internationaljournalofengineering international journal of … · 2019. 4. 27. · cedd t n e va c...
TRANSCRIPT
-
S. No
Volume-8 Issue-4C, April 2019, ISSN: 2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication
Page No.
1.
Authors: Varsha Saxena, Sanjay Srivastava
Paper Title: Image Processing in Brain Tumor Detection
Abstract: Image transforming operations to be strictly isolated fewer than three significant categories, picture Compression, picture upgrade Furthermore Restoration, Also estimation extraction. It includes diminishing the
measure about memory required to store digital image. Picture defects which Might make brought about by
that digitization transform in the imaging set-up (for example, awful lighting) might be remedied utilizing
picture upgrade strategies. Once those pictures may be for great condition, those estimation extraction
operations a chance to be used to acquire suitable data starting with the picture. Percentage illustrations for
picture upgrade and estimation extraction are provided for beneath. Those samples demonstrated all work on
256 grey-scale pictures.
Keywords: Image compression, Image enhancement, Restoration, Digitization, Measurement Extraction
References: 1. Kumar, GJ & Kumar GV (2008), Biological Early Brain Cancer Detection Using Artificial Neural Networks. In Artificial Intelligence
and Pattern Recognition, 89-93. 2. El Emary, IM & Ramakrishnan, S (2008). On the application of various probabilistic neural networks in solving different pattern
classification problems. World Applied Sciences Journal 4(6), 772-780.
3. Kadam, DB (2012). Neural network based brain tumor detection using MR images. International Journal of Computer Science and Communication 2(2), 325-331.
4. Nazem-Zadeh MR, Jafari-Khouzani K, Davoodi-Bojd E, Jiang Q & Soltanian-Zadeh H (2011). Clustering method for estimating principal diffusion directions. NeuroImage, 57(3), 825-838.
5. Menze BH, Van Leemput K, Lashkari D, Weber MA, Ayache N & Golland P (2010), September. A generative model for brain tumor segmentation in multi-modal images. In International Conference on Medical Image Computing and Computer-Assisted
Intervention (pp. 151-159). Springer, Berlin, Heidelberg. 6. Gooya A, Biros G and Davatzikos C (2011). Deformable registration of glioma images using EM algorithm and diffusion reaction
modeling. IEEE transactions on medical imaging, 30(2), 375-390.
7. Varun Gulshan, Carsten Rather, Antonio Criminisi,Andrew Blake,Anddrew Zisserman “Geodesic star convexity,” http://www. robots.ox.ac.uk/˜vgg/research/iseg/.
8. Fauzi M, Othman B and Abdullah NB (2011). MRI brain classification using support vector machine. In IEEE 4th International Conference on Modeling, Simulation and Applied Optimization (ICMSAO).
1-4
2.
Authors: Mani Sharma, Sunil.J.Wagh, Miss. Archana Sar
Paper Title: Identifying Cuts by Linear Search Method
Abstract: Tracking cuts and their position in wireless sensor network is the main issue of focus now-a -days. This research paper describes cut detection by linear search method in a dynamic table. We are working on the
values of node’s related factors. In this method, scanning will be performed on each sensor node on the basis of
certain factors and cut will be detected. We hope that our method will be efficiently takes less time in tracking
cut and will help in the process of connectivity restoration.
Keywords: Tracking cuts, wireless sensor network, linear search, scanning
References: 1. N. Shrivastava, S. Suri, and C. Toth, “Detecting cuts in sensor networks,” ACM Transactions on Sensor Networks, vol. 4, no. 2, pp. 1–
25, 2008.
2. P. Barooah, H. Chenji, R. Stoleru, and T. Kalmar-Nagy, “Cut detection in wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. PrePrints, 2011.
3. M. Won and R. Stoleru, “Destination-based cut detection in wireless sensor networks,” in Proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), 2011
4. Shuguang Xiong and Jianzhong, “An Efficient Algorithm for Cut Vertex Detection in Wireless Sensor Network”, International Conference on Distributed Computing system, 2010
5. Izzet F.Senturk, Kemal Akkaya and Sabri Yilmaz, “Distributed Relay Node Positioning for Connectivity Restoration in Partitioned Wireless Sensor Network” IEEE Explore Digital Library,2012
6. Ms. Rini Mathew and Mrs. Annadevi. E “Artificial Routing Protocol for Cut Detection of Cut Vertices” IOSR Journal of Computer Engineering (IOSR-JCE).vol. 9,
7. [7] D. B. West, “Introduction to Graph Theory (Second Edition)”, Prentice Hall, 2001. 8. [8] X. Liu, L. Xiao, A. Kreling and Y. Liu, “Optimizing Overlay Topology by Reducing Cut Vertices”, in ACM Workshop on
Network and Operating System Support for Digital Audio and Video (NOSSDAV), 2006. 9. [9] P. Barooah, “Distributed cut detection in sensor networks,” in Proceedings of IEEE Conference on Decision and Control and
European Control Conference (CDC), 2008.
10. 2012 11. [10] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, “Introduction to Algorithms (Second Edition)”, The MIT Press, 2002 12. [11] B. Milic and M. Malek, “Adaptation of the Breadth First Search Algorithm for Cut-edge Detection in Wireless Multihop
Networks”, in ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 2007. 13. [12] M. Won, M. George, and R. Stoleru, “Towards robustness and energy efficiency of cut detection in wireless sensor networks,”
Elsevier Ad Hoc Networks, vol. 9, no. 3, pp. 249–264, 2011.
14. [13]Prof. Prashant P. Rewagad and Harish Prakash Patil, " DCD Algorithm in Wireless Sensor Networks with enhance security mechanism", IJLTET, vol-3, Issue-2, Nov-2013
5-11
-
3
Authors: Indu Bhuria, Rajeev Pourush, D. R. Godara
Paper Title: Attenuation Due to Foliage Depth at 35 Ghz Prevailing in Desert Region of India
Abstract: Communication window, ka-band (28 to 42 GHz) is to be investigated for the various developing applications. In 5 G communications all the devices are being developed to use millimeter wave as medium of
propagation as rest of the spectrum is getting exhausted day by day. 35 GHz frequency can be used to
characterize the whole band. For LOS communication foliage is one of the main obstacle which can attenuate
the signal. In this paper an attempt is made to specify the rate of attenuation due to cumulative effect of
atmospheric gases and foliage in depth on the basis of observational studies. In autumn season, rate of
attenuation up-to five trunks is 0.154 dBm per feet and it decreases to .062 dBm per feet if signal prevails
through fourteen trunks. Similarly, if signal propagates through canopy area then rate of attenuation is 0.22
dBm per feet for first five tree canopies and it decreases to 0.095 dBm per feet as foliage depth increases to
fourteen canopies. For spring season, rate of attenuation for first five canopies is 0.179 dBm per feet and for
eleven canopies rate becomes 0.140 dBm per feet. This decrement in rate of attenuation is due to coherent
interplays of field component due to collective scatterers. Rate of decrement suggests that there is possibility of
35 GHz to be used for communication applications. Attenuation in autumn is observed to be lesser then in
other seasons as leaves density which can offer multiple scattering of field components is less.
Keywords: Attenuation; Foliage depth; LOS communication; Scattering; Millimeter wave
References: 1. Indu Bhuria, Rajeev Pourush, D.R Godara “Free space path loss statistics of 35 GHz wave prevailing in desert region of India” at
Mody University International Journal of Computing and Engineering Research ’ vol-2 , Issue-2, ISSN 2456-8333, Pp-17-19, March
2018 2. Schwering, Felix K, E.J.Violette, and R.H. Espeland (1988), ‘Millimeterwave propagation in vegetation: Experiments and
theory’,IEEE Trans. Geoscience Remote Sensing, Vol. 26, No. 3, 355-367
3. Indu Bhuria, Rajeev Pourush, D.R Godara “ Effect of leaf size on millimeter wave Propagation” at ‘National conference on Emerging trends in Engineering ’ organized by CET , Bikaner, 10 February 2017, ISBN No. 978-93-85135-31-6
4. Feinian Wang,Kamal Sarabandi, “An Enhanced Millimeter-Wave Foliage Propagation Model” IEEE Transactions on Antenna and Propagation,Vol. 53, NO. 7, pp.2138-2145, July 2005
5. H. Essen, D Nüßler, N. von Wahl, S. Heinen and S. Sieger “Foliage Penetration upto millimeter wave frequencies” IEEE Fourth European Conference on Antennas and Propagation, , Print ISSN: 2164-3342 ,12-16 April 2010
6. Seville, A. and K. H. Craig,” Semi-empirical model for millimeter-wave vegetation attenuation rates", Electron. Lett., Vol. 31, pp.- 1507 – 1508, Print ISSN: 0013-5194, 1995
7. Gary Comparetto “The Impact of Dust and Foliage on Signal Attenuation in the Millimeter Wave Regime” Journal of Space Comm., Vol. 11, pp.-13-20, July 1993.
8. R. P. Rafuse, "Effects of Sandstorms and Explosion-Generated Mie, G., "A Contribution to the Optics of Turbid Media, Especially Colloidal Metallic Suspensions," Number DCA-16, Massachusetts Institute of Technology Lincoln Laboratory, Ann. Phys., Vol. 25,
pp. 377-445, 10 November 1981. 9. Indu Bhuria, Rajeev Pourush, D.R Godara “Behaviour of millimeter wave with increasing canopy size of scared fig tree ” at
‘International conference on Optical and wireless Technologies’ organized by MNIT , Jaipur , 10-11 February 2018
10. D.R Godara, J.S Purohit , Sandeep Rankawat , S.K Modi(2013) ‘Effects of foliage length on signal Attenuation in Millimeter Band at 35 GHz.’, International Journal of Computer Applications USA( 0975-8887), Vol. 84 Issue No. 2, P.11-13. IJCA solicits original
Papers for June 2015 Edition.
11. P. L. McQuate, J. M. Harman, and A. T. Barsis, "Tabulation of Propagation Data Over Irregular Terrain in the 230 to 9200 MHz Frequency Range. Part 1: Gunbarrel Hill Receiver Site," Technical Report No. ERL 65-ITS 58-1, Institute for Telecommunications
Science, Boulder, Colorado,March 1968 12. Tewari, R.K. S. Swarup, and M. N. Roy, "Radio Wave Propagation through Rain Forests of India," IEEE Transactions on Antenna and
Propagation, Vol. 38, No. 4, pp. 433-449 ,April 1990
13. Tamir, T.,"Radio Wave Propagation Along Mixed Paths in Forest Environments," IEEE Transactions on Applied Physics, Vol. 25, pp. 471-477, July 1977
12-15
4
Authors: Harsh Purohit, Ravisha Chutani
Paper Title: Financial Literacy and Planning: A Study of Indian Households of Punjab State
Abstract: This study surveys 800 people from Indian households in the state of Punjab to examine the effect
of demographic factors on the factors affecting financial literacy level. Seven factors were identified through
exploratory factor analyses which help in assessing the financial literacy level of the people. The results
indicated that there is a significant difference in the financial literacy level of the people based on educational
qualification, occupation and monthly income. And women possessed lower financial literacy than men on the
parameters of financial planning, financial advisory services, retirement planning, estate planning, insurance
planning, legal services and budgeting and documentation.
Keywords: Demographics, Financial Planning, Financial Literacy, Indian Households, Punjab
References: 1. S. Schagen and A. Lines, "Financial Literacy in Adult Life: A Report to the Natwest Group Charitable Trust", Slough, Berkshire:
National Foundation for Educational Research, 1996.
2. H. CHEN, "An analysis of personal financial literacy among college students", Financial Services Review, vol. 7, no. 2, pp. 107-128, 1998.
3. UK Adult Financial Literacy Advisory Group, Report to the Secretary of State for Education and Employment, December 2000. 4. Volpe, R. P., Kotel, J. E. & Chen, H., “A survey of investment literacy among online investors”, Financial Counseling and Planning,
Vol. 13 (1), pp. 1-13, 2002.
5. Roy Morgan Research, “ANZ Survey of Adult Financial Literacy in Australia: Stage 3: In-Depth Interview Survey Report”, Melbourne: ANZ Bank, 2003c.
6. O. Publishing, Improving Financial Literacy. Paris: Organization for Economic Co-operation and Development, 2005.
16-22
-
7. A. Lusardi and O. Mitchell, "Planning and Financial Literacy: How Do Women Fare?", American Economic Review, vol. 98, no. 2, pp. 413-417, 2008.
8. H. Hassan Al‐Tamimi and A. Anood Bin Kalli, "Financial literacy and investment decisions of UAE investors", The Journal of Risk Finance, vol. 10, no. 5, pp. 500-516, 2009.
9. A. LUSARDI, O. MITCHELL and V. CURTO, "Financial Literacy among the Young", Journal of Consumer Affairs, vol. 44, no. 2, pp. 358-380, 2010.
10. A. LUSARDI and O. MITCHELL, "Financial literacy around the world: an overview", Journal of Pension Economics and Finance, vol. 10, no. 04, pp. 497-508, 2011.
11. J. Gathergood and R. Disney, "Financial Literacy and Indebtedness: New Evidence for U.K. Consumers", SSRN Electronic Journal, 2011.
12. M. Sherraden, L. Johnson, B. Guo and W. Elliott, "Financial Capability in Children: Effects of Participation in a School-Based Financial Education and Savings Program", Journal of Family and Economic Issues, vol. 32, no. 3, pp. 385-399, 2011.
13. Leora. Klapper, Annamaria. Lusardi and A-Georgios. Panos, “Financial Literacy and the Financial Crisis: Evidence from Russia”, World Bank Policy Research Working Paper No. 5980,
5
Authors: Mayank Singh, Viranjay M. Srivastava
Paper Title: Implementing Architecture of Fog Computing for Healthcare Systems based on IoT
Abstract: Healthcare has been highly benefited with the technology advancement. Technology-based new solutions, methods, applications, and systems completely revolutionize the healthcare industry. Earlier the
decision making of doctor entirely depends on the experience, domain knowledge, laboratory reports,
diagnostics and patient’s symptoms. With the advancement of technology in healthcare, the decision-making
will be highly advanced and add wisdom to it. The patient’s care and regular monitoring have been vastly
improved at low cost with the appearance of the Internet of things based healthcare systems. There are a lot of
Internet of Things (IoT) based healthcare devices that produces enormous of data and transfer to the cloud for
analysing and sharing with other stakeholders. Cloud computing is the backbone for such devices to collect,
analyse and share the data or result with all the concern persons. Data are increasing day by day as the user
base of IoT based healthcare devices has also been increased in folds. Due to such high volume of data, the
latency rate, security issues and quality of analysed data has been decreased on the cloud. To overcome such
limitation of cloud, a new paradigm called Fog computing has appeared. Fog computing is the intermediate
layer between sensors and cloud servers. It facilitates the data gathering from various nearby sensors, analyses
the data and provides the result to the sensor, cloud servers and other concerns locally. Deploying such
computing infrastructure locally reduces the cost and increase the quality of analysis and alerting in real time.
It also adds the security to the data as it is processed locally. This paper proposed an architecture to implement
the fog computing between IoT sensors and cloud to handle the medical data.
Keywords: Fog computing, healthcare systems, IoT based healthcare applications
References: 1. European Commission Information Society, Internet of Things strategic research roadmap, 2009. http://www.internet-of-things-
research.eu/ [accessed 25-05-2018].
2. P. Venkatramanan, I. Rathina “Healthcare leveraging Internet of Things to revolutionize healthcare and wellness,” IT Services Business Solutions Consulting, Tata Consultancy Services Limited, 2014.
3. A. Dohr, R. Modre-Opsrian, M. Drobics, D. Hayn, G. Schreier, “The internet of things for ambient assisted living,” proceedings of the International Conference on Information Technology: New Generations, pp. 804–809, 2010.
4. D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, “Internet of things: vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp.1497–1516, 2012.
5. M. Carmen Domingo, “An overview of the internet of things for people with disabilities,” Journal of Network and Computer Applications, vol. 35, no. 2, pp. 584–596, 2012.
6. Hairong Yan, Li Da Xu, Zhuming Bi, Zhibo Pang, Jie Zhang, Yong Chen, “An emerging technology: a wearable wireless sensor networks with applications in human health condition monitoring”, Journal of Management Analytics, vol. 2, no. 2, pp. 121–137,
2015. 7. Y. J. Fan, Y. H. Yin, L. D. Xu, Y. Zeng, F. Wu, “Iot-based smart rehabilitation system,” IEEE Transactions on Industrial Informatics,
vol. 10, no. 2, pp. 1568–1577, 2014.
8. C.E. Koop, R. Mosher, L. Kun, J. Geiling, E. Grigg, S. Long, C. Macedonia, R. Merrell, R. Satava, J. Rosen, “Future delivery of health care: cybercare,” IEEE Engineering in Medicine and Biology Magazine, vol. 27, no. 6, pp. 29–38, 2008.
9. A. M. Rahmani, T. N. Gia, B. Negash, A. Anzanpour, I. Azimi, M. Jiang, P. Liljeberg, “Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach,” Future Generation Computer Systems, vol. 78, no. 2, pp. 641-658, 2018.
10. F. Bonomi, R. Milito, J. Zhu, S. Addepalli, “Fog computing and its role in the internet of things,” Proceedings of the First Edition of the MCCWorkshop on Mobile Cloud Computing, pp. 13–16, 2012.
11. M. Aazam, E. N. Huh, “Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT,” 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 687–694, 2015.
12. M. Aazam, E. N. Huh, “Fog computing and smart gateway based communication for cloud of things,” Future Internet of Things and Cloud (FiCloud), 2014 International Conference on, pp. 464–470, 2014.
13. A. M. Rahmani, N. K. Thanigaivelan, Tuan Nguyen Gia, J. Granados, B. Negash, P. Liljeberg, H. Tenhunen, “Smart e-health gateway: bringing intelligence to IoT-based ubiquitous healthcare systems,” Proceeding of 12th Annual IEEE Consumer Communications and
Networking Conference, pp. 826–834, 2015. 14. C. Doukas, T. Pliakas, I. Maglogiannis, “Mobile healthcare information management utilizing cloud computing and android OS,” 2010
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 1037–1040, 2010.
15. G. Fortino, M. Pathan, G.D. Fatta, “Bodycloud: integration of cloud computing and body sensor networks,” 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 851–856, 2012.
16. A.J. Jara, M.A. Zamora, A.F. Skarmeta, “An internet of things—based personal device for diabetes therapy management in ambient assisted living (AAL),” Personal and Ubiquitous Computing, Springer, vol. 15, no. 4, pp. 431–440, 2011.
17. P. K. Gupta, B. T. Maharaj, Reza Malekian, “A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres,” Multimedia Tools and Applications, vol 76, no. 18, pp. 18489–18512, 2017.
18. C. Doukas, I. Maglogiannis, “Bringing IoT and Cloud Computing towards Pervasive Healthcare,” Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 922–926, 2012.
19. M. Chen, Y. Qian, J. Chen, K. Hwang, S. Mao, L. Hu, “Privacy protection and intrusion avoidance for cloudlet-based medical data sharing,” IEEE Transactions on Cloud Computing, vol. 99, 2017.
20. Pelagia Tsiachri Renta, Stelios Sotiriadis, Euripides G.M. Petrakis, “Healthcare sensor data management on the cloud,” Proceedings
23-27
-
of the 2017 Workshop on Adaptive Resource Management and Scheduling for Cloud Computing (ARMS-CC ’17), ACM, pp. 25–30, 2017.
21. T. Nguyen Gia, M. Jiang, V. K. Sarker, A. M. Rahmani, T. Westerlund, P. Liljeberg, H. Tenhunen, “Low-cost fog-assisted health-care IoT system with energy-efficient sensor nodes,” Proceedings of 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1765–1770, 2017.
22. F. Bonomi, R. Milito, J. Zhu, S. Addepalli, “Fog computing and its role in the internet of things,” Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ACMpp. 13-16, 2012.
23. M. Singh, P. K. Gupta and V. M. Srivastava, "Key challenges in implementing cloud computing in Indian healthcare industry," 2017 Pattern Recognition Association of South Africa and Robotics and Mechatronics (PRASA-RobMech), Bloemfontein, pp. 162-167,
2017.
6
Authors: Shailendra Mishra, Mayank Singh
Paper Title: An improved Energy Efficient Communication Protocol (IEECP) for Wireless Sensor Networks
Abstract: The wireless sensor networks have been experiencing exponential growth in the past decade. A Wireless Sensor Network provides low cost solutions and consists of several sensors distributed across a
geographical area. In many commercial and industrial applications, it often needs to monitor and collect the
information about the environment conditions (temperature, humidity, vibration, acceleration etc.) by using
sensor networks. This paper aims to resolve issues relating to excessive multi-hoping from one node to another.
Proposed addressing can be used for signal spreading and de-spreading and minimize power usage. The
proposed protocol is compared with the two existing protocols namely Tree Routing and Enhanced Tree
Routing. The simulation results show that the proposed protocol has the low hop-count compare to TR and
ETR, also it consumes less power and energy in finding paths and transmitting data to the sink node compare
to TR and ETR protocols.
Keywords: Wireless sensor network, Energy Efficient Hope Count Protocol, Tree Routing,
Extended Tree Routing, Non-Orthogonal Variable Spreading Factor Technique.
References: 1. M. Edal Anand; K. Senthil Kumar; and R. Amutha (2013). Energy efficiency of cooperative communication in wireless sensor
networks. International journal of data mining techniques and applications, (2), 300-314.
2. H. F. Chan; and H. Rudolph (2015). New energy efficient routing algorithm for Wireless Sensor Network. TENCON 2015 IEEE
Region 10 Conference, Macao, 2015, 1-5.
3. Huili Jia; Xunli Fan; Kun Liu; and Yang Qian (2017). An Energy Efficiency Routing Algorithm for Wireless Sensor Network. 2017
IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded
and Ubiquitous Computing (EUC), Guangzhou, 2017, 735-739.
4. H. KIM (2008). Multiple Sink Positioning and Routing to Maximize the Lifetime of Sensor Networks. IEICE Transactions on
Communications, volume 91(B), 3499-3506.
5. Yu, Jun; Zhang; and Xueying (2015). A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-
Time. Journal of Sensors, 2015(5), 1-13.
6. Vijayan, K; and Arun Raaza (2016). A Novel Cluster Arrangement Energy Efficient Routing Protocol for Wireless Sensor Networks.
Indian Journal of Science and Technology, 9(2), 1-9.
7. Shinji Inoue; Noriyuki Masuda; and Yoshiaki Kakuda (2007). An Autonomous Method for Aggregating and Repairing Paths in
Sensor Networks. Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07), Sedona, Arizona, USA, 526-
533.
8. Basma M. Mohammad; El-Basioni; Sherine; M. Abd El-kader; and Hussein S. Eissa (2012). Designing a local path repair algorithm
for directed diffusion protocol. Egyptian Informatics Journal, 13, 155-169.
9. Arain; Qasim Ali; Uqaili; Muhammad Aslam;Deng; and Zhongliang (2017). Clustering Based Energy Efficient and Communication
Protocol for Multiple Mix-Zones Over Road Networks. Wireless Personal Communications, 95, 411–428.
10. S. C. Ergen; and P. Varaiya (2010). TDMA scheduling algorithms for wireless sensor networks. Springer Wireless Network, 16(4),
985–997.
11. Mario Macedo;Antonio Grilo; and Mario Nunes(2009). Distributed Latency-Energy Minimization and interference avoidance in
TDMA Wireless Sensor Networks. Elsevier Journal on Computer Networks, 53, 569–582.
12. Bashir Yahya; and Jalel Ben-Othman (2009). Towards a classification of energy aware MAC protocol for wireless sensor networks.
Wireless Communication and Mobile Computing, 9, 1572–1607.
13. Singh S.; and Raghavendra C (1998). PAMAS: power aware multi-access protocol with signaling for ad hoc networks. SIGCOMM
Computer Communications Review, 28(3), 5–26.
14. Ephremides; and O. Mowafi(1992).Analysis of a hybrid access scheme for buffered user probabilistic time division. IEEE
Transactions on Software Engineering, 8 (1), 52–61.
15. J. R. Jiang; Y. C. Tsang; C.S. Hsu; and T. H. Lai (2003). Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11
Ad-Hoc Networks. Proceedings of the 2003 IEEE- International Conference on Parallel Processing (ICPP’03), 257-264.
16. R. Zheng; J. Hou; and L. Sha (2003). Asynchronous wakeup for ad hoc networks. Proceedings ACM Mobi Hoc, USA, 35–45.
17. C. Vigorito;D. Ganesan;and A. Barto (2007).Adaptive Control of Duty-Cycling in Energy-Harvesting Wireless Sensor Networks.
Proceedings of IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 2007), San Diego, 1-10.
18. M Maroti; B. Kusy;G. Simon; and A. Ledeczi(2004). The flooding time synchronization protocol. Proceedings of ACM International
Conference on Embedded Networked Sensor Systems, Maryland, USA, 39-49.
19. S. Cui; R. Madan; A. Goldsmith; and S. Lall (2005). Joint routing, Mac, and link layer optimization in sensor networks with energy
constraints. Proceedings of IEEE International Conference on Communications, ICC 2005 Seoul, Korea, 2, 725–729.
20. Kilhung Lee (2008). An Energy-Aware Aggregation Tree Scheme in Sensor Networks. International Journal of Computer Science
and Network Security, 8 (5), 51-57.
21. Wanzhi Qiu;Efstratios Skafidas; and Peng Hao(2009).Enhance tree routing for wireless sensor networks. Ad-Hoc Networks, Elsevier,
7, 638-650.
22. Y. Xu; J. Heidemann; and D. Estrin (2001). Geography-informed energy conservation for ad hoc. Proceedings of ACM MobiCom,
Rome, 70–84.
23. S. Sharma (2008). Speed Aware Modified Span for Wireless Mobile Ad-hoc Networks. Proceedings of Third International
Conference on Digital Telecommunications IEEE Computer Society, 53-58.
24. M. Basseville; and I.V. Nikiforov(1993).Detection of Abrupt Changes: Theory and Application. Publisher Prentice-Hall.
25. Jain; and J.Y. Chang (2004). Adaptive sampling for sensor networks. Proceedings of 1st international workshop on Data management
28-35
-
for sensor networks (DMSN 2004), Toronto, Canada, 10–16.
26. S. Goel, A. Passarella; and T. Imielinski(2006).Using buddies to live longer in a boring world. Proceedings of IEEE International
Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS), Italy, 67-72.
27. P. Padhy; R. K. Dash; K. Martinez; and N. R. Jennings (2006). A utility-based sensing and communication model for a glacial sensor
network. Proceedings of Fifth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS ‘06),
Hakodate, Japan, 1353-1360.
28. D. Tulone; and S. Madden (2006). An energy-efficient querying framework in sensor networks for detecting node similarities.
Proceedings of 9th International ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
(MSWIM06), 291–300.
29. B. Kanagal; and A. Deshpande (2008). Online filtering, smoothing and probabilistic modeling of streaming data. Proceedings of 24th
International Conference on Data Engineering (ICDE 2008), Cancun Mexico, 7–12.
30. N. Kim; S. Choi; and H. Cha (2008). Automated Sensor-specific Power Management for Wireless Sensor Networks. Proceedings of
IEEE Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008), Atlanta, Georgia, 305-314.
31. C. Alippi; G. Anastasi; C. Galperti;F. Mancini; and M. Roveri(2007). Adaptive Sampling for Energy Conservation in Wireless
Sensor Networks for Snow Monitoring Applications. Proceedings of IEEE MASS 2007, Pisa, Italy,1-6.
32. R. Willett; A. Martin; and R. Nowak (2004). Back casting: Adaptive Sampling for Sensor Networks. Proceedings of International
Symposium on Information Processing in Sensor Networks (IPSN 2004), 124-133.
33. I.F. Akyildiz; and I.H. Kasimoglu(2004).Wireless sensor and actor networks: research challenges”, Ad-Hoc Networks, 2 (4), 351–
367.
34. W. Zhao, M. Ammar; and E. Zegura (2004). A message ferrying approach for data delivery in sparse mobile ad hoc networks.
Proceedings of PACM MobiHoc 2004, Tokyo, Japan, 97-102.
35. R.C. Shah;S. Roy;S. Jain; and W. Brunette(2003).Data MULEs: modeling a three-tier architecture for sparse sensor networks.
Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, 30–41.
36. Z. M. Wang; S. Basagni; E. Melachrinoudis; and C. Petrioli(2005). Exploiting sink mobility for maximizing sensor networks
lifetime. Proceedings of 38th Annual Hawaii International Conference on System Sciences (HICSS’05), Hawaii, 327-332.
37. S.R. Gandham; M. Dawande; R. Prakash; and S. Venkatesan (2003). Energy efficient schemes for wireless sensor networks with
multiple mobile base stations. Proceedings of IEEE Globecom 2003, San Francisco, 377–381.
38. S. Basagni; A. Carosi; E. Melachrinoudis; C. Petrioli; and Z.M. Wang (2007). Controlled sink mobility for prolonging wireless
sensor networks lifetime. ACM Journal on Wireless Networks, 112-117.
39. K. Akkaya; and M. Younis (2004). Energy-aware to mobile gateway in wireless sensor networks”, Proceedings of IEEE Globecom
2004 Workshops, USA, 16–21.
40. H. Luo;F. Ye; J. Cheng; S. Lu; and L. Zhang(2005).TTDD: two-tier data dissemination in large-scale wireless sensor networks. ACM
Wireless Networks, 11 (1–2), 161–175.
41. K Senthil Kumar; and R Amutha (2016). An Algorithm for Energy Efficient Cooperative Communication in Wireless Sensor
Networks., KSII Transactions on Internet and Information Systems, 10(7), 3080-3099.
42. Kiran Vadde; and Hasan Cam (2004). A Code Assignment Algorithm for Non-blocking OVSF Codes in WCDMA.
Telecommunication Systems, 25(3-4), 417–431.
43. Giuseppe Anastasi; Marco Conti; Mario Di Francesco; and Andrea Passarella (2009). Energy conservation in wireless sensor
networks: A survey. Ad Hoc Networks,7(3) ,537-568
7
Authors: Sandhya Tarar, Vyomika Singh, Vibhash Yadav, Shekhar Singh
Paper Title: Optimized Variational Bayesian Extreme Learning Machine Algorithm for Multimodal
Biometric Recognition
Abstract: In the thriving field of secure biometric systems, numerous advancements have been created and the need of the hour is Variational Bayesian Extreme Learning Machine (VBELM) which has an advantage in
terms of time efficiency, speed, security and accuracy over traditional Extreme Learning Machine method
(ELM). After observing the experimental results of Variational Bayesian Extreme Learning Machine
(VBELM) we observe that testing accuracy, over fitting problem and recognition models are the issues and in
order to address them, we curate an Optimized VBELM (OVBELM) which has opened doors for an
exceptional performance in terms of improved statistical testing accuracy, improved recognition rates,
execution time, reduced error rates and improved average fusion time.In this paper, optimized Variational
Bayesian Extreme Learning Machine (VBELM) is based on local feature fusion of three modalities- Face,
Fingerprint and Iris where appending iris as a third modality makes the system robust and secure. The
optimized biometric recognition system which is trained on an artificial neural network (ANN) exhibits
exceptional results after applying on 240 face images (40 people with 6 images for each individual) from
FERET Face database (Facial Recognition Database), 240 fingerprint images( 40 people with 6 images for
each individual) from FVC2002 fingerprint database and 240 iris images (40 people with 6 images for each
individual) from UBIRIS database and result analysis depicts that the optimized VBELM (OVBELM) is
having an edge over VBELM and traditional ELM duly reflected with improved execution time , testing
accuracy, average fusion time and reduced error rates.
Keywords: Artificial Neural Network (ANN),Extreme Learning Machine (ELM), Feature based fusion, Multimodal biometrics system, Optimizedm Varia-tional Bayesian Extreme Learning Machine
(OVBELM);Variational Bayesian Extreme Learning Machine (VBELM)
References: 1. AkankshaAggarwal, Manoj K. Verma, “Enhancing Performance of multimodal biometric system using gabor feature and similarity
index” June 2016, International Journal of Engineering Trends and Technology (IJETT). 2. Peter Waggett, IBM (2016), “Risk-based Authentication: Biometrics brave new world”. 3. Sandhaya Tarar, Ela Kumar, “Fingerprint Mosaicking Algorithm to Improve the Performance of Fingerprint Matching System”, 2014,
Computer Science and Information Technology . 4. RuchiKumari, Sandhya Tarar,” An Efficient High Dimensional Indexing Method For Content Based Image Retrieval (CBIR)”,
International Journal of Engineering and Techniques - Volume 2 Issue 3, May – June 2016
5. SubiyaZaidi, Sandhya Tarar, Shrish Kumar Singh, “To evaluate the performance of fingerprint enhancement techniques”,2015 Annual IEEE India Conference (INDICON).
6. Sandhya Tarar, ElaKumar,”Fingerprint Image Enhancement: Iterative Fast Fourier Transform Algorithm and Performance
36-43
-
Evaluation”,2013, International Journal of Hybrid Information Technology, Volume 6, No.4, July 2013. 7. Guang-Bin Huang, Qin-Yu Zhu, Chee-KheongSiew,,”Extreme Learning Machine: Theory and applications”, Volume 70, Issues 1-3,
December 2006, Pages 489-501.
8. Hai-Jun Rong, Yew-Soon Ong, ,”A fast pruned extreme learning machine for classification problem”, December 2008, Volume-72, Issues 1-3, Pages 359-366, Neurocomputing, Elsevier.
9. Jun-Ying Gan, Jun-Feng Liu, “Fusion and recognition of face and iris feature based on wavelet feature and KFDA”, 2009 International Conference on Wavelet Analysis and Pattern Recognition, IEEE.
10. Mohammad Hanif, Usman Ali,” Optimized Visual and Thermal Image Fusion for Efficient Face Recognition”, 2007, 9th International Conference on Information Fusion, IEEE.
11. Yibing Wang, BangjunHu , “A More Efficient Face Recognition Framework Based on Illumination Compensation, Kernel PCA and SVM”, 2014 Seventh International Symposium on Computational Intelligence and Design, IEEE.
12. Mina Farmanbar, OnsenToygar ,” A Hybrid Approach for Person Identification Using Palmprint and Face Biometrics”, June 2015, International Journal of Pattern Recognition and Artificial Intelligence 29(6):1556009.
13. Maryam Eskandari, OnsenToygar ,” A new approach for face-iris multimodal biometric recognition using score fusion.”, May 2013, International Journal of Pattern Recognition and Artificial Intelligence, Volume 27, Issue 03.
14. OmidSharifi, MaryanEksandari ,” Optimal Face-Iris Multimodal Fusion Scheme”, June 2016, Symmetry 8(6):48. 15. Chhaya Verma, Dr. Sandhya Tarar, “Watermark extraction and validation in images using hybrid techniques”(2016), International
journal of computer science trends and technology(IJCST), Volume 4, Issue 1.
16. Maria V. Ruiz, Zhanpeng Jin, Sarah Laszlo,” CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification.”, July 2016,IEEE Transactions on Information Forensics and Security ( Volume: 11, Issue: 7, )
17. C.M Sheela Rani, V. Vijaya Kumar, et al , “An Efficient Block based Feature Level Image Fusion Technique using Wavelet Transform and Neural Network.”, August 2012, International Journal of Computer Applications (0975 – 8887) Volume 52– No.12.
18. Secure ID News, Online source: https://www.secureidnews.com/news-item/iris-vs-retina-biometrics-yes-they-really-are-different/ 19. M2SYS Blog on biometric technology, Online source : http://www.m2sys.com/blog/biometric-hardware/reliable-biometric-modality/ 20. Feretdatabase : http://www.itl.nist.gov/iad/humanid/feret/feret_master.html 21. “Euclidean & Geodesic Distance between a Facial Feature Points in Two-Dimensional Face Recognition System”, Dec 2016,
RachidAhdid, KhaddoujTaifi.
22. Shouyi Yin *, Xu Dai, PengOuyang, Leibo Liu and Shaojun Wei, “A Multi-Modal Face Recognition Method Using Complete Local Derivative Patterns and Depth Maps”, Sensors , 2014, 14(10), 19561-19581.
23. Online Source: http://bias.csr.unibo.it/fvc2002/ 24. Online Source :https://utiris.wordpress.com/2014/03/04 /university- of- tehran-iris-image-repository/
8
Authors: Dmitry Topchiy, Andrey Tokarskiy
Paper Title: Formation of Hierarchies in the Organization System of the State Construction Supervision
during Reshaping of City Territories
Abstract: The authors in this article review the basic principles of the Formation of Hierarchies in the City of Territories. Also shown are the features of construction control (supervision) as a state regulatory apparatus in
the context of the current legislation of the Russian Federation and the world construction complex as a whole.
The development of an integrated control model for improving the qualimeter parameters of finished
construction products is described.
Keywords: Territories, Principles of the formation of hierarchy
References: 1. Energy audit of buildings commissioned after reprofiling of industrial facilities. Topchy D.V. Scientific Review. 2017. No. 9. P. 114-
117.
2. Adaptation of industrial buildings to social facilities. Topchy D.V. Housing construction. 2007. No. 7. P. 16-19. 3. Local expansion of the span of industrial buildings. Topchy D.V. Vestnik MGSU. 2007. No. 4. S. 95-99. 4. Changing the grid of columns of reconstructed single-storey multi-span buildings when adapting them for civilian objects. Topchy
D.V. Vestnik MGSU. 2010. No. 4-1. Pp. 294-303. 5. Preparation of former industrial sites for the construction of civil facilities. Topchy D.V. Architecture and construction of Russia.
2011. No. 5. P. 14-21.
6. Comprehensive construction supervision: requirements and necessity. Topchy D.V. Technology and organization of construction production. 2014. No. 1. P. 46-47.
7. Assessment of the potential for reprofiling industrial facilities. Topchy D.V. Technology and organization of construction production. 2014. № 3 (8). Pp. 40-42.
8. Evaluation of organizational, technological and economic parameters in the withdrawal of enterprises outside the city limits. Topchy D.V. Technology and organization of construction production. 2014. No. 4. P. 34-41.
9. Evaluation of organizational, technological and economic parameters in the withdrawal of enterprises outside the city limits. Topchy D.V. Technology and organization of construction production. 2015. No. 4-1 (9). Pp. 34-41.
10. Assessment of the correlation dependence of the material intensity of building structures of various types of industrial buildings that are subject to dismantling during the conversion of industrial areas. Topchy D.V. European Research. 2015. № 6 (7). Pp. 6-9.
11. Assessment of the structure of industrial enterprises to be redeveloped and located within the boundaries of large megacities. Topchy D.V. In the collection: innovative technologies in construction and geo-ecology. Materials of the II International Scientific and
Practical Conference. St. Petersburg State University of Communications named after Emperor Alexander I, Department of Engineering Chemistry and Natural Science. 2015. pp. 37-41.
12. Development of an organizational and managerial model for the implementation of projects for reprofiling industrial sites. Topchy D.V. In the collection: innovative technologies in construction and geo-ecology. Materials of the II International Scientific and Practical Conference. St. Petersburg State University of Communications named after Emperor Alexander I, Department of
Engineering Chemistry and Natural Science. 2015. pp. 42-60.
13. Project risk reduction reduction tool. Topchy D.V., Skakalov V.A., Yurgaitis A.Yu. International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 1, January 2018, pp. 985–993
14. A. Lapidus., I Abramov, For example of a construction company / A. Lapidus, I. Abramov // E3S Web of Conferences. - 2018. - No. 33.
15. A. Lapidus, A. Makarov, Formation of structural units within a construction company using A. system, A. Lapidus, A. Makarov // MATEC Web Conf. - 2016. - No. 86.
16. P. Oleinik, Method for a company / Oleinik P. // International Journal of Construction Management. - 2017. - No. 7.
44-46
9 Authors: Ritu Sachdeva (Sharma), Sachin Gupta
Paper Title: A Novel Algorithm for Enhancing Search Engine Optimization
https://www.secureidnews.com/news-item/iris-vs-retina-biometrics-yes-they-really-are-different/http://www.m2sys.com/blog/biometric-hardware/reliable-biometric-modality/http://www.itl.nist.gov/iad/humanid/feret/feret_master.htmlhttp://bias.csr.unibo.it/fvc2002/
-
Abstract: Google search engine uses Page Rank algorithm to rank websites in their search results. But, Page
Rank calculates only the importance of each page rather than relevancy. Whenever a user triggers a query to
be searched, searching algorithm finds pages associated with the query term i.e. on basis of relevancy. Then,
Page Rank selects the most imperative result. Different Search Engine use different searching algorithm plays
an indispensable role in searching relevant results. But efficiency of searching algorithm is calculated by
drafting algorithms for specific categories of data like strings. In numerous key approaches, the trie is a
recognized fast access method. The proposed algorithm is a search algorithm for path-compressed trie for
keyword searching in a database through a search engine. Faster searching optimizes the search engine and
speeds up the complete process of creating final results. Thus, greater SEO (search engine optimization), faster
will be Page Rank Algorithm
Keywords: binary trie, LC-trie, Page Rank, PAT, PATRICIA, Search Engine Optimization, Trie
References: 1. Stefan Nilsson, Matti Tikkanen, ”Implementing a dynamic compressed Trie”Proceeding WAE’98, Saarbricken, Germany, (1998),
Ed. Kurt , pp. 1-3
2. Heinz, S. Zobel, J. & Williams, H.E., “Burst tries: A fast, efficient data structure for string keys”, ACM Transactions on Information Systems 20(2), 192-223
3. Aanchal Kakkar et al, “Search Engine Optimization: A Game of Page Ranking, (2015) 978-9-3805-4416- 8/15 IEEE 4. John B. Killoran, “how to use search engine optimization techniques to increase website visibility”, (2013), IEEE transaction on
professional communication vol 56 no. 1
5. Santosh Kumar Ganta, “Search Engine Optimization through Web Page Rank Algorithm”,(2011), ISSN: 0976- 8491, IJCST Vol. 2, Issue 3
6. Renalyn C. Antonio et al, “i-search: Document searching using Page Rank Algorithm”(2015), ISSN: 2278- 5299, Int. Journal of Latest Research in science and Technology, Volume 4, Issue 1: Page no. 70-74
7. N. Kaur & J. Kaur, “Development of Ranking algorithm for Search Engine Optimization”,(2014), International Journal of Engineering Research & Technology, India, ISSN: 2278-0181, Vol-3
8. K. Shum, “Notes on Page Rank Algoritnm”, (2013), ENGG2012B Advanced Engineering Mathematics 9. D.R. Morrison,” PATRICIA- practical algorithm to retrieve information coded in alphanumeric (1968), Journal of the ACM, 15,
514-534
10. Masami Shishibori et al, “A key search algorithm using the com pact Patricia Trie”, (1997), IEEE International Conference on Intel ligent Processing systems, Beijing, China
11. Niloufar shafiei, “Non-blocking Patricia Tries with Replace Operations”, (2013), IEEE, 33rd International conference on Distributed Computing Systems
12. M. Shishiburi et al., “An Efficient Method of Compressing Binary Tries”,(1996), IEEE, 7803-3280-6 13. Ayush Jain, “The Role and Importance of Search Engine and Search Engine Optimization”,(2013), IJETICS Vol. 2, Issue 3, ISSN-
2278-6856 14. Shipra Kataria & Pooja Sapra, “A Novel Approach for Rank Optimization using Search Engine Transaction Logs”,(2016), 978-9-
3805-4421-2/16, IEEE
15. Search Engine Optimization – tutorialspoint, simply easy learning, http://www.tutorialspoint.com/seo /seo_tutorial.pdg 16. Neil V. Murray et al, “Reduced implicate tries with updates”,(2008) Oxford University Press, Vol. 20, The author 17. P. Flat, “On the performance evaluation of extendible hashing and trie searching” (1983), Acta Informatica, 20: 345-369 18. E. Fredkin, “This memory” (1960), Communications of the ACM, 3.490-500, 19. Arne Andersson et al, “Efficient implementation of suffix trees”(1995), Software –Practice and Experience, VOL. 25(2), 129- 141,
CCC 0038- 0644/95/020129-13
20. Neha Mangla et al, “Context based Indexing in Information Retrieval System using BST”(2014), International Journal of scientific and research Publications, Volume 4, Issue 6, ISSN 2250-3153.
21. V. R. Kangavalli, G. Maheeja, “A study on the usage of data structures in Information retrieval” (2016), National Conference on Innovations in Communication and Computing Technologies
22. Monther Aldwairi et al. , “IP Lookup using two- level indexing and B-trees”,(2010), International Conference on Internet Computing, ICOMP ,Las Vegas Nevada, USA
23. Roberto Grossi et al, “Fast compressed tries through path decompositions” (2014), ACM journal of experimental algorithms, Vol. 19, No. 1, Article 1.8,
24. Erik Demaine, “Advanced data structures”(2012), Lecture L16 , Spring 2012 25. Isara Nakavisute, “Optimizing information retrieval (IR) time with doubly linked list and binary search tree (BST)” (2015),
international journal of advanced computational engineering and networks, ISSN 2320- 2106, Volume-3, Issue-12
26. Rene De La Briandais, “File searching using variable length keys”, (1959), western joint computer conference, p.295-298, San Francisco, California
27. Andersson, A, Nilsson, S. “ Improved Behaviour of Tries by Adaptive Branching. IPL, 46(6):295-300 28. Hatab, Rayhan,” Improve Website Rank Using Search Engine Optimization (SEO)” (2014), Thesis Submitted to Faculty of
Computer & Information Al-Madinah International University
29. Atish Das Sarma , Anisur Rahaman Molla , Gopal Pandurangan Eli Upfal ,” Fast Distributed PageRank Computation”, ∗Appeared in Theoretical Computer Science (TCS) (2015), volume 561, pages 113- 121
30. H. Ishii, R. Tempo and E. Bai, "A Web Aggregation Approach for Distributed Randomized PageRank Algorithms” (2012), IEEE Transactions on Automatic Control, vol. 57, no. 11, pp. 2703-2717, doi: 10.1109/TAC.2012.2190161.
31. M. Thenmozhi, H. Srimathi, “An Analysis on the Performance of Tree and Trie based Dictionary Implementations with Different Data Usage Models” (2015), Indian Journal of Science and Technology, Vol 8(4), 364–375, ISSN (Online) : 0974-5645 , DOI:
10.17485 /ijst/2015/v8i4/59865 32. Sangita Karmakar and Soumen Swarnakar, “New Concept based Indexing Technique for Search Engine” (2018), Indian Journal of
Science and Technology, Vol 10(18), DOI: 0.17485/ijst/2017/ v10i18/ 114018, 0974-6846 ISSN (Online) : 0974-5645
33. https://www.searchmetrics.com/knowledge-base/ranking-factors/ 34. S. Hussien, “Factors Affect Search Engine Optimization” (2014), IJCSNS International Journal of Computer Science and Network
Security, VOL.14 , No.9
47-53
10
Authors: Y. K. Salal, Prof. S. M. Abdullaev, Mukesh Kumar
Paper Title: Educational Data Mining: Student Performance Prediction in Academic
Abstract: At present data mining techniques become very popular among the data analyst. It became an effective tool for finding the uncovered information from a big database. Due to this feature data mining are
adopted by many areas like education, telecommunication, retail management etc to resolve their business
54-59
http://www.tutorialspoint.com/seo%20/seo_tutorial.pdghttps://www.searchmetrics.com/knowledge-base/ranking-factors/
-
problems. In this paper, for building classification models for ‘student performance’ dataset consisting of 649
different instances with 33 different attributes implement algorithms like NaiveBayes, Decision Tree (J48),
RandomForest, RandomTree, REPTree, JRip, OneR, SimpleLogistic and ZeroR. After implementing these
algorithms on student performance dataset, we evaluate and compare the implementation result for better
accuracy of prediction. The result of this study is extremely significant and hence provides a greater insight for
evaluating the student performance and underlines the significance of data mining in education. It also shows
that how students attributes affect the student performance.
Keywords: Naive Bayes, k-nearest neighbor, Logistic regression, J4.8, RandomForest.
References: 1. P. Cortez and A. Silva. Using Data Mining to Predict Secondary School Student Performance. In A. Brito and J. Teixeira Eds.,
Proceedings of 5th FUture BUsiness TEChnology Conference (FUBUTEC 2008) pp. 5-12, Porto, Portugal, April, 2008, EUROSIS,
ISBN 978-9077381-39-7. [Web Link6 ]
2. P. Cortez and A. Silva. Using Data Mining to Predict Secondary School Student Performance. In A. Brito and J. Teixeira Eds., Proceedings of 5th FUture BUsiness TEChnology Conference (FUBUTEC 2008) pp. 5-12, Porto, Portugal, April, 2008, EUROSIS,
ISBN 978-9077381-39-7. [Web Link6 ]
3. S. Harvey. Mining Information from US Census Bureau Data. 4. Mukesh Kumar, A.J. Singh, Disha Handa,"Literature Survey on Student’s Performance Prediction in Education using Data Mining
Techniques", International Journal of Education and Management Engineering(IJEME), Vol.7, No.6, pp.40-49, 2017.DOI:
10.5815/ijeme.2017.06.05 5. Turban E.; Sharda R.; Aronson J.; and King D., 2007. Business Intelligence, A Managerial Approach. Prentice-Hall. 6. Witten I. and Frank E., 2005. Data Mining: Practi- cal Machine Learning Tools and Techniques with Java Implementations. Morgan
Kaufmann, San Francisco, CA. 7. Luan J., 2002. Data Mining and Its Applications in Higher Education. New Directions for Institutional Research, 113, 17–36. 8. Mukesh Kumar, A.J. Singh, "Evaluation of Data Mining Techniques for Predicting Student’s Performance", International Journal of
Modern Education and Computer Science(IJMECS), Vol.9, No.8, pp.25-31, 2017.DOI: 10.5815/ijmecs.2017.08.04 9. Ma Y.; Liu B.; Wong C.; Yu P.; and Lee S., 2000. Targeting the right students using data mining. In Proc. of 6th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining. Boston, USA, 457–464.
10. M. Kumar, S. Shambhu, P. Aggarwal, "Recognition of Slow Learners Using Classification Data Mining Techniques", Imperial Journal of Interdisciplinary Research, vol. 2, no. 12, 2016.
11. Mashael A. Al-Barrak And Mona S. Al-Razgan, predicting students‟ performance through classification: a case study, Journal of Theoretical and Applied Information Technology 20th May 2015. Vol.75. No.2
12. Edin Osmanbegović and Mirza Suljic, DATA MINING APPROACH FOR PREDICTING STUDENT PERFORMANCE, Economic Review – Journal of Economics and Business, Vol. X, Issue 1, May 2012.
13. Raheela Asif, Agathe Merceron, Mahmood K. Pathan, Predicting Student Academic Performance at Degree Level: A Case Study, I.J. Intelligent Systems and Applications, 2015, 01, 49-61 Published Online December 2014 in MECS (http://www.mecs-press.org/) DOI:
10.5815/ijisa.2015.01.05
14. Mohammed M. Abu Tair, Alaa M. El-Halees, Mining Educational Data to Improve Students‟ Performance: A Case Study, International Journal of Information and Communication Technology Research, ISSN 2223-4985, Volume 2 No. 2, February 2012.
15. Dr Pranav Patil, a study of student’s academic performance using data mining techniques, international journal of research in computer applications and robotics, ISSN 2320-7345, vol.3 issue 9, pg.: 59-63 September 2015.
16. Jyoti Bansode, Mining Educational Data to Predict Student‘s Academic Performance, International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169, Volume: 4 Issue: 1, 2016.
17. R. Sumitha and E.S. Vinoth kumar, Prediction of Students Outcome Using Data Mining Techniques, International Journal of Scientific Engineering and Applied Science (IJSEAS) – Volume-2, Issue-6,June 2016 ISSN: 2395-3470.
18. Karishma B. Bhegade and Swati V. Shinde, Student Performance Prediction System with Educational Data Mining, International Journal of Computer Applications (0975 – 8887) Volume 146 – No.5, July 2016.
19. Mrinal Pandey and S. Taruna, Towards the integration of multiple classifiers pertaining to the Student's performance prediction, http://dx.doi.org/10.1016/j.pisc.2016.04.076 2213-0209/© 2016 Published by Elsevier GmbH. This is an open access article under the
CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
20. Niranjan Lal, Shamimul Qamar , Monika Kalra, “K- Mean Clustering Algorithm Approach for Data Mining of Heterogeneous Data” Information and Communication Technology for Sustainable Development{ICT4SD), LNNS, Springer Proceeding , Volume 10,
pp.61-70 2017.
11
Authors: M Anto Juliet Mary, Vani Ramesh, Vishal C Jaunky
Paper Title: Work Life Integration of Migrant Faculty at Higher Educational Institutions, Bangalore
Abstract: Migration is an intended drive between and within the national fringes by any professional. Recently, initial and growing disparity in development between and among states has triggered such
movement. The dimensions notable are demographic, socio cultural, economic, political, infrastructural,
technological and environmental. Referring to academic migrants, interstate migrants are those who have
moved to other states for employment opportunities. Intra state academicians are moved within the state for
employment opportunities. Research in higher education for the migrant academicians is very stimulating as
well as a demanding. One of the Challenges faced by the migrant academicians is balancing the academic
career with family responsibilities. The use of the term integration refers to the areas of work and life domains
that are interconnected, overlapping, or interspersed throughout the day, which may be a prominent source of
positive spillover or negative conflict for people in the workplace. Hence this research attempts to assess the
work life integration with respect to role of work family conflict (WFC) and family work conflict (FWC)
experienced by the academicians migrated to Bangalore, working in private institutions by using PESTLE
determinants (Political, Economic, Social, Technical, Legal and Environmental). The findings will increase
our understanding PESTLE impact on the migrant faculty’s work life integration and purely for contributing
for the existing literature.
Keywords: Migration, Migrant academicians, work life integration, work life conflict, family work conflict
References:
60-66
-
1. Adepoju, A. (1998, Sep), Linkages between and internal and international migration : The African Situation. International Social Science Journal, 50(157), 387.
2. Bailyen, L., and Joyce, F. K. (2002), work redesign theory and practise. MIT sloan university. 43-12(1) 3. Byrne, U. (2017), Work-life balance. Business Information Review, 22(1), 53-59. 4. Collina, M., and Rawlings, F. (2014, july), Academic Migration, Discipline Knowledge and Pedagogical Practice. voices from the
Asia pacific. Retrieved from
https://www.nafsa.org/Resource_Library_Assets/Networks/RS/Book_Reviews/Academic_Migration,_Realities,_and_Challenges/Department of Economic Affairs . (2017). Economic Survey of India. Delhi: Goverment of India. Retrieved from
https://www.indiabudget.gov.in/es2016-17/echapter.pdf
5. Greenhaus, J. H., and Beutell, N. J. (1985, january), Sources of conflict between work and family roles. Academy of the management review, 10(1).
6. Halpern, D. F., and Murphy, S. E. (Eds.)(2015), From work–family balance to work– family interaction: Changing the metaphor. Mahwah, NJ: Erlbaum. 1355(24)
7. India, G. o. (2001), census of India 2001. governement of India ,Ministry of home affairs. 8. Kreiner, G. E., Hollensbe, E. C., and Sheep, M. L. (2016), Balancing borders and bridges: Negotiating the work-home interface via
boundary work tactics. Academy of Management Journal, 52, 704-730. 9. Kanter, R. M. (1989), Work and family in the united states :A critical review and agenda for reseach and policy (Vol. 2). New York:
Russel Sage Foundaton(1).
10. Mukerji, S. (1994), Interstate migration and regional disparities in India. Bombay: Himalaya Publishing. 11. Price Water Coopers. (2007), (Citizens perception on Democratic Capital, 2007). Bangalore: PWC. Retrieved from
https://www.pwc.in/assets/pdfs/citizens-perception-on-democratic-capital.pdf
12. Ramesh, R., & Shyam, k. K. (2014), Role of Employee Empowerment in Organizational. International Journal of scientific research and management (IJSRM), 2(8), 1241-1245.
13. Reddy, K. (2010, jul), Work–Life Balance among Married Women Employees. Indian Journal of Pshycological constrol, 32(2). 14. Ragu-Nathan, T. S., and Ragu-Nathan, B. S. (2017), Crossing to the dark side: Examining creators, outcomes, and inhibitors of
technostress. Communications of the ACM, 67(9), 143-170.
15. Srivastava, R., and Sasikumar, S. K. (2003), An overview of migration in India and its key impacts and issues. 16. Regional Conference on Migration, Development and Pro-Poor. Dhaka. 17. Tabachnick, b. s., and fidell, l. s. (1996), Using multivariate statistics, 43-56-89(3). 18. Tembhekar, C. (2013, February 3), The times of India. Retrieved from The times of India.indiatimes.com:
https://timesofindia.indiatimes.com/city/bengaluru/Bangalore-gets-lions-share-of-educated-migrants/articleshow/18344203.cms
19. Niranjan Lal, Shamimul Qamar, Savita Shivani, “Search Ranking for Heterogeneous Data over Dataspace”, Indian Journal of Science and Technology (Scopus Indexed). Volume 9, Issue 36, pp.1-9, 2016
20. Work–Life Balance among Married Women Employees. (2010, Jul-Dec), Indian Journal of Psychological Medicine, 2(32). doi:10.4103/0253-7176.78508
12
Authors: Neha Miglani, Gaurav Sharma
Paper Title: Modified Particle Swarm Optimization based upon Task categorization in Cloud Environment
Abstract: Cloud Computing has become a spearhead in the field of industries and academia. As far as the IT Industry is concerned, it is pioneering the peculiar domains of clustering, virtualization and grid computing.
Traditionally, the complex computation nowadays, demands abundance of resources and computing facilities
to perform operational tasks. Cloud computing provides user a new wave in procuring available resources. To
scale up the capacity, task scheduling has been emerged as one of the key features of Cloud Computing.
Though it is considered as NP-Hard problem, yet numerous researchers and authors have tried to reap out the
effective and implementable results for scheduling of tasks to different virtual machines. Meta-heuristic
techniques have been embedded to obtain nearly optimal results in the previous studies, still loopholes are
lying in the consideration of multiple QoS parameters. In this paper, PSO approach has been modified by
manipulating parameters based on the QoS factors from the very initial stage. Instead of considering the
population randomly, MIPS and Bandwidth factors have been inculcated to refine and adjust the parametric
structure as well as for balancing the load more efficiently. The experimental setup shows that the proposed
algorithm works fairly well in assigning the upcoming tasks, henceforth, resulting in reduction of execution
time as well.
Keywords: Cloud Computing, Load Balancing, Particle Swarm Optimization, Quality of Service, Task Scheduling
References: 1. Karger D, Stein C, Wein J. Scheduling Algorithms. “Algorithms and Theory of Computation Handbook: special topics and
techniques”. Chapman & Hall/CRC; 2010.
2. M.A. Arfeen, K. Pawlikowski, A. Willig. “A Framework for Resource Allocation Strategies in Cloud Computing Environment”. Computer Software and Applications Conference Workshops (COMPSACW), IEEE 35th Annual, 2011, pp. 261 -266.
3. Salim Bitam, “Bees Life algorithms for job scheduling in cloud computing”, International Conference on computing and Information Technology, 2012.
4. Saeed Parsa and Reza Entezari-Maleki, “RASA: A New Grid Task Scheduling Algorithm”, International Journal of Digital Content Technology and its Applications, Vol.3, pp. 91-99, 2009.
5. Mala Kalra and Sarbjeet Singh, ”A review of metaheuristic scheduling techniques in cloud computing”, Egyptian Informatics Journal (2015) 16, 275-295.
6. Talbi EG. “Metaheuristics: from Design to Implementation” Wiley; 2009. 7. Hemlata S. Urade and Prof. Rahila Patel, “Study and Analysis of Particle Swarm Optimization: A Review” 2nd National Conference
on Information and Communication Technology (NCICT) 2011. 8. Rodriguez M A, Buyya R, "Deadline based Resource Provisioning and Scheduling Algorithm for Scientific Workflows on Clouds [J]",
IEEE Transactions on Cloud Computing, vol. 2, no. 2, pp: 222-235, 2014.
9. Zhang L, Chen Y, Sun R, et al., "A Task Scheduling Algorithm based on PSO for Grid Computing [J]", International Journal of Computational Intelligence Research, vol. 4, no. 1, pp: 37-43, 2008.
10. Tirado J M, Higuero D, Isaila F, et aI., "Predictive Data Grouping and Placement for Cloud-based Elastic Server Infrastructures [C]", Proceedings of the 2011 11th IEEE ACM International Symposium on Cluster, Cloud and Grid Computing, pp: 285-294,
2011.
11. Pandey, S., Wu, L., Guru, S. M., & Buyya, R., “A particle swarm optimization-based heuristic for scheduling workflow applications in cloud computing environments”, IEEE International Conference on Advanced Information Networking and Applications
67-72
https://www.indiabudget.gov.in/es2016-17/echapter.pdfhttps://www.pwc.in/assets/pdfs/citizens-perception-on-democratic-capital.pdfhttps://timesofindia.indiatimes.com/city/bengaluru/Bangalore-gets-lions-share-of-educated-migrants/articleshow/18344203.cms
-
(AINA), pp. 400-40, 2010. 12. M.Sridhar and G. Rama Mohan Babu,” Hybrid Particle Swarm Optimization Scheduling for Cloud Computing”, International
Advance Computing Conference (IACC), 978-1-4799-8047-5/15, 2015 IEEE.
13. HE Hua, XU Guangquan, PANG Shanchen, ZHAO Zenghua, “AMTS: Adaptive Multi-Objective Task Scheduling Strategy in Cloud Computing” China Communications, April, 2016.
14. Baliga J, Ayre R W A, Hinton K, et aI. "Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport [Jr, Proceedings of the IEEE, vol. 99, no. 1, pp: 149-167, 2011.
15. Kumar P, Verma A, "Independent Task Scheduling in Cloud Computing by Improved Genetic Algorithm [Jr, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 5, pp: 111-114, 2012.
16. T. Chen, B. Zhang, X. Hao, Y. Dai, “Task scheduling in grid based on particle swarm optimization”, The Fifth International Symposium on Parallel and Distributed Computing, ISPDC '06. pp. 238-245, 2006.
17. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, I. Brandic, “Cloud Computing and Emerging IT Platforms”, Vision, Hype, and Reality for Delivering Computing as the 5th Utility, Future Generation Computer Systems 25(6), 599–616 (2009).
18. Baomin Xu, Chunyan Zhao, Enzhao Hu, Bin Hu, “Job scheduling algorithm based on Berger model in cloud environment”, Advances in Engineering Software 42, PP. 419–425,2011.
19. M.A. Arfeen, K. Pawlikowski, A. Willig. “A Framework for Resource Allocation Strategies in Cloud Computing Environment. Computer Software and Applications”, Conference Workshops (COMPSACW), IEEE 35th Annual, 2011, pp. 261 -266.
20. Solmaz Abdi, Seyyed Ahmad Motamedi, and Saeed Sharifian, “Task Scheduling using Modified PSO Algorithm in Cloud Computing Environment”, International Conference on Machine Learning, Electrical and Mechanical Engineering (ICMLEME'2014) Jan. 8-9, 2014 Dubai (UAE).
21. Kennedy, J., “Particle swarm optimization”, In Encyclopedia of Machine Learning, Springer US, pp. 760-766, 2010.
22. B. K. Nanda, G. Das, "Ant colony optimization: a computational intelligence technique", Int. J. Comput. Commmun.
Technol, vol. 2, no. 6, pp. 105-110, 2011. 23. Anqi Xu, Yang Yang, Zhenqiang Mi and Zenggang Xiong,” Task scheduling algorithm based on PSO in cloud environment”, DOI
10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015, 978-1-4673-7211-4/15 IEEE.
24. A.I.Awad, N.A.El-Hefnawy, H.M.Abdel_kader, “Enhanced Particle Swarm Optimization For Task Scheduling In Cloud Computing Environments”, International Conference on Communication, Management and Information Technology (ICCMIT ) Procedia Computer Science 65 ( 2015 ) 920 – 929.
25. James Kennedy and Russel Eberhart” Particle Swarm Intelligence”, IEEE 1995. 26. Rajesh K. Bawa and Gaurav Sharma, “Modified Min –Min Heuristic for Job Scheduling based on QoS in Grid Environment”. IEEE
Conference on International Management in the Knowledge Economy, 19-20 December 2013.
27. Rajesh K. Bawa and Gaurav Sharma, "Reliable resource selection in grid environment”. International Journal of Grid Computing & Applications, March 2012, Volume 3, Number 1, pp. 1-10.
28. Upadhyaya Jolly and Ahuja Neelu Jyoti, “Quality of Service in Cloud Computing in Higher Education: A Critical Survey and Innovative Model” International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2017) 978-1-5090-
3243-3/17 2017 IEEE. 29. Mondal Himadri Shekhar, Hasan Md. Tariq, Karmokar Taposh Kumar, Sarker Shamlendu, “Improving Quality of Service in cloud
computing architecture using Fuzzy Logic” Proceedings of the 2017 4th International Conference on Advances in Electrical Engineering (ICAEE), 978-1-5386-0869-2/17 2017 IEEE.
30. Abdallah A.Z.A. Ibrahim, Sebastien Varrette and Pascal Bouvry, “On Verifying and Assuring the Cloud SLA by Evaluating the Performance of SaaS Web Services across Multi-Cloud Providers” 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops 2325-6664/18 2018 IEEE DOI 10.1109/DSN-W.2018.00034.
31. Halabi, Talal, and Martine Bellaiche. "Evaluation and selection of Cloud security services based on Multi-Criteria Analysis MCA." Computing, Networking and Communications (ICNC), 2017 International Conference on. IEEE, 2017.
32. Shan Luo, Yanhui Zhou, “How to Guarantee the Cloud Services Quality” 978-1-4673-9904-3/16 2016lEEE. 33. Huimin Zhang, Xiaolong Yang, “Cloud Computing Architecture based-on SOA” 2012 Fifth International Symposium on
Computational Intelligence and Design 978-0-7695-4811-1/12 IEEE 34. David S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise. RR Donnelley, Crawfordsville, Indiana.
September 2009.
35. Niranjan Lal, Dr. S Qamar, Mrityunjay Singh” Internet-ware cloud computing Challenges” International Journal of Computer Science and Information Security (IJCSIS)- 1947-5500, Vol. 7, No. 3, pp. 206-210, 2010.
36. Buyya R, Ranjan R, Calheiros R N. “Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities” Proceedings of the Conference on High Performance Computing and Simulation (HPCS
2009), Leipzig, Germany. IEEE Press: New York, U.S.A., 21–24 June 2009; 1–11.
13
Authors: Preeti Sirohi, Amit Agarwal, Piyush Maheshwari
Paper Title: A framework for ranking of cloud services using non dominated sorting
Abstract: Cloud computing technology offers variety of cloud services to the users. The cloud user faces the
challenge in choosing the service which can meet his requirements. Therefore, selection of an approach which
can compare and select the best service according to the requirement is an issue. Several approaches,
algorithms and frameworks have been proposed and designed which provide solutions to its user in choosing
the best services. This paper proposed a framework which will use both subjective and objective parameter and
is based on non-dominated sorting approach for ranking of cloud services. Various genetic algorithm are
studied, analyzed and compared with each other find out their limitations.
Keywords: Cloud computing, Genetic Algorithm, Multi-Objective Optimization
References: 1. B¨ack, T. (1996). Evolutionary Algorithms in Theory and Practice. Oxford University Press, New York 2. C.A. Coello Coello, An updated survey of GA-based multiobjective optimization techniques, ACM Computing Surveys 32 (2) (2000)
109–143. 3. Chankong, V., & Haimes, Y. Y. (1 983). Multiobjective decision making theory and methodology. New York: North-Holland. 4. C.M. Fonseca, P.J. Fleming, An overview of evolutionary algorithms in multiobjective optimization, Evolutionary Computation 3 (1)
(1995) 1–16. 5. Coello, C. A. C. (1999). A comprehensive survey of evolutionnary-based multiobjective optimization. Knowledge and Information
Systems, 1(3):269–308.
6. Deb, K. (1999). Multi-objective genetic algorithms: Problem difficulties and construction of testproblems. Evolutionary Computation, 7(3):205–230.
7. Deb K, Multi-Objective Optimization Using Evolutionary Algorithms, John Wiley & Sons Ltd., 2001. 8. D.A. Van Veldhuizen, G.B. Lamont, Multiobjective evolutionnary algorithms: analyzing the state-of-the-art, Evolutionary
73-77
-
Computation 8 (2) (2000) 125–147. 9. Deb, K., Agarwal, S., Pratap, A. and Meyarivan, T. (2000b).A fast elitist non-dominated sorting genetic algorithm for multi-objective
optimization: NSGA-II. In Proceedings of Parallel Problem Solving from Nature VI (PPSN-VI), pp. 849-858.
10. Deb, K., Pratap, A., Agarwal, S., and Meyarivan, T., A fast and elitist multiobjective genetic algorithm: NSGA-II, IEEE Transactions on Evolutionary Computation 6(2) (2002) 182-192.
11. Deb, Kalyanmoy. "Evolutionary algorithms for multi-criterion optimization in engineering design." Evolutionary algorithms in engineering and computer science 2 (1999): 135-161.
12. Deb, Kalyanmoy, et al. "A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II." International Conference on Parallel Problem Solving From Nature. Springer, Berlin, Heidelberg, 2000.
13. Fonseca, C. M. and Fleming, P. J. (1998).Multiobjective optimization andmultiple constraint handling with evolutionary algorithms—part ii: Application example. EEE Transactions on Systems, Man,and Cybernetics, 28(1):38–47
14. Fonseca, C.M. and Fleming, P.J. Multiobjective genetic algorithms. in IEE Colloquium on `Genetic Algorithms for Control Systems Engineering' (Digest No. 1993/130), 28 May 1993. 1993. London, UK: IEEE.
15. Garg, Mohinder P., Ajai Jain, and Gian Bhushan. "Modelling and multi-objective optimization of process parameters of wire electrical discharge machining using non-dominated sorting genetic algorithm-II." Proceedings of the Institution of Mechanical Engineers, Part
B: Journal of Engineering Manufacture 226.12 (2012): 1986-2001 16. Horn, J., Nafpliotis, N., and Goldberg, D.E. A niched Pareto genetic algorithm for multiobjective optimization. in Proceedings of the
First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence, 27-29 June 1994. 1994.
Orlando, FL, USA: IEEE. 17. Holland, J. H. (1975). Adaptation in Natural and Artificial Systems. Ann Arbor,MI: MIT Press. 18. Holland, J.H., Adaptation in Natural and Artificial Systems, University of Michigan Press, Ann Arbor, 1975. 19. K. Miettinen, Nonlinear Multiobjective Optimization, Kluwer Academic Publishers, 1999. 20. Koduvilarpatti, Theni. "Strength Pareto evolutionary algorithm based multi-objective optimization for shortest path routing problem in
computer networks." Journal of Computer Science7.1 (2011): 17-26.
21. Kursawe, F. (1991). A variant of evolution strategies for vector optimization. In Schwefel, H.-P. and M¨anner, R., editors, Parallel Problem Solving from Nature – Proceedings of the FirstWorkshop PPSN,pages 193–197, Springer, Berlin, Germany.
22. 23. M. Li, S. Yang, and X. Liu. 2013. Shift-based density estimation for Pareto-based algorithms in many-objective optimization. IEEE
Transactions on Evolutionary Computation PP, 99, 1.
24. M. Reyes-Sierra, C.A. Coello Coello, Multi-objective particle swarm optimizers: a survey of the state-of-the-art, International Journal of Computational intelligence Research 2 (3) (2006) 287–308.
25. Murata, T. and Ishibuchi, H. (1995). MOGA: multi-objective genetic algorithms. In Proceedings of the Second IEEE International Conference on Evolutionary Computation, pp. 289-294.
26. Schaffer, J. D. (1985).Multiple objective optimization with vector evaluated genetic algorithms. In proceedings of the first International Conference on Genetic Algorithms, pp. 93-100.
27. Srinivas, N. and Deb, K. (1994). Multi-objective function optimization using non-dominated sorting genetic algorithms. Evolutionary Computation Journal 2(3), pp. 221-248.
28. W. Stadler, A survey of multicriteria optimization or the vector maximum problem, part I: 1776–1960, Journal of Optimization Theory and Applications 29 (1979) 1–52.
29. Zitzler, E. and Thiele, L. (1998). Multiobjective optimization using evolutionary algorithms – a comparative case study. In Eiben, A. E., B¨ack, T., Schoenauer, M. and Schwefel, H.-P., editors, Fifth International Conference on Parallel Problem Solving from Nature
(PPSN-V), pages 292–301, Springer, Berlin, Germany. 30. Zitzler, E. and Thiele, L., Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach, IEEE
Transactions on Evolutionary Computation 3(4) (1999) 257-271.
31. Zhou, B. Qu, H. Li, S. Zhao, P. N. Suganthan and Q.Zhang 2011. Multi-objective evolutionary algorithm: A survey of the state of the art. Swarm and Evolutionary Computation 1, 1, 32–49.
32. Niranjan Lal, Shamimul Qamar, Savita Shivani, “Search Ranking for Heterogeneous Data over Dataspace”, Indian Journal of Science and Technology (Scopus Indexed). Volume 9, Issue 36, pp.1-9, 2016
14
Authors: Samir Yerpude, Tarun Kumar Singhal
Paper Title: New Product Development – A Transformational Perspective with Internet of Things
Abstract: There is a fierce competition prevailing in the market due to different aspects that influenced such as globalization. Customers are exposed to the variety of goods encapsulated with complete information.
Organizations are constantly on the lookout for means for survival. New product development is one such area
where the organizations are concentrating rigorously. New product development is amongst the eight
constructs of supply chain and a very important one as the future of the organization depends on the new
product launched by the organizations. For a successful product launch, it is vital to be proactive in capturing
the customer requirements. Researchers vide this study and in consultation with industry experts in supply
chain and Information-technology area recommend the implementation of Internet of Things in this domain.
The primary considerations are due to the speed of the Internet and the ubiquitous presence of Internet and
Internet of Things. The business value derived with this implementation is discussed along with the
recommended architecture for the application.
Keywords: Business Value Realization; EDSOA; Internet of Things; IoT Architecture; New Product
Development.
References: 1. D. Lambert and M. Cooper, "Issues in Supply Chain Management", Industrial Marketing Management, vol. 29, no. 1, pp. 65-83, 2000. 2. S. Wheelwright and K. Clark, Revolutionizing product development. New York, N.Y.: Free Press/Simons & Schuster, 2011. 3. S. Brown and K. Eisenhardt, "PRODUCT DEVELOPMENT: PAST RESEARCH, PRESENT FINDINGS, AND FUTURE
DIRECTIONS", Academy of Management Review, vol. 20, no. 2, pp. 343-378, 1995. 4. R. Mancha, S. Fixson, J. Bailey, V. Seidel, B. Iyer, S. Erzurumlu and S. Gordon, "8 Ways Digital Transformation is Changing New
Product Development", Faculty & Leadership Blog, 2017. [Online]. Available: http://blogs.babson.edu/leadership/2017/06/16/8-ways-
digital-transformation-is-changing-new-product-development/. [Accessed: 03- Feb- 2018]. 5. S. Yerpude and T.K. Singhal, "Internet of Things based Customer Relationship Management – A Research Perspective", International
Journal of Engineering & Technology, vol. 7, no. 27, p. 444, 2018
6. H. Kopetz, Real-time systems. New York, NY: Springer, 2011 7. S. Yerpude and T.K. Singhal, "Internet of Things and its impact on Business Analytics", Indian Journal of Science and Technology,
vol. 10, no. 5, pp. 1-6, 2017
78-85
-
8. S. Yerpude and T.K. Singhal, "Enhancing New Product Development Effectiveness With Internet of Things Origin Real Time Data", Journal of Cases on Information Technology, vol. 20, no. 3, pp. 21-35, 2018.
9. F. Buttle, Customer relationship management: concepts and technologies, 2nd ed. London: Routledge, 2009. 10. A. Khurana, "Towards holistic “front ends” in new product development", Journal of Product Innovation Management, vol. 15, no. 1,
pp. 57-74, 1998.
11. D. Nobelius and L. Trygg, "Stop chasing the Front End process — management of the early phases in product development projects", International Journal of Project Management, vol. 20, no. 5, pp. 331-340, 2002.
12. P. Kotler, N. Rackham and S. Krishnaswamy, "Ending the War Between Sales and Marketing", HARVARD BUSINESS SCHOOL PUBLISHING CORPORATION, 2006.
13. R. Fisk, "A Customer Liberation Manifesto", Service Science, vol. 1, no. 3, pp. 135-141, 2009. 14. M. Nagamachi, "Kansei Engineering: A new ergonomic consumer-oriented technology for product development", International
Journal of Industrial Ergonomics, vol. 15, no. 1, pp. 3-11, 1995.
15. S. Yerpude and T.K. Singhal, Customer Service Excellence through Internet of Things, 1st ed. Germany: Lambert Academic Publishing, 2017
16. S. Yerpude and T.K. Singhal, "Augmentation of Effectiveness of Vendor Managed Inventory (VMI) Operations with IoT Data – A Research Perspective", International Journal of Applied Business and Economic Research, vol. 15, no. 16, 2017
17. S. Yerpude and T.K. Singhal, "Impact of Internet of Things (IoT) Data on Demand Forecasting", Indian Journal of Science and Technology, vol. 10, no. 15, pp. 1-5, 2017
18. "IoT installed base by category 2014-2020", Statista, 2015. [Online]. Available: https://www.statista.com › Technology & Telecommunications › Consumer Electronics. [Accessed: 24- Nov- 2017].
19. A. Nabulsi, "The Digital Universe of Opportunities", Slideshare, 2014. [Online]. Available: https://www.slideshare.net/ abdullah_nabulsi/idc-digitaluniverse2014-33810387. [Accessed: 12- Nov- 2017]
20. S. Sagiroglu and D. Sinanc, "Big data: A review", 2013 International Conference on Collaboration Technologies and Systems (CTS), 2013.
21. D. Wellers, "Is this the future of the Internet of Things?", Word Economic Forum, 2015. [Online]. Available: https://www. weforum.org/agenda/2015/11/is-this-future-of-the-Internet- of-things. [Accessed: 05- Nov- 2017].
22. S. Yerpude and T.K. Singhal, "Customer Service Enhancement through “On-Road Vehicle Assistance” Enabled with Internet of Things (IoT) Solutions and Frameworks: A Futuristic Perspective", International Journal of Applied Business and Economic Research, vol. 15, no. 16, 2018
23. S. Kemp, "Digital in 2016 - We Are Social UK", We Are Social UK, 2016. [Online]. Available: https://wearesocial.com/uk/special-reports/digital-in-2016. [Accessed: 07- Feb- 2018].
24. "Statcounter - Web Analytics Made Easy", Statcounter, 2018. [Online]. Available: http://gs.statcounter.com/platform-market-share/desktop-mobile-tablet. [Accessed: 13- Dec- 2017].
25. S. Jose, "10th Annual Cisco Visual Networking Index (VNI) Mobile Forecast Projects 70 Percent of Global Population Will Be Mobile Users", Newsroom.cisco.com, 2016. [Online]. Available: https://newsroom.cisco.com/press-release-
content?articleId=1741352. [Accessed: 16- Nov- 2017].
26. P. Calton, "A world of opportunities: CPS, IOT, and beyond", in 5th ACM international conference on Distributed event-based system, New Yok USA, 2011.
27. K. Hauser, H. Sigurdsson and K. Chudoba, "EDSOA: An Event-Driven Service-Oriented Architecture Model For Enterprise Applications", International Journal of Management & Information Systems (IJMIS), vol. 14, no. 3, 2011
28. L. Lan, B. Wang, L. Zhang, R. Shi and F. Li, "An Event-driven Service-oriented Architecture for Internet of Things Service Execution", International Journal of Online Engineering (iJOE), vol. 11, no. 2, p. 4, 2015.
29. A. Brown, S. Johnston and K. Kelly, "Using Service-Oriented Architecture and Component Based Development to Build Web Service Applications", Rational Software Corporation, 2002.
30. S. Kahadawa, "https://www.w3.org/2006/02/samantha.pdf", W3.org, Sri Lanka, 2018. 31. I. Barclay and Z. Dann, "New-product-development performance evaluation: a product-complexity-based methodology", IEE
Proceedings - Science, Measurement and Technology, vol. 147, no. 2, pp. 41-55, 2000.
32. Z. Jory and Z. Jory, "Transforming engineering and product development with IoT", Internet of Things blog, 2017. [Online]. Available: https://www.ibm.com/blogs/Internet-of-things/transforming-engineering-and-product-development-with-iot/. [Accessed:
28- Mar- 2018].
33. D. Woods, "How Internet of Things Data Improves Product Development", Forbes.com, 2015. [Online]. Available: https://www.forbes.com/sites/danwoods/2015/05/15/how-Internet-of-things-data-improves-product-development/#708ec777fe10.
[Accessed: 05- Feb- 2018].
34. R. Oliana, "The Internet of Things; The Next Big Thing for New Product Development?", Bachelor, University of Twente, 2018. 35. T. Rajpathak and A. Narsingpurkar, "Managing knowledge from Big Data analytics in product development", Tata Consultancy
Services, 2013.
36. M. Porter and J. Heppelmann, "How Smart, Connected Products Are Transforming Competition", Harvard, 2014. 37. PTC, "IoT Use Cases for Product Development | PTC", Ptc.com. [Online]. Available: https://www.ptc.com/en/products/iot/use-
cases/product-development. [Accessed: 18- Jan- 2018].
38. A. Ravichandran, K. Taylor and P. Waterhouse, DevOps for Digital Leaders, 1st ed. Berkeley, CA: Apress, 2016, pp. 1 - 40. 39. A. Aliverti, "Wearable technology: role in respiratory health and disease", Breathe, vol. 13, no. 2, pp. e27-e36, 2017. 40. K. Rowe, "Develop Wearable Devices on the IoT Cutting Edge", Electronic Design, 2018. [Online]. Available:
https://www.electronicdesign.com/iot/develop-wearable-devices-iot-cutting-edge. [Accessed: 07- Jul- 2018].
41. F. Wortmann and K. Flüchter, "Internet of Things", Business & Information Systems Engineering, vol. 57, no. 3, pp. 221-224, 2015. 42. J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions",
Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013. 43. O. Vermesan and P. Friess, Internet of Things Applications - From Research and Innovation to Market Deployment. Aalborg: River
Publishers, 2014.
44. Y. Li, M. Hou, H. Liu and Y. Liu, "Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things", Information Technology and Management, vol. 13, no. 4, pp. 205-216, 2012.
15
Authors: Vetriselvi T, Gopalan N P
Paper Title: A Novel Approach to Summarization based on Centroid Fuzzy
Abstract: Text summarization is a way to create a description of a given document. This is a novel approach
to text summarization, which is a combination of fuzzy and centroid methods. In fuzzy method the result is
based on the input given to the membership function. In centroid, missing some relevant words may make the
summary irrelevant, and then the summary content is not meaningful. Our model overcomes the above two
problems by combining the results of those approaches. The rate of summarization determines the size of the
summary. Centroid is a group of words which are highly relevant to the document. Fuzzy membership
functions helps to categorize the most relevant sentences. Both approaches have their own disadvantages, so
we pick the best of the above two and create a novel approach as fuzzy centroids text summarization: this
approach performs well in multi document summary when compare with existing
86-90