Information Retrieval System Using Vector Space Model for Document Summarization
Research Paper | Journal Paper
Vol.2 , Issue.10 , pp.46-50, Oct-2014
Abstract
Document summarization is the process of reducing size of text document and that retains the most important content of the original document into the reduced document(Summary).In recent year there are huge work has been done in document summarization. There are various techniques available for document summarization but most of the techniques used similarity of sentences to extract sentence, in the document summarization a context of the document are important, so our current method used term indexing model to gives index to document as well as sentences in that document. In this proposed system we used context based document indexing based on vector space model. This document indexing model works with document frequency (DF) and term frequency (TF).DF and TF model gives document indexing weight which is used for document summarization. We compare our system with traditional term based indexing model and will prove that our system gives better result than this system.
Key-Words / Index Term
Vector space model, Document frequency, Term Frequency, Document context
References
[1] X. Wan and J. Xiao, “Exploiting Neighborhood Knowledge for Single Document Summarization and Keyphrase Extraction,” ACM Trans. Information Systems, vol. 28, pp. 8:1-8:34, http://doi.acm.org/10.1145/1740592.1740596, June 2010.
[2] K.S. Jones, “Automatic Summarising: Factors and Directions,” Advances in Automatic Text Summarization, pp. 1-12, MIT Press, 1998.
[3] L.L. Bando, F. Scholer, and A. Turpin, “Constructing Query- Biased Summaries: A Comparison of Human and System Generated Snippets,” Proc. Third Symp. Information Interaction in Context, pp. 195-204, http://doi.acm.org/10.1145/1840784. 1840813, 2010.
[4] X. Wan, “Towards a Unified Approach to Simultaneous Single- Document and Multi-Document Summarizations,” Proc. 23rd Int’l Conf. Computational Linguistics, pp. 1137-1145, http://portal. acm.org/citation.cfm?id=1873781.1873909, 2010.
[5] X. Wan, “An Exploration of Document Impact on Graph-Based Multi-Document Summarization,” Proc. Conf. Empirical Methods in Natural Language Processing, pp. 755-762, http://portal.acm.org/ citation.cfm?id=1613715.1613811, 2008.
[6] Q.L. Israel, H. Han, and I.-Y. Song, “Focused Multi-Document Summarization: Human Summarization Activity vs. Automated Systems Techniques,” J. Computing Sciences in Colleges, vol. 25, pp. 10-20, http://portal.acm.org/citation.cfm?id=1747137. 1747140, May 2010.
[7] C. Shen and T. Li, “Multi-Document Summarization via the Minimum Dominating Set,” Proc. 23rd Int’l Conf. Computational Linguistics, pp. 984-992, http://portal.acm.org/citation.cfm?id= 1873781.1873892, 2010.
[8] X. Wan and J. Yang, “Multi-Document Summarization Using Cluster-Based Link Analysis,” Proc. 31st Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 299-306, http://doi.acm.org/10.1145/1390334.1390386, 2008.
[9] D. Wang, T. Li, S. Zhu, and C. Ding, “Multi-Document Summarization via Sentence-Level Semantic Analysis and Symmetric Matrix Factorization,” Proc. 31st Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 307-314, http://doi.acm.org/10.1145/1390334.1390387, 2008.
[10] S. Harabagiu and F. Lacatusu, “Using Topic Themes for Multi- Document Summarization,” ACM Trans. Information Systems, vol. 28, pp. 13:1-13:47, http://doi.acm.org/10.1145/1777432.1777436, July 2010.
[11] H. Daume´ III and D. Marcu, “Bayesian Query-Focused Summarization,” Proc. 21st Int’l Conf. Computational Linguistics and the 44th Ann. meeting of the Assoc. for Computational Linguistics, pp. 305-312, http://dx.doi.org/10.3115/1220175.1220214, 2006.
[12] D.M. Dunlavy, D.P. O’Leary, J.M. Conroy, and J.D. Schlesinger, “QCS: A System for Querying, Clustering and Summarizing Documents,” Information Processing and Management, vol.43, pp.1588-1605, http://portal.acm.org/citation.cfm?id=1284916.
1285163, Nov. 2007.
[13] R. Varadarajan, V. Hristidis, and T. Li, “Beyond Single-Page Web Search Results,” IEEE Trans. Knowledge and Data Eng., vol. 20, no. 3, pp. 411-424, Mar. 2008.
[14] L.-W. Ku, L.-Y. Lee, T.-H. Wu, and H.-H. Chen, “Major Topic Detection and Its Application to Opinion Summarization,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 627-628, http://doi.acm.org/10.1145/ 1076034.1076161, 2005.
[15] E. Lloret, A. Balahur, M. Palomar, and A. Montoyo, “Towards Building a Competitive Opinion Summarization System: Challenges and Keys,” Proc. Human Language Technologies: The 2009 Ann. Conference of the North Am. Ch. Assoc. for Computational Linguistics, Companion Vol. : Student Research Workshop and Doctoral Consortium, pp. 72-77, http://portal.acm.org/citation.cfm?id= 1620932.1620945, 2009.
[16] J.G. Conrad, J.L. Leidner, F. Schilder, and R. Kondadadi, “Query- Based Opinion Summarization for Legal Blog Entries,” Proc. 12th Int’l Conf. Artificial Intelligence and Law, pp. 167-176, http://doi.acm.org/10.1145/1568234.1568253, 2009.
Citation
Vaibhav A. Chavan and Santosh R. Durugkar , "Information Retrieval System Using Vector Space Model for Document Summarization," International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.46-50, 2014.
Radix-4 And 8 Both Encoder Multi Modules Multiplier
Research Paper | Journal Paper
Vol.2 , Issue.10 , pp.51-53, Oct-2014
Abstract
Multiplication may be a for the most part used mathematical process, considerably in signal process and scientific applications. Multiplication having hardware challenge, and therefore the main criterion of upper speed, lower cost, and fewer VLSI space, the most apprehension in customary multiplication, typically realized by K no of cycles with shifting and adding, is to hurry up the underlying multi-operand addition of partial merchandise. during this paper we have a tendency to studied the changed Booth encryption (MBE) technique that has been introduced to scale back the quantity of PP rows, still keeping each straightforward and quick enough the generation method of every row.
Key-Words / Index Term
Modified Booth Encoding, higher speed, lower cost, and less VLSI area
References
[1] R. Landauer, “Irreversibility and Heat Generation in the Computational Process”, IBM Journal of Research and Development, 5, pp. 183-191, 1961.
[2] C.H. Bennett, “Logical Reversibility of Computation”, IBM J.Research and Development, pp. 525-532, November 1973.
[3] T. Toffoli., “Reversible Computing”, Tech memo MIT/LCS/TM-151, MIT Lab for Computer Science (1980).
[4] E. Fredkin and T. Toffoli, “Conservative logic,” Int’l J. Theoretical Physics, Vol. 21, pp.219–253, 1982.
[5] R. Feynman, “Quantum Mechanical Computers,” Optics News, Vol.11, pp. 11–20, 1985.
[6] B. Parhami; “Fault Tolerant Reversible Circuits” Proc. 40th Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA,Oct.2006.
[7] A. Peres, “Reversible Logic and Quantum Computers”, Physical review A, 32:3266- 3276, 1985.
[8] W. N. N. Hung, X. Song, G. Yang, J. Yang and M. Perkowski, “Quantum Logic Synthesis by Symbolic Reachability Analysis”, Proc. 41st annual .
Citation
P.Ashok Shiva Kumar, .K.V.Subrahmanyam and S Chandra Sekhar , "Radix-4 And 8 Both Encoder Multi Modules Multiplier," International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.51-53, 2014.
Comparison on Different Data Mining Algorithms
Research Paper | Journal Paper
Vol.2 , Issue.10 , pp.54-58, Oct-2014
Abstract
Data mining an interdisciplinary research area spanning several disciplines such as machine learning, database system, expert system, intelligent information systems and statistic. Data mining has evolved into an active and important area of research because of previously unknown and interesting knowledge from very large real-world database. Many aspects of data mining have been investigated in several related fields. A unique but important aspect of the problem lies in the significance of needs to extend their studies to include the nature of the contents of the real world database. In this paper we are going to compare the three different algorithms which are commonly used in data mining. These three algorithms are CHARM Algorithm, Top K Rules mining and CM SPAM Algorithm.
Key-Words / Index Term
Data Mining, CHARM algorithm, K rule mining, CM SPAM Algorithm
References
[1] Neelamadhab Padhy, Dr. Pragnyaban Mishra, Rasmita Panigrahi “The Survey of Data Mining Applications And Feature Scope” at International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.3, June 2012.
[2] Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1-892095-02-5, Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.), 1999.
[3] Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN 0-471-66657-2, ohn Wiley & Sons, Inc, 2005.
[4] Dunham, M. H., Sridhar S., “Data Mining: Introductory and Advanced Topics”, Pearson Education, New Delhi, ISBN: 81-7758-785-4, 1st Edition, 2006
[5] M. J. Zaki and K. Gouda. Fast vertical mining using Diffsets. Technical Report 01-1, Computer Science Dept., Rensselaer Polytechnic Institute, March 2001.
[6] M. J. Zaki. Scalable algorithms for association mining. IEEE Transactions on Knowledge and Data Engineering, 12(3):372-390, May-June 2000.
[7] R. Agrawal, T. Imielminski and A. Swami, “Mining Association Rules Between Sets of Items in Large Databases,” Proc. ACM Intern. Conf. on Management of Data, ACM Press, June 1993, pp. 207-216.
[8] P. Tzvetkov, X. Yan and J. Han, “TSP: Mining Top-k Closed Sequential Patterns”, Knowledge and Information Systems, vol. 7, no. 4, 2005, pp. 438-457.
[9] C. Kun Ta, J.-L. Huang and M.-S. Chen, “Mining Top-k Frequent Patterns in the Presence of the Memory Constraint,” VLDB Journal, vol. 17, no. 5, 2008, pp. 1321-1344.
[10] J. Wang, Y. Lu and P. Tzvetkov, “Mining Top-k Frequent Closed Itemsets,” IEEE Trans. Knowledge and Data Engineering, vol. 17, no. 5, 2005, pp. 652-664.
[11] A. Pietracaprina and F. Vandin, “Efficient Incremental Mining of Top-k Frequent Closed Itemsets,” Proc. Tenth. Intern. Conf. Discovery Science, Oct. 2004, Springer, pp. 275-280.
[12] G. I. Webb and S. Zhang, “k-Optimal-Rule-Discovery,” Data Mining and Knowledge Discovery, vol. 10, no. 1, 2005, pp. 39-79.
[13] G. I. Webb, “Filtered top-k association discovery,” WIREs Data Mining and Knowledge Discovery, vol.1, 2011, pp. 183-192.
[14] Y. You, J. Zhang, Z. Yang and G. Liu, “Mining Top-k Fault Tolerant Association Rules by Redundant Pattern Disambiguation in Data Streams,” Proc. 2010 Intern. Conf. Intelligent Computing and Cognitive Informatics, March 2010, IEEE Press, pp. 470-473.
[15] Mabroukeh, N.R., Ezeife, C.I.: A taxonomy of sequential pattern mining algorithms. ACM Computing Surveys 43(1), 1–41 (2010).
[16] Agrawal, R., Ramakrishnan, S.: Mining sequential patterns. In: Proc. 11th Intern. Conf. Data Engineering, pp. 3–14. IEEE (1995)
Citation
Aruna J. Chamatkar and P.K. Butey , "Comparison on Different Data Mining Algorithms," International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.54-58, 2014.
Face Recognition Using PCA Technique
Research Paper | Journal Paper
Vol.2 , Issue.10 , pp.59-61, Oct-2014
Abstract
This paper provides the information about Face Recognition Technology which gives the much more security in the field of multimedia and information technology. To provide the protection to the data we keep the password but as we know hackers can break the password, for that we keep password as our face. Thus for accessing some network or PC by an unauthorized person is virtually impossible and it helps to protect our data. It also provides the user friendliness in human interaction with computer as there is no such physical touch. In this image is captured and stored into database in compress form. Its benefits show in retrieval and in matching. Like the applications of teleconferencing and video call, face recognition is more efficient. Most of the cameras have this application of face recognition which detects the human face and shows appropriate square box on face. In this paper there is an introductory part of this technology. This shows the generic framework and variants that are frequently use by the face recognizer. Some well known face recognition algorithms, such as PCA, Eigenfaces, will also be explained in this paper.
Key-Words / Index Term
PCA Technique, Data Flow Diagram, Principal Components Analysis (PCA)
References
[1] R. Brunelli and T. Poggio, "Face Recognition: Features versus Templates", IEEE Trans. PAMI, 1993, (15)10:1042-1052
[2] M. A. Turk and A. P. Pentland, “Face recognition using eigenfaces,” in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition, Maui, Hawaii, 1991, pp. 586-591
[3] Zhujie and Y.L. Yu, Face Recognition with Eigenfaces, Unknown source, The Hong Kong University of science & Technology, Clear Water Bay, Kowloon, HK, pp. 434-438
[4] E.Lizama, D. Waldoestl and B. Nickolay, “An Eigenfaces-Based Automatic Face Recognition System” 1997 IEEE International Conference on Systems, Man, and Cybernetics, IEEE, New York, NY, 5 vol. 4535, 1997, pp. 174-177
[5] M. Turk and A. Pentland, “Eigenfaces for Recognition”, Journal of Cognitive Neuroscience, March 1991
[6] Reuters News, “Computer Security Threat On Rise – U.S. Survey”, March 7, 1999.
[7] Zhang, J., Yan, Y., and Lades, M., “Face Recognition: Eigenfaces, Elas-tic Matching, and Neural Nets”, Proc. IEEE, vol.85, no.9, pp.1423-1435, 199
[8] Sung, K. and Poggio, T., "Learning a Distribution-Based Face Model for Human Face Detection", Neural Networks for Signal Processing V, pp. 398-406, Cambridge, Mass. 1995.
[9] Pentland, A.P., Moghaddam, B., Starner, T., and Turk, M.A., “View-based and Modular Eigenspaces for Face Recognition”, Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition, pp.84-91, Seattle, WA, 1994.
[10] Chellappa, R., Wilson, C.L., and Sirohey, S., “Human and Machinr Recognition of Faces: A Survey”, Proc. IEEE, vol.83, pp.705-741, May 1995.
[11] Lin, S.-H., Kung, S.Y., and Lin, L.-J., “Face Recognition/Detection by Probabilistic Decision-Based Neural Network”, IEEE Trans. Neu-ral Networks, vol. 8, No. 1, pp.114-132, Jan. 1997
[12] Dempster, A.P., Laird, N.M., and Rubin, D.B., “maximum Likelihood from Incomplete Data via the EM Algorithm”, Journal of Royal Statistics Society, B39, pp.1-38, 1976.s
[13] Harley Geiger (2011-12-06). "Facial Recognition and Privacy". Center for Democracy & Technology. Retrieved 2012-01-10.
[14] R. Brunelli, Template Matching Techniques in Computer Vision: Theory and Practice, Wiley, ISBN 978-0-470-51706-2, 2009
[15] Albiol,A., Albiol,A., Oliver,J., Mossi,J.M.(2012). Who is who at different cameras: people re- identification using depth cameras. Computer Vision, IET. Vol 6(5), 378-387.
Citation
Divesh N. Agrawal and Deepak Kapgate, "Face Recognition Using PCA Technique," International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.59-61, 2014.
Lab Tracer- The Remote Desktop Technology
Research Paper | Journal Paper
Vol.2 , Issue.10 , pp.62-66, Oct-2014
Abstract
Lab Tracer is a remote desktop technology that serves as the future of computer applications. The main objective is to develop an application that can control a computer remotely. Remote desktop technology makes it possible to view another computer’s desktop on our computer. The person sitting on the server can view and control the client’s computer. With fast, reliable, easy-to-use pc from remote control software, it helps us to save hours of running up and down the stairs between computers. The basic idea behind this work is to capture the screenshot of the client and send to the server. In response, mouse events and key events are captured from the server and exchanged those events between the Server and the Client via network.
Key-Words / Index Term
Lab tracer, Remote desktop technology, Remote desktop administration, Remote server, Remote client, Remote access, Remote Method Invocation
References
[1] Shubhra Saggar, “Controlling Remote Desktop”, proceedings of the 2nd National Conference INDIAcom-2008, Computing for Nation Development, February 08-09, 2008.
[2] Harsh Mittal1, Manoj Jain, Latha Banda, “Monitoring Local Area Network Using Remote Method Invocation”, International Journal of Computer Science and Mobile Computing (IJCSMC), Vol. 2, and Issue. 5, pg.50 – 55, May 2013,
[3] Mark P. Sullivan, “Secure Remote Network Administration and Power Management”, Thesis, June 2004.
[4] Janaka Wijekoon, Malitha Wijesundara,, Thilok Dassanayaka, Dineth Samarathunga, Rasanga Dissanayaka, Deshani Perera, ”The Advanced Remote PC Management Suite”, International Conference on Industrial and Information Systems (ICIIS), Pg. 410-413, 2011
[5] Anis Ismail, Mohammad Hajjar, Haissam Hajjar, “Remote Administration Tools: A Comparative Study”, Journal of Theoretical and Applied Information Technology (JATIT), 2005 – 2008.
[6] Shi-hai Huang, Chuang Lin, An'an Luo, Zhen Chen, Xin Jiang, Kai Wang, Hui Zhang, Xue-hai Peng, “Proxy-based Security Audit System for Remote Desktop Access”, 2009 IEEE
[7] Pan-Lung Tsai, Chin-Laung Lei, “Towards Ubiquitous Computing via Secure Desktop Service”, 2001 IEEE, Pg. 187-190.
[8] Timothy C. Lethbridge and Robert Laganière, “Object-Oriented Software Engineering: Practical Software Development using UML and Java”, Second Edition, McGraw Hill, ISBN 0-07-710908-2, 2001
[9] Teamviewer 9-overview
URL: http://www.teamviewer.com/en/index.aspx/.
[10] Remote desktop control
URL: http://www.remote-desktop control.com/
Citation
Midhya Mohan E, Filma Mathew, Glemin George, Harikrishnan V, Vaneza Benny, Bineesh M, "Lab Tracer- The Remote Desktop Technology," International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.62-66, 2014.
Enhancement of the portfolio determination using Multi- Objective Optimization
Research Paper | Journal Paper
Vol.2 , Issue.10 , pp.67-75, Oct-2014
Abstract
Portfolio construction is enabled through the multi objective optimization. The nature of the problem invites the construction through multi objective optimization. Genetic algorithm and the particle swarm optimization is used for the above purpose. The results obtained are compared against the classical Markowitz model. The data from the Nifty from March 2010 to October 2010 has been used. The Stocks from various sectors are used to build the portfolio. The proposed work is promising and the results obtained are outperforming. Comparing on both the algorithms PSO based multi objective optimization serves better than Genetic algorithms based on the results obtained.
Key-Words / Index Term
Portfolio Optimization; MOPSO; MOGA
References
[1] Zadeh LA, “Optimality and non-scalar-valued
performance criteria”, IEEE Trans Automat
Contr, (1963)AC-8:59–60.
[2] Koski J, Silvennoinen R, “Norm methods and
partial weighting in multicriterion optimization of
structures”, Int J Numer Methods Eng, (1987),
24:1101–1121.
[3] R. Timothy Marler • Jasbir S. Arora, “The
weighted sum method for multi-objective
optimization: new insights”, Struct Multidisc
Optim, springer, (2010), 41:853–862.
[4] Marler RT, Arora J S, “Transformation methods
for multiobjective optimization”, Eng Optim,
(2005), 37:551–569.
[5] Ching-Lai Hwang; Abu Syed Md Masud,
“Multiple objective decision making, methods
and applications: a state-of-the-art survey”,
Springer-Verlag, (1979).
[6] Zeleny, M, "Compromise Programming", in
Cochrane, J.L.; Zeleny, M., “Multiple Criteria Decision Making”, University of South Carolina Press, Columbia, (1973), pp. 262–301.
[7] http://en.wikipedia.org/wiki/Multi-
objective_optimization.
[8] Das, I.; Dennis, J. E. (1998). "Normal-Boundary
Intersection: A New Method for Generating the
Pareto Surface in Nonlinear Multicriteria
Optimization Problems", SIAM Journal on
Optimization 8 (3): 631.
doi:10.1137/S1052623496307510.
[9] S. Motta, Renato; Afonso, Silvana M. B.; Lyra,
Paulo R. M. (8 January 2012), "A modified NBI
and NC method for the solution of N-
multiobjective optimization problems",
Structural and Multidisciplinary Optimization.
doi:10.1007/s00158-011-0729-5.
[10] Messac, A.; Ismail-Yahaya, A.; Mattson, C.A.
"The normalized normal constraint method for
generating the Pareto frontier", Structural and
multidisciplinary optimization, (2003). 25
(2): 86–98. doi:10.1007/s00158-002-0276-1.
[11] Messac, A.; Mattson, C. A,"Normal constraint
method with guarantee of even representation of
complete Pareto frontier". AIAA journal 42
(10): 2101–2111, (2004), doi:10.2514/1.8977.
[12] Mueller-Gritschneder, Daniel; Graeb, Helmut;
Schlichtmann, Ulf "A Successive Approach to
Compute the Bounded Pareto Front of Practical
Multiobjective Optimization Problems", SIAM
Journal on Optimization 20 (2): 915–934,
(2009), doi:10.1137/080729013.
[13] Erfani, Tohid; Utyuzhnikov, Sergei V, "Directed
Search Domain: A Method for Even Generation
of Pareto Frontier in Multiobjective
Optimization", Journal of Engineering
Optimization 43 (5): 1–18, (2011), Retrieved
October 17, 2011.
[14] Miettinen, K.; Ruiz, F.; Wierzbicki, A. P,
"Introduction to Multiobjective Optimization:
Interactive Approaches". Multiobjective
Optimization. Lecture Notes in Computer Science
5252, 2008.
[15] Luque, M.; Ruiz, F.; Miettinen, K, "Global
formulation for interactive multiobjective
optimization", OR Spectrum 33: 27, 2008,
doi:10.1007/s00291-008-0154-3.
[16] Ruiz, F.; Luque, M.; Miettinen, K. (2011),
"Improving the computational efficiency in a
global formulation (GLIDE) for interactive
multiobjective optimization", Annals of
Operations Research 197.
[17] Veldhuizen, D; Lamont, G, "Multiobjective
Evolutionary Algorithms: Analyzing the State-
of-the-Art," Evolutionary Computation , vol.8,
no.2, June 2000,pp.125,147.
[18] Goldberg, D.E., & Deb, K.,“A comparative
analysis of selection schemes used in genetic
algorithms”. In G.J.E. Rawlins (Ed.),
Foundations of genetic algorithms, (1991),
pp. 69-93.
[19] Carlos A. Coello Coello, A Short Tutorial on
Evolutionary Multiobjective Optimization,
http://www.cs.bham.ac.uk/~durranrj/NID/
documentCache /tutorial1/tutorial-slides-
coello.pdf, 2001.
[20] http://www.iitmandi.ac.in/ciare/files/8
Ashwani _MOGA.pdf.
[21] http://eden.dei.uc.pt/~cmfonsec/fonseca-ec-
v3n1-preprint.pdf.
[22] Jones, D.F., Mirrazavi, S.K., and Tamiz, M., “
Multiobjective meta-heuristics: an overview of
the current state-of-the-art”, European Journal of
Operational Research 137(1) (2002) 1-9.
[23] http://ie.rutgers.edu/resource/research_paper
/paper_05-008.pdf
[24] Schaffer, J.D, “Multiple Objective optimization
with vector evaluated genetic algorithms”,
International Conference on Genetic
Algorithm and their applications . 1985.
[25] Fonseca, C.M. and Fleming, P.J,
“.Multiobjective genetic algorithms”, In IEE
Colloquium on `Genetic Algorithms for Control
Systems Engineering' (Digest No. 1993/130),
28 May 1993 .
[26] Horn, J., Nafpliotis, N., and Goldberg, D.E, “ A
niched Pareto genetic algorithm for
multiobjective optimization” , In Proceedings
of the First IEEE Conference on Evolutionary
Computation. IEEE World Congress on
Computational Intelligence, 27-29 June 1994.
[27] Murata, T. and Ishibuchi, H., “MOGA : multi-
objective genetic algorithms”, In Proceedings of
1995 IEEE International Conference on
Evolutionary Computation, 29 Nov.-1 Dec.
1995.
[28] Srinivas, N. and Deb, K., “Multiobjective
Optimization Using Nondominated Sorting in
Genetic Algorithms”,Journal of Evolutionary
Computation 2(3) (1994) 221-248.
[29] Zitzler, E. and Thiele, L., “Multiobjective
evolutionary algorithms: a comparative case
study and the strength Pareto approach”, IEEE
Transactions on Evolutionary Computation 3(4)
(1999) 257-271.
[30] Knowles, J.D. and Corne, D.W.,
“Approximating the nondominated front using
the Pareto archived evolution strategy”,
Evolutionary Computation 8(2) 149-172.
[31] Deb, K., Pratap, A., Agarwal, S., and Me
yarivan, T., “A fast and elitist multiobjective
genetic algorithm: “, NSGA-II, IEEE
Transactions on Evolutionary Computation 6(2)
(2002) 182-197.
[32] Sarker, R., Liang, K.-H., and Newton, C, “A
new multiobjective evolutionary algorithm”,
European Journal of Operational Research
140(1) (2002) 12-23.
[33] Lu, H. and Yen, G.G., “Rank-density-based
multiobjective genetic algorithm and benchmark
test function study”, IEEE Transactions on
Evolutionary Computation7(4) (2003) 325-343
[34] http://www.cc.gatech.edu/~bhroleno/cs6601
/mopso.pdf
[35] J. Kennedy and R. C. Eberhart, “Swarm
Intelligence”, San Mateo, CA: Morgan
Kaufmann, 2001.
[36] Carlos A. Coello Coello, “Handling Multiple
Objectives With Particle Swarm Optimization”,
IEEE Transactions On Evolutionary
Computation, Vol. 8, No. 3, June 2004.
[37] Margarita Reyes-Sierra and Carlos A. Coello
Coello,” Multi-Objective Particle Swarm
Optimizers: A Survey of the State-of-the-Art”,
2006.
[38] Eduardo J. Solteiro Pires 1, Jos´e A. Tenreiro
Machado and Paulo B. de Moura Oliveira,
“Entropy Diversity in Multi-Objective Particle
Swarm Optimization”, Entropy 2013, 15, 5475-
5491.
[39] Mishra, S.K.; Panda, G.; Meher, S.; Majhi, R.;
Singh, M., "Portfolio management assessment
by four multiobjective optimization algorithm,"
Recent Advances in Intelligent Computational
Systems (RAICS), 2011 IEEE, vol., no, Sept.
2011, pp.326,331, 22-24.
[40] http://homepages.rpi.edu/~bonisp/NASA-course
/cec05.pdf
[41] http://thesis.topco-global.com/TopcoTRC
/2010_Thesis/B0022.pdf
[42] I. Radziukynienė , A. Žilinskas, “Evolutionary
Methods for Multi-Objective Portfolio
Optimization”, Proceedings of the World
Congress on Engineering 2008 Vol II.
Citation
B. UmaDevi, D. Sundar and DR. P. Alli, "Enhancement of the portfolio determination using Multi- Objective Optimization," International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.67-75, 2014.
Color Code –The Replacement for Bar Code
Research Paper | Journal Paper
Vol.2 , Issue.10 , pp.76-79, Oct-2014
Abstract
In our day-today life we come across a lot of situations where coding is needed. Coding is a technique that reduces the space to store the data. It also makes it easier for future access. During coding, the data in one form is coded to another form which may be legible and sometimes not. This happens because the form of representing the data gets changed while coding. The existing coding formats like barcode have been successful because of its application in several areas like health care and hospital settings, library services and coding of products by its manufacturer. There have been a lot advancement in sensor Technology which paves way to an efficient coding system. Color sensor Technology helps us to replace the existing Bar code system. In this paper, a new approach for coding is introduced by using color codes in place of bar codes. Data compression and encoding are done here to make color codes. Bar code scanner cannot read the code if it is crumpled or distorted and also the length increases the scanning time also increases accordingly. The color fading can be reduced by using colors of different intensities.
Key-Words / Index Term
Coding, Data Compression, Encoding, Color Code, Bar code, Color Sensor Technology
References
[1] Data Compression and Encoding Using Colors, www.technicalsymposium.com, 14 Jan 2014.
[2] W. Fritzsche and J. Popp,”Optical Nano- and Microsystems for Bioanalytics”, Springer Series on Chemical Sensors and Biosensors, ISBN: 978-3-642-25498-7_1, Page No 3- 46, Oct 2012.
[3] John G. Cleary and Ian H. Witten, Data Compression Using Adaptive Coding and Partial String Matching, IEEE Transactions on Communications, Volume Com-32, NO. 4, APRIL 1984.
[4] G. V. Cormack and R. N. S. Horspool, Data Compression Using Dynamic Markov Modeling, the Computer Journal, Volume. 30, No. 6, 1987
[5] Edward L. Hauck, Data Compression Using Run Length Encoding and Statistical Encoding, US PATENT, Dec. 2 1986, Patent Number: 4,626,829
[6] What is a Barcode scanner www.densowave.com/en/adcd/fundamental/barcode/scanner/
[7] How Barcode Scanner work, www.carolinabarcode.com/how-barcode-scanners-work/
[8] Barcode Scanners: How Do They Work, www.waspbarcode.com/buzz/how-barcode-scanners-work/
[9] CCD Barcode Scanner, www.barcodesinc.com/cats/barcode-scanners/ccd/
Citation
Neena George P, Silpa Johnson, Arif P.A, Naveen Pavitran, Diana Davis, "Color Code –The Replacement for Bar Code," International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.76-79, 2014.