Attribute Selection for the Early Diagnosis of Alzheimer`s Disease from Magnetic Resonance Images
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1321-1326, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13211326
Abstract
Alzheimer`s disease (AD), also known as Senile Dementia of the Alzheimer Type (SDAT) or simply Alzheimer’s is the most common form of dementia. The AD is a slowly progressive disease of the brain that is characterized by impairment of memory and eventually by disturbances in reasoning, planning, language, and perception. Many scientists believe that Alzheimer`s disease results from an increase in the production or accumulation of a specific protein called beta-amyloid protein in the brain that leads to nerve cell death. Conventional clinical decision-making systems are more manual in nature and ultimate conclusion in terms of exact diagnosis is remote. In this case, the employment of advanced Biomedical Engineering Technology will definitely helpful for making a diagnosis. Profiling of human body parameter using computers can be utilized for the early diagnosis of Alzheimer’s disease. There are a lot of tests and imaging modalities to be performed for an effective diagnosis of the disease. In this paper, we have focused on MRI imaging for making an expert system for the diagnosis of the AD. For this purpose, we have used Discrete Wavelet Transform for the segmentation of MRI images. After segmentation, some of the attributes extracted using histogram, gradient, SURF, and Gabor has been done. Finally, we have selected some attributes based on the criteria of early diagnosis through MRI brain images.
Key-Words / Index Term
Alzheimer’s Disease, MRI, Discrete Wavelet Transform, histogram, gradient, SURF, Gabor
References
[1] Sandeep C S, Sukesh Kumar A, “A Review on the Early Prediction of Alzheimer’s Disease (AD) through Different Tests, Techniques and Databases”, AMSE JOURNALS Series: Modelling C, Vol. 76, Issue.1; pp.1-22, 2015.
[2] Harvey, R.A., P.C. Champe, B.D. Fisher, Lippincott’s Illustrated Reviews: Microbiology. 2nd Edn., Lippincott Williams and Wilkins, pp.432, 2006.
[3] Sandeep C S, Sukesh Kumar A, Susanth M J, “The Online Datasets Used to Classify the Different Stages for the Early Prediction of Alzheimer’s Disease (AD) “,International Journal of Engineering and Advanced Technology, Vol.6, Issue.4, pp.38-45, 2017.
[4] Cummings, J.L., H.V. Vinters, G.M. Cole and Z.S. Khachaturian, “Alzheimer’s disease: etiologies, pathophysiology, cognitive reserve and treatment opportunities”, Neurology, Vol.51. pp.2-17, 1998.
[5] Sandeep C S, Sukesh Kumar A, Susanth M J "The Early Diagnosis of Alzheimer Disease (AD) Using CAMD, TREAD and NAAC Databases" International Journal for Science and Advance Research In Technology, Vol.3, Issue.3, pp.366-371, 2017.
[6] Yaari, R. and J. Corey-Bloom, “Alzheimer’s disease: Pathology and pathophysiology”, Semin Neurol. Vol.27, pp.32-41, 2007.
[7] Larson EB, Wang L, Bowen JD, et al. “Exercise is associated with reduced risk for incident dementia among persons 65 years of age and older”, Ann Intern Med., Vol.144, pp.73-81, 2006.
[8] Mayeux R. “Epidemiology of neurodegeneration”, Annu Rev Neurosci., Vol.26, pp.81-104, 2003.
[9] Sandeep C S, Sukesh Kumar A ,”A Psychometric Assessment Method for the Early Prediction of Alzheimer’s disease”, International Journal of Scientific & Engineering Research, Vol.8, Issue.3, 2017
[10] Harvey RJ, Skelton-Robinson M, Rossor MN. “The prevalence and causes of dementia in people under the age of 65 years”, J Neurol Neurosurg Psychiatry, Vol.74, pp.1206-9, 2003.
[11] Chu LW, Tam S, Wong RL, et al. “Bioavailable testosterone predicts a lower risk of Alzheimer’s disease in older men”, J Alzheimers Dis; 21:1335-45, 2010.
[12] Sandeep C S, Sukesh Kumar A, Susanth M J,” Cognitive Examination for the Early Diagnosis of Alzheimer’s Disease”, IEEE International Conference on Trends in Electronics and Informatics, 2017
[13] K.-S. Cheng, J.-S. Lin, and C.-W. Mao, “Techniques and comparative analysis of neural network systems and fuzzy systems in medical image segmentation,” Fuzzy Theor. Syst. Tech. Appl., Vol.3, pp.973–1008, 1999.
[14] J. Jiang, P. Trundle, and J. Ren, “Medical image analysis with artificial neural networks,” Comput.Med. Imag. Graph., Vol. 34, Issue.8, pp. 617–631, 2010.
[15] Sandeep C S, Sukesh Kumar A, K Mahadevan and Manoj P, “Dimensionality Reduction of Optical Coherence Tomography Images for the Early Diagnosis of Alzheimer’s Disease”, American Journal of Electrical and Electronic Engineering, Vol.5, Issue.2, pp.58-63, 2017.
[16] Sandeep CS, Kumar SA, Mahadevan K, Manoj P, “Analysis of MRI and OCT Images for the Early Diagnosis of Alzheimer’s Disease Using Wavelet Networks”, AMSE journal on Lectures on Modelling and Simulation, pp.31-40, 2018
[17] Sandeep C.S, Sukesh Kumar.A, K. Mahadevan, Manoj P,” Classification of OCT Images for the Early Diagnosis of Alzheimer’s Disease”, IEEE International Conference on Intelligent Computing and Control (I2C2), 2017.
[18] Q. Zhang and A. Benveniste, “Wavelet networks,” IEEE Trans. Neural Netw., Vol.3, Issue.6, pp. 889–898, 1992.
[19] R. M. Balabin,R. Z. Safieva, and E. I. Lomakina,“Wavelet neural network (WNN) approach for calibration model building based on gasoline near infrared (NIR) spectra,” J. Chemometr. Intell. Lab. Syst., Vol.93, Issue.1, pp.58–62, 2008.
[20] Sandeep C.S, Sukesh Kumar.A, K. Mahadevan, Manoj P,” Early Prognosis of Alzheimer’s Disease Using Images from Fundus Camera”, IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE), 2017.
[21] Y. C. Pati and P. S. Krishnaprasad, “Analysis and synthesis of feedforward neural networks using discrete affine wavelet tranformations,” IEEE Trans. Neur. Netw., Vol.4, Issue.1, pp.73–85, 1992.
[22] H. H. Szu, B. A. Telfer, and S. L. Kadambe, “Neural network adaptive wavelets for signal representation and classification,” Opt. Eng., Vol.31, Issue.9, pp.1907–1916, 1992.
[23] H. Zhang, B. Zhang, W. Huang, and Q. Tian, “Gabor wavelet associative memory for face recognition,” IEEE Trans. Neural Netw., Vol.16, Issue.1, pp. 275–278, 2005.
[24] O. Jemai, M. Zaied, C. B. Amar, and M. A. Alimi, “Pyramidal hybrid approach: Wavelet network with OLS algorithm-based image classification,” Int. J. Wavel. Multir. Inf. Process., Vol.9, Issue.1, pp.111–130, 2011.
[25] R. Galvao, V. M. Becerra, and M. F. Calado, “Linear–wavelet networks,” Int. J. Appl. Math. Comput. Sci., Vol.14, Issue.2, pp. 221–232, 2004.
[26] S. A. Billings and H. L. Wei, “A new class of wavelet networks for nonlinear system identification,” IEEE Trans. Neural Netw., Vol.16, Issue.4, pp. 862–874, 2005.
[27] Y. Oussar and G. Dreyfus, “Initialization by selection for wavelet network training,” Neurocomputing, Vol.34, Issue.1, pp.131–143, 2000.
[28] R. Baron and B. Girau, “Parameterized normalization: Application to wavelet networks,” in Proc. IEEE Int. Conf. Neural Netw., Vol.2, pp.1433–1437, 1998.
[29] Michael Freeman, “The Digital SLR Handbook. Ilex.” ,2005.
[30] Korn, Theresa M.; Korn, Granino Arthur, “Mathematical Handbook for Scientists and Engineers: Definitions, Theorems, and Formulas for Reference and Review”, Dover Publications. pp. 157–160, 2000.
[31] Herbert Bay, Andreas Ess, Tinne Tuytelaars, Luc Van Gool "SURF: Speeded Up Robust Features", Computer Vision and Image Understanding (CVIU), Vol. 110, Issue.3, pp.346–359, 2008.
[32] Jones, J.P.; Palmer, L.A., "An evaluation of the two-dimensional gabor filter model of simple receptive fields in cat striate cortex", J. Neurophysiol. Vol.58, Issue.6, pp.1233–1258, 1987.
Citation
C.S. Sandeep, A. Sukesh Kumar, "Attribute Selection for the Early Diagnosis of Alzheimer`s Disease from Magnetic Resonance Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1321-1326, 2018.
High Utility Sequential Pattern Mining over Data Streams with Sliding Window Control
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1327-1332, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13271332
Abstract
Mining valuable examples from successive information are a testing subject in information mining. An essential undertaking for mining successive information is consecutive example mining, which finds arrangements of thing sets that as often as possible show up in a grouping database. In consecutive example mining, the determination of arrangements is by and large in light of the recurrence/bolster structure. Nonetheless, the vast majority of the examples returned by successive example mining may not be sufficiently educational to representatives and are not especially identified with a business objective. In perspective of this, high utility sequential pattern (HUSP) mining has risen as a novel research point in information mining as of late. The principle goal of HUSP mining is to separate important and valuable successive examples from information by considering the utility of an example that catches a business objective (e.g., benefit, client`s advantage). In HUSP mining, the objective is to discover successions whose utility in the database is no not as much as a client indicated least utility edge. Assembling arrange for which enables the company to expand its income, high utility example mining is an essential viewpoint. A lot of stream information identified with client buys conduct utilized for building up assembling design. Ongoing inclination of the clients likewise helps in producing fabricating plans. This review work contains a rundown structure and a novel calculation for producing high utility example over expansive information, based on Sliding Window Control Mode. This approach maintains a strategic distance from the age of hopeful example. Because of that calculation not required a lot of memory space and in addition computational assets for checking hopeful examples. Because of this current, it`s exceptionally proficient approach.
Key-Words / Index Term
Sliding window based utility pattern mining, Manufacturing plan, Industrial systems
References
[1] Yun, Unil, Gangin Lee, and Eunchul Yoon. "Efficient High Utility Pattern Mining for Establishing Manufacturing Plans with Sliding Window Control." IEEE Transactions on Industrial Electronics, 2017.
[2] R. Agrawal and R. Srikant. “Fast Algorithms for Mining Association Rules.” Proceedings of the 20th International Conference on Very Large Data Bases. [Online], 1994.
[3] C. Ahmed, S. Tanbeer, B.-S. Jeong and Y.-K. Lee. “Efficient Tree Structures for High Utility Pattern Mining in Incremental Databases.” IEEE Transactions on Knowledge and Data Engineering. [Online], 2009.
[4] C.-J. Chu, V. Tseng, and T. Liang. “An efficient algorithm for mining temporal high utility itemsets from data streams.” Journal of Systems and Software. [Online], 2008.
[5] P. Fournier-Viger, C.-W. Wu, S. Zida, and V. Tseng. “FHM: Faster High-Utility Item set Mining Using Estimated Utility Cooccurrence Pruning.” Proceedings of 21st International Symposium ISMIS. [Online], 2014.
[6] M. Liu and J. Qu. “Mining high utility item sets without candidate generation.” Proceedings of the 21st ACM international conference on Information and Knowledge management. [Online], 2012.
[7] Y. Liu, W. Liao, and A. Choudhary. “A Two-Phase Algorithm for Fast Discovery of High Utility Item sets.” Proceedings of 9th Pacific-Asia Conference PAKDD. [Online], 2005.
[8] X. Liu, J. Guan, and P. Hu. “Mining frequently closed item sets from a landmark window over online data streams.” Computer & Mathematics with Applications. [Online], 2009.
[9] V. Tseng, B.-E. Shie, C.-W. Wu, and P. Yu. “Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases.” IEEE Transactions on Knowledge and Data Engineering. [Online], 2013.
[10] Y. Takama and S. Hattori. “Mining Association Rules for Adaptive Search Engine Based on RDF Technology.” IEEE Transactions on Industrial Electronics. [Online], 2007.
[11] C. Ahmed, S. Tanbeer, B.-S. Jeong and Y.-K. Lee. “Efficient Tree Structures for High Utility Pattern Mining in Incremental Databases” IEEE Transactions on Knowledge and Data Engineering. [Online], 2009.
[12] C. Ahmed, S. Tanbeer, B.-S. Jeong, H.-J. Choi. “Interactive mining of high utility patterns over data streams. Expert Systems with Application [Online]. 2012.
Citation
S. M. V. Sirisha, V. MNSSVKR Gupta, "High Utility Sequential Pattern Mining over Data Streams with Sliding Window Control," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1327-1332, 2018.
On the Development of Credit Card Fraud Detection System using Multi-Agents
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1333-1343, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13331343
Abstract
The paper presents multi-agent techniques for fraud analysis. We present a mathematical model for credit card detection and compare different intelligent agents such as monitoring agents, collating agent, diagnosing agent and reporting agent. We tested agents as against cases of credit card fraud over time at different rates with which customer received fraud alerts, we discovered improvement in detecting a credit card fraud cases using multi-agents system. The credit card authentication techniques is weak and give room to unauthorised users to gain access to customers account and steal their money through online transactions. No single platform for credit card fraud detection + Intelligent Agents +Data Mining. The objective of this paper is to model a security system that will promote trust in communication channels by implementing hybrid technology that will combine both adaptive data mining and intelligent agents to authenticate the credit card transaction. The model was therefore recommended for implementation in use by Banks, financial agencies and government agencies for the security and diagnosis of credit card fraud. This shows that the performance of credit card fraud (CCF) detection using multi-agents is in agreement with other detection software, but performs 94% better.
Key-Words / Index Term
Multi-agents, credit card fraud, fraudulent transactions, data mining, confusion matrix & ROC curve
References
[1] Lee, W., Stolfo, S., & Mok, K. (2011). Adaptive Intrusion Detection: a Data mining Approach, Kulwer Academic Publishers.
[2] Singh Mandeep, Perminderpal Singh & Rajan Kumar (2014). Fraud detection by monitoring user behavior and activities. International Conference on Computer and Intelligent Systems, 6-14.
[3] Farvaresh, H., & Sepehri, M.M (2010). A Data Mining Framework for deleting Subscription Fraud in Telecommunication. Science Direct, Engineering Applications of Artificial intelligence. (24), 182-194.
[4] Quah, J.T.S., & Sriganesh, M. (2008). Real Time Credit Card Fraud detection using Computational Intelligence. Expert Systems with applications, 35(4), 112-118.
[5] Srivastava, J., & Raghubir, P. (2008). Monopoly Money, the Effect of Payment Coupling and form on spending behavior. Journal of Experimental Psycology, 27(4), 460-474
[6] Nabha, K., Neha, P., Shraddha, K., Suja, S., & Amol, P. (2015). Credit card fraud detection system using Hidden Markov Model and Adaptive Communal Detection. International Journal of Computer Science and Information Technologies, 6 (2), 1795-1797.
[7] Singh, H., & Rajan. (2014). Impact of information technology on Indian banking services. Proceedings of the 1st International Conference on Recent Advances in Information Technology, IEEE Xlore Press, Dhanbad, 662-665.
[8] Sahil Hak, Suraj Singh, & Varun Purohit. (2015). Credit card fraud detection using Advanced Combination Heuristic and Bayes’ Theorem. International Journal of Innovative Research in Computer and Communication Engineering. 3(4), 2756-2763
[9] Ekrem, D., & Mehmet Hamdi Ozcelik (2011). Detecting Credit Card fraud by genetic algorithms and scatter search. Expert Systems with applications: An International Journal, 38(10), 13057-13063.
Citation
Amanze B.C., Inyiama H.C, Onyesolu M.O, "On the Development of Credit Card Fraud Detection System using Multi-Agents," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1333-1343, 2018.
Stack improving optimization feed with multi core task display interface
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1344-1349, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13441349
Abstract
The real time embedded software development requires expertise for developing critical software. The safety critical embedded development has major concerns as the final target code should execute with less size and more speed. The increased stack size and reduced execution speed lowers the performance of embedded software. In the paper, a method to overcome the rapid growth of the stack is proposed and multicore load balancing issues are addressed. The model for stack improving optimization feed and multi core task balancing display interface is derived in the paper. A unique approach with the method of providing optimization hints during the development phase through interactive display interface is suggested in the paper. The experiment is conducted by considering a concave set of functions with a task dependency derivation cost. The best execution result being obtained by using stack, improving optimization feed interface.
Key-Words / Index Term
Embedded software, interactive, display interface, multicore task balancing, parallelism, programmer, optimization, task dependency
References
[1] Bahl, A. K.; Baltzer, O.; Rau-Chaplin, A.; and Varghese, B. (2012). Parallel Simulations for Analysing Portfolios of Catastrophic Event Risk. Workshop Proceedings of the International Conference of High Performance Computing, Networking, Storage and Analysis (SC12).
[2] Eigenmann, Rudol.; Hoeflinger, Jay.; and Padua, David, (1998). On the Automatic Parallelization of the Perfect Benchmarks. IEEE Transactions on Parallel and Distributed Systems, volume 9, number 1, January 1998, pages 5-23.
[3] Hall, Mary; Padua, David.; and Pingali, Keshav. (2009). Compiler Research: The Next 50 Years, FEBRUARY 2009 VOL. 52, COMMUNICATIONS OF THE ACM, pp. 60-67,
[4] Pennycook, S.J.; Hughes, C.J..; Smelyanskiy, M.; and A, S. (2013). Exploring SIMD for Molecular Dynamics Using Intel R Xeon Processors and Intel R Xeon PhiTMCoprocessors , Parallel Computing Lab, Intel Corporation, IEEE publication, 2013
[5] Contreas, G., and Martonosi, M. (2008) Characterizing and improving the performance of Intel threading building blocks. In 4th International Symposium on Workload Characterization (IISWC 2008), Seattle, Washington, USA, September 14- 16, 2008 (2008), pp. 57–66
[6] DeVito, Zachary.; Hegarty, James.; Aiken, Alex.; Hanrahan, Pat.; and Vitek, Jan. (2013). Terra: A Multi-Stage Language for High Performance Computing PLDI13 June 16-22, 2013, ACM
[7] Nethercote, Nicholas; Seward, Julian. (2007). "Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation". Proceedings of ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation (PLDI 2007).
[8] Graham, Susan L.; Kessler, Peter B.; and Mckusick, Marshall K.(1982). gprof: a Call Graph Execution Profiler, Proceedings of the SIGPLAN `82 Symposium on Compiler Construction, SIGPLAN Notices, Vol. 17, No 6, pp. 120-126
[9] Sapinderjit Kaur, Kirandeep. Kaur, Amit.Chhabra, Parallel Job Scheduling Using Grey Wolf Optimization Algorithm for Heterogeneous Multi-Cluster Environment, International Journal of Computer Sciences and Engineering (IJCSE), Volume 5, Issue 10, E-ISSN: 2347-2693, Oct 2017, pp 44-53.
[10] Vasiliu, Laura.; Pop, Florin.; Negru, Catalin.; and Mocanu, Mariana, (2017). A hybrid scheduler for many task computing in big data systems. Int. J. Appl. Math. Comput. Sci., 2017, Vol. 27, No. 2, m`, 385–399
[11] Chmaj, G.; Walkowiak, K.; Tarnawski, M.; and Kucharzak, M.(2012). Heuristic algorithms for optimization of task allocation and result distribution in peer-to-peer computing systems, International Journal of Applied Mathematics and Computer Science 22(3): 733–748,
[12] Ró˙zycki, R.; Waligóra, G.; and Weglarz, J.(2016). Scheduling preemptable jobs on identical processors under varying availability of an additional continuous resource, International Journal of Applied Mathematics and Computer Science 26(3): 693–706,
[13] Mathwork’s Simulink Tool R2017b (2017). Generate C and C++ code optimized for embedded systems, MathWorks.
[14] Fritzson, Peter.; Bachmann, Bernhard.; Moudgalya, Kannan,; Casella, Francesco.; Lie, Bernt.; Kofranek, Jiri,.; Haumer, Anton,.; Geusen, Christoph.Nytsch.; and Vanfretti, Luigi (2017). Introduction to Modelica with Examples in Modeling Technology, and Applications, Modelica Publication, 2017
[15] Frenkel, Jens.; Schubert, Christian.; Kunze, Günter.; Fritzson, Peter .; Sjölund , Martin.; and Pop, Adrian (2011).Towards a Benchmark Suite for Modelica Compilers: Large Models, 8th International Modelica Conference - Dresden, Germany - 20-22 March 2011, ISBN: 978-91-7393-096-3
[16] Seidewitz, Papyrus.Ed (2015). Tool Paper: Combining Alf and UML in Modeling Tools – An Example with Model Driven Solutions, A specification by CEA, LIST.
[17] Roy, Nilabja.; Dabholkar, Akshay.; Hamm, Nathan.; Dowdy, Larry.; and Schmidt, Douglas (2008). Modeling Software Contention Using Colored Petri Nets, MASCOTS 2008, Baltimore, MD, USA
[18] Amann, S.; Proksch, S.; and Nadi, S (2016). FeedBaG: An Interaction Tracker for Visual Studio, In Proceedings of the 24th International Conference on Program Comprehension Tool Track, 2016
[19] Vogel, Lars (2013). Eclipse IDE: Java programming, debugging, unit testing, task management and Git version control with Eclipse (3rd ed.). Leipzig: Vogella. ISBN 978-3943747041.
[20] Gonnet, Pedro.; Schallery, Matthieu.; Theunsyz, Tom.; and Chalk Aidan B. G. (2013). SWIFT - Fast algorithms for multi resolution SPH on multi core architectures, 8th international SPHERIC workshop Trondheim, Norway, June 4-6, 2013
[21] Rutar, Nick.; Almazan, Christian. B.; and Foster, Jeffrey.S (2004), "A Comparison of Bug Finding Tools for Java". ISSRE `04 Proceedings of the 15th International Symposium on Software Reliability Engineering, IEEE
[22] Saunders, Stephen; Fields, Duane K.; Belayev, Eugene (March 1, 2006), IntelliJ IDEA in Action (1st ed.), Manning, p. 450, ISBN 1-932394-44-3
[23] Neumann, Dean.; Kulkarni, Dileep.; Kunze, Aaron.; Rogers, Gerald.; Verplanke, Edwin. (August 2006). Intel Virtualization Technology in Embedded and Communications Infrastructure Applications, Intel Technology Journal of application of virtualization to embedded systems.
[24] Bodin, Francois.; Chamski, Zbigniew.; Eisenbeis, Christine.; Rohou, Erven.; and Seznec, Andre. (1997). Salto: GCDS, A Compiler Strategy for Trading Code Size Against Performance in Embedded Applications, systems Pro jet CAPS Publication internet ,1153 ,December 1997, from https://hal.archives-ouvertes.fr/inria-00073718/document
[25] Deepali Simaiya, Raj Kumar Paul, “Review of Various Performcae Evaluation Issues and Efficient Load Balancing for Cloud Computing” IJSRCSEIT, Mar-Apr;3(3) :pp. 943-951, 2018
[26] Abdullah, Loai.; and Shinshoni, Lian. (2016). Look Ahead Selective Sampling for Incomplete Data, International Journal of Applied Mathematics and Computer Science., 2016, Vol. 26, No. 4, 871–884
[27] Falco, I. De.; Laskowski, E.; Olejnik, R.; Scafuri1, U.; Tarantino, E.; Tudruj, M. (2013). Load Balancing in Distributed Applications Based on Extremal Optimization, Applications of Evolutionary Computation, Springer Verlag (Ed.) (2013) pp. 52-61
[28] Korte, Bernhard.; and Vygen, Jens.(2006). Bin-Packing, Combinatorial Optimization: Theory and Algorithms, Algorithms and Combinatorics 21, Springer, pp.426–441, ISBN 978-3-540-25684-7
Citation
Sumalatha Aradhya, N.K. Srinath, "Stack improving optimization feed with multi core task display interface," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1344-1349, 2018.
Implementation of Optical Character Recognition Using Machine Learning
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1350-1356, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13501356
Abstract
With the passing of time, the realm of human knowledge is ever expanding. Further, with each passing day, we witness the explosion of information which is evident in life style, social events and breakthrough in medical science. The human beings from time memorial have attempted to preserve the information for posterity by adopting various forms starting with pictorial forms in stone carvings and subsequently recorded in palm leafs, metal sheets, as well as leather sheets. With the invention of paper and subsequent electronics, the information is recorded with ease and could be transferred to any corner of world within seconds, but modern technology, facilitating electronic preservation of information faced a challenging task of gigantic and herculean proportion while it preserving information, voluminous in quantity, recorded on papers, from preceding centuries, into electronic form. The same became more difficult with numerous languages spoken and written by people from every corner of the world. Adoption of Optical Character Recognition (OCR), producing editable text out of text image documents, has reduced the problem to a great extent. Even though, the OCR is fairly advanced in major languages like English, French etc. Various random images are taken for simulation then accuracy is measured to conclude the efficiency of the OCR system.
Key-Words / Index Term
Optical Character Recognition (OCR), Editable Text, Modern Technology, Feature Extraction
References
[1]. Vishal Chourasia, Dr. Sanjay Silakari, Dr. Rajeev Pandey, "A Survey Paper on Optical Character Recognition using Machine Learning ", International Journal of Computer Technology and Applications, ((IJCTA)Vol 9(3), 160-164 ,2018
[2]. Tao Wang, David J. Wu, Adam Coates, Andrew Y. Ng, "End-to-End Text Recognition with Convolutional Neural Networks" Stanford University, CA 94305.2013
[3]. Aayushi Jain, Nitish Joshi, MayureshKhendkar “Implementation of OCR Based on Template Matching and Integrating in Android Application(IJCSE)-04, Issue-02, 2016
[4]. R. Smith, “An overview of the Tesseract OCR Engine”, Proc 9th Int. Conf. on Document Analysis and Recognition, IEEE, Curitiba, Brazil, Sep 2007, pp629- 633.
[5]. Ankush Gautam, "Segmentation of Text from Image Document", International Journal of Computer Science and Information Technologies, Vol. 4, Issue 3, pp. 538-540, 2013.
[6]. P.B. Pati, S. Sabari Raju, N. Pati, A. G. Ramakrishnan, "Gabor filters for document analysis in Indian bilingual documents", International Conference Intelligent Sensing and Information Processing, pp. 123- 126, 2004.
[7]. Ranjeet Srivastava., Ravi Kumar Tewari., Shashi Kant., "Separation of machine printed and handwritten text for Hindi documents", International Research Journal of Engineering and Technology (IRJET), Vol. 2, Issue 2, pp. 704--708, 2015.
[8]. Saba, Tanzila, Amjad Rehman, Mohamed Elarbi-Boudihir, "Methods and strategies on off-line cursive touched characters segmentation: a directional review", Artificial Intelligence Review, Vol. 42, Issue 4, pp. 1047-1066, 2014.
[9]. Anil R, Arjun Pradeep, Midhun E.M, Manjusha K., "Malayalam Character recognition using singular value decomposition", International Journal of Computer applications, Vol. 92, Issue 12, pp.6-11, 2014.
[10]. Apurva A. Desai, "Gujarati handwritten numeral optical character reorganization through neural network", Pattern Recognition, Vol. 43, Issue 7, pp. 2582–2589, 2010.
Citation
Vishal Chourasia, Sanjay Silakari, Rajeev Pandey, "Implementation of Optical Character Recognition Using Machine Learning," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1350-1356, 2018.
A Sequential, Secured and Sharable Data Storage Approach for Cloud Services
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1357-1361, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13571361
Abstract
As Cloud computing is getting prevalent step by step, Cloud service providers need to take care of their systems with the policies which may lead to better execution and additionally privacy and consistency. According to the volume of users gets expanded, the framework makes more surface area for security attacks. Yet at the same time there are some issues related to privacy of the information, sorting the implicit fragmentation, and under encoding (compression) and so forth. This work recommends a simplified standard based distributed information privacy and consistency for cloud computing. Here, at the analytical level of evaluation, this approach is serving everything the needs of effective privacy and consistency mechanism and later prototype will legitimize the same.
Key-Words / Index Term
Cloud computing, Data Security Confidentiality, Integrity, information privacy consistency, Encryption, Compression, Virtual Machine, Fragmentation
References
[1]. Guilherme Sperb Machado, Thomas Bocek, Michael Ammann, Burkhard Stiller “A Cloud Storage Overlay to Aggregate Heterogeneous Cloud Services” 38 Annual IEEE conference on local computer network 2013
[2]. Ming Li, Utah State University Shucheng Yu, University of Arkansas at Little Rock Kui Ren, University at Buffalo Toward Privacy-Assured and Searchable Cloud Data Storage Services 2013 IEEE IEEE Network • July/August 2013
[3]. Dejun Wang An Efficient Cloud Storage Model for Heterogeneous Cloud Infrastructures © 2011 Published by Elsevier Ltd.
[4]. Guilherme Sperb Machado, Thomas Bocek, Michael Ammann, Burkhard Stiller “PiCsMu: A System to Aggregate MultipleHeterogeneous Cloud Services’ Storage” 38 Annual IEEE conference on local computer network 2013
[5]. Amazon.com Web Services: Products and Services. Available at:
aws.amazon.com/products. Last visited on: March 2013.
[6]. Dropbox: Dropbox Service. Available at: dropbox.com. March 2013.
[7]. Google Corporate: Google Products and Solutions. Available at:http://google.com/intl/en/about/products/. Last visited at: March 2013.
[8]. ID3 Website: ID3 Version 2 Standard. Available at: id3.org. May 2013.
[9]. JSON-RPC Website Specification: A Light Weight Remote ProcedureCall Protocol, Specification 2.0. Available at: jsonrpc.org. April 2013.
[10]. V. I. Levenshtein: Binary Codes Capable Of Correcting Deletions,Insertions And Reversals. Soviet Physics Doklady, Vol. 10, No. 8,February 1966, pp. 707-710.
[11]. Microsoft: SkyDrive, Files Anywhere. http://skydrive.com. March 2013.
[12]. OAuth Specification: OAuth 2.0 Specification. Available at:http://oauth.net/2. Last visited on: March 2013.
[13]. Otixo: All Your Cloud Files from a Single Login. Available at:http://otixo.com. Last visited on: March 2013.
[14]. PiCsMu Website: Platform-independent Cloud Storage System forMultiple Usage. Available at: http://www.pics.mu , May 2013.
[15]. SalesForce.com: The Leader of Customer Relationship Management(CRM) and Cloud Computing. Available at: http://www.salesforce.com.Last visited on February 2010.
[16]. Broberg J, Venugopal S, Buyya R. Market-oriented grids and utility computing: the state-of-the-art and future directions.Journal of Grid Computing 2008, 6(3):255–76.
[17]. Open Grid Forum. Cloud Storage for Cloud Computing, Storage Networking Industry Association.http://www.snia.org/cloud/CloudStorageForCloudComputing.pdf.2009.
[18]. Erickson, J. S., Spence, S., Rhodes, M., Banks, D., Rutherford, J., Simpson, E., et al. Content-Centered Collaboration Spacesin the Cloud. IEEE Internet Computing, 2009, 13(5), 34-42.
[19]. Grossman, R. L., Gu, Y. H., Sabala, M., & Zhang, W. Z.. Compute and storage clouds using wide area high performance networks. Future Generation Computer Systems-the International Journal of Grid Computing Theory Methods and Applications, 2009, 25(2), 179-183.
[20]. Y. Deng, F. Wang, A heterogeneous storage grid enabled by grid service, SIGOPS Oper. Syst. Rev. 2007, 41 (1): 7–13.
Citation
Deepika Verma, Ajitabh Mahalkari, "A Sequential, Secured and Sharable Data Storage Approach for Cloud Services," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1357-1361, 2018.
A Literature Survey on Wireless Sensor Network in Home Automation Based on Internet of Things
Survey Paper | Journal Paper
Vol.6 , Issue.6 , pp.1362-1368, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13621368
Abstract
The hustling lives in today’s fast pace era has led to people undergoing stress with less time and more responsibilities. With the emergence of digitization, the above problem is approached with the solution of home automation. Home automation alludes to the controlling of home, which includes home appliances, home environment, home safety, home energy, and other domestic features, remotely or by the means of local networking, and it is gaining popularity at a very rapid rate today as it offers numerous benefits to its users such as time saving, cost saving, decreased stress, better immunity, better self-productivity and self-efficiency. Home automation can be efficiently achieved by the Internet of Things, which is a framework wherein physical objects are interconnected via the Internet to form a dynamic network infrastructure. Due to its synergistic and minimal effort nature, Wireless Sensor Network (WSN) brings noteworthy favourable circumstances over conventional communication techniques utilized as a part of the present IOT framework. This paper presents a detailed study of various smart home systems that are built on the IOT framework using Wireless Sensor Networks (WSNs) wherein the interconnected multiple devices including home appliances and various sensors such as temperature sensor, fire sensor, safety sensors etc., are monitored and controlled through a single or multiple smart device/s such as smart phone, laptop etc. either locally or remotely by the user. The heterogeneity of home automations is indicated in this survey in which various technologies that have been considered are ZigBee protocol, cloud computing, wearable sensors, and android-based and arduino-uno microcontroller based protocols.
Key-Words / Index Term
Home Automation, Internet of Things (IOT), Wireless Sensor Networks (WSNs), Smart Home, ZigBee, Cloud, Arduino
References
[1]. Pallavi Ravindra Joshi, Prof. M S khan, “IOT Based Smart Power Management System Using WSN”, International Research Journal of Engineering and Technology (IRJET), Volume 4, Issue No. 6, June 2017.
[2]. Vikram.N, Harish K.S, Nihaal M.S, Raksha Umesh, Shetty Aashik, Ashok Kuma, “A Low Cost Home Automation System Using Wi-Fi Based Wireless Sensor Network Incorporating Internet of Things(IoT)”, 2017 IEEE 7th International Advance Computing Conference, 13 July 2017.
[3]. Sandeep Pirbhulal,Heye Zhang,Md Eshrat E Alahi, Hemant Ghayvat, Subhas Chandra Mukhopadhyay, Yuan-Ting Zhang, Wanqing Wu, “A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network”, Sensors (Basel), 30 December, 2016.
[4]. Pooja N.Pawar, Shruti Ramachandran, Nisha P.Singh, Varsha V.Wagh, "A home automation system using Internet of Things", International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, Issue 4, April 2016
[5]. Vinod Choudhary, Aniket Parab, Satyajeet Bhapkar, Neetesh Jha, Ms. Medha Kulkarni, “Design and Implementation of Wi-Fi based Smart Home System”, International Journal Of Engineering And Computer Science, Volume 5, Issue No.2, 02 February, 2016
[6]. Franco Cicirelli, Giancarlo Fortino, Andrea Giordano, Antonio Guerrieri, Giandomenico Spezzano, Andrea Vinci, “On the Design of Smart Homes: A Framework for Activity Recognition in Home Environment”, Springer Science+Business Media New York, 12 July 2016
[7]. Hemant Ghayvat, Subhas Mukhopadhyay, Xiang Gui and [10er Suryadevara, "WSN- and IOT- Based Smart Homes and Their Extension to Smart Buildings", Sensors (Basel), 04 May, 2015
[8]. Vinay Sagar K N, Kusuma S M, "Home Automation using Internet of things", International Research Journal of Engineering and Technology (IRJET), Vol. 2, Issue 3, June 2015
[9]. Nagender Kumar Suryadevara, Subhas Chandra Mukhopadhyay, Sean Dieter Tebje Kelly, and Satinder Pal Singh Gill, “WSN-Based Smart Sensors and Actuator for Power Management in Intelligent Buildings”, IEEE, 14 January, 2016.
[10]. Ashwini.R, Mrs. Pooja Mohnani, “Application of Wireless Sensor Network in Home Automation”, International Journal of Computer & Organization Trends, Volume 9, June 2014
[11]. Keyur K Patel, Sunil M Patel, “Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges”, International Journal of Engineering Science and Computing, Volume 6 Issue No. 5, May 2016.
[12]. Shagufta Rajguru, Swati Kinhekar, Sandhya Pati, “Analysis of Internet of Things in a Smart Environment”, International Journal of Enhanced Research in Management & Computer Applications, Vol. 4 Issue 4, April-2015.
[13]. John A. Stankovic, “Research Directions for the Internet of Things”, IEEE, 2014.
[14]. “Wireless Sensor Network”, https://en.wikipedia.org/wiki/Wireless_sensor_network, Accessed: 23 December 2017, 09:20.
[15]. M.U. Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi, Talha Kamal, “A Review on Internet of Things (IoT)”, International Journal of Computer Applications, Volume 113 - No. 1, March 2015.
[16]. Lalit Mohan Joshi, “Research paper on IOT based Air and Sound Pollution Monitoring System”, International Journal of Computer Applications, Volume 178 – No.7, November 2017.
[17]. Anitha A, “Home security system using internet of things”, International Conference on E-Society, E-Education and E-Technology 14th ICSET, 2017.
[18]. M. Chengathir Selvi, T. D. Rajeeve, A. John Paul Antony, T. Pratibha, “Wireless sensor based healthcare monitoring system using cloud”, IEEE, 16 October 2017.
[19]. Insung Hong, Sunghoi Park, Beomseok Lee, Jaekeun Lee, Daebeom Jeong, and Sehyun Park, “IoT-Based Smart Garbage System for Efficient Food Waste Management”, The Scientific World Journal, Volume 2014, 28 August 2014.
Citation
Shweta Manda, Yashashwita Shukla, Kritika Shrivastava, T.B. Patil, S.T. Sawant-Patil, "A Literature Survey on Wireless Sensor Network in Home Automation Based on Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1362-1368, 2018.
Design and Analysis of A Secure Online Monitoring of Engineering Works By A.P Tourism Development Corporation
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1369-1375, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13691375
Abstract
Tourism is considered as the interval for pleasure or business and also in terms of touring it is termed as the business of attracting, accommodating, and entertaining tourists. This may be available within the same country or outside the country may be international. It is also described as an engine of development and a catalyst to economic prosperity of a state. Now a day’s tourism became a major importance in the modern era for carrying immense importance. As we all know all the works that takes place in any tourism are done manually in certain hours of time, but there is no work done round the clock. So in this proposed work ,we try to construct a system to monitor all the engineering works in Andhra Pradesh state and try to find out the working status as they were completed or still in progress or not yet commenced based on the appropriate financial year. Some of the engineering work sources are CFA(Central Fund Assistance),GOAP Funds(State),LTW(Local Tourism Works) and major other components like Capital component, complimentary component and maintenance components etc.All the works are sanctioned with certain amounts for that particular projects based on individual district wise and state wise. By designing this proposed application, the govt of AP try to promote a steady and sustained growth of the travel and tourism sector for making the destinations more accessible, more attractive with many facilities for the tourists worldwide.
Key-Words / Index Term
Tourism, Engineering Works, Central Fund Assistance, Capital Components
References
[1]. Rachel Sugar (19 December 2016). "More tourists visited NYC in 2016 than ever before". Vox Media. Retrieved 24 April 2018.
[2]. "tourism". Oxford English Dictionary (3rd ed.). Oxford University Press. September 2005. (Subscription or UK public library membership required.
[3]."UNWTO technical manual: Collection of Tourism Expenditure Statistics" (PDF). World Tourism Organization. 1995. p. 10. Archived from the original (PDF) on 22 September 2010. Retrieved 26 March 2009.
[4]. "The Growing Importance of Tourism in the Global Economy and International Affairs". journal.georgetown.edu. Retrieved 9 April 2017.
[5]. "International tourism challenged by deteriorating global economy" (PDF). UNWTO World Tourism Barometer. World Tourism Organization. 7 (1). January 2009. Archived from the original (PDF) on 17 October 2013. Retrieved 17 November 2011.
[6] Manila Declaration on World Tourism (PDF). World Tourism Conference. Manila, Philippines. 10 October 1980. pp. 1–4. Archived from the original (PDF) on 20 November 2012.
[7] "2012 Tourism Highlights" (PDF). UNWTO. June 2012. Archived from the original(PDF) on 9 July 2012. Retrieved 17 June 2012.
[8] Theobald, William F. (1998). Global Tourism (2nd ed.). Oxford [England]: Butterworth–Heinemann. pp. 6–7. ISBN 0-7506-4022-7. OCLC 40330075.
[9] Spode, Hasso (1998). "Geschichte der Tourismuswissenschaft". In Haedrich, Günther. Tourismus-management: Tourismus-marketing Und Fremdenverkehrsplanung (in German). Berlin: [u.a.] de Gruyter. ISBN 3-11-015185-5. OCLC 243881885.
[10] "Recommendations on Tourism Statistics" (PDF). Statistical Papers. M. New York: United Nations (83): 5. 1994. Retrieved 12 July 2010.
[11] "Member States – Regional Programme for Europe".
[12] "Global Destination Cities Index" (PDF). Mastercard. 2016.
[13] "MasterCard 2015 Global Destination Cities Index" (PDF). MasterCard. June 2015. Retrieved 5 July 2015.
[14] "World`s most visited cities". CNN. 3 March 2015.
[15] "Top 100 City Destinations Ranking". Euromonitor International. 27 January 2015.
Citation
Aruna Kumari Samsani, P. Krishna Subbarao, "Design and Analysis of A Secure Online Monitoring of Engineering Works By A.P Tourism Development Corporation," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1369-1375, 2018.
Performance Evaluation of Fuzzy C Mean Clustering on Social Media Data Set
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1376-1380, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13761380
Abstract
As we all know that in recent days social media play’s a very prominent role for sharing human social behaviors and participation of multi users in the network. This social media greatly increased the user’s interest in posting various updates of them which happened in and around the world. This social media will also create a facility to study and analyze the general behavior of human to process the large stream of data which is available on the social media database. Till now there are several primitive algorithms that are available in the literature regarding the clustering of user’s interest on social media but they failed to achieve in reducing the time complexity. In this proposed application we for the first time have designed a novel fuzzy c means clustering algorithm for grouping related information of users. By implementing this proposed algorithm and comparing with several primitive algorithms, we can get best group result and also reduce error rate for generating cluster groups
Key-Words / Index Term
Clustering, Social Media, Fuzzy C Means, Grouping Messages, Time Complexity
References
[1] J´erˆome Kunegis, Andreas Lommatzsch, and Christian Bauckhage. The slashdot zoo: mining a social network with negative edges. In Proceedings of the 18th international conference on World wide web, pages 741–750. ACM, 2009.
[2] Andreas M Kaplan and Michael Haenlein. Users of the world, unite! the challenges and opportunities of social media. Business horizons,53(1):59–68, 2010.
[3] Bogdan Batrinca and Philip C Treleaven. Social media analytics: a survey of techniques, tools and platforms. AI & SOCIETY, 30(1):89–116, 2015.
[4] Claudio Cioffi-Revilla. Computational social science. Wiley Interdisciplinary
Reviews: Computational Statistics, 2(3):259–271, 2010.
[5] David Lazer, Alex Sandy Pentland, Lada Adamic, Sinan Aral, Albert Laszlo Barabasi.
[6] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. ACM,2010.
[7] Harry Halpin, Valentin Robu, Hana Shepherd The Complex Dynamics of Collaborative Tagging, Proceedings 6th International Conference on the World Wide Web (WWW`07), Banff, Canada, pp. 211-220, ACM Press, 2007.
[8] Eytan Bakshy, Jake M Hofman, Winter A Mason, and Duncan J Watts. Everyone’s an influencer: quantifying influence on twitter. In Proceedings of the fourth ACM international conference on Web search and data mining, pages 65–74. ACM, 2011.
[9] Valentin Robu, Harry Halpin, Hana Shepherd Emergence of consensus and shared vocabularies in collaborative tagging systems, ACM Transactions on the Web (TWEB), Vol. 3(4), article 14, ACM Press, September 2009.
[10] Kintsch, W. (1988). The role of knowledge in discourse comprehension: A construction-integration model. Psychological Review, 95, 163–182.
[11] Ando, T. (2010), Bayesian Model Selection and Statistical Modeling,
[12] D. Pedreschi, S. Ruggieri, and F. Turini, “Discrimination-Aware Data Mining,” Proc. 14th ACM Int’l Conf. Knowledge Discovery and Data Mining (KDD ’08), pp. 560-568, 2008.
Citation
Kothapalli Revathi, Chalumuri Avinash, "Performance Evaluation of Fuzzy C Mean Clustering on Social Media Data Set," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1376-1380, 2018.
Early Detection of Glaucoma using Perimetry
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1381-1385, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.13811385
Abstract
Glaucoma refers to a diseases characterized by optic neuropathy, specific pattern of visual field, raised intraocular pressure. Glaucoma is the second leading cause of blindness. Visual field testing is a subjective method, but yet a very important part for diagnosis & in follow-up of ocular or neurological diseases. Standard automated perimetry or white-on-white perimetry is state of the art for the visual field examination of glaucoma patients. Careful instructions & supervision of the patient help to achieve high quality results. The purpose of this work is to develop a new family of test algorithm such as Swedish interactive thresholding algorithm (SITA) for computerized static threshold perimetry which significantly reduces test time without any reduction of data quality. A comprehensive visual field model constructed from available knowledge of normal & glaucomatous visual field is continuously updated during testing. The main components of the system are push button, PIC microcontroller, bluetooth module, android phone to display output results. Android app mainly consist of number of screens which contain patient data, test selection according to age group, 76 led glow randomly & output screen.
Key-Words / Index Term
Glaucoma, Standard automated perimetry, SITA, Visual Field(VF)
References
[1]D.Hensonet.al, “Perimetry”, Elsevier journal, Encyclopaedia of the Eye, pp.300-306, 2010
[2] Ahmad A. Aref et.al, “Detecting Visual Field Progression”, Elsevier journal American Academy of Ophthalmology, vol.124, Issue.12, pp-s51-s56,2017
[3] Andrew S. Camp et.al,“Will Perimetry Be Performed to Monitor Glaucoma in 2025”,Elsevier journal, American Academy of Ophthalmology,Vol.124,Issue.12,pp-s71-s75, 2017
[4] Ron Chibel et.al, “Chromatic Multifocal Pupillometer for Objective Perimetry and Diagnosis of Patients with Retinitis Pigmentosa ”, Elsevier journal, American Academy of Ophthalmology,vo.123, Issue.9,pp-1898-1911,2016
[5] Christoph et.al, “Tonometry through the ages”, Elsevier journal, Survey of ophthalmology, vol.53, Issue.6, pp-568-591, 2008
[6] Kazunori Hirasawa et.al,“Evaluation of stimulus velocity in automated kinetic perimetry in young healthy participants” Elsevier journal, Department of Ophthalmology, vol. 98,pp 83-88, 2014
[7] Addepalli U. Kumar et.al, “Agreement of glaucoma specialists and experienced optometrists in gonioscopy and optic disc evaluation”, Elsevier journal of optometry, vol. 6, Issue.4, pp 212-218, 2013.
[8] George L. Spaeth et.al, “Imaging of the optic disc in caring for patients with glaucoma: ophthalmoscopy and photography remain the gold standard ”, Science Direct Journal,Survey of ophthamology, vol.59, Issue.4,pp 454-458, 2014
[9] Charles W. Mcmonnies et.al, “Glaucoma history and risk factors”, Elsevier Journal of Optometry, vol.10, issue.2, pp 71-78, 2017
[10] G.L. Scuderi et.al, “Standard automated perimetry and algorithms for monitoring glaucoma progression” Elsevier, vol. 173, pp 77-99, 2008
[11] Andrew J. Anderson et.al, “Can Home Monitoring Allow Earlier Detection of Rapid Visual Field Progression in Glaucoma?”, Elsevier journal, American Academy of Ophthalmology, vol. 124, Issue 12,pp1735-1742, 2017.
[12] Robert H. Spector, “Visual Fields”, Butterworths publishers, Boston,pp. 565-572,1990.
[13] J.Kanimozhi, P.Vasuki, S.Mohamed Mansoor Roomi, “Iterative vessel segmentation with stopping criterion for fundus imagery”, International journal of scientific research in network security and communication, vol. 6, Issue 3, pp6-12, 2018.
[14] A.K.Gupta, S.Gupta, “Neural Network Through Face Recognition”, International journal of scientific research in computer science and engineering, vol 6, Issue 2, pp38-40, 2018.
Citation
N.S. Mule, S.M. Jagdale, "Early Detection of Glaucoma using Perimetry," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1381-1385, 2018.