Image Caption Generation Using Deep Learning
Technical Notes | Journal Paper
Vol.06 , Issue.10 , pp.53-55, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si10.5355
Abstract
From the perspective of humans and computers, a picture can be interpreted in distinct manner. In the case of humans, a picture will be clearly a few description or scene of a motion or environment and so forth, whilst with respect to computers, it is just a few aggregates of pixels or digital numbers. The system of photo captioning offers with assigning inner facts in the shape of captions with the aid of extracting the applicable functions from an input picture. This venture aims at producing meaningful captions for a given picture. The proposed work is based on deep neural networks. The proposed work has three fundamental units. The first is the picture module that is given as input to the function extractor unit. The next unit is a feature extractor unit based on CNN (Convolutional Neural Network) which extracts the applicable characteristic. The final unit is the language generator. It generates sentences that describe the input image. To assess the quality of the generated textual content, BLEU(Bi-Lingual Evaluation Understudy) rating is used. Suitable captions will help the users to search snapshots with lengthy queries. Such systems may also be beneficial for visually impaired humans in understanding pictures.
Key-Words / Index Term
BLEU rating, captions, CNN, deep neural network
References
[1] Chen and C. L. Zitnick, "Mind`s eye: A recurrent visual representation for image caption generation," 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR),Boston, MA, 2015, pp. 2422-2431.
[2] J. Donahue et al., "Long-Term Recurrent Convolutional Networks for Visual Recognition and Description," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, Issue 4, pp. 677-691, April 1 2017.
[3] V. B. Kumar, T. R. Baadkar, and V. Joshi, "CRYPTANITE: A New Look to the World of Social Networks Using Deep Learning," 2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS),Naples, 2016, pp. 358-364.
[4] Arnab Ghoshal, Pavel Ircing, Sanjeev Khudanpur "Hidden Markov Models for Automatic Annotation and Content-Based Retrieval of Images and Video".
[5] Zajic R. Schwartz, D & Door, B & Schwartz, Richard "Automatic Headline Generation for Newspaper Stories", 2018.
[6] PHILO SUMI , ANU.T.P " A Systematic Approach for News aption Generation", International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014), Vol. 2, Issue 2, Ver. 1 (April -June 2014).
[7] K. Ramnath et al., "AutoCaption: Automatic caption generation for personal photos," IEEE Winter Conference on Applications of Computer Vision, Steamboat Springs, CO, 2014, pp. 1050-1057.
Citation
Sailee P. Pawaskar, J. A. Laxminarayana, "Image Caption Generation Using Deep Learning", International Journal of Computer Sciences and Engineering, Vol.06, Issue.10, pp.53-55, 2018.
Garbage Management Using Internet of Things
Survey Paper | Journal Paper
Vol.06 , Issue.10 , pp.56-59, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si10.5659
Abstract
Increasing population and unhealthy lifestyle in urban and semi-urban areas is giving rise to catastrophic decline in cleanliness of surroundings. Recently there are several government programs and NGOS that are focused in making people aware in keeping their surroundings clean. This paper discusses about a system designed using Internet of Things (IoT) which informs organization as soon as garbage bin is full. Organization may include government body or any private firm that is responsible for garbage collection. Various sensors help detecting when the garbage bin is full and then via telegram it will inform the organizations to act. Gas sensor helps to detect toxic and harmful gases. To detect fire in garbage bin temperature sensor is placed, if the temperature goes beyond the predefined threshold value or presence of harmful gas is detected, alarm will be raised to alert the nearby people and organization will be notified using telegram. This will help to keep the polluted places clean in a smart and effective way. The organization will be notified by the system automatically, when the garbage bin is filled, which reduces time for manual checking.
Key-Words / Index Term
IoT, sensors, RPI
References
[1] Medvedev A., Fedchenkov P., Zaslavsky A., Anagnostopoulos T., Khoruzhnikov S. (2015) “Waste Management as an IoT-Enabled Service in Smart Cities”. In: Balandin S., Andreev S., Koucheryavy Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART 2015. Lecture Notes in Computer Science, vol 9247. Springer, Cham
[2] Misra, Debajyoti, et al. "An IoT-based waste management system monitored by cloud" Journal of Material Cycles and Waste Management (2018): 1-9.
[3] Anagnostopoulos, Theodoros, et al. "Challenges and opportunities of waste management in IoT-enabled smart cities: a survey" IEEE Transactions on Sustainable Computing 2.3 (2017): 275-289.
[4] Gutierrez, Jose M., et al. "Smart waste collection system based on location intelligence" Procedia Computer Science 61 (2015): 120-127.
[5] Akhtar, Mahmuda, et al. "Backtracking search algorithm in CVRP models for efficient solid waste collection and route optimization" Waste Management 61 (2017): 117-128.
[6] Cristóbal, Jorge, et al. "Prioritizing and optimizing sustainable measures for food waste prevention and management" Waste Management 72 (2018): 3-16.
[7] Kiddee, Peeranart, Ravi Naidu, and Ming H. Wong. "Electronic waste management approaches: An overview" Waste Management 33.5 (2013): 1237-1250.
[8] Sharmin, Sadia, and Sikder Tahsin Al-Amin. "A Cloud-based dynamic waste management system for smart cities" Proceedings of the 7th Annual Symposium on Computing for Development. ACM, 2016.
[9] Zhao, Yiran, et al. "VibeBin: A Vibration-Based Waste Bin Level Detection System" Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1.3 (2017): 122.
[10] Sharmin, Sadia, and Sikder Tahsin Al-Amin. "A Cloud-based dynamic waste management system for smart cities" Proceedings of the 7th Annual Symposium on Computing for Development. ACM, 2016.
Citation
Reeja S R, Kumar Abhishek Gaurav, Ladly Patel, Rino Cherian, "Garbage Management Using Internet of Things", International Journal of Computer Sciences and Engineering, Vol.06, Issue.10, pp.56-59, 2018.
Grammar And Context Based Approach For Identification And Translation Of Proverbs Using Trie-Based Ontology
Review Paper | Journal Paper
Vol.06 , Issue.10 , pp.60-63, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si10.6063
Abstract
Most current machine translation systems for translation from English to regional Indian languages ignore the presence of idioms in the text or return the exact literal meaning of the phrase in another language which loses the essence of the proverb. The main issues that arise include timely detection of the proverbs from a given paragraph and the separate processing required for translations of idioms into other languages. This paper presents a combination of natural language grammar-based approach and context-based approach towards detection of idioms in given English text and further presents a trie-based ontology that can be used to translate proverbs into regional languages. The grammar-based approach involves parsing English sentences and identifying the parts-of-speech tags and determining statistically the probability whether the given sentence is a proverb using certain grammar-based rules applicable for only proverbs. The context-based approach classifies and compares keywords in the proverbs and the keywords present in remaining part of the paragraph. Based on the combination of these two approaches, the proverb can be determined with better accuracy. For quick translation of detected proverbs into regional languages, keyword based priority search can be implemented on previously developed trie-based ontology using parts-of-speech tags.
Key-Words / Index Term
Machine translation, Proverbs, Idioms, English, Regional Languages, grammar-based approach, classification, context-based approach, trie-based ontology
References
[1] D. Pisharoty, P. Sidhaye, H. Utpat, S. Wandkar, R. Sugandhi, “Extending capabilities of english to marathi machine translator”, IJCSI International Journal of Computer Science Issues, Vol.9, Issue No.3, May 2012. ISSN (Online): 1694-0814.
[2] M. Sharma, V. Goyal, “Extracting proverbs in machine translation from hindi to punjabi using regional data approach”, International Journal of Computer Science and Communication, Vol. 2, No. 2, pp. 611-613, July-December 2011.
[3] V. K. Birla, M. N. Ahmed, V. N. Shukla, “Multiword expression extraction – text processing”, In the Proceedings of ASCNT – (2009), CDAC, Noida, India pp. 72-77, 2009.
[4] V. Goyal and Priyanka, “Implementation of rule based algorithm for sandhi-vicheda of compound hindi words”, International Journal of Computer Science Issues, No. 3, pp. 45-49, 2009.
[5] K. Toutanova, C. D. Manning, “Enriching the knowledge sources used in a maximum entropy part-of-speech tagger”, In the Proceedings of the 2000 joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora (EMNLP/VLC-2000), pp. 63-70, 2000.
[6] K. Toutanova, D. Klein, C. Manning, Y. Singer, “Feature-rich part-of-speech tagging with a cyclic dependency network”, In the Proceedings of 2003 HLT-NAACL, pp.252-259, 2003.
[7] R. Balyan, S. K. Naskar, A. Toral, N. Chatterjee, “A diagnostic evaluation approach targeting MT systems for indian languages”, In Proceedings of the 2012 Workshop on Machine Translation and Parsing in Indian Languages (MTPIL-2012), pp. 61-72, COLING 2012, Mumbai, December 2012.
[8] L. R. Nair, P. S. David, “Machine translation systems for indian languages”, International Journal of Computer Applications, Vol. 39, No. 1, February 2012. ISSN: 0975-8887.
Citation
Naziya Shaikh, "Grammar And Context Based Approach For Identification And Translation Of Proverbs Using Trie-Based Ontology", International Journal of Computer Sciences and Engineering, Vol.06, Issue.10, pp.60-63, 2018.
A quantitative report on the present strategies of Graphical authentication
Survey Paper | Journal Paper
Vol.06 , Issue.10 , pp.64-73, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si10.6473
Abstract
The foremost common authentication strategy is to use alphanumeric usernames and passwords. This strategy has been appeared to posses critical disadvantages. Clients prefer to choose passwords which are effectively speculated. At the same time, if the password is difficult to figure, then at that point its obviously difficult to keep in mind. To solve this issue a few analyst have created verification strategy’s that utilizes images as passwords. This paper examines the qualities of the existing graphical passwords methodologies and we try to answer a question “whether a graphical password more secure to a text based password”?
Key-Words / Index Term
Authentication strategy, graphical passwords, secure passwords
References
[1] Fledmeier, D’ and Karn, P., UNIX password security ten years later .In proceedings of the 19th International Conference on Advances in Cryptology (CRYPTO ‘89). Lecture Notes in Computer Science, Vol 435, Springer , Verlag
[2] Sobrado , L, Briget,J.C.,Graphical Password , The Rutgers Scholar, An electronic bulletin of Undergraduate Research, Vol 4. 2007
[3] Adams, A., Sasse, M.A.and Lunt, P., Making Passwords Secure and Usable, in H.Thimbleby, leby, B. O’connailal and P. Thomas(Eds), HCI’97-people and computers XII, Springer-Verlag, Bristol ,pp.1-20,1997
[4] L.Y.Por, X.T.Lim,M.T.Su,F.Kianoush. The Design and Implementation of Background Pass-Go Scheme Towars Security Threat, WSEAS Transactions on INFORMATION SCIENCE & APPLICATION ISSN:1790-0832,Issue 6,Volume 5 June 2008.
[5] Wanli Ma,John Campbell,Dat Tran and Dale Kleeman, A conceptual Fran=me work for accessing Passwords Quality,IJCSNS, International Journal of Computer Science and Network Security, Vol. 7 No1 pp 179-185,2007
[6] Klein, D., Foiling the Cracker: a Survey of improvements to password security, Proceedings of the 2nd USENIX security workshop,http://www.citeseer.ist.psu.edu/112514.html,May 2008
[7] Paivio A., Rogers, T.B., and Symthe,P.C. 1968. Why are pictures easier to recall than words? Psychonomic Science,11:137-138,1968
[8] R.Dhamija and A.Perrig,”Déjà vu: A user Study using Images for authentication”, in Proceedings of 9th USENIX Security Symposium,2000
[9] T. Pering, M. Sundar, J. Light, Roy W,” Photographic Authentication through Untrusted Terminals”, IEEE Pervasive Computing, January 2003,PP 30-36
[10] S.Akula & V. Devisetty, ” Image Based Registration and Authentication System” in Proceedings of Midwest Instruction & Computing Symposium,2004
[11] S.Wiedenbeck, j. Waters,J.C. Birget, A.Brodskiy, N.Memon, “Design and Longitudinal evaluation of a graphical password system”, International Journal of Human Computer Studies 63(2005) 102-127.
[12] L.Y. Por, X. T. Lim, M.T. Su, F. Kianoush,”The Design and Implementation of Background Pass-Go Scheme Towards security Threats” WSEAS Transactions on Information science and Applications, ISSN:1790-0832, Issue 6, Volume 5, June 2008
[13] Dhruv KumarYadav,Beatrice Ionascu, Sai Vamsi Krishna Ongole,Aditi Roy, Nasir Memon, “Design and Analysis of Shoulder Shurfing Resistant Pin Based Authentication Mechanisms on Google Glass”, International conference on Financial cryptography and Data Security, pppp281-297,2015
[14] Chen Sun,Yang Wang, Jun Zheng “Dissecting pattern unlock:The effect of pattern strength meter on pattern selection” Journal of information security and applicaions Nov 2014, Elsevier,pp308-320
[15] Adam J Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, Jonathan M Smith,”Smudge attacks on smartphone touch screens” WOOT’10 Proceedings of the 4th USENIX conference on Offensive technologies Article No.1-7 Washington DC, USENIX Association Berkley, CA
[16] Sebastian Uellenbeck, Markus Durmuth, Christopher Wolf and Thorsten Holz, CCS’13 Proceedings of the 2013 ACM SIGSAC conference of Computer & Communication security, Pages 161-172. Berlin Germany November 04-08,2013, ACM New york NY
[17] Blasé Ur, Patrick Gage Kelley,saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek,Timothy Passaro, Richard Shay,Timothy Vidas,Lujo Bauer, Nicholas Christin,Lorrie Faith Cranor,”How does your Password measure up?” The effet of strength meters on password creation”, ACM,Proceeding Security’12 Proceedings of the 21st USENIX conference on Security Symposium, Bellevue ,WA, USENIX Association Berkeley, CA,USA.
[18] Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, Cormac Herley, “Does my password go up to eleven? The impact of Password Meters on Password Selection” CHI’13 ,Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Pg 2379-2388, Paris, France –April 27- May 02-2013
[19] Blasé Ur, Felicia Alfieri, maung Aung,Lujo Bauer, Nicholas Christin, Jessica Colnago, Lorrie Faith Cranor, henry Dixon, Pardis Emami Naeini, Hana Habib, Noah Johnson, William Melicher, “Design and evaluation of Data-Driven Password Meter” CHI’17 ,Conference on Human Factors in Computing Systems, pg. 3775-3786,ACM ,ISBN:978-1-4503-4655-9
[20] L.D. Paulson “Taking a graphical Password to the approach”, Computer(Volume 35,Issue 7,July 2002),IEEE Computer Society
[21] S. Brostoff and M. A.Sasse, “Are Passfaces maore usable than passwords”, a field trial investigation in peiolple and computers XIV- Usability or Else:Proceedings of HCI, Sunderland, Uk: Springer-Verlag 2000
[22] D. Davis F. Monrose and M.K. Reiter,”On User choice in graphical Password Scheme” in proceedings of the 13th USENIX Security Symposium, San Diego, CA , 2004
[23] W.Jansen, S. gavrila, V Korolev, R Ayers and R Swanstorm, “Picture Password: A Visual Login technique for Mobile devices” National Institute of Standards and Technology Interagency Report NISTIR 7030,2003
[24] W. A. Jansen “Authenticating users on Handheld Devices” in proceedings of Canadian Information Technology Security Symposium,2003
[25] W.Jansen “Authenticating Mobile Device Users through image Selection” in Data Security,2004
Citation
Norman Dias, Reeja S R, "A quantitative report on the present strategies of Graphical authentication", International Journal of Computer Sciences and Engineering, Vol.06, Issue.10, pp.64-73, 2018.