition
Algorithms for Data Mining", CRC Press, 2004.
[7]. R language and environment Hornik, Kurt
(November 26, 2015). "R FAQ". The
Comprehensive R Archive Network. 2.1 What
is R. Retrieved 2015-12-06.
Technology changes every day and everyone wants to add more comfort in our life but some technologies
increase the safety. Wireless Sensors are one of the technologies which increase the safety in our life in some
manner. Wireless sensors are used in remote areas where human cannot survive to collect results of atmosphere,
temperature and pressure. All the technical devices are work on electricity/battery and in remote area it is
impossible to change batteries or provide continues power supply to sensors that is why we want to increase
the lifetime of wireless sensor network in this paper. In this paper we are explaining our approach which is
developed by us to increase the lifetime of wireless sensor network as well as we are comparing its results to
some other technologies which are already present now a days.
Keywords : EES Scheme, LBM, REAR, Hybrid, Network Topology, Routing, Random Event Model
CSEIT195140 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 185-190 ]
185
Bhumika Yadav, Ram Neresh Sharma Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 185-190
For every set of simulation I consider 500 random Random event launch sequence
events. The attributes of events such as start and end
time etc are generated randomly and stored in a file Other Parameters
as an input to simulator. In performance evaluation
comparison in EES with 50 events in the simulation,
my experiment has higher occurrence rate because I
am considering the 500 random events are put into
launce sequence during one simulation. The coverage
are for each event varies from 6m to 30m in the
network and the duration of the event varies from 1
unit time to maximum 3000 unit time in the system.
The actual duration of an event will depend on Algorithm
specific application and the time may vary in
millisecond, or in several minutes or in several hours. LBM can be represented as
• S = the set of all sensors in the network
In each time interval many events can start, many • pfinal = (Xs, Ys) the final position of the sink node
can end or many can continue. To define each time • ptentative = (X’s, Y’s) the tentative position of the
unit of the simulation the simulator uses a timeline, sink node (for finding routes)
event file access, read Startn and Endn of every event • pi = (xi, yi) the position of sensor node 𝑠𝑠𝑖𝑖∈𝑆𝑆.
and place them into corresponding sequence of • bi = Total number of bits transmitted by sensor node
launch for every time interval. When the simulation 𝑠𝑠𝑖𝑖∈𝑆𝑆.
start simulation process and the simulation reach the • wi = Total number of bits generated by sensor node
time interval then it will generate pop event in the 𝑠𝑠𝑖𝑖∈𝑆𝑆 .
sequence and perform start or end activities. • dij = distance from node si to node sj
• cij = cost of edge e(i& j)
• dmax = maximum transmission range of a sensor
node
• rij = 1 if and only if node si transmits its data
directly to node sj
Algorithm 1:-
Step 1: Calculate tentative sink position ptentative =
(X’s, Y’s
Based on EES [51], use equations (3) and (4) to • Metric 1: First sensor node depletes energy
compute values for X’s and Y’s • Metric 2: 10% of total sensors depletes energy
Step 2: Calculate paths • Metric 3: Network becomes disconnected, i.e.
Use Dijkstra’s algorithm [52] to compute the path at least one sensor node cannot find a valid
from each sensor 𝑠𝑠𝑖𝑖∈𝑆𝑆 to sink node at (X’s, Y’s) path to route data back to the sink
Step 3: Determine load on each sensor node
Load on node-
Step 4: Calculate final sink position
Result Analysis and Performance Fig 3 – Network Lifetime in network with 200
sensors
I am comparing 4 different strategies in our
comparisons
1. Location based sink placement (EES)
2. Load based sink placement (LBM)
3. Residual Energy aware routing (REAR)
4. Hybrid approach that combines both LBM
and REAR (Hybird).
For each network size, we generated 5 different Fig 4 – Network Lifetime in network with 500
random topologies, and tested each topology with 5 sensors
sets of random events sequences. So, the results Comparison of lifetimes for grid topologies
reported for the random networks are averages from
the 25 runs. As mentioned earlier, different
researchers have used different metrics to measure
the lifetime of a wireless sensor network. In our
simulations, we have taken the following commonly
used metrics to measure network lifetime:
Fig 5 – Network Lifetime in grid with 100 sensors Fig 8 – Network lifetime under different maximum
transmission range in network with 200 sensors
ABSTRACT
Automation of farm activities can transform agricultural domain from being manual and static to intelligent and
dynamic leading to higher production with lesser human supervision. This paper proposes an automated
irrigation system which monitors and maintains the desired soil moisture content via automatic watering.
Microcontroller ATMEGA328P on arduino uno platform is used to implement the control unit. The setup uses
soil moisture sensors which measure the exact moisture level in soil. This value enables the system to use
appropriate quantity of water which avoids over/under irrigation. IOT is used to keep the farmers updated
about the status of sprinklers. Information from the sensors is regularly updated on a App using WiFi modem
through which a farmer can check whether the water sprinklers are ON/OFF at any given time. Also, the
sensor readings are transmitted to a Thing speak channel to generate graphs for analysis.
Keywords : Irrigation System, Soil Moisture Sensor, Temperature Sensor, Humidity Sensor, IOT, Android
CSEIT195155 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 191-196 ]
191
Anjali Dokhande et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 191-196
A. Moisture Measurement This stage is called as the field limit. Void spaces are
currently loaded with water and air parcels (Fig. 1(b)).
Soil is comprised of blend of segments including Each harvest has a Critical Soil Moisture Deficit level,
mineral and natural particles, with water and air enabling soil to dry out past this level, water pulling
making up the spaces in the middle. Soil can be from edit can't occur, diminishing the yield. Advance
essentially characterized into following 4 classes: more water expulsion from soil lead little holding of
water by soil particles much firmly on account of
surface strain impact for the yield to remove this is
said to be as withering point as appeared in figure 1(c).
The accessible water limit is the measure of water a
dirt can make accessible to plants, by and large
It is encouraged to break down soil to reason its
characterized as the contrast between measure of
classification. Every classification has distinctive
water put away in a dirt at field limit and the measure
properties henceforth their water holding limit
of water put away in the dirt at the lasting shrinking
changes from one sort to the next. As water invades
point. Plants get the vast majority of water from the
soil, it begins to fill the hole between the void spaces
upper part of the root zone.
in the middle of soil particles (Fig. 1(a)), when every
one of the spaces are totally immersed with the water,
The term viable root zone alludes to about the upper
the state is known as immersion point. This state goes
portion of the root zone profundity, where around 70%
on for brief time. With time overabundance water
of harvests water is taken up.
permeates descending through water profile because
of gravitational power. At same time narrow activity
give inverse power to gravity and give adjusted
condition so descending development of water is
ruined.
methodology for moisture estimation is assessing moisture sensor (VH400) in the perspective of
assortment in dielectric steady [7]. Dielectric electromagnetic estimation and second is soil
unfaltering of water is (~80) high when appeared temperature sensor (DS1822). The recorded data was
differently in relation to dry soil (2-3). In [8] secured locally in the memory chip and was moreover
assortment of the dielectric was assessed as an transmitted to the web. The system is controlled
assortment in the capacitor using capacitor and capable and thoroughly wears down sun controlled
resistor interface. The response is generally immediate essentialness. The promising delayed consequence of
which is required in case of exactness agriculture. S. S. around 90% water saving was viewed. P. Bhosale and
Mathurkar and D. S. Chaudhari [9] showed a model in V. Dixit made atmosphere monitoring structure. They
perspective of moisture, temperature and humidity used a broad assortment of sensors for monitoring
sensor. All of the sensors were balanced for the specifically ecological temperature and humidity
straight response. The standard purpose of the (SHT1x), Soil temperature (LM35), Radiation and
structure is to develop an exact system which can be sunshine, soil moisture (gypsum square in perspective
utilized in real estate and offer preferences to the of the resistive framework), wind speed and course
farmer. (anemometer) and rainfall. In control board, PIC
microcontroller was used. The total data was secured
An epic method to manage design automated in memory card amassing and was also sent to the
irrigation system is the use of Plant water weight remote customer by methods for the GSM module.
examination. It is overcome selection of optical and IR Powerful usage of water was practiced through this
pictures of plant overhang. This particular enrollment structure [12].
speaks to a couple of challenges as no anticipated
essential segment or right organizing can be found IV. PROPOSED METHODOLOGY
from the data pictures. X. Wang et al [10] developed
an Automatic Cross-Correlation course of action Nowadays agricultural field is facing lot of problems
count which uses the information of smart picture due to lack of water resources. In order to help the
structure yet clears out the effect of picture shading farmers to overcome the difficulties, smart irrigation
and power in the relationship method and thusly system has been used. In this system, various sensors
achieves a pleasing enlistment result. They similarly such as pH, soil moisture and DHT11 are connected to
realized capable computation approach which can the input pins of Arduino microcontroller. The sensed
fundamentally diminish the estimation eccentrics of values from the sensors are displayed in LCD. If the
the ACC count while keeping up needed exactness. sensed value goes beyond the threshold values set in
Game plan control was also improved by accepting N- the program, the pump will be automatically switched
maxima procedure in the control point count. ON/OFF by the relay circuit and it is connected to the
Preliminary comes about showed that the proposed driver circuit which helps to switch the voltage. The
system defeated each and every other procedure for farmer will be intimated about the current field
region-based methods. J. Gutierrez et al [11] executed condition through Wi-Fi module and also updated in
amazingly capable automated system with remote the web page. By using this system, the farmer can
sensor arrange. The remote interface was given access the details about the condition of the field
through the GPRS module (MTSMC-G2-SP). The anywhere at any time.
structure has two information parameters at first is
V. COMPONENTS USED
• Wi-Fi Module
• Soil Moisture Sensor The ESP8266 Wi-Fi module is a self-contained SOC
Soil Moisture sensor is used to measure the moisture (System on Chip) with integrated TCP/IP
content present in the soil. When the soil moisture (Transmission Control Protocol/Internet Protocol)
value read by the sensor is above the threshold value, protocol stack that can give any microcontroller
low level (0V) will be the digital output and if it is access to any Wi-Fi network. Each ESP8266 module
below the threshold level, high level (5V) will be the comes preprogrammed meaning, it can be simply
digital output. The digital pin is used to directly read hooked up to Arduino device to get Wi-Fi ability. This
current soil moisture value to see if it is above module has a powerful enough on-boarding process
threshold or not. The threshold voltage can be and high storage capacity that allows it to be
regulated with help of potentiometer. integrated with the sensors and other application
specific devices.
VI. APPLICATION
ABSTRACT
Marg-Sudhar: Pothole Reporting System is a mobile application for detecting and reporting road condition.
Dangerous road surface conditions are major distractions for safe and comfortable transportation and therefore
road damage needs to be reported by locality. Data can be gathered by clicking image to identify potholes and
other severe road surface anomalies using geotagging technique and upload on the server.
Keywords : Potholes, GPRS, Geotagging, Road Maintainance, Strategy i.e. Click, "Report" and "Fix".
CSEIT195153 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 197-202 ]
197
Riya Agrawal et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 197-202
The pothole information obtained from pothole Fig. 2. Pothole detection system and its application
reporting system is sent to server and can be applied
to a pothole alert service and road management Application has been implemented on following
system. All uploaded information are shown as a list android features:
view on client side. Also, the obtained pothole
information is provided to Road Management System. • For designing part various activities and their
components are used.
III. IMPLEMENTATION • Communication between activities has been
implemented using Intent object. Intent is an
Marg-Sudhar has been implemented using following messaging object use to request an action from
technologies (1) Android (2) Java (3) SQL (4) another app component.
Geotagging (5) Web Technologies. • Components registration, is an entry point
through which the system or a user can enter into
(1) Android: app.
• Also, various background services rights has been
Android studio is the IDE for google’s Android OS used.
build on JetBrains’ InteliJ IDEA software and • This application needs various build app access
designed specifically for android development. The rights such as: Storage, Camera, Data access,
following features are provided in the current stable Internet access, GPRS access.
version: Gradel-Based build support, Android-specific • Data is Authenticated due to security purpose at
refactoring and quick fixes, template-based vizards to various point such as at time of login.
create common android designs and components, a
rich layout editor that allows user to drag-and-drop (2) Java:
UI components, build-in support for google cloud
platform, enabling integration with firebase cloud Java is an object-oriented, class-based, concurrent,
messaging and google app engine. secured and general-purpose computer-programming
language.
(4) Geotagging:
IV. WORKING
IX. ACKNOWLEDGEMENT
Smart Meals
Shivali Singh1, Aishwarya Narnaware1, Kirtikumar Jain1, Kash Patel1, Prof. S Dhawale2
1Department of Computer Science Engineering, Rashtrasant Tukadoji Maharaj Nagpur University,
Nagpur, Maharashtra, India
2 Professor, Department of Computer Science Engineering, J D College of Engineering and Management,
Nagpur, Maharashtra, India
ABSTRACT
Online business, also known as e-commerce or electronic commerce, refers to transaction and the activities that
have been performed by the customers and seller over the business is facilitated by the web based technologies.
Online food delivery system is one of the most popular online business products. Customers are able to view
and select their favourite food from the list, add to the cart, choose the delivery types, make payments and the
order is complete.
Keywords : Automated Food Ordering System, Dynamic Database Management, Global Positioning System
CSEIT195152 | Received : 25 Jan 2019 | Accepted : 05 Feb 2019 | January-February -2019 [ 5 (1) : 203-206 ]
203
Shivali Singh et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 203-206
Now the verification of the customer details will be shortest path. In this project through .NET
done to see that whether it is valid or invalid. So for technology we have created login page, checking our
this we have to contact the credit card company. password and through MySQL we created database.
After this if we find all the details correct in all After login our site will show variety of nearby hotels
means then the order is placed successfully. But if through which a customer can order the meals.
given details mismatch then the order will be
cancelled. In the future research, we suggest adding more
variable for routing optimization process such as type
Now, the last step is to make the product ready and vehicle, the size of food packages, holiday session the
get the delivery. driver license type owned by delivery service and the
maximum capacity of the vehicle type. These
ADVANTAGES additional variables will add the complexity to our
application. This system can also enhance to produce
• Online Ordering and easy to use for all. an online system by adding the email notification
• Freedom for demanding food. feature for order confirmation with official receipt.
• Food available on decided places.
• Remove time consumption. VI. ACKNOWLEDGMENT
• Meal comes with good packing.
• Hygiene has first priority. Special Thanks to our Head of Department CSE/IT
• Hassle-free food preparation. Prof Prasanna Lohe , for his valuable suggestions and
encouragement.
FLOW DIAGRAM
VII.REFERENCES
ABSTRACT
Face recognition has been a quickly developing, testing and intriguing region progressively applications. An
extensive number of face recognition calculations have been produced in a decade ago. In this paper an
endeavor is made to survey an extensive variety of techniques utilized for face recognition exhaustively. This
incorporate PCA, LDA, ICA, SVM, Gabor wavelet delicate registering instrument like ANN for recognition and
different cross breed blend of this systems. This audit examines every one of these techniques with parameters
that difficulties face recognition like illumination, pose variation, facial expressions.
Keywords: Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Face Recognition,
Independent, Component Analysis (ICA), Artificial Neural Networks (ANN)
CSEIT195159 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 207-213 ]
207
Aishwarya Admane et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 207-213
II. FACE RECOGNITION ALGORITHMS LDA is more touchy than PCA and ICA on fractional
impediments, however PCA is less delicate to halfway
A. Principal Component Analysis (PCA) impediments contrasted with LDA and ICA. PCA is
PCA otherwise called Karhunen-Loeve technique is utilized as a measurement lessening method in [12]
one of the famous strategies for include determination and for demonstrating articulation disfigurements in
and measurement lessening. Recognition of human [13].
faces utilizing PCA was first done by Turk and
Pentland [8] and recreation of human faces was A recursive calculation for figuring the discriminant
finished by Kirby and Sirovich [9]. The recognition highlights of PCA-LDA method is presented in [14].
technique, known as eigenface strategy characterizes This technique focuses on testing issue of figuring
an element space which lessens the dimensionality of separating vectors from an incrementally arriving
the first information space. This diminished high dimensional information stream without
information space is utilized for recognition. In any processing the comparing covariance grid and without
case, poor separating power inside the class and huge knowing the information ahead of time. The proposed
calculation are the outstanding basic issues in PCA incremental PCA-LDA calculation is exceptionally
technique. This restriction is overwhelmed by Linear proficient in memory utilization and it is extremely
Discriminant Analysis (LDA). LDA is the most productive in the estimation of first premise vectors.
predominant calculations for highlight choice in This calculation gives an adequate face recognition
appearance based techniques [9]. achievement rate in correlation with extremely
acclaimed face recognition calculations, for example,
Be that as it may, numerous LDA based face PCA and LDA. Two appearance– based systems, for
recognition framework initially utilized PCA to lessen example, Modified PCA (MPCA) and Locality
measurements and after that LDA is utilized to boost Preserving Projections (LPP) are consolidated in [15]
the separating energy of highlight determination. The to give a high face recognition rate. PCA is utilized as
reason is that LDA has the little specimen measure a component extraction strategy in [16]. These
issue in which dataset chose ought to have bigger component vectors are thought about utilizing
examples per class for good segregating highlights Mahalanobis separations for basic leadership. Tensor
extraction. Accordingly executing LDA based Multilinear PCA approach is proposed in [17]
straightforwardly brought about poor extraction of which removes highlight specifically from the tensor
separating highlights. In the proposed strategy [10] portrayal as opposed to the vector portrayal. This
Gabor channel is utilized to channel frontal face technique demonstrates a superior execution in
pictures and PCA is utilized to decrease the correlation with the outstanding strategies in separate
measurement of separated component vectors and changing situations.
after that LDA is utilized for highlight extraction. The
exhibitions of appearance based factual techniques, for PCA can outflank over numerous different systems
example, PCA, LDA and ICA are tried and looked at when the span of database is little. In proposed
for the recognition of hued faces pictures in [11]. PCA calculation [18] the database was sub grouped utilizing
is superior to LDA and ICA under various a few highlights of enthusiasm for faces. Just a single
illumination variations however LDA is superior to of the acquired subgroups was given by PCA to
ICA. recognition. Notwithstanding the great aftereffects of
PCA, this system has the inconvenience of being Another face recognition technique in light of PCA,
computationally costly and complex with the LDA and neural system were proposed in [21]. This
expansion in database estimate, since every one of the technique comprises of four stages:
pixels in the picture are important to get the portrayal
used to coordinate the information picture with all i. Preprocessing
others in the database. ii. Dimension lessening utilizing PCA
iii. include extraction utilizing LDA
Diverse dimensionality diminishment methods, for iv. grouping utilizing neural system.
example, PCA, Kernel PCA, LDA, Locality
safeguarding Projections and Neighborhood Blend of PCA and LDA were utilized for enhancing
Preserving inserting were chosen and connected so as the capacity of LDA when a couple of tests of pictures
to decrease the loss of grouping execution due to were accessible and neural classifier was utilized to
changes in facial appearance. The execution of diminish number misclassification caused by not-
recognition while utilizing PCA and in addition LDA directly distinguishable classes. The proposed strategy
for dimensionality diminishment is by all accounts was tried on Yale face database. Exploratory outcomes
parallel as far as precision. However, it was watched on this database showed the viability of the proposed
that LDA requires long time for preparing more technique for face recognition with less
number of numerous face pictures notwithstanding misclassification in examination with past strategies.
for little databases. In the event of Locality Preserving
Projections (LPP) and NPE techniques, the An alternate approach for face recognition was
recognition rate was less if expanding number of face proposed in [22] which limit calculation time while
pictures were utilized when contrasted with that of accomplishing higher discovery precision. PCA was
PCA and KPCA strategies. The proposed technique utilized to decrease the measurement separating a
[19] gave significant enhancements on account of component vector. GRNN utilized as a capacity
illumination variations, PCA and bit PCA are the best estimate system to identify whether the information
entertainers. picture contains a face or not and if existed then
reports about its introduction. The proposed
Altered PCA calculation for face recognition were framework had demonstrated that GRNN can perform
proposed in [20], this strategy depended on superior to back propagation calculation and give
diminishing the impact of eigenvectors related with some answer for better regularization.
the expansive eigen esteems by normalizing the
component vector component by its comparing B. Support Vector Machine (SVM)
standard deviation. The reenactment comes about Support Vector Machines (SVM) are a standout
demonstrate that the proposed strategy brings about a amongst the most valuable systems in grouping issues.
superior execution than customary PCA and LDA One clear case is face recognition. Be that as it may,
approaches and the computational cost continues as SVM can't be connected when the component vectors
before as that of PCA and significantly less than that characterizing tests have missing sections. A grouping
of LDA. calculation that has effectively been utilized as a part
of this structure is the all-known Support Vector
Machines (SVM) [23], which can be connected to the
first appearance space or a subspace of it acquired in This approach depended on the exhibitions of a firmly
the wake of applying an element extraction technique segregating optical connection strategy alongside the
[24] [25] [26]. The benefit of SVM classifier over heartiness of the ICA show. Independent component
customary neural system is that SVMs can accomplish analysis (ICA) demonstrate had started enthusiasm for
better speculation execution. looking for a direct change to express an arrangement
of arbitrary factors as straight mixes of factually
C. Independent Component Analysis (ICA) independent source factors [36]. ICA gave a more
Independent component analysis (ICA) is a strategy intense information portrayal than PCA as its
for finding basic elements or components from objective was that of giving an independent instead of
multivariate (multidimensional) measurable uncorrelated picture deterioration and portrayal. A
information. There is have to execute face recognition quick incremental primary non Guassian headings
framework utilizing ICA for facial pictures having analysis calculation called IPCA_ICA was proposed in
face introductions and distinctive illumination [37].This calculation figures the key components of an
conditions, which will give better outcomes as arrangement of picture vectors incrementally without
contrasted and existing frameworks [27] [28] [29] . evaluating the covariance grid and in the meantime
What recognizes ICA from different strategies is that, change these important components to the
it searches for component that is both measurably independent bearings that amplify the non-
independent and non-gaussian [27]. The ICA is like Guassianity of the source. IPCA_ICA is extremely
visually impaired source detachment issue [30] that effective in the estimation of the main premise vectors.
comes down to finding a straight portrayal in which PCA_ICA makes higher normal progress rate than
the components are measurably independent. The Eigenface, the Fisherface and FastICA strategies.
correlation of face recognition utilizing PCA and ICA
on FERET database with various classifiers [31] [32] III. CONCLUSIONS
were talked about and discovered that the ICA would
be advised to recognition rate as contrasted and PCA This paper has endeavored to survey significant
with factually independent premise pictures and number of papers to cover the current advancement
furthermore with measurably independent in the field of face recognition. Introduce think about
coefficients. Face recognition utilizing ICA with uncovers that for upgraded face recognition new
extensive revolution edges with poses and variations calculation needs to advance utilizing half and half
in illumination conditions was proposed in [33]. A strategies for delicate figuring apparatuses, for
novel subspace technique called successive line example, ANN, SVM, SOM may yields better
segment independent component analysis for face execution. The rundown of references to give more
recognition is proposed in [34]. In ICA each face itemized comprehension of the methodologies
picture is changed into a vector before figuring the portrayed is enrolled. We apologize to specialists
independent components. RC_ICA decreases face whose critical commitments may have been neglected.
recognition blunder and dimensionality of recognition
subspace ends up noticeably littler. A novel system for
face recognition consolidated the independent
component analysis (ICA) demonstrate with the
optical connection procedure was proposed in [35].
[20]. Lin Luo, M.N.S. Swamy, Eugene I. Plotkin, ―A Applications‖ Neural Networks Research Centre
Modified PCA algorithm for face recognition‖, Helsinki University of Technology P.O. Box
Proceedings of IEEE 2003 5400, FIN-02015 HUT, Finland, Neural
[21]. A. Hossein Sahoolizadeh, B. Zargham Heidari, Networks, 13(4-5):411-430, 2000
and C. Hamid Dehghani,‖ A New Face [31]. Bruce A. Draper, Kyungim Baek, Marian
Recognition Method using PCA, LDA and Stewart Bartlett, ―Recognizing faces with PCA
Neural Network‖, International Journal of and ICA‖, Computer Vision and Image
Electrical and Electronics Engineering 2:8 2008 Understanding 91 (2003) 115-137.
[22]. Feroz Ahmed Siddiky, Mohammed Shamsul [32]. Jian Yang, David Zhang, Jing-yu Yang, ―Is ICA
Alam,Tanveer Ahsan and Mohammed Saifur Significantly Better than PCA for Face
Rahim,‖An Efficient Approach to Rotation Recognition?‖ Proceedings of the Tenth IEEE
Invariant Face detection using PCA,Generalized International Conference on Computer Vision
Regression Neural network and Mahalanobis (ICCV’05) 1550- 5499/05.
Distance by reducing Search space‖,Proceedings [33]. Kailash J. Karande, Sanjay N.Talbar,‖ Face
Of IEEE 2007 Recognition under Variation of Pose and
[23]. Vapnik. Statistical Learning Theory. JohnWiley Illumination using Independent Component
and Sons, New York, 1998. Analysis‖, ICGST-GVIP, ISSN 1687-398X,
[24]. E. Osuna, R. Freund, and F. Girosit. Training Volume (8), Issue (IV), December 2008
support vector machines: an application to face [34]. Quanxue Gao , LeiZhang, DavidZhang,‖
detection. Proc. of CVPR, pages 130–136, 1997. Sequential row–column independent
[25]. B. Heisele, T. Serre, and T. Poggio. A component analysis for face recognition‖,
componentbased framework for face detection Elsevier 2008
and identification. IJCV, 74(2):167–181, 2007. [35]. A. Alfalou and C. Brosseau,‖ A New Robust and
[26]. Q. Tao, D. Chu, and J. Wang. Recursive support Discriminating Method for Face Recognition
vector machines for dimensionality reduction. Based on Correlation Technique and
IEEE Trans. NN, 19(1):189–193, 2008. Independent Component Analysis Model‖,
[27]. Marian Stewart Bartlett, Javier R. Movellan, Optics Letters 36 (2011) 645-647
Terrence J. Sejonowski, ―Face Recognition by [36]. P. Comon, ―Independent component analysis:
Independent Component Analysis‖, IEEE a new concept?‖, Signal Process. 3, 287-314
Transactions on Neural Networks, vol-13, No- (1994).
6,November 2002, PP 1450- 1464. [37]. Issam Dagher and Rabih Nachar,‖Face
[28]. Pong C.Yuen, J.H.Lai, ―Face representation Recognition Using IPCA-ICA algorithm‖, IEEE
using independent component analysis‖, Pattern Transactions On Pattern Analysis and Machine
Recognition 35 (2002) 1247-1257. Intelligence, VOL. 28, NO. 6, JUNE 2006
[29]. Tae-Kyun Kim, Hyunwoo Kim, Wonjum [38]. Arindam Kar, Debotosh Bhattacharjee, Dipak
Hwang, Josef Kittler, ―Independent component Kumar Basu, Mita Nasipuri, Mahantapas
analysis in a local facial residue space for face Kundu,‖ High Performance Human Face
recognition‖, Pattern Recognition 37 (2004) Recognition using Independent High Intensity
[30]. Aapo Hyvärinen and Erkki Oja ―Independent Gabor Wavelet Responses: A Statistical
Component Analysis: Algorithms and Approach‖, International Journal of Computer
ABSTRACT
With various developing applications requiring biometric acknowledgment of children (e.g., following tyke
immunization plans, recognizing missing children and counteracting infant swaps in emergency clinics),
exploring the worldly solidness of biometric acknowledgment precision for children is critical. The diligence of
acknowledgment precision of three of the most ordinarily utilized biometric qualities (fingerprints, face and iris)
has been examined for grown-ups. Notwithstanding, the industriousness of biometric acknowledgment
precision has not been concentrated methodicallly for children in the age gathering of 0-4 years. Given that
youthful children are regularly uncooperative and don't fathom or adhere to directions, as we would see it,
among all biometric modalities, fingerprints are the most suitable for perceiving children. This is principally in
light of the fact that it is simpler to catch fingerprints of youthful children contrasted with other biometric
attributes, e.g., iris, where a tyke needs to gaze straightforwardly towards the camera to start iris catch. In this
report, we detail our drive to explore the perseverance of unique finger impression acknowledgment for
children.
Keywords : Bio-Metric, Fingerprint, Child Identification
CSEIT195160 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 214-220 ]
214
Shanon Paul et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 214-220
child fingerprints gathered by VaxTrac in Benin: (I) immunizations obtained, $50 will never go into the
upsample the obtained unique finger impression arm of a tyke in need"3. Accordingly, the kid death
picture to encourage particulars extraction, (ii) rates keep on being high in the low-salary and
coordinate the question print against formats made creating nations.
from every enlistment impression and wire the
match scores, (iii) intertwine the match scores of II. RELATED WORK
the thumb and forefinger, and (iv) refresh the
display with fingerprints procured over various A powerful inoculation program needs to monitor
sessions. which babies and little children have been
vaccinated and how frequently they have gotten
The United Nations Children's Fund (UNICEF's) the required sponsor shots from birth to 4 years old
"2013 Progress Report on Committing to Child (Fig. 1 demonstrates the UNICEF prescribed
Survival: A Promise Renewed" [2] makes reference vaccination plan for newborn children; for CDC
to that while more children currently make due suggested timetable for children up to 6 years see
past their fifth birthday celebration than at any [1]). In creating nations, regularly, there are no
other time, the poorest countries still lose an national distinguishing proof projects which can be
extensive number of children to immunization- utilized to recognize children all through the
preventable illnesses. The 2011 Grand Challenges in vaccination schedule4. This brings up the
Global Health Explorations Round 7 issued by the accompanying issue: can fingerprints, or, so far as
Bill and Melinda Gates Foundation [4] states that that is concerned some other biometric
"every year roughly 25 million babies don't get the methodology, be utilized to distinguish children
vital immunizations1, and in any event, 2.4 million from birth to 4 years old.
children bite the dust from antibody preventable
sicknesses."
framework, the left and right thumb prints of both The connection-based techniques utilized in spatial
the kid and his mom are gathered. In the event that or in the recurrence area associate two unique mark
the kid's fingerprints can't be coordinated effectively, pictures to process the similitude between them.
mother's fingerprints are utilized for building
up/confirming the youngster's personality. While A tale way to deal with unique mark arrangement
VaxTrac does not report the coordinating exactness and coordinating was proposed by Arun Ross et.al
of children's fingerprints, they notice that they [10]. The list of capabilities utilized in this strategy
constantly end up utilizing the mother's fingerprints was an edge include map. A lot of Gabor channels
for this reason in light of the fact that coordinating pre-tuned to a particular recurrence were utilized to
children's fingerprints flops frequently 5. Proceeded catch the neighborhood edge qualities at different
with endeavors are, thusly, expected to propel the introductions and concentrate the nearby edge
unique finger impression innovation, both detecting attributes. The convolution was performed in the
innovation just as coordinating calculation behind recurrence space. A standard deviation picture that
the versatile immunization library framework. In caught the variety in the edge quality at different
this paper, we present the underlying consequences introductions was developed utilizing the separated
of our progressing study on utilizing fingerprints to pictures. The edge highlight map was acquired
perceive newborn children and little children. utilizing standard deviation picture. A 2D connection
of the edge highlight maps of the question picture
III. LITERATURE SURVEY and format was resolved to produce a coordinating
score.
Countless for programmed unique finger impression
coordinating have been proposed in the writing. Two Karthik Nandakumar and Anil K. Jain [11] proposed a
given fingerprints are thought about by a connection based unique mark matcher that used the
coordinating calculation and return either a level of nearby relationship of districts around the details to
closeness (additionally called coordinating score) or assess the level of comparability between two unique
an acknowledgment/dismissal choice. This finger impression pictures. Particulars focus and the
workgroup the unique finger impression coordinating related edge focuses were separated from the layout
methodologies into connection based, particulars and the inquiry unique finger impression pictures.
based methodologies, and non-details include based, This technique utilized Procrustes examination to get
for example, edge shape, surface data and so forth. a decent gauge of comparing edge bends to adjust the
The motivation behind the study is to break down inquiry to the layout. The two pictures were
those calculations and talk about the execution improved utilizing a bank of Gabor channels of
assessment. various introductions. The standardized cross
correlation was processed to decide the nature of the
The current unique finger impression particulars coordinate. A database comprising of
acknowledgment frameworks utilize methods unique finger impression impressions of 160 clients
dependent on the neighborhood and worldwide were utilized to assess this technique.
element portrayals of the unique mark pictures, for
example, details, edge shape, surface data and so on. A Robust Fingerprint Matching Algorithm for
Verification dependent on connection was
introduced by Abdullah Cavusoglu et. al [12]. They
utilized a fluctuation based division technique to
fragment the unique mark picture. Neighborhood the connection between's edges of neighboring
edge introduction was resolved to utilize Sobel particulars that shows the similarity of regions in the
administrators. The strategy used to discover the middle of the two comparing particulars sets were
Reference point depended on the differential entirety processed. The item rule was utilized to join the
of sine estimations of the headings of the pixels quantity of coordinated particulars sets,
situated on a specific sweep. The proposed calculation neighborhood connection score and edge relationship
determined 12 distinctive cross connections score that spoke to an all-out aggregate of
dependent on certain span esteems from the coordinating zones in two fingerprints. The proposed
reference point for both the info and format pictures coordinating calculation recognized real coordinated
and found an all-out total to decide if the pictures details and impostor coordinated particulars in this
relate to a similar unique finger impression. The manner enhancing the coordinating precision.
proposed calculation was assessed on an open space
database. Haiyun Xu et.al [15] exhibited a novel technique for
unearthly details portrayal for unique finger
Koichi Ito et.al [13] proposed a proficient unique impression check. The ghostly particulars spoke to
mark acknowledgment calculation utilizing the stage detail set as a settled length include vector and
parts in 2D Discrete Fourier Transforms of the depended on the move, scale, and revolution
pictures. They utilized Phase-Only Correlation (POC) properties of the two-dimensional (2-D) ceaseless
capacity and Band-Limited Phase-Only Correlation
(BLPOC) capacity to decide the stature and area of Fourier change. The two details portrayal techniques
the crest from stage attributes in Fourier space, which utilized for particulars coordinating were Location-
gave the comparability measure and the translational Based Spectral Minutiae and Orientation-Based
uprooting between the pictures separately. The Spectral Minutiae. To lessen the higher frequencies, a
revolution and the removal between the enlisted Gaussian low-pass channel was connected on the
unique mark and the information finger impression range. Two coordinating calculations were exhibited.
pictures were standardized utilizing BLPOC work. The relationship of two ghostly pictures (direct
The covered locale of the two pictures was removed coordinating) was picked as a comparability score.
lastly the coordinating score is assessed as the The second calculation is the Fourier– Mellin
entirety of the most elevated two pinnacles. The coordinating, in
execution of their calculation was assessed on a
database comprising of 330 unique finger impression which the extent of the Fourier change of the
pictures. particulars range was taken to compute the likeness
score. The proposed calculations were assessed on
Jiang Li et.al [14] depicted a unique mark three unique finger impression databases. A basic
coordinating calculation that consolidates minutia relationship based unique mark confirmation
based coordinating strategy with relationship-based framework was proposed by Asker M. Bazen et.al
coordinating technique. Minutia based coordinating [16]. The proposed framework specifically utilized
calculation was utilized to separate the rundown of the more extravagant dark scale data of the
coordinated minutia sets from the two unique mark fingerprints.
pictures. Relationship of the nearby neighborhood
districts around each coordinating details pair that Suitable trademark layouts were chosen in the
speaks to the neighborhood likeness and furthermore essential unique mark and their relating positions in
the info unique finger impression were resolved. The [2]. Committing to child survival: A promise
format was moved over the whole unique finger renewed.
impression picture and the area where the separation http://www.unicef.org/lac/Committing to Child
is insignificant was picked as the relating position of Survival APR 9 Sept 2013.pdf.
the layout in the info finger impression. The data of [3]. Vaccines and immunizations.
all layout sets was converged to get the ultimate http://www.cdc.gov/vaccines
choice. The proposed framework execution was /vacgen/whatifstop.htm.
assessed on pictures from four diverse unique mark [4]. F. Galton. Finger prints of young children.
databases comprising of 880 fingerprints altogether. British Association for the Advancement of
Science, 1899.
IV. CONCLUSIONS [5]. C. Gottschlich, T. Hotz, R. Lorenz, S.
Bernhardt, M. Hantschel, and A. Munk.
Current biometric information catch and Modeling the growth of fingerprints improves
acknowledgment arrangements cook essentially to matching for adolescents. IEEE Transactions on
grown-ups (more than 16 years old). National ID Information Forensics and Security, 6(3):1165–
programs, for example, India's Aadhaar program, 1169, Sept 2011.
order catching fingerprints and iris pictures of people [6]. P. M. Corby, T. Schleyer, H. Spallek, T. C. Hart,
who are 5 years old or more established. There is R. J. Weyant, A. L. Corby, and W. A. Bretz.
currently a developing requirement for creating Using biometrics for participant identification
capacities to perceive exceptionally youthful children in a research study: a case report. J. Am.
(from infant to 4 years of age) in light of biometrics. Medical Informatics Assoc., 13(2):233–235,
For biometric acknowledgment to be fruitful, 2006.
uniqueness and constancy properties of a biometric [7]. S. Tiwari, A. Singh, and S. K. Singh. Intelligent
characteristic should be fulfilled for the number of method for face recognition of infant.
inhabitants in intrigue. While these two central International Journal of Computer
fundamentals of biometrics have been researched for Applications, 52(4):36–50, 2012.
the three essential biometric characteristics [8]. S. Bharadwaj, H. Bhatt, R. Singh, M. Vatsa, and
(fingerprints, face, and iris) of the grown-up populace, S. Singh. Face recognition for newborns: A
there is no thorough examination led to explore the preliminary study. In 4th IEEE BTAS, pages 1–
perseverance of biometric acknowledgment 6, Sept 2010.
(longitudinal investigation) for children. In this [9]. D.Weingaertner, O. R. P. Bellon, L. Silva, and
examination, we will likely research the tirelessness M. N. Cat. Newborn’s biometric identification:
of unique mark acknowledgment for children in the Can it be done? In VISAPP (1), pages 200– 205,
age gathering of 0-4 years. 2008.
[10]. Arun Ross, James Reisman and Anil Jain,
V. REFERENCES (2002), “Fingerprint Matching Using Feature
Space Correlation”, Biometric Authentication.
[1]. 2014 recommended immunizations for children Springer Berlin Heidelberg, pp. 48-57.
from birth through 6 years old. [11]. Karthik Nandakumar and Anil K. Jain ,(2004),
http://www.cdc.gov/vaccines/ “Local Correlation- based Fingerprint
parents/downloads/parentver- sch-0-6yrs.pdf. Matching”, Conference proceeding of
ABSTRACT
Machine learning techniques play an important role in building predictive models by learning from Electronic
Health Records (EHR). Predictive models building from Electronic Health Records still remains as a challenge
as the clinical healthcare data is complex in nature and analysing such data is a difficult task. This paper
proposes prediction models built using random forest ensemble by using three different classifiers viz. J48, C4.5
and Naïve Bayes classifiers. The proposed random forest ensemble was used for classifying four stages of liver
cancer. Using a feature selection method the reliable features are identified and this subset serves as input for
the ensemble of classifiers. Further a majority voting mechanism is used to predict the class labels of the liver
cancer data. Experiments were conducted by varying the number of decision trees generated using the J48, C4.5
and Naïve Bayes classifiers and compared with the classification made using decision stump and Adaboost
algorithms.
Keywords : Ensemble, Feature Selection, C4.5, J48 and Random Forest
CSEIT183818 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 221-228 ]
221
L. S. Rohith Anand et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 221-228
electronic health records. Section 3 explains the constraint projection for mutli-label ensemble. They
overall architecture of proposed system. Section 4 have adopted boosting methods to construct a multi-
reports the experimental results. Section 5 concludes label ensemble to increase the generalization ability
the paper. [6].
II. RELATED WORK Jia Zhua et. al. (2015) employed multiple classifier
systems (MCS) to improve the accuracy of disease
This section discusses the existing methods for pre- detection for Type-2 Diabetes Mellitus. Multi
processing, feature extraction, boosting methods such classifier system performs worse when design is not
as adaptive boosting. Aydin et. al. (2009) investigated proper [7]. They have proposed a dynamic weighted
the various factors involved on ensemble voting scheme for multiple classifier decision
construction using a wide variety of learning combination. Yan Li et. al. (2015) stated data mining
algorithms, data sets and evaluation criteria [5]. They framework for distributed healthcare information
have provided the idea of subset selection to the level based on privacy preserving constraints [8]. Neesha
of discriminating whether the discrimination is Jothi et. al. (2015) surveyed the data mining
applicable or not at the level of classifier.Ping Li et. al. techniques and has classified the articles have
(2013) surveyed about supervisedmulti-label suggested data mining plays important role in
classification and proposed variable pairwise medical diagnosing for predicting diseases [9].
Based on the literature survey carried out a proposed system and how limitations in existing
comparative analysis of the ensemble of classification system is resolved.
methods, the data sets used for experiments by
different researchers, the number of iterations for III. PROPOSED WORK
which the experiments were conducted and the
metrics used for measuring the classification accuracy The proposed architecture is shown in Figure 1. The
are tabulated in the table given below. Electronic health records contain features like patient
id, status, age, sex, hepato, ascites, edema, billi,
From the above table the conclusion drawn is an cholestrol, albumin etc. The data considered have to
ensemble of C4.5, J48 and Naïve Bayes classifier with be clinically transformed i.e. to make it suitable for
majority voting scheme was not studied and hence further processing. The clinical transformation step is
this work focusses on building a predictive model also identified as preprocessing step.
based on building a random forest using these three
classifiers. The proposed system has been compared The unprocessed has null values, irrelevant values
with the existing decision stump and Adaboost and noisy values. These data errors would lead to
algorithms. The next section discusses about the misclassification and hence need to be clinically
transformed. The missing data in the considered
dataset is imputed with values computed using mode The proposed system with its role and advantages is
function. discussed. The experimental result analysis of the
proposed work has been discussed in the next section.
After pre-processing of data, for classifying instances
under Random forest, three subsets from the datasets IV. RESULTS AND DISCUSSION
are generated. The subset will be generated
considering three features like platelet count, alkaline Experiment Results
phosphate and cholesterol values.
The proposed system is implemented using Java and
The random forests are built using three classification Weka tool. The liver cancer dataset having 500
algorithms namely C4.5, J48 and Naïve Bayes. There instances and breast cancer dataset are used for the
are many voting mechanisms followed for ensemble experiments. The ensemble of classifiers is used for
of classifiers, here we are using majority vote method classifying these datasets on which voting is
to perform voting with different classifiers. Here the performed.
output will be the final outcome of the majority of
classifiers Pre-processing
Figure 1 shows the architecture of proposed system. In this module, pre-processing of data is done. The
dataset which we have contains null values,
irrelevant values and noisy values. As missing values
in the dataset lead to misprediction of the final result,
the dataset is pre-processed by filling missed values
on basis of mode function. The dataset without pre-
processing which contains irrelevant values is shown
below in figure 2.
Figure 1. Architecture of Proposed System The dataset is preprocessed to fill missing and
irrelevant values as shown in figure 3
Feature selection
Performance Evaluation
Subset Generation
For classifying instances under Random forest, Figure 6. Comparison of J48 Random forest classifier
generate three subsets from the datasets. Subset will at different stages
be generated considering some features as first,
middle and last stages as shown in figure 5.
ABSTRACT
The use of machines to perform different tasks is constantly increasing in society. Providing machines with
perception can lead them to perform a great variety of tasks. Machine perception requires that machines understand
about their environment. Recognizing facial emotions will thus help in this regard. We use the TensorFlow library
and the Inception model and apply transfer-learning for our dataset to retrain the model. We then identify the facial
emotions: happiness, sadness, anger, surprise, disgust and neutral.
Keywords: Deep learning, TensorFlow, Inception, Transfer Learning, Convolutional neural networks.
CSEIT195150 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 229-234 ]
229
Sairama Geetanand et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 229-234
and the ones that don‟t suit the emotion are removed. part of ImageNet Large Sale Visual Recognition
The current dataset of images we used contain 2192 challenge 2014. It can classify almost every day-to-day
images for the six emotions : Happy, Sad, Angry, objects. The architecture of the Inception is briefly
Surprise, Disgust, Neutral. described in . Inception consists of 22 layers. The
penultimate layer is called as “Bottlenecks”. The final
B. TensorFlow layer is called as softmax layer. This is the layer that
can be retrained to classify the required image group.
Tensor Flow (TF) [2] is an open source software library We retrained it to classify 6 emotions: neutral, happy,
for machine learning written in Python and C++. The sad, surprise, disgust and anger. There are 3 metrics.
main reason behind it is that TF was developed by Training accuracy describes the accuracy of the
Google Brain Team. Google has already been using TF inception model in classifying the images on which it
to improve some tasks on several products. These tasks was trained. Validation accuracy describes the accuracy
include speech recognition in Google Now, search of the model in classifying the images that are not part
features in Google Photos, and the smart reply feature of the training dataset. Cross entropy is the loss
in Inbox by Gmail. Some design decision in TF have function. It describes the error rate.
lead to this framework to be early adopted by a big
community. One of them is the ease of going from
prototype to production. There is no need to compile or
to modify the code to use it on a product. Then, the Fig.1: The 3 metrics: Train accuracy, Class entropy,
framework is not only thought as a research tool, but as Validation accuracy
a production one. Another main design aspect is that
there is no need to use different API when working on D. Implementation
CPU or GPU. Moreover, the computations can be
deployed over desktops, servers and mobile devices. A Once we are sure that inception is correctly installed
key component of the library is the data flow graph. and is working correctly we retrain the model for our
The sense of expressing mathematical computations dataset like so. Modern object recognition models have
with nodes and edges is a TF trademark. Nodes are millions of parameters and can take weeks to fully train.
usually the mathematical operations, while edges define Transfer learning is a technique that shortcuts a lot of
the input / output association between nodes. The this work by taking a fully-trained model for a set of
information travels around the graph as a tensor, a categories like ImageNet, and retrains from the existing
multidimensional array. Finally, the nodes are allocated weights for new classes. We retrained the final layer
on devices where they are executed asynchronously or from scratch, while leaving all the others untouched.
in parallel when all the resources are ready. How is it done?
V. REFERENCES
Data in educational institutions are growing progressively along these lines there is a need of progress this
tremendous data into helpful data and information utilizing data mining. Educational data mining is the zone of
science where diverse techniques are being produced for looking and investigating data and this will be
valuable for better comprehension of understudies and the settings they learned. Classification of data objects in
view of a predefined learning of the articles is a data mining and information administration procedure utilized
as a part of collection comparable data questions together. Decision Tree is a valuable and well known
classification method that inductively takes in a model from a given arrangement of data. One explanation
behind its prominence comes from the accessibility of existing calculations that can be utilized to assemble
decision trees. In this paper we will survey the different ordinarily utilized decision tree calculations which are
utilized for classification. We will likewise contemplating how these decision tree calculations are appropriate
and valuable for educational data mining and which one is ideal.
Keywords : Educational data mining (EDM), Classification, Dropout Prediction, Selection Failure
CSEIT195167 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 235-239 ]
235
Mayuri S. Dongre et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 235-239
of measurements, data perception, and computational amid this stage the tree is recursively parcelled till
displaying. every one of the data things have a place with a
similar class name. Tree pruning is done is a base up.
As we examined over the new territory of center for It is utilized to enhance the forecast and classification
the specialists is EDM. In introduce the vast majority exactness of the calculation by limiting over-fitting.
of the procedures was produced for the educational Over-fitting in decision tree calculation brings about
data mining, which foresee the disappointment and misclassification mistake. Tree pruning is less
dropout understudies. Be that as it may, a large entrusting contrasted with the tree development
portion of the examination on the use of EDM to stage as the preparation data set is filtered just once.
determine the issues of understudy disappointment In this examination we will audit Decision tree
and drop-outs has been connected principally to the calculations executed, recognize the ordinarily
particular instance of advanced education and all the utilized calculations.
more particularly to on the web or separation
instruction. Less almost no data about particular II. RELATED WORK
research on basic and optional instruction has been Decision tree is a vital strategy for both acceptance
found, and what has been discovered uses just research and data mining, which is basically utilized
measurable strategies, not DM methods. Along these for display classification and expectation. ID3
lines, there is a need to proposed Educational data calculation is the most broadly utilized calculation in
mining system that is attainable for rudimentary and the decision tree up until this point. Through
optional instruction. outlining on the fundamental thoughts of decision
tree in data mining. ID3 calculation is a forerunner of
Classification can be depicted as a regulated learning C4.5 calculation and it was produced by a data
calculation in the machine learning process. It mining software engineering scientist Ross Quinlan
relegates class marks to data objects in light of earlier in 1983.It is utilized to build a decision tree by testing
information of class which the data records have a every hub's trait of tree in top-down way. ID
place. In classification a given arrangement of data calculation performs property choice component
records is partitioned into preparing and tests data utilizing Entropy and Information Gain idea. A
sets. The preparation data set is utilized as a part of decision tree is an essential method for data mining
building the classification display, while the test data and inductive realizing, which is generally used to
record is utilized as a part of approving the model. frame classifiers and expectation models [2].
The model is then used to order and foresee new
arrangement of data records that is not the same as C4.5 is a standout amongst the most exemplary
both the preparation and test data sets. Decision tree classification calculations on data mining. Decision
calculation is a data mining enlistment methods that Trees a Decision Tree is a helpful and prevalent
recursively segments a data set of records utilizing classification procedure that inductively takes in a
profundity first voracious approach or expansiveness model from a given arrangement of data. One
initially approach until the point when every one of explanation behind its fame originates from the
the data things have a place with a specific class. The accessibility of existing calculations that can be
tree structure is utilized as a part of arranging obscure utilized to manufacture decision trees [3].
data records. Decision tree classification system is
performed in two stages: tree building and tree CART is Classification and relapse trees. It was
pruning. Tree building is done in top-down way. It is presented by Breiman in 1984. It fabricates the two
classifications and regressions trees. The classification classification and for recognition of connection
tree development via CART. It depends on paired between factors [16].
part of the characteristics. It is additionally in view of
Hunt's model of decision tree development. It The present decision tree calculations likewise
additionally can be executed serially by Breiman et al. contrast in their capacity to deal with various sorts of
It utilizes gini record part measure for choosing the data, and by a wide margin the most exceptional
part quality. Pruning is finished by utilizing a calculation of the gathering is C4.5. C4.5 depends on
segment of the preparation data set in truck. This Quinlan's prior work with ID3 and is equipped for
approach utilizes both numeric and clear cut taking care of ceaseless data, data with missing
properties for building the decision tree and has in- esteems, and even has worked in ventures for
constructed highlights that arrangement with missing rearranging the resultant decision tree. Another
qualities [11]. purpose for the ubiquity of decision trees is that they
are regularly interpretable by human analyzers. The
The fundamental distinction between CART, ID3 and structure of a decision tree gives thinking to each
C4.5 is the manner by which the parceling of data is statement of class esteem, and it is trusted that this
performed. Truck utilizes the Gini list to choose the thinking is anything but difficult to understand.
part quality, though ID3 and C4.5 utilize an
estimation of data pick up and the data pick up The classifier is tried first to group inconspicuous
proportion. data and for this reason coming about decision tree is
utilized. C4.5 calculation takes after the standards of
SLIQ is the Supervised Learning in Ques approach. It ID3 calculation. Also C5.0 calculation takes after the
was presented by Mehta et al in 1996. It is a quick, tenets of calculation that is the vast decision tree can
adaptable decision tree calculation that can be see as an arrangement of guidelines which is
executed in serial and parallel example. It does not straightforward. C5.0 calculation gives the recognize
depend on Hunt's calculation for decision tree on clamor and missing data. Issue of over fitting and
classification. It segments a preparation data set mistake pruning is tackled by the C5 calculation. In
recursively. It utilizes expansiveness first ravenous classification procedure the C5 classifier can envision
procedure that is coordinated with pre-sorting which properties are important and which are not
method amid the tree building stage [17]. applicable in classification [5]
1Department of Computer Science and Engineering, JD College of Engineering and Management, Nagpur,
Maharashtra, India
2Assistant Professor, Department of Computer Science and Engineering, JD College of Engineering and
ABSTRACT
ETS (E-Toll System) is an electronic Toll Tax collection system by which we can collect the toll charges using
RFID card detection and scanning.These RFID Cards are related to the respective vehicle holders.This project
hence, reducing common problems like traffic congestion, Pollution caused due to vehicles, Time dilemma,
requirement of labours etc. Makes it effective to collect the required amount of charge from the driver. There
will be an RFID tag implemented on every vehicle. Whenever vehicle passes through the toll plaza RFID
reader with the help of sensors will detect tag and the required amount will be deducted. Driver don’t need to
stop to pay the money ,and this RFID card is used to track & bill the vehicle owner through a payment gateway.
Keywords : Electronic Toll Collection, RFID, XAMPP, Vehicle, Tag.
CSEIT195166 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 240-243 ]
240
Ankita Bambole et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 240-243
V. DATABASE
In this report, the conclusion that came out is that, to Ankita Bambole, Shrishti Thakur, Suvidha Ramteke,
implement modern system of toll collection new Sneha Borkar, Hitesh Kasturi, Prof. M. M. Baig, "E-
technique RFID came into light. The RFID safety is Toll System Using RFID", International Journal of
key important o this project. Scientific Research in Computer Science, Engineering
This project is reliable and easy way to pay toll as and Information Technology (IJSRCSEIT), ISSN :
compared to manual one. 2456-3307, Volume 5 Issue 1, pp. 240-243, January-
February 2019.
Project is all about automated toll system which will Journal URL : http://ijsrcseit.com/CSEIT195166
overcome disadvantages of current toll system. Our
project helps driver to pass through toll without
stopping his vehicle to pay the toll tax. RFID tag on
each vehicle will be detected by RFID reader and
amount will be deducted. Open Road Tolling
System[2] and Automated Toll system[3] these are
two previously implemented projects similar to our
project. We have studied them and we are trying to
overcome disadvantages of these two. The project if
implemented by government then toll system will be
fully automated and one who is passing through toll
don’t need to wait for a long time this will also
reduce pollution, traffic and accidents.
VII. REFERENCES
ABSTRACT
GPS is in actuality the main answer for outdoor positioning, no unmistakable arrangement has so far risen for
indoor positioning notwithstanding the business hugeness. Along these lines, the principal point is to grow
ongoing indoor following framework and utilizing cell phone sensors to give dependable and precise indoor
localization. Indoor navigation is a vital empowering innovation for application, for example, finding a
gathering room in a place of business, security exit amid a crisis or focused on the retail commercial in a
shopping center. Utilizing this thought, an application can be made and by methods for that application, we are
handling indoor navigation utilizing continuous navigation. The android application gives mindfulness,
straightforwardness to discover your direction, commercial and effortlessness. To give solid indoor navigation
to business structures like shopping centers, enterprises, universities, hospitals, inns. In this paper, we give an
order and arrangement of the current indoor positioning systems and distinguish some conceivable zones of
improvements.
Keywords : Indoor Navigation, Pedestrian Navigation, GPS, Object Tracking, Location Based Services
CSEIT195165 | Received : 01 Feb 2019 | Accepted : 08 Feb 2019 | January-February -2019 [ 5 (1) : 244-250 ]
244
Meenakshi D. Dhobale et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 244-250
considered and coordinate them with the client II. LITERATURE REVIEW
prerequisites, which must be broke down and
portrayed decisively for every application. In Scientists and organizations have made considerable
addition, the estimations of the execution parameters commitments to the theme of Indoor Positioning
are not univocally definable since they thus rely systems and conditions. Indoor Positioning zone is
upon different factors and conditions. Consequently, brimming with valuable commitments. In this
it is important to locate the correct exchange off segment, we talk about the diverse indoor conditions
among execution parameters, client necessities, and and the best in the class of indoor positioning systems.
natural conditions so as to plan a modified
arrangement. A. Fixed Indoor Positioning
In an outside situation, the Global Positioning System Normal design of Fixed IPS systems is having settled
(GPS) works productively in positioning and focusing number of Base Stations (BS), which is the
on various sorts of substances. It has been utilized in fundamental PC that gets every one of the signs from
numerous outdoor applications for limiting the diverse hubs and ascertains the directions of the
individuals, autos, just as different items. Be that as it objective article utilizing the parameters sent from
may, GPS comes up short on a similar dimension of the sensor hubs. All BS are required to be introduced
effectiveness when utilized inside indoor situations. in settled areas inside the building. In addition, a
This issue is because of the presence of hindrances Wireless Sensor arranges including the sensor hubs
that can debilitate the flag of the GPS (e.g., building are required. In this structure, the sensor hubs are in
engineering, dividers) where the presence of various charge of proliferating the flag got from a portable
gear can cause a commotion in the GPS transmitted station to the base station just as doing the basic
flag. count of the goal or time of transmissions. This
conduct relies upon the structure of the framework.
Pedersen [1] proposed a miniaturized scale The third principle segment of the settled indoor
positioning procedure that ought to be actualized positioning engineering is the cell phones or labels
inside the indoor condition so as to position and track conveyed by individuals or joined to target objects.
objects. He expressed that this procedure would fill in These labels give a novel recognizable proof to each
as a trade for the GPS positioning framework. item or individual. Along these lines, blunders will be
Furthermore, Fhelelboom [2] found that a remote restricted. Next, we list every remote innovation
neighbourhood (WLAN) can be utilized inside any with the systems, which are produced dependent on
indoor condition to position objects. this innovation. Elements of IPS are talked about in
[3].
In this paper, we audit the distinctive positioning
conditions, the diverse systems connected for every a. Infrared Positioning Systems
condition and the calculations utilized inside every
framework. We indicate two situations for These systems utilize infrared flags so as to transmit
positioning individuals and articles inside an indoor signals from sensor hubs to the BS. A standout
domain. Every one of these situations has its very amongst the most well-known infrared positioning
own difficulties, which specialists attempted in the systems is the dynamic identifications created by
past to moderate by proposing a few arrangements AT&T Cambridge [4]. In this framework, clients
throughout the most recent ten years. convey an ID card furnished with an infrared LED.
The infrared LED sends a special code at regular and its directions. Cricket utilizes the Time
intervals. Moreover, there are infrared sensors Difference of Arrivals (TDOA) credit so as to figure
introduced on a roof and if the IR identification is the directions of the objective item. That is by
inside six meters, the sensor can peruse the code. The ascertaining the contrast between the Radio
BS gets the information from the IR sensors Frequency flag Time Arrival and the ultrasonic flag
occasionally. At last, the BS can assemble a guide of Time Arrival. The Difference of the season of the
each identification area utilizing the data recovered landing of the two signs is determined to utilize
from the sensors. Dynamic Badges have for the most conditions since the Radio Frequency is a lot quicker
part four directions, WITH, LOOK, NOTIFY, and than sound. At that point, the TDOA is equivalent to
HISTORY, every one of which gives an alternate the separation the flag went over the speed of the flag.
capacity. For instance, WITH demonstrates the The Cricket framework is professed to give a
identifications that exists in the sensor region, LOOK precision of up to 2 cm. Be that as it may, when
is utilized to search for an identification by a sensor, confronting NLOS blunder, the Cricket framework
NOTIFY is utilized to tell the BS when the does not give an exact computation of the facilitate.
identification is found and HISTORY demonstrates
the identifications positions over a specific timeframe. Popa [8] proposes joining Cricket with Inertial
Navigation sensors. This blend gives a superior
b. Ultrasonic Positioning Systems precision and relief of NLOS blunder as guaranteed
by Popa. That is on the grounds that Inertial
Ultrasonic reference points are utilized more Navigation sensors have a more extensive inclusion
frequently than infrared innovation. Ultrasonic and their flag isn't influenced by the NLOS mistake.
systems give increasingly exact positions to objects.
Ultrasonic based systems are more exact than Radio c. RF Positioning Systems
Frequency based systems, as we will find in the talk
area. Nevertheless, Ultrasonic systems need a settled The for the most part utilized remote innovation is
structure of the framework [5]. Radio Frequency (RF). This is because of the minimal
effort and the high scope of inclusion of the systems
Instances of the systems created dependent on created dependent on RF innovation. Some RF based
Ultrasonic innovation are the Active Bats [6] created systems that we will examine in this paper are
by AT&T Cambridge as well. This framework has a RADAR, Spot-On, LANDMARC, and UWB systems.
comparative structure to the dynamic identifications.
LANDMARC framework [9] depends on Radio
The Crickets framework [7] created by the Frequency signs and RFID labels. LANDMARC
Massachusetts Institute of Technology (MIT) is decreases the expense of utilizing RFID per users by
another outstanding ultrasonic based indoor lessening the quantity of per users and utilizing
positioning framework. The Cricket framework has reference labels. These reference labels have a well-
two kinds of hubs, signals, and audience members. known area and they transmit to the per users the
Reference points' areas are settled and they are area of the objective items. LANDMARC is a decent
connected to the roof while the audience members framework however its exactness is 1-2 meters.
are appended to the objective items and individuals.
Guides send intermittent data to the BS containing its Guang [10] gave a component to enhance the
ID, scope of inclusion or physical space related to it execution and exactness of LANDMARC. This
and estimation the bearing of development. The Project onto way, (iii) Find the objective position,
constraint in this framework is that the sensor on the and (iv) Compute the direction point.
protective cap must be coordinated to the bearing of
the person on foot's development. Woodman [19] proposed a Bat framework. Bat
framework utilizes a foot-mounted inertial unit for
Another methodology given by Robertson [17], he Pedestrian Dead Reckoning and a Wifi innovation to
proposes utilizing foot-mounted inertial sensors position people on foot inside a multi-story building.
which give the person on foot dead retribution. He Bat framework utilizes molecule channel calculation
gave a framework called FootSlam. This framework which is Bayesian channels. Woodman proposed an
utilizes a foot mounted Inertial Measurement Unit adjustment calculation to address the float in inertial
(IMU). In addition, it assembles a 2D guide of the estimations with the person on foot development.
working with no earlier information of the structure Woodman's calculation helps in assessing the
of the building. The learning of all client expectation situation of the person on foot at time k when
assists with shaping the guide of the building and knowing his situation at time k-1.
managing the client through it. Notwithstanding, the
more occasions places are visited inside the building Shao [20] talks about a relative region; he executed
the better data or guide worked in respects of that self-ruling people on foot in a 3D domain. He
put. Recreation results demonstrate a precision of 1-2 demonstrated how his self-sufficient people on foot
meters. associate inside nature and how they fabricate maps
of the earth. He characterized the maps as
Fischer [18] recommends utilizing Ultrasound Topological guide, recognition guide and way outline.
reference points to give better precision and less The topological guide speaks to the ecological
heading mistakes in Pedestrian Dead Reckoning. His districts and the bolts speak to the openness between
methodology joins Ultrasonic and PDR. The PDR them. The discernment maps include stationary
calculation contains two sorts of stages inside the articles, which are the nearby items. Where the
means, a positioning stage, and a swing stage. Fischer versatile articles are the worldwide items. At long last,
saw there are likewise two kinds of mistakes that can the way maps can be either framework, which is for
happen inside PDR, these blunders are the heading short way mapping (e.g., seat) or Quadtree which are
blunder and the separation blunder. As examined for long way arranging. Shao's maps technique for his
before, the heading is the bearing of the development; independent people on foot may be extremely
in this way, the heading blunder is the mistake valuable whenever utilized for walker direction
happens in the appeared of the walker. The through indoor positioning.
separation blunder as expressed by Fischer has fewer
events. Fischer's framework is connected primarily to III.CONCLUSION
the safeguard group specialist on call. The framework
functions as pursues; the specialists on call put the In this paper, we have surveyed indoor positioning
ultrasonic sensors on their way as they continue systems, the standards of positioning and calculations
inside the building. PDR framework is utilized to get utilized in different conditions. We talked about the
the area of the people on foot. Be that as it may, difficulties that can be confronted when planning an
ultrasonic sensors influence the modifications so as to indoor positioning framework, expounded on various
lessen the heading mistake. His calculation has four arrangements proposed to beat these difficulties and
stages (I) Estimate the individual's position, (ii) given a conceivable zone of utilization and
improvement inside indoor positioning systems. We Workshop on Software Technologies for Future
saw Indoor Positioning is a tremendous zone with Embedded Systems.
numerous applications and numerous enhancements [9] Lionel M.NI, Yunhao Liu, Iu Cho Lau,
to be conveyed. As referenced before in this paper, Abhıshek P. Patil; LANDMARC: Indoor
explores inside indoor positioning could be Location Sensing Using Active RFID
increasingly valuable whenever conveyed for people [10] Guang-yao Jin, Xiao-yi Lu, Myong-Soon Park.
on foot positioning since the exactness came to isn't 2006. An Indoor Location Mechanism Using
as precise as the precision came to in settled indoor Active RFID. Proceedings of the IEEE
positioning. International Conference on Sensor Networks,
Ubiquitous and Trustworthy Computing.
IV.REFERENCES [11] Lijan Jiang, Lim Nam Hoe, Lay Leong Loon.
2010. Integrated UWB and GPS Location
[1] Solrun Furuholt Pedersen, "Micro Positioning". Sensing System In Hospital Environment. IEEE
Master Thesis. ITEM NTNU, Jun 15, 2014. International Conference of Sensor Networks.
[2] Fhelelboom, Zuher. "Equipment tracking and [12] Tilch, S. Mautz, R. 2010. Current investigations
security systems for hospitals". Master Thesis at the ETH Zurich in optical indoor
Universitiy Teknology Malaysia. May, 2017. positioning. IEEE Positioning Navigation and
[3] I. Guvenc, C.-C. Chong, “A Survey on TOA Communication (WPNC) conference.
Based WirelessLocalization and NLOS [13] S. Beauregard and H. Haas. Pedestrian dead
Mitigation Techniques”, IEEE Communications reckoning: A basis for personal positioning. In
Surveys and Tutorials, vol. 11, no. 3, 2009, Proceedings of the 3rd Workshop on
Pages: 107-124. Positioning, Navigation and Communication,
[4] R.Want, A.Hopper, V.Falcao and J.Gibbons; 2006.
The active Badge location system, ACM [14] V. Fox, J. Hightower, L. Lin, D. Schulz, and G.
Transactions on Information systems Vol. 40, Borriello, “Bayesian filtering for location
No. 1, pp. 91-102, January 2012. estimation,” IEEE Pervasive Computing, vol. 2,
[5] Hazas, M., Hopper, A; A Novel Broadband no. 3, pp. 24–33, 2003.
Ultrasonic Location System for Improved [15] Matthies, L. H., Szeliski, R., and Kanade, T.
Indoor Positioning, IEEE Transactions on (1989). Kalman filter-based algorithms for
mobile Computing, Vol. 5, No. 5, May 2006. estimating depth from image sequences.
[6] Michael Popa, Junaid Ansari, Janne Riihij¨arvi, International Journal of Computer Vision, 3,
and Petri M¨ah¨onen. 2008. Combining 209–236.
Cricket System and Inertial Navigation for [16] Beauregard, S., (2006). A Helmet-Mounted
Indoor Human Tracking. WCNC proceedings. Pedestrian Dead Reckoning System.
[7] Priyantha, N. B; The cricket indoor location Proceedings of IFAWC2006, TZI University
system: PhD Thesis, Massachusetts Institute of Bremen, Germany, pp. 79-89
Technology. 199 p, June 2005. [17] Robertson, P., Angermann, M, Krach, B.,
[8] Fukuju, Y.; Minami, M.; Morikawa, H.; Simultaneous Localization and Mapping for
Aoyama, T.; Dolphin. 2003. An autonomous Pedestrians using only Foot-Mounted Inertial
indoor positioning system in ubiquitous Sensors. In Proc. Ubi Comp 2009, ACM (2009)
computing environment, in Proc of the IEEE 93-96.
ABSTRACT
Gaining information and explicit job skills have turned into the fundamental destinations for understudies in
the colleges. Learning is important to settle on educated choices, particularly, in a basic circumstance. Learning
and information the executives in any organization are pivotal to give it an aggressive edge in the present
testing and globalized condition. In this paper we present the plan of different on-line recruitment framework,
that enables businesses to post their job advertisements, which job searcher can allude to, when searching for
jobs. This job portal can catch job prerequisites dependent on industry needs.
Keywords: Knowledge Sharing, Web Portal, Job Portal, Online Recruitment.
CSEIT195175 | Received : 01 Feb 2019 | Accepted : 09 Feb 2019 | January-February - 2019 [ 5 (1) : 251-255 ]
251
Aafreen Khan et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 251-255
educational modules vitae (CV) of candidates, and different arrangements they need to make. Securing
contact the jobseekers who are qualified, on the web. all accessible position opening is a principle venture
Today, the Internet has turned out to be one of the at in the job-chasing process.
key strategies for landing data identifying with
position opening. Substantial foundations, similar to The Internet is presently an incredible asset that
colleges incorporate data on vocation prospects in jobseekers can utilize. Today, numerous locales
their sites, which are likewise connected to publicize job positions to be filled by individuals with
recruitment locales. specific skills in different fields. The Internet assumes
an essential job in the region of human asset
II. LITERATURE REVIEW arranging and advancement. Most arranging and
advancement organizations are currently utilizing PC
A. Job Procurement: Old and New Ways innovation and the Internet for staff recruitment. It
Job looking for more often than not includes ought to be noticed that despite the fact that the
distinctive approaches to search for jobs, for example, Internet has encouraged the procedure of job chasing,
through close to home contacts, direct phone calls to it has not supplanted the conventional techniques,
businesses, job organization office, filtering on the totally.
web job postings, and so on [3]. Prior to the Internet,
turned out to be generally utilizes as a strategy for B. Significance of Job Portals
looking for jobs; jobseekers invested a heap of energy
utilizing different strategies to search for job In the period of innovation, the Internet has
openings. Today, jobseekers utilize online techniques, turned into the principle wellspring of data for
which are extremely advantageous and spare a great jobseekers. Extensive partnerships, foundations, and
deal of time. Galanaki [5] records the accompanying colleges incorporate data on vocation prospects on
strategies to be the conventional (old) routes for their sites. As per a review, 70% of the workforce
recruitment: utilizes sites or portals on the Internet to look for jobs
in France. These sites or portals give an internet
• Employment recruitment offices searcher to get to data on job openings [7].
• Job fairs
• Advertising in the broad communications, for Sulaiman and Burke [8] found that most businesses
example, papers are quick to utilize online recruitment strategies for
• Advertisement in TV and radio getting staff. He referenced that online recruitment
• Management Consultants strategies can recognize the best candidates. That is
• Existing worker contacts the motivation behind why progressively created
• Schools universities or colleges understudies nations, for example, Malaysia have begun to utilize
administrations office online job portal as one of the vital method to enlist
• Workers or expert referrals individuals to fill job opening. An examination done
in 2006, found that 21% of web clients in the EU
These old jobs looking for techniques are utilized the web to look for jobs or to send job
excessively moderate, distressing, testing and applications. In 2007, this had expanded to 67% for
furthermore need quality [6]. What's more, the jobless individuals [5].
candidates need to consider the expense and the
measure of time to get the data they need, and
Most organizations distribute their job opening on individuals approach the job data from anywhere on
their site, or utilize online jobsites. These techniques the planet, while with the paper, data is spread at
result in incredible sparing in expenses. Mochol and nearby dimension. One key part of job portal is the
Nixon [9] expressed that the utilization of semantic expense. Organizations spend less to distribute or
web innovation gives advertise straightforwardness, publicize job opportunities on the portals or sites,
higher speed of acquisition yet decreased exchange when contrasted with the utilization of other media,
cost. Today, the Internet is utilized for an expansive for example, paper or job fairs. Besides, online
number of business exchanges. Individuals observe recruitment is quick, and spares time. Once the
the Internet to be a compelling specialized apparatus. managers transfer the job opening on the portal, the
In a report in 2005, it was discovered that 90% of jobseekers can see it and send in their resume.
jobseekers in Germany utilize the web to search for
jobs. A purpose behind this high rate of Internet is Along these lines, cost and efficient are two
that candidates are youthful and very qualified and noteworthy points of interest of job portals. Ganalaki
utilize the web a great deal, and numerous [5], refered to in Rosita and Nadianatra (2007),
organizations distributed their job openings on the expressed that the Internet is an instrument without
web and through their portal. fringes, and is an amazing strategy to come to an
around the world gathering of people.
Job portals are the beginning stage of jobseekers
while scanning for jobs. In this way, some job portals C. Highlights of Job Portals
charge businesses high expenses to distribute data on
job opportunities. Regardless of this, numerous One of the approaches to enhance work portability
businesses still keep on publicizing or distribute data is to give online job offer administrations. Online job
on job openings hands on portal, however portals can help jobseekers as they contain all
constrained to minimize expenses. Numerous required data about accessible opening in a solitary
businesses still trust that a jobseeker will visit job point. Such portals upgrade effectiveness in job
portals while hunting down job opening [10]. recruitment as candidates can coordinate their
capabilities and skills to the prerequisites of bosses.
A great job portal can likewise bolster learning
sharing among the individuals. The quantity of For the most part, looking for jobs on the web
online job portals keeps on expanding. It is trusted includes a procedure of data gathering in light of the
that seventy-five percent of individuals who are fact that the jobseeker accumulates data contained in
looking for jobs, utilize the web and on the web the job portals, amid the inquiry [11]. A great job
portals. Gangle [4] expressed that online recruitment portal imparts data and encounters to its
has the accompanying points of interest: bosses can individuals/clients. This spare time and endeavours
distinguish an extensive number of qualified job and better choices can be made [12]. Job openings
searchers and get their data effectively. It implies that necessities can be coordinated to a candidate's
organizations or organizations can broaden the capability and skills. Along these lines, job portals
inquiry area, subsequently, they have better prospect return the exact matches as well as return the most
of choosing the most qualified applicants. Web gives comparable match. The individuals from the
managers an approach to draw in a higher number of European Commission (EC) expressed that online job
applicants, particularly, the individuals who satisfy portals ought to have very comparable attributes. The
the job necessities. With online recruitment, attributes included are:
• An online accessible database of positions for job portals to have the necessary information for the
searcher; offices to send cvs to the site; students. Fig. 1 shows the schema of the proposed job
• Email alarms of jobs which coordinate the clients web portal, in illustrating the relationship between
profile; the students and the faculty, and the unemployed
• Additional guidance, for instance, about working graduates and the potential employers.
in remote nations or profession direction;
• The capacity to oversee job applications; Nowadays, most modern universities web portals
• Businesses must be able to distribute and oversee provide information and services to achieve various
job positions, look through the CV database; goals and to improve the quality of education with
• Have online contact with potential jobseekers. these services. Based on information from the
literature review, as well as the students’
III.Discussion and Analysis requirements identified from the survey, a job portal
should be develop. The portal should be a knowledge
Analysis of the data collected from the survey sharing system for the students to create a better
indicates that most of students are not satisfied with academic environment for their studies.
the current faculty portal. The respondents said that
they have problem to get the needed information IV.CONCLUSION
when they are looking for a job. In addition, there is
not enough information and resources related to help In perspective of the prior discoveries, the invalid
them. The students looking for a proper Job want a speculation expressing that there is no huge contrast
knowledge sharing system to get such information in the respondents' assessment on the viability of the
and help them in their decisions. created Online Job Recruitment System regarding
execution, dependability, security, and cost-adequacy
Base the development of the new web portal should was acknowledged. It is inferred that the created
on the feedback from the survey and the programming was successful in choosing qualified
requirements of the students. In recent years, the candidates inside a shorter timeframe. Subsequently,
structure of university portals has changed from static it would turn into a noteworthy supporter of the
information to dynamic and transaction mode. It is value contract. It is additionally inferred that
very important for the faculty to provide the students Performance, Reliability, Security, and Cost-
with online access to different services and adequacy could be used as criteria in assessing web
transactions such as online enrolment, course support recruitment programming.
and job information. Suresh Ram stated that 70% of
students, who finished their studies at tertiary level In light of the ends drawn, it is prescribed that the
education, could not find a job. This shows how product is actualized in the organization. After
important it is to have access to the right information execution, it is recommended that the effect of the
to find a job. It is important for the universities that framework on the recruitment procedures is resolved
provide information to jobless graduates on the jobs and that the adjustments in the recruitment forms
or career opportunities. with the presentation of the online recruitment
programming be examined. It is proposed that
Sulaimun and Burke [8] emphasized that it is reviews on the client experience, reception or non-
necessary for the universities to pay more attention selection of the product, and mistakes submitted in
to their knowledge management system or web
utilizing the product be directed and that the [8] N. Sulaiman and M. Burke, “A case analysis of
Usability model of FURPS be surveyed. knowledge sharing implementation and job
searching in Malaysia,” International Journal of
As far as an upgrade of the product, it is Information Management, 2009.
unequivocally prescribed that an online test is joined [9] M. Mochol, H. Wache, and L. Nixon,
in the recruitment and that additional security “Improving the accuracy of job search with
highlights, for example, the dimension of access semantic techniques,” in Proc. Business
grouped by the situation in the organization likewise Information Systems, 10th International Conf.,
be fused in the product. BIS 2007, Poznan, Poland, April 25-27, 2007,
Springer, pp. 301-313.
V. REFERENCES [10] M. Mansourvar, Development of a Job Web
Portal to Capture Industry’s Needs, 2011.
[1] J. Dorn and T. Naz, “Integration of Job portals [11] A. Weber and H. Mahringer, “Choice and
by Meta-search,” in Proc. 3rd International success of job search methods,” Empirical
Conf. on Interoperability for Enterprise Economics, vol. 35, no. 1, pp. 153-178, 2008.
Software and Applications, Funchal, Portugal, [12] M. Mansourvar and N. B. M. Yasin,
2007, pp. 401-412. “Knowledge portal: a tool to capture university
[2] S. Bsiri, M. Geierhos, and C. Ringlstetter, requirements,” in Proc. 2011 International
“Structuring job search via local grammars,” Conf. on Graphic and Image Processing,
Advances in Natural Language Processing and International Society for Optics and Photonics,
Applications, pp. 201, 2008. October 2011, pp. 82850F-82850F.
[3] M. Mansourvar and N. Y. Mohd, “Web portal
as a knowledge management system in the Cite this article as :
universities,” World Academy of Science,
Engineering and Technology, vol. 70, pp. 968- Aafreen Khan, Anirudha Wankhade, Priyanka
974, 2010. Pakhide, Sagar Meshram, Prof. Sonali Zunke, "A
[4] M. Gangle, “The only way is up? Employment Review Study on Online Job Portal", International
protection and job mobility among recent Journal of Scientific Research in Computer Science,
entrants to European labour markets,” Engineering and Information Technology
European Sociological Review, vol. 19, pp. 429, (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
2007. 251-255, January-February 2019.
[5] E. Galanki, “The decision to recruit online: a
descriptive study,” Career Development
International, vol. 7, pp. 243-251, 2002.
[6] S. Mauno, U. Kinnunen, and M. Ruokolainen,
“Job demands and resources as antecedents of
work engagement: A longitudinal study,”
Journal of Vocational Behavior, vol. 70, 2007,
pp. 149-171.
[7] A. Doyle, Internet Your Way to a New Job:
How to Really Find a Job Online, Happy about,
2008.
This main aim of this project to provide voice-based navigation system for blind people using voice recognition
module and it is intended to provide overall measures object detection and real time assistance via Global
Positioning System (GPS) and ultrasonic sensors. This project aims at the development of an Electronic
Travelling Aid (ETA) kit to help the blind people to find obstacle free path. This ETA is fixed to the stick of the
blind people. When the object is detected near to the blinds stick it alerts them with the help of vibratory
circuit. The blind person will give the destination’s name as the input to voice recognition module. GPS module
continuously receives the latitude and longitude of the current location. GPS compares it with the destination’s
latitude and longitude. The blind person receives the pronounced directions which he needs to follow to reach
his destination.
Keywords : Global Positioning System, Electronic Travelling Aid, Navigation System, Latitude and Longitude.
CSEIT195158 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 256-259 ]
256
N. Vijayalakshmi, K. Kiruthika Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 256-259
reliable. Another major factor is the cost of such also in case of an emergency, the location of the blind
products. Since they are already paying for person can be sent to a relative or friend via SMS.
treatments or other nursing cares, the price of the
product should be in the range that is reasonable. II. METHODOLOGY
Other feature of these products should be the
durability. The users might not be able to charge the
system. So, appropriate measure should be taken for
it.
high costs and relatively poor levels of user sensors. Information and Automation (ICIA),
satisfaction associated with existing electronic 2010 IEEE International Conference on June
systems. So we tried to develop a low cost and user 2010
friendly system for blind people with greatest [7]. Baranski, P.; Polanczyk, M.; Strumillo, P.; A
possible accuracy. This method offers innovative remote guidance system for the blind. e-Health
solutions in order to replace the conventional Networking Applications and Services
methods of guiding visually impaired person. Also, it (Healthcom), 2010 12th IEEE International
can be easily applied anywhere where it can handle Conference .
places like mall, airports etc. In this project we have
used ARM processor which contains more memory Cite this article as :
and its operating speed is high. We guide or navigate
the blind people using voice. N. Vijayalakshmi, K. Kiruthika, "Voice Based
Navigation System for the Blind People",
V. REFERENCES International Journal of Scientific Research in
Computer Science, Engineering and Information
[1]. Amit Kumar,Rusha Patra, M. Manjunatha, J. Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
Mukhopadhyay and A. K. Majumdar An 5 Issue 1, pp. 256-259, January-February 2019.
electronic travel aid for navigation of visually Available at doi :
impaired Communication Systems and https://doi.org/10.32628/CSEIT195158
Networks (COMSNETS), 2011 Third Journal URL : http://ijsrcseit.com/CSEIT195158
International conference on 4-8 jan 2011.
[2]. Shamsi, M.A.; Al-Qutayri, M.; Jeedella, J.; Blind
assistant navigation system Biomedical
Engineering (MECBME), 2011 1st Middle East
Conference on 21-24 Feb. 2011
[3]. Calder, David J.; Curtin .An obstacle signaling
system for the blind ,Digital Ecosystems and
Technologies Conference (DEST), 2011
Proceedings of the 5th IEEE International
Conference on 30 June 2011
[4]. Dunai, L.; Fajarnes, G.P.; Praderas, V.S.; Garcia,
B.D.; Lengua,I.L.; Real-time Assistance
prototype- a new Navigation Aid for Blind
people, IECON 2010 - 36th Annual Conference
on IEEE Industrial Electronics Society
[5]. Shang Wenqin; Jiang Wei; Chu Jian; A machine
vision based navigation system for the blind
China Computer Science and Automation
Engineering (CSAE), 2011 IEEE International
Conference on 10-12 June 2011
[6]. Hashino, S.; Ghurchian, R.; A blind guidance
system for street crossings based on ultrasonic
ABSTRACT
Security is required to transmit confidential information over the network. Security is also demanding in wide
range of applications. Cryptographic algorithms play a vital role in providing the data security against
malicious attacks. Massage communication over internet facing problems like data security, copyright control,
data size capacity, authentication etc. A new idea is to apply reversible data encoding algorithms images by
wishing to remove the embedded data after data receiving with the help of image pixel color value.
Keywords: Network Security, Cryptographic Algorithms, Image Pixel, Data Encryption, Public-Key
Cryptosystem, Encryption, Decryption
CSEIT195161 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 260-265 ]
260
Vijay Gokul Koli, Raj Kumar Paul Int J Sci Res CSE & IT. January-February-2019; 5(1) : 260-265
requires pair of key for communicating with any side, the customer representatives only see the
number of other parties. It is beauty of this names list.
scheme. Once someone obtains a key pair, he can
When operation is needed, software installed on
communicate with anyone else. They have done
the customer representatives’ computer or cell
implementation of RSA algorithm efficiently using
phone were decrypt the data and send them to the
two public key pairs and using some mathematical
call center directly without touching the
logic rather than sending the e value directly as a
representatives.
public key.
compromises the security of the systems. Law of In RSA computation is lengthy and some less
physics is used in Quantum computing for secure. This paper[5] present a new algorithm to
communication. In cryptography and key presents the modified form of new RSA algorithm
distribution quantum theorems and principles are in order to boost up the speed of the
applied. In this paper[3], new model for quantum implementation of RSA algorithm during data
key distribution are introducing among three exchange across the network world. In this method
parties or more where there is a trusted center that keys are stored offline before the process start.
providing the necessary secret information of Thus, the speed of process increased as compared
clients to securely communicate to each other. to original RSA method.
To compare the bases, classical channel is used by Enhancing the Security of The RSA Cryptosystem
quantum key distribution protocols BB84, B92 and
ERP.
This paper [6] increases the security of the RSA
Loop-based RSA Key Generation Algorithm using algorithm, this enhancement use randomized
String Identity parameter to change every encrypted message
block such that even if the same message is sent
more than once the encrypted message block is look
This paper [4] propose i-RSA algorithm that is focus
different. This paper suggests that how to use
on key generation algorithm. user identity is
randomized parameters in the encrypt the data to
Enhancement of this algorithm. it can be used as a
make RSA. By this enhancement it makes the RSA
public key, such as email address. The key
semantically more secure. Means an attacker cannot
certificates are used to authenticate the user's key
distinguish two encryptions from each other, even
pair. So certificate does work as important role in
if the attacker knows (or has chosen) the
secure communication but to issue the certificate is
corresponding plaintexts (original message). In this
a big challenge and it also increases the overhead
Work comparison between the modified RSA and
due to the increasing cost. For public key Previous
the basic RSA version introduced. Enhancement
algorithm has successful used email identity, but all
can easily be implemented on this Work. Also other
type of email can’t be used as a public key. So the
attacks are presented by this paper, also how to
propose i-RSA algorithm that can produces 66.6%
speed up the RSA encryption and decryption
compared to previous algorithm (46.67%) email can
process is an important issue for the RSA
be a string public key. in key generation looping
implementation.
process is the main differences between i- RSA and
previous algorithm, to get new value of p and q Here, RSA is more secure and it may be more
parameter, when value of k is equal to 1, then stronger by applying some techniques. Here They
looping process can stop, and the email can be a have seen that all authors are talking about many
public key. Detail explanations of i-RSA algorithm methods but no one is talking about image pixel for
in propose algorithm section. security purpose. So theyF can add image pixel
technique to make more powerful RSA
algorithm.
Modified RSA Cryptosystem Based on Offline
Storage and Prime Number
Encryption {
If(i==P_id)
After generating public key, before sharing to other Px=im(p_id);
people’s sender can be use an image that already
}
have in receiver side. First of all select an image that
already have all receivers then select any pixel color (11) E=Px+e.
value of that image. Then add that color value with (12) Public key to transmit = {E,P_id,n}.
e and save in E. now it doesn’t need to share actual (13) Message (M) Cipher text- C = M^e mod n.
value of e. now it share E and position of that pixel Decryption
in image.
60
IV. CONCLUSION
Time in Seconds
50
40
V. REFERENCES
ABSTRACT
The risking components of diabetic retinopathy (DR) were examined broadly in the past investigations, yet it
stays obscure which chance variables were more connected with the DR than others. On the off chance that we
can distinguish the DR related hazard factors all the more precisely, we would then be able to practice early
avoidance systems for diabetic retinopathy in the most high-chance populace. The motivation behind this
examination to study and consider the different predicting mechanisms for the DR in diabetes mellitus utilizing
data mining techniques including the support vector machines, decision trees, artificial neural networks, and
logistic regressions.
Keywords : Data Mining, Artificial neural fuzzy interference system, K-Nearest-Neighbor (KNN), Machine
Learning (ML), Support Vector Machines, Decision Trees
CSEIT195179 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 266-272 ]
266
Kajal Sanjay Kothare, Prof. Kalpana Malpe Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 266-272
retinopathy is the most regular reason for new vision with NPDR. However, when they created
instances of visual deficiency among grown-ups PDR with vitreous drain, they lost the vision all of a
matured 20– 74 years [2]. Around 21% of the sudden. Prior to vision misfortune, photocoagulation
recently determined patients to have type 2 diabetes can evade drain of PDR and diminished vision
(T2D) were likewise found to have co-bleak state of misfortune. In spite of the fact that instruction of
DR, though 60% of the patients with a ceaseless intricacy of T2D in our consideration unit is normal
history of 20 years of T2D were determined to have routine training for patients with T2D, the absence of
diabetic retinopathy [3]. About 20– 40% of patients knowledge is by all accounts the significant reason.
in T2D had diabetic retinopathy and 8% of patients
in T2D had locate compromising diabetic retinopathy One of the significant hazard factors inspected in a
(STDR) in United States [4]. In 2009, Prevalence of pooled examination from populace based
the diabetic retinopathy and poor vision/visual investigations around the globe was the long span of
impairment in Taiwanese patients with T2D were diabetes [8]. Other hazard factors distinguished in
8.91 and 0.62%, separately [5]. this investigation were abnormal state haemoglobin
A1C (HbA1C) and hypertension [8]. As indicated by
There are a few medicines for DR., To begin with, the UKPDS, the rate of diabetic retinopathy is
it is critical to immediately allude patients with any intently connected with the expanding length of T2D,
dimension of macular edema, extreme NPDR, or any and lower dimension of HbA1c can diminish the
PDR to an ophthalmologist who is proficient and danger of experiencing DR in these patients [9]. In
experienced in the administration and treatment of any case, it was seen in clinical practice that a few
diabetic retinopathy [2]. What's more, laser patients with long haul controlled HbA1c levels still
photocoagulation ought to be considered for eyes have dangers experiencing diabetic retinopathy in
with clinically critical macular edema, especially T2D [10]. This proposes the HbA1C level isn't the
when the focal point of the macula is included or main significant hazard factor, and different factors,
unavoidably undermined [6]. Hostile to vascular for example, hypertension, high blood glucose, and
endothelial development factor (against VEGF) length of diabetes may have conceivably played
treatment is additionally demonstrated for diabetic incomplete jobs in the improvement of diabetic
macular edema [2]. retinopathy in T2D. There were realized hazard
components of diabetic retinopathy, for example,
To limit the chances of visual misfortune or the long span of diabetes, poor glycaemic control,
new beginning of visual deficiency of diabetic hypertension, and hyperlipidaemia.
retinopathy, current rules of Taiwan diabetic
association proposes that the screening of fundus In the end, the most well-known hazard factor found
examination in patients with T2D should be by each bit of observational the proof is the term of
performed every year, and performed all the more diabetes. Poor glycaemic control drives a high fasting
much of the time in patients with diabetic glucose level, high, postprandial glucose, and high
retinopathy. It is noticed that the screening rate was HbA1C. Every one of the three previously mentioned
low, for there was just 28.9% of patients with T2D parameters advise diverse parts of diabetes and should
had eye fundus examination in Taiwan in 2009 [7]. all be considered.
One conceivable clarification for the low screening
rate might be that patients with T2D couldn't care
less about retinopathy when they have an ordinary
S.Sagar Imambi and T.Sudha [21] have connected Calculated relapse estimates the connection
content mining classification systems on the between the absolute ward variable and at least one
accessible clinical information to anticipate the autonomous factors by assessing probabilities. The
hazard factor of DR. They demonstrated that first expect a calculated capacity and the second a
moderately brief length of the case the executives standard typical dissemination work. The chances of
initiated before the beginning of clinically the reliant variable measuring up to a case are
recognizable retinopathy, essentially diminish the proportional to the exponential capacity of the direct
danger of creating retinopathy in patients with sort 2 relapse articulation. This shows how the rationale
diabetes. The objective was to build up an adaptable fills in as a connection work between the likelihood
and hearty clinical report classification framework and the direct relapse articulation. We additionally
that could be connected in extensive doctor's facility joined stepwise choice to choose discriminative
settings to encourage the doctors, with the goal that highlights in strategic relapse.
they can direct the patients effectively and diminish
the vision misfortune. SVM classifier is a machine learning calculation
proposed by Vapnik dependent on basic hazard
Hayrettin Evirgen, Menduh Çerkezi [22], have minimization rule of insights learning hypothesis. It
utilized Naive Bayes classification calculation to very well may be utilized to take care of classification
examine the genuine dataset so as to assembled and relapse issues. As a forecast of diabetic
prescient framework for DR. A sum of 385 diabetes retinopathy is a paired classification issue, SVM
patients' information was utilized to prepare the would be helpful for our motivation. During the time
expectation framework. With cross-approval creators spent model improvement, we utilize outspread
demonstrated that gullible Bayes calculation can be premise work (RBF) as the bit work in SVM.
utilized for diabetic retinopathy forecast with an
enhanced precision of 89%. An artificial neural Network is a group of
measurable learning models propelled by organic
III. MACHINE LEARNING ALGORITHMS TO neural systems and are utilized to evaluate or inexact
PREDICT DIABETIC RETINOPATHY capacities that can rely on countless and are
commonly obscure. ANNs are for the most part
DR expectation can be viewed as a multi-class exhibited as frameworks of interconnected neurons
classification issue. We consolidated choice trees, which send messages to one another. Positioned
calculated relapse, fake neural systems, and bolster forecast execution of choice trees dependent on 2-
vector machines to anticipate DR. The SAS year, 10-year, and a 15-year term of diabetes be
Enterprise Miner adaptation 12.1 programming of tuned dependent on experience, making neural nets
was utilized to produce expectation models. versatile to sources of info and fit for learning.
diabetic retinopathy from highlight extraction. In angiographic and other retinal characteristics at
this paper condensed perspective of different baseline: ETDRS report no. 19", Early treatment
information mining methods is displayed which diabetic retinopathy study research group. Arch
demonstrates that KNN and SVM have given the best Ophthalmol. 1995; 113(9):1144–55.
correctnesses. This survey paper can go about as an [7] Chang TJ, Jiang YD, Chang CH, Chung CH, Yu
asset for the future scientists for the forecast of NC, Chuang LM. Accountability, utilization and
diabetic retinopathy utilizing information mining providers for diabetes management in Taiwan,
procedures. This will likewise be helpful for scientists 2000–2009: an analysis of the National Health
to get a diagram of this zone so as to grow Insurance database. J Formos Med Assoc.
increasingly proficient calculations. 2012;111(11):605–16. Tsao et al. BMC
Bioinformatics 2018, 19(Suppl 9):283 Page 120 of
V. REFERENCES 121
[8] Yau JW, Rogers SL, Kawasaki R, Lamoureux EL,
[1] Chew EY, Klein ML, Ferris FL 3rd, Remaley NA, Kowalski JW, Bek T, Chen SJ, Dekker JM,
Murphy RP, Chantry K, Hoogwerf BJ, Miller D., Fletcher A, Grauslund J, et al. Global prevalence
"Association of elevated serum lipid levels with and major risk factors of diabetic retinopathy.
retinal hard exudate in diabetic retinopathy. Diabetes Care. 2012; 35(3):556–64.
Early treatment diabetic retinopathy study [9] UK Pospective Diabetes Study Group. Tight
(ETDRS) report", 22. Arch Ophthalmol. 2016; blood pressure control and risk of macrovascular
114(9):1079–84. and microvascular complications in type 2
[2] American Diabetes Association. Standards of diabetes: UKPDS 38. UK Prospective Diabetes
medical care in diabetes–2014. Diabetes Care. Study Group. BMJ. 1998; 317(7160):703–13.
2014;37(Suppl 1):S14–80. [10] Kowall B, Rathmann W. HbA for diagnosis of
[3] Fong DS, Aiello L, Gardner TW, King GL, type 2 diabetes. Is there an optimal cut point to
Blankenship G, Cavallerano JD, Ferris FL 3rd, assess high risk of diabetes complications, and
Klein R, "American Diabetes A. Retinopathy in how well does the 6.5% cut-off perform?
diabetes. Diabetes Care", 2004;27(Suppl 1):S84–7. Diabetes Metab Syndr Obes. 2013; 6:477–91.
[4] Kempen JH, O'Colmain BJ, Leske MC, Haffner [11] Hosseini SM, Maracy MR, Amini M, Baradaran
SM, Klein R, Moss SE, Taylor HR, Hamman RF. HR. A risk score development for diabetic
"The prevalence of diabetic retinopathy among retinopathy screening in Isfahan-Iran. J Res Med
adults in the United States", Arch Ophthalmol. Sci. 2009;14(2):105–10.
2004; 122(4):552–63. [12] Aspelund T, Thornorisdottir O, Olafsdottir E,
[5] Huang YY, Lin KD, Jiang YD, Chang CH, Chung Gudmundsdottir A, Einarsdottir AB, Mehlsen J,
CH, Chuang LM, Tai TY, Ho LT, Shin SJ. Einarsson S, Palsson O, Einarsson G, Bek T, et al.
"Diabetes-related kidney, eye, and foot disease in Individual risk assessment and information
Taiwan: an analysis of the nation wide data for technology to optimise screening frequency for
2000-2009", J Formos Med Assoc. 2012; diabetic retinopathy. Diabetologia.
111(11):637–44. 2011;54(10):2525–32.
[6] Early Treatment Diabetic Retinopathy Study [13] Semeraro F, Parrinello G, Cancarini A, Pasquini
Research Group. "Focal Photocoagulation L, Zarra E, Cimino A, Cancarini G, Valentini U,
treatment of diabetic macular edema. Costagliola C. Predicting the risk of diabetic
Relationship of treatment effect to fluorescein
retinopathy in type 2 diabetic patients. J [21] S. Sagar Imambi and T. Sudha - Building
Diabetes Complicat. 2011;25(5):292–7. Classification System to Predict Risk factors of
[14] Dr. Karim Hashim Al-Saedi, Dr. Razi Jabur Al- Diabetic Retinopathy Using Text mining, (IJCSE)
Azawi, Rasha Asaad Kamil, - Design and International Journal on Computer Science and
Implementation System to Measure the Impact Engineering Vol. 02, No. 07, 2010, 2309-2312
of Diabetic Retinopathy Using Data Mining [22] Hayrettin Evirgen, Menduh Çerkezi- Prediction
Techniques, International Journal of Innovative and Diagnosis of Diabetic Retinopathy using
Research in Electronics and Communications Data Mining
(IJIREC) Volume 4, Issue 1, 2017, PP 1-6 Technique,ijaedu.ocerintjournals.org/tojsat/issue
[15] Abhilash Bhaisare, Sagar Lachure, Amol Bhagat, /22642/241874, Sep, 2014
Jaykumar Lachure - Diabetic Retinopathy
Diagnosis Using Image Mining, International Cite this article as :
Research Journal of Engineering and Technology
(IRJET), Volume: 03, Issue: 10, Oct -2016 Kajal Sanjay Kothare, Prof. Kalpana Malpe, "A
[16] K. R. Ananthapadmanaban and G. Parthiban. - Review on Prediction of Diabetic Retinopathy Using
Prediction of Chances - Diabetic Retinopathy Data Mining Algorithms", International Journal of
using Data Mining Classification Techniques. Scientific Research in Computer Science, Engineering
Indian Journal of Science and Technology, Vol and Information Technology (IJSRCSEIT), ISSN :
7(10), 1498–1503, October 2014 2456-3307, Volume 5 Issue 1, pp. 266-272, January-
[17] M. Usman Akram, Shehzad Khalid, Shoab A. February 2019.
Khan - Identification and classification of Journal URL : http://ijsrcseit.com/CSEIT195179
microaneurysms for early detection of diabetic
retinopathy, Pattern Recognition, Vol. 46, No. 1,
2013, pp. 107–116.
[18] Vimala Balakrishnan , Mohammad R. Shakouri
and Hooman Hoodeh - Integrating association
rules and case-based reasoning to predict
retinopathy, Maejo Int. J. Sci. Technol. 2012,
6(03), 334-343, ISSN 1905-7873
[19] M. Tamilarasi and Dr. K. Duraiswamy -A Survey
for Automatic Detection of Non- Proliferative
Diabetic Retinopathy, International Journal of
Innovative Research in Computer and
Communication Engineering, Vol. 2, Issue 1,
January 2014
[20] Ramon Casanova , Santiago Saldana, Emily Y.
Chew, Ronald P. Danis, Craig M. Greven,
Walter T. Ambrosius - Application of Random
Forests Methods to Diabetic Retinopathy
Classification Analyses, Published: June 18,
2014https://doi.org/10.1371/journal.pone.009858
7
ABSTRACT
Web usage mining is driving examination zone in Web Mining worried about the web client's behavior.
Weblog mining is one of the ongoing regions of research in Data mining. Web Usage Mining turns into an
imperative perspective in the present time because the amount of information is persistently expanding. We
manage the web server logs which keep up the historical backdrop of page demands. Web log records are the
documents, which contain total data about the clients, peruse exercises on the web server Web mining is the
utilization of information mining strategies to find designs from the World Wide Web. This paper gives a
consideration on Web usage mining to anticipate the behavior of web clients dependent on web server log
records. Clients utilizing web pages, a successive access way's and continuous access pages, joins are put away in
web server log records. Contingent on the recurrence of clients visiting each page mining is performed. By
finding the session of the client we can break down the client behavior when spending on a specific page. Web
log alongside the distinction of the client catches their perusing behavior on a website and talking about with
respect to the behavior from the investigation of various algorithms and diverse strategies.
Keywords : Knowledge Sharing, Web Portal, Job Portal, Online Recruitment.
CSEIT195180 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 273-277 ]
273
Veena Moharle et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 273-277
out of IP address of the asking for customer, date and algorithms for playing out every one of these
time of the demand, asking for technique utilized, procedures [1].
status code, the asked for the record, and so forth. It
is conceivable to sort the arrangement of snap Anshul Bhargav and Munish Bhargav likewise the
exercises into sessions, and after that utilization them individuals from IEEE proposed edge work for web
for further investigation to get the predicted client usage mining. The edge work is to perform client’s
behaviour. Breaking down clients' Web watching characterization dependent on found examples and to
behaviours is one of the essential and testing research discover the qualities of clients. The casing work
subjects of Web usage mining. On the off chance that comprises of three principal steps: pre-processing,
clients' advantages can be naturally recognized from design disclosure and client arrangement. The pre-
clients' Web log information, they can be utilized for processing stage incorporates log document cleaning,
data suggestion and showcasing which are valuable client ID and session recognizable proof. The
for the two clients and Web webpage engineers. example disclosure process finds a new example from
Research for dissecting Web log information has the informational collection. In the client
been finished by numerous specialists in the field of arrangement process, every client is grouped by his
Web usage mining; finding incessant examples of log or her attributes. The groupings depend on nation-
information. The principle motivation behind the based arrangement, site section based order and
investigation of the client's visit record is to break access time-based characterization [2].
down the client's most worried about the outcomes
from the mining results. By breaking down the client S. S. Patil and H.P Khandagale proposed subjective
access to assets of the time, recurrence, etc., alter the client demonstrate which determine the foreseen
structure and plan of the site to anticipate that more usage behaviour dependent on the examples found in
clients should remain and better serve clients. Client past pre-processing, stage. The edge work
behaviour investigation has turned into another incorporates information cleaning, client
examination hotspot. recognizable proof, session distinguishing proof, way
finish, exchange ID and example revelation and
The work of this research mainly contemplates the extraction forms. Way culmination alludes to
weblog Mining technology in client behaviour creating rules for missing references dependent
investigation and assembles the client premium available structure, referrer, and other heuristic data.
model dependent on the client premium data, lastly By breaking down the found example, the behavior
draws the client's advantage. of the client is recognized and route refreshes are
given in the web page [3].
II. LITERATURE REVIEW
Virendra R. Rathod and Govind V. Patel proposed an
G. Neelima and Dr. Sireesha Rodda individuals from edge work dependent on FCM grouping and Markov
IEEE have proposed a thought for anticipating client show for foreseeing client behaviour utilizing weblog.
behavior through sessions utilizing weblog mining. Subsequent to pre-processing fluffy c implies (FCM)
They manage web server logs of NCSA normal log calculation is connected for example disclosure and
record design for mining. The proposed methodology examination. Markov demonstrate is utilized to next
comprises of information handling, client page expectation and better web page forecast
distinguishing proof and session recognizable proof precision. Fluffy c implies bunching calculation gives
procedures. They are utilizing three unique the preferred outcome over k-implies grouping.
Fluffy c implies bunching is a standout amongst the client's advantage dependent on the M5 display tree
most generally utilized fluffy grouping algorithms [4]. to break down the explanatory occasions.
In this exploration [5] propose the structure and In this examination [9], we present the "errand trail"
usage of a half and half framework by consolidating a to comprehend client seek behaviours. We
few information mining methods to catch the client's characterize an errand to be a nuclear client data
web perusing behavior. Client route sessions that need, while an assignment trail speaks to all client
speak to the association with a given website are exercises inside that specific undertaking, for
utilized to develop Hypertext Probability Grammar example, question reformulations, URL clicks. he
(HPG). Break down the HPG with the idea chain of considers investigations and correlations with assess
command show and apply the network bunching the viability of undertaking trails in a few inquiry
procedure to separate the usual portrayal of client applications: determining client fulfillment,
route behavior. anticipating client seek premiums, and
recommending related questions. Analyses on
This paper [6] portrays a technique for clearing up expansive scale datasets of a business internet
clients' interests dependent on an examination of the searcher demonstrate that:
site-catchphrase diagram. The technique is for (1) Task trail performs superior to anything session
removing sub-diagrams speaking to clients' primary and question trails in determining client
advantages from a website Keyword chart. It is fulfillment;
produced from increased Web crowd estimation (2) Task trail builds web page utilities of end clients
information (Weblog information). Our contrasting with session and inquiry trails;
commitments are 1) Web structure mining strategy (3) Task trails are equivalent to question trails yet
(PageRank) is appropriate for assessing the more touchy than session trails in estimating
characteristics of chose sub-diagrams and 2) two sorts distinctive positioning capacities;
of information (destinations and catchphrases) can be (4) Query terms from a similar assignment are more
spoken to and handled in a similar way utilizing a topically predictable to one another than
webpage catchphrase diagram. Our technique is basic question terms from various undertakings;
and it has capacities of separating sub-diagrams (5) Query proposal dependent on errand trail is a
identified with clients' principle advantages. Our decent supplement of question recommendations
work is required to give bits of knowledge for dependent on session trail and navigate
preparing boisterous heterogeneous chart structures. bipartitely.
This investigation of work [8] for the most part The discoveries in this paper check the need for
presents the technique for weblog mining, which can removing errand trails from web look logs and
find the method of web pages by burrowing web log improve applications in hunt and suggestion
records. By dissecting and investigating the standards frameworks.
of weblog records, we can recognize the potential
clients of the website and enhance the nature of data III.Discussion and Analysis
administrations to clients. In the phase of client
behaviour investigation, this examination investigates Research for breaking down Web log information has
the distinctions in client perusing behaviour in been finished by numerous analysts in the field of
various sorts of access occasions and figures the Web usage mining; finding regular examples of log
information, demonstrating clients' route designs, At present, there is no standard meaning of session in
grouping clients of explicit Web webpage, and the International scholarly network. The meaning of
finding client networks. the session made by W3C Union is that it's a point of
confinement set of pages produced by clients' one or
A. Web Log Mining a few demand click. In the Weblog, the demand
records have a place with the clients who have
Web Usage Mining is the use of information mining distinctive IP addresses positively not in a similar
strategies to find intriguing usage designs from Web session. A client may peruse a similar site a few times
information to comprehend and better serve the and the time interim between each peruse
requirements of Web-based applications. Usage moderately expansive, at that point that is not in a
information catches the character or beginning of similar session. Session distinguishing proof's
Web clients alongside their perusing behaviour at a undertaking is to partition clients' peruse records into
Web webpage. a suitable session. We in every case initially do
distinctive presumptions on the client's perusing
behaviour on the customer, and after that distinguish
the session. These sessions can be utilized as a piece
of info information in grouping, bunching,
expectation and different errands. In light of a
uniform settled timeout, a conventional session
recognizable proof calculation is utilized.
A server log is a log document (or a few records) Web usage mining is without a doubt one of the
consequently made and kept up by a server rising regions of research and imperative sub-space of
comprising of a rundown of exercises it performed. information mining and its systems. So as to take the
Web server logs are utilized to bunch web clients full favourable position of web usage mining and its
having comparative interests. It is likewise everything methods, it is essential to do pre-
characterized as adjusting administrations and data processing stage proficiently and viable. This paper
which was accessible on a website to the necessities endeavours to convey territories of pre-processing,
and the desires for an objective client, the dynamic including information purifying, session ID, client
client; the personalization undertaking by might recognizable proof. When the pre-processing stage is
profit by the information picked up from an all around performed, we can apply information
investigation of the client's navigational behaviour mining strategies like bunching, affiliation, order and
joined with different highlights which are curious to so on for utilization of web usage mining, for
a Web setting, to be specific its structure and content example, business insight, web-based business, e-
[10]. learning, personalization, and so on. Weblog mining
is one of the ongoing regions of research in Data
B. Session Identification mining. Web Usage Mining turns into an imperative
perspective in the present time in light of the fact
that the amount of information is ceaselessly
expanding. We manage the web server logs which
keep up the historical backdrop of page demands Efficient Web Mining Algorithm for Web Log
Weblog record examination started with the reason Analysis: E-Web Miner ",1st International
to offer to Web webpage directors an approach to Conference on Recent Advances in Information
guarantee sufficient transfer speed and server ability Technology (RAIT) 2012
to their association. By examining these logs, it is [8] Xipei Luo, Jing Wang, Qiwei Shen, Jingyu
conceivable to find different sorts of learning, which Wang, Qi Qi ,"User Behavior Analysis Based on
can be connected behavior investigation of clients. User Interest by Web Log Mining ", 27th
International Telecommunication Networks
V. REFERENCES and Applications Conference (ITNAC),2017
[9] Zhen Liao, Yang Song, Yalou Huang, Li-wei
[1] G. Neelima , Dr. Sireesha Rodda, “Predicting He, Qi He,"Task Trail: An Effective
user behavior through sessions using the web Segmentation of User Search Behavior",IEEE
log mining”, Conference on Advances in Transactions on Knowledge and Data
Human Machine Interaction (HMI), R. L. Engineering,2014.
Jalappa Institute of Technology, Doddaballapur, [10] C., Ventura, S., Zafra, A., de Bra, P.: Applying
Bangalore, India, March 2016. Web usage mining for personalizing hyperlinks
[2] Anshul Bhargav , Munish Bhargav, “Pattern in Web-based adaptive educational systems
discovery and users classification through web (received January 8, 2009) (received in revised
usage mining”, International Conference on form May 4, 2009) (accepted May 4, 2009)
Control Instrumentation, Communication and
Computational Technologies, IEEE 2014.
[3] S. S. Patil, H. P. Khandagale, “Survey paper on
enhancing web navigation usability using web
usage mining techniques”, International journel
of modern trends inenginnering and
research.2016.
[4] Virendra R. Rathod and Govind V Patel,
“Prediction of user behaviour using web log
mining in web usage mining”, International
journel of computer application vol. 139- No. 8,
April 2016.
[5] . M. -S. Kao, T. Ozyer, R. Alhajj,"Hybrid
approach for predicting the behavior of Web
users", IEEE International Conference on
Information Reuse and Integration, Conf, 2005.
[6] Tsuyoshi Murata, Kota Saito,"Extracting Users'
Interests from Web Log Data ",
IEEE/WIC/ACM International Conference on
Web Intelligence (WI 2006 Main Conference
Proceedings) (WI'06)
[7] Mahendra Pratap Yadav, Pankaj Kumar
Keserwani, Shefalika Ghosh Samaddar,"An
ABSTRACT
In this method, we've got introduced a new technique for the improvement of gray scale images, when images
are corrupted by salt and pepper noise that's additionally referred to as an impulse noise. Our suggested
phenomena show a better output for Medium density impulse noise as compare to the opposite renowned
filters like standard Median Filter (SMF), a decision based mostly Median Filter (DBMF) and modified decision
based Median Filter (MDBMF), Nonlinear filter (NLF) and so on. Our projected technique worked on two steps,
within the beginning is that the detection of noisy pixels and within the second step is that the removal of
noisy pixels. For detection of noisy constituent apply condition pixels values lies in between 0 to 255 it noisy
it's noisy free pixels. In our second step that's the removal of noisy pixel recommended technique that's replaces
the noisy pixel by alpha trimmed mean median value. Different grayscale pictures are tested via proposed
technique. The experimental result shows higher Peak Signal to Noise ratio (PSNR) values and with higher
visual and human perception.
Keywords : Gray Scale, Impulse Noise, Trimmed Mean, Median, Unsymmetricness
CSEIT195169 | Received : 01 Feb 2019 | Accepted : 10 Feb 2019 | January-February -2019 [ 5 (1) : 278-288 ]
278
Trupti Arun Jangale, Raj Kumar Paul Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 278-288
centre part is that the constituent of interest. once signal, the foremost obvious window is simply the
the mask is affected starting from the left-top corner primary few preceding and following entries,
of theimagetothe right-bottom corner, it performs whereas for 2nd (or higher-dimensional) signals like
some mathematics operations whereas not images, additional complicated window patterns are
discriminating any constituent. potential (such as "box" or "cross" patterns). Note that
if the window has associate degree odd range of
Detection followed by Filtering:- entries, then the median is easy to define: It's simply
This type of filtering involves two steps. In the center price on balance the entries within the
commencement it identifies screeching pixels and in window are sorted numerically. For an excellent
second step it filters those pixels. Here in addition a range of entries, there's quite one potential median.
mask is affected across the image and a number of
mathematics operations unit of measurement 1-D median Filter:-In 1D median filter, we have a
distributed to look at the screeching pixels. Then tendency to take into account the filtering window
filtering operation is performed exclusively on those slippy over a 1D array (either horizontal or vertical)
pixels that unit of measurement found to be of pixels. Assume the 5 pixels presently within the
screeching inside the previous step, keeping the non- windows are:
noisy intact.
Mean filter:-
Mean filtering may be a easy, intuitive and simple to Where the center picture element with price two
implement technique of smoothing images, i.e. hundred is associate isolated picture element and it's
reducing the quantity of intensity variation between out-of-range (noise). The median of those 5 values is
one pel and also the next. It's usually accustomed cut found by sorting the values (in either ascending or
back noise in images. The thought of mean filtering is falling order). the center price is that the median:
just to interchange every pel price in a picture with
the mean (`average') price of its neighbours, as well The original picture element price two hundred is
as itself. This has the impact of eliminating pel values replaced by the median a hundred and ten.
that square measure atypical of their surroundings.
Thearithmeticmean filter may be a terribly easy one 2-D median Filter:
and is calculated as follows: Replace every pel by the
typical of pels during a sq. window close this pixel
Median filter:-
The median filter is often accustomed scale back
noise in a picture, somewhat just like the mean filter.
However, it usually will a much better job than the
mean filter of protective helpful detail within the
image. the most plan of the median filter is to run Neighbouring pixel values = 115,119,120,123,
through the signal entry by entry, commutation 124,125,126,127,150
every entry with the median of close entries. The Median value = 124.
pattern of neighbours is named the "window", that Figure 2 (a) : Selection of filtering window of 2-D
slides, entry by entry, over the whole signal. For 1D
Copy the window matrix (3 by 3) into Table 1 Filtering window of size 3x3
an array and sort it. Column 1 Column 2 Column 3
Row 1 Z1 Z2 Z3
Row 1 Z4 Z5 Z6
Find the median element. Here 5th
element (total elements are 9, middle Row 3 Z7 Z8 Z9
element will be 5).
Different blocks are shown for different steps. At the
starting there is filtering window of size 3x3 has been
Place 5th element into the output selected and calculated gray value of pixels according
matrix. Do the process for the to the strength of intensity of every pixel.
complete input matrix ALGORITHM
We have develop the trouble-free algorithm in which Select a target image - [x] = imread(‘Test image.jpeg’)/
we execute the noise finding and noise removal for the read of image
Mean Filtering (MUTMMF), will next part of this the image, Y means the original image, 𝑌̂ shows the
report. Shows the result and simulation. de-noised image.
Graphic User Interface (GUI) in MATLAB:-
III. RESULT
In this preceding section, the image Tool GUI and
Mean Square Error (MSE): Measure GUI (Graphic User Interface) will be
introduced. Both of them were developed with the
The mean square error (MSE) dealings the value Matlab tool GUIDE (GUI Design Environment). In
modify or can say the changes to pixel intensity this GUI part shows the whole phenomena of
values between the original image (Xi)and de-noised proposed work like that image selection, impulse
image (Yj) and is given by noise addition, removal of noise and edges
preservation of the images in this research, in a user-
1 𝑁−1
𝑀𝑆𝐸 = ∑ (𝑋𝐽 ̅𝑗 )2
−𝑌 (5.1) friendly environment. First of all, the images are
𝑁 𝑗−0
selected by clicking the browse and Select Images. A
The MSE has been widely used to quantify image browser will appear afterwards to allow the user to
quality and when used alone, it does not correlate select the images, which can be any of the following
strongly sufficient with perceptual excellence. It file formats:
should be use therefore, with other quality check
parameter like SNR, PSNR, RMSEand visual Layout implementation of image enhancement based
perception. fusion techniques is done by following steps.
Peak signal-to-noise ratio (PSNR): ▪ First create simple Graphical User Interface (GUI)
window.
The PSNR is computed as - ▪ Second add impulse noise with the help of
𝑆2 imnoise command in this GUI.
PSNR=10log10 (𝑀𝑆𝐸 ) (5.2)
▪ Third step apply our proposed method that is
removal of noise.
Where 𝑆 is the maximum intensity in the original
▪ Fourth stepcalculated the image enhancement
image. The pear signal to noise ratio is higher for a
parameters like peak signal to noise ratio, mean
good resultant image and poorer for a reduced quality
square error, mean absolute error.
image. It calculate image reliability, that is, nearer
▪ Fifth step shows edges preservation of tested
the transformed image resembles the original
image.
image.In this proposed work on the source of our
▪ Sixth step graphical representation of PSNR and
image dimension 255×255, we mentioned peak signal
MSE values of the images. There are two
to noise ration and mean square error are as follows:
important push button design in this GUI these
are RESET and END.
The PSNR is expressed as:
(255)2
𝑃𝑆𝑁𝑅 = 10 𝑙𝑜𝑔10 (5.3)
(𝑀𝑆𝐸)
Where MSE acronym of Mean Square Error stands
for image enhancement factor, 𝑚 × 𝑛 is the size of
TABLE 4 CALCULATED PSNR OF PROPOSED In the figure 5 put side by side our proposed method
ALGORITHM FOR LENA IMAGE visual results compare with different algorithms they
are - median filter,adaptive median filter, decision
based algorithms, modified decision based
unsymmetric trimmed median filter, Non-linear
Filter algorithm. This method is tested on the ‘Lena’
image of size 256×256 in the 80% noise density ‘Lena’
image result with our planned algorithm. Shown
plotsof PSNR values of different noise. Our proposed
method provide a good result in low and medium
noise density.
(a)Original Image (b) 70% Noise (c) MF (d) AMF (e) PSMF (f) DBA
[2] Fundamentals of Digital Image Processing, S. [12] A. Ben Hamza, P. Luque, J. Martinez, and R.
Annadurai, R. Shammugalakshmi, Pearson Roman, “Removing noise and preserving
Education India. details with relaxed median filters,” J. Math.
[3] Castleman Kenneth R, Digital Image Imag. Vision, vol. 11, no. 2, pp. 161–177, Oct.
Processing, Prentice Hall, NewJersey, 1979 1999.
[4] T.A. Nodes and N.C. Gallagher, Jr., “The [13] V. Strela. “Denoising via block Wiener
output distribution of median type filters,” filtering in wavelet domain”. In 3rd European
IEEE Trans. Communication., 32(5): 532-541, Congress of Mathematics, Barcelona, July
1984. 2000. BirkhäuserVerlag.
[5] A.K.Jain,Fundamentals of digital image [14] S. Zhang and M. A. Karim, “A new impulse
processing. Prentice-Hall, 1989. detector for switching median filters,” IEEE
[6] David L. Donoho and Iain M. Johnstone., Signal Process. Lett., vol. 9, no. 11, pp. 360–
“Adapting to unknown smoothness via 363, Nov. 2002.
wavelet shrinkage”, Journal of the American [15] T. Yahagi. "A Random-valued Impulse
Statistical Association, vol.90, no432, NoiseDetector Using Level Detection", 2005
pp.1200-1224, December 1995. National IEEEInternational Symposium on Circuits
Laboratory, July 27, 2001. and Systems, 2005.
[7] H. Hwang and R. A. Hadded, “Adaptive [16] K. S. Srinivasan. "A New Fast and Efficient
median filter: New algorithms and results,” Decision-Based Algorithm for Removal of
IEEE Trans. Image Process., vol. 4, no. 4, pp. High-Density Impulse Noises", IEEE Signal
499–502, Apr. 1995. Processing Letters, 3/2007
[8] E. Abreu and S.K. Mztra,” A Signal- [17] JafarRamadhan Mohammed. "An Improved
Dependent Rank Ordered Mean (Sd-Rom) MedianFilter Based on Efficient Noise
Filter –ANew Approach For Removal Of Detection for HighQuality Image
Impulses From Highly Corrupted Images”, 0- Restoration", 2008 Second Asia
7803-2431- 5/95$ 4.000 1995 IEEE. InternationalConference on Modelling &
[9] R. Yang, L. Yin, M. Gabbouj, J. Astola, and Y. Simulation (AMS).
Neuvo, “Optimal weighted median filters [18] V.R. Vijaykumar. "Detail preserving median
understructural constraints,” IEEE Trans. basedfilter for impulse noise removal in
Signal Processing vol. 43, pp. 591–604, Mar. digital images",2008 9th International
1995. Conference on Signal Processing.
[10] Scott E Umbaugh, Computer Vision and [19] S. Saudia. "Salt & pepper impulse detection
Image Processing, Prentice HallPTR, New andmedian based regularization using
Jersey, 1998. Adaptive Median Filter", TENCON 2008 -
[11] Zhou Wang and David Zhang, “Progressive 2008 IEEE Region 10 Conference, 11/2008
Switching Median Filter for the Removal of [20] DENG Xiuqin, XIONG Yong PENG Hong , A
Impulse Noise from Highly Corrupted new kind of weighted median filtering
Images", IEEE Transactions On Circuits And algorithm used for image Processing,
Systems—Ii: Analog And Digital Signal International Symposium on Information
Processing, Vol. 46, No. 1, January 1999. Science and Engieering, 2008.
ABSTRACT
For that purpose, we are developing this application, which can collect the tax information from different
authorities based on the house no’s and owner name by using Web Services and stores the data in our own
database. For getting the information, regarding taxes citizens need to register first. The bill is calculating on
different modes like annual, half-yearly, quarterly etc. By using the user, id and password citizens can log into
the system and collect the necessary information from the home page. For this every user need to provide his
house no and owner name. By clicking on the search button, they will get their own.
Keywords: E- TAX, Web Services
CSEIT195145 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 289-291 ]
289
M. Florence Dayana, B. Vinithamani. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 289-291
Web Services taxpayers who are using the e-tax system. With these
Citizen Bill Information limitations the result of our study gives an insight to
The system interface is going to show the Bill e-tax quality evaluation criteria in an emerging
information of different authorities. The bills mainly economy like Nigeria and also provide the basis for
going to these types further research in these areas.
Water Bills
Electricity Bills VII. REFERENCES
Property Taxes
These interfaces also show the [1]. Productivity of the Nigerian Tax System: 1970-
Pending Bills 1990 AERC Research Paper 67. Nairobi: African
Penalties Economic Research Consortium. Black. (1999).
Due Dates Black’s Law Dictionary (Seventh Edition). West
Group. Centers for Medicare and Medicaid
V. CONCLUSION Services Office of Information Service. (2008,
March 27).
[2]. Selecting a development approach. United States
It has been a great pleasure for me to work on this
Department of Health and Human Services (HHS).
exciting and challenging project. This project proved
Clarke, J. M. (1998).
good for me as it provided practical knowledge of not
[3]. Automated test generation from a Behavioral
only programming in ASP.NET andC#.NET web-
Model. Pacific Northwest Software Quality
based application and no some extent Windows
Conference. IEEE Press. Federal Republic of
Application and SQL Server, but also about all
Nigeria. (1997).
handling procedure. It also provides knowledge about
[4]. Report of the Vision 2010 Committee. Abuja,
the latest technology used in developing web enabled Nigeria. Federal Republic of Nigeria. (2002).
application and client server technology that will be [5]. Personal Income Tax Act 1993(1993 No. 104):
great demand in future. This will provide better [6]. Operation of Pay as You Earn (PAYE) Regulations
opportunities and guidance in future in developing 2002 Official Gazette. Federal Ministry of Finance
projects independently. Abuja. Geoffrey, E. (2004).
[7]. Global Business Information Technology: An
VI. FUTURE ENHANCEMENT Integrated Systems Approach. Pearson Education.
Grady. (2005).
This paper examines the taxpayers’ e-tax system [8]. Unified Modelling Language User Guide the
implementation by validating the psychometric Second Edition. Addison-Wesley. International
properties and using the instrument validated for e- Organization for Standardization. (2015, February
tax service evaluation criteria in the context of 26).
Nigeria. It is concluded that all the six variables,
Cite this article as :
compatibility, complexity, reliability, affordability, M. Florence Dayana, B. Vinithamani, "E - Tax
ease of use and tangible are important in the Information System", International Journal of Scientific
evaluation of e-tax system implementation. The items Research in Computer Science, Engineering and
used should enable the tax authority to bench mark Information Technology (IJSRCSEIT), ISSN : 2456-3307,
their routine and plan for enhancement. The first Volume 5 Issue 1, pp. 289-291, January-February 2019.
limitation of these study is small sample size and the Available at doi : https://doi.org/10.32628/CSEIT195145
population been limited to only self-employed Journal URL : http://ijsrcseit.com/CSEIT195145
ABSTRACT
Children tracking system based on android terminals is proposed. Recently, all over the world crime against the
children in the age of 14 to 17 years is more popular. Parent’s always worry about their children whenever they
are outside from the home. In this paper, the proposed system consists of two sides out of them one is parent
module and another is the child module. The child module consists of ARM7 Microcontroller (LPC 2148), GPS
(Global Positioning System), GSM (Global System for Mobile Communication) and voice chip where the parent
module consists of android mobile phone. This paper gives the information about missing child from school
campus. There are two android mobile phones for the safety of the both modules. The system tracking the child
from source to destination i.e. from home to school or anywhere.
Keywords : ARM Based Children Tracking System, arm7microcontroller, GSM, GPS and Android Mobile
Phone.
CSEIT195154 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 292-295 ]
292
M. Juno Isabel Susinthra, S. Praveena Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 292-295
devices. Therefore, research areas on data collection, among different apps, which increase the difficulty in
analysis and patterns learning are becoming rich monitor single flow between an app and the
discussion area, especially with all the cheap features operating system. The proposed platform only tracks
and technological advances available on phones data flows but not control flows. Data flows are the
allowing for a variety of users experiences and usage. explicit flowing of data through the apps. Control
The framework architecture proposed in is built upon flows are the implicit flowing of data that require
using mobile phone sensing and the cloud computing. analytical analysis.
The paper discussed the different challenges with
gathering data techniques using mobile and EXISTING PROCESS
unexpected environment (mobile context), as well as,
the privacy issues on gathering personal information Android terminals have wireless LAN and Bluetooth
from a third-party application. The study discussed device. It results in lack of individual attention
the three different scales mobile sensing considered towards the children. It offers less security. Studies
beneficial on: individual, group, and community data conducted by Cyber Travel Tips, showed that in
gathering. The scalability feature of gathering Malaysia, missing children are basically classified into
individual behaviour to learn from community two categories. The first category is disappearance,
patterns may help improve communities in social, which includes running away from home. Children
healthy and environmental studies. The study also tracking system is also developed on mobile ad hoc
explained the two sensing paradigms: participatory networks. System developed in says that in GPS
sensing, which involves users who lunch sensors system and tag-based system, each parent cannot
manually, and opportunistic sensing, where sensors obtain group information on the vicinity of the child.
automatically collect data. The main focus of the A self -configurable new generation children tracking
introduced work in is about understanding how system. Hiroshima City Children Tracking System is
personal data travels through selected third-party a safety support system for children based on ad hoc
applications. The authors raised the issue about network technologies. Field experiments have been
violating privacy barriers when applications access conducted in cooperation with an elementary school
the personal information by only ask for users’ in Hiroshima. In this paper, propose a new
permissions to access the data with no explanation of generation child tracking system which is based on
how the data will be used. The research proposed a experiences and findings of the field experiments for
monitoring platform based on Android mobile phone Hiroshima children tracking system. Existing
to track the data flow through 30 selected technologies, however, are not powerful to prevent
applications. After testing the proposed the platform, crimes against children and helpful parent ‘s since it
the research concluded that 20 apps miss used the is difficult to take information of children as a group.
users’ private data and 15 apps used users’ locations to
support marketing services. The main challenges in PROPOSED METHODOLOGY
monitoring the use of mobile apps include the
shortage of Smartphone used data as a resource The children information is transmitted and received
constrained, as well as, the dynamic nature of data using GSM technology. The child module acts as a
flow using mobile devices. This dynamicity causes transmitter which includes ARM7 microcontroller
another context-based challenge because data could (lpc 2148), GSM module, GPS module and voice chip
be sent at any time and any place. Further, mobile as well as android mobile phone. The receiver
apps allow for across sharing data and information module includes Android mobile phone and
monitoring database. The position of the moving defining the location of their children (indoor or
child is tracked by is tracked by GPS and is sent to outdoor) and to give the safety distance for each child.
ARM7 microcontroller. This controller forwards the
GPS data (latitude and longitude) to GSM board. Detection of Safety Distance When parent starts the
GSM will in turn send the position of the moving system, she/he should select where they stay; indoor
child to two receivers. It allows the parent to get or outdoor; in order to calculate the distance between
their child ‘s location. them and each child. Indoor option limit child range
to 3m by reducing child transmitter source so signal
III. RESULTS AND DISCUSSION attenuated will not be detected. But if parent selects
outdoor option, distance will be calculated by taking
IMPLEMENTATION RESULTS child and parent locations from GPS chips. Child
module will send its GPS reading to parent module
which calculates distance and compares it with
distance threshold; this threshold value should be
entered by parent after selecting outdoor option.
IV.CONCLUSION
falling into a swimming pool, leaving in a hot car, Cite this article as :
leaving behind gas heater. The flexibility of the
designed system makes it easy to add new sensors for M. Juno Isabel Susinthra, S. Praveena, "Children
any child. Tracking Classification Control Using Android",
International Journal of Scientific Research in
VI.REFERENCES Computer Science, Engineering and Information
Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
[1] Druin A., "The role of children in the design of 5 Issue 1, pp. 292-295, January-February 2019.
new technology", Behavior and Information Available at doi :
Technology", vol21, No.1,pp1-25, 2002. https://doi.org/10.32628/CSEIT195154
[2] Morris Williams, Owain Jones, Constance Journal URL : http://ijsrcseit.com/CSEIT195154
Fleuriot and Lucy Wood, "Children and emerging
wireless Technologies", Conference on Human
Factors in Computing systems, 2005.
[3] Deborah L. Ruf, "Losing Our Minds", 2005, Great
Potential Press, Inc.
[4] Stephen S. Intill, James W. Davis and Aaron F.
Bobick, "Real-Time Closed-World Tracking",
Proceedings of the IEEE Computer Sciety
Conference on Computer Vision and Pattern
Recognition, pp. 697-703, June 1997.
[5] GregoryT.FRENCH "Understanding the GPS,
1996
[6] Katin Michael, "The Emerging Ethics of Human
Centric GPS Tracking and Monitoring",
International Conference on Mobile Business
(ICM'06), 2006.
[7] A. (Angela) Canny, Anne E. Green and Malcolm
J. Maguire, "Keeping Track", Published 2001, The
Policy Press.
[8] PIC16F87XA Datasheet 28/40-Pin Enhanced
Flash
[9] Lovine, John, “PIC Microcontroller Project
Book“, Mc Graw-Hill, 2004
ABSTRACT
In today’s world communication has become so easy due to integration of communication technologies
with internet. However, the visually challenged people find it very difficult to utilize this technology
because of the fact that using them requires visual perception. Even though many new advancements have
been implemented to help them use the computers efficiently no naïve user who is visually challenged can
use this technology as efficiently as a normal naïve user can do that is unlike normal users they require
some practice for using the available technologies. This paper aims at developing an email system that will
help even a naïve visually impaired person to use the services for communication without previous
training. The system will not let the user make use of keyboard instead will work only on mouse operation
and speech conversion to text. Also this system can be used by any normal person also for example the
one who is not able to read. The system is completely based on interactive voice response which will make
it user friendly and efficient to use.
Keywords : Visually Challenged People, IVR, Speech to Text Converter, Mouse Click Event, Screen
Reader
CSEIT195163 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 296-298 ]
296
R. Gomathijayam, A. Jenifer Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 296-298
2019[4]. It is also estimated that there are a total of perception. Even though many new advancements
340.2 million smart phone users in India in the year have been implemented to help them use the
2017 [5]. This makes emails the most used kind of computers efficiently no naïve user who is visually
communication. The prevailing email systems don’t challenged can use this technology as efficiently as a
give any means of feedback or Talkback service. The normal naïve user can do that is unlike normal users
most common mail services that we tend to use in they require some practice for using the available
our day to day life cannot be used by visually technologies.
challenged people. This is as a result of they do not
offer any facility in order that the person in front will IV. PROPOSED METHODOLOGY
listen the content of the screen. As they cannot
visualize what is already present on screen they The proposed system relies on voice command based
cannot build out where to click in order to perform system unlike the existing mail systems. The most
the required operations. For a visually impaired important thing that has been kept in mind while
person employing a computer or smart phone system developing the proposed system is accessibility. A
for the first time isn't that convenient as it is for a system is accessible solely if it may be used
standard user even though it is user friendly. Though expeditiously by all varieties of individuals whether
there are several screen readers offered then also or not disabled. The current systems do not offer this
these individuals face some minor difficulties. Screen accessibility. Therefore the system we are developing
readers speak out whatever content is there on the is completely different from the current system.
screen and to perform the particular actions the Unlike current system that emphasizes a lot on user
person will have to use keyboard shortcuts because friendliness of traditional users, our system focuses a
mouse location cannot be detected by the screen lot on user friendliness of all varieties of individuals
readers. This means 2 things; one that the user cannot as well as normal people visually impaired individuals.
make use of mouse pointer as it is fully inconvenient The complete system is primarily based on speech to
if the pointer location cannot be derived and second text commands. Once using this system the
that user should be versed with the keyboard on application will be prompting the user to speak
wherever each and every key is placed. A user who is specific commands to avail respective services and if
new to computer will therefore not use this service as the user wants to access the respective services then
they're not conscious of the key locations. Also there he/she needs to speak that command.
are some difficulties faced by visually impaired
people when using smartphone systems. All these are V. IMPLEMENTATION RESULTS
some drawbacks of the present system that we are
going to overcome within the application we are
developing.
in Speech Recognition API is used for this purpose keyboard usage is eliminated. The user solely has to
hence using this input is provided to different follow the directions given by the system and use
modules of the system as intended user cannot voice commands consequently to get the several
manually enter the data required. services offered. Other than this the user may have to
Text-To-Speech is used for conversion from text to be requested to feed info through voice inputs
speech. It is used to Speak menu to the user which whenever required.
can be used to provide list of available options a
particular user can do on a given module or page. It is VII.FUTURE ENHANCEMENT
also used to read message that is been received by the
intended user. As intended user cannot directly read. Voice could be extended to image attachments and
ResponsiveVocic.js is API that is used for conversion other options such as indentation, fonts etc., that are
of Text to speech. available with normal E-Mail.
Php Mailer and PhP-IMAP PhP Mailer is a library
which is provided by PhP which can be used to send VIII. REFERENCES
e-mail. PhP Mailer is used in proposed system which
is used to send emails. In order to extract the mails [1]. T. Shabana, A.Anam, A.Rafiya, K.Aisha, “Voice
from the system Php Imap is used to fetch the user’s based Email System for Blinds”, “IJARCCE”, Jan
mail from the IMAP server. 2015.
Knuth-Morris-Pratt Algorithm Pattern Matching is [2]. P. Ingle, Harshada Kanade, Arti Lanke, “Voice
very key component when it comes to searching mail based Email System for Blind”, “IJRSCSE”,
in inboxes. System provides three ways to search by 2016.
keyword, date and today’s date out of search by [3]. Jagtap Nilesh, Pawan Alai, Chavan Swapnil,
keyword requires KMP for pattern matching. Given a “Voice based System in Desktop and Mobile
string ‘S’, the problem of string matching deals with devices for blind people”, “IJETAE”, Feb 2014.
finding whether a pattern ‘p’ occurs in ‘S’ and if ‘p’ [4]. Prof Umesh A Patil, Pranouti Patil, “A survey
does occur then returning position in ‘S’ where ‘p’ on voice based mails system for physically
occurs. Knuth, Morris and Pratt proposed a linear impaired peoples”, “IJIRCCE”, Jan 2016.
time algorithm for the string matching problem as
compared to other approaches. Cite this article as:
ABSTRACT
Analytics is very important in all fields in order to make decisions over certain facts. Social media analytics is
the process of collecting information from various social media platforms, websites and blogs. These analytics is
done to make effective business conclusions. The usage of social media has become the latest trend in today’s
world. Social data analytics is not about just collecting likes and comments shared by individuals but it has
become the platform for many trademarks to bring out promotion. Applications such as marketing, elections
widely used social data to make predictive decisions. Some of the approaches followed are forming hypothesis,
getting deep into the data, mapping events etc. These analytics can also be done in applications such as business,
Change in amendments, Education, Demonetization etc. The challenges faced are metrics formed by social
media should reach the right people, unstructured data being difficult to priestship paper discusses about the
model, theme, performance evaluation, advantages and disadvantages under literature survey.
Keywords : Social Media, Insights, Datasets, Analysis, Challenges
CSEIT195149 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 299-302 ]
299
T. K. Anusuya, A. Preethi Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 299-302
LITERATURE SURVEY Big data is nothing but huge amount of data which
cannot be processed using traditional methods. The
A. Can Twitter save lives? A Broad scale study on data to be processed may bestructured, unstructured
Visual Social Media Analytics for Public Safety or semi structured. These data come from various
Theme: According to Dennis Thom et al. presents sources such as sensor data, transactional data,
that nowadays the social media is being used for cameras, microphones and lot more of resources. On
commercial purpose rather than safety. The paper these large data sets analytics is performed in order to
gives a clear understanding on the crisis intelligence obtain undiscovered insights. Based on facts,
field study via Twitter data during the flood on everyday terabytes of data are being generated and
German 2013. Scatter Blogs systems was introduced now it has come up to zeta data. All social media
to implement other techniques. The second phase platforms in which billions of users are connected
sketched out a system based on the feedback about generate huge data which can be of any type such as
Scatter Blogs and a comparison is made between both text, images, audio, video, gif, etc.
the systems. B. Big Data Analytics in Healthcare
Theme: Based on the field of healthcare Big Data PROPOSED METHODOLOGY
analytics and its benefits with the methodologies
used and its outcomes and the challenges faced are It has been observed that each paper has used
discussed here according to Wullianallur Raghupathi different techniques which have their own pros and
et al. C. Big Social Data Analytics for Public Health: corns. The techniques overall used are Scatter Blogs,
Face book Engagement and Performance Theme: SoLoMo, IBM Big Insights each used for a purpose
analysis of Facebook data using unsupervised learning such as analysis, storage, streaming real time data etc.
indicates recent tendency of user engagement in We have decided to take the positive features of all
public health has been increased as observed by the algorithms, tools and techniques used in the
Nadia Straton et al. D. SoLoMo analytics for Telco Big above discussed papers. The social Media analytics is
Data monetization Theme: The reference has the main resource to perform analysis. It is actually
observed that the world can be accessed using the the process of developing informative tools to collect
mobile internet. This has helped widely in Business. and summarize the data. The usage of social media
The algorithms and technologies used in this paper has been evolving more as the days pass by. It has
are used to find out the insights with the help of been used for many positive as well asnegative usage.
social, location and mobile data of the individual. E. It all depends upon the attitude of the users.
Impact of Demonetization on Indian Economy Facebook, YouTube and Twitter are in the first, third
Theme: India has the highest rate of currencies. 87% and tenth position on account of the usage. In general
of the currencies are rotating in the form of Rs.500 the analysis process comprises of three stages Capture,
and Rs.1000. These currencies become the source of Understand and Present. Topic modeling is also one
income either by working under organizations or of the important techniques being used in above
through illegal enterprise. This paper by Dr. Pratap papers. Hence Social media analytics is highly used in
Singh et al. presents the impacts after the process of the analysis that is performed on demonetization.
demonetization occurred in India.
III. RESULTS AND DISCUSSION the API (Application Programming Interface) of the
respective platform. Sometimes it is requested to pay
in order to retrieve the data as they might keep their
resources secure. The next step processes it to
perform analysis on the retrieved data. This process
can also make use of R studio and flume platform to
store the data and perform analysis. The outcome is
derived in any of the formats such as Graph, line or
pie chart.
VI.REFERENCES
ABSTRACT
The main objective of this paper is to avoid the railway accidents happening at the level crossings. In India
railway is the major mode of the transportations and it is the cheapest way for travelling. So there are more
numbers of rail users. And it is not easy to stop railway anywhere to prevent accident or for any other reason.
Due to that there are major drawbacks of that. At present manned system is available at level crossings. Hence,
many accidents occur at such crossings, since there is no one to take care of the functioning of the railway gate
when a train approaches the crossing. The objective of this paper is to manage the control system of railway
gate using the microcontroller. This model includes IR sensors, RFID, LCD, buzzer, light led, motor driver and
microcontroller PIC16F877A. In the automatic railway gate control system, at the level crossing the arrival of
the train is detected by the IR sensor and RFID placed near to the gate. In case of RFID it detects only arrival of
train. Hence, the time for which it is closed is less compared to the manually operated gates and reduces the
human labour. As the entire system is automated errors occurring due to manual operation are prevented
because the accuracy of automated operation is more than the manned operation.
Keywords : Automatic Railway Gate, IR Sensors, RFID, PIC 16F877A, Motor Driver, Level Crossing.
I. INTRODUCTION the train by both sides. RFID is also used for the
detection of specific train only. RFID consisting of
We can’t take care of ours while in running by less tag and reader. Tag is given to the train and it will be
Railways being the cheapest mode of transportation read by that RFID reader only. When reader reads
are preferred over all the other means. But there are that tag which is placed on train then the gate will be
so many accidents happening at the manned control closed. When the last carriage of train passes having
level crossings. This is mainly due to the carelessness tag then the gate will be opened. LCD will display
in manual operations or lack of workers. This project information for the road users. This process Reduces
utilizes two pairs of IR sensor and RFID placed at the the traffic and time for which users have to for long
either sides of gate. Each pair of sensor consist of a time at level crossing.
transmitter and receiver, in our case light emitting
diode is used as a transmitter and a p-n junction
photodiode is used as receiver. It detects the arrival of
CSEIT195147 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 303-306 ]
303
M. Florence Dayana, R. Bhuvaneshwari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 303-306
Concept
At the present, India having world’s largest railway
network which having manned gate control system.
Over hundreds of railways running on track every
day. It is definitely impossible to stop the running
train at immediate in some critical situation or
emergency arises. Train accidents having serious
drawbacks in terms of loss of human life, injury,
damage to Railway property. This model uses
automatic control or operation of gate and reduces
the human labors. The concept of the model is to
control the railway gate using microcontroller
PIC16F877A. Figure 1. Block Diagram of System
ABSTRACT
The advancement in nature has prompted the presentation of very effective organic systems. Emulating these
instruments offers gigantic possibilities for the change of our life and the apparatuses we utilize. Nowadays, the
robot is biggest mechanism that is used for each and every process as it has the gripper assembly designed uses a
flexible casing which grasps the tree trunk of almost all diameter within the predefined range, basically it uses
passive compliance. This mechanism can be used for climbing trees which are almost height like coconut trees
and poles. The main drawback is being slow and there is a possibility of damaging the tree trunk. Hence this
system propose a new tree climbing mechanism for multi tree climbing robot that can be used to climb trees
that are almost straight and height.
Keywords : Robot, Grippers, Climbing trees, Clutching
CSEIT195141 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 307-311 ]
307
V. Manochithra, S. Karthika Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 307-311
These models using inch worm mechanism are pesticide sprayer, weed remover or some harvesting
continuous in their motion and can maneuver in mechanism can be mounted on the Robot. With
complex tree environments involving multiple these attachments this robot can act as harvesting or
branches. Next common type of design is wheeled maintenance equipment by the farmers.
robot where in instead of grippers wheels are used for
climbing up. The robot engulfs the tree and locks Coconut picking is a tough, arduous work. The
against it and as the motor rotates, it moves up. The farmers in popular coconut cultivating countries are
sizes of these robots are comparable to the diameter facing severe shortage of skilled workers for
of tree. These models are suitable for trees with harvesting. In recent years, the number of coconut
straight and plain trunks. tree climbers has declined sharply, as those men who
do this rigorous job of climbing 30 to 80 feet high
The main drawback is it being slow and there is a above the ground, bare handed or with the aid of a
possibility of them damaging the tree trunk. Hence rope, have broken away from their traditional role to
most of the models are slow, less agile, have less load take-up better paid jobs. Since the Green Revolution
carrying capacity. As a result, we propose a tree of the late 1960s, the harvesting of coconuts today
climbing mechanism that can be used to climb trees has little changed from how it used to be done for
that are almost straight, like coconut trees and poles generations. The job of coconut picking, which is
with greater agility. The main locomotion of the perceived as risky and unglamorous, does not attract
robot is caused due to the two motors which youngsters either, even though the remuneration is
facilitates simultaneous motion of two consecutive fairly good in local standards. Though there exist few
links. tree climbing machines today, by any measure,
climbing for coconuts is hard work. Not only does a
climber have to scale the tree and reach out among
the fronds and cut the coconut, but they also have to
instinctively learn which nuts are ripe enough to be
harvested. Besides, those few climbers who still
remain in the business of coconut picking, claims
higher wages.
V. LOCOMOTION OF ROBOT
IV. METHODOLOGY
There are three types of motion. These are classified
In traditional harvesting method on reaching the top as continuous, discrete and serpentine. As we get
of a coconut tree, the climber taps the nut in the closer to continuum type, energy consumption is
lowermost bunch with its harvesting knife to test its reduced and speed is increased. But it is difficult to
maturity. If he is satisfied, he cuts the bunch at the achieve continuous motion, so discrete form is
base of the stalk when it drops down to the ground. followed in the construction.
The climber also cleans the crown and removes the
dry leaves, sheaths and spathes. In some places where First, the bot is attached to the tree trunk with the
the trees are not tall, cutting the coconut bunches help of grippers which grips on to the tree trunk and
with a knife, attached to a long bamboo pole, does provides adequate friction such that it does not slip.
the harvesting. The motors used for climbing overcome the moments
caused by its weight.
❖ Ease of use - They wanted use of the robot to be
something that could be easily learned, so it The movement takes place as follows:
would not slow down ALB inspection rate.
❖ Work safe - They wanted the system to have fail 1. First the arm with first motor will hold the tree.
safes implemented to ensure no potential harm 2. Then the link with second motor will release the
to USDA operators in the field. grip and the whole setup will rotate about motor
❖ Minimal damage to tree - They did not want the one as shown in figure.
robot to inflict any serious harm on the tree it 3. After half a rotation, the arm with second motor
was climbing. will grip the tree and the process continues. Once
❖ Navigation around branches - They needed to the robot reaches the topmost point of the tree
robot to be able to find its way around branches, trunk, the whole body is gripped on to the trunk
so inspections could be complete. without any further movement, i.e., the body is
grounded, thereafter miscellaneous action like
harvesting or maintenance work can be
performed.
ABSTRACT
Spinal muscular atrophy (SMA) describes a group of disorders associated with spinal motor neuron loss. In this
review we provide an update regarding the most common form of SMA, proximal or 5q SMA, and discuss the
contemporary approach to diagnosis and treatment. Electromyography and muscle biopsy features of
denervation were once the basis for diagnosis, but molecular testing for homozygous deletion or mutation of
the SMN1 gene allows efficient and specific diagnosis. In combination with loss of SMN1, patients retain
variable numbers of copies of a second similar gene, SMN2, which produce reduced levels of the survival motor
neuron (SMN) protein that are insufficient for normal motor neuron function. Despite the fact that the
understanding of how ubiquitous reduction of SMN protein leads to motor neuron loss remains incomplete,
several promising therapeutics are now being tested in early phase clinical trials. This proposed model
investigates the symptoms and scans readings from the initial MRI scan images of babies with mutation
progress and SMN proteins formation benchmark values for this particular disorder SMA and further this
segmented parameters are acquitted into the K-means clustering technique that predict the report with the
disorder symptoms with MSE (mean square error) values that helps the babies in future to take prevention
measures to overcome this problem.
Keywords : Spinal Muscular, K-Means Clustering, Neuron, Disorder Symptoms, MRI Images.
I. INTRODUCTION legs first and then the arms and, in due time, they
will become quadriplegic and even more disabilities
Spinal Muscular Atrophy (SMA) is a progressive can follow including speech impairment. Assistive
neuromuscular disorder. Usually, this condition is Technology support for people with such disabilities
considered genetically induced with no known cure often requires identification of the best residual
to date. Children are born with the condition and muscular function so that this can be utilized as a
develop muscular weakness progressively as they means of voluntary control.
grow. The weakness ultimately encompasses the
whole muscular function rendering the limbs Spinal muscular atrophy (SMA) refers to a group of
dysfunctional or paralyzed. Many children with SMA, inherited diseases of the motor nerves that cause
if they do not have the weakness from the beginning, muscle weakness and atrophy (wasting). The motor
will start having the disease manifesting itself on the nerves arise from the spinal cord and control the
CSEIT195142 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 312-318 ]
312
V. Manochithra, G. Sumithra Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 312-318
muscles that are used for activities such as breathing, muscles at disease duration of >10 years compared to
crawling, walking, head and neck control, and disease duration of ≤10 years. Longitudinal follow-up
swallowing. SMA is a rare disorder affecting of four patients with two MRI studies eight years
approximately 1 out of every 10,000 individuals apart showed evidence of slow progression. Clinical-
worldwide. radiological comparison revealed a good correlation
for most of the muscles. This muscle MRI study in a
SMA affects muscles throughout the body. In the relatively large number of patients showed a specific
most common types, weakness in the legs is generally pattern of involvement in SMA 3b and revealed that
greater than in the arms. Sometimes feeding, muscle MRI can be an objective and powerful tool in
swallowing, and respiratory function (e.g., breathing, showing disease progression with implications for
coughing, and clearing secretions) can be affected. clinical trials.
When the muscles used for breathing and coughing
are affected and weakened, this can lead to an Clinical Features Of SMA
increased risk for pneumonia and other respiratory
infections, as well as breathing difficulty during sleep. Since only α motor neurons are lost progressively,
The brain’s cognitive functions and the ability to feel only motor function is compromised and sensory
objects and pain are not affected. People with SMA neurons are unaffected. This loss of function leads to
are generally grouped into one of four types (I, II, III, weakness and to progressive symmetrical atrophy of
IV) based on their highest level of motor function or the proximal voluntary muscles of the legs, arms and,
ability. sometimes, the trunk, as the disease progresses. A
number of unusual clinical features are observed in
There are only a few reported muscle magnetic SMA. One of these is the distribution of muscle
resonance imaging (MRI) studies of genetically- weakness, which is more compatible with a
confirmed spinal muscular atrophy (SMA). The aim myopathic disorder than with a neurogenic
of this study was to search for the presence of disorder.12 Proximal muscles are more involved than
selective muscle involvement and of disease distal muscles, legs are more affected than arms and
progression by MRI in SMA 3b. MRI of proximal arms are more affected than the face anddiaphragm.8,
upper and lower extremities was performed on a 1.5- 12 In other words, muscle weakness and atrophy does
Tesla MR scanner using conventional T1 and T2 not have a homogeneous distribution. The severity of
weighted axial images in twenty-two patients with muscle weakness is related to age at onset and
genetically-confirmed SMA. Patients had detailed children with the most severe form of the disease
clinical examinations within one month of the (Type I SMA) can appear normal at birth, but present
radiological investigation. MRI revealed a selective muscle weakness few months later. Furthermore, the
involvement of muscles. Triceps, iliopsoas and clinical course followed by SMA patients.
quadriceps femoris were the most affected muscles.
In contrast, biceps brachii, deltoid and gluteus Who survive beyond childhood demonstrates that
maximus were well-preserved. Gracilis, short head of loss of muscle strength is normally most evident at
biceps femoris, semimembranosus, and Sartorius and diseases onset and that, after this, residual muscle
adductor long us were also relatively spared. Slow, power can remain stable for months or years.
but definite progression with a predictable sequence
and magnitude was documented. Median MRI grade II. LITERATURE SURVEY
was higher (worse) usually by one grade in the
One of the major challenges facing researchers poses an extra challenge precisely due to their
engaged in the study of neurodegenerative and complicated genetics. An attractive alternative would
neuron development diseases is to explain why therefore be to address these issues in diseases with a
defects in ubiquitously expressed proteins have such simple Mendelian inheritance pattern. Spinal
a selective effect on the nervous system and its muscular atrophy provides researchers studying
constituent cell types. Explaining the molecular neurodegenerative diseases with this opportunity.
mechanisms underlying the disease phenotypes has This review highlights why (1) SMA might be
been hampered by their multifactorial nature and considered a prototypical neurodegenerative disease
high incidence of sporadic cases. Alzheimer’s disease, in which to address certain general questions facing
Parkinson’s disease, and amyotrophic lateral sclerosis the field, and (2) why a thorough understanding of
(ALS) are among the most common this disorder might shed light on the mechanisms
neurodegenerative diseases in humans and good that have a specific effect on the development, health,
examples of disorders that exemplify these challenges. survival, and causes of motor neuron degeneration,
Two less common neurological diseases which are which ultimately leads to a disease phenotype.
monogenic in origin but are the result of defects in Proximal spinal muscular atrophy, commonly
ubiquitously expressed proteins involved in referred to as SMA, is a common autosomal recessive
housekeeping functions are Rett syndrome and 5q neuromuscular disease that affects the anterior horn
spinal muscular atrophy (SMA). cells of the spinal cord, resulting in atrophy of the
proximal muscles of the limbs and trunk. There are
The former is characterized by mutations in the gene numerous other forms of spinal muscular atrophy
encoding methyl – CpG binding protein 2 (MeCP2), which share certain characteristics with proximal
which likely regulates gene expression and chromatin SMA; however, they are genetically distinct and
structure; the latter by a deficit of the survival of often affect different subsets of neurons and muscle.
motor neurons (SMN) protein, whose best They include autosomal dominant forms of the
characterized function is in snRNP biogenesis and disease (Sambuughin et al., 1998; Van der Vleuten et
pre-mRNA splicing. Yet, despite the apparent need al., 1998), X-linked forms (La Spada et al., 1991;
for these proteins in all tissues, Rett syndrome, a Kobayashi et al., 1995), recessive forms that affect the
prototypical neurodevelopment disorder, is distal muscles (Viollet et al., 2002), and a severe form
characterized by a specific defect in maintaining of SMA (SMARD) with respiratory distress
proper function of post mitotic neurons in the (Grohmann et al., 2001) (Table 1).
forebrain, hippocampus, and brainstem, while SMA
has a particularly profound effect on lower motor After cystic fibrosis, SMA is the most common
neurons. autosomal recessive disorder in humans, with a
carrier frequency of approximately 1 in 35 and
This begs the question: do the proteins implicated in therefore an incidence of 1 in 6000 in the human
these diseases have functions in neurons other than population. It is also the most common genetic cause
their proposed housekeeping roles? Do they modulate of infant mortality. Despite the high incidence of the
downstream pathways specific to the tissues affected? disease in the human population, SMA has gained
Alternatively, are neuronal cells simply more relatively little attention among researchers studying
susceptible than other tissues to genetic, biochemical, neurodegenerative diseases. However, it has a
and environmental insults? Answering these fascinating biology, which includes two major players:
questions using multifactorial diseases as paradigms the highly homologous SMN1 and SMN2 genes.
III. METHODOLOGY
Nadu, India
2M.Sc Computer Science, Department of Computer Science, Bon Secours College for Women, Thanjavur, Tamil
Nadu, India
ABSTRACT
The transfer of the medical care services to the patient, rather than the transport of the patient to the medical
services providers is aim of the project. This is achieved by using web-based applications including Modern
Medical Informatics Services which is easier, faster and less expensive. The required system implements the
suitable informatics and electronics solutions efficiently for the Tele-medicine care. We proposed an approach
to manage different multimedia medical databases in the telemedicine system. In order to be efficiently and
effectively manage, search, and display database information, we define an information package for both of
doctor and patient as a concise data set of their medical information from each visit. The methodology for
accessing various types of medical records will be provided, also we will design two web-based interfaces, high-
quality data and display for many medical service purposes.
Keywords: Datamining, Telemedicine, Medical Services, Databases.
CSEIT1183818 | Received : 05 Feb 2019 | Accepted : 15 Feb 2019 | January-February -2019 [ 5 (1) : 319-321 ]
319
T. K. Anusuya, P. Maharajothi Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 319-321
rural areas and medical centers [16][18],this web management services, namely—
database
subsystem is not included in a PACS. fragmentation, data distribution, websites clustering,
distributed caching, and database scalability.
II. LITERATURE SURVEY
IV. PROPOSED METHODOLOGY
Recently, many researchers have focused on
designing web medical database management systems Our approach integrates three enhanced computing
that satisfy certain performance levels. Such services techniques namely, database fragmentation,
performance is evaluated by measuring the amount of network sites clustering and fragments allocation.
relevant and irrelevant data accessed and the amount We propose an estimation model to compute
of transferred medical data during transactions’ communications cost which helps in finding cost-
processing time. The medication reminder effective data allocation solutions. We perform both
synchronization system provides a patient with external and internal evaluation of our integrated
medications as prescribed by medical staff. In approach.
addition, medical staff can remotely send messages to
the system in order to change the medication In our proposed system we develop a fragmentation
schedules or device configuration settings embedded computing service technique by splitting
in the medication reminder. The proposed system telemedicine database relations into small disjoint
supports the OMA (open mobile alliance) DS (data fragments. This technique generates the minimum
synchronization) protocol, which was originally number of disjoint fragments that would be allocated
proposed as a DS standard protocol that synchronizes to the web servers in the data distribution phase. This
data between mobile devices and a central server. In in turn reduces the data transferred and accessed
this study, the OMA DS protocol is redefined and through different websites and accordingly reduces
extended to transmit the patient’ s medication status the communications cost.
data and the device configuration data.
V. IMPLEMENTATION RESULTS
III. EXISTING PROCESS
ABSTRACT
Today’s world belongs to information technology. Information is worthwhile only if, it can be accessed at the
right time, by the right person & is useful for the purpose defined. The purpose of Medical Product Complaint
Management System (MPCMS) is to provide their prescription details and complaint registration easier one.
This is an important tool to control and effectively manage the entire operation of patient details management
and complaint registration in a very efficient manner and take it to the path of growth. The System deals with
the collection of patient details and the prescription details and outputting it to the user through web
application. The prescription details are stored into the database and when the user logs into the system they
can view their prescription details. The user has been given a login to view the details and he can able to
register the complaint in case of severe problems occurred due to the wrong prescription of medicines. The
complaint will be submitted and it will be viewed by the NGO. The NGO is having separate login to view the
complaints and he will be given the authority to accept/reject the complaint.
Keywords : Medical Product, Complaints, NGO, Prescription, Patient, MPCMS (Medical Product Complaint
Management System).
CSEIT195171 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 322-326 ]
322
R. Gomathijayam, J. Ayeesha Int J Sci Res CSE & IT. January-February-2019 ; 5(1) 322-326
investigations are carried out. Carrying out number his login. The online storage can be implemented
of tests and making the results available promptly is using cloud computing which provides a shared and
very crucial for assessing the patient's medical status secured access to all the resources shared. If a
and deciding on the further course of action. patient is currently admitted then that patient’s
Patient’s medical record data is critical for the current status (whether he is undertaking tests or in
analysis and research purposes and therefore it has OPD etc.). Doctors can have this customized version
to be stored and manipulated in an efficient manner. of application on their tablets based on their
This data includes patient history, observation, speciality that can give them all the patient details
diagnosis and therapeutic conclusions along with in hand which can help manage their schedule by
the tests details and serves as a source of prioritizing each patient.
information for any analysis and research. The
purpose for this storing the medical data is for Doctor can also send pictures and videos of a
utilizing the patient’s medical information and uses patient’s condition to other doctors for expert
it for analysis thereby improving patient care. opinion if required; doctors can give online
prescriptions to pharmacy directly specific to
When the user logs into the system, he can view all particular patient with their patient id. We can
his medical data through ‘medical prescription develop this application using android programming,
details module’. Since the data are stored in case of android programming being open source the entire
severe problems after the treatment, the user can OS is open for usage and extension. Every person
register the complaint as he has the electronic proof. can view the website and should be able to register
Further if the concerned doctor is not available and him/her providing all the necessary details required ,
if there comes the need to take care of the person by the system will provide a Patient’s ID to the patient
some other doctor he can make use of the stored and further actions can be taken based on the this
proof instead of searching the prescriptions and patient ID .A patient can take the appointments
medical data from the form. Even if third party tries online and know the availability of the doctor.
to login / alter the data he will be prompted to the Notifications about regular health check-ups and
error page as there were strong validations in the vaccinations can be sent to the patients and doctors.
system. Website also contains page for online journals
II. LITERATURE SURVEY which include all the latest medical advances and
also medical breakthroughs, unique cases for study
A. Functional Description of Online Medical and videos featuring several surgeries and research.
Management System Using Modern The user can also check for tips. Using web
Technologies: Priyanka Patil, Sruthi technology it can be easy to provide all the above
Kunhiraman, Rohini Temkar, VES Institute of functionalities and making the management of
Technology, Chembur, Mumbai patients efficient.
analysis to identify the flaws in the service causes of online complaints; (2) seek effective ways
standards, in the complaint handling procedure of handling customer complaints by examining
itself, and the finer points which help to formulate different product types; and (3) provide guidelines
resolution methods. When major key problems for successful e-CRM. 1000 customer complaints
persist, complaints may spread across a range of from three different publicized e-business customer
company activity, from operational employee service centres and 500 complaints from online
performance to managerial handling of both policy feedback systems were analyzed in this study. The
and practice. A poorly managed and/or designed research findings suggest that e-businesses should (1)
complaint system will inevitably impact on the provide excellent online customer services because
company's profit and loss status, through excessive customer service is the most important factor in
expenditures, damage to market reputation and online customer satisfaction; (2) respond to
declining income. As the ultimate goal of a customers' requests/complaints quickly because the
company is to content customers, acquire an response speed is more important in online
efficient profit margin, and have a long-lasting customer satisfaction than offline; and (3) employ
relationship with customers and improving market strategies that are appropriate for the product
shares. They should handle the complaints within category in question.
complaint management system and this system
alone must be under the monitoring of customer D. A Multimedia Medical Report Management
relationship management system. The aim of this System:
study is to identify these irregularities and to
The goal of the MrBrAQue (Medical Report Browse
propose a strategy to minimize them. For improving
and Query) project is to develop a system that
reliability of the company we benefited from failure
enables effective management of a large collection
mode and effect analysis technique (FMEA) which
of multimedia documents. The tools for consulting
lets preventive analysis of failures that may
the report collection are presented in this paper.
compromise credibility of the company. As a
Our proposal is based on a paradigm, which we call
methodology model set of 30 questionnaires have
orthogonal navigation that allows a user to
been assigned for this reason and a case study of an
dynamically build a hypermedia network of
airline has been chosen. Ultimately, using, 5-point
documents by means of queries over the document
likert scale and SPSS software, we were managed to
collection
administer the data and conclude the results.
model makes full use of legacy applications and is • Less Time constraint for registering complaints.
flexible for future extensions. Experiment shows • Once the complaint is accepted, the patient can
that real-time, intelligent performances and register the case so that they can be given some
efficiency of operation are obviously improved. fund in return to the mistakes done.
F. Clinical Database Management Software
(CDMS) for medical, diagnostic and research
centres:
[2] Handling e-complaints in customer complaint qualitative system, Faed, A., DEBII, Curtin
management system using FMEA as a Univ. of Technol., Perth, WA, Australia
qualitative system - Faed, A. ; DEBII, Curtin
Cite this article as :
Univ. of Technol., Perth, WA, Australia
[3] A multimedia medical report management
R. Gomathijayam, J. Ayeesha Parveen, "Medical
system ,Merialdo, P. ; Dipartimento di Inf. e
Product Verify and Complaint Management System
Autom., Rome Univ., Italy ; Sindoni, G.
for Ngo's", International Journal of Scientific
[4] Functional Description of Online Medical
Research in Computer Science, Engineering and
Management System Using Modern
Information Technology (IJSRCSEIT), ISSN : 2456-
Technology - Priyanka Patil, Sruthi
3307, Volume 5 Issue 1, pp. 322-326, January-
Kunhiraman, Rohini Temkar,VES Institute of
February 2019. Available at doi :
Technology, Chembur, Mumba
https://doi.org/10.32628/CSEIT195171
[5] Handling e-complaints in customer complaint
Journal URL : http://ijsrcseit.com/CSEIT195171
management system using FMEA as a
Chennai, India
2 Assistant Professor, Department of Computer Science and Engineering, RMK Engineering College,
Chennai, India
ABSTRACT
Currently a child’s security is a crucial space of concern. This paper is developed to rectify the troubles parents
relating to their child security. In keeping with a story from 2014, about 135,000 kids are calculable to be
trafficked in India annually. Trafficked children are sold-out into slavery, domestic slavery, beggary, and
therefore the sex trade. This paper provides the conception of sensible wearable devices for our little ones. And
to stop kid trafficking. One amongst the most precedence over this device is that it provides us the tracing
details of our little ones. And it doesn’t require a smart phone or a technician person to know and use it. The
motive of this device is to assist find their kids with none difficulties. At the moment there are several tracking
device that helps us to note our children’s activity with ease and additionally notice the kid using Wi-FI and
Bluetooth. However Wi-Fi and Bluetooth seem to be unpredictable medium of communication between the
parent and kid. So the main focus of the paper is to possess an SMS text enabled communication between the
child’s wearable and also the parent because the GSM mobile communication is nearly present everyplace. The
parents will send a text with specific keywords like “LOCATION” “TEMPERATURE” “UV” “SOS” “BUZZ” ETC.
The tracking device can reply back providing the correct location of the kid and it will navigate through google
maps. So this paper provides parents with a way of security for his or her kid in today’s world.
Keywords : Child Safety Wearable Device, Arduino, Trafficked children, Lynceus2Market, RFID, MASS, RSSI,
DCC, ATNAC
CSEIT195191 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 327-333 ]
327
Elakiya M., S. Radhika Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 327-333
location of the fishing boats through a new Ultra low-power UWB-RFID system for precise
technology using radio waves. location-aware applications
Ultra low-power radio-frequency identification
(RFID) tag with preciseness localization is commonly
the sanctioning technology for location-aware
detector applications. The RFID tag could be a
transmitter comprising of a micro-controller board
and a UWB impulse radio board. Power saving and
precision localization is achieved by improvement of
the circuit style for immoderate short pulses further
as system design and operation.
This technology will be provided with SME –driven S. Nasrin and P. 1. Radcliffe, "Novel protocol allows
market segments of smoke alarm, fire detection DIY home automation," Telecommunication
systems, life saving equipment, emergency Networks and Applications Conference (ATNAC),
management decision support systems and assistive Novel Protocol Enables DIY Home Automation.
search and rescue equipment.
In this paper, we tend to describe a brand new design
Y. Zhou, C.L. Law and J. Xia, “Ultra low-power for a home automation system that is constructed on
UWB-RFID system for precise location-aware novel network protocols.
applications,” in Wireless Communications and
Networking Conference Workshops (WCNCW), pp. The new system permits a user or home-owner to
154–158, April 2012. buy off the shelf devices and management them by a
computer or mobile device terribly} very easy Objective measures of response throughout these
manner. phases could facilitate determine kids in danger for
The system does not require expert configuration or a anxiety, we tend to propose an alternate technology,
central controller therefore the cost will be an inertial measurement unit (IMU), that permits
significantly reduced. The key enabling technology non-invasive activity of the movements related to
that makes this possible is an XML definition threat response.
Of the device capabilities, show needs, and
management signals. Internet of Things: a definition & taxonomy: Bruno
Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe
Md Imdadul Hoque,1,* Abdullah Al Amin,1 Md Wary and Nizar Kheir
Jumshadur Rahaman,1 and Mohammad Hossam-E-
Haider1 1Electrical Electronic & Communication Internet of Things: a definition & taxonomy
Engineering Department Military Institute of Science
and Technology, Dhaka, Bangladesh The Internet of Things (IOT) has varied fields of
Designing and Performance analysis of GSM/GPS application including health care, resource
based mostly heavier-than-air craft following Device management, asset tracking, etc. depending on the
utilization case, varied technologies like RFID,
Low flying aircrafts are always powerful to trace Wireless sensing element Network (WSN) or smart
because of the radar horizon limitation. However an Objects is used. With each of these comes a specific
aircraft is often to be tracked for the security purpose vision of what the IoT and connected objects are and
.The combination of world Positioning System (GPS) – to our information – there's no global image of the
and international System for Mobile IoT.
Communications (GSM) also can perform the duty
satisfactorily. During this work, two GSM networks Jun Zheng David Simplot-Ryl Chatschik Bisdikian
were utilized to trace low flying aircrafts in several Hussein T. Mouftah
routes. The device style is projected basing on the
experimental results of chase. GUEST EDITORIAL – THE INTERNET OF THINGS
Ellen W. McGinnis*, Ryan S. McGinnis*, Member, The growth of the internet shows no signs of
IEEE, Maria Muzik, Jessica Hruschak, Nestor L. retardation down and it steady becomes the cause of
Lopez-Duran, Noel C. Perkins, Kate Fitzgerald, a brand new pervasive paradigm in computing and
Katherine L. Rosenblum communications. This new paradigm enhances the
standard internet into a smart net of Things (IoT)
Movements indicate threat response phases in created around intelligent interconnections of
children at-risk for anxiety numerous objects within the physical world, like
vehicles, cell phones, habitats, and habitat occupants.
Temporal phases of threat response similarly as It utilizes affordable information gathering and
Potential Threat (Anxiety), Acute Threat (Startle, dissemination devices, like sensors and RFID tags,
Fear), and Post-threat Response Modulation area unit that facilitate fast interactions among the objects
referred to as underlying markers of tension themselves as well because the objects and persons in
disorders. anyplace and at any time. IoT isn't a mere extension
of today’s net or an online of net systems.
ChildGuard: A Child-Safety Monitoring System A wireless modem behaves like a dial-up modem.
Zhigang Gao, Hongyi Guo, Yunfeng Xie, and Yanjun The main distinction between them is that dial-up
Luo Hangzhou Dianzi University Huijuan Lu and Ke electronic equipment sends and receives information
Yan China Jiliang University. through a set telephone line whereas wireless
electronic equipment sends and receives information
ChildGuard: A Child-Safety Monitoring System through radio waves.
The ChildGuard system exploits mobile devices to The operating of GSM electronic equipment relies on
observe the period of time movement of commands.
unsupervised children. It additionally sends
reminders and alarms to kids and notifies guardians C. LCD
of abnormities in a child’s routine. for instance, two
typical measures embody hiring manned guards or LCD (Liquid Crystal Display) screen is associate
using video surveillance, but guards aren’t practical electronic show module and notices a large vary of
or affordable when it involves monitoring kids, and applications.
video surveillance systems typically have blind zones.
to that end, ChildGuard may be a security A 16x2 {lcd liquid crystal display |LCD| digital display
methodology for observation kids that uses present |alphanumeric display} display is incredibly basic
computing devices, like smartphones or wearable module and is extremely unremarkably employed in
devices—which are growing in each quality and varied devices and circuits.
performance.
These modules area unit most popular over seven The sensors contain two in contact with an
phases and alternative multi segment LEDs. electrolyte.
The reasons being: LCDs are economical; easily The electrodes are usually invented by fixing a high
programmable. extent valuable on to the porous hydrophobic
membrane.
G. ARDUINO IDE:
Most of the daily commuters of RTC face problems to know the exact time of arrival of a bus to a particular stop.
The time of arrival of bus depends on many factors like traffic, condition of a bus, climate etc. So it is very
tough for a person waiting for a bus without knowing whether it has left or not from a particular stop. So here
we are providing a solution for this problem by using latest technologies like an Android Application. The
solution is that we want to develop an ANDROID APP[1] which gives the notification of a bus arrival in a
particular route for a particular stop. The backbone of our application is using CROWDSOURCING. It is
nothing but taking the help of some people to help other people. The passengers who have seen or boarded the
bus can report the bus location along with an image of bus with the help of our app. Then this location will be
sent as a notification to all other commuters in that particular route. The commuters who have missed the bus
from the stops through which the bus has already passed, can go with an alternative option and the other
commuters waiting at the stops to which bus has to arrive can wait accordingly. This helps in saving our
precious time which many of us wasting it in waiting for a bus. In this way our application helps the daily
commuters to know the location of a bus and saves their precious time.
Keywords : Crowd Sourcing, Androidapp, Notification, Location
CSEIT195192 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 334-339 ]
334
B. Harshini Reddy et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 334-339
commuters waiting at the stops to which bus has to Initial review which is organized is for proving that
arrive can wait accordingly. This helps in saving our problem regarding buses being late to bus stops exists.
precious time which many of us wasting it in waiting At the same time, we assessed the level of significant
for a bus. In this way our application helps the daily of the problem. We observed the expected arrival
commuters to know the location of a bus and saves time to each bus stop for a period of time for two
their precious time. weeks. The result of the observation is that most of
the time the bus failed to arrive at the bus stop as
II. LITERATURE SURVEY they are scheduled to arrive. Furthermore, we had
got a shocking observation result that is sometime the
For any enterprise or task, the initial phase would be bus skipped its trip and causing the passengers to wait
literature survey concerning with formerly issued for the next bus that might arrive an hour later.
journals. Prior to decision making, a thorough Sometimes the bus arrives late at the first bus stop for
patrons review regarding journals is done in a more than fifty minutes. It is causing the passengers
sequence manner. Complete knowledge and in that entire route to be delayed and arrive at late to
interpretation concerning the enterprise would be their workplaces. Also, the problem even happens
the main principle of this literature review. It also during peak hours where most of the passengers will
helps us lay a firm base for upcoming tasks. be rushing to their workplaces. These observation
Research which is undergone serves as guideline and results successfully proved that our problem
citation to the enterprise. Once the literature analysis statement is valid and these problems have to be
is done, we should be in a position to write to such a solved urgently for the benefit of the city and the bus
degree that manifests our experience and observation passengers. The second study is via survey. The main
regarding that particular domain and realize principal aim of this survey is to help understand the current
subject which are pertinent for the project. It’s demand and acceptance for our proposed solution in
important to have an idea about the one’s that can be the market. In order to understand the culture of the
ignored and must be in a position to predict end passengers, the problems faced by the passengers, and
result. the need of our proposed system, and the present
By summing up wholly, undeniably the intention of condition of public transportation we conducted a
literature survey is to find out the oversight survey by distributing hundred survey forms to the
pertaining to a task. The SMS Based Forecasting passengers who travel frequently through these
System of Public Transport Arrival Time[5]. public transportation.
After issue being identified and then coming up with According to our survey results the majority of the
suitable solving methodology we organized some commuters of the public transportation are
research concerning bus passengers stating our issue workforce and students who use this for travelling to
explanation, also explaining our recommended their respected workplaces daily. Also the most
solution. Three main segments are concentrated in common and major problem that is that the buses
our analysis. They are: usually do not arrive to the bus stops according to
1. Demonstrate as well as appraise the importance their scheduled time. Due this problem there is an
regarding issue description . inconvenience caused to the passengers and they are
2. The ultimatum and necessity of suggested end forced to wait for unpredictable frame of time.
result must be recognized and understood. Majority of the passengers who took part in survey
3.Providing the issue description demonstrated is reported that a SMS system which gives updates
correct, extract and analyse it. about the whereabouts and the arrival timings of the
bus would be a better solution for their problems. off. The methods used in this system are
Based on the this survey results and the information onPause(),onResume(),onKeyDown() and
obtained we are very positive that our proposed onDestroy().The Post-configuration process is
solution would be accepted by the bus passengers. managed by onDestroy() and onKeyDown() which
The current status of the problems faced by the makes the usage convenient.
passengers is very high. Thus we derived some
hypotheses to help us to understand the factors The implemented modules in this system are:-
which are affecting the bus’s arrival time. These
hypotheses are extremely important for us to 1. Bus Unit
understand the parameters involved in this system. 2. Central Control Unit
Based on the result of the hypotheses, we are able to 3. Client-Side Application
understand the possible causes of bus delays and this
The bus unit consists of GPS which tracks the co-
information will provide great assistant.
ordinates such as latitude, longitude and other
attributes of that particular location and send s it to
This report is a survey which helps the passengers to
the server. The GPS is free to use i.e.., no subscription
overcome the difficulties they are facing in their
fee is required. The GPS has the capability to
daily transportation. This helps to conserve time
receive information about these locations from three
which in very important. This not only saves the
satellites and calculates the position based on this
time but also it helps to form an advance transport
information. There are three different types of
system.
transceivers in GPS such as Data Loggers, Data
pullers and Data Pushers .Based on the application,
There are many resources present which gives us the
the appropriate transceiver will be chosen to gather
information regarding the bus numbers and its details.
the information and track the position. The GPS
In this review we get advance information like
attached to sends the information to the servers at
vacant seats, location of the bus, estimated time of
regular intervals of time. This information is received
arrival and departure to a particular place which can
by the device from the servers.
be viewed by the travellers.Gradual advancement of
bus systems reaches demands pertaining to various
The received data is analysed by the servers .The GPS
areas. Main motto of the application is to have a
antenna is connected to the right jack and fixes it’s
comfortable, simple and accessible bus facility that
position to receive signals in the appropriate places
uplifts the usage of public transport system.
.There is a slot allocated for a SIM card, the GSM
towers helps in receiving messages from different
III. PROPOSED METHODOLOGY
users and respond to them. The positive and negative
wires are connected to 12V or 24V vehicle power
This model consists of four parts. Each and every
system [4]. The tracker device is turned on to receive
individual model is divided based on their
the signals from the satellite hence thus enabling the
functionalities. The main activity of our application
device to receive the latitude and longitude values of
perform major tasks which include Pre-configuration
the position of the bus. At any point of time the GPS
and Instantiation methods. It consists information
receiver gives us the location values. The coordinates
about the total distance between the two locations
of the bus along with the timestamp is present in the
and also about the previous and current location. The
bus unit, these values are compared with the previous
status of the GPS is also examined whether it's on or
coordinates if there is any distinction then the new and the elements which are in correspondence with
co-ordinate values are updated and will be sent to the the stack are integrated in a tight manner to provide
server over the Internet[4]. the convenient and proper execution frame for
mobile devices.
The location details of the bus are saved in a
particular format with few attributes such as As per the advancement of the technology the
Latitudinal position, longitudinal position, ID and Android is developed for the touch screen devices
timestamp etc. Every bus has a unique ID which like mobile devices and tablets. This android is an
helps to identify different buses easily. Every bus has operating system developed by Google. The android
a different identification number called as ID. Server is based on the Linux kernel[6] whereas the
in this system takes an important role and performs Android's user interface is based on direct
major functions. Here the server stores and maintains manipulation with the help of human touches that
the complete information. The server also performs help to perform actions on the screen and also to give
actions like a gateway between the user and the bus input[5]. In extension to the devices Google added
module. The overall information about the routes, Android TV, Android Wear etc. with an exclusive
arrival time, department time are stored in the new user interfaces. The complication of the mobile
database. world has completely been reduced with the use of
Android. The unimaginable features are implemented
The final user can only view the application which is and high quality phones are made easily with the
an interactive web based module. Here the help of this Android OS.
application provides different services to remote
users. The user module requires two inputs that is the
current location point and the end location point. As
the user requests the server, it sends the list the buses
available in that location. Ones the bus is selected it
shows the real time location and time of that
particular bus on screen.
Figure 2. Screen 2 of bus notification system Figure 4. Login for bus notification system
Figure 3. Registration for bus notification system Figure 5. Location accessing for bus notification
system
ABSTRACT
Cryptography comes from the Greek word kryptos which means hidden. The aim of our research is to provide
secrecy for the data during transmission. In this we discuss about the qwerty cipher algorithm, its merits and
demerits. The existing qwerty algorithm is based on the use of a keyboard which is not much secured. We have
proposed an enhancement to the existing algorithm by using a diagonalized qwerty algorithm which is more
secure and highly difficult for the intruder to understand or decrypt the cipher text, even if it is decrypted the
result would be gibberish.
Keywords : Transmission, Intruder, Decrypt, Cipher, Gibberish.
I. INTRODUCTION
Traditional ciphers consist of substitution or
Cryptography is the strongest tool used for secret transposition techniques [2] [3]. In Substitution
writing which is controlling against the security ciphers, replace letters in the plain text with other
threats [6]. The study of encoding and decoding is letters or symbols keeping the order as same. It maps
called as cryptography [1]. In cryptography, a cipher plain text elements into cipher text elements [4].
is an algorithm consists of well-defined steps for
performing encryption or decryption. In encryption
ABCDEFGHIJKLMNOPQRSTUVWXY
process, the original plain text is coded into the Z
cipher text and in the decryption process; the plain
ZYXWVUTSRQPONMLKJIHGFEDCB
text is restored from the cipher text [2]. We need a A
strong encryption algorithm in order to encrypt the
plain text into cipher text [7]. The sender and Fig 2. Substitution Cipher
receiver must have obtained the secret key in a
secure fashion and must keep the key secure. The In Transposition ciphers, keep all of the original
process of encryption and decryption are shown letters intact, but mix up their order [5]. It transposes
below systematically the position of plain text elements.
Transposition cipher hides the message by
rearranging the order. Transposition cipher, just
reorder the letters [8]. A character in the first
Fig 1. Encryption and Decryption process position of plaintext may appear at 12th position in
CSEIT195151 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 340-342 ]
340
V. Vennila, S. Umamaheswari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 340-342
Encryption Technique:
A S D F G H J K L
Plain text: SUN RISES IN THE EAST
Key: QWERTY
Cipher text: MGY DHMCM HY EPC CLME Z X C V B N M
VI. REFERENCES
Fig 7. Representation of qwerty keyboard
[1]. ”Transformation of plain Text with two
V. EXAMPLE FOR DIAGONALIZED QWERTY ciphers”,(Rajani Bala,Swapnika saxena,Sonal
CIPHER beniwal), Volume 3, Issue 5, May 2013.
[2]. “Implementation of Ceasar Cipher with Rail
Encryption Algorithm: Fence for Enhancing Data Security”,(Ajit Singh,
Plain text: CRYPTOGRAPHY IS MY FAVOURITE Aarti Nandal, Swati Malik), Volume 2, Issue 12
SUBJECT , December 2012.
Key: DIAGONALIZED QWERTY [3]. “An Extension to Traditional Playfair
Cipher text: IKZTPFQKBTWZ CN DZ OBLFXKCPJ Cryptographic Method”( Ravindra Babu, Uday
NXAEJIP Kumar, Vinay Babu, Aditya, Komuraiah),
Volume 17, No.5, March 2011.
Decryption Algorithm: [4]. “An Improved Ceasar Cipher
Cipher text: IKZTPFQKBTWZ CN DZ OBLFXKCPJ Algorithm”,(Ochoche Abraham,
NXAEJIP GaniyO.Shefiu), Volume 2, Issue-5,1198-1202.
Key: DIAGONALIZED QWERTY [5]. "Alpha-Qwerty Cipher: An Extended Vigenere
Plain text: CRYPTOGRAPHY IS MY FAVOURITE Cipher”( Khalid Imam Rahmani,Neeta
SUBJECT Wadhwa, Vaibhv Malhotra), Volume 3, No.3,
May, 2012.
VI. ADVANTAGES [6]. William Stalling “Network Security Essentials
(Applications and Standards)”, Pearson
This diagonalized qwerty cipher has various Education, 2004 .
advantages over simple cipher. It is more difficult to [7]. Atul Kahate (2009), Cryptography and Network
cryptanalyze. The result cannot be easily Security, second edition, McGraw-Hill.
reconstructed. Brute force attack cannot crack the [8]. William Stallings, Cryptography and Network
code. Overcome all the limitations of the qwerty Security, 5th impression, 2008.
cipher.
Cite this Article : V. Vennila, S. Umamaheswari, "An Extension to Traditional Qwerty Cryptographic Method", International
Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307,
Volume 5 Issue 1, pp. 340-342, January-February 2019. Available at doi : https://doi.org/10.32628/CSEIT195151
Journal URL : http://ijsrcseit.com/CSEIT195151
ABSTRACT
In this era of information age, a huge amount of data generates every moment through various sources. This
enormous data is beyond the processing capability of traditional data management system to manage and
analyse the data in a specified time span. This huge amount of data refers to Big Data. Big Data faces numerous
challenges in various operations on data such as capturing data, data analysis, data searching, data sharing, data
filtering etc. HADOOP has showed a big way of various enterprises for big data management. Big data hadoop
deals with the implementation of various industry use cases. To master the Apache Hadoop, we need to
understand the hadoop eco system and hadoop architecture. In this paper we brief on the Hadoop architecture
and hadoop eco system.
Keywords: Big Data, Hadoop architecture, Hadoop eco system components, HDFS, MapReduce.
CSEIT195172 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 343-348 ]
343
Anushree Raj, Rio D’Souza Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 343-348
used to keep the distributed system functioning HCatalog works like a key component of Hive and it
together as a single unit, using its synchronization, enables the users to store their data in any format
serialization and coordination goals. For and any structure.
simplicity's sake Zookeeper can be thought of as a file HCatalog is a table storage management tool for
system where we have znodes that store data instead Hadoop that exposes the tabular data of Hive
of files or directories storing data. Zookeeper is metastore to other Hadoop applications. It enables
a Hadoop Admin tool used for managing the jobs in users with different data processing tools (Pig,
the cluster. MapReduce) to easily write data onto a grid [7].
HCatalog ensures that users don’t have to worry
ZooKeeper is a centralized service for maintaining about where or in what format their data is stored.
configuration information, naming, providing This is a small tutorial that explains just the basics of
distributed synchronization, and providing group HCatalog and how to use it.
services. ZooKeeper is simple, distributed, reliable,
and fast [11]. IV. CONCLUSION
• maintaining configuration information: It
maintains cluster configuration info which is Apache Hadoop is the most popular and powerful big
shared across all the nodes in the cluster. data tool, Hadoop provides world’s most reliable
• naming: Zookeeper can be used as naming storage layer – HDFS, a batch Processing engine –
service, so that one node in the cluster can find MapReduce and a Resource Management Layer –
another node in the large cluster ex: 1000 node YARN [11]. HADOOP is a highly scalable storage
cluster platform, because it can store and distribute very
• providing distributed synchronization: We can large data sets across hundreds of inexpensive servers
also use zookeeper for solving distributed that operate in parallel. Unlike traditional relational
synchronization problems in the cluster by using database systems (RDBMS) that can't scale to process
locks, Queues etc. large amounts of data, Hadoop enables businesses to
• providing group services: Zookeeper also helps in run applications on thousands of nodes involving
group service with the selection of a master in thousands of terabytes of data. HADOOP also offers a
the cluster (Leader election process). cost-effective storage solution for businesses'
exploding data sets. Hadoop enables businesses to
ZooKeeper can work in replicated mode as well as easily access new data sources and tap into different
standalone mode types of data (both structured and unstructured) to
generate value from that data [13]. This means
HCatalog: businesses can use Hadoop to derive valuable
HCatalog is a table storage management tool for business insights from data sources. A key advantage
Hadoop. It exposes the tabular data of Hive of using Hadoop is its fault tolerance. When data is
metastore to other Hadoop applications. It enables sent to an individual node, that data is also replicated
users with different data processing tools (Pig, to other nodes in the cluster, which means that in the
MapReduce) to easily write data onto a grid. It event of failure, there is another copy available for
ensures that users don’t have to worry about where use.
or in what format their data is stored [3].
ABSTRACT
This paper deals with a low cost solution to problem avoidance for a mobile machine using just a single Artifical
Intelligennce. It allows the machine to navigate smoothly in an unknown environment, avoiding collisions,
without having to stop in front of problems. The problem avoidance process is made up of three distinct stages -
the mapping algorithm, the core problem avoidance algorithm, and the steering algorithm. The mapping
algorithm takes the raw Artifical Intelligennce readings and processes them to create higher resolution maps
from the wide-angle Artifical Intelligennce. The problem avoidance algorithm is based on the potential field
theory which considers the machine to be a test charge that is repelled by all the problems around it, and
which moves in the direction of the resultant of the forces acting on it. An algorithm which steers a mobile
machine based on the differential drive system is also discussed.
Keywords : Mobile Machine, Problem Avoidance, Autonomous Navigation, Ultrasonic Range Sensor.
CSEIT195186 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 349-356 ]
349
J.Antony Daniel Rex et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 349-356
have a range of upto 30m, and are very accurate, Beyond the range value, there may be problems
having an angular resolution of upto 0.25. somewhere along the arc, but it is not certain at
which positions the problems are present.
However, they are very expensive compared to other Figure 1 shows the next sensor reading, which is
sensors of these, the ultrasonic range sensor was obtained after rotating the sensor through a certain
found most suitable for our requirement because of angle, say 5. This reading, with a range value of 1.2m
its low cost and ranging capability. covers angles -10 to +20. After obtaining this reading,
we are certain that there is no problem between
II. MAPPING these angles for a range of 1.2m. Thus, in the
overlapping region, the larger distance value is
An ultrasonic range sensor detects the range of an chosen over the smaller one.
object in front of it by sending a short burst of
ultrasonic waves, and measuring the time taken for If a subsequent overlapped reading is smaller than the
the echo to be received. These sensors typically have existing value, then we have to consider the ‘age’ of
a wide beam angle of 15 to 30 As a result, the cone the existing information. If the existing large range
gets wider with increasing distance from the value is very recent, then the overlapped area is taken
transmitter. This increases the uncertainty in the to have the larger range, because it can be assumed
spatial dimensions of the problem. Most mobile that no object moved into the intersecting area
machines which use ultrasonic range finders for between the two scans. If the existing large range
problem avoidance have 12 or 24 sensors in a ring value is old, then the smaller value is taken, because
around the machine, to cover all directions. This is the machine may have moved within that time, or a
not very cost-effective, and moreover, all of them moving problem may have appeared.
cannot be triggered at once due to crosstalk and
interference problems. A maximum of 4 sensors Using this technique, the accuracy of the ultrasonic
which are at 90 to each other can be triggered at a range information can be greatly improved upto the
time. Our solution was to use a single sensor mounted step size of the stepper motor. However, there are
on a stepper motor to pan the sensor across 180. This some cases where the information is still not accurate.
can be expanded to 4 sensors mounted at 90 to each Consider the case gap between problems A and B can
other on the stepper motor for maximum scanning never be detected by the sensor at that distance.
speed and full coverage. Such a setup also provides Once the machine moves closer to these problems,
the flexibility to perform fine scanning of an area for the gap can be detected.
a more accurate map of the environment, with an
angular resolution of the minimum step size of the IV. PROBLEM AVOIDANCE
stepper motor, as opposed to the 30 resolution of the
sensor. All mobile machines feature some kind of problem
avoidance. The algorithm could be as simple as
III. MACHINE SCANNING ALGORITHM stopping if an problem is detected in front of it. This
is common in track-following machines, where the
A single range reading from the sensor implies that machine follows a pre-determined track. Another
the area in a 30 sector in front of it with a radius of solution is wall-following, in which the machine
the range value contains no problems. A reading of a moves alongside a wall at a fixed distance, following
range of 1m. This reading covers angles -15 to +15. the contour of the wall till it reaches its destination.
[2] “Sensory based motion planning”-IEEE Computer Networking, Wireless and Mobile
transactions on Machineics & Automation- Communications. Vol No – 3, Issue No - 1, pp.
Kamon Ishay. 245-256.
[3] A.S.Syed Navaz, C.Prabhadevi & [11] A.S.Syed Navaz, H.Iyyappa Narayanan &
V.Sangeetha”Data Grid Concepts for Data R.Vinoth.” Security Protocol Review Method
Security in Distributed Computing” January Analyzer (SPRMAN)”, August – 2013,
2013, International Journal of Computer International Journal of Advanced Studies in
Applications, Vol 61 – No 13, pp 6-11. Computers, Science and Engineering, Vol No –
[4] A.S.Syed Navaz, V.Sangeetha & C.Prabhadevi, 2, Issue No – 4, pp. 53-58.
“Entropy Based Anomaly Detection System to [12] A.S.Syed Navaz, G.M. Kadhar Nawaz &
Prevent DDoS Attacks in Cloud” January 2013, B.Karthick.” Probabilistic Approach to Locate a
International Journal of Computer Mobile Node in Wireless Domain”, April –
Applications, Vol 62 – No 15, pp 42-47. 2014, International Journal of Computer
[5] Y. Kim, H. Shin, and H. Cha, “Y-mac: An Engineering and Applications, Vol No – 6, Issue
energy-efficient multichannel mac protocol for No – 1, pp.41-49.
dense wireless sensor networks,” in IPSN ’08, [13] S. Gandham, Y. Zhang, and Q. Huang,
April 2008, pp. 53–63. Distributed time-optimal scheduling
[6] A.S.Syed Navaz, A.S.Syed Fiaz, C.Prabhadevi, forconvergecast in wireless sensor networks,”
V.Sangeetha & S.Gopalakrishnan “Human Computer Networks, vol. 52, no. 3, pp. 610–
Resource Management System” Jan – Feb 2013, 629, 2008.
International Organization of Scientific [14] A.S.Syed Navaz & G.M. Kadhar Nawaz, “Ultra
Research Journal of Computer Engineering, Vol Wideband on High Speed Wireless Personal
8, Issue 4, pp. 62-71. Area Networks” August – 2014, International
[7] A.S.Syed Navaz, S.Gopalakrishnan & R.Meena Journal of Science and Research, Vol No – 3,
“Anomaly Detections in Internet Using Issue No – 8, pp.1952-1955.
Empirical Measures” February 2013, [15] A.S.Syed Navaz & Dr.G.M. Kadhar Nawaz &
International Journal of Innovative Technology A.S.Syed Fiaz “Slot Assignment Using FSA and
and Exploring Engineering, Vol 2 – Issue 3. pp. DSA Algorithm in Wireless Sensor Network”
58-61. October – 2014, Australian Journal of Basic and
[8] “Problem detection based on qualitative Applied Sciences, Vol No –8, Issue No –16,
&quantitative 3d reconstruction-IEEE pp.11-17.
transaction on pattern analysis and [16] A.S.Syed Navaz & A.S.Syed Fiaz, “Load
intelligence”-Zhang-Zhonggei. Balancing in P2P Networks using Random
[9] A.S.Syed Navaz, M.Ravi & T.Prabhu, Walk Algorithm” March – 2015, International
“Preventing Disclosure of Sensitive Knowledge Journal of Science and Research, Vol No – 4,
by Hiding Inference” February 2013, Issue No – 3, pp.2062-2066.
International Journal of Computer [17] Qiao Li, Baihai Zhang, Lingguo Cui, Zhun Fan,
Applications, Vol 63 – No 1. pp. 32-38. V. Vasilakos Athanasios, Epidemics on small
[10] A.S.Syed Navaz , T.Dhevisri & Pratap worlds of tree-based wireless sensor networks,
Mazumder “Face Recognition Using Principal Journal of Systems Science and Complexity
Component Analysis and Neural Networks“ December 2014, Volume 27, Issue 6, pp 1095-
March -2013, International Journal of 1120.
[18] A.S.Syed Navaz, J.Antony Daniel Rex, S.Jensy and Research, Vol No - 5, Issue No - 1, pp.1581-
Mary. “Cluster Based Secure Data Transmission 1584.
in WSN” July – 2015, International Journal of [26] A.S.Syed Fiaz, N.Asha, D.Sumathi & A.S.Syed
Scientific & Engineering Research, Vol No - 6, Navaz “Data Visualization: Enhancing Big Data
Issue No - 7, pp. 1776 – 1781. More Adaptable and Valuable” February –
[19] Ricardo Severino, Nuno Pereira, Eduardo 2016, International Journal of Applied
Tovar, Dynamic cluster scheduling for cluster- Engineering Research, Vol No - 11, Issue No -
tree WSNs, Springer, Vol.3, No.493, 2014. 4, pp.–2801-2804.
[20] A.S.Syed Navaz, J.Antony Daniel Rex, P.Anjala [27] W. Song, F. Yuan, and R. LaHusen, “Time-
Mary. “An Efficient Intrusion Detection optimum packet scheduling for many-to-one
Scheme for Mitigating Nodes Using Data routing in wireless sensor networks,” in MASS
Aggregation in Delay Tolerant Network” ’06, pp. 81–90.
September – 2015, International Journal of [28] A.S.Syed Navaz & Dr.G.M. Kadhar Nawaz
Scientific & Engineering Research, Vol No - 6, “Flow Based Layer Selection Algorithm for
Issue No - 9, pp. 421 – 428. Data Collection in Tree Structure Wireless
[21] A.S.Syed Navaz, P.Jayalakshmi, N.Asha. Sensor Networks” March – 2016, International
“Optimization of Real-Time Video Over 3G Journal of Applied Engineering Research, Vol
Wireless Networks” September – 2015, No - 11, Issue No - 5, pp.–3359-3363.
International Journal of Applied Engineering [29] A.S.Syed Navaz & Dr.G.M. Kadhar Nawaz
Research, Vol No - 10, Issue No - 18, pp. 39724 “Layer Orient Time Domain Density Estimation
– 39730. Technique Based Channel Assignment in Tree
[22] M.Ravi & A.S.Syed Navaz. “Development of Structure Wireless Sensor Networks for Fast
Mail Tracking System” October – 2015, Data Collection” June - 2016, International
International Journal of Innovative Research in Journal of Engineering and Technology, Vol No
Computer and Communication Engineering, - 8, Issue No - 3, pp.–1506-1512.
Vol No - 3, Issue No - 10, pp.9757-9762. [30] M.Ravi & A.S.Syed Navaz "Rough Set Based
[23] S.Jensy Mary, A.S Syed Navaz & J.Antony Grid Computing Service in Wireless Network"
Daniel Rex, “QA Generation Using Multimedia November - 2016, International Research
Based Harvesting Web Information” November Journal of Engineering and Technology, Vol No
– 2015, International Journal of Innovative - 3, Issue No - 11, pp.1122– 1126.
Research in Computer and Communication [31] A.S.Syed Navaz, N.Asha & D.Sumathi “Energy
Engineering, Vol No - 3, Issue No - 11, Efficient Consumption for Quality Based Sleep
pp.10381-10386. Scheduling in Wireless Sensor Networks”
[24] A.S Syed Navaz & A.S.Syed Fiaz “Network March - 2017, ARPN Journal of Engineering
Intelligent Agent for Collision Detection with and Applied Sciences, Vol No - 12, Issue No - 5,
Bandwidth Calculation” December – 2015, pp.–1494-1498.
MCAS Journal of Research, Vol No – 2, pp.88- [32] N. Lai, C.King, and C. Lin, “On Maximizing the
95, ISSN: 2454-115X. throughput of convergecast in wireless sensor
[25] A.S Syed Navaz & K.Durairaj “Signature networks,” in GPC ’08, pp. 396– 408.
Authentication Using Biometric Methods” [33] A.S.Syed Fiaz, K.S.Guruprakash & A.S.Syed
January – 2016, International Journal of Science Navaz “Prediction of Best Cloud Service
Provider using the QoS Ranking Framework”
ABSTRACT
Tuition Plus+ is a website and a web-based application provides a simple interface for maintenance of a student
records and information. It is used by educational institution like tuitions or colleges which can manage
student’s records easily. Tuition Plus website deals with different modules like registration, organization,
Subjects, Course, Batches, Student, Account, Enquiry and Report Module. It tracks all the details of a student
from a day to day course. It will also track all the students fees structure like installments. These will be
available through a secure, online interface embedded in the Tuition Plus website. It will also have registration
details, batch execution details, students’ details in all aspects, the various academic notifications to the staff and
students updated by the tuition organisation
Keywords : Tuition Plus+, DFD, OTP
CSEIT195197 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 357-362 ]
357
Bharat Dhak et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 357-362
will have the authority to update or edit the easy and interactive manner which provides facilities
information of student as well as the information of like online registration and profile creation of
their organisation. Student login will help the student’s thus reducing paper work and automating
students to see their own data, fees structure, etc. the record generation process in an educational
organization, which will also save the time of a
[1]Previously, the Tuition relied heavily on paper student. This website also provides a common
records for this initiative. While paper records are a platform for registering their organization online that
traditional way of managing student data there are is why the need of making separate website by
several drawbacks to this method. Like when a investing money will reduce.
student's wants to register for a particular course then
it must have to visit the particular tuition class and III. PROPOSED SYSTEM
register themselves. It takes a very long time to
convey the information to the student. Paper records The purpose is to design a Tuition Plus+ website,
are difficult to manage and track. The physical which contains up to date information of an
exertion required to retrieve, alter, and re-file the educational organization that should improve
paper records are all non-value added activities. This efficiency of a tuition record management and about
system provides a simple interface for the a different courses that they will provide to the
maintenance of student information. It can be used student.
by educational institutes or colleges to maintain the
records of students easily. Achieving this objective is OBJECTIVES
difficult using a manual system as the information is
scattered, can be redundant and collecting relevant • Provide the online interface for a student’s
information may be very time consuming. All these information, courses, fees structure, etc.
problems are solved using Tuition Plus+. The paper • Increase the efficiency of tuition record
focuses on presenting information in an easy and management.
interact manner which provides facilities like online • Decrease time required to access and
registration and profile creation of student’s thus delivered records.
reducing paper work and automating the record • To make a system more secure.
generation process in an educational institution. • Decrease time spent on non-value added
tasks.
II. RELATED WORK
SYSTEM DESIGN
The existing system is web based student information
management is also good but that have certain
A. DATA FLOW DIAGRAM
drawback like these existing website is only for a
Data Flow Diagram shows the graphical
college but our system is for all educational
representation of the flow of Tuition Plus+. It shows
institution .Also the existing system does not provide
the visualization of processing of data. It shows how
any information about a fees structure but that is
users of the Tuition Plus+ will interact with the
included in our system .
system. DFD contains the different modules that can
be viewed as a function that is used to transform the
The purpose is to design a Tuition Plus+ website that,
these website focuses on presenting information in an
a. Registration Module
b. Organization Setting Module
c. Subject Module
d. Course Module
e. Batch Module
f. Student Module
g. Account Module
h. Enquiry Module
i. Report Module
There are two different login because both the users
have different level of authorization to the system.
Merchants have the authority to access the data of
the students in their organization whereas users have
the authority to access their own data.
A. Registration Module
branches of their organization by clicking manage batch for subjects one or more subjects all students in
branch tab. It will set company as default primary that batch will show in batch list.
branch user can change primary branch. User can allocate batch to one student from student’s
profile.
C. Subject Module
It has two options batch for course and batch for
Merchant Login have the authentication to add subjects.
subject that are taught in their organization. User can 1) Batch for course:
create subjects from add button in subject It will show all batches, which have all
module.Once subjects are created user can create subjects of that course.
course through course panel. User can edit or delete 2) Batch for subjects:
subjects. Add subject for particular branch, which are It will show batch for every subjects of that
already created from organization setting. User can course.
select more than one branch to assign same subject in
multiple branches. F. Student Module
Batch module has two steps to create batch In account, module user can manage fees, duration,
1) Create batch: tax and discount for courses.
2) This tab includes basic information about In this student, can able to pay in three different
batch name, batch capacity, start date, end ways:
date, start time, end time. A. Onetime payment
3) Batch subjects B. Instalment payment
In batch subjects user have to assign one or C. Monthly payment
more subjects in batch with trainer name In Payment Management, tab user can manage
subject start and end time, start and end date. course payment methods, instalment amount and
User can edit batch or can view batch. schedule of instalment.
1) One Time :
View batch In Onetime, payment method complete fees
It will show all details fill during batch creation. User should be paid at a time.
can add more subjects after creating batch from 2) Installment:
assign subject’s button. In Batch student, tab user can In installment user can create any number of
assign multiple students to single batch for separate installments and can schedule duration foe
subjects or for all subjects. After assigning students to that installment
ABSTRACT
This paper performs a comprehensive analysis of Vix Index data with Heikin Ashi Transformation of stock
index Neural Network Learning. It has been demonstrated that Heikin Ashi Transformation can improve the
learning effect of Neural Network and the effect can also be filter out if volume weights are also considered.
This paper introduces another improvement beside using volume-weighted data. Instead volatility index is used
as an input and its effect for neural network learning process is analyzed.
Keywords : Heikin Ashi Transformation, Vix Data, Neural Network, Stock Market Analysis, Time series
filtering
CSEIT195195 | Received : 09 Feb 2019 | Accepted : 18 Feb 2019 | January-February -2019 [ 5 (1) : 363-365 ]
363
Nishchal Sharma, Dr. Chaman Singh Chauahn Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 363-365
Some Researchers [2] have demonstrated the HA-Close = (Ocurrent + Hcurrent +Lcurrent+Ccurrent)/ 4
importance of availability of favorable methods for HA-Open = (HA-OpenPrev + HA-ClosePrev) / 2
finance managers and incorporating many systems HA-High = Maximum of the Hcurrent , HA-Open or HA-Close
for portfolio management. Such connection of HA-Low = Minimum of the LCurrent , HA-Open or HA-Close
selection of technology and company is vital [3] for a
finance driven system. Artificial Neural network has Using Vix Data:
been a very important learning system [4] and it has
provided a definite edge for it’s user. The effect of Vix is a volatility index and tracks volatility measured
neural network and genetic algorithm has been as per the options of stock index. Since the value of
researched [5] and found to be very effective. Neural Vix may very between some fraction value, it is
network for trend determination [6] and optimized converted between [0,1.0] using inversion.
neural network [7] are a few key methods to work
with. Many researchers have incorporated hybrid A 2 hidden layer ANN is used with configuration
models [8] and had early success. Generating buy and 5,6,3,1. The choice of structure of ANN is quite
sell signal using deep neural network [9] as well as a subjective. This setup given relatively stable results.
self organizing rule based system [10] perform very Again test data is converted into 2 sets. One is for
well. Effect and result of ANN on NASDAQ learning and other for test results.
Composite [11] and results are inline with
expectations. III. RESULTS AND DISCUSSION
II. METHODS AND MATERIAL A Plot of Prediction by ANN and its original value
provides us with an absolute error. This absolute
Heikin-Ashi is widely used in candlestick charts. In error is plotted against Vix data and results are
Japanese, Heikin means “average” and “Ashi” means compared.
“pace”. Since it is based on candlestick patterns. We
give a brief intro to candlesticks. A candlestick Mean Average Error 11.87130668
Mean error when Vix is above 19 14.00708243
describes trade information of a given time period.
Mean Error when Vix is below 16 8.658732212
Every candlestick has 4 values Open, High, Low and
Close. These values represent the value at which
stock or index candle opened, highest value of stock,
lowest value of stock and closing value of the stock in
that time period. Heikin-Ashi transforms these 4
values using following formulas to create new
candlesticks. New Candlestick produces simpler and
smoother candlestick for analysis.
Transformation rules:
Let Ocurrent, Hcurrent , Lcurrent, Ccurrent represents current
open, high, low, close values.
Let OPrev, HPrev, LPrev, CPrev represents Previous
day/period open, high, low, close values. These results clearly show an increase in error rate
Then Heikin-Ashi values (HA) are calculated as:-
when Vix is High. A vix above 19 causes a spike in [8]. "A hybrid stock trading framework integrating
error rate. Also a lower level of vix causes low error technical analysis with machine learning
rate. However variation in lower level of vix is not techniques - ScienceDirect."
linear with the error rate. This phenomenon can’t be [9]. "A Deep Neural-Network Based Stock Trading
explained and a further study might be needed. System Based on Evolutionary Optimized
Technical Analysis Parameters - ScienceDirect."
IV.CONCLUSION [10]. "Establishing Rules for Self-Organizing
Systems-of-Systems - ScienceDirect."
[11]. "Stock market index prediction using artificial
It is clear that Vix data may be an indication of
neural network - ScienceDirect."
volatility of underlying system and the noise may
increase during high period of volatility which affect
the learning capability of ANN but it is also clear that Cite this article as :
there is a still a disconnect between vix and stock
market movement and a further research might be Nishchal Sharma, Dr. Chaman Singh Chauhan,
needed. "Heikin-Ashi Transformation and Vix Index data for
Stock Market Index Prediction and It's Effects ",
V. REFERENCES International Journal of Scientific Research in
Computer Science, Engineering and Information
[1]. "Stock Market Volatility and Learning - ADAM Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
5 Issue 1, pp. 363-365, January-February 2019.
- 2016 - The Journal of Finance - Wiley Online
Available at doi :
Library."
https://doi.org/10.32628/CSEIT195195
[2]. "Data | Free Full-Text | Current Core Journal URL : http://ijsrcseit.com/CSEIT195195
Competencies Trend of Small to Medium
Enterprises (SMEs) in China—A Concurrent
Comprehensive Evaluation and Active Learning
Study of Newly Listed Chinese Stocks from
2015 through 2017."
[3]. "The contribution of technology selection to
core competencies - ScienceDirect."
[4]. "Using artificial neural network models in stock
market index prediction - ScienceDirect."
[5]. "Application of artificial neural network for the
prediction of stock market returns: The case of
the Japanese stock market - ScienceDirect."
[6]. "Predicting stock and stock price index
movement using Trend Deterministic Data
Preparation and machine learning techniques -
ScienceDirect."
[7]. "Predicting the Direction of Stock Market
Index Movement Using an Optimized Artificial
Neural Network Model."
The Internet of Things (IoT) is turning into the following Internet-related transformation. It enables billions of
gadgets to be associated and speak with one another to share data that enhances the nature of our day-by-day
lives. Then again, Cloud Computing gives on-request, helpful and versatile system get to which makes it
conceivable to share computing assets, without a doubt, this, thus, empowers dynamic information integration
from different information sources. There are numerous issues hindering the fruitful implementation of both
Cloud and IoT. The integration of Cloud Computing with the IoT is the best path on which to defeat these
issues. The huge number of assets accessible on the Cloud can be greatly helpful for the IoT, while the Cloud
can acquire attention to enhance its impediments with true protests in a more powerful and dispersed way. This
paper gives to the various factors that affect the integration of the Cloud into the IoT by featuring the
integration advantages and implementation challenges. This paper mainly focus on a study which was
conducted on various IT and business leaders.
Keywords : Cloud, IoT, CIO, SLA, QoS
CSEIT195185 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 366-396 ]
366
Jipson George Thoomkuzhy, Dr. Mohammed Nazeh. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 366-396
will play out its typical farthest point concerning a like way identified with fearless quality: an
given time distribution under a given strategy of organization that is on 24x7 yet goes continually
conditions. A cloud will be more dependable on the isolated is futile. As cloud organizations and
off chance that it is more denounce tolerant and applications wind up being even more amazing and
more adaptable to propelling conditions. It is difficult more dependent on the covered cloud mastermind, it
to have a cloud that is totally free from sorrows or twists up continuously hard rapidly perceiving and
dissatisfaction safe [Garrison, 2012]. Different kinds managing issues. Weights can ascend out of an
of dissatisfactions are interleaved in the passed on individual organization, and furthermore from the
computing condition, for example, flood bafflement, collaboration of various parts and mechanized
timeout dissatisfaction, asset missing dissatisfaction, structures over spread frameworks and server farms,
coordinate dissatisfaction, equipment dissatisfaction, acknowledging issues that set aside a long
programming frustration, and database opportunity to be settled.
disillusionment.
c. Scalability:
The boundless idea of cloud computing is Lee and Kim showed programming centred
uncommonly fundamental yet hard to isolate on the procedures for ensuring the high versatility of
grounds that cloud computing is comprised of the administrations in Cloud Computing. [Lee and Kim,
blend of different factors, for example, wide-zone 2006] High flexibility under high administration
frameworks, heterogeneous programming/adapt parts, loads seeks nothing out of pocket; it very well may be
and so on. There are different confused trades among ensured by grasping some versatility confirmation
the various parts of cloud computing. Thusly, the designs. The most broadly perceived conventional
standard quality models that are depicted for arrangement is to simply incorporate the required
unadulterated programming/outfit or regular resources. Nevertheless, as they propose in the paper,
frameworks cannot be connected with the surveying diverse plans can ensure high adaptability or
of cloud unwavering quality [Pocatine, 2010]. The adaptability.
downtime of the cloud server develop negatively
affects the cloud advantage enduring quality. There is always some cost drew in with running
Surveying and re-designing undeterred quality in versatility ensuring plans, for instance, the expense of
coursed computing is not so much direct errand. additional CPU and memory. The adaptability
Notwithstanding these, two or three contraptions are expanded through such plans should be with respect
utilized to overview and overhaul the cloud to the expense of applying the plans. That is, cost-
advantage consistency. reasonability should be considered in ensuring
flexibility. Administrations should give the level of
b) Availability the esteem decided in their SLAs. Administrations
High transparency is, at last, the colossal vessel of the with palatable flexibility should not to encounter the
cloud. It encapsulates the probability of wherever evil impacts of significant degradation of QoS.
and at whatever direct access toward organizations, Adaptability affirmation designs should ensure that
mechanical congregations, and information and is the administrations satisfy the confinements of meeting
connecting with the effect of dreams of a future with the immaterial edge of their QoS properties
organizations with no physical workplaces, generally [Collinchau, 2013]. From this, two convincing
speaking organizations with totally arranged and programming centreed plans can be resolved:
joined IT frameworks. Transparency or openness is in advantage replication and administration
data remains the commitment of the data a cloud setting, this test is befuddled by the circled
proprietor/outsourcer and scattered computing thought of fogs and the possible nonattendance of
professional organizations are not plainly subject for supporter care over where data is secured and who
data misfortune or fines or other lawful. Like PC has or can approach.
security programs, cloud security consolidates a
practically identical general concern. Data Framework Integrity: the cloud requires security
orchestrated in an open cloud and applications against deliberate subversion or mischief of the value
running in an open cloud may encounter specific of a cloud. Inside a cloud, there are accomplices:
security exposures than would be the situation in an endorsers, providers, and a combination of chiefs.
on region energized condition. The capacity to fragment get to rights to each one of
these social occasions, while monitoring harmful
Right when an association purchases into a cloud, attacks, is a key normal for keeping up cloud
each one of the data created and arranged will reliability. In a cloud setting, any nonappearance of
physically abide in premises had and worked by a porousness into a cloud's frameworks makes it more
provider. In this extraordinary situation, the troublesome for endorsers of checking the
fundamental issue is whether a supporter can obtain uprightness of cloud-encouraged applications. Cloud
an attestation that a provider is executing the computing administrations use the Internet as a
equivalent or proportionate controls as for what the transmission medium and change data development
endorser would have completed. The going with resources into administrations for end-customers,
issues develop when an endorser is endeavoring to including programming administrations, figuring
ensure scope for these controls: Compliance stage administrations, change organize
necessities, regarding data that an endorser is a administrations, and crucial structure leasing.
significance to move to a cloud, may call for specific
levels and granularities of audit logging, the time of Vaquero and Lindner prescribed that cloud
cautions, activity declaring, and data support. For computing could be described as the joining of virtual
encryption of data still, the quality of the encryption resources according to customer necessities,
figuring suite, the key administration plots a provider adaptably solidifying resources including hardware,
reinforces, and the number of keys for each datum change stages, and diverse applications to make
proprietor (individual or shared keys) should be administrations [Faisal, 2011]. The novel features of
known by the data proprietors. Data arranged in an cloud computing join the capacity of customer data in
open cloud and applications running in an open the cloud and the nonattendance of any prerequisite
cloud may experience particular security exposures for programming foundation on the client side. For
than would be the circumstance in an on-area whatever timeframe that the customer can interface
encouraged condition. with the Internet, most of the gear resources in the
cloud can be used as a client-side structure. When in
Data Privacy: Security watches out for the protection doubt, cloud-computing applications ask for driven,
of data for specific components, for instance, giving distinctive administrations as demonstrated by
endorsers or others whose data is taken care of in a customer requirements, and expert communities
structure. Assurance passes on authentic and chance charge by metered time, instances of usage, or
concerns and should be viewed as a particular test portrayed period.
and also a legal and good concern. Guaranteeing
insurance in any handling system is a specific test; in
The use of passwords as an affirmation strategy is in a remote server requires a costly expense of
even more outstanding to general customers, yet transmission and capacity. To alleviate the expense of
messages sent by the customer are weak against the transmission and capacity, it is required to partition
covert record by software engineers who might then IoT data into two sorts of data; one is put away in
have the capacity to use the data in the message to edge systems and the other is put away in cloud
sign into the administration as the customer. systems. The impact of Edge computing is uncovered
with the treatment of IoT data in edge systems.
Additionally, the One-Time Password (OTP)
approval system fluctuates from a great many people As of not long ago, most system hardware, for
gatherings' beginning of a secret word. By far, most example, switches, passages, and switches simply
grasp a mystery word to be a watchword picked by forward data conveyed from other system gadgets,
the customer to be critical and can be used repeatedly. not to peruse the substance or change them. In light
The complement of OTP, in any case, is the single- of end-to-end communication, data is recognized and
use nature of the mystery key. In the wake of getting continue at a last relating hub. This is a common use
affirmation from the customer, the structure side of cloud computing a customer service
must make an ensured transmission channel to communication. Be that as it may, in the IoT
exchange data with the customer. The Secure environment, some IoT data will be exchanged to a
Attachments Layer (SSL) is a run of the mill strategy cloud system and some IoT data will be conveyed to
for building secure channels, primarily using RSA an edge hub/haze hub. The primary purpose behind
encryption to transmit the secret keys required for this partition is to give constant preparing and
the opposite sides to encode and unravel data security upgrade. Despite the fact that there are
transmitted between them [Zheng, 2009]. Consistent numerous new advancements to diminish the
methodologies for guaranteeing customer data join postpone time and transmission time, it is difficult to
encryption going before a capacity, customer ensure ongoing handling. The commonplace utilize
approval strategies before capacity or recuperation, instance of this necessity is the Industrial Internet
and building secure channels for data transmission. and savvy processing plant. What's more, despite the
These security systems commonly require fact that, there are control capacities to give security,
cryptography figurings and propelled stamp the more fundamental decision is that not to uncover
techniques, as illuminated underneath. Ordinary data the private data to open systems. On the off chance
encryption systems fuse symmetric and Hilter kilter that we separate IoT data into private data and non-
cryptography computations. private data and keep private data inside an edge
organize, not to uncover them in an open system, it
e) Capacity will diminish numerous feeble purposes of security.
As huge IoT sensors, IoT actuators, and IoT gadgets
are associated with the Internet, IoT data volume In the event that we consider new difficulties of IoT
from these things are required to increment administrations, the enormous volume of IoT data, as
dangerously. Also, it is normal that a significant well as the gigantic number of IoT things, can be a
number of these high volumes of IoT data are created basic issue. Despite the fact that we recognize this
and additionally devoured inside edge systems, not to future issue, Internet design initially has the capacity
navigate through cloud systems. As of recently, of scalability and it will alleviate the scalability issue
primarily IoT data produced IoT things are moved in the IoT environment. In any case, we can't assess
and gathered in a remote server and to store IoT data the quantity of IoT things later on and we can't
ensure the Internet engineering still manage the interviewees avowed that execution issues are caused
scalability issue in the IoT environment. Edge generally by the low web association the adopters
computing will isolate the scalability area into edge have in there. In like way, little organizations should
systems and outside system (e.g., cloud systems) and ensure to have a snappy Web association which
this partition of scalability space can give a more would reduce inaction (Marston et al., 2011). As
effective approach to handle the enormous number of demonstrated by Thurman (2008), execution is one of
IoT things. Since Edge computing can deal with IoT the troubles of cloud advancement execution
data in an edge zone and store the IoT data in an contiguous data security, data affirmation, and
edge/haze hub, and continue IoT data on the off availability. There are challenges in grasping
chance that it is required, it can likewise isolate the conveyed computing advancement. Key execution
administration area into two sections. Edge obstacles are application quality (i.e. application
Computing can focus on the administration of IoT execution likewise, versatility), application faithful
things in an edge zone and collaborate with the quality (i.e. persevering administrations) and data
administration of other outside systems. security and insurance concern (i.e. illegitimate
access of organization data, security bursts) (Benlien
f) Throughput et al., 2009). In this manner, execution is a factor for
Throughput implies the execution of errands by a organizations who wish to get Cloud courses of
figuring administration or contraption over a specific action and use them capably.
period. It checks the proportion of completed clash
with time exhausted and may be used to evaluate the g) Lower costs
execution of a processor, memory and also In cloud computing, setting up an organization as a
framework trades. Throughput was considered to utility, and giving figuring as an organization to
evaluate the benefit of PC processors. This was, clients is a piece of the real work. One of the
generally, registered with respect to bunch beguiling and fundamental cost issues in cloud
occupations or assignments consistently and computing is the capacity to pay for the favorable
countless consistently. A couple of backups measure a position, in the viewpoint of necessities, keeping
structure's general throughput by evaluating the total away from the significant costs for PC frameworks
and unusualness of work, the number of synchronous purchases (Armbrust, 2009). Consequently, cost
customers and application/system responsiveness. sufficiency is another basic factor bearing
Additionally, for arranging trades, throughput is organizations should note while tolerating spread
evaluated by discovering the proportion of data computing. The organizations of today dependably
traded between zones in the midst of a foreordained filter for approaches to manage cut expense or
period, overall occurring as bits consistently (bps), additional cash. Organizations need to spend a critical
which has created to bytes consistently (Bps), piece of their wage on the IT foundation, while
kilobytes consistently (Kbps), megabytes consistently under 10% of their servers can be incredibly used,
(Mbps) and gigabytes consistently (Gbps). accomplishing an essential maltreatment of cash. Also,
these servers should be supplanted respectably at
The physical zone of the data can influence the standard intervals and ought to be kept up and
execution of the system if it is arranged in another bit administrated; expanding its aggregate cost practices
of the world. In this way, Cloud plans may significantly (Marston et al., 2011). Cost perfect
comprehend the postponement in the administration conditions are the most grounded driver influencing
(Kim et al., 2009). Concurring the result consider the
IT chiefs' impression of SaaS openings (Benlian et. al, Organizations can in like manner immensely
2011). diminish their help costs (Miller, 2009). This implies
both gear and programming upkeep.
Above all, cloud computing enables organizations to
decrease their gear costs (Miller, 2009). While using According to Miller (2009 p. 26), organizations are
cloud administrations, organizations never again "never again compelled to what a singular work
require intense and high-evaluated PCs to run region PC can do" and now can "perform
applications inside the cloud. This starts with the supercomputing – like assignments utilizing the
lessened requirements for a dealing with power and vitality of countless and servers." Thus they can
storage space (Miller, 2009). Not in any way like perform more conspicuous errands and augmentation
standard programming, for running cloud has by and large their benefit and capability. On the
applications had PCs required less memory. They other hand, from a provider`s perspective, the basic
moreover can be with minimal hard plates in light of cash sparing favorable circumstances for the vendors
the way that there isn't foundation programming. are the foreseen employments and the more broad
Therefore, organizations can diminish costs by customer base (Goncalves and Ballon, 2011).
procuring lower-esteemed PCs. Since using cloud Disseminated computing cuts down legitimate
computing, organizations don't have to do high expenses and empowers an association to offload
interests in the IT system. This especially concerns three sorts of organization (Rosenthal et al., 2009).
the greater organizations (Miller, 2009). Instead of
putting a colossal proportion of trade out an extensive III. SURVEY AND TOOLS USED FOR THE SURVEY
number of extreme servers, the IT divisions of those
organizations can use the cloud` figuring vitality to The survey was conducted using online methods. The
supplant or improve the internal preparing resources. survey attempted to explore the major challenges
Plant administrator (2009) states, as Armbrust at al. faced by CIOs in cloud computing and IoT based
(2009), that organizations don't have to manage the organizations from various industries. This study was
zeniths and the nonpeak times in figuring power asks conducted on IT and business leaders/professionals
for any more drawn out by getting new equipment, from various countries across the globe. A sample size
the apex figuring demands are dealt with by cloud of 405 was used for this survey. Since the target
servers. Cloud computing furthermore prompts cut population is unknown the baseline was of 385 has to
down programming costs. be maintained. The sample size of 405 was used in
order to have an effective result after excluding the
Organizations never again need to buy disconnect errors. A website named e-mailmeform.com was used
programming packs for each PC (Miller, 2009). Or to create an online survey. It is a paid services based
maybe, a particular application is gotten to simply by portal which provides survey setup services. This has
the laborers using that application. Moreover, this in security features like one response from one
like manner infers saved the expense of presenting computer and one response from one IP address.
and keeping up that item on each PC. Another item These sort of security features would help to avoid
related cash sparing preferred standpoint is that duplicate submissions resulting in improved quality
organizations don't have to pay for an item refresh in responses. A total of 40 questions were asked to the
order to have the latest variations of the applications respondents and the results were captured and
(Miller, 2009). As all applications are in the cloud, correlated using the IBM SPSS statistical tool.
they are redesigned thusly by the provider.
Fig 3 : Education
Fig 9.
Fig 13
Fig 17
Fig 15
Fig 21
Fig 19
As showed in the data computed above, exactly 79
As showed in the data computed above, exactly 96 respondents out of the total number of people who
respondents out of the total number of people who responded, which is 405 in number, strongly agreed
responded, which is 405 in number, strongly agreed with the fact stating CIO should be able to answer
with the fact stating CIO should be able to answer how an IT solution is beneficial to the company.
how an IT solution is beneficial to the company. Following this wise, a whopping number of 209
Following this wise, a whopping number of 201 respondents, representing 51.6 percent of the total
respondents, representing 51.9 percent of the total respondents also did agree though not strongly with
respondents also did agree though not strongly with the fact stated above. Meanwhile, very few
the fact stated above. Meanwhile, very few respondents, about 31 in number and accounting for
respondents, about 18 in number and accounting for 7.7 percent of the total respondents, disagreed that as
4.4 percent of the total respondents, disagreed that as a CIO, the cloud/ IoT platform is up and working at
a CIO, we have taken enough measures to backup all the times. Only five of these respondents who
and store data to be easily retrieved during disagreed, strongly expressed their own disagreement
emergencies. Only five of these respondents who while about 81 of the remainder participants went
disagreed, strongly expressed their own disagreement neutral and indeterminate on the matter.
while about 76 of the remainder participants went
neutral and indeterminate on the matter.
Fig 23
As showed in the data computed above, exactly 98 Fig 25
respondents out of the total number of people who
responded, which is 405 in number, strongly agreed As showed in the data computed above, exactly 84
with the fact stating CIO should be able to answer respondents out of the total number of people who
how an IT solution is beneficial to the company. responded, which is 405 in number, strongly agreed
Following this wise, a whopping number of 192 with the fact stating CIO should be able to answer
respondents, representing 47.4 percent of the total how an IT solution is beneficial to the company.
respondents also did agree though not strongly with Following this wise, a whopping number of 213
the fact stated above. Meanwhile, very few respondents, representing 51.6 percent of the total
respondents, about19 in number and accounting for respondents also did agree though not strongly with
4.7 percent of the total respondents, disagreed that as the fact stated above. Meanwhile, very few
a CIO, Our cloud platform experiences minimum respondents, about 11 in number and accounting for
downtime. Only four of these respondents who 2.7 percent of the total respondents, disagreed that as
disagreed, strongly expressed their own disagreement a CIO, our cloud and IoT platforms are prepared to
while about 92 of the remainder participants went withstand server failures. Only two of these
neutral and indeterminate on the matter. respondents who disagreed, strongly expressed their
own disagreement while about 95 of the remainder
participants went neutral and indeterminate on the
matter.
Fig 29:
Fig 30b
Fig 32
Fig 31: Our cloud and IoT platform does not collapse
Fig 33: We keep making improvements to the IoT
or slow down while being used by multiple users
and cloud platform to ensure higher scalability
Fig 34 Fig 36
In accordance with the computed data computed in In accordance with the computed data computed in
Fig.33 and 34, the number of people who responded Fig.35 and 36, the number of people who responded
to the notion stating that as CIOs We keep making to the notion stating that as CIOs our systems can
improvements to the IoT and cloud platform to handle multiple application requests arising at the
ensure higher scalability, was 405. About 112 of these same time, was 405. About 104 of these respondents
respondents representing 27.7 percent of the total representing 25.7 percent of the total respondents
respondents strongly agreed with this notion, while strongly agreed with this notion, while 213
203 respondents accounting for a whopping 50.1 respondents accounting for a whopping 52.6 percent
percent of the total respondents did agree but not of the total respondents did agree but not strongly
strongly with this notion. However, a few number of with this notion. However, a few number of
respondents, not more than eleven in number did respondents, not more than eleven in number did
disagree with the notion, with about 79 respondents disagree with the notion, with only two more
representing 19.5 percent of the total respondents respondent strongly disagreeing. About 75
were neutral as concerns this notion respondents representing 17.5 percent of the total
respondents were neutral as concerns this notion
Fig 40
Fig 38 In accordance with the computed data computed in
Fig.39 and 40, the number of people who responded
In accordance with the computed data computed in to the notion stating that as CIOs We have adequate
Fig.37 and 38, the number of people who responded safeguards for different interconnected devices to
to the notion stating that as CIOs Our cloud and IoT avoid data theft or breach of privacy, was 405. About
platforms have been designed to match up with the 139 of these respondents representing 34.3 percent of
changing business objectives, was 405. About 102 of the total respondents strongly agreed with this notion,
these respondents representing 25.2 percent of the while 182 respondents accounting for a whopping
total respondents strongly agreed with this notion, 44.9 percent of the total respondents did agree but
while 202 respondents accounting for a whopping not strongly with this notion. However a few number
49.9 percent of the total respondents did agree but of respondents, not more than 9 in number did
not strongly with this notion. However, a few disagree with the notion, with only three more
number of respondents, not more than thirteen in respondent strongly disagreeing. About 72
number did disagree with the notion, with only four respondents representing 17.8 percent of the total
more respondent strongly disagreeing. About 84 respondents were neutral as concerns this notion
respondents representing 20.7 percent of the total
respondents were neutral as concerns this notion
In accord to the data computed in Fig.41 and 42a, the In accord to the data computed in Fig.42b and 43, the
number of people who responded to the notion number of people who responded to the notion
stating that as CIOs We have adequate safeguards for stating that as CIOs We constantly monitor our cloud
different interconnected devices to avoid data theft and IoT platforms to identify potential security
or breach of privacy, was 405. About 116 of these threats, was 405. About 121 of these respondents
respondents representing 28.6 percent of the total representing 29.9 percent of the total respondents
respondents strongly agreed with this notion, while strongly agreed with this notion, while 185
176 respondents accounting for a whopping 43.5 respondents accounting for a whopping 45.7 percent
percent of the total respondents did agree but not of the total respondents did agree but not strongly
strongly with this notion. However, a few number of with this notion. However, a few number of
respondents, not more than 10 in number did respondents, not more than 16 in number did
disagree with the notion, with only three more disagree with the notion, with only three more
respondent strongly disagreeing. About 100 respondent strongly disagreeing. About 80
respondents representing 24.7 percent of the total respondents representing 22.0 percent of the total
respondents were neutral as concerns this notion respondents were neutral as concerns this notion.
Fig 47
Fig 45
In accord to the data computed in Fig.46 and 47, the
In accord to the data computed in Fig.44 and 45, the number of people who responded to the notion
number of people who responded to the notion stating that as CIOs Our cloud and IoT platforms are
stating that as CIOs We regularly update and improve designed to make optimal use of existing resources,
our data safety mechanisms to counter novel means was 405. About 116 of these respondents representing
of breach to network security, was 405. About 114 of 28.6 percent of the total respondents strongly agreed
these respondents representing 28.1 percent of the with this notion, while 202 respondents accounting
total respondents strongly agreed with this notion, for a whopping 49.9 percent of the total respondents
while 190 respondents accounting for a whopping did agree but not strongly with this notion. However,
46.9 percent of the total respondents did agree but a few number of respondents, not more than 7 in
not strongly with this notion. However, a few number did disagree with the notion, with only one
number of respondents, not more than ten in number more respondent strongly disagreeing. About 79
did disagree with the notion, with only two more respondents representing 19.5 percent of the total
respondent strongly disagreeing. About 89 respondents were neutral as concerns this notion.
respondents representing 22.0 percent of the total
respondents were neutral as concerns this notion.
Fig 4 Fig 51
In accord to the data computed in Fig.48 and 49, the In accord to the data computed in Fig.50 and 51, the
number of people who responded to the notion number of people who responded to the notion
stating that as CIOs We constantly track the stating that as CIOs We undertake capacity planning
resources used up by our cloud and IoT products and much before the implementation of cloud and IoT
take steps to minimize resource loss, was 405. About based technologies, was 405. About 105 of these
104 of these respondents representing 25.7 percent of respondents representing 25.9 percent of the total
the total respondents strongly agreed with this notion, respondents strongly agreed with this notion, while
while 203 respondents accounting for a whopping 203 respondents accounting for a whopping 50.1
50.1 percent of the total respondents did agree but percent of the total respondents did agree but not
not strongly with this notion. However, a few strongly with this notion. However, a few number of
number of respondents, not more than 12 in number respondents, not more than 10 in number did
did disagree with the notion, with only four more disagree with the notion, with only a single more
respondent strongly disagreeing. About 82 respondent strongly disagreeing. About 86
respondents representing 20.2 percent of the total respondents representing 21.2 percent of the total
respondents were neutral as concerns this notion. respondents were neutral as concerns this notion.
Fig 50: We undertake capacity planning much before Fig 52: We are constantly innovating means to reduce
the implementation of cloud and IoT based resource use and improve productivity
technologies
Fig 55
Fig 57 Fig 59
In congruence to the data computed in Fig.56 and 57, In congruence to the data computed in Fig.58 and 59,
the number of people who responded to the notion the number of people who responded to the notion
stating that as CIOs We allocate only required stating that as CIOs our cloud and IoT based
resources to cloud or IoT platforms to avoid losses, applications can process maximum tasks in a given
was 405. About 99 of these respondents representing unit of time, was 405. About 105 of these respondents
24.4 percent of the total respondents strongly agreed representing 25.9 percent of the total respondents
with this notion, while 205 respondents accounting strongly agreed with this notion, while 192
for a whopping 50.6 percent of the total respondents respondents accounting for a whopping 47.4 percent
did agree but not strongly with this notion. However, of the total respondents did agree but not strongly
a few number of respondents, not more than 13 in with this notion. However, a few number of
number did disagree with the notion, with only one respondents, not more than 13 in number did
more respondent strongly disagreeing. About 87 disagree with the notion, with only two more
respondents representing 21.5 percent of the total respondent strongly disagreeing. About 93
respondents were neutral as concerns this notion. respondents representing 23.0 percent of the total
respondents were neutral as concerns this notion.
Fig 61 Fig 63
In congruence to the data computed in Fig.60 and 61, In congruence to the data computed in Fig.62 and 63,
the number of people who responded to the notion the number of people who responded to the notion
stating that as CIOs We make sure we respond to the stating that as CIOs We do our best to achieve
requests of every user within minimum possible time, maximum transactions per second, was 405. About
was 405. About 107 of these respondents representing 112 of these respondents representing 27.7 percent of
26.4 percent of the total respondents strongly agreed the total respondents strongly agreed with this notion,
with this notion, while 199 respondents accounting while 193 respondents accounting for a whopping
for a whopping 49.1 percent of the total respondents 47.7 percent of the total respondents did agree but
did agree but not strongly with this notion. However, not strongly with this notion. However, a few
a few number of respondents, not more than 11 in number of respondents, not more than 11 in number
number did disagree with the notion, with only five did disagree with the notion, with only two more
more respondent strongly disagreeing. About 83 respondent strongly disagreeing. About 87
respondents representing 20.5 percent of the total respondents representing 21.5 percent of the total
respondents were neutral as concerns this notion. respondents were neutral as concerns this notion.
Fig 64b
Fig 66
In congruence to the data computed in Fig.64 and
64b, the number of people who responded to the In congruence to the data computed in Fig.65 and 66,
notion stating that as CIOs our throughput has been the number of people who responded to the notion
consistently improving over the years, was 405. stating that as CIOs We are constantly on the lookout
About 107 of these respondents representing 26.4 for new mechanisms to improve our throughput, was
percent of the total respondents strongly agreed with 405. About 109 of these respondents representing
this notion, while 197 respondents accounting for a 26.9 percent of the total respondents strongly agreed
whopping 48.6 percent of the total respondents did with this notion, while 198 respondents accounting
agree but not strongly with this notion. However, a for a whopping 48.9 percent of the total respondents
few number of respondents, not more than 13 in did agree but not strongly with this notion. However,
number did disagree with the notion, with only three a few number of respondents, not more than 12 in
more respondent strongly disagreeing. About 85 number did disagree with the notion, with only a
respondents representing 21.0 percent of the total single more respondent strongly disagreeing. About
respondents were neutral as concerns this notion. 85 respondents representing 21.0 percent of the total
respondents were neutral as concerns this notion.
d. Lower Costs
Fig 68 Fig 70
In congruence to the data computed in Fig.67 and 68, In congruence to the data computed in Fig.69 and 70,
the number of people who responded to the notion the number of people who responded to the notion
stating that as CIOs our cloud and IoT platforms offer stating that As cloud based programs can be accessed
integrated data storage solutions, hereby helping anywhere, it saves logistics and data transfer costs,
reduce data storage costs, was 405. About 99 of these was 405. About 109 of these respondents representing
respondents representing 24.4 percent of the total 26.9 percent of the total respondents strongly agreed
respondents strongly agreed with this notion, while with this notion, while 195 respondents accounting
204 respondents accounting for a whopping 50.4 for a whopping 48.1 percent of the total respondents
percent of the total respondents did agree but not did agree but not strongly with this notion. However,
strongly with this notion. However, a few number of a few number of respondents, not more than 12 in
respondents, not more than 14 in number did number did disagree with the notion, with about 5
disagree with the notion, with about 3 more more respondent strongly disagreeing. About 84
respondent strongly disagreeing. About 85 respondents representing 20.7 percent of the total
respondents representing 21.0 percent of the total respondents were neutral as concerns this notion.
respondents were neutral as concerns this notion.
Fig 72 Fig 74
In congruence to the data computed in Fig.71 and 72, In congruence to the data computed in Fig.73 and
the number of people who responded to the notion 764, the number of people who responded to the
stating As our cloud and IoT technologies can be notion stating that Cloud and IoT based technologies
expanded for large number of users, the cost of in reduction of server maintenance, power and other
additional infrastructure is saved, was 405. About 115 costs, was 405. About 106 of these respondents
of these respondents representing 28.4 percent of the representing 26.2 percent of the total respondents
total respondents strongly agreed with this notion, strongly agreed with this notion, while 189
while 191 respondents accounting for a whopping respondents accounting for a whopping 46.7 percent
47.2 percent of the total respondents did agree but of the total respondents did agree but not strongly
not strongly with this notion. However, a few with this notion. However, a few number of
number of respondents, not more than 19 in number respondents, not more than 16 in number did
did disagree with the notion, with about 4 more disagree with the notion, with about 6 more
respondent strongly disagreeing. About 76 respondent strongly disagreeing. About 88
respondents representing 18.8 percent of the total respondents representing 21.7 percent of the total
respondents were neutral as concerns this notion. respondents were neutral as concerns this notion.
Fig 73: Cloud and IoT based technologies in reduction Fig 75: Cloud based data backup saves the cost of
of server maintenance, power and other costs retrieving lost data during system crashes or natural
calamities
The results shows that the new role of the CIO has
resulted in successful implementation of cloud and
IoT based technologies. The study also states that the
Fig 76
most of the companies cloud and IoT platforms has
less chance of failure and they are set up in such a
In congruence to the data computed in Fig.75 and 76,
way that they have adequate methods for recovery.
the number of people who responded to the notion
To have the best availability and reliability most of
stating that Cloud based data backup saves the cost of
the cloud infrastructures are using effective tools to
retrieving lost data during system crashes or natural
address the issues which can give higher confidence
calamities, was 405. About 117 of these respondents
rate to the cloud adopters. The confirmation from IT
representing 28.9 percent of the total respondents
and business leaders states that they have taken the
strongly agreed with this notion, while 188
necessary measure to backup and store data to be
respondents accounting for a whopping 46.4 percent
easily retrieved during emergencies. The results
of the total respondents did agree but not strongly
shows that the availability of the cloud is high with
with this notion. However, a few number of
minimal downtime and server failures. The
respondents, not more than 14 in number did
infrastructure is designed with enough redundancy so
disagree with the notion and about 83 respondents
that resiliency is achieved in case of failures. The
representing 20.5 percent of the total respondents
automated backup mechanisms are helping the
were neutral as concerns this notion.
organizations from any data loss.
that any change in the business environment can be Moreover, the result analysis unveiled that the
effectively addressed by the cloud infrastructures. overall experience and/or exposure, and the industry
This also gives a learning to the companies sector of one’s present organization plus his/her
implementing and adopting cloud to make sure that background education status goes a long way in the
they are doing the required business forecasting and successful implementation of Cloud-IoT based
planning for designing the cloud and IoT technologies. Also, it became obviously necessary
infrastructures. A poor planning in this area can that cloud-based data back-up saves the cost of
negatively affect the future business of any retrieving lost data during system crashes or any
organization. So the organizations has to give utmost natural calamity, as well as helps in the reduction of
importance to match up with the environmental server maintenance, power and other costs. It is
changes in the business. The organizations are important that as cloud & IoT technologies are being
concerned about the security of their infrastructures expanded to be accessible by large number of users,
and they are doing the best possible measures to the cost of all additional infrastructures is being
safeguard their infrastructure. The organizations are saved. The results also reveals that as cloud-based
constantly monitoring their cloud and IoT platforms programs are being accessed anywhere, it saves
to identify any potential security threats that would logistics and data transfer costs much more
impact their business. From this study it gives a importantly. It proved that cloud & IoT platforms
reference that there is huge scope for research in offer integrated data storage solutions, thereby
scalability and security aspects of the cloud and IoT. helping to reduce data storage costs in the
Assessing the scalability and security of cloud-IoT atmosphere of its successful implementation.
technologies, including its capacity, throughput and
additional lower costs, it is concluded that the In the same vein, as business leaders willing to
targeted successful implementation of cloud-IoT successfully implement and integrate cloud
based technologies will be very much easier to technologies, it is necessary to achieve maximum
accomplish by improving cloud throughputs transaction per seconds and respond to the requests
frequently by looking out for newer operating of each user within the shortest possible timeframe,
mechanisms. thus enhancing good customer satisfaction and
service. It is also quite important to allocate only the
The analysis of the capacity and throughput required resources to cloud-IoT based platforms to
parameters states that the organizations are showing avoid critical losses. As business and IT leaders, it
more interest in optimizing the existing resources. becomes essential to constantly innovate, thus
The organizations implementing the cloud and IoT improving productivity while minimising the use of
has to prepare a roadmap of the capacity well in scarce resources and eliminating unnecessary errors.
advance before the implementation of cloud and IoT. It is also essential to indulge in capacity planning and
A proper planning would help the organizations to tracking of the available resources. Furthermore, it
optimise the resources when the volume of will do the company good to update data-safety
transactions increases in the infrastructure. An mechanisms frequently, and checking any breach in
architects and designers also need to consider the network security or security threats, as a way of
chances of error rates and do the required resource enhancing optimal usage of resources, i.e, network
planning to avoid any losses. The results of this study security and data security. In addition, cloud
states that there is huge scope for research in the area technologies can multi-task in terms of application
of digital optimization. requests without slowing down, and it is built to
accommodate changing business objectives [3]. Pocatilu, P., Alecu, F., &Vetrici, M. (2010).
(flexibility). Measuring the efficiency of cloud computing
for e-learning systems. Wseas transactions on
The cloud-IoT platforms should be able to withstand
computers, 9(1), 42-51.
server failures, endure power outages, network
[4]. Deka Ganesh Chandra & Dutta Borah Malaya,
failures and any form of environmental damage one
(2012), Role of Cloud Computing in Education,
again. These and many more will surely enhance the
ICCEET, Pg: 832-836.
reliability, availability, scalability, security, capacity,
[5]. Dong, B., Zheng, Q., Qiao, M., Shu, J., & Yang,
throughput and cut operating costs of cloud-Iot based
J. (2009). BlueSky cloud framework: an e-
technologies in the quest of its successful
learning framework embracing cloud
implementation and integration. The execution was
computing. In Cloud Computing (pp. 577-582).
another issue that was recognized as a factor. The
Springer Berlin Heidelberg.
discoveries recommended it needs thought in light of
[6]. Faisal A. Alshuwaier, Abdullah A. Alshwaier,
the fact that receiving Cloud services could influence
Ali M. Areshey (2011), Applications of Cloud
the system execution and accessibility of the services
Computing in Education.
is outside of the business control. Likewise, security
[7]. Feng, D. G., Zhang, M., Zhang, Y., & Xu, Z.
was distinguished as the best mechanical test. The
(2011). Study on cloud computing security.
discoveries contradicted that by recommending that
Journal of Software, 22(1), 71-83.
substantial organizations have their very own
[8]. Fox, A., Griffith, R., Joseph, A., Katz, R.,
foundation that needs thought and it would be less
Konwinski, A., Lee, G., ... &Stoica, I. (2009).
demanding for little organizations to receive cloud
Above the clouds: A Berkeley view of cloud
services as a result of the moderately little set-up
computing. Dept. Electrical Eng. and Comput.
expense. Considering the constraints to the
Sciences, University of California, Berkeley,
exploration of this examination a proposal for further
Rep. UCB/EECS, 28, 13.
research can be made. With the end goal to address
[9]. Hailu, A. (2012). Factors influencing cloud-
these issues, a further research could be made
computing technology adoption in developing
utilizing a quantitative technique that could look at a
countries (Doctoral dissertation, Capella
bigger example of the populace.
University).
[10]. Chen, Y., & Kunz, T. (2016, April).
VI. REFERENCES
Performance evaluation of IoT protocols under
a constrained wireless access network. In
[1]. Iosup, A., Ostermann, S., Yigitbasi, M. N.,
Selected Topics in Mobile & Wireless
Prodan, R., Fahringer, T., &Epema, D. (2011).
Networking (MoWNeT), 2016 International
Performance analysis of cloud computing
Conference on (pp. 1-7). IEEE.
services for many-tasks scientific computing.
[11]. Collinchau. (2013, August 19). 7 performance
IEEE Transactions on Parallel and Distributed
metrics for measuring cloud ROI within HP
systems, 22(6), 931-945.
Cloud Management. Micro Focus. Retrieved 19
[2]. The cloud service industry’s 10 most critical
October 2018 from
metrics. Guiding Metrics. Retrieved 19
https://community.softwaregrp.com/t5/IT-
February 2018 from
Operations-Management-ITOM/7-
https://guidingmetrics.com/content/cloud-
performance-metrics-for-measuring-cloud-
services-industrys-10-most-critical-metrics
ROI-within-HP-Cloud/ba-
p/300699#.Wopi1INua01
[12]. Frey, S., Reich, C., &Lüthje, C. (2013,
September). Key performance indicators for
cloud computing SLAs. In The Fifth
International Conference on Emerging
Network Intelligence, EMERGING (pp. 60-64).
ABSTRACT
An agricultural mechanism or agri mechanism could be a mechanism deployed for agricultural functions. The
most space of application of robots in agriculture is seeding robots square measure designed to exchange human
labour. The agricultural business is behind alternative complementary industries in victimization robots as a
result of the kind of jobs concerned in agriculture are not any and dig. This project strives to develop a
mechanism capable of activity operations like automatic seeding and dig. It additionally provides manual
management once needed and keeps tabs on the wetness with the assistance of wetness sensors. Then main part
here is that the microcontroller that supervises the whole method.
Keywords : Agri Vehicle, GPS based Remote Controlled Robot, Zigbee, Raspberry Pi, Global Positioning
System, UART, LM35
I. INTRODUCTION environmental factors which in turns helps to
monitor the system. Monitoring environmental
Agriculture is considered as the basis of life for the factors is not enough and complete solution to
human species as it is the main source of food grains improve the yield of the crops. There are number of
and other raw materials. It plays vital role in the other factors that affect the productivity to great
growth of country’s economy. It also provides large extent. These factors include attack of insects and
ample employment opportunities to the people. pests which can be controlled by spraying the crop
Growth in agricultural sector is necessary for the with proper insecticide and pesticides. Secondly,
development of economic condition of the country. attack of wild animals and birds when the crop grows
Unfortunately, many farmers still use the traditional up. There is also possibility of thefts when crop is at
methods of farming which results in low yielding of the stage of harvesting. Even after harvesting, farmers
crops and fruits. But wherever automation had been also face problems in storage of harvested crop. So, in
implemented and human beings had been replaced order to provide solutions to all such problems, it is
by automatic machineries, the yield has been necessary to develop integrated system which will
improved. Hence there is need to implement modern take care of all factors affecting the productivity in
science and technology in the agriculture sector for every stages like; cultivation, harvesting and post
increasing the yield. Most of the papers signifies the harvesting storage. This paper therefore proposes a
use of wireless sensor network which collects the system which is useful in monitoring the field data as
data from different types of sensors and then send it well as controlling the field operations which
to main server using wireless protocol. The collected provides the flexibility. The paper aims at making
data provides the information about different agriculture smart using automation and IoT
CSEIT195177 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 397-403 ]
397
Juno Isabel Susinthra M, K. Gayadri Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 397-403
technologies. The highlighting features of this paper sensing and control irrigation system using
includes smart GPS based remote controlled robot to distributed wireless sensor network aiming for
perform tasks like; weeding, spraying, moisture variable rate irrigation, real time in field sensing,
sensing, bird and animal scaring, keeping vigilance, controlling of a site-specific precision linear move
etc. Secondly, it includes smart irrigation with smart irrigation system to maximize the productivity with
control based on real time field data. Thirdly, smart minimal use of water was developed by Y. Kim. The
warehouse management which includes temperature system described details about the design and
maintenance, humidity maintenance and theft instrumentation of variable rate irrigation, wireless
detection in the warehouse. Controlling of all these sensor network and real time in field sensing and
operations will be through any remote smart device control by using appropriate software. The whole
or computer connected to Internet and the operations system was developed using five in field sensor
will be performed by interfacing sensors, Wi-Fi or stations which collects the data and send it to the
ZigBee modules, camera and actuators with micro- base station using global positioning system (GPS)
controller and raspberry pi. where necessary action was taken for controlling
irrigation according to the database available with the
II. METHODS AND MATERIAL system. The system provides a promising low cost
wireless solution as well as remote controlling for
The newer scenario of decreasing water tables, drying precision irrigation. In the studies related to wireless
up of rivers and tanks, unpredictable environment sensor network, researchers measured soil related
present an urgent need of proper utilization of water. parameters such as temperature and humidity.
To cope up with this use of temperature and moisture Sensors were placed below the soil which
sensor at suitable locations for monitoring of crops is communicates with relay nodes by the use of
implemented in. An algorithm developed with effective communication protocol providing very low
threshold values of temperature and soil moisture can duty cycle and hence increasing the life time of soil
be programmed into a microcontroller-based gateway monitoring system. The system was developed using
to control water quantity. The system can be microcontroller, universal asynchronous receiver
powered by photovoltaic panels and can have a transmitter (UART) interface and sensors while the
duplex communication link based on a cellular- transmission was done by hourly sampling and
Internet interface that allows data inspection and buffering the data, transmit it and then checking the
irrigation scheduling to be programmed through a status messages. The drawbacks of the system were its
web page. The technological development in cost and deployment of sensor under the soil which
Wireless Sensor Networks made it possible to use in causes attenuation of radio frequency (RF) signals.
monitoring and control of greenhouse parameter in
precision agriculture. After the research in the III. RESULTS AND DISCUSSION
agricultural field, researchers found that the yield of
agriculture is decreasing day by day. However, use of
technology in the field of agriculture plays important
role in increasing the production as well as in
reducing the extra man power efforts. Some of the
research attempts are done for betterment of farmers
which provides the systems that use technologies Fig 1. System Overview
helpful for increasing the agricultural yield. A remote
In the present system, every node is integration with with AVR microcontroller. Motion detector will
different sensors and devices and they are detect the motion in the room when security mode
interconnected to one central server via wireless will be ON and on detection of motion, it will send
communication modules. The server sends and the alert signal to user via Raspberry pi and thus
receives information from user end using internet providing theft detection.
connectivity. There are two modes of operation of
the system; auto mode and manual mode. In auto
mode system takes its own decisions and controls the
installed devices whereas in manual mode user can
control the operations of system using android app or
PC commands.
Node 1:
Node1 is GPS based mobile robot which can be
controlled remotely using computer as well as it can
be programmed so as to navigate autonomously Fig 3.
within the boundary of field using the Co-ordinates Node 2
given by GPS module. Temperature sensor and Humidity sensor senses the
temperature and humidity respectively and if the
value crosses the threshold then room heater or
cooling fan will be switched ON/OFF automatically
providing temperature and humidity maintenance.
Node2 will also controls water pump depending upon
the soil moisture data sent by node3.
Node 3:
Node3 is a smart irrigation node with features like;
Smart control of water pump based on real time field
data i.e. automatically turning on/off the pump after
Fig 2. attaining the required soil moisture level in auto
Node 1 mode, switching water pump on/off remotely via
The Remote controlled robot have various sensors mobile or computer in manual mode, and continuous
and devices like camera, obstacle sensor, siren, cutter, monitoring of soil moisture.
sprayer and using them it will perform tasks like; Hardware used:
Keeping vigilance, Bird and animal scaring, Weeding, a) AVR Microcontroller At mega 16/32:
and Spraying The microcontroller used is, Low-power AVR® 8-bit
Node 2: Microcontroller, having 8K Bytes of In-System Self-
Node2 will be the warehouse. It consists of motion programmable Flash program memory,
detector, light sensor, humidity sensor, temperature Programmable Serial USART, 8-channel, 10-bit ADC,
sensor, room heater, cooling fan altogether interfaced 23 Programmable I/O Lines.
d) SinaProg:
SinaProg is a Hex downloader application with AVR
Dude and Fuse Bit Calculator. This is used to
download code/program and to set fuse bits of all
AVR based microcontrollers.
e) Raspbian Operating System:
Raspbian operating system is the free and open
source operating system which Debian based and
optimized for Raspberry Pi. It provides the basic set
of programs and utilities for operating Raspberry Pi.
Fig 4. It comes with around 35,000 packages which are pre-
In node3, moisture sensor transmits the data using compiled software that are bundled in a nice format
HT12E Encoder IC and a RF transmitter. The for hustle free installation on Raspberry Pi.It has
transmitted data is received by node2 and there it is good community of developers which runs the
processed by microcontroller in order to control the discussion forms and provides solutions to many
operation of water pump. relevant problems. However, Raspbian OS is still
under consistent development with an main focus on
Burned in the microcontroller in order to perform improving the performance and the stability of as
desired operations. This software directly provides many Debian packages as possible.
.hex file which can be easily burned into the
microcontroller. V. EXPERIMENTATION AND RESULTS
b) Proteus 8 Simulator:
Proteus 8 is one of the best simulation software for
various circuit designs of microcontroller. It has
almost all microcontrollers and electronic
components readily available in it and hence it is
widely used simulator. It can be used to test programs
and embedded designs for electronics before actual
hardware testing. The simulation of programming of
microcontroller can also be done in Proteus.
Simulation avoids the risk of damaging hardware due
to wrong design.
c) Dip Trace: Fig 5. Experimental setup for Node1
Dip race is EDA/CAD software for creating schematic
As shown in figure 5, experimental setup for node1
diagrams and printed circuit boards. The developers
consists of mobile robot with central server, GPS
provide multi-lingual interface and tutorials
module, camera and other sensors. All sensors are
(currently available in English and 21 other
successfully interfaced with microcontroller and the
languages). Dip Trace has 4 modules: Schematic
microcontroller is interfaced with the raspberry
Capture Editor, PCB Layout Editor with built-in
pi.GPS and cameras are also connected to raspberry
shape-based auto router and 3D Preview & Export,
pi. Test results shows that the robot can be controlled
Component Editor, and Pattern Editor.
remotely using wireless transmission of PC
commands to R-Pi.R-Pi forwards the commands to As shown in above figure, node3 consists of a
microcontroller and microcontroller gives signals to moisture sensor connected to HT12E. Moisture
motor driver in order to drive the Robot.GPS module sensor transmits the data using HT12E Encoder IC
provides the co-ordinates for the location of the robot and a RF transmitter to the Node2 where it is
processed by microcontroller and accordingly water
pump is switched ON/OFF.
VI. CONCLUSION
VIII. REFERENCES
Web users are increasingly turning to ad blockers to avoid ads, which are often perceived as annoying or an
invasion of privacy. While there has been significant research into the factors driving ad blocker adoption and
the detrimental effect to ad publishers on the Web, the resulting effects of ad blocker usage on Web users’
browsing experience is not well understood. To approach this problem, we conduct a retrospective natural field
experiment using Firefox browser usage data, with the goal of estimating the effect of ad blocking on user
engagement with the Web. We focus on new users who installed an ad blocker after a baseline observation
period, to avoid comparing different populations. Their subsequent browser activity is compared against that of
a control group, whose members do not use ad blockers, over a corresponding observation period, controlling
for prior baseline usage. In order to estimate causal effects, we employ propensity score matching on a number
of other features recorded during the baseline period. In the group that installed an ad blocker, we find
significant increases in both active time spent in the browser (+28% over control) and the number of pages
viewed (+15% over control), while seeing no change in the number of searches. Additionally, by reapplying the
same methodology to other popular Firefox browser extensions, we show that these effects are specific to ad
blockers. We conclude that ad blocking has a positive impact on user engagement with the Web, suggesting
that any costs of using ad blockers to users’ browsing experience are largely drowned out by the utility that
they offer.
Keywords: AdBlockPlus, Unblock Origin, Trivial Algorithm.
CSEIT195178 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 404-408 ]
404
V. Santhi, S. Abirami Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 404-408
developed and IT solutions became more available, Adaptive filtering of advertisements on web pages
the manner in which advertisements were shown on We presented a method to dynamically create custom
websites also developed. filters to avoid downloading unwanted URLs with
minimal interaction with the user, using a weighted-
II. LITERATURE SURVEY majority type algorithm. Both the standalone
extension (AdBlockLearner) and the test driver
Native Advertising and its Effects on Online (AdBlockLearnerTest) are available in [2], including
Advertising Native Advertising and its Effects on source code and documentation. They are compatible
Online Advertising According to Financial Times with most versions of Mozilla Firefox.
Limited (2013), the digital revolution has made many
business models obsolete and advertising companies Adblocking and Counter-Blocking: A Slice of the
see this as a welcome change. Online social Arms Race Adblocking tools like Adblock Plus
networking and internal structural changes in the continue to rise in popularity, potentially threatening
media market have changed how online advertising the dynamics of advertising revenue streams. In
is done. This change has many concurrent forms and response, a number of publishers have ramped up
implications, and the most apparent of them might be efforts to develop and deploy mechanisms for
the change in the various strategies and tactics detecting and/or counter-blocking adblockers (which
companies are adapting in response to said changes; we refer to as anti-adblockers), effectively escalating
mainly advertising online in the form of native the online advertising arms race. In this paper, we
advertising; while one company is inhibiting media develop a scalable approach for identifying third-
profitability in its current form, at the same time party services shared across multiple websites and use
furthering the its corporate sponsors' agenda to it to provide a first characterization of antiadblocking
promote and implement native advertising-or "non- across the Alexa Top-5K websites. We map websites
intrusive" advertising-as the norm of online that perform anti-adblocking as well as the entities
advertising. Abstract According to Financial Times that provide anti-adblocking scripts. We study the
Limited (2013), the digital revolution has made many modus operandi of these scripts and their impact on
business models obsolete and advertising companies popular adblockers. We find that at least 6.7% of
see this as a welcome change. Online social websites in the Alexa Top-5K use anti-adblocking
networking and internal structural changes in the scripts, acquired from 12 distinct entities – some of
media market have changed how online advertising which have a direct interest in nourishing the online
is done. This change has many concurrent forms and advertising industry.
implications, and the most apparent of them might be
the change in the various strategies and tactics Green Mining : Energy Consumption of
companies are adapting in response to said changes; Advertisement Blocking Methods
mainly advertising online in the form of native Extending battery life on mobile devices has become
advertising; while one company is inhibiting media an important topic recently due to the increasing
profitability in its current form, at the same time frequency of smartphone adoption. A primary
furthering the its corporate sponsors' agenda to component of smart phone energy consumption is
promote and implement native advertising-or "non- the apps that run on these devices. Many apps have
intrusive" advertising-as the norm of online embedded advertising and web browser apps will
advertising. show ads that are embedded on webpages. Other
researchers have found that advertising libraries and
advertisements tend to increase power usage. But is determinants concerning users blocking
the converse true? If we use advertisement-blocking advertisements and IT tools. The paper refers to this
software will we consume less energy, or will the and systematizes knowledge in the scope of types of
overhead of ad-blocking consume more energy? This online advertisements and methods for blocking
study seeks to determine the effects of advertisements them using an adblock, and it identifies reasons and
on energy consumption, and the effects of attempts to main categories of reasons for users blocking
block the advertisements. We compared different advertisements.
methods of blocking advertisements on an Android
mobile phone platform and compared the power PROPOSED METHODOLOGY
efficiency of these methods. We found many cases
where ad-blocking software or methods resulted in The research presented in the paper was confronted
increased power use. with results of an analysis of application of ad blocks.
The obtained results will facilitate conducting further,
Blocking online advertising-A state of the art. more thorough research. Considerations included in
the paper can constitute a set of recommendations for
Compared with online advertising industry, there is publishers displaying advertisements on websites and
an even faster increase of ad blocker usage, which they can be useful for drawing conclusions and
influence badly on publishers’ and advertisers’ preparing guidelines for projects supporting
business. Thus more and more companies initialize sustainable development in the scope of online
their counter-ad blocking strategies, in which advertising.
customers choose to either disable their ad blockers
or leave without seeing the content. There are also
companies which abandon their counter-ad blocking
strategies after conducting them for a while due to
insufficient understanding of users’ ad blocking
behavior. In this study, we employed a quasi-
experiment framework and collected a large-size data
with the cooperation with Forbes Media. We aim to
identify factors influencing ad blocker usage.
Furthermore, we will model the interaction effects
among user profile, online behavior patterns, device
features on ad blocker usage propensity. Our study
contributes the literature of understanding ad blocker Connecting Network and Data Exchanging: -
usage by evaluating those principles using big amount
of real-world data. Computer network that interconnects computers or
systems within a large-scale network among internet
III. METHODS AND MATERIAL networks, it connects individual computer terminals,
mobile devices, and computer networks to the
EXISTING PROCESS Internet, enabling users to access Internet services,
Research concerning users blocking advertisements such as email and the software application. Network
constitutes a new research area both in the scope of computer devices that originate, route and terminate
analysis of collected data regarding that topic, the data are called network nodes. Nodes can include
hosts such as personal computers, phones, servers as Nodes Protected from Ad Block:-
well as networking hardware. Two such devices are Using metropolis sampler makes it more security for
said to be networked together when one device is Internet activity to be traced back to the user during
able to exchange data information with the other the visits of Web sites, online posts, and other
device, whether or not they have a direct connection communication forms. It intended to protect the
to each other. personal privacy of users, as well as their freedom
and ability to conduct confidential communication
Ad Block occurred (i.e. Ad Block Software):- by keeping their Internet activities from being
monitored. Assuming the networks is fully
Malicious software, is any software used to disrupt trustworthy, the system node must provide the
computer operation, gather sensitive information, or means to properly authenticate to connect other
gain access to private computer systems. Malware is nodes. Other nodes may impersonate trusted
defined by its malicious intent, acting against the computers, thus requiring system authentication. The
requirements of the computer user, and does not nodes and user may be trusted but within an
include software that causes unintentional harm due untrustworthy environment.
to some deficiency. The term badware is sometimes
used, and applied to both true (malicious) malware IV. RESULTS AND DISCUSSION
and unintentionally harmful software. During the
data transferring or downloading Computer users CONCLUSIONS
often download malware (i.e. malicious software) to The paper shows the reasons for using adblock
their computer by unknowingly visiting a malicious programs and presents the current most popular
webpage hosting a drive-by download attack, programs of that type as well as their characteristics.
clicking on a malicious link included in email, Apart from aforementioned, a survey study was
opening an attachment which includes an exploit, conducted involving a group of Polish internet users,
and destroy the data. which shows that they actively and consciously block
the display of advertisements in their web browsers.
Detecting, Blocking using Check Sum and Metropolis In this study we show how to adblock software
Sampler:- technologies are applied in Polish environment. We
discover a strong desire to block advertisements and
Anti-malware software is computer software used to well known ways to do this. Also in Poland there are
prevent, detect and remove the virus software. But many adapted solutions to improve adblock accuracy
the malware (i.e. malicious software) occurred during and coverage.
download the software or clicking the malware link
in spite of clicking the e-mail unknowingly it affects FUTURE ENHANCEMENT
entire system. Check sum algorithm was originally Future directions of research will concern the
developed to detect malware based on the priority of problem of intrusiveness of advertisements and ways
other kinds of malware during the data processing. for decreasing it. As it was mentioned in the paper,
And encounter based algorithm is used to block the users are not against advertisements being
malware (i.e. malicious software). Metropolis Sampler displayed—they oppose the way in which they
algorithm is to block and encounter the malware. To appear on their screen, e.g. by suddenly covering the
prevent the nodes and against to filtered the thread. viewed content. Further research will be also aimed
And it is recover the data in a large scale systems. at a quantitative analysis regarding elements blocked
V. REFERENCES
To comfort the living conditions within of a human his home, she can use home monitoring and automation
are utilized. The standards of human’s comfort in homes can be categorized into several types. Among these
categories, the most significant ones are the thermal comfort, which is related to temperature and humidity,
followed by the visual comfort, related to colors and light, and hygienic comfort, associated with air quality.We
are proposing a system to monitoring the paremeters range which will increase the comfortness of the
human.Additionally,we incorporate the smart home technique which controls the home appliances by
intelligent automatic execution of commands after analyzing the collected data. Automation can be
accomplished by using the Internet of Things (IoT). This gives the inhabitant accesses to certain data in the
house and the ability to control some parameters remotely. We propose the complete design of an IoT based
sensing and monitoring system for smart home automation. That uses the EmonCMS platform for collecting
and Visualizing monitored data and remote controlling of home appliances and devices. The selected platform
is very flexible and user-friendly. The sensing of different variables inside the house is conducted using the
NodeMCU-ESP8266 microcontroller board, which allows real-time data sensing, processing and
uploading/downloading to/from the EmonCMS cloud server.
Keywords : IOT, CMS, Humidity, Air Quality, Temperature
CSEIT195190 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 409-413 ]
409
R. Sugantha Lakshmi et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 409-413
Cable broadband, DSL, Bluetooth and wireless ZigBee modules due to their low power and cost
technologies provide a way to have a home efficiency.
networked for devices to communicate with each
other as well as internet. These technologies either D. GSM Based Home Automation System
wired or wireless provide foundation on which smart A smart home automation system implemented by
home will operate. using Global System for Mobile communication
(GSM). The hardware architecture of the system
II. LITERATURE SURVEY consists of GSM modem, PIC16F887 microcontroller
and smartphone. The system used a GSM modem to
A. Bluetooth based home automation system control electric appliances through SMS request.
Home automation systems using smartphone, PIC16F887 microcontroller interfaced with a GSM
Arduino board and Bluetooth technology are secured modem and it is used to read and decode the received
and low cost. A Bluetooth based home automation SMS to execute the specific command.
system proposed by R.Piyare and M.Tazil. The
hardware architecture of this system consists of the F. EnOcean based home automation system
Arduino BT board and a cell phone, the The EnOcean is newly developing energy harvesting
communication between Arduino BT board and cell technology used in transportation, building and home
phone is wirelessly using Bluetooth technology. The automation systems. EnOcean’s technology is
Arduino BT board has a range of 10 to 100 meters, 3 productively in logistics as well as in the industry due
Mbps data rate and 2.4 GHz bandwidth. to energy efficiency and easily installing device
anywhere for users ease which significantly save the
B. Voice recognition based home automation installation cost up to 40%. Moreover EnOcean’s
Voice recognition based home automation system devices utilize 315 MHz band and it provides
proposed and implemented by a researcher. The convenient ways for home automation system.
hardware architecture of this system consists of
Arduino UNO and smartphone. The wireless III. EXISTING PROCESS
communication between the smartphone and the
Arduino UNO is done through Bluetooth technology. Smart home technology has the potential of bringing
Android OS has a built-in voice recognizing feature benefits to modern households and their inhabitants.
which is used to develop a smartphone application Yet, ever since its early development, it has been
which has ability to control the home appliances struggling to reach mass consumer adoption. Privacy
from user voice command. and security, trust issues, reliability, and price are just
some of the challenges smart home technology is
C. ZigBee Based Wireless Home Automation System facing. In addition, literature suggests that there is an
ZigBee based wireless home automation system has evident gap between the functionalities offered by
also been studied, it consists of three main modules, smart devices and users’ needs. Investigating these
handheld microphone module, central controller potential adoption challenges in some more detail, we
module and appliance controller module. Handheld conducted an interview study with existing smart
microphone module use ZigBee protocol and central home technology users. Results show that privacy
controller module are based on PC. In this system, and security are still the most prominent hindering
Microsoft speech API is used as a voice recognition factors, and that the often insufficient
application, wireless network is established using RF interoperability of devices becomes an ever-growing
concern. Also, smart home devices are consistently humidity, luminosity, and air quality (i.e. CO2 and
perceived as complex and expensive, and lack dust levels). Usually, the term “Big Data” is often
perceived value and trustworthiness. associated with IoT and refers to the large number
data collected from a large number of sensors and
IV. PROPOSED METHODOLOGY devices to be processed, which is the case here. In
fact, depending on the number of sensors and the
As mentioned earlier, the monitored parameters in measurement-sampling rate, a large number of data
homes are selected to ensure a smart, efficient and might be generated and transmitted through the
comfortable living conditions. Therefore, one hub is internet to the cloud server, which should be able to
made to measure temperature, humidity, light handle such large amount of data communication and
intensity, proximity, and CO2 levels. This hub can be archiving.
placed in each room of the house, and preferably at a
high level above the ground and below the ceiling. B. Data Transmission
Collected data can be processed and used to control Transmitting data between devices and controllers is
smart devices such as smart LEDs and A/Cs. The done using one or more communication technologies.
schematics of the proposed design. It comprises These include Bluetooth, ZigBee, Wi-fi, Ethernet or
mainly sensors, processor, user interface, and data GSM. Bluetooth and ZigBee are commonly used for
communication and transmission links. in-home data transmission and control and provide
the link between the sensors and the central
processing unit. These data communication
technologies are popular because of their low power
consumption, and simplicity to implement.
Furthermore, IoT requires the use of either Wi-fi or
Ethernet to connect to the internet. While Ethernet
is by far faster than Wi-fi connection, the high data
rate is not essential for home automation applications.
Additionally, Wi-fi has the advantage of mobility,
making it more widespread in most systems. Wi-fi
technology consumes more energy than alternatives
such as Bluetooth or ZigBee. The power consumption
can be reduced by lowering the frequency of data
V. IMPLEMENTATION RESULTS uploading.
Internet security is a branch of computer sciences often involving browser security, network security,
applications and operating systems to keep the internet as a secure channel to exchange information by
reducing the risk and attacks. There are a number of studies that have been conducted in this field resulting in
the development of various security models to achieve internet security. However, periodic security reports and
previous studies prove that the most secure systems are not immune from risk and much effort is needed to
improve internet security. This paper proposed a simple security model to improve internet applications
security and services protections, specified access control, cryptographic, cookies and session managements,
defense programing practices, care for security from early stage on development life cycle, use hardware
authentication techniques in access control, then propose cryptographic approach by mix MD5 with Based64,
consider session and cookies types and ways to keep it secure. Additionally, these practices discussed the most
important web security vulnerability and access control weakness and how to overcome such weaknesses,
proposed an approach to measure, analyze and evaluate security project according to software quality standard
ISO 25010 by using Liker scale, finally ended by case study. The effort of this paper represents a set of
techniques and tips that should be applied within each web application development process to maintain its
security.
Keywords : Combinationarial Optimization Identification, Public Key Infrastructure, Partial Forward Secrecy.
CSEIT195198 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 414-418 ]
414
J. Jose Merlin et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 414-418
information and data maintained by corporation's application development process to maintain its
servers and government agencies, safety from easily security.
distributed malicious software, and computer crimes. Security Issues for Web-Based Applications: Issues
On the other hand, software security has become a And Solutions For The Safe Transfer Of Clinical
quality attribute used to measure the quality of Trials Data Over The Internet When building any
software according to standards such as ISO software web-based application, the issue of security is always
quality standard 25010. a concern. When the application is designed to allow
the sharing of clinical trials data across the Internet,
II. LITERATURE SURVEY security becomes one of the major topics. This paper
describes what approach iBiomatics, a SAS company,
Proposed Security Model For Web Based has taken in the construction of their biometrics
Applications And Services Portal. The paper presents a basic overview of
Internet security is a branch of computer sciences security for an Internet based application, describes
often involving browser security, network security, what security features were built into the application,
applications and operating systems to keep the what software tools were used to implement various
internet as a secure channel to exchange information aspects of the security model, and how the actual
by reducing the risk and attacks. There are a number hardware configuration can be a critical piece of the
of studies that have been conducted in this field overall security of a web based application.
resulting in the development of various security Securing Frame Communication in Browsers
models to achieve internet security. However, Many web sites embed third-party content in frames,
periodic security reports and previous studies prove relying on the browser’s security policy to protect
that the most secure systems are not immune from them from malicious content. Frames, however, are
risk and much effort is needed to improve internet often insufficient isolation primitives because most
security. This paper proposed a simple security model browsers let framed content manipulate other frames
to improve internet applications security and services through navigation. We evaluate existing frame
protections, specified access control, cryptographic, navigation policies and advocate a stricter policy,
cookies and session managements, defense which we deploy in the open source browsers. In
programming practices, care for security from early addition to preventing undesirable interactions, the
stage on development life cycle, use hardware browser’s strict isolation policy also hinders
authentication techniques in access control, then communication between cooperating frames. We
propose cryptographic approach by mix MD5 with analyze two techniques for inter-frame
Based64, consider session and cookies types and ways communication. The first method, fragment
to keep it secure. Additionally, these practices identifier messaging, provides confidentiality without
discussed the most important web security authentication, which we repair using concepts from
vulnerability and access control weakness and how to a well-known network protocol. The second method,
overcome such weaknesses, proposed an approach to post Message, provides authentication, but we
measure, analyze and evaluate security project discover an attack that breaches confidentiality. We
according to software quality standard ISO 25010 by modify the post Message API to provide
using Likert scale, finally ended by case study. The confidentiality and see our modifications
effort of this paper represents a set of techniques and standardized and adopted in browser
tips that should be applied within each web implementations.
Protecting Browsers From Dns Rebinding Attacks the secret key or password shared between two users.
DNS rebinding attacks subvert the same-origin policy The main goal of password-based authenticated key
of browsers, converting them into open network exchange protocols is to restrict the adversary to this
proxies. Using DNS rebinding, an attacker can case only. The existing system consider that
circumvent organizational and personal firewalls, password-based authenticated key exchange in the
send spam email, and defraud pay-per-click three-party scenario, in which the users trying to
advertisers. We evaluate the cost effectiveness of establish a secret do not share a password between
mounting DNS rebinding attacks, finding that an themselves but only with a trusted server. In this
attacker requires less than $100 to hijack 100,000 IP existing system the key exchange between three
addresses. We analyze defenses to DNS rebinding authenticated users so, that the privacy of the system
attacks, including improvements to the classic “DNS is failed to overcome. Since we want to trust as little
pinning,” and recommend changes to browser plug- as possible the third party, we develop a new notion
ins, firewalls, and Web servers. Our defenses have called key privacy which roughly means that, even
been adopted by plug-in vendors and by a number of though the server’s help is required to establish a
open-source firewall implementations. session key between two users in the system, the
server should not be able to gain any information on
Assessment of Access Control Systems the value of that session key.
Adequate security of information and information
systems is a fundamental management responsibility. IV. PROPOSED METHODOLOGY
Nearly all applications that deal with financial,
privacy, safety, or defense include some form of A secure 2-party password-based key exchange is a
access control. Access control is concerned with 2PAKE protocol where the parties use their password
determining the allowed activities of legitimate users, in order to derive a common session key that will be
mediating every attempt by a user to access a used to build secure channels. Several practical
resource in the system. In some systems, complete schemes can be used in the instantiation of the 2-
access is granted after successful authentication of the party password-based key exchange of our generic
user, but most systems require more sophisticated construction. In these proposed system, instead of
and complex control. In addition to the exchange the password the owner going to send the
authentication mechanism (such as a password), link to get that particular data and in user side by
access control is concerned with how authorizations using that link they can retrieve that data easily.
are structured. In some cases, authorization may Once the user make logout means they cannot again
mirror the structure of the organization, while in enter into the system. The link can be used only once.
others it may be based on the sensitivity level of
various documents and the clearance level of the user V. IMPLEMENTATION RESULTS
accessing those documents. This publication explains
some of the commonly used access control services Search engine recognized
available in information technology systems. Search engine indexing collects, parses, and
stores data to facilitate fast and accurate information
III. EXISTING PROCESS retrieval. Index design incorporates interdisciplinary
concepts from linguistics, cognitive psychology,
Password-based authenticated key exchange is mathematics, informatics, and computer science. An
protocols which are designed to be secure even when alternate name for the process in the context
of search engines designed to find web pages on the industry-specific vertical search engines. SEO differs
Internet is web indexing. from local search engine optimization in that the
Popular engines focus on the full-text indexing of latter is focused on optimizing a business' online
online, natural language documents. Media presence so that its web pages will be displayed by
types such as video and audio and graphics are also search engines when a user enters a local search for
searchable. its products or services. The former instead is more
focused on national or international searches.
Meta search engines reuse the indices of other
Authentication
services and do not store a local index, whereas
An authentication module is a plug-in that collects
cache-based search engines permanently store the
user information such as a user ID and password, and
index along with the corpus. Unlike full-text indices,
compares the information against entries in a
partial-text services restrict the depth indexed to
database. If a user provides information that meets
reduce index size. Larger services typically perform
the authentication criteria, the user is validated and,
indexing at a predetermined time interval due to the
assuming the appropriate policy configuration,
required time and processing costs, while agent-
granted access to the requested resource. If the user
based search engines index in real time.
provides information that does not meet the
authentication criteria, the user is not validated and
denied access to the requested resource. OpenSSO
Enterprise is deployed with a number of
authentication modules.
Session Handling
A web session is a sequence of network HTTP request
and response transactions associated to the same user.
Modern and complex web applications require the
retaining of information or status about each user for
the duration of multiple requests.
User preference
Optimized search results
Understanding user preference settings. Completing
Search engine optimization (SEO) is the process of
the user preferences pages enables the system
affecting the online visibility of a website or a web
to use the field values that you specify as the default
page in a web search engine's unpaid results—often data that appears on various inquiry pages. ... This
referred to as "natural", "organic", or "earned" results.
enables default values to be set by user ID; the
In general, the earlier (or higher ranked on the
user can override the defaults when running an
search results page), and more frequently a website
inquiry.
appears in the search results list, the more visitors it
will receive from the search engine's users; these Temporary User Restriction
visitors can then be converted into To ensure a consistent user experience, we monitor
customers.[1] SEO may target different kinds of the level of requests to the my hr toolkit system from
search, including image search, video user accounts. If an abnormally high frequency of
search, academic search,[2] news search, and requests is detected, an escalating blocking process is
deployed
E-learning system is very much popular in today`s digital era due to which one can easily get access to the
required information or knowledge. Due to online learning there are several solutions to a single problem is
available as the internet has grown in the largest manner. Even the online learning is changing the load of
traditional classrooms. E-learning provides an integrated environment where access to particular information
can be found at one place in various forms. The proposed technique is for creating an E-learning system with an
integrated environment for students of higher education. So that, they are able to get access to an appropriate
solutions for the particular question asked in an university examination. The system will provide free access to
the study material for students simply by logging in. This will be creating an integrated library for each subject
and create model answer section for questions related to the subject. This will help student to learn subject
easily, the question and their answer that can be asked in the university examination.
Keywords: Raspberry pi, USB camera, motor driver, motor, LCD display, road side speed sign controlling
CSEIT1951106 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 419-421 ]
419
Neha Bitodkar et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 419-421
without any confusion as there are several solutions Author : Yogesh Deshpande , Samit Bhattacharya,
are available online for a single solution. Pradeep Yammiyavar
Description: This paper focuses on analyzing the
III. LITERATURE REVIEW ability of children`s for adopting e-learning
environment in comparison with traditional
Title 1 : Implementation of E-learning on full stack classrooms. Online learning can be an additional tool
concept for the school environment to get more knowledge
Author: Nitish Kumar, Chaitali Alhat, Rupali about the particular subject.
Bachhav
Description : The designed system provides materials IV. PROPOSED SYSTEM
in different formats. It can be in the form of videos,
pdf etc. Their purpose is to provide an open free The proposed system will be a beneficiary product for
course which provides access to the material after the the students of university and will get a complete
registration process is completed. This system focuses access to all the material related to their syllabus
on interactive learning between the students and the designed by university.
proffesors.
Title 2: Open educational resource : opportunities The system is designed using Bootstrap, CSS and PHP.
and challenges for Indian higher education. Mysql database is used for storing the login ID as well
Author : Dr. Indrajeet Dutta as the data of the user. The system will allow students
Description : This paper gives information about the for complete study of subjects due to the question
opportunities and challenges for Indian higher answer section is available. Question papers will be
education related with open educational resources. available on the subjects along with their model
This paper gives the detailed information about the answer.
several online courses started by the govt. such as
NMECIT, NKN, SHAKSHAT, NPTEL, EKLAVYA, The designed system contains information in
OSCAR E-GRID etc. This papers says that the different formats. It will also contain information in
opportunities can be increased as students can hear the form of video lectures and e-books. The system is
the lectures from international proffesors. branch wise and semester wise separated according to
Title 3 : Role of consortia for effective use of e- the university.
resources in Higher education : A practical approach Data Flow Diagram:
in Indian liabraries.
Author: Sunil Goria
Description : This paper says that in the last decade
the liabraries of higher education and the research
institutes are using the e-resources. In consortium
mode, one can be able to access the journals in Indian
libraries using e-resources. This paper focuses on
increasing use of e-resources.
Title 4: A behavioural approach to modelling Indian
children`s ability of adopting to e-learning
environment.
In this work, after login the study material will be Neha Bitodkar, Prof. Aniket Bhoyar, Suraj Chavhan,
available for the students. This is a beneficiary Priyanka Wahane, "Managing university defined
product for the students. University syllabus will be Study material by using Online Portal", International
available on this website along with related material Journal of Scientific Research in Computer Science,
such as question answer set, video lectures, model Engineering and Information Technology
answer, e-books, notes.It will help the students for (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
complete learning of subjects designed by university. 419-421, January-February 2019.
Due to E-learning one can access this information Journal URL : http://ijsrcseit.com/CSEIT1951106
form anywhere at anytime.
VI. REFERENCES
Maharashtra, India
ABSTRACT
According to the World Health Organization (WHO), in excess of a million people on the planet pass on
consistently by virtue of vehicle accidents. Notwithstanding care cause, this issue is up 'til now growing due to
rider's poor practices, for instance, tank driving, speed driving, riding without sufficient rest, riding with no top
protection, etc. The Event Data Recorder (EDR) or vehicle 'black box' is a standout amongst the most valuable
instruments accessible to crash Reconstructionist. For vehicles outfitted with this innovation, and when the
recorders fill in as planned, the EDR gives crash agents significant data that in numerous examples could not be
gathered. In this paper, we present the issues related to accident detections and some existing systems for
prevention of accidents.
Keywords : Car Accidents, Road Safety, Public Health, Black Box, Event Data Recorder
CSEIT1951107 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 422-428 ]
422
Prof. Tejal Irkhede et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 422-428
The investigation demonstrates that amid the most The mishap examination includes the investigation of
recent ten years, street unplanned fatalities in India accident scenes and the documentation of all
have expanded at the rate of 5% every year while the fundamental and accessible data of every segment
number of inhabitants in the nation has expanded (for example a human, vehicle, and street condition).
just at the rate of 1.4% every year. Because of this, Mishap reproduction is characterized by Baker and
casualty chance, street inadvertent passings per Fricke as[11]"… the endeavors to decide from
100,000 individuals, has expanded from 7.9 in 2003 to whatever data is accessible, how the mishap
11.2 in 2013. Casualty hazard in India isn't just happened". Mishap reproduction approach works in
fourfold than that in a portion of the created nations, reverse from the proof of the accident examination
for example, the United Kingdom and Sweden yet in and the remaining parts of the collide with
addition as yet expanding quickly. It is likewise investigating the situation of previously (pre-crash),
discovered that the conveyance of street coincidental amid (crash) and after the accident (post-crash). The
passings and wounds shifts as per age, sexual successive investigation of final products to the
orientation, month and time. Among individuals of underlying state of the events can build up "how" and
all age gatherings, individuals of monetarily dynamic "why" a specific sort of accident happens. Arithmetic
age gathering of 30-59 years is the most powerless. and Newtonian material science are connected in this
Nonetheless, on the off chance that we analyze sexual investigation. It tends to be expressed that crash
orientation insightful fatalities and accidents, we recreation returns to explore the contributory
found that the guys represented 85.2% all things elements and additionally causes behind the accident
considered and 82.1% of all wounds in 2013. event dependent on major and minor physical pieces
of information abandoned at the accident scene.
Besides, street accidents are generally higher in
May-June and December-January, which The strategies of accident reproduction, direction,
demonstrates that extraordinary climate, impacts the and harm based investigation by utilizing material
event of street accidents. Accidents remain generally science streamline the assurance of numerous vital
steady and high amid 9 AM - 9 PM and variable yet parameters of accident events. In addition, to acquire
low amid mid-night and early hours of the day. In a dependable end, itemized data incorporating the
any case, this does not infer that daytime driving is framework segments should be completely explored.
more hazardous than evening time driving. The The data important for reproduction begins with the
investigation additionally attempts to discover the accident scene [12]. The responses to the inquiries of
reason shrewd conveyance of street accidents. 'why', 'what', 'when' and 'how' should lead the
recreation procedure to develop the genuine situation
There are a few variables in charge of accidents yet of the pre-crash, crash, and post-crash. Capturing of
the drivers' blame is observed to be the most essential imperative pieces of information and recording of the
one; drivers' blame represented 78% of all-out accident scene assumes an essential job in the
accidents in 2013. The recognizable proof of elements reproduction. Damage data from tenant restorative
influencing street crashes got from the accident reports can be checked with the direction of the
examination and remaking has not been directed by inhabitants found inside the included vehicles at the
and by in the Asian nations. The objective of this scene. In this way, a "receptive outlook" insightful
examination was to start this street wellbeing practice frame of mind is extremely urgent to scan for all the
in Thailand by tending to the auspicious requirement point-by-point data from the scene.
for a top to bottom investigation of street accidents.
this manner gadgets wound up intended for both the were included to ensure airbags deployed when they
cars.This is a stage for crisis salvage which will work were supposed to.
ideally so as to lessen the brilliant time of entry of
rescuers if there should arise an occurrence of street Over the years, as electronics got cheaper, smaller
accidents, when each microsecond checks. Our paper and smarter, event data recorders became capable of
plans to introduce an innovation consequently doing more than simply monitoring airbags.
identifying the mishap and an equipment GPS beacon Automakers realized the devices could be used to
dependent on GSM/GPS innovation illuminating at provide information about the seriousness of an
the event of mishap with adequate subtleties like accident, and if a car was being operated properly
accurate area and time at which mishap occurred and when a crash occurred. Based on a separate NHTSA
alongside that the voice was recorded for two or regulation passed in 2012, if a vehicle today does
three minutes when the mishap occurs.This paper have an event data recorder, it must track 15 specific
build up a correspondence between the control data points, including speed, steering, braking,
station and the unit introduced in vehicles. Vehicles acceleration, seatbelt use, and, in the event of a crash,
will have GPS/GSM empowered following modules force of impact and whether airbags deployed.
and will be followed progressively utilizing cell
systems. The product installed in the microcontroller Depending on the automaker and car model, an event
will control the different activities of the gadget by data recorder may capture many more functions,
observing waveform from the vibration sensor. In the though car companies are not required to disclose
event of mishap the gadget will send an alarm exactly what those are. The language many use to
message alongside area data from GPS module to explain black boxes in owner's manuals also is
control station utilizing GSM arrange. It is a purposely general to cover technology updates and to
thorough and viable answer for the poor salvage save space.
reaction in the event of mishap. The mishap detailing
can naturally discover an auto collision; scan for the Put everything the devices do in an owner's guide
spot and after that send the fundamental data to the and "instead of one paragraph, you'd have potentially
salvage office covering topographical directions and another 20 or 30 pages. That really wouldn't be
the time and conditions in which a car crash realistic," says Richard Ruth, a black box equipment
occurred. At the server end, a control capacity will trainer, expert witness and consultant who worked at
remove important data and store it in a database, to Ford Motor Co. for 33 years, including a stint
which mishap data from models will be surveyed evaluating event data recorders and other safety
progressively. Our framework joins propelled equipment. "It's not going to change whether or not
equipment plan and refined control innovation into a you're going to buy the car."
conservative, dependable bundle.
Most event data recorders are programmed to record
III. DECODING CAR'S BLACK BOX data in a continuous loop, writing over information
again and again until a vehicle is in a front-end
A. How Black Boxes Work collision or other crash. When an accident occurs,
Event data recorders are not actually black boxes but the device automatically saves up to 5 seconds of data
tiny microcomputer chip sets. In most vehicles, they from immediately before, during and after an
are part of the airbag control module, and originally incident.
Today, practically every major automaker selling cars police and other law enforcement agencies that are
in the United States builds event data recorders into investigating an accident, insurance companies
new vehicles. The exceptions are Volkswagen (which looking into a claim, lawyers representing parties in
auto industry watchers say is preparing for the car-crash lawsuits and accident reconstruction
NHTSA regulation to kick in), Ferrari and Maserati. consultants working for any of the above.
Traffic accident analysis consultant Harris Technical
Services maintains a list of car makes and models In states with no black box laws on the books, "state
from 1994-2014 with event data recorders. troopers could get the data without a subpoena if
there was a fatality," says Tom Kowalick, a self-taught
The NHTSA rule, which the agency has been black box expert who chairs an event data recorder
working on for years, was supposed to take effect standards working group that's part of the Institute of
September 1, 2014. However, auto industry insiders Electrical and Electronics Engineers. Kowalick also
say the agency is still reviewing more than 1,000 wrote some of the black box information on the
comments it received about the proposed regulation, NHTSA Web site. "If they want to grab it, there's
making that implementation date unrealistic. A nobody saying they can't."
NHTSA representative declined to comment on the
delay. To rectify that situation, 15 states have passed EDR
B. Getting Black Box Data regulation over the past decade. Under the theory
Black box data is difficult and expensive to get to, and that car owners have privacy rights, many of the state
interpreting it takes special training. Extracting the laws require automakers to notify new-car buyers
data after an accident involves using a data-retrieval that vehicles contain black boxes, such as in the
tool kit that consists of hardware, software and a owner's manual. State laws also spell out the
cable that plugs into a car's on board diagnostics port. conditions under which police or other parties can
That is the same port mechanics use to identify obtain EDR information without an owner's consent,
engine problems and insurance companies tap as the such as with a court order; for dispatching emergency
basis for use-based insurance policies. Crash data personnel; diagnosing, servicing or repairing the
retrieval tool kits are not cheap, running $2,000- vehicle; or probable cause in an accident. The
$10,000 and up, not including training costs. National Council of State Legislatures maintains an
updated list of state EDR laws.
It follows that since drivers own their cars or trucks,
they own data the vehicles generate, including black Black boxes have become a battleground in states
box data. But because it's so difficult and costly to such as California, where earlier this year, insurance
extract, it's virtually impossible for average car companies and automakers lined up on opposite sides
owners to do it on their own — assuming that they of a black box data protection bill that would have
even want to. required automakers to let car owners block or opt
out of recording vehicle information. The bill didn't
Who else can access the information is a point of make it out of the state Senate Transportation
contention. Automakers would like the right to Committee after heavyweights including the Alliance
access the information for numerous reasons of Automobile Manufacturers opposed it.
including safety, to make sure systems work the way
they should and to check for defects. Other parties Earlier in 2014, two U.S. senators introduced a
that want a black box's car crash data can include bipartisan bill that would provide some of the same
protections on a national level. The Driver Privacy turned off. No one can hack into something without
Act explicitly states that a black box's data can't be Internet access." Even if someone could break in,
retrieved by anyone other than vehicle owners specifically in an effort to get data from an event data
without their consent and protects any personally recorder, the devices have access codes that need
identifiable information. By April 2014, the bill had authorized commands to work, he says.
collected 23 co-sponsors and been approved by the
Senate Commerce Committee. As of July 2014, In addition, car companies use threat modeling and
however, no further action had been taken. simulated attacks to test security and to help design
controls that protect data, says Wade Newton,
C. Black Boxes, Privacy and Security communications director for the Alliance of
Meanwhile, electronic privacy advocates worry about Automobile Manufacturers, an auto industry trade
a related car-data security issue: that a car's diagnostic group that represents 12 large car companies. "From
port, through which black box data streams, isn't bumper to bumper, automakers use proven security
secure enough to withstand hacking, and therefore techniques to help prevent unauthorized access to
poses a danger. Security experts and "white-hat" software," he says.
hackers already are testing how to break into the
ports to show how vulnerable they are. They are IV. CONCLUSION
publicly sharing the results, as in a video called "How
to Hack a Car." The analysis shows that the distribution of road
accidental deaths and injuries in India varies
Kowalick, a longtime black box data privacy advocate, according to age, gender, month and time. It is found
started a company to sell a diagnostic port lock that that the economically active age group is the most
he invented. The $30 AutoCyb lock, which he vulnerable population group. In general, males face
markets on his company Web site, is inserted into the higher fatality and accident risk than their female
diagnostics port to turn off access and prevent counterparts. Moreover, road accidents are relatively
unwelcome parties from getting to the data or higher in May-June and December-January which
interfering with car systems. "Every car in America shows that extreme weather influences the
can be hacked," he says. "The diagnostic link occurrence of road accidents. Accidents are relatively
connector is unsecure. All you have to do is set up constant and high during 9 AM to 9 PM and variable
access to the vehicle and have the right tool." but low during mid-night and early hours of the day.
There are several factors responsible for accidents but
However, Ruth, the EDR consultant and former Ford drivers’ fault is the most important factor; drivers’
executive, maintains a physical lock couldn't stop a fault accounted for 78% of total accidents, 76.5% of
black box expert or mechanic from bypassing the total injuries and 73.7% of total fatalities in 2013.
diagnostics port and obtaining the data another way. Automatic vehicle accident detection and reporting
He also dismisses the notion that hackers would be System using black box is is the need of the hour. The
interested in information. framework should be placed in moving vehicle to
detect accident and report to In Case of Emergency
"What would the incentive be?" he asks. "I think it's (ICE). The black box will records the voice of victim
an over-reaction. For all practical purposes, the after the accident occurs which will be used for
owner controls physical access. There's no Internet further investigation.
port on the car that's live, especially when the car's
[5] Yong-Kul Ki ,Jin-Woo Kim and Doo-Kwon Baik," Ranjan, Manish Kumar, "A Review on Car Collision
Avoidance System based on Interpretation of Vehicle
A Traffic Accident Detection Model using
Event Data Recorder ", International Journal of Scientific
Metadata Registry ",Conference on Software
Research in Computer Science, Engineering and
Engineering Research, Management and
Information Technology (IJSRCSEIT), ISSN : 2456-3307,
Applications, 2006 ppno: 0-7695-2656-X. Volume 5 Issue 1, pp. 422-428, January-February 2019.
[6] “Providing Accident Detection in Vehicular Journal URL : http://ijsrcseit.com/CSEIT1951107
Networks Through OBD-II Devices and Android-
based Smartphones”Juan Carlos Cano,Jorge
Zaldivar, Carlos T. Calafate, Pietro Manzoni in
5th IEEE Workshop On User Mobility and
Vehicular Networks 2011 pp no : 978-1-61284-
928-7.
[7] "Method of Freeway Incident Detection Using
wireless Positioning,"H. Ru-fu,L. Chuan-zhi, Y.E.
Hong-wu, in Proceedings of the IEEE
International Conference on Automation and
Logistics, 2008, pp. 2801 -2804.
[8] "GPS-free terrain-based vehicle tracking on road
networks," Jerath, K.; Brennan, S.N., American
Control Conference (ACC), 2012, pp.307, 311,
27-29 June 2012
[9] "An accident detection system on highway
through CCTV with calogero-mosersystem,Jung
ABSTRACT
Recently, there is an enormous increment in online looking for changed wares like fabric, adornments and the
closeout of medicines have been expanded by means of the online/web. The online following of medicine is one
of the innovation headways that is going to make a colossal interest in the up and coming days. Despite the fact
that it is helpful to get them, there is a high danger of self-medicine and abuse of drugs, particularly that go
under calendar H and X. In this article, we have examined in insight concerning online pharmacy, its focal
points, and drawbacks contrast among online and neighborhood pharmacy, and certain measures to keep away
from the abuse of e-pharmacy.
Keywords : Drug Tracking, Online Pharmacies, Laws of Pharmacy, Prescription
CSEIT1951108 | Received : 10 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 429-432 ]
429
Swati Hedau et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 429-432
There are numerous obvious dangers of purchasing (1) Legitimate Internet pharmacy sites giving
medicine over the Internet. These incorporate simple fantastic pharmacy administrations as indicated by
access to unlawful or unapproved drugs, medicine confirmation principles, and
offered without a solution, and drugs promoted with
phony wellbeing claims [5]. Additionally, it reroutes (2) Illegitimate online drug stores that are not
the conventional protections i.e., noteworthy confirmed and may not consent to national or global
cooperation with medicinal services experts (doctor expert benchmarks and directions.
as well as drug specialist) and subsequently putting
shoppers in danger [6]. Additionally, the greatest II. LITERATURE REVIEW
hazard that online drug stores present is to the
patient's wellbeing through fake and unacceptable A. Laws of Pharmacy
prescriptions [7]. According to Supreme Court statement, except in
emergency cases, doctor cannot consult through
Despite various potential dangers of buying meds phone. As far as India is concerned, there are no
online, there are a few evident advantages. Getting dedicated e-health and telemedicine laws in India.
medicines through the Internet is basic and There are no well-defined dedicated laws for online
advantageous as going forward and backward from a pharmacies. The laws applicable are:
traditional pharmacy had turned out to be extremely • Drug and Cosmetics Act 1940,
troublesome. Drugs can be requested whenever of • Drugs and Cosmetic Rules 1945,
day or on the other hand night and medicine could • Pharmacy Act 1948,
be dispatched by an online pharmacy medium-term • Indian Medical Act 1956 and
to his front entryway, thus sparing time and stress. • Laws related to e-commerce are defined under
What's more, utilizing online drug stores manages the Information Technology Act, 2000.
customers with more protection than the customary
specialist or pharmacy visit. Online drug stores are
especially engaging for those with ailments they wish B. Role Of Prescription
to keep private, as they don't require any immediate Online pharmacies will promote drug abuse, drug
human cooperation. misuse, self-medication, etc. Self-medication is a
rampant practice in India, and online sale of drugs
In past, the best-specialized technique for doctors would only encourage it.
in choices identifying with the drug for drug • Any medication taken without the supervision
specialists to disseminate medicines was written by of doctors may be dangerous and even
hand remedy. Presently it is being supplanted by potentially life-threatening.
electronic solution organize usually known as e- • A prescription issued by a doctor cannot be re-
pharmacy/online pharmacy. Online drug stores are used randomly. There is a danger that
organizations that move pharmaceutical scheduled drugs can be re-ordered and misused
arrangements that incorporate solution just drugs, on by the consumer.
the Internet by means of online requesting and mail • The D&C Act 1940, and the D&C Rules 1945
conveyance. Online drug stores can be arranged has guidelines on the sale of Schedule H and
fundamentally as: Schedule X drugs. These can be sold only on
prescription, and there are specific rules,
including for labeling and bar coding.
Schedule X drugs include narcotics and pain relievers. Patients can take steps to ensure that
psychotropic substances. Chances of drug abuse and they use prescription medications appropriately by:
addiction are higher with the Schedule X category. • Never change a dosing regimen without first
Schedule X drugs require meticulous storage and discussing it with the doctor
dispensing records. The prescription has to be in • Never using another person’s prescription,
duplicate and one copy of which is to be retained by and never giving his or her prescription
the licensed pharmacist for 2 years. medications to others.
• Storing prescription stimulants, sedatives, and
C. Comparison Of Local Pharmacy And Online opioids safely patients should properly
Pharmacy discard unused or expired medications
Price: The prices for medications from an online Schedule H and schedule X drugs cannot be sold
pharmacy are less because there is no particular without prescription because it is easy for local
production unit, there is no physical store for the pharmacy stores to verify the authencity of a
medications storage and dispensing, and the company prescription, as it contains details like registration
has a large network of retailers to draw from, or a number of medical practitioner and name of the
combination of factors. hospital and there is no such checking by online
Convenience: Prescription can be submitted at any stores.
time, there is no need to rush to the pharmacy during • According to the report of high-level
business hours and do not have to wait in any long government the physicians should digitally
lines. However, there are also disadvantages. If it is sign committee since doctor’s prescription is
not the same website every time, one may not be mandatory for purchasing drugs, online
aware of any potential drug interactions, it can be pharmacies will need to mandatorily display
difficult to find someone to answer any specific the portal link on their homepage for
questions about medications. authencity verification by patients or
Local pharmacies are small independently owned customers and the prescriptions.
business rather than a pharmacy within one of the • In certain countries like United States,
large chains and they have staff during regular England, Sweden, Denmark and Finland have
business hours, and many also have an online accurate, regular, and systematic plans to use
counterpart as well. The large chains do use locals for electronic prescription system, and health
a large portion of their workforce. ministry of these countries was responsible
Pharmacist is responsible for dispensing the right for coordinating and leading the electronic
medicines and even counseling a patient about side- health.
effects and dosage. In the online space, where the • It is suggested to use experiences and
medicines are delivered at the patient’s home, there is programs of the leading countries to design
no possibility of an interaction between a patient and and develop the electronic prescription
a pharmacist. systems.
D. Measures To Be Taken To Avoid The Misuse Of
Online Pharmacy III. CONCLUSION
Before preventing the misuse of online pharmacy,
patients should stop the nonmedical use of Despite the fact that online pharmacy is more
prescription drugs like stimulants, sedatives or opiod subject than nearby pharmacy particularly in remote
regions, it ought to be planned to build up standards
ABSTRACT
Cloud computing is an innovation which utilizes the Internet to store, oversee, and register the information, as
opposed to a nearby server or a PC. Clients can access the cloud condition wherever they need on
compensation for each utilization way. Transferring of delicate information on un-believed servers in the cloud
is a testing assignment. Established encryption procedures are utilized when the re-appropriating of
information in the cloud to give access control and secrecy. Access control instruments are not doable in the
cloud as a result of the absence of adaptability, versatility, and fine-grained access control. As an option, So,
Attribute-Based Encryption (ABE) procedures are acquainted in the cloud with increment the security and
adaptability. Attribute-based encryption is an open key cryptographic strategy in which the private key and
figure content are based on the attributes. ABE involves IBE, KP-ABE, and CP-ABE. In Identity-Based
Encryption (IBE) the mystery key and the attributes are based on the character of the client. In Ciphertext-
Policy Attribute-Based Encryption (CP-ABE) a mystery key is gotten from the arrangement of attributes and
the access strategy is defined over the universe of attributes inside the framework. In Key Policy – Attribute-
Based Encryption (KP – ABE) the figure content is related to the arrangement of attributes and the mystery key
is based on the access structure. This paper is a study of all ABE strategies and specialty an evaluation table
about ABE keys job in cloud condition.
Keywords : Attribute-Based Encryption, Attributes Revocation, Fine-Grained Access Control, Keywords Search,
Mobile Cloud Storage.
CSEIT1951110 | Received : 10 Feb 2019 | Accepted : 21 Feb 2019 | January-February -2019 [ 5 (1) : 433-437 ]
433
Navin Sethiya et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 433-437
Versatility is the capacity of a cloud to direct scale IT 2. Integrity: It will keep unapproved clients from
assets as required by the cloud purchaser or cloud changing the information which is put away or
supplier. Estimated usage addresses the limitations of transmitted in the cloud.
a cloud stage to screen the utilization of its IT assets,
in a general sense by cloud buyers. Flexibility alludes 3. Availability: It enables the information to be
to excess IT assets inside a similar cloud or over accessible and usable amid an explicit timeframe.
various clouds. Three regular cloud conveyance
models are generally utilized and set up: 4. Scalability: Capability to deal with the clients
Infrastructure-as-a-Service (IaaS), Platform-as-a- included the system powerfully with no disturbance
Service (PaaS), Software-as-a-Service (SaaS). IaaS of administration.
conveyance demonstrates involved framework driven
IT assets that can be accessed and oversaw through 5. Client revocation: If the client leaves the system
cloud benefit based interfaces and instruments. PaaS the plan should disavow his access rights from the
relies upon the current condition that makes a lot of system straightforwardly. Something else, the client
apparatuses used to help the whole applications. SaaS can't utilize the information put away and the access
gives reusable cloud benefit generally accessible to is repudiated.
the scope of cloud buyers. Essentially, three sorts of
cloud arrangement models are the open cloud, 6. User revocation: Users can decode the encoded
private cloud, and third-party cloud. The open cloud information with their very own attributes since the
is claimed by an outsider cloud which is accessible by attributes are identified with polynomial arbitrary
everybody in the cloud condition. Private cloud is encryption work.
possessed by a solitary association where limits are
defined. The third party cloud is a mix of open and 7. Access Tree: Based on the attributes, the access tree
private cloud models. is produced. The access tree is included hubs. The leaf
hubs are spoken to as attributes and the middle of the
Cloud computing is a sort of distributive computing road hubs are spoken to utilizing doors likes AND,
that speaks to the usage models for remotely OR, and so on.
provisioning versatile and estimated assets [12]. At II. LITERATURE REVIEW
the point when the business information is moved to
the cloud, at that point the security issue will ascend, By expecting the believed cloud service provider
as information security ends up imparted to the cloud gives security additionally to the expansive measure
specialist organization. Fundamental wordings of delicate and significant information put away. ABE
utilized in the cloud will be: cloud supplier gives the calculations can be utilized for securing the
cloud-based IT assets. Cloud buyer utilizes the cloud- confidentiality of the put away information and
based IT assets. Cloud examiner assesses the security furthermore ABE gives the access control instrument
controls, protection effects, and execution. Central to information on the cloud. In cloud condition,
security terms important to cloud computing are: information confidentiality is imperative to shield
against insider assault, crash assault and refusal of
1. Confidentiality: It enables approved gatherings to administration assault. This area gives the current
access the information or assets that is it confines the attribute based encryption components in cloud
unapproved access to information in travel and condition.
storage.
ABE was presented by Sahai and Waters [2] in 2005. intended for one to numerous correspondences.
It is an open key based one to numerous encryption Decoding should be possible just when the attribute
that enables client to scramble and decode the set fulfills the client's access structure. It bolsters
information based on client attributes. The mystery access control conspire.
key and figure content are subject to the client
attributes. The decoding of ciphertext is conceivable Disadvantages:
just if the arrangement of attributes of client key Information proprietor can't choose who can decode
matches with the attributes of ciphertext. Decoding the encoded information. It can just pick graphic
should be possible just when the quantity of attributes for the information. It isn't appropriate for
coordinating keys is equivalent to the referenced broadcasting applications in light of the fact that the
limit level. ABE calculation comprise of four stages: information proprietor needs to confide in the key
Setup, key age, encryption and unscrambling. Crash backer.
obstruction is a pivotal highlights of ABE. A rival that
holds numerous keys can access the information if 3. Expressive Key Policy ABE (EKP-ABE)
the individual key matches. It is the all-inclusive variant of KP-ABE, the non-
monotonic access structures [5] are utilized. Non-
Drawbacks: monotonic access structure utilizes repudiated doors,
For encryption, the Data proprietor needs to utilize for example, NOT in the access structure. It is
each approved client's open key so it expands the increasingly adaptable to limit the unapproved use of
calculation overhead. This strategy is confined in information.
light of the fact that it utilizes access of monotonic
attributes to control client's access to the framework. Disadvantage:
The overhead is expanded on account of negative
1. Identity Based Encryption (IBE) attributes which isn't pertinent to the encoded
It was proposed by Shamir in 1984[3].In Identity information.
Based Encryption (IBE) the mystery key and the
attributes are based on the identity of the client. For 4. Ciphertext Policy ABE (CP-ABE)
instance, email id be the identity of the client. It is a turn around the form of KP-ABE [6]. In CP-
Believed third party will create the private key. ABE, the ciphertext is related with an access
structure and client's private key is based on set of
Drawback: attributes. A client can unscramble the ciphertext just
In the event that the believed third party gets traded whenever set of attributes related with clients private
off, there is no security for the framework. The client key fulfills the access policy related with the
protection can't be saved utilizing IBE. ciphertext. CP-ABE is more anchored even the
believed the third party is imperiled.
2. Key Policy Attribute Based Encryption (KP-ABE)
It was proposed by Goyal et al. [4]. Each client is Disadvantage:
assigned with some access tree over the arrangement
of attributes. Ciphertexts are based on the CP-ABE doesn't fulfilled undertaking needs of the
arrangement of attributes and the private key is based access control component. Decoding keys underpin
on the monotonic access structure that controls client attributes that are sorted out intelligently as a
which ciphertexts a client can decode. This is solitary set.
5. Hierarchical Attribute Based Encryption (HABE) The FHABE conspire is turned out to be secure under
The HABE was proposed by Wang et al. [7]. This the standard suspicion.
model comprises of a root ace that relates to the
confided in third party, different space ace in which 8. Ciphertext policy Weighted ABE (CPWABE)
top dimension area aces compares to various venture This plan assigns [10] load to the attributes based on
clients and various clients that relates to all work the inclination defined in the access control structure.
force in an undertaking. This plan client's Clients will have appointed the load to their
hierarchical age of keys. It utilizes randomized attributes. The information proprietor will encode
polynomial time calculation. It underpins anchored the information based on the attributes. The private
access control, adaptability and completely key is based on the weighted access structure and the
designation. It can share the ensured information for decryption [11] is conceivable just when the
clients in a cloud in an endeavor situation. It bolsters ciphertext and the weighted attribute matches with
intermediary reencryption conspire. the weighted access structure. It takes care of the key
Disadvantages: escrow issue by utilizing weighted attributes.
It is extremely hard to actualize continuously Drawback:
condition. A similar attribute will be utilized by Cost of computation is increased.
numerous area aces.
III. CONCLUSIONS
6. Multiple Authority ABE (MAABE)
This strategy utilizes numerous experts and the client This paper abridges different attribute-based
attributes are dispersed to different specialists. encryption systems for information security in cloud
Suppose [8] it comprises of N multiple attribute condition. Security will be the essential factor to be
experts and one focal specialist. The information can tended to. The storage cost of the figure writings,
be decoded by the client under attribute set an and time of encryption and unscrambling to be
unscrambling keys for an attribute set Au. It enables diminished. Based on the qualities like fine-grained
any free experts to disseminate private keys and to access control, adaptability and adaptability in cloud
deal with flawed or lost specialists. computing we can infer that FH-WABE performs
well superior to the next attribute encryption
Disadvantages: strategies.
Trouble in muti-expert plan is it expects specialist's to
keep up disjoint arrangements of attributes. IV. REFERENCES
7. File Hierarchy Attribute Based Encryption (FH- [1]. Muhammad Yasir Shabir, Asif Iqbal, Zahid
ABE) Mahmood and Ataullah Ghafoor, Analysis of
This strategy utilizes record progressive system based Classical Encryption Techniques in Cloud
encryption strategies. The documents are scrambled Computing, IEEE Tsinghua Science &
based on the layered access structure. Both figure Technology, Vol.21, February 2016.
content storage and time expenses of encryption are [2]. A.Sahai and B.Waters, Fuzzy identity based
saved [9]. encryption, in Proc. Advances in Cryptology –
Eurocrypt, 2005, pp.457-473.
Disadvantage: [3]. Adi Shamir. Identity-based cryptosystems and
signature schemes, in Proc. of CRYPTO 84 on
Advances in cryptology, pages 47–53. Attribute based data sharing scheme revisited
SpringerVerlag New York, Inc., 1985. in cloud computing, IEEE Transactions on
[4]. V.Goyal, O.Pandey, A.Sahai and B.Waters, information forensics and security, Vol.11, No.8,
Attribute based encryption for fine grained August 2016.
access control of encrypted data, in proc. ACM [13]. G.K.Sandhia, G.K.Bhaskar, secure data sharing
conf. computer and communications, 2006. using attribute based encryption in cloud
[5]. J.Bethencourt, A.Sahai, and B.Waters, computing, Journal of Chemical &
Ciphertext policy attribute based encryption, in Pharmaceutical Sciences, Vol.9, December 2016.
proc. IEEE symposium security and privacy,
2007. Cite this article as :
[6]. K.Meena,S.Vinodhini, T.Pallavi & R.Vasugi,”
Surveillance Based Gcm Home Security System Navin Sethiya, Hrishikesh Patel, Akshay Harshe, Alekh
Gaigole, Harshvardhan Donadkar, Prof. Priya Karemore, "A
Using Object Motion Detection”,International
Survey on Secure User Data Transaction using Attribute -
Innovative Research Journal of Engineering Based Encryption Scheme over Cloud Data", International
and Technology,pp.44-47,2016. Journal of Scientific Research in Computer Science,
[7]. S.Rifki, Y.Park, and S.Moon, A fully secure Engineering and Information Technology (IJSRCSEIT),
ISSN : 2456-3307, Volume 5 Issue 1, pp. 433-437, January-
ciphertext policy attribute based encryption
February 2019.
with a tree-based access structure, Journal of Journal URL : http://ijsrcseit.com/CSEIT1951110
Information Science and Engineering, Vo.31,
pp.247-265,2015.
[8]. G.Wang, Q.Liu and J.Wu, Hierarchical
attribute based encryption for fine grained
access control in cloud storage services, in Proc.
ACM conf. computer and communication
security, 2010.
[9]. K.Yang, X.Jia, K.Ren and B.Zhang, Dac-Macs:
Effective data access control for multiauthority
cloud storage systems, in Proc. Of IEEE
Infocom, 2013.
[10]. Shulan Wang, Junwei Zhou, Joseph K.Liu,
Jianping Yu, Jianyong Chen and Weixin Xie,
An efficient file hierarchy attribute based
encryption scheme in cloud computing, IEEE
Transactions on information forensics and
security, Vol. 11, No.6, June 2016.
[11]. Ximeng Liu, Jiafeng Ma, Jinbo Xiong, Qi Li, Jun
Ma, Ciphertext – policy weighted attribute
based encryption for fine grained access control,
International conference on Intelligent
networkings and collaborative systems, 2013.
[12]. Shulan Wang, Kaitai Liang, Joseph K.Liu,
Jianyong Chen, Jianping Yu, Weixin Xie,
ABSTRACT
Security plays a vital role in today’s mobile world. There are security issues like sniffing of data while accessing
information through open channel. Proper security measures can help to deal with the common security
threats faced by mobile phone users such as data protection, privacy, application and personal information
security. Cryptographic techniques play an important role in protecting communication links and data, since
access to data can be limited to those who hold the proper key. This paper discusses a method to securely access
information in a network by an android mobile application using AES cryptographic technique. The paper
describes a new key sharing algorithm, based on the symmetric key management, for faster and efficient
encryption of data that is suitable for use in a mobile device.
Keywords : Cognitive Radio Networks, Primary User, Secondary Users.
CSEIT195164 | Received : 08 Feb 2019 | Accepted : 21 Feb 2019 | January-February -2019 [ 5 (1) : 438-442 ]
438
R. Gomathyjayam, R. Thilakavathi Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 438-442
the trustworthiness of an entity. Trust is the detection and energy based detection algorithms.
expectation of one entity about the action of another. Coherent sensor is an optimal linear detector for
Reputation and trust have been adapted to wireless known primary signals in presence of white Gaussian
communication Network it can solve many problems noise. However, detector implementation requires.
in the Networks. Demodulation of received signals for achieving the
optimal gains.
Combinationarial Optimization dentification
Algorithm (Coi) Agent-Based Trust Calculation
The COI (Combinationarial Optimization The author (yenumula B.Reddy et al., 2011) is
Identification Algorithm) to defend against such proposed agent based approach algorithm. The
attacks .Cooperative Spectrum sensing has been Cooperation in wireless sensor networks to detect the
shown good performance in improving the accuracy malicious node without any Infrastructure is a recent
of primary user detection .zhenquiri et al., 2013 trend in research. The current models need more
proposed a modified Design an attack model,called storage, Computation, security tools and
cooperative attack in which an attacker injects self- communication requirements. The fail wireless
consistent false data to multiple sensors sensor Network due to limitation of resources. The
simultaneously. A theorem that the center node of a proposed agent based approach eliminates the
cognitive radio network may face uncertainties under computations in the sensor nodes with appropriate
a cooperative attack, especially in the case when a trust factor. The proposed approach uses an agent
large portion of sensors are compromised. A modified based collaborative concept ensure the trust in the
COI algorithm to deal with cooperative attacks. Our successive node in the Path. The proposed agent
algorithm is a good scheme to complement IRIS for based framework uses reputation of neighboring node
cooperative attacks, and can be flexibly adjusted to as part of trust calculation in its successive node.
fulfill the detection delay requirement. Intensively
evaluate our algorithm through simulation, with the Sophisticated Detection Methods
results validating its performance. The original COI is The Spectrum scarcity is becoming a major issue for
an approach for identifying multiple instances of bad service providers interested in either deploying new
data in power system state estimation. The essential services or enhancing the capacity for existing
idea is to construct a partial decision tree using the applications. The author (Amir Ghasemi et al.,2007)is
branch-and-bound method to obtain a feasible proposed that Recent Measurements suggest that
solution with the minimum number of bad data. many portions of the licensed (primary) spectrum
remain unused for significant periods of time.
Clustered Based Algorithms Sensing-based access incurs a very low infrastructure
The spectrum sensing methods can be distributed in cost and is backward compatible with the legacy
three categories i.e. transmitter, receiver. (Dr. Talat primary systems.
Altaf et al.,2013) is propose cluster based algorithms
is based spectrum sensing and interference- III. EXISTING PROCESS
temperature based detection algorithms. From these,
transmitter detection based methods are a preferred The T-CSS (Traditional collaborative spectrum
way of sensing for presence/absence of spectral holes. sensing) protocol delays in data transmission and
These methods can be implemented through various unaware of secondary user selection for licensed
techniques including coherent detection, feature bandwidth and interference occur in unlicensed
ABSTRACT
We all search on google for something and get the results in the form of different websites with some
description. We generally click on first or second website links if results are not found we go down on google
page. The website ranking is given by search engines by different criteria. Last website won’t be seen by none
of the people in most cases and first website will be having a great market compared to last website. So we need
to help the last website to be moved up in results and help in generating revenue and have good rank on
searching by giving feedback. This system will provide the difference between the first website and last website
on the google results and will provide the feedback to the last website like content, links, images used by first
website which helps the last website to be used in his webpage. This system is user friendly which is built on
HTML as front end and Python flask as back end and used python package beautiful soup to parse HTML data
and to automate browser behaviour with python. This system is done on web mining which has three
categories firstly web content mining in which we scan the web pages and get to know the links, text, images
used. Secondly web usage mining in which reports are generated after analysis which contain the details of text,
images, links. Finally the web structure mining states that structural summary of website.
Keywords : Beautiful Soup Package, Web Crawling, Feedback, Python- Flask, Searching Results, Web Mining,
Website
CSEIT195135 | Received : 01 Feb 2019 | Accepted : 20 Feb 2019 | January-February -2019 [ 5 (1) : 443-447 ]
443
Shaik Muzammil, Sai Kiran Yerramaneni Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 443-447
by the proposed method. Relevant Web pages are provided to webpage to increase its rank with respect
fetched and displayed irrespective of keyword to first page.
matching.
A. Implementation
Web Content Mining (WCM) concerns with retrieval
of information from WWW in a structured form and
thereby indexes the information for quick retrieval.
It is the process to extract useful information from
web documents contents. The documents consist of
images, audio, video, text files, structured records etc.
Figure 2 : Search bar to search queries
WCM technique is used on web documents and the
results page obtained from a search engine.
Here we can search for anything we get the weblinks
what the google has described in the google search.
II. METHODS AND MATERIAL
Algorithm
checked query. Which helps the others who are International Conference on Advances in
designing the web page what to put in the webpage Computer Engineering, IEEE, 2010
and how the content resides on webpage. For the [8]. Frank McSherry "A Uniform Approach to
future work, consider the SEO tools and machine Accelerated PageRank Computation", ACM,
learning techniques for ranking the web page ranking 2005
not by factors.
ABSTRACT
Heart attack is most common disease that engulfs the patient’s precious life. This disease attacks a man so in a
flash that it barely gets treated. Many systems that detect heart attack came into the picture but they do have
many flaws. Some system does not work properly in cold weather and other doesn’t give accuracy. To have a
solution for Heart attack utilization of IoT and sensor system could be beneficial. Heart Attack Early Prediction
System predicts the Heart rate and accordingly sends the notification to the patient’s doctor and acquaintances.
Keywords : Heart Attack, IoT (Internet Of Things), Health Parameters, Heart Disease Prediction, Oximeter,
Heart rate sensor, Android App.
CSEIT1951120 | Received : 12 Feb 2019 | Accepted : 24 Feb 2019 | January-February -2019 [ 5 (1) : 448-451 ]
448
Shweta Gajbhiye et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 448-451
IOT is the network of devices such as vehicles and et al. The models are trained and validated against a
home appliances that contain electronics, software, test dataset. Classification Matrix Methods are used
sensors, actuators, and connectivity that allows to evaluate the effectiveness of the models. Neural
these things to connect, interact and exchange data. Network is Difficult to understand. The system has
Embedded with the technology, these devices can 89.9 percent accuracy according to the Research[3].
communicate and interact through internet, and
they can be remotely monitored and controlled. Distributed computing has been incorporated in a
health care framework. The creators have
• Sensor Technology introduced a cloud-based keen healthcare
The capacity to recognize changes in the physical monitoring framework (CIHMS) for giving
status of things is additionally fundamental for restorative input to a patient through the cloud.
chronicle changes in the earth. In such manner, Albeit cell phones are constantly viewed as a
sensors assume an urgent job in overcoming any promising instrument to screen and deal with the
issues between the physical and virtual universes, patient's own health status, these gadgets have some
and empowering things to react to changes in their innate restrictions in calculation or information
physical condition. Sensors gather information concentrated undertakings. ECG monitoring system
from their condition, producing data and bringing contains WI-FI Bluetooth and Zigbee. ECG signs
issues to light about setting. For instance, sensors in were gathered and were transmitted to the IOT
an electronic coat can gather data about changes in cloud utilizing WI-FI. This information were send
outer temperature and the parameters of the coat to the family of the patient [4].
can be balanced in like manner.
Remote health care framework for monitoring
II. REVIEW OF LITERATURE electrocardiographic and temperature information
has been introduced in [5]. The framework
Milan Kumari et al. fathom cardiovascular disease comprises of three modules, in particular, an
dataset utilizing diverse information mining equipment module, Bluetooth module, and show
calculations, for example, Support Vector Machine, module. The equipment module is utilized for
Artificial neural systems (ANNs), Decision Tree, and information securing. The Bluetooth module is
RIPPER classifier. The creators break down the utilized for information transmission. At long last,
execution of these calculations through a few the information is shown by utilizing the
factual investigation factors, for example, presentation module. The obtained clinical
affectability, specificity, exactness, mistake rate. A information is sent to a database server by utilizing
choice emotionally supportive network for GPRS or Wi-Fi.
conclusion of Congenital Heart. Using data mining
and artificial neural networks ,the system predicts The exhibitions of the framework have been tried
Heart disease with nearly 100% accuracy. [1] on various patients and it typical arrhythmia
database.
Niti Guru et al. [2] connected a neural system for
forecast of heart disease, circulatory strain and has been discovered that the introduced framework
sugar. A model Intelligent Heart Disease Prediction is extremely useful for the doctors[5].
System (IHDPS) in view of information mining
procedures is introduced by Sellappan Palaniappan
A walking framework for monitoring the physical Heart Attack Early Prediction System could contain
restoration patients has been accounted for in [6]. Arduino board and a Wi-Fi module. The Heart Beat
The framework comprises of a multi-sensor-based sensor can begin detecting heart rate readings. If the
monitoring gadget, a cell phone with customer Heart beat will be above 120 bpm then the patient
application, an administration situated engineering will be in the danger situation. If the oxygen level
based server arrangement, and an application. The will be below 80 bpm then again, the patient will be
framework has been tried in a controlled condition considered in the dangerous situation. Likewise,
comprising of some healthy volunteers and some with the utilization of Wi-Fi module it will transmit
congestive heart disappointment patients. The test the information over web. The framework will
outcomes demonstrate that the introduced begin monitoring the heart rate of patient and
framework can identify and screen congestive heart instantly the heart rate goes above or beneath as far
disappointment and it can send criticism to the as possible the framework will send notification on
attendants for patient development [6]. the Android Application.
Ongoing universal health care framework for notification in the Android Application. An android
monitoring ECG motions by utilizing cell phone has application will track the heartbeat of specific
been exhibited in [7]. By utilizing this framework, patient and screen it effectively and give the crisis
the client can screen his ECG flag. The creators message on odds of Heart Attack.
have introduced a calculation for unusual heartbeat
detection and irregular heartbeat check delineate). III. CONCLUSION
The execution of the introduced framework has
been assessed against the MIT-BIH It has It has Heart disease is one of the major cause that leads to
been accounted for that the framework can death and early prediction of heart disease is very
distinguish at a top with a win rate of 97.8 percent important for every one. Garmin is a smart watch
and it is additionally ready to recognize strange and it predicts the heart attack but it does not work
heartbeat condition with a win rate of 78.9 percent. accurately in cold weather. Fit Bit is another
An unavoidable healthcare framework empowering alternative but even it has many flaws i.e. while the
self-administration for constant the introduced tracker is charging, patient cannot move and it is
framework in [8] comprises of patient health expensive too.Heart Attack Early Prediction System
monitoring framework, status logging, and social has many pros Over the existing solutions. It takes
sharing of the recorded data. The framework has two inputs i.e. Pulse rate and oxygen level of the
been executed by a cell phone, a wearable multi- patient to have the accuracy. It transmits the
detecting gadget contains pulse sensor and Notifications to the patients doctor and
temperature sensor, an administration situated acquaintances.
engineering for correspondence, and smaller scale
blogging administrations. The framework has been IV. REFERENCES
tried on 16 patients. The test outcomes demonstrate
that the introduced framework is anything but [1]. Milan Kumari, Sunila Godara, Comparative
difficult to learn and advantageous to use by endless Study of Data Mining Classification Methods
patients. in Cardiovascular Disease Prediction, IJCST
Vol. 2, Issue 2, June 2011.
[2]. Niti Guru, Anil Dahiya, Navin Rajpal, Cite this article as :
Decision Support System for Heart Disease
Diagnosis Using Neural Network, Delhi Shweta Gajbhiye, Bharati Vyas, Shrushti
Business Review, Vol. 8, No. 1, January-June Shrikhande, Anshika Janbandhu, Komal Nagpure,
2007. Mrunali Agashe, "IoT Based Heart Attack Early
[3]. Sellappan Palaniappan, Rafiah Awang, Prediction", International Journal of Scientific
Intelligent Heart Disease Prediction System Research in Computer Science, Engineering and
Using Data Mining Technique, 978-1-4244- Information Technology (IJSRCSEIT), ISSN : 2456-
1968-5/08/25.00 2008 IEEE. 3307, Volume 5 Issue 1, pp. 448-451, January-
[4]. http://www.nlm.nih.gov/medlineplus/magazi February 2019.
ne/issues/winter11 Journal URL : http://ijsrcseit.com/CSEIT1951120
[5]. Bourouis, A., Feham, M., and Bouchachia,
A.(2011), Ubiquitous Mobile Health
Monitoring System for Elderly (UMHMSE),
International Journal of Computer Science
and Information Technology, Vol.2, No. 3,
June, pp. 74-82
[6]. Yuce, M. R.(2010) Implementation of
wireless body area networks for healthcare
systems, Sensor and Actuators A:Physical,
Vol. 162, No. 1, July, pp. 116-129
[7]. Lei Clifton, David A. Clifton, Marco A. F.
Pimentel, Peter J. Watkinson, and Lionel
Tarassenko (2014), Predictive Monitoring of
Mobile Patients by Combining Clinical
Observations with Data From Wearable
Sensors, IEEE Journal of Biomedical and
Health Informatics, Vol. 18, No. 3, May , pp.
722-730
[8]. Parane, K.A., Patil, N.C. ; Poojara, S.R. ;
Kamble, T.S(2014) Cloud based Intelligent
Healthcare Monitoring System, In the
proceedings of International Conference on
Issues and Challenges in Intelligent
Computing Techniques (ICICT), February 7-
8, Ghaziabad, Indian, pp. 697-701
ABSTRACT
Women biggest issue we are facing today. Many apps have been developed to provide safety to women through
Android phones. Many of the times government conduct different awareness events for stopping crime against
women. But that's not enough; there are various kinds of crimes women are facing today. Now it's time to aid
the roots of these crimes. This paper presents Shakti, an Android Application for mapping of crime against
women. This will help the government to identify which crime has the highest frequency in a particular area
and can implement an appropriate campaign for aiding its root cause. In case of an emergency, the victim can
send its location along with a help message just by clicking the volume button 5 times. Also, the victim can
reach-out to NGO for help. Shakti will feel like having family power with you at any time.
Keywords : Android, Women, Crime, Mapping, Location, Help message, NGO.
I. INTRODUCTION that the government runs for helping the victims are
appreciable. How about not letting any women be a
From past years, it has been recorded that the graph victim? For this, a study is needed for every area and
of crime against women has risen. Though the list of the type of crime occurring most frequently.
NGO's, Women Empowerment campaigns, safety
applications, and more steps for the safety of women "Dowry" can be aided with a literate society.
has continuously risen with time, the crime graph is "Domestic Violence" needs a little work on the
still incrementing. There are various government mindset of the family; in-laws. "Rape" and "Sexual
bodies as well as private organizations working for Assault" can be stopped if the females are equipped
women empowerment and helping the victims. But with right safety tools, and self-defense training.
the call of today is to find the root cause of these
crimes and treat it accordingly. Rape, Sexual assault, A. Existing Systems:
Domestic violence, Dowry, these are major of the As a part of a literature survey, we investigated some
crime list. Everyone is talking about empowering applications that offer the same or similar services for
women, blaming society. What is making a society Android and other platforms. The aim is to see how
guilty? Is its people with narrow thinking and evil these applications work and to see how they can be
minds, and these are the causes of illiteracy, lack of improved.
life values, in short- the mindset of people.
The existing women safety apps:
In everyday Newspaper, some areas are in headlines Women Safety: This app is offered by Awesome Apps
for "Rape" and Sexual "Assault cases". Some areas are Inc. Released on 28th Aug 2015. With just a tap of a
in the headline for "Domestic Violence". The projects button, the app sends an e-mail to preconfigured
CSEIT1951119 | Received : 12 Feb 2019 | Accepted : 24 Feb 2019 | January-February -2019 [ 5 (1) : 452-455 ]
452
Diksha Ingle et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 452-455
email ID(s) along with your location and a link to Limitation : You to keep this women safety app
Google Map. The app also captures 2 pics, one with always running in the background which can drain
front camera and the other with the back camera, the battery of your phone. It does not show every
and a video or audio clip and uploads it to our server. area of information. It gets crashed in cases.
A link to the pic, audio or video is emailed to a
preconfigured email Id(s). redEye - Women Safety: This is a very useful app for
women safety. It does not need any additional action
Limitation: It is not useful in case of emergency. Also, by the user in any emergency situations. The app
there is an issue in managing phone numbers. Also, itself let your dear ones know that you are in danger
the panic message has no notification, so no use if the through an alert alarm. In this app, the user will
other sees it later. choose the source and the destination. The redEye
app then keeps tracking you. If the app finds that the
Raksha, A Women's Safety App: This app is offered user's path has deviated or the user is idle in the same
by Portal Perfect, released on 27th May 2018. This place for a configured duration, then the app will
app understands the worries and problems of dear trigger the alert. Once you reach your destination
ones, be it your child, mother, daughter, sister or safely you can manually disable the app.
wife. By using this application you can check their
current location. The special feature of this app is Limitation: This app only allows 2500 uses per day by
"Are you in trouble" button. all users. More than 5000 people have downloaded
the app, so only half or less than half users are able to
Limitation: The emergency messages are not able to use the app.
send. It also failed working many times.
Here, we introduce an android app that ensures the
My Safetipin: Personal Safety & Women Safety App. safety of women. It reduces the risk and helps us in
This app gives safety scores to an area and helps you need by identifying the location of a person who is in
to get alerts when you enter in an unsafe area. It danger.
helps in finding the safest route for you. You can also
choose the alternate safe location when you give II. PROPOSED SYSTEM
Google maps the access of this women safety app.
SafetiPin collects primary data on Women Safety in For the need of surveying various areas and
public spaces at night, on a number of parameters. implementing appropriate programs in that area to
• Lighting diminish the roots of crime against women, we have
• Visibility: Are there ‘eyes on the street'. Can developed an android application SHAKTI. In today's
others see you world android phone is a basic thing which everyone
• Diversity: Presence of women and children carries, with SHAKTI in your android phone women
around now will feel secure and protected all the time.
• Crowd: How densely crowded is the area Following are the features of our Android application:
• Public Transport: How close it is The user will rate a type of crime for their particular
• Walk Path: Is there a proper place to walk area. This data will be graphically represented on our
• Security: Are police or private security nearby. website.
• Openness: Can you see all around
• Feeling: How safe do you feel
In cases when the victim is unable to report against (2)Server Side: Data entered by the users (members
crime to the police, the victim can complain to the registered, crime reported, etc.) via the app is
social NGO through this application. uploaded to the web server, the crime details for
The user will save three contacts of three family various areas will be graphically represented on the
members. Whenever the user feels any danger like website and complaint is sent via text message to
crime coming its way, the user can press volume key registered NGO for further processing and
of its Android phone five times and an emergency authenticity. Also, admins get all the privileges
message for help will be delivered to their family through this server.
members along with the location URL through GPS.
Family members will also be notified if the victim's BLOCK DIAGRAM
phone battery is below 20%.
Shakti: An Android app for mapping of crime against
women is implemented into two modules: (1) Client-
side, (2) Server Side.
Next, the users need to enter three family members Shakti android application is being implemented
contact number with an emergency message. In the using the following technologies: (1) Android (2) Java
situation of any crime, the user will have to press the (3) SQL (4) Cloud (5) Web Technologies (6) Database
volume button five times. Saved emergency message (7) GPS
will be forwarded to the saved contact numbers along
with the victim's location through GPS. (1)Android: Android is the most widely used mobile
OS motorized by Linux kernel. This is the first
The user can also ask for help to the NGO directly complimentary platform which is robust and is
through our application. expected to gain much popularity. It was developed
by Google team and allows writing managed code in
In cases if the user’s mobile battery drains below 20%, the Java language. The current system is developed
the app will send an alert message to the dear ones. on the basis of android platform. Android utilizes a
Also user can set a secret code in the app. When the custom virtual machine that was designed to
dear ones want to reach the user, they will send this optimize memory and hardware resources in a smart
secret code as a text message and they will phone. Android does not differentiate between the
automatically get the users mobile location through phone’s core applications and third-party applications.
GPS . Any application that is built will definitely have
equal access to a phone’s capabilities providing users
with a broad spectrum of applications and services (2) different areas. Thus, the social bodies working for
Java: Java is an object-oriented, class-based, the security of women can implement an aid to those
concurrent, secured and general-purpose computer- areas to halt the crimes.
programming language.
V. ACKNOWLEDGEMENT
After front-end elements are finalized java classes
and packages are used to make them work. First, and foremost we would like to thank God for
the wonderful opportunities and challenges he has
(3) SQL: Structured Query Language or SQL is a given to us. We express our sincere gratitude to our
standard Database language which is used to create, guide Prof. Prasanna Lohe, Head, Department of
maintain and retrieve the relational database. It is Computer Science and Engineering for his valuable
particularly used to work with structured data where contribution in fulfilling the requirement related to
there is a relation associated within the data itself. the project and for providing his valuable guidance,
(4) Cloud: Cloud storage involves stashing data on patience and for encouraging us to do our best.
hardware in a remote physical location, which can be
accessed from any device via the internet. Clients Cite this article as :
send files to a data server maintained by
a cloud provider instead of (or as well as) storing it on Diksha Ingle, Pritee Dhale, Priyanka Palsapure, Sagar
their own hard drives. Pazare, Dhawal Chimurkar, Niket Farfad, Prof.
(5) Web Technologies: The data collected in this Prasanna Lohe, "Shakti : An Android App for
android women safety application we be displayed Mapping of Crime against Women", International
using website. Journal of Scientific Research in Computer Science,
(6) Database: A database is an organized collection of Engineering and Information Technology
data, generally stored and accessed electronically (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
from a computer system where databases are more 452-455, January-February 2019.
complex they are often develop using formal design Journal URL : http://ijsrcseit.com/CSEIT1951119
and modeling techniques.
Android comes with in-built SQLite database. SQLite
supports all the relational database features.
(7) GPS: GPS or Global Positioning System is a
satellite navigation system that furnishes location and
time information in all climate conditions to the user.
GPS is used for navigation in planes, ships, cars and
trucks also. The system gives critical abilities to
military and civilian users around the globe. GPS
provides continuous real time, 3-dimensional
positioning, navigation and timing worldwide.
IV. CONCLUSION
2Assistant Professor, Department of Computer Technology, KDK College of Engineering, Nagpur, Maharashtra,
India
ABSTRACT
Video data hiding is yet a vital research subject because of the structure complexities included. As of late, there
are loads of frameworks are present. The general population designed a substantial thing to ensure the data and
there are bunches of hiding procedures are to be developed for security reason. In any case, that strategies can
be hack by unapproved clients is downside in existing frameworks so that propose the new framework for
example Data hiding behind the video utilizing forbidden zone and selective embedding. We propose another
video data hiding technique that makes utilization of eradication amendment ability of Repeat Accumulate
codes and prevalence of Forbidden Zone Data Hiding. This framework makes utilization of redress capacity of
duplication store codes and favorable position of forbidden zone data hiding is utilized. In this examination the
encryption and decoding method is utilized to give the security key. Without that key, nobody can see the first
data. This system is utilized to shield the database from unapproved and the dangerous powers .It has
substantial deletion ability of data hiding.
Keywords: Data Hiding, Forbidden Zone, Quantization Index Modulation [QIM], Repeat Accumulate Codes,
Selective Embedding
I. INTRODUCTION
Consequently, video data hiding keeps on
Data hiding is the way toward embedding data into establishing a functioning examination region. Data
a host medium. When all is said in done, visual and hiding in video arrangements is performed in two
real media are favored because of their wide nearness noteworthy ways: bitstream-level and data-level. In
and the resilience of human perceptual frameworks bitstream-level, the redundancies inside the present
included. pressure measures are misused. Ordinarily, encoders
have different alternatives amid encoding and this
In spite of the fact that the general structure of the opportunity of choice is appropriate for control with
data hiding process does not rely upon the host media the point of data hiding. In any case, these strategies
type, the strategies change contingent upon the idea exceptionally depend on the structure of the
of such media. For example, picture and video data bitstream; henceforth, they are very delicate, as in
hiding share numerous regular focuses; be that as it much of the time they can't endure any organization
may, video data hiding requires progressively transformation or transcoding, even with no
complex structures because of the extra fleeting noteworthy loss of perceptual quality. Subsequently,
measurement. this sort of data hiding techniques is by and large
CSEIT1951123 | Received : 15 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 456-461 ]
446
Ruchika S. Bhambore. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 456-461
proposed for delicate applications, for example, utilize the BCH code to expand blunder amendment
verification. capacity. The creators perform 3D interleaving so as
to dispose of the nearby burst of mistakes. Also, they
Then again, data-level techniques are increasingly propose a worldly synchronization procedure to
strong to assaults. Subsequently, they are reasonable adapt to fleeting assaults, for example, outline drop,
for a more extensive scope of utilization. addition, and rehash. In this paper, we propose
Notwithstanding their delicacy, the bitstream-based another square based selective embedding type data
techniques are as yet alluring for data hiding hiding structure that exemplifies Forbidden Zone
applications. For example, the excess in square size Data Hiding (FZDH) and RA codes as per an extra
choice of H.264 encoding is misused for hiding data. fleeting synchronization instrument. FZDH is a down
In another methodology, the quantization parameter to earth data hiding strategy, which it appeared to be
and DCT (Discrete Cosine Transform) coefficients are better than the traditional Quantization Index
changed in the bitstream-level. In any case, the vast Modulation
majority of the video data hiding techniques use
uncompressed video data. Sarkar proposes a high (QIM) .RA codes are as of now utilized in picture
volume change area data hiding in MPEG-2 videos. and video data hiding because of their vigor against
They apply QIM to low-recurrence DCT coefficients eradication. Vigor permits taking care of
and adjust the quantization parameter dependent on desynchronization among embedder and decoder
MPEG-2 parameters. that happens because of the distinctions in the chose
coefficients. So as to join outline synchronization
Besides, they differ the embedding rate contingent markers, we segment the squares into two gatherings.
upon the sort of the casing. Therefore, inclusions and One gathering is utilized for edge marker embedding
eradications happen at the decoder, which causes and the other is utilized for message bits.
desynchronization. They use Repeat Accumulate (RA)
codes so as to withstand deletions. Since they adjust By methods for basic standards connected to the
the parameters as per the sort of casing, each edge is edge markers, we present a specific dimension of
handled independently RA codes are as of now power against casing drop, rehash, and creepy crawly
connected in picture data hiding. Versatile square assaults. We use precise RA codes to encode message
choice outcomes in desynchronization and they use bits and edge marker bits.
RA codes to deal with eradication. Additions and
deletions can be additionally taken care of by Each piece is related to a square living in a gathering
convolutional codes. The creators use convolutional of casings. Irregular interleaving is performed
codes at embedder. In any case, the weight is put on spatiotemporally; thus, reliance on nearby attributes
the decoder. Different parallel Viterbi decoders are is diminished. Host flag coefficients utilized for data
utilized to address desynchronization mistakes. In hiding are chosen at four phases. In the first place,
any case, it is seen that such a plan is effective when outline determination is performed. Casings with an
the quantity of chose host flag tests is significantly adequate number of squares are chosen. Next, just
less than the absolute number of host flag tests. 3-D some foreordained low-recurrence DCT coefficients
DWT space is utilized to conceal data. They use LL are allowed to conceal data. At that point, the normal
subband coefficients and don't play out any versatile vitality of the square is relied upon to be more
determination. In this way, they don't utilize blunder prominent than a foreordained limit. In the last stage,
redress codes strong to eradication. Rather, they the vitality of every coefficient is contrasted with
another edge. The unselected squares are marked as non-covering, which can be accomplished by
eradication and they are not handled. For each utilizing a base quantizer and moving its recreation
chosen square, there exists a variable number of focuses relying upon m, like Dither Modulation. A
coefficients. These coefficients are utilized to install run of the mill embedding capacity that utilizes a
and unravel a solitary message bit by utilizing the uniform quantizer. we need to consider that the In
multi-dimensional type of FZDH that utilizes cubic the unrivaled field, the hiding advancement, for
cross-section as its base quantizer. example, least critical bit(LSB) extra, is done in the
predominant field, while change space techniques;
II. LITERATURE REVIEW conceal data in another area, for example, wavelet
space. Least noteworthy piece (LSB) is the
The writing review is the most critical advance in the unassuming type of Steganography. LSB depends on
product improvement process. Before building up the infusing data in the littlest huge piece of pixels,
device it is important to decide the time factor, which data to a minor change on the spread picture,
economy n organization quality. When these things r which is not noticeable to the human eye. Since this
fulfilled, ten following stage is to figure out which strategy can be effectively part, it is more fragile to
working framework and language can be utilized for assaults. LSB framework effectively affects the
building up the instrument. When the software arithmetical data of picture like a histogram.
engineers begin assembling the instrument, the
developers need a great deal of outside help. This Safeguards could be the alarm of a shrouded
help can be acquired from senior software engineers, correspondence by simply testing the Histogram of a
from a book or from sites. Before building the picture. A decent answer for reject this deformity
framework the above thought r considered for was LSB indistinguishable. LSB Identical was an
building up the proposed framework. Forbidden incredible advance forward in Steganography
Zone Data Hiding (FZDH) is presented in [8]. The strategies and numerous others get plans from it.
technique relies upon the Forbidden Zone (FZ) idea, Downsides of Existing System are that the strategy
which is characterized as the host flag go where no given in Existing framework is effectively broken.
change is permitted amid data hiding process. The measure of the put-away data is little.
So as to satisfy the prerequisite of common Building up a steganography system that is fit for
prohibition, the reproduction purposes of the hiding data in a video le lies at the core of this
quantizers that are recorded by various m ought to be undertaking, and it is alluring that the resultant
arrangement is as secure as could be expected under We talk about parts of our underlying examination,
the circumstances. Lithe plan strategies enable us to which included a wide examination of steganography
assess and enhance our executed systems as we (utilizing sound, picture and video compartments).
advance. Moreover, our overview of the writing and The understanding given by this exploration in
our starter explore (see A.2) yielded incredibly uenced the plan choices that pursue.
constrained data on the best way to plan and execute
a video steganography arrangement of this nature. In Steganography and Steganalysis are in a ceaseless
light of this, coordinated advancement would enable fight. At whatever point a decent steganography
us to roll out considerable improvements to the system is built up, another Steganalysis method is
structure and execution anytime something that can likewise created endeavouring to overcome it
only with significant effort be accomplished with Steganalysis is the workmanship and exploration of
other programming designing models. identifying mystery messages shrouded utilizing
steganography. Once there is proof that a message is
concealed, the objective of steganography is crushed
regardless of whether the message was not separated.
In spite of the fact that steganography methods may
clearly straightforward to the human eyes, assaults on
them are yet conceivable. Any embedding procedure
definitely leaves follows in the stego-item and
modifies a portion of its properties, which present
irregular attributes and some debasement as far as
quality. Consequently, Steganalysis can be arranged
into two classes: inactive Steganalysis and dynamic
Steganalysis. Aloof Steganalysis distinguishes the
nearness or nonappearance of shrouded message or
recognizes the embedding calculation utilized. While
dynamic Steganalysis change, extricate or obliterate
the concealed message or concentrate a portion of its
traits, for example, message length.
It is at this crossroads that we might want to bring up In the first step, frame selection is completed and the
that our exploration has been considerably more test a selection of frames are managed block-wise. For
than we could have predicted. Our decision of a each block, only a first bit is hidden. After obtaining
coordinated improvement process has been a 88 DCT of the block, energy check is performed on
demonstrated gift on various events. While most of the coefficients that are predefined in a mask. Selected
this section will report the structure and execution of proficient of variable length are used to hide data bit
our last arrangement, we will likewise feature how m. m is a supporter of message bits or frame
our plan and usage have changed with the emphases. synchronization markers. Message sequence of each
Being in contact at the last phase of usage has been an group is obtained by using RA encryptions for T
unpredictable procedure and a few essential exercises consecutive frames. Each block is assigned to one of
have been learned en route. these groups at the start. After the inverse convert
host frame is obtained. Decoder is the dual of the
In this paper, we proposed another video data [1] Ersin Esen, A. Aydin Alatan,\Robust Video Data
hiding structure that makes utilization of deletion Hiding Using Forbidden Zone Data Hiding And
redressability of RA codes and prevalence of FZDH. Selective Embedding ",IEEE ,VOL. 21, NO. 8,
The strategy is likewise powerful to outline control AUGUST 2011.
assaults through casing synchronization markers. To [2] K.Mohan, S.E.Neelakandan \Secured Robust
begin with, we thought about FZDH and QIM as the Video Data Hiding Using Symmetric Encryption
data hiding strategy for the proposed structure. We Algorithms ", IJIRE ,VOL.6,DECEMBER 2012
saw that FZDH is better than QIM, particularly for [3] R. Ravi Kumar V., Kesav Kumar \Selective
low embedding mutilation levels. The structure was Embedding and Forbidden Zone Data Hiding for
tried with MPEG-2, H.264 pressure, scaling and Strong Video Data Thrashing ",IJETT ,VOL.
casing rate transformation assaults. Ordinary 4,SEPTEMBER 2013
framework parameters are accounted for mistake-free [4] Mr.Sudheer Adepu, Mr.P. Ashok , Dr.C.V.Guru
translating. The outcomes show that the structure Rao \A Security Mechanism for Video Data
can be effectively used in video data hiding hiding " ,IJCTT,VOL.4, August 2013
applications. For example, Tardos fingerprinting, [5] Resoju Omprakash and D. Jyothi \Block Based
which is a randomized development of double unique Adaptive Videodata Hiding Technique", IJMSTH,
mark codes that are ideal against agreement assault, 2012
can be utilized inside the proposed structure with the [6] Mr. Mritha Ramalingam \Stego Machine Video
accompanying settings. The length of the Tardos Steganography using Modified LSB Algorithm ",
unique mark is AC2 0 In 1 ε1, where A will be an World Academy of Science, Engineering and
element of false positive likelihood (ε1), false Technology,2011
negative likelihood, and the greatest size of the [7] W. Bender D. Gruhl,N. Morimoto,A. Lu,
colluder alliance, (Co). We likewise analyzed the \Techniques for data hiding ", IBM SYSTEMS
proposed structure against the standard JOURNAL, VOL.35, NOS 3 and 4, 1996
watermarking technique, JAWS, and a later
quantization-based strategy. The outcomes Cite this article as : Ruchika S. Bhambore, Ashwini B.
demonstrate a huge predominance over JAWS and a Gurudeo, Shital B. Borkar, Pallavi G. Thul, Chanchala
V. Udepurkar, Prof. Anup Bhange, "Robust Video
practically identical execution with. The analyses
Data Hiding in Forbidden Zone", International
likewise revealed insight into conceivable
Journal of Scientific Research in Computer Science,
enhancements for the proposed technique. To begin Engineering and Information Technology
with, the system includes various edges (T0, T1, and (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
T2), which are resolved physically. 456-461, January-February 2019.
Journal URL : http://ijsrcseit.com/CSEIT1951123
The scope of these limits can be examined by
utilizing a preparation set. At that point, a few
heuristics can be derived for the legitimate choice of
these edge esteems. Moreover, joining of the human
visual framework based spatiotemporally adjustment
of data hiding technique parameters as in stays as a
future bearing.
ABSTRACT
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a
variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the
Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s’
Internet wave connected 1.2 billion subscribers while the 2000s’ mobile wave connected another 2.4 billion.
Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of
data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid,
and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast
across several industry verticals along with increases in the number of interconnected devices and diversify of
IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many
challenges to overcome. The Internet of Things combines actual and virtual anywhere and anytime, fascinate
the attention of both constructor and hacker. Necessarily, leaving the devices without human interference for a
long period could lead to theft and IoT incorporates many such things. In this paper, we are briefly discussing
technological perspective of Internet of Things security. Because, the protection was a major concern when just
two devices were coupled. In this context, security is the most significant of them. Today scenario, there are
millions of connected devices and billions of sensors and their numbers are growing. All of them are expected
secure and reliable connectivity. Consequently, companies and organizations adopting IoT technologies require
well-designed security IoT architectures.
Keywords : Internet of Things (IoT), Sybil Attack, IoT Authentication, IoT Trust, IoT Protocols, IoT Security
CSEIT195193 | Received : 12 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 462-482 ]
462
Dr. Yusuf Perwej et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 462-482
Internet of Things today is consolidation of data, and exposed to attacks by malicious opponent [1]. An
responding to the collected data in a useful way [3]. invasion may compromise an IoT device and use it as
While connecting all our things to the Internet will a platform for launching invasion on other IoT
permit us to advantage insight into our lives and devices. IoT security introduces technological
environment, we can potentially permit others to defiance at the device, network and platform level.
advantage the same insight if security is not managed Therewith, there is the process challenge of
correctly. A couple of security anxiety on a single organizing the security technologies in an end-to-end
device like as a mobile phone can swiftly turn to 60 manner. One thing is certain, when evaluating
or 70 anxiety when considering multiple IoT devices security necessity is that, then IoT is still very much a
in an interconnected business or home. In light of the work in progress. This paper provides an overview of
significance of what IoT devices have access to, it is Internet of Things (IoT) stage in section 2. We are
an essential to understand their security peril [1]. briefly discussing Internet of Things (IoT) threats in
section 3, and in section 4, we describe Internet of
The Internet of Things (IoT) [4] enables everywhere Things scheme. We categorize the reliance in section
communication between various devices. From 5. In section 6, we discuss public key infrastructures
entering patient details to watch post-surgery, from in Internet of Things. In section, 7 and 8 Internet of
parking vehicles to tracking vehicles, from childcare Things design thought for digital certificates and
to elder care, from smart cards to near field cards, protocols. In the last section discuss guidelines for
sensors are making their impendence felt. Sensors secure the IoT devices.
play an important role in the IoT as well. In spite of,
the functionality and operations of the IoT heavily II. INTERNET OF THINGS (IoT) STAGE
depend on the underlying network connectivity
structure. In the opinion of Gartner [5], it is required The IoT requires five stages, from data collection to
that the number of Internet connected devices will data delivery to the end [1] users on or off demand, as
increase from around 28 billion to 50 billion by 2020. shown in figure 1.
In spite of the IoT features everywhere
communication [6] among all kinds of electronic
devices, it inevitably raises security concerns due to
seamless infiltration and automated integration
among all sorts of applications. The IoT works across
miscellaneous networks and standards. Security and
privacy are considered the most important IoT
challenges [7]. In particular, no network is free from
security threats and vulnerabilities. Each of the IoT
layers is uncovered to various types of threats. In the
opinion of Gartner [8] security and risk, concerns
will continue to be the greatest hindrance to IoT
adoption. The market for IoT distinguished security Figure 1. The Internet of Things (IoT) Stage
solutions will dramatically expand in 2017 as current
security providers aggressively retool present In the upstanding stage, sensors collect data from the
capabilities to address IoT security risks IoT devices environment or object under measurement and turn
have often limited resources and may be more it into useful data [9]. Actuators can also intervene to
modify the physical conditions that generate the data. security problems. In the future, maybe around the
The thing may be a constant body (body sensors or year 2020 with IPv6 and the 5G network, billions of
RFID tags) or a dynamic vehicle (sensors and chips) miscellaneous things will be part of the IoT. Privacy
[10]. The actuating and sensing stage involucre and security will be the major factors of worry at that
everything from legacy industrial devices to robotic time [12]. IoT security threats and attacks will
camera systems, water-level detectors, heart rate escalate as the IoT devices become everyday events.
monitors, accelerometers, and air quality sensors. In The security threat is high enough for Gartner to
the secondly data collected on stage first should be estimate spending on IoT security is required to reach
stored and making it obtainable for analysis. If the near $600 million in 2018. In this [13] report,
thing has its own local memory, data can be stored prophecy that 30% of attacks in enterprises will
[7]. The different technologies are appropriate for include IoT. In this section, we are discussing
this purpose, depending on the scenario. The high security problems in three dimensions, components,
performance storage solutions are suggested for based on stage, and architecture.
companies performing data analysis with the
distributed system Hadoop. Normally, IoT 3.1 The Components Based Incursion
components are installed with low memory and low
processing potential [1]. The cloud takes over the As a technology, IoT is peerless since it has a role to
answerability for storing the data in the case of play in consumer, industrial worlds and enterprise.
stateless devices. In the thirdly stage, IoT analyzes The things are diverse in nature, communicating
the data stored in the cloud DCs and provides sensitive data over a distance [13]. The Internet of
intelligent services for work and life in hard actual Things (IoT) is extremely heterogeneous, highly
time as well as analyzing and responding to queries, dynamic, always available, [7] and consequently
then IoT also handle things. The IoT proposal for always vulnerable to attack. Apart from attenuation,
intelligent processing and control services to all stealing, loss, violation, and disaster, data can also be
things homogeneously. In the fourth, data [1] concocted and modified by compromised sensors.
transmission happen in all stage for instance sensors, The figure 2 shows the types of attacks at the
RFID tags [10], processors to controllers, devices, DCs component level in IoT.
to processing units, and end users. In the fifth stage,
delivery of processed data to things on time without
errors or transformation is a sensitive task that must
always accomplish.
3.2 The Stage Based Incursion needed to make sure connected devices on the IoT
can be trusted to be what they intend to be.
The diversify kind of attacks on the five stages of IoT. Accordingly, each IoT device needs a distinctive
Data effusion, sovereignty, [14] violation, and identity that can be authenticated when the device
authentication are the major concerns in the data effort to connect to a main server or gateway. With
perception phase. this distinctive identity in place [15], IT system
administrators can track every device throughout its
3.2.1 Data Effusion lifecycle, communicate securely with it, and inhibit it
from executing detrimental processes. If a device
The data is a precious resource, and if recent events shows unforeseen behavior, administrators can
surrounding the allegations against (for instance, simply revoke its perquisite [16]. In addition, it is
Cambridge Analytica) demonstrate anything, it is compulsory to verify that the data do not change
that you cannot always trust companies to manage during transit. Data authentication could endow
such data responsibly. Specifically, device originality and integrity.
manufacturers are in a prime position to potentially
abuse [14] IoT generating data. Data effusion can be 3.2.4 Data Mislay
internal or external, intentional or unintentional,
authorized or spiteful, involving hardware or Data mislay considered a primus risk for the Internet
software. Data effusion is a solemn threat to of Things. The data mislay dissimilar from data
reliability. As the cloud data move from one renter to effusion in that the latter is a sort of revenge taking
several other renter of the cloud, there is a sedate risk action on the employer or administrator. Data mislay
of data effusion. is losing the work accident due to hardware or
software, lack of success and natural calamity.
3.2.2 Data Sovereignty
3.2.5 Attack on Availability
Internet of Things (IoT) connections growing from 9
billion in 2017 to 24 billion by 2020, it is vital to The Internet of Things continues to increase, which
understand the potential influence data sovereignty in turn spread your organization’s attack surface.
will play for organizations collecting and sharing Many types of attacks have been on every side for a
customer’s individual information. International very long time. What is new is the scale and relative
organizations are now often moving big data across naivety of attacks in the Internet of Things the
borders for analysis and consolidation [2]. Data millions of devices that are a potential sufferer to
sovereignty is the idea that information which has traditional style cyber-attacks, but on a much huge
been transformed and stored in binary digital form is scale and often with limited, if any shield [17]. IoT is
subject to the laws of the country in which it is all about connecting and networking devices that up
located. The IoT encloses all things across the globe until now not on a mandatory basis been connected.
and is hence responsible to sovereignty. This means that all of those devices, whether it is
your new connected sensor or your connected
3.2.3 Data Authentication vehicle, are creating a new entry point in the
network and here upon posing an increasing security
The data can be perceived from any device at any and privacy hazard. In this context, denial of service
moment. The powerful IoT device authentication is (DoS) attack happens when a service that would
usually work is not available. There can be many of vicinal gets formed and these new vicinal [19] are
factors for unavailability, but it generally refers to an all from other end of wormhole tunnel and not in
infrastructure that cannot cope due to capacity transmission range of node therefore, during the
overload [18]. In a Distributed Denial of Service attack lots of control packets are going to exchange
(DDoS) attack, a huge number of systems spitefully from one end of the tunnel to the other in that
attack one target. This is often done via a botnet, vicinal advertisement. Wormhole attack is very
where many devices are programmed to entreaty a strange and arduous to identify. The figure 3 shows
service at the same time. the wormhole attack on IoT.
The wormhole attacks considered as the grievous The man-in-the-middle concept is where an attacker
attacks during IoT routing. In this attack, tunnel is or hacker is looking to intervene and violation
established between two nodes and the packet is communications between two distinct systems. It can
forwarded among each other. These distant spiteful be a hazardous attack because it is one where the
nodes make believe that they are very close to each attacker secretly intercepts [21] and transmits
other so that vicinal nodes forward packets via them. messages between two parties when they are under
If wormhole attack is triggered in the more number
detected by the fusion center, which means that the arduous endeavor. On the physical level, device
attack is eventually in futile. From the protector enclosures are frequently not tamper proof devices
point of view, inferring attacks using all feedbacks can be unlocked and their hardware can be accessed
might treat the topological attack as a fabled alarm, via investigate and pin headers [45]. The device
since only a small subset of nodes are targeted. On central processing units (CPUs) are low-cost
the other hand, inferring attacks using only a few components that frequently have no sophisticated
feedbacks might tolerate from information means to protect their code, data, and tokens for
insufficiency and therefore fabled to detect the external access. This permits an attacker to clone
presence of attacks [40]. Accordingly, there exists a entire devices or manipulate software and data. If the
balance point at which both attacker and defender device is brought into service in an unsupervised
are contented with their own master plan, which is environment, it may be accessed and frame up by a
precisely the notion of Nash equilibrium in game malicious third party without information. Besides,
theory. As an outcome, the game payoff at game IoT devices are frequently based on low-power
equilibrium can be used to study the robustness of a hardware and may only be able to process tokens
network. with a low complexity. This can have an implication
on the robustness of a token, as it can be
V. INTERNET OF THINGS (IoT) RELIANCE reengineered or recovered through a brute force
attack. As an outcome of this, any faith management
The Internet of Things (IoT) can deliver important system for IoT deployments must have the ability to
advantage to our society and economy, enabling dynamically withdraw faith of individual devices.
superior health services, cleaner and secure societies, When faith and security credentials given out at the
more dexterous industries and [41] stimulating new time of manufacturing or deployment, a device is
businesses. On the other hand, data is a sensitive seen as initially honest. A network wide update
subject and customers and end users are wary of mechanism will ideally incorporate a smooth and
sharing data for apprehension that it will fall into the effective patching process, which contains robust
hands of criminals, or using in ways they consider integrity and authenticity examine, minimize service
inappropriate [42]. Faith is the oxygen, which will outages, and permits for a version withdraw if
breathe life into the internet of things. Industry needed.
necessity to show data is secure and that it is properly
treated [43]. Faith and security are based on tokens or 5.2 Secure Key Storage
credentials, provided by a faith management
infrastructure, which are embedded in and The secure storage provision to increase the
potentially shared between devices. The aim of this robustness of reliance tokens used both within an IoT
section is to investigate frameworks that ensure faith system and within its reliance management
as well as communication security between nodes in infrastructure [46]. Passive keystores endow a means
an IoT deployment [44]. to securely save and retrieve credentials cryptographic
operations are carried out [10] outside these stores by
5.1 Reliance and Security from a Device Point of the device’s CPU. Active keystores in contrast, permit
View the internal execution of cryptographic operations
through an application program interface (API), so
IoT devices are vulnerable in many sides, so the credentials are never disclosed.
providing and maintaining faith and security is an
5.3 Reliance and Security from a Network Point of the number one users of the Internet and necessity to
View digital identities for secure operation. As enterprises
seek to transform their business models to stay
During the operation of a network, devices set up competitive, swift adoption of IoT technologies is
stable or unstable communication links with other creating increasing demand for Public Key
peers. These links can be either point-to point or Infrastructures (PKIs) to confer digital certificates for
incorporate a group of nodes. From a device’s point of the increase number of devices and the software and
view, the challenge [47] is to validate the authenticity firmware they run [49]. The secure IoT deployments
and authority of the other peer and to set up a secure need not only faith the devices to be authentic, but
communication link to keep away from attack also faith that the data they collect is real and not
scenarios. For this objective, reliance tokens are changed. If one cannot fault the IoT devices and the
interchange and validated or new session tokens bring data, there is no point in collecting, running
into being. The promise of data integrity, optionally analytics, and executing decisions based on the
in combination with data confidentiality through [48] information gathered.
encryption, provides trustworthiness in the data a
node sends or receives. Data integrity and 6.1 The PKIs Elements
confidentiality provide a foundation to deal with the
principal attack vectors of interception, A public key infrastructure confers the revocation,
transformation and disruption. The data secrecy is distribution, revocation and verification of public
generally conferred through symmetric encryption keys used for public key encryption, and enables
with the advanced encryption standard algorithm as a linking of identities with public key certificates. The
de facto industry standard often implemented directly public key infrastructure describes the policies, the
in hardware. While data integrity confers through procedure, the hardware, the software, and the
message authentication codes or cryptographic hashes people that are used to handle digital certificates [50].
that are attached to the data payload [48]. The peer This means the process of creating, distributing,
authenticity belonging to the problem of how a peer handle, storing, and revoking certificates are all
can validate another peer’s identity before a encapsulate under PKI. The PKI also mention to the
communication link is established. Peer authenticity associations we make with a public key to a person,
can go hand in hand with system availability. For or a public key to a device. It is based on faith, and a
instance, denial-of-service (DoS) way attacks are certificate authority creates this faith. This key
typically external attacks, so the ability to qualify and management lifecycle starts with the creation of a
if necessary to discard data or connection requests [14] key [51]. We make up one's mind on a distinctive
at an early stage can help to reduce such attacks. Proof strength of the key, which would be a certain
of authorization provides commitment that a peer has number of bits, and we make up one's mind what
the authority to communicate with another peer and cipher we would like to use to create the key. Now,
conduct a few actions. we are discussing the PKI elements.
and other existence. Generally known as certificate typically through online certificate status protocol
authorities (CA), these entities provide promise about services.
the parties identified in a PKI certificate. Each CA
keeps going its own root CA, for use only by the CA. 6.1.4 The Central Directories
The certification authority browser forum, also called
a CA & browser forum, is an industry coalition The central directories protect location in which are
founded in 2005 and whose members contain [51] stored and index keys [50]. The central directories
CAs, browser software publishers and other system make certificates accessible to other entities. Since
contributor, who use X.509 digital certificates for other data, such as policies or CRLs necessity to be
authentication and encryption. The CAs forms the published as well, central directories store and make
backbone and the faith anchors of a PKI. They all these data accessible. They are frequently
problem certificates and, in many cases, repeal status executing as lightweight directory access protocol
data regarding the certificates they problem, and servers.
publish both types of products.
6.1.5 The Time Stamping Authorities
6.1.2 The Registration Authorities
When the date and time of the phenomena is
The registration authorities (RAs) act as the front end recorded, we say that it is time stamped. A digital
of certification authorities. A registration authority, camera will record the time and date of a photo being
often called a subordinate CA, problem PKI taken, a computer will record the time and date of a
certificates. The registration authorities are certified document being saved and emended. These are all
by a root certificate authority and authorized to issue instances of a timestamp. Timestamps are essential for
certificates for distinguished uses permitted by the keeping records on when information is being
root. That they are accountable for identifying and reciprocity, created, or destroyed online. In many
authenticating entities that request certificates, and situations, these records are simply utilitarian for us
then dispatching certificate requests to CAs and to know about. However, in some situations, a
routing back the certificate(s) to the implore entity. timestamp is more valuable. The time stamping
In some instance, RAs are just a unique component of authorities are characterized by their ability to
CAs. problem PKI based believable timestamps. Believable
time stamping is a process that keeps track of the
6.1.3 The Validation Authorities creation and alteration of data. This data can be a
program or a document. This process is done in a
A certificate database stores information about trouble free manner and recorded so that no one cans
controversy certificates. Therewith, to the certificate alteration the data, including the owner, without
itself, the database includes validity period and the being informed and it assurance the integrity of the
status of each PKI certificate. The validation data.
authorities (VAs) permit for the validation of
certificates. Validating a certificate in fact comprises 6.1.6 The Certificate Revocation Authorities
many steps for instance; possibly acquire certificates,
verifying signatures, checking the revocation status. A certificate revocation list (CRL) contains digital
It’s normally supposed that VAs only provides certificates that have been invalidated by the
services in connection to check revocation status, emanate certificate authority before their scheduled
expiration date and should no longer be believed. The The connected IoT endpoints share coequal security
CRLs is a type of blacklist and are used by different requirements [47]. A faithful or device identity,
endpoints, including web browsers, to confirm confirm applications and data secured in motion and
whether a certificate is valid and trustworthy. In at rest. These needs translate to authentication,
general, invalidate duties are carried out by a signature and encryption [52]. The industrial sector
dedicated service that belongs to each certificate has placed greater trust on digital certificates for IoT
authority. While either the number of issuing system elements such as controls, applications,
certificates is high, or the complexity of invalidate sensors, devices, switches, and data [23]. The
procedures increases, or so does the number and countless commercial operations, systems and
diversification [51] of CAs, specialized authorities, infrastructure are before controlled through the
CRAs, come to play, whereby a single, centralized Internet. Many devices that use the sensors and
CRA can replace equivalent invalidate services on actuators should follow particular policy and proxy
multiple CAs. When a web browser makes a rules for authentication to authorize the sensors to
connection to a site using TLS, the web server's public their information [53]. Meantime, low cost
digital certificate is investigated for anomalies or solutions in this field have not been conferred as
difficulty, part of this process involves investigating much as needed. At the present, if we want to confer
that the certificate are not catalogued in a certificate the security for the sensors we have to use high-cost
revocation list. These investigate are arduous steps in solutions, which is a dispute with the primary goal of
any certificate-based transaction because they permit IoT to provide lightweight protocols. The need for
a user to calibrate the identity of the owner of the particular commitment and related controls is greatly
site and discover whether the CAs still considers the increased for both industrial and consumer-driven
digital certificate believable. IoT devices. The security is very critical, and one of
the key distinctions between an enterprise PKI and
6.2 The IoT Challenges in PKIs an IoT PKI is the necessity for protecting data and
safe authentication at multiple endpoints. In this
PKI for IoT needs to be dissimilar than an enterprise context, digital certificates are an increasingly famous
PKI. The majority of devices collect transmit and has solution for signing, encryption and authentication.
at least one piece of private, confidential or
proprietary information [47]. Some devices will 6.4 Need the IoT Device Authentication
cross-unencrypted network and cloud services with
varying security levels and requirements. Some The powerful IoT device authentication is needed to
devices will be physically inaccessible. Other devices make sure connected devices on the IoT can be
may be attractive to impersonate in order to [14] gain believed to be what they purport to be. Accordingly,
access to IoT system resources. Comprehension the each IoT device needs a distinctive identity that can
following difficult situation can help organizations be authenticated, when the device effort to connect to
plan certificate policies upon which the PKI a central server. With this distinctive ID in place, IT
environment will be based. system administrators can track each device via its
lifecycle, communicate securely with it, and inhibit it
6.3 In the IoT Authentication, Integrity & from executing detrimental processes. If devices,
Confidentiality manifest unforeseen behavior, administrators can
simply revoke its prerogative.
6.5 Need the IoT Device Connected Trouble Freely certificate policy the suitable amount of promise so
that relying parties know why the certificate is
To trouble freely participate in the IoT, each considered faith, as well as to understand what the
connected device needs a distinctive identity even device is authorized to do and not to do.
before it has an IP address. This digital credential
establishes the root of faith for the device’s entire VII. TERNET OF THINGS (IoT) DESIGN IDEA
lifecycle, from initial design to deployment to FOR DIGITAL CERTIFICATES
freedom from work. The every device a distinctive
identity using the powerful cryptographic processing, In a digital identity certificate, both its owner and the
key shielding, and key management available. A CA that signed the certificate must be distinctively
digital certificate is injected into every device enable identified. While there will be a comparatively small
to firstly, authentication of each device introduced to number of CAs, there is a need for a scalable naming
the organization’s architecture. Secondly, verification scheme appropriate for billions of nodes. In the design
of the integrity of the operating system and idea, device identifier establishment plans can be
applications on the device level. Thirdly, secure based on a different technique. These techniques
communications between devices, gateway, and incorporate either a hierarchical identifier, the
cloud. Lastly, authorized software and firmware encoding of extra information, unsystematic data, and
updates, based on approved code. the use of cryptographic operations [54]. In the design
idea, certificate validity the X.509 certificates have a
6.6 The PKI Security Guarantee in the IoT limited life span, which is enciphered in the validity
field [55]. The field accommodates the two date’s
The guarantee in the PKI space can be defined as the notAfter and notBefore, both accommodates a
amount of confidence that a person or system has timestamp in the UTCTime encoding format.
that the identity being introduced in a certificate in Investigation the validity of a certificate requires
fact be suited to the device. Maintaining specific access to actual time [56], and since low cost
levels of guarantee across millions of deployed device oscillators found in embedded, systems have an
identities is no trivial task. Risks must be important drift in the order of up to many. Seconds
comprehensible and mitigation plans established and per day, the use of time synchronization protocols
executed. The IoT system may incorporate millions of like network time protocol or precision time protocol
diverse connected devices sharing data to complete should be believed. In the design idea, the public key
various tasks, it makes sense that peril be inclined to cryptosystems confer pairs of keys, whereby the
be greater for an IoT system than for an enterprise public encryption key dissimilar from the secret
use case. The higher IoT peril’s profile, the PKI decryption key [51]. Such cryptosystems are at the
environment needed to issue believe certificates core of PKI, as they confer a means to digitally, the
across the system endpoints warrants very careful hash value of a digital certificate using a CA’s private
security planning to make sure a distinctly defined key; provide a means to confirm the integrity of a
level of promise for device authentication. The digital certificate, through decoding the already. The
reliability promise applies to both enterprise and IoT encoded hash value using a CA’s public key and
PKIs and various use cases may rely on varying levels comparing it with the hash value calculated over the
of promise. Some use cases need to define, detailed presented certificate; and permit a device to digitally
and strict promise requirements, while others may sign or decrypt information. In the design idea, hash
require less definition. Organizations must define in functions are one-way functions that modify a bit
string of variable length into a fixed-length hash value. scenarios, a number of technologies have been
They are utilizing to digital signs a certificate [57]. In developed to achieve information privacy and security
the hash, functions have four essential mathematical objective, such as transport layer security, which
and algorithmic characteristic, first they should have a could also make better the confidentiality and
small computational complexity, second irreversible integrity of the IoT.
“one-way” functions, third infeasible to alter an input
without changing the hash and fourth it must be 8.1 In IoT Secure Device Provisioning and
infeasible to find two dissimilar inputs with the same Authentication Using Azure
hash. There are a number of various future-proof hash
algorithms in use, most particularly SHA-2 and SHA- The security token technique provides authentication
3 with customizable hash lengths of between 224 and for every call made by the device to the IoT hub by
512 bits. associating the symmetric key to each call. The X.509-
based authentication permits authentication of an IoT
VIII. INTERNET OF THINGS (IoT) PROTOCOLS device at the physical layer as part of the TLS
FOR ACCESS NETWORKS connection establishment [60]. The security token-
based method can be used without the X.509
The Internet of Things (IoT) goal to make better our authentication, which is a less safe pattern. The
lives by increasing the interconnectivity of an preference between the two techniques is primarily
increased variety of embedded computing devices dictated by how safe the device authentication needs
using components of existing Internet infrastructure to be, and availability of safe storage of the device. IoT
[1]. This will permit for communications between hub uses security tokens to authenticate devices and
sensors in cars, laptops, factory, home appliances, services to keep away from sending keys on the
mobile phones, machineries, and many other devices network. Besides, security tokens are limited in time
that are already capable of network access through validity and scope. Azure IoT SDKs automatically
existing protocols such as 3G, Wi-Fi, Bluetooth [58], generate tokens without need any special
and ZigBee. The IoT scenarios remain a challenge, configuration [61]. Some scenarios need the user to
mainly due to the large number of miscellaneous generate and use security tokens outright. These
devices as well as data exchanged via insecure scenarios contain the direct use of the AMQP, MQTT,
connections. Moreover, the concepts of security are and HTTP surfaces, or the implementation of the
extended not only to device-to-device token service pattern.
communications, but also to network aspects. As an
example, many hackers create fake networks (termed After each IoT hub has a recognize registry that can
botnets) to steal data and user privacy information. be used to create per-device resources in the service,
Normally, various security requirements should be like as a queue that contains in flight cloud-to-device
addressed to promise network, and data security. First, messages, and to permit access to the device facing
confidentiality is essential to limit network access and endpoints. The IoT hub identity registry provides safe
data only to authorized users. Second, data integrity storage of device identities and security keys for a
and authentication should be promise so that solution. Independent or groups of device identities
messages are triumphantly transmitted and are can be added to a permit list, or a block list, enabling
reliable to the receiver. In the end, data complete control over device access. The use of a
authentication and availability should be provided, as device-based X.509 certificate and its associated
well as detection of malicious interloper [59]. In IoT private and public key pair permits extra
authentication at the physical layer. The private key close to the gateway and negotiator, propagation
is stored securely in the device and is not detectable delays can be ignored. In addition, for the
outside the device. The X.509 certificate contains unidirectional case, the security keys have a valid
information about the device, like as device time interval sufficiently long to transmit one or more
identification, and other organizational details. A packets and to absorb possible retransmissions or any
signature of the certificate is originated by using the other undesirable latency.
private key. Internet connection between the IoT
device and IoT hub is secured using the transport IX. GUIDELINES FOR SECURE THE INTERNET OF
layer security standard. Azure provides for IoT THINGS DEVICES
transport layer security standard, namely TLS 1.2,
TLS 1.1, and TLS 1.0, in this order. The Internet of Things is comprised of an
indiscriminately diverse range of device types from
8.2 The Secure Access to Unidirectional Data in IoT small to huge, from simple to complex, from
consumer gadgets to state of the art systems found in
The unidirectional devices cannot perform any safe DoD, [1] utility and industrial and manufacturing
procedure for secure key exchange with the systems. IoT devices face the same types of privacy
negotiator. The transmitter just sends a message and security problem that many traditional end-user
without any feedback, that is, it lapses to receive any devices face. There are approx six million new things
signal, and is equipped with an internal clock, which being connected every day in 2016, as we head
is supposed not to be on the mark. Then, a toward more than 22 billion by 2020, according to
nonspecific non-IP unidirectional terminal runs the Gartner [5]. End users do not have the technical
following move to send data to the gateway and specialist to assess the privacy and security
negotiator in a safe way. In the first move, it implications of any particular IoT device, or they may
generates the encryption key locally, based on the lack interest in doing so [63]. The subscribers already
time measured by a local clock. In the second move, have trouble identifying and troubleshooting the
it creates the message and encrypts it with the devices that are currently connected to their home
generated key, this message includes the payload and networks [64]. IoT devices will worsen these
any other data to be used to make better security. In circumstances, as subscribers connect an increasingly
the third move, it computes the hash values using the wide variety of devices to their home networks. The
message text and the generated key and attaches consumer will likely lose track of what devices are
them to the message. At the end move, it sends the connected to the Internet over time, which will make
message to the gateway and negotiator. defend them even more challenging. In this section,
we are discussing guidelines for secure the IoT
8.3 The Secure Access to Bidirectional Data in IoT
devices.
For bidirectional terminals, the negotiator can 9.1 Don’t Connect Your Devices Unless You Necessity
periodically broadcast its clock timing in a dedicated
message, and its identification in the plain part of the The first step is to consider what functionality you
message. The terminals can align their local clocks to necessity from the device. In view of the, your TV or
the gateway and negotiator terminal, and then fridge can connect to the internet, doesn’t mean you
generate the security keys in accordance with the surely want to hook it up. Take a good look at the
algorithm already described [62]. Since devices are
features it offers and learn precisely what internet sent through email or SMS before access is permitted.
connectivity brings before you connect. When used properly, two-factor authentication can
halt the bad people obtain access to your accounts
9.2 To Secure Communications Using Encrypted and taking control of your IoT devices.
Protocols
9.5 Using the Latest Firmware
Encryption practices of IoT devices are lower and
unsafe. A small number devices use encrypted If you want to make sure you have the latest security
communications as part of their beginning patches and diminish the possibility of a successful
configuration. Instead, most use ordinary web attack, then you need to keep your firmware fully
protocols that communicate across the Internet in updated. Vulnerabilities and exploits will be
plain text, which makes them simple targets for extricated as they emerge, so your IoT devices and
hackers keep an eye on network traffic to identify your router need to be frequently updated. Automate
debility. At the very least, all webs, traffic should be this wherever possible or set a schedule to investigate
using HTTPS [65], transport layer security, secure file for updates every two months or so.
transfer protocol, DNS security extensions, and other
secure protocols for communications with 9.6 During Processing Using a Encrypt Data
management stations and across the Internet.
Therewith, devices that connect to mobile apps or Infrequently the party processing the data should not
other remote gateways should use encrypted be able to read the data or the computational
protocols as well as encrypt data stored on flash outcome. The operational data while they are in
drives. encrypted form. For instance, identical encryption is
a form of encryption that permits computations to be
9.3 Block Incoming Traffic When Possible carried out on cipher-text, thus generating an
encrypted outcome that, when decrypted, matches
The several IoT devices ship with open ports to the outcome of operations performed on the plain
support management functions rather than the text.
standard functionality available through a user
interface. Even some passwords allow telnet access 9.7 Create Impressive and Inoffensive Password
with only an IP address. Afterwards, the point here is Policies
to decrease your attack surface as much as feasibly
possible. That might mean perfectly blocking all Most network infrastructure needs the administrator’s
incoming traffic with a firewall. However, in other default password to be altered when first accessed. In
cases, that will mean only keeping open which TCP spite of that, most devices, like as home routers,
and UDP ports you necessity. network printers, and sensors, lack strong
authentication and access technique. Furthermore,
9.4 Two-Factor Authentication the concept of using multifactor authentication using
a diversity of mechanisms to log in besides an easy
Supposing any of your devices offer two-factor
password, such as with an SMS code sent to a cell
authentication, use it. Two-factor authentication is
phone is a rarity in the IoT world. Actually, some IoT
an extra security layer on top of a device password
devices do not need any authentication. A subscriber
that need secondary authentication a one-time code
can navigate with a web browser to a specific IP
address and control the device’s configuration and read up on the provider’s privacy policy and look for
operation. commitment about encryption and data safety.
9.8 Investigate if Physical Access Assents Intrusion 9.12 Put IoT Devices on Their Personal Firewalled
and Monitored Network
It is obliged to understand how your attack surface
dissimilar in the case that a hacker is remote versus, When it comes to linked consumer grade IoT devices
when they are corporeally in the office location. in the enterprise, you need to take a proactive
There are a number of attached devices that are procedure. You want to have them segmented away
vulnerable subsequently doing a hard reset. If there and rear a firewall. You can block incoming traffic to
are any, consider locking them away, when feasible. it so people cannot attack from the inboard and you
can handle and monitor it closely.
9.9 Decrease Data Granularity
9.13 Disable UPnP Characteristics
disconnections. Failover design is especially vital for its potential lapse points, as well as the IoT and Cloud
IoT devices that involve user protection, like as video platform used for handling and storage of data. Many
monitoring, door lock mechanisms, and simpler IoT devices have no computing power and
environmental monitors and alarms. These devices communicate with a gateway and the idea should be
should have manual overrides or particular functions given to choosing a remote monitoring service or IoT
for disconnected operations. service platform.
function can be a real difficulty. Not only will it not control for all objects in the physical world commonly
work when the network is very slow, but it may also called as IoT. The Internet of Things opens up a new
be synchronized sensitive data or offering another universe of connected and intelligent devices that can
potential route into your home and make sure you work together to provide virtually unlimited
capabilities, and the majority of these new capabilities
will be personalized. Much of the value of the IoT Technology,” International Transaction of
comes from the capability to customize products and Electrical and Computer Engineers System
services to a client individually and immediately, (ITECES), USA, ISSN (Print): 2373-1273 ISSN
necessity. The analysts have a prophecy that (Online): 2373-1281, Vol. 4, No. 1, page 26-38,
hundreds of thousands of new IoT services will May 2017, DOI: 10.12691/iteces-4-1-4.
connect billions of new IoT devices over the next [4]. Luigi Atzori, Antonio Iera, and Giacomo
decade. Industry and academia are both Morabito. The internet of things: A survey.
concentrating on moving ahead in attempts to Computer Networks, 54(15):2787–2805, 2010.
improve usability, maintainability, and security via [5]. Gartner Inc. Press Release (2014)
standardization and development of best practices. http://www.gartner.com/newsroom/id/2905717
The Internet of Things (IoT) embodies the [6]. G. Wu, S. Talwar, K. Johnsson,N. Himayat, and
convergence of the physical and virtual worlds. It is K. D. Johnson, “M2M: from mobile to embedded
the important nexus between data-oriented internet,” IEEE Communications Magazine, vol.
applications and device-oriented sensor networks 49, no. 4, pp. 36–43, 2011.
facilitated by Internet technologies. The biggest [7]. L. Atzori, A. Iera, and G. Morabito, “The
challenges to the IoT will come in securing sensitive internet of things: a survey,” Computer
information from unauthorized access as well as Networks, vol. 54, no. 15, pp. 2787–2805, 2010.
authorizing access to only the information we're [8]. Gartner Inc., “Hype cycle for the internet of
comfortable disclose. This paper provides an things 2017,” Technical report, July 2017.
overview of Internet of Things (IoT) threats, scheme [9]. V. Karagiannis, P. Chatzimisios, F. Vazquez-
and faith. Afterwards, we are briefly discussing Gallego, J. Alonso-Zarate, "A survey on
public key infrastructures and guidelines for secure application layer protocols for the internet of
the IoT devices. things", Transaction on IoT and Cloud
Computing, vol. 3, no. 1, pp. 11-17, 2015.
XI. REFERENCES [10]. Xiaolin Jia, Quanyuan Feng, Taihua Fan,
Quanshui L. , ”RFID technology and its
[1]. Yusuf Perwej, Mahmoud A. AbouGhaly, Bedine applications in Internet of Things (IoT)”, 2nd
K. Hani Ali M. Harb, “An Extended Review on International Conference on Consumer
Internet of Things (IoT) and Its Promising Electronics, Communications and Networks
Applications”, Communications on Applied (CECNet), IEEE, Yichang, China, April 2012
Electronics (CAE), ISSN: 2394-4714, Foundation [11]. Nasser S. A., Andrew J., Olga A.,” Internet of
of Computer Science FCS, New York, USA, Things Security: A Review of Risks and Threats
Volume 9, Number 26, Pages 8– 22, Feb 2019, to Healthcare Sector ”, IEEE International
DOI: 10.5120/cae2019652812 Conference on Internet of Things (iThings) and
[2]. Yusuf Perwej, “An Experiential Study of the Big IEEE Green Computing and Communications
Data,” International Transaction of Electrical (GreenCom) and IEEE Cyber, Physical and
and Computer Engineers System (ITECES), USA, Social Computing (CPSCom) and IEEE Smart
ISSN (Print): 2373-1273 ISSN (Online): 2373- Data (SmartData), Exeter, UK, June 2017
1281, Vol. 4, No. 1, page 14-25, March 2017, [12]. Wei Z., Yan Jia., Anni P., Yuqing Z., Peng
DOI:10.12691/iteces-4-1-3. L.,”The Effect of IoT New Features on Security
[3]. Nikhat Akhtar, Firoj Parwej, Dr. Yusuf Perwej, and Privacy: New Threats, Existing Solutions,
“A Perusal of Big Data Classification and Hadoop
and Challenges Yet to Be Solved”, IEEE Internet [22]. Elisa Bertino, Nayeem Islam,” Botnets and
of Things Journal, June 2018 Internet of Things Security ”. Computer, IEEE,
[13]. J. Gubbia, R. Buyya, S. Marusic, M. Palaniswami, Volume 50 , Issue 2, Feb 2017
"Internet of Things (IoT): A vision architectural [23]. A. Mohsen Nia and N. K. Jha, “A Comprehensive
elements and future directions" in Future Study of Security of Internet-of-Things,” IEEE
Generation Computer Systems, Elsevier, vol. 29, Transactions on Emerging Topics in Computing,
pp. 1645-1660, 2013. vol. PP, no. 99, p. d, 2016.
[14]. R. H. Weber, "Internet of Things New security [24]. Kuan Zhang, Xiaohui Liang, Rongxing Lu,
and privacy challenges", Computer Law & Xuemin Shen,” Sybil Attacks and Their Defenses
Security Review, vol. 26, no. 1, pp. 23-30, Jan. in the Internet of Things”, IEEE Internet of
2010. Things Journal , Volume 1 , Issue 5 , Oct. 2014
[15]. M. O. Lehtonen, F. Michahelles, E. Fleisch, [25]. Ian G. Harris,” Social Engineering Attacks on the
"Trust and Security in RFID-Based Product Internet of Things ”, September 7, 2016
Authentication Systems", IEEE Systems Journal, [26]. L. Atzori, A. Iera, G. Morabito, "The Internet of
vol. 1, no. 2, pp. 129-144, Dec. 2007. Things: A survey", Comput. Netw., vol. 54, no.
[16]. Yusuf Perwej, Kashiful H., Uruj J., Firoj Perwej, 15, pp. 2787-2805, 2010.
“Block ciphering in KSA, A major breakthrough [27]. E. Haselsteiner and K. Breitfuß, “Security in
in cryptography analysis in wireless networks” Near Near Field Communication (NFC)
International Transactions in Mathematical Strengths,” Semiconductors, vol. 11, no. 71, p.
Sciences and Computer, India, ISSN-0974-5068, 71, 2006.
vol. 2, No. 2, pages 369-385, July-December [28]. Seo JW, Lee SJ,”A study on the detection of
2009 DDoS attack using the IP Spoofing”, J Korea Inst
[17]. G. Gan, Z. Lu, J. Jiang, "Internet of Things Inf Secur Crytol 25(1):147-153, 2015
Security Analysis", 2011 International [29]. D. Miessler, “Securing the Internet of Things:
Conference on Internet Technology and Mapping Attack Surface Areas Using the
Applications, pp. 1-4, Aug. 2011. OWASP IoT Top 10.
[18]. I. Gudymenko, K. B. Pfitzmann, K. Tietze, [30]. G. Hernandez, O. Arias, D. Buentello, and Y. Jin,
"Privacy implications of the internet of things" “Smart Nest Thermostat : A Smart Spy in Your
in Constructing Ambient Intelligence, Springer, Home,” Black Hat USA, pp. 1–8, 2014.
pp. 280-286, 2012 [31]. Pin-Yu Chen, Shin-Ming Cheng, and Kwang-
[19]. Marianne Azer, Sherif El-Kassas, Magdy El- Cheng Chen. Optimal control of epidemic
Soudani, “A full of the Wormhole Attack”, information dissemination over networks. IEEE
International Journal of Computer Science and Trans. Cybern., 44(12):2316–2328, December
Information Security, 2009. 2014.
[20]. Kelly Jackson, “Hacker’s Choice: Top Six [32]. Pin-Yu Chen and Shin-Ming Cheng. Sequential
Database Attacks. defense against random intentional attacks in
[21]. Ş. Okul ; M. Ali Aydın,” Security Attacks on IoT complex networks. Phys. Rev. E, 91:022805,
”, International Conference on Computer February 2015.
Science and Engineering (UBMK), IEEE, [33]. Shan C, Hui X, Da L, et al. A Vision of IoT:
Antalya, Turkey, Oct. 2017 Applications, Challenges, and Opportunities
With China Perspective{J}. IEEE Internet of
Things Journal, 1(4), 349-359, 2014
[34]. Pin-Yu Chen and Alfred O. Hero. Assessing and [44]. J. Guo, R. Chen, "A Classification of Trust
safeguarding network resilience to nodal attacks. Computation Models for Service-Oriented
IEEE Commun.Mag., 52(11):138–143,November Internet of Things Systems", IEEE International
2014. Conference on Services Computing (SCC), pp.
[35]. D. Quercia and S. Hailes, “Sybil attacks against 324-331, June 2015.
mobile users: Friends and foes to the rescue,” in [45]. Ie yuan, Xiaoyong li,” A Reliable and
Proc. IEEE IEEE Conf. Comput. Commun. Lightweight Trust Computing Mechanism for
(INFOCOM), 2010, pp. 336–340. IoT Edge Devices Based on Multi-Source
[36]. W. Chang, J. Wu, C. Tan, and F. Li, “Sybil Feedback Information Fusion”, special section
defenses in mobile social networks,” in Proc. on security and trusted computing for industrial
IEEE Conf. Global Commun. (GLOBECOM), internet of things, volume 6, May 16, 2018
2013, pp. 1–6. [46]. P. Porambage, C. Schmitt, P. Kumar, A. Gurtov,
[37]. Pin-Yu Chen and Kwang-Cheng Chen. M. Ylianttila, "Two-phase authentication
Intentional attack and fusion-based defense protocol for wireless sensor networks in
strategy in complex networks. In Proc. IEEE distributed IoT applications", Proc. IEEE
Global Telecommunications Conference Wireless Commun. Netw. Conf. (WCNC), pp.
(GLOBECOM), pages 1–5, December 2011. 2728-2733, Sep. 2014
[38]. Pin-Yu Chen, Shin-Ming Cheng, and Kwang- [47]. E Vasilomanolakis, J Daubert, M Luthra, V
Cheng Chen. Information fusion to defend Gazis, A Wiesmaier, P. Kikiras, "On the Security
intentional attack in internet of things. IEEE and Privacy of Internet of Things Architectures
IoT-J., 1(4):337–348, August 2014. and Systems", 2015 International Workshop on
[39]. J. Tian, W. Zhao, R. Du, and Z. Zhang, “A New Secure Internet of Things (SIoT), pp. 49-57, Sep
Data Fusion Model of Intrusion Detection- 2015
IDSFP,” in Parallel and Distributed Processing [48]. Chen, D., Chang, G. R., Sun, D. W., Li, J. J., Jia.
and Applications, vol. 3758 of Lecture Notes in J., and Wang. X. W.,”TRM-IoT: A Trust
Computer Science, pp. 371–382, Springer Berlin Management Model Based on Fuzzy Reputation
Heidelberg, Berlin, Heidelberg, 2005. for Internet of Things”, Computer Science and
[40]. Martin Osborne and Ariel Rubinstein. A Course Information Systems.,1207-28, October 2010
in Game Theory. MIT, Cambridge, MA, 1999. [49]. Michael Schukat, Pablo Cortijo,” Public key
[41]. S. Sicari, A. Rizzardi, L. A. Grieco, A. Coen- infrastructures and digital certificates for the
Porisini, "Security privacy and trust in Internet Internet of things”, 26th Irish Signals and
of Things: The road ahead", Computer Systems Conference (ISSC),IEEE, Carlow,
Networks, vol. 76, pp. 146-164, Jan. 2015. Ireland, June 2015
[42]. T. Eder, D. Nachtmann, D. Schreckling, "Trust [50]. Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin
and Reputation in the Internet of Things", Yang, "Security and Trust in Digital Rights
Conference Seminar (SS2013) - Real Life Management: A Survey", International Journal
Security (5827HS), Dec. 2013. of Network Security, vol. 9, no. 3, pp. 247-263,
[43]. Z. Yan, P. Zhang, A. V. Vasilakos, "A survey on 2009.
trust management for Internet of Things", [51]. Younggyo Lee, Jeonghee Ahn, Seungjoo Kim,
Journal of Network and Computer Applications, Dongho Won, "A PKI System for Detecting the
vol. 42, pp. 120-134, Jan. 2014. Exposure of a User's Secret Key Public Key
Infrastructure Springer Berlin, Heidelberg", vol. [60]. Borislav S. Đorđević, Slobodan P. Jovanović,
4043, pp. 248-250, June 2006. Valentina V. Timčenko, ” Cloud Computing in
[52]. Yun-kyung Lee, Hong-il Ju, Jee-hye User, Amazon and Microsoft Azure platforms:
authentication mechanism using authentication Performance and service comparison ”, 22nd
server in homnetwork Advanced Telecommunications Forum Telfor
Communication Technology, pp. 504-506, 2006. (TELFOR),IEEE, Belgrade, Serbia, Nov. 2014
[53]. Gianmarco Baldini, Trevor Peirce, Maria Chiara [61]. R. Tudoran, A. Costan, G. Antoniu, L. Bougé, "A
Tallachini, "Internet of Things: IoT Governance performance evaluation of azure and nimbus
European Research Cluster on the Internet of clouds for scientific applications", Proceedings of
Things, Jan. 2014 the 2nd International Workshop on Cloud
[54]. M. Bauer, P. Chartier, K. Moessner, Catalogue of Computing Platforms, pp. 4, 2012.
IoT Naming, Addressing and discovery schemes [62]. R. Giuliano, A. Neri, and D. Valletta, “End-to-
in IERC projects V1.7, IERC-AC2-D1, 2013. end secure connection in heterogeneous
[55]. AS. Wazan, R. Laborde, F. Barrère, A. Benzekri, networks for critical scenarios”, WIFS 2012,
"Validating X. 509 certificates based on their Proc. of the 2012 IEEE Intl. Workshop on
quality", Young Computer Scientists 2008. Information Forensics and Security, pp. 264–
ICYCS 2008. The 9th International Conference 269, Tenerife, Spain.
for IEEE, pp. 2055-2060, November 2008. [63]. Ka-Ping Yee, "Aligning security and usability."
[56]. J. Shannon, H. Melvin, A. G. Ruzzelli, Dynamic IEEE Security & Privacy 2.5, pp 48-55, 2004
flooding time synchronization protocol for [64]. Rebecca E. Grinter, et al., "The work to make a
WSNs, IEEE GLOBECOM, 2012. home network work." ECSCW 2005. Springer
[57]. P. Camion, J. Patarin, "The knapsack hash Netherlands, 2005
function proposed at Crypto'89 can be broken", [65]. A. P. Castellani, M. Gheda, N. Bui, M. Rossi, and
Adv. in Cryptology Proc. Eurocrypt'91, pp. 39- M. Zorzi, "Web Services for the Internet of
53, 1991. Things through CoAP and EXI," in IEEE RWFI,
[58]. Yusuf Perwej, Kashiful H., Uruj J., Sharad S., Kyoto, Japan, Jun. 2011
“Some drastic improvements found in the
analysis of routing protocol for the Bluetooth Cite this article as :
technology using scatternet” International
Conference on Computing, Communications Dr. Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani
and Information Technology Applications Mohamed Hassan, Nikhat Akhtar, "The Internet-of-
(CCITA-2010), Ubiquitous Computing and Things (IoT) Security : A Technological Perspective
Communication Journal (UBICC) Seoul, South and Review ", International Journal of Scientific
Korea, ISSN Online 1992-8424, ISSN Print 1994- Research in Computer Science, Engineering and
4608, Volume CCITA-2010, Number 5, pages Information Technology (IJSRCSEIT), ISSN : 2456-
86-95, 2010 3307, Volume 5 Issue 1, pp. 462-482, January-
[59]. J. Granjal, E. Monteiro, J. Sá Silva, "Security for February 2019. Available at doi :
the Internet of Things: A survey of existing https://doi.org/10.32628/CSEIT195193
protocols and open research issues", IEEE Journal URL : http://ijsrcseit.com/CSEIT195193
Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294-
1312, 3rd Quart. 2015
In online aggressors regularly go for taking such client information. In these situations, malware that can take
card information when they are perused by the gadget has thrived. This framework gives secure micro-
payment and enhances date approaches in terms of security. In proposed system, utilize two principle capacities
PUF (Physical Unclonable Function) and FRoDo(Fraud Resilient Device for Off-Line Micro-Payments). These
two can be given security to installment process and client account. These produce double encryption to
protect the system from attackers. In proposed system gives more security for transaction.
Keywords : Mobile Secure Payment, Architecture, Protocols, Advance Encryption, Fraud-Resilience
CSEIT195199 | Received : 12 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 483-486 ]
483
M. Jalasri et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 483-486
Vendor
FRoDo
Activate the
User
Generate
Private Key For Generate Binary
User Code for Account
FRoDo Login Number
Check Availability
Balance
Request Sent to
Fig. 4. Payment request
PUF
User
User Database User Login Enter the Payment Encrypted Cash
Registration
Amount
Vendor Login
In cryptography, (Advance Encryption Standard)AES
Payment Verification Identity and Coin
Element Verification Cash decryption
is broadly embraced and upheld in both equipment
Waiting for PUF Activate the
View Vendor
Verification Vendor
PUF
has not been discovered practically. A degree of
Fig. 4. Architecture Diagram for secure micro ‘future-proofing’ allowed by AES which has
payment using physical unclonable function. flexibility of key length.
The Rivest-Shamir-Adleman(RSA) public key In any case, similarly with respect to DES, the AES
cryptography algorithm which is used to encrypt a security is guaranteed just in the event that it is
message. The RSA algorithm performs public key effectively actualized and great key administration is
encryption and digital signatures. utilized.
1. Represent the message as a whole number in the
vicinity of 0 and (n-1). Huge messages can be E. PUF PROCESS:
separated into various squares. Each piece would then
be spoken to by a whole number in a similar range. Heart of FRoDO proposal lies a read-once strong
2. Encrypt the message by raising it to the eth physical unclonable function. In fig.5 PUF check
control modulo n. The outcome is a ciphertext vendors details involved in payment and activate the
message C. vendors.
3. To unscramble ciphertext message C, raise it to
another power d modulo n
D. PAYMENT REQUEST
Fig. 5. Puf process
After activation user login into account to gives
payment request in fig. 4. Enter the required In payment verification PUF check both Identity and
payment and Check the availability of payment for Coin Element. After verification payment decrypted
customer requirement. Required amount encrypted using public key and the payment transaction
using key and after payment request goes to PUF completed successfully and whole transaction will be
secure. Finally receives the Private Response, the last [2]. D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk,
step only requires the coin just read to be validated. and S. Devadas, “Extracting secret keys from
Then, the whole payment transaction can be integrated circuits,” IEEE Trans. Very Large Scale
Integr. Syst., vol. 13, no. 10, pp. 1200–1205, Oct.
authorized and committed.
2005.
[3]. G. Hong and J. Bo, “Forensic analysis of skimming
IV. CONCLUSION
devices for credit fraud detection”, 2nd IEEE Int.
Conf. Inf. Financial Eng., Sep. 2010
Security analysis shows proposed system does not [4]. P. Choi and D. K. Kim, “Design of security enhanced
impose trustworthiness assumptions.Further, it is also TPM chipagainst invasive physical attacks”,IEEE Int.
the first solution in the literature where no customer Symp. Circuits Syst., pp. 1787–1790,2012.
device data attacks can be exploited to compromise [5]. W. Chen, G. Hancke, K. Mayes, Y. Lien, and J.-H.
the system This has been accomplished basically by Chiu, “Using 3G network components to enable NFC
utilizing a novel erasable PUF engineering and a mobile transactions and authentication”, IEEE Int.
Conf. Progress Informat. Comput., Dec. 2010, vol. 1,
novel convention outline. Furthermore, our proposal
pp. 441–448.
has been thoroughly discussed and compared against
[6]. V. C. Sekhar and S. Mrudula, “A complete secure
the state of the art. Our investigation demonstrates
customer centric anonymous payment in a digital
that it is the main suggestion that appreciates every ecosystem”, Int. Conf. Comput., Electron. Elect.
one of the properties required to a safe small scale Technol., 2012, pp. 1049–1054.
installment arrangement, while likewise presenting [7]. V. Daza, R. Di Pietro, F. Lombardi, and M. Signorini,
adaptability while thinking about the installment “FORCE: Fully off-line secure credits for mobile
medium (kinds of advanced coins). micro payments”, 11th Int. Conf. Security
Cryptography, 2014, pp. 125–136.
Finally, some open issues have been identified that [8]. S. Golovashych, “The technology of identification
and authentication of financial transactions. from
are left as future work. Specifically, examining the
smart cards to NFC-terminals”, IEEE Intell. Data
likelihood to enable computerized change to be spent
Acquisition Adv. Comput. Syst., Sep. 2005, pp. 407–
over various disconnected exchanges while keeping
412.
up a similar level of security and ease of use. In [9]. Slava Gomzin, “Hacking Point of Sale: Payment
FRoDO, develop to access money without standard Application Secrets, Threats, and Solutions,
coin element. In future, try to enhance the capability Computing & Technology 1st ed. New York, NY,
of the AES algorithm to a generate private key and USA: Wiley, 2014.
create more security for Electronic payments. [10]. Meng-Day Yu, Srinivas Devadas “Secure and robust
Another approach will involve smarter error correction for physical unclonablefunctions”,
implementation of secure offline transfer of money IEEE Design & Test of Computers , vol. 27, no. 1, pp.
48–65, Jan. 2010.
by using PUF.
ABSTRACT
Since few years, a new problem is trying to combine in a single step, compression, encryption and data hiding.
So far, few solutions have been proposed to combine image encryption and compression for example. Nowadays,
a new challenge consists to embed data in encrypted images. Since the entropy of encrypted image is maximal,
the embedding step, considered like noise, is not possible by using standard data hiding algorithms. A new idea
is to apply reversible data hiding algorithms on encrypted images by wishing to remove the embedded data
before the image decryption. Recent reversible data hiding methods have been proposed with high capacity,
but these methods are not applicable on encrypted images. In this paper we propose an analysis of the local
standard deviation of the marked encrypted images in order to remove the embedded data during the
decryption step. We have applied our method on various images, and we show and analyze the obtained results.
Keywords: Standard Data Hiding, Embedding Images
CSEIT1951102 | Received : 12 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 487-490 ]
487
V. Santhi et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 487-490
extraction the image quality should be maintained Reversible data hiding is a technique to embed
just like the original image. But the image which is additional message into some distortion-unacceptable
obtained contains some distortions. With regards to cover media, such as military or medical images, with
distortion in image, Kalker and Williams established a eversible way so that the novel cover content can
a rate-distortion copy for RDH, through which they be perfectly restored after extraction of the hidden
showed the rate-distortion bounds of RDH for message. As an effective and popular means for
without memory covers and proposed a recursive privacy fortification, encryption changes the ordinary
code development which, however, does not move signal into incomprehensible data, so that the general
towards the bound. Another promising strategy for signal processing typically takes place before
RDH is histogram shift (HS), in which the space is encryption or after decryption.
saved where data can be embedded by shifting the
bins of histogram of gray values. In this process, the However, in some circumstances that a content
embedding of data is done in three steps. Step1. The owner does not trust the supplier, the ability to
histogram is drawn. Step2. The peak point is taken influence the encrypted data when maintaining the
into consideration. Step3. The whole image is plain content secret is needed. When the secret data
scanned row by row. After these steps, the image is to be broadcasted are encrypted, a supplier without
scanned again. If the greyscale value 154 is any information of the cryptographic key may
encountered, then the embedded data sequence is compress the encrypted data due to the limited
checked & we get the marked image. Finally, the data channel resource. Some attempts on RDH in
extraction is done. To get the original quality of the encrypted images have been made. Zhang divided the
cover, the process of histogram shift is applied again. encrypted image into numerous blocks. By spinning
The original cover is then obtained back. Basically, LSBs of the half of pixels in every block, space can be
data hiding is the process to hide the data into some created for the embedded bit. The data extraction and
covering media i.e. it is the concatenation of two image recovery proceed by finding which part has
blocks of data, first is the embedding data & second is been spinned in one block. This process can be
the covering media. But in most of the cases the grasped with the help of spatial correlation in
covering media gets distorted after the data is decrypted image.
embedded & the covering media is not inverted back
to its original form after data is removed from it. Hong et al. ameliorated Zhang’s method at the
Some reversible data hiding methods use the concept decryption side by further making use of the spatial
of differential expansion transform which is based on correlation using a different estimation equation and
haar wavelet transform. Another concept used is the side match method to gain much lower error rate.
histogram shift. The differential expansion is the These two methods explained above rely on spatial
difference between two neighbouring pixels for correlation of original image to extract data. That is,
hiding one bit of data. In this process, the histograms the encrypted image should be decrypted first before
are drawn first. Then the peak values are taken into data extraction.
consideration. Then two peak values are considered
& difference is calculated. Then according to the Zhang et al. recovered the recursive code
result the bit by bit data is embedded into the image. development for binary covers and proved that this
In this way the distortion analysis is done & it is development can gain the rate-distortion bound as
helpful to remove the distortion in the covering long as the compacting algorithm reaches entropy,
media & to get the original cover back. which launches the correspondence between data
People are always looking around’ when vacationing Furthermore there may be some services which are
for the cheapest venues for celebration’s and arrange not provided by the wedding hall owner, so for that
bookings in advance to guarantee their stay for the the user has to inquiry and get there services from a
period of their celebration. However these activities third party, such services can be like decoration of
generally require individuals to do the bulk of the hall, orchestra, photographer etc. So in he proposed
search and booking. This is not only time consuming system we aim to gather the entire venue for all types
exercise, but can be frustrating and costly as well. of function and also the services. By this user will
have much more options under one roof.
The objective of the system is to reserve a venue for
functions, parties, weddings, meetings etc., user can
CSEIT1951118 | Received : 12 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 491-494 ]
491
Shruti N. Ghule et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 491-494
II. LITERATURE SURVEY people are viewing it and more and more people are
queuing.
“LARS: A Location-Aware Recommender System”
authored by Justin J. Levandoski ,Mohamed Sarwat, In [4] the author tells about Position based Services
Ahmed Eldawy, Mohamed F. Mokbel contains a which offers many benefits to the mobile consumers
position alert recommender structure that uses to recover the information about their current
position-based ratings to generate references. LARS position and manner that data to get more useful
achieves Customer rating positions through user information near to their position. With the help of
partitioning, a technique that influences GPS in phones and through Net Services using GPRS,
recommendations with ratings spatially close to Position based Facilities can be fulfilled on Android
querying users in a manner that maximizes system based smart phones to provide these value-added
scalability while not sacrificing recommendation services like handset profiling, scheduling alarms.
quality. Position based services are a general class of
computer program level services used to include
“Position Detection and Tracking System” published specific controls for position and time data as control
by Mahesh Kadibagil, and Dr. H S Guruprasad features in computer programs.
proposed a Self-directed location recognition and
tracking method which enhances the correctness of III. PROPOSED
finding friends and family member’s locations by
using GPS and typical web technology. This design The main aim of the proposed concept is to develop a
includes a mobile client, a repository, a web client web application that will allow the user to search and
and a map service. The mobile user is used to book the menu. The application should be able to
discover location and conduct a notification SMS to provide a platform for venues providers to showcase
user when his/her friends or family members come their services. There should be the options for
nearby the user’s zone of path. This location material disbursing auto discount for existing customers. The
can be sent to the server and the same information application should provide details of all booked
can be achieved and observed using the web venues with dates and user can query if they want to.
consumer by other customers. Following fig1. shows work flow VBS which has two
parts service provider (venue owner) and second is
In [3] the author wants to convey that with user having their own functionality of booking venue
the hasty improvement of Internet, people's day-to- or registering the venue.
day life has basically been attached from the Internet.
After the Internet, without resolution, whether
entities or industries, both clients and industrialists,
are made on the network of expectation, this new
expectation is to get through the network of the
greatest things the inexpensive, most practical to find
the fastest information, the most money-making
products to sell up. As people's lives are getting better,
it comes with many lifestyle changes. As the film are Fig1. Work Flow of VBS
still the same and has not changed predilections and
as more and more film are churned out more an more
• Admin
Admin can add, update the categories in which a
venue will be added. He/ She can manage all the
functionality related to user and venue owner.
The admin acts as a intermediate between this
two modules.
• Booking
The booking module will handle the booking
functionality also it manages all functions related
to the enquiries of different venues and
availability of dates according to bookings.
Fig 2. DFD for Customer • Category
Above data flow diagram(DFD) i.e. fig2 will show This module will used to saving the categories
how user can interact with the application by sign in, from admin module. It contains different
sign up, searching venues etc. categories related to venues which can be decided
by venue owner according to his / her venue.
• Discount
This module will handle the functionality related
with discount. It provides discounts to the
existing user which will decided by venue owner.
• Gateway
This is the dummy implementation of gateway
for payments. It would be the full payment to
owner or some amount of down payment.
• Messages
This will used for showing and storing the
Fig 3. DFD for Venue Owner inquiry messages. This is basically act as enquiry
Fig3 will show how venue owner can interact with section where user can ask their inquiries related
the application by registering their venues and to venues.
provide various services as per their venue. • User
The user module will provide functionality for
This application will consists of following modules. signup and login etc. This will be customer
1) Admin Module section.
2) Booking Module • Venue
3) Category Module The venue module will used for showing and
4) Discount Module managing the venues which are registered and
5) Payment Gateway their information and services provided by venue
6) Inquiry Module owner.
7) Customer Module • DAO
8) Venue Owner Module Data access object will used for managing the
Following information shows functionality of database connectivity
different modules.
The proposed system will be implanted as a web Pages 196-199 July 16-17, 2011 IEEEComputer
based application on J2EE platform of Java with Society Washington, DC, USA ©2011 ISBN:978-
MySQL as database. 0-7695-4443-4 10.1109/ISCCS.2011.61
[4]. VEDANG MOHOLKAR,PRATHAMESH
Thus we have been able to design a venue booking HULE,MANDAR KHULE,SUMIT SAURABH
system and have been able to carry on partial computer department,pvpit,pune,India
implementation as. “AUTOMATED LOCATION BASED
SERVICES”, International Journal of Advanced
IV. CONCLUSION Research in Computer Science and Software
Engineering, Volume 4, Issue 2, February 2014
In this paper we discuss about managing different ISSN: 2277 128 X.
venues according to user need. It helps user to book
venues as per their requirements. It can be different Cite this article as :
halls, lawns, meeting rooms etc. The user can show
their interest by booking venues. This application Shruti N. Ghule, Harish M. Mohurle, Akshay P.
will overcome the problem of previous system in Shegaonkar, Zeba Parvin Abdual Saleem, Pradhnya S.
which all the work were done manually. It gives Borkar, "A Review : Venue Booking System",
better results by booking venues directly without International Journal of Scientific Research in
visiting the venue. Computer Science, Engineering and Information
Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
V. REFERENCES 5 Issue 1, pp. 491-494, January-February 2019.
Available at doi :
[1]. Justin J. Levandoski ; Mohamed Sarwat ; Ahmed https://doi.org/10.32628/CSEIT1951118
Eldawy ; Mohamed F. Mokbel “LARS: A Journal URL : http://ijsrcseit.com/CSEIT1951118
Location-Aware Recommender System” ICDE
'12 Proceedings of the 2012 IEEE 28th
International Conference on Data Engineering
Pages 450-461 April 01 - 05, 2012 IEEE
Computer Society Washington, DC, USA ©2012
ISBN: 978-0-7695-4747-3 10.1109/ICDE.2012.54
[2]. MAHESH KADIBAGIL PG SCHOLAR, DEPT.
OF ISE, DR. H S GURUPRASAD PROFESSOR
AND HEAD, DEPT. OF CSE, BMSCE,
BANGALORE, INDIA POSITION DETECTION
AND TRACKING SYSTEM IRACST -
International Journal of Computer Science and
Information Technology & Security (IJCSITS),
Vol. 4, No. 3,June 2014
[3]. BO HANG “DESIGN AND IMPLEMENTATION
OF CINEMA ONLINE BOOKING SYSTEM”,
ISCCS ‘ 11 Proceedings of the 2011 International
Symposium on Computer Science and Society,
Ordinarily, in our city, we see that the garbage bins or dustbins put at open spots are over-burden. It makes
unhygienic conditions for individuals just as grotesqueness to that place leaving a terrible stench. To dodge
every single such circumstance we are going to execute a venture called IoT Based Smart Garbage and Waste
Collection Bins. As the populace is expanding step by step, the earth ought to be spotless and sterile. In a large
portion of the urban areas, the flooded garbage bins are making an unhygienic situation. This will additionally
prompt the emerging of various kinds of maladies. This will corrupt the way of life. To beat these circumstances
a productive savvy squanders collection framework must be created. As the extent of IoT is creating step by
step successful techniques can be discovered effectively. Different plans were proposed and have points of
interest just as drawbacks. This paper is a review dependent on Smart Waste Collection System dependent on
IoT.
Keywords : Internet of Things, Smart Garbage Monitoring, Smart City, Microcontroller
CSEIT1951103 | Received : 13 Feb 2019 | Accepted : 25 Feb 2019 | January-February -2019 [ 5 (1) : 495-500 ]
495
Himanshu Gupta et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 495-500
Things a suitable alternative for a decent number of developing and populated urban communities as it
urban communities. contains contaminants which result in flimsiness,
issue and uneasiness to the biological system.
The board of waste is a major testing issue in urban Numbness and absence of neatness are ruining nature.
regions for the greater part of the nations all through The correct waste expulsion and the executives are
the world and is seen in a large portion of the incredibly viable to improve the wellbeing and
creating nations than in the created nations. A prosperity of the city's populace.
productive administration of waste is a prerequisite
for keeping up a perfect and green condition as there The primary objective of this paper is to take a shot at
is increment in a wide range of squanders tossed by natural issues because of ill-advised waste transfer
numerous spots like mechanical, agrarian, home and unravel them for better wellbeing and
waste, and so on. Squander collection and reusing is cleanliness of the general population. The proposed
done through different innovations. Collection of framework fits into the classification of IoT
data is huge and unwieldy. The present development connected to outer and open situations and it satisfies
in country with vast local location and an interest for the accompanying essential prerequisites of IoT
modernization in the city makes a testing administrations:
undertaking for waste administration individuals [5].
• Unwavering quality: Communication is crucial in
India especially creates around 1, 33,760 tons of IoT for administration provisioning, connected to
Municipal strong waste (MSW) the executives every the outside and open condition. Dependable and
day, of which roughly 91,152 tones are gathered, and solid correspondence is required arranged by
a colossal entirety of cash is spent on collection [6]. completing correspondence between gadgets as
World waste generation is relied upon to be roughly this sort of IoT has an extensive administration
27 billion tons for each year by 2050, 33% of which space. Consequently, the receptacle utilized in
will originate from Asia, with significant the proposed framework associated with one
commitments from China and India [7]. Squander age another, in light of a remote work arranges
in urban regions of India will be 0.7 kg per individual (WMN), giving dependability.
every day in 2025, around four to multiple times • Portability: IOT gadgets might be required to
higher than in 1999 [8]. move in the external environment. The proposed
framework works with a battery rather than the
II. MOTIVATION AND BACKGROUND changeless power source, bringing about an
extraordinary dimension of versatility. The
In the previous history, since the human populace versatility of the framework is secured with a
thickness and dimensions of misuse of characteristic power-based power supply.
assets were less, the measure of strong waste created • Administration Continuity: Data communications
was noteworthy. Be that as it may, the expansion in and administrations ought to be directed
the populace in this day and age has expanded the flawlessly whenever and any area in IoT with an
garbage. To keep nature spotless and solid, there is a extensive administration space. Bins are situated
necessity of legitimate garbage transfer. Inappropriate at the customary space of separation to guarantee
garbage transfer raises contamination, medical the administration progression.
problems, different dangers and in result it influences • Client Convenience: The presentation of IoT has
nature. Contamination extremely influences the improved client comfort. For client facilitate, the
proposed framework lessens the method postpone Another technique [10], there are different
the time of the existing garbage gathering dustbins situated all through the city or the Campus.
frameworks, which empowers clients to set free These dustbins are furnished with ease implanted
their garbage without a long pause and auspicious gadget which helps in following the dimension of the
end of filled bins. garbage bins and a one of a kind ID will be
• Vitality Efficiency: IoT connected to outer and accommodated each dustbin in the city so it is
open conditions depends on a dependable on the anything but difficult to recognize which garbage
framework and requires versatility, causing a lot container is full. The undertaking module is isolated
of vitality utilization. To take care of this issue, into two sections Transmitter area and recipient
the sensors work utilizing vitality proficient segment. Here in the transmitter segment we are
procedures, expanding their battery lifetimes. utilizing 8051 microcontrollers, RF Transmitter and
sensors these are appended to the dustbin. Where
III. LITERATURE REVIEW
sensor is utilized to identify the dimension in the
dustbin whether the dustbin is full or void.
The garbage the executives in urban communities
must be successfully and productively actualized. The
Another strategy [11] is that, when the garbage
different recommendations were advanced and some
achieves the edge level ultrasonic sensor will trigger
of them effectively actualized. Be that as it may, it
the GSM modem which will constantly alarm the
can't be considered as a powerful one. Therefore, an
required expert until the garbage in the dustbin is
overview was done among various proposition and
squashed. When the dustbin is squashed, individuals
this review paper incorporates study among various
can reuse the dustbin. At customary interims dustbin
strategies for Waste Collection System dependent on
will be squashed. In this strategy, GSM 900A modem
IoT.
is utilized to send the messages.
framework utilizes ultrasonic sensors put over the partition from wrong dimension estimation and are
bins to identify the garbage level and contrast it and interfaced with the microcontroller.
the garbage bins profundity. The framework makes
utilization of AVR family microcontroller, LCD To distinguish awful stench a gas sensor is set at the
screen, Wi-Fi modem for sending information and a base of the dustbin and is adjacent to interfaced with
signal. the controller to remember it off the waste filled in
the dustbin. The two sensors send the signs to the
In paper [15] guarantees the cleaning of dustbins controller. Arduino accumulates information gotten
soon when the garbage level achieves its most by the gatherer and trade nearby page through the
extreme. In his administration framework IOT as the Ethernet shield.
working in the field for arranged radio-recurrence
distinguishing proof (RFID), following the collection
vehicle, Dustbin observing and other developing
detecting advancements.
ABSTRACT
India is an agricultural country. Agriculture is the important contributor to the Indian economy. There are
many classification techniques like Support Vector Machine(SVM), LADTree, Naïve Bayes, Bayesnet, K Nearest
Neighbour(KNN), Locally Weighted Learning(LWL) on rice crop production datasets. They have some
drawbacks like low accuracy and more errors. To achieve more significant result, To increase classification
accuracy and reducing classification errors, our research uses classification method Bayesnet based adaboost
will be proposed in work. Rice crop yield depend on environment’s parameters like Rainfall, minimum
temperature, average temperature, Maximum temperature, Vapour Pressure, potential evapotranspiration,
reference crop evapotranspiration, cloud cover, wet day frequency for the kharif season. our dataset containing
these environmental parameters for accurate prediction of Rice crop yield.
Keywords : AdaBoost Technique, BayesNet Classifier, Rice Crop Yield Prediction, Kharif Season
CSEIT1951122 | Received : 15 Feb 2019 | Accepted : 26 Feb 2019 | January-February -2019 [ 5 (1) : 501-507]
501
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
crop cultivation data and weather data using data Regression AdaBoost (Adaptive Boosting), Support
mining methods[14]. Vector Machine Regression and a Modified
Nonlinear Regression (MNR) equation and then
There are many classification techniques like Support comparing the modified equation with the other
Vector Machine(SVM), Naïve Bayes, BayesNet, K three methods to check its accuracy For Aus and
NearestNeighbour (KNN), Locally Weighted Boro Rice our modified Nonlinear Regression
Learning(LWL), LAD Tree are applied on rice crop equation not only yields better RMSE, MSE and MAE
production datasets. The provision of accurate and values, it also has the highest Rsquare value, which
timely information can assist farmers to make the proves that the MNR equation is the best fit for this
best decision for their cropping situations This could study. this study also proves that weather conditions
benefit them to attain greater crop productivity[42]. play very vital role in predicting the yield. In [2],
This study examines the application of machine author used classifiers for research are J48, LWL,
learning for the prediction of rice crop yield. The LAD Tree and IBK. The experimental results showed
current study use the most rice producing that J48, LADTree achieved the highest accuracy,
states(Haryana, Punjab, Tamilnadu, Andhra Pradesh, sensitivity and specificity. In [3], author used
Bihar). The dataset parameters are state name, district classifiers were BayesNet and NaiveBayes. The results
name, crop year, Rainfall, minimum temperature, showed that the performance of BayesNet was much
average temperature, maximum temperature, vapour better compared with NaiveBayes for the dataset. In
pressure, reference opevapo transpiration, [4], proposed approach builds a model to predict the
Potential evapotranspiration, diurnal temperature weather parameters applying Neural Networks, then
range, area, production, yield, class. The dataset was estimates the rice yields applying Support Vector
then sorted on the basis of yield to classify the Regression. In [5], The authors have used pre-
records in to low, moderate and high. The low yield processed data that was clustered using k-means
was from 0. 1 to 1 tonnes/hectare, moderate from 1 to clustering algorithm. The association rule mining
2 tonnes/hectare and high from 2 to 5 process will apply on clustered data to find the rules.
tonnes/hectare. The training phase ends with number of generated
rules. In the testing phase, the yield value is predicted
The further document is as follows. In Section 2 based on the generated rules. The parameters
(Literature Survey), the literature review done on considered for research were precipitation, minimum
Rice Crop Yield Prediction, Bayesnet Method, temperature, reference crop evapotranspiration
AdaBoost method and Rice Crop. In Section 3 average temperature, maximum temperature.
(Conclusion) conclusion derived based on literature production, area and yield for the Kharif season
survey. including months from June to November.
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
502
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
November) for the years 1998 to 2002. In this Nigeria. The climate data used was for a period of 36
research WEKA tool is used. A Multilayer Perceptron years from 1980 to 2015. This study[14] describes the
Neural Network was implemented as ANN. Cross role of data mining in Agriculture and crop yield
validation method was used to validate data. In [8], prediction. This paper also describes Groundnut crop
The proposed method uses yield and weather data yield prediction analysis and Naive Bayes Method.
collected from United States Department of This Study [15] describes multi-model heterogeneous
Agriculture. The parameters in the dataset are rainfall, ensemble approach. This study [16] examine the
humidity, temperature, yield and. regression-based introduction about Bayesian network, Directed
algorithms to predict the crop yield. These were acyclic graph, Conditional Probability table. This
multivariate polynomial regression, support vector study [17] examine various data mining classification,
machine regression and random forest. support clustering and association rule mining technique.
vector machine regression to obtain the best possible This study [18] examine detail information about
results for predicting the crop yield. In [9], The naïve bayes classification technique. This study [19]
prominent classification methods in this study are the examine Bayesian network classification technique,
Support VectorMachine(SVM) and Naive Bayes. In structure learning technique, parameter learning
this paper, AdaSVM and AdaNaive are the proposed technique. This study[20] examine various adaptive
ensemble model use to project the crop production Learning Algorithms for Bayesian Network Classifiers.
over a period of time. This ensemble model is This study[21] examine Bayesian Network Classifiers
compared with Naive Bayes and SVM methods. in Weka. This study[22] examine the introduction
accuracy and the classification error are two about bayesian approach to Probability and Statistics.
parameters used for output predictions. The finding This study[23] examine bayesian method for
yields that AdaSVM and AdaNaive are agreeable than constructing probabilistic networks from databases.
SVM and Naive Bayes for the data set analyzed. In they focus on constructing Bayesian belief networks.
this study[10], regression based adaptive boosting This study[24] examine the overview of rice crop
prediction model is presented, There are three coastal yield prediction. Examines Different data mining
districts belonging to Odisha are located in India techniques utilized for foreseeing rice crop yield. In
using the datasets of Rabi and Kharif seasons. This this study[25], there is overview of rice crop yield
study experiments on weak regressors, such as: SVR prediction. This paper Examines Different data
regression, linear, lasso, ridge proposes strong mining techniques utilized for foreseeing rice crop
predictors by avoiding the shortcomingss of yield. In this study[26], rice yield prediction is
individual weak regressors. In [11] study examines performed by back propagation algorithm. In this
the variations of climate variables and rice yield and study[27], there is Comparative Study of
examines the relationships using multiple linear Classification Algorithms for Forecasting Rainfall.
regression, principal component analysis, and support This study[28] examine Modeling Rainfall Prediction
vector machine (SVM) analysis in southwest Nigeria. Using Data Mining Method: A Bayesian Approach
In this study[12], Adaptive boosting of weak data mining method for modeling rainfall prediction.
regressors for forecasting of crop production In [29], Rice Crop Yield Forecasting of Tropical Wet
considering climatic variability. In this study[13] and Dry Climatic Zone of India using data mining
examines the variations of climate variables and rice Techniques is applied. For data set results show that
yield and quantifies the relationships using multiple J48 and LADTree achieved the highest accuracy,
linear regression, principal component analysis, and sensitivity and specificity. Classification by LWL
support vector machine (SVM) analysis in southwest classifier displayed the lowest accuracy, sensitivity
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
503
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
and specificity results. In [30], This study presents an Accuracy is highest in case of Soybean. A study by
analysis using data mining techniques for estimating [37] has applied association rules for Tamilnadu. Rice
the future yield prediction in tea cultivation with crop yield predicted using regression analysis,
climatic change trends observed in last 30 years experiment implemented in MATLAB tool. Yield
(1977-2006). The patterns of crop production in predicted from Annual Rainfall, Area under
response to the climatic (rainfall, temperature, Cultivation, and Food Price Index. Relationship
relative humidity, evaporation and sunshine) effect established between AR, AUC and FPI[38]. A study
across the four tea growing regions (South Bank, [39] described literature review in tabular form. Some
North Bank, Upper Assam and Cachar) of Assam research study only summarized the data mining
were developed using Multiple Linear Regression techniques for crop yield prediction. Support Vector
(MLR) technique. Machine, Random Forest, Neural Network, REPTree,
Bagging, Bayes algorithm described in the study [40].
The tea production estimation equations developed These classifiers used for Soybean Crop Yield
for the regions were validated for the future yield Prediction and results are compared. Bagging
prediction (2007, 2009 and 2010) and were found to algorithm gives maximum accuracy for soybean crop
be significant. yield prediction among REPTree, Random Forest,
Neural Network, SMO classifiers. Bayesian modelling
A study by [31] has done Crop Yield Prediction of used for wheat crop yield prediction using small
Wheat Using Fuzzy C Means Clustering and Neural dataset[41]. A study also identified drought related
Network. A research work [32] has implemented agronomic factors that significantly affect the
artificial neural networks (ANNs) for predicting crop variation in the rain fed wheat yield and relative
yields for an agricultural region in Nepal. In research, importance of these factors.
Agricultural data was collected from paddy field
cultivation in the Siraha district, an eastern region in Applications
Nepal. climatic parameters are rainfall, maximum
temperature and minimum temperature, fertilizer use Predicts crop yield production of rice for most Rice
were also used as input values. The result shows that producing states, India.
the trained neural network produced a minimum Predicting productivity of crop in various climatic
error. In [33] researcher has implemented neural conditions can help farmer and other partners in
networks for rice yield prediction in mountainous essential basic leadership as far as agronomy and
regions. A study by [34] reaching review of research product decision. It also helps to increase the yield of
devoted to applications of machine learning in crop.
agrarian generation frameworks. The review reports
the application of machine learning techniques with III. PERFORMANCE EVALUATION METRICS
artificial neural networks, Bayesian networks,
support vector machines and k-means. In [35], Accuracy: It is defined as the overall success rate of
researchers predict Rice Production in Phimai the classifier.
District, Thailand Decision Support System Using Accuracy = (TP + TN) / (TP + FP + FN + TN).
Artificial Neural Network. A study by [36] Where, True Positive (TP) depicts the number of
implemented C 4. 5 Algorithm to predict yield of instances where system detects for condition when it
crops like paddy, maize, wheat, soybean. Interactive is really present[1].
web pages developed for crop yield prediction.
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
504
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
505
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
506
Kolin Sukhadia, M. B. Chaudhari Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 501-507
[28]. V. B. Nikam and B. B. Meshram, "Modeling [36]. Veenadhari, B. Misra, and C. D. Singh, "Machine
Rainfall Prediction Using Data Mining Method: A learning approach for forecasting crop yield based
Bayesian Approach", Fifth International on climatic parameters, " 2014 Int. Conf. Comput.
Conference on Computational Intelligence, Commun. Informatics Ushering Technol.
Modelling and Simulation, Seoul, 2013, pp. 132- Tomorrow, Today, ICCCI 2014, pp. 1-5, 2014.
136. [37]. E. Manjula, S. Djodiltachoumy, ” A Model for
[29]. Niketa Gandhi, Leisa J. Armstrong, “Rice Crop Prediction of Crop Yield”, International Journal
Yield Forecasting of Tropical Wet and Dry of Computational Intelligence and Informatics,
Climatic Zone of India using data mining Vol. 6: No. 4, March 2017, pp.298-305.
Techniques”, 2016 IEEE International Conference [38]. Sellam and E. Poovammal, "Prediction of Crop
on Advances in Computer Applications (ICACA) Yield using Regression Analysis, " vol. 9, no.
[30]. Rupanjali D. Baruah, R.M. Bhagat, Sudipta Roy, October, 2016.
L.N. Sethi, ”Use of Data Mining Technique for [39]. B. H. Dhivya, R. Manjula, S. B. S, and R.
Prediction of Tea Yield in the Face of Climate Madhumathi, "A Survey on Crop Yield Prediction
Change of Assam, India”, 2016 International based on Agricultural Data, " pp. 4177-4183, 2017.
Conference on Information Technology, pp. 265- [40]. Savla and A. Mandholia, "Survey of classification
269. algorithms for formulating yield prediction
[31]. Akanksha Verma, Aman Jatain, Shalini Bajaj, ” accuracy in precision agriculture, " 2015.
Crop Yield Prediction of Wheat Using Fuzzy C [41]. Yildirak, Z. Kalaylioglu, and A. Mermer,
Means Clustering and Neural Network”, "Bayesian estimation of crop yield function :
International Journal of Applied Engineering drought based wheat prediction model for tigem
Research ISSN 0973-4562 Volume 13, Number 11 farms, " Environ. Ecol. Stat., vol. 22, no. 4, pp.
(2018) pp. 9816-9821. 693-704, 2015.
[32]. Tirtha Ranjeet, Leisa Armstrong, ” An Artificial [42]. Mrs. K. E. Eswari, Ms. L.Vinitha, ” Crop Yield
Neural Network for Predicting Crops Yield in Prediction in Tamil Nadu using Baysian
Nepal”, Proceedings of AFITA 2014 - Copyright Network”, International Journal of Intellectual
ASICTA Inc, pp. 376-386. Advancements and Research in Engineering
[33]. B. J I , Y. SUN, S.YANG, J. WAN1, ” Artificial Computations, Volume-6, Issue-2, pp.1572-1576.
neural networks for rice yield prediction in [43]. Niketa Gandhi, Owaiz Petkar, Leisa J. Armstrong,
mountainous regions”, Journal of Agricultural "Rice Crop Yield Prediction Using Artificial
Science (2007), pp. 249–261. Neural Networks", 2016 IEEE International
[34]. Ankita Bissa, Meena Kushwaha , Mayank Patel, Conference on Technological Innovations in ICT
”A Survey of Machine Learning Appliacations In For Agriculture and Rural Development (TIAR
Decision Making To Improve Farming”, 2016), pp.105-110
International Journal of Computer Sciences and
Engineering, Vol.-6, Issue-9, Sept. 2018, pp. 669- Cite this article as : Kolin Sukhadia, M. B. Chaudhari, "A
683. Survey on Rice Crop Yield Prediction in India Using
[35]. Saisunee Jabjone, Sura Wannasang, ” Decision Improved Classification Technique ", International Journal
Support System Using Artificial Neural Network of Scientific Research in Computer Science, Engineering
and Information Technology (IJSRCSEIT), ISSN : 2456-
to Predict Rice Production in Phimai District,
3307, Volume 5 Issue 1, pp. 501-507, January-February
Thailand”, International Journal of Computer and
2019.
Electrical Engineering, Vol. 6, No. 2, April 2014,
Available at doi : https://doi.org/10.32628/CSEIT1951122
pp. 162-166.
Journal URL : http://ijsrcseit.com/CSEIT1951122
Volume 5, Issue 1, January-February-2019 | http:// ijsrcseit.com | UGC Approved Journal [Journal No : 64718]
507
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2019 IJSRCSEIT | Volume 5 | Issue 1 | ISSN : 2456-3307
DOI : 10.32628/CSEIT1951131
The Safe System (SS) approach to road safety emphasizes safety-by-design through ensuring safe vehicles, road
networks, and road users. With a strong motivation from the World Health Organization (WHO), this
approach is increasingly adopted worldwide. Considerations in SS, however, are made for the medium-to-long
term. Our interest in this work is to complement the approach with a short-to-medium term dynamic
assessment of road safety. Toward this end, we introduce a novel, cost-effective Internet of Things (IoT)
architecture that facilitates the realization of a robust and dynamic computational core in assessing the safety of
a road network and its elements. In doing so, we discuss about the various existing mechanisms for road safety.
Keywords : Internet of Things, Smartphone, Road Safety, Arduino, G-Sensor, Accelerometer
CSEIT1951131 | Received : 01 Feb 2019 | Accepted : 16 Feb 2019 | January-February -2019 [ 5 (1) : 508-513 ]
508
Chandrashekhar Rathod et al. Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 508-513
vehicles in no honking zone–controlling unwanted cushioned impact at a speed of more than 30 km/h,
disturbances in horn prohibited zone such as with lower speeds resulting in either death or serious
hospitals, public libraries ,courts, schools, etc., injury [1, 2]. The objective of the SS approach is that
the three model elements should be designed and
The Safe System (SS) approach to transport networks monitored to proactively prevent deadly speeds from
originated with the “Safe Road Transport System” happening and allow for a reduced emergency
model developed by the Swedish Transport Agency. response time in the event of an accident.
In its essence, the approach migrates from the view
that accidents are largely and automatically the Elements of the SS approach are as follows.
driver’s fault to a view that identifies and evaluates
the true causes for accidents. Through the (1) Safe Vehicle. Emphasis on vehicle safety is
categorization of safety into the safety of three verified through mandated regulatory testing and
elements (vehicle, road, and road user), SS minimizes rating, as well as technologies such as electronic
fatalities and injuries by controlling speeds and stability control. Beyond this, enforced checks (e.g.,
facilitating prompt emergency response. The model upon license renewals) combined with on the road
has been widely adopted since its introduction and is reporting work to review the status of vehicle safety.
currently motivated by the WHO as a basis for road
safety planning, policy-making, and enforcement. (2) Safe Road. The assessment of road (or road
network) safety is multifaceted. Road inspection
enables clear and direct observation of the state of the
road and assesses the need for repairs or
modifications. The structure of the road network is
amenable to safety assessment through partitioning
into what is called “Traffic Analysis Zones (TAZs)”
[4]. In addition, considerations for crash data and
other supporting data offer further insights into
general safety assessment.
such characterization rises substantially as the Anto bennet et al., [13] had proposed that a review
findings of crash report analysis in cities typically on an Embedded System in Passenger Car for Road
note a critical dependence on either driver behavior Safety using GPS and GSM.GPS Receiver gets the
or driver awareness [8]. A great need is further location information from satellite in the form of
established in these studies for innovative latitude and longitude. The system can be
mechanisms to instill safe driving at the licensing and interconnected with the alcohol detection and alert
post-licensing stages. the owner on his mobile phone.
II. LITERATURE REVIEW Anto bennet et al., [14] had proposed that a review
on Alcohol Detection and Accident Avoidance Using
Pramodshelke et al. [9] had proposed that a review on locking With Tracking. This system will detect
Arduino Based embedded System in Car for Road drunker driver by alcohol sensor through driver
Safety using RFID .In this work when the RFID tag is breathe fitted on steering in front of driver ,the
detected by the RFID reader the speed of the motor message is sent to the police through GSM system
reduces in specified areas and it avoids accidents. and provides GPS base system to track those cars.
Ch . Sonali Shankar et al., [10] had proposed that a III. RELATED WORK
review on Arduino based Embedded System in
Passenger Car for Road Safety .In this work the sound Many countries around the world ban the use of
of the horn stops and speed is also reduced when the hand-held devices while driving, including the
RFID tag is detected by the RFID reader. United States, Canada, Germany, Israel, Greece,
Norway, and more. While smartphones can be a
Deepa et al., [11] had proposed that a review on dangerous distraction, correct use of cell phone apps
Embedded System in Passenger Car for Road can reduce risk and promote safer driving behavior.
Safety.in this work the proposed features are Apps used with hands-free devices can monitor
automatic collision notification that gives notification distractions, protect young drivers, call for help when
to the victim’s relative, red light traffic control makes needed, and prevent speeding. Following are few Top
sure the vehicle doesn’t break signal, speed control Road Safety Apps.
alters speed in different zones, horn control prevents
honking in horn prohibited zone, alcohol detection Kruzr – Driving Assistant for Distracted Driving
detects drunk driving and vehicle security is used to Kruzr Road Safety App Kruzr is a free android-based
prevent theft Suhas Katkar et al., [12] had proposed app that detects when you’re driving and
that a review on An Embedded System In passenger automatically screens incoming calls and messages.
Car For Road Safety. This project is designed to Kruzr tells senders you’re on the road and will
inform about an accident or theft that has occurred to respond later. Don’t worry, you won’t miss critical
the vehicle, to the family members of the travelling calls. Kruzr automatic driving assistant allows urgent
persons and concerned authorities. Anto bennet et al., calls to proceed, while less important calls and
had proposed that a review on An Embedded System messages can be retrieved later.
in Passenger Car for Road Safety using GPS and GSM.
This work is designed to inform about an accident Safely Home – Detects Accidents
that is occurred to a vehicle to the family members of Safety Home Road Safety App Safely Home is a free
the travelling persons. Android app that automatically detects road accidents
without any human intervention. If you’re in an such as “Driving right now, will get back to you
accident, the app notifies your emergency contacts. shortly”.
Safely Home includes a “Save a Life” feature to help
injured accident victims get help quickly. The app Fleetsafer
also provides traffic updates, and GPS-guided Fleetsafer is aimed at employers who want to reduce
Roadside Assistance for mechanical problems. the risk of employee liability for accidents on the job.
The app appears on company-issued tablets and
Drive Mode: Safe Driving App smartphones. It detects the driving state and
Drive Mode Road Safety app Drive Mode is an automatically puts the device into safe mode. Only
Android app that includes a voice-control option for emergency calls may be made.
streamlined interfacing with your favorite
applications, as well as simple swipe or tap MamaBear
functionality. With Drive Mode voice control, MamaBear Family Safety is a free app for Android
drivers can easily access navigation, music and and Apple devices. Recognized as the “Best Parenting
messaging apps. App” in 2017 by Mumi Family Awards, MamaBear
Drive Mode can be setup to launch when you start provides parental alerts for speeding, and provides
driving. The app will ignore calls and messages in GPS locations for young drivers. MamaBear also
“Do Not Disturb” mode, send text message auto allows parents to monitor their child’s text messages,
replies, or you can choose to reply to calls and social media, and arrival and departure times at
messages using seamless voice commands, and much locations away from home.
more.
Drive Safely Pro Road Safety App
AT&T DriveMode The DriveSafe.ly app is designed to prevent distracted
ATT Road Safety App driving accidents by providing hands-free access to
AT&T Drive Mode is a free app for Android and emails and text messages. Powered by a text-to-
Apple users and is available on all carriers. This app speech program, Drive Safe.ly Pro converts messages
silences incoming messages when the GPS detects in 27 languages. The app reads text messages and
you are driving 15mph or faster, and turns off when emails aloud in real time, allowing drivers to keep
you drop below 15 mph for two or three minutes. It their hands on the wheel and eyes on the road.
offers you a list of up to five contacts you can call
hands-free. Parents of young drivers can receive In this system, various sensors such as soil moisture,
alerts if the app is turned off. AT&T Drive Mode is DHT11 sensors are connected to the input pins of
also available in Spanish. arduino microcontroller. The sensed values from the
sensors are displayed in LCD. If the sensed value goes
iBolt Dock’n Drive beyond the threshold values set in the program, the
iBolt Road Safety App The iBOLT Dock’n Drive app pump will be automatically switched ON/OFF by the
requires the use of an iBolt docking station. This relay circuit and it is connected to the driver circuit
Android-based app provides automated answering of which helps to switch the voltage. The farmer will be
incoming calls. The “It Can Wait” feature places intimated about the current field condition through
incoming text messages on hold while the phone is GSM module and also updated in the web page. By
docked. Messages are delivered to the phone when using this system, the farmer can access the details
it’s not docked. You can set the auto reply message, about the condition of the field anywhere at any time.
ABSTRACT
Being a developing issue, plagiarism is commonly described as literature theft and academic dishonest nature in
the writing, and it must be avoided and adhere to the moral standards. Plagiarism occur in scholastics, paper
publication, music, work of art developing quickly, so the recognizing plagiarism is essential. While the most
recent couple of year’s plagiarism detection tools have been utilized predominantly in research conditions,
refined plagiarism programming and instruments are presently quickly rising. In this paper, we give an outline
of various plagiarism programming and apparatuses to take care of the plagiarism issue. We propose an element
classification conspire that can be utilized to examine plagiarism discovery programming and plagiarism
recognition instruments. This plan depends on the product's general qualities, devices qualities, and apparatuses
property.
Keywords : Plagiarism Detection, Plagiarism Types, Plagiarism Techniques, Plagiarism Algorithms
CSEIT1951129 | Received : 15 Feb 2019 | Accepted : 26 Feb 2019 | January-February -2019 [ 5 (1) : 514-518 ]
514
Kedar Bhujade et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 514-518
plagiarism on these reports was distinguished and institutions such as Ohio University, Umass Boston
the results were checked. and Trinity College Dublin.
assignment at the same time during the last 12 years. document is mark as plagiarism document and
This has made the instructors to give careful similarity percentage is calculated.
consideration on finding the plagiarism. In this way,
they constructed a discovery device for plagiarism.
This device had the full range of tools to help
administrator to manage the work of the research
facility. To quantify the similarities between two
assignments, they used four comparability criteria.
was shown how the problem of plagiarism can be Plagiarism in Programming Assignments,” IEEE
addressed using different techniques and tools. In this Transactions on Education, vol. 51, no. 2, pp.
paper, we have seen that different software and tools 174-183, 2008.
are available to check plagiarism. Comparison of [7]. Hermann M., Frank K., and Bilal Z.,
software and tools has shown that they still have no “Plagiarism -A Survey,” Universal Computer
software and tool that can detect that the document Science, vol. 12, no. 8, pp. 1050-1084, 2006.
has been plagiarized at 100 percent, since each [8]. Jinan F., Alkhanjari Z., Mohammed S., and
software and tool has advantages and limitations Alhinai R., “Designing a Portlet for Plagiarism
according to the features and performance described Detections within a Campus Portal,” Journal of
in the table. However, this software has limitations, Science, vol. 1, no. 1, pp. 83-88, 2005.
tools that have a significant impact on the success of [9]. Nathaniel G., Maria P., and Yiu N., “Nowhere
plagiarism detection. We also presented our proposed to Hide: Finding Plagiarized Documents Based
to the detection of plagiarism. on Sentence Similarity,” in Proceedings of
IEEE/WIC/ACM
[10]. International Conference on Web Intelligence
VI. REFERENCES and Intelligent Agent Technology, NSW, pp.
690-696, 2008.
[1]. P. OGR, “What is Plagiarism?”, [On Line]
http://www.plagiarism.org/,Retrieved Nov. 15, Cite this article as :
2010
[2]. C. Lyon, R. Barrett, and J. Malcolm, “Plagiarism Kedar Bhujade, Tushar Bhandirge, Rohan
is Easy, but also easy to detect.” Cross- Khobragade, Saurabh Shelare, Jayprakash Shukla,
Disciplinary Studies in Plagiarism, Fabrication, Prof. R. S. Thakur , "Review on Various Tools and
and Falsification, 2006. Techniques for Plagiarism Detection", International
[3]. L. Romans, G. Vita, and G. Janis, “Computer- Journal of Scientific Research in Computer Science,
based plagiarism detection methods and tools: Engineering and Information Technology
an overview,” the 2007 international (IJSRCSEIT), ISSN : 2456-3307, Volume 5 Issue 1, pp.
conference on Computer systems and 514-518, January-February 2019.
technologies. 2007, ACM: Bulgaria. Journal URL : http://ijsrcseit.com/CSEIT1951129
[4]. S. Mann and Z. Frew, “Similarity and
originality in code: plagiarism and normal
variation in student assignments,” the 8th
Australian conference on computing education,
2006.
[5]. Allan K., Kevin A., and Bruce B., “An
Automated System for Plagiarism Detection
Using the Internet,” in Proceedings of World
Conference on Educational Multimedia,
Hypermedia and Telecommunications,
Chesapeake, pp. 3619-3625, 2004.
[6]. Francisco R., Antonio G., Santiago R., Jose L.,
Pedraza M., and Manuel N., “Detection of
Face recognition has now become one of the interesting fields of research and has received a substantial
attention of researchers from all over the world. Face recognition techniques has been mostly used in the
discipline of image analysis, image processing, etc. One of the face recognition techniques is used to develop a
face recognition system to detect a human face in an image. In face recognition system a digital image with a
human face is given as an input which extracts the significant features of face such as (eyes, nose, chin, cheeks,
etc) to recognize a face in a digital image which is an exhausting task. Security of information is very salient
feature and is difficult to achieve. Security cameras are present in offices, universities, banks, ATMs, etc. All
these security cameras are embedded with face recognition systems. There are various algorithms which are
used to solve this problem. This paper provides an overview of various techniques which are often used for this
face recognition in a face recognition system. This paper is divided into five parts, first section concludes
various face detection techniques, second section describes about image processing ,third section have details
about face recognition techniques, fourth section describes various classification methods and last section
concludes all of these sections.
Keywords : Face Recognition, Face Detection, Features Extraction, Pre-Processing
CSEIT1951116 | Received : 15 Feb 2019 | Accepted : 27 Feb 2019 | January-February -2019 [ 5 (1) : 519-525 ]
519
Payal Maken Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 519-525
Face recognition system basically consists of Each year new techniques are developing for this
following blocks: purpose.
B. Facial detection
It basically means locating a face in a given image.
C. Image processing
Images are cropped to avoid facial image remains and
Figure 2. Detecting a face in an image
images are converted into black and white and then
There are number of techniques for detecting a face
to gray images.
in an image.
D. Facial recognition
1. Voila Jones face detection
It means to extract the features of a face (eyes, nose,
This technique was given by Paul Viola and Michael
etc) and make a template of it.
Jones. It is also known as haar cascade algorithm, this
E. Verification algorithm detect a face in an image on the basis of
System recognizes a given individual and gives a various features like eyes, nose, upper body, lower
decision. body. A system is designed by giving input some faces
and some non-faces and training a classifier. This
F. Validation
classifier is known as haar cascade classifier. Now a
In this system compares a given individual face with
cascade classifier is something that tells what we have
faces in the database to identify a given face.
to look in an image for detecting a face. For example,
if we are distinguishing whether a person is
overweight or not, then weight is the feature that is
to be considered not their age or skin color [1]. So we
basically train a classifier to detect a face. The data is
Figure1. Block diagram of face recognition system then stored in a file in the system. By referring to
Figure 1 shows the block diagram of face recognition that trained data one can detect a face.
system. Nevertheless ample work has been done on This algorithm includes following:
face recognition problem, but still not any work is up • Haar features
to the mark for the implementation point of view. • Integral image
b. Integral image
In an integral image the value at pixel (x, y) is the
sum of pixels above and to the left of (x, y).
C. Face recognition
Face recognition primarily means extracting the
features from face i.e. eyes, nose, chin, etc. Various
techniques which are used for this purpose are
following:
4. Filtering or smoothing
Filtering or smoothing is done to enhance the quality
of the image by the removal of the noise (blurring,
poor resolution, etc) from the image.
Median filter: Filtering set the value of Figure 10. Face images to Eigen faces
the output pixel as the median of all the In Eigenfaces the first principal component shows the
neighborhood pixels that is taken as input. Other most dominant feature of the dataset and each
filters replace the pixels values by mean and succeeding component in turn shows the next
average value: dominant component.
a. Take the median value of pixels in a window in
the neighborhood.
Median= sort all the pixels in an increasing
order, take the middle one.
b. Replace the pixel value with the median value.
To reduce the calculations that are needed for finding separable and produces the good results even under
the principal components, the dimensionality of the varying illumination conditions and images with
original dataset is reduced before they are calculated. different poses and expressions.
Since each preceding components how less features
and more noise, only few first principal components
are selected and rest of the last are discarded.
D. Verification/Validation
Verification and validation is the process of
Figure13. Weighted sum of Eigen faces recognizing an individual.
So, PCA reduces the number of values (from M to K) 1. Distance-wise classification
needed to recognize a face.
Once the features are extracted from face recognition
2. Linear Discriminant Analysis or Fisher Faces techniques, it is then to classify whether the test face
LDA is also known as Fisher faces. LDA is derived belongs to the training set or not. It is done by
from Fisher’s Linear Discriminant (FLD) technique. It measuring the distance between the training dataset
is considered as a classical technique in pattern and the image. If the distance is minimum, the test
recognition. It is used to find a linear combination of image is verified and the person is recognized.
features which separate two or more classes into 2. K-Nearest neighbor
objects [5]. Data is assumed to be uniformly
In this method, nearest neighbor is searched, and if
distributed in each class. It is used to convert the
maximum number of neighbors belongs to one class,
training samples into bases vectors. Linear
we can classify test image to that class. With
combination that is obtained using FLD is known as
increases k value, the classification rate decreases.
Fisher faces while in PCA it is known as Eigen faces.
LDA is preferred over PCA because it groups the 3. Neural Networks
classes into projected faces that can be linearly
It is mostly used because of its similarities with the [4]. A. Sengupta and P. Mondal, “Estimating The
human brain. Neural networks make the mapping of Age Of Human Face In Image Processing Using
the images with the person’s expressions. Matlab,” vol. 4, no. 3, pp. 10899–10902, 2015.
[5]. M. N. S. Zainudin et al., “Face Recognition
III. CONCLUSION using Principle Component Analysis ( PCA )
and Linear Discriminant Analysis ( LDA ),” no.
The research in face recognition has been an exciting 05, 2012.
area and it will keep attracting many engineers and
scientists for many years in this field. In this paper Cite this article as :
different techniques that can be used in face
recognition are discussed. It also gives the whole Payal Maken, "An Elementary Study on Various
concept of face recognition system. According to this Techniques Involved in Face Recognition Systems : A
literature survey, Viola Jones gives real time Review", International Journal of Scientific Research
performance for face detection. Skin detection in Computer Science, Engineering and Information
technique also works well. Image preprocessing is Technology (IJSRCSEIT), ISSN : 2456-3307, Volume
necessary to reduce the noise from the images and to 5 Issue 1, pp. 519-525, January-February 2019.
give better recognition rate. PCA and LDA works Available at doi :
better for features extraction. Among PCA and ICA, https://doi.org/10.32628/CSEIT1951116
ICA uses high order statistics. Neural networks, k- Journal URL : http://ijsrcseit.com/CSEIT1951116
nearest neighbor techniques and Distance-wise
classification methods are used for further
recognition and classification. Combining all these
techniques, a face recognition application or system
can be developed.
IV. REFERENCES
E Return Tool
Pooja Aher*, Manish Kirnapure, Shubhangi Nemade, Tejaswita Shrivastava, Lulkaran Chohale
Department of computer science and Engineering, Priyadarshini J.L. College of Engineering, Nagpur,
Maharashtra, India
ABSTRACT
Every organization has need to pay salary to their employees, this work is done every month. Each and every
organization has to maintain the record monthly for future use. Now a day as we know the countries goes
become digit so this work is also performed digitally. This project E RETURN TOOL involves everything
regarding to employee payment and related to salary tax. This also includes delivering of taxes to the
government and also keep track of employee payments. This tool will facilitate to the employers to pre-validate
the ECR and also carry out amendments in the ECR file before uploading on Unified Portal. The return tool has
member wise details of wages and the contributions including basic details for the new and existing members’
return Tools also maintain the record of EPF member. Employer can check monthly or yearly details of every
EPF member. When a company hires its first employee it started its e return tool. In the United States, every
new employee must be reported to the state along with a completed W-4 tax form. The W-4 determines how
many allowances the employee qualifies for when calculating the federal income tax that should be withheld
from each check. Generally, the employee has to pay income tax depending upon their dependents.
Keywords : E Return Tool, ECR, EPF, EPFO, SME
CSEIT1951132 | Received : 15 Feb 2019 | Accepted : 28 Feb 2019 | January-February -2019 [ 5 (1) : 526-530 ]
526
Pooja Aher et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 526-530
II. METHODS AND MATERIAL Form 5 are mandatory. In case a member has exited,
you can enter the date of exit and in such case the
E Return Tool software does a lot of the heavy lifting reason for exit will become mandatory. There are
of salary management for you. Like outsourced some additional details which also can be filled up.
payroll services, this software requires very little These details may become helpful later when
input from the employer, just employee wage member applies for claim. However, they are not
information and days. All of the tricky calculations mandatory.
and withholdings are calculated by the software,
which receives automatic updates every time tax laws D. Salary Information
are changed. The software can also fill out
This module taking the input from employer like
employment tax forms for you and remind you when
number of days and rate. Basis of that input it
to file them.
calculate the employee deduction and stored their
record in database
Module
E. Summery:
A. Registration:
This screen after the entry of the Return Month takes
Registration is first module that is authentication to
you to the actual data entry/upload screen for the
user means in Registration module software create
monthly return. This screen also displays the
the username and password
summary, account wise and month wise of the
already entered/uploaded wage details. In this
B. Log-in:
complete summery will be recorded in the form of
This is the screen where you have to enter your user A/c 1, A/c 2, A/c 10, A/c 21, A/c 22, Month, Year and
id and password for login. You have come here after total. The screen will ask you to enter in the Return
selecting an added establishment from the earlier Month and Return Year fields.
screen. The screen at top shows the Establishment ID
you have selected. In case you have selected a wrong F. Monthly Return:
establishment from the list, if multiple establishments
In this module EPF details is recorded and the based
have been added, please click BACK instead of login.
on this details EPF return fill in Unified Portal. This
It will take you back to the first screen for selecting
screen is to be used for entry of wages for each
the correct establishment.
member for a month.
b. Report:
i. Form 5:
In this module Form 5 is generated between pf range
or between Joining date. Form 5 is nothing but the
complete basic information of employee.
ABSTRACT
Gas leakage is a major problem in the industrial sector, in residential locations etc. One of the preventive
methods to stop the incident related to the gas leak is to install a gas leak detection kit at vulnerable locations.
The goal of this paper is to propose a system that can detect, alert and automatically control gas leaks. In
particular, a gas sensor has been used which has a high sensitivity to gases such as propane and butane together
with LPG. There is an alarm that is triggered once the LPG has been detected. The gas leakage system consists
of a Wi-Fi module that alerts the user by sending an SMS message.
Keywords : LPG gas, IoT (Internet of Things)
CSEIT1951128 | Received : 15 Feb 2019 | Accepted : 28 Feb 2019 | January-February -2019 [ 5 (1) : 531-534 ]
531
Prof. Pranay Meshram et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 531-534
tell the consumer by sending text messages to the Arduino is an open-source electronics platform based
registered mobile phone and informing people in on easy-to-use hardware and software. It
your home by activating the alarm including the has 14 digital input/output pins (of which 6 can be
alarm and the message display the message on the used as PWM outputs), 6 analog inputs, a 16 MHz
LCD screen to take required action. quartz crystal, a USB connection, a power jack, an
ICSP header and a reset button. Arduino boards are
WHAT IS IoT? able to read inputs - light on a sensor and turn it into
an output - turning on an LED, activating buzzer and
From homes and industries to enterprises, Internet
WiFi module for sending SMS. You can tell your
of Things have become commonplace in all walks of
board what to do by sending a set of instructions to
life. Connecting everything and everyone, IoT is
the microcontroller on the board. To do so you use
making the world smarter and better than ever
the Arduino programming language (based
before. However, this is just the beginning.
on Wiring), and the Arduino Software (IDE), based
Unlocking the full potential of Internet of Things
on Processing.
requires that businesses understand the
opportunities for value creation and systematically
Gas Sensor (Mq5) :
address the underlying challenges.
Generally, semiconductor sensors are used to detect
Internet of Things (IoT) is an ecosystem of connected LPG gas. MQ5 semiconductor sensor is used in this
physical objects that are accessible through the system. Sensitive material of MQ-5 gas sensor is SnO2,
internet. The ‘thing’ in IoT could be a person with a which with lower conductivity in clean air. When
heart monitor or an automobile with built-in-sensors, the target combustible gas exist. The sensor
i.e. objects that have been assigned an IP address and conductivity increases along with the rising gas
have the ability to collect and transfer data over a concentration. MQ-5 gas sensor has high sensitivity
network without manual assistance or intervention. to Propane, Butane and LPG, also response to Natural
The embedded technology in the objects helps them gas. The sensor could be used to detect different
to interact with internal states or the external combustible gas, especially Methane; it is with low
environment, which in turn affects the decisions cost and suitable for different application. The MQ-5
taken. Devices and objects with built in sensors are can detect gas concentrations anywhere from 200 to
connected to an Internet of Things platform, which 10000 ppm. The sensor's output is an analog
integrates data from the different devices and applies resistance.
analytics to share the most valuable information with
applications built to address specific needs. WI-FI Module :
The WI-FI technology is radio wireless networking
These powerful IoT platforms can pinpoint exactly technology. It is mainly used for communication
what information is useful and what can safely be purpose. In this project, the WI-FI system is used to
ignored. This information can be used to detect communicate with the user. When the gas leakage
patterns, make recommendations, and detect possible occurs, the microcontroller stops the leakage and
problems before they occur. alerts the surroundings. Then, the information about
the leakage has to be informed to the user. For this
II. METHODS AND MATERIAL purpose, WIFI is used. Using WI-FI, a warning is sent
to the user. The method of communication is
Arduino Kit : asynchronous serial communication. The
corresponding code has to be loaded into the is connected to the Arduino kit. As soon as the gas
microcontroller, to which WI-FI is connected. level has exceeded this threshold value, the LED
lights up and the system warns the environment by
Buzzer: sending out a sound that is issued by the buzzer. At
It most commonly consists of a number of switches or the same time, the sound is sent via a WiFi module to
sensors connected to a control unit that determines if the user's mobile phone in order to inform the user of
and which button was pushed or a preset time has the loss. The user can avoid dangerous events such as
lapsed, and usually illuminates a light on the fire with the help of an exhaust fan.
appropriate button or control panel, and sounds a
warning in the form of a continuous or intermittent SYSTEM SENSO INDICATI FEATURE
buzzing or beeping sound. R ON
ARM Based MQ-6 Inform GSM
III. LITERATURE SURVEY Gas through Module is
Monitoring SMS used to
To overcome the issue of LPG leakage, many system System notify the
has been propossed. Gas leak detection is the process user
of identifying potentially hazardous gas leaks by Hazardous MQ- LCD Detects the
means of various sensors [2]. Several designs of LPG gas detection 4,MQ-7 Displays concentrati
detection and alert system have been proposed in the using arduino on
literature. Apeh et al. designed kitchen gas leakage Gas leakage MQ-2 Wireless Sends the
detection and automatic gas shut off system [3]. detector built Module informatio
T.Soundaryaet al. presented the cylinder LPG gas on n through
leakage detection system [4]. Wireless and GSM microcontroll wireless
technology [5] based gas detectors have also been ers module
proposed. This paper presents a LPG leakage IOT Based Electron Through Customer
detection and alert system to avoid fire accidents and real time ic sensor Social can check
to provide house safety. monitoring media the
gas detection previous
IV. PROPOSED SYSTEM system data and
determine
The proposed system uses the Arduino kit with an at which
integrated microcontroller. This Arduino kit forms condition
the core of our proposed system. Arduino is emergency
connected to other components that complement the occurred
system. These components are the MQ5 sensor, the
Gas leakage MQ-5 Through Notify the
LED light, the buzzer and the WiFi module. The
detection and buzzers and user
system uses an MQ5 gas sensor to detect LP gas. A
monitoring alarms through
threshold value (180 ppm for the proposed system) is
using IoT alarms
set in the MQ5 sensor. The sensor continuously
detects the surrounding atmosphere. For this
continuous air evaluation, the 5V power supply is
supplied to the Arduino via an AC adapter. A buzzer
in April 2013.
[5] Online Monitoring of Green House Gas
Leakage inIndustries Angel College of
Engineering and Technology, Tirupur, Tamil
Nadu, India. In DecJan, 2014.
[6] Development of Movable Gas Tanker Leakage
Detection Using Embedded System
Mr.S.B.Patil, Dr.A.J.Patil Dec 2012.
VI. REFERENCES
ABSTRACT
The computer networks are exposed to increasingly safety threats. With new kinds of attacks appearing usually,
growing flexible and adaptive protection-oriented strategies is a severe undertaking. In this context, anomaly-
primarily based community intrusion detection techniques are a precious era to guard target structures and
networks in opposition to malicious sports. Threats the internets are posing higher threat on IDS safety of
statistics. The primary concept is to utilize auditing programs to extract an in-depth set of capabilities that
describe each network connection or host session and practice statistics mining applications to learn rules that
correctly capture the behavior of intrusions and normal activities. Now Intrusion Detection has end up the
priority and on the crucial assignment of statistics protection administrators. A device deployed in a network is
at risk of numerous assaults and desires to be blanketed towards assaults. Intrusion detection machine is a
necessity of these days’ information safety area. It performs a vital function in detection of anomalous site
visitors in a community and indicators the network administrators to manage such visitors. The painting
supplied in this thesis is an attempt to locate such visitor’s anomalies in the networks through generating and
reading the site visitors float information.
Keywords : IDS (Intrusion Detection System), HIDS (Host Based Intrusion Detection System), ML (Machine
Learning), NIDS(Network Based Intrusion Detection System)
CSEIT1951141 | Received : 20 Feb 2019 | Accepted : 28 Feb 2019 | January-February -2019 [ 5 (1) : 535-545 ]
535
Mohammad Asif et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 535-545
IDS product becomes launched in 1991, with a ✓ It must impose a minimal overhead at the
relative handful emerging within the subsequent half system wherein it is walking; with a view to no
of dozen years. Then, inside the remaining couple of longer intervene with its ordinary operation.
years, the sphere underwent explosive increase. Even ✓ It needs to be capable of being configured in
after the obvious failure of numerous early releases, step with the security policies of the gadget this
there nevertheless remains at the least seventeen is being monitored.
extant products that claim to provide powerful ✓ It ought to be able to adapt to changes in device
intrusion detection in a networked environment. and person conduct over the years (e.g., new
Given this recent growth, and the reported improved applications being mounted, customers
utility of corporate assets to these products [1, 2, and converting from one hobby to another or new
3], the time has come for a complete assessment of assets being to be had those purpose
the subject. modifications in gadget aid utilization patterns).
✓ Anomalies are deviations from everyday
Intrusion detection structures try to discover laptop consumer behavior. Misuses, alternatively, are
misuse. Misuse is the overall performance of an recognized patterns of attack [5]. at the same
motion that isn't always favored by the machine time as misuse styles are frequently easier to
proprietor; one that doesn't comply with the device’s process and locate, it is frequently the paradox
ideal use and/or security coverage. IDSs mechanically patterns with a purpose to help to discover
examine online person hobby for forbidden (i.e., problems. As misuses are recognized styles of
invalid) and anomalous (i.e., strange, inconsistent) assault, the detection machine tends to fail
conduct. they're primarily based on the speculation whilst novel assault techniques are
that monitoring and reading community implemented. Detection of anomaly patterns is
transmissions, machine audit information, software computationally pricey due to the overhead of
audit data, device configuration, facts files, and keeping track of, and possibly updating several
different information can locate misuse. This record machine profile metrics, because it need to be
encompasses widespread portions of information, tailor-made gadget to device, and every now
effective analysis calls for detection1 specialized and and then even used to a person, due to the
constantly honed expertise, and at the least close to reality conduct styles and gadget usage vary
real-time of misuse is frequently important. significantly.
In [4], the subsequent characteristics are identified as ✓ Different IDSs had been designed to do
suited for IDS: dispensed collection and analysis of records. A
✓ It needs to run constantly with minimal human hierarchical device is defined in [6], and [7]
supervision. describes a cooperative gadget without a central
✓ It has to be fault tolerant in the sense that it has authority. these structures clear up maximum
to be capable of recover from gadget crashes, of the problems mentioned except for the
both unintended or because of malicious reconfiguration or adding skills to the IDS,
activity. Upon startup, the IDS have to be which aren't described in either of the 2
capable of recovering its previous country and designs.
resume its operation unaffected.
✓ The boom of the net has added excellent
✓ It ought to face up to subversion. The IDS need
benefits to society at the identical time the
to be able to screen itself and stumble on if it's
growing attacks on the IT Infrastructure are
been modified by way of an attacker.
getting an increasing number of serious issues The growth of Internet has brought great benefits to
and wishes to be addressed. Together with the the society at the same time the growing attacks on
growth of the internet, attacks also are growing the IT Infrastructure are becoming an increasingly
in parallel. serious issue and needs to be addressed. Along with
✓ Host-based intrusion detection system pursuits the growth of Internet attacks are also growing in
at detecting the intrusions at the host stage. parallel. In earlier days, the attacker should have a
They function in my opinion at each host of the good knowledge about the target infrastructure and
community. Consequently, they are able to knowledge on the Network, Operating Systems &
operate on distinctive type and quantity of Applications. Whereas today there are lots of open
records on the equal time. The host-based tools available in the Internet which can trigger
machine is dependent on the host operating automated attacks.
system. Any vulnerability inside the host-
primarily based OS can weaken the integrity of
the host-primarily based.
of Petya the usage of Eternal Blue exploit and this consideration as the collection deviation from
was aimed to create disruption alternatively to normal profile sequence. thus, this device works
generate income. [9] offline the use of previously accrued information
and implements the view desk set of rules for
We located that there are many benefits of gaining knowledge of software profiles significantly.
C4.5algorithms for special attacks occurs on your Duan et al. [12] have concentrated on identifying
dataset and C4.5 will detect the R2L and U2R compromised machines which can be recruited to
attacks and the neural network is the use of for hit upon junk mail zombies. An method SPOT is
detecting the DOS and Probe attacks and many proposed to experiment sequentially outgoing
greater. In this, we are the usage of four algorithms. messages by means of enforcing SPRT (Sequential
The primary one is okay-manner clustering and the possibility Ratio check). This method quick
second steps are fuzzy good judgment 1/3 steps are estimates whether a number is compromised or not.
SVM and the remaining and very last step is C4.5. figuring out compromised machines using malware
The blessings of all this set of rules are to detect the contamination device is said via Bot hunter [13].
assaults from the datasets. After that, it will
examine it with the SVM and C4.5 classifiers to This machine has massive no of steps that allow
find out how many attacks are coming about in the intrusion detection alarms correlation caused using
dataset at the same time as transferring the dataset inbound visitors with outgoing message trade
from supply to destination. [8] sample consequences. Bot Sniffer [14] explained in
his paintings approximately compromised device
This center also evolved a subsequent-era traits which might be a uniform temporal-spatial
mechanism which includes audit profiles of conduct for detecting zombies. This approach
person’s and may monitor the modern-day identifies zombies by using combining flows based
reputation of the consumer, if any change takes totally on server connections and searching flows
place with person’s hobby as compared with audit with comparable conduct respectively. Kumar and
profile of person then it will generate an alarm. Goyal [15] have explained implements genetic
algorithms in dataset training to categories the
Haystack [10] later developed a framework to labels that are smurf attacked and achieves a low
estimate an intrusion detection approach based false high-quality ratio of 0.2%. in addition,
totally on person and anomaly strategies. Six paintings were completed through Abdullah [16]
varieties of intrusion have been detected and and co-people elaborated intrusion detection class
people include the masquerade assaults, malicious regulations using genetic algorithms. Intrusion
use, leakage, carrier denial, the unauthorized detection policies the usage of genetic algorithms
consumer’s wreck-ins try, and get admission to becomes also the have a look at made through
control of a protection system. The source fire Ojugo et al. [17]. This approach uses health
developed suggests a community-based intrusion characteristic for estimating the rules. system
detection and prevention mechanism referred to as learning strategies are also applied to hit upon the
snicker machine that is an open supply. Forrest [11] intrusion. current device mastering strategies
in 1996 created an ordinary profile based on (artificial Neural Networks - ANN) for intrusion
studying the call sequences between intrusion detection was described by way of Roshani group
detection and protection in opposition to a human [18]. Gaikwad et al [19] added a technique based on
machine. An assault on this device is taken into fuzzy clustering and ANN approach.
algorithm of data mining class methods. Those is k- placed into the space. These points denote the
means primary group centroids.
2. The data are assigned to the group that is
K-means Clustering Algorithm: - adjacent to
the centroid.
Clustering, primarily based on distance 3. The positions of all the K centroids are
measurements carried out on items, and classifying recalculated
gadgets (invasions) into clusters. not like type, as soon as all the data are assigned.
classification because there may be no information 4. Repeat steps 2 and 3 until the centroid
about the label of studying statistics is an unattended unchanged.
getting to know system. For anomalous detection, we
will use welding and in-intensity evaluation to guide This consequence within the partition of facts into
the identity model. Dimension of distance or groups. The preprocessed dataset partition is
similarity performs a critical function in collecting achieved the usage of the ok-means set of rules
observations into homogeneous corporations. with k value as 5. due to the fact we have the
dataset that contains regular and 4 assault
Jacquard affinity size, the longest not unusual order categories which include DoS, Probe, U2R, R2L.
scale (LCS), is vital that the occasion is to evoke the
scale to decide if regular or odd. Euclidean distance is
about two vectors X and Y in space Euclidean n-
dimensions, the size of the distance widely used for
vector area. Euclidean distance can be defined
because the rectangular root of the whole difference
of the same vector dimension. Subsequently,
grouping and category algorithms want to be
[15] Goyal, A. and Kumar, C. .GA-NIDS: A Genetic for detecting network intrusion and misuse.
Algorithm based Network Intrusion Detection Computers and Security, 12(3):235-248, May
System, Electrical Engineering and Computer 1993.
Science, North West University, Technical [23] S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan,
Report;2008.Feb. 2008. L. T. Heberlein, C. Ho, K. N. Levitt, B.
[16] Abdullah, B., Abd-algafar I., Salama G. I. and Mukherjee, S. E. Smaha, T. Grance, D. M. Teal,
Abd-alhafez A. Performance Evaluation of a and D. Mansur. DIDS (Distributed Intrusion
Genetic Algorithm BasedApproach to Network Detection System) - Motivation, Architecture,
Intrusion Detection System, Proceedings of and an early Prototype. In Proceedings of the
13th International Conference on Aerospace 14th National Computer Security Conference,
Sciences andAviation Technology (ASAT-13), pages 167-176, October 1991.
Military Technical College, Cairo, Egypt, [24] Biswanath Mukherjee, Todd L. Heberlein, and
2009;1-5. Karl N. Levitt. Network intrusion detection.
[17] Ojugo, A. A., Eboka, A. O., Okanta, O. E., Yora, IEEE Network, 8(3):26-41, May/June 1994.
R. E. and Aghware, F. O.Genetic Algorithm [25] Thomas H. Ptacek and Timothy N. Newsham.
Rule-Based IntrusionDetection System Insertion, evasion, and denial of service:
(GAIDS), Journal of Emerging Trends in Eluding network intrusion detection. Technical
Computing and Information Sciences, report, Secure Networks, Inc., January 1998.
3(8);2012; 1182 – 1194. [26] S. Staniford-Chen, S. Cheung, R. Crawford, M.
[18] Roshani Gaidhane, Vaidya, C. and Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee,
Raghuwanshi, M. Survey.Learning Techniques R. Yip, and D. Zerkle. GrIDS: A graph based
for Intrusion Detection System intrusion detection system for large networks.
(IDS),International Journal of Advance In Proceedings of the 19th National
Foundation and Research in Computer Information Systems Security Conference,
(IJAFRC) Feb 2014. ISSN 2348 – 4853, volume 1, pages 361-370. National Institute of
2014;1(2). Standards and Technology, October 1996.
[19] Gaikwad, Sonali Jagtap, D.P. Kunal Thakare [27] Gregory B. White, Eric A. Fisch, and Udo W.
and Vaishali Budhawant. Anomaly Based Pooch. Cooperating security managers: A peer
Intrusion Detection System UsingArtificial based intrusion detection system. IEEE
Neural Network and fuzzy clustering., Network, pages 20-23, January/February 1996.
International Journal of Engineering Research [28] Review Paper on Shallow Learning and Deep
& Technology (IJERT), ISSN:2278-0181, Learning Methods for Network security Afzal
November- 2012; 1(9). Ahmad1*, Mohammad Asif2, Shaikh Rohan Ali
[20] L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, 3 (page: -52) 2018
J. Wood, and D. Wolber. A Network [29] Youssef Ahmed and Ahmed Emam, “Network
SecurityMonitor. In Proceedings of the IEEE Intrusion Detection Using Data Mining and
Symposium on Research in Security and Network Behavior Analysis”, International
Privacy, May 1990. Journal of Computer Science & Information
[21] R. Heady, G. Luger, A. Maccabe, and M. Technology (IJCSIT) Vol 3, No 6, Dec 2011.
Servilla. The Architecture of a Network Level [30] X. Wu, V.Kumar, Ross Quinlan, Joydeep
Intrusion Detection System. Technical report, Ghosh, Qiang Yang, Hiroshi Motoda, Geoffrey
University of New Mexico, Department of J. McLachlan, Angus Ng, Bing Liu, Philip S. Yu,
Computer Science, August 1990. Zhi-Hua Zhou, Michael Steinbach, David J.
[22] Judith Hochberg, Kathleen Jackson, Cathy Hand, and Dan Steinberg, “Top 10 algorithms
Stallings, J. F. McClary, David DuBois, and in data mining”, Survey Paper(2008).
Josephine Ford. NADIR: An automated system
Authors Profile
Deep Learning is one of the active analysis topic obtaining a great deal of analysis attention recently. This
increase in analysis interest is driven by several area as that are being worked on like machine-based reality
finding, good over-seeing, sensory activity recognition, online learning, world of advertisement, text analysis
and so on. Videos have specific characteristics that make their method unique. Visual aesthetic typically:
Remember what they see, understand and learn rather than what they hear. This paper principally emphasizes
deep learning on basics of automatic video aesthetic assessments.
Keywords : Video Aesthetics, Preprocessing Techniques, Feature Extraction, Deep Learning, Applications.
CSEIT1951100 | Received : 20 Feb 2019 | Accepted : 28 Feb 2019 | January-February -2019 [ 5 (1) : 546-554 ]
546
Manish Bendale et al Int J Sci Res CSE & IT. January-February-2019 ; 5(1) : 546-554
Deep learning is a part of machine learning Aesthetics assessment is a subjective field [4] because
technology which has ability to learn and mimic the individual preferences differ according to personal
working principal of human brain. To mimic the taste too, thus what may be pleasing to one person
brain working structure the deep learning technology may not be pleasing to the other. Therefore different
required more number of datasets [3]. communities define aesthetics differently, based on
psychological and emotional aspects [8].
There is a different types of media aesthetics visions,
video aesthetics is one of the aesthetics, due to the
increasing in the popularization of high quality smart
phones, the videos and image aesthetics are in great
demands. In the current market the videos are
playing important role in various fields like,
advertisement, video conferencing, industrial
representation etc. Previous works done using
machine learning approaches, also called as
handcrafted method in which, feature extraction 2.3 Comparisons of Deep Learning with previous
were a common ways and methods for aesthetic method about Video Aesthetic Assessment
analysis. CNN is recently used method to solve
critical and complex problems as state-of-arts All the present system is based on the handcrafted
approaches [4]. methodologies as we find in literature. Hand-crafted
feature for images and videos aesthetics is good
feature extractors based on user preferences
2.2 Which are the features that can be identified?
algorithms, to design this features required a
considerable amount of engineering skill and domain
Many other specific photographic rules can be sued expertise. The main limitation is the excessive time
to discover particular aesthetic of videos by directly consumption and the accuracies of aesthetic
measuring physiological facts. This understanding assessments. There are many researches done on the
and captured information is used to processed and image aesthetics using hand crafted as well as deep
extract meaningful information from the gathered learning methods [16].
data. In the earlier research, aesthetics was defined
by Handcrafted and learned features [6]. Video aesthetics using deep learning, there exists a
scope for future research as this field is less explored
[19]. The table (table 1) shows the difference
The aesthetic quality of images and videos are judged
between the hand crafted and deep learning
by their low, middle and high level properties. The
technology:
low level properties of an image are that of color,
texture, edges and intensity [7]. The middle level
Deep Learning
property is the object in the image or video. And the Handcrafted Method
Method
high level properties are the photographic rules,
Handcrafted features Deep learning
mainly comprising of the Rules of Thirds (RoT),
judge by commonly method work on
Visual Balance (VB), Diagonal Dominance (DD),
established highly and accurate
Simplicity and the Depth of Field (DoF) [7].
photographic rules, feature extractions 2.4 Areas of Deep Learning related to video aesthetic
mainly low and middle by using hidden assessments
level features. layer concept. • Detecting and recognizing aesthetic information
This is sequential step- This is parallel Aesthetics is a study that relates to the relationship
by-step method and method using hidden between the mind and emotions in assessing beauty
time consuming to layers concept and [8]. The aim of aesthetics analysis is to define the
extract and classification required less amount science in assessing the aspects of arts and beauty
of features. of time. sought in images and videos. Human brain thinking
This method require This method structure begins with gathering information from
engineering skills and depends on the different environment which take fact about users
human experience and amount of dataset to psychology and understanding with behavior. The
do not need large train the network for fact gathered are of the form of features which are
dataset to train network. accuracy. contains in a video and this features used to perceive
Backpropagation is not Backpropagation is people understanding behind videos beauty. For
allowed to correct the main advantage of example, a camera might take pictures of the any
final results. CNN. object; Then human mind start its working and
Classification done at Allow to use more identify the object position, color contrast between
once only. fully connected layer foreground and background, Depth of Field, and etc.
for classification. • Psychology in machine
Another area within video aesthetic computing is
Table 1. Difference between the handcrafted and that the design of procedure systems to exhibit either
deep learning method. innate robust mind psychological powers or that is in
a position of as definitely acting the part of
There are the many researcher working on the deep aesthetics. An additional helpful move involving
learning to improve more accurate result in different computers based mostly on current technology based
field also. In the today life, the video aesthetic is the powers, is that the simulation of aesthetic in taking
important multimedia application. Many field use the pleasure in communication agents to boost
video for improver the selling quantity of the interactivity between human like and machine like
products. So, the video aesthetic is self-increasing communications. Thinking ability in machines could
area of aesthetic and in the future, it will go on the be connected with define states connected with
great demand. The deep learning provides a good forward development (or exist without of forward
opportunity for the video aesthetic assessment to development) of a pc primarily based learning
improve the aesthetic time and the accuracy of video system supported rules [8].
aesthetic editing. In this method, we deploy the
2.5 Another applications related to video aesthetic
multiple method of photography on the neural
network and extract the good feature using the Consider online-learning applications based on
hidden layer of neural network. computers wherein computing the users feelings can
be used to adjust the conference learning, content
can be more polished and tasteful form may be used
while teaching when a learner is uninterested, or
paused. Human Psychological being healthy,
suggestions behind aesthetic, can help to the users, 2.6 Different Algorithms Employed by Researchers
based on current emotion behind video beauty by In the work on regression and classifying video
computing applications when working out a aesthetic, the most frequently used classifier
particular user’s state of feelings [9]. algorithms are Artificial Neural Networks (ANN),
Deep Neural Network, Hidden Markov Models
Visual aesthetic has possible applications in human
(HMMs), Gaussian Mixture Model (GMM), Support
computer interaction, now a day human computer
Vector Machines (SVM), k-nearest neighbor (k-NN),
interaction is varying area in different fields. Many
and Decision Tree Algorithms. Numerous studies
researchers are working on gesture technology, in
have decisively showed that choosing the acceptable
which camera capture the video of moving body
classifier will meaningfully improve the performance
gesture and according to movement of gesture the
of the system.
machine will understand, what action required on
the basis of gesture. Virtual reality is also a greater Below gives a brief description about algorithm:
area in human computer interaction, which shows
• K-NN – Classification prediction by defining the
the 3D video and create environment according to
object in the feature space, and comparing this
human psychology and emotion at the time of
object with “k” nearest neighbors. In which the
interactions.
majority vote predict the classification of
gathered data.
Video aesthetics in Advertisements [10]: Now a day,
• GMM – it is a probabilistic based model used for
the increasing in the population the requirement of
signifying and classification of the presence of
the peoples goes on high demand. Due to renewed
sub part within the whole pats. Every sub part is
and changing consumer demands and the rapidly
outlined exploitation the mixture distribution
developing technological factors, companies need to
which permits for classification of explanations
search of new strategies to make a difference in
into the sub-parts [27].
their products. As competition increased marketers
• SVM – is used to binary linear classification and
started to focus on new approaches for product to
it is also used for regression, which selects in the
attract consumers' perception and attention. One of
two (or more) different classes, each input may
the most effective ways of differentiating is using
fall into this class [28].
video aesthetics.
• ANN – is a mathematical model, which has
In gamming area a mistake that’s unfortunately only ability to mimic brain structure of working
too common within the gaming business, is to lump process, it is enthused by biological neural
video graphics and video aesthetics together as if they networks that can work and extract feature
were the same factor. This, unnecessary to say, is similar to human mind [29].
false. The distinction becomes obvious once one • Decision Tree algorithms – are supported
compares, as an example, a heavily artificial, cartoon succeeding a decision tree throughout that the
game that aims for realism specially else. The leaves of the tree represent the classification
former’s video aesthetic, despite its presumptively result, and branches represent the conjunction
smaller budget and scope, can possibly hold up longer of consecutive features that lead to the
than the latter’s. classification [30].
Video aesthetic is also being applied to the growth • HMMs – An applied mathematics markov model
of communicative technologies for use by people during which the conditions and state
[10]. transitions are unobtainable for the observation.
In its place, the series of outputs dependent on recognize and classify by the deep learning method
the states are visible [31]. to predict accurate results.
assessments. The frame conversion and the shots Detection Method for Art Images”, IEEE
detection is help to understand the characteristics Photonics Journal ( Volume: 9, Issue: 6, Dec.
of video motion to good shot quality of videos. In 2017
the future, the feature extraction and the [7]. Roberto Gallea, Edoardo Ardizzone, and
classification both using the deep learning to take Roberto Pirrone, “Automatic Aesthetic Photo
more accurate result on aesthetics. Many editor are Composition”, Image Analysis and Processing –
working on the animation work in the videos, using ICIAP 2013: 17th International Conference,
deep learning we can modify and get the better Naples, Italy, September 9, 2013.
result over that videos. The video transmission is [8]. Stephen Groening, “Introduction: The
based on the video size, so we can use the deep Aesthetics of Online Videos”, The Aesthetics of
learning base aesthetic video transmission with less Online Videos, June 2016,
size and high aesthetic assessments. DOI: http://dx.doi.org/10.3998/fc.13761232.004
0.201
[9]. christos tzelepis, eftichia mavridaki, vasileios
V. REFERENCES
mezaris, ioannis patras, “Video aesthetic quality
assessment using kernel support vector
[1]. Dhiraj Joshi, Ritendra Datta, Elena
machine with isotropic gaussian sample
Fedorovskaya, Quang-Tuan Luong, James Z.
uncertainty (ksvm-igsu)”, IEEE Int. Conf. On
Wang, Jia Li, and Jiebo Luo, “Aesthetics and
Image Processing (Icip 2016), Phoenix, Az, Usa.
Emotions in Images”, IEEE Signal Processing
[10]. Jun-Ho Choi, Jong-Seok Lee, “Automated
Magazine, Volume: 28, Issue: 5, Sept. 2011
Video Editing for Aesthetic Quality
[2]. Xin Lu, Zhe Lin, Hailin Jin, Jianchao Yang, and
Improvement”, 23rd ACM international
James. Z. Wang, “Rating Image Aesthetics using
conference on Multimedia, Brisbane, Australia
Deep Learning ”, IEEE Transactions on
— October 26 - 30, 2015
Multimedia, Volume: 17, Issue: 11, Nov. 2015
[11]. Anselm Brachmann, Christoph Redies,
[3]. Yubin Deng, Chen Change Loy, and Xiaoou
“Computational and Experimental Approaches
Tang, “Image Aesthetic Assessment”, IEEE
to Visual Aesthetics”, Front. Comput.
Signal Processing Magazine, Digital Object
Neurosci., 14 November 2017 |
Identifier 10.1109/MSP.2017.2696576, 11 July
https://doi.org/10.3389/fncom.2017.00102.
2017.
[12]. Aarushi Gaur, “Ranking Images Based on
[4]. Yubin Deng, Chen Change Loy, and Xiaoou
Aesthetic Qualities”, Submitted for the Degree
Tang, “Image Aesthetic Assessment: An
of Doctor of Philosophy from the University of
Experimental Survey”, arXiv:1610.00838v2
Surrey, April 2015.
[cs.CV] 20 Apr 2017.
[13]. Loris Nanni, Stefano Ghidoni, Sheryl Brahna,
[5]. Ritendra Datta Dhiraj Joshi Jia Li James Z.
“Handcrafted vs. non-handcrafted features for
Wang, “Studying Aesthetics in Photographic
computer vision classification”, Elsevier Journal
Images Using a Computational Approach”,
on Pattern Recognition 71 (2017) 158–172,
Computer Science, vol 3953. Springer, Berlin,
2017.
Heidelberg, ECCV 2006
[14]. Hsin-Ho Yeh, Chun-Yu Yang, Ming-Sui Lee,
[6]. Chongke Bi ,Ye Yuan, Ronghui Zhang , Yiqing
and Chu-Song Chen, “Video Aesthetic Quality
Xiang,Yuehuan Wang, and Jiawan Zhang, “A
Assessment by Temporal Integration of Photo-
Dynamic Mode Decomposition Based Edge
[33]. https://medium.com/machine-learning-in-
practice/deep-learnings-permanent-peak-on-
gartner-s-hype-cycle-96157a1736e
[34]. NadineKrefetz , streaming media
https://www.streamingmedia.com/Authors/683
7-Nadine-Krefetz.htm