A Survey of Wireless Communication Technologies in Internet of Things
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.823-826, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.823826
Abstract
The main Motive of Internet of Things is to segregate everything in our world under a common controlled environment that will give us control of day to day life things, as well as providing us status updates of the things. In Accordance with this, Effective implementation of Internet of Things is completely depends upon Technologies and protocols incorporated to communicate between electronic devices and its controlling circuitry. This paper Introduces about basic standards and parameters of the various Communication technologies inculcated in Internet of Things. In this paper, we illustrated the survey of key technologies involved in the implementation of Internet of Things along with the wide application area where the Internet of Things will have major role. We also discussed about detailed comparison of different parameters of various wireless Communication technologies.
Key-Words / Index Term
Internet of Things, Communication Technologies, Comparison
References
[1] Jasper Tan ; Simon G.M. Koo ,” A Survey of Technologies in Internet of Things” 2014 IEEE International Conference on Distributed Computing in Sensor Systems
[2] Sajjad Hussain Shah ; Ilyas Yaqoob,” A survey: Internet of Things (IOT) technologies, applications and challenges”, 2016 IEEE Smart Energy Grid Engineering (SEGE)
[3] Shayan Nalbandian,” A survey on Internet of Things: Applications and challenges”, 2015 International Congress on Technology, Communication and Knowledge (ICTCK)
[4] Ala Al-Fuqaha ; Mohsen Guizani ; Mehdi Mohammadi ; Mohammed Aledhari ; Moussa Ayyash,” Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications”, IEEE Communications Surveys & Tutorials ( Volume: 17, Issue: 4, Fourthquarter 2015 )
[5] R. Porkodi ; V. Bhuvaneswari,” The Internet of Things (IoT) Applications and Communication Enabling Technology Standards: An Overview”, 2014 International Conference on Intelligent Computing Applications
[6] Somayya Madakam, R. Ramaswamy, Siddharth Tripathi,” Internet of Things (IoT): A Literature Review”, Journal of Computer and Communications, 2015, 3, 164-173
[7] Luigi Atzori , Antonio Iera , Giacomo Morabito,” The Internet of Things: A survey” Elsevier Computer networks journal, Computer Networks 54 (2010) 2787–2805
Citation
M. Avatade, M. Lal, A. Jain, "A Survey of Wireless Communication Technologies in Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.823-826, 2018.
Forecasting Energy Consumption of a House using Radial Basis Function Network
Review Paper | Journal Paper
Vol.6 , Issue.8 , pp.827-830, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.827830
Abstract
Electrical energy is used throughout the globe to power devices, appliances, and strategies of transportation used in everyday life. The uses of electricity are Residential uses, industrial uses, and Transportation. This paper targeted on Forecasting Energy Consumption of a House using historical information. The proposed work uses the Radial Basis Function (RBF) Network for forecasting the demand for energy consumption of a house using historical data. The result showed that the Radial Basis Function Network performs better than FeedForward BackPropagation Network (FFBPN), and Elman BackPropagation Network (EBPN) were compared with Mean Square Error (MSE) and accuracy values.
Key-Words / Index Term
Radial Basis Function, Neural Network, FeedForward BackPropagation Network, Elman BackPropagation Network, RBF
References
[1] Shiwei Yu, Ke Wang, Yi-Ming Wei “A hybrid self-adaptive Particle Swarm Optimization–Genetic Algorithm–Radial Basis Function model for annual electricity demand prediction”, Energy Conversion and Management,Volume 91, February 2015, Pages 176-185.
[2] Pedro M. Ferreira, António E. Ruano, Rui Pestana, “Improving the Identification of RBF Predictive Models to Forecast the Portuguese Electricity Consumption”, IFAC Proceedings Volumes, Volume 43, Issue 1, 2010, Pages 208-213.
[3] Mohanad S. Al-Musaylh, Ravinesh C. Deo, Jan F. Adamowski, Yan Li, “Short-term electricity demand forecasting with MARS, SVR and ARIMA models using aggregated demand data in Queensland, Australia”, Advanced Engineering Informatics, Volume 35, January 2018, Pages 1-16.
[4] Changhao Xia, Jian Wang, Karen McMenemy, “Short, medium and long term load forecasting model and virtual load forecasterbased on radial basis function neural networks”, International Journal of Electrical Power & Energy Systems, Volume 32, Issue 7, September 2010, Pages 743-750.
[5] Javeed Nizami, S. S. A. K., and A.Z. Al-Garni, “Forecasting electric energy consumption using neural networks,” Energy Policy, vol.23, iss. 12, pp. 1097–1104, Dec. 1995.
[6] Juan Vilar,Germán Aneiros, Paula Rana, “ Prediction intervals for Electricity demand and price using functional data”, International Journal of Electrical Power & Energy Systems, Volume 96, March 2018, Pages 457-472.
[7] Sukumar Mishra, Vivek Kumar Singh, “ Monthly Energy Consumption Forecasting Based on Windowed Momentum Neural Network”, IFAC- PapersOnline, Volume 48, Issue 2015.
[8] Pedro M. Ferreira, António E. Ruano, Rui Pestana, Laszlo T. Koczy, “Evolving RBF Predictive Models to Forecast the Portuguese Electricity Consumption”, IFAC Proceedings Volumes, Volume 42, Issue 19, 2009, Pages 414-419.
[9] Antonino Marvuglia, Antonio Messineo, “Using Recurrent Artificial Neural Networks to Forecast Household Electricity Consumption”, Energy Procedia, Volume 14,2012, Pages 45-55.
[10] Aowabin Rahman, Vivek Srikumar, Amanda D. Smith, “Predicting Electricity consumption for commercial and residential buildings using deep recurrent neural networks”, Applied Energy, Volume 212, 15 February 2018, Pages 372-385.
[11] A. S. Ahmad, M. Y. Hassan, M. P. Abdullah, H. A. Rahman, R. Saidur, “A review on applications of ANN and SVM for building electrical energy consumption forecasting”, Renewable and Sustainable Energy Reviews, Volume 33, May 2014,Pages 102-109
[12] Zuzana Majdisova, Vaclav Skala, “Radial Basis Function approximations: comparison and applications”, Applied Mathematical Modelling,Volume 51, November 2017, Pages 728-743
[13] L. G. B. Ruiz, R. Rueda, M. P. Cuéllar, M. C. Pegalajar, “Energy consumption forecasting based on Elman neural networks with evolutive optimization”, Expert Systems with Applications, Volume 92, February 2018, Pages 380-389.
[14] Michal Smolik, Vaclav Skala, Zuzana Majdisova, “Vector field radial basis function approximation”, Advances in Engineering Software,Volume 123, September 2018, Pages 117-129.
[15] Radiša Z. Jovanović, Aleksandra A. Sretenovic, Branislav D. Zivkovic, “Ensemble of various neural networks for prediction of heating energy consumption”, Energy and Buildings, Volume 94, 1 May 2015, Pages 189-199.
[16] Kunlong Chen, Jiuchun Jiang, Fangdan Zheng, Kunjin Chen, “A novel data-driven approach for residential electricity consumption prediction based on ensemble learning”, Energy, Volume 150,1 May 2018, Pages 49-60.
[17] Jihui Yuan, Craig Farnham, Chikako Azuma, Kazuo Emura, “Predictive artificial neural network models to forecast the seasonal hourly electricity consumption for a University Campus”, Sustainable Cities and Society, Volume 42, October 2018, Pages 82-92.
[18] V.O. Oladokun, A.T. Adebanjo, and O.E. Charles-Owaba, “Predicting students’ academic performance using artificial neural network:A case study of an engineering course,” Pacific Journal of Science and Technology, vol. 9, iss. 1, pp. 72-79, 2008.
[19] K. P. Amber, R. Ahmad, M. W. Aslam, A. Kousar, M. S. Khan, “Intelligent techniques for forecasting electricity consumption of buildings”, Energy, Volume 157, 15 August 2018, Pages 886-893.
[20] O.L. Usman, O.B. Alaba, “Predicting Electricity Consumption using Radial Basis Function Network”, International Journal of Computer Science and Artificial Intelligence, June 2014, Vol.4 Iss.2,PP.54-62.
Citation
N. Saranya, B.S.E. Zoraida, "Forecasting Energy Consumption of a House using Radial Basis Function Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.827-830, 2018.
A Survey on Facial Age Estimation Techniques
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.831-834, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.831834
Abstract
Age Estimation is predicting a person’s age and is a very important attribute used for identity authentication. One of the major factors affecting the age estimation result is the identification of features of a person’s face accurately. Age Estimation has several real-world applications, equivalent to security management, biometrics, client relationship management, recreation, and cosmetology. The foremost ordinarily used age estimation technique is regression based mostly as a result of it takes into consideration the interrelationship among the age values for face pictures. The current work is an overview of techniques employed previously for age estimation.
Key-Words / Index Term
Age Estimation, Forensics, Age based retrieval, Security, Surveillance, Label based learning, Label Distribution based learning
References
[1] Z.Hu and Y.Wen, Facial Age Estimation with Age Difference, IEEE TRANSACTIONS ON IMAGE PROCESSING,2016
[2] Z.A. Othman and D.A. Adnan, Age Classification from Facial Images System, International Journal of Computer Science and Mobile Computing,2014.
[3] V.G. Khetade and S. B. Thakare, An Efficient Method for Human Age Estimation by Label Distribution Learning,2014
[4] Karthikeyan D and Balakrishnan G, A comprehensive age estimation on face images using hybrid filter based feature extraction., Biomedical Research 2018.
[5] A.Sharma and S.Chhabra, A Hybrid Feature Extraction Technique for Face Recognition, International Journal of Advanced Research in Computer Science and Software Engineering,2017.
[6] Geng X, Yin C & Zhou ZH.” Facial age estimation by learning from label distributions.”, IEEE Trans Pattern Anal Mach Intell. 2013 Oct;35(10):2401-12. doi: 10.1109/TPAMI.2013.51.
[7] S.Soman and A.Austine, A Survey on Age Estimation Techniques, International Journal of Computer Applications ,2017.
[8] Shara M. S. and Shemitha P. A. A Survey on Facial Age Estimation Based on Multiple CNN , International Journal for Scientific Research & Development,2017.
[9] S.Soman & A.Austine,” A Survey on Age Estimation Techniques”, International Journal of Computer Applications, Volume 161 - Number 4,2017
[10] Xin Geng, Label Distribution Learning, IEEE TRANSACTIONS,2014
[11] W.Shen, K.Zhao, Y.Guo,and A.Yuille, Label Distribution Learning Forests, 31st Conference on Neural Information Processing Systems (NIPS 2017).
[12] G. Tsoumakas, M.-L. Zhang, and Z.-H. Zhou, “Tutorial on learning from multi-label data,” in European Conf. Machine Learning and Principles and Practice of Knowledge Discovery in Databases, Bled, Slovenia, 2009.
[13] G. Tsoumakas and I. Katakis, “Multi-label classification: An overview,” Int’l Journal of Data Warehousing and Mining, vol. 3, no. 3, pp. 1–13, 2007.
[14] E. Hullermeier, J. F ¨ urnkranz, W. Cheng, and K. Brinker, “Label ranking ¨ by learning pairwise preferences,” Artif. Intell., vol. 172, no. 16-17, pp. 1897–1916, 2008
[15] P. Li, H. Li, and M. Wu, “Multi-label ensemble based on variable pairwise constraint projection,” Information Sciences, vol. 222, pp. 269– 281, 2013.
[16] J. Read, B. Pfahringer, G. Holmes, and E. Frank, “Classifier chains for multi-label classification,” Machine Learning, vol. 85, no. 3, pp. 333– 359, 2011.
[17] X. Geng, K. Smith-Miles, and Z. Zhou. Facial age estimation by learning from label distributions. In Proc. AAAI, 2010.
[18] A. L. Berger, S. D. Pietra, and V. J. D. Pietra. A maximum entropy approach to natural language processing. Computational Linguistics, 22(1):39–71, 1996.
[19] X. Geng, K. Smith-Miles, and Z. Zhou. Facial age estimation by learning from label distributions. In Proc. AAAI, 2010.
[20] X. Geng, C. Yin, and Z. Zhou. Facial age estimation by learning from label distributions. IEEE Trans. Pattern Anal. Mach. Intell., 35(10):2401–2412, 2013.
[21] X. Yang, X. Geng, and D. Zhou. Sparsity conditional energy label distribution learning for age estimation. In Proc. IJCAI, pages 2259–2265, 2016.
[22] X. Geng. Label distribution learning. IEEE Trans. Knowl. Data Eng., 28(7):1734–1748, 2016.
[23] X. Geng and P. Hou. Pre-release prediction of crowd opinion on movies by label distribution learning. In Pro. IJCAI, pages 3511–3517, 2015.
[24] C. Xing, X. Geng, and H. Xue. Logistic boosting regression for label distribution learning. In Proc. CVPR, pages 4489–4497, 2016.
[25] R.K.Shukla, A.Agarwal & A.K.Malviya,” An Introduction of Face Recognition and Face Detection for Blurred and Noisy Images”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.39-43 , June (2018).
[26] A. S.Banu, P.Vasuki, S. M.M.Roomi & A. Y.Khan,” SAR Image Classification by Wavelet Transform and Euclidean Distance with Shanon Index Measurement”, Journal (IJSRNSC) Vol.6 , Issue.3 , pp.13-17, Jun-2018.
Citation
Vishnu Prasad Verma, Dipti Verma, "A Survey on Facial Age Estimation Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.831-834, 2018.
Installation of Hadoop on Windows
Review Paper | Journal Paper
Vol.6 , Issue.8 , pp.835-839, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.835839
Abstract
Technology brings a rapid growth of data. It becomes a challenge to process data with previous methods and applications. The unstructured, scalable, complex data is available through distinct sources like social sites, news, applications and so on. Hadoop is a most demanding development tool for big data because it processes the data in the structured and unstructured form. When you think about Hadoop usually it comes into mind regarding Linux. It is not mandatory for all to learn Linux first and then install Hadoop on a system and then use it. There is an advantage of Linux that it provides basic production and development platform for Hadoop. This paper reflects the light on the variety of platforms, open source systems available for Hadoop installation. Now Hadoop is not only limited to the Linux platform, you can put it on Windows too. Windows is user-friendly and you can install Hadoop without Linux on another hand there are enormous resources by which you can easily go into the Linux environment and place Hadoop. Java is a prerequisite of Hadoop.
Key-Words / Index Term
Powershell, Hyper-V, Dual Booting, Virtual Machine, Cygwin
References
[1] https://www.cio.com/article/3195905/windows/18-things-you-should-know-about-using-linux-tools-in-windows-10.html
[2] Shantanu Sharma “Installing Hadoop-2.6.x on Windows 10” University of California, Irvin.
[3] “Introduction to Hyper-V on Windows 10” Microsoft Documents, United States Feb 05,2016. https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windowsv
[4] S. Prasad “Hadoop Installation” https://www.it.iitb.ac.in/frg /wki/images/a/af/03D05011_Sandeep_Prasad_Group_7_Week_3_Report_1_Hadoop_Installation.pdf
[5] N.S. Hoe, C. Charles “User Guide to using the Linux Desktop”, UNDP-APDIP, Kuala Lumpur, Malaysia,2004
[6] Y. Bassil,” Windows and Linux Operating System from a Security Perspective”, Journal of Global Research in Computer Science.
[7] N.Economides, E.Katsamakas,”Linux vs. Windows: A comparison of Applications and platform Innovation Incentives for Open Source and Proprietary Software Platform ”Elsevier pp.207-218, 2006.
[8] K. Parimala G. Rajkumar , A. Ruba , S. Vijayalakshmi, , “Challenges and Opportunities with Big Data ”, International Journal of Scientific Research in Computer Science and Engineering. pp:16-20, 2017
[9] A.Tanuja, D. Swetha Swatha, “Processing and Analyzing Big Data using Hadoop” International Journal off Computer Science & Engineering, pp: 91-94, April,2016.
Citation
A.K. Chela, H.S. Sidhu, "Installation of Hadoop on Windows," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.835-839, 2018.
A Case Study on Neo-Wave Cinema Based on Feminism
Review Paper | Journal Paper
Vol.6 , Issue.8 , pp.840-842, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.840842
Abstract
The aim of the research paper is to study about the portrayal of women in cinema. Also, it aimed to analyse the changing mind set of the young budding directors from the cinema industry. The emerging directors of our current film industry are very well aware of the portrayal of women which makes them to form a well-scripted for their film story. In this research, these young directors of cinema industry with a feministic approach in their movies are interviewed and analysed for the research. The social issues faced by women in both psychological and physical aspect is been brought to limelight and bravely disclosed in their films. The main films which are been discussed for this research are IRAIVI, THARAMANI and ARUVI which is been released in the year of 2016, 2017 and 2018 consecutively. These directors are been categorised under neo wave film making directors of cinema industry where they portray a favourable opinion regarding the strong characterisation of women and their struggle against gender bias. Henceforth these types of films had created a reflection of rational thoughts among the viewers and audiences to understand the present scenario of social issues against women prevailing in the authoritarian society. This research tries to provide awareness for the future budding directors about the importance of social touch in a movie in connection with the entertainment in the whole form as infotainment.
Key-Words / Index Term
Neo-Wave Films, Feminist thoughts, Gender Bias, catharsis effect, Infotainment, Tamil film industry, Script
References
[1] Keval J. Kumar, “Mass Communication in India”, Jaico and publications, Revised edition 2, New Delhi 2010.
[2] Geoffrey nowell-smith,“The story of film”. pavilion new edition November 1, 2013.
[3] David Bordwell, Kristin Thompson, “Minding Movies Observations on the Art, Craft, and Business of Filmmaking”, häftad, 2011
[4] David Bordwell and Kristin Thompson, “Film Art : An Introduction”, New York: McGraw-Hill, 9th Edition 2010
[5] Giannetti, Louis D., “Understanding Movies, Upper Saddle River”, N.J.: Pearson/Prentice Hall, 11th Edition 2008.
[6] Joseph M. Boggs and Dennis W. Petrie, “The Art Of Watching Films”, New York: McGraw-Hill, 7th Edition 2008.
[7]Alexandra, “Film Studies: Women in Contemporary World Cinema”Framing Film), Peter Lang International Academic Publishers, 2002
[8]Lalitha Gopalan, “Cinema of Interruptions: Action Genres in contemporary Indian Cinema”, British Film Institute , 2002.
[9] Eve Light Honthaner,“The Complete Film Production Handbook (American Film Market Presents)”, 4th Edition, March 2014,
[10] McQueen, D. Television, “A Media Student’s Guide”. London: Arnold. 1998
[11] Arthur Asa Berger. “Media and Communication Research Methods: An Introduction to Qualitative and Quantitative Approaches”, Sage Publication, New Delhi, 2000.
Citation
Anthony Kimton Prabhu, "A Case Study on Neo-Wave Cinema Based on Feminism," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.840-842, 2018.
Discovery of High Utility Patterns from Retail Database with adding constraints on LBHUP algorithm
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.843-846, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.843846
Abstract
Association-rule mining is commonly used mining technique for finding frequent patterns. In real world applications traditional association-rule mining is not appropriate since the purchased item have different factors, for example, amount and benefit. High utility pattern mining was used for unravelling the limitations of the association-rule mining as far as amount and benefit. There are algorithms for finding high utility patterns from static databases. Some researches worked for handling dynamic dataset but huge computational time and multiple database scan was required. In this paper, a system is proposed for finding high utility patterns which uses list based data structure for dynamic dataset. To improve computational time and memory, constraints like item, date or length are used. A few experiments are led to demonstrate the execution of the proposed system with and without using constraints regarding time and memory.
Key-Words / Index Term
Association rules (ARs); Association rule mining; frequent patterns; high utility patterns; pattern mining
References
[1] M. Liu , J.-F. Qu , “Mining high utility itemsets without candidate generation”, in: International Conference on Information and Knowledge Management (CIKM 2012), 2012, pp. 55–64.
[2] J.C.-W. Lin , T. Li , P. Fournier-Viger , T.-P. Hong , J. Zhan , M. Voznak , “An efficient algorithm to mine high average-utility itemsets”, Adv. Eng. Inform. 30 (2) (2016) 233–243.
[3] J. Liu , K. Wang , B.C.M. Fung , “Mining high utility patterns in one phase without generating candidates”, IEEE Trans. Knowl. Data Eng. 28 (5) (2016) 1245–1257 .
[4] J. Liu , K. Wang , B.C.M. Fung , “Direct discovery of high utility itemsets without candidate generation”, in: Proceedings of the 2012 IEEE International Conference on Data Mining (ICDM 2012), 2012, pp. 984–989.
[5] L. Troiano , G. Scibelli , “Mining frequent itemsets in data streams within a time horizon”, Data Knowl. Eng. 89 (2014) 21–37.
[6] C.F. Ahmed , S.K. Tanbeer , B.-S. Jeong , H.-J. Choi , “Interactive mining of high utility patterns over data streams”, Expert Syst. Appl. 39 (15) (2012) 11979–11991.
[7] V.S. Tseng , C.-W. Wu , P. Fournier-Viger , P.S. Yu , “Efficient algorithms for mining the concise and lossless representation of high utility itemsets”, IEEE Trans. Knowl. Data Eng. 27 (3) (2015) 726–739.
[8] J. Sahoo , A.K. Das , A. Goswami , “An efficient approach for mining association rules from high utility itemsets”, Expert Syst. Appl. 42 (13) (2015) 5754–5778.
[9] U. Yun , D. Kim , H. Ryang , G. Lee , K.-M. Lee , “Mining recent high average utility patterns based on sliding window from stream data”, J. Intell. Fuzzy Syst. 30 (6) (2016) 3605–3617.
[10] C.-W. Lin , G.-C. Lan , T.-P. Hong , “Mining high utility itemsets for transaction deletion in a dynamic database”, Intell. Data Anal. 19 (1)(2015) 43–55.
[11] H. Ryang , U. Yun , K. Ryu , “Fast algorithm for high utility pattern mining with the sum of item quantities”, Intell. Data Anal. 20 (2) (2016) 395–415.
[12] U. Yun , D. Kim , H. Ryang , G. Lee , K.-M. Lee , “Mining recent high average utility patterns based on sliding window from stream data”, J. Intell. Fuzzy Syst. 30 (6) (2016) 3605–3617.
[13] R. Agrawal , R. Srikant , “Fast algorithms for mining association rules”, in: Proceedings of the 20th International Conference on Very Large Data Bases (VLDB 1994), 1994, pp. 487–499.
Citation
A. G. Deshpande, R. J. Deshmukh, "Discovery of High Utility Patterns from Retail Database with adding constraints on LBHUP algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.843-846, 2018.
Foggy Video Restoration Using Guided Filter
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.847-852, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.847852
Abstract
When videos are captured under the influence of atmospheric or climatic conditions, the overall quality of the image gets effected with fog and haze. This work focuses on haze removal which is also called as the visibility restoration which can infer to the various procedures employed for removing or reducing degradation from the image. Degradation in image can be due to various reasons such as miss-focus, relative atmospheric conditions and object-camera motion. This paper presents a method in which the fog in video can be removed by using dark channel method followed by Guided filtering. Guided filter has better filtering capability, fast running time and gives a clear haze free video. So, we can say that this method can be employed in real-life settings or video applications. Restoration of hazy videos is important in computer graphics, remote sensing and outdoor surveillance.
Key-Words / Index Term
Guided filter, dark channel method, Transmission map, Video Restoration
References
[1]. Kaiming He, Jian Sun and Xiaoou Tang,” Single image haze removal using Dark Channel Prior,” IEEE Transactions on Pattern analysis and Machine intelligence, Vol. 33, No. 12, December 2011.
[2]. Md. Imtiyaz Anwar , Arun Khosla ”Vision enhancement through single image fog removal” Engineering Science and technology.
[3]. R. R. Tan, “visibility in bad weather from a single image,” IEEE Conference on CVPR, 2008.
[4]. R. Fattal, “Single Image Dehazing,” SIGGRAPH, 2008.
[5]. Narasimhan, Srinivasa G. and Shree K. Nayar, "Chromatic framework for vision in bad weather", The Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 598-605, 2000.
[6]. Z. Tao, S. Changyan1 & W. Xinnian1, “Atmospheric scattering-based multiple images fog removal,”4th International Congress on Image and Signal Processing, 2011.
[7]. Schechner, Yoav Y., Srinivasa G. Narasimhan and Shree K. Nayar, "Instant dehazing of images using polarization", The Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition ( CVPR), vol. 1, pp. I-325, 2001.
[8]. Shwartz, Sarit, Einav Namer and Yoav Y. Schechner, "Blind haze separation", IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2, pp. 1984-1991, 2006.
[9]. T.Veeranjaneyulu, N H Sankaramurthy, Ravi Prasad Kini, A.Prasanna Kumar & Sibsambhu Kar” A Fast Method of Fog and Haze Removal” ICASSP , 2016.
[10]. N Hautière, JP Tarel, J Lavenant, D Aubert, Automatic fog detection and estimation of visibility distance through use of onboard camera. Mach. Vis.Appl. 17(1), 8–20 (2006)
[11]. K. He, J. Sun, and X. Tang, “Guided image filtering,” in Proc. Europ. Conf. on Comp. Vis., Sep. 2010.
[12]. Ritesh Tiwari and Anil Khandelwal “ Fog Removal Technique with Improved Quality through FFT”DOI: 10.23883/IJRTER.2017.3395.FNOIR
Citation
Mounika Kanala, Shaik Taj Mahaboob, "Foggy Video Restoration Using Guided Filter," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.847-852, 2018.
Psychological Stress Detection from Social Media Data using a Novel Hybrid Model
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.853-862, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.853862
Abstract
Psychological stress is a biggest threat to human’s health. Hence, it is vital to detect and manage stress before it turns into severe problem. However, conventional stress detection strategies rely on psychological scales and physiological devices, which require active individual participation making it labor-consuming and expensive. With the rapid evolution of social media networks, people are willing to sharetheir everyday events and moods via social media platforms, making it practicable to leverage this online social media content for stress detection as these data timely reflect user’s real-life emotional state. To automatically predict stress, we have defined a set of stress-related textual ‘F = {f1, f2, f3, f4}’, visual ‘vF = {vf1, vf2}’, and social ‘sf’ features, and thenproposed a hybrid model Psychological Stress Detection (PSD) - a Probabilistic Naïve Bayes Classifier combined with Visual (Hue, Saturation, Value) and Social modules,to leverage text, image and social interaction information for stress detection from social media contentExperimental results show that the proposed PSD model improves the detection performance,when compared to TensiStrength and Teenchat frameworkPSD achieves 95% of Precision rate. PSD model would be useful in developing stress detection tools for mental health agencies and individuals.
Key-Words / Index Term
Psychological Stress Detection; Social Media interaction; Health agencies; Physiological Signals
References
[1] J. Herbert, “Fortnightly review: Stress, the brain, and mental illness”, British Medical J., pp. 530–535, Vol. 315, No. 7107, 1997.
[2] Liew, and Jasy Suet Yan, “fine-grained emotion detection in microblog text”, Dissertations – ALL. pp 440, 2016.
[3] F.-T. Sun, C. Kuo, H.-T. Cheng, S. Buthpitiya, P. Collins, and M. L. Griss, “Activity-Aware Mental Stress Detection Using Physiological Sensors”, In Proc. Of Intl. Conf. on Mobile Computing, Application, and Services (MobiCASE), Santa Clara, CA, 2010.
[4] Chaffey, D. (2016). “Global social media research summary 2016.” Retrived in June 15th 2016 from http://www.smartinsights.com/social-mediamarketing/social-media-strategy/new-global-social-mediaresearch.
[5] H. Kurniawan, A.V. Maslov, and M. Pechenizkiy, “Stress detection from speech and galvanic skin response signals”, in: Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, pp. 209–214, 2013.
[6] V.P. Patil, K.K. Nayak, and M. Saxena, “Voice stress detection”, Int. J. Electr. Electron. Comput. Eng., pp. 148–154, 2013.
[7] S. Greene, H. Thapliyal, and A. C. Holt, “A survey of affective computing for stress detection: Evaluating technologies in stress detection for better health”, IEEE Consum. Electron. Mag., Vol. 5, No. 4, pp. 44–56, 2016.
[8] K. Lee, A. Agrawal, and A. Choudhary, “Real-time disease surveillance using twitter data: Demonstration on FLU and cancer”, in Proc. ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, pp. 1474–1477, 2013.
[9] Sztajzel, “Heart rate variability: a noninvasive electrocardiographic method to measure the autonomic nervous system”, Swiss Med. Weekly, pp. 514–522, 2004.
[10] L. Nie, Y.-L. Zhao, M. Akbari, J. Shen, and T.-S. Chua, “Bridging the vocabulary gap between health seekers and healthcare knowledge”, IEEE Trans. Knowl. Data Eng., vol. 27, no. 2, pp. 396–409, Feb. 2015.
[11] G. Coppersmith, C. Harman, and M. Dredze, “Measuring post traumatic stress disorder in twitter”, in Proc. Int. Conf. Weblogs Soc. Media, 2014, pp. 579–582.
[12] R. Fan, J. Zhao, Y. Chen, and K. Xu, “Anger is more influential than joy: Sentiment correlation in weibo”, PLoS One, vol. 9, 2014, Art. no. e110184.
[13] Pincus T, Swearingen C, Wolfe F “Toward a multidimensional Health Assessment Questionnaire (MDHAQ): assessment of advanced activities of daily living and psychological status in the patient-friendly health assessment questionnaire format”, Arthritis Rheum 1999; 42: 2220-30
[14] W. Chen, Y. Q. Shi, and G. Xuan, “Identifying computer grahics using HSV color model and statistical moments of characteristic functions”, In Proceedings of IEEE International Conference on Multimedia and Expo, Jul. 2007, pp. 1123–1126.
[15] Y. Zhang, J. Tang, J. Sun, Y. Chen, and J. Rao, “Moodcast: Emotion prediction via dynamic continuous factor graph model”, Proc. IEEE 13th Int. Conf. Data Mining, 2010, pp. 1193–1198.
[16] A. Sano, and R. W. Picard, “Stress recognition using wearable sensors and mobile phones”, In Proceedings of ACII, pp. 671–676, 2013.
[17] G. Farnadi, et al., “Computational personality recognition in social media”, UserModel User-Adapted Interaction, vol. 26, pp. 109–142, 2016.
[18] J. Golbeck, C. Robles, M. Edmondson, and K. Turner, “Predicting personality from Twitter”, in Proc. IEEE 3rd Int. Conf. Privacy, Security, Risk Trust, IEEE 3rd Int. Conf. Soc. Comput., 2011, pp. 149–156.
[19] A. Fernandes, R. Helawar, R. Lokesh, T. Tari, and A. V. Shahapurkar, “Determination of stress using blood pressure and galvanic skin response”, In Proceedings of the International Conference on Communication and Network Technologies (ICCNT’14), pp. 165–168, Sivakasi, India, 2014.
[20] B. Verhoeven, W. Daelemans, and B. Plank, “Twisty: A multilingual twitter stylometry corpus for gender and personality profiling”, in Proc. 10th Int. Conf. Language Resources Eval., PP. 1632–1637 2016.
[21] F. A. Pozzi, D. Maccagnola, E. Fersini, and E. Messina, “Enhance user-level sentiment analysis on microblogs with approval relations”, in Proc. 13th Int. Conf. AI* IA: Advances Artif. Intell., PP. 133–144, 2013.
[22] J. Huang, Q. Li, Y. Xue, T. Cheng, S. Xu, J. Jia, and L. Feng.: “Teenchat: a chatterbot system for sensing and releasing adolescents’ stress”, In: X. Yin, K. Ho, D. Zeng, U. Aickelin, R. Zhou, H. Wang. (eds.) HIS LNCS, Vol. 9085, pp. 133–145. Springer, Heidelberg, 2015.
[23] C. Tan, L. Lee, J. Tang, L. Jiang, M. Zhou, and P. Li, “User-level sentiment analysis incorporating social networks,” in Proc. SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2011, pp. 1397–1405.
[24] J.W. Pennebaker, R.J. Booth, and M.E. Francis, “Linguistic Inquiry and Word Count (LIWC)”, 2007.
[25] Shaikha Hajera and Mohammed Mahmood Ali, “A Comparative Analysis of Psychological Stress Detection Methods”, In IJCEM, Vol. 21 Issue 2, March 2018.
[26] Y.R. Tausczik, and J. W. Pennebaker, “The psychological meaning of words: LIWC and computerized text analysis methods”, Journal of Language and Social Psychology, pp. 24-54, 2010.
[27] Thelwall M. “TensiStrength: stress and relaxation magnitude detection for social media texts”, J Inf Process Managpp: 106–121, 2017.
[28] X. Wang, J. Jia, H. Liao, and L. Cai, “Affective image colorization”, Journal of Computer Science andTechnology, Vol. 27, No. 6, pp. 1119-1128, 2012.
[29] S. R. Ireland, Y. M. Warren, and L. G. Herringer, “Anxiety and color saturation preference”, Perceptualand Motor Skills, Vol. 75, pp. 545-546, 1992.
[30] S.-B. Kim, K.-S. Han, H.-C. Rim, and S. H. Myaeng. Some effective techniques for naive bayes text classification. IEEE Transactions on Knowledge and Data Engineering, 18(11):1457–1466, Nov. 2006.
[31] Z. Pawlak, “Rough sets, decision algorithms and Bayes’s theorem,” Eur. J. Oper. Res., Vol. 136, , Issue.1, pp. 181–189, 2002.
[32] C.P.Patidar, Meena Sharma, VarshaSharda, "Detection of Cross Browser Inconsistency by Comparing Extracted Attributes", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.1-6, 2017.
[33] MM Ali, MAU Rahman, S Hajera “A comparative study of various image dehazing techniques” International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), IEEE, pp. 3622-3628, 2017
[34] G. Sharma, A. Kumar, "REVIN: Reduced Energy Virtuous Immune Network for WSN", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.1-8, 2017.
[35] MM Ali, M Tajuddin, M Kabeer “SDF: psychological Stress Detection Framework from Microblogs using Pre-defined rules and Ontologies”, International Journal of Intelligent Systems and Applications in Engineering, Vol.6, Issue.2, pp. 158-164, 2018.
Citation
Shaikha Hajera, Mohammed Mahmood Ali, "Psychological Stress Detection from Social Media Data using a Novel Hybrid Model," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.853-862, 2018.
Machine Translation In Indian Languages
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.863-868, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.863868
Abstract
Machine Translation (MT) is one of the tasks of Natural Language Processing. It can be used by intellectuals to attain information from the documents written in different languages. In the following paper, we have discussed problems faced in MT in Indian languages, various approaches of MT, limitations of some of the current existing MT Systems and the work that has been done till now in MT in Indian language perspective. We have also discussed performance metrics that are used for evaluation of MT System.
Key-Words / Index Term
Machine Translation, Rule Based Approach, Example Based Approach
References
[1]. Sinha, R. M. K., and A. Jain. "AnglaHindi: an English to Hindi machine-aided translation system." MT Summit IX, New Orleans, USA (2003): 494-497.
[2] Ramanathan, Ananthakrishnan, et al. "Simple Syntactic and Morphological Processing Can Help English-Hindi Statistical Machine Translation." IJCNLP. 2008.
[3]. Sinha, R. Mahesh K., and Anil Thakur. "Machine translation of bi-lingual Hindi-English (hinglish) text." 10th Machine Translation Summit (MT Summit X), Phuket, Thailand (2005): 149-156.
[4]. Ambati, Vamshi, and U. Rohini. "A hybrid approach to example-based machine translation for Indian languages." Proceedings ICON (2007).
[5] Soni A et al. (2013) “Exploring Verb Frames for Sentence Simplification in Hindi” In Proceedings of International Joint Conference on Natural Language Processing, Nagoya, Japan, 14-18 October (2013), pp-1082-1086
[6] Goyal, Vishal, and Gurpreet Singh Lehal. "Evaluation of Hindi to Punjabi machine translation system." arXiv preprint arXiv:0910.1868 (2009).
[7]. Josan, Gurpreet Singh, and Gurpreet Singh Lehal. "A Punjabi to Hindi machine translation system." 22nd International Conference on Computational Linguistics: Demonstration Papers. Association for Computational Linguistics, 2008
[8] Rama, Taraka, and Karthik Gali. "Modeling machine transliteration as a phrase-based statistical machine translation problem." Proceedings of 2009 Named Entities Workshop: Shared Task on Transliteration. Association for Computational Linguistics, 2009.
[9] Poornima, C., et al. "Rule based sentence simplification for English to Tamil machine translation system." International Journal of Computer Applications 25.8 (2011): 38-42.
[10] Germann, Ulrich. "Building a statistical machine translation system from scratch: how much bang for the buck can we expect?." Proceedings of the workshop on Data-driven methods in machine translation-Volume 14. Association for Computational Linguistics, 2001.
[11]. Islam, Md Zahurul, Jörg Tiedemann, and Andreas Eisele."English to Bangla phrase-based machine translation."Proceedings of the 14th Annual conference of the European Association for Machine Translation (2010).
[12]. Joshi, Nisheeth, Hemant Darbari, and Iti Mathur. "Human and Automatic Evaluation of English to Hindi Machine Translation Systems."Advances in Computer Science, Engineering & Applications. Springer Berlin Heidelberg, 2012. 423-432.
Citation
Deepti Chopra, Nisheeth Joshi, Iti Mathur, "Machine Translation In Indian Languages," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.863-868, 2018.
Data Encryption Standard Algorithm in Multimodal Biometric Image
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.869-874, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.869874
Abstract
In every field of technology there are major issues of security. Biometric images are used as input and then the features like edge, texture are extracted. This is done by applying feature extraction algorithms and data encryption standard cryptographic algorithm on Fingerprints, Iris, face and palm simultaneously. In this paper we have explained the information about multimodal biometrics, DES algorithm, and role of DES in multimodal. We have discussed the implementation of DES algorithm by using MATLAB on parameters of captured images according to age and gender. Parameters such as key size, input size, time taken, simulation, memory requirement, CPU usage. Matching algorithm, time delay, FAR, FRR is also a major issue in multimodal biometrics.
Key-Words / Index Term
Cryptographic algorithm; Biometric traits; FAR, FRR; Data Encryption Standard; Cipher Text
References
[1]. Abhishek Sharma, Narendra Kumar ,”Encryption of Text Using Fingerprints as Input to Various Algorithms”, International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, ISSN (Online): 2319-7064, pp. 418-421.
[2]. Bk. Bala and Jl. Joanna, “Multi Modal Biometrics using Cryptographic Algorithm,” Eur. J. Acad. Essays, vol. 1, no. 1, pp. 6–10, 2014.
[3]. B.Rajesh , G.S.Rath, “Real Time Implementation Of DES Algorithm By Using Tms3206713 DSK ” National Institute Of TechnologyRourkela 2008.
[4]. Burrows M. and D. Wheeler, “A block-sorting lossless data compression algorithm,” Algorithm, Data Compression, no. 124, p. 18, 1994.
[5]. C. M. Bishop, Pattern Recognition and Machine Learning, vol. 4, no. 4. 2006.
[6]. Ieee, “IEEE Standard Specifications for Public-Key Cryptography,” IEEE Std 1363-2000. p. i, 2000.
[7]. D. G. Lowe, “Object recognition from local scale-invariant features,” in Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999, pp. 1150–1157 vol.2.
[8]. Lumini and L. Nanni, “Overview of the combination of biometric matchers,” Information Fusion, vol. 33. pp. 71–85, 2017.
[9]. S. S. More, B. Narain, and B. T. Jadahv, “A Comparative Analysis of Unimodal and Multimodal Biometric Systems,” in International Conference (ITESM-2017) On Innovative Trends in Engineering Science and Management, 2017, vol. 8, no. 5.
[10]. S. S. More. and B. T. Jadhav, “Comparative Study of Biometric Devices,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 5, no. 2, pp. 1302–1309, 2017.
[11]. S. S and S. Mathew, “Multimodal Biometric Authentication : Secured Encryption of IRIS Using Fingerprint ID,” Int. J. Cryptogr. Inf. Secur., vol. 6, no. 3/4, pp. 39–46, 2016.
[12]. Sanjay Kumar , Sandeep Srivastava ,” Image Encryption using Simplified Data Encryption Standard (S-DES) ”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No.2, October 2014.
[13]. S. S. More and B. T. Jadahv, “FUZZY LOGIC ALGORITHMS FOR EXTRACTING BIOMETRIC DATA,” in National Conference on Modern Approach for Green Electronics & Computing 29th and 30th September 2014 (MAGEC 2014) ISBN : 978-81-928732-2-0, 2014, pp. 200–204.
[14]. S. S. More and B. T. Jadahv, “An Overview on Technologies Used in Biometric System,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 4, no. 2, pp. 365–373, 2016.
[15]. S. S. More, “Biometrics: Overview and potential use for E- Governance Services,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 6, pp. 1145–1151, 2014.
[16]. Sharmila Shinde, J. Shinde, Kharade M and Kadam D. “Biometrics: Overview and potential use for E- Governance Services,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 6, pp. 1145–1151, 2014.
[17]. Odinaka, P. H. Lai, A. D. Kaplan, J. A. O’Sullivan, E. J. Sirevaag, and J. W. Rohrbaugh, “ECG biometric recognition: A comparative analysis,” IEEE Trans. Inf. Forensics Secur., vol. 7, no. 6, pp. 1812–1824, 2012.
[18]. R. Patil and M. a. Zaveri, “A Novel Approach for Fingerprint Matching Using Minutiae,” Math. Model. Comput. Simul. (AMS), 2010 Fourth Asia Int. Conf., 2010.
[19]. Rupam Kumar Sharma , Generation of Biometric Key for Use in DES, https://arxiv.org/ftp/arxiv/papers/1302/1302.6424.pdf ,Bosco College Of Engineering and Technology, Assam India.
[20]. Teena Joseph, Latha Parthiban, “Multimodal biometric based authentication for ensuring data security in Cloud Computing ”, Journal of Chemical and Pharmaceutical Sciences, Volume 9 Issue 4 , 2016, ISSN: 0974-2115.
[21]. Wayman J., Biometric Systems: Technology, Design and Performance Evaluation. 2005.
[22]. William E. B, C. Barker, “Data Encryption Algorithm,” Recomm. Triple Data Encryption Algorithm Block Cipher, no. January, 2012.
Citation
Sharmila S.More, Bhawna Narain, B.T.Jadhav, "Data Encryption Standard Algorithm in Multimodal Biometric Image," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.869-874, 2018.