Adaptive Switching De-noising Filter Cascaded with Cuckoo Search Algorithm to Minimize the Mean Error – Medical Image Application
Research Paper | Journal Paper
Vol.06 , Issue.04 , pp.1-7, May-2018
Abstract
This paper presented the new work to minimize the mean absolute error of mammogram breast image which is highly corrupted by impulse noise density. The proposed methodology is implemented with the Adaptive Switching Weighted Median (ASWM) Filter cascaded with Cuckoo Search (CS) optimization algorithm. The efficient adaptive filter de-noises the medical image by detecting the corrupted pixel and replaces them with the median value. The CS algorithm minimizes the error rate between the ASWM filter image and corrupted image. It minimizes the Mean Absolute Error (MAE) percentage and also maximizes the Peak Signal to Noise Ratio (PSNR). This method removes the highly corrupted impulse noise of 90%. The experimental analysis is made and it is observed from the result that the proposed method is far superior to the other conventional techniques in terms of qualitative and quantitative factors. In terms of visual quality, it yields a well sharp edge region and better visual perception of the image quality.
Key-Words / Index Term
Switching filter, image de-noising, impulse noise, optimization technique, Cuckoo search algorithm
References
[1] Ramya, A., Murugan, V. and Murugan, D., 2017. Non-Linear Directive Contrast Filter for Mammogram Images to Enhance Pleomorphic Calcification. International Journal of Computer Applications, 163(7).
[2] Bhandari, A.K., Kumar, D., Kumar, A. and Singh, G.K., 2016. Optimal sub-band adaptive thresholding based edge preserved satellite image denoising using adaptive differential evolution algorithm. Neurocomputing, 174, pp.698-721.
[3] Javaid, Q., Arif, M., Shah, M.A. and Nadeem, M., 2018. A hybrid technique for De-Noising multi-modality medical images by employing cuckoo`s search with curvelet transform. Mehran University Research Journal Of Engineering & Technology, 37(1), p.29.
[4] Borra, S.R., Reddy, G.J. and Reddy, E.S., 2016. An efficient fingerprint enhancement technique using wave atom transform and mcs algorithm. Procedia Computer Science, 89, pp.785-793.
[5] Faragallah, O.S. and Ibrahem, H.M., 2016. Adaptive switching weighted median filter framework for suppressing salt-and-pepper noise. AEU-International Journal of Electronics and Communications, 70(8), pp.1034-1040.
[6] Yang, X.S. and Deb, S., 2009, December. Cuckoo search via Lévy flights. In Nature & Biologically Inspired Computing, 2009. NaBIC 2009. World Congress on (pp. 210-214). IEEE.
[7] Yang, X.S., 2014. Nature-inspired optimization algorithms. Elsevier.
[8] Mareli, M. and Twala, B., 2017. An adaptive Cuckoo search algorithm for optimisation. Applied Computing and Informatics.
[9] Ye, Z., Wang, M., Hu, Z. and Liu, W., 2015. An adaptive image enhancement technique by combining cuckoo search and particle swarm optimization algorithm. Computational intelligence and neuroscience, 2015, p.13.
[10] Babu, R.K. and Sunitha, K.V.N., 2015. Enhancing digital images through cuckoo search algorithm in combination with morphological operation. Journal of Computer Science, 11(1), p.7.
[11] Ashour, A.S., Samanta, S., Dey, N., Kausar, N., Abdessalemkaraa, W.B. and Hassanien, A.E., 2015. Computed tomography image enhancement using cuckoo search: a log transform based approach. Journal of Signal and Information Processing, 6(03), p.244.
[12] Wang, Z. and Zhang, D., 1999. Progressive switching median filter for the removal of impulse noise from highly corrupted images. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 46(1), pp.78-80.
[13] Srinivasan, K.S. and Ebenezer, D., 2007. A new fast and efficient decision-based algorithm for removal of high-density impulse noises. IEEE signal processing letters, 14(3), pp.189-192.
[14] Meher, S.K. and Singhawat, B., 2014. An improved recursive and adaptive median filter for high density impulse noise. AEU-International Journal of Electronics and Communications, 68(12), pp.1173-1179.
[15] Nair, M.S. and Mol, P.A., 2013. Direction based adaptive weighted switching median filter for removing high density impulse noise. Computers & Electrical Engineering, 39(2), pp.663-689.
[16] Gupta, V., Chaurasia, V. and Shandilya, M., 2015. Random-valued impulse noise removal using adaptive dual threshold median filter. Journal of visual communication and image representation, 26, pp.296-304.
[17] Gandomi, A.H., Yang, X.S. and Alavi, A.H., 2013. Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems. Engineering with computers, 29(1), pp.17-35.
Citation
A. Ramya, D. Murugan , T. Ganesh Kumar, S. Vijaya Kumar , "Adaptive Switching De-noising Filter Cascaded with Cuckoo Search Algorithm to Minimize the Mean Error – Medical Image Application", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.1-7, 2018.
The Enhancement of Character and Non-Character images using Extensive segmentation Techniques
Research Paper | Journal Paper
Vol.06 , Issue.04 , pp.8-13, May-2018
Abstract
The research work presents detection of different types of text in scene images based on extensive segmentation (proposed method) to generate character candidate regions. We usually consider many connected regions as candidates, which aim to capture character regions as many as possible. Key feature of exhaustive segmentation technique, which exactly segments character candidate region in scene images from non-character candidate region also. First, we detect candidate text regions using Maximally Stable External Region (MSER method) where the scene image has been converted to gray image and to find the text region. Second, the geometric properties of text on the image are used to filter out non-text regions using simple thresholds. Third, we remove the rest Non-Text region based on Stroke Width Variation (SWV). Finally, we merge the entire text region from the detection of Text and thus recognise the Detected Text in the scene image. We use public dataset, namely, the Street View Text dataset and some other language (Tamil, Hindi and Chinese) images to evaluate the performance of our(extensive segmentation) method. The experimental results are shown that our(extensive segmentation) method achieves excellent improvement in the detection of text though the images being blurred, low-resolution and small in size from the existing method(Yuenwang et al.). We also achieve considerable rate of recall with the executed images.
Key-Words / Index Term
digitization, Exhaustive segmentation, stroke Width Variation
References
[1] Yuanwang Wei, Zhijiang Zhang, Wei Shen, Dan Zeng,, Mei Fang, Shifu Zhou, “Text detection in scene images based on exhaustive segmentation”,2017, Signal Processing: Image communication, 50, pg 1-8.
[2] L. Neumann, J. Matas, Real-time scene text localization and recognition, in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, Providence, RI USA, 2012, pp. 3538–3545.
[3] Lei Sun, QiangHuo, WeiJia, KaiChen, A robust approach for text detection from natural scene images, in: 2015 Pattern recognition, 48, pp. 2906-2920.
[4] Qixiang Ye, Qingming Huang, Wen Gao, Debin Zhao, Fast and Robust text detection in images and video frames, in :2005, Image and vision computing, 23, pp. 565 – 576.
[5] Juhua Liu, HaiSu, YaohuaYi, WenbinHu, Robust text detection via multi-degree of sharpening and blurring, in: 2016, Signal Processing, 124, pp. 259-265.
[6] B. Epshtein, E. Ofek, Y. Wexler, Detecting text in natural scenes with stroke width transform, in: 2010 IEEE Conference on Computer Vision and Pattern Recognition(CVPR), IEEE, San Francisco, California, USA, 2010, pp. 2963–2970.
[7] T. Wang, D.J. Wu, A. Coates, A.Y. Ng, End-to-end text recognition with convolutional neural networks, in: 2012 21st International Conference on Pattern Recognition (ICPR), IEEE, Tsukuba, 2012, pp. 3304–3308.
[8] K. Wang, B. Babenko, S. Belongie, End-to-end scene text recognition, in: 2011 IEEE International Conference on Computer Vision (ICCV), IEEE, Barcelona, Spain, 2011, pp. 1457–1464.
[9] K.I. Kim, K. Jung, J.H. Kim, Texture-based approach for text detection in images using support vector machines and continuously adaptive mean shift
[10] algorithm, IEEE Trans. Pattern Anal. Mach. Intell. 25 (12) (2003) 1631–1639.
[11] J. Gllavata, R. Ewerth, B. Freisleben, Text detection in images based on unsupervised classification of high-frequency wavelet coefficients, in: Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004, vol. 1, IEEE, Cambridge UK, 2004, pp. 425–428.
[12] L. Neumann, J. Matas, Text localization in real-world images using efficiently pruned exhaustive search, in: 2011 International Conference on Document Analysis and Recognition (ICDAR), IEEE, Beijing, China, 2011, pp. 687–691.
[13] T. Wang, D.J. Wu, A. Coates, A.Y. Ng, End-to-end text recognition with convolutional neural networks, in: 2012 21st International Conference on Pattern Recognition (ICPR), IEEE, Tsukuba, 2012, pp. 3304–3308.
Citation
S. Gopinathan, "The Enhancement of Character and Non-Character images using Extensive segmentation Techniques", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.8-13, 2018.
A Survey on Recovering High Resolution images by Using Various Image Restoration Techniques
Survey Paper | Journal Paper
Vol.06 , Issue.04 , pp.14-20, May-2018
Abstract
Now a day‘s Image Restoration plays an essential task, since it is one of the major components of image processing technique. Image Restoration is used to enrich the appearance of the Image. It is the process of recovering original image from degraded image, which also reduces and removes the degraded image was found using Point Spread Function (PSF).Degradation transpires in many forms namely Motion blur, Noise, Camera Misfocus. There are two types of Image restoration namely degradation model and restoration model. Degradation model includes different types of noise model and restoration model includes different types of Deconvolution algorithm. Deconvolution algorithm is divided into two parts namely Blind Image Deconvolution algorithm and Non-blind Image Deconvolution algorithm. Blind Image Deconvolution algorithm will not have knowledge about how image was degraded. Non-Blind Image Deconvolution algorithm will have knowledge about how image was degraded. In this paper, surveys on various image restoration techniques for recovering high resolution images are analysed.
Key-Words / Index Term
Point Spread Function, Blind Deconvolution, Degradation, Non-Blind Deconvolution
References
[1] J.S. Lee, Digital Image Enhancement and Noise Filtering by use ofLocal Statistics", IEEE Trans. On Pattern Analysis and. Machine Intelligence, Vol.PAMI-29, March,1980.
[2] Khare, C., & Nagwanshi, K. K. (2012). Image restoration technique with non linear filter. International Journal of Advanced Science and Technology, 39, 67-74.
[3] L. I. Rudin, S. Osher, and E. Fatemi, ―Nonlinear total variation based noise removal algorithms,‖Phys. D, vol. 60, pp. 259–268, 1992
[4] D. A. Fish, A. M. Brinicombe, and E. R. Pike, ―Blind deconvolution by means of the Richardson–Lucy algorithm, J. Opt. Soc.Am. A/Vol. 12, No. 1/January 1995
[5] Dong-Dong Cao, Ping Guo, ― Blind image restoration based on wavelet analysis IEEE, Machine Learning and Cybernetics, pp.4977 - 4982 , 2005.
[6] P. Simon celli and E.H. Adelson, ―Noise Removal via Bayesian Wavelet Coring,‖ Proc. IEEE Int‟l Conf. Image Processing
[7] Dong, Weisheng, Guangming Shi, and Xin Li. "Nonlocal image restoration with bilateral variance estimation: A low-rank approach." IEEE transactions on image processing 22.2 (2013): 700-711.
[8] Kalotra, Rinku, and Sh Anil Sagar. "A review: A novel algorithm for blurred image restoration in the field of medical imaging." International Journal of Advanced Research in Computer and Communication Engineering 3.6 (2014).
[9] M. Drulea and S. Nedevschi, Total variation regularization of local global optical flow,‖ in Proc. IEEE Conf. Intell. Transp. Syst. (ITSC),2011, pp. 318– 323
[10] R. Lagendijk, J. Biemond, and D. Boekee, Identification and restoration of noisy blurred images using the expectation-maximization algorithm,‖ IEEE Trans. Acoust. Speech Signal Process., vol. 38, no. 7, pp. 1180–1191, Jul. 1990
[11] Sorel, Michal, and Jan Flusser. "Space-variant restoration of images degraded by camera motion blur." IEEE Transactions on Image Processing 17.2 (2008): 105-116.
[12] J. Gil and R. Kimmel, ―Efficient dilation, erosion, opening and closing algorithms in Mathematical Morphology and its Applications to Image and Signal Processing V, J. Goutsias, L. Vincent, and D. Bloomberg, Eds. Palo-Alto, USA, June 2000, pp. 301.310, Kluwer Academic Publishers.
[13] Raid, A. M., et al. "Image restoration based on morphological operations." Int J Comput Sci Eng Inf Technol 4.3 (2014).
[14] Mishra, Sheelu, and Mrs Tripti Sharma. "Image Restoration Technique for Fog Degraded Image." International Journal of Computer Trends and Technology (IJCTT) 18.5 (2014): 208-213
[15] Olivier Le Meur ,Christine Guillemot,: Super resolution based inpainting IEEE Trans. On Image processing vol.pp no. 99 2013
[16] R. Fattal, "Single image dehazing", International Conference on Computer Graphics and Interactive Techniques archive ACM SIGGRAPH, 2008, pp. 1-9.
[17] Sathe, Chaitali P., Dr Shubhalaxmi P. Hingway, and Sheeja S. Suresh. "Image Restoration using Inpainting." International Journal 2.1 (2014).
[18] M. R. Banham and A. K. Katsaggelos, ―Digital Image Restoration‖, IEEE Signal Processing Magazine, vol. 14,no.2, pp. 24-41, 1997.
[19] Debakla, K., and M. Benyettou. "Image restoration using multilayer neural networks with minimization of total variation approach." IJCSI International Journal of Computer Science Issues 11.1 (2014): 2.
[20] Shelake, Ms Seemadevi M., Ms Trupti D. Deshmukh, and Mr Vijaykumar M. Shelake. "Image Restoration Techniques for Better Visualization."
[21] Kappeler, Armin, et al. "Video super-resolution with convolutional neural networks." IEEE Transactions on Computational Imaging2.2 (2016): 109-122.
[22] Kundur, D. and D. Hatzinakos, ―Blind Image Deconvolution‖, IEEE Signal Processing Magazine, vol. 13 (3), pp. 43-64, May 1996.
[23] Sroubek, Filip, Gabriel Cristóbal, and Jan Flusser. "A unified approach to superresolution and multichannel blind deconvolution." IEEE Transactions on Image Processing 16.9 (2007): 2322-2332
Citation
N. Krishnammal, G. Muthulakshmi, "A Survey on Recovering High Resolution images by Using Various Image Restoration Techniques", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.14-20, 2018.
A conceptual method to enhance the prediction of heart diseases using big data Techniques
Review Paper | Journal Paper
Vol.06 , Issue.04 , pp.21-25, May-2018
Abstract
As death rate due to heart diseases is increasing significantly, prediction of heart disease with required accuracy becomes a critical issue in health care industry. Data mining and machine learning algorithms, more specifically classification algorithm plays an important role in prediction. Still the accuracy of prediction is influenced by the evolving size of data, nature or format of data and velocity of data. Keeping these factors in mind, Big data based model has been proposed after a careful investigation on existing analytical algorithms. In this paper, some of the existing literature related to the prediction of heart diseases using data mining is presented. Inferences are drawn to find out the essential attributes to be considered for prediction. A study is carried out to find which algorithm will work better for prediction of heart diseases. With inference drawn, an approach is proposed based on Hadoop and MapReduce programming paradigm. It is proposed to employ Support Vector Machine(SVM) in parallel fashion in order to improve the accuracy of prediction. The overview of proposed model is presented.
Key-Words / Index Term
Bid data in prediction, classification techniques in heart disease prediction, parallel SVM
References
[1] Himanshu Sharma,M A Rizvi,”Prediction of Heart Disease using Machine Learning Algorithms:A survey”,International Journal of Recent and Innovation Trends in Computing and Communication”, Volume:5,Issue 8,pp.99-104
[2] Himanshu Sharma,M A Rizvi,”Prediction of Heart Disease using Machine Learning Algorithms:A survey”,International Journal of Recent and Innovation Trends in Computing and Communication”, Volume:5,Issue 8,pp.99-104
[3] V. Manikantan, S.Latha, ”Predicting the Analysis of Heart Disease Symptoms using Medicinal Data Mining Methods, conference paper,2013,pp.5-10
[4] T.Revathi,S.Jeevitha,”Comparitive study on Heart Disease Prediction System using Data Mining Techniques”, International Journal of Science and Research,2013,pp. 2120-2123
[5] Pediredla Praveen Kumar,Sunita a Yadwad V V D L Tejaswi, ”Prediction of Heart Disease using Hadoop Mapreduce”, International Journal of Computer Application (2250-1797) Volume 6– No.6, November – December 2016. Pp.1-8
[6] Shamsher Bahadur Patel,Pramod Kumar Yadav,Dr.D.P.Shukla,”Predict the Diagnosis of Heart Disease Patients using classification Mining Techniques”,Journal of Agricultural and Verterinary Science,Volume 4,Issue 2,2013,pp.61-64.
[7] Nidhi Bhatla,Kiran Jyoti,”An Analysis of Heart Disease Prediction Using Different Data Mining Techniques”,International Journal Of Engineering Research & Technology,Volume1, Issue 8,Oct-2012,pp.1-4
[8] Miss.Chaitrali.s,Dangare,Dr.Mrs.Sulabha S.Apte,”A Data Mining approach for prediction of heart disease using Neural Networks”,International Journal of Computer Engineering & Technology,Volume 3, October 2012,pp.30-40
[9] K.Thenmozhi,”Heart Disease Prediction using Classification with Different Decision Tree Techniques”,International Journal of Engineering Research and General Science ,Volume 2,Issue 6,October 2014,pp.6-11.
[10] V. Subha and M.Revathi, D.Murugan,” Comparative Analysis of Support Vector Machine Ensembles for the Heart disease prediction”, International Journal of Computer Science & Communication Networks,Vol 5(6),386 – 390,December 2015,pp.386-390.
[11] Megha Shahi,Er.Rupinder Kaur Guram,”Heart Disease Prediction System Using Data Mining Techniques –A Review”, International Journal of Technology and Computation, Volume 3, Issue 4, April 2017,pp.73-77.
[12] Shalet K.S, V.Sabarinathan, V.Sugumaran, V.J.Sarath Kumar,” Diagnosis of Heart disease using Decision Tree and SVM Classifier”, International Journal of Applied Engineering Research,ISSN 0973-4562 Vol.10 No.68(2015),pp.598-602.
[13] Dr.Siddaraju,Sowmya.c l,Rashmi k,Rahul M,”Efficient Analysis of Big Data using Map Reduce Framework”,International Journal of Recent Development in Engineering and Technology, Volume2,Issue 6,June 2014, pp.64-68
[14] https://archive.ics.uci.edu/ml/datasets/Heart+Disease.
Citation
R. Sharmila, S. Chellammal , "A conceptual method to enhance the prediction of heart diseases using big data Techniques", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.21-25, 2018.
Multidimentional View of Automatic Video Classification : An Elucidation
Research Paper | Journal Paper
Vol.06 , Issue.04 , pp.26-29, May-2018
Abstract
Media is one of the foremost roles in human daily life activity. Multimedia is the integration of multiple forms of media, which includes text, image, audio, and video. Most of the people are always working with their Personal Digital Assistant (PDA) that provides computing, information storage and retrieval capabilities for personal or business use. Images and videos engage more space than other kinds of data on their PDA or electronic device. There are many kinds of videos available in day to day life, so we need an efficient tool to classify the videos with sky-scraping accuracy. The main goal of video classification is to help the people to find video of their interest. In this paper we study multi dimensional view of video classification methods and techniques, compare them and also conclude with opinion for further research.
Key-Words / Index Term
Video Classification
References
[1] Darin Brezeale and Diane J. Cook, ―”Automatic Video Classification: A Survey of Literature”, IEEE Transactions on systems, man, and cybernetics—part c: applications and reviews, vol. 38, no. 3, may 2008.
[2] Jiajun Sun, Jing Wang, Ting-chun Yeh, - “Video Understanding: From Video Classification to Captioning”, 2017.
[3] Mittal C. Darji1, Dipti Mathpal2, - “ A Review of Video Classification Techniques”, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 06 | June -2017.
[4] Nirav Bhatt, - “A survey on video classification techniques”, International Journal of Emerging Technologies and Innovative Research, March 2015, Volume 2, Issue 3.
[5] M.Ramesh, Dr. K. Mahesh, - “Significance of various Video Classification Techniques and Methods: A Retrospective”, International Journal of Pure and Applied Mathematics, Volume 118 No. 8 2018, 523-526.
[6] Hansang Kim, Youngbae Kim, Jae-Young Sim, and Chang-Su Kim, ―”Spatiotemporal Saliency Detection for Video Sequences Based on Random Walk With Restart”, IEEE transactions on image processing, vol. 24, no. 8, august 2015.
[7] Reza Fuad Rachmadi†∗ , Keiichi Uchimura†, and Gou Koutaki, ―”Video classification using compacted dataset based on selected keyframe”, Proceedings of the International Conference,2016 IEEE Region.
[8] Shankar, K., K. Mahesh, and K. Kuppusamy. ―”Analyzing Image Quality via Color Spaces.‖ image. In 1.1 (2014).
[9] Shankar, K., K. Mahesh, and K. Kuppusamy. "Video Segmentation on 2D Images with 3D Effect." International Journal of Computer Applications 43.8 (2012): 1-4.
[10] Darin Brezeale and Diane J. Cook, ―”Automatic Video Classification: A Survey of Literature‖”, IEEE Transactions on systems, man, and cybernetics—part c: applications and reviews, vol. 38, no. 3, may 2008
Citation
M. Ramesh, K. Mahesh, "Multidimentional View of Automatic Video Classification : An Elucidation", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.26-29, 2018.
Supervised Learning Architecture for Solving Double Dummy Bridge Problem
Research Paper | Journal Paper
Vol.06 , Issue.04 , pp.30-37, May-2018
Abstract
The bridge game is one of the most generally known card games comprising many mesmerizing aspects, such as bidding, playing and winning the trick including estimation of human hand strength. The harmonizing input data based on the human knowledge of the game to improvement the quality of tricks. The bridge game classification under a game of imperfect information is to be equally well-defined. The decision made on any stage of the game is simply based on the assessment that was made on the immediate preceding stage. The intelligent game of bridge incompleteness of information, the real spirit of the card game in proceeding further deals of the game are taking into many forms especially during the distribution of cards for the next deal. The cascade correlation neural network architecture with supervised learning implemented in resilient back - propagation algorithm to train data and therefore to test data it is together along with the bamberger point count method and work point count methods.
Key-Words / Index Term
Cascade-correlation neural network, Resilient back-propagation algorithm, Bridge game, Double dummy bridge problem, Bamberger point count method, Work point count method
References
[1] B.Yegnanarayana, D.Khemani, M.Sarkar, “Neural networks for contract bridge bidding”, Sadhana, Vol.21, Issue.3, pp.395-413, 1996.
[2] A.Amit, S.Markovitch, “Learning to bid in bridge. Machine Learning”, Vol.63, Issue.3, pp.287-327, 2006.
[3] J.Mandziuk, K.Mossakowski, “Looking Inside Neural Networks Trained to Solve Double-Dummy Bridge Problems”, In the 5th Game-on International Conference on Computer Games: Artificial Intelligence, Design and Education (CGAIDE 2004),U.K, 2004.
[4] J.Mandziuk, K.Mossakowski, “Neural networks compete with expert human players in solving the Double Dummy Bridge Problem”, In the Proceedings of the 2009 IEEE symposium on computational intelligence and games (CIG 2009), Italy, pp. 117-124, 2009.
[5] K.Mossakowski, J.Mandziuk, “Artificial neural networks for solving double dummy bridge problems”, Lecture Notes in Computer Science (LNAI), Springer, Heidelberg, Vol. 3070, pp. 915-921, 2004.
[6] M.Sarkar, B.Yegnanarayana, D.Khemani, “Application of neural network in contract bridge bidding”, In the Proceedings of the 1995 national conference on neural networks and fuzzy methods, India, pp.144-151,1995.
[7] M.Dharmalingam, R.Amalraj, “Neural Network Architectures for Solving the Double Dummy Bridge Problem in Contract Bridge”, In the Proceedings of the 2013 PSG-ACM national conference on intelligent computing, India, pp. 31-37, 2013.
[8] M.Dharmalingam, R.Amalraj, “Artificial Neural Network Architecture for Solving the Double Dummy Bridge Problem in Contract Bridge”, Advanced Research in Computer and Communication Engineering, Vol.2, Issue.12, pp.4683-4691, 2013.
[9] H.Francis, A.Truscott, D.Francis, “The Official Encyclopedia of Bridge”, 6th ed. Memphis, American Contract Bridge League, 2001.
[10] K.Mossakowski, J.Mandziuk, “Learning without human expertise: A case study of Double Dummy Bridge Problem”, IEEE Transactions on Neural Networks. Vol.20, Issue.2, pp.278-299, 2009.
[11] B.Seifert, “Encyclopedia of Bridge”, Polish Scientific Publishers PWN, Warsaw, 1996.
[12] S.Haykin, “Neural Networks: A Comprehensive Foundation”, Prentice Hall, New York, 1998.
[13] K.Mossakowski, J.Mandziuk, “Neural networks and the estimation of hand’s strength in contract bridge”, Lecture Notes in Computer Science (LNAI), Springer, Heidelberg, Vol.4029, pp. 1189-1198, 2006.
[14] S.N.Sivanandam, S.N.Deepa, “Principles of Soft Computing”, Wiley, New Delhi, 2007.
[15] B.Yegnanarayana, “Artificial neural networks”, Prentice Hall, New Delhi, 2010.
[16] J.Mandziuk, “Computational intelligence in mind games”, In the Studies in computational intelligence, Springer, Heidelberg, 2007.
[17] J.Mandziuk, “Some thoughts on using computational intelligence methods in classical mind board games”, In the Proceedings of the 2008 International joint conference on neural networks (IJCNN 2008), China, pp. 4001-4007, 2008.
[18] J.Mandziuk, “Knowledge-free and learning- based methods in intelligent game playing”, Springer, Berlin, Heidelberg, 2010.
[19] M.Dharmalingam, R.Amalraj, “Back-Propagation Neural Network Architecture for Solving the Double Dummy Bridge Problem in Contract Bridge”, In the Proceedings of the 2014 IEEE international conference on intelligent computing applications (ICICA 2014), India, pp. 454-461,2014.
[20] M.Dharmalingam, R.Amalraj, “A Solution to the Double Dummy Bridge Problem in Contract Bridge Influenced by Supervised learning module Adapted by Artificial Neural Network”, In the Special Issue on distributed intelligent method and applications, Vol.5, Issue.1, pp.836- 843, 2014.
[21] M.Dharmalingam, R.Amalraj, “Artificial Neural Network Architectures: Work Point Count System Coupled with Back-Propagation and Resilient Back - Propagation Algorithm for Solving Double Dummy Bridge Problem in Contract Bridge”, International Journal of Innovative Science, Engineering and Technology, Vol.2, Issue.8, pp.142-157, 2015.
[22] M.Dharmalingam, R.Amalraj, “Artificial Neural Network Architectures for solving Double Dummy Bridge Problem in Imperfect Information Game”, International Journal of Computational Intelligence and Informatics, Vol.5, Issue.3, pp.188-197, 2015.
[23] M.Dharmalingam, “Point Count Systems in Imperfect Information Game”, International Research Journal of Engineering and Technology, Vol.3, Issue.1, pp.362-370, 2016.
[24] M.Dharmalingam, “Artificial Neural Network Architectures for Solving the Contract Bridge”, International Journal of Advanced Information and Communication Technology, Vol.4, Issue.3, pp.01-09, 2017.
[25] W.H. Root, “The ABCs of Bridge”, Three Rivers Press, 1998.
[26] M.Dharmalingam, R.Amalraj, “Supervised Learning in Imperfect Information Game”, Advanced Research in Computer Science, Vol.4, Issue.2, pp.195-200, 2013.
[27] T.Ando, N.Kobayashi, T.Uehara, “Cooperation and competition of agents in the auction of Computer Bridge”, Electronics and Communications in Japan, Part 3, Vol.86, Issue.12, pp.76-86, 2003.
[28] T.Ando, T.Uehara, “Reasoning by agents in computer bridge bidding”, In the Computers and Games, Lecture Notes in Computer Science, Springer, Berlin, Vol. 2063, pp. 346-364, 2001.
[29] I.Frank, D.A.Basin, “Optimal play against best Defence: Complexity and Heuristics”, Lecture Notes in Computer Science, Springer-Verlag, Germany, Vol.1558, pp.50-73, 1999.
[30] T.Ando, Y. Sekiya, T.Uehara, “Partnership bidding for Computer Bridge”, Systems and Computers, Japan, Vol.31, Issue.2, pp.72-82, 2000.
[31] I.Frank, D.A.Basin, “Strategies explained”, In the Proceedings of the 5th Game programming workshop, Japan, pp1-8, 1999.
[32] I.Frank, D.A.Basin, “A Theoretical and Empirical Investigation of Search in Imperfect Information Game”, Theory of Computer Science, Vol.252, Issue.1, pp.217-256, 2001.
[33] W.Jamroga, “Modeling artificial intelligence on a case of bridge card play bidding”, In the Proceedings of the 1999 international workshop on intelligent information method, pp.276-277, 1999.
[34] D.N.Levy, “The million pound bridge program”, In the Heuristic Programming in artificial intelligence - First Computer Olymiad, pp.95-103, 1989.
[35] J.Mandziuk, K.Mossakowski, “Example-based estimation of hand’s strength in the game of bridge with or without using explicit human knowledge”, In the Proceedings of the 2007 IEEE symposium on computational intelligence in data mining (CIDM 2007), Los Alamitos, pp. 413-420, 2007.
[36] S.J.J. Smith, D.S.Nau, T.A.Throop, “Computer bridge - a big win for AI planning”, Artificial intelligence, Vol.19, Issue.2, pp.93-106, 1998.
[37] S.J.J. Smith, D.S.Nau, T.A.Throop, “Success in Spades: Using AI Planning Techniques to Win the World Championship of Computer Bridge”, In the Proceedings of the 1998 national conference on artificial intelligence, pp.1079-1086, 1998.
[38] S.E.Fahlman, V.Lebiere, “The cascade-correlation learning architecture”, In the Advances in neural information processing methods, pp.524-532, 1990.
[39] M.Riedmiller, H.Braun, “A direct adaptive method for faster back propagation: the RPROP algorithm”, In the Proceedings of the 1993 IEEE international conference on neural networks (ICNN 1993), pp. 586- 591, 1993.
[40] R.Amalraj, M.Dharmalingam, “A work point count method coupled
[41] with back-propagation for solving double dummy bridge problem”, Neurocomputing, Vol.168, pp.160-178, 2015.
[42] M.L.Ginsberg, “GIB:Imperfect information in a computationally challenging game”, Artificial intelligence research, Vol.14, pp.303-358, 2001.
Citation
Dharmalingam Muthusamy, "Supervised Learning Architecture for Solving Double Dummy Bridge Problem", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.30-37, 2018.
Role of Feature Extraction Techniques : PCA and LDA for Appearance Based Gait Recognition
Research Paper | Journal Paper
Vol.06 , Issue.04 , pp.38-44, May-2018
Abstract
Feature extraction is one of the most important step in image pattern recognition. Some sources of difficulty are the presence of irrelevant information and the relativity of a feature set to a particular application. Feature extraction and description are essential components of various computer vision applications. The concept of feature extraction and description refers to the process of identifying points in an image (interested points) that can be used to describe the image’s contents. The One major goal of feature extraction is to increase the accuracy of learned models by compactly extracting prominent features from the input data, while also possibly removing noise and redundancy from the input. Additional objectives include low-dimensional representations for data imagining and compression for the purpose of reducing data storage requirements as well as increasing training and implication speed. The aim of this paper is to report an descriptive study of most popular feature extraction methods PCA and LDA which are generally used in pattern recognition and the role of PCA and LDA in gait feature extraction.
Key-Words / Index Term
Feature extraction, PCA, LDA, Gait Feature Extraction
References
[1] Gaurav Kumar, Pradeep Kumar Bhatia, A Detailed Review of Feature Extraction in Image Processing Systems, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.
[2] Turk M, Pentland A. Eigenfaces for recognition. J Cognitive Neurosci. 1991; 3(1):71–86.
[3] Lindsay I Smith, A tutorial on Principal Components Analysis, 2002.
[4] M. Murali, Principal Component Analysis based Feature Vector Extraction, Indian Journal of Science and Technology, Vol 8(35), 2015.
[5] Alaa Tharwat, Tarek Gaber, Abdelhameed Ibrahim, Aboul Ella Hassanien, Linear discriminant analysis: A detailed Tutorial, AI Communications, 2017.
[6] Han Su, Zhi-Wu Liao, Guo-Yue Chen, A gait recognition method using L1-PCA and LDA, IEEE, International Conference on Machine Learning and Cybernetics, 2009.
[7] Pranjit Das, Sarat Saharia, Human Gait Recognition Based on Principal Component Analysis, International Journal of Computer Sciences and Engineering, Volume-4, Special Issue-7, Dec 2016.
[8] Qiong Cheng, Bo Fu, and Hui Chen, Gait Recognition Based on PCA and LDA, Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT ’09), 2009.
[9] Gait recognition based on gait energy image and linear discriminant analysis, IEEE International conference on signal processing, communications and computing, 2015.
[10] Liang Wang, Tieniu Tan, Huazhong Ning, and Weiming Hu, Silhouette Analysis-Based Gait Recognition for Human Identification, IEEE Trans. on Pattern analysis and machine intelligence, vol. 25, no. 12, december 2003.
[11] T. Daoliang, H. Kaiqi, Y. Shiqi, and T. Tieniu, "Orthogonal Diagonal Projections for Gait Recognition," in 2007 IEEE International Conference on Image Processing, 2007, pp. I - 337-I - 340.
[12] P.N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, "Eigenfaces vs. Fisherfaces: recognition using class specific linear projection," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, pp. 711-720, 1997.
[13] T. Dacheng, L. Xuelong, W. Xindong, and S. J. Maybank, "General Tensor Discriminant Analysis and Gabor Features for Gait Recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, pp. 1700-1715, 2007.
[14] Y. Mu and D. Tao, "Biologically inspired feature manifold for gait recognition," Neurocomputing, vol. 73, pp. 895-902,2010.
[15] R. Hu, W. Shen, and H. Wang, "Recursive spatio temporal subspace learning for gait recognition," Neuro computing,vol. 73, pp. 1892-1899, 2010.
[16] E. Zhang, Y. Zhao, and W. Xiong, "Active energy imageplus 2DLPP for gait recognition," Signal Processing, vol.90, pp. 2295-2302, 2010.
[17] G. Baofeng and M. S. Nixon, "Gait Feature Subset Selectionby Mutual Information," IEEE Transactions on Systems,Man and Cybernetics, Part A: Systems and Humans vol. 39, pp. 36-46, 2009.
[18] G. Baofeng and M. S. Nixon, "Gait Feature Subset Selection by Mutual Information," in First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007, pp. 1-6.
[19] Jinyan Chen Jiansheng Li, Average Gait Differential Image Based Human Recognition, Scientific World Journal. 2014. 27.
[20] Yang J, Zhang D, Frangi AF, Yang J-Y. Two-dimensional PCA: a new approach to appearance based face representation and recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2004;26(1):131–137.
[21] Worapan Kusakunniran, Qiang Wu, Hongdong Li, Jian Zhang, Multiple views gait recognition using View Transformation Model based on optimized Gait Energy Image, IEEE 12th International Conference on Computer Vision Workshops (ICCV Workshops), 2009
[22] Deng Cai, Xiao fei He, Jia wei Han.“Training Linear Discriminant Analysis in Linear Time,” IEEE International Conference on Data Engineering, 2008(24):pp. 209-217.
[23] Fradkin, Dmitriy1,Madigan, David2.“Experiments with random projections for machine learning,” IEEE 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD`03. 2003(8):pp 517-522.
Citation
K. Annbuselvi, N. Santhi, S. Sivakumar, "Role of Feature Extraction Techniques : PCA and LDA for Appearance Based Gait Recognition", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.38-44, 2018.
Optimally Facing the uncertainty : A brief survey on Reinforcement Learning
Survey Paper | Journal Paper
Vol.06 , Issue.04 , pp.45-48, May-2018
Abstract
— Reinforcement Learning is a combination of supervised learning and unsupervised learning, the two main streams of Machine Learning .It has many applications in Artificial Intelligence arena. Multi Armed Bandits problem, a classical Reinforcement Learning task employs exploration and exploitation tradeoff. Efficient Bandit Algorithms for solving Bandit problem proides solutions for various problems from Dynamic pricing to online multi class prediction. This research article analyses the elements of Reinforcement learning, mathematical formulation of multi armed Bandits problem and attempts to present a naive RL algorithm for N-Queens problem for an instance of N=4 and concludes with applications of Reinforcement Learning .
Key-Words / Index Term
Reinforcement Learning, multiarmed Bandit problem, ϵ- Greedy algorithm
References
[1] Alpaydm, Introduction to Machine Learning, MIT Press, 2010.
[2] Dai Shi, Exploring Bandit algorithms for Automatic content selection, Barcelona, 2014.
[3] Ellis Horrowitz, Fundamentals of Computer Algorithms, Galgottia Publictions,1996
[4] Kakade et al, Efficient Bandit Algorithms for online multiclass prediction, Conference Proceedings, University of Pennysylvnia,2008.
[5] Nahum Shimkin, Reinforcement Learning –Basic algorithms, Learning in Complex Systems Lecture notes, Spring 2011.
[6] Prathamesh, Multi armed bandit approach for Dynamic pricing, M.Tech Dissertation, Iit, Mumbai, 2015
[7] Sutton and Barto, Reinforcement Learning – an introduction, The MIT Press, England, 2017.
[8] Szepesvari, Algorithms for Reinforcement Learning, Synthesis lectures on Artificial Intelligence and machine learning, 2009.
[9] http://cs.mcgill.ca/~dprecup/courses /AI/Lectures/ai-lecture13.pdf
[10] www.medium.com/machinelearning for humans .html
Citation
R. Raja Rajeswari, A. Pethalakshmi, "Optimally Facing the uncertainty : A brief survey on Reinforcement Learning", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.45-48, 2018.
Performance Analysis of Age Invariant Face Recognition Methods
Research Paper | Journal Paper
Vol.06 , Issue.04 , pp.49-55, May-2018
Abstract
Age Invariant Face Recognition is an emerging research topic in Face Recognition Research Community has many practical applications such as in law enforcement, identifying criminals, passport renewal etc. Facial Aging has not received adequate attention compared to other sources of variations due to pose, lighting, and expression. This paper aims to give a detailed survey of age invariant face recognition. This review covers the techniques that attempt to solve the age invariant problems. This paper also discusses different techniques to extract features and textures of age invariant facial part. Existing problems in age invariant face recognition are covered and possible solutions are suggested in this review. Advantage and disadvantage of each methods and recognition accuracy have been discussed.
Key-Words / Index Term
Age invariant, face recognition, aging database, Morph, FGNET and Epoch database.
References
[1] Zhifeng Li, Unsang Park, Anil K. Jain. “A Discriminative Model for Age Invariant Face Recognition”, IEEE transactions on information forensics and security, vol. 6, no. 3, September 2011.
[2] Gayathri Mahalingam and Chandra Kambhamettu. “Age Invariant Face Recognition Using Graph Matching” , IEEE 2010.
[3] Jyothi S. Nayak, Indiramma M. “Efficient Face Recognition with Compensation for Aging Variations”, IEEE- Fourth International Conference on Advanced Computing, 2012.
[4] Jyothi S. Nayak, Indiramma M and Nagarathna N. “Modeling Self –Principal Component Analysis for Age Invariant Face Recognition”, IEEE International Conference on Computational Intelligence and Computing Research 2012.
[5] Nana Rachmana Syambas, Untung Hari Purwanto. “Image Processing and ace Detection Analysis on Face Verification Based on the Age Stages”,7th International Conference on Telecommunication Systems, Services and Applications, IEEE, 2012.
[6] Diana Sungatullina1, Jiwen Lu, Gang Wang, and Pierre Moulin ,“Multiview Discriminative Learning for Age-Invariant Face Recognition”,10th IEEE international conference,2013.
[7] Djamel bouchaffra, “Nonlinear topological component analysis: application to age-invariant face recognition”, IEEE transactions on neural networks and learning systems, vol. 26, 2015.
[8] A.Sindhuja`, S.Devi Mahalakshmi, Dr.K.Vijayalakshmi, “Age Invariant Face Recognition with Occlusion”, IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2012.
[9] Felix luefei-Xu, Khoa LUU, Marios Savvides1, Tien D. Bui, and Ching Y. Suen,, “Investigating Age Invariant Face Recognition Based on Periocular Biometrics” International joint conference, 2011.
[10] Junyong Si, Weiping Li, “Age-invariant face recognition using a feature progressing model”, 3rd IAPR Asian Conference on Pattern Recognition, 2015.
[11] Dihong Gong, Zhifeng Li, Dahua Lin, “Hidden Factor Analysis for Age Invariant Face Recognition”, IEEE International Conference on Computer Vision, 2013.
[12] Amal Seralkhatem Osman Ali, Vijanth Sagayan, Aamir Malik Saeed, Hassan Ameen, Azrina Aziz, “Age-invariant face recognition system using combined shape and texture features”, IET Biometrics,2014.
[13] Ravi Pal and Ajith kumar Gautam, “Age Invariant Face Recognition Using Multiclass SVM”, 3rd IAPR Asian Conference on Pattern Recognition, 2015.
[14] Tianyue Zheng, Weihong Deng, Jiani Hu, “Age Estimation Guided Convolutional Neural Network for AgeInvariant Face Recognition”,IEEE conference,,2017.
[15] Yandong Wen, Zhifeng Li , Yu Qiao, “Latent Factor Guided Convolutional Neural Networks for Age-Invariant Face Recognition”,IEEE conference on 2017.
[16] Dihong Gong,Zhifeng Li and Dacheng Tao, “A Maximum Entropy Feature Descriptor for Age Invariant Face Recognition”, IEEE conference on 2015.
[17] Chi Nhan Duong , Kha Gia Quach , Khoa Luu , T. Hoang Ngan Le and Marios Savvides, “Temporal Non-Volume Preserving Approach to Facial Age-Progression and Age-Invariant Face Recognition”, computer vision IEEE conference on 2017.
[18] Huiling Zhou, Kwok-Wai Wong, and Kin-Man Lam, “Feature-Aging for Age-Invariant Face Recognition”, Proceedings of APSIPA Annual Summit and Conference on 2015.
[19] Cui Meng, Jiwen Lu, and Yap-Peng Tan, “A Comparative Study of Age-Invariant Face Recognition with Different Feature Representations”, Int. Conf. Control, Automation, Robotics and Vision on 2010.
[20] Xiaonan Hou, Shouhong Ding, Lizhuang Ma, “Robust feature encoding for age-invariant face recognition”,Multimedia and Expo IEEE conference on 2016.
[21] Albert, A.M. and K. Ricanek, “The MORPH database: investigating the effects of adult craniofacial aging on automated face-recognition technology”, Forensic Sci. Commun., 10(2), 2008.
[22] FGNET, “The FG-NET Aging Database”, Retrieved form: /http: // www.fgnet.rsunit. Com, 2009.
[23] M. Parisa Beham and S. Md. Mansoor Roomi, “ INFACE and EPOCH Database: A Benchmark for Face Recognition in Uncontrolled Conditions”, Research Journal of Applied Sciences, Engineering and Technology 8(6): 795-802, 2014.
Citation
H. Jebina, M. Parisa Beham, S. Md. Mansoor Roomi and R. Tamilselvi, "Performance Analysis of Age Invariant Face Recognition Methods", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.49-55, 2018.
A Signal Integrity Based Rate Adaptation Algorithm
Research Paper | Journal Paper
Vol.06 , Issue.04 , pp.56-64, May-2018
Abstract
Wireless systems have gained momentum in recent years due to ease, universality and cost reduction. In a wireless network the signal degradation is time variant based on environmental factors. As variations in signal quality and interference from external sources affect the network, it is necessary and important to adapt the rate to the channel conditions via a rate adaptation algorithm driven by changes in the signal quality. This research addresses signal integrity in a local area network and proposes a rate adaptation algorithm for 802.11 wireless networks based on signal quality and packet error rate. The relationship between signal strength and packet error rate is analyzed and a new rate adaptation algorithm for 802.11n is presented. The algorithm developed in this thesis effectively adapts the rate to minimize packet error rate while it maximizes throughput. Through experiments, it has been shown that the proposed algorithm achieves better throughput compared to state of the technology rate adaptation algorithms currently implemented in commercial 802.11n systems.
Key-Words / Index Term
Wireless, 802.11, MAC
References
[1] A. Kamerman and L. Monteban, “Wavelan-ii: a high-performance wireless lan for the unlicensed band,” Bell Labs Technical Journal, vol. 2,no. 3, pp. 118–133, 1997. ARF.
[2] M. Lacage, M. H. Manshaei, and T. Turletti, “IEEE 802.11 rate adaptation: a practical approach,” in MSWiM ’04: Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, (New York, NY, USA), pp. 126–134, ACM, 2004.
[3] J. Kim, S. Kim, S. Choi, and D. Qiao, “CARA: Collision-aware rate adaptation for IEEE 802.11 WLANs,” in INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pp. 1–11, Apr. 2006.
[4] S. H. Y. Wong, H. Yang, S. Lu, and V. Bharghavan, “Robust rate adaptation for 802.11 wireless networks,” in MobiCom ’06: Proceedings of the 12th annual international conference on Mobile computing and networking, (New York, NY, USA), pp. 146–157, ACM, 2006.
[5] T. Joshi, D. Ahuja, D. Singh, and D. Agrawal, “Sara: Stochastic automata rate adaptation for ieee 802.11 networks,” Parallel and Distributed Systems, IEEE Transactions on, vol. 19, pp. 1579–1590, Nov. 2008.
[6] Shu-Ming Liu, Yu-Hong Lin, Wu-i Chou, Zan-Yu Chen, Tsung-Nan Lin, “Performance Evaluation of Rate Adaptation Algorithms in 802.11-based Mesh Networks,” GLOBECOM Workshops, 2009 IEEE, IEEE Transactions on, vol. 19, pp. 1–5, Nov. 2009.
[7] Ioannis Pefkianakis, Yun Hu, Starsky H.Y. Wong, Hao Yang, Songwu Lu, “MIMO Rate Adaptation in 802.11n Wireless Networks”, in MobiCom ’10: Proceedings of the sixteenth annual international conference on Mobile computing and networking, (New York, NY, USA), pp. 110-121, 2010.
[8] https://wireless.wiki.kernel.org/en/developers/documentation/mac80211/ratecontrol/minstrel - Minstrel Algorithm
[9] http://www.cacetech.com/documents/PPI_Header_format_1.0.1.pdf - PPI Header Format
[10] G. Holland, N. Vaidya, and P. Bahl. A rate-adaptive MAC protocol for multi-hop wireless networks. In Proceedings of ACM MOBICOM`01, Rome, Italy,2001.
[11] Liping Qian; Jinfang Zhou; Ying Qian; Kangsheng Chen; , "Improved Opportunistic Auto Rate Media Access Protocol for Multi-Rate Ad Hoc Networks," Wireless Communications, Networking and Mobile Computing, 2006. WiCOM 2006.International Conference on , vol., no., pp.1-4, 22-24 Sept. 2006S.
Citation
Mohan Kumar Seerangarajan, "A Signal Integrity Based Rate Adaptation Algorithm", International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.56-64, 2018.