The IHS-FTR Transformations Based Image Fusion Algorithm For Remote Sensing Images
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.697-702, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.697702
Abstract
Image fusion has been attracting researchers with the aim of finding solutions to a wide area of applications. In the area of remote sensing, the increasing availability of imaging sensors, operating in a variety of spectral bands, definitely provides strong motivations. Because of the trade-off observed between sensors with a high spatial resolution with only a few spectral bands and sensors with low spatial resolution having many spectral bands, spatial enhancement of poor-resolution image and vice-versa is desirable. Thus, a new method of fusing different resolution images based on IHS transform and fuzzy transform (FTR) is proposed. The main aim is to produce a fused image with high spatial as well as high spectral resolution by fusing two images, an Ms image and a Pan image, the former with high spectral resolution but poor spatial resolution and the latter with high spatial resolution but poor spectral resolution. Experimental results obtained from the fusion of different pairs of input images prove the effectiveness of the proposed algorithm.
Key-Words / Index Term
Remote Sensing, fuzzy transform, image fusion
References
[1] T. Stathaki, “Image fusion: algorithms and applications”, Academic Press, 2011.
[2] J. Dong, D. Zhuang, Y. Huang and J. Fu, “Advances in multi-sensor data fusion: algorithms and applications”, Sensors, Vol. 9, No. 10, pp. 7771- 7784, 2009.
[3] I. Perfilieva, “Fuzzy transforms: Theory and applications”, Fuzzy Sets and Systems, Vol. 157, No 8, pp. 993-1023, 2006.
[4]. M. Manchanda, and R. Sharma, “An improved multimodal medical image fusion algorithm based on fuzzy transform”, Journal of Visual Communication and Image Representation, Vol. 51, pp. 76 -94, 2018.
[5] X. Wen, “Image fusion based on improved IHS Transform with weighted average”, International Conference on Computational and Information Sciences, 2011
[6] G. Bhatnagar, Q. M. Jonathan Wu and L. Zheng, “Human visual system inspired multi-modal medical image fusion framework”, Expert Systems with Application, Vol. 40, No. 5, pp. 1708 – 1720, 2013.
[7] M. Gonzalez-Audicana, J. L. Saleta, R. G. Catallan, and R. Garcia, “Fusion of multispectral and panchromatic images using improved IHS and PCA mergers based on wavelet decomposition”, IEEE Transactions on Geoscience and Remote sensing, Vol. 42, No. 6, pp. 12911299, 2004.
[8] N. H. Kaplan, I. Erer, and F. Elibol, “Fusion of multispectral and panchromatic images by combining bilateral filter and IHS transform”, Proceedings of the 20th IEEE European Signal Processing Conference, Romania, pp. 25012505, 2012.
Citation
Meenu Manchanda, Deepak Gambhir, "The IHS-FTR Transformations Based Image Fusion Algorithm For Remote Sensing Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.697-702, 2018.
Congestion Avoidance in Wireless Mesh Networks Based On Multicast Routing Protocols
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.703-707, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.703707
Abstract
Congestion is a major challenge in Wireless Mesh Networks (WMNs) that rely on high mobility, dynamic topology, and limited resources. Congestion is the instability of the network due to unmanaged traffic resulted in exceeding the capacity of the network’s resources which leads to bottleneck stage that can occur at any intermediate node. Therefore, the performance of the network is deteriorating in packet drops, high delays, and low throughput. Therefore, an extensive research has been done for searching an effective algorithm for congestion problem in WMNs. Hence, the demand for effective management of the resources is immensely needed to enhance the network performance with multicast processes that lead to more congestion in the networks due to the high demands of resources in WMNs. Hence, a new scheme has been proposed in this paper to avoid the congestion in WMNs using the concept of target rate that is applied in the MAC layer and based on (MAODV) Multicast Ad-hoc on Demand Distance Vector routing protocol. The simulation results through NS2.26 simulator show the performance of the proposed scheme outperforms the original scheme. Thus, proving a fair distribution of resources among nodes is maintained due to resolving the congestion problem which leads to increases packet delivery ratio and the throughput and reduces the delay thereby increasing the network performance on the whole which is suitable for the emerging applications in WMNs.
Key-Words / Index Term
Congestion, Routing, Wireless Mesh Network, Target Rate
References
[1] Ajish Kumar K.S, SaumyaHegde,”Multicasting in Wireless Mesh Networks: Challenges and Opportunities “, in the proceeding of 2009 International Conference on Information Management and Engineering, India, © 2009 IEEE DOI 10.1109/ICIME.2009.92.
[2] Md Rashid Hussain , Prof. (Dr.) PankajKumar,“WIRELESS MESH NETWORK BASED ON DESIGN AND IMPLEMENTATION”, International Journal of Advance Research In Science And Engineering , Vol.3, Issue.4, April 2014 ISSN-2319-8354(E).
[3] AdebanjoAdekiigbe , Kamalrulnizam Abu Bakar , and OgunnusiOlumide Simeon “A Review of Cluster-Based Congestion Control Protocols in Wireless Mesh Networks“, International Journal of Computer Science (IJCSI) , Vol.8, Issue.4, No 2, July 2011 ISSN (Online): 1694-0814 www.IJCSI.org.
[4] HarshaChandran K C ,Jayasree P S, “Multicast Ad-hoc On-demand Distance vector Routing :A Survey”,International Journal of Science, Engineering and Technology Research (IJSETR) Vol.6, Issue.4, April 2017, ISSN: 2278 -7798.
[5] Mohammad Masdari, RezaKhorsandi, ParinazAghapoor,“Analysis of Multicast Routing Protocols in Wireless Mesh Networks”, International Journal of Applied Information Systems (IJAIS) – ISSN: 2249-0868 Foundation of Computer Science FCS, New York, USA Vol.6 – No.2, September 2013 – www.ijais.org.
[6] Kohei Nakajima , Kenichi Mase , Hiraku Okada,“A Congestion Control Scheme for Layer 3 Wireless Mesh Networks“,In the Proceedings of (2009) the 15th Asia-Pacific Conference on Communications (APCC 2009)-172.
[7] Tiejun Chen,Shuang Xu,"Algorithm for Congestion Control in Wireless Mesh Network",In the Proceedings of (2010) WASE International Conference on Information Engineering.
[8] Muhammad Sharif , Maryum Murtaza , Waqas Haider , Mudassar Raza,"Priority Based Congestion Control Routing in Wireless Mesh Network",International Journal of Advanced Networking and Applications 1147 Vol.3, Issue.3 (2011).
[9] Payal Grover, Paramjeet Singh, Shaveta Rani,“Congestion Reduction in Wireless Mesh Networks”,International Journal of Computer Applications (0975 – 8887) Vol.124 – No.13, August 2015.
[10] B. Sadeghi , S. Misra et al.,"Guide to Wireless Mesh Networks , Computer Communications and Networks", DOI 10.1007/978-1-84800-909-7 11, _c Springer-Verlag London Limited 2009.
Citation
Mohammed A. Al-Jendary, Maher A. Al-Sanabani, "Congestion Avoidance in Wireless Mesh Networks Based On Multicast Routing Protocols," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.703-707, 2018.
Decision Support System for Promotion Assessment using Analytic Hierarchy Process
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.708-713, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.708713
Abstract
Promotion Assessment is an important mechanism in every organization to recognize and utilize the talent of the work force efficiently. Exiting approach uses manual process which is highly subjective in nature and hence has high probability of errors. Therefore, automating this process is required to overcome the deficiencies in the manual process. Decision Support System is the most appropriate tool for automation in such kind of scenarios. The proposed system uses criteria based on profession skill and behavioural aspects of staff. This system can further be used to predict those staffs that need training program/ domain technical skill and also predict those staffs that have higher chances of promotion in next assessment. It is based on multi-criteria ranking procedure utilizing Analytic Hierarchy Process (AHP) and weighted score method. The system can be utilized to improve the credibility of the whole assessment process adding transparency to the system. To test the model, the sample is taken from the Defence lab.
Key-Words / Index Term
Decision Support System, Analytic Hierarchy Process, Weighted Score Method, Promotion Assessment
References
[1] C. Moon, J. Lee, C. Jeong, J. Lee, S. Park and S. Lim (2007), “An Implementation Case for the Performance Appraisal and Promotion Ranking”, in IEEE International Conference on System, Man and Cybernetics, 2007.
[2] R. Ahmad, S. Bujang, “Issues and Challenges in the practice of performance appraisal activities in the 21st century”, International journalof eduction and research, Vol. 1 No. 4, April 2013.
[3] M. Fernandes, “Data Mining: A Comparative Study of its Various Techniques and its Process”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 5, Issue 1, pp. 19-23, Febuary 2017.
[4] A. Varma, Y. S. Chouhan, “Recent Methodologies for Improving and Evaluating Academic Performance”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 3, Issue 2, pp. 11-16, 2015.
[5] R. Taufiq, A. Sugiharto, “The Decision Support System Design Of Employee Performance Appraisal Using Analytical Hierarchy Process (AHP) Method”, Proceedings of The 1st International Conference on Information Systems For Business Competitiveness (ICISBC) 2011.
[6] R. Ahmad, N. A. Ali, “Performance appraisal decision in Malaysian public service”, The International Journal of Public Sector Management, 17,1, pp:48-64, 2004.
[7] Dr. P.D.D. Dominic, I.A. Aziz, K.N.Goh, “A Decision Support System for Performance Appraisal”, Fifth International Conference on Information Technology, 2008
[8] R. McLeod, G. Schell, “Management Information System”, Prentice Hall, 2003
[9] Turban E., Aronson J. E., “Decision Support Systems and Intelligent Systems”; sixth edition, Prentice Hall,2001.
[10] N. Noor and R. Mohemad, “Strategies for evaluating a web-based decision support system for tendering processes,” Inf. Manag. Eng. ICIME 2nd IEEE International Conference, pp. 1–7, 2010.
[11] Turban, E., Sharda, R., and Delen, D, “Decision support and business intelligence systems”, 9th ed., vol. 674. Boston: Prentice Hall, 2011.
[12] A.H.R, “A Decision Support System for Performance Evaluation,” IJCA Spec. Issue “Computational Intell. Amp Inf. Secur., pp. 1–8, 2012
[13] A. Calabrese, R. Costa, T. Menichini., “Using Fuzzy AHP to manage Intellectual Capital assets: An application to the ICT service industry”, Journal Expert Systems with Applications, Vol. 40, No. 9,pp. 3747-3755, 2013
[14] Saaty, L Thomas [2003], “Decision-making with the AHP: Why is the principal eigenvector necessary”, European Journal of Operational Research, page 85–91, Elsevier Science B.V.
[15] Ab. Aziz Yusof. (2003), “Performance Appraisal Issues, Challenges & Prospects”, Pearson.
[16] Dessler, G. (2000), Human Resource Management (8th Edition), New Jersey, Pearson Education, Inc.
[17] Emma, B. and Bryman, A. (2003), Business Research Methods. US: Oxford University Press.
Citation
Sanjeev Kumar, Shivangi Gupta, "Decision Support System for Promotion Assessment using Analytic Hierarchy Process," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.708-713, 2018.
Gujarati Text Localization, Extraction and Binarization from Images
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.714-724, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.714724
Abstract
In this paper, first ever attempt to automatic detection and extraction of Gujarati text from image has been presented. This method is based on Haar discrete wavelet transform (HDWT), edge detection and connected component analysis. The distinct features of Gujarati script make it hard to directly apply the existing text detection methods designed for English, Chinese and other languages. In proposed work, first high-frequency wavelet coefficients are extracted using HDWT and then sobel filter is applied on to detect candidate text edges. Then connected component analysis is performed using area geometric feature to get rid of non-text area. The proposed method is tested on a variety of images such as images of complex background and images of different fonts, colour, and size of text. The experiment on over 878 images show that the proposed method can detect regions and isolation of text perfectly including modifier. The proposed framework has achieved a precision of 0.91, recall of 0.97 and f measure of 0.94.
Key-Words / Index Term
Gujarati text detection, Text extraction, Text binarization, HDWT, Connected Componenet
References
[1] J. M. Patel, A. A. Desai, “Segmentation and Recognition of printed Gujarati numeral from Image”, International Journal of Engineering Research & Technology, Vol. 3, Issue. 2, pp. 1012-1020, February 2014
[2] SH Kim, KJ An, SW Jang, GY Kim, "Texture feature-based text region segmentation in social multimedia data", Multimedia Tools and Applications 75, No. 20, pp. 12815-12829, 2016
[3] Y. Zhong, H. J. Zhang, and A. K. Jain, “Automatic caption localization in compressed video”, IEEE transactions on pattern analysis and machine intelligence, Vol. 22, No. 4, pp. 385–392, Apr. 2000.
[4] L. Neumann , J. Matas, “Scene text localization and recognition with oriented stroke detection”, In Proceedings of the IEEE International Conference on Computer Vision, pp. 97–104, 2013
[5] I. Haritaoglu, “Scene text extraction and translation for handheld devices”, in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol. 2, pp. 408–413, 2001
[6] J. Liang, D. Doermann, H. Li, “Camera-based analysis of text and documents: A survey”, International Journal of Document Analysis and Recognition, Vol. 7, Issue. 2-3, pp. 84–104, 2005.
[7] L. Lin , C. L. Tan, “Text extraction from name cards using neural network”, Proceedings. IEEE International Joint Conference on, Vol. 3, pp. 1818–1823, 2005.
[8] P Sermanet, S Chintala, Y LeCun, "Convolutional neural networks applied to house numbers digit classification", In the Proceedings of international conference on pattern recognition ICPR, pp 10–13, 2012
[9] Lee, Chung-Mong, A Kankanhalli. "Automatic extraction of characters in complex scene images", International Journal of Pattern Recognition and Artificial Intelligence, Vol. 9, No. 01, pp. 67-82, 1995
[10] X Liu, J Samarabandu, "An edge-based text region extraction algorithm for indoor mobile robot navigation", In Mechatronics and Automation, IEEE International Conference, Vol. 2, No. 7, pp. 2008–2015, 2005
[11] G. S. Hsu, J. C. Chen , Y. Z. Chung, "Application-Oriented License Plate Recognition", in IEEE Transactions on Vehicular Technology, Vol. 62, No. 2, pp. 552-561, Feb. 2013
[12] P. Prabhakar , P. Anupama, "A novel design for vehicle license plate detection and recognition", Second International Conference on Current Trends In Engineering and Technology - ICCTET, pp. 7-12, 2014
[13] Liu, Xiaoqian, Ke Lu, ,W. Wang, "Effectively localize text in natural scene images", In Pattern Recognition (ICPR), 21st International Conference on, pp. 1197-1200, 2012.
[14] N. Ezaki, M. Bulacu, L. Schomaker, "Text detection from natural scene images: towards a system for visually impaired persons", Proceedings of the 17th International Conference on Pattern Recognition, ICPR, Cambridge, Vol. 2, pp. 683-686, 2004
[15] X. Chen , A. L. Yuille, “Detecting and reading text in natural scenes”, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol. 2, pp. 366–373, 2004
[16] B. T. Nassu, R. Minetto, L. E. S. d. Oliveira, “Text line detection in document images: Towards a support system for the blind”, 12th International Conference on Document Analysis and Recognition, pp. 638–642, 2013
[17] C. N. Patel, A.A. Desai, "Segmentation of text lines into words for Gujarati handwritten text", In Proceedings of international conference on signal and image processing (ICSIP’10), IEEEXplore, 15–17, 2010
[18] J Dholakia, A Negi, M. S. Rama, "Zone identification in the printed Gujarati text", In the Proceedings of the eight international conference on document analysis and recognition (ICDAR’05), 2005.
[19] L Neumann, J Matas, "Real-time scene text localization and recognition", In the Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. pp. 3538–3545, 2012.
[20] C. Yi, Y L. Tian , "Text string detection from natural scenes by structurebased partition and grouping", IEEE Transactions on Image Processing, Vol. 20, No. 9, pp. 2594–2605, 2011.
[21] X. Yin, X. Yin, K. Huang , H. Hao, "Robust Text Detection in Natural Scene Images", in IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 36, No. 5, pp. 970-983, May 2014.
[22] G. K. Myers, R. C. Bolles, Q. Luong, J. A. Herson, H. B. Aradhye, "Rectification and recognition of text in 3-d scenes", International Journal on Document Analysis and Recognition Vol. 7, No. 2, pp. 147-158, 2005.
[23] C. Yi , Y. Tian, ”Localizing text in scene images by boundary clustering, stroke segmentation and string fragment classification”, IEEE Transaction on Image Process., Vol. 21, No. 9, pp. 4256-4268, Sep. 2012.
[24] Huang, Weilin, Z. Lin, J. Yang, , J. Wang. "Text localization in natural images using stroke feature transform and text covariance descriptors", In Proceedings of the IEEE International Conference on Computer Vision, pp. 1241-1248, 2013.
[25] H. Li , D. Doermann, “Text enhancement in digital video using multiple frame integration”, In Proceedings of the seventh ACM international conference on Multimedia (Part 1), pp. 19–22, 1999.
[26] Ali, Suhad A., Ashwaq T. Hashim. "Wavelet transform based technique for text image localization”, Karbala International Journal of Modern Science Vol. 2, No. B, pp. 138-144., 2016.
[27] M. Kumar, G. Lee, "Automatic text location from complex natural scene images", International conference on computer and automation engineering (ICCAE), Vol. 3, pp. 594–597, 2010.
[28] S. Lu, T. Chen, S. Tian, Lim J-H, Tan C-L, "Scene text extraction based on edges and support vector regression", International Journal on Document Analysis and Recognition (IJDAR) Vol. 18, Issue. 2, pp 125–135, 2015.
[29] A. Zhu, G. Wang, Y. Dong, "Detecting natural scenes text via auto image partition, two-stage grouping and two-layer classification", Pattern Recognition Letters, Vol. 67, pp. 153–162 ,2015.
[30] C Yu, Y Song, Y Zhang, "Scene text localization using edge analysis and feature pool", Neurocomputing Vol. 175, pp. 652–661, 2016.
[31] W Huang, Y Qiao, X Tang, "Robust scene text detection with convolution neural network induced Mser trees", In Proceedings of European Conference on Computer Vision, Springer, pp. 497–511, 2014
[32] Y. F. Pan, X. Hou, C. L. Liu, “A hybrid approach to detect and localize texts in natural scene images”, IEEE Transaction on Image Processing, Vol. 20, No. 3, pp. 800–813, Mar. 2011.
[33] Y Liu, S Goto, T Ikenaga, "A contour-based robust algorithm for text detection in color", IEICE TRANSACTIONS on Information and Systems, Vol. 89, No. 3, pp. 1221–1230, 2006.
[34] Y. Pan, X. Hou , C. Liu, "Text Localization in Natural Scene Images Based on Conditional Random Field", 10th International Conference on Document Analysis and Recognition, Barcelona, pp. 6-10, 2009.
[35] M. Petter, V. Fragoso, M. Turk, C. Baur, "Automatic text detection for mobile augmented reality translation", IEEE international conference on computer vision workshops (ICCV), pp 48–55, 2011.
[36] Y. Pan, X. Hou , C. Liu, "A Hybrid Approach to Detect and Localize Texts in Natural Scene Images", in IEEE Transactions on Image Processing, Vol. 20, No. 3, pp. 800-813, March 2011.
[37] C. Shi, B. Xiao, C. Wang and Y. Zhang, "Graph-Based Background Suppression for Scene Text Detection," 10th IAPR International Workshop on Document Analysis Systems, pp. 210-214, 2012.
[38] P. Shivakumara, W. Huang, T. Phan, and C. Tan, “Accurate video text detection through classification of low and high contrast images”, Pattern Recognition, Vol. 43, No. 6, pp. 2165–2185, 2010.
[39] J. Lee, P. Lee, S. Lee, A. Yuille, and C. Koch, “AdaBoost for text detection in natural scene”, in Proceeding of IEEE International Conference on Document Analysis and Recognition, pp. 429–434, 2011.
[40] X. Chen , A. L. Yuille, “Detecting and reading text in natural scenes”, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 366–373., 2004.
[41] X. Yin, X.-C. Yin, H.-W. Hao, and K. Iqbal, “Effective text localization in natural scene images with MSER, geometry-based grouping and AdaBoost”, Proceedings of the 21st International Conference on Pattern Recognition, pp. 725–728, Nov. 2012.
[42] C. Liu, C. Yang, X. Q. Ding, and K. Wang, “An improved scene text extraction method using conditional random field and optical character recognition”, International Conference on Document Analysis and Recognition, pp. 708–712, 2011.
[43] Shi, Baoguang, Xiang Bai, and Cong Yao. "An end-to-end trainable neural network for image-based sequence recognition and its application to scene text recognition”, IEEE transactions on pattern analysis and machine intelligence, Vol. 39, No. 11, pp. 2298-2304, 2017.
[44] C. Yao, X. Zhang, X. Bai, W. Liu, Y. Ma, and Z. Tu, ”Detecting texts of arbitrary orientations in natural images”, IEEE Conference on Computer Vision and Pattern Recognition, pp. 1083–1090, 2012.
[45] A. R. Chowdhury, U. Bhattacharya, and S. K. Parui, ”Scene text detection using sparse stroke information and MLP”, in Proceeding of IEEE International Conference on Pattern Recognition., pp. 294–297, 2012.
[46] S. Lee, M. Cho, K. Jung, J. Kim, “Scene text extraction with edge constraint and text collinearity”, International Conference on Pattern Recognition, IEEE, pp. 3983–3986, 2010.
[47] K. Esther Amulya, P. Sanoop Kumar, "Scene Text Extraction using Stroke Width Transform", International Journal of Computer Sciences and Engineering, Vol. 6, Issue. 6, pp.375-379, 2018.
[48] C. Yan, H. Xie, S. Liu, J. Yin, Y. Zhang and Q. Dai, "Effective Uyghur Language Text Detection in Complex Background Images for Traffic Prompt Identification", in IEEE Transactions on Intelligent Transportation Systems, Vol. 19, No. 1, pp. 220-229, Jan. 2018.
[49] Dey, Soma, Rajat Subhra Goswami. "A morphological segmentation and curve-let features extraction on text region classification using SVM”, In Computational Intelligence and Computing Research (ICCIC), IEEE International Conference on, pp. 1-6, 2015.
[50] C Shi, C Wang, B Xiao, Y Zhang, S Gao,"Scene text detection using graph model built upon maximally stable extremal regions", Pattern Recognition Letter Vol. 34, Issue. 2, pp.107–116, 2013.
[51] C. Shi, C. Wang, B. Xiao, Y. Zhang, S. Gao, and Z. Zhang, “Scene text recognition using part-based tree-structured character detections”, in Proceeding IEEE Conference on Computer Vision and Pattern Recognition, pp. 2961–2968, 2013.
[52] H. Koo, D. H. Kim, “Scene text detection via connected component clustering and non-text filtering”, IEEE Transaction Image Processing, Vol. 22, No. 6, pp. 2296–2305, Jun. 2013.
[53] L. Neumann , J. Matas,”Real-time scene text location and recognition”, IEEE Conference on Computer Vision and Pattern Recognition, pp. 3538–3545, 2012.
[54] L. Neumann, J. Matas," Text localization in real-world images using efficiently pruned exhaustive search", In Proceedings of the international conference on document analysis and recognition (ICDAR), pp 687–691, 2011.
[55] H. Chen, S. S. Tsai, G. Schroth, D. M. Chen, R. Grzeszczuk and B. Girod, "Robust text detection in natural images with edge-enhanced Maximally Stable Extremal Regions", 18th IEEE International Conference on Image Processing, pp. 2609–2612, 2011.
[56] D. Karatzas, S. R. Mestre, J. Mas, F. Nourbakhsh and P. P. Roy, "ICDAR 2011 Robust Reading Competition - Challenge 1: Reading Text in Born-Digital Images (Web and Email)", International Conference on Document Analysis and Recognition, Beijing, pp. 1485-1490. IEEE, 2011.
[57] A. Shahab, F. Shafait , A. Dengel, "ICDAR 2011 Robust Reading Competition Challenge 2: Reading Text in Scene Images", International Conference on Document Analysis and Recognition, pp 1491–1496, 2011.
[58] D. Karatzas et al., "ICDAR 2015 competition on Robust Reading", 13th International Conference on Document Analysis and Recognition (ICDAR), Tunis, pp. 1156-1160, 2015.
[59] D. Karatzas et. al., "ICDAR 2013 robust reading competition”, In Document Analysis and Recognition (ICDAR), 12th International Conference on, pp. 1484-1493. IEEE, 2013.
[60] Lucas et al., "ICDAR 2003 robust reading competitions”, In Document Analysis and Recognition, Proceedings. Seventh International Conference on, pp. 682-687. IEEE, 2003.
[61] Kumar, Deepak, M. N. Prasad, A. G. Ramakrishnan. "Multi-script robust reading competition in icdar 2013”, In Proceedings of the 4th International Workshop on Multilingual OCR, p. 14. ACM, 2013.
[62] X. Jiang, J. Lian, Z. Xia, X. Feng, A. Hadid, "Fast Chinese character detection from complex scenes", Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), Oulu, pp. 1-4, 2016.
[63] X. Ren, K. Chen, X. Yang, Y. Zhou, J. He and J. Sun, "A new unsupervised convolutional neural network model for Chinese scene text detection", IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), Chengdu, pp. 428-432, 2015.
[64] Y Wang, L Peng, S Wang, "A Multi-stage Method for Chinese Text Detection in News Videos”, Procedia Computer Science, Vol. 96, pp. 1409-1417, 2016.
[65] O. Zayene, S. M. Touj, J. Hennebert, R. Ingold and N. E. Ben Amara, "Data, protocol and algorithms for performance evaluation of text detection in Arabic news video”, In Advanced Technologies for Signal and Image Processing (ATSIP), 2nd International Conference on, pp. 258-263. IEEE, 2016.
[66] X. Chen, J. Yang, J. Zhang, A. Waibel, “Automatic detection and recognition of signs from natural scenes”, IEEE Trans. Image Process., Vol. 13, No. 1, pp. 87–99, Jan. 2004.
[67] M. Iwamura, T. Kobayashi, and K. Kise, “Recognition of multiple characters in a scene image using arrangement of local features”, in Proc. IEEE International Conference on Document Analysis and Recognition, pp. 1409–1413, 2011.
[68] M. Moradi, S. Mozaffari and A. A. Orouji, "Farsi/Arabic text extraction from video images by corner detection", 6th Iranian Conference on Machine Vision and Image Processing, Isfahan, pp. 1–6, 2010.
[69] Ghoshal, Ranjit, A. Roy, S. Parui. "Recognition of Bangla text from scene images through perspective correction”, In Image Information Processing (ICIIP), 2011 International Conference on, pp. 1-6. IEEE, 2011.
[70] H Gaddour, S Kanoun, N Vincent, "A New Method for Arabic Text Detection in Natural Scene Image Based on the Color Homogeneity”, In International Conference on Image and Signal Processing, Springer International Publishing pp. 127-136., 2016.
[71] O. Zayene, S. M. Touj, J. Hennebert, R. Ingold and N. E. Ben Amara, "Data, protocol and algorithms for performance evaluation of text detection in Arabic news video", 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), Monastir, pp. 258-263, 2016.
[72] L. Xu, H. Nagayoshi, H. Sako, “Kanji character detection from complex real scene images based on character properties”, In Document Analysis Systems, 2008. DAS`08. The Eighth IAPR International Workshop on, IEEE, pp. 278–285, 2008.
[73] J. Park, G. Lee, E. Kim, J. Lim, S. Kim, H. Yang, M. Lee, and S. Hwang, “Automatic detection and recognition of Korean text in outdoor signboard images”, Pattern Recognition Letter., Vol. 31, No. 12, pp. 1728–1739, 2010.
[74] SH Lee, MS Cho, K Jung, JH Kim, "Scene text extraction with edge constraint and text collinearity link", In Proceedings of International Conference on Pattern Recognition. , pp. 3983–3986, 2010.
[75] A. Jamil, I. Siddiqi, F. Arif, A. Raza, “Edge-based features for localization of artificial Urdu text in video images”, in Proceeding IEEE International Conference In Document Analysis and Recognition, pp. 1120–1124, 2011.
[76] Y. Song et. al., "Robust and parallel Uyghur text localization in complex background images”, Machine Vision and Applications, Vol. 28, Issue. 7, pp. 755-769, 2017.
[77] S Fang, H Xie, Z Chen, S Zhu, X Gu, X Gao, "Detecting Uyghur text in complex background images with convolutional neural network”, Multimedia Tools and Applications Vol.76, No. 13 ,pp. 15083-15103, 2017.
[78] C. Yao, X. Bai, W. Liu, "A Unified Framework for Multioriented Text Detection and Recognition", in IEEE Transactions on Image Processing, Vol. 23, No. 11, pp. 4737-4749, Nov. 2014.
[79] P. Shivakumara, T. Q. Phan, C. L. Tan, “A Laplacian approach to multi-oriented text detection in video”, IEEE transactions on pattern analysis and machine intelligence, Vol. 33, No. 2, pp. 412–419, Feb. 2011.
[80] L Li, S Yu, L Zhong, X Li, "Multilingual text detection with nonlinear neural network”, Mathematical Problems in Engineering 2015
[81] M. R. Lyu, J. Song, M. Cai, “A comprehensive method for multilingual video text detection, localization, and extraction”, IEEE transactions on circuits and systems for video technology, Vol. 15, No. 2, pp. 243– 255, Feb. 2005.
[82] G. Zhou, Y. Liu, Q. Meng, and Y. Zhang, ”Detecting multilingual text in natural scene”, 1st International Symposium on Access Spaces (ISAS), Yokohama,, pp. 116–120, 2011.
[83] V.N. Manjunath Aradhya, M.S. Pavithra, "A comprehensive of transforms, Gabor filter and k-means clustering for text detection in images and video", Applied Computing and Informatics, Vol. 12, Issue. 2, Pages 109-116, 2016.
[84] L. Gomez, D. Karatzas,”Multi-script text extraction from natural scenes”, in Proceeding IEEE International Conference in Document Analysis and Recognition, pp. 467–471, 2013.
[85] Gomez, L. & Karatzas, "A Fast Hierarchical Method for Multi-script and Arbitrary Oriented Scene Text Extraction", IJDAR, Vol. 19, Issue. 4, pp 335–349, December 2016.
[86] X. Liu, H. Fu, and Y. Jia, “Gaussian Mixture modeling and learning of neighboring characters for multilingual text extraction in images”, Pattern Recognition, Vol. 41, No. 2, pp. 484–493, 2008.
[87] A. Negi, N. Kasinadhuni, "Localization and extraction of text in Telugu document images", TENCON. Conference on Convergent Technologies for Asia-Pacific Region, Vol. 2, pp. 749-752, 2003.
[88] A Negi, KN Shanker, CK Chereddi, "Localization, extraction and recognition of text in Telugu document images”, In Document Analysis and Recognition, Proceedings. Seventh International Conference on, pp. 1193-1197. IEEE, 2003.
[89] U. Bhattacharya, S. K. Parui and S. Mondal, "Devanagari and Bangla Text Extraction from Natural Scene Images", 10th International Conference on Document Analysis and Recognition, Barcelona, pp. 171-175, 2009.
[90] "D.V. Sharma, S. Singh "Gurmukhi text detection and localization in natural scene images", International Journal of Advanced Research in Computer Science and Software Engineering Vol. 5, Issue 12, pp. 442–458, 426-428, 2015
[91] S. Kaur, G.S Josan, “Gurmukhi Text Extraction From Image Using Support Vector Machine (SVM)”, International Journal of Engineering Research and Applications (IJERA), Vol. 3, No. 4, pp. 9-15, 2011.
[92] R Ghoshal, A Roy, TK Bhowmik, SK Parui, "Decision tree based recognition of Bangla text from outdoor scene images”, In International Conference on Neural Information Processing, pp. 538-546. Springer, Berlin, Heidelberg, 2011.
[93] S. V. Seeri, S. Giraddi and B. M. Prashant, "A novel approach for Kannada text extraction", International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012), Salem, Tamilnadu, pp. 444-448, 2012.
[94] S. A.Angadi, M. M. Kodabagi. "A robust segmentation technique for line, word and character extraction from Kannada text in low resolution display board images”, In Signal and Image Processing (ICSIP), Fifth International Conference on, pp. 42-49. IEEE, 2014.
[95] T. E. de Campos, B. R. Babu, M. Varma, “Character recognition in natural images”, VISAPP Vol. 2, Issue 7, 2009.
[96] A. A. Desai, "Support vector machine for identification of handwritten Gujarati alphabets using hybrid feature space”, CSI transactions on ICT, Vol. 2, No. 4, pp. 235-241, 2015.
[97] A. A. Desai, "Gujarati handwritten numeral optical character recognition through neural network", Pattern Recognition, Vol. 43, Issue. 7, pp. 2582–2589, 2010.
[98] A. A. Desai, "Handwritten Gujarati numeral optical character recognition using Hybrid feature extraction technique", In Proceeding of international conference on image processing, Computer vision and pattern recognition, (IPCV’10), Vol. 2, pp. 733–739, 2010.
[99] C. N. Patel, A. A. Desai, "Zone identification for Gujarati handwritten words", In Proceedings of international conference on emerging applications of information technology (EAIT 2011), IEEEXplore, pp. 19–20, 2011.
[100] J. Gllavata, R. Ewerth, B. Freisleben, “Text detection in images based on unsupervised classification of high-frequency wavelet coefficients”, in Proceeding IEEE International Conference Pattern Recognition, pp. 425–428, 2004.
[101] Q. Ye, Q. Huang, W. Gao and D. Zhao, “Fast and robust text detection in images and video frames”, Image and Visison Computing, Vol. 23, pp. 565–576, 2005.
[102] Sobel, I., “An Isotropic 3×3 Gradient Operator”, Machine Vision for Three – Dimensional Scenes, Freeman, H., Academic Pres, NY, pp. 376-379, 1990.
[103] Haralick, Robert, M., Linda, G. S., “Computer and Robot Vision”, Addison-Wesley Longman: Boston, MA, USA, pp. 28–48, 1992.
[104] N. Otsu, “A Threshold Selection Method from GreyLevel Histogram”, IEEE transactions on systems, man, and cybernetics, Vol. 9, No. 1, pp. 62-66, 1979.
Citation
J. M. Patel, A. A. Desai, "Gujarati Text Localization, Extraction and Binarization from Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.714-724, 2018.
A Mapreduce Approach To Deal with Big Data Pre Processing And Classification Problems Based On Evolutionary Algorithms
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.725-730, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.725730
Abstract
The big data is a term which is used to describe the exponential growth in data that has occurred recently and it also represents an immense challenge for traditional learning techniques. In order to deal with big data pre processing and classification problems, a novel MapReduce-Neuro Ant Colony (MR-NAC) algorithm was proposed. The proposed algorithm used MapReduce framework to pre process and classify the large dataset which is found to difficult without using the MapReduce framework. The experimentation for the proposed work is carried on two different datasets and results obtained are discussed. The obtained results are much satisfactory which supports the proposed novel algorithm for big data pre processing and classification. AUC and execution time are the two metrics which were used to measure the performance of the proposed MR-NAC Algorithm.
Key-Words / Index Term
Big Data, Map Reduce, Neural Network, Ant Colony, Pre process, Classification, execution time
References
[1] E. Alpaydin, “Introduction to Machine Learning”, MIT Press, Cambridge Mass, USA, 2ND Edition, 2010.
[2] E. Merelli, M. Pettini and M. Rasetti, “Topology driven modelling: the IS metaphor”, Natural Computing, Vol. 14, Issue 3, pp 421-430, 2015.
[3] Prakash Singh , "Efficient Deep Learning for Big Data: A Review", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.36-41, 2016.
[4] A. Fern´andez, S. del R´ıo,V.L´opez, “Big data with cloud computing: an insight on the computing environment, MapReduce, and programming frameworks,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, Vol. 4, Issue 5, pp.380–409,2014.
[5] S. Sakr, A. Liu, D. M. Batista, and M. Alomari, “A survey of large scale data management approaches in cloud environments,” IEEE Communications Surveys and Tutorials, Vol.13,Issue.3, pp.311–336, 2011.
[6] Bacardit and X. Llor`a, “Large-scale data mining using genetics-based machine learning,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, Vol. 3, Issue.1, pp.37–61,2013.
[7] J. Dean and S. Ghemawat, “MapReduce: simplified data processing on large clusters,” Communications of the ACM,Vol.51, Issue.1, pp. 107–113, 2008.
[8] J. Dean and S. Ghemawat, “Map reduce: a flexible data processing tool,” Communications of the ACM,Vol.53, Issue.1,pp.72–77, 2010.
[9] S. Ghemawat, H. Gobioff, and S.-T. Leung, “The google file system,” In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP ’03), pp. 29–43, October 2003.
[10] M. Snir and S. Otto, “MPI—The Complete Reference: The MPI Core”, MIT Press, Boston, Mass, USA, 1998.
[11] W. Zhao, H. Ma, and Q. He, “Parallel k-means clustering based on MapReduce, In Cloud Computing, M. Jaatun, G. Zhao, and C. Rong, Eds., Vol. 5931 of Lecture Notes in Computer Science, pp. 674–679, Springer, Berlin, Germany, 2009.
[12] A. Srinivasan, T. A. Faruquie, and S. Joshi, “Data and task parallelism in ILP using MapReduce,” Machine Learning, Vol.86, Issue.1, pp.141–168, 2012.
[13] H. He, E.A. Garcia, “Learning from imbalanced data”, IEEE Transaction of Knowledge Enginnering, Vol. 21, Issue. 9, pp 1263-1284, 2009.
[14] Y. Sun, A.K.C. Wong, M.S. Kamel, “Classification of imbalanced data: a review”, International Journal of Pattern Recognition and Artificial Intelligence, Vol 23, Issue 4, pp 687-719, 2009.
[15] J. Dean and S. Ghemawat, “MapReduce: simplified data processing on large clusters,” Communications of the ACM, Vol.51, Issue.1, pp. 107–113, 2008.
[16] J. Dean and S. Ghemawat, “Map reduce: a flexible data processing tool,” Communications of the ACM, Vol.53, Issue.1, pp.72–77, 2010.
[17] Daniel Peralta, Sara del Río,Sergio Ramírez-Gallego, Isaac Triguero, Jose M. Benitez, and Francisco Herrera, “Evolutionary Feature Selection for Big Data Classification: A MapReduce Approach”, Hindawi Publishing Corporation, Mathematical Problems in Engineering, Vol 2015, pp,. 1-11, 2015.
[18] Sara del Río , Victoria López, José Manuel Benítez, Francisco Herrera, “On the use of MapReduce for imbalanced big data using Random Forest”, Information Sciences, Vol 285, pp 112–137, 2014.
[19] A. Yadav, V.K. Harit, "Fault Identification in Sub-Station by Using Neuro-Fuzzy Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.1-7, 2016
Citation
M.S. Saranya, N. Jayaveeran, "A Mapreduce Approach To Deal with Big Data Pre Processing And Classification Problems Based On Evolutionary Algorithms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.725-730, 2018.
Credibility of Genetic Algorithm (GA) for Power Efficient Routing and Reactive Protocols in MANET
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.731-734, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.731734
Abstract
Mobile ad hoc networks (MANETs) does not depend upon the access points or it is an infrastructure less network that connects multiple nodes. The structure of the mobile network may alter frequently and in expected way. In mobile ad-hoc network (MANET), due to mobility of nodes. Energy consumption of nodes is important problem in MANET. In such scenario, link breaks in mobile network, when the battery power of a node is depleted and it results to stops services. Efficient shortest distance paths from source node to destination node is another a critical design issue in mobile ad hoc networks. Genetic Algorithm (GAs) gives the best possible solution to such kind of problems. Genetic algorithm has been used successfully in different applications. Genetic Algorithm will be helpful to minimize the route multiple times when any failure happens during transmission.This paper is giving the brief survey of genetic algorithm in mobile ad-hoc network.
Key-Words / Index Term
Mobile Ad-hoc Network (MANET), Energy Efficient Routing Protocols, Reactive Protocol, Genetic Algorithm (GA).
References
[1]. E. Alotaibi and B.Mukherjee, “A survey on routing algorithms for wireless Ad-Hoc and mesh networks,”Computer Networks: The International Journal of Computer and Telecommunications Networking, vol.56, no.2, pp. 940–965, October 2011.
[2]. Anju Sharma, Madhavi Sinha, “A Differential Evaluation Algorithm For Routing Optimization In Mobile Ad Hoc Networks”, The Birla Institute Of Technology, Jaipur Mesra, Ranchi Campus Jaipur, Rajasthan, International Journal Of Computer Science And Network (IJCSN),Volume 1, Issue 4, Www.Ijcsn.Org ISSN 2277-5420,Pages 109-115, August 2012.
[3]. Gao, J., Shen, Y., Jiang, X., & Li, J. (2015). “Source Delay in Mobile Ad Hoc Networks”. Ad-hoc Networks, 24(Part A), 109–120.
[4]. T R Gopalakrishnan Nair, Kavitha Sooda & R Selvarani. (2014) “ A Qos Based Routing Approach Using Genetic Algorithms For Bandwidth Maximization In Networks ” International Journal of Artificial Intelligence and Soft Computing, Volume 4 Issue 1.
[5]. Anju Sharma, Madhavi sinha. ‘‘A Differential Evaluation Algorithm for routing Optimization in Mobile Ad-hoc networks’’ International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4, August 2015 www.ijcsn.org ISSN 2277-5420.
[6]. Sangeetha, K., Periasamy, P.S., Prakash, S.: Identification of network intrusion with efficient Genetic Algorithm using Bayesian classifier. In: International Conference on Computer Communication and Informatics (ICCCI), pp. 1–4 (2015)
[7]. Arun Biradar, Dr. Ravindra C. Thool, Performance Evaluation of Mobile Ad-hoc Networks Routing Protocols to Employ Genetic Algorithm, 3rd World Congress on Information and Communication Technologies (WICT 2013), 15-18 December 2013, Hanoi, Vietnam, IEEE.
[8]. Arun Biradar, Dr. Ravindra C. Thool, Reliable Genetic Algorithm Based Intelligent Routing for MANET,World Congress on Computer Applications and Information Systems, WCCAIS‘2014, Hammamet, January 17-19, 2014.
[9]. Shengxiang Yang, Member, IEEE, Hui Cheng, and Fang Wang, Member, IEEE, “Genetic Algorithms with Immigrants and Memory Schemes for Dynamic Shortest Path Routing Problems in Mobile Ad Hoc Networks”, in proc. IEEE transactions on systems, man, and cyberneticspart C: applications and reviews, vol. 40, no. 1, January 2010, pp. 52-63.
[10]. Rakesh K. 2012 Rakesh K. and Jyotishree, "Effect Of Polygamy With Selection In Genetic Algorithms", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Vol. 2, 2012.
[11]. Arun Biradar, Dr. Ravindra C. Thool, Performance Evaluation of Mobile Ad-hoc Networks Routing Protocols to Employ Genetic Algorithm, 3rd World Congress on Information and Communication Technologies (WICT 2013), 15-18 December 2013, Hanoi, Vietnam, IEEE.
[12]. Arun Biradar, Dr. Ravindra C. Thool, Reliable Genetic Algorithm Based Intelligent Routing for MANET,World Congress on Computer Applications and Information Systems, WCCAIS‘2014, Hammamet, January 17-19, 2014.
[13]. Thamilarasu, G.: Genetic algorithm based intrusion detection system for wireless body area networks. In: IEEE Symposium on Computers and Communication (ISCC), pp. 160–165 (2015).
[14]. Desale, K.S., Ade, R.: Genetic algorithm based feature selection approach for effective intrusion detection system. In: International Conference on Computer Communication and Informatics (ICCCI), pp. 1–6 (2015).
[15]. Arunraja, M., Malathi, V., Sakthivel, E.: Distributed energy efficient clustering algorithm for wireless sensor networks. J. Microelectron. Electron. Compon. Mater. 45(3), 180–187 (2015).
[16]. Kannammal, K., Purusothaman, T., Manjusha, M.: An efficient cluster based routing in wireless sensor networks. J. Theor. Appl. Inf. Technol. 59(3), 683–689 (2014).
[17]. Umesh Kumar Singh et.al, On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks, International Journal of Scientific Research in Computer Science & Engineering, Vol-3(1), PP (11-15) Feb 2015, E-ISSN: 2320-7639.
[18]. M. Bandyopadhyay et. all, “Emphasis on Genetic Algorithm (GA) Over Different PID Tuning Methods of Controlling Servo System Using MATLAB” , International Journal of Scientific Research in Computer Science & Engineering,Vol-1, Issue-3, PP (8-13) May- June 2013, ISSN: 2320-7639.
Citation
Juhi Aggarwal, Shelly, "Credibility of Genetic Algorithm (GA) for Power Efficient Routing and Reactive Protocols in MANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.731-734, 2018.
Encrypted Query Data Processing in Internet Of Things(IoTs) : CryptDB and Trusted DB
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.735-741, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.735741
Abstract
Internet of Things (IoT) consists of two merging technologies IoT and Cloud Computing is known as IoT. In the cloud, the large amount of data might be gathered by various IoT applications. Privacy and Security concerns on behalf of IoT are proven targets of great significance. Encrypted Query Processing is securely to protect data confidentiality as preserving confidentiality and performing a standard set of SQL queries in an accurate manner for IoT. In this paper, compare the CryptDB and TrustedDB encrypted query processing systems with the purpose of IoT data stores securely in the Cloud database. The performance of an encrypted databases CryptDB and TrustedDB are compared by using SQL queries from TPC-H benchmark. As a result of that TrustedDB is performed as more efficient and scalable to large datasets.
Key-Words / Index Term
Internet of Things, TrustedDB, CryptDB, Encrypted Query Processing, Homomorphic Encryption
References
[1]. Ken Eguro and Ramarathnam Venkatesan. FPGAs for trusted cloud computing. In 22nd International Conference on Field Programmable Logic and Applications (FPL), Oslo, Norway, pages 6370, 2012.
[2]. Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter FriessEU, Belgium, “Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems”, river publishers’ series in communications, 2013.
[3]. Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter FriessEU, Belgium, “Internet of Things–From Research and Innovation to Market Deployment”, river publishers’ series in communications, 2014.
[4]. https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/Technology/TechnologyRoadmap/InternetOfThings.pdf
[5]. Popa, R. A. (2014). Building practical systems that compute on encrypted data. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA.
[6]. R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases. In SIGMOD ’03, 2003.
[7]. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In SIGMOD ’04, 2004.
[8]. M. R. Asghar, G. Russello, B. Crispo, and M. Ion. Supporting complex queries and access policies for multi-user encrypted databases. In Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, CCSW ’13, pages 77–88, New York, NY, USA, 2013. ACM.
[9]. M. J. Atallah, K. B. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In CCS ’05, 2005.
[10]. A. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-preserving symmetric encryption. IACR Cryptology ePrint Archive, 2012.
[11]. V. Ciriani, S. De Capitani Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Keep a few: Outsourcing data while maintaining confidentiality. In Proceedings of the 14th European Conference on Research in Computer Security, ESORICS’09, pages 440–455, Berlin, Heidelberg, 2009. Springer-Verlag.
[12]. E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Key management for multi-user encrypted databases. In StorageSS ’05, 2005.
[13]. E. Damiani, S. D. C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS ’03, 2003.
[14]. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-enrcryption: Management of access control evolution on outsourced data. In VLDB, 2007.
[15]. H. Hacigümü¸s, B. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD ’02, 2002.
[16]. R. A. Popa and N. Zeldovich. Multi-key searchable encryption. IACR Cryptology ePrint Archive, 2013:508, 2013.
[17]. R. A. Poppa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: Proctecting confidentiality with encrypted query processing. In SOSP ’11, 2011.
[18]. D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In SP ’00, 2000.
[19]. Y. Yang, F. Bao, X. Ding, and R. H. Deng. Multiuser private queries over encrypted databases. Int. J. Appl. Cryptol., 1(4):309–319, Aug. 2009.
[20]. IBM 4764 PCI-X Cryptographic Coprocessor. Online at http://www-03.ibm.com/security/cryptocards/ pcixcc/overview.shtml, 2007.
[21]. IBM 4765 PCIe Cryptographic Coprocessor. Online at http://www-03.ibm.com/security/cryptocards/ pciecc/overview.shtml, 2010.
[22]. TPC-H Benchmark, http://www.tpc.org/tpch/, 2013.
Citation
G. Ambika, P. Srivaramangai, "Encrypted Query Data Processing in Internet Of Things(IoTs) : CryptDB and Trusted DB," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.735-741, 2018.
Finding Topic Experts in the Twitter dataset using LDA Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.742-746, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.742746
Abstract
Expert finding which aims to identifying people with the relevant expertise or practices on a given topic query. In blogging services like Twitter, the expert analysis problem has gained big attention in social media. Twitter is a new type of media giving a publicly available way for users to publish 140-character short messages (i.e., tweets). However, earlier systems cannot be directly applied to twitter expert finding difficulty. They generally rely on the supposition that all the documents linked with the candidate experts receive implicit knowledge related to the expertise of individuals. Whereas it might not be directly allied with their expertise, i.e., who is not an expert, but may publish/re-tweet a substantial amount of tweets including the topic words. Recently, several attempts use the relations among users and twitter list for expert finding. Nevertheless, these strategies only partly utilize such relationships. To address these issues generate a probabilistic method to jointly exploit three types of relations (i.e., follower relation, user-list relation and list-list relation) for finding experts. LDA algorithm is applied to finding topic experts. LDA is based upon the concept of searching for a linear combination of variables (predictors) that best separates two classes (targets). Semi-supervised Graph-based Ranking approach (SSGR) to offline measure the global authority of users. Then, online compute the local relevance between users and the given query. Then order all of the users & find top-N users with the highest ranking scores. Therefore, the proposed method can jointly exploit the different types of relations among users and lists for improving the precision of finding experts on a given topic on Twitter.
Key-Words / Index Term
Expert finding, Semi-supervised, Graph-based ranking approach, LDA, Sentiment Analysis, Hashtag, Twitter
References
[1] Wei Wei, Gao Cong, Chunyan Miao, Feida Zhu, and Guohui Li "Learning to Find Topic Experts in Twitter via Different Relations" IEEE transactions on knowledge and data engineering, vol.28, no 7, July 2016.
[2] S. Ghosh, N. Sharma, F. Benevenuto, N. Ganguly, and K. Gummadi, "Cognos: Crowdsourcing search for topic experts in microblogs," in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2012, pp. 575–590.
[3] J. Weng, E.-P. Lim, J. Jiang, and Q. He, “Twitterrank: Finding topic-sensitive influential Twitterers,” in Proc. ACM Int. Conf. Web Search Data Mining, 2010, pp. 261–270.
[4] A. Pal and S. Count, "Identifying topical authorities in microblogs," in Proc. ACM Int. Conf. Web Search Data Mining, 2011, pp. 45–54.
[5] Z. Zhao, L.-J. Zhang, X.-F. He, and W. Ng, "Expert finding for question answering via graph regularized matrix completion," IEEE Trans. Knowl. Data Eng., vol. 27, no. 4, pp. Retrieval, 2012, pp. 575–590.
[6] A. Pal and J. A. Konstan, “Expert identification in community question answering: Exploring question selection bias,” in Proc. ACM Conf. Inf. Knowl. Manag., 2010, pp. 1505–1508.
[7] X. Liu, W. B. Croft, and M. Koll, "Finding experts in community-based question-answering services," in Proc. ACM Conf. Inf. Knowl. Manag., 2005, pp. 315–316.
[8] W. Wei, B. Gao, T.-Y. Liu, T.-F. Wang, H.-G. Li and H. Li. "A ranking approach on a large-scale graph with multidimensional heterogeneous information," IEEE Trans. Cybern., vol. Pp, no. 99, pp. 1–15, Apr. 2015.
[9] G. Demartini, D. E. Difallah, and P. Cudr_e-Mauroux, "Zencrowd: Leveraging probabilistic reasoning and crowdsourcing techniques for large-scale entity linking," in Proc. 21st Int. Conf. World Wide Web, 2012, pp. 469–478.
[10] J. Lehmann, C. Castillo, M. Llamas, and E. Zuckerman, “Finding news curators in Twitter,” in Proc. Int. Conf. World Wide Web, 2013, pp. 469–478.
[11] K. Balog, L. Azzopardi, and M. De Rijke, “Formal models for expert finding in enterprise corpora,” in Proc. 29th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2006, pp. 4
[12] A. Pal and J. A. Konstan, “Co-occurrence-based diffusion for expert search on the web,” IEEE Trans. Knowl. Data Eng., vol. 25, no. 5, pp. 1001–1014, May 2013.
[13] M. David and A. Andrew, "Expertise modeling for matching papers with reviewers," in Proc. ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2007, pp. 500–509.
[14] H. Deng, I. King, and M.-R. Lyu, "Formal models for an expert finding on DBLP bibliography data," in Proc. Int. Conf. Data Mining, 2008, pp. 163–172.
[15] P. Serdyukov, H. Rode, and D. Hiemstra, “Modelling multi-step relevance propagation for expert finding,” in Proc. ACM Conf. Inf. Knowl. Manag., 2008, pp. 1133–1142.
Citation
Ashwini Anandrao Shirolkar, R. J. Deshmukh, "Finding Topic Experts in the Twitter dataset using LDA Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.742-746, 2018.
Rural Electrification Using Gram Jyoti Doot, Mobile, And Web-Based Application
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.747-751, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.747751
Abstract
‘Pradhan Mantri Sahaj Bijli Har Ghar Yojana’ – Saubhagya is a Government Scheme to achieve 100% household electrification in the country in rural as well as urban areas by 31st March 2019. GramJyotiDoot, developed in collaboration with Jammu and Kashmir Power Development Department (JKPDD)is a well-organized and consistent approach to support Saubhagya. GramJyotiDoot comprises an android application and web-portals for Junior Engineers (JEs) and Assistant Executive Engineers (AEEs). The objective of GramJyotiDoot is to eliminate the cumbersome procedure of filing the documents for obtaining a new electricity connection and making the procedure simple by going digital. This expedites the process of registration of new connections and electrification of unelectrified households. The new connections in the rural areas of Jammu and Kashmir are being released using GramJyotiDoot.
Key-Words / Index Term
Rural Electrification, Saubhagya, Android Application, Junior Engineer, Assistant Executive Engineer, Electricity, Electric Connection, Electricity, Digital Connections
References
[1] V.P. Balpande, L. Lende, R. Raut, R. Deshpande, S. Thakur, S. Majarkhede, "Survey on Android Base Smart City Nagpur App," International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.67-69, 2018.
[2] R.K. Verma, R. Mishra, S. Prajapat, "Information Sharing Portal for Indus Sub-systems," International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.46-55, 2017.
[3] C.B. Pinkerton, E.D. Lazowska, D. Notkin, J. Zahorjan, "A heterogeneous distributed file system," Distributed Computing Systems 1990. Proceedings. 10th International Conference on, pp. 424-431, 1990.
[4] Kodge B. G., "Information Security: A Review on Steganography with Cryptography for Secured Data Transaction," International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017
[5] Jan Kybic, Claudia Nieuwenhuis, "Bootstrap optical flow confidence and an uncertainty measure," Computer Vision and Image Understanding, Vol. 115, pp. 1449, 2011.
Citation
Bhawna Sharma, Akshay Sharma, Akash Rajput, Parnika Gupta, Rohit Dhiman, Sheetal Gandotra, "Rural Electrification Using Gram Jyoti Doot, Mobile, And Web-Based Application," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.747-751, 2018.
A New Unequal Clustering Method for Energy Efficient Computation in WSN Using Cuckoo Search Based Particle Swarm Optimization (CBPSO)
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.752-756, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.752756
Abstract
There have been recent advances in micro-electro-mechanical systems (MEMS) technology, wireless communications, and digital electronics. These advances have enabled the development to low-cost, low-power, multi-functional sensor nodes that are small in size and communicate with each other using radio frequencies. They have limited processing capabilities, transmission range, and most importantly available energy. For load balancing and efficient data collection in the network, clustering is used. Sensors in each cluster send the data to their corresponding cluster heads. The cluster head performs data aggregation and transmission of the aggregated data to the base station. This paper proposes a methodology to achieve load balancing & cluster head selection using cuckoo search algorithm and cluster formation is done using particle swarm optimization algorithm in anticipation of minimizing energy consumption and network lifetime.
Key-Words / Index Term
Wireless Sensor Network, Unequale Clustering, Cuckoo Search, Particle Swarm Optimization
References
[1] I.F. Akyildiz, W. Su, Sankar Y. Subramaniam, and E. Cayirci, 2002. Wireless sensor networks: a survey. Comput. Netw 38: 393–422.
[2] O. Younis, M. Krunz, and Ramasubramanian, S. 2006. Node clustering in wireless sensor networks: recent developments and deployment challenges. IEEE Network 20:20–25.
[3] J. Ibriq, and Mahgoub, I.,2004, Cluster-based routing in wireless sensor networks: issues and challenges. In Proceedings of the 2004 Symposium on Performance Evaluation of Computer Telecommunication Systems (SPECTS).
[4] O. Younis, and S. Fahmy, 2004. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks: IEEE Transactions on Mobile Computing 3:660–669.
[5] W.B Heintzelman, A.P Chandrakasan, and H Balakrishnan, 2002, An application-specific protocol architecture for wireless microsensor networks: IEEE Transactions on Wireless Communications 1:660–670.
[6] A. Mangeshkar, and D. P. Agrawal, 2001, TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks. Parallel and Distributed Processing Symposium held at USA during April 23-27,2001, pp.2009-2015.
[7] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power Efficient Gathering in Sensor Information Systems”, in Proc. of IEEE Aerospace Conference, 2002.
[8]. X. Yang and S. Deb, "Cuckoo Search via Levy flights”, World Congress on Nature & Biologically Inspired Computing (NaBIC), PP.210-214, DEC.2009
[9]. S. Kumar E, G.P. Mohanraj, R. R. Goudar, "Clustering approach for Wireless Sensor Networks based on Cuckoo Search Strategy”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 6, June 2014
[10]. M. Dhivya and M. Sundaram Bal, “Cuckoo Search for data gathering in Wireless Sensor Networks", Int. Int. J. Communications, Network and System Sciences”, 2011, 4, 249-255
[11] P. Kuila, S.K. Gupta, and P. K. Jana, ,2013, A novel evolutionary approach for load balanced clustering problem for wireless sensor networks. Swarm and Evolutionary Computation 12: 48–56.
[12] K. K Chand, P V Bharati and B. S Ramanjaneyulu.,” Optimized Energy Efficient Routing Protocol for Life-Time Improvement in Wireless Sensor Networks” IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012.
[13] N. M. A. Latiff, C. C. Tsimenidis, and B. S. Sharif, “Performance comparison of optimization algorithms for clustering in wireless sensor networks,” in Proc. IEEE Int. Conf. Mobile Ad Hoc Sens. Syst., Oct. 8–11, 2007, pp. 1–4.
[14] Y. del Valle, G. K. Venayagamoorthy, S. Mohagheghi, J. C. Hernandez, and R. Harley, “Particle swarm optimization: Basic concepts, variants and applications in power systems,” IEEE Trans. Evol. Comput., vol. 12, no. 2, pp. 171–195, Apr. 2008
[15 ] R. Kulkarni and G. Venayagamoorthy, “Particle swarm optimization in wireless-sensor networks: A brief survey,” IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 41, no. 2, pp. 262–267, Mar. 2011.
[16] N. Latiff, C. Tsimenidis, and B. Sharif, “Energy-aware clustering for wireless sensor networks using particle swarm optimization,” in IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMR C’07), Sep. 2007, pp. 1–5.
Citation
K. Sharma, N. Chaudhary, "A New Unequal Clustering Method for Energy Efficient Computation in WSN Using Cuckoo Search Based Particle Swarm Optimization (CBPSO)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.752-756, 2018.