CINXE.COM

journalijcsa | International Journal on Computational Science & Applications (IJCSA)

<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>journalijcsa | International Journal on Computational Science &amp; Applications (IJCSA)</title> <link rel="profile" href="http://gmpg.org/xfn/11"> <link rel="pingback" href="https://journalijcsa.wordpress.com/xmlrpc.php"> <script type="text/javascript"> WebFontConfig = {"google":{"families":["Alegreya:r:latin,latin-ext"]},"api_url":"https:\/\/fonts-api.wp.com\/css"}; (function() { var wf = document.createElement('script'); wf.src = 'https://s0.wp.com/wp-content/plugins/custom-fonts/js/webfont.js'; wf.type = 'text/javascript'; wf.async = 'true'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(wf, s); })(); </script><style id="jetpack-custom-fonts-css">.wf-active h1{font-style:normal;font-weight:400}.wf-active h2{font-style:normal;font-weight:400}.wf-active h3{font-style:normal;font-weight:400}.wf-active h4{font-style:normal;font-weight:400}.wf-active h5{font-style:normal;font-weight:400}.wf-active h6{font-style:normal;font-weight:400}@media ( min-width: 980px ){.wf-active h1{font-style:normal;font-weight:400}}@media ( min-width: 980px ){.wf-active h2{font-style:normal;font-weight:400}}@media ( min-width: 980px ){.wf-active h3{font-style:normal;font-weight:400}}@media ( min-width: 980px ){.wf-active h4{font-style:normal;font-weight:400}}@media ( min-width: 980px ){.wf-active h5{font-style:normal;font-weight:400}}@media ( min-width: 980px ){.wf-active h6{font-style:normal;font-weight:400}}.wf-active h1, .wf-active h2, .wf-active h3, .wf-active h4, .wf-active h5, .wf-active h6{font-family:"Alegreya",serif;font-weight:400;font-style:normal}.wf-active .site-title{font-style:normal;font-weight:400}.wf-active .site-description{font-weight:400;font-family:"Alegreya",serif;font-style:normal}.wf-active .page-title{font-style:normal;font-weight:400}.wf-active .comments-title{font-weight:400;font-style:normal}.wf-active .widget-title{font-style:normal;font-weight:400}</style> <meta name='robots' content='max-image-preview:large' /> <link rel='dns-prefetch' href='//s1.wp.com' /> <link rel='dns-prefetch' href='//s2.wp.com' /> <link rel='dns-prefetch' href='//s0.wp.com' /> <link rel='dns-prefetch' href='//fonts-api.wp.com' /> <link rel='dns-prefetch' href='//s.pubmine.com' /> <link rel='dns-prefetch' href='//x.bidswitch.net' /> <link rel='dns-prefetch' href='//static.criteo.net' /> <link rel='dns-prefetch' href='//ib.adnxs.com' /> <link rel='dns-prefetch' href='//aax.amazon-adsystem.com' /> <link rel='dns-prefetch' href='//bidder.criteo.com' /> <link rel='dns-prefetch' href='//cas.criteo.com' /> <link rel='dns-prefetch' href='//gum.criteo.com' /> <link rel='dns-prefetch' href='//ads.pubmatic.com' /> <link rel='dns-prefetch' href='//gads.pubmatic.com' /> <link rel='dns-prefetch' href='//tpc.googlesyndication.com' /> <link rel='dns-prefetch' href='//ad.doubleclick.net' /> <link rel='dns-prefetch' href='//googleads.g.doubleclick.net' /> <link rel='dns-prefetch' href='//www.googletagservices.com' /> <link rel='dns-prefetch' href='//cdn.switchadhub.com' /> <link rel='dns-prefetch' href='//delivery.g.switchadhub.com' /> <link rel='dns-prefetch' href='//delivery.swid.switchadhub.com' /> <link rel='dns-prefetch' href='//a.teads.tv' /> <link rel='dns-prefetch' href='//prebid.media.net' /> <link rel='dns-prefetch' href='//adserver-us.adtech.advertising.com' /> <link rel='dns-prefetch' href='//fastlane.rubiconproject.com' /> <link rel='dns-prefetch' href='//prebid-server.rubiconproject.com' /> <link rel='dns-prefetch' href='//hb-api.omnitagjs.com' /> <link rel='dns-prefetch' href='//mtrx.go.sonobi.com' /> <link rel='dns-prefetch' href='//apex.go.sonobi.com' /> <link rel='dns-prefetch' href='//u.openx.net' /> <link rel="alternate" type="application/rss+xml" title="International Journal on Computational Science &amp; Applications (IJCSA) &raquo; Feed" href="https://journalijcsa.wordpress.com/feed/" /> <link rel="alternate" type="application/rss+xml" title="International Journal on Computational Science &amp; Applications (IJCSA) &raquo; Comments Feed" href="https://journalijcsa.wordpress.com/comments/feed/" /> <link rel="alternate" type="application/rss+xml" title="International Journal on Computational Science &amp; Applications (IJCSA) &raquo; Posts by journalijcsa Feed" href="https://journalijcsa.wordpress.com/author/journalijcsa/feed/" /> <script type="text/javascript"> /* <![CDATA[ */ function addLoadEvent(func) { var oldonload = window.onload; if (typeof window.onload != 'function') { window.onload = func; } else { window.onload = function () { oldonload(); func(); } } } /* ]]> */ </script> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s0.wp.com\/wp-content\/mu-plugins\/wpcom-smileys\/twemoji\/2\/72x72\/","ext":".png","svgUrl":"https:\/\/s0.wp.com\/wp-content\/mu-plugins\/wpcom-smileys\/twemoji\/2\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/s2.wp.com\/wp-includes\/js\/wp-emoji-release.min.js?m=1719498190i&ver=6.8-alpha-59438"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link crossorigin='anonymous' rel='stylesheet' id='all-css-0-1' href='https://s2.wp.com/_static/??-eJxljUsOwjAMRC9EsBqEUBeIsziNFYU6H8WOIm5PWbUV25n3ZmBUs5SslBUcl2Aq9xCzwCjNoxcIXBzydRG5wIFNfSejD6QC1Le2rJEM4wClVBmVBEQ/TH8Dp7OEbSWNORiHDTb0nPzkV3pODzvf7Xyb7PsL7ptDng==&cssminify=yes' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-2-1' href='https://s0.wp.com/_static/??-eJydzMsOwiAQheEXEibEXtKF8VmATggVgcwMNby91U13LlyenHw/vKryJQtmgZpaiJkhtGM6pHA8hLCbRU96ANdiWsGl4h8qRUeWOrD0hNozX+Bn6KsYNpRqP9z20kQFiuu/CbISc+CT3583M1/NMg6zGbc3O1tP4A==&cssminify=yes' type='text/css' media='all' /> <style id='wp-block-library-inline-css'> .has-text-align-justify { text-align:justify; } .has-text-align-justify{text-align:justify;} </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-4-1' href='https://s2.wp.com/_static/??-eJzTLy/QzcxLzilNSS3WzyrWz01NyUxMzUnNTc0rQeEU5CRWphbp5qSmJyZX6uVm5uklFxfr6OPTDpRD5sM02efaGpoZmFkYGRuZGmQBAHPvL0Y=&cssminify=yes' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-6-1' href='https://s2.wp.com/wp-content/plugins/coblocks/2.18.1-simple-rev.4/dist/coblocks-style.css?m=1681832297i&cssminify=yes' type='text/css' media='all' /> <style id='classic-theme-styles-inline-css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-8-1' href='https://s1.wp.com/_static/??/wp-content/mu-plugins/core-compat/wp-mediaelement.css,/wp-content/mu-plugins/wpcom-bbpress-premium-themes.css?m=1432920480j&cssminify=yes' type='text/css' media='all' /> <style id='global-styles-inline-css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--font-family--albert-sans: 'Albert Sans', sans-serif;--wp--preset--font-family--alegreya: Alegreya, serif;--wp--preset--font-family--arvo: Arvo, serif;--wp--preset--font-family--bodoni-moda: 'Bodoni Moda', serif;--wp--preset--font-family--bricolage-grotesque: 'Bricolage Grotesque', sans-serif;--wp--preset--font-family--cabin: Cabin, sans-serif;--wp--preset--font-family--chivo: Chivo, sans-serif;--wp--preset--font-family--commissioner: Commissioner, sans-serif;--wp--preset--font-family--cormorant: Cormorant, serif;--wp--preset--font-family--courier-prime: 'Courier Prime', monospace;--wp--preset--font-family--crimson-pro: 'Crimson Pro', serif;--wp--preset--font-family--dm-mono: 'DM Mono', monospace;--wp--preset--font-family--dm-sans: 'DM Sans', sans-serif;--wp--preset--font-family--dm-serif-display: 'DM Serif Display', serif;--wp--preset--font-family--domine: Domine, serif;--wp--preset--font-family--eb-garamond: 'EB Garamond', serif;--wp--preset--font-family--epilogue: Epilogue, sans-serif;--wp--preset--font-family--fahkwang: Fahkwang, sans-serif;--wp--preset--font-family--figtree: Figtree, sans-serif;--wp--preset--font-family--fira-sans: 'Fira Sans', sans-serif;--wp--preset--font-family--fjalla-one: 'Fjalla One', sans-serif;--wp--preset--font-family--fraunces: Fraunces, serif;--wp--preset--font-family--gabarito: Gabarito, system-ui;--wp--preset--font-family--ibm-plex-mono: 'IBM Plex Mono', monospace;--wp--preset--font-family--ibm-plex-sans: 'IBM Plex Sans', sans-serif;--wp--preset--font-family--ibarra-real-nova: 'Ibarra Real Nova', serif;--wp--preset--font-family--instrument-serif: 'Instrument Serif', serif;--wp--preset--font-family--inter: Inter, sans-serif;--wp--preset--font-family--josefin-sans: 'Josefin Sans', sans-serif;--wp--preset--font-family--jost: Jost, sans-serif;--wp--preset--font-family--libre-baskerville: 'Libre Baskerville', serif;--wp--preset--font-family--libre-franklin: 'Libre Franklin', sans-serif;--wp--preset--font-family--literata: Literata, serif;--wp--preset--font-family--lora: Lora, serif;--wp--preset--font-family--merriweather: Merriweather, serif;--wp--preset--font-family--montserrat: Montserrat, sans-serif;--wp--preset--font-family--newsreader: Newsreader, serif;--wp--preset--font-family--noto-sans-mono: 'Noto Sans Mono', sans-serif;--wp--preset--font-family--nunito: Nunito, sans-serif;--wp--preset--font-family--open-sans: 'Open Sans', sans-serif;--wp--preset--font-family--overpass: Overpass, sans-serif;--wp--preset--font-family--pt-serif: 'PT Serif', serif;--wp--preset--font-family--petrona: Petrona, serif;--wp--preset--font-family--piazzolla: Piazzolla, serif;--wp--preset--font-family--playfair-display: 'Playfair Display', serif;--wp--preset--font-family--plus-jakarta-sans: 'Plus Jakarta Sans', sans-serif;--wp--preset--font-family--poppins: Poppins, sans-serif;--wp--preset--font-family--raleway: Raleway, sans-serif;--wp--preset--font-family--roboto: Roboto, sans-serif;--wp--preset--font-family--roboto-slab: 'Roboto Slab', serif;--wp--preset--font-family--rubik: Rubik, sans-serif;--wp--preset--font-family--rufina: Rufina, serif;--wp--preset--font-family--sora: Sora, sans-serif;--wp--preset--font-family--source-sans-3: 'Source Sans 3', sans-serif;--wp--preset--font-family--source-serif-4: 'Source Serif 4', serif;--wp--preset--font-family--space-mono: 'Space Mono', monospace;--wp--preset--font-family--syne: Syne, sans-serif;--wp--preset--font-family--texturina: Texturina, serif;--wp--preset--font-family--urbanist: Urbanist, sans-serif;--wp--preset--font-family--work-sans: 'Work Sans', sans-serif;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;}.has-albert-sans-font-family{font-family: var(--wp--preset--font-family--albert-sans) !important;}.has-alegreya-font-family{font-family: var(--wp--preset--font-family--alegreya) !important;}.has-arvo-font-family{font-family: var(--wp--preset--font-family--arvo) !important;}.has-bodoni-moda-font-family{font-family: var(--wp--preset--font-family--bodoni-moda) !important;}.has-bricolage-grotesque-font-family{font-family: var(--wp--preset--font-family--bricolage-grotesque) !important;}.has-cabin-font-family{font-family: var(--wp--preset--font-family--cabin) !important;}.has-chivo-font-family{font-family: var(--wp--preset--font-family--chivo) !important;}.has-commissioner-font-family{font-family: var(--wp--preset--font-family--commissioner) !important;}.has-cormorant-font-family{font-family: var(--wp--preset--font-family--cormorant) !important;}.has-courier-prime-font-family{font-family: var(--wp--preset--font-family--courier-prime) !important;}.has-crimson-pro-font-family{font-family: var(--wp--preset--font-family--crimson-pro) !important;}.has-dm-mono-font-family{font-family: var(--wp--preset--font-family--dm-mono) !important;}.has-dm-sans-font-family{font-family: var(--wp--preset--font-family--dm-sans) !important;}.has-dm-serif-display-font-family{font-family: var(--wp--preset--font-family--dm-serif-display) !important;}.has-domine-font-family{font-family: var(--wp--preset--font-family--domine) !important;}.has-eb-garamond-font-family{font-family: var(--wp--preset--font-family--eb-garamond) !important;}.has-epilogue-font-family{font-family: var(--wp--preset--font-family--epilogue) !important;}.has-fahkwang-font-family{font-family: var(--wp--preset--font-family--fahkwang) !important;}.has-figtree-font-family{font-family: var(--wp--preset--font-family--figtree) !important;}.has-fira-sans-font-family{font-family: var(--wp--preset--font-family--fira-sans) !important;}.has-fjalla-one-font-family{font-family: var(--wp--preset--font-family--fjalla-one) !important;}.has-fraunces-font-family{font-family: var(--wp--preset--font-family--fraunces) !important;}.has-gabarito-font-family{font-family: var(--wp--preset--font-family--gabarito) !important;}.has-ibm-plex-mono-font-family{font-family: var(--wp--preset--font-family--ibm-plex-mono) !important;}.has-ibm-plex-sans-font-family{font-family: var(--wp--preset--font-family--ibm-plex-sans) !important;}.has-ibarra-real-nova-font-family{font-family: var(--wp--preset--font-family--ibarra-real-nova) !important;}.has-instrument-serif-font-family{font-family: var(--wp--preset--font-family--instrument-serif) !important;}.has-inter-font-family{font-family: var(--wp--preset--font-family--inter) !important;}.has-josefin-sans-font-family{font-family: var(--wp--preset--font-family--josefin-sans) !important;}.has-jost-font-family{font-family: var(--wp--preset--font-family--jost) !important;}.has-libre-baskerville-font-family{font-family: var(--wp--preset--font-family--libre-baskerville) !important;}.has-libre-franklin-font-family{font-family: var(--wp--preset--font-family--libre-franklin) !important;}.has-literata-font-family{font-family: var(--wp--preset--font-family--literata) !important;}.has-lora-font-family{font-family: var(--wp--preset--font-family--lora) !important;}.has-merriweather-font-family{font-family: var(--wp--preset--font-family--merriweather) !important;}.has-montserrat-font-family{font-family: var(--wp--preset--font-family--montserrat) !important;}.has-newsreader-font-family{font-family: var(--wp--preset--font-family--newsreader) !important;}.has-noto-sans-mono-font-family{font-family: var(--wp--preset--font-family--noto-sans-mono) !important;}.has-nunito-font-family{font-family: var(--wp--preset--font-family--nunito) !important;}.has-open-sans-font-family{font-family: var(--wp--preset--font-family--open-sans) !important;}.has-overpass-font-family{font-family: var(--wp--preset--font-family--overpass) !important;}.has-pt-serif-font-family{font-family: var(--wp--preset--font-family--pt-serif) !important;}.has-petrona-font-family{font-family: var(--wp--preset--font-family--petrona) !important;}.has-piazzolla-font-family{font-family: var(--wp--preset--font-family--piazzolla) !important;}.has-playfair-display-font-family{font-family: var(--wp--preset--font-family--playfair-display) !important;}.has-plus-jakarta-sans-font-family{font-family: var(--wp--preset--font-family--plus-jakarta-sans) !important;}.has-poppins-font-family{font-family: var(--wp--preset--font-family--poppins) !important;}.has-raleway-font-family{font-family: var(--wp--preset--font-family--raleway) !important;}.has-roboto-font-family{font-family: var(--wp--preset--font-family--roboto) !important;}.has-roboto-slab-font-family{font-family: var(--wp--preset--font-family--roboto-slab) !important;}.has-rubik-font-family{font-family: var(--wp--preset--font-family--rubik) !important;}.has-rufina-font-family{font-family: var(--wp--preset--font-family--rufina) !important;}.has-sora-font-family{font-family: var(--wp--preset--font-family--sora) !important;}.has-source-sans-3-font-family{font-family: var(--wp--preset--font-family--source-sans-3) !important;}.has-source-serif-4-font-family{font-family: var(--wp--preset--font-family--source-serif-4) !important;}.has-space-mono-font-family{font-family: var(--wp--preset--font-family--space-mono) !important;}.has-syne-font-family{font-family: var(--wp--preset--font-family--syne) !important;}.has-texturina-font-family{font-family: var(--wp--preset--font-family--texturina) !important;}.has-urbanist-font-family{font-family: var(--wp--preset--font-family--urbanist) !important;}.has-work-sans-font-family{font-family: var(--wp--preset--font-family--work-sans) !important;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-10-1' href='https://s0.wp.com/wp-content/themes/pub/big-brother/style.css?m=1513292499i&cssminify=yes' type='text/css' media='all' /> <link rel='stylesheet' id='big-brother-gentium-css' href='https://fonts-api.wp.com/css?family=Gentium+Basic%3A400%2C700%2C400italic%2C700italic&#038;subset=latin%2Clatin-ext&#038;ver=6.8-alpha-59438' media='all' /> <link rel='stylesheet' id='big-brother-open-sans-css' href='https://fonts-api.wp.com/css?family=Open+Sans%3A400%2C800&#038;subset=latin%2Clatin-ext&#038;ver=6.8-alpha-59438' media='all' /> <link crossorigin='anonymous' rel='stylesheet' id='all-css-14-1' href='https://s2.wp.com/_static/??-eJx9jtsKQiEQRX8oGyy6PUSfEiqTedIZcZRDf58HejCK3vYa9toMzFk5popUITWVY/OBBCas2bjHm0EawTWQA4+EJXRBfse1E1nBsFnvmFAgNws2eGUL90uBZUvqM6Kas+P0pQ2vFLSRfY8eemvAf5JHVpGdqYHpA9QtmlAW9ZLOen/cab3Zng7TCxYjYqE=&cssminify=yes' type='text/css' media='all' /> <link crossorigin='anonymous' rel='stylesheet' id='print-css-15-1' href='https://s1.wp.com/wp-content/mu-plugins/global-print/global-print.css?m=1465851035i&cssminify=yes' type='text/css' media='print' /> <style id='jetpack-global-styles-frontend-style-inline-css'> :root { --font-headings: unset; --font-base: unset; --font-headings-default: -apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif; --font-base-default: -apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;} </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-18-1' href='https://s2.wp.com/wp-content/themes/h4/global.css?m=1420737423i&cssminify=yes' type='text/css' media='all' /> <script type="text/javascript" id="wpcom-actionbar-placeholder-js-extra"> /* <![CDATA[ */ var actionbardata = {"siteID":"104889533","postID":"0","siteURL":"http:\/\/journalijcsa.wordpress.com","xhrURL":"https:\/\/journalijcsa.wordpress.com\/wp-admin\/admin-ajax.php","nonce":"f1f7d771d3","isLoggedIn":"","statusMessage":"","subsEmailDefault":"instantly","proxyScriptUrl":"https:\/\/s0.wp.com\/wp-content\/js\/wpcom-proxy-request.js?ver=20211021","i18n":{"followedText":"New posts from this site will now appear in your <a href=\"https:\/\/wordpress.com\/read\">Reader<\/a>","foldBar":"Collapse this bar","unfoldBar":"Expand this bar"}}; /* ]]> */ </script> <script type="text/javascript" id="jetpack-mu-wpcom-settings-js-before"> /* <![CDATA[ */ var JETPACK_MU_WPCOM_SETTINGS = {"assetsUrl":"https:\/\/s1.wp.com\/wp-content\/mu-plugins\/jetpack-mu-wpcom-plugin\/sun\/vendor\/automattic\/jetpack-mu-wpcom\/src\/build\/"}; /* ]]> */ </script> <script crossorigin='anonymous' type='text/javascript' src='https://s1.wp.com/_static/??/wp-content/js/rlt-proxy.js,/wp-content/blog-plugins/wordads-classes/js/cmp/v2/cmp-non-gdpr.js?m=1720530689j'></script> <script type="text/javascript" id="rlt-proxy-js-after"> /* <![CDATA[ */ rltInitialize( {"token":null,"iframeOrigins":["https:\/\/widgets.wp.com"]} ); /* ]]> */ </script> <link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://journalijcsa.wordpress.com/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress.com" /> <!-- Jetpack Open Graph Tags --> <meta property="og:type" content="profile" /> <meta property="og:title" content="journalijcsa" /> <meta property="og:url" content="http://journalijcsa.wordpress.com" /> <meta property="og:site_name" content="International Journal on Computational Science &amp; Applications (IJCSA)" /> <meta property="og:image" content="https://secure.gravatar.com/avatar/9500496993137011c35a6e9f814b522e?s=200&#038;d=identicon&#038;r=g" /> <meta property="og:image:alt" content="journalijcsa" /> <meta property="og:locale" content="en_US" /> <meta property="fb:app_id" content="249643311490" /> <!-- End Jetpack Open Graph Tags --> <link rel="shortcut icon" type="image/x-icon" href="https://s1.wp.com/i/favicon.ico" sizes="16x16 24x24 32x32 48x48" /> <link rel="icon" type="image/x-icon" href="https://s1.wp.com/i/favicon.ico" sizes="16x16 24x24 32x32 48x48" /> <link rel="apple-touch-icon" href="https://s2.wp.com/i/webclip.png" /> <link rel="search" type="application/opensearchdescription+xml" href="https://journalijcsa.wordpress.com/osd.xml" title="International Journal on Computational Science &#38; Applications (IJCSA)" /> <link rel="search" type="application/opensearchdescription+xml" href="https://s1.wp.com/opensearch.xml" title="WordPress.com" /> <style type="text/css">.recentcomments a{display:inline !important;padding:0 !important;margin:0 !important;}</style> <style type="text/css"> .recentcomments a { display: inline !important; padding: 0 !important; margin: 0 !important; } table.recentcommentsavatartop img.avatar, table.recentcommentsavatarend img.avatar { border: 0px; margin: 0; } table.recentcommentsavatartop a, table.recentcommentsavatarend a { border: 0px !important; background-color: transparent !important; } td.recentcommentsavatarend, td.recentcommentsavatartop { padding: 0px 0px 1px 0px; margin: 0px; } td.recentcommentstextend { border: none !important; padding: 0px 0px 2px 10px; } .rtl td.recentcommentstextend { padding: 0px 10px 2px 0px; } td.recentcommentstexttop { border: none; padding: 0px 0px 0px 10px; } .rtl td.recentcommentstexttop { padding: 0px 10px 0px 0px; } </style> <meta name="application-name" content="International Journal on Computational Science &amp; Applications (IJCSA)" /><meta name="msapplication-window" content="width=device-width;height=device-height" /><meta name="msapplication-tooltip" content="ISSN : 2200 - 0011" /><meta name="description" content="Read all of the posts by journalijcsa on International Journal on Computational Science &amp; Applications (IJCSA)" /> <script type="text/javascript"> /* <![CDATA[ */ var wa_smart = { 'network_id': 3905, 'site_id': 474853, 'page_id': 1572546, 'blog_id': 104889533, 'post_id': null, 'theme': 'pub/big-brother', 'target': 'wp_blog_id=104889533;language=en', '_': { 'title': 'Advertisement', 'privacy_settings': 'Privacy Settings' }, 'top': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135099 }, 'inline': { 'enabled': false, 'adflow_enabled': true, 'format_id': 110354, 'max_slots': 20, 'max_blaze_slots': 20 }, 'belowpost': { 'enabled': false, 'adflow_enabled': true, 'format_id': 134071 }, 'bottom_sticky': { 'enabled': false, 'adflow_enabled': true, 'format_id': 117571 }, 'sidebar': { 'enabled': false, 'adflow_enabled': true, 'format_id': 134686 }, 'sidebar_sticky_right': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135281 }, 'gutenberg_rectangle': { 'enabled': false, 'adflow_enabled': true, 'format_id': 134788 }, 'gutenberg_leaderboard': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135073 }, 'gutenberg_mobile_leaderboard': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135098 }, 'gutenberg_skyscraper': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135088 } }; wa_smart.cmd = []; /* ]]> */ </script> <script type="text/javascript"> function __ATA_CC() {var v = document.cookie.match('(^|;) ?personalized-ads-consent=([^;]*)(;|$)');return v ? 1 : 0;} var __ATA_PP = { 'pt': 3, 'ht': 0, 'tn': 'big-brother', 'uloggedin': 0, 'amp': false, 'consent': __ATA_CC(), 'gdpr_applies': false, 'ad': { 'label': { 'text': 'Advertisements' }, 'reportAd': { 'text': 'Report this ad' } }, 'disabled_slot_formats': [], 'siteid': 8982, 'blogid': 104889533 }; var __ATA = __ATA || {}; __ATA.cmd = __ATA.cmd || []; __ATA.criteo = __ATA.criteo || {}; __ATA.criteo.cmd = __ATA.criteo.cmd || []; </script> <script type="text/javascript"> (function(){var g=Date.now||function(){return+new Date};function h(a,b){a:{for(var c=a.length,d="string"==typeof a?a.split(""):a,e=0;e<c;e++)if(e in d&&b.call(void 0,d[e],e,a)){b=e;break a}b=-1}return 0>b?null:"string"==typeof a?a.charAt(b):a[b]};function k(a,b,c){c=null!=c?"="+encodeURIComponent(String(c)):"";if(b+=c){c=a.indexOf("#");0>c&&(c=a.length);var d=a.indexOf("?");if(0>d||d>c){d=c;var e=""}else e=a.substring(d+1,c);a=[a.substr(0,d),e,a.substr(c)];c=a[1];a[1]=b?c?c+"&"+b:b:c;a=a[0]+(a[1]?"?"+a[1]:"")+a[2]}return a};var l=0;function m(a,b){var c=document.createElement("script");c.src=a;c.onload=function(){b&&b(void 0)};c.onerror=function(){b&&b("error")};a=document.getElementsByTagName("head");var d;a&&0!==a.length?d=a[0]:d=document.documentElement;d.appendChild(c)}function n(a){var b=void 0===b?document.cookie:b;return(b=h(b.split("; "),function(c){return-1!=c.indexOf(a+"=")}))?b.split("=")[1]:""}function p(a){return"string"==typeof a&&0<a.length} function r(a,b,c){b=void 0===b?"":b;c=void 0===c?".":c;var d=[];Object.keys(a).forEach(function(e){var f=a[e],q=typeof f;"object"==q&&null!=f||"function"==q?d.push(r(f,b+e+c)):null!==f&&void 0!==f&&(e=encodeURIComponent(b+e),d.push(e+"="+encodeURIComponent(f)))});return d.filter(p).join("&")}function t(a,b){a||((window.__ATA||{}).config=b.c,m(b.url))}var u=Math.floor(1E13*Math.random()),v=window.__ATA||{};window.__ATA=v;window.__ATA.cmd=v.cmd||[];v.rid=u;v.createdAt=g();var w=window.__ATA||{},x="s.pubmine.com"; w&&w.serverDomain&&(x=w.serverDomain);var y="//"+x+"/conf",z=window.top===window,A=window.__ATA_PP&&window.__ATA_PP.gdpr_applies,B="boolean"===typeof A?Number(A):null,C=window.__ATA_PP||null,D=z?document.referrer?document.referrer:null:null,E=z?window.location.href:document.referrer?document.referrer:null,F,G=n("__ATA_tuuid");F=G?G:null;var H=window.innerWidth+"x"+window.innerHeight,I=n("usprivacy"),J=r({gdpr:B,pp:C,rid:u,src:D,ref:E,tuuid:F,vp:H,us_privacy:I?I:null},"","."); (function(a){var b=void 0===b?"cb":b;l++;var c="callback__"+g().toString(36)+"_"+l.toString(36);a=k(a,b,c);window[c]=function(d){t(void 0,d)};m(a,function(d){d&&t(d)})})(y+"?"+J);}).call(this); </script> <script> var sas_fallback = sas_fallback || []; sas_fallback.push( { tag: "&lt;div id=&quot;atatags-26942-{{unique_id}}&quot;&gt;&lt;/div&gt;&lt;script&gt;__ATA.cmd.push(function() {__ATA.initDynamicSlot({id: \'atatags-26942-{{unique_id}}\',location: 120,formFactor: \'001\',label: {text: \'Advertisements\',},creative: {reportAd: {text: \'Report this ad\',},privacySettings: {text: \'Privacy\',}}});});&lt;/script&gt;", type: 'belowpost' }, { tag: "&lt;div id=&quot;atatags-26942-{{unique_id}}&quot;&gt;&lt;/div&gt;&lt;script&gt;__ATA.cmd.push(function() {__ATA.initDynamicSlot({id: \'atatags-26942-{{unique_id}}\',location: 310,formFactor: \'001\',label: {text: \'Advertisements\',},creative: {reportAd: {text: \'Report this ad\',},privacySettings: {text: \'Privacy\',}}});});&lt;/script&gt;", type: 'inline' }, { tag: "&lt;div id=&quot;atatags-26942-{{unique_id}}&quot;&gt;&lt;/div&gt;&lt;script&gt;__ATA.cmd.push(function() {__ATA.initDynamicSlot({id: \'atatags-26942-{{unique_id}}\',location: 140,formFactor: \'003\',label: {text: \'Advertisements\',},creative: {reportAd: {text: \'Report this ad\',},privacySettings: {text: \'Privacy\',}}});});&lt;/script&gt;", type: 'sidebar' }, { tag: "&lt;div id=&quot;atatags-26942-{{unique_id}}&quot;&gt;&lt;/div&gt;&lt;script&gt;__ATA.cmd.push(function() {__ATA.initDynamicSlot({id: \'atatags-26942-{{unique_id}}\',location: 110,formFactor: \'002\',label: {text: \'Advertisements\',},creative: {reportAd: {text: \'Report this ad\',},privacySettings: {text: \'Privacy\',}}});});&lt;/script&gt;", type: 'top' } ); </script> <script type="text/javascript"> window.doNotSellCallback = function() { var linkElements = [ 'a[href="https://wordpress.com/?ref=footer_blog"]', 'a[href="https://wordpress.com/?ref=footer_website"]', 'a[href="https://wordpress.com/?ref=vertical_footer"]', 'a[href^="https://wordpress.com/?ref=footer_segment_"]', ].join(','); var dnsLink = document.createElement( 'a' ); dnsLink.href = 'https://wordpress.com/advertising-program-optout/'; dnsLink.classList.add( 'do-not-sell-link' ); dnsLink.rel = 'nofollow'; dnsLink.style.marginLeft = '0.5em'; dnsLink.textContent = 'Do Not Sell or Share My Personal Information'; var creditLinks = document.querySelectorAll( linkElements ); if ( 0 === creditLinks.length ) { return false; } Array.prototype.forEach.call( creditLinks, function( el ) { el.insertAdjacentElement( 'afterend', dnsLink ); }); return true; }; </script> <script type="text/javascript"> window.google_analytics_uacct = "UA-52447-2"; </script> <script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-52447-2']); _gaq.push(['_gat._anonymizeIp']); _gaq.push(['_setDomainName', 'wordpress.com']); _gaq.push(['_initData']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(ga); })(); </script> </head> <body class="archive author author-journalijcsa author-99305799 customizer-styles-applied jetpack-reblog-enabled has-marketing-bar has-marketing-bar-theme-big-brother"> <div id="page" class="hfeed site"> <a class="skip-link screen-reader-text" href="#content">Skip to content</a> <header id="masthead" class="site-header clearfix" role="banner"> <div class="site-branding"> <a href="https://journalijcsa.wordpress.com/" class="site-logo-link" rel="home" itemprop="url"></a> <h1 class="site-title"><a href="https://journalijcsa.wordpress.com/" rel="home">International Journal on Computational Science &amp; Applications (IJCSA)</a></h1> <h2 class="site-description">ISSN : 2200 &#8211; 0011</h2> </div> <nav id="site-navigation" class="main-navigation nav-horizontal" role="navigation"> <button class="menu-toggle" aria-controls="primary-menu" aria-expanded="false">Menu</button> <div class="menu-menu-1-container"><ul id="primary-menu" class="menu"><li id="menu-item-371" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-371"><a target="_blank" rel="noopener" href="https://journalijcsa.wordpress.com/">Home</a></li> <li id="menu-item-370" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-370"><a href="https://journalijcsa.wordpress.com/current-issue/">Current Issue</a></li> </ul></div> </nav><!-- #site-navigation --> </header><!-- #masthead --> <div id="content" class="site-content clearfix"> <div class="breadcrumbs"> <a class="breadcrumbs-root" href="https://journalijcsa.wordpress.com/">Home</a><span class="breadcrumbs-current">Articles posted by journalijcsa</span> </div> <section class="primary content-area"> <main id="main" class="site-main" role="main"> <header class="page-header"> <h1 class="page-title"> Author: <span class="vcard">journalijcsa</span> </h1> </header><!-- .page-header --> <div class="article-wrapper"> <article id="post-1179" class="post-1179 post type-post status-publish format-standard hentry category-uncategorized"> <header class="entry-header"> <h1 class="entry-title"><a href="https://journalijcsa.wordpress.com/2023/03/07/international-journal-on-computational-science-applications-ijcsa-2/" rel="bookmark">International Journal on Computational Science Applications&nbsp;(IJCSA)</a></h1> <div class="entry-meta"> <span class="posted-on"><a href="https://journalijcsa.wordpress.com/2023/03/07/international-journal-on-computational-science-applications-ijcsa-2/" rel="bookmark"><time class="entry-date published" datetime="2023-03-07T08:39:53+00:00">March 7, 2023</time><time class="updated" datetime="2024-11-19T07:19:19+00:00">November 19, 2024</time></a></span> <span class="byline"><span class="author vcard"><a class="url fn n" href="https://journalijcsa.wordpress.com/author/journalijcsa/">journalijcsa</a></span></span> </div><!-- .entry-meta --> </header><!-- .entry-header --> <div class="entry-content"> <p class="has-text-align-center"><strong>ISSN : 2200 &#8211; 0011</strong></p> <h3 class="wp-block-heading has-text-align-center"><a href="http://wireilla.com/ijcsa/index.html" target="_blank" rel="noreferrer noopener">http://wireilla.com/ijcsa/index.html</a></h3> <h3 class="wp-block-heading"><strong>Scope &amp; Topics</strong></h3> <p class="has-text-align-justify">Computational science is interdisciplinary fields in which mathematical models are combined with scientific computing methods to study of a wide range of problems in science and engineering. Modeling and simulation tools find increasing applications not only in fundamental research, but also in real-world design and industry applications.</p> <h3 class="wp-block-heading"><strong>Topics of interest include but are not limited to, the following</strong></h3> <ul class="wp-block-list"> <li>Modeling, Algorithms and Simulations</li> <li>Problem Solving</li> <li>Scientific Computing</li> <li>Computational Sciences (Biology, Chemistry, mathematics, physics, forensics, etc.)</li> <li>High Performance Computing</li> <li>Machine Learning</li> <li>Network Analysis</li> <li>Computer Architecture</li> <li>Visualization and Virtual Reality as Applied to Computational Science</li> <li>Architectures and computation models, compiler, hardware and OS issues</li> <li>Large Scale Scientific Instruments</li> <li>Memory system, I/O, tools, programming environment and language supports</li> </ul> <h3 class="wp-block-heading"><strong>Paper Submission</strong></h3> <p class="has-text-align-justify">Authors are invited to submit papers for this journal through&nbsp;<a href="http://wireilla.com/paper_submission/index.php" target="_blank" rel="noreferrer noopener">Submission system</a>. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.</p> <h3 class="wp-block-heading"><strong>Important Dates</strong></h3> <ul class="wp-block-list"> <li><strong>Submission Deadline    :  November 24, 2024</strong></li> <li>Notification                  :  December 24, 2024</li> <li>Final Manuscript Due   :  December 31, 2024</li> <li>Publication Date &nbsp;: Determined by the Editor-in-Chief</li> </ul> <h3 class="wp-block-heading"><strong>Contact Us</strong></h3> <p class="has-text-align-justify">Here&#8217;s where you can reach us :&nbsp;<a href="mailto:ijcsajournal@yahoo.com">ijcsajournal@yahoo.com</a>&nbsp;or&nbsp;<a href="mailto:ijcsajournal@wireilla.com">ijcsajournal@wireilla.com</a></p> <div id="atatags-26942-67421a0f6f737"></div> <script> __ATA.cmd.push(function() { __ATA.initDynamicSlot({ id: 'atatags-26942-67421a0f6f737', location: 120, formFactor: '001', label: { text: 'Advertisements', }, creative: { reportAd: { text: 'Report this ad', }, privacySettings: { text: 'Privacy', } } }); }); </script> </div><!-- .entry-content --> <footer class="entry-meta"> <span class="comments-link"><a href="https://journalijcsa.wordpress.com/2023/03/07/international-journal-on-computational-science-applications-ijcsa-2/#respond">Leave a comment</a></span> </footer><!-- .entry-meta --> </article><!-- #post-## --> </div> <div class="article-wrapper"> <article id="post-990" class="post-990 post type-post status-publish format-standard hentry category-uncategorized"> <header class="entry-header"> <h1 class="entry-title"><a href="https://journalijcsa.wordpress.com/2020/12/01/international-journal-on-computational-science-applications-ijcsa/" rel="bookmark">International Journal on Computational Science Applications&nbsp;(IJCSA)</a></h1> <div class="entry-meta"> <span class="posted-on"><a href="https://journalijcsa.wordpress.com/2020/12/01/international-journal-on-computational-science-applications-ijcsa/" rel="bookmark"><time class="entry-date published" datetime="2020-12-01T10:32:22+00:00">December 1, 2020</time><time class="updated" datetime="2024-11-21T04:24:35+00:00">November 21, 2024</time></a></span> <span class="byline"><span class="author vcard"><a class="url fn n" href="https://journalijcsa.wordpress.com/author/journalijcsa/">journalijcsa</a></span></span> </div><!-- .entry-meta --> </header><!-- .entry-header --> <div class="entry-content"> <h3 class="wp-block-heading has-text-align-center" id="http-wireilla-com-ijcsa-index-html"><a href="http://wireilla.com/ijcsa/index.html" target="_blank" rel="noreferrer noopener">http://wireilla.com/ijcsa/index.html</a></h3> <h3 class="wp-block-heading" id="scope-topics"><strong>Scope &amp; Topics</strong></h3> <p class="has-text-align-justify">Computational science is interdisciplinary fields in which mathematical models are combined with scientific computing methods to study of a wide range of problems in science and engineering. Modeling and simulation tools find increasing applications not only in fundamental research, but also in real-world design and industry applications.</p> <h3 class="wp-block-heading" id="topics-of-interest-include-but-are-not-limited-to-the-following"><strong>Topics of interest include but are not limited to, the following</strong></h3> <ul class="wp-block-list"> <li>Modeling, Algorithms and Simulations</li> <li>Problem Solving</li> <li>Scientific Computing</li> <li>Computational Sciences (Biology, Chemistry, mathematics, physics, forensics, etc.)</li> <li>High Performance Computing</li> <li>Machine Learning</li> <li>Network Analysis</li> <li>Computer Architecture</li> <li>Visualization and Virtual Reality as Applied to Computational Science</li> <li>Architectures and computation models, compiler, hardware and OS issues</li> <li>Large Scale Scientific Instruments</li> <li>Memory system, I/O, tools, programming environment and language supports</li> </ul> <h3 class="wp-block-heading" id="paper-submission">Paper Submission</h3> <p class="has-text-align-justify">Authors are invited to submit papers for this journal through <a href="http://wireilla.com/paper_submission/index.php" target="_blank" rel="noreferrer noopener">Submission system</a>. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.</p> <h3 class="wp-block-heading" id="important-dates"><strong>Important Dates</strong></h3> <ul class="wp-block-list"> <li>Submission Deadline    : <strong>November 24, 2024</strong></li> <li>Notification                  : December 24, 2024</li> <li>Final Manuscript Due   : December 31, 2024</li> <li>Publication Date &nbsp;: Determined by the Editor-in-Chief</li> </ul> <div id="atatags-370373-67421a0f70611"> <script type="text/javascript"> __ATA.cmd.push(function() { __ATA.initVideoSlot('atatags-370373-67421a0f70611', { sectionId: '370373', format: 'inread' }); }); </script> </div> </div><!-- .entry-content --> <footer class="entry-meta"> <span class="comments-link"><a href="https://journalijcsa.wordpress.com/2020/12/01/international-journal-on-computational-science-applications-ijcsa/#respond">Leave a comment</a></span> </footer><!-- .entry-meta --> </article><!-- #post-## --> </div> <div class="article-wrapper"> <article id="post-787" class="post-787 post type-post status-publish format-standard hentry category-uncategorized"> <header class="entry-header"> <h1 class="entry-title"><a href="https://journalijcsa.wordpress.com/2017/07/13/787/" rel="bookmark"></a></h1> <div class="entry-meta"> <span class="posted-on"><a href="https://journalijcsa.wordpress.com/2017/07/13/787/" rel="bookmark"><time class="entry-date published" datetime="2017-07-13T07:06:06+00:00">July 13, 2017</time></a></span> <span class="byline"><span class="author vcard"><a class="url fn n" href="https://journalijcsa.wordpress.com/author/journalijcsa/">journalijcsa</a></span></span> </div><!-- .entry-meta --> </header><!-- .entry-header --> <div class="entry-content"> <p style="text-align:center;">A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS</p> <p style="text-align:center;">Jasleen Kour1, Saboor Koul2 and Prince Zahid3</p> <p style="text-align:center;">1Assistant Professor, Department of CSE, BGSBU, Rajouri, J&amp;K, India<br /> 2,3UG Scholars, Department of CSE, BGSBU, Rajouri, J&amp;K, India</p> <p>&nbsp;</p> <h4 style="text-align:justify;"><span style="color:#008000;">ABSTRACT</span></h4> <p style="text-align:justify;">Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows two parties to produce a shared random bit string known only to them. These random bits can be used as a key to encrypt and decrypt messages. The most important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. It is based on fundamental aspects of quantum mechanics. By using quantum entanglement or quantum super positions and transmitting information in quantum states, a communication system can be implemented which detects eavesdropping. Quantum cryptography is used to produce and distribute a key, not to transmit any message data. This key along with certain encryption algorithm, is used to encrypt (and decrypt) a message, which can then be transmitted over a standard communication channel. This paper concentrates on comparison between classical and quantum cryptography as well as survey on various quantum key distribution protocols used to generate and distribute the key among communicating parties.</p> <h4><span style="color:#008000;">KEYWORDS</span></h4> <p>Quantum Cryptography, QKD, bits, photons and qubits.</p> <h4><span style="color:#008000;">1.INTRODUCTION</span></h4> <p style="text-align:justify;">Data communication security can be defined as complex process that implies networks, users and applications, all of these connected by a set of modern technologies. So, Information systems are very vulnerable to attacks and illegitimate penetrations, to data incidental or intended data. Cryptography is a concept to protect the information transmission over such networks.</p> <p style="text-align:justify;">Cryptography is the science where the use of mathematics occurs to encrypt and decrypt data. It enables user to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be interpreted by anyone other than the intended receiver. To achieve such level of security different algorithms are used for secure transmissions which unite the message with additional information to produce a cryptogram. These algorithms are known as Cipher and the additional information is known as the key. This method is termed as encryption. Whereas cryptanalysis is the science of analyzing and breaking secure communication without knowing the encryption technique. Classical cryptanalysis involves an interesting combination of analytical reasoning, pattern finding, patience, determination, and luck. Quantum cryptographic devices generally make use of individual photons of light and take benefit of Heisenberg&#8217;s Uncertainty Principle, according to this principle cryptographic protocols can invoke up streams of random bits whose values will remain unknown to third parties. When we use these bits as key material for Vernam ciphers, we can get Shannon’s ideal of perfect secrecy—cheaply and easily. The development of quantum cryptography was inspired by some limitations of classical cryptography methods. In classical cryptography, communicating parties share a secret sequence of random numbers, the key, that is exchanged by some physical mean and thus open to security loopholes. The classical cryptography does not detect eavesdropping like quantum cryptography, also with increase in computing power and new computational techniques are developed, the numerical keys will no longer be able to provide satisfactory levels of secure communications. These weaknesses led to the development of quantum cryptography, whose security basis is quantum mechanics. This paper presents the comparison of quantum and classical cryptography on several background, quantum cryptography key protocols and real world application of quantum cryptography.</p> <h4><span style="color:#008000;">2. CLASSICAL V/S QUANTUM CRYPTOGRAPHY</span></h4> <p>Both quantum cryptography and classical cryptography can be compared on following<br /> dimensions:</p> <h4><span style="color:#008000;">2.1. Fundamental Dimension</span></h4> <p style="text-align:justify;">In theory, any classical private channel can be easily monitored inertly, without the knowledge to sender or receiver that the eavesdropping has been done. Classical physics is the theory of macroscopic bodies and phenomena such as radio signals that allows a physical property of an object to be measured without disturbing other properties. Cryptographic key like information is encoded in computable physical properties of some object or signal. Thus there is open possibility of passive eavesdropping in classical cryptography.</p> <p style="text-align:justify;">Quantum theory which is basis of quantum cryptography is believed to direct all objects, but its consequences are mainly noticeable in individual atoms or subatomic particles like microscopic systems. As far as classical cryptography is concerned there is frequent requirement of using longer keys as computational power doubles in every 18 months and cost of computation is reducing rapidly with time [moors law]. Thus an algorithm using k bit key which is secure may not be secure in future, i.e. it needs regular updating. On the other hand, security in quantum cryptography is based on the basic principles of quantum mechanics, so the possibilities of major changes requirements for future are almost negligible.</p> <h4><span style="color:#008000;">2.2. Commercial dimensions</span></h4> <p style="text-align:justify;">Commercial solutions for QC that already exist; they are only suitable for point-to-point connections. On the other hand, crypto chip made by the Siemens and Graz technical university makes possible the creation of networks with many participants, and cost of €100,000 per unit, the system is very expensive and requires a lot of work. On other hand classical cryptography can be implemented in software and its cost for consumer is almost zero. Also, cryptographic system based on classical cryptography can be implemented on small hardware component like smart card , but this is major issue in case of quantum cryptography shrinkage to such a level require too much development.</p> <h4><span style="color:#008000;">2.3. Technological dimensions</span></h4> <p style="text-align:justify;">Chinese scientists accomplished the world`s most long-distance of quantum communication transmission (teleportation), or as &#8220;instant matter transmission technology&#8221; technology. From the China University of Technology and researchers at Tsinghua University, Hefei National Laboratory in their free-space quantum communication experiments, and effectively enlarges the communication distance to 10 miles [9]. But classical cryptography can be used to communication distance of several million miles. According to the latest research, Toshiba achieve new record bit rate for quantum key distribution, that is, 1 Mbit/s on average [10]. On the other hand the bit rate of classical cryptography depends on the computational power largely.</p> <h4 style="text-align:justify;"><span style="color:#008000;">2.4. Other dimensions</span></h4> <p style="text-align:justify;">Communication medium is not an issue in classical cryptography because its security depends only on the computational complexity. Thus, this removes the need for excessively secure channels. On the other hand communication of quantum cryptography require a quantum channel like optical fiber or through air (wireless), also, there is constantly a likelihood of modification in polarization of photon due to Birefringence effect or rough paths that cause change in refractive index due to damage sometimes. Also, an n-bit classical register can store at any moment exactly one n-bit string. Whereas an n-qubit quantum register can store at any moment a superposition of<br /> all 2n n-bit strings.</p> <p style="text-align:justify;">Quantum cryptography is based on mixture of concepts from quantum physics and information theory. The security standard in QC is based on theorems in classical information theory and on the Heisenberg’s uncertainty principle. Experiments have demonstrated that keys can be exchanged over distances of a few miles at low bit rate. Its combination with classical secret key cryptographic algorithms permits increasing the confidentiality of data transmissions to an extraordinary high level. From comparison, it’s obvious that quantum cryptography (QC) is having more advantage than Classical Cryptography (CC) though some issues are yet to be solved. This is mainly due to the implementation problems but in future there exist possibilities that most of the problems in quantum cryptography will get resolved.</p> <h4 style="text-align:justify;"><span style="color:#008000;">3 QUANTUM KEY DISTRIBUTION PROTOCOLS.</span></h4> <p style="text-align:justify;">Quantum key distribution is a key establishment protocol which generates symmetric key material by using quantum properties of light to transfer information from one Client to another Client in a manner which uses the results of quantum mechanics. By using the quantum properties of light, current lasers, fibre-optics and free space transmission technology can be used for QKD (Quantum key distribution), so that many observers claiming security can be based on the law of quantum physics only. Based upon the necessary principles of Quantum mechanics the QKD protocols are divided into two categories some are based on Heisenberg Uncertainty Principles and others are based on quantum entanglement.</p> <h4><span style="color:#008000;">3.1. Protocols based on Heisenberg Uncertainty Principle:</span></h4> <h4><span style="color:#008000;">3.1.1. BB84 protocol</span></h4> <p style="text-align:justify;">In 1984 Charles Bennet and Gilles Brassard for the first time proposed a protocol known as BB84 protocol which depends upon the Heisenberg Uncertainty principle. Quantum key Distribution (QKD) is used in quantum cryptography for generating a secret key shared between two parties using a quantum channel and an authenticated classical channel. The private key obtained then used to encrypt message that are sent over an insecure channel (such as a conventional internet connection) as shown fig. below .A bit can be represented by polarising the photon in either of the two bases i.e. Rectilinear base(R) and Diagonal base (B).Binary 0 represents the polarisation of 0° degree in rectilinear base or 45° degree in diagonal base. Similarly binary 1 represents the polarisation of 90° degree in the rectilinear base or 135° degree in diagonal base. [1][5][15][16]</p> <p><img data-attachment-id="812" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/787/capture-22/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture20.png" data-orig-size="590,280" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture20.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture20.png?w=590" class="alignnone size-full wp-image-812" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture20.png" alt="Capture.PNG" width="590" height="280" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture20.png 590w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture20.png?w=150&amp;h=71 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture20.png?w=300&amp;h=142 300w" sizes="(max-width: 590px) 100vw, 590px" /></p> <p>There are two steps involved in key distribution for BB84 protocol, as explained below:<br /> a) One way communication channel (via quantum channel).</p> <p>Step i) User A (Alice) randomly chosen polarized photon and send it to the user B (Bob) over Quantum channel.</p> <p>Step ii) In this, user B receives photons using random basis either rectilinear or random</p> <p>b) Two way communication (via classical channel).<br /> Step i) User A will use classical channel to inform user B about the polarisation A chose for every bit sent to B without disclosing the bit value.</p> <p>Step ii) Now user will compare the polarisation sequence he receives from user A with the sequence he generated.</p> <p>Step iii) Bits of same orientation of those two sequences can be used as secret key.</p> <h4><span style="color:#008000;">3.1.2. BBM92 protocol</span></h4> <p style="text-align:justify;">It is the modified version of BB84 protocol which uses only two states instead of four states which were used in BB84 protocol. Charles Bennett, Brassard and Mermin devised another, the so-called BBM92 protocol. They realized that it was not necessary to use two orthogonal bases for encoding and decoding. It turns out that a single non-orthogonal basis can be used instead, without affecting the security of the protocol against eavesdropping. This idea is used in the BB92 protocol, which is otherwise identical to BB84 protocol.</p> <p><img data-attachment-id="819" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/787/capture-23/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture21.png" data-orig-size="236,179" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture21.png?w=236" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture21.png?w=236" class="alignnone size-full wp-image-819 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture21.png" alt="Capture.PNG" width="236" height="179" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture21.png 236w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture21.png?w=150&amp;h=114 150w" sizes="(max-width: 236px) 100vw, 236px" /></p> <p style="text-align:justify;">As shown in fig 1B. BB92 above, 0 represents 0°degree in the rectilinear basis and 1 represents 45°degree in the diagonal basis. Client A transmits string of photons to client B which were encrypted by randomly chosen bits just like in BB84 protocol. But here client A chooses the bits by an authoritative rule to which base client B must use. But still Client B chooses randomly a basis by which to measure but if Client B chooses wrong base he will not measure anything; a condition in quantum mechanics which is known as an erasure. After every step Client B tells Client A that the bits end by client A whether or not he measured it correctly.[2][3][7]</p> <h4><span style="color:#008000;">3.1.3. SARG04 protocol</span></h4> <p style="text-align:justify;">SARG04 protocol was proposed by Scarani et.al in 2004. In this protocol the four states of BB84 protocol is used with different information such a new protocol is developed which is capable of performing without failure under a wide range of conditions when attenuated laser pulses instead of single photon source.</p> <p style="text-align:justify;">Its first phase is similar to BB84 protocol. In the second Phase Client A instead of directly<br /> announcing her base to Client B, it announces a pair of non-orthogonal states one of which client A uses it to encode its bit. Client B measures the correct state if it has used the correct base. Client B will not be able to determine the bit or will not measure the correct states of client A if he chooses the wrong base. The length the key will remain ¼ of the raw key after shifting stage if there are no errors.</p> <p style="text-align:justify;">The SARG04 protocol has almost same security to BB84 in perfect single-photon implementations, If the quantum channel is of a given visibility (i.e. with losses) then the QBER of SARG04 is twice that of BB84 protocol, and is more sensitive to losses.SARG04 is more secure than BB84 protocol in presence of PNS attacks.[1][4][5][14]</p> <p><img data-attachment-id="825" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/787/capture-24/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture22.png" data-orig-size="400,315" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture22.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture22.png?w=400" class="alignnone size-full wp-image-825 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture22.png" alt="Capture.PNG" width="400" height="315" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture22.png 400w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture22.png?w=150&amp;h=118 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture22.png?w=300&amp;h=236 300w" sizes="(max-width: 400px) 100vw, 400px" /></p> <h4><span style="color:#008000;">3.2. Protocols based on Quantum Entanglement.</span></h4> <h4><span style="color:#008000;">3.2.1 E91 protocol</span></h4> <p style="text-align:justify;">Ekert, in 1992, performed the process of key distribution through entanglement of photons in a quantum channel. He proposed a method of harnessing Bell`s inequalities. In this method any of the three, A (Alice), B (Bob), or the third party could produce entangled photons. Separation in each pair is such that the communicants, A and B could receive one of each pair. Quantum entanglement means to define the quantum states of one object without referencing the quantum states of another object far away from it. The fact that entangled states are used conceals the information about the key from the eavesdroppers, hence more secure method. The states of particle are not collapsed until the moment of measurement, so trying to access the system is as looking for something that doesn`t exist yet.</p> <p style="text-align:justify;">Both A and B choose randomly and independently from two different orientations of their analysers to measure the polarization of photons. A typically physical set-up is shown in fig3A: given below, using active polarization rotators (PR), polarizing beam splitter (PBS) and avalanche photodiodes (APD). [8][11][13]</p> <p><img data-attachment-id="830" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/787/capture-25/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture23.png" data-orig-size="371,186" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture23.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture23.png?w=371" loading="lazy" class="alignnone size-full wp-image-830 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture23.png" alt="Capture.PNG" width="371" height="186" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture23.png 371w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture23.png?w=150&amp;h=75 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture23.png?w=300&amp;h=150 300w" sizes="(max-width: 371px) 100vw, 371px" /></p> <h4><span style="color:#008000;">3.2.2. COW protocol</span></h4> <p style="text-align:justify;">A new protocol, given by Nicolas Gisin et al in 2004, was proposed for QKD based on the weak coherent pulses at high bit rates. The protocol was termed as Coherent One-Way protocol l(COW protocol). The main feature of the method was the setup being experimentally simple and resistant to interference visibility and to photon numbers splitting attacks, hence more efficient in terms of distilled secret bits per qubit.</p> <p><img data-attachment-id="834" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/787/capture-26/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture24.png" data-orig-size="585,209" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture24.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture24.png?w=585" loading="lazy" class="alignnone size-full wp-image-834" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture24.png" alt="Capture.PNG" width="585" height="209" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture24.png 585w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture24.png?w=150&amp;h=54 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture24.png?w=300&amp;h=107 300w" sizes="(max-width: 585px) 100vw, 585px" /></p> <p style="text-align:justify;">The figure 4A above represents the COW protocol. The message is encoded in time. Alice sends Coherent pulses that are either empty or have a mean photon number μ &lt; 1. Each logical bit of information is encoded by sequences of two pulses, μ-0 for a logical ―0‖ or 0-μ for a logical ―1‖.</p> <p style="text-align:justify;">Alice sends decoy sequences μ-μ for security needs. Bob measures the arrival time of the photon on his data-line, detector DB to obtain its key. Bob randomly measure the coherence between successive non-empty pulses, bit sequence ―1 -0‖ or decoy sequence, with interferometer and detectors DM1 and DM2. If wavelength of the laser and the phase in the interferometer are well aligned, we have all detection on DM1 and no detection on DM2. A loss of coherence and therefore a reduction of the visibility reveal the presence of an eavesdropper, in which case the key is simply discarded, hence no information will be lost.[1][11][12][7]</p> <h4><span style="color:#008000;">3.2.3. DPS protocol</span></h4> <p style="text-align:justify;">Differential –phase-shift QKD (DPS-QKD) is a new quantum key distribution scheme that was proposed by K. Inoue et al. Figure 5A mentioned below shows the setup of the DPS-QKD scheme.</p> <p><img data-attachment-id="839" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/787/capture-27/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture25.png" data-orig-size="573,266" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture25.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture25.png?w=573" loading="lazy" class="alignnone size-full wp-image-839 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture25.png" alt="Capture.PNG" width="573" height="266" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture25.png 573w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture25.png?w=150&amp;h=70 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture25.png?w=300&amp;h=139 300w" sizes="(max-width: 573px) 100vw, 573px" /></p> <p style="text-align:justify;">From the Alice site, a pulse train of weak coherent states is phase-modulated randomly by {0, π} for every pulse and then to Bob with an average photon number less than one per pulse. From the Bob`s site, the phase difference is measured between the two sequential pulses using one bit delay. Mach-Zender interferometer and photon detectors record the photon arrival time and which detector clicked. Bob, after transmission of the optical pulse train, tells Alice the time at which photon was counted. Alice comes to know from this time information and her modulation data about the detector clicked at Bob`s site. Under an agreement that a click by detector 1 denotes ―0‖ and click by detector 2 denotes ―1‖, for example Alice and Bob obtain an identical bit<br /> string.</p> <p style="text-align:justify;">The DPS-QKD scheme has certain advantageous features including a simple configuration, efficient time domain use, and robustness against photon number splitting attack. [9][10][11]</p> <h4><span style="color:#008000;">4. APPLICATIONS OF QUANTUM CRYPTOGRAPHY</span></h4> <p style="text-align:justify;">The study of quantum cryptography is heavily application-oriented. Therefore, a fundamental question is: Who really needs it rather than classical cryptography? The most significant advantage of quantum cryptography is the forward security. That is, if a classified message is appropriately encrypted with quantum cryptography, its distribution will stay secure as long asquantum mechanics is valid. In contrast, a classified message that is encrypted with classical cryptographic algorithm may stay safe only for a certain period of time. The length of this ―secure period‖ is predictable only if the increase of computational power is predictable. Quantum cryptography can be a favored choice for applications that require long-term information security. There can be a long list of potential (or maybe present) clients. Here we raise a few examples.</p> <h4><span style="color:#008000;">4.1. Government agencies.</span></h4> <p style="text-align:justify;">This includes intelligence, diplomatic, and military agencies. Often under the name of national interest, some information (like some pictures taken in Guantanamo Bay detention camp) is expected to be kept confidential for decades, during which such confidential information may be extensively distributed among different government agencies. Note that the Canadian census data are kept secret for 92 years. Therefore, if we conducted a census in 2009, the data would not be released until 2101, which is the next century! Quantum cryptography can help keep these sensitive data secure during transmission.</p> <h4><span style="color:#008000;">4.2. Financial institutes.</span></h4> <p style="text-align:justify;">Financial information is very sensitive and needs long-time confidentiality. Quantum encrypted links between financial institutes can substantially reduce the risk of leaking the clients’ information during communication.</p> <h4><span style="color:#008000;">4.3. Health care providers.</span></h4> <p style="text-align:justify;">Health care records are being digitized gradually. Digital records of patients are often distributed between different health care providers facilitate medical treatments. The distribution of a patient’s health record may have to be kept secure for the life span of the patient, and quantum cryptography can certainly be of help. Note that quantum cryptography is not the only method to guarantee unconditional communication security. It is not even the only solution to the key distribution problem.</p> <h4><span style="color:#008000;">5. CONCLUSION &amp; FUTURE WORK</span></h4> <p style="text-align:justify;">The techniques adapted from classical computer science are applicable to quantum key<br /> distribution protocols is an appropriate sign that quantum cryptography is a rousing new area of research work. In this paper we endeavored to introduce quantum cryptography, QKD protocols and QC applications. It explains about different quantum key distribution protocols. These protocols can be used along with encryption technique to achieve higher level of security. There is much more to describe about quantum cryptography</p> <h4><span style="color:#008000;">REFERENCES</span></h4> <p style="text-align:justify;">[1] Abhishek Parakh, (2015), ―New Protocol for Quantum Public Key Cryptography‖, IEEE ANTS 2015 1570203267 .</p> <p style="text-align:justify;">[2] Otilia Cangea, Carmen Silvia Oprina, Mihai-Octavian Dima, (2016), ―Implementing Quantum Cryptography Algorithms for Data Security‖ ,ECAI 2016 &#8211; International Conference – 8th Edition Electronics, Computers and Artificial Intelligence 30 June -02 July, 2016, Ploiesti, ROMÂNIA.</p> <p style="text-align:justify;">[3] V. Padamvathi, B. Vishnu Vardhan, A.V.N. Krishna,(2016), ―Quantum Cryptography and Quantum Key Distribution Protocols: A Survey‖, Advanced Computing (IACC), 2016 IEEE 6th International Conference.</p> <p style="text-align:justify;">[4] H. Bennett, (May 1992),‖Quantum cryptography using any two no orthogonal states‖,‖ Phys. Rev. Lett., vol. 68, no. 21, pp. 3121–3124,.</p> <p style="text-align:justify;">[5] Tamaki, K., M. Koashi, and N. Imoto, (2003), ―Unconditionally secure key distribution based on two non orthogonal states‖,‖ Physical Review Letters 90, 167904 [preprint quant-ph/0210162].</p> <p style="text-align:justify;">[6] M. Christandl, R. Renner, and A. Ekert, (Mar. 2004 ), ―A generic security proof for quantum key distribution‖,‖ arXiv:quant-ph/0402131.</p> <p style="text-align:justify;">[7] M. A. Nielsen and I. L. Chuang, (2000), ―Quantum Computation and Quantum Information‖, Cambridge, UK: Cambridge University Press.</p> <p style="text-align:justify;">[8] Eduin H. Serna, (2009), ―Quantum Key Distribution Protocol with Private-Public Key‖‖, Quantum Physics (quant-ph), <a href="http://arxiv.org/PS_cache/arxiv/pdf/0908/0908.2146v3.pdf" rel="nofollow">http://arxiv.org/PS_cache/arxiv/pdf/0908/0908.2146v3.pdf</a>.</p> <p style="text-align:justify;">[9] E. Biham, T. Mor, (1997), ―Security of quantum cryptography against collective attacks‖, Physical Review Letters 78 (11) 2256–2259.</p> <p style="text-align:justify;">[10] Ekert, Artur K.,( August 1991), ―Quantum cryptography based on Bell’s theorem, Physical Review Letters‖, Vol. 67, No. 6, 5, pp 661 &#8211; 663.</p> <p style="text-align:justify;">[11] Inoue K, Woks E and Yamamoto Y, (2002), ―Differential phase shift quantum key distribution‖, Phys. Rev. Lett. 89037902.</p> <p style="text-align:justify;">[12] M. Lucamarini, S. Mancini, (2005), ―Secure deterministic communication without entanglement, Physics Review Letters‖, 94140501.</p> <p style="text-align:justify;">[13] M. Elboukhari, M. Azizi, A. Azizi, (2009), ―Implementation of secure key distribution based on quantum cryptography‖‖, in Proc. IEEE Int. Conf Multimedia Computing and Systems (ICMCS’09), pp 361 – 365.</p> <p style="text-align:justify;">[14] M. Elboukhari, Mostafa Azizi, and Abdelmalek Azizi, (2009), ―Integration of Quantum Key Distribution in the TLS Protocol‖‖, IJCSNS, Vol. 9 No. 12 , pp.21-28,.<br /> <a href="http://paper.ijcsns.org/07_book/200912/20091204.pdf" rel="nofollow">http://paper.ijcsns.org/07_book/200912/20091204.pdf</a>.</p> <p style="text-align:justify;">[15] N. Lutkenhaus, (1996), ―Security against eavesdropping in quantum cryptography, Physical Review‖, A 54 (1) 97–111.</p> <p style="text-align:justify;">[16] P. W. Shor and J. Preskill,( July 2000), ―Simple proof of security of the BB84 quantum key distribution protocol‖, Phys. Rev. Lett, vol. 85, no. 2, pp. 441– 444.</p> <p style="text-align:justify;">[17] R.Hughes,J.Nordholt,D.Derkacs,C.Peterson, (2002), ―Practical free-space quantum key distribution over 10km in daylight and at night‖, New journal of physics 4 (2002)43.1-43.14.URL: <a href="http://www.iop.org/EJ/abstract/1367-2630/4/1/343" rel="nofollow">http://www.iop.org/EJ/abstract/1367-2630/4/1/343</a>.</p> <p style="text-align:justify;">[18] C. H. Bennett and G. Brassard, (1984), ―Quantum cryptography: Public key distribution and coin tossing,‖ in Proc. IEEE Intl. Conf. on Computers, Systems, and Signal Processing, pp. 175–179.</p> <p style="text-align:justify;">[19] U. Vazirani and T. Vidick, (Sep 2014), ―Fully device-independent quantum key distribution.‖, Phys. Rev. Lett., 113:140501,.</p> <p style="text-align:justify;">[20] S.-A. Wang and C.-Y. Lu.( Aug 2013), ―Quantum secure direct communication network In Nanotechnology (IEEE-NANO)‖, 13th IEEE Conference, pp 752–755.</p> <p style="text-align:justify;">[21] Verma Deepankar, Kour Jasleen, (June 2014), ―Image Steganography Based on Hybrid Cryptography  Algorithm Designed by making use of Blowfish, AES, RSA Algorithm‖, IJARCSSE, Vol. 4, Issue 6.</p> </div><!-- .entry-content --> <footer class="entry-meta"> <span class="comments-link"><a href="https://journalijcsa.wordpress.com/2017/07/13/787/#respond">Leave a comment</a></span> </footer><!-- .entry-meta --> </article><!-- #post-## --> </div> <div class="article-wrapper"> <article id="post-732" class="post-732 post type-post status-publish format-standard hentry category-uncategorized"> <header class="entry-header"> <h1 class="entry-title"><a href="https://journalijcsa.wordpress.com/2017/07/13/732/" rel="bookmark"></a></h1> <div class="entry-meta"> <span class="posted-on"><a href="https://journalijcsa.wordpress.com/2017/07/13/732/" rel="bookmark"><time class="entry-date published" datetime="2017-07-13T05:49:40+00:00">July 13, 2017</time><time class="updated" datetime="2017-07-13T06:36:25+00:00">July 13, 2017</time></a></span> <span class="byline"><span class="author vcard"><a class="url fn n" href="https://journalijcsa.wordpress.com/author/journalijcsa/">journalijcsa</a></span></span> </div><!-- .entry-meta --> </header><!-- .entry-header --> <div class="entry-content"> <p style="text-align:center;">DATA ANALYSIS AND PHASE DETECTION DURING NATURAL DISASTER BASED ON SOCIAL DATA</p> <p style="text-align:center;">Mohammad Rezwanul Huq, Abdullah-Al-Mosharraf and Khadiza Rahman</p> <p style="text-align:center;">Department of Computer Science and Engineering</p> <p style="text-align:center;">East West University, Dhaka, Bangladesh</p> <h4 style="text-align:justify;"><span style="color:#008000;">ABSTRACT</span></h4> <p style="text-align:justify;">Social media becomes a communicating channel during a natural disaster for detecting disaster events because people share their opinions, feelings, activity during the disaster through the Twitter. Twitter is not simply a platform for broadcasting information, but one of informational interaction. So, we use this platform for mining various disaster relevant tweets during a natural disaster. We examine more than 4,500 tweets during crisis moment. In this paper, we propose a classifier for classifying the disaster phases using social data and identify these types of phases. We use KNN, a machine learning classification algorithm for classifying the disaster relevant tweets. By knowing different phases of a disaster, response teams can detect where disaster will happen; the medical enterprise can be prepared to mitigate the damage after disaster and neighborhood area may also be alert to face the disaster. We classify the disaster-related tweets into three phases that are: pre (preparedness before the disaster event), on (during disaster event), post (impact and recovery after the disaster).We also take the geolocation with latitude and longitude of the disaster event for visualizing it using an earth map which can be useful to emergency response teams and also increase social awareness of the disaster.</p> <h4><span style="color:#008000;">KEYWORDS</span></h4> <p style="text-align:justify;">Social Media, Natural Disaster, Phase Detection, Machine Learning, Geolocation, Awareness</p> <h4><span style="color:#008000;">1.INTRODUCTION</span></h4> <p style="text-align:justify;">Social data now has become the popular media for extracting valuable information and a source that may contribute to situational awareness [23]. During the natural calamities people share their experience using tweet, and by seeing this tweet, we can understand that disaster is occurring in a particular area. Whenever Twitter users say rain is occurring or cyclone is acting to this area, by collecting this type of tweet we can detect in which area the natural disaster is occurring. Many researchers examined the disaster-related tweet for the sake of people and relied on a four-phase categorization (preparedness, response, impact, recovery) to mitigate their sufferings [2, 7]. So we  think social network Twitter can be an excellent source for collecting twitter data during a natural disaster. We try to collect disaster relevant data from the Twitter and in previous studies focus on relevant data in disaster phases and extracted relevant tweets into many categories [25]. So the relevant tweet is extracted based on disaster keyword. Our main challenge is building a classifier for different phases and to classify the disaster relevant tweet and to identify various phases during a natural disaster. In this paper, we build a model for classifying the Twitter into three phases (pre, on, post). Moreover, we also show the geographical map of the affected are by visualizing and pointing out that type of different phases [19]. The main objective of our work is to help and inform the Medicine Company, people, and disaster response team about the impact of the catastrophe and to alert them. As we pointed out these phases on the Earth map, the response team can easily understand where and when this disaster is happening by seeing the map, and they can take immediate actions.</p> <h4><span style="color:#008000;">1.1. Tweets reflect phases during natural disaster</span></h4> <p style="text-align:justify;">Twitter users tweet before the disaster for making awareness and during the natural disaster they tweet about the condition of nature, and after the disaster has occurred, they tweet for remediation. Here many types of tweet we find. Certain kinds of the tweets are like “be prepared for the Cyclone Debbie,” “Cyclone Debbie is coming,” and by seeing this kind of tweet, we can say it is a pre-status tweet. During a disaster event, some tweets are like, “it is raining” or “cyclone is occurring, ” and from these tweets, we can say that this place is current disaster zone area. After the disaster, people share their sufferings, impacts and damages happened by the disaster, and the tweets are like “food”, “help”, “injured”, “death”. By seeing these kinds of the tweet, we can say that for remediation food, fund or any kinds of help is needed in that area for the mitigation of damage. Besides tweet also reflect the geographical status of the disaster affected area, and by collecting this location with the GPS, we also pointed out these three phases on an earth map which will help to make situational awareness.</p> <h4><span style="color:#008000;">1.2. Motivation</span></h4> <p style="text-align:justify;">Our main challenge is identifying different phases of the natural disaster using social data. For this reason, we try to classify the disaster relevant data into some phases. This classification provides a framework to predict the pre-status before the disaster event, the on-status during a disaster and the post-status after the disaster has occurred. We select social data for our work because there could be many informative tweets can be found from them. For understanding the disaster event, we classify the disaster data into three phases which are pre (preparedness, public alert, and awareness), on-time (during the disaster event), and post (impact, damage, remediation, recovery). By detecting pre-phase, emergency response team can say that this area is in the disaster zone. So they can make awareness among the people that a catastrophe is coming, so to get prepared. Doctor, nurse and medical enterprise may get ready for curing the affected people. They also make awareness between the neighborhood areas because there is a high probability of a disaster occurring in that area. Thus awareness can be performed before the disaster takes place and that is on the pre-status phase. When a disaster is happening in a particular area, people become rushed to fight against the disaster, and during a disaster event, electricity loss happens in most of the cases, and internet connection may cut down. So, during a disaster, only a few tweets can be found. Most of the time this type of tweet is about the impact of the weather or nature during the disaster, and that is in the on-time-status phase. By detecting the post-status phase, response team can know about the damage caused by the disaster and take quick action to recover the damage. Remediation is needed to help the affected disaster zone after the disaster has occurred. By detecting the post phase emergency, the concerned people should be transferred to the medical center and take immediate medical care and proper medicine to cure them. Besides by seeing the geographical map of that type of phases, people can get alerted, and response team can create a situational awareness.</p> <h4><span style="color:#008000;">1.3. Research Questions</span></h4> <p>We have carefully considered the following research issues to accomplish our goal. In fact, the answer to these questions contains the core concept behind our work.</p> <h4><span style="color:#008000;">1.3.1. Why do we select a keyword from Twitter?</span></h4> <p style="text-align:justify;">During a disaster event, many tweets can be tracked from the Twitter. We use this social media for tracking disaster relevant data, and this data is needed for classifying into three phases which we were determined in our work. Besides tracking public data is very easy. Without extracting this disaster data, we could not be able to train our algorithm, and therefore we use Twitter data</p> <h4 style="text-align:justify;"><span style="color:#008000;">1.3.2. Why do we need classifying disaster phases?</span></h4> <p style="text-align:justify;">We need a classifier for classifying the disaster data into three classes and detecting each class of a tweet that it is in a particular phase. We can detect the phases by comparing the training data with the test data. So classifying disaster phases is needed for detecting disaster phases of a tweet</p> <h4><span style="color:#008000;">1.3.3. Why do we assign the weight of a tweet?</span></h4> <p style="text-align:justify;">There may have some extra word in the keyword from which we cannot understand that what type of tweet is it. So basically ignoring the last letter of a word we match every word of a tweet with the relevant keyword which we manually extracted. Based on the matching keyword we assign a weight of a tweet. For declaring the phases of a tweet weight is needed.</p> <h4><span style="color:#008000;">1.3.4. Why do we use KNN algorithm?</span></h4> <p style="text-align:justify;">KNN algorithm is easy to understand and easy to implement. This classification algorithm helps to predict the data with better accuracy. So we use this algorithm so that our result can be much better. As this method contributes to predict data, we compare this predicted data with our actual data and can measure whether our result is right or wrong.</p> <h4><span style="color:#008000;">1.4. Overview of the Proposed Solution</span></h4> <p style="text-align:justify;">Our main goal is detecting disaster phases during a natural disaster. So we trained a classification algorithm for classifying disaster data into three phases that are pre-status (before the disaster), on-time-status (during a disaster) and post-status (after a disaster has occurred). So to fulfill our aim, first of all, we extract data from social media based on hashtag using Twitter 4j API. We also extract data using time-boundary and the bounding box (collecting data with latitude and longitude).As there were many noisy data, so we clean the data using C++ programming based on the disaster hashtags. For the data cleaning process, we match a tweet word with a relevant keyword (manually extracted) and if any word matches then it was considered as a relevant data otherwise noisy data. For keyword matching, we check and compare the tweet word and related keyword in three steps (matching the tweet word with relevant keyword directly,  matching the tweet word with keyword considering the last letter of a word as a relevant keyword, also consider the increasing length of 1 of a word as relevant).According to this process, we assign a weight of a tweet. We also normalize the time into minutes based on the posting time of a file.</p> <p style="text-align:justify;">We use KNN algorithm to classify this relevant data into three phases using four descriptive features (pre-status weight, on-status weight, post-status weight, time in minutes) and test features as like 1,0,0 (indicates pre-status high); 0,1,0 (on-status high); 0,0,1 (post-status high); 1,1,0 (prestatus and on-status both are same and high); In this case confusion occur because we cannot detect the phases. We split the file of data into training data and test data according to 2:1 ratio that means the training data is 0.67 (67%) and the test data is 0.33 (33%). Then we trained our algorithm by calculating the Euclidian distance between each test data with all of the training data and take the nearest distances 5 data as the value of K we assign 5 and take the majority voted data from it. From that majority voted data we can predict the disaster phases.</p> <p style="text-align:justify;">We extract disaster relevant data manually and compare the actual data with the predicted data which we get after classifying and show how accurate our result is. Then we get the accuracy of our result based on the correct prediction. We also visualize and demonstrate the percentage of three phases using a pie-chart and graphically represent the data with the posted time in minutes using axis-chart. After that, we create a map using the latitude and longitude of the affected area. In an earth map, we try to point out the particular area under each disaster phase.</p> <p style="text-align:justify;">After completing this classification step, we evaluate our result by calculating the precision, recall, F1-measure of each phase and the overall accuracy of our paper.</p> <h4><span style="color:#008000;">2. BACKGROUND</span></h4> <p style="text-align:justify;">We extract social data using Twitter 4j API and assign a weight of a status. For calculating the weight we need max time and min time of tweets (in minutes) which is in the file, also need a ratio which we identified using a ternary search [14, 21]. We classify the disaster data into three phases. For classifying disaster phases, we use a machine learning algorithm that is KNN to predict the different phases and also use confusion matrix for calculating the accuracy of our experiment. Then we use matplotlib library for visualizing our work and create pie-chart, axischart, and Earth-map.</p> <h4><span style="color:#008000;">2.1. Twitter 4j API</span></h4> <p style="text-align:justify;">Twitter4J is a Java library for the Twitter API [12]. With Twitter4J, we can easily use our Java application with the Twitter service. The Twitter Platform connects our website or application with the global conversation happening on Twitter. To get the recent tweets based on hashtags, we can use streaming API through which we can extract the data.</p> <h4><span style="color:#008000;">2.2. Ternary Search</span></h4> <p style="text-align:justify;">For finding a maximum or minimum point in U-shape graph, the ternary search is the best choice. A ternary search [14, 21] is an example of a divide and conquer algorithm. A ternary search determines either that the minimum or maximum cannot be in the first third of the domain or that it cannot be in the last third of the domain, then repeats on the remaining two-thirds.</p> <h4><span style="color:#008000;">2.3. K-nearest Neighbor (KNN)</span></h4> <p style="text-align:justify;">A K-nearest neighbor is a machine learning classification algorithm [8]. It is a similarity base learning. Whenever we have a new point to classify, we find its K-nearest neighbor from the training data and the new point is assigned from the majority of classes. The distance is calculated by using the following measures: Euclidean, Minkowski, Manhattan. In classification problems, KNN is most commonly used. The main drawback of KNN is the complexity in searching the nearest neighbor for each sample. We implement this algorithm in Python [20].</p> <h4><span style="color:#008000;">2.4. Matplotlib</span></h4> <p style="text-align:justify;">Matplotlib [13] is a plotting library for the Python programming language and its numerical mathematics extension NumPy. It provides an object-oriented API for embedding plots into applications using general-purpose GUI toolkits. Pyplot is a matplotlib module which provides an MATLAB-like interface. Matplotlib is designed to be as usable as MATLAB, with the ability to use Python, with the advantage that it is free. We also use multiple maps using subplots [19].</p> <h4><span style="color:#008000;">2.5. Confusion matrix</span></h4> <p style="text-align:justify;">Confusion matrix contains information about actual and predicted classifications done by a classification system and describes the performance of a classifier model [9]. For evaluating the performance [18] of such systems, we have to use the data in the matrix.</p> <h4><span style="color:#008000;">3. RELATED WORK</span></h4> <p style="text-align:justify;">Many researchers provide disaster-related information during a natural disaster using social data. Ashktorab et al. [1] introduce tweedr, a twitter-mining tool, which extracts actionable information during a natural disaster for helping disaster responder team. The tweedr pipeline consists of three main parts: classification, clustering, and extraction. Some researchers also make an automatic method for extracting information nuggets [3] so that they can help professional emergency responders and the Twitter data has been categorized into different features such as Caution, Advice, Fatality, Injury, Offers of Help, Missing and General Population Information. Recently it has been found that for helping emergency responders to act quickly for disaster response and disaster relief, actionable data can be extracted from social media. Here [4] a tweet tracker tool has been proposed. During disaster, by tracking and monitoring disaster-related twitter data researchers help Humanitarian Aid and Disaster Relief (HADR) respondents for gaining valuable insights and situational awareness in the affected area</p> <p style="text-align:justify;">Many studies have applied to work with geographic locations of tweets of the disaster event to help the emergency response team to make situational awareness. Social media messages have been separated into four categories (preparedness, response, impact, and recovery) [2] to understand the disaster event, and this framework has been done with the relevant tweet to take action quickly and efficiently in the impacted communities. Other researchers also describe the use of disaster phases (mitigation, preparedness, emergency response, and recovery) [7] which has assisted both disaster researchers and managers. In this paper, it has been suggested that the use of disaster phases can improve the theoretical and applied dimension of the field during disaster periods and also mentioned that disaster researchers have used disaster phases to organize significant findings and recommendations about disasters.</p> <p style="text-align:justify;">Big Data can help in all four phases of disaster management [22]. However, significant big data research challenges arise because of disaster management requirements for quality of service (e.g., highly available real-time response) and quality of information (e.g., reliable communications on resource availability for the victim). Besides, social data is a source of extracting valuable information to make situational awareness [23]. The goal of this paper is to identify and measure features that could support technology in analyzing mass emergency situations. The contribution of this article is considering “situational update” information that is communicated by people through micro blogging in mass emergency situations.</p> <p style="text-align:justify;">It has been described that annotating social media data with geographic coordinate is more valuable for quickly finding out the area under the victim [5]. Twitter user locations are being estimated by propagating the locations of GPS-known users across a Twitter social network. A method has been invented to locate the overwhelming majority of active Twitter users by examining their locations. The algorithm assigns a location to a user based on the locations of their friends by calculating the min, median and max distance between their friends. Moreover, the automatic geolocation of social media messages is beneficial [10]. They analyze that since different people, in different locations write messages at different times; these factors can significantly vary the performance of a geo-location system over time.</p> <p style="text-align:justify;">In this paper, they consider the task of tweet geo-location, where a system identifies the location where a single tweet was written. Here [11] it has been investigated and improved on the task of text-based geo-location prediction of Twitter users. They present an integrated geo-location prediction framework and investigate what factors impact on prediction accuracy. Here they evaluate the impact of temporal variance on model generalization and discuss how users differ regarding their geo-locatability.</p> <p style="text-align:justify;">The contributions of this paper [6] are to introduce AIDR (Artificial Intelligence for Disaster Response), a platform designed to perform automatic classification of crisis-related social data. The objective of AIDR is to classify messages that people post during disasters into a set of userdefined categories of information (e.g., “needs”, “damage”) For this purpose, the system continuously ingests data from Twitter, processes it (i.e., using machine learning classification techniques). Imran et al. [25], extracted tweets into several categories, caution and advice, casualty and damage, donation and offer, and information source during a natural disaster. A platform AIDR is also described here, which collects human annotations over time to create and maintain automatic supervised classifiers for social media messages.</p> <p style="text-align:justify;">The contribution of this paper [15] is that conducting a systematic comparative analysis of nine state-of-the-art network-based methods for performing geolocation inference at the global scale. The analysis identifies a significant performance disparity between that reported in the literature and that seen in real-world conditions. All implementations have been released in an open source geo-inference package to aid reproducibility and future comparison.</p> <p style="text-align:justify;">Lie et al. [16] declare that Twitter data contains valuable information that has the potential to help improve the speed, quality, and efficiency of disaster response. However, supervised learning algorithms require labeled data to learn accurate classifiers. Experimental results suggest that, for some tasks, source data itself can be useful for classifying target data. However, for tasks specific to a particular disaster, domain adaptation approaches that use target unlabeled data in addition to source labeled data are superior.</p> <p style="text-align:justify;">This paper [17] presents a CyberGIS framework that can automatically synthesize multi-sourced data, such as social media and socioeconomic data, to track disaster events, to produce maps, and to perform statistical analysis for disaster management. In this framework, Apache Hive, Hadoop, and Mahout are used as scalable distributed storage, computing environment, and machine learning library to store, process and mine massive social media data. Several attempts have taken to illustrate volunteered geographical data (VGI) [24]. Volunteered data obtained through Google news, videos and photos are added to modify the contour regions. A new methodology for the generation of flood hazard maps is presented using remote sensing and volunteered geographical data.</p> <h4><span style="color:#008000;">4. PROPOSED SOLUTION</span></h4> <p>Our solution consists of several computational steps. Figure 1 shows the flow chart of the<br /> proposed solution. In this section, we describe each computational step in detail.</p> <h4><span style="color:#008000;">4.1. Collecting Data</span></h4> <p style="text-align:justify;">We collect tweet from Twitter using Twitter4j API in JAVA based on hashtags. Using those hashtags, we collect randomly 4,500 tweets without any bounding-box and no timebound.</p> <h4><span style="color:#008000;">4.2. Keyword Selection</span></h4> <p style="text-align:justify;">From 4500 tweets, we select a total number of 65 keywords and classify them into three different phases &#8211; Pre-Status, On-time-Status, and Post-Status. Table 1 shows these keywords. Sometimes some keywords are classified under one phase, but due to the presence of another word, the actual meaning of the tweet could be divided into a different phase. As for example, consider tweets &#8211; “Response teams are coming” and “response teams are working”. Here the former belongs to “Pre-Status” and the latter belongs to “Post-Status”. Therefore, we keep another checking to solve this type of problem. Table 2 shows the list of this type of keywords.<img data-attachment-id="712" data-permalink="https://journalijcsa.wordpress.com/?attachment_id=712#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture.png" data-orig-size="488,521" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture.png?w=281" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture.png?w=488" loading="lazy" class=" size-full wp-image-712 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture.png" alt="Capture" width="488" height="521" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture.png 488w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture.png?w=140&amp;h=150 140w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture.png?w=281&amp;h=300 281w" sizes="(max-width: 488px) 100vw, 488px" /></p> <p><img data-attachment-id="715" data-permalink="https://journalijcsa.wordpress.com/?attachment_id=715#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture1.png" data-orig-size="597,323" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture1.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture1.png?w=597" loading="lazy" class=" size-full wp-image-715 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture1.png" alt="Capture" width="597" height="323" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture1.png 597w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture1.png?w=150&amp;h=81 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture1.png?w=300&amp;h=162 300w" sizes="(max-width: 597px) 100vw, 597px" /></p> <p><img data-attachment-id="718" data-permalink="https://journalijcsa.wordpress.com/?attachment_id=718#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture2.png" data-orig-size="482,342" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture2.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture2.png?w=482" loading="lazy" class=" size-full wp-image-718 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture2.png" alt="Capture" width="482" height="342" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture2.png 482w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture2.png?w=150&amp;h=106 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture2.png?w=300&amp;h=213 300w" sizes="(max-width: 482px) 100vw, 482px" /></p> <h4><span style="color:#008000;">4.3. Assigning Weight of a Tweet</span></h4> <p>We formulate an equation to assign a weight of a tweet. The equation is:</p> <p><img data-attachment-id="722" data-permalink="https://journalijcsa.wordpress.com/?attachment_id=722#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture3.png" data-orig-size="591,34" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture3.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture3.png?w=591" loading="lazy" class="alignnone size-full wp-image-722" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture3.png" alt="Capture" width="591" height="34" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture3.png 591w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture3.png?w=150&amp;h=9 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture3.png?w=300&amp;h=17 300w" sizes="(max-width: 591px) 100vw, 591px" /></p> <p>In Eq. 1, time is measured in minutes. Number of matches is the number of keyword matches  with the words of a tweet. We consider three rules for counting matches.</p> <p>i. Directly and equally the keyword and a word of a tweet is matched.<br /> Example: (“rain”[Keyword] and “rain”[A word of tweet]).</p> <p>ii. If there is any last letter like „.‟(dot), „,‟(comma), „?‟(interrogation symbol and<br /> „!‟(Exclamatory symbol) then we ignore it and check without it, Example:<br /> (“rain”[Keyword] and “rain.”[A word of tweet]).</p> <p>iii. If a keyword matches completely but the word_of_tweet_length &#8211; Keyword_length = 1<br /> then we accept that as a match. (“wind”[Keyword] and “winds”[A word of a tweet]).<br /> The ratio is found by using ternary search. Lower bound and upper bound of ternary search is 0.0 and 1.0. The actual value is calculated by taking the average accuracy of five random iterations of each ratio point. Figure 2 shows the justification of taking ratio = 0.75.</p> <h4><span style="color:#008000;">4.4. Providing the Ground Value</span></h4> <p>We provide the ground value of all tweets manually by reading all cleaned tweets and determine their original value.</p> <p><img data-attachment-id="728" data-permalink="https://journalijcsa.wordpress.com/?attachment_id=728#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture4.png" data-orig-size="492,158" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture4.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture4.png?w=492" loading="lazy" class="alignnone size-full wp-image-728 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture4.png" alt="Capture" width="492" height="158" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture4.png 492w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture4.png?w=150&amp;h=48 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture4.png?w=300&amp;h=96 300w" sizes="(max-width: 492px) 100vw, 492px" /></p> <h4 style="text-align:justify;"><span style="color:#008000;">4.5. Predicting Phase of the Tweet</span></h4> <p style="text-align:justify;">Now we use KNN [K=5] to predict the phase of a tweet. 67% data are using as a training set and 33% used as a test set of a data file. There are four characteristic features in the dataset (e.g. PreStatus, On-time-Status, Post-Status, Time) and three target features (Pre-Status, On-time-Status, Post-Status). As an example, the weight of the Pre-status is higher than the other two target features the value of 3 target features would be [1, 0, 0].</p> <p style="text-align:justify;">Now program selects five nearest training dataset by using Euclidian distance. The three phases point is counted from the target features of these 5 data and returns the phase which gets the maximum number of point and predicts that as the phase of that tweet Now we compare the predicted value with the actual ground value. We build a confusion matrix based on the average of 5 iterations.</p> <p style="text-align:justify;">We take the last 10% data whose predicted value and the actual value is equal. Afterward, we count which phase occurs most from these tweets and then select that phase.</p> <h4 style="text-align:justify;"><span style="color:#008000;">4.6. Demonstration of the Proposed Solution</span></h4> <p style="text-align:justify;">In Queensland, Australia recently a Cyclone named Debbie has occurred. This disaster hits the Queensland in the evening of 28th March 2017. We collect tweets in three steps based on two hashtags (e.g. #Cyconedebbie, #disaster). Table 3 shows the overview of this data collection.</p> <p><img data-attachment-id="768" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-6/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture5.png" data-orig-size="589,145" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture5.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture5.png?w=589" loading="lazy" class="alignnone size-full wp-image-768 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture5.png" alt="Capture.PNG" width="589" height="145" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture5.png 589w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture5.png?w=150&amp;h=37 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture5.png?w=300&amp;h=74 300w" sizes="(max-width: 589px) 100vw, 589px" /></p> <p style="text-align:justify;">There are 4 files of dataset, file1 has step-1 data (pre-status), file2 has step-2 data (on-timestatus), file3 has step-3 data (post-status) and file4 has all data (three-status).</p> <p style="text-align:justify;">Then we give the actual value of all these tweets manually trained the KNN algorithm to predict the phase of these data.</p> <h4> <span style="color:#008000;">4.6.1. Visualization of file1</span></h4> <p style="text-align:justify;">In Figure 3, we visually represent the percentage of the actual value and the predicted value of phase1 using a pie chart. From here we can see that in pre-status phase the percentage of data is 85.11 (actual) and 77.08 (predicted), in on-status phase the percentage are 14.89 (actual) and 22.92 (predicted), whereas in post-status phase there is 0.00% data in both cases. As in pre-status phase in both actual and predicted the percentage is higher than another two phases so we can say that this chart indicates that this data is under pre-status phase. When we collect data from cyclone-Debbie there, we see that whenever people tweet for the awareness before the cyclone in that time cyclone has been beginning and so during the pre-status phase, people were posting an<br /> on-status tweet. So we get tweets in on-time-status.</p> <p><img data-attachment-id="769" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-7/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6.png" data-orig-size="604,281" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6.png?w=604" loading="lazy" class="alignnone size-full wp-image-769" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6.png" alt="Capture.PNG" width="604" height="281" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6.png 604w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6.png?w=150&amp;h=70 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6.png?w=300&amp;h=140 300w" sizes="(max-width: 604px) 100vw, 604px" /></p> <p><img data-attachment-id="770" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-8/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6-1.png" data-orig-size="577,300" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6-1.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6-1.png?w=577" loading="lazy" class="alignnone size-full wp-image-770" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6-1.png" alt="Capture.PNG" width="577" height="300" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6-1.png 577w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6-1.png?w=150&amp;h=78 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture6-1.png?w=300&amp;h=156 300w" sizes="(max-width: 577px) 100vw, 577px" /></p> <p style="text-align:justify;">In Figure 4, the actual data and predicted data of phase1 are graphically represented using axis diagram. Here we visualize three phases using three colors (green for pre, red for on, yellow for the post). In this figure, the x-axis represents the Time in minutes, and the y-axis is the Number of Tweets. The circled point indicates the data of each phase including time represented by the color. By comparing and observing the actual and predicted data we can understand that in pre-status phase there are many data and in on-status phase, there are little bit data and here is no yellow data so post-status phase is empty. By observing the data, we can understand that this is pre-status data because the number of tweets is higher in pre-status phase in both cases.</p> <p style="text-align:justify;">Figure 5 shows two tiny green stars pointing out the affected area [both for actual and predicted data]. As a green star represents as Pre-Status, we can say that this is under Pre-Status phase. By seeing the visualization of file1, we can observe that our solution declares step1 (26th -27th , March 2017) was the Pre-Status phase.</p> <p><img data-attachment-id="771" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-9/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture7.png" data-orig-size="570,261" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture7.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture7.png?w=570" loading="lazy" class="alignnone size-full wp-image-771 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture7.png" alt="Capture.PNG" width="570" height="261" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture7.png 570w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture7.png?w=150&amp;h=69 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture7.png?w=300&amp;h=137 300w" sizes="(max-width: 570px) 100vw, 570px" /></p> <h4><span style="color:#008000;">4.6.2. Visualization of file2</span></h4> <p style="text-align:justify;">Figure 6 describes the visual representation of the actual and predicted value of phase2 using piechart. By comparing figures of actual and predicted values, we can see that the percentage of data in pre-status phase is 9.38 (actual) and 9.09) (predicted), in on-status phase percentage is 56.25(actual) 57.58 (predicted), whereas in post-status phase it is 34.38 (actual) 33.33 (predicted). We could say that in on-status phase the percentage is higher than the two. So we could say that we correctly predict that this is in on-status phase because actual and predicted value is almost same.</p> <p><img data-attachment-id="772" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-10/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture8.png" data-orig-size="593,263" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture8.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture8.png?w=593" loading="lazy" class="alignnone size-full wp-image-772" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture8.png" alt="Capture.PNG" width="593" height="263" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture8.png 593w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture8.png?w=150&amp;h=67 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture8.png?w=300&amp;h=133 300w" sizes="(max-width: 593px) 100vw, 593px" /></p> <p style="text-align:justify;">In Figure 7, the actual and predicted data of phase2 is graphically represented using axis diagram. Here we visualize three phases. By comparing the actual and predicted value, we can understand that in on-status phase there is a higher data than the two. By observing the data, we can understand that this is in on-status phase though there are post-status data because of the flooding during the cyclone.</p> <p style="text-align:justify;">From Figure 8 we can see that a tiny red circle is pointing out the affected area. As a red circle represents as On-time-Status, we can say that this is under On-time-Status phase. By seeing the visualization of file2, we can observe that our solution declares step2 (28th<br /> -29th , March 2017) was the On-Time-Status phase.</p> <p><img data-attachment-id="773" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-11/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture9.png" data-orig-size="583,506" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture9.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture9.png?w=583" loading="lazy" class=" size-full wp-image-773 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture9.png" alt="Capture.PNG" width="583" height="506" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture9.png 583w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture9.png?w=150&amp;h=130 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture9.png?w=300&amp;h=260 300w" sizes="(max-width: 583px) 100vw, 583px" /></p> <h4><span style="color:#008000;">4.6.3. Visualization of file3</span></h4> <p><img data-attachment-id="774" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-12/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture10.png" data-orig-size="582,267" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture10.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture10.png?w=582" loading="lazy" class=" size-full wp-image-774 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture10.png" alt="Capture" width="582" height="267" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture10.png 582w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture10.png?w=150&amp;h=69 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture10.png?w=300&amp;h=138 300w" sizes="(max-width: 582px) 100vw, 582px" /></p> <p style="text-align:justify;">From this figure (Figure 9) of actual and predicted value by comparing the percentage of three statuses we see that the percentage of pre-status and the on-status phase is same (10.17) for both cases and in post-status phase, 79.66 (actual and predicted). As the percentage of post-status</p> <p style="text-align:justify;">phase is higher than another two phases so we can say that this chart indicates that this data is under post-status phase. A little bit of pre-status and on-status phases also here.</p> <p><img data-attachment-id="775" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-13/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture11.png" data-orig-size="567,206" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture11.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture11.png?w=567" loading="lazy" class="alignnone size-full wp-image-775" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture11.png" alt="Capture.PNG" width="567" height="206" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture11.png 567w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture11.png?w=150&amp;h=54 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture11.png?w=300&amp;h=109 300w" sizes="(max-width: 567px) 100vw, 567px" /></p> <p style="text-align:justify;">The actual and predicted data of phase3 is graphically represented using axis diagram. From this chart, we can see that yellow circle point indicates the higher data than the red and green data. As the yellow color represents the post-status phase, so by observing the data, we can understand that this is in post-status phase. So we can predict well that this is post-status data.</p> <p><img data-attachment-id="776" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-14/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture12.png" data-orig-size="576,251" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture12.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture12.png?w=576" loading="lazy" class="alignnone size-full wp-image-776 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture12.png" alt="Capture.PNG" width="576" height="251" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture12.png 576w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture12.png?w=150&amp;h=65 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture12.png?w=300&amp;h=131 300w" sizes="(max-width: 576px) 100vw, 576px" /></p> <p style="text-align:justify;">From this figure (Figure 11), we can see that two tiny red circles &amp; two yellow triangles pointing out the affected area. As red circle represents as On-time-Status, and yellow triangle represent Post-Status. So we can say that this is under On-time-Status and Post-Status phase.</p> <p>By seeing the visualization of file3, we can observe that our solution declares step3 (30th -31th , March 2017) was the Post-Status phase.</p> <h4><span style="color:#008000;">5. EXPERIMENTAL RESULTS AND PERFORMANCE EVALUATION</span></h4> <p>Here we calculate some comparison results in all three file using confusion matrix and find Precision, Recall and F1-measure from 5 random iterations of those files.</p> <h4><span style="color:#008000;">5.1. Confusion Matrix of file1</span></h4> <p style="text-align:justify;">In this confusion matrix as shown in Table 4, from the 48.2 actual pre-status tweets, the program can predict that 43 were pre-status tweets and 5.2 were on-status tweets, and from the actual 4.4 on-status tweets, the program can predict 4.4 on-status tweets correctly and here is no post-status tweets. The accuracy of file1 we get is 90.11%.</p> <p><img data-attachment-id="777" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-15/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture13.png" data-orig-size="599,154" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture13.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture13.png?w=599" loading="lazy" class=" size-full wp-image-777 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture13.png" alt="Capture.PNG" width="599" height="154" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture13.png 599w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture13.png?w=150&amp;h=39 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture13.png?w=300&amp;h=77 300w" sizes="(max-width: 599px) 100vw, 599px" /></p> <h4><span style="color:#008000;">5.2. Confusion Matrix of file2</span></h4> <p style="text-align:justify;">In this confusion matrix as depicted in Table 5, from the 15.6 actual on-time-status tweets, the program can predict that 14.8 were on-time-status tweets, 0.6 were pre-status phases, and 0.2 were post-status tweets, and from the actual 6.8 post-status tweets, the system can predict 6.2 post-status tweets. The accuracy of file2 we get is 95.70%.</p> <p><img data-attachment-id="778" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-16/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture14.png" data-orig-size="580,150" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture14.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture14.png?w=580" loading="lazy" class="alignnone size-full wp-image-778 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture14.png" alt="Capture.PNG" width="580" height="150" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture14.png 580w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture14.png?w=150&amp;h=39 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture14.png?w=300&amp;h=78 300w" sizes="(max-width: 580px) 100vw, 580px" /></p> <h4><span style="color:#008000;">5.3. Confusion Matrix of file3</span></h4> <p style="text-align:justify;">In this confusion matrix (see Table 6), from the 57.4 actual post-status tweets, the system can predict that 49.2 were post-status tweets, 5.4 were pre-status tweets, and 2.8 were on-time-status tweets, and from the actual 0.8 post-status tweets, the system can predict 0.8 post-status tweets. The accuracy of file 3 is 85.90%.</p> <p><img data-attachment-id="779" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-17/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture15.png" data-orig-size="585,136" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture15.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture15.png?w=585" loading="lazy" class="alignnone size-full wp-image-779 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture15.png" alt="Capture.PNG" width="585" height="136" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture15.png 585w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture15.png?w=150&amp;h=35 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture15.png?w=300&amp;h=70 300w" sizes="(max-width: 585px) 100vw, 585px" /></p> <h4><span style="color:#008000;">5.4. Performance Evaluation using Precision, Recall and F1-measure </span></h4> <h4><img data-attachment-id="780" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-18/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture16.png" data-orig-size="585,190" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture16.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture16.png?w=585" loading="lazy" class="alignnone size-full wp-image-780" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture16.png" alt="Capture.PNG" width="585" height="190" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture16.png 585w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture16.png?w=150&amp;h=49 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture16.png?w=300&amp;h=97 300w" sizes="(max-width: 585px) 100vw, 585px" /></h4> <p style="text-align:justify;">Figure 12 shows precision, recall, and F1-measure of tweets of file 1. We get precision (1.000), recall (0.892) and F1-measure (0.942) of pre-status tweets. In on-status it is, precision (0.458), recall (1.000) and F1-measure (0.682). Similarly, for post-status,</p> <p><img data-attachment-id="781" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-19/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture17.png" data-orig-size="581,179" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture17.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture17.png?w=581" loading="lazy" class="alignnone size-full wp-image-781 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture17.png" alt="Capture.PNG" width="581" height="179" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture17.png 581w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture17.png?w=150&amp;h=46 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture17.png?w=300&amp;h=92 300w" sizes="(max-width: 581px) 100vw, 581px" /></p> <p style="text-align:justify;">In Figure 13, we get precision (0.692), recall (1.000) and F1-measure (0.817) of pre-status tweets. In on-status, precision (1.000), recall (0.949) and F1-measure (0.973). In post-status, precision, recall, and F1-measure value are same (0.968). This measurement indicates that this is on-timestatus.</p> <p><img data-attachment-id="782" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-20/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture18.png" data-orig-size="578,191" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture18.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture18.png?w=578" loading="lazy" class="alignnone size-full wp-image-782 aligncenter" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture18.png" alt="Capture.PNG" width="578" height="191" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture18.png 578w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture18.png?w=150&amp;h=50 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture18.png?w=300&amp;h=99 300w" sizes="(max-width: 578px) 100vw, 578px" /></p> <p style="text-align:justify;">The result of file3 is shown in Figure 14. We get no precision, recall, and F1-measure is<br /> ambiguous of pre-status tweets. In on-status, precision (0.222), recall (1.000) and F1-measure (0.360). In post-status, precision (1.000), recall (0.857) and F1-measure (0.922). From this measurement, we can say that this is post-status tweets.</p> <h4><span style="color:#008000;">6. CONCLUSION AND FUTURE WORK</span></h4> <p style="text-align:justify;">Twitter is a popular social media, and during natural disaster or any other crisis moment this source is beneficial for tracking the disaster data to alert people or helps the affected people. In our work, we track this twitter data with latitude and longitude using text mining technique during a disaster, Cyclone Debbie in Queensland, Australia (26 March to 31 March 2017, three steps). A machine learning classifier technique is introduced here to categorize these messages. Our aim was to measure and classify these tweets into three phases (pre, on, post) and detect the phases. We also visualize the actual and predicted value of each category phases using pie chart and axis chart and seeing this graph we can easily compare the actual data and the predicted data and the percentage of each phase and also visualize our experimental result by showing the earth map and pointing out these three phases on that map. Our result indicates that there is an increasing number of classification accuracy and we calculate this using confusion matrix. We also take the screenshot of the accuracy of each category phases and the all the phases to show our result how accurate it is.</p> <p style="text-align:justify;">In future, the most damaged area of a disaster can be pointing out by using our work so that by seeing the pointed map affected people can get help, food, and donation by the response team. Our paper is also helpful for examining the disaster tweet with their geo-location by mapping. In future, the more risky zone of a disaster can also be finding out so that people can alert and make a recovery plan or leave the dangerous area for reducing the damage. Also, it can be possible to predict the nature and the danger level during a natural disaster. It is also feasible to visualize the live disaster moment in future and will be very helpful for disaster responder. By visualizing the live disaster event, it will be straightforward to find out the area under the disaster event.</p> <h4><span style="color:#008000;">REFERENCES</span></h4> <p style="text-align:justify;">[1] Z. Ashktorab, C. Brown, M. Nandi and A. Culotta, Tweedr: Mining Twitter to inform disaster response. In: Proceedings of the 11th International ISCRAM Conference, USA, 2014.</p> <p style="text-align:justify;">[2] Qunying Huang and Yu Xiao, Geographic Situational Awareness: Mining Tweets for Disaster Preparedness, Emergency Response, Impact, and Recovery. In: ISPRS Int. J. Geo-Information, 2015, 4(3), 1549-1568.</p> <p style="text-align:justify;">[3] P. Meier, C. Castillo, M. Imran, S. M. Elbassuoni, and F. Diaz, Extracting information nuggets from Disaster-related messages in social media. In: 10th International Conference on Information Systems for Crisis Response and Management, 2013.</p> <p style="text-align:justify;">[4] S. Kumar, G. Barbier, M. A. Abbasi, and H. Liu, Tweet Tracker: an analysis tool for humanitarian and disaster relief. In: ICWSM, 2011.</p> <p style="text-align:justify;">[5] Ryan Compton, David Jurgens and David Allen, Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization. In: International Conference on Big Data (BigData), IEEE, 2014, 393-401.</p> <p style="text-align:justify;">[6] M. Imran, S. Elbassuoni, C. Castillo, F. Diaz, and P. Meier, Practical extraction of disaster-relevant information from social media. In: Proceedings of the 22nd international conference on World Wide Web companion, Republic and Canton of Geneva, Switzerland, 2013, 1021-1024.</p> <p style="text-align:justify;">[7] D. M. Neal, Reconsidering the phases of disaster. In: Int. J. Mass Emerg. Disasters, 15, 1997, 239– 264.</p> <p style="text-align:justify;">[8] Siddharth Deo Kar, Lecture Notes on K-nearest Neighbor Algorithm.<br /> <a href="http://www.csee.umbc.edu/~tinoosh/cmpe650/slides/K_Nearest_Neighbor_Algorithm.pdf" rel="nofollow">http://www.csee.umbc.edu/~tinoosh/cmpe650/slides/K_Nearest_Neighbor_Algorithm.pdf</a></p> <p style="text-align:justify;">[9] <a href="http://faculty.smu.edu/tfomby/eco5385_eco6380/lecture/Confusion%20Matrix.pdf" rel="nofollow">http://faculty.smu.edu/tfomby/eco5385_eco6380/lecture/Confusion%20Matrix.pdf</a> (accessed on Feb 02 2017)</p> <p style="text-align:justify;">[10] Mark Dredze, Miles Osborne, and Prabhanjan Kambadur, Geolocation for Twitter: Timing Matters. In: Proceedings of NAACL-HLT, 2016, 1064-1069.</p> <p style="text-align:justify;">[11] Bo Han, Paul Cook and Timothy Baldwin, Text-Based Twitter User Geolocation Prediction. In: Journal of Artificial Intelligence Research, 49, 2014, 451-500.</p> <p style="text-align:justify;">[12] Twitter 4j API: twitter4j.org/en/ (accessed on Jan 11 2017)</p> <p style="text-align:justify;">[13] Matplotlib library: <a href="http://matplotlib.org/index.html" rel="nofollow">http://matplotlib.org/index.html</a> (accessed on Jan 11 2017)</p> <p style="text-align:justify;">[14] Ternary Search: <a href="https://en.wikipedia.org/wiki/Ternary_search" rel="nofollow">https://en.wikipedia.org/wiki/Ternary_search</a> (accessed on Jan 01 2017)</p> <p style="text-align:justify;">[15] D. Jurgens, T. Finnethy, J. McCorriston, Y.T. Xu, D. Ruths, Geolocation Prediction in Twitter Using Social Networks: A Critical Analysis and Review of Current Practice. In: ICWSM, 2015, 188-197.</p> <p style="text-align:justify;">[16] H. Li et al. Twitter Mining for Disaster Response: A Domain Adaptation Approach, In: 12th International Conference on Information Systems for Crisis Response and Management, 2015.</p> <p style="text-align:justify;">[17] Q.Huang et al. DisasterMapper: A CyberGIS framework for disaster management using social media data In: Proceedings of the 4th International ACM SIGSPATIAL Workshop on Analytics for Big Geospatial Data, ACM, 2015, 1-6.</p> <p style="text-align:justify;">[18] S. Visa et al. Confusion Matrix-based Feature Selection, In: MAICS, 2011, 120-127.</p> <p style="text-align:justify;">[19] <a href="http://basemaptutorial.readthedocs.io/en/latest/subplots.html" rel="nofollow">http://basemaptutorial.readthedocs.io/en/latest/subplots.html</a> (accessed on Jan 11 2017)</p> <p style="text-align:justify;">[20] <a href="http://machinelearningmastery.com/tutorial-to-implement-k-nearest-neighbors-in-python-fromscratch/" rel="nofollow">http://machinelearningmastery.com/tutorial-to-implement-k-nearest-neighbors-in-python-fromscratch/</a> (accessed on Jan 13 2017)</p> <p style="text-align:justify;">[21] Ternary search algorithm: <a href="http://codeforces.com/blog/entry/3560" rel="nofollow">http://codeforces.com/blog/entry/3560</a> (accessed on Jan 01 2017)</p> <p style="text-align:justify;">[22] C. Pu, M. Kitsuregawa, Big Data and Disaster Management: A Report from the JST/NSF Joint Workshop. Georgia Institute of Technology, CERCS, 2013.</p> <p style="text-align:justify;">[23] S. Vieweg, A.L. Hughes, K. Starbird, L. Palen, Microblogging during two natural hazards events: What Twitter may contribute to situational awareness. In: Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems, USA, 2010, 10–15.</p> <p style="text-align:justify;">[24] E. Schnebele, G. Cervone, Improving remote sensing flood assessment using volunteered geographical data. In: Nat. Hazards Earth Syst. Sci. 13, 2013, 669–677.</p> <p style="text-align:justify;">[25] M. Imran, S. Elbassuoni, C. Castillo, F. Diaz, P. Meier, Practical extraction of disaster-relevant information from social media. In: Proceedings of the 22nd International Conference on World Wide Web Companion, Brazil, 2013</p> <h4><span style="color:#008000;">Authors</span></h4> <p><img data-attachment-id="783" data-permalink="https://journalijcsa.wordpress.com/2017/07/13/732/capture-21/#main" data-orig-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture19.png" data-orig-size="611,362" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Capture" data-image-description="" data-image-caption="" data-medium-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture19.png?w=300" data-large-file="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture19.png?w=611" loading="lazy" class="alignnone size-full wp-image-783" src="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture19.png" alt="Capture.PNG" width="611" height="362" srcset="https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture19.png 611w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture19.png?w=150&amp;h=89 150w, https://journalijcsa.wordpress.com/wp-content/uploads/2017/07/capture19.png?w=300&amp;h=178 300w" sizes="(max-width: 611px) 100vw, 611px" /></p> </div><!-- .entry-content --> <footer class="entry-meta"> <span class="comments-link"><a href="https://journalijcsa.wordpress.com/2017/07/13/732/#respond">Leave a comment</a></span> </footer><!-- .entry-meta --> </article><!-- #post-## --> </div> </main><!-- #main --> </section><!-- #primary --> <div class="secondary widget-area" role="complementary"> <aside id="search-4" class="widget widget_search"><form role="search" method="get" class="search-form" action="https://journalijcsa.wordpress.com/"> <label> <span class="screen-reader-text">Search for:</span> <input type="search" class="search-field" placeholder="Search &hellip;" value="" name="s"> </label> <input type="submit" class="search-submit" value="Search"> </form> </aside> <aside id="recent-posts-4" class="widget widget_recent_entries"> <h1 class="widget-title">Recent Posts</h1> <ul> <li> <a href="https://journalijcsa.wordpress.com/2023/03/07/international-journal-on-computational-science-applications-ijcsa-2/">International Journal on Computational Science Applications&nbsp;(IJCSA)</a> </li> <li> <a href="https://journalijcsa.wordpress.com/2020/12/01/international-journal-on-computational-science-applications-ijcsa/">International Journal on Computational Science Applications&nbsp;(IJCSA)</a> </li> <li> <a href="https://journalijcsa.wordpress.com/2017/07/13/787/">(no title)</a> </li> <li> <a href="https://journalijcsa.wordpress.com/2017/07/13/732/">(no title)</a> </li> </ul> </aside><aside id="recent-comments-4" class="widget widget_recent_comments"><h1 class="widget-title">Recent Comments</h1></aside><aside id="archives-4" class="widget widget_archive"><h1 class="widget-title">Archives</h1> <ul> <li><a href='https://journalijcsa.wordpress.com/2023/03/'>March 2023</a></li> <li><a href='https://journalijcsa.wordpress.com/2020/12/'>December 2020</a></li> <li><a href='https://journalijcsa.wordpress.com/2017/07/'>July 2017</a></li> </ul> </aside><aside id="categories-4" class="widget widget_categories"><h1 class="widget-title">Categories</h1> <ul> <li class="cat-item cat-item-1"><a href="https://journalijcsa.wordpress.com/category/uncategorized/">Uncategorized</a> </li> </ul> </aside><aside id="meta-4" class="widget widget_meta"><h1 class="widget-title">Meta</h1> <ul> <li><a href="https://wordpress.com/start?ref=wplogin">Register</a></li> <li><a href="https://journalijcsa.wordpress.com/wp-login.php">Log in</a></li> <li><a href="https://journalijcsa.wordpress.com/feed/">Entries feed</a></li> <li><a href="https://journalijcsa.wordpress.com/comments/feed/">Comments feed</a></li> <li><a href="https://wordpress.com/" title="Powered by WordPress, state-of-the-art semantic personal publishing platform.">WordPress.com</a></li> </ul> </aside> <div id="atatags-286348-67421a0f7d24f"></div> <script> __ATA.cmd.push(function() { __ATA.initDynamicSlot({ id: 'atatags-286348-67421a0f7d24f', location: 140, formFactor: '003', label: { text: 'Advertisements', }, creative: { reportAd: { text: 'Report this ad', }, privacySettings: { text: 'Privacy', } } }); }); </script> </div><!-- #secondary --> </div><!-- #content --> <footer id="colophon" class="site-footer" role="contentinfo"> <div class="site-footer-wrapper"> <div class="site-info"> <a href="https://wordpress.com/?ref=footer_blog" rel="nofollow">Blog at WordPress.com.</a> </div><!-- .site-info --> </div><!-- .site-footer-wrapper --> </footer><!-- #colophon --> </div><!-- #page --> <!-- --> <script type="text/javascript" src="//0.gravatar.com/js/hovercards/hovercards.min.js?ver=2024474048849247f5660a2d05b85c6fc286379897f30a1061ad46e7f037e059ed7fe7" id="grofiles-cards-js"></script> <script type="text/javascript" id="wpgroho-js-extra"> /* <![CDATA[ */ var WPGroHo = {"my_hash":""}; /* ]]> */ </script> <script crossorigin='anonymous' type='text/javascript' src='https://s2.wp.com/wp-content/mu-plugins/gravatar-hovercards/wpgroho.js?m=1610363240i'></script> <script> // Initialize and attach hovercards to all gravatars ( function() { function init() { if ( typeof Gravatar === 'undefined' ) { return; } if ( typeof Gravatar.init !== 'function' ) { return; } Gravatar.profile_cb = function ( hash, id ) { WPGroHo.syncProfileData( hash, id ); }; Gravatar.my_hash = WPGroHo.my_hash; Gravatar.init( 'body', '#wp-admin-bar-my-account', { i18n: { 'Edit your profile': 'Edit your profile', 'View profile': 'View profile', 'Sorry, we are unable to load this Gravatar profile.': 'Sorry, we are unable to load this Gravatar profile.', 'Profile not found.': 'Profile not found.', 'Too Many Requests.': 'Too Many Requests.', 'Internal Server Error.': 'Internal Server Error.', }, } ); } if ( document.readyState !== 'loading' ) { init(); } else { document.addEventListener( 'DOMContentLoaded', init ); } } )(); </script> <div style="display:none"> </div> <script type="text/javascript"> ( function() { function init() { document.body.addEventListener( 'is.post-load', function() { if ( typeof __ATA.insertInlineAds === 'function' ) { __ATA.insertInlineAds(); } } ); } if ( document.readyState !== 'loading' ) { init(); } else { document.addEventListener( 'DOMContentLoaded', init ); } } )(); </script> <!-- CCPA [start] --> <script type="text/javascript"> ( function () { var setupPrivacy = function() { // Minimal Mozilla Cookie library // https://developer.mozilla.org/en-US/docs/Web/API/Document/cookie/Simple_document.cookie_framework var cookieLib = window.cookieLib = {getItem:function(e){return e&&decodeURIComponent(document.cookie.replace(new RegExp("(?:(?:^|.*;)\\s*"+encodeURIComponent(e).replace(/[\-\.\+\*]/g,"\\$&")+"\\s*\\=\\s*([^;]*).*$)|^.*$"),"$1"))||null},setItem:function(e,o,n,t,r,i){if(!e||/^(?:expires|max\-age|path|domain|secure)$/i.test(e))return!1;var c="";if(n)switch(n.constructor){case Number:c=n===1/0?"; expires=Fri, 31 Dec 9999 23:59:59 GMT":"; max-age="+n;break;case String:c="; expires="+n;break;case Date:c="; expires="+n.toUTCString()}return"rootDomain"!==r&&".rootDomain"!==r||(r=(".rootDomain"===r?".":"")+document.location.hostname.split(".").slice(-2).join(".")),document.cookie=encodeURIComponent(e)+"="+encodeURIComponent(o)+c+(r?"; domain="+r:"")+(t?"; path="+t:"")+(i?"; secure":""),!0}}; // Implement IAB USP API. window.__uspapi = function( command, version, callback ) { // Validate callback. if ( typeof callback !== 'function' ) { return; } // Validate the given command. if ( command !== 'getUSPData' || version !== 1 ) { callback( null, false ); return; } // Check for GPC. If set, override any stored cookie. if ( navigator.globalPrivacyControl ) { callback( { version: 1, uspString: '1YYN' }, true ); return; } // Check for cookie. var consent = cookieLib.getItem( 'usprivacy' ); // Invalid cookie. if ( null === consent ) { callback( null, false ); return; } // Everything checks out. Fire the provided callback with the consent data. callback( { version: 1, uspString: consent }, true ); }; // Initialization. document.addEventListener( 'DOMContentLoaded', function() { // Internal functions. var setDefaultOptInCookie = function() { var value = '1YNN'; var domain = '.wordpress.com' === location.hostname.slice( -14 ) ? '.rootDomain' : location.hostname; cookieLib.setItem( 'usprivacy', value, 365 * 24 * 60 * 60, '/', domain ); }; var setDefaultOptOutCookie = function() { var value = '1YYN'; var domain = '.wordpress.com' === location.hostname.slice( -14 ) ? '.rootDomain' : location.hostname; cookieLib.setItem( 'usprivacy', value, 24 * 60 * 60, '/', domain ); }; var setDefaultNotApplicableCookie = function() { var value = '1---'; var domain = '.wordpress.com' === location.hostname.slice( -14 ) ? '.rootDomain' : location.hostname; cookieLib.setItem( 'usprivacy', value, 24 * 60 * 60, '/', domain ); }; var setCcpaAppliesCookie = function( applies ) { var domain = '.wordpress.com' === location.hostname.slice( -14 ) ? '.rootDomain' : location.hostname; cookieLib.setItem( 'ccpa_applies', applies, 24 * 60 * 60, '/', domain ); } var maybeCallDoNotSellCallback = function() { if ( 'function' === typeof window.doNotSellCallback ) { return window.doNotSellCallback(); } return false; } // Look for usprivacy cookie first. var usprivacyCookie = cookieLib.getItem( 'usprivacy' ); // Found a usprivacy cookie. if ( null !== usprivacyCookie ) { // If the cookie indicates that CCPA does not apply, then bail. if ( '1---' === usprivacyCookie ) { return; } // CCPA applies, so call our callback to add Do Not Sell link to the page. maybeCallDoNotSellCallback(); // We're all done, no more processing needed. return; } // We don't have a usprivacy cookie, so check to see if we have a CCPA applies cookie. var ccpaCookie = cookieLib.getItem( 'ccpa_applies' ); // No CCPA applies cookie found, so we'll need to geolocate if this visitor is from California. // This needs to happen client side because we do not have region geo data in our $SERVER headers, // only country data -- therefore we can't vary cache on the region. if ( null === ccpaCookie ) { var request = new XMLHttpRequest(); request.open( 'GET', 'https://public-api.wordpress.com/geo/', true ); request.onreadystatechange = function () { if ( 4 === this.readyState ) { if ( 200 === this.status ) { // Got a geo response. Parse out the region data. var data = JSON.parse( this.response ); var region = data.region ? data.region.toLowerCase() : ''; var ccpa_applies = ['california', 'colorado', 'connecticut', 'delaware', 'indiana', 'iowa', 'montana', 'new jersey', 'oregon', 'tennessee', 'texas', 'utah', 'virginia'].indexOf( region ) > -1; // Set CCPA applies cookie. This keeps us from having to make a geo request too frequently. setCcpaAppliesCookie( ccpa_applies ); // Check if CCPA applies to set the proper usprivacy cookie. if ( ccpa_applies ) { if ( maybeCallDoNotSellCallback() ) { // Do Not Sell link added, so set default opt-in. setDefaultOptInCookie(); } else { // Failed showing Do Not Sell link as required, so default to opt-OUT just to be safe. setDefaultOptOutCookie(); } } else { // CCPA does not apply. setDefaultNotApplicableCookie(); } } else { // Could not geo, so let's assume for now that CCPA applies to be safe. setCcpaAppliesCookie( true ); if ( maybeCallDoNotSellCallback() ) { // Do Not Sell link added, so set default opt-in. setDefaultOptInCookie(); } else { // Failed showing Do Not Sell link as required, so default to opt-OUT just to be safe. setDefaultOptOutCookie(); } } } }; // Send the geo request. request.send(); } else { // We found a CCPA applies cookie. if ( ccpaCookie === 'true' ) { if ( maybeCallDoNotSellCallback() ) { // Do Not Sell link added, so set default opt-in. setDefaultOptInCookie(); } else { // Failed showing Do Not Sell link as required, so default to opt-OUT just to be safe. setDefaultOptOutCookie(); } } else { // CCPA does not apply. setDefaultNotApplicableCookie(); } } } ); }; // Kickoff initialization. if ( window.defQueue && defQueue.isLOHP && defQueue.isLOHP === 2020 ) { defQueue.items.push( setupPrivacy ); } else { setupPrivacy(); } } )(); </script> <!-- CCPA [end] --> <div class="widget widget_eu_cookie_law_widget"> <div class="hide-on-button ads-active" data-hide-timeout="30" data-consent-expiration="180" id="eu-cookie-law" style="display: none" > <form method="post"> <input type="submit" value="Close and accept" class="accept" /> Privacy &amp; Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br /> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies/" rel="nofollow"> Cookie Policy </a> </form> </div> </div> <div id="actionbar" style="display: none;" class="actnbr-pub-big-brother actnbr-has-follow"> <ul> <li class="actnbr-btn actnbr-hidden"> <a class="actnbr-action actnbr-actn-follow " href=""> <svg class="gridicon" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path clip-rule="evenodd" d="m4 4.5h12v6.5h1.5v-6.5-1.5h-1.5-12-1.5v1.5 10.5c0 1.1046.89543 2 2 2h7v-1.5h-7c-.27614 0-.5-.2239-.5-.5zm10.5 2h-9v1.5h9zm-5 3h-4v1.5h4zm3.5 1.5h-1v1h1zm-1-1.5h-1.5v1.5 1 1.5h1.5 1 1.5v-1.5-1-1.5h-1.5zm-2.5 2.5h-4v1.5h4zm6.5 1.25h1.5v2.25h2.25v1.5h-2.25v2.25h-1.5v-2.25h-2.25v-1.5h2.25z" fill-rule="evenodd"></path></svg> <span>Subscribe</span> </a> <a class="actnbr-action actnbr-actn-following no-display" href=""> <svg class="gridicon" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path fill-rule="evenodd" clip-rule="evenodd" d="M16 4.5H4V15C4 15.2761 4.22386 15.5 4.5 15.5H11.5V17H4.5C3.39543 17 2.5 16.1046 2.5 15V4.5V3H4H16H17.5V4.5V12.5H16V4.5ZM5.5 6.5H14.5V8H5.5V6.5ZM5.5 9.5H9.5V11H5.5V9.5ZM12 11H13V12H12V11ZM10.5 9.5H12H13H14.5V11V12V13.5H13H12H10.5V12V11V9.5ZM5.5 12H9.5V13.5H5.5V12Z" fill="#008A20"></path><path class="following-icon-tick" d="M13.5 16L15.5 18L19 14.5" stroke="#008A20" stroke-width="1.5"></path></svg> <span>Subscribed</span> </a> <div class="actnbr-popover tip tip-top-left actnbr-notice" id="follow-bubble"> <div class="tip-arrow"></div> <div class="tip-inner actnbr-follow-bubble"> <ul> <li class="actnbr-sitename"> <a href="https://journalijcsa.wordpress.com"> <img loading='lazy' alt='' src='https://s2.wp.com/i/logo/wpcom-gray-white.png' srcset='https://s2.wp.com/i/logo/wpcom-gray-white.png 1x' class='avatar avatar-50' height='50' width='50' /> International Journal on Computational Science &amp; Applications (IJCSA) </a> </li> <div class="actnbr-message no-display"></div> <form method="post" action="https://subscribe.wordpress.com" accept-charset="utf-8" style="display: none;"> <div> <input type="email" name="email" placeholder="Enter your email address" class="actnbr-email-field" aria-label="Enter your email address" /> </div> <input type="hidden" name="action" value="subscribe" /> <input type="hidden" name="blog_id" value="104889533" /> <input type="hidden" name="source" value="https://journalijcsa.wordpress.com/author/journalijcsa/" /> <input type="hidden" name="sub-type" value="actionbar-follow" /> <input type="hidden" id="_wpnonce" name="_wpnonce" value="81593ca97f" /> <div class="actnbr-button-wrap"> <button type="submit" value="Sign me up"> Sign me up </button> </div> </form> <li class="actnbr-login-nudge"> <div> Already have a WordPress.com account? <a href="https://wordpress.com/log-in?redirect_to=https%3A%2F%2Fjournalijcsa.wordpress.com%2F2023%2F03%2F07%2Finternational-journal-on-computational-science-applications-ijcsa-2%2F&#038;signup_flow=account">Log in now.</a> </div> </li> </ul> </div> </div> </li> <li class="actnbr-ellipsis actnbr-hidden"> <svg class="gridicon gridicons-ellipsis" height="24" width="24" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><g><path d="M7 12c0 1.104-.896 2-2 2s-2-.896-2-2 .896-2 2-2 2 .896 2 2zm12-2c-1.104 0-2 .896-2 2s.896 2 2 2 2-.896 2-2-.896-2-2-2zm-7 0c-1.104 0-2 .896-2 2s.896 2 2 2 2-.896 2-2-.896-2-2-2z"/></g></svg> <div class="actnbr-popover tip tip-top-left actnbr-more"> <div class="tip-arrow"></div> <div class="tip-inner"> <ul> <li class="actnbr-sitename"> <a href="https://journalijcsa.wordpress.com"> <img loading='lazy' alt='' src='https://s2.wp.com/i/logo/wpcom-gray-white.png' srcset='https://s2.wp.com/i/logo/wpcom-gray-white.png 1x' class='avatar avatar-50' height='50' width='50' /> International Journal on Computational Science &amp; Applications (IJCSA) </a> </li> <li class="actnbr-folded-customize"> <a href="https://journalijcsa.wordpress.com/wp-admin/customize.php?url=https%3A%2F%2Fjournalijcsa.wordpress.com%2Fauthor%2Fjournalijcsa%2F"> <svg class="gridicon gridicons-customize" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><g><path d="M2 6c0-1.505.78-3.08 2-4 0 .845.69 2 2 2 1.657 0 3 1.343 3 3 0 .386-.08.752-.212 1.09.74.594 1.476 1.19 2.19 1.81L8.9 11.98c-.62-.716-1.214-1.454-1.807-2.192C6.753 9.92 6.387 10 6 10c-2.21 0-4-1.79-4-4zm12.152 6.848l1.34-1.34c.607.304 1.283.492 2.008.492 2.485 0 4.5-2.015 4.5-4.5 0-.725-.188-1.4-.493-2.007L18 9l-2-2 3.507-3.507C18.9 3.188 18.225 3 17.5 3 15.015 3 13 5.015 13 7.5c0 .725.188 1.4.493 2.007L3 20l2 2 6.848-6.848c1.885 1.928 3.874 3.753 5.977 5.45l1.425 1.148 1.5-1.5-1.15-1.425c-1.695-2.103-3.52-4.092-5.448-5.977z"/></g></svg> <span>Customize</span> </a> </li> <li class="actnbr-folded-follow"> <a class="actnbr-action actnbr-actn-follow " href=""> <svg class="gridicon" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path clip-rule="evenodd" d="m4 4.5h12v6.5h1.5v-6.5-1.5h-1.5-12-1.5v1.5 10.5c0 1.1046.89543 2 2 2h7v-1.5h-7c-.27614 0-.5-.2239-.5-.5zm10.5 2h-9v1.5h9zm-5 3h-4v1.5h4zm3.5 1.5h-1v1h1zm-1-1.5h-1.5v1.5 1 1.5h1.5 1 1.5v-1.5-1-1.5h-1.5zm-2.5 2.5h-4v1.5h4zm6.5 1.25h1.5v2.25h2.25v1.5h-2.25v2.25h-1.5v-2.25h-2.25v-1.5h2.25z" fill-rule="evenodd"></path></svg> <span>Subscribe</span> </a> <a class="actnbr-action actnbr-actn-following no-display" href=""> <svg class="gridicon" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path fill-rule="evenodd" clip-rule="evenodd" d="M16 4.5H4V15C4 15.2761 4.22386 15.5 4.5 15.5H11.5V17H4.5C3.39543 17 2.5 16.1046 2.5 15V4.5V3H4H16H17.5V4.5V12.5H16V4.5ZM5.5 6.5H14.5V8H5.5V6.5ZM5.5 9.5H9.5V11H5.5V9.5ZM12 11H13V12H12V11ZM10.5 9.5H12H13H14.5V11V12V13.5H13H12H10.5V12V11V9.5ZM5.5 12H9.5V13.5H5.5V12Z" fill="#008A20"></path><path class="following-icon-tick" d="M13.5 16L15.5 18L19 14.5" stroke="#008A20" stroke-width="1.5"></path></svg> <span>Subscribed</span> </a> </li> <li class="actnbr-signup"><a href="https://wordpress.com/start/">Sign up</a></li> <li class="actnbr-login"><a href="https://wordpress.com/log-in?redirect_to=https%3A%2F%2Fjournalijcsa.wordpress.com%2F2023%2F03%2F07%2Finternational-journal-on-computational-science-applications-ijcsa-2%2F&#038;signup_flow=account">Log in</a></li> <li class="flb-report"> <a href="https://wordpress.com/abuse/?report_url=https://journalijcsa.wordpress.com" target="_blank" rel="noopener noreferrer"> Report this content </a> </li> <li class="actnbr-reader"> <a href="https://wordpress.com/read/feeds/42219841"> View site in Reader </a> </li> <li class="actnbr-subs"> <a href="https://subscribe.wordpress.com/">Manage subscriptions</a> </li> <li class="actnbr-fold"><a href="">Collapse this bar</a></li> </ul> </div> </div> </li> </ul> </div> <script> window.addEventListener( "load", function( event ) { var link = document.createElement( "link" ); link.href = "https://s0.wp.com/wp-content/mu-plugins/actionbar/actionbar.css?v=20241015"; link.type = "text/css"; link.rel = "stylesheet"; document.head.appendChild( link ); var script = document.createElement( "script" ); script.src = "https://s0.wp.com/wp-content/mu-plugins/actionbar/actionbar.js?v=20231122"; script.defer = true; document.body.appendChild( script ); } ); </script> <div id="jp-carousel-loading-overlay"> <div id="jp-carousel-loading-wrapper"> <span id="jp-carousel-library-loading">&nbsp;</span> </div> </div> <div class="jp-carousel-overlay" style="display: none;"> <div class="jp-carousel-container"> <!-- The Carousel Swiper --> <div class="jp-carousel-wrap swiper-container jp-carousel-swiper-container jp-carousel-transitions" itemscope itemtype="https://schema.org/ImageGallery"> <div class="jp-carousel swiper-wrapper"></div> <div class="jp-swiper-button-prev swiper-button-prev"> <svg width="25" height="24" viewBox="0 0 25 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <mask id="maskPrev" mask-type="alpha" maskUnits="userSpaceOnUse" x="8" y="6" width="9" height="12"> <path d="M16.2072 16.59L11.6496 12L16.2072 7.41L14.8041 6L8.8335 12L14.8041 18L16.2072 16.59Z" fill="white"/> </mask> <g mask="url(#maskPrev)"> <rect x="0.579102" width="23.8823" height="24" fill="#FFFFFF"/> </g> </svg> </div> <div class="jp-swiper-button-next swiper-button-next"> <svg width="25" height="24" viewBox="0 0 25 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <mask id="maskNext" mask-type="alpha" maskUnits="userSpaceOnUse" x="8" y="6" width="8" height="12"> <path d="M8.59814 16.59L13.1557 12L8.59814 7.41L10.0012 6L15.9718 12L10.0012 18L8.59814 16.59Z" fill="white"/> </mask> <g mask="url(#maskNext)"> <rect x="0.34375" width="23.8822" height="24" fill="#FFFFFF"/> </g> </svg> </div> </div> <!-- The main close buton --> <div class="jp-carousel-close-hint"> <svg width="25" height="24" viewBox="0 0 25 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <mask id="maskClose" mask-type="alpha" maskUnits="userSpaceOnUse" x="5" y="5" width="15" height="14"> <path d="M19.3166 6.41L17.9135 5L12.3509 10.59L6.78834 5L5.38525 6.41L10.9478 12L5.38525 17.59L6.78834 19L12.3509 13.41L17.9135 19L19.3166 17.59L13.754 12L19.3166 6.41Z" fill="white"/> </mask> <g mask="url(#maskClose)"> <rect x="0.409668" width="23.8823" height="24" fill="#FFFFFF"/> </g> </svg> </div> <!-- Image info, comments and meta --> <div class="jp-carousel-info"> <div class="jp-carousel-info-footer"> <div class="jp-carousel-pagination-container"> <div class="jp-swiper-pagination swiper-pagination"></div> <div class="jp-carousel-pagination"></div> </div> <div class="jp-carousel-photo-title-container"> <h2 class="jp-carousel-photo-caption"></h2> </div> <div class="jp-carousel-photo-icons-container"> <a href="#" class="jp-carousel-icon-btn jp-carousel-icon-info" aria-label="Toggle photo metadata visibility"> <span class="jp-carousel-icon"> <svg width="25" height="24" viewBox="0 0 25 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <mask id="maskInfo" mask-type="alpha" maskUnits="userSpaceOnUse" x="2" y="2" width="21" height="20"> <path fill-rule="evenodd" clip-rule="evenodd" d="M12.7537 2C7.26076 2 2.80273 6.48 2.80273 12C2.80273 17.52 7.26076 22 12.7537 22C18.2466 22 22.7046 17.52 22.7046 12C22.7046 6.48 18.2466 2 12.7537 2ZM11.7586 7V9H13.7488V7H11.7586ZM11.7586 11V17H13.7488V11H11.7586ZM4.79292 12C4.79292 16.41 8.36531 20 12.7537 20C17.142 20 20.7144 16.41 20.7144 12C20.7144 7.59 17.142 4 12.7537 4C8.36531 4 4.79292 7.59 4.79292 12Z" fill="white"/> </mask> <g mask="url(#maskInfo)"> <rect x="0.8125" width="23.8823" height="24" fill="#FFFFFF"/> </g> </svg> </span> </a> <a href="#" class="jp-carousel-icon-btn jp-carousel-icon-comments" aria-label="Toggle photo comments visibility"> <span class="jp-carousel-icon"> <svg width="25" height="24" viewBox="0 0 25 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <mask id="maskComments" mask-type="alpha" maskUnits="userSpaceOnUse" x="2" y="2" width="21" height="20"> <path fill-rule="evenodd" clip-rule="evenodd" d="M4.3271 2H20.2486C21.3432 2 22.2388 2.9 22.2388 4V16C22.2388 17.1 21.3432 18 20.2486 18H6.31729L2.33691 22V4C2.33691 2.9 3.2325 2 4.3271 2ZM6.31729 16H20.2486V4H4.3271V18L6.31729 16Z" fill="white"/> </mask> <g mask="url(#maskComments)"> <rect x="0.34668" width="23.8823" height="24" fill="#FFFFFF"/> </g> </svg> <span class="jp-carousel-has-comments-indicator" aria-label="This image has comments."></span> </span> </a> </div> </div> <div class="jp-carousel-info-extra"> <div class="jp-carousel-info-content-wrapper"> <div class="jp-carousel-photo-title-container"> <h2 class="jp-carousel-photo-title"></h2> </div> <div class="jp-carousel-comments-wrapper"> <div id="jp-carousel-comments-loading"> <span>Loading Comments...</span> </div> <div class="jp-carousel-comments"></div> <div id="jp-carousel-comment-form-container"> <span id="jp-carousel-comment-form-spinner">&nbsp;</span> <div id="jp-carousel-comment-post-results"></div> <form id="jp-carousel-comment-form"> <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label> <textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..." ></textarea> <div id="jp-carousel-comment-form-submit-and-info-wrapper"> <div id="jp-carousel-comment-form-commenting-as"> <fieldset> <label for="jp-carousel-comment-form-email-field">Email (Required)</label> <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field" /> </fieldset> <fieldset> <label for="jp-carousel-comment-form-author-field">Name (Required)</label> <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field" /> </fieldset> <fieldset> <label for="jp-carousel-comment-form-url-field">Website</label> <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field" /> </fieldset> </div> <input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment" /> </div> </form> </div> </div> <div class="jp-carousel-image-meta"> <div class="jp-carousel-title-and-caption"> <div class="jp-carousel-photo-info"> <h3 class="jp-carousel-caption" itemprop="caption description"></h3> </div> <div class="jp-carousel-photo-description"></div> </div> <ul class="jp-carousel-image-exif" style="display: none;"></ul> <a class="jp-carousel-image-download" href="#" target="_blank" style="display: none;"> <svg width="25" height="24" viewBox="0 0 25 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <mask id="mask0" mask-type="alpha" maskUnits="userSpaceOnUse" x="3" y="3" width="19" height="18"> <path fill-rule="evenodd" clip-rule="evenodd" d="M5.84615 5V19H19.7775V12H21.7677V19C21.7677 20.1 20.8721 21 19.7775 21H5.84615C4.74159 21 3.85596 20.1 3.85596 19V5C3.85596 3.9 4.74159 3 5.84615 3H12.8118V5H5.84615ZM14.802 5V3H21.7677V10H19.7775V6.41L9.99569 16.24L8.59261 14.83L18.3744 5H14.802Z" fill="white"/> </mask> <g mask="url(#mask0)"> <rect x="0.870605" width="23.8823" height="24" fill="#FFFFFF"/> </g> </svg> <span class="jp-carousel-download-text"></span> </a> <div class="jp-carousel-image-map" style="display: none;"></div> </div> </div> </div> </div> </div> </div> <link crossorigin='anonymous' rel='stylesheet' id='all-css-0-2' href='https://s2.wp.com/_static/??-eJydjEEKgCAQAD+UrR6KLtFbTJfQdJXWxe9HUB/oOMMw0KtyhRpSgyyqJjkCMURs1brzZWAhyMVLQgZnryKMCbiHipfahXzC0TEP8H/2NZ94fltezbxMxkx61vEGx+U/hQ==&cssminify=yes' type='text/css' media='all' /> <script type="text/javascript" id="jetpack-carousel-js-extra"> /* <![CDATA[ */ var jetpackSwiperLibraryPath = {"url":"https:\/\/s2.wp.com\/wp-content\/mu-plugins\/jetpack-plugin\/sun\/_inc\/build\/carousel\/swiper-bundle.min.js"}; var jetpackCarouselStrings = {"widths":[370,700,1000,1200,1400,2000],"is_logged_in":"","lang":"en","ajaxurl":"https:\/\/journalijcsa.wordpress.com\/wp-admin\/admin-ajax.php","nonce":"c2c9eee1cd","display_exif":"1","display_comments":"1","single_image_gallery":"1","single_image_gallery_media_file":"","background_color":"black","comment":"Comment","post_comment":"Post Comment","write_comment":"Write a Comment...","loading_comments":"Loading Comments...","image_label":"Open image in full-screen.","download_original":"View full size <span class=\"photo-size\">{0}<span class=\"photo-size-times\">\u00d7<\/span>{1}<\/span>","no_comment_text":"Please be sure to submit some text with your comment.","no_comment_email":"Please provide an email address to comment.","no_comment_author":"Please provide your name to comment.","comment_post_error":"Sorry, but there was an error posting your comment. Please try again later.","comment_approved":"Your comment was approved.","comment_unapproved":"Your comment is in moderation.","camera":"Camera","aperture":"Aperture","shutter_speed":"Shutter Speed","focal_length":"Focal Length","copyright":"Copyright","comment_registration":"0","require_name_email":"1","login_url":"https:\/\/journalijcsa.wordpress.com\/wp-login.php?redirect_to=https%3A%2F%2Fjournalijcsa.wordpress.com%2F2017%2F07%2F13%2F787%2F","blog_id":"104889533","meta_data":["camera","aperture","shutter_speed","focal_length","copyright"],"stats_query_args":"blog=104889533&v=wpcom&tz=0&user_id=0&subd=journalijcsa","is_public":"1"}; /* ]]> */ </script> <script crossorigin='anonymous' type='text/javascript' src='https://s1.wp.com/_static/??-eJyNkFFOAzEMRC+Ea6qlQnwgjoKSrDd4N4mjOGk4flOJQrVIiE+P34xHxp7BSaqUKq6KUSwHgqZUjB8acFrksOoD3nE2iIccmuek2KXMZlZwwaiSXkO6qWHvie3HwbOnqkhtbGVjgmA6Voo5mEo7fZ9TPygOJjeLlj3YIkMp16vJnNmbypL+79GNMwROGyzimsLCn38UX6lm47avGbUlfOfk0DYOMzpTZPwtfGM34RD5V6W71BsGPTuJu3H43uLr8Xk6Pk2P0+llvQCZlqFK'></script> <script type="text/javascript"> (function () { var wpcom_reblog = { source: 'toolbar', toggle_reblog_box_flair: function (obj_id, post_id) { // Go to site selector. This will redirect to their blog if they only have one. const postEndpoint = `https://wordpress.com/post`; // Ideally we would use the permalink here, but fortunately this will be replaced with the // post permalink in the editor. const originalURL = `${ document.location.href }?page_id=${ post_id }`; const url = postEndpoint + '?url=' + encodeURIComponent( originalURL ) + '&is_post_share=true' + '&v=5'; const redirect = function () { if ( ! window.open( url, '_blank' ) ) { location.href = url; } }; if ( /Firefox/.test( navigator.userAgent ) ) { setTimeout( redirect, 0 ); } else { redirect(); } }, }; window.wpcom_reblog = wpcom_reblog; })(); </script> <script type="text/javascript"> // <![CDATA[ (function() { try{ if ( window.external &&'msIsSiteMode' in window.external) { if (window.external.msIsSiteMode()) { var jl = document.createElement('script'); jl.type='text/javascript'; jl.async=true; jl.src='/wp-content/plugins/ie-sitemode/custom-jumplist.php'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(jl, s); } } }catch(e){} })(); // ]]> </script><script src="//stats.wp.com/w.js?67" defer></script> <script type="text/javascript"> _tkq = window._tkq || []; _stq = window._stq || []; _tkq.push(['storeContext', {'blog_id':'104889533','blog_tz':'0','user_lang':'en','blog_lang':'en','user_id':'0'}]); _stq.push(['view', {'blog':'104889533','v':'wpcom','tz':'0','user_id':'0','subd':'journalijcsa'}]); _stq.push(['extra', {'crypt':'UE5XaGUuOTlwaD85flAmcm1mcmZsaDhkV11YdWFnNncxc1tjZG9XVXhRZmhSYUFEMXVJdlp1Q2dGaT0lXXxFb1QrX1VxRFQlWD9DY1ZfRW5qdndYN3hbSm0vTWY/Yn5MNUw/U2lrZDFmW29PeDdwdUhWXVhIZmMuRHBdU34mTXBDNyVHWEpUbEl0SFUzbTZdOGh6MEhuS3g4NlVualNWRGdnLTFaYW9IWyZNYmJyP2J+eE53U0Z8cFR4MCY5WGk0TiZFVkh4bV9Ba3Bic0Vrem1GUlVNLGc3aFF2anhvMFdFVmpOfGZ0LEdYZFJDXTdRdnZaYWlnYlQtd29sNUlkcUFCT0ZqPWVMflZ8YWRDeEtMYnFiP04lSzUyeis='}]); _stq.push([ 'clickTrackerInit', '104889533', '0' ]); </script> <noscript><img src="https://pixel.wp.com/b.gif?v=noscript" style="height:1px;width:1px;overflow:hidden;position:absolute;bottom:1px;" alt="" /></noscript> <div id="marketingbar" class="marketing-bar noskim "><div class="marketing-bar-text">Design a site like this with WordPress.com</div><a class="marketing-bar-button" href="https://wordpress.com/start/?ref=marketing_bar">Get started</a><a class="marketing-bar-link" tabindex="-1" aria-label="Create your website at WordPress.com" href="https://wordpress.com/start/?ref=marketing_bar"></a></div> <script type="text/javascript"> window._tkq = window._tkq || []; window._tkq.push( [ 'recordEvent', 'wpcom_marketing_bar_impression', {"is_current_user_blog_owner":false} ] ); document.querySelectorAll( '#marketingbar > a' ).forEach( link => { link.addEventListener( 'click', ( e ) => { window._tkq.push( [ 'recordEvent', 'wpcom_marketing_bar_cta_click', {"is_current_user_blog_owner":false} ] ); } ); }); </script><script> ( function() { function getMobileUserAgentInfo() { if ( typeof wpcom_mobile_user_agent_info === 'object' ) { wpcom_mobile_user_agent_info.init(); var mobileStatsQueryString = ''; if ( wpcom_mobile_user_agent_info.matchedPlatformName !== false ) { mobileStatsQueryString += '&x_' + 'mobile_platforms' + '=' + wpcom_mobile_user_agent_info.matchedPlatformName; } if ( wpcom_mobile_user_agent_info.matchedUserAgentName !== false ) { mobileStatsQueryString += '&x_' + 'mobile_devices' + '=' + wpcom_mobile_user_agent_info.matchedUserAgentName; } if ( wpcom_mobile_user_agent_info.isIPad() ) { mobileStatsQueryString += '&x_' + 'ipad_views' + '=' + 'views'; } if ( mobileStatsQueryString != '' ) { new Image().src = document.location.protocol + '//pixel.wp.com/g.gif?v=wpcom-no-pv' + mobileStatsQueryString + '&baba=' + Math.random(); } } } document.addEventListener( 'DOMContentLoaded', getMobileUserAgentInfo ); } )(); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10