A Novel Framework for Image Dehazing
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1398-1403, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13981403
Abstract
Image dehazing is a method to improve the images gained in poor weather conditions, for example, haze and dimness. Existing image dehazing strategies are principally in view of dark channel prior. Since the dark channel isn`t sensible for sky regions, a sky division and area wised medium transmission based image dehazing strategy is proposed in this paper. Right off the bat, sky regions are divided by quad-tree part based component pixels location. At that point, a medium transmission estimation strategy for sky regions is proposed in view of shading trademark perception of sky regions. The medium transmission is then separated by an edge saving guided channel. At long last, in light of the evaluated medium transmission, the hazed images are reestablished. Exploratory outcomes show that the execution of the proposed strategy is superior to that of existing techniques. The reestablished image is more regular, particularly in the sky regions.
Key-Words / Index Term
Image dehazing, image segmentation, dark channel prior
References
[1] Y. K. Wang, and C. T. Fan, “Single image defogging by multiscale depth fusion,” IEEE Trans. Image Process., vol. 23, no. 11, pp. 4826- 4837, Nov. 2014.
[2] I. Yoon, S. Kim, D. Kim, M. H. Hayes, and J. Paik “Adaptive defogging with color correction in the HSV color space for consumer surveillance system,” IEEE Trans. Consum. Electron., vol. 58, no. 1, pp. 111-116, Feb. 2012.
[3] Y. Xu, J. Wen, L. Fei, and Z. Zhang, “Review of video and image defogging algorithms and related studies on image restoration and enhancement,” IEEE Access, vol. 4, pp. 165-188, Mar. 2016
[4] R. T. Tan, “Visibility in bad weather from a single image,” in Proc. Of IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 1–8, Jun. 2008, Anchorage, Alaska.
[5] Y. Y. Schechner, S. G. Narasimhan, and S. K. Nayar, “Polarizationbased vision through haze,” Appl. Opt., vol. 42, no. 3, pp. 511–525, 2003.
[6] K. He, J. Sun, and X. Tang, “Single image haze removal using dark channel prior,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 12, pp.2341-2353, Dec. 2011.
[7] Y. Zhu, J. Liu, and Y. Hao, “A single image dehazing algorithm using sky detection and segmentation,” in Proc. of IEEE Int. Congr. Image Signal Process. (CISP), pp. 248-252, Oct. 2014. Dalian, China.
[8] K. B. Gibson, D. T. Vo, and T. Q. Nguyen, “An investigation of dehazing effects on image and video coding,” IEEE Trans. Image Process., vol.21, no.2, pp. 662-673, Feb. 2012.
[9] U.S. Department of Transportation Federal Highway Administration. http://ops.fhwa.dot.gov/Weather/
[10] National Highway Traffic Safety Administration. http://www. nhtsa.gov/
[11] Siogkas, G.K., Dermatas, E.S.: Detection, tracking and classification of road signs in adverse conditions. In: IEEE MELECON, pp. 537–540 (2006)
[12] Garg, K., Nayar, S.K.: Vision and rain. Int. J. Comput. Vis. 75(1), 3–27 (2007)
[13] Roser, M., Moosmann, F.: Classification of weather situations on single color images. In: IEEE Intelligent Vehicles Symposium, pp. 798–803. Eindhoven (2008)
[14] Narasimhan, S.G., Nayar, S.K.: Vision and the atmosphere. Int. J. Comput. Vis. 48(3), 233–254 (2002)
[15] Narasimhan, S.G., Nayar, S.K.: Shedding light on the weather. In: International Conference on Com Computer Vision and, Pattern Recognition, pp. 665–672 (2003)
[16] Narasimhan, S.G., Nayar, S.K.: Contrast restoration of weather degraded images. IEEE Trans. Pattern Anal. Mach. Intell. 25(6), 713–724 (2003)
[17] Narasimhan, S.G., Nayar, S.K.: Interactive (De) weathering of an image using physical models. In: IEEE Workshop on Color and Photometric Methods in Computer Vision, in conjunction with ICCV (2003)
[18] Schechner, Y.Y., Narasimhan, S.G., Nayar, S.K.: Instant dehazing of images using polarization. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 325–332 (2001)
Citation
D. Bhagya Sree, "A Novel Framework for Image Dehazing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1398-1403, 2018.
Intimate Web Reversion Based on Framework in addition Gratified Keywords through Potential Criticism
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1404-1410, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.14041410
Abstract
Individual web reversion on programs is a typical yet uneasy assignment for consumers since of the extensive volume of website pages taken in day by day life. Enlivened through the human memory and its common review qualities, we construct an individual web reversion device, WebPrev, to encourage clients to return to past site pages through related memory signals. To impersonate clients` wordy memory review, we show an approach to naturally produce a wealth of related logical metadata (e.g., Date, Location, Activity) and compose them as setting tree for every website page in an existence cycle. Popular the time being, web content (e.g., theme name, point catchphrases and so on.) is extricated and overseen in a weighted term list, which relates to semantic memory In this paper we examine about some writing that, how critical for return to the website pages in web programs and we talk about what techniques is utilized as chunk of calligraphy. In this overview different information mining ideas are viewed as: Gesture Navigation, Linear History Display, Episodic memory, Memento and Youpivot
Key-Words / Index Term
WebPrev, Gesture Navigation, Linear History Display, Episodic memory, Memento and Youpivot
References
[1]J. Hailpern, K. Karahalios,R. Sesek, N. Jitkoff and A. Warr, N. “Shkrob. Youpivot: improving recall with contextual search. In CHI, pages 1521–1530, 2011”.
[2] S. Greenberg.And S. Kaasten“Integrating back, history and bookmarks in web browsers. In HCI, pages 379–380, 2001”.
[3] R. Udupa andC. E. KulkarniS. Raju Memento: “unifying content and context to aid webpage re-visitationin UIST, pages 435–436”,
[4] S. Greenberg, A. Cockburn, B. Mckenzie,S. Jones, and M. Moyle. “Improving web page revisitation: analysis, design and evaluation”. IT & Society, 1(3):159–183, 2003.
[5] Rizzo, F. et al. “Evaluating the semantic memory of web interactions in the xMem project, In Proc. AVI 2006”.
[6]Kawase,E. Herder,W. Nejdl.G. Papadakis, and E. Herder“Beyond theusual suspects: context-aware revisitation support. In HT, pages”27–36, 2011.
[7]H. Wang, L. Feng, H. Wang, Q. Liu, T. Deng, and L. Zhao“Refinder:a context-based information re-finding system. IEEE TKDE,25(9):2119–2132, 2013”.
[8] J. A. Gamez, J. L. Mateo, “Ameliorating revisitation browsers capability by utilizing a dynamic bookmarks personal toolbar” J. M. Puerta.
Citation
Talari Jyothsna, P.Venkateswara Rao, "Intimate Web Reversion Based on Framework in addition Gratified Keywords through Potential Criticism," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1404-1410, 2018.
Cloud Technology and Start-up business Growth in India
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1411-1420, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.14111420
Abstract
Today Cloud computing is not a trend anymore. It has become an important tool for many organisations which helps to outsource their IT, instead from having it in-house. Most of the companies nowadays are deciding for cloud solutions to reduce their costs and overall IT spending. This is a great way to invest more in other initiatives such as customer experience rather than hardware or software. Despite challenges with infrastructure, security and trade policy, India remains a top market for U.S. cloud services exporters due to its large number of consumers with Internet access. India boasts 250 million people with web connected devices; it has already changed both business and everyday life – from consumers who perhaps unknowingly use it to access their favourite music to companies that purposely harness its powerful resources. While much activity and buzz relating to cloud involves its technological capabilities. SMEs usually have bad technological infrastructure. Either they have to resort to buying expensive software designed for large companies or build their own cheap applications that lack functions. This present article describes that the cloud technology is a smart move for any start-up business in India. Cloud offers the flexibility, agility and security required by SMEs at a modest price. The resources that once were limited only to large enterprises are now conveniently accessible as well as affordable. This paper also focuses cloud has the power to fundamentally shift competitive landscapes by providing a new platform for creating and delivering business value and market growth. It has potential to transform internal operations, customer relationships and small industry value chains, security of data protection of the organizations & to develop a new business models that promote sustainable competitive advantage.
Key-Words / Index Term
Cloud computing (CC), cost effectiveness, Security & trade policy, cloud -based-business, sustainable competitive advantage
References
[1]http://www.sifytechnologies.com/blog/how-the-start-up-industry-can-benefit-from-cloud-computing/
[2] https://techcrunch.com/2017/08/22/cloud-data-management-startup-druva-raises-80m/.
[3] https://www.noobpreneur.com/small-business-ideas/
[4] ttps://www.thehindubusinessline.com/info-tech/alibaba-betting-big-on-indian-cloud-market/article9724296.ece, June 10, 2017
[5] https://www.newgenapps.com/services/start-ups.
[6] 2016, Top Markets Report Cloud Computing Country Case Study
[7] Hinchcliffe Dion , Enterprise , June 5, 2009. “Eight ways that cloud computing will change business”, https://www.zdnet.com/article/eight-ways-that-cloud-computing-will-change-business/
[8] https://www.indusnet.co.in/site/wp-content/uploads/2016/04/cloud-adoption-ebook.pdf
[9] https://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.html
[10] http://www.cio.in/feature/2020-no-cloud-policy-be-almost-extinct
[11] ] https://www.indusnet.co.in/site/wp-content/uploads/2016/04/cloud-adoption-ebook.pdf
[12] https://yourstory.com/2017/03/cloud-wars-2017-india/
[13] https://www.firstpost.com/business/indian-cloud-market-will-face-consolidation-2016-says-gartner-2242592.htm
[14] https://www.firstpost.com/business/indian-cloud-market-will-face-consolidation-2016-says-gartner-2242592.html
[15] Pallivathukal Manoj Joy, 11th January 2016, “Adoption of Cloud Computing by SMEs in emerging markets (India) Cloud Computing”, Dublin Business School.
[16] https://www.computerweekly.com/news/2240213634/Indian-government-plans-for-IT-in-the-cloud
[17] https://www.computerweekly.com/news/2240214819/Indian-public-cloud-spend-grows-faster-than-rest-of-world
[18] https://hostway.com/blog/india-and-the-cloud-cautious-optimism-for-significant-growth/
[19] https://www.computerweekly.com/news/2240226115/Indias-cloud-adoption-rises-but-basic-challenges-remain-entrenched
[20] https://www.cfr.org/defense-and-security/cybersecurity
[21] https://arstechnica.com/information-technology/2014/06/with-the-americas-running-out-of-ipv4-its-official-the-internet-is-full/
[22] 23, 24 - April 2014,http://netmundial.br/netmundial-multistakeholder-statement/
[23] Berman Saul, Kesterson-Townes Lynn, Marshall Anthony , Srivathsa Rohini ,2012 ,”The power of cloud”, Executive Report ,IBM Global Business Services
[24] “An Innovative Business Model for Cloud Providers”, 2013, Whitepaper, CISCO
[25] https://www.computerweekly.com/news/2240222268/High-awareness-but-low-adoption-of-public-cloud-in-India
[26] 2018 BSA GLOBAL CLOUD COMPUTING SCORECARD Powering a Bright Future
[27] “An Innovative Business Model for Cloud Providers”, Whitepaper, Cisco.
[28] P Balasubhramanyam Reddy, G. Nagappan, “ A Survey on Secure Cloud Storage with Techniques Like Data Deduplication and Convergent Key management”
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
ISSN : 2456-3307 , Vol. 1,Issue1, july-August-2016
[29] Rucha Pawar, Vailshali Munguwadi, Pranav Lapsiwala ,”Wireless Mesh Network Link Failure Issues and Challenges: A Survey”
Survey Paper | Journal (IJSRNSC) ,Vol.6 , Issue.3 , pp.28-36, Jun-2018
Citation
Moumita Biswas, Nabanita De, Paramita Chatterjee, "Cloud Technology and Start-up business Growth in India," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1411-1420, 2018.
Smart Grid Database Security Using Steganography Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1421-1425, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.14211425
Abstract
Smart Grids are the efficient network for manage and distribute the electricity in the power grids. The smart grid is provided the two-way communication between customers and distributors. In this paper, double layer security technique is designed using steganography spatial domain and cryptography AES algorithm for smart grid database security. In the proposed technique, one time padding initialization vector (IV) is generated based on the edges information of cover image, which resolved the replay attack. The encryption of secret data is done using AES_IV algorithm. Further, the data embedding is done in smooth reason of the image using 2-bit LSB technique. At the receiver end, based on the edges information IV is determined and data extraction is done. The avalanche effect, Peak-signal-to-noise ratio, embedding capacity parameters are measured for performance analysis. The experimental results show that for different images, different IV is generated and quality of output image not degraded.
Key-Words / Index Term
Steganography, Cryptography, Smart Grid, Avalanche Effect, Initialization Vector, One Time Padding
References
[1] Suleiman, H., Alqassem, I., Diabat, A., Arnautovic, E. and Svetinovic, D., 2015. Integrated smart grid systems security threat model. Information Systems, 53, pp.147-160.
[2] Kumar, A. and Agarwal, A., 2016, November. Research issues related to cryptography algorithms and key generation for smart grid: A survey. In Power Electronics (IICPE), 2016 7th India International Conference on (pp. 1-5). IEEE.
[3] Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J. and Shu, L., 2018. A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustainable Cities and Society, 38, pp.806-835.
[4] Chaudhary, S., Dave, M., Sanghi, A. and Manocha, J., 2016, March. An elucidation on steganography and cryptography. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 43). ACM.
[5] Jiang, Y., Zhang, L., Tang, S. and Zhou, Z., 2013, August. Real-Time Covert VoIP Communications over Smart Grids by Using AES-Based Audio Steganography. In Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing (pp. 2102-2107). IEEE.
[6] Abood, O.G., Elsadd, M.A. and Guirguis, S.K.2017, December. Investigation of cryptography algorithms used for security and privacy protection in smart grid. In Power Systems Conference (MEPCON), 2017 Nineteenth International Middle East (pp. 644-649). IEEE.
[7] Abuadbba, A., Khalil, I., Ibaida, A. and Atiquzzaman, M., 2016. Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings− BCH based steganographic approach. Ad Hoc Networks, 41, pp.30-46.
[8] Ghane, A.H. and Harsini, J.S., 2018. A network steganographic approach to overlay cognitive radio systems utilizing systematic coding. Physical Communication, 27, pp.63-73.
[9] Mouachi, R., Ait-Mlouk, A., Gharnati, F. and Raoufi, M., 2017. A Choice of Symmetric Cryptographic Algorithms based on Multi-Criteria Analysis Approach for Securing Smart Grid. Indian Journal of Science and Technology, 10(39).
[10] Neeta, D., Snehal, K. and Jacobs, D., 2006, December. Implementation of LSB steganography and its evaluation for various bits. In Digital Information Management, 2006 1st International Conference on (pp. 173-178). IEEE.
[11] Vincent, O.R. and Folorunso, O., 2009, June. A descriptive algorithm for sobel image edge detection. In Proceedings of Informing Science & IT Education Conference (InSITE) (Vol. 40, pp. 97-107). California: Informing Science Institute.
[12] Heron, S., 2009. Advanced encryption standard (AES). Network Security, 2009(12), pp.8-12.
[13] Bansod, G., Pisharoty, N. and Patil, A., 2016. PICO: An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing. Defence Science Journal, 66(3).
[14] Chakraborty, S., Jalal, A.S. and Bhatnagar, C., 2017. LSB based non blind predictive edge adaptive image steganography. Multimedia Tools and Applications, 76(6), pp.7973-7987.
Citation
Mandeep kaur Sidhu, Anantdeep Kaur, "Smart Grid Database Security Using Steganography Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1421-1425, 2018.
Integration of Solar Energy Generation with Conventional Power Generation to Reduce the Emission of Carbon Dioxide and Other Harmful GHG
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1426-1432, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.14261432
Abstract
As there is great demand for the reduction of CO2 emission all over the globe. Efforts have been put in the same direction to further reduce the CO2 emission using the solar technology in integration with the Conventional Energy. We have noticed that the proposed scheme may further reduce the emission of CO2 along with that it can also reduce the emission of other harmful green house gases (GHG). Data from a Power situated in Kanpur, India is taken into consideration for analysis on the topic.
Key-Words / Index Term
Green House Gases (GHG), Renewable Energy, Carbon Emission, Solar Energy
References
[1] Claudia, S. & Leticia, O. “Energy use and CO2 emissions for Mexico`s cement industry. Elsevier, Energy,” Vol. 23, pp. 725–732, 1998.
[2] Zaheeruddin, Raj Kumar, Atul Kumar, V. K. Jain “Mitigation of CO2 emission in conventional power generation with renewable energy”, IEEE International Conference on Futuristic Trends in Computational Analysis and Knowledge Management, Amity University, Noida, pp. 734 – 738, 25-27 February 2015, ISBN:978-1-4799-8432- 9.
[3] “Safeguarding the Ozone Layer and the Global Climate System”, Issues Related to Hydro-fluoro-carbons and Per-fluoro-carbons IPCC/TEAP Special Report, 2005
[4] “The International Panel on Climate Change (IPPC)” Forth Assessment Report (AR4): Climate Change, 2007.[online] IPPC-Sec@wmo.int
[5] “The International Panel on Climate Change (IPPC)” Forth Assessment Report: Climate Change, WG-1, 2007.
[6] Austin Sarat and Stuart Scheingold, “Cause Lawyering and the State in a Global Era,” text book of Oxford Socio-Legal Studies published by Oxford University Press.
[7] “Energy Technology Perspectives 2008, Scenarios & Strategies to 2050”, International Energy Agency (IEA), Head of Communication and Information Office,9 rue de la Federation, 75739 Paris Cendex 15, France. [Online] http: // www.iea.org/ taxtbase.
9780521700801.
[8] Bert Metz, Lambert Kuijpers, Susan Solomon, Stephen O. Andersen, Ogunlade Davidson, Jose Pons, David de Jager, Tahi Kestin, Martin Manning and Leo Meyer (Eds), “Safeguarding the Ozone Layer and the Global Climate System issues Related to Hydrofluorocarbons and Perfluorocarbons: Issues Related to Hydro-fluoro-carbons and Per-fluoro-carbons” Cambridge University Press, England, UK. pp. 478.
[9] Edward S. Rubin, Sonia Yeh, Mett Antes, Michael Berkenpas, John Davison, “Use of experience curves to estimate the future cost of power plant with CO2 Capture”, ScienceDirect, Elsevier, international Journal of greenhouse gas control, pp. 188-197.
[10] Joris Koornneef , Tim van Keulen, Andre´ Faaij, Wim Turkenburg “Life cycle assessment of a pulverized coal power plant with post-combustion capture, transport and storage of CO2,” Elsevier, international journal of greenhouse gas control, Vol. 2, pp. 448–467, 2008.
[11] RA Durie,P McMullan, CAJ Paulson, “Proceedings of the 5th International Conferences on Greenhouse Gas Control Technologies (GHGT-5)”, held in August 2000 at Cairns, Queensland, Australia.
[12] “The RETScreen Clean Energy Project Analysis Software 4.0, Natural Resources Canada-Canmet Energy,” The RETScreen International Clean Energy Decision Support Centre, 580, http://www.retscreen.net/ang/centre.php [accessed 11.11.11]
[13] Harder E, MacDonald Gibson J. “The costs and benefits of large-scale solar photovoltaic power production in Abu Dhabi: United Arab Emirate,” Elsevier, Renewable Energy, Vol. 36, No.2, pp. 789–96, 2011.
[14] EL-Shimy M., “Viability analysis of PV power plants in Egypt,” Elsevier, Renewable Energy, Vol. 34 No.10, pp. 2187–96, 2009.
[15] CANMET, “Photovoltaic Systems Design Manual”, Available from Natural Resources Canada, CANMET, 580 Booth Street, Ottawa, ON, Canada, K1A 0E4, 1991.
[16] Watsun, PV., “A Computer Program for Simulation of Solar Photo- voltaic Systems,” User’s Manual and Program Documentation, , Watsun Simulation Laboratory, University of Waterloo, Waterloo, ON, Canada, Version 6.1, N2L 3G1; 1999.
[17] Hohm DP, Ropp ME.,”Comparative study of maximum power point tracking algorithms”, Progress in Photovoltaics: Research and Application, Vol. 11, pp. 47-62, 2003.
[18] Razykov TM, Ferekides CS, Morel D, Stefanakos E, Ullal HS, Upadhyaya HM., “Solar photovoltaic electricity: current status and future prospects”, Elsevier, Solar Energy, Volume 85, No. 8, pp. 1580-1608, August,2011 ISSN 0038 092X,10.1016/j.solener.2010.12.002.
[19] Liu JS, HueiKuan C, ChoCha S, LingChuang W, Gau GJ, YwanJeng J. “Photovoltaic technology development: a perspective from patent growth analysis,” Elsevier, Solar Energy Materials & Solar Cells, Vol. 95, pp.3130–3136, 2011.
[20] Javier Gómez-Gil F, Wang X, Barnett A. “Energy production of photovoltaic systems: fixed, tracking, and concentrating”, Renewable and Sustainable Energy Reviews Vol. 16, No. 1, pp. 30, 2012.
[21] Photovoltaic Project analysis, www.retscreen.net, ISBN: 0-662-35672-1, Catalogue no.: M39-99/2003E-PDF © Minister of Natural Resources Canada 2001 – 2004
[22] Chekired F, Larbes C, Rekioua D, Haddad F. “Implementation of a MPPT fuzzy con- troller for photovoltaic systems on FPGA circuit”, Elsevier, Energy Procedia, Vol. 6, pp.541–9, 2011.
[23] Raghuvanshi SP, Raghav AK, Chandra A, “Carbon dioxide emissions from coal based power generation in India”, Elsevier, Energy Conversion and Management, Vol. 47, pp. 427–441, 2006.
[24] Raghuvanshi SP, Chandra A, Raghav AK, “Carbon dioxide emission inventory from power sector”, In Proceedings Energy and Environment—International Conference on Energy and Environment: Strategies for Sustainable Development (ICEE-SSD), pp. 369–78, 2004.
[25] Ranee Dye, Olivier Sibony and S. Patrick Viguerie, “Strategic planning: Three tips for 2009”, April 2009.
[26] “IEA Greenhouse R&D Progress report no.4/9, Building the cost curves for CO2 Storage, Part 1: Source of CO2”, July 2002.[online] http://www.ieaghg.org
Citation
Zaheeruddin, Raj Kumar, V.K. Jain, "Integration of Solar Energy Generation with Conventional Power Generation to Reduce the Emission of Carbon Dioxide and Other Harmful GHG," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1426-1432, 2018.
A Comprehensive Review on Protein Sequence Analysis Techniques
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1433-1442, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.14331442
Abstract
Sequence analysis aims to explorethe pattern of DNA, RNA and Protein sequences. This analysis involves sequence alignment and extracts the patterns in sequences for the purpose of classification. Sequence analysis can be performed in several ways such as comparison of sequences, computation of similarity measure and mutation detection, based the degree of conserved sequences. It is useful to perform evolutionary analysis, prediction of gene/protein structures and reconstruction of DNA sequences. Sequence alignment plays a vital role in finding similarities among multiple sequences. This article gives an account on the familiar protein sequences alignment techniques being reported. Sequence alignments are of three types: Pair-wise Alignment, Multiple Sequence Alignment and Structural Alignment. The scope of this survey limits to the first two types of alignment. Pair-wise alignment handles a maximum of two sequences at a time, whereas multiple sequence alignment handles more than two sequences. This paper gives a synoptic view on the mechanisms, merits and demerits of select pairwise alignments and multiple sequence alignment techniques to find similarities among sequences
Key-Words / Index Term
Protein Sequence, Protein Alignment, Local Alignment, Global Alignment, Multiple Sequence Alignment.
References
[1] M. Lehman, “Experiments with Algorithms for DNA Sequence alignment”, Computer Science, Simpson College, Indianola, Iowa 50125, pp.1-14, 2005.
[2] D. Fenstermacher, “Introduction to Bioinformatics”, Journal of American Society for information Science and Technology, Vol.56, pp.440-446, 2005.
[3] B. Alberts, A. Johnson, J. Lewis, “From DNA to RNA”, Molecular Biology”, 4th Edition, 2002.
[4] J. Wu, J. Xiao, Z. Zhang, X. Wang, S. Hu, J. Yu,“Ribogenomics: The Science and Knowledge of RNA”, Genomics Proteomics
Bioinformatics, Vol.22, pp. 57-63, 2014.
[5]R. Chen, H. Yan, K.N. Zhao, B. Martinac, G.B. LIU, “Comprehensive Analysis of Prokaryotic Mechanosensation Genes: Their Characteristics in Codon Usage”, DNA Sequence, pp. 1-10, 2006.
[6] G. Bertram, S. Innes, O. Minella, J. P. Richardson, L. Stansfield, “Endless Possibilities: Translation Termination and Stop Codon Recognition”, Microbiology, Vol.147, pp.255-269, 2001.
[7] T.J.J. Kelly, A.D. Lindeman, S.M. Bridges, “Exploratory visual analysis of conserved domains on multiple sequence alignments”, BMC Bioinformatics, Vol.10,pp. 1-18, 2009.
[8] B.H.A. Rehm, “Bioinformatic Tool for DNA/ Protein Sequence Analysis, Functional Assignment of Genes and Protein Classification”, Applied Microbiology Biotechnology, Vol.57, pp.579-592. 2001.
[9] C.B. Do and K. Katoh, “Protein Multiple Sequence Alignment”, Methods in Molecular Biology, Vol.484, pp. 379-413, 2009.
[10] S. Batzoglou, “The Many Faces of Sequence Alignment”, Briefings in Bioinformatics, Vol.6, pp. 6-22, 2005.
[11] L. Mullan, “Pairwise Sequence alignment”, Briefings in Bioinformatics, Vol. 7, pp. 113-115, 2006.
[12] P. Manohar, S. Singh, “Protein Sequence Alignment: A Review”, World Applied Programming, Vol. 2, pp.141-145, 2012.
[13] Z.M. Zhou, Z.W. Chen, “Dynamic Programming for Protein Sequence Alignment”, International Journal of Bio-Science and Technology, Vol.5, pp. 141-150, 2013.
[14] R. Mott, “Smith-Waterman Algorithm” University of Oxford, DOI: 10.1038/npg.els.0005263, pp. 1-5, 2005.
[15] E.S. Donkor, N.T.K.D. Dayie, T.K. Adiku, “Bioinformatics With Basic Local Alignment Search Tool (BLAST) and Fast Alignment (FASTA)”, Journal of Bioinformatics and Sequence Analysis, Vol. 6, pp.1-6, 2014.
[16] T. Madden, “The BLAST Sequence Analysis Tool”, National Center for Biotechnology Information, pp.1-10, 2013.
[17] T.A. Tatusova, T.L. Madden, “BLAST2 Sequences, a New Tool For Comparing Protein And Nucleotide Sequences”, FEMS Microbiology Letters, Vol. 174, pp. 1-6, 2006.
[18] N.A.A. Rashid, R. Abdullah, A.Z.H.Talib, Z.Ali, “Fast Dynamic Programming Based Sequence Alignment”, IEEE Transactions, pp.1-7,2006.
[19] S.R. Harris, K. Chinyere, Okoro, “New Approaches to Prokaryotic Systematics”, Methods in Microbiology, 2014.
[20] K. Benkrid, Y.Liu, A. Benkrid, “A Highly Parametrized and Efficient FPGA-Based Skeleton for Pair-wise Biological Sequence Alignment”, IEEE Transactions on very large scale integration (VLSI) Systems, Vol. 17,pp. 561-570, 2009.
[21] N. Bray, I. Dubchak, L. Pachter, “AVID: A Global Alignment Program”, Genome Research, Vol. 13, pp. 97-102, 2003.
[22] M. Brudno, C. B. Do, G, M, Cooper, “LAGAN and Multi-LAGAN: Efficient Tools for Large-Scale Multiple Alignment of Genomic DNA”, Genome Research, pp. 721-731, 2015.
Citation
P. Haritha, P. Shanmugavadivu, S. Dhamodharan, "A Comprehensive Review on Protein Sequence Analysis Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1433-1442, 2018.
Reconfiguration of Distributed Network using Binary Particle Swarm Optimization Method
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1443-1445, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.14431445
Abstract
In this paper the network reconfiguration based on the method of Binary Particle Swarm Optimization Method (BPSO). It is used to find the optimal distribution network configuration for power loss minimization. The main objective of this paper is to minimize the power loss in the network system by employing reconfiguration technique. This method is applied on 33bus system then it has been verified by BPSO. The proposed work is gives an good performance over the distributed network.
Key-Words / Index Term
BPSO, Power Loss Reduction, Reconfiguration, Distributed network
References
[1] Dai, W, Sheng, W.X.,Liu, K.Y. Sheng, Y, Ye,
Z.J,” A novel reconfiguration method in smart
distribution grid considering interval data and
distributed generation. “, In Proceedings of the
International Conference on Computer
Information Systems and Industrial Applications
(CISIA 2015), Bangkok, Thailand,,
pp. 25–28, June 2015.
[2] Gomes, F.V, Carneiro, S, Pereira, J.L.R,
Vinagre,.M.P, Garcia, P.A.N, Araujo, L.R. “A
new heuristic reconfiguration algorithm for large
distribution systems. “,IEEE Trans. Power Syst. ,
pp.1373–1378, 2005.
[3] S. Sultana, P. Kumar Roy, “Oppositional krill
herd algorithm for optimal location of capacitor
with reconfiguration in radial distribution
system,” Electrical Power and Energy Systems,
vol. 74, pp. 78–90, 2016.
[4] S. Naveen, K. Kumar, K. Raja Lakshmi,
“Distribution system reconfiguration for loss
minimization using modified bacterial
foraging optimization algorithm,” Electrical
Power and Energy Systems, vol. 55,
pp.128– 143, 2014.
[5] B. Amanulla, S. Chakrabarti and S. Singh,
“Reconfiguration of Power Distribution Systems
Considering Reliability and Power Loss,” IEEE
Trans on Power Delivery, vol. 27, no. 2,
pp. 918-926, 2012.
[6] H. L. Willis, Power Distribution Planning
Reference Book, 2nd ed. New York: Mercel
Dekkar, 2004
[7] M. E. Baran and F. F. Wu, “Network
Reconfiguration in distribution systems for loss
reduction and load balancing,” IEEE Trans.
Power De., vol. 4, no. 2, pp. 1401–1407, Apr.
1989.
[8] S. K. Goswami and S. K. Basu, “A new algorithm
for the reconfiguration of distribution feeders for
loss minimization,” IEEE Trans. Power Del., vol.
7, no. 3, pp. 1484–1491, Jul. 1992.
[9] Pavani, P.; Singh, S.N. Reconfiguration of radial
distribution networks with distributed generation
for reliability improvement and loss
minimization. In Proceedings of the IEEE Power
and Energy Society General Meeting (PES GM),
Vancouver, BC, Canada, 21–25 July 2013.
[10] Prasad, K.; Ranjan, R,Sahoo, N.C, Chaturvedi,
A,” Optimal reconfiguration of radial distribution
Systems using a fuzzy mutated genetic
Algorithm”,IEEE Trans. Power Deliv.
pp. 1211– 1213, 2005.
[11] T. Dheepak, S. Neduncheliyan, “ Low
Power Distributed MAC Protocol Against
Various Kinds Of Attacks By Using Traffic
Analysis Methodology” , IJSRCSE,pp.1-7,
Jun- 2018.
[12] Rikam Palkar, Swati Chopade,” An
Implementation of an Vulnerability
Management in Complex Networks and
Defining Severity”, IJSRCSE,pp.35-38,
Jun-2018.
[13] Rucha Pawar, Vailshali Munguwadi, Pranav
Lapsiwala,” Wireless Mesh Network Link
Failure Issues and Challenges: A Survey”,
IJSRNSC, pp. 28-36, Jun-2018.
[14] Amr M. Kishk.et.al.,” Proposed Jamming
Removal Technique for Wireless Sensor
Network”,OJSRNSC,pp.1-14, Mar-2015.
Citation
Manjunath Ravikumar, "Reconfiguration of Distributed Network using Binary Particle Swarm Optimization Method," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1443-1445, 2018.
Big Data and Hadoop Computational Challenges- A Comparison Study
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1446-1452, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.14461452
Abstract
Big Data refers that data which cannot be stored and processed efficiently by traditional techniques. Storage and processing of big data is a real challenge. To solve the big data problem, Hadoop provide an optimum framework. Hadoop framework is based on java and it can process data in large quantities. It is able to process unstructured data as well and that too in a distributed manner. In this paper, the authors have studied different dimensions of Big Data and tried to provide the comparison study existing between the resource findings related to it. The authors have further highlighted the various challenges where researchers need to put focus to enhance functionality and power of Big Data Computation.
Key-Words / Index Term
Big Data, Hadoop, HDFS, Map Reduce, Security
References
[1] Seref Sagiroglu and Duygu Sinanc, “Big Data: A review”
, IEEE, 2013, pp. 42–47.
[2] Dinesh D. Jagtap and Prof. B.K. Patil, “Big Data using
Hadoop”, International Journal of Engineering Research and
General Science, Oct-Nov 2014, Volume 2, Issue 6, pp. 467
472.
[3] Cloudera white paper, “Hadoop and HDFS”, version 106.
[4] Sreedhar C, Dr. D. Kavitha and K. Asha Rani, “Big Data
and Hadoop”, International Journal of Advanced Research in
Computer Engineering and Technology, May 2014, Volume
3, Issue 5, pp. 1571–1575.
[5] Yashika Verma and Sumit Hooda, “A Review Paper on
Big Data and Hadoop”, International Journal of Scientific
Research and Development, 2015, Volume 3, Issue 2, pp.
682–684.
[6] Swarupkumar Shivaji Suradkar, “Analysis of Big Data
with Hadoop Framework”, International Journal of
Advanced Research in Computer Science and Software
Engineering, Nov 2016, Volume 6, Issue 11, pp. 167–169.
[7]Anusha B. Dhakite and Prof. Nitin V. Wankhade, “Big
Data: An Overview”, International Journal of Advanced
Research in Computer Science and Software Engineering,
June 2016, Volume 6, Issue 6, pp. 841–845.
[8] Prabhjot singh, Mamoon Rashid, “Smart Home Automation Deployment on Third Party Cloud Using
Internet of Things”, published in Journal of Bioinformatics and Intelligent Control, Vol. 4, 1–4, 2015.
[9] Ranjana Bahri, “Big Data: Concept, Challenges and
Management Tools”, International Journal of Advanced
Research in Computer Science and Software Engineering,
Feb 2015, Volume 5, Issue 2, pp. 986–990.
[10] Prof. R.A. Fadnavis and Samrudhi Tabhane, “Big Data
Processing using Hadoop”, International Journal of
Computer Science and Information Technologies, 2015,
Volume 6(1), pp. 443–445.
[11] Simmi Bagga and Satinder Kaur, “Big Data and
Hadoop”, International Journal of Advanced Engineering
Research and Applications, Oct 2015, Volume 1, Issue 6, pp.
233–238.
[12] Deepika Pand Anantha Raman G R, “A Study of
Hadoop-Related Tools and Techniques”, International
Journal of Advanced Research in Computer Science and
Software Engineering, September 2015, Volume 5, Issue 9,
pp. 160–164.
[13] Abhinandan P Shirahatti, Neha Patil, Durgappa
Kubasad and Arif Mujawar, “Sentiment Analysis on Twitter
Data using Hadoop”, International Journal of Emerging
Technology in Computer Science and Electronics, April
2015, Volume 14, Issue 2, pp. 831–837.
[14] Sukhpal Kaur and Mamoon Rashid, “Web News Mining using Back Propagation Neural Network and Clustering using K-Means Algorithm in Big Data, published in Indian Journal of Science and Technology, Vol 9(41), DOI: 10.17485/ijst/2016/v9i41/95598, November 2016.
Citation
Mamoon Rashid, Mir Aamir, Balwant Ram, "Big Data and Hadoop Computational Challenges- A Comparison Study," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1446-1452, 2018.
Various Methods of Enhancement in Colored Images: A Review
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1453-1459, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.14531459
Abstract
Image Enhancement is a technique to enhance images for many applications such as medical diagnosis and analysis, satellite images, agriculture etc. This paper is a review paper which focused on recent methods used by the authors such as soft computing for enhancing images, result of the methods used and also its limitation over the images. The main aim of this paper is to analyse the different proposed methods and to identify research problem.
Key-Words / Index Term
Enhancement, Color Image Processing, Histograms
References
[1]. R.C. Gonzales and R.E. Woods, Digital Image Processing, Addison-Wesley, Publisher- Addison-Wesley, 1992
[2]. J.D. Foley, A. van Dam, S.K. Feiner and J.F. Hughes, Computer Graphics, Principles and Practice, Addison-Wesley, (3rd Edition) 3rd Edition
[3]. P.E. Trahanias and A.N. Venetsanopoulos, “Color Image Enhancement Through 3-D Histogram Equalization” IEEE, 1992
[4]. Bei Tang, Guillermo Sapiro, “Color Image Enhancement via Chromaticity Diffusion”, IEEE Transactions On Image Processing, Vol. 10, No. 5, May 2001
[5]. M. Hanmandlu, Devendra Jha, Rochak Sharma, “Color image enhancement by fuzzy intensification”, M. Hanmandlu et al. / Pattern Recognition Letters, Vol 24, ,pp. 81-87,2003
[6]. John J. McCann, “Capturing a Black Cat in Shade: The Past and Present of Retinex Color Appearance Models” ,SPIE and IS&T Journal of Electronic Imaging, 2004
[7]. Madasu Hanmandlu,Devendra Jha, “An Optimal Fuzzy System for Color Image Enhancement”, IEEE Transactions On Image Processing, Vol. 15, No. 10, October 2006
[8]. Edoardo Provenzi, Carlo Gatta, Massimo Fierro, Alessandro Rizzi, “A Spatially Variant White-Patch and Gray-World Method for Color Image Enhancement Driven by Local Contrast”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 30, No. 10, October 2008
[9]. Shaohua Chen and Azeddine Beghdad, “Natural Rendering Of Color Image Based On Retinex”, IEEE Transactions in Image Processing, 2009
[10]. Shaohua Chen, Azeddine Beghdad, “Natural Enhancement of Color Image”, Springer, EURASIP Journal on Image and Video Processing, December 2010
[11]. Angela Ribeiro 1,*, Juan Ranz 1 , Xavier P. Burgos-Artizzu 1 , Gonzalo Pajares 2 , Maria J. Sanchez del Arco 3 and Luis Navarrete, “An Image Segmentation Based on a Genetic Algorithm for Determining Soil Coverage by Crop Residues” ,Sensors 2011, 11, pp.6480-6492
[12]. Megha Sahu , K.M. Bhurchandi, “Color Image Segmentation using Genetic Algorithm”, International Journal of Computer Applications, Volume 140 – No.5, April 2016
[13]. Sargun† and Shashi B. Rana, “A Review of Medical Image Enhancement Techniques for Image Processing”, International Journal of Current Engineering and Technology,2015
[14]. Zhu Ronga, Zhu Lib, Li Dong-nan, “Study of color heritage image enhancement algorithms based onhistogram equalization”, http://dx.doi.org/10.1016/j.ijleo.2015.08.169, 0030-4026/© 2015 Elsevier GmbH.
[15]. Kuldeep Singh, Rajiv Kapoor, “Image enhancement using Exposure based Sub Image Histogram Equalization”, in Pattern Recognition Letters, 2013 Elsevier
[16]. Xi Qiao, Jianhua Bao , Hang Zhang, Lihua Zeng, Daoliang Li, “Underwater image quality enhancement of sea cucumbers based on improved histogram equalization and wavelet transform”, Information Processing in Agriculture 4 pp. 206–213, Elsevier,2017
[17]. Hengjun Yu, Kohei Inoue∗, Kenji Hara, Kiichi Urahama “Saturation improvement in hue-preserving color image enhancement without gamut problem”, ICT Express, Elsevier 2017
[18]. Kirti Khatkar, Dinesh Kumar, “Biomedical Image Enhancement Using Wavelets” Elsevier 2015
[19]. Wei Qi, Jing Han, Yi Zhang, Lian-fa Bai, “Hierarchical image enhancement”, Infrared Physics & Technology journal, Elsevier 2017
Citation
Bably Dolly, Deepa Raj, "Various Methods of Enhancement in Colored Images: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1453-1459, 2018.
Virtualization: One of The Core Technologies of Cloud Computing and Its Success
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1460-1465, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.14601465
Abstract
Virtualization is a technique, in which the creation of a virtual, rather than actual version of something. In computing, virtual is a digitally replicated version of something real. The replication, which is created with software, may not be an exact copy of the actual item, but it is similar enough in essence to be described as a digital rendition. The term virtualization broadly describes the separation of a resource or request for a service from the underlying physical delivery of that service. With virtual memory, for example, computer software gains access to more memory than is physically installed, via the background swapping of data to disk storage. Similarly, virtualization techniques can be applied to other IT infrastructure layers - including networks, storage, laptop or server hardware, operating systems and applications. Virtualization is a combination of software and hardware engineering that creates Virtual Machines (VMs) - an abstraction of the computer hardware that allows a single machine to act as if it where many machines. There are many challenges in business like, cost-effective resources utilization, responsiveness in supporting new business initiatives, flexibility in adapting to changes in organization function, expansion and sense of urgency and so on. Virtualization is a fundamental technological innovation that allows skilled IT managers to deploy creative solutions to such business challenges. This paper discusses what virtualization is, how technologies improve it, and how organizations can benefit from adopting virtualization into future IT plans.
Key-Words / Index Term
Cloud Computing, Grid Computing, Virtualization, Utility Computing, Autonomic Computing
References
[1]. Graziano, Charles. "A performance analysis of Xen and KVM hypervisors for hosting the Xen Worlds Project". Retrieved 2013-01-29.
[2]. Jump up^ Turban, E; King, D; Lee, J; Viehland, D (2008). "Chapter 19: Building E-Commerce Applications and Infrastructure". Electronic Commerce A Managerial Perspective. Prentice-Hall. p. 27.
[3]. Jump up^ "Virtualization in education" (PDF). IBM. October 2007. Retrieved 6 July 2010. A virtual computer is a logical representation of a computer in software. By decoupling the physical hardware from the operating system, virtualization provides more operational flexibility and increases the utilization rate of the underlying physical hardware.
[4]. Jump up to:a b "Strategies for Embracing Consumerization" (PDF). Microsoft Corporation. April 2011. p. 9. Retrieved 22 July 2011.
[5] Jump up to:a b Chernicoff, David, “HP VDI Moves to Center Stage,” ZDNet, August 19, 2011.
[6] Jump up^ Baburajan, Rajani, "The Rising Cloud Storage Market Opportunity Strengthens Vendors," infoTECH, August 24, 2011. It.tmcnet.com. 2011-08-24.
[7] Jump up^ Oestreich, Ken, "Converged Infrastructure," CTO Forum, November 15, 2010. Thectoforum.com.
[8] Jump up^ "Desktop Virtualization Tries to Find Its Place in the Enterprise". Dell.com. Retrieved 2012-06-19.
[9] Jump up^ "HVD: the cloud`s silver lining" (PDF). Intrinsic Technology. Retrieved 30 August 2012.
[10] Jump up^ "Enterprise Systems Group White paper, Page 5" (PDF). Enterprise Strategy Group White Paper written and published on August 20, 2011 by Mark Peters.
[11] Jump up^ Orit Wasserman, Red Hat (2013). "Nested virtualization: Shadow turtles" (PDF). KVM forum. Retrieved 2014-04-07.
[12] Jump up to:a b Muli Ben-Yehuda; Michael D. Day; Zvi Dubitzky; Michael Factor; Nadav Har’El; Abel Gordon; Anthony Liguori; Orit Wasserman; Ben-Ami Yassour (2010-09-23). "The Turtles Project: Design and Implementation of Nested Virtualization" (PDF). usenix.org. Retrieved 2014-12-16.
[13] Jump up^ Alex Fishman; Mike Rapoport; Evgeny Budilovsky; Izik Eidus (2013-06-25). "HVX: Virtualizing the Cloud" (PDF). rackcdn.com. Retrieved 2014-12-16.
[14] Jump up^ "4th-Gen Intel Core vPro Processors with Intel VMCS Shadowing" (PDF). Intel. 2013. Retrieved 2014-12-16.
[15] Cloud Computing: The Simplified Format of Pay – to – Use By Dr. M E Purushoththaman and Ms B Bhavani
Citation
M E Purushoththaman, "Virtualization: One of The Core Technologies of Cloud Computing and Its Success," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1460-1465, 2018.