Hybrid Parallel Multithreading Encryption
Review Paper | Journal Paper
Vol.3 , Issue.6 , pp.50-52, Jun-2015
Abstract
First part of this thesis which was needed to be developed before moving onto the next levels is Cloud Computing. The client section was a simple application for user which was made on Socket Programming in Java. Application connection is to be made with Server which is a LAN based server on which data is to be uploaded and downloaded. Since backbone network (client and server) is developed, then it needs to be secured with a particular algorithm or technique. The algorithm studied is known as RSA key oriented algorithm which offers dynamic security on client and server level during communication. The other technique for advancing the level of scalability and improvement along the network layer we used is NTRU encryption. Since this algorithm encrypt data of every type ensures the originality of particular data and adds the advancement in throughput level. These two algorithms are implemented to run on single server on a different core thread thus making the idle cores of sever in use for both the algorithms. It is reflecting that the parallelism encryption done on single content during the data storage on network marginally increase the speed of execution and decryption and encryption timings have been increased. Other part of this thesis also deals with the approaches followed previously which are the part this thesis.
Key-Words / Index Term
RSA, LOSSY, SAAS
References
[1] Ranjit Ranjan, Dr. A.S Baghel, Sushil Kumar “Improvement of NTRU cryptosystem” International Journal of Advanced Research in Computer Science Vol-2, Issue-9, Page no-79-84, September 2012.
[2] Subedari Mithila, P. Pradeep Kumar, “Data Security through Confidentiality in Cloud Computing Environment”, Subedari Mithila et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol-2, Issue-5, Page no-1836-1840, 2011.
[3] Gurkamal Bhullar and Navneet Kaur “Concurrency and security control with NTRU” International Journal of Innovative Research in Computer Science and Communication Engineering Vol-2, Issue 3, March 2014.
[4] Dr. C. Sunil Kumar, J. Seetha, S.R Vinotha “Security implications of Distributed parallel cloud database management system models” International Journal of Software Computing and Software Engineering, Vol-2, Issue-11,Page no-20-28, 2012.
[5] Shashi Mehrotra Seth and Rajan Mishra, “Comparative Analysis of Encryption Algorithm for Data Communication”, International Journal of Computer Science and Technology Vol-4, Issue-8, Page no-348-354, August 2014.
[6] YashPal Mote and Shekhar Gaikward, “Superioer Security Data Encryption Algorithm”, International Journal of Computer Scienece, Vol- 6,Page no-171-181 , July 2012.
[7] Parsi Kalpana and Sudha Singaraju, ”Data security in cloud computing using RSA algorithm, International Journal of Research in Computer and Communication Technology, Vol-1, Issue-4, Page no-143-146, September 2012.
Citation
Deepali and Namita Kakkar, "Hybrid Parallel Multithreading Encryption," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.50-52, 2015.
A Study On E-Learning by Applying Data Mining Techniques
Survey Paper | Journal Paper
Vol.3 , Issue.6 , pp.53-55, Jun-2015
Abstract
Now a days these are many E-Resources to learn. By using this resources E-Learning is very effective learning things in present days. The Data Mining applications are powerful tools in various domains. By applying these Data mining applications on E-Learning system, it is a good idea to improve the capabilities of E-Learning system. The main advantage of Data mining and E-Learning interaction it is very useful to learn many advanced technologies very easy by using plying Data mining technologies very easily by using applying Data mining technologies to E-Learning System.
Key-Words / Index Term
EDM, KDD, E-Learning, Educational Data, Online courses
References
[1]. Jaiwei Han Micheline Kamber, “ Data Mining concepts and Techniques”. 2012.
[2]. Abeer Badr EI Din Ahmed, Ibrahim Sayed Elaraby “Data Mining: A prediction for Student’s Performance Using Classificatio Method.” World Journal of Computer Applicationsand Technology 2(2): 43-47, 2014.
[3]. Aarti Sharma, ahul Sharma, Vivek Kr. Sharma, Vishal Shrivatava, “Application of Data Mining – A Survey Paper”, International Journal of Computer Science and Information Technologies. Vol. 5(2), 2014, 2023-2025.
[4]. S.Laxmi Prabha, “Educational Data Mining Applications”, Operational Research and Applications: An International Journal(ORAJ), Vol. 1. No.1, August-2014
[5]. Yousf A.ALMazroui,” A survey of Data Mining In the context of E-Learning”, International Journal of Information Technology & Computer Science (IJITCS), Volume 7: No:3Issue on January / Febraury, 2013.
[6]. Margo Hanna,” Data mining in the e-learning domain”, Volume 21-Number 1, 2004-29-34.
Citation
S. Nagaparameshwara Chary, "A Study On E-Learning by Applying Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.53-55, 2015.
Tactile Robot Vibrating Detection Using Haptic Wireless Sensors
Review Paper | Journal Paper
Vol.3 , Issue.6 , pp.56-60, Jun-2015
Abstract
Haptic technology, haptics, or kinesthetic communication, is tactile feedback technology which recreates the sense of touch by applying forces, vibrations, or motions to the user. This mechanical stimulation can be used to assist in the creation of virtual objects in a computer simulation, to control such virtual objects, and to enhance the remote control of machines and devices (telerobotics). It has been described as "doing for the sense of touch what computer graphics does for vision". Haptic devices may incorporate tactile sensors that measure forces exerted by the user on the interface.
Key-Words / Index Term
Tactile;Haptic Sensors;Mobile Device; Touch Synopsis
References
[1]. “ Gabriel Robles-De-La-Torre. "International Society for Haptics: Haptic technology, an animated explanation". Isfh.org. Retrieved 2010-02-26.
[2]. "Robles-De-La-Torre G. Virtual Reality: Touch / Haptics. In Goldstein B (Ed.), "Sage Encyclopedia of Perception". Sage Publications, Thousand Oaks CA (2009)." (PDF). Retrieved 2010-02-26.
[3]. “ Patent US3780225 - TACTILE COMMUNICATION ATTACHMENT - Google Patents. Google.com (1973-12-18). Retrieved on 2013-08-23.
[4]. "Man-Machine Tactile Communication," SID Journal (The Official Journal of the Society for Information Display), Vol. 1, No. 2, (July/August 1972), pp. 5-11.
[5]. "US Patent 3919691 A". Retrieved 22 September 2013.
[6]. "Haptic controller chips offer low latency". EE Times. 12/8/2011Jump up^ Wilson, Drew (2008-05-20). "Finnish interface developer gets Estonian VC investment".EE Times.
[7]. “ Bau, Olivier; Ivan Poupyrev (July 2012). "REVEL: Tactile Feedback Technology for Augmented Reality". ACM Transactions on Graphics 31 (4): 1.doi:10.1145/2185520.2185585. Retrieved 22 September 2013.
[8]. “ Hornyack, Tim (5/10/2011). "KDDI haptic touch screen pushes your buttons". Cnet.
Citation
D.Bullarao, P.Khatija Khanam and P.Nageswara Rao, "Tactile Robot Vibrating Detection Using Haptic Wireless Sensors," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.56-60, 2015.
Correlated Probabilistic Graph with Clustering
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.61-64, Jun-2015
Abstract
Recently, probabilistic graph have more interest in the data mining. After some result it is found that correlations may exist among adjacent edges in various probabilistic graphs. As one of the basic mining techniques, graph clustering is widely used. Different Clustering methods are used. But, when correlations are considered, it becomes more challenging to efficiently cluster probabilistic graphs. Here, we define the problem of clustering correlated probabilistic graphs and its techniques. To solve the challenging problem the PEEDR and the DPTC clustering algorithm are defined for each of the proposed algorithms, with some several pruning techniques and Different Similarity measures.
Key-Words / Index Term
Clustering; Correlated; Probabilistic Graph; Graph Clustering; Pruning
References
[1] “Graph Clustering” Satu Elisa Schaeffer_C Computer Science Review 2007 .
[2] A.K. JAIN, M.N. MURTY, P.J. FLYNN, “Data Clustering: A Review "
[3] C. C. Aggarwal and H. Wang, “Managing and Mining Graph Data”, New York, NY, USA: Springer, 2010.
[4] Ye Yuan, Guoren Wang, Lei Chen, Haixun Wang,"Efficient Subgraph Similarity Search on Large Probabilistic Graph Databases"
[5] Wang, W. and Demsetz" Model for Evaluating Networks under Correlated Uncertainty",—NETCOR.” J. Constr. Eng. Manage., 126(6), 458–466.
[6] U. Brandes, M. Gaertler, and D. Wagner, “Engineering Graph Clustering: Models and Experimental Evaluation,” ACM J. Experimental Algorithmics, vol. 12, article 1.1, pp. 1-26, 2007.
[7] G. Karypis and V. Kumar, “Parallel Multilevel K-Way Partitioning for Irregular Graphs,” SIAM Rev., vol. 41, pp. 278-300, 1999.
[8] M. Newman, “Modularity and Community Structure in Networks,” Proc. Nat’l Academy of Sciences USA, vol. 103, pp. 8577-8582, 2006.
[9] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
[10] C.C. Aggarwal and P.S. Yu, “A Framework for Clustering Uncertain Data Streams,” Proc. IEEE 24th Int’l Conf. Data Eng.(ICDE), pp. 150-159, 2008
[11] G. Cormode and A. McGregor, “Approximation Algorithms for Clustering Uncertain Data,” Proc. 27th ACM SIGMOD-SIGACTSIGART Symp.Principles of Database Systems (PODS), pp. 191-200, 2008.
[12] S. Gu¨nnemann, H. Kremer, and T. Seidl, “Subspace Clustering for Uncertain Data,” Proc. SIAM Int’l Conf. Data Mining (SDM),pp. 385-396, 2010
[13] S. Guha and K. Munagala, “Exceeding Expectations and Clustering Uncertain Data,” Proc. 28th ACM SIGMOD-SIGACT-SIGARTSymp. Principles of Database Systems (PODS), pp. 269-278, 2009.
[14] Yu Gu,Chunpeng Gao, Gao Cong, and Ge Yu, "Effective and Efficicient Clustering Methods for correlated probabulistic graph" IEEE Transactions On Knowledge And Data Engineering, Vol. 26, No. 5, May 2014.
Citation
Sawant Ashlesha G., "Correlated Probabilistic Graph with Clustering," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.61-64, 2015.
Agent-based flexible e-learning paradigm
Case Study | Journal Paper
Vol.3 , Issue.6 , pp.65-75, Jun-2015
Abstract
The use of computer-based and online education systems has made new data available that can describe the temporal and process-level progression of learning. Many scholars are interested in improving e-learning in order to provide easy access to educational materials. There is, however, the need to incorporate the ability to classify learners into these learning systems. Learner classification is used adaptively to provide relevant information for the various categories of learners. The modern ubiquity of computer use and internet access has dramatically impacted many facets of education, including engineering education. There has been a rapid rise over the last decade in the use of computer-based or online formats either to facilitate (e.g. online distribution of materials) or conduct higher-education courses, and enrollment among all students in at least one online course is now at 32%. Many universities now include online programs, and online publisher resources have also grown correspondingly. There is also a need for learning to continue, whether learners are on- or off-line. In many parts of the world, especially in the eve loping world, most people do not have reliable continuous internet connections. We tested an Adaptive e-earning Model prototype that implements an adaptive presentation of course content under conditions of intermittent internet connections This prototype was tested in February 2011 on undergraduate students studying a database systems course. This study found out that it is possible to have models that can adapt to characteristics such as the learner’s level of knowledge and that it is possible for learners to be able to study under both on- and off-line modes through adaptation.
Key-Words / Index Term
E-learning, Internet, Adaptation, Agent-based
References
[1]. Sampson D, Karagiannidis C, Kinshuk D. Personalised learning: educational, technological and standarisation perspective. Digital Education Review. 2002;4:24–39.
[2]. Blochl M, Rumetshofer H, Wob W. Individualized e-learning systems enabled by a semantically determined adaptation of learning fragments. Paper presented at DEXA 2003. Proceedings of the 14th International Workshop on Database and Expert Systems Applications; 2003 Sep 1–5.
[3]. Pai WC, Wang CC, Jiang DR. A software development model based on quality measurement. Paper presented at ICSA 2000. Proceedings of the ICSA 13th International Conference; 2000. p. 40–43.
[4]. Wang Y, Wang ZO. Paper presentation. A fast KNN algorithm for text categorization. Proceedings of 2007 International Conference on Machine Learning and Cybernetics; 2007. Vol. 6, p. 3436–3441. http://dx.doi.org/10.1109/ ICMLC.2007.4370742
[5]. Srihivok A, Intrapairote A. A conceptual framework for e-learning in the tertiary education in Thailand: Report of the National Council Research of Thailand; 2003.
[6]. Ismail J. The design of an e-learning system: Beyond the hype. The Internet and Higher Education. 2001;4(3–4):329–336. http://dx.doi.org/10.1016/S1096- 7516(01)00069-0
[7]. Sun PC, Tsai RJ, Finger G, et al. What drives a successful e-learning? An empirical investigation of the critical factors influencing learner satisfaction. Compu Educ. 2008;50(4):1183–1202. http://dx.doi.org/10.1016/j.compedu.2006.11.007
[8]. Mulwa C, Lawless S, Sharp M, et al. Adaptive educational hypermedia systems in technology enhanced learning: a literature review. Paper presented at ACM 2010. Proceedings of the 2010 ACM Conference on Information Technology Education; 2010. p. 73–84.
[9]. Popescu E, Trigano P, Badica C. Towards a unified learning style model in adaptive educational systems. Paper presented at ICALT 2007. Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies; 2007, July 18-20. p. 804–808.
[10]. Saleh AA, El-Bakry HM, Asfour TT, et al. Adaptive e-learning tools for numbering systems. Paper presented at ACE 2010. Proceedings of the 9th WSEAS International Conference on Telecommunications and Informatics; 2010 May 29–31. p. 293–298.
[11]. Atolagbe TA. E-learning: the use of components technologies and artificial intelligence for management and delivery of instruction. Paper presented at ITI 2002. Proceedings of the 24th International Conference on Information Technology Interfaces; 2002. p. 121–128.
[12]. Zaíane OR. Building a recommender agent for e-learning systems. In. Paper presentation. Proceedings of International Conference on Computers in Education; 2002 Dec 3–6. p. 55–59.
[13]. Mungunsukh H, Cheng Z. An agent based programming language learning support system. Paper presentation. Proceedings of the International Conference on Computers in Education; 2002 Dec 3–6. p. 148–152. [14]. Lima RM, Sousa RM, Martins PJ. Distributed production planning and control agent-based system. Int J Prod Res. 2006;44(18-19), 3693–3709. http://dx.doi. org/10.1080/00207540600788992
[15]. D’Inverno M, Luck M. Understanding agent systems. Berlin: Springer-Verlag, 2001.
[16]. Pacheco O, Carmo J. A role based model for normative specification of organized collective agency and agents interaction. Auton Agent Multi-Ag. 2003;6(2):145– 184. http://dx.doi.org/10.1023/A:1021884118023
17. Wooldridge M. An introduction to multiagent systems. Cambridge: John Wiley & Sons, 2009.
[18]. Nienaber R, Cloete E. A software agent framework for the support of software project management. Paper presented at SAICSIT 2003. Proceedings of the 2003 annual research conference of the South African institute of South African Institute for Computer Scientists and Information Technologists on Enablement through Technology; 2003. p. 16–23.
[19]. Van Merriënboer JJG, Sweller J. Cognitive load theory and complex learning: Recent developments and future directions. Educ Psychol Rev. 2005;17(2):147– 177. http://dx.doi.org/10.1007/s10648-005-3951-0
Citation
Kranthi Kiran G, Umashankar Rao E, Md Shabbeer, "Agent-based flexible e-learning paradigm," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.65-75, 2015.
Dynamic Vehicle Management System Using Fast Optical Character Recognition Technique
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.76-81, Jun-2015
Abstract
Vehicles have become one of the most common commodities that the masses have adopted during these modern times. Tracking all such vehicles and regulating their inflow and outflow at any institution/organization is still a labor intensive task. With the development of technology, every day we come across one or the other situation where technology is skillfully replacing all such labor orientated tasks with faultless automated systems which are in most situations cheaper and more efficient. The proposed system in this paper elucidates a similar elegant automation solution for the mentioned situation. This system has the ability to register and deregister a vehicle from a database, identifying it based on its number plate which is fed dynamically to the system. Further this proposed technology makes use of a fast optical character recognition system to map the dynamically obtained characters from the license plate by the system to alphanumeric characters used by standard license plates across the country and eventually registers/deregisters users to automate the tedious gatekeeping process, as we know it today.
Key-Words / Index Term
Vehicle management system; License plate recognition; Digital Image Processing; Optical Character Recognition; Machine vision; Machine Learning; Automation Systems; Vehicle Parking Automation Systems
References
[1] Ahmad and Mohammad, 2009,” Efficient Farsi License Plate Recognition”,Information, Communications and Signal Processing, 2009, ISBN:978-1-4244-4657-5, Pages (1-5),8-10 Dec 2009.
[2] Shaohong Wu, “A Novel Accurately Automatic License Plate Localization Method” ICEES, ISBN: 978-1-4577-0576-2, Pages (155-160),10-12July 2011.
[3] Maini R, Aggarwal H, “Study and comparison of various image edge detection techniques”, International Journal of Image Processing, Volume (03), Issue (01), Pages (1-11), 15 March 2009.
[4] V. Koval, V. Turchenko, V. Kochan, A. Sachenko, G. Markowsky”, Smart License Plate Recognition System Based on Image Processing Using Neural Network”,Pages (123-127)8-10 September 2003, Lviv, Ukraine.
[5] Hao Chen, Jisheng Ren, Huachun Tan, Jianqun Wang, “ A novel method for license plate localization”,Image and Graphics, 2007. ICIG 2007, Pages (604-609)22-24 August 2007.
[6] SerkanOzbay, Ergun Ercelebi, “Automatic vehicle identification by plate recognition”, International Science Index, Volume:1, No.:9, Pages (222-225), 2007.
[7] Yungang Zhang, Changshui Zhang, “A New algorithm for character segmentation of license plate”, Proc. Of IEEE Intelligent Vehicles Symposium, Pages(106-109), 2003
[8] Tran DurDuan, Duong AnhDuc, Tran Le, Hong Du, “Combining Hough transform and contour algorithm for detecting vehicle license plate”, Proc. Of International Symposium Intelligent Multimedia, Video and Speech Processing,2004, Pages(747-750).
[9] M. Sarfraz, M. J. Ahmed, and S. A. Ghazi, “Saudi Arabian license plate recognition system”,Geometric Modeling and Graphics Proceedings, Pages(36–41), 16-18 July 2003.
[10] S. Kranthi, K. Pranathi, and A. Srisaila, “Automatic number plate recognition”,International Journal of Advancements in Technology, Volume:2 No.:3, Pages(408–422), July 2003.
[11] Hegt H A, De La Haye R J, Khan N A, “A high performance license plate recognition system”, Systems, Man, and Cybernetics, 1998 IEEE, Pages (4357-4362), 11-14 October 1998.
[12] Sirithinaphong T, Chamnongthai K, “The recognition of car license plate for automatic parking system”, Signal Processing and Its Applications, 1999. ISSPA'99. Proceedings of the Fifth International Symposium on. IEEE, Pages(455-457), 1999.
[13] SubhashTatale, and AkhilKhare, “Real time anpr for vehicle identification using neural network”, International Journal of Advances in Engineering & Technology, IJAET ISSN: 2231- 1963- 262, Vol. 1, Issue 4, Pages (262-268), September 2007.
[14] T. E. de Campos, B. R. Babu, and M. Varma, “Character recognition in natural images,” in Proceedings of the International Conference on Computer Vision Theory and Applications, Lisbon, Portugal, February 2009.
[15] Y. Pan, X. Hou, and C. Liu, “Text localization in natural scene images based on conditional random field,” in International Conference on Document Analysis and Recognition, 2009.
[16] X. Chen and A. Yuille, “Detecting and reading text in natural scenes,” in Computer Vision and Pattern Recognition, vol. 2, 2004.
[17] J. Yang, K. Yu, Y. Gong, and T. S. Huang, “Linear spatial pyramid matching using sparse coding for image classification.” in Computer Vision and Pattern Recognition, 2009.
[18] K. Kavukcuoglu, P. Sermanet, Y. Boureau, K. Gregor, M. Mathieu, and Y. LeCun, “Learning convolutional feature hierarchies for visual recognition,” in Advances in Neural Information Processing Systems, 2010.
[19] R. Smith. “An overview of the Tesseract OCR Engine.” Proc. 9th Int. Conf. on Document Analysis and Recognition, IEEE, Curitiba, Brazil, Pages (629-633), Sep 2007.
[20] The Tesseract open source OCR engine, http://code.google.com/p/tesseract-ocr.
Citation
Aditya Rawat and Suvigya Awasthi, "Dynamic Vehicle Management System Using Fast Optical Character Recognition Technique," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.76-81, 2015.
A Comparative analysis of Association rule excavating in Big Data Mining Algorithms
Review Paper | Journal Paper
Vol.3 , Issue.6 , pp.82-88, Jun-2015
Abstract
In Data Mining Research, Association rule mining plays a significant role in data mining. This paper presents the review of Association rule mining. The analysis of research survey would give the instruction concerning somewhat has been done previously in the same area, what is the present tendency and what are the other related areas. Big data is the word for a set of data sets which are enormous and convoluted, it holds structured and unstructured both varieties of data. Data comes from everywhere, sensors used to amass climate information, posts to social media sites, digital pictures and videos etc. This data is known as big data. Useful data can elicit from this big data with the help of data mining. In this paper, the association rule of data mining and advanced big data mining algorithms are scrutinized.
Key-Words / Index Term
Association rule, Apriori Algorithm Big data mining, Data mining
References
[1] R. Agarwal and R. Srikant,“Fast Algorithms for Mining Association Rules.”, International Conference on very large Databases, proc 20th, pp 487-499, June 1994.
[2] Khurana K and Sharma S, ―A comparative analysis of association rule mining algorithms, International Journal of Scientific and Research Publications, Volume 3, Issue 5, pp 38-45, May 2013.
[3] Borgelt, C. “Efficient Implementations of Apriori and Eclat”. Workshop of frequent item set mining implementations (FIMI 2003, Melbourne, FL, USA).
[4] Hunyadi, D.”Performance comparison of Apriori and FP-Growth Algorithms in Generating Association Rules”.Proceedings of the European Computing Conference ISBN: 978-960-474-297-4.
[5] Thieme, S.L. “Algorithmic Features of Eclat”. FIMI, Volume 126 of CEUR Workshop Proceedings, CEUR- WS.org, 2004.
[6] Ms. Dhamdhere Jyoti L., Prof. Deshpande Kiran B. "An Effective Algorithm for Frequent Itemset Mining on Hadoop.", International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 8, August 2014.
[7] Agrawal, R., Shafer, J.C., "Parallel mining of association rules.", IEEE Transactions on Knowledge and Data Engineering, Volume.8, no.6, pp 962-969, Dec 1996.
[8] A. Swami, T. Imielienski, R. Agrawal," Mining Association Rules between Sets of Items in Large databases.", ACM Press, pp 207–216, July 1993
[9] Brain.s Motwani R,Ullman.J.D and S. Tsur,"Dynamic itemsets counting and implication rules for market basket analysis.", ACM-SIGMOD ,pages 255-264, May 1997.
[10] Ferenc Kovacs and Janos Illes “Frequent Itemset Mining on Hadoop.”,IEEE 9th International conference on Computational Cybernetics, Volume 2 Issue 4, June 2013.
Citation
Ahilandeeswari. G, DR.R.Manicka Chezian, "A Comparative analysis of Association rule excavating in Big Data Mining Algorithms," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.82-88, 2015.
Role of Suffix Array in String Matching: A Comparative Analysis
Review Paper | Journal Paper
Vol.3 , Issue.6 , pp.89-93, Jun-2015
Abstract
Text search is a classical problem in Computer Science, which reside in many data-intensive applications. For this problem, suffix arrays are the most widely known and used data structures, which enabling fast searches for phrases, terms, substrings and regular expressions in large texts. Potential application domains of this method includes large-scale search services, such as Web search engines, plagiarism checker where it is necessary to efficiently process intensive traffic streams of on-line queries. Suffix array is an effective way to construct the index of the full text i.e. sorted array of all suffix of string which is important for different kind of applications, perhaps most notably string matching, string discovery and block-sorting data compression. This paper elucidates intensive research toward efficient construction of suffix arrays with algorithms striving not only to be fast, but also “lightweight” (in the idea that they use small working memory).
Key-Words / Index Term
Suffix sorting, Suffix array, fm index, trie structure
References
[1] Member, Ubi;Myers, Geene. “Suffix arrays:a new method for online string search” First annual ACM-SIAM Journel on Computing 22, (1993).
[2] Abouelhoda, Mohamed Ibrahim; Kurtz, Stefan; Ohlebusch, Enno "Replacing suffix trees with enhanced suffix arrays". Journal of Discrete Algorithms 2: 53, (2004).
[3] Gog, Simon, Alistair Moffat, J. Culpepper, Andrew Turpin, and Anthony Wirth. "Large-scale pattern search using reduced-space on-disk suffix arrays." IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 8, AUGUST 2014.
[4] Ahmed Abdelhadi, A. H. Kandil1 and Mohamed Abouelhoda. “Cloud-based Parallel Suffix Array Construction based on MPI ” Middle East Conference on Biomedical Engineering (MECBME) ,(2014).
[5] Stefan Burkhardt, Andreas Crauser, Eric Rivals, Hans, martin. “q-gram based database searching using suffix array (quasar)” ,2006.
[6] Diego Arroyuelo, Carolina Bonacic, Veronica Gil-Costa, Mauricio Marin Gonzalo Navarro. “Distributed text search using suffix arrays” Elsevier Journal ,28 june 2014.
[7] Maan Haj Rachid, Qutaibah Malluhi, and Mohamed Abouelhoda. “A space-efficient solution to find the maximum overlap using a compressed suffix array .” Middle East Conference on Biomedical Engineering (MECBME) , 2014.
[8] Shunlai Bai, Wenhao Zhu, Bofeng Zhang , Jianhua Ma. “Search Results Clustering Based on Suffix Array and VSM .” IEEE/ACM International Conference on Green Computing and Communications & 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing , 2010.
[9] Juha Ka ̈rkka ̈inen , Peter Sanders , Stefan Burkhardt. “Linear Work Suffix Array Construction .” ACM Journal, Volume 53 Issue 6, (2006).
[10] Mohammadreza Ghodsi . “Approximate String Matching using Backtracking over Suffix Arrays .” Computer Science Department of University of Maryland at College Park , 2009.
[11] Nataliya Timoshevskaya, Wu-chun. “SAIS-OPT: On the Characterization and Optimization of the SA-IS Algorithm for Suffix array construction” IEEE Transaction, 2014.
[12] Hongwei Huo, Longgang Chen, Jeffrey Scott Vitter and Yakov Nekrich. “A Practical Implementation of Compressed Suffix Arrays with Applications to Self-Indexing.” IEEE Journel DOI 1109.2014.49, 2014.
[13] Ricardo Baeza-Yates . “Modern information retrieval.” ACM press, 1999.
[14] Esko Ukkonen , “On–line construction of suffix trees.”Algorithmatica , Volume 14, Issue 3, 1995, pp 249-260.
Citation
Nagendra Singh, "Role of Suffix Array in String Matching: A Comparative Analysis," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.89-93, 2015.
Feature Subset Selection Using Genetic Algorithms for Handwritten Kannada Alphabets Recognition
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.94-99, Jun-2015
Abstract
The process of pattern recognition pose quiets a lot of challenges especially in recognizing hand-written scripts of different languages in India, in spite of several advancement in technologies pertaining to optical character recognition (OCR). Handwriting continues to persist as means of documenting information for day today life especially in rural areas. There exist a need to develop handwritten character recognition system for its applications in post offices, bank cheque processing, handwritten document processing etc,. In this paper a handwritten Kannada alphabets recognition using neuro-genetic hybrid system is proposed which makes use of wavelet transform coefficients as feature vectors. Subset of these feature vectors is selected using genetic algorithm and is given to neural network for classification. Higher degree of accuracy in results has been obtained with the implementation of this approach on a comprehensive database compared to conventional systems.
Key-Words / Index Term
Pattern Recognition, OCR, Wavelets Transformation, Kannada alphabets, Genrtic algorithms, Neural Networks
References
[1] K V Prema_ and N V Subbareddy- Two-tier architecture for unconstrained handwritten character recognition-SadhanaVol. 27, Part 5, October 2002, pp.585-594.
[2] Hyun-Chul Kim, Daijin Kim, Sung Yang Bang-A numeral character recognition using PCA mixture model, pattern recognition letters, Vol 23, 2002, pp.103-111
[3] G Y Chen, T D Bui, A. Krzyzak-Contour based numeral recognition using mutiwavelets and neural networks, pattern recognition letters, Vol 36, 2003, pp.1597-1604
[4] RejeanPlamondon, Sargur.N.Srihari, On-line and Off-line Handwriting Recognition: A Comprehensive survey, IEEETrans,Pattern Analysis and Machine Intelligence, vol 22, no 1, pp 63-79,Jan 2000
[5] Claus Bahlmann-Directional features in online handwriting recognition, pattern recognition letters, Vol 39, 2006, pp.115-125
[6] Oivind Due Trier, Anil.K.Jain and TorfinnTaxt,-Feature Extraction Methods for Character Recognition – A Surve, July 1995.
[7] Alexander Goltsev, Dmitri Rachkovskij-Combination of the assembly neural network with a perceptron for recognition of handwritten digits arranged in numeral strings, pattern recognition letters, Vol 38, 2005, pp.315-322
[8] Bailing Zhang, Minyue Fu, Hong Yan-A nonlinear neural network model of mixture of local principal component analysis: application to handwritten digits recognition, pattern recognition letters, Vol 34, 2001, pp.203-214
[9] Cheng-Lin Liu, Kazuki Nakashima, Hiroshi Sako, Hiromichi Fujisawa, Handwritten digit recognition: investigation of normalization and feature extraction techniques, Jun 2003
[10] R. JagadeeshKannan and R. Prabhakar- Off-Line Cursive Handwritten Tamil Character Recognition-WSEAS TRANSACTIONS on SIGNAL PROCESSING- ISSN: 1790-5052 Issue 6, Volume 4, June 2008.
[11]G. G. Rajput, RajeswariHorakeri, SidramappaChandrakant- Printed and Handwritten Mixed Kannada Numerals Recognition Using SVM- IJCSE- Vol. 02, No. 05, 2010, 1622-1626
[12] N.Arica and F.T.Yarman_Vural-One dimensional representation of two dimensional information for HMM based handwriting recognition, Pattern recognition letters, vol-21(2000)583-592
[13] Frank Z. Brill, Donald E. Brown and Worthy N.Martin-Fast Genetic Selection of Features for Neural Network Classifiers, IEEE Transaction on neural networks Vol.3, No.2, March-1992.
[14] Seon-Whan Lee-Off-Line Recognition of Totally Unconstrained Handwritten Numerals Using Multilayer Cluster Neural Network, IEEE Transaction on Pattern Analysis and Machine Intelligence Vol.18, No.6, June-1996
[15] Sung-Hyuk Cha, Charles C.Tappert, and Sargur N Srihari-Optimizing Binary Feature Vector Similarity Measure using Genetic Algorithm and Handwritten Character Recognition, Proceedings of ICDAR’03, 0-7695-1960-1/03IEEE.
Citation
Sreedharamurthy S K and H.R.Sudarshana Reddy, "Feature Subset Selection Using Genetic Algorithms for Handwritten Kannada Alphabets Recognition," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.94-99, 2015.
A Survey on Cognitive Biometrics: EEG based approach to user recognition
Survey Paper | Journal Paper
Vol.3 , Issue.6 , pp.100-103, Jun-2015
Abstract
Recent advances in signal processing have made possible the use of brain waves or EEG signals for user recognition and also for communication between human and computers. Electroencephalography (EEG) is sensitive to electrical field generated by the electric currents in the brain, and EEG recordings are acquired with portable and relatively inexpensive devices when compare to the other brain imaging techniques. EEG signals are representative signals containing the information about state of human brain. EEG signals are sometimes uses for clinical applications for medical diagnostics. The shape of the wave may contain useful information about the state of the brain. It has been known that different regions of the brain are activated according to the associated mental status, for example, emotional status, cognitive status, etc. Since the difference in activities of the brain causes the difference in characteristics of EEG, it has been attempted to investigate the brain activity through analyzing EEG.
Key-Words / Index Term
Electroencephalography (EEG), brain rhythms, biometrics, Brain Computer Interfacing (BCI), Feature Extraction, Auto-regression, Classification
References
[1] Patrizio Campisi , Daria La Rocca, “Brain Waves for Automatic Biometric-Based User Recognition” IEEE Trans on Info Forensics and security , vol. 9, no. 5, may 2014.
[2] Zhenghui Gu, Zhuliang Yu, Zhifang Shen, and Yuanqing Li “An Online Semi-supervised Brain Computer Interface ” IEEE Tran On Biomedical Engg, VOL. 60, NO. 9, 2013
[3] J. Klonovs, C. Petersen, H. Olesen, and A. Hammershoj, “ID proof on the go: Development of a mobile EEG-based biometric authentication system,” IEEE Veh. Technol. Mag., vol. 8, no. 1, Mar. 2013.
[4] C. He and Z. J. Wang, “An independent component analysis (ICA) based approach for EEG person authentication,” in Proc. 3rd ICBBE, 2010.pp.1-10
[5] Ramaswamy Palaniappan, “Two-stage biometric authentication method using Thought activity brain waves”, Department of Computing and Electronic Systems, University of Essex, Colchester, CO4 3SQ, United Kingdom.
[6] Khalid, M.B.; Rao, N.I.; Rizwan-i-Haque, I.; Munir, S.; Tahir, F., “Towards a Brain Computer Interface Using Wavelet Transform with Averaged and Time Segmented Adapted Wavelets”, In Proceedings of the 2nd International Conference on Computer, Control and Communication (IC4’09) Karachi, Sindh, Pakistan, February 2009; pp. 1–4.
[7] M. Näpflin, M. Wildi, and J. Sarnthein “Test–retest reliability of resting EEG spectra validates a statistical signature of persons,” Clin. Neurophysiol., vol. 118, no. 11, pp. 2519–2524, 2007.
[8] Y. Boytsova and S. Danko, “EEG differences between resting states with eyes open and closed in darkness,” Human Physiol., vol. 36, no. 3, pp. 367–369, 2010.
[9] R. Palaniappan, “Two-stage biometric authentication method using thought activity brain waves,” Int. J. Neural Syst., vol. 18, no. 1, pp. 59–66, 2008.
[10] C. He and Z. J. Wang, “An independent component analysis (ICA) based approach for EEG person authentication,” in Proc. 3rd ICBBE, 2010, pp. 1–10.
[11] T. O’Donoghue et al., “A NOS1 variant implicated in cognitive performance influences evoked neural responses during a high density EEG study of early visual perception,” Human Brain Mapping, vol. 33, no. 5, pp. 1202–1211, 2012.
[12] M. Fernandes et al., “Wearable brain cap with contactless electroencephalogram measurement for brain-computer interface applications,” in Proc. 4th Int. IEEE EMBS Conf. Neural Eng., Apr./May 2009, pp. 387–390.
Citation
Bhagyashri D. Dangewar, and R. V. Pujeri, "A Survey on Cognitive Biometrics: EEG based approach to user recognition," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.100-103, 2015.