Hybrid Model Approach for Impulsive Noise Removal Image Enhancement Techniques
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.832-834, May-2018
Abstract
In the world of digital image processing, image enhancements is a biggest challenge without losing any information of image, better visualization, edge prevention and provide better quality of the image etc. At the time of image processing, images are corrupted by different types of noises. Using noise removal techniques we have remove noises from the digital image. In this paper we discussed about the impulsive noise and techniques for removal of impulsive noise from digital image by proposed algorithm. The proposed algorithm “An Approach for Hybrid Impulsive Noise Image Enhancement Techniques” is a combination of two algorithms Modified Decision Based Unsymmertic Trimmed Median filter (MDBUTMF) and Fast Switching Based Median Filter for high Density Salt and Pepper noise (FSBMMF). It gives better Peak-Signal-to-Noise Ratio (PSNR) and Image Enhancement Factor (IEF).
Key-Words / Index Term
Digital image processing, Image enhancements, Impulsive noise, MDBUTMF, FSBMMF, PSNR, IEF)
References
[1] M. Ghebleh, A. Kanso,” A robust chaotic algorithm for digital image steganography”, Commun Nonlinear Sci Numer Simulat 19 (2014) 1898–1907.
[2] J. Astola and P. Kuosmaneen, “Fundamentals of Nonlinear Digital Filtering. Boca Raton”, FL: CRC, 1997.
[3] Hwang H, Haddad RA,”Adaptive median filters: new algorithms and results”, IEEE Transactions on Image Processing 1995, 4(4):499-502. 10.1109/83.370679
[4] J. Astola and P. Kuosmaneen,” Fundamentals of Nonlinear Digital Filtering. Boca Raton”, FL: CRC, 1997.
[5] V. Jayaraj and D. Ebenezer, “A New Adaptive Decision Based Robust Statistics Estimation Filter for High Density Impulse Noise in Images and Videos”,International Conference on Control, Automation, Communication and Energy conversion, 2009.
[6] Ng P-E, Ma K-K,”A switching median filter with boundary discriminative noise detection for extremely corrupted images”,IEEE Transactions on Image Processing 2006, 15(6):1506-1516.
[7] S. Zhang and M. A. Karim, “A new impulse detector for switching median filters,” IEEE Signal Process. Lett., vol. 9, no. 11, pp. 360–363, Nov. 2002.
[8] S. Esakkirajan, T. Veerakumar, Adabala N. Subramanyam, and C. H. PremChand,” Removal of High Density Salt and Pepper Noise Through Modified Decision Based Unsymmetric Trimmed Median Filter”, ieee signal processing letters, vol. 18, no. 5, may 2011.
[9] V.R. Vijaykumar G. Santhana Mari D. Ebenezer,” Fast Switching Based Median-Mean Filter for High Density Salt and Pepper Noise Removal”, AEUE - International Journal of Electronics and Communications (2014).
[10] Priyanka Rastogi, Neelesh Gupta,’’ Review of Noise Removal Techniques for Fixed Valued Impulse Noise”, International Journal of Computer Applications (0975 – 8887) Volume 123 – No.5, August 2015.
Citation
Pratima Verma, Jitendra Kurmi, "Hybrid Model Approach for Impulsive Noise Removal Image Enhancement Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.832-834, 2018.
Deriving Aggregate Results with Incremental Data using Materialized Queries
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.835-839, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.835839
Abstract
OLAP queries perform analytical processing on enterprise warehouse data. These queries are implemented using aggregate as well as non-aggregate functions. Result extraction using OLAP queries involves traversal through huge number of warehouse records. For repeated queries, processing time can be saved by storing queries along with its result and other parameters like timestamp, frequency, threshold in relational database MQDB. With periodic data warehouse refresh, incremental results for the frequent queries are processed using data marts and results are combined with existing results. This paper depicts the methodology to derive results based on different aggregate functions giving the effect of incremental data. Some aggregate functions may require other measures to be stored for compiling results.
Key-Words / Index Term
Data warehouse, Materialized queries, Aggregate functions, Deriving incremental results
References
[1] S. Chakraborty and J. Doshi, “Data Retrieval from Data Warehouse Using Materialized Query Database,” International Journal of Computer Sciences and Engineering, Vol.6(1), Jan 2018, E-ISSN: 2347-2693, pages 280-284.
[2] S. Chakraborty and J. Doshi, “Performance Evaluation of Materialized Query,” International Journal of Emerging Technology and Advanced Engineering, vol. 8, Issue 1, pages 243-249, January 2018.
[3] S. Chakraborty and J. Doshi, “Materialized Queries with Incremental Updates,” 3rd International Conference on Information and Communication Technology for Intelligent Systems, Springer Smart Innovation, Systems and Technologies (SIST). Series: http://www.springer.com/series/8767. [Presented, Ahmedabad, 6-7th April, In Press].
[4] S. Chakraborty and J. Doshi, “An Approach for Creating and Maintaining Dependent Data Marts using Materialized Queries’ Information,” International Journal of Scientific Research in Science, Engineering and Technology, vol 4, Issue 1, pages 1527-1533, JanuaryFebruary,2018.
[5] D Theodoratos, T Sellis, “Data Warehouse Configuration,”Proceedings of the 23rd VLDB Conference Athens, Greece, 1997.
[6] P. Karthik, G.Thippa Reddy, E.Kaari Vanan, “Tuning the SQL Query in order to Reduce Time Consumption,” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012, ISSN (Online): 1694-0814.
[7] P O`Neil, D Quass, “Improved Query Performance with Variant Indexes,” Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data, Pages 38-49.
[8] Z Lin, D Yang, G Song, T Wang, “Dealing with Query Contention Issue in Real-time Data Warehouses by Dynamic Multi-level Caches,” Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on Computer and Information Technology.
[9] S Chaudhuri, “An Overview of Query Optimization in Relational Systems,” PODS `98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Pages 34-43.
[10] P Roy, S. Seshadri, S. Sudarshan, S Bhobe, “Efficient and Extensible Algorithms for Multi Query Optimization,” Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Pages 249-260.
[11] A Gupta, V Harinarayan, D Quass, “Aggregate-Query Processing in Data Warehousing Environments,” Proceedings of the 21st VLDB Conference, Zurich, Swizerland, 1995.
[12] S Cohen, W Nutt, A Serebrenik, “Rewriting Aggregate Queries Using Views,” Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Pages 155-166.
[13] J Goldstein, P -A Larson, “Optimizing Queries Using Materialized Views: A Practical, Scalable Solution,” Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data, Pages 331-342, ISBN:1-58113-332-4.
Citation
Sonali Chakraborty, Jyotika Doshi, "Deriving Aggregate Results with Incremental Data using Materialized Queries," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.835-839, 2018.
Access Control Android Application to Remotely Control PC
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.840-847, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.840847
Abstract
Access Control is an Android Application that works on the concepts of wireless socket programming. Our main aim for developing this application is to provide the user with a remote for his/her PC in the form of an android device. Using this application, the user may perform various actions on his PC such as controlling the mouse movement and operations, sliding through various PPT slides, managing media, entering text on any application on their PC, from a reasonable distance, all just with the help of their android device. In order for this application to work, the PC and the given android device need only be connected to a common network.
Key-Words / Index Term
Android, remote, wireless, socket program, client-server model, IP address, TCP/IP
References
[1]Suhas Hola, Mahima M Katti, “Android Based Mobile Application Development and its security”, International Journal of Computer Trends and Technology, Vol.3, Issue.3, pp.486-490, 2012.
[2]Limi Kalita, “Socket Programming”, International Journal of Computer Science and Information Technologies, Vol.5, Issue.3, 4802-4807, 2014.
[3]Mahesh Kumar, Rakhi Yadav, “TCP and UDP Packets Analysis Using Wire shark”, International Journal of Science, Engineering and Technology Research (IJSETR), Vol.4, Issue.7, 2015.
[4]Prathap M., A.S. Thanamani, "Real-time Packet Behavior Response in Socket Application", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.143-146, 2017.
[5]Mayur Khatpe, Brij Patel, Tushar Jain and Varun Shah, “Remote Controlled Home Automation Using Android application via Wi-Fi Connectivity”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.191-194, April, 2016.
[6]P Joby, Abby. (2016). Socket Programming WIFI Chat APP For Android Smartphone. 10.13140/RG.2.1.3692.2483.
Citation
Shalabh Agarwal, Sayantika Sengupta, Swarnali Sanyal, Naireeta De, "Access Control Android Application to Remotely Control PC," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.840-847, 2018.
Isolated Word Lateral Phonetic Class Speech Recognition in Malayalam Language
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.848-850, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.848850
Abstract
For Speech recognition in the selection of text corpus commonly some phonemes will never likely to occur and the words which includes such phonemes will never be recognized properly. Therefore special care to be taken to include all phonemes of a language in maximum word positions( Start, end , middle). Our aim in this paper is to develop a speech recognizer for lateral class of words of Malayalam Language.
Key-Words / Index Term
Automatic speech recognition, Malayalam, lateral
References
[1] Furui, S., “50 Years of Progress in Speech and Speaker Recognition Research Identification”, In ECTI Transformations n Computer and Information Technology, vol. 1, no. 2, 2003
[2] Sorin Dusan and Larry R. Rabiner, “On integrating insightsfrom human speech perception into automatic speech recognition,” in Proceedings of INTERSPEECH 2005, Lisbon, 2005.
[3] HILL, D. R. (1971). Man-machine interaction using speech. In Advances in Computers, 11. Eds F. L. Alt, M. Rubinoff & M. C. Yovitts, pp. 165-230. New York: Academic Press.
[4]Furui, S., “50 Years of Progress in Speech and Speaker Recognition Research Identification”, In ECTI Transformations on Computer and Information Technology, vol. 1, no. 2, 2003
[5] Balaji. V., K. Rajamohan, R. Rajasekarapandy, S. Senthilkumaran,"Towards a knowledge system for sustainable Food security: The information village experiment in Pondicherry," in IT Experience in India : Bridging the Digital Divide, Kenneth Keniston and Deepak Kumar, eds., New Delhi, Sage,2004.
[6] Madhuresh Singhal et al. ‘Developing Information Technology Solutions in Indian Languages: Pros and Cons’. At 1st International CALIBER: Mapping Technology on Libraries and People, 13-15 Feb. Ahmadabad, India, pages 655-666, 2003.
[7] Namboothiri, E.V.N. 2002. Bhashavinjaneeyam. Calicut: Poorna Publications
[8] Punnoose, R. (2010). An Auditory and Acoustic Study of Liquids in Malayalam. Ph.D. Thesis, Newcastle University, Newcastle, UK
[9] G. Doddington, (1989), "Phonetically Sensitive Discriminants for Improved Speech Rec.", Proc. IEEE Int Conf. Acoustics. Speech and Sig. Proc., ICASSP-89, pp. 556-559, Glasgow, Scot- land.
[10] L.,R Rabiner, "A tutorial on Hidden Markov model and selected application in speech recognition" , Pro.IEEE,7(2):257-286, February 1998
Citation
Cini Kurian, "Isolated Word Lateral Phonetic Class Speech Recognition in Malayalam Language," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.848-850, 2018.
A Review and Analysis of MAODV routing protocols for Mobile Ad Hoc Networks
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.851-856, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.851856
Abstract
Mobile Ad hoc Networks have gained significant interest and popularity due to their open architecture, capability of changing location and self-configuring as per the needs and requirements of the users. The expanding ubiquity and accessibility of portable remote gadgets has lead analysts to build up an assortment of Mobile Ad hoc Networking (MANET) Protocols. This paper presents study of various sorts of Multicast Ad hoc On-Demand Vector (MAODV) directing protocols which offers fast adjustment to dynamic link conditions, low handling and memory overheads. Multicasting sends the information to a group of host PCs by utilizing single source address. The main objective of multicasting is to support group-oriented computing, which can reduce communication costs, processing overheads and delivery delay. Finally this paper analyses various MADOV routing protocols according to particular attributes which enables to reveal the significance of the research work went on in MAODV routing protocol and summarized literature reviews and its findings are presented in tabular form.
Key-Words / Index Term
Wireless, Ad Hoc, Multicast, Routing
References
[1]. Mamata Rath[2013],”A comparative analysis on QoS multicast routing protocols in MANETs”, IOSR Journal of Computer Engineering (IOSR-JCE), Volume 15, Issue 4 (Nov. - Dec. 2013), PP 88-92.
[2]. D. Kalaiselvi, Radhakrishnan[2015], “Multi constrained QoS Routing Using a Differentially Guided Krill Herd Algorithm in Mobile Ad Hoc Networks”, Hindawi Publishing Corporation Mathematical Problems in Engineering, Volume 2015, Article ID 862145, 10 pages
[3]. Ma Xiang [2012], “Analysis on Multicast Routing Protocols for Mobile Ad Hoc Networks”, 2012 International Conference on Solid State Devices and Materials Science, Volume 25, Pages 1787-1793
[4]. Thomas Kunz and Ed Cheng[2001]“Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP”, Pages : 10186-190
[5]. Ajay Kumar Yadav, Sachin Tripathi [2016], “QMRPRNS: Design of QoS multicast routing protocol using reliable node selection scheme for MANETs”, Peer-to-Peer Networking and Applications, Feb 2016, Volume 10, Issue 4, pp 897–909.
[6]. Sambhu Dahal, Niranjan Ray[2016],” Enhanced Multicast Routing Protocol in MANET”, International Conference on Information Technology (ICIT), IEEE-2016, Pages: 6 – 11.
[7]. Runping Yang, Xia Sun[2015], “DMAODV: A MAODV-Based Multipath Routing Algorithm “, 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES), IEEE-2015, Pages: 220 – 223.
[8]. Xeuming Wang, Fuxing Chang[2015], “ A new multi- objective routing protocol of ad hoc based on routing constrains” ,11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Pages: 1 – 5, IET Conferences.
[9]. Xu Li; Tianjiao Liu; Ying Liu; Yan Tang[2014], “Optimized multicast routing algorithm based on tree structure in MANETs”, “ China Communications”, , Volume: 11, Issue: 2, Pages: 90 – 99, IEEE Journals & Magazines.
[10]. N. -C. Wang [2012], “Power-aware dual-tree-based multicast routing protocol for mobile ad hoc networks”, Volume: 6, Issue: 7, IET Communications-2012, Pages: 724 – 732, IET Journals & Magazines.
[11]. Jin Lu, Dongfeng Zhao, Zhenzhou An, Wenxue Ran[2011],” Family particle swarm optimization for QoS multicast routing in Ad hoc”, International Conference on Computer Science and Network Technology, Volume: 3, IEEE-2011, Pages: 1699 - 1702
[12]. Feng He,Kuan Hao,Hao Ma[2010], “S-MAODV: A trust key computing based secure Multicast Ad-hoc On Demand Vector routing protocol” , 3rd International Conference on Computer Science and Information Technology , Volume: 6 , IEEE-2010, Pages: 434 – 438.
[13]. Weiliang Li, Jianjun Hao[2010],” Research on the improvement of multicast Ad Hoc On-Demand Distance Vector in MANETS”, The 2nd International Conference on Computer and Automation Engineering (ICCAE), Volume: 1, IEEE-2010,Pages: 702 – 705.
[14]. Rui Yang,Baolin Sun,Zhuanhua Deng,Qifei Zhang[2010],”An Energy Entropy-based power-conserving multicast routing of ad hoc networks”, The 3rd International Conference on Information Sciences and Interaction Sciences, IEEE- 2010, Pages: 191 – 195.
[15]. Srinivas Sethi, Siba K. Udgata[2009],” IMAODV: A reliable and multicast AODV protocol for MANET” , Fifth International Conference on Wireless Communication and Sensor Networks (WCSN), IEEE-2009, Pages: 1 – 6.
[16]. Hua Chen; Zhengxiang Yan; Baolin Sun; Yue Zeng; Xianying He[2009], “An entropy-based long-life multicast routing protocol in MAODV”, ISECS International Colloquium on Computing, Communication, Control, and Management, Volume: 1, IEEE – 2009, Pages: 314 – 317.
[17]. Xiaoyan Zhu; Jin, Lian[2008], “A QoS Multicast Routing Protocol with Mobile Prediction Based on MAODV in MANETs”, International Conference on Computer Science and Software Engineering, Volume: 3, IEEE Conferences-2008, Pages: 355 – 358.
[18]. Guo-feng Zhao; Wei Yang; Hong Tang; Yan-bing Liu[2008], “An MAODV-Based Energy Saving Multicast Routing Algorithm” , IFIP International Conference on Network and Parallel Computing IEEE Conferences – 2008, Pages: 247 - 250
[19]. Sun Baolin; Li Layuan[2006], “QoS-aware multicast routing protocol for ad hoc networks” Journal of Systems Engineering and Electronics, Volume: 17, Issue: 2, IEEE-2006, Pages: 417 – 422.
Citation
D. Madhu Babu, M.Ussenaiah, "A Review and Analysis of MAODV routing protocols for Mobile Ad Hoc Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.851-856, 2018.
A Comparative Study of Clustering Techniques Used in Cloud Computing to Minimize the Adverse Environmental Impact
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.857-860, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.857860
Abstract
Cloud Computing is a computing paradigm where various tasks are assigned to a combination of connections, software and services that can be accessed by the user over a network. The research paper aims to reach a theoretical notion of sustainable development with proposing an incentive for reducing global warming through effective clustering techniques and methods. This paper is a comparative study on k-means clustering, map-reduce technique and resource clustering used in cloud computing. The focus of the paper is to suggest better methodology for handling the events of cloud computing and possibly reducing the similar types of events by clustering them. This approach might lead to the reduction of carbon-dioxide gas (which is a greenhouse gas) by less usage of servers in cloud data centers. With the advent of IT services in cloud computing energy consumption it is necessary for the developing technology to progress towards sustainable development rather thrashing and harnessing energy from every possible means.
Key-Words / Index Term
Cloud Computing, Clustering, Cloud Data centers, Clustering Algorithms, K-Means Clustering, Map-Reduce, Resource Identification and Clustering
References
[1.] K. Birman, “Networks and Cloud”, CS5412 Spring (Cloud Computing: Birman), 2015.
[2.] R. K. Trivedi, R. Sharma, “Case Study on Environmental Impact of Cloud Computing”, IOSR-JCE e-ISSN: 2278-0661, p-ISSN: 2278-8727 Volume 16, Issue 2, Ver. VI, PP 81-86, 2014.
[3.] M. Arif, T. Mahmood, “Cloud Computing and its Environmental Effects”, International Journal of Grid Distribution Computing Vol.8, No.1, pp.279-286, 2015.
[4.] A. More, P. Kanungo, "Use of Cloud Computing for Implementation of e-Governance Services", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.115-118, 2017.
[5.] Y. G. Patil, P. S. Deshmukh, "A Review: Mobile Cloud Computing: Its Challenges and Security", Vol.06, Issue.01, pp.11-13, 2018.
[6.] M. K. Saggi, A. S. Bhatia, “A Review on Mobile Cloud Computing: Issues, Challenges and Solutions”, International Journal of Advanced Research in Computer and Communication Engineering, 2015.
[7.] R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar, "Cloud Computing: Data Storage Protocols and Security Techniques", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.113-118, 2018.
[8.] M. Gattulli, M. Tornatore, R. Fiandra, A. Pattavina, “Low- Carbon Routing Algorithms for Cloud Computing Services in IP-over-WDM Networks”, IEEE ICC Optical Network and Systems, 2012.
[9.] Malathy, G. R. Somasundaram, K. Duraiswamy, “Performance Improvement in Cloud Computing Using Resource Clustering”, Journal of Computer Science 9 (6): 671-677, ISSN: 1549-3636, 2013.
[10.] D.K. Sharma, S.K. Dhurandher, A. Kumar, A. Kumar, A.K. Jha, “Cloud Computing based Routing Protocol for Infrastructure-based Opportunistic Networks”, CAITFS Division of Information Technology, 2016.
[11.] S.N. Bushra, A.C. Sekar, “An Efficient Clustering Method for Incremental Cloud Data”, IJARCSSE ISSN: 2277128X, 2014.
[12.] E. Sarkar, C.H Sekhar, “Organizing Data in Cloud using Clustering Approach”, International Journal of Scientific & Engineering Research, Volume 5, Issue 5, 2014.
[13.] I. Singh, P. Dwivedi, T. Gupta, P. G. Shynu, “Enhanced K-means clustering with encryption on cloud”, IOP Conf. Series: Materials Science and Engineering 263, 042057, 14th ICSET, 2017.
[14.] S.Y Kim, J. Bottleson, J. Jin, P. Bindu, S.C. Sakhare, J.S Spisak, “Power Efficient Map Reduce Workload Acceleration using Integrated GPU”, IEEE First International Conference on Big Data Computing Service and Applications, 2015.
Citation
Renuka Raj, Vivekanand, Sohit Shukla, "A Comparative Study of Clustering Techniques Used in Cloud Computing to Minimize the Adverse Environmental Impact," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.857-860, 2018.
Secure and Authenticated Cryptographic Techniques: “A Review”
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.861-870, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.861870
Abstract
In the world of the high technology networking system, it is very important to ensure the security of the data. To make our data secure during communications, Cryptography is the best method in networking security to provide the confidentiality or authentication. There are two main methods which are used to achieve these two things (i.e. confidentiality and authentication) in cryptography that are public key cryptosystem and digital signatures. Here this work shows a survey on the existing techniques and also presents a comparison that helps the researches to find the gaps in the existing techniques.
Key-Words / Index Term
Encryption, Decryption, Symmetric key, Public Key, Cryptographic algorithms, Digital Signature
References
[1] Abdul D.S, Kader H.M Abdul, Hadhoud, M.M., “Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA, Volume 8, 2009, pp. 58-64.
[2] Apoorva, Kumar Yogesh, “Comparative Study of Different Symmetric Key Cryptography”, IJAIEM, Vol. 2, Issue 7, July 2013, pp.204-206.
[3] Babita and Gurjeet Kaur, "network security based on cryptography and steganography techniques", International Journal of advanced research in computer science. VOL 8, NO. 4, May 2017(special issue), pp. 161-165.
[4] B.Nithya and P.Sripriya" A review of cryptographic algorithms in network security". International journal of engineering and technology (IJET). Vol 8,no.1, FEB-MAR 2016. pp. 324-331.
[5] Cornwell Jason W, “Blowfish survey”, department of computer science, Columbus state university, Columbus, GA, 2010
[6] Darshana Patil and P.M.Chawan" A survey on enhanced cryptographic techniques for messages encryption and decryption". International journal of innovative research in computer and communication engineering. Vol 5, Issue 3,March 2017. pp. 3713-3719.
[7] Deepti Chaudhary and Rashmi Welekar, “secure authentication using visual cryptography”, International Journal of computer science and applications, vol 8, no. 1, JAN-MAR 2015, pp. 65-68.
[8] Dhawan Priya, “Performance Comparison: Security Design Choices”, Microsoft Developer Network October 2002.
[9] Harpreet Kaur, Vaishali Verma, Jaya Mishra." A survey paper on cryptography" International conference on innovative trends and technologies in engineering sciences and education. 8th & 9th September. www.conferenceworld.in. pp. 129-136.
[10] Kamal Kumar Gola, Zubair Iqbal, and Bhumika Gupta, "Modified RSA digital signature scheme for data confidentiality", IJCA (0975 – 8887) Volume 106 – No 13, November 2014
[11] M.Chanda Mona, S.Banu Chitra, V.Gayathri" A survey on various encryption and decryption algorithms". International journal of security and Singaporean journal of scientific research. VOL 6, NO. 6, 2014. pp. 289-300.
[12] Marwaha Mohit, Bedi Rajeev, Singh Amritpal, Singh Tejinder, “comparative analysis of cryptographic algorithms”, International Journal of advanced engineering technology/IV/III/ July Sep 2013/16-18.
[13] Monika Agrawal and Pradeep Mishra."A comparative survey on symmetric key encryption techniques". International journal on computer science and engineering (IJSCE).VOL.4, NO.5, May 2012. pp. 877-882.
[14] Muhammad Faheem Mushtaq, Sapiee Jamel,Abdul Kadir Hassan Disina, Zahraddeen A.Pindar,Nur Shafinaz Ahmad Shakir, Mustafa Mat Deris."A survey on the cryptography encryption Algorithms", International Journal of advanced computer science and applications, volume 8, number 11, 2017. pp. 333-344.
[15] Mukund R.Joshi and Renuka Avinash,”Network security with cryptography”. International journal of computer science and mobile computing(IJCSMC). VOL 4, Issue 1, January 2015, pp. 201-204.
[16] Nadeem Aamer, “Performance Comparison of Data Encryption Algorithms”, Oct 2008.
[17] Pallavi H.Dixit,Kamlesh B.Waskar, Uttam L.Bombale, “Multilevel network security combining cryptography and steganography on ARM platform", a journal of embedded systems, 2015, Vol 3, no. 1, pp. 11-15.
[18] Prerna Mahajan and Abhishek Sachdeva, "A Study of encryption algorithms AES, DES and RSA for security", Global Journal of CS and technology network, web and security. Vol 13, issue 15 version 1.0, year- 2013. pp. 15-22.
[19] Saini Bahar, “survey on performance analysis of various cryptographic algorithms”, International Journal of advanced research in computer science and software engineering, Volume 4, issue 4, April 2014, pp. 1-4.
[20] Sandeep Tayal, Nipin Gupta, Pankaj Gupta, Deepak Goyal, Monika Goyal.” A review paper on network security and cryptography”, advances of computational sciences and technology. Vol 10, no. 5, 2017, pp. 763-770.
[21] Saranya K, Mohanapriya K, Udhayan J."A review on symmetric key encryption techniques in cryptography". International journal of science, engineering, and technology research(IJSETR), VOLUME 3, issue 3, March 2014. pp.539-544.
[22] Sarita Kumari"A research paper on cryptography encryption and compression techniques". International journal of engineering and computer science. VOL 6,Issue 4,April 2017.pp. 20915-20919.
[23] Seth Shashi Mehrotra, Mishra Rajan, “Comparative analysis of Encryption algorithm for data communication”, International Journal of Computer Science and Technology, vol. 2, Issue 2, June 2011, pp. 292-294.
[24] Singh Gurjeevan, Kumar Ashwani, Sandha K.S. “A Study of New Trends in Blowfish Algorithm” International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 2, pp.321-326
[25] Tamimi A. Al., “Performance Analysis of Data Encryption Algorithms”, Oct 2008.
[26] Thakur Jawahar, Kumar Nagesh. “DES, AES, and Blowfish Symmetric Key Cryptography algorithm3 Simulation-Based Performance Analysis”, IJETAE, Vol. 1, Issue 2, DEC. 2011, pp. 6-12.
[27] Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs, "Efficient public-key cryptography in the presence of key leakage”, computer science dept. august 17, 2017. pp. 1-33.
Citation
S. Srivastav, V. Pal, V. Gupta, K.K. Gola, "Secure and Authenticated Cryptographic Techniques: “A Review”," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.861-870, 2018.
Face Recognition based smart attendance system using IOT
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.871-877, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.871877
Abstract
Attendance is a compulsory requirement of every organization. Maintaining attendance register daily is a difficult and time consuming task. There are many automated methods for the same available like Biometric, RFID, eye detection, voice recognition, and many more. This paper provides an efficient and smart method for marking attendance. As it is known that primary identification for any human is its face, face recognition provides an accurate system which overcomes the ambiguities like fake attendance, high cost, and time consumption. This system uses face recognizer library for facial recognition and storing attendance. The absentee’s supervisor or parents are informed through email regarding the absence of their employees or wards respectively. The objective of this project is to innovate existing projects with some added feature like large data storage and fast computing through less hardware cost.
Key-Words / Index Term
Smart attendance system, Raspberry pi3, OpenCV, Face_Recognition, SMTP
References
[1] Charles A. Walton, electronic identification & recognition system Filed: Dec. 27, 1971 Appl. No.: 212,281.
[2] Michael Dobson, Douglas Ahlers, Bernie DiDario, “Attendance Tracking System", United States Patent Application Publication, Pub. No.: US 2006/0035205 A1, Feb.16, 2006.
[3] O. Shoewu and O.A. Idowu, “Development of Attendance Management System using Biometrics ", The Pacific Journal of Science and Technology, Vol. 13, Number1, pp.300-307, May 2012 (Spring).
[4] L. Sirovich and M. Kirby (1987). "Low-dimensional procedure for the characterization of human faces". Journal of the Optical Society of America A 4: 519–524.
[5] M.Turk and A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive Neuroscience, March 1991.
[6] Viola, P., & Jones, M. (2001). Rapid object detection using a boosted cascade of simple features. In Computer Vision and Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE Computer Society Conference on (Vol. 1, pp. I-511).
[7] C. Papageorgiou, M. Oren, and T. Poggio. A general framework for object detection. In International Conference on Computer Vision, 1998.
[8] Automated attendance management system based on face recognition algorithms Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference.
[9] Robust 3D Face Recognition. International Journal of Computer Sciences and Engineering (IJCSE), 2015 Volume-3, Issue-5 E-ISSN: 2347-2693
[10] Monitoring Driver Distraction in Real Time using Computer Vision System. International Journal of Computer Sciences and Engineering (IJCSE),2017Volume-5, Issue-6, E-ISSN: 2347-2693
Citation
Sakshi Patel, Prateek Kumar, Shelesh Garg, Ravi Kumar, "Face Recognition based smart attendance system using IOT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.871-877, 2018.
Predictive Analytics and Retrieval Using Mri-A Recent Retrospective
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.878-886, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.878886
Abstract
Research in MRI is gaining attention for tumor detection, classification, retrieval which it is critical for diagnosis, surgical planning and treatment. Several techniques are proposed to address this challenge and none of the solution is yet perfect. The accuracy of the system is improved using pre-processing, determined in feature extraction, evaluated in classification and retrieval techniques. Segmentation techniques are used to extract the tumor for feature extraction. As the tumor characteristic differs on various types, different spatial, wavelet, model based techniques are adapted to capture the unique features. The objective of this paper is to present a comprehensive overview of different methods, their efficacy on predictive analytics and retrieval.
Key-Words / Index Term
MRI Retrieval, Feature Extraction, Classification, Tumor Detection
References
[1] G. Dougherty,”Digital Image Processing for Medical Applications”, Cambridge University Press,2009.
[2]
Rojas-Domínguez A, Nandi AK.,”Development of tolerant features for characterization of masses in mammograms”. Comput Biol Med Vol.39, pp. 678-688,2009.
[3] N. R. Mudigonda, Rangaraj M. Rangayyan and J. E. Leo Desautels, “Detection of Breast Masses in Mammograms by Density Slicing and Texture Flow-Field Analysis” ,IEEE transactions on medical imaging, Vol. 20, NO. 12, December 2001.
[4] C.H. Wei , Y.Sherry, Chen, X. Liub, “Mammogram retrieval on similar mass lesions”, Computer methods and programs in biomedicine, pp. 234–248, 2012.
[5] E.I. Zacharaki, S. Wang, S. Chawla, D. S. Yoo, R. Wolf, E.R. Melhem, and C. Davatzikos, “Classification of Brain Tumor Type and Grade Using MRI Texture and Shape in a Machine Learning Scheme”, Magnetic Resonance in Medicine, pp.1609 –1618,2009
[6] C.H.Wei , Y.Li , P. J. Huang,”Mammogram retrieval through machine learning within BI-RADS standards”, Journal of Biomedical Informatics, Vol 44, Issue 4, August 2011, pp. 607-614
[7] W. Yang, Q. Feng, M.Yu, Z.Lu, Y. Gao, Y.Xu, and W. Chen, “Content-based retrieval of brain tumor in contrast-enhanced MRI images using tumor margin information and learned distance metric”, Medical Physics 39, 6929 ,2012
[8] S. Dube, S. El-Saden, T. F. Cloughesy, U. Sinha, “Content Based Image Retrieval for MR Image Studies of Brain Tumors”, Proceedings of the 28th IEEE EMBS Annual International Conference
[9] M. P. Arakeri, and G. R. M. Reddy, “Medical image retrieval system for diagnosis of brain tumor based on classification and content similarity,” Annual India Conference (INDCON), 2012, pp. 416-421.
[10] A. Islam, S. M. S. Reza and K. M. Iftekharuddin, “Multi-fractal Texture Estimation for Detection and Segmentation of Brain Tumors”, IEEE Transactions on Biomedical Engineering Vol. 60, Issue:11, Nov. 2013
[11] V. A. Kovalev, F. Kruggel, H.J. Gertz, and D. Y. von Cramon, “Three-Dimensional Texture Analysis of MRI Brain Datasets”, IEEE transactions on medical imaging, Vol. 20, NO. 5, MAY 2001
[12] Arunadevi,B,Deepa, S N.,”Texture analysis for 3D classification of brain tumor tissues”,Przeglad Elektrotechniczny. . pp.338-342, 2013.
[13] B.S. Kumar, Dr.R.A. Selvi, “Feature Extraction Using Image Mining Techniques to Identify Brain Tumors”, IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems ,ICIIECS`15
[14] N. B. Bahadure, A. K. Ray,and ,H. . Thethi,” Image Analysis for MRI Based Brain Tumor Detection and Feature Extraction Using Biologically Inspired BWT and SVM”, Hindawi International Journal of Biomedical Imaging Vol 2017, Article ID 9749108 ,12 pages
[15] L. Morarua , S. Moldovanua., D. Bibicua and M.Stratulat , “Hemorrhage Detection in MRI Brain Images using Images Features”, TIM 2012 Physics Conference AIP Conf. Proc. 1564, 171-177 ,2013.
[16] J.Sachdeva, V.Kumar, I.Gupta, N.Khandelwal and C.K. Ahuja,,” Segmentation, Feature Extraction, and Multiclass Brain Tumor Classification”, Journal of Digit Imaging.Vol 26(6),pp.1141–1150, Dec 2013.
[17] O. R. Seryasat and J. Haddadnia, “Assessment of a novel computer aided mass diagnosis system in mammograms”, Biomedical Research Vo 28, Issue 7, 2017
[18]
J. Yao, J. Chen, and C. Chow, “Breast Tumor Analysis in Dynamic Contrast Enhanced MRI Using Texture Features and Wavelet Transform” ,IEEE journal of selected topics in signal processing, Vol. 3, No. 1, February 2009
[19] E. Dandıl,, M. Çakıroğlu , and Ziya Ekşi , “Computer-Aided Diagnosis of Malign and Benign Brain Tumors on MR Images”, ICT Innovations. Advances in Intelligent Systems and Computing, Vol 311. Springer, 2014
[20] E. Sayed , E.Dahshan , H. M. Mohsen , Kenneth Revett , Abdel-Badeeh M. Salem , “Computer-aided diagnosis of human brain tumor through MRI: A survey and a new algorithm”, Expert Systems with Applications ,Vol 41, pp.5526–5545, 2014
[21] I. Ahmed, Q. N.U.Rehman, G.Masood, M.Nawaz, “Analysis of Brain MRI for Tumor Detection & Segmentation”, Proceedings of the World Congress on Engineering , June 29, IWCE 2016.
[22] D. Unay, A. Ekin, “Intensity Versus Texture For Medical Image Search And Retrival”,Video Processing and Analysis Group,Philips Research Europe, pp. 241-244,IEEE 2008
[23] A. A. Pandian and R. Balasubramanian, “Performance Analysis Of Texture Image Retrieval For Curvelet, Contourlet Transform And Local Ternary Pattern Using Mri Brain Tumor Image”,International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
[24] V. Anitha, S. Murugavalli ,”Brain Tumour Classification Using Two-Tier Classifier With Adaptive Segmentation Technique”,IET Computer Vision ,ISSN 1751-9632, “in press” ,Accepted on 22nd June 2015.
[25] T.A Anju, D. A. Chandy,” Brain Image Retrieval Using Local Ternary Co-Occurrence Pattern and CDF 9/7 Wavelet”, International Conference on Electronics and Communication System (lCECS -2014)
[26] A. A. Pandian ,Dr. R. Balasubramanian ,I.J. Information Engineering and Electronic Business, “Analysis on Shape Image Retrieval Using DNN and ELM Classifiers for MRI Brain Tumor Images”, Vol. 4, pp. 63-72 , 2016.
[27] N.Nabizadeh, M. Kubat , “Brain tumors detection and segmentation in MR images: Gabor wavelet vs. statistical features. Comput Electr Eng ,2015
[28] J. Cheng, W. Yang, M. Huang, W. Huang, J. Jiang, Y. Zhou, R. Yang, J. Zhao, Y.Feng, Q. Feng, W. Chen,”Retrieval of Brain Tumors by Adaptive Spatial Pooling and Fisher Vector Representation”, PLOS ONE pone.0157112 June 6, 2016
[29] M. R. Nazari,E. Fatemizadeh,“CBIR System for Human Brain Magnetic Resonance Image Indexing “,International Journal of Computer Applications,pp. 0975 – 8887,Vol 7, No.14, October 2010,
[30] T.R Sivapriya., V.Saravanan, R. Jeba P.Thangaiah “Texture Analysis of Brain MRI and Classification with BPN for the Diagnosis of Dementia”, Communications in Computer and Information Science, Vol 204. Springer, 2011.
[31] D. Unay, A. Ekin, and R. S. Jasinschi,”Local Structure-Based Region-of-Interest Retrieval in Brain MR Images”, IEEE Transactions On Information Technology In Biomedicine, Vol. 14, No. 4, July 2010
[32] C. M. Meshram, Bapurao, “Brain Tumor Segmentation and Classification: A Review”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol. 4, Issue 1, 2018
[33] N. Jyoti, “Automatic Classification and Detection of Brain Tumor with Fuzzy Logic and MFHWT”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol. 2, Issue 1,2017
Citation
R.A. Jasmine, P.A.J. Rani, D.J. Sharmila, "Predictive Analytics and Retrieval Using Mri-A Recent Retrospective," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.878-886, 2018.
Human Computer Interaction congregate with computer vision: A Review on Sixth Sense Technology
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.887-891, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.887891
Abstract
“Sixth Sense” is a wearable gestural interface that ameliorate the physical world around us with the digital information and allow us to use natural hand gestures to interact with the physical world. Data is available to us in an intangible form with the help of sixth sense technology we convert this data into tangible form. It provides a comprehensive way to interlink the physical and digital world using natural hand gestures only. The Sixth Sense Technology was discovered by Steve Mann and later on the proper modification was made by Pranav Mistry. He gives the new outlook and definition to the Sixth Sense device by relating it in such manner so that it can directly append with the people. Different applications have been discovered using the concept of Human Computer Interaction and Computer Vision. This paper discusses about the new era in the technology that will be soon developed revolution in the digital world which is known as Sixth Sense Technology.
Key-Words / Index Term
Gestural interface, Security Issues, Human-Computer Interaction,Computer Vision
References
[1] Touch Screen Computers: A History. Retrieved online June 2014 from http://www.touchscreencomputers.co.uk/history.
[2] Meenakshi Gupta, Shruti Sharma Virtual Class room using six sense Technology, IOSR Journal of Computer Engineering (IOSRJCE) Vol. 6, no. 4, , Sep. -Oct. 2012.
[3] https://en.wikipedia.org/wiki/SixthSense.
[4] Monika Arora, Basic Principles of Sixth Sense Technology, VSRD-IJCSIT, Vol. 2,no.8, 2012.
[5] https://pt.slideshare.net/sreenagamani/gesture-recognition-technology-40433836/17.
[6] https://gfycat.com/gifs/search/computer+vision.
[7] BathaniRaksha Sixth Sense Technology OR WUW (Wear Ur World), Research Expo International Multidisciplinary Research Journal, Vol.2, no. 2, June – 2012.
[8] https://www.g2crowd.com/products/jasper/reviews
[9] http://www.pranavmistry.com/projects/sixthsense/
[10] R. Lo, “Augmediated reality system based on 3D camera self-gesture sensing,” IEEE International Symposium on Technology and Society (ISTAS), June 2013.
[11] http://students.iitk.ac.in/eclub/assets/documentations/summer13/Sixth%20Sense.pdf.
[12] https://pt.slideshare.net/sreenagamani/gesture-recognition-technology-40433836/17
[13] http://groupassignment1.blogspot.com/2012/11/hardware-and-application-of-sixth-sense_13.html.
[14] https://jasperproject.github.io/.
[15] Thad Starner. Project Glass: An Extension of the Self. Pervasive Computing. 1536-1268/13, Published by IEEE CS, 2013. Available at http://Computingnow.computer.org.
[16] http://ecyberuniversity.com/sixth-sense-technology/
[17] http://www.neuralblog.com/_content/Innovation/Sixth-Sense-Technology_bid-682_pn-1.html.
[18] M. H. Yang, N. Ahuja, “Gaussian Mixture Model for Human Skin Color and Its Applications in Image and Video Databases", Spicing. On Storage and Retrieval for Image and Video Databases, pp.458-466, 1999.
[19] http://www.pranavmistry.com/projects/sixthsense/
[20] www.cs.cmu.edu/~cil/vision.htmlcomputervision.wikia.com.
[21] Building temporal models for gesture recognition. In proceedings British Machine Vision Conference, pp. 32-41, 2000.
[22] https://www.slideshare.net/aujistiador/presentation1-sixthsensetechnology.
[23] https://www.researchgate.net/figure/Topology-of-the-sixth-sense-device-71_fig1_298907837.
Citation
H. Agrawal, A. Agrawal, "Human Computer Interaction congregate with computer vision: A Review on Sixth Sense Technology," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.887-891, 2018.