{"title":"Metaheuristic Algorithms for Detect Communities in Social Networks: A Comparative Analysis Study","authors":"A. Hassanien, Ramadan Babers","doi":"10.4018/IJRSDA.2018040102","DOIUrl":"https://doi.org/10.4018/IJRSDA.2018040102","url":null,"abstract":"ThisarticlepresentsacomparativeanalysisbetweenCuckooSearchOptimizationAlgorithm,Lion OptimizationAlgorithmandAnt-LionOptimizationAlgorithm.ZacharykarateClub,TheBottlenose DolphinNetwork,AmericanCollegeFootballNetwork,andFacebookusedasbenchmarkdatasetsfor comparison,theresultsprovedthosealgorithmscandefinethestructureanddetectcommunitiesof complexnetworkswithhighaccuracyandqualitybasedondifferentmethodthatitused.TheCuckoo SearchOptimizationAlgorithmisthebestalgorithmcomparedtoAnt-LionOptimizationAlgorithm andLionOptimizationAlgorithmasitgotgreatestnumberofcommunities,detectcommunitiesin usedbenchmarkdatasetswithaverageaccuracy%69,averagemodularity%62andaveragefitness%60. KeywoRDS Ant Lion Optimization Algorithm, Community Structure, Cuckoo Search, Lion Optimization Algorithm, Networks Community Detection, Social Networks Analysis, Social Networks","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131104561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Rawal, Songjie Liang, S. Gautam, H. Kalutarage, P. Vijayakumar
{"title":"Nth Order Binary Encoding with Split-Protocol","authors":"B. Rawal, Songjie Liang, S. Gautam, H. Kalutarage, P. Vijayakumar","doi":"10.4018/IJRSDA.2018040105","DOIUrl":"https://doi.org/10.4018/IJRSDA.2018040105","url":null,"abstract":"TocopeupwiththeBigDataexplosion,theNthOrderBinaryEncoding(NOBE)algorithmwith theSplit-protocolhasbeenproposed.Intheearlierpapers,theapplicationSplit-protocolforsecurity, reliability,availability,HPChavebeendemonstratedandimplementedencoding.Thistechnologywill significantlyreducethenetworktraffic,improvethetransmissionrateandaugmentthecapacityfor datastorage.Inadditiontodatacompression,improvingtheprivacyandsecurityisaninherentbenefit oftheproposedmethod.ItispossibletoencodethedatarecursivelyuptoNtimesanduseaunique combinationofNOBE’sparameterstogenerateencryptionkeysforadditionalsecurityandprivacyfor dataontheflightoratastation.Thispaperdescribesthedesignandapreliminarydemonstrationof (NOBE)algorithm,servingasafoundationforapplicationimplementers.Italsoreportstheoutcomes ofcomputablestudiesconcerningtheperformanceoftheunderlyingimplementation. KEywORDS Adaptive Huffman Coding, Data Compression, Performance, Split-Encoding","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132154937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Curvelet Based Semi-Fragile Watermarking Scheme for Effective and Intelligent Tampering Classification and Recovery of Digital Images","authors":"R. ChetanK., S. Nirmala","doi":"10.4018/IJRSDA.2018040104","DOIUrl":"https://doi.org/10.4018/IJRSDA.2018040104","url":null,"abstract":"","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128080401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WSN Management Self-Silence Design and Data Analysis for Neural Network Based Infrastructure","authors":"N. K. Kamila, S. Dhal","doi":"10.4018/IJRSDA.2017100106","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017100106","url":null,"abstract":"In recent Wireless Sensor Network environment, battery energy conservation is one of the most important focus of research. The non-maintainable wireless sensor nodes need modern innovative ideas to save energy in order to extend the network life time. Different strategy in wireless sensor routing mechanism has been implemented to establish the energy conservation phenomenon. In earlier days, the nodes are dissipating maximum energy to communicate with each other(flooding) to establish the route to destination. In the next evolution of this research area, a clustering mechanism introduced which confirms the energy saving over the flooding mechanism. Neural Network is an advanced approach for self-clustering mechanism and when applied on wireless sensor network infrastructure, it reduces the energy consumption required for clustering. Neural network is a powerful concept with complex algorithms and capable to provide clustering solutions based on the wireless sensor network nodes properties. With the implementation of Neural Network on Wireless Sensor Network resolves the issues of high energy consumption required for network clustering. The authors propose a self-silence wireless sensor network model where sensor nodes change the sensing and transmitting mechanism by making self-silent in order to conserve the energy. This concept is simulated in neural network based wireless sensor network infrastructure of routing methodology and the authors observe that it extends the network life time. The mathematical analysis and simulation study shows the improved performance over the existing related neural network based wireless sensor routing protocols. Furthermore, the performance & related model parameters data set analysis provides the respective dependent relation information.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131105784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparison of Data Exchange Mechanisms for Real-Time Communication","authors":"M. Chawla, S. Mishra, Kriti Singh, C. Kumar","doi":"10.4018/IJRSDA.2017100105","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017100105","url":null,"abstract":"","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132761567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complexity Analysis of Vedic Mathematics Algorithms for Multicore Environment","authors":"U. Shrawankar, K. Sapkal","doi":"10.4018/IJRSDA.2017100103","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017100103","url":null,"abstract":"","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"21 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Analysis of a Novel Anomaly Detection Algorithm with Neural Networks","authors":"Srijan Das, Arpita Dutta, Saurav Sharma, Sangharatna Godboley","doi":"10.4018/IJRSDA.2017100101","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017100101","url":null,"abstract":"Anomaly Detection is an important research domain of Pattern Recognition due to its effects of classification and clustering problems. In this paper, an anomaly detection algorithm is proposed using different primitive cost functions such as Normal Perceptron, Relaxation Criterion, Mean Square Error (MSE) and Ho-Kashyap. These criterion functions are minimized to locate the decision boundary in the data space so as to classify the normal data objects and the anomalous data objects. The authors proposed algorithm uses the concept of supervised classification, though it is very different from solving normal supervised classification problems. This proposed algorithm using different criterion functions has been compared with the accuracy of the Neural Networks (NN) in order to bring out a comparative analysis between them and discuss some advantages.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131853934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Clustering in MANETs with Minimum Communication and Reclustering Overhead","authors":"M. Mir, Satyabrata Das","doi":"10.4018/IJRSDA.2017100107","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017100107","url":null,"abstract":"AflatstructureinMANETsbasedonproactiveorreactiveroutingschemesfacescalabilityproblems withincreaseinbothmobilityandnetworksize.Clusteringoffershierarchicalorganizationofmobile nodesbyformingdisjointgroups(clusters).Soclusteringtechniquessolvethescalabilityissuein largeMANETsbut,requiresextramessageexchangeamongmobilenodesformaintenanceofcluster structure.DuetomobilityinMANETsstabilityofclusterstructureisgreatlyaffectedassuchitoften leads toRippleeffectof reclustering. In thispaper, theauthorspresentclusteringalgorithmthat eliminatestherequirementoffrozenperiodandminimizesreclusteringofentirenetworkbylocally repairingclusterstructurethatgetsaffectedduetomomentofheadnode.Theyhavereducedthe numberofmessagesexchangedintheirproposedworkbyincludingdifferentrangeoftransmission foreachnodeandoverallstabilityofentirestructureisenhanced. KEywORDS Access Point, Clusterhead, Clustering, Clustermember, Clusters, Message Overhead, Mobile Ad Hoc Networks (MANETs), Scalability","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116484087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}