Review of Various Load Distribution Methods for Cloud Computing, to Improve Cloud Performance
Review Paper | Journal Paper
Vol.4 , Issue.12 , pp.61-64, Dec-2016
Abstract
Cloud computing in an improve form for grid computing, cluster computing and distributed computing. Cloud computing provides sharing of computing resources such as platform, software, infrastructure and data over the network, on pay and use basis. Cloud computing provides service PaaS, IaaS and SaaS to various cloud users, by supporting various cloud models private, public, community and hybrid. Cloud computing reduces overall cost and efforts. Day by day numbers of cloud user are increasing rapidly. Higher number of cloud users are requires high computing resources on time, which creates a big challenge for cloud service providers so serve computing resources on time. Various cloud researchers are working on improvement on cloud performance by correct load distribution among cloud user request and computing resources. In this survey paper we are presenting a comparative study of various load distribution method for cloud computing.
Key-Words / Index Term
Cloud Computing ,Load Balancing ,Grid Computing ,Cloud Services
References
[1]. Sidra Aslam, Munam Ali Shah, �Load Balancing Algorithms in Cloud Computing: A Survey of Modern Techniques�, National Software Engineering Conference (NSEC 2015), IEEE, PP 30-36
[2]. Geethu Gopinath P P(1), Shriram K Vasudevan, An in-depth analysis and study of Load balancing techniques in the cloud computing environment, 2nd International Symposium on Big Data and Cloud Computing (ISBCC�15), Science Direct, Procedia Computer Science 50 ( 2015 ) 427 � 432
[3]. Aarti Singha, Dimple Junejab, Manisha Malhotraa,� Autonomous Agent Based Load Balancing Algorithm in Cloud Computing,� International Conference on Advanced computing Technologies and Applications (ICACTA-2015), Science direct, Procedia Computer Science 45 ( 2015 ) 832 � 841
[4]. Bhaskar. R, Deepu. S.R and Dr. B.S. Shylaja (2012, September). Dynamic Allocation Method for Efficient Load Balancing in Virtual Machines for Cloud Computing Environment. Advanced Computing: An International Journal (ACIJ), 3(5), pp. 53-61.
[5]. Dr. PK Sinha, SR Dhore,(2010),Multi-Agent Optimized Load balancing Using Spanning Tree for Mobile Services, International Journal Of Computer Application , 1(6).
[6]. G. Xu, J. Pang, X. Fu. (2013, Feb). A Load Balancing Model Based on Cloud Partitioning for the Public Cloud. Tsinghua Science and Technology.[Online].18(1),pp. 34-39.
[7]. J. Hu, J. Gu, G. Sun, T. Zhao. A Scheduling Strategy on Load Balancing of Virtual Machine Resources in Cloud Computing Environment in Proc. PAAP, 2010, pp. 89-96.
[8]. K. B. Mahieddine. An Evaluation of Load Balancing Algorithms for Distributing System A thesis of Doctor of Philosophy submitted in The University of Leeds, School of Computer Studies, October 1991.
[9]. M. Amar, K. Anurag, K. Rakesh, K. Rupesh, Y. Prashant (2011). SLA Driven Load Balancing For Web Applications in Cloud Computing Environment, Information and Knowledge Management, 1(1), pp. 5-13.
[10]. M.Randles, D.Lamb, AT.Bendiab. A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing. In Proc. ICAINAW, 2010, pp.551-556.
[11]. R. Ezumalai,G. Aghila, R. Rajalakshmi,(2010, Feb). Design and Architecture for Efficient Load balancing with Security Using Mobile Agents.International Journal of Engineering & Technology (IACSIT). pp. 149-160.
[12]. S Jing and K She (2011 April). A Novel Model for Load Balancing in Cloud Data Centre. Journal of Convergence Information Technology. , pp. 29-38.
[13]. .S. Ray and A.D. Sarkar (2012, October). Execution Analysis of Load Balancing Algorithms in Cloud Computing Environment. International Journal on Cloud Computing: Services and Architecture (IJCCSA). 2(5), pp. 1-13.
[14]. S. S. Moharana, R. D. Ramesh & D.Powar,(2013, May). Analysis of Load Balancers in Cloud Computing. International Journal of Computer Science & Engineering (IJCSE), pp.: 101-108.
[15]. S.C. Wang,K.Q. Yan, W.P.Liao, S.S. Wang. Towards a Load Balancing in a three-Level Cloud Computing Network. In Proc. ICCSIT, 2010, pp.108-113.
[16]. T. Desai, J. Prajapati,(2013, Nov). A Survey of Various Load Balancing Techniques And Challenges In Cloud Computing. International Journal of Scientific & Technology Research, [Online]. 2(11), pp.158-161.
[17]. Y.Xu, L. Wu, L. Guo, Z.Chen, L.Yang, Z.Shi. An Intelligent Load Balancing Algorithms Towards Efficient Cloud Computing. In Proc. AAAI Workshop, 2011, pp. 27-32.
Citation
R. Upadhyay, U. Lilhore, "Review of Various Load Distribution Methods for Cloud Computing, to Improve Cloud Performance," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.61-64, 2016.
Development of Gray Scale Image Processing computing Technique to Remove the Unwanted Frequency Patches on Sodar Facsimiles
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.65-71, Dec-2016
Abstract
Gray Scale Image Processing (GSI) technique has developed using MATLAB�s Digital Signal Processing toolbox to remove the unwanted frequencies present in the SODAR facsimiles and also to enhance the pixel quality (intensity) of the facsimiles for a better view. In general, the sources of these noises (unwanted frequencies) are airplanes, Choppers, Hi-frequency sound systems and man-made noises nearby SODAR antenna. Already some filtering techniques like Gaussian filter, median filter, and other DSP filter techniques are employed to remove the noises from facsimiles but these techniques are incapable of enhancing the pixel clarity. This GSI computing techniques could be applied directly to SODAR facsimiles, which is not possible with other filtering techniques. The beauty of the technique is that time was taken to complete the process within 10 to 20 seconds. Here in this paper, all mathematical computing techniques are designed and developed through MATLAB.
Key-Words / Index Term
Computing, Facsimile, Filter, Gaussian, Grayscale, Histogram, Image, MATLAB, Noise, Pixel, SODAR
References
[1]. Anandan, V.K., Shravan, K.M., and Srinivasa Rao, I., 2008: �First results of experimental tests of newly developed NARL phased array Doppler sodar�, J. Atmos. Oceanic Technol. 25, 1778-1784.
[2]. Antoniou, I., J�rgensen, H.E., Ormel, F., Bradley, S., von Hunerbein, S., Emeis, S., and Warmbier, G., 2003: �On the theory of sodar measurement techniques�, Riso-R-1410 (EN), Ris� National Laboratory, Roskilde, Denmark, 1-60.
[3]. Asimakopoulos, D.N., Helmis, C.G., and Michopoulos, J., 2004: �Evaluation of sodar methods for the determination of the atmospheric boundary layer mixing height�, Meteorol. Atmos. Phys. 85, 85-92.
[4]. Balser, M. and Amber, F.E., 1985: �Phased Array Acoustic Antenna�, U.S. Pat. No. 4,558,594 dated December 17, 1985, United States Patents and Trademark Office, Alexandria, VA.
[5]. Baumann-Stanzer, K. and Piringer, M., 2004: �Foehn signals detected by sodar wind and turbulence measurements in the Rhine Valley, Austria, during the MAP field phase�, Meteorol. Atmos. Phys. 85, 125-139.
[6]. Beran, C.W., Little, C.G., and Willmarth, B.C., 1971: �Acoustic Doppler measurements of vertical velocities in the atmosphere�, Nature, 230, 160-162.
[7]. Bradley, S., 2008: �Atmospheric Acoustic Remote Sensing�, CRC Press, USA.
[8]. Bradley, S., Mursch-Radlgruber, E., and von H�nerbein, S., 2007: �Sodar measurements of wing vortex strength and position�, J. Atmos. Oceanic Tech. 24, 141-155.
[9]. Neff, W.D., 1978: �Beam width effects on acoustic backscatter in the planetary boundary layer�, J. Appl. Meteorol. 17, 1514-1520.
[10]. M. Hareesh Babu and et.all �Scattering of Sodar Signal by Turbulence in Homogenous, Isotopic and other Mediums�, IJCSE,Vol-2,Issue-4,page1-5;April2014.E-ISSN:2347-2693.
[11]. Nilsson, A., 2010: �The Sodar as a Screening Instrument�, M.S. Thesis, Department of Earth Sciences, Air, Water and Landscape Science, Uppsala University, Uppsala, Sweden.
[12]. Painter, E. and Spanias, A., 1996: �A Matlab software tool for the introduction of speech coding fundamentals in a DSP course�, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal processing, 1133-1136.
[13]. Pang, X. and Grabl, H., 2005: �High-frequency single-board Doppler mini sodar for precipitation measurements. Part I: Rainfall and hail�, J. Atmos. Oceanic Technol. 22, 421-432.
[14]. Purdy, R.J., Blankenship, P.E., Muehe, C.E., Rader, C.M., Stern, E., and Williamson, R.C., 2000: �Radar signal processing�, Lincoln Laboratory Journal, 12, 297-320.
Citation
M.H. Babu, M.B.N. Bhushanamu, D.S.S.N Raju, M. Purnachandra Rao, "Development of Gray Scale Image Processing computing Technique to Remove the Unwanted Frequency Patches on Sodar Facsimiles," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.65-71, 2016.
An Efficient Human Recognition Using Background Subtraction and Bounding Box Technique for Surveillance Systems
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.72-77, Dec-2016
Abstract
Visual surveillance has been a very active research topic in the last few years due to its growing importance in security, law enforcement, and military applications. The project presents moving object detection based on background subtraction for video surveillance system. In all computer vision system, the important step is to separate moving object from background and thus detecting all the objects from video images. The main aim of this paper is to design a bounding box concept for the human detection and tracking system in the presence of crowd. The bounding box around each object can track the moving objects in each frame and it can be used to detect crowd and the estimation of crowd. This paper gives the implementation results of bounding box for detecting objects and its tracking. In order to remove some unwanted pixels, morphological erosion and dilation operation is performed for object edge smoothness. The simulated result shows that used methodologies for effective object detection has better accuracy and with less processing time consumption rather than existing methods.
Key-Words / Index Term
Input video, Frame separation, Background subtraction, Morphological Filtering, Performance measurement
References
[1]. M. Kass, A. Witkin, and D. Terzopoulos. Snakes: active contour models. Int. J. Comput. Vision 1, 321�332, 1988.
[2]. V.Caselles, R. Kimmel, and G. Sapiro.Geodesic active contours. In IEEE International Conference on Computer Vision .694�699, 1995.
[3]. N. Paragios, and R. Deriche.. Geodesic active contours and level sets for the detection and tracking of moving objects. IEEE Trans. Patt. Analy. Mach. Intell. 22, 3, 266�280, 2000.
[4]. Comaniciu, D. And Meer, P. 2002. Mean shift: A robust approach toward feature space analysis. IEEE Trans. Patt. Analy. Mach. Intell. 24, 5, 603�619.
[5]. S. Zhu, and A. Yuille. Region competition: unifying snakes, region growing, and bayes/mdl for multiband image segmentation. IEEE Trans. Patt. Analy. Mach. Intell. 18, 9, 884�900, 1996.
[6]. S.C. Cheung and C. Kamath, "Robust techniques for background subtraction in urban traffic video," Video Communications and Image Processing, SPIE Electronic Imaging, UCRL Conf. San Jose, vol.200706, Jan 2004.
[7]. L. Maddalena and A. Petrosino, �A self-organizing approach to detection of moving patterns for real-time applications,� in Proc. 2nd Int. Symp. Brain, Vision, and ArtificialIntelligence, 2007, pp. 181�190, Lecture Notes Comput. Sci. 4729
[8]. N. McFarlane, C. Schofield, �Segmentation and tracking of piglets in images�, Machine Vision Application, Vol. 8, No. 3, pp. 187-193, 1995
[9]. C. Stauffer , W.E.L. Grimson, �Adaptive background mixture models for real-time tracking,� In Proc. Computer Vision and Pattern Recognition conference ,pp. 246-252, 1999.
[10]. Z. Zivkovic and F. van der Heijden,� Efficient adaptive density estimation per image pixel for the task of background subtraction�, Pattern Recognition Letters, Vol. 27 No.7, pp. 773�780,
[11]. KanokphanLertniphonphan , SupavadeeAramvith and Thanarat H,�The Region-Based Distance of Oriented Gradient and Motion Directionfor Human Action Classification�, International Sumposium onCommunication and Information technologies, IEEE 2012.
[12]. Kairoek Choeychuent, PinitKumhomta nd and KosinChamnongthait,�An Efficient Implementation of the Nearest Neighbor Based VisualObjects Tracking�, International Symposium on Intelligent SignalProcessing and Communication Systems (ISPACS2006), Japan,2006.
[13]. Smitha Suresh, Chitra K and Deepak P� Patch Based frame work forocclusion Handling�, IEEE 2013.
[14]. Nan Lu, Jihong Wang, Q.H Wu, Li Yang, An Improved Motion Detection Method for Real-Time Surveillance, International Journal Of Computer Science, vol.1, Issue 6, 2008.
[15]. Guangping Hu, HuijieLian, Pei Wang, Design and Research on the Motion Target Detection and Tracking Algorithm, (978-1-4244-76183)Information Science and Engineering, 2nd International conference, pp 1114-1117, Dec 2010.
Citation
A.C. Saindane, P.S. Patil, "An Efficient Human Recognition Using Background Subtraction and Bounding Box Technique for Surveillance Systems," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.72-77, 2016.
Clustering and Energy Efficiency in Wireless Sensor Networks: A Study
Survey Paper | Journal Paper
Vol.4 , Issue.12 , pp.78-82, Dec-2016
Abstract
A wireless sensor network comprises a number of small sensors that communicate with each other. Each sensor collects the data and communicates through the network to a single processing center that is a base station. The communication of node and process of message passing consumes energy. This energy consumption by the nodes to transmit data decreases the network lifetime significantly. Clustering is by far the best solution to save the energy consumption in the context of such network. Clustering divides the sensors into groups, so that sensors communicate information only to cluster heads and then the cluster heads communicate the aggregated information to the processing center so as to save energy. This paper studies and discusses various dimensions and approaches of some broadly discovered algorithms for clustering. It also presents a comparative study of various clustering algorithms and discussion about the potential research areas and the challenges of clustering in wireless sensor networks.
Key-Words / Index Term
base station; clustering; cluster head;multi hop;nodes; sensors; single hop; WSN
References
[1] Saman Siavoshi, et. al, �Load-balanced Energy Efficient Clustering Protocol for Wireless Sensor Eetworks� IET Wireless Sensor Systems,Vol. 06, Issue-03, pp. 67�73, 2016.
[2] Wendi B. Heinzelman,et. al, �An Application-Specific Protocol Architecture for Wireless Microsensor Networks�. IEEE Transactions on Wireless Communications, Vol. 01, No- 04, Oct. 2002
[3] Lindey, S., Raghavendra, C.S., �PEGASIS: Power Efficient Gathering in Sensor Information System�, Proceedings of IEEE Aerospace Conference., Vol. 03, pp. 1125�1130, 2002
[4] Shamneesh Sharma, Dinesh Kumar and Keshav Kishore, "Wireless Sensor Networks- A Review on Topologies and Node Architecture", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (19-25), Oct -2013
[5] Younis, O., Fahmy, S.: �HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Adhoc Sensor Networks�, IEEE Transactions on Mobile Computing., 2004, Vol. 03, No-04, pp. 660�669, 2004
[6] C. Li, M. Ye, G. Chen, and J. Wu., �An energy efficient unequal clustering mechanism for wireless sensor networks�. In Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems Conference, 2005
[7] R.Nathiya and S.G.Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (36-43), Feb -2014
[8] Jongsik Jung et. al., �A Forwarding Scheme for Reliable and Energy-Efficient Data Delivery in Cluster-based Sensor Networks� , IEEE Communications Letters, Vol. 09, No.-02, February, 2005
[9] Atul Rana, Manju Bala and Varsha , "Review Paper on MSEEC: Energy Efficient Clustering Protocol in HWSN", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (71-75), May -2016
[10] Ming Yu et. al. �A Dynamic Clustering and Energy Efficient Routing Technique for Sensor Networks�, IEEE Transactions On Wireless Communications, Vol. 06, No-08, August 2007
[11] Ablolfazl Afsharzadeh Kazerooni, Hamed Jelodar And Javad Aramideh, �Leach And Heed Clustering Algorithms In Wireless Sensor Networks: A Qualitative Study� Advances in Science and Technology Research Journal Vol. 09, No.-25, pp. 7�11, March 2015.
[12] Tuba Firdaus et. al. �A Survey on Clustering Algorithms for Energy Efficiency in Wireless Sensor Network�
[13] I.F. Akyildiz et al., Wireless sensor networks: a survey, Computer Networks:The International Journal of Computer and Telecommunications Networking,Vol.38, Elsevier, pp. 393-422, March, 2002
[14] D. Culler, D. Estrin, M. Srivastava, "Overview of Sensor Networks", IEEE Computer Magazine, USA, Vol. 37, pp. 41-49, August, 2004.
[15] S. Ghiasi, A. Srivastava, X. Yang, M. Sarrafzadeh, �Optimal energy aware clustering in sensor networks�,Sensors Magazine MDPI 1 (1),Vol. 02, Issue-07, pp. 258-269,2004.
Citation
V. Sharma , "Clustering and Energy Efficiency in Wireless Sensor Networks: A Study," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.78-82, 2016.
Competitive Influence Maximization in Social Networks
Review Paper | Journal Paper
Vol.4 , Issue.12 , pp.83-86, Dec-2016
Abstract
Impact amplification is aware of augment the good thing about infective agent promoting in informal organizations. The defect of impact growth is that it does not acknowledge specific shoppers from others, despite the likelihood that some things are often useful for the actual shoppers. For such things, it`s a superior system to consider boosting the impact on the actual shoppers. During this paper, we tend to detail an effect boost issue as question handling to acknowledge specific shoppers from others. We tend to demonstrate that the question handling issue is NP-hard and its target capability is sub secluded. We tend to propose a need model for the estimation of the target capability and a fast covetous primarily based shut estimation strategy utilizing the need model. For the need model, we tend to explore a relationship of the way between shoppers. For the covetous technique, we tend to estimate a productive progressive overhauling of the negligible addition to our goal capability. We tend to lead trials to assess the planned technique with real datasets, and distinction the outcomes and people of existing systems that area unit adjusted to the problem. From our trial results, the planned strategy is not any but asking of extent speedier than the prevailing routines by and enormous whereas accomplishing high truth. Also we are implementing Maximum Coverage algorithm in which will post or spread add(product list) as per category wise means we will divide the age category in different age group range by using Maximum Coverage algorithm and that particular adds will be displayed to particular age group users. This allows the marketers to plan and evaluate strategies online for advertised products.
Key-Words / Index Term
Graph Algorithms, Influence Maximization, Independent Cascade Model, Social Networks
References
[1] P. Domingos and M. Richardson, �Mining the network value of customers,� in Proc. 7th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2001, pp. 57�66.
[2]D. Kempe, J. Kleinberg, and E. Tardos, �Maximizing the spread of influence through a social network,� in Proc. 9th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2003, pp. 137�146.
[3]W. Chen, C. Wang, and Y. Wang, �Scalable influence maximization for prevalent viral marketing in large-scale social networks,� in Proc. 16th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2010, pp. 1029�1038.
[4] F.-H. Li, C.-T. Li, and M.-K. Shan, �Labeled influence maximization in social networks for target marketing,� in Proc. IEEE 3rd Int. Conf. Privacy, Secur., Risk Trust, Int. Conf. Social Comput., 2011, pp. 560�563.
[5] W. Lu and L. Lakshmanan, �Profit maximization over social networks,� in Proc. IEEE 12th Int. Conf. Data Mining, 2012, pp. 479�488.
[6]K. Jung, W. Heo, and W. Chen, �Irie: Scalable and robust influence maximization in social
networks,� in Proc. IEEE 12th Int. Conf. Data Mining, 2012, pp. 918�923.
[7] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, �Cost-effective outbreak detection in networks,� in Proc. 13th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2007, pp. 420�429.
[8] A. Goyal, W. Lu, and L. V. Lakshmanan, �CELF++: Optimizing the greedy algorithm for influence maximization in social networks,� in Proc. 20th Int. Conf. Companion World Wide Web, 2011, pp. 47�48.
[9] A. Goyal, F. Bonchi, L. Lakshmanan, and S. Venkatasubramanian, �On minimizing budget and time in influence propagation over social networks,� Soc. Netw. Anal. Mining, vol. 3, no. 2, pp. 179� 192, 2013.
[10] N. Barbieri, F. Bonchi, and G. Manco, �Topic-aware social influ- ence propagation models,� in Proc. IEEE 12th Int. Conf. Data Min- ing, 2012, pp. 81�90.
[11] M. Cha, A. Mislove, and K. P. Gummadi, �A measurement-driven analysis of information propagation in the flickr social network,� in Proc. 18th Int. Conf. World Wide Web, 2009, pp. 721�730.
[12] E. Sun, I. Rosenn, C. Marlow, and T. Lento, �Gesundheit! model- ing contagion through facebook news feed,� in Proc. Int. AAAI Conf. Weblogs Soc. Media, 2009, pp. 146�153.
[13] H. Kwak, C. Lee, H. Park, and S. Moon, �What is twitter, a social network or a news media?� in Proc. 19th Int. Conf. World Wide Web, 2010, pp. 591�600.
[14] Analytics: An Intelligent Approach in Clinical Trail Management Ankit Lodha* Analytics Operations Lead, Amgen, Thousand Oaks, California, USA.
[15] Agile: Open Innovation to Revolutionize Pharmaceutical Strategy Ankit Lodha University of Redlands, 333 N Glenoaks Blvd #630, Burbank, CA 91502.
[16] Clinical Analytics � Transforming Clinical Development through Big Data Ankit Lodha University of Redlands, 333 N Glenoaks Blvd #630, Burbank, CA 91502.
Citation
S.S. Kamble, T.I. Bagban, "Competitive Influence Maximization in Social Networks," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.83-86, 2016.
DWT Based PCA and K-Means Clustering Block Level Approach for SAR Image De-Noising
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.87-91, Dec-2016
Abstract
Visual data are transmitted as the high quality digital images in the major fields of communication in all of the modern applications. These images on receiving after transmission are most of the times corrupted with noise. This thesis focused on the work which works on the received image processing before it is used for particular applications. We applied image denoising which involves the manipulation of the DWT coefficients of noisy image data to produce a visually high standard denoised image. This works consist of extensive reviews of the various parametric and non parametric existing denoising algorithms based on statistical estimation approach related to wavelet transforms connected processing approach and contains analytical results of denoising under the effect of various noises at different intensities .These different noise models includes additive and multiplicative type�s distortions in images used. It includes Gaussian noise and speckle noise. The denoising algorithm is application independent and giving a very high speed performance with desired noise less image even in the presence of high level distortion. Hence, it is not required to have prior knowledge about the type of noise present in the image because of the adaptive nature of the proposed denoising algorithm.
Key-Words / Index Term
Image - denoising, DWT, Gaussian noise , PCA ,K mean clustering
References
[1] Z. Cai, T. H. Cheng, C. Lu, and K. R. Subramanian, �Efficient waveletbased image denoising algorithm,� Electron. Lett., vol. 37, no. 11, pp. 683�685, May 2001.
[2] S. Chang, B. Yu, and M. Vetterli, �Adaptive wavelet thresholding for image denoising and compression,� IEEE Trans. Image Processing, vol. 9, pp. 1532�1546, Sept. 2000.
[3] F. Luisier, T. Blu, and M. Unser, �A new SURE approach to image denoising: Interscale orthonormal wavelet thresholding,� IEEE Trans. Image Process., vol. 16, pp. 593-606, 2007.
[4] T. Cai and B.W. Silverman, �Incorporating information on neighboring coefficients into wavelet estimation,� Sankhya, vol. 63, pp. 127�148, 2001.
[5] M. S. Crouse, R. D. Nowak, and R. G. Baraniuk, �Wavelet-based signal processing using hidden Markov models,� IEEE Trans. Signal Processing, vol. 46, pp. 886�902, Apr. 1998.
[6] D. L. Donoho and I. M. Johnstone, �Ideal spatial adaptation by wavelet shrinkage,� Biometrika, vol. 81, no. 3, pp. 425�455, 1994.
[7] H. Rabbani, �Image denoising in steerable pyramid domain based on a local Laplace prior,� Pattern Recognition, vol. 42, pp. 2181-2193, 2009.
[8] A. Achim and E. E. Kuruoglu, �Image denoising using bivariate α-stable distributions in the complex wavelet domain,� IEEE Signal Process. Lett., vol. 12, pp. 17-20, 2005.
[9] A. Pizurica and W. Philips, �Estimating the probability of the presence of a signal of interest in multi resolution single- and multiband image denoising,� IEEE Trans. Image Process., vol. 15, pp. 654-665, 2006.
[10] M. K. Mihcak, I.Kozintsev, K. Ramchandran, and P. Moulin, �Low-complexity image denoising based on statistical modeling of wavelet coefficients,� IEEE Signal Processing Lett., vol. 6, pp. 300�303, Dec. 1999.
[11] Q. Guo and S. Yu, �Image denoising using a multivariate shrinkage function in the curvelet domain,� IEICE Electron. Express, vol. 7, pp. 126-131, 2010.
[12] L. Sendur and I. W. Selesnick, �A bivariate shrinkage function for wavelet based denoising,� in IEEE ICASSP, 2002.
Citation
D. Tripathi, V.K. Shukla, "DWT Based PCA and K-Means Clustering Block Level Approach for SAR Image De-Noising," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.87-91, 2016.
A Survey on Retinal Area Detector Using SLO Images
Survey Paper | Journal Paper
Vol.4 , Issue.12 , pp.92-97, Dec-2016
Abstract
Scanning Laser ophthalmoscopes (SLOs) are going to be used for early detection of retinal diseases. it`s a method of examination of the attention. The advantage of exploitation SLO is its wide field of scan, which can image associate outsized an area of the membrane for higher identification of the retinal diseases. On the opposite aspect, throughout the imaging methodology, artefacts like eyelashes and eyelids are also imaged in conjunction with the retinal space. This brings an enormous challenge on the thanks to exclude these artefacts. In planned novel approach to automatically extract out true retinal house from associate SLO image based mostly on image method and machine learning approaches. the straightforward Linear unvaried cluster (SLIC) is that the rule utilised in super-pixel calculation. To decrease the unpredictability of image preparing errands and supply associate advantageous primitive image vogue. to scale back the quality of image method tasks and provide a convenient primitive image pattern, conjointly to classified pixels into utterly totally different regions primarily based on the regional size and compactness, referred to as super-pixels. The framework then calculates image based mostly choices reflective textural information and classifies between retinal house and artefacts. The survey presents different methods that are used to detect the artefacts.
Key-Words / Index Term
Scanning Laser Ophthalmoscope, retinal image analysis,feature selection, retinal artefacts extraction
References
[1] Amit Madhukar Wagh , �Eyelids, Eyelashes Detection Algorithm and Hough Transform Method for Noise Removal in Iris Recognition �, Biomedical Signal Processing and Control 25 (2016) 108117.
[2] Mohammad Javad Aligholizadeh, Shahram Javadi, Sabbaghi-Nadooshan Eyelid and Eyelash Segmentation Based on Wavelet Transform for Iris
Recognition., 2011 4th International Congress on Image and Signal Processing.
[3] A.V.Mire and B.L.Dhote, �Iris Recognition System with Accurate Eyelash Segmentation Improved FAR, FRR using textural Topological Features�, IEEE Trans.Med. Imaging, vol. 7, pp. 09758887, 2010.
[4] Zeinab Ghassabi, Jamshid Shanbehzadeh and Ali Mohammadzadeh � structure-based region detector for retinal image registration, Department
of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran.
[5] D. Zhang, D. Monro, and S. Rakshit, �Eyelash removal method for human iris recognition�,in Proc. IEEE Int. Conf. Image Process., 2006, pp. 285288.
[6] Jiri Minar, Marek Pinkava, Malay Kishore Dutta and Namita Sengar Automatic Extraction of Blood Vessels and Veins using Laplace Operator in Fundus Image Department of Telecommunications, Faculty of Electrical Engineering, Brno University of Technology, Technicka.
[7] J. Xu, O. Chutatape, P. Chew, �Human Iris Segmentation for Iris Recognition in Unconstrained Environments �, nternational Journal of Computer Science Issues Vol. 9, Issue 1, No 3, January 2012 473482.
[8] Yuexian ZQU, Guangyi SHI, Yufeng JIN, and Yali ZHENG �Extraocular image processing for retinal prosthesis based on DSP�.The Key Laboratory of Integrated Microsystems, Shenzhen Graduate School ofPeking University, Shenzhen China.
[9] Carla Agurto, Sergio Murillo, Victor Murray, Marios Pattichis, Stephen Russell and Michael Abramoff �Detection and Phenotyping of retinal disease using AM-FM Processing for feature extraction�. University of New Mexico, Department of Electrical and Computer Engineering Albuquerque, NM 87131, USA, University of Iowa, Department of Ophthalmology and Visual Sciences Iowa City, IA 52242, USA, VisionQuest Albuquerque, NM 87109, USA.
[10] Y.-H.Li,M.Savvides,and T.Chen, �Investigating useful and distinguishing features around the eyelash region�,in Proc. 37th IEEE Workshop Appl. Imag.
Pattern Recog. 2008, pp. 16.
[11] H. Yu, C. Agurto, S. Barriga, S. C. Nemeth, P. Soliz, and G. Zamora �Automated image quality evaluation of retinal fundus photographs in diabetic retinopathy screening�, Proc. IEEE Southwest Symp. Image Anal. Interpretation, 2012, pp. 125128.
[12] J. A. M. P. Dias, C. M. Oliveira, and L. A. d. S. Cruz�Retinal image quality assessment using generic image quality indicators�, IEEE Trans. Inf.
Technol.Biomed. 16 (4) (2012) 644657.
[13] Suraya Mohammad, et al., �Texture analysis for the segmentation of optic disc inretinal images�, in: IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2013, pp. 42654270.
[14] Faisal KK, et al., �Study on Diabetic Retinopathy Detection Techniques�, in: IJCSE International Journel of Computer Science and Engineering, Volume-04, Issue-12, Page No 137-140, Dec - 2016, pp
Citation
G. Gopi, M.R. Kavitha, K.K. Faisal , "A Survey on Retinal Area Detector Using SLO Images," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.92-97, 2016.
Security Technology
Review Paper | Journal Paper
Vol.4 , Issue.12 , pp.98-103, Dec-2016
Abstract
All input is evil until proven otherwise!‖�so security technology come into play.With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world. The fact that the information and tools needed to penetrate the security of corporate networks are widely available has increased that concern. Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. Tools that probe for system vulnerabilities, such as the Security Administrator Tool for Analyzing Networks (SATAN), and some of the newly available scanning and intrusion detection packages and appliances, assist in these efforts, but these tools only point out areas of weakness and may not provide a means to protect networks from all possible attacks. Thus, as a network administrator, you must constantly try to keep abreast of the large number of security issues confronting you in today`s world. This paper describes many of the security issues that arise when connecting a private network. Understand the types of attacks that may be used by hackers to undermine network security. For decades, technology has transformed almost every aspect of business, from the shop floor to the shop door. While technology was a fundamental enabler, it was often driven from an operational or cost advantage and seen as separate from business itself. The new reality is that technology doesn�t support the business�technology powers the business. IT risks are now business risks and IT opportunities are now business opportunities.
Key-Words / Index Term
Security, Fires, IP networks, Internet, Filtering
References
[1]. "Using the Domain Name System for System Break-Ins" by Steve Bellovin, 1995
[2]. U.S. National Strategy to Secure Cyberspace, p. 30 February 2003
[3]. RIPE NCC DNSSEC Policy Department of Homeland and Security wants master key for DNS Heise News, 30 March 2007
[4]. Analysis: of Owning the keys to the Internet [UPI]], April 21, 2007
[5]. Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, �Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", International Journal of Computer Science, Information Technology and Security, Vol. 2, No. 4, Aug 2012.
[6]. Dipali D. Punwatkar and Kapil N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (65-69), Feb -2014, E-ISSN: 2347-2693
[7]. Shivlal Mewada and Umesh Kumar Singh, �Measurement Based Performance of Reactive and Proactive Routing Protocols in WMN�, Int. Journal of advanced research in Computer Science and Software Engineering, Vol. 1, No. 1, pp(1-4), Dec.-2011.
[8]. M. Nachammai and N. Radha, "Survey on Black Hole and Gray Hole Attacks in MANET", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (66-70), May -2016, E-ISSN: 2347-2693
[9]. Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc Networks", International Journal of Scientific Research in Network Security and Communication, Vol-1, Issue-05, pp.(1-4), Dec 2013.ISSN 2321-3256,
[10]. Nisha Mannan and Shipra Khurana, "Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (233-237), Apr -2014
[11]. M. Nagendra and B.Kondaiah, "A Comparison and Performance Evaluation of On-Demand Routing Protocols for Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (15-19), May -2014,
[12]. Ritika Kachal and Shrutika Suri, "Comparative Study and Analysis of DSR, DSDVAND ZRP in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (148-152), May -2014
[13]. Mayank Kumar and Tanya Singh, "A Survey on Security Issue in Mobile AD-HOC Network and Solutions", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (71-75), Mar -2014,
[14]. Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, �An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)�, International Journal of Computer Science and Information Security, Vol-9, No.4, pp.(106-111), April 2011.
[15]. Nand Kishore, Sukhvir Singh and Renu Dhir, "Energy Based Evaluation of Routing Protocol for MANETs", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (14-17), Mar -2014
Citation
A.J. Zaru, "Security Technology," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.98-103, 2016.
Animal Migration Optimization: A Survey
Survey Paper | Journal Paper
Vol.4 , Issue.12 , pp.104-107, Dec-2016
Abstract
A new swarm intelligent algorithm, called as Animal Migration Optimization (AMO). This paper discusses brief introduction of few optimization techniques. Optimization techniques used for finding optimal solutions. The efficiency of AMO is not appropriate due to its execution time. The efficiency of animal migration optimization algorithm (AMO )is increase by using few benchmark functions and which show the animal migration algorithm performance and it�s working in order to confirm the presentation of AMO including four benchmark functions � Sum, Ackley, Baele and Rosenbrock are employed. The benchmark functions which are considered as standard functions increase the efficiency and minimize the time.
Key-Words / Index Term
Animal Migration Optimization,Cuckoo Search,Firefly Algorithm,Ant Bee Colony, Particle Swarm Optimization,Bat Algorithm
References
[1] J. Han and M. Kamber(2001) "Data mining: Concepts and techniques," China Machine Press, vol. 8, pp. 3-6.
[2] Melanie M (1999) An introduction to genetic algorithms. MIT Press.
[3] Sivanandam SN, Deepa SN (2008) Introduction to genetic algorithms. Springer, Berlin.
[4] Kennedy J, Eberhart R (1995) Particle swarm optimization ProcIntConf Neural New 4:1942�1948 Engelbrecht AP (2005) Fundamentals of computational swarm intelligence. Wiley, New Jersey.
[5] AP (2005) Fundamentals of computational swarm intelligence. Wiley, New Jersey.
[6] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[7] C. Karlof and D. Wagner, �Secure routing in wireless sensor networks: attacks and countermeasures,� Ad Hoc Networks 1, 2003, pp. 293-315.
[8] Y. Yang, Y. Gu, X. Tan and L. Ma, �A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,� 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265.
[9] Yang X.-S., "A New Metaheuristic Bat-Inspired Algorithm�, Nature Inspired Cooperative Strategies for Optimization (NISCO 2010), Eds. J. R. Gonzalez et al., Studies in Computational Intelligence.
[10] MingzhiMa, Qifang Luo, Yongquan Zhou, Xin Chen, and Liangliang Li (2015) Improved animal migration Optimization algorithm for clustering analysis. Hindawi Publishing Corporation Discrete Dynamics in Nature and Society volume.
[11] Yi Cao, Xiangtao Li, and Jianan Wang (2013) Opposition based AMO Hindawi Publishing Corporation Mathematical Problems in Engineering
[12] Li X, Wang JN, Yin M (2013) Enhancing the performance of cuckoo search algorithm using orthogonal learning Method. Neural Computes App.
[13] Karaboga D, Ozturk C, Karaboga N, Gorkemli B (2012) Artificial bee colony programming for symbolic regression. Inf Sci 209:1�15.
[14] Shouyi Wang, Cheng-Jhe Lin, Changxu Wu, and Wanpracha Art Chaovalitwongse �Early Detection of Numerical Typing Errors Using Data Mining Techniques� IEEE November 2011.
[15] Mahdi Esmaeili, AmirhoseinMosavi, �Variable Reduction for Multi Objective Optimization Using Data Mining Techniques;Application to Aerospace Structures� 2010 2nd International Conference on Computer Engineering and Technology.
[16] DominikFisch, Edgar Kalkowski, and Bernhard Sick �Knowledge Fusion for Probabilistic Generative Classifiers with Data Mining Applications�IEEE Transactions (Vol. 26) 3, March 2014.
[17] JS. Dhanalakshmi, S. Suganya and K. Kokilavani, "Mobile Learning Using Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-02, Issue-11, Page No (102-108), Nov -2014,
[18] Dongsong Zhang and LinaZhou � Discovering Golden Nuggets: Data Mining in Financial Application� IEEE Transactions Vol. 34, 2004.
Citation
R. Rai, V.S. Kushwah, "Animal Migration Optimization: A Survey," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.104-107, 2016.
Static Face Recognition Using Hierarchical Model
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.108-112, Dec-2016
Abstract
Face is an important biometric feature for personal identification. Human beings easily detect and identify faces in a scene but it is very challenging for an automated system to achieve such objectives. Hence there is need to have reliable identification method for user interactions. A computer application which automatically identifies or verifies a person from a digital image or a video frame from a video source, is presented and it is done by comparing selected facial features from the image and a facial database. One of the retrieving method is Content based image retrieval (CBIR), which retrieves images on the basis of automatically derived features. This paper draws points from it but, focuses on a low-dimensional feature based indexing technique for achieving efficient and effective retrieval performance. A static appearance based retrieving system for face recognition referred to as hierarchical model is presented based on singular value decomposition (SVD) is proposed in this paper and is different from principal component analysis (PCA), which effectively considers only Euclidean structure of face space for analysis and leads to poor classification performance in case of great facial variations such as expression, lighting, occlusion and so on, due to the fact the image gray value matrices on which they manipulate are very sensitive to these facial variations. It is a known fact that every image matrix can always have the well known singular value decomposition (SVD) and can be regarded as a composition of a set of base images generated by SVD and further it is pointed out that base images are sensitive to the composition of the face image. Finally the experimental results show that SVD has the advantage of providing a better representation and achieves lower error rates in face recognition but it has the disadvantage that it drags the performance evaluation. So, in order to overcome that, a controlling parameter �α �, which ranges from 0 to 1 is introduced a better result is achieved for α=0.4 when compared to the other value of �α� and it is also seen that it reduces classification redundancy.
Key-Words / Index Term
Face recognition, Feature based methods, singular value decomposition Euclidean distance Original gray value matrix
References
[1] .Jun Liu, Song can Chen, Xiao yang Tan �Fractional order singular value decomposition representation for face recognition� ELESVER Journal 26 March (2007).
[2] M. Kirby, L. Sirovich, �Application of the Karhunen�Loeve procedure for the Characterization of human faces� IEEE Trans. Pattern Anal. Mach. Intell. 12 (1990) 103�108.
[3] M.Turk, A.Pentland, �Eigen faces for recognition�, J. Cognitive Neurosci. 3 (1) (1991) 71�96.
[4] J. Yang, D. Zhang, et al., �Two-dimensional pca: a new approach to appearance based face representation and recognition�, IEEE Trans. Pattern Anal. Mach. Intell. 26 (1) (2004) 131�137.
[5] J. Ye, �Generalized low rank approximation of matrices, in: International Conference on Machine Learning, pp. 2004, pp. 887�894.
[6] J. Liu, S. Chen, �Non-iterative generalized low rank approximation of matrices�,Pattern Recognition Lett. 27 (9) (2006) 1002�1008.
[7] P. Belhumeur, J. Hespanha, D.J. Kriegman, �Eigenfaces vs. Fisherfaces: recognition using class specific linear projection, IEEE Trans. Pattern Anal. Mach. Intell. 19 (7) (1997) 711�720.
[8] Z. Hong,� Algebraic feature extraction of image for recognition�, Pattern Recognition 211-219 (1991)
[9] Y. Cheng, K. Liu, J. Yang, Y. Zhuang, N. Gu, �Human face recognition method based on the statistical model of small sample size�, Intelligent Robots and Computer Vision X: Algorithms and Techniques, 85�95 (1991).
[10] H. Othman, T. Aboulnasr, �A separable low complexity 2D HMM with application to face recognition� IEEE Trans. Pattern. Anal. Machie Intell., 25(10): 1229-1238 (2003).
[11] K. Lee, Y. Chung, H. Byun, �SVM based face verification with feature set of small size�, Electronic letters, 38(15): 787-789 (2002).
[12] H. Cevikalp,M.Neamtu,M.Wilkes, A. Barkana, � Discriminative common vectors for face recognition� , IEEE Trans. Pattern Anal. Machie. Intel. 27(1): 4-13 (2005).
[13]Dr.Raghavendra Kulkarni, Dr.S.G.Hiremath, �Redundancy in Face Image Recognition�, International Journal of Advanced Engineering, Research and Science, ISSN:2349-6495(P) I 2456-1908(O),Vol.3,Issue 8,Page No058-061, August-2016.
[14]M. Er, S. Wu, J. Lu, L.H.Toh, �face recognition with radial basis function(RBF) neural networks�, IEEE Trans. Neural Networks, 13(3): 697-710
Citation
D. Narsaiah, R. Kulkarni, "Static Face Recognition Using Hierarchical Model," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.108-112, 2016.