Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/04722018
Ewit
{"title":"A Smart Security Watch For Women","authors":"Ewit","doi":"10.30534/IJCCN/2018/04722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/04722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117049235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/06722018
Ewit
Online abuse is an act of attacking an individual repeatedly with an intent to harm. This has a very disturbing effect on many individual irrespective of the age group. In this paper, we propose a new representation learning method to solve this problem. Our method named Naïve Bayes classifier is a simple probabilistic classifier based on Bayes’ theorem with naïve independence assumptions between the features. Naive Bayes is an highly scalable with different number of parameters linear in number of predictors in a learning problem. The proposed method is able to exploit the hidden feature structure of abusive information and learn a robust and discriminative representation of text. We have implemented our algorithm using five lakhs of tweets and around one thousands of users.
{"title":"Identification of Online Abuse and It’s Inhibition","authors":"Ewit","doi":"10.30534/ijccn/2018/06722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/06722018","url":null,"abstract":"Online abuse is an act of attacking an individual repeatedly with an intent to harm. This has a very disturbing effect on many individual irrespective of the age group. In this paper, we propose a new representation learning method to solve this problem. Our method named Naïve Bayes classifier is a simple probabilistic classifier based on Bayes’ theorem with naïve independence assumptions between the features. Naive Bayes is an highly scalable with different number of parameters linear in number of predictors in a learning problem. The proposed method is able to exploit the hidden feature structure of abusive information and learn a robust and discriminative representation of text. We have implemented our algorithm using five lakhs of tweets and around one thousands of users.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126670143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/44722018
Ewit
The key issue in determining the lifetime of wireless sensor network (WSN) is the energy burning up of individual node. The cluster based routing improves the energy usage of WSN compared to other routing approach. In this paper, an effective multi-level cluster algorithm using link correlation is proposed for heterogeneous WSN.The heterogeneous nodes are adopted as level-k cluster heads and implementing network coding on those nodes increases network lifetime significantly. Meanwhile, implementing time division multiple access (TDMA) technique within a cluster creates an organized cluster architecture improving the energy efficiency. How to make efficient data routing in energy constrained wireless sensor networks (WSNs) is one of the key points. In order to find the optimal path of data transmission in the WSNs, a new routing algorithm based on ant colony algorithm is proposed. Using the improved heuristic function and considering the node communication transmission distance, transmission direction and residual energy, an optimal path from the source node to the destination node can be found. Thus the network energy consumption is reduced and the network lifetime is prolonged Simulation results show that new ant algorithm can effectively save the energy of nodes and prolong the network lifetime.
{"title":"Fuzzy Logic based Enhanced Zone Stable Election Protocol for Energy Efficient Cluster head election in WSN","authors":"Ewit","doi":"10.30534/IJCCN/2018/44722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/44722018","url":null,"abstract":"The key issue in determining the lifetime of wireless sensor network (WSN) is the energy burning up of individual node. The cluster based routing improves the energy usage of WSN compared to other routing approach. In this paper, an effective multi-level cluster algorithm using link correlation is proposed for heterogeneous WSN.The heterogeneous nodes are adopted as level-k cluster heads and implementing network coding on those nodes increases network lifetime significantly. Meanwhile, implementing time division multiple access (TDMA) technique within a cluster creates an organized cluster architecture improving the energy efficiency. How to make efficient data routing in energy constrained wireless sensor networks (WSNs) is one of the key points. In order to find the optimal path of data transmission in the WSNs, a new routing algorithm based on ant colony algorithm is proposed. Using the improved heuristic function and considering the node communication transmission distance, transmission direction and residual energy, an optimal path from the source node to the destination node can be found. Thus the network energy consumption is reduced and the network lifetime is prolonged Simulation results show that new ant algorithm can effectively save the energy of nodes and prolong the network lifetime.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127731905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/41722018
Ewit
Glaucoma is one of the 2 nd leading eye diseases in the world, if not treated properly might lead to permanent blindness. There are no specific symptoms for this disease, it is observed by loss of side vision. Glaucoma is a slow progressive degeneration of retinal ganglion cells (RGC) and their axons, resulting in a distinct appearance to the optic nerve head (ONH), often called cupping. Due to cupping, the cup area increases and causes loss of side vision. Usually manually grade the fundus images in a time-consuming manner. In this context, we are trying to develop some novel algorithms for automatic detection of eyes affected with glaucoma using image processing filtering & transformation techniques. 5 different concepts are going to be used in our project work for the automatic detection of glaucoma disease in human beings using the concept of fuzzy, artificial neural networks (ANN), neuro-fuzzy (ANFIS), genetic algorithms & using the wavelet features. The work aims to compare the 5 different algorithms developed and to compare the work done by other authors. Matlab / LabVIEW / Xilinx could be the software platform that is being used for developing the improvised algorithms by incorporating some additional parameters in the work done by the earlier authors.
{"title":"A EFFICIENT MULTIPLE DETECTION AND CLASSIFICATION OF GLAUCOMA USING MAT LAB","authors":"Ewit","doi":"10.30534/IJCCN/2018/41722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/41722018","url":null,"abstract":"Glaucoma is one of the 2 nd leading eye diseases in the world, if not treated properly might lead to permanent blindness. There are no specific symptoms for this disease, it is observed by loss of side vision. Glaucoma is a slow progressive degeneration of retinal ganglion cells (RGC) and their axons, resulting in a distinct appearance to the optic nerve head (ONH), often called cupping. Due to cupping, the cup area increases and causes loss of side vision. Usually manually grade the fundus images in a time-consuming manner. In this context, we are trying to develop some novel algorithms for automatic detection of eyes affected with glaucoma using image processing filtering & transformation techniques. 5 different concepts are going to be used in our project work for the automatic detection of glaucoma disease in human beings using the concept of fuzzy, artificial neural networks (ANN), neuro-fuzzy (ANFIS), genetic algorithms & using the wavelet features. The work aims to compare the 5 different algorithms developed and to compare the work done by other authors. Matlab / LabVIEW / Xilinx could be the software platform that is being used for developing the improvised algorithms by incorporating some additional parameters in the work done by the earlier authors.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125977577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/29722018
Ewit
Deep web is termed as sites present on web but not accessible by any search engine. Due to the large volume of web resources and the dynamic nature of deep web, achieving wide coverage and high efficiency is a challenging issue. Keyword based crawler for hidden web interfaces consist of mainly two stages, first is site locating another is in-site exploring. Site locating starts from seed sites and obtains relevant websites through reverse searching and obtains relevant sites through feature space of URL, anchor and text around URL. Second stage receives input from site locating and starts to find relevant link from those sites. The adaptive link learner is used to find out relevant links with help of link priority and link rank. To eliminate inclination on visiting some more closely related links in inaccessible web directories, we design a data structure called link tree to achieve broader coverage for a website.
{"title":"A TWO-STAGE KEYWORD BASED CRAWLER FOR GATHERING DEEP-WEB SITES","authors":"Ewit","doi":"10.30534/IJCCN/2018/29722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/29722018","url":null,"abstract":"Deep web is termed as sites present on web but not accessible by any search engine. Due to the large volume of web resources and the dynamic nature of deep web, achieving wide coverage and high efficiency is a challenging issue. Keyword based crawler for hidden web interfaces consist of mainly two stages, first is site locating another is in-site exploring. Site locating starts from seed sites and obtains relevant websites through reverse searching and obtains relevant sites through feature space of URL, anchor and text around URL. Second stage receives input from site locating and starts to find relevant link from those sites. The adaptive link learner is used to find out relevant links with help of link priority and link rank. To eliminate inclination on visiting some more closely related links in inaccessible web directories, we design a data structure called link tree to achieve broader coverage for a website.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/38722018
Ewit
{"title":"FILE SYNCHRONIZATION : TOWARDS AN EFFICIENT FILE SYNCHRONIZATION BETWEEN DIGITAL SAFES","authors":"Ewit","doi":"10.30534/ijccn/2018/38722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/38722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124592934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/52722018
Ewit
Mobile Ad hoc Networks is autonomous, multi hop network in which Quality of Service (QoS) for a network is measured in terms of the exact amount of data which a network transfers from one place to another during a certain time. QoS for Mobile Ad hoc Networks is a distinct task due to limited resource and dynamic topology environment. The link state information in the network such as bandwidth, node energy, error rate, jitter and delay should be accessible and manageable. The proposed work is to show a genetic based routing approach to optimize the routing in MANETs. The genetic approach will generate an optimized path on the basic of congestion over the network. The result path in NS2 will improve the data delivery over the network. The paper is to study about MANET, QOS and tries to develop a network on which genetic algorithm is applied to generate an optimized path.
{"title":"An Optimize Genetic Based Routing Protocol for QoS in MANET","authors":"Ewit","doi":"10.30534/IJCCN/2018/52722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/52722018","url":null,"abstract":"Mobile Ad hoc Networks is autonomous, multi hop network in which Quality of Service (QoS) for a network is measured in terms of the exact amount of data which a network transfers from one place to another during a certain time. QoS for Mobile Ad hoc Networks is a distinct task due to limited resource and dynamic topology environment. The link state information in the network such as bandwidth, node energy, error rate, jitter and delay should be accessible and manageable. The proposed work is to show a genetic based routing approach to optimize the routing in MANETs. The genetic approach will generate an optimized path on the basic of congestion over the network. The result path in NS2 will improve the data delivery over the network. The paper is to study about MANET, QOS and tries to develop a network on which genetic algorithm is applied to generate an optimized path.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125069303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/45722018
Ewit
{"title":"An investigation of Lung Cancer Detection & classification Techniques on CT scan images","authors":"Ewit","doi":"10.30534/IJCCN/2018/45722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/45722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129352914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/05722018
Ewit
{"title":"Occasion news with Upgraded Reporting towards Advanced India","authors":"Ewit","doi":"10.30534/IJCCN/2018/05722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/05722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129811278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/32722018
Ewit
{"title":"LOC with Wireless Secured Communication & Tracking Devices","authors":"Ewit","doi":"10.30534/IJCCN/2018/32722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/32722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127948906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}