A Novel Block-Based Selective Embedding Type Video Data Hiding using Encryption Algorithms
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.647-653, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.647653
Abstract
Data hiding is a process of embedding information into the host medium and is an important process in security. Video data hiding is a very important research topic due to the design complexities involved. In general, due to the wide presence and the tolerance of human perceptual systems involved visual and aural media are preferred. The methods vary depending on the nature of such media and the general structure of data hiding process does not depend on the host media type. However, most of the video data hiding methods utilize uncompressed video data. Recent video data hiding techniques are focused on the characteristics generated by video compressing standards. The main objective of this research work is to propose a new video data hiding method that makes use of correction capability of repeat accumulate codes and superiority of forbidden zone data hiding (FZDH). FZDH is used for no alteration is allowed while data hiding process. The framework is tested by all kinds of videos such as .mp4, .3gp, .avi etc., and gets successful output for all video data hiding process. The proposed scheme is hiding the video data to provide security by encryption and decryption process. The simulation results show that the process of hiding the video data enforce security in higher level.
Key-Words / Index Term
FZDH, data hiding, encrypt process, decrypt process, superiority
References
[1] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: I. Fundamental issues and solutions,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 685–695, Jun. 2003.
[2] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: II. Designs and applications,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 696–705, Jun. 2003.
[3] S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, “Data hiding in H-264 encoded video sequences,” in Proc. IEEE 9th Workshop Multimedia Signal Process., pp. 373–376,Oct. 2007,.
[4] A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath,“Adaptive MPEG-2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents, pp.373–376. 2007,
[5] K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima,
“Complete video quality-preserving data hiding,” IEEE
[6]A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, ―Adaptive MPEG-2 Video Data Hiding Scheme,‖ in Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents IX, 2007.
[7]M. Wu, H. Yu, and B. Liu, “Data hiding in image and video I. Fundamental issues and solutions, ”IEEE Transactions on Image Processing, vol. 12, pp. 685—695, June 2003.
[7] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video II: Designs and applications,” IEEE Transactions on Image Processing, vol. 12, pp. 696—705, June 2003.
[8] E. Esen and A. A. Alatan, “Forbidden zone data hiding,” in IEEE International Conference on Image Processing, 2006, pp. 1393— 1396.
[9] B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods fordigital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47,May 2001, pp. 1423-1443, May 2001,.
[10] E. Esen, Z. Doğan, T. K. Ates, and A. A. Alatan, “Comparison of Quantization Index Modulation and Forbidden Zone Data Hiding for Compressed Domain Video Data Hiding,”in IEEE 17th Signal Processing and Communications Applications Conference SIU, 2009.
[11] D. Divsalar, H. Jin, and R. J. McEliece, “Coding theorems for turbo like codes,” in Proc. 36thAllerton Conf. Communications, Control, and Computing, 1998, pp. 201— 210.
[12] M. M. Mansour, “A Turbo-Decoding Message-Passing Algorithm for Sparse Parity-Check Matrix Codes,” IEEE Transactions on Signal Processing, vol. 54, pp. 4376—4392, Nov. 2006.
[13] Z. Wei, K. N. Ngan, “Spatio-Temporal Just Noticeable Distortion Profile for Grey Scale Image/Videoin DCT Domain,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, pp.337—346, Mar. 2009.
[14] M. Maes, T. Kalker, J. Haitsma, and G. Depovere, “Exploiting Shift Invariance to Obtain a High Payload in Digital Image Watermarking,” in IEEE International Conference on Multimedia Computing and Systems (ICMCS`99), vol. 1, 1999.
[15] T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, “Video watermarking system for broad castmonitoring,” in Security and watermarking of multimedia contents Conference, SPIE Proceedings vol.3657 , 1999, pp. 103— 112.
[16] M. Maes, T. Kalker, J. -P. M. G., J. Talstra, F. G. Depovere, and J. Haitsma, “Digital watermarking for DVD video copy protection,” IEEE Signal Processing Magazine, vol. 17, pp. 47—57, Sep. 2000.
[17] K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, pp. 1499—1512,Oct. 2009.
[18] G. Tardos, “Optimal probabilistic fingerprint codes,” in Proceedings of the thirty fifth annual ACM symposium on Theory of computing (STOC ’03), New York, NY, USA, 116—125.
[19] B. Skoric, T. U. Vladimirova, M. Celik, and J. C. Talstra, “Tardos fingerprinting is better than we thought,” IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3663—3676, 2008.
[20] Ramesh, G. Umarani, R. ,UMARAM: A novel fast encryption algorithm for data security in local area network http://ieeexplore.ieee.org /xpl/ freeabs_all.jsp? arnumber=5670740
[21] Ramesh, G. Umarani, R,” UR5: A Novel Symmetrical Encryption Algorithm with Fast Flexible and High Security Based on Key Updation”, European Journal of Scientific Research ISSN 1450-216X Vol.77 No.2 (2012), pp.275-292.
Citation
Dr.K.Vanaja, D. Thilagavathi, C. Rukmani, L.Gandhi, "A Novel Block-Based Selective Embedding Type Video Data Hiding using Encryption Algorithms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.647-653, 2018.
Big Data and Learning Analytics Model
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.654-663, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.654663
Abstract
Big Data opens big opportunities in every corner of the world in almost every companies and industries, viz. banking, stock, agriculture, telecommunications, healthcare and education. With this big opportunity comes with big challenges and issues. Opportunities are increasing as the volume of Big Data is also increasing and predicted to grow enormously because of the technological revolution, which includes but not limited to various mobile devices. The nature of big data using use cases, real-time analysis, data integration, eventually turns big data into a big value. Pressing issues identified in this paper are privacy, processing and analysis and storage. In this paper, we explored various usages of Big Data, methodologies in Big Data and a Learning Analytics Model based on Big Data, as educational entities have sensitive data which are scattered across departments in various formats and need to be processed to gain insight and to make future predictions. Prediction models may be prepared by analyzing the trends from the available historical data. These data models are helpful for data-driven decisions by the authorities.
Key-Words / Index Term
Big Data, Learning Analytics, Hadoop, MapReduce, Big Data Analytics
References
[1] Chia-WeiLee, Kuang-YuHsieh, Sun-YuanHsieh and Hung-ChangHsiao, “A Dynamic Data Placement Strategy for Hadoop in Heterogeneous Environments”, Journal of Big Data Research, vol. 1,pp. 14-22, 2014.
[2] Z. Sun, Zou, H, & K. Strang, “Big data analytics as a service for business intelligence”, LNCS9373, pp. 200-211, Springer, 2015.
[3] Z. Sun, “Intelligent Big Data Analytics”, PNG University of Technology, 8 May 2017. BAIS No. 17004, DOI: 10.13140/RG.2.2.32631.83361, 2017.
[4] Divyakant Agrawal, Philip Bernstein, Elisa Bertino, Susan Davidson, Umeshwas Dayal, Michael Franklin, Johannes Gehrke, Laura Haas, Jiawei Han Alon Halevy, H.V. Jagadish, Alexandros Labrinidis, Sam Madden, Yannis Papakon stantinou, Jignesh Patel, Raghu Ramakrishnan, Kenneth Ross, Shahabi Cyrus, Dan Suciu, Shiv Vaithyanathan, Jennifer Widom, “Challenges and Opportunities with Big Data”, CYBER CENTER TECHNICAL REPORTS, PurdueUniversity, 2011.
[5] D. Laney, “3D data management: controlling data volume, velocity, and variety”, META Group, Tech. Rep. 2001. [Online]. Available: http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf, 2012.
[6] K. Ajit, (n.d.),”The Emerging Precision, Personalized Medicine and Big Data Analytics Approach in Healthcare: Big Data Analytics in Healthcare” (Big Data in Healthcare Book 2) Kindle Edition.
[7] K. Al-Barznji, “Review of big data and big data mining for adding big value to enterprises. Engineering & Education”, 2, (1), 2017 50 Science, Engineering & Education,2(1), 50-57, 2017.
[8] L. Berntzen., M. Krumova, “Big Data from a Business Perspective. In: Themistocleous M., Morabito V. (eds) Information Systems”, EMCIS 2017. Lecture Notes in Business Information Processing, vol 299. Springer, Cham, 2017.
[9] H. Bhosale, & D. Gadekar, “A Review Paper on Big Data and Hadoop” International Journal of Scientific and Research Publications. , 4(10), 1-7, 2014.
[10] Kevin Taylor-Sakyi, “Big Data: Understanding Big Data”, CoRR, abs/1601.04602, 2016.
[11] Nawsher Khan, Yaqoob Ibrar, Hashem I.A.T., Inayat Zakira, Ali, W.K.M., Alam M., Shiraz, M., Gani Abdullah, “Big Data Survey, Technologies, Opportunities, and Challenges”, The Scientific World Journal, Volume 2014.
[12] MS Dhruva, “Survey on Big Data Analytics,” International Journal of Engineering and Applied Computer Science, vol. 02, no. 06, pp. 181–185, Jul. 2017. http://dx.doi.org/10.24032/ijeacs/0206/02
[13] K. Parimala, G. Rajkumar, A. Ruba, S. Vijayalakshmi, “ Challenges and Opportunities with Big Data”, International Journal Scientific Research in Computer Science and Engineering, Vol 5, Issue 5, pp 16-20, 2017.
[14] Rakesh. S.Shirsath, Vaibhav A.Desale, Amol. Potgantwar,
“Big Data Analytical Architecture for Real-Time Applications”, IJSRNSC, Volume-5, Issue-4, August 2017.
[15] M. Srinuvasu, A. Koushik, & E. Santhosh, “Big Data: Challenges and Solutions”, International Journal of Computer Sciences and Engineering. , 5(10), 2017.
[16] R Gadde,., & N.Vijay, “A SURVEY ON EVOLUTION OF BIG DATA WITH HADOOP”, International Journal of Research In Science & Engineering, 3(6), 2017.
[17] M. Memon, S. Soomro, A. Jumani, & M. Kartio,” Big Data Analytics and Its Applications”, Annals of Emerging Technologies in Computing (AETiC). ,1(1), 2017.
[18] U. Kazemi, “Clustering methods in Big data”, Journal of Embedded Systems and Processing. 2(1,2,3), 2017.
[19] L. Sharma, & K. Ramya, “A Review on Density-based Clustering Algorithms for Very Large Datasets”, International Journal of Emerging Technology and Advanced Engineering, 3(12), 2013.
[20] M. A. Chatti, V.Lukarov, H. Thüs, A. Muslim, Yousef, A. M. F., Wahid, U., Greven, C., Chakrabarti, A., Schroeder, U.,” Learning Analytics: Challenges and Future Research Directions” eleed, Iss. 10. (urn:nbn:de:0009-5-40350), 2014.
[21] Anthony G. Picciano, “THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION”, Journal of Asynchronous Learning Networks, Volume 16: Issue 3, 2012.
[22] I.D. Constantiouand, J. Kallinikos, “New games, new rules: big data and the changing context of strategy”, Journal of Information Technology, 30(1): p. 44-57, 2015.
[23] T.C. Redman, “Data quality: the field guide” Digital press, 2001.
[24] P.Paul, “Marketing on the Internet”, Journal of Consumer Marketing, 13(4): p. 27-39, 1996.
[25] S. Mulder, and Z. Yaar, “The user is always right: A practical guide to creating and using personas for the web”, New Riders, 2006.
[26] R.L. Villars, C.W. Olofson, and M. Eastwood, “Big data: What it is and why you should care”, White Paper, IDC, 2011. 14.
[27] D.D Anderson, “Debit card fraud detection and control system”, Google Patents, 1999.
[28] K.V. Rao, and M.A. Ali, “Survey on Big Data and applications of real-time Big Data analytics”, Academic Press, 2015.
[29] O. Eisen, “Methods and apparatus for detecting fraud with time-based computer tags”, Google Patents, 2015.
[30] A.F. Colladon and E. Remondi, “Using social network analysis to prevent money laundering”, Expert Systems with Applications, 67: p. 49-58, 2017.
[31] I.H. Witten et al., “Data Mining: Practical machine learning tools and techniques”, Morgan Kaufmann, 2016.
[32] R. Rui, H. Li, and Y.-C. Tu, “Performance Analysis of Join Algorithms on GPUs”, Technical Report CSE/14–016, 2014.
[33] A.K ROY, “Applied Big Data Analytics”, Paperback. Create Space Independent Publishing Platform, ISBN-10, 2015.
[34] B. Dillon, P. Brummund, and G. Mwabu, “How complete are labor markets in East Africa?” Evidence from panel data in four countries. 2017.
[35] M.A. Moisescu, and I.S. Sacala, “Towards the development of interoperable sensing systems for the future enterprise”, Journal of Intelligent Manufacturing, 27(1): p. 33-54, 2016.
[36] Zhang, Yingfeng, et al. “A framework for Big Data-driven product lifecycle management”, Journal of Cleaner Production, 2017, 159: 229-240, 2017.
[37] A.J. Coale, and E.M. Hoover, “Population growth and economic development”, Princeton University Press, 2015.
[38] R. Mahajan, “Analysis of challenges for management education in India using total interpretive structural modeling”, Quality Assurance in Education, 24(1): p. 95-122, 2016.
[39] K. Sravanthi, and T.S. Reddy, “Applications of Big data in Various Fields, International Journal of Computer Science and Information Technologies (IJCSIT), 6(5): p. 4629-4632, 2015.
[40] A. Thomas, “Implementing Lean Six Sigma to overcome the production challenges in an aerospace company”, Production Planning & Control, 27(7-8): p. 591-603, 2016.
[41] A. Collins, and S. Drinkwater, “Fifty shades of gay: Social and technological change”, urban deconcentration and niche enterprise. Urban Studies, 54(3): p. 765-785, 2017.
[42] V.K. Jain, “Big Data and Hadoop” ,Khanna Publishing, 2017.
[43] V. Tresp, “Going digital: A survey on digitalization and large-scale data analytics in healthcare”, Proceedings of the IEEE, 104(11): p. 2180-2206, 2016.
[44] M.J. Mayer, and D.M. Andersen, “Source-to-processing file conversion in an electronic discovery enterprise system”, Google Patents, 2017.
[45] B. Akhgar, G.B. Saathoff, H.R Arabnia, R. Hill, et al.: “Application of Big Data for National Security”, Elsevier Butterworth-Heinemann, Oxford, 2015.
[46] S. Kulshrestha, “ Big data in military information & intelligence” IndraStra Global. doi: 10.6084/m9.figshare.2066640, 2(1), 1–9, 2016.
[47] M.A. Sahin, K. Leblebicioglu, “Approximating the optimal mapping for weapon-target assignment by fuzzy reasoning”, Inf. Sci. 255, 30–44, 2014.
[48] Ben Daniel, “The Value of Big Data in Higher Education”, British Journal of Educational Technology, doi: 10.1111/bjet.12230, 2014.
[49] Wadkar, S., M. Siddalingaiah, and J. Venner, Pro Apache Hadoop. Apress, 2014.
[50] N. Lohar, “Content-Based Image Retrieval System over Hadoop Using MapReduce”, 2016.
[51] L. Alarabi, “ST-Hadoop: A MapReduce Framework for Big Spatio-temporal Data” in Proceedings of the 2017 ACM International Conference on Management of Data. ACM, 2017.
[52] P. Zikopoulos, and C. Eaton, “Understanding big data: Analytics for enterprise-class Hadoop and streaming data”, McGraw-Hill Osborne Media, 2011.
[53] A.M Hendawi, “Hobbits: Hadoop and Hive based Internet traffic analysis. in Big Data”, IEEE International Conference on. IEEE, 2016.
[54] S. Landset, “A survey of open source tools for machine learning with big data in the Hadoop ecosystem”, Journal of Big Data, 2(1): p. 24, 2015.
[55] I. Polato, “A comprehensive view of Hadoop research—A systematic literature review”, Journal of Network and Computer Applications, 46: p. 1-25, 2014.
[56] A.P. Kulkarni, and M. Khandelwal, “Survey on Hadoop and Introduction to YARN”, International Journal of Emerging Technology and Advanced Engineering, 4(5): p. 82-87., 2014.
[57] M.A. Chatti, A.L. Dyckhoff,., U. Schroeder, H. Thus, “A reference model for learning analytics”, International Journal of Technology Enhanced Learning 4(5/6), pp. 318-331, 2012.
[58] R. Ferguson, “Learning Analytics: drivers, developments and challenges”, International Journal of Technology Enhanced Learning 4(5/6), pp. 304-317, 2012.
[59] M. Crush, “Monitoring the PACE of student learning: Analytics at Rio Salado Community College", Campus Technology, 2011.
[60] S. Dawson, D. Gasevic, G.Siemens, S. Joksimovic, “Current State and Future Trends: a citation network analysis of the learning analytics field”, Proceedings of the Fourth International Conference on Learning Analytics & Knowledge, ACM New York, NY, USA, pp. 231-240, 2014.
[61] L. Johnson, S. Adams, and M. Cummins, “The NMC Horizon Report: 2012 Higher Education Edition”, Austin Texas: The New Media Consortium, 2012.
Citation
Sadiq Hussain, Mehmet Akif ÇİFÇİ, Josan D. Tamayo, Aleeza Safdar, "Big Data and Learning Analytics Model," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.654-663, 2018.
Hiding data in video using maximum motion detection and intensity technique
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.664-667, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.664667
Abstract
steganography is becoming popular, especially for adding undetectable identifying marks, such as author or copyright information. Existing stegography systems for video stegnography used simple techniques to hide the images into videos which can be easily decoded by using some decoding algorithms. Hence a novel video stegnography system must be made that can hide the image in the video in the more secure way so that attacker cannot decode the hidden message from the video. In the proposed work, Least Significant Bit (LSB) will be used to hide the image message into a video. Proposed system hide the image into each of the LSB of each color of each pixel of the input video frame. In the proposed system, from the input video a fame with maximum motion and intensity is extracted which is treated as the target frame for hiding message. In this target frame image will be hide using Least Significant approach. The resultant video becomes the stegno video. Reverse process is performed on the stegno video to extract the image file from that video file. The proposed system is tested on various input videos and various input images are used as message to hide in these videos. It is evaluated that the results of the proposed system are very satisfactory. Performance of the proposed system is also compared with the performance of the existing system and it is evaluated that the proposed system generates the better results in terms of PSNR and MSE than that of existing system.
Key-Words / Index Term
Steganography, LSB, Image Hiding, Message Security, Video Stegnography.
References
[1] K.Thangadurai and G.Sudha Devi, "An analysis of LSB Based Image Steganography Techniques", International Conference on Computer Communication and Informatics, 2014
[2] Rashi Singh,Gaurav Chawl, "A Review on Image Steganography", International Journal of Advanced Research in Computer Science and Software Engineering,Vol. 4, Issue 5, 2014
[3] S. Sharda, S. Budhiraja, "Performance Analysis of Image Steganography based on DWT and Arnold Transform",International Journal of Computer Applications (0975 – 8887) Vol. 69– No.21, 2013
[4] S. Khosla,P. Kaur, "Secure Data Hiding Technique Using Video Steganography and Watermarking", International Journal of Computer Applications (0975 – 8887) Volume 95– No.20, 2014
[5] Jayaram P,Ranganatha H R,Anupama H S, "Information hiding using audio steganography – a survey", The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, 2011
[6] K. Pradhan, C. Bhoi,"Robust Audio Steganography Technique using AES algorithm and MD5 hash",International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 10, 2014.
[7] F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn:”Information Hiding- A Survey”, Process of IEEE, vol.87,no.7, pp.1062-1078, 1999.
[8] M. Wu, B. Liu. “Multimedia Data Hiding”, Springer- Verlag New York, 2003.
[9] N. Taraghi-Delgarm, “Speech Watermarking”, M.Sc. Thesis, Comptuer Engineering Department, Sharif University of Technology, Tehran, IRAN, 2006.
[10] M. Pooyan, A. Delforouzi, “LSB-based Audio Steganography Method Based on Lifting WaveletTransform”, in Proc. 7th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT`07), 2007.
[11] R.A. Santosa and P. Bao, “Audio-to-image wavelet transform based audio steganography,” Proc. of 47th Int. Symposium ELMAR, pp. 209- 212, 2005.
[12] X. Huang, R. Kawashima, N. Segawa, Y. Abe. “The Real-Time Steganography Based on Audio-to-Audio Data Bit Stream”,Technical report of IEICE, ISEC, vol.106 pp.15-22, 2006.
Citation
Shaminder Kaur, Paramjeet Singh, Shaveta Rani, "Hiding data in video using maximum motion detection and intensity technique," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.664-667, 2018.
A Novel Method for Automatic Detection of Brain Tumor from MR Image
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.668-673, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.668673
Abstract
Image processing is an important aspect of medical science to visualize the different anatomical structures of human body. Sometimes it becomes very difficult or impossible to detect or visualize such hidden abnormal structures by using simple imaging. Brain tumor is one of the major causes for mortality among children and adults. Extensive research is being carried out to develop automatic algorithms for detection of Tumor from Brain images captured using MR imaging. Still there are challenges like time requirements, inaccuracy, need of human intervention and complexity of images in detecting region of interest. In this study, an algorithm is proposed for detection of Tumor from MR Brain images, which is based upon thresholding, region growing and genetic algorithm. Performance evaluation of proposed algorithm and studied state-of-the-art algorithms suggests that proposed algorithm gives best results for Tumor detection from MR brain images.
Key-Words / Index Term
Brain tumor detection, medical image, segmentation, magnetic resonance imaging (MRI).
References
[1] G.R. Chandra, K.R. Rao, “Tumor detection in brain using Genetic Algorithm” In the Proceedings of the 2016 7th International Conference on Communication, Computing and Virtualization, pp.449-457, 2016.
[2] C. Li , R. Chiao, “Multi-resolution genetic clustering algorithm for texture segmentation”, Image and Vision Computing, Vol. 21, pp. 955 – 966, 2003.
[3] E.Y. Kim, S.H. Park, H.J. Kim, “A genetic algorithm-based segmentation of Markov random field modeled images”, IEEE Transaction, Vol. 7, pp. 301- 315, 2000.
[4] M. Gong, Y.H. Yang, “Genetic-based multi resolution color image segmentation”, Vision Interface, pp. 141–148. 2001.
[5] Abdullah, “Implementation of an improved cellular neural network algorithm for brain tumor detection”, In International Conference on Biomedical Engineering , pp.611-615, 2012.
[6] A. Bianchi, J. V. Miller, A. Montillo, “Brain tumor segmentation with symmetric texture and symmetric intensity-based decision forests”, In IEEE 10th International Symposium on Biomedical Imaging, pp.748-751, 2013.
[7] A. Halder, D.K. Kole, “Automatic Brain Tumor Detection and Isolation of Tumor Cells from MRI Images”, International Journal of Computer Applications, Vol.39, No.2, 2012.
[8] Gajanayake, Randike, Yapa, R. Dharshana, Badra, “Comparison of standard image segmentation methods for segmentation of brain tumors from 2D MR images”, In the Proceedings of the 2009 IEEE 4th International Conference on Industrial and Information Systems, pp. 301-305, 2009.
[9] I. Maiti, M. Chakraborty, “A new method for brain tumor segmentation based on watershed and edge detection algorithms in HSV colour model”, In National Conference onComputing and Communication Systems, 2012.
[10] N. Sohi, L. Kaur, S. Gupta, “Enhanced Thresholding algorithm to Extract Tumor region from MR brain images”, In the Proceedings of International Conference on Electrical engineering and Computer Science,2012.
[11] S. Albayrak, F. Amasyali, “Fuzzy C-Means Clustering on Medical Diagnosis Systems”, International 12th Turkish Symposium on Artificial Intelligence and Neural Networks, 2003.
[12] K. Thapaliya and G. Kwon, “Extraction of brain tumor based on morphological operations”, In the Proceedings of 2012 IEEE-8th international Conference on Computing Technology and Information Management, pp. 515-520, 2012.
[13] K. J Gorgolewski, P. L Bazin, D. S Margulies,“Fifty Shades of Gray Matter: using bayesian priors to improve the power of whole-brain Voxel and connexe lwise inferences”, In International Workshop, Pattern Recognition in Neuro-imaging, pp.194-197, 2013.
[14] F.W. Prior, S. J. Fouke, T. Benzinger, A. Boyd, L.Kim,“Predicting a multi-parametric probability map of active tumor extent using random forests”, In Annual International Conference on Engineering in Medicine and Biology Society, pp.6478-6481, 2014.
[15] A. Q. Syedi, K. Narayanan, “Detection of Tumour in MRI Images Using Artificial Neural Networks”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, Issue 9, 2012.
[16] J.C. Dunn, “A fuzzy relative of the ISODATA process and its use in detecting compact well separated clusters”, Journal of Cybernetics, Vol. 3, No.3, pp. 32–57, 1973.
Citation
A. Kaur and N. Sohi, "A Novel Method for Automatic Detection of Brain Tumor from MR Image," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.668-673, 2018.
Text Mining Technique on Big Data Using Genetic Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.674-681, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.674681
Abstract
This paper provides the use of three terminologies and gives the best results with the details of methods implemented while applying applications of Genetic Algorithm for the Big Data which is mined from the plain text using Text Mining concept. The focus of this paper is to build up an algorithm that can extract or mine the details from plain text resumes & generates the method to provide the optimum solution. The method which is presented in this paper will help the organizations analyze that weather employee will work with them so long. Our main observation is that the system gives the results on the basis of details mined from the text resumes and based on these results, we can find the result that will helpful for the organizations.
Key-Words / Index Term
Text Mining, Genetic Algorithm, Big Data
References
[1] M. Bahrami and M. Singhal, “The Role of Cloud Computing Architecture in Big Data”, Information Granularity, Big Data, and Computational Intelligence, Vol. 8, pp. 275-295, Chapter 13, Pedrycz and S.-M. Chen (eds.), Springer, 2015.
[2] McAfee, Andrew, and Erik Brynjolfsson. "Big data: the management revolution." Harvard business review 90.10: pp 60-66, 2012.
[3] B. Thakur, M. Mann, “Data Mining for Big Data: A Review”. International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, May 2014 ISSN: 2277 128X.
[4] Mining the Big Data: The Critical Feature Dimension Problem, 2014 IIAI 3rd International Conference on Advanced Applied Informatics, IEEE.
[5] “Data Mining with Big Data”, IEEE Transactions on Knowledge and Data Engineering, Vol. 26, no. 1, January 2014.
[6] A. Kogilavani, “Clustering based optimal summary generation using Genetic Algorithm”, 2010.
[7] Suthaharan, S. Big data classification: Problems and challenges in network intrusion prediction with machine learning. Performance Evaluation Review, 41(4), 70-73.doi: 10.1145/2627534.2627557, 2014.
[8] Indarjit Mukherjee, “Content Analysis based on Text Mining using Genetic Algorithm” (ICCTD, 2010).
[9] The Rise of Big Data on Cloud Computing (A Review), Ibrahim Abaker Targio Hashem, Faculty of Computer Science, University of Malaya, 2014.
[10] A Data Science Solution for Mining Interesting Patterns from Uncertain Big Data, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing.
[11] Mining Big Data: Current Status, and Forecast to the Future, Volume 14, Issue 2, SIGKDD Explorations.
[12] “Text Mining Technique using Genetic Algorithm”, International Journal of Computer Applications (0975 – 8887) Volume #. 63, February 2013
[13] S.M. Khalessizadeh, R.Zaefarian, World Academy of Science, Engineering and Technology, “Genetic Mining: Using Genetic Algorithm for Topic based on Concept Distribution”. 2006
[14] Jiawei Han and Micheline Kamber, “Data Mining Concepts & Techniques”, Second Edition, Morgan Kaufmann Publishers, Pg 318, 319, 351
Citation
Deepankar Bharadwaj, Arvind Shukla, "Text Mining Technique on Big Data Using Genetic Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.674-681, 2018.
An Optimized Color Image Coding using Quadtree Method
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.682-686, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.682686
Abstract
Generally the RGB images are characterised by high degree of inter-correlation. Based on this information the compression algorithms reduce the amount of bits required for coding, by transferring the RGB color space to another colorspace. Images consist of luminance and chrominance components but human eye is sensitive to luminance components. So, more bits are allocated to luminance components. This paper proposes Quadtree decomposition-based image coding. Most of the researchers have proposed several colorization-based image coding techniques, in which, the luma component is encoded by a standard encoder, while the two chroma components encoded by colorization. The proposed method colorizes the luminance image fast and effectively. The simulation results show that the proposed technique gives better results than the existing coding methods derived from classical methods.
Key-Words / Index Term
Luminance Image, Image coding, Quadtree decomposition
References
[1] “ISO/IEC 10918-1, statistics generation-digital compression and coding of continuous-tone still pictures requirements and guidelines”.
[2] Xing San, Hua Cai, and Jiang Li, “coloration photograph coding by means of the usage of inter-color correlation,” in IEEE worldwide convention on Image Processing, Oct 2006, pp. 3117–3120.
[3] S. Ono, T. Miyata, and Y. Sakai, “Colorization-primarily based coding with the aid of specializing in characteristics of colorization bases,” in photo Coding Symposium (computers), Dec 2010, pp. 230–233.
[4] T. Miyata, Y. Komiyama, Y. Sakai, and Y. Inazumi, “Novel inverse colorization for photograph compression,” in photograph Coding Symposium (computers), May 2009, pp. 1–4.
[5] Sukho Lee, Sang wook Park, P. Oh, and Moon Gi Kang, “Colorization-based totally compression the usage optimization,” IEEE Transactions on photo processing, Vol. 22, no. 7, pp. 2627–2636, July 2013.
[6] Li Cheng and S. V. N. Vishwanathan, “getting to know to compress pictures and motion pictures,” in proceedings of the 24th worldwide conference on machine learning, ny, the big apple, u.s, 2007, ICML ’07, pp. 161–168, ACM.
[7] Megumi Nishi, Takahiko Horiuchi and Hiroaki Kotera, “a unique photograph coding the use of colorization technique,” NIP and Virtual Fabrication Convention, Vol. 2005, no. 2, pp. 380–383, Jan 2005.
[8] K. Uruma, K. Konishi, T. Takahashi and T. Furukawa, “shade image coding based totally on the colorization set of rules the usage of multiple decision photographs,” in 2015 IEEE International Symposium on Circuits and Systems (ISCAS), May 2015, pp. 1290–1293.
[9] Yoshitaka Inoue, Takamichi Miyata and Yoshinori Sakai, “Colorization based picture coding through the usage of by local correlation between luminance and chrominance,” IEICE Transactions on Information and Systems, Vol. 95, no. 1, pp. 247–255, Jan 2012.
Citation
N. Obulesu, Chandra Mohan Reddy Sivappagari, "An Optimized Color Image Coding using Quadtree Method," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.682-686, 2018.
Analysis on LSB based detection methods and hiding strategies with color images
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.687-692, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.687692
Abstract
The internet users are regularly increasing day by day. After the launching of the 4G or IMT-Advanced services, communication over internet increased drastically. People across all the communities like social, economical, business, financial, etc are doing communication or exchanging their valued documents over internet. Hence, the demand of securing these documents or hiding some secret message into another cover is also increased. As, Steganography is the art and science of hiding a secret message in another message, image, or video as cover, in such a way, which hides the existence of the communication. Its goal is to hide messages inside other harmless messages, or image and does not allow any enemy to even detect that there is a second message present. In this paper, we have presented an analysis on LSB based detection methods and current hiding strategies with color images. Many noticeable hiding strategies proposed by researchers are presented here, but more research is required with the objectives of achieving high embedding payload and less detectable against the modern detector SPAM.
Key-Words / Index Term
Secret Message, Data Hiding, Steganography, Detection Method, Color Images, SPAM
References
[1] G. Shailender and A.G. Bhushan, “Information Hiding least significant bit steganography and cryptography”, International Journal of Education and Computer Science, vol. 6, 2012, pp. 27-34
[2] S. Wang, J. Sang, X. Song, X. Niu, “Least Significant Qubit (LSQb) Information Hiding Algorithm for Quantum Image”, Elsevier, Measurement (2015), doi: http://dx.doi.org/10.1016/j.measurement. 2015.05.038
[3] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, S. W. Baik, “Image steganography using uncorrelated color space and its application for security of visual contents in online social networks”, Future Generation Computer Systems 86 (2018), pp. 951–960
[4] Thien Huynh-The , Cam-Hao Hua , N. Anh Tu , Taeho Hur , J. Bang , D. Kim , M. Bilal Amin, B. Ho Kang , H. Seung , S. Lee, “Selective bit emb e dding scheme for robust blind color image watermarking”, Elsevier, Information Sciences 426 (2018),pp. 1–18
[5] Huan Xu, Jianjun Wang, Hyoung Joong Kim, Near-optimal solution to pair-wise LSB matching via an immune programming strategy, Elsevier, Information Sciences 180 (2010), pp. 1201–121
[6] Zhenjun Tang, Quanfeng Lu, Huan Lao, Chunqiang Yu, Xianquan Zhang, Error-free reversible data hiding with high capacity in encrypted image, Elsevier, Optik, Vol. 157 (2018), pp. 750–760
[7] Chin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan, Lossless data hiding for color images based on block truncation coding, Elsevier, ScienceDirect, Pattern Recognition, vol. 41 (2008), pp. 2347 – 2357
[8] Wen-Long Xu, Chin-Chen Chang, Tung-Shou Chen, Liang-Min Wang, “An improved least-significant-bit substitution method using the modulo three strategy”, Elsevier, ScienceDirect, Displays vol. 42 (2016), pp. 36–42
[9] Chuan Qin, Ping Ji, Xinpeng Zhang , Jing Dong, Jinwei Wang, “Fragile image watermarking with pixel-wise recovery based on overlapping emb e dding strategy”, Elsevier, Signal Processing, vol. 138 (2017), pp. 280–293
[10] Daniel Lerch-Hostalot, David Megıas,” LSB matching steganalysis based on patterns of pixel differences and random embedding”, Elsevier, computers & security, vol. 32 (2013), pp. 192-206.
[11] HayatAl-Dmour,AhmedAl-Ani, “A steganography embedding method based on edge identification and XOR coding”, Elsevier, Expert SystemsWithApplications, vol. 46(2016), pp. 293–306
[12] B. Feng, J. Weng, Wei Lu, Bei Pei, “Steganalysis of content-adaptive binary image data hiding”, Elsevier, J. Vis. Commun. Image R. vol. 46 (2017), pp. 119–127
[13] B. B. Haghighi, A. H. Taherinia, A. Harati, “TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique”, Elsevier, Journal of Visual Communication and Image Representation, vol 50 (2018), pp. 49–64
[14] S. Sajasi, A.M. E. Moghadam, “An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method”, Elsevier, Applied Soft Computing, vol. 30 (2015), pp. 375–389
[15] N. N. El-Emama, M. Al-Diabat, “A novel algorithm for colour image steganography using a new intelligent technique based on three phases”, Elsevier, Applied Soft Computing, vol. 37 (2015), pp. 830–846
[16] S. Udhayavene, A. T. Dev and K. Chandrasekaran, “New Data Hiding Technique In Encrypted Image: DKL Algorithm (Differing Key Length)”, Elservier, Procedia Computer Science, vol. 54 ( 2015 ), pp. 790 – 798, Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015)
[17] K. Patel, S. Utareja, H. Gupta, “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm”, International Journal of Computer Applications (0975 – 8887), Volume 63– No.13, February 2013, pp. 24-28
[18] Amit and Jyoti, “REVIEW OF INFORMATION HIDING USING LEAST SIGNIFICANT BIT STEGANOGRAPHY IN BMP & JPG IMAGES”, ISSN 2319-5991, Vol. 3, No. 3, August 2014, pp. 96-102
[19] Sabu M Thampi, “Information Hiding Techniques : A Tutorial Review”, ISTE-STTP on Network Security & Cryptography, LBSCE 2004
Citation
A.K. Chaturvedi, Annu Sharma, Kalpana Sharma, "Analysis on LSB based detection methods and hiding strategies with color images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.687-692, 2018.
Graphical Analysis of Feedback System using Web Technologies
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.693-697, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.693697
Abstract
Feedback System is a performance evaluation system which is used by an organization to monitor all the activities happening in the organization. In this paper, we have proposed a feedback system which can be used by many stakeholders of our university such as admin, students, teachers, parents and non-teaching staff. We have provided fully dynamic nature for the system. This feedback system can be used by any non-programmer person such as admin and the feedback form will be available for all the concerned stakeholders of the organization. Some other facilities are also available in this system such as disabling of a specific form after a certain period of time, providing availability of feedback form for other faculties if it was not available initially. Feedback can be seen in the tabular form as well as in graphical form. In our paper, we have shown the result in bar graph so that analysis can be done perfectly and easily. Security is one of the main concerns in our paper as unauthorized users are not allowed to access the feedback system.
Key-Words / Index Term
Feedback System, Dynamic, Security, Graphical Analysis
References
[1] Akshay Jedhe, Nitish Prabhu ,Mandar Temkar ,(Prof.)Ankit Sanghavi, “Online Feedback System”, IJRASET, ISSN:2321-9653, Volume – 5, Issue – III, pp. 442-445, 2017.
[2] R. J. Anderson, R. Anderson, T.Vandegrift, S.Wolfman, K.Yasuhara, “Promoting Interaction in Large Classes with Computer-Mediated Feedback”, Kluwer Academic Publishers, pp. 119-123, 2003.
[3] Ms. Sana Rahman, Mr. Amit P. Raut, Mr. Adnan S. Ahmed , Mr. Shubham S. Junghare, “Online Student Feedback System”, International Journal of Research In Science & Engineering- Special Issue: Techno-Xtreme 16, ISSN: 2394-8299 pp. 224-230 2016.
[4] Kuang Chen, Harr Chen , Neil Conway, Joseph M. Hellerstein, Tapan S. Parikh, “USHER: Improving Data Quality with Dynamic Forms”, Data Engineering (ICDE), IEEE 26th International Conference , 2010, ISSN: 2375-026X pp.321-332
[5] Yao-Ting Sung , Kuo-En Chang, Shen-Kuan Chiou, Huei-Tse Hou, “The design and application of a web-based self- and peer-assessment system”, Elsevier, doi:10.1016/j.compedu.2004.07.002, 2004.
[6] Andrea Avancini, “Security testing of web applications: A research plan”, ICSE 2012, IEEE International Conference, ISSN: 1558-1225, pp. 1491-1494, 2012.
[7] Ria Nicoletti Morphitou, “The use of smart phones among students in relation to their education and social life”, 2014 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL) IEEE Explore, ISBN: 978-1-4799-4742-3, pp. 315-319, 2015.
[8] Preeti Garg, Dr. Vineet Sharma , “An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function”, International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), (IEEE-2014) pp.334-339.
[9] Khushal Singh, Vikas, “Analysis of Security Issues in Web Applications through Penetration Testing”, International Journal of Emerging Research in Management &Technology, ISSN: 2278-9359 Volume-3, Issue-3, 2014.
[10] Chris Palmer, “Secure Session Management with Cookies for Web Applications”, iSEC Partners, Version 1.1, pp.1-18, 2008.
[11] Gaurav, Ritu Sindhu, “Python as a key for data science”, IJCSE, ISSN:2347-2693,Volume 6 Issue 4, pp. 325-328, 2018.
[12] Farrukh Shahzadc, Tarek R. Sheltamia, Elhadi M. Shakshukib, Omar Shaikh, “A Review of Latest Web Tools and Libraries for State-of-the-art Visualization”, Procedia Computer Science 98 ( 2016 ) Elsevier, ISSN: 1877-0509, pp. 100 – 106 , 2016.
[13] D.J. Love ; R.W. Heath ; W. Santipach ; M.L. Honig, “What is the value of limited feedback for MIMO channels?”, IEEE Communications Magazine, ISSN: 0163-6804, Volume: 42, Issue: 10, 2004
[14] Preeti Garg, Dr. Vineet Sharma , “A Survey on Mobile Cloud Computing”, International Journal of Computer Applications, pp. 1-5. 2012.
Citation
Preeti Garg, Gaurav, "Graphical Analysis of Feedback System using Web Technologies," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.693-697, 2018.
Melanoma Detection Using Modified Extended LBP
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.698-703, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.698703
Abstract
Detecting skin cancer at an early age is very crucial for differentiating malignant melanoma from benign one. We presented a novel approach for automatic detection of skin cancer based on modified extended LBP feature. Extended LBP is a generalized form of LBP and we have proposed some modification in its functioning in order to make it more robust. Gabor filter bank is used to segment the lesion area based on the frequency and orientation pattern of the lesion in input image. We have trained and tested our proposed methodology on Support Vector Machine. We have used our own self-created database which consists of 225 images captured from different internet resources. The proposed framework is able to achieve sensitivity, specificity and overall accuracy of about 92.72%, 94.5% and 93.6% respectively.
Key-Words / Index Term
Extended Local Binary Pattern, Modified Extended LBP Gabor filter, Support Vector Machine, Image Segmentation
References
[1] Fredrik Georgsson and Tor-Björn Holmström ,Master Thesis in Computing Science “A Survey and Evaluation of Features for Diagnosis of Malignant Melanoma” August 2005.
[2] Pehamberger H, Binder M, Steiner A, Wolff K. “In vivo epiluminescence microscopy: improvement of early diagnosis of melanoma.” , J Invest Dermatol , 1993,vol.100,pp-356S–62S.
[3] Bafounta ML, Beauchet A, Aegerter P, Saiag P. “Is dermoscopy (epiluminescence microscopy) useful for the diagnosis of melanoma? Results of a meta-analysis using techniques adapted to the evaluation of diagnostic tests”. Arch Dermatol 2001,vol. 137,pp. 1343–50.
[4] McGovern TW, Litaker MS. “Clinical predictors of malignant pigmented lesions“a comparison of the Glasgow seven-point checklist and the American Cancer Society’s ABCDs of pigmented lesions” J DermatolSurgOncol 1992,vol 18,pp22–26.
[5] H. Harms, H.M. Aus, M. Haucke, U. Gunzer, “Segmentation of stained blood cell images measured at high scanning density with high magnification and high numerical aperture optics, Cytometry” 1992;vol. 7;pp. 522-531
[6]W. Stolz, T. Vogth, M. Landthaler, S. Hempfer, P. Bingler, W. Abmayr, “Differentiation between maligant melanomas and benign melanocytic nevi by computerized DNA cytometry of imprint specimens”, J CutanPathol 1994, vol. 21;pp. 7-15
[7]A.R. Brown, “Combined immunecytochemical staining and image analysis for the study of lymphocyte specificity and function in situ” J Immunol Methods 1990; vol. 130:pp 410-414
[8].http://www.mathworks.com/
[9]Binder M, Steiner A, Schwarz M, Knollmayer S, Wolff K, Pehamberger H: “Application of an artificial neural network in epiluminescence microscopy pattern analysis of pigmented skin lesions:a pilot study.” Br J Dermatol1994, vol. 130:pp.460-465.
[10]Piccolo D, Ferrari A, Peris K, Diadone R, Ruggeri B, Chimenti S “Dermoscopic diagnosis by a trained clinician vs. a clinician with minimal dermoscopy training vs. computer-aided diagnosis of 341 pigmented skin lesions: a comparative study”. Br JDermatol2002, vo.147, pp.481-486
[11]Blum A, Luedtke H, Ellwanger U, Schwabe R, Rassner G, Garbe C: “Digital image analysis for diagnosis of cutaneous melanoma”.
[12]. Medical Image analysis Methods. Edited by Lena Costaridou,Taylor &Francis
[13] T. Ojala, M. Pietikäinen, T. Mäenpää, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns”, IEEE Trans. Pattern Anal. Mach. Intell., Vol.24 ,pp.971–987.
[14] Li Liu a, , Lingjun Zhao a, Yunli Long a, Gangyao Kuang a, Paul Fieguth b , “Extended Local Binary Patterns for Texture Classification”, Image and Vision Computing, pg 86-99
[15]. Erkol, B.; Moss, R.H.; Stanley, R.J.; Stoecker, W.V.; Hvatum, E. “Automatic lesion boundary detection in dermoscopy images using gradient vector flow snakes”. Skin Res. Technol., vol.11, pp.17–26. 2005
[16]. Rajab, M.I.; Woolfson, M.S.; Morgan, S.P. “Application of region-based segmentation and neural network edge detection to skin lesions.”, Comput. Med. Imaging Graph.vol. 28, pp 61–68,2004
[17]. Zhou, H.; Schaefer, G.; Sadka, A.H.; Celebi, M.E. “Anisotropic mean shift based fuzzy c-means segmentation of dermoscopy images. “IEEE J. Sel. Top. Signal Proc. 2009, vol. 3,pp. 26–34.
[18]. Schmid, P. Segmentation of digitized dermatoscopic images by two-dimensional color clustering. IEEE Trans.Med. Imaging, vol.18, pp.164–171. 1999
[19].Celebi, M.E.;Wen, Q.; Hwang, S.; Iyatomi, H.; Schaefer, G.” Lesion border detection in dermoscopy images using ensembles of thresholding methods”. Skin Res. Technol.,vol. 19, pp.e252–e258.
[20].Sadek, S.; Al-Hamadi, A.; Michaelis, B.; Sayed, U. Human action recognition: A novel scheme using fuzzy log-polar histogram and temporal self-similarity. EURASIP J. Adv. Signal Proc., vol.1,pp. 1–9. 2011
[21]. Sadek, S.; Al-Hamadi, A.; Michaelis, B.; Sayed, U. An SVM approach for activity recognition based on chord-length-function shape features. In Proceedings of the IEEE International Conference on Image
Processing (ICIP’12), Orlando, FL, USA; pp. 767–770, , 30 September–3 October 2012
[22].Vapnik, V.N. The Nature of Statistical Learning Theory; Springer: New York, NY, USA, 1995.
[23]. Vapnik, V.N. An overview of statistical learning theory. IEEE Trans. Neural Netw.,vol. 10,pp. 988–999.
[24]. Sadek, S.; Al-Hamadi, A.; Michaelis, B.; Sayed, U. Towards Robust Human Action Retrieval in Video. In Proceedings of the British Machine Vision Conference (BMVC’10), Aberystwyth, UK, 31 August–3 September 2010.
[25]. Sadek, S.; Al-Hamadi, A.; Michaelis, B.; Sayed, U. Human Activity Recognition: A Scheme Using Multiple Cues. In Advances in Visual Computing, Proceedings of the International Symposium on Visual Computing (ISVC’10), Las Vegas, NV, USA, 29 November–1 December 2010; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6454, pp. 574–583.
[26]. Elgamal, M. Automatic Skin Cancer Images Classification. Int. J. Adv. Comput. Sci. Appl. 2013, 4, 1–8.
[27]. Sheha, M.A.; Mabrouk, M.S.; Sharawy, A. Automatic detection of melanoma skin cancer using texture analysis. Int. J. Comput. Appl.,vol. 42,pp. 22–26. 2012
[28]. M. Zortea, S. O. Skrovseth, and F. Godtliebsen, “Automatic learning of spatial patterns for diagnosis of skin lesions.,” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2010, pp. 5601-5604, 2010.
Citation
Ritesh Maurya, "Melanoma Detection Using Modified Extended LBP," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.698-703, 2018.
A Review On Load Balancing Algorithm in Cloud Computing Using Restful Web Services
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.704-707, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.704707
Abstract
As the IT industry is growing day by day, the need of computing and storage is increasing rapidly. The amount of data exchanged over the network is constantly increasing. These services return the required information in form of text, images, video etc. In Cloud computing, Load Balancing is required in such situations to avoid overload. A load balancer technique mediates client access requests to servers and intelligently decides which server is best placed to fulfil each request. Restful interfaces are mainly used for implementation of web services and are based on the resource-oriented approach. This paper discusses the some existing load balancing algorithms in cloud computing. In this review paper, Restful services are used for data storage and retrieval from Cloud system. Cloud is a storage mechanism in which one can store, process data on demand. Load balancing approach is used to distribute load dynamically among the all the nodes in the cloud. Load balancing avoids the occurrence of such a situation where some virtual machines are heavily loaded or in ideal situation. This approach has reduced the amount of data used for recovery to almost half and also maintains a secure access control mechanism for authenticated user.
Key-Words / Index Term
REST, HTTP, Load Balance, XOR scheduling,Web Services
References
[1].Digvijaysinh M. Rathod; M S Dahiya; Satyen M. Parikh, (2015) Towards composition of RESTful web services, 6th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp 1 6.
[2]Gaj, P., Jasperneite, J. and Felser, M. (2013). Computer Communication Within Industrial Distributed Environmental Survey. IEEE Transactions on Industrial Informatics, 9(1), pp.182-189.
[3]DU, Y., GUO, T. and CHEN, J. (2013). Fleet elastic load balancing mechanism in cloud environment. Journal of Computer Applications, 33(3), pp.830-833.
[4]XIE, H. and CHEN, X. (2013). Cloud storage-oriented unstructured data storage. Journal of Computer Applications, 32(6), pp.1924-1928.
[5]Zhang, G., Wu, G., Wang, S., Shu, J., Zheng, W. and Li, K. (2016). CaCo: An Efficient Cauchy Coding Approach for Cloud Storage Systems. IEEE Transactions on Computers, 65(2), pp.435-447.
[6]Trifonov, P. (2015).” Low-Complexity Implementation of RAID Based on Reed-Solomon Codes.” ACM Transactions on Storage, 11(1), pp.1-25.
[7]Li, X., Zheng, Q., Qian, H., Zheng, D. and Li, J. (2009). Toward optimizing cauchy matrix for cauchy reed-solomon code. IEEE Communications Letters, 13(8), pp.603-605.
[8]Gruner, S., Pfrommer, J. and Palm, F. (2016). RESTful Industrial Communication With OPC UA. IEEE Transactions on Industrial Informatics, 12(5), pp.1832-1841.
[9]Luo, C., Zheng, Z., Wu, X., Yang, F. and Zhao, Y. (2016). Automated structural semantic annotation for RESTful services. International Journal of Web and Grid Services, 12(1), p.26.
[6]Zhao, X., Liu, E., Yu, H. and Clapworthy, G. (2015). A linear logic approach to the composition of RESTful web services. International Journal of Web Engineering and Technology, 10(3), p.245.
[7]Load Balancing In Cloud Computing. (2017). International Journal of Recent Trends in Engineering and Research, 3(3), pp.260-267.
[8] Microsoft Windows Azure: Developing Applications for Highly Available Storage of Cloud Service. (2015). International Journal of Science and Research (IJSR), 4(12), pp.662-665.
[9] A Review of Load Balancing in cloud Computing by Gunpriya Makkar and Pankaj Deep Kaur.,IJARCSSE volume 5 Issue 4, ISSN:2277128X
[10] Load balancing in Cloud Computing : A Review by shiny, IOSR journal of Computer Engineering e-ISSN:22780661.
[12]Microsoft Windows Azure: Developing Applications for Highly Avail-able Storage of Cloud Service. (2015). International Journal of Science and Research (IJSR), 4(12), pp.662-665.
[13]Jabbar, S., Khan, M., Silva, B. and Han, K. (2016). A REST-based industrial web of things framework for smart warehousing. The Journal of Supercomputing, pp., 2016, ISSN 0920-8542.
[14]Henen, R. and Schleipen, M. (2014). Interoperability between OPC UA and AutomationML. Procedia CIRP, 25, pp.297-304.
[15]L. M. S. De Souza, P. Spiess, D. Guinard, M. Kohler, S. Karnouskos, and D. Savio, (2013). Socrades: A web service based shop oor integration infrastructure, in The internet of things, Spriger, pp. 5067.
Citation
Tusha Agarwal, Abhishek Saxena, "A Review On Load Balancing Algorithm in Cloud Computing Using Restful Web Services," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.704-707, 2018.