Space Reduction using String and Synonym Matching Algorithm (SSMA)
Research Paper | Conference Paper
Vol.04 , Issue.01 , pp.1-8, Feb-2016
Abstract
The Command Based System (CBS) is one of the fields of Human Computer Interaction (HCI). In the modern era the Command Based System is enormously explored by many scientists and it is used in many fields. This study proposes to develop a new approach to build up a Command Based System which will accept a Text as an input and take the corresponding action. In this paper the String and Synonym Matching Algorithm (SSMA) is made to develop a String Command Based System (SCBS). The String and Synonym Matching Algorithm (SSMA) Algorithm focuses on the comparison between the users given string with the preloaded strings in the system database. The comparison is made in two ways i.e. a straight string comparison and the comparison between all the synonyms of the input string with the preloaded strings from the system database. The trick of matching the synonyms of the user given string reduces the space in the system database and increases the flexibility of the user to give more input with same meaning.
Key-Words / Index Term
Human Computer Interaction (HCI), Command Based System (CBS), String Command Based System (SCBS), Unimodal System, String and Synonym Matching Algorithm (SSMA), Space Complexity
References
[1] “ACM SIGCHI Curricula for Human-Computer Interaction”, Definition of HCI, [Available: http://old.sigchi.org/cdg/cdg2.html] [Access Date: May 21, 2014].
[2] “Human-computer Interaction”, [Available: https://en.wikipedia.org/wiki/Human–computer_interaction] [Access Date: May 21, 2014].
[3] “Human Computer Interaction (HCI)”, [Available: http://www.webopedia.com/TERM/H/HCI.html] [Access Date: May 21, 2014].
[4] F. Karray, M. Alemzadeh, J. A. Saleh and M. N. Arab. “Human-Computer Interaction: Overview on State of the Art”. In the proceedings of IJSSIS, Vol. 1, No. 1, pp. 137-159, March 2008.
[5] K. P. Tripathi, “A Study of Interactivity in Human Computer Interaction”, International Journal of Computer Applications, ISSN: 0975 – 8887, Vol. 16, Iss. 6, Feb 2011.
[6] P. Sharma, N. Malik, N. Akhtar, Rahul, “Human Computer Interaction”, International Journal of Advanced Research in IT and Engineering (IJARITE), ISSN: 2278-6244, Nov 2012.
[7] Brad A. Myers. "A Brief History of Human Computer Interaction Technology." ACM interactions. Vol. 5, no. 2, pp. 44-54, March, 1998.
[8] U. Aickelin and D. Dasgupta, “Artificial Immune System” [Available: http://arxiv.org/ftp/arxiv/papers/0803/0803.3912.pdf] [Access Date: July 5, 2014].
[9] M. Fetaji, S. Loskoska, B. Fetaji, M. Ebibi. “Investing Human Computer Interaction Issues in Designing Efficient Virtual Learning Envioronment”. BCI, Sofia, Bulgaria, 2007.
[10] P. Sharma, N. Malik, N. Akhtar, Rahul, “Human Computer Interaction”, International Journal of Advanced Research in IT and Engineering (IJARITE), ISSN: 2278-6244, Nov 2012.
[11] A. Britto, R. Sabourin, F. Bartolozzi, C. Y. Suen, “A Two-Stage HMM-Based System for Recognizing Handwritten Numeral Strings”, International Conference on Document Analysis and Recognition, pp.396-400, 2001.
[12] L. Yun, C. S. Liu, X. Q. Ding, F. Qiang, “A Recognition Based System for Segmantation of Touching Handwritten Numeral Strings”,
[13] S. Gamm, R. H. Umbach, D. Langmann, “Finding with the Design of a Command Based Speech Interface for a Voice Mail System”, IEEE Proceedings of Interactive Voice Technologies for Telecommunications Applications, 1996, pp.93-96, India.
[14] A. Rashedi, S. S. Moghaddam, “Appropriate Farsi Speech Recognizes for Commanding Robots: Performance Evolution of Correlation-Based and Model-Based Classifiers for a Farsi Isolated Word Recognition Robotic System”, ICSP, pp. 573-576, 2010.
[15] K. Hinckley, J. Hollan, “PapierCraft: A Gesture-Based Command System for Interactive Paper”. [Available: http://www.cs.cornell.edu/~francois/Papers/PapierCraft_TOCHI.pdf] [Access Date: 8th Aug, 2015]
Citation
Papri Ghosh, Tejbanta Singh Chingtham, Mrinal Kanti Ghose, "Space Reduction using String and Synonym Matching Algorithm (SSMA)", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.1-8, 2016.
A Shortest Path Similarity Matrix based Spectral Clustering
Research Paper | Conference Paper
Vol.04 , Issue.01 , pp.9-15, Feb-2016
Abstract
This paper proposed a new spectral graph clustering model by casting the non-categorical spatial data sets into an undirected graph. Decomposition of the graph to Delaunay graph has been done for computational efficiency. All pair shortest path based model has been adapted for the creation of the underlying Laplacian matrix of the graph. The similarity among the nodes of the graph is measured by a random selection based correlation coefficients. The effectiveness as well as the efficiency of the proposed model has beentasted and measuredwith standard data and the performances are compared with that of existing standard models.
Key-Words / Index Term
Graph Clustering;Delaunay Triangulation;All-pair Shortest Path Distance; Similarity Matrix; Spectral Clustering
References
[1] A. K. Jain, M. N. Murty and P. J. Flynn, “Data Clustering: A Review,” ACM Computing Surveys, vol. 31, no. 3, pp. 264-323, Sept. 1999
[2] Duda, R. O., P. E. Hart and D. G. Stork, “Pattern Classification,” 2nd ed.,John Wiley&Sons,UK, 2008.
[3] A. K. Jain, and R. C. Dubes, “Algorithms for clustering data,” Prentice Hall, , March 1988.
[4] RuiXu and Donald C. Wunsch, II, “Clustering,” Wiley-IEEE Press, October 24, 2008
[5] B. Everitt, S. Landau S., M. Leese and D. Stahl, “Cluster Analysis,” Wiley, 5thedn. February, 2011
[6] M.E.J. Newman and M. Girvan, Mixing patterns and community structure in networks, in: R. PastorSatorras, M. Rubi, A. DíazGuilera (Eds.), Statistical Mechanics of Complex Networks: Proceedings of the XVIII Sitges Conference on Statistical Mechanics, in: Lecture Notes in Physics, vol. 625, SpringerVerlag GmbH, Berlin, Germany, 2003.
[7] L.C. Freeman, “A set of measures of centrality based on betweenness,” Sociometry, vol. 40, no. 1, pp. 35–41, 1977.
[8] Waqas Nawaz, Kifayat-Ullah Khan and Young-Koo Lee, "SPORE: shortest path overlapped regions and confined traversals towards graph clustering", Applied Intelligence, vol. 43,no. 1, pp. 208-232, 2015, DOI 10.1007/s10489-014-0637-7
[9] Satu Elisa Schaeffer, “Graph Clustering,” Computer Science Review, vol. I, pp. 27-64, 2007.DOI 10.1016/j.cosrev.2007.05.001.
[10] B. Mohar, "Some Applications of Laplace eigenvalues of graphs", Graph Symmetry: Algebraic Methods and Applications, NATO ASI, Series.C-497, pp.225-275, pub.Kluwer, Editor. G. Hahn and Sabidussi, 1997.
[11] Jianbo Shi and Jitendra Malik, "Normalized Cuts and Image Segmentation", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.22, no.8, pp.888-905, August, 2000.
[12] Ulrike von Luxburg, “A Tutorial on Spectral Clustering,” Statistics and Computing, vol. 17, no. 4, pp. 1-32, 2007.
[13] Daniel A. Spielman and Shang-HuaTeng, "Spectral Partitioning Works: Planar Graphs and Finite Element Meshes", Linear Algebra and its Applications, vol.421, no. 2-3, pp.284-305, March, 2007.
[14] R. B. Bapat, “The Laplacian Matrix of A Graph,” The Mathematics Student, vol. 65, nos. 1-4, pp. 214-223, 1996.
[15] A. E. Brouwer and W. H. Haemers, “Spectra of Graphs,” Springer, February, 2011.
[16] Jianyuan Li, Yingjie Xia andYuncai Liu, "Scalable Constrained Spectral Clustering", IEEE Transactions on Knowledge and Data Engineering,vol. 27, no. 2, pp. 589-593, September, 2014.
[17] Christina Chrysouli andAnastasiosTefas, "Spectral clustering and semi-supervised learning using evolving similarity graphs", Applied Soft Computing, vol.34, No. C, pp. 625-637, 2015.
[18] Parthajit Roy and J. K. Mandal, "A Novel Spectral Clustering based on Local Distribution", International Journal of Electrical and Computer Engineering(IJECE), vol.5, No.2, pp.361-370, April, 2015.
[19] Parthajit Roy, Swati Adhikari and J.K. Mandal, A Novel Similarity Matrix based Spectral Clustering for Two Class Problems, in Proceedings of the National Conference on Computing, Communication and Information Processing (NCCCIP-2015), ISBN: 978-93-84935-27-6, pp:149-157, May, 2015.
[20] HongjieJia, Shifei Ding, XinzhengXuand RuNie, "The latest research progress on spectral clustering", Neural Computing & Applications, vol.24, , no. 7-8 pp.1477-1486, June, 2014 , DOI 10.1007/s00521-013-1439-2.
[21] M. D. Berg, O. Cheong, M. V. Kreveld and M. Overmars, “Computational Geometry: Algorithms and Applications” 3rd ed., Springer-verlag, 2008.
[22] Jia LV, "Clustering Algorithm Based on Delaunay Triangulation Density Metric", inProceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2010),vol.4, pp.1621-1624, 2010.
[23] Min Deng, Qiliang Liu, Tao Cheng and Yan Shi, "An adaptive spatial clustering algorithm based on delaunay triangulation", Computers, Environment and Urban Systems, vol.35, no. 4, pp.320-332, July, 2011.
[24] Parthajit Roy and J. K. Mandal, "A Delaunay Triangulation Preprocessing Based Fuzzy-Encroachment Graph Clustering for Large Scale GIS Data", in Proceedings of the International Symposium on Electronic System Design, 2012, pp.300-305, December, 2012.
[25] Renjie Chen, Yin Xu, Craig Gotsman, Ligang Liu, "A spectral characterization of the Delaunay triangulation", Computer Aided Geometric Design, vol.27, no. 4, pp.295-300, May, 2010.
[26] R. A. Fisher, “UCI machine learning repository,” 1936. [Online]. Available: http://archive.ics.uci.edu/ml
[27] L. Fu and E. Medico, “ FLAME, a novelfuzzyclusteringmethod for the analysis of DNA microarray data,” BMC Bioinformatics, vol. 8, no. 3, January 4, 2007, DOI: 10.1186/1471-2105-8-3.
[28] SriparnaSaha and SanghamitraBandyopadhyay, “Performance Evaluation of Some Symmetry-Based Cluster Validity Indexes”, IEEE Transaction on Systems, Man, and Cybernetics-Part C: Applications and Reviews, Vol-39, No-4, pp-420-425, July 2009.
[29] Parthajit Roy and J.K. Mandal, Performance Evaluation of Some Clustering Indices, presented in the conference Computational Intelligence in Data Mining - 2014, Volume 3, Published in the Springer online in Smart Innovation, Systems and Technologies, Volume 33, ISSN:2190-3018, ISBN(print): 978-81-322-2201-9, ISBN(online):978-81-322-2202-6 , pp:509-517, 2015.
Citation
Parthajit Roy, Swati Adhikari, J. K. Mandal, "A Shortest Path Similarity Matrix based Spectral Clustering", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.9-15, 2016.
Histogram Peak Normalization Based Threshold to Detect Brain Tumor from T1 Weighted MRI
Research Paper | Conference Paper
Vol.04 , Issue.01 , pp.16-24, Feb-2016
Abstract
Medical imaging is a process of creating images of interior body organs or parts which is very useful for diagnose, clinical analysis and treatment of specific disease. Magnetic Resonance Imaging (MRI) is amedical imaging technique used primarily in medical settings to produce high quality images of the inside of the human body or parts. MRI has become effective way to study brain tumors.Threshold based image segmentation is a common technique often used to detect the tumor object. The literature survey depicts that most of the existing methods have ignored the poor quality images. In this paper a method has been proposed based on histogram segmentation to detect the brain tumor from T1 weighted MRI images. T1 weighted MRI images of brain has been takenas input. This system includes image filtering, image segmentation, and object extraction for the purpose. The whole procedure has been implemented in MATLAB.
Key-Words / Index Term
Magnetic Resonance Image (MRI), Histogram segmentation, Brain tumor, Histogram peak difference
References
[1] http://neuroinstitute.org/btc/brain-tumor.html
[2] Leonard V. Crowley, An Introduction to Human Disease: Pathology and Pathophysiology Correlations.9th ed., Jones & Bartlett Publishers, 2013, pp. 192-209,
[3] PankajSapra, Rupinderpal Singh, ShivaniKhurana, “Brain Tumor Detection Using Neural Network.” International Journal of Science and Modern Engineering. Vol. 01(09), pp. 83-88, August, 2013.
[4] Pankaj Kr. Saini, Mohinder Singh, “Brain Tumor Detection In Medical Imaging Using Matlab.” International Research Journal of Engineering and Technology.Vol. 02(02), pp. 191-196, May, 2015.
[5] M.Karuna, Ankita Joshi, “Automatic Detection And Severity Analysis Of Brain Tumors Using Gui In Matlab.”International Journal of Research in Engineering and Technology. Vol. 02(10), pp. 586-594, October 2013.
[6] Geetika Gupta, RupinderKaur, ArunBansal, MunishBansal, “Analysis and Comparison of Brain Tumor Detection and Extraction Techniques from MRI Images.” International Journal of Advanced Research in Electrical,Electronics and Instrumentation Engineering. Vol. 03(11), pp. 13272-13284, November 2014.
[7] Manoj K Kowar and SourabhYadav, “Brain Tumor Detction and Segmentation Using Histogram Thresholding.”International Journal of Engineering and Advanced Technology. Vol. 01(04), pp. 16-20, April 2012.
[8] HarneetKaur ,SukhwinderKaur,“Improved Brain Tumor Detection Using Object Based Segmentation.”International Journal of Engineering Trends and Technology. 13(01), pp. 10-17, July 2014.
[9] Gerard P. Montague. Who Am I? Who Is She?: A Naturalistic,Holistic, Somatic Approach to Personal Identity. Berlin, Germany:Walter de Gruyter, pp. 103-123, 2012.
[10] P.K.Srimani and Shanthi Mahesh, “A Comparative Study of Different Segmentation Techniques for Brain Tumour Detection.” International Journal of Emerging Technologies in Computational and Applied Sciences. Vol. 04(02), pp. 192-197, March-May 2013.
[11] Jin Liu, Min Li, Jianxin Wang Fangxiang Wu, Tianming Liu, and Yi Pan, “Survey of MRI-Based Brain Tumor Segmentation Methods.” Tsinghua Science And Technology, Vol. 19(6),pp. 578-595, December 2014.
[12] Eman Abdel-Maksoud, Mohammed Elmogy, Rashid Al-Awadi, “Brain tumor segmentation based on a hybrid clustering technique” Egyptian Informatics Journal. 16(01). Pp 71-81, March 2015.
[13] C. Croisille, M. Souto, M. Cova, S. Wood, Y. Afework, J.E. Kuhlman, E.A. Zerhouni. Pulmonary nodules, “Improved detection with vascular segmentation and extraction with spiral CT”. Radiology 197, pp.397-401, 1995.
[14] T. Tozaki, Y. Kawata, N. Noki, H. Ohmatsu, K. Eguchi, N. Moriyama. “Three-dimensional analysis of lung area using thin slice CT images”. Medical Imaging Proc SPIE, Vol. 2709, pp.02-11, 1996.
[15] M.L. Giger, K.T. Bae, H. MacMahon. “Computerized detection of pulmonary nodules in computed tomography images”. Invest Radiology. Vol. 29(4), pp.459-465, 1994.
[16] S. Toshioka, K. Kanazawa, N. Niki, H. Satoh, H. Ohmatsu, K. Eguchi, N Moriyama. “Computer aided diagnosis system for lung cancer based on helical CT images, image processing.” KM Hanson, ed. Proc SPIE 3034, pp.975-984, 1997.
[17] J. Toriwaki, A. Fukumura, T. Maruse. “Fundamental properties of the gray weighted distance transformation” Trans IEICE Japan, Vol. J60-D(12), pp.1101-1108, 1977.
[18] http://seer.cancer.gov/statfacts/html/brain.html accessed on08-01-2016
[19] http://neurosurgerybasics.com/brain/brain-mri-a-systematic-reading/accessed on 10-01-2016
[20] EashaNoureen, Dr. Md. Kamrul Hassan, “Brain Tumor Detection Using Histogram Thresholding to Get the Threshold point”. Vol. 09(05), pp.14-19, Sep – Oct 2014.
[21] Swathi P S ,DeepaDevassy , Vince Paul ,Sankaranarayanan P N., “Brain Tumor Detection and Classification Using Histogram Thresholding and ANN”. Vol. 06 (01), pp.173-176, 2015.
[22] KanishkaSarkar, ArdhenduMandal and Rakesh Kumar Mandal,” Brain Tumor Detection from T1 Weighted MRI Using Histogram Peak Difference Threshold”, in Proc. of National Conference on Research Trends in Computer Science and Application (NCRTCSA-2015), pp. 32-37, Nov. 07, 2015.
[23] Halder, Amitava, ChandanGiri, and AmiyaHalder. "Brain tumor detection using segmentation based Object labeling algorithm." In Electronics, Communication and Instrumentation (ICECI), 2014 International Conference on. IEEE, pp. 1-4, 2014.
[24] Salah, Mohamed Ben, Idanis Diaz, Russell Greiner, Pierre Boulanger, Bret Hoehn, and Albert Murtha."Fully Automated Brain Tumor Segmentation Using Two MRI Modalities." Advances in Visual Computing, Springer, pp. 30-39, 2013.
[25] Bhattacharjee, Rupsa, and MonishaChakraborty. "Brain tumor detection from MR images: Image processing, slicing and PCA based reconstruction." In Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on, pp. 97-101.IEEE, 2012.
[26] Parisot, Sarah, HuguesDuffau, StéphaneChemouny, and Nikos Paragios."Graph-based detection, segmentation & characterization of brain tumors." In Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, pp. 988-995, 2012
Citation
Kanishka Sarkar, ArdhenduMandal, Rakesh Kumar Mandal, "Histogram Peak Normalization Based Threshold to Detect Brain Tumor from T1 Weighted MRI", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.16-24, 2016.
Automated System for Computationof Burnt Forest Region using Image Processing
Research Paper | Conference Paper
Vol.04 , Issue.01 , pp.25-31, Feb-2016
Abstract
Fire is one of the major problems that are causing great loss to property and ecosystem in today’s world. Fires not only affect the characteristics of forests but it also affects human lives and livelihood. Due to the lack of specific techniques for calculation of burnt regions of forests, researchers use different methods. In this research, an automated approach is developed to determine the significant burnt area of forest using different image processing techniques. The proposed method is compared with other existing methods and is found to be capable in more precise measurement of the burnt area.
Key-Words / Index Term
Thresholding, Erosion, Dilation, Region leveling
References
[1] N. Otsu, "A threshold selection method from gray-level histograms". IEEE Trans. Sys., Man., Cyber. 9 (1), 1979, pp: 62–66.
[2] H. G. Firouzjaee, H. Hassanpour and A. Shahbahrami, “Computing the Burnt Forest Regions Using Digital Image Processing”,Journal Of Advances in Computer Research ,Vol. 3( 4), November 2012.
[3] P. Pawar, P. Deshkar, P. Rokade, “Computation of burnt forest regions using digital image processing”, International Journal for Engineering Applications and Technology,ISSN: 2321-8134.
[4] R.C. Gonzalez,R. E. Woods,“Digital Image processing”,3rd Edition,Prentice Hall,2009.
[5] R. Haralick, S. Sternberg, and X. Zhuang, “Image analysis using mathematical morphology”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 9(4), pp. 532.550, July 1987.
[6] H.Heijmans, “Morphological image operators”, Advances in Electronics and Electron Physics. Academic Press, 1994.
[7] J. Serra., “Mathematical Morphology and Its Applications to Image Processing”, Kluwer Academic Publishers, Boston (1994).
Citation
Bibek Ranjan Ghosh, Siddhartha Banerjee, Attyuttam Saha, "Automated System for Computationof Burnt Forest Region using Image Processing", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.25-31, 2016.
Conceptual Framework Strategies for Image Compression: A Review
Review Paper | Conference Paper
Vol.04 , Issue.01 , pp.32-37, Feb-2016
Abstract
Image compression plays an important role in digital image processing, it is also very crucial for efficient transmission and storage of images. In image compression, does not only concentrate on reducing size but also concentrate on doing it without losing quality and information of image. This paper summarizes the image compression techniques that may be lossy and lossless and research possibilities.
Key-Words / Index Term
Image Compression; Lossy Techniques; Lossless Techniques
References
[1] Bhupinderjit Kaur, “ Digital Image and Video Compression Techniques”, ISSN, Vol. 3, Issue 7, pp. 554- 558, July 2013.
[2] Ming Yang & Nikolas Bourbakis ,” An Overview of Lossless Digital Image Compression Techniques”, IEEE, Vol.2, pp. 1099- 1102, Aug 2005.
[3] Kitty Arora & Manshi Shukla,” A Comprehensive Review Of Image Compression Techniques”, ISSN, Vol.5, pp. 1169- 1172, May 2014.
[4] Jasmeen Jaura, Richa Goyal “ A Review of Various Image Compression Techniques”, ISSN, Vol.4, Issue 7, pp.708- 710, July 2014.
[5] Subramanya A, “Image Compression Technique,” Potentials IEEE, Vol. 20, Issue 1 pp. 19-23, Feb-March 2001.
[6] Manjinder Kaur, Gagan Preet Kaur, “ A Survey of Lossless and Lossy Image Compression Techniques”, ISSN, Vol. 3, Issue 2, pp. 323- 326, February 2013.M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
[7] ] Ismail Avcibas, Nasir Memon, Bulent Sankur, Khalid Sayood, “ A Progressive Lossless / Near Lossless Image Compression Algorithm,”IEEE Signal Processing Letters, vol. 9, No. 10, pp. 312- 314, October 2002
[8] Jagadish H Pujar, “A New Lossless Method of Image Compression & Decompression Using Huffman Coding Techniques”, Journal of Theoretical and Applied Information Technology, vol. 15, pp. 18- 22, 2010.
[9] Amanjot Kaur, Jaspreet Kaur, “Comparison of DCT and DWT of Image Compression Techniques”, International Journal of EngineeringResearch and Development, volume 1, Issue 4, pp.49-52, June 2012.
[10] A.Skodras, Christopoulos and T Ebrahami, “ The JPEG 2000 still Image Compression Standard”,IEEE, pp. 36-58, 2001.
[11] Jeffrey Scott Vitter, "Design and Analysis of Dynamic Huffman Codes", Journal of the Association for Computing Machinery, vol. 34, no. 4, pp. 825-845, October 1987.
[12] ] D.Malarvizhi, Dr. K. Kuppusammy “ A New Entropy Encoding for Image Compression using DCT”, ISSN, Vol. 3, Issue 3, pp. 327- 331, 2012.
[13] Sachin Dhawan, “A Review of Image Compression and Comparison of its Algorithms”, International Journal of electronics & Communication technology, Vol. 2, pp. 22-26, March 2011.
[14] ] G. K .Wallace:“The JPEG Still Picture Compression Standard,” Communication of the ACM, Vol.34, pp. 39- 44, April 1991.
[15] A.M. Raid, W.M. Khedr, M. A. El-dosuky and Wesam Ahmed, “Jpeg Image Compression Using Discrete Cosine Transform - A Survey”, Vol.5, No.2, pp. 39- 47 April 2014.
[16] Léger, A., Omachi, T., & Wallace, G. The JPEG still picture compression algorithm. In Optical Engineering, Vol. 30, No. 7, pp. 947-954, July 1991.
Citation
Sumanta Lal Ghosh, Dilip Roy Chowdhury, "Conceptual Framework Strategies for Image Compression: A Review", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.32-37, 2016.
Green Computing : Efficient Practices And Applications
Research Paper | Conference Paper
Vol.04 , Issue.01 , pp.38-47, Feb-2016
Abstract
Today the importance of going green have been realized both in terms of environmental issues and cost minimization by implementing different strategies and policies by the ICT industry. Going green suggest the environmentally responsible practice of computers and related resources of ICT. For a sustainable environment, today Green Computing is an emerging topic, because of efficient power usage, minimal or no emission of carbon footprint, also proper disposal of electronic waste (e-waste) and many more, thus to take less participation in the global warming phenomenon. In this study, emphasis has given ondiminishing the energy and carbon footprint of computer and its related resources like- monitors, printers using green computing.
Key-Words / Index Term
Carbon Footprint; E-waste; Green Computing; ICT
References
[1] S. Aggarwal, M. Garg, and P. Kumar, “Green Computing is SMART COMPUTING- A Survey,” International Journal of Emerging Technology and Advance Engineering, vol. 2, issue 2, pp. 297-300, February 2012.
[2] R. A. Sheikh, U. A. Lanjewar, “Green Computing- Embrace a Secure Future,” International Journal of Computer Applications, vol. 10-N.4, pp. 22-26, November 2010.
[3] P. Somavat, and V. Namboodiri, "Energy consumption of personal computing including portable communication devices," Journal of Green Engineering 1.4, pp. 447-475, 2011.
[4] G. Jindal, M. Gupta, ”Green Computing “Future of Computers”,” International Journal of Emerging Research in Management & Technology, ISSN: 2278-9359, pp. 14-18, December 2012.
[5] S. Murugesan, "Harnessing green IT: Principles and practices." IT professional 10.1, 2008, pp. 24-33.
[6] R. R. Harmon andN. Auseklis, "Sustainable IT services: Assessing the impact of green computing practices,"Management of Engineering & Technology, 2009. PICMET 2009. Portland International Conference, August 2009, pp.1707-1717, doi: 10.1109/PICMET.2009.5261969.
[7] D. Wang, "Meeting green computing challenges,"Electronics Packaging Technology Conference (EPTC 2008) Dec. 2008, pp.121-126, doi: 10.1109/EPTC.2008.4763421.
[8] “ Databank: World Development Indicators”, Last visited : 10th Jan, 2016, Available [ www.data.worldbank.org/country/india]
[9] H. Wong, "EPA datacenter study IT equipment feedback summary." Intel Digital Enterprise Group, Cited in: Report to Congress on Server and Data Center Efficiency Public Law, pp.109-431, 2007.
[10] Google’s Green Computing: Efficiency at Scale
[11] “ epeat “, Last visited : 10th Jan, 2016, Available [ www.epeat.net/about-epeat]
[12] “ GREEN ELECTRONICS COUNCIL”, Last visited : 10th Jan, 2016, Available [www.greenelectronicscouncil.org]
[13] S. Shinde, S. Nalawade, and A. Nalawade, “Green Computing: Go Green and Save Energy,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, issue 7, pp. 1075-1077, October 2013.
[14] “ ICLEI Local Governments for sustainability”, Last visited : 10th Jan, 2016, Available [www.iclei.org]
[15] “ ICLEI “, Last visited : 10th Jan, 2016, Available [http://en.wikipedia.org/wiki/ICLEI]
[16] P. Mittal, N. Kaur, “Green Computing- Need and Implementation,” International Journal of Advanced Research in Computer Engineering and Technology, vol. 2, issue 3, pp. 1200-1203, March 2013.
[17] A. Harbia, P. Dimri, D. Negi, and Y. S. Chauhan, “Green Computing Research Challenges: A Review,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, issue 7, pp. 1033-1037, July 2013.
[18] P. Malviya, S. Singh, ”A Study about Green Computing,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, issue 6, pp. 790-794, June 2013.
[19] “HP Officejet Pro 8610/8620/8630 e-All-in-One series”, Last visited : 10th Jan, 2016, Available [www.hp.com/hpinfo/newsroom/press_kits/2014/OJPro/4AA5-0644ENUC.pdf]
[20] “hp Officejet 100 Mobile Printer”, Last visited : 10th Jan, 2016, Available [store.hp.com/wcsstore/hpusstore/pdf/cn551a.pdf ]
[21] “hp Officejet Pro 251 dw Printer”, Last visited : 10th Jan, 2016, Available[ www.hp.com/hpinfo/newsroom/press_kits/2014/OJPro/OfficejetPro251dw.pdf ]
[22] “XEROX ColorQube 8570 Color Printer”, Last visited : 10th Jan, 2016, Available [ www.office.xerox.com/latest/857DS-02U.PDF ]
[23] “ World Databank: Explore. Create. Share: Development Data”, Last visited : 10th Jan, 2016, Available [databank.worldbank.org/data/]
[24] “ Energy use Calculator”, Last visited : 10th Jan, 2016, Available [www.energyusecalculator.com]
Citation
Deepanjan Sen, Dilip Roy Chowdhury, "Green Computing : Efficient Practices And Applications", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.38-47, 2016.
Generalized Anxiety Disorder : Prediction using ANN
Research Paper | Conference Paper
Vol.04 , Issue.01 , pp.48-56, Feb-2016
Abstract
Artificial Neural Network plays an important role in medical diagnostics field and used by medical practitioners and domain specialists for diagnosis and treatment with ultimate accuracy. In this paper, a medical diagnosis system is proposed for predicting Generalized Anxiety Disorder (GAD). In today’s world of computational Intelligence, Swarm Intelligence technique is one of the successive ways to solve hard medical problems. Particle Swarm Optimization (PSO) imitates the behavior of a swarm of insects or a group of fish or birds. In this paper the relative advantages of genetic algorithm, Particle Swarm Optimization and Artificial Neural Network (ANN) are combined to achieve the desired accuracy. ANN’s are often used as a powerful discriminating classifier for tasks in medical diagnosis for early detection of diseases. The data set on this study is composed of 200 patients with various sign symptoms. The objective of this paper is to determine the weights of the neural network using genetic algorithm in less number of iterations and PSO algorithm for feature Reduction. For training the network Quasi-newtonalgorithm is used in this study using various training algorithm parameters. The accuracy obtained using this approach is 98.56%.
Key-Words / Index Term
Artificial Neural Network (ANN); Genetic Algorithm (GA); Particle Swarm Optimization (PSO); Generalized Anxiety Disorder (GAD)
References
[1] Anxiety Dsorders Association of America Available: http://www.adaa.org
[2] ”Generalized Anxiety Disorder: When Worry Gets Out of Control”-national institute of mental Health U.S. Department of Health and Human Services national institutes of Health
[3] Singh Y, and Chauhan, A.S. “Neural Networks in Data mining”, Journal of Theoretical and Applied Information Technology, Vol. 5, No. 1, Pp. 37-42,2009
[4] Roy ChowdhuryDilip, BhattacharjeeDipanwita, "Swarm Intelligence and ANN Techniques for predicting Neonatal Disease" NCRTCSA-2014
[5] Gupta preeti,KaurBikrampal, “Accuracy Enhancement of Heart Disease Diagnosis System Using Neural Network and Genetic Algorithm”International Journal of Advanced Research in Computer Science and Software Engineering 4(8), August - 2014, pp. 160-166
[6] Sivagowry.S ,Dr.Durairaj.M “PSO - An Intellectual Technique for Feature Reduction on Heart Malady Anticipation Data”Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
[7] Valavanis, I.K.,School Of Electrical And Computer Engineering, National Technical University Of Athens, 9 heroonPolytechneiou Str,15780 Zographou, Geece, Mougiakakou, S.G; Grimaldi, Ka Nikita Ks,”. Analysis Of Postprandial Lipemia As A Cardiovascular Disease Risk factor Using Genetic And Clinical Information: An Artificial Neural network Perspective”, Engineering In Medicine And Biology Society 2008.Embs 2008.30th Annual International IEEE Embs Conference Vancouver, British Columbia, Canada, August 20-24, 2008 Pages 4609-4612.
[8] Goldberg E., “Genetic algorithms in search, optimization, and machine learning” , London, Addison-Wesley, 1989.
[9] KaregowdaGowda, Manjunath A.S. and JayaramM.A.,”Application of Genetic Agorithm optimized Neural Network connection weights for Medical Diagnosis of PIMA Indians Diabets”,International Journal on Soft Computing(IJSC), Vol.2,No.2,Pp. 15-23,2011
[10] Parimala M., Sumalatha G. and N. Zareena, “A heuristic Approach to the CHILLI Expert System using PSO Algorithm”, Int. J of Advanced research in Computer Science and Software Engineering(IJARCSSE),Vol.3,Issue 7, Pp. 1126-1130, ISSN: 2277 128X, July 2013
[11] Alperunler, Alper Murat and RatnaBabuChinnam, “m2PSO: A maximum relevance minimum redundancy feature selection method based on Swarm Intellignce for SVM Classification”, Elsevier, 2011, pp 4625-4641.
[12] Shi Y. and Eberhart R., “Parameter Selection in Particle Swarm Optimization”, proceedings of the Seventh Annual Conference on Evolutionary Programming,Pp.591-601,1998.
[13] D. R. Chowdhury, R.K Samanta and M. Chatterjee. "Artificial Neural Network Model for Neonatal Disease Diagnosis", International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (3), 2011
[14] International Classification of Diseases(ICD)”. World Health Organization. Retrieved 23 November 2010.
[15] “Neuro Intelligence using Alyuda”, http://www.alyuda.com
Citation
Dilip Roy Chowdhury, Arpita Das, "Generalized Anxiety Disorder : Prediction using ANN", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.48-56, 2016.
Pattern Variation Method to Detect Lie Using Artificial Neural Network (PVMANN)
Research Paper | Conference Paper
Vol.04 , Issue.01 , pp.57-60, Feb-2016
Abstract
This beautiful world is a collection of variety of people. They have different sort of mind. Some people always speak the truth. Some hardly have the habits to tell the truth. If a person is guilty then he or she must try to save him or herself and conceal his or her sin. If a system can be designed to detect lie then a genuine and trusty counseling can be done for the establishment of the truth. This paper contains an algorithm PVMANN which makes a gateway to detect a person’s truthfulness.
Key-Words / Index Term
Lie detection, Artificial Neural Network (ANN), Pattern, Perceptron, Segmentation
References
[1]. L. Fausett, “Fundamentals of Neural Networks, Architectures, Algorithms and Applications”, Pearson Education, India, 2009.
[2]. Mic Hanlon, Mathematician at Manchestar Metropolitan University, Polygraphic Lie Detecting Technique.
(www.gizmag.com/go/1735/)
[3]. Patrick Kennedy, School of Professional Development
(www3.imperial.ac.uk/newsandeventspggrp/imperialcollege/newssummary/news_10-3-2014-15-20-12)
[4]. Mark Williams Pontin, contributing editor to Technology Review –
(www.technologyreview.com/review/413133/lie-detection/page/1/)
[5]. Saxe L, (1991), Lying, American Psychologist, “Thoughts of an applied social psychologist.” 46(4): 409-15. American Psychological Association, August 5, 2004.
[6]. John P. Clark and Larry L. Tifft, “American Sociological Review”, Vol. 31, No. 4 (Aug. 1966), pp. 516-523.
Citation
Shantanu Chakraborty, Rakesh Kumar Mandal, "Pattern Variation Method to Detect Lie Using Artificial Neural Network (PVMANN)", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.57-60, 2016.
A novel technique to hide information using Daubechies Transformation
Research Paper | Conference Paper
Vol.04 , Issue.01 , pp.61-68, Feb-2016
Abstract
Steganography is an ancient approach of fusing data into innocence medium to hide data secretly in such a way no one can have knowledge of it. This paper presents a technique of Image steganography on frequency domain through Daubechies Transformation. This transformation converts image from spatial domain to frequency domain and allowed embedding with a payload of 2.0 bpb without visual degradation. A gray level image considered as innocent medium of size NxN, where N = 2p, p is an positive integer & is divided into 4x4 non-overlapping blocks in a row major order and a 2D Daubechies Transformation is applied to each of (NxN)/16 blocks to generate frequency components. Three layer of adjustment in terms of security enhancement are applied to improve the quality of stego image. The number of bits embedded per pixel or block is a variable and based on hash function which is used to find the position of each bit. After embedding 4 bits from LSB are grouped into two pairs and XORed, bitwise results are shuffled and stored on last four bits from LSB
Key-Words / Index Term
Daubechies Transform,Cover Image,Stego Image
References
[1] Alturki F.; Russell, Mersereau. (2001, October 7-10). Secure blind image steganographic technique using discrete Fourier transformation. International Conference on Image Processing. Proceedings., vol.2,. 542 545. doi: 10.1109/ICIP.2001.958548
[2] Hashad, A.I.; Madani, A.S.; Wahdan, A.E.M.A. (2005, December 5th 6th). A robust steganography technique using discrete cosine transform insertion. 3rd International Conference on Information and Communications Technology. Enabling Technologies for the New Knowledge Society: ITICT. 255 264, doi: 10.1109/ITICT.2005.1609628.
[3] J.K. Mandal,MadhumitaSengupta, ”Authentication/Secret Message Transformation through Wavelet Transform Based Subband Image Coding (WTSIC)”,2010
[4] Hsieh, Ming-Shing; Tseng, Din-Chang; Huang. Yong-Huai. (2001, October). Hiding digital watermarks using multiresolution wavelet transform. Industrial Electronics, IEEE Transactions on, 48(5). 875 882. doi: 10.1109/41.954550.
[5] MadhumitaSengupta,J. K. Mandal, N. Ghoshal ,”An Authentication Technique in Frequency Domain through Wavelet Transform (ATFDWT)”,2012
[6] Sengupta, Madhumita; Mandal, J. K.,”Transformed IRIS Signature fabricated Authentication in Wavelet based Frequency Domain (TISAWFD)”,2011
[7] MadhumitaSengupta,J.K. Mandal,”Authentication Through Hough Transformation Generated Signature on G-Let D3 Domain (AHSG)”,2013
Citation
Jyotsna Kumar Mandal, Sujit Das,, Madhumita Sengupta , "A novel technique to hide information using Daubechies Transformation", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.61-68, 2016.
Weight-based Starvation-free Improvised Round-Robin (WSIRR) CPU Scheduling Algorithm
Research Paper | Conference Paper
Vol.04 , Issue.01 , pp.69-77, Feb-2016
Abstract
CPU is a primary computer resource, so its scheduling is central to operating system design. When multiple runnable processes exist in the ready queue, OS has the onus of responsibility to decide which one is to run fast. The part of the OS that takes this decision is called scheduler and the algorithm based on which it works, is called the scheduling algorithm. Different kinds of scheduling algorithms exist in the literature. Among them First-Come-First-Served (FCFS), Shortest-job-first (SJF), Priority Scheduling and Round-robin, are mention-worthy. This paper proposes a weight-based starvation-free improvised scheduling algorithm that allocates CPU to processes in round-robin manner while the time quantum is calculated based on the burst time of the processes waiting in the ready queue.
Key-Words / Index Term
Anuradha Banerjee, Nabajit Mondal, Naznin, Poulomi Basu, Prateeksha Singh
References
[1]. http://en.wikipedia.org/wiki/Scheduling_(computing)
[2]. Sindhu M, Rajkamal R, Vigneshwaran P. An Optimum Multilevel CPU Scheduling Algorithm.2010 International Conference on Advances in Computer Engineering
[3]. Wei Zhao, John A. Stankovic. Performance Analysis of FCFSand Improved FCFS Scheduling Algorithms for DynamicReal-Time Computer Systems.IEEE 1989.
[4]. DavenderBabbar, Phillip Krueger. A Performance Comparison of Processor Allocation and Job Scheduling Algorithms for Mesh-Connected Multiprocessors.IEEE 1994.
[5]. Umar Saleem and Muhammad YounusJaved. Simulation Of CPU Scheduling Algorithms. IEEE 2000.
[6]. SnehalKamalapur, Neeta Deshpande. Efficient CPU Scheduling: A Genetic Algorithm based Approach. IEEE 2006.
[7]. Nikolaos D. Doulamis, Anastasios D. Doulamis, Emmanouel A. Varvarigos, and Theodora A. Varvarigou. Fair Scheduling Algorithms in Grids. IEEE Transactions On Parallel And Distributed Systems, Vol. 18, No. 11, November 2007
[8]. Xiao-jing Zhu, Hong-boZeng, Kun Huang, Ge Zhang. Round-robin based scheduling algorithms for FIFO IQ switch. IEEE 2008.
[9]. Apurva Shah, KetanKotecha. Efficient Scheduling Algorithms for Real-Time Distributed Systems. 2010 1st International Conference on Parallel, Distributed and Grid Computing
[10]. DevendraThakor, Apurva Shah. D_EDF: An efficient Scheduling Algorithm for Real-Time Multiprocessor System.IEEE 2011.
[11]. Tong Li, Dan Baumberger, Scott Hahn. Efficient and Scalable Multiprocessor Fair Scheduling Using Distributed Weighted Round-Robin. ACM 2009
[12]. A. Sirohi, A. Pratap, M. Aggarwal, Improvised Round-Robin CPU Scheduling Algorithm, International Journal of Computer Applications, vol. 99, no. 18, August 2014
Citation
CPU, Processes, Ready Queue, Round-Robin, Scheduling, Weight, "Weight-based Starvation-free Improvised Round-Robin (WSIRR) CPU Scheduling Algorithm", International Journal of Computer Sciences and Engineering, Vol.04, Issue.01, pp.69-77, 2016.