An Optimal Patch Size based Sporadic Decomposition of Hankel Structured Matrix in Gradient Transform Domain for Impulse Noise Denoising
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.246-250, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.246250
Abstract
Noise removal refers to the most vital process in image processing to remove the noise from a given image and reconstruct the original image. Among many denoising techniques, four types of extended versions of robust Annihilating filter-based Low-rank Hankel Matrix (r-ALOHA) approaches have been proposed in the previous researches. In those approaches, different kinds of transform domains like log-exponential, wavelet, generalized Hough, and gradient were considered separately in which that the image patch was considered as it was sparse in the considered transform domains independently to denoise the corrupted image. Even if gradient transform based denoising called e4-ALOHA achieves better performance than the other transform domains, it requires an automatic selection of Optimal Patch Size (OPS) to further improve the denoising performance. Hence in this article, an automatic selection of OPS is proposed with e4-ALOHA that searches similar image patches and selects an optimal patch size. In this technique, a Flower Pollination optimization Algorithm (FPA) is proposed to search similar patches and choose an optimal patch size adaptively according to the variance of similar patch groups. Once an optimal patch size is selected, e4-ALOHA is applied to perform the denoising process. Finally, the effectiveness of the proposed technique is evaluated through the experimental results.
Key-Words / Index Term
Noise removal, r-ALOHA, e4-ALOHA, Optimal patch size, Flower pollination algorithm Formatting
References
[1] P. Kamboj, V. Rani, “A brief study on various noise model and filtering techniques”, Journal of Global Research in Computer Science, Vol.4, Issue.4, pp.166-171, 2013.
[2] A. Suganthi, M. Senthilmurugan, “Comparative study of various impulse noise reduction techniques”, International Journal of Engineering Research and Applications, Vol.3, Issue.5, pp.1302-1306, 2013.
[3] K. Pritamdas, Kh. M. Singh, L. L. Singh, “A summary on various impulse noise removal techniques”, International Journal of Science and Research, Vol.6, Issue.3, pp.941-954, 2017.
[4] K. H. Jin, J. C. Ye, “Sparse and low-rank decomposition of a hankel structured matrix for impulse noise removal”, IEEE Transactions on Image Processing, Vol.27, Issue.3, pp.1448-1461, 2018.
[5] L. B. Victoria, S. Sathappan, “A sporadic decomposition of hankel structured matrix in logarithmic and wavelet domain for impulse noise removal”, International Journal of Engineering & Technology, 2018.
[6] L. B. Victoria, S. Sathappan, “A sporadic decomposition of hankel structured matrix in generalized Hough and gradient transform domain for impulse noise removal”, In International Conference on Research Trends in Computing Technologies (ICRTCT18), 2018.
[7] C. A. Deledalle, J. Salmon, A. S. Dalalyan, “Image denoising with patch based PCA: local versus global”, In BMVC, Vol.81, pp.425-455, 2011.
[8] X. Zhang, X. Feng, W. Wang, “Two-direction nonlocal model for image denoising”, IEEE Transactions on Image Processing, Vol.22, Issue.1, pp.408-412, 2013.
[9] X. Chen, S. Bing Kang, J. Yang, J. Yu, “Fast patch-based denoising using approximated patch geodesic paths”, In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.1211-1218, 2013.
[10] C. Kervrann, “PEWA: Patch-based exponentially weighted aggregation for image denoising”, In Advances in Neural Information Processing Systems, pp.2150-2158, 2014.
[11] K. Kundu, “Image Denoising using Patch based Processing with Fuzzy Gaussian Membership Function”, International Journal of Computer Applications, Vol.118, Issue.12, pp.35-40, 2015.
[12] X. Liu, Z. Yang, J. Wang, J. Liu, K. Zhang, W. Hu, “Patch-based denoising method using low-rank technique and targeted database for optical coherence tomography image”, Journal of Medical Imaging, Vol.4, Issue.1, pp.014002(1-12), 2017.
[13] M. Kaur, B. Jindal, “Improved sparse matrix denoising technqiues using affinity matrix for geographical images”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.51-57, 2017.
Citation
L. Baby Victoria, S. Sathappan, "An Optimal Patch Size based Sporadic Decomposition of Hankel Structured Matrix in Gradient Transform Domain for Impulse Noise Denoising," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.246-250, 2018.
Handwriting Analysis for Disease Identification
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.251-254, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.251254
Abstract
Handwriting is a tool to understand partially the unknown world of subconscious mind. The motor nerves come into play while writing. Personality trait identification can be done successfully with accuracy through handwriting. A research is done to show new avenues of application of handwriting analysis. Diseases like strokes, Alzheimer’s disease, Parkinson, Dyslexic disorders can be very easily diagnosed well in advance before the onset of the disease. A novel work is carried out to enlighten that, hand writing analysis not only identifies a person’s characteristic traits but also identifies many diseases including brain disorders like Alzheimer’s disease, suicidal tendency and pessimism etc.
Key-Words / Index Term
Behavior Recognition; Segmentation; SVM Classifier;Drop Fall Algorithm; Zernike Moments
References
[1] Syeda Asra, Dr.Shubhangi DC, “Personality Trait Identification – A Survey”, International Journal of Computer Science (IJCSN) , Vol 3, Issue 2 , pp.2277-5420, 2014.
[2] SyedaAsra, Dr.Shubhangi D.C ,”Personality Trait Identification Using Unconstrained Cursive and Mood Invariant Handwritten Text”I.J. Education and Management Engineering, 2015, 5, 20-31 Published Online October 2015 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2015.05.03
[3] Syeda Asra, Dr.Shubhangi DC ,” Specific Trait Identification in Margins Using Hand Written Cursive”, International Journal Of Engineering And Computer Science (IJECS) ISSN: 2319-7242, Volume 6 Issue 1 Jan. 2017, Page No. 19963-19964 Index Copernicus Value (2015): 58.10, DOI: 10.18535/ijecs/v6i1.19.
[4] Syeda Asra, Dr.Shubhangi D.C,” Human Behavior Recognition based on Hand Written Cursives by SVM Class/ifier, ”, in ICEECCOT Mysuru,2017.
[5] Syeda Asra, Dr.Shubhangi D.C,”Behaviour Recognition Based on Hand Written T-Letter Using SVM Classifier “ International Journal of Computer Science (IAENG) Scopus Indexed
[6] Jinyin Yang et.al.” A Novel Drop-fall Algorithm Based on Digital Features for Touching Digit Segmentation” IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON),2016.
[7] Tomoki Watanabe, Satoshi Ito, and Kentaro Yokoi,“ Co-occurrence Histograms of Oriented Gradients for Pedestrian Detection”, Springer-Verlag Berlin Heidelberg 2009.
[8] Michael Vorobyov Notes on, Topic: “Shape Classification Using Zernike Moments”, iCamp at University of California Irvine August 5, 2016.
Citation
Syeda Asra, Shubhangi D.C, "Handwriting Analysis for Disease Identification," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.251-254, 2018.
Binary Mask Pattern Segmentation in glaucoma detection
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.255-259, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.255259
Abstract
Glaucoma detection is one of the most recent researches in medical field. There are several researches which mainly focus on optic cup to disc ratio to efficiently identify glaucoma. The objective of this paper is to identify glaucoma by creating a binary mask for optic cup and disc of glaucomatous eyes. The query image is segmented using these masks and identified as either normal or glaucomatous eyes. The proposed method is tested on RIM-ONE r3 database. The experimental results substantially proved that the proposed method achieved 95.29% specificity at 94.59% sensitivity with AUC of 0.869. The proposed method is also compared with existing methods and proved to work better than them.
Key-Words / Index Term
Fundus image, glaucoma, optic disc, optic cup, mask
References
[1] P. Schacknow and J. Samples, “Glaucoma in the Twenty-First Century”, The Glaucoma Book. New York, NY, USA, Springer, pp. 12-13, 2010.
[2] A. F. Clark, “Basic sciences in clinical glaucoma: Steroids, ocular hypertension and glaucoma”, J. Glaucoma, vol. 4, no. 5, pp. 354_369, 1995.
[3] B. Nemesure, R. Honkanen, A. Hennis, S. Y. Wu, and M. C. Leske, “Incident open-angle glaucoma and intraocular pressure”, Ophthalmology, vol. 114, no. 10, pp. 1810 - 1815, 2007.
[4] F. A. Medeiros and R. N. Weinreb, “Risk assessment in glaucoma andocular hypertension”, International Ophthalmology Clinics, vol. 48, no. 4, pp. 1-12, 2008.
[5] R. E. Kalina, “Seeing into the future. Vision and aging”, Western Journal of Medicine, vol. 167, no. 4, pp. 253-257, 1997.
[6] Juan Xu et al., “Automated volumetric evaluation of stereoscopic disc photography”, Optics Express, vol. 18, no. 11, pp. 11347-11359, 2010.
[7] J. S. Schuman et al., “Comparison of optic nerve head measurements obtained by optical coherence tomography and confocal scanning laser ophthalmoscopy”, American Journal of Ophthalmology, vol. 135, no. 4, pp. 504-512, 2003.
[8] J. C. Tsai, “How to Evaluate the Suspicious Optic Disc”, Review of Ophthalmology, Vol. 12, issue 6, pp. 40, 2005
[9] Jun Cheng, Fengshou Yin, Damon Wing Kee Wong, Dacheng Tao and Jiang Liu, “Sparse Dissimilarity-Constrained Coding for Glaucoma Screening”, IEEE Transactions On Biomedical Engineering, Vol. 62, No. 5, pp.1395-1403, May 2015.
[10] J. Liu, D. W. K. Wong, J.H. Lim, X. Jia, F. Yin, H. Li, W. Xiong, T. Y. Wong, “Optic Cup and Disk Extraction from Retinal Fundus Images for Determination of Cup-to-Disc Ratio”, IEEE 2008 978-1- 4244-1718-6/08, pp.1828-1832, 2008.
[11] Gopal Datt Joshi, Jayanthi Sivaswamy and S. R. Krishnadas, “Optic Disk and Cup Segmentation From Monocular Color Retinal Images for Glaucoma Assessment” IEEE Transactions On Medical Imaging, Vol. 30, No. 6, pp.1192- 1205, June 2011.
[12] Jun Cheng, et al. “Super pixel Classification Based Optic Disc and Optic Cup Segmentation for Glaucoma Screening”, IEEE Transactions On Medical Imaging, Vol. 32, No. 6, pp.1019-1032, June 2013.
[13] Padmasinh M. Deshmukh, Anjali C. Pise, S. V. Survase, “Segmentation of Retinal Images for Glaucoma Detection”, International Journal of Engineering Research & Technology, Vol. 4 Issue 06, pp. 747-749, June-2015.
[14] PriyankaVerma, “Segmentation of Cup And Disc For Glaucoma Detection”, International Journal Of Current Engineering And Scientific Research, Vol. 2, Iss. 4, pp. 43-48, 2015.
[15] Hanamant M. Havagondi, Mahesh S. Kumbhar, “Optic cup and disc localization for Detection of glaucoma using Matlab”, International Journal of Electrical, Electronics and Computer Systems, Volume -2, Issue-7, pp. 13-166, 2014.
[16] F. Fumero et al., “RIM-ONE: An open retinal image database for optic nerve evaluation,” in International Symposium on Computer-Based Medical Systems (CBMS), IEEE, pp 1-6, 2011.
[17] Akshaya Ramaswamy, Keerthi Ram, Niranjan Joshi, Mohanasankar, “A Polar Map Based Approach Using Retinal Fundus Images forGlaucoma Detection”, Proceedings of the Ophthalmic Medical Image Analysis International Workshop, Iowa Research Online, pp. 145-152, 2016.
[18] M. Arulmary, S. P. Victor, “Geometrical Feature Extraction for Glaucoma Detection”, International Journal of Computer Applications (0975 – 8887) Vol. 180, – No.27, pp. 1-5, March 2018.
[19] M. Arulmary, S.P. Victor, “Block Based Probability Intensity Feature Extraction for Automatic Glaucoma Detection”, International Journal of Pharmaceutical Research, Vol. 10, Issue 2, pp. 87-93, April-June 2018.
Citation
M. Arulmary, S.P. Victor, "Binary Mask Pattern Segmentation in glaucoma detection," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.255-259, 2018.
WSN – An Emerging Technology and its Security Meaures
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.260-264, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.260264
Abstract
Wireless Sensor Network (WSN) is one of the merging network technologies. It is an extensively distributed network equipped with low powered and lightweight wireless sensor nodes. WSN are being deployed to monitor system and environment. WSN are being used in health sectors, military operations, automation industries, traffic monitoring, oil refineries etc. But with the emerging applications, WSN is prone to attacks and threats. These attacks and threats must be studied thoroughly in order to counter them. Today security issues are the major challenges faced by WSN. The deployment of wireless sensor nodes in hostile environments makes them the subject of lethal attacks, also due to the limitations of resources processing capability, power consumption & communication range WSN are vulnerable to many types of threats/attacks. There are serious consequences if security of WSN gets compromised by any means such as information theft, lack of privacy, etc. Thus it must be our utmost priority to save WSNs from malicious attacks. In this study we have highlighted the various fatal attacks that can destruct WSN with their impacts and consequences.
Key-Words / Index Term
Wireless Sensor Network (WSN), Network Security, Cryptography, Confidentiaity, Authenicity, Blackhole, Jammming.
References
[1] Al-Sakib Khan Pathan ,Hyung-Woo Lee, ChoongSeon Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, Proc. ICACT 2006, Volume 1, 20-22 Feb, 2006, pp. 1043-1048.
[2] N. Gura, A. Patel, et al. "Comparing elliptic curve cryptography and RSA on 8-bit CPUs." Cryptographic Hardware and Embedded Systems-CHES 2004, pp 925-943, 2004.
[3] Hung, X, L, et al. “An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge,” Sensors, Vol 8. 2008, 7753-7782.
[4] L. Jialiang, Valois, F.; Dohler, M.; Min-You Wu; , "Optimized Data Aggregation in WSNs Using Adaptive ARMA," Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on, , pp.115-120, 18-25 July 2010.
[5] RobertSzewczyk, Joseph Polastre, Alan Mainwaring, and David Culler. Lessons from a sensor network expedition. In First European Workshop on Wireless Sensor Networks (EWSN 04), January 2004.
[6] Kalpana Sharma, M.K. Ghose, Deepak Kumar, Raja Peeyush Kumar Singh,Vikas Kumar Pandey. “A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”. In IJAST, Vol 7, April 2010.
[7] Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., and Jokerst, R.M., "Analyzing interaction between distributed denial of service attacks and mitigation technologies", Proc. DARPA Information Survivability Conference and Exposition, Volume 1, 22-24 April, 2003, pp. 26 - 36.
[8] Douceur, J. "The Sybil Attack", 1st International Workshop on Peer-to-Peer Systems (2002).
[9] Hu, Y.-c., Perrig, A., and Johnson, D.B., "Packet leashes: a defense against wormhole attacks in wireless networks", Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, Vol. 3, 30 March-3 April 2003, pp. 1976 - 1986.
[10] Sheela D. Naveen K,C and Mahadevan G, A non cryptographic method of sink hole attack detectionin wireless sensor networks, Recent Trends in Information Technology (ICRTIT), 2011 International Conference IEEE.
[11] Hamid, M. A., Rashid, M-O., and Hong, C. S., “Routing Security in Sensor Network: Hello Flood Attack and Defense”, to appear in IEEE ICNEWS 2006.
[12] Choong Seon Hong. "Security in wireless sensor networks: issues and challenges", 2006 8th International Conference Advanced Communication Technology, 2006.
[13] Wang Xin-sheng, Zhan Yong-zhao, Xiong Shu-ming, Wang Liangmin, “Lightweight Defense Scheme against Selective Forwarding Attacks in Wireless Sensor Networks’ pp 226-232, IEEE 2009.
[14] Ahmad Salehi, S., M.A. Razzaque, Parisa Naraei, and Ali Farrokhtala. "Security in Wireless Sensor Networks: Issues and challanges", 2013 IEEE International Conference on Space Science and Communication (IconSpace), 2013.
Citation
Shafiqul Abidin, "WSN – An Emerging Technology and its Security Meaures," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.260-264, 2018.
Active Object Detection Model with Deep Neural Network for Object Recognition
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.265-269, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.265269
Abstract
The number of the computations and feature transformations along with the normalization and automatic categorization is required by the object classification algorithms. In this paper, the robust feature descriptor used with the active object detection method (AODM) along with the probabilistic equation enabled deep neural networks (DNN). The multi-category DNN (mDNN) has been described with the repetitious phases so that it is simple to do job with the multi-category dataset. In every iterative phase mDNN shows the training data of main class as primary class and remaining all other training data are divided as the secondary class for the supervised classification. In the object image dataset, designed model is proficient of working with the variations which are observed in the configuration of the color, texture, light, image orientation, and occlusion and color illuminations. Certain analysis has been organized over the designed model for the performance calculation of the object identification system in the designed model. The results which we collected are in the shape of the various performance parameters of statistical errors, precision, recall, F1-measure and overall accuracy. In the terms of the overall accuracy the designed model has clearly outperformed the existing models. The designed model growth has been recorded higher than ten percent for all of the evaluated parameters against the existing models based upon SURF, FREAK, etc.
Key-Words / Index Term
Deep neural network, active object model, object recognition, SIFT, SURF
References
[1] Esehaghbeygi, A., Ardforoushan, M., Monajemi, S.A.H. and Masoumi, A.A.. Digital image processing for quality ranking of saffron peach. Int. Agrophysics, 24(2), pp.115-120, 2010.
[2] Plebe, A. and Grasso, G… Localization of spherical fruits for robotic harvesting. Machine Vision and Applications, 13(2), pp.70-79,2001.
[3] Alfatni, M.S.M., Shariff, A.R.M., Shafri, H.Z.M., Saaed, O.B. and Eshanta, O.M. Oil palm fruit bunch grading system using red, green and blue digital number. Journal of Applied Sciences, 8(8), pp.1444-1452, 2008.
[4] Jiménez, A.R., Ceres, R. and Pons, J.L.. A vision system based on a laser range-finder applied to robotic fruit harvesting. Machine Vision and Applications, 11(6), pp.321-329, 2000.
[5] Bama, B.S., Valli, S.M., Raju, S. and Kumar, V.A. Content based leaf image retrieval (CBLIR) using shape, color and texture features. Indian Journal of Computer Science and Engineering, 2(2), pp.202-211, 2011.
[6] Bucksch, A. and Fleck, S.. Automated detection of branch dimensions in woody skeletons of fruit tree canopies. Photogrammetric engineering & remote sensing, 77(3), pp.229-240, 2011.
[7] Margaritis, D. and Thrun. Learning to Locate an Object in 3D Space from a Sequence of Camera Images. In ICML Vol. 98, no. July, pp. 332-340, 1988.
[8] Eitz, M., Richter, R., Boubekeur, T., Hildebrand, K. and Alexa, M. Sketch-based shape retrieval. ACM Trans. Graph., 31(4), pp.31-1, 2012.
[9] Fleites, F.C., Wang, H. and Chen, S.C.. Enhancing product detection with multicue optimization for TV shopping applications. IEEE Transactions on Emerging Topics in Computing, 3(2), pp.161-171, 2015.
[10] Hassan, S.N.A., Rahman, N.N.S.A., Htike, Z.Z. and Win, S.L Vision Based Entomology-How to Effectively Exploit Color and Shape Features. Computer Science & Engineering, 4(2), p.1., 2014.
[11] Ishak, W.I.W. and Hudzari, R.M. Image based modeling for oil palm fruit maturity prediction. Journal of Food, Agriculture & Environment, 8(2),
.pp.469-476, 2010.
[12] Ismail, W.I.W. and Razali, M.H... Hue optical properties to model oil palm fresh fruit bunches maturity index. In Proceedings of World Multi-Conference on Systemics, Cybernetics and Pattern Recognition (pp. 168-173) , 2010.
[13] Jiang, L., Zhu, B., Cheng, X., Luo, Y. and Tao, Y.. 3D surface reconstruction and analysis in automated apple stem-end/calyx identification. Transactions of the ASABE, 52(5), pp.1775-1784, 2009.
[14] Dadwal, M. and Banga, V.K.. Estimate ripeness level of fruits using RGB color space and fuzzy logic technique. International Journal of Engineering and Advanced Technology, 2(1), pp.225-229, 2012.
[15] Dadwal, M. and Banga, V.K.. . Estimate ripeness level of fruits using RGB color space and fuzzy logic technique. International Journal of Engineering and Advanced Technology, 2(1), pp.225-229, 2012.
[16] Li, P., Lee, S.H. and Hsu, H.Y.. Use of a cold mirror system for citrus fruit identification. In Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on Vol. 2 ,no. June, pp. 376-381, 2011.
[17] Venkatraman, D. and Makur, A.. A compressive sensing approach to object-based surveillance video coding. In Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on pp. 3513-3516, 2009.
[18] Girshick, R., Donahue, J., Darrell, T. and Malik, J.. Region-based convolutional networks for accurate object detection and segmentation. IEEE transactions on pattern analysis and machine intelligence, 38(1), pp.142-158, 2016.
[19] Singh, P. and Sharma, A. Face recognition using principal component analysis in MATLAB. International journal of Scientific research in Computer science and Engineering, 3(1), pp.1-5, 2015.
[20] Shivakumar, M., Subalakshmi, R., Shanthakumari, S. and Joseph, S.J... Architecture for Network-Intrusion Detection and Response in open Networks using Analyzer Mobile Agents. International Journal of Scientific Research in Network Security and Communication, 1, pp.1-7, 2013.
Citation
R. Kapila, H. Wadhwa, "Active Object Detection Model with Deep Neural Network for Object Recognition," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.265-269, 2018.
A Hybrid Approach To Solving The View Selection Problem In Data Warehouse
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.270-275, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.270275
Abstract
A data warehouse is a centralized repository of information from one or more data sources. The amount of big data that arrives in data warehouse typically comes from transactional systems and other relational databases. Often the data is stored in the form of materialized views in order to improve the performance of query execution in data warehouse. One of the most important techniques for improving query optimization performance is the selection of views to materialize. In this paper, the views selection problem is modelled as constraint satisfaction and optimization problem. The exact method standard may take a considerable amount of time in order to find an optimal solution. To address this limitation of the exact method, we proposed an approach based on consistency techniques and systematic search techniques to select an optimal set of views for materialization. This proposed approach improves the quality of execution time for selecting an optimal set of views to materialize.
Key-Words / Index Term
Data warehouse, view selection problem, constraint satisfaction and optimization problem, hybrid approach, exact method
References
[1] H. Gupta and I.S. Mumick, “Selection of Views to Materialize Under a Maintenance Cost Constraint”, Proc. 7th Int. Conf. Database Theory, vol. 13, pp. 453–470, 1999.
[2] H. Gupta and I.S. Mumick, “Selection of views to materialize in a data warehouse”, IEEE Trans. Knowl. Data Eng., vol. 17, no. 1, pp. 24–43, 2005.
[3] D. Yang, M. Huang, and M. Hung, “Efficient Utilization of Materialized Views in a Data Warehouse”, PAKDD 2002 Adv. Knowl. Discov. Data Min., pp. 393–404, 2002.
[4] G. Gou, J.X. Yu, and H. Lu, “A* search: An efficient and flexible approach to materialized view selection”, IEEE Trans. Syst. Man Cybern. Part C Appl. Rev., vol. 36, no. 3, pp. 411–425, 2006.
[5] T.V.V. Kumar and S. Kumar, “Materialized View Selection Using Simulated Annealing”, Int. Conf. Big Data Anal., pp. 168–179, 2012.
[6] C.S. Park, M.H. Kim, and Y.J. Lee, “Finding an efficient rewriting of OLAP queries using materialized views in data warehouses”, Decis. Support Syst., vol. 32, no. 4, pp. 379–399, 2002.
[7] J. Chang and S. Lee, “Extended conditions for answering an aggregate query using materialized views”, Inf. Process. Lett., vol. 72, pp. 205–212, 1999.
[8] I. Mami, R. Coletta, and Z. Bellahsene, “Modeling view selection as a constraint satisfaction problem”, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6861 LNCS, no. PART 2, pp. 396–410, 2011.
[9] D. Theodoratos, “Detecting redundant materialized views in data warehouse evolution”, Inf. Syst., vol. 26, no. 5, pp. 363–381, 2001.
[10] T.V.V. Kumar and S. Kumar, “Materialised view selection using differential evolution”, Int. J. Innov. Comput. Appl., vol. 6, no. 2, pp. 102–113, 2014.
[11] M. El Alaoui, K. El moutaouakil, and M. Ettaouil, “Weighted constraint satisfaction and genetic algorithm to solve the view selection problem”, International Journal of Database Management Systems (IJDMS), Vol.9, No.4, August 2017.
[12] R. Derakhshan and F. Dehne, “Simulated Annealing for Materialized View Selection in Data Warehousing Environment”, 24th IASTED Int. Conf. Database Appl., pp. 89–94, 2006.
[13] K. Aouiche and J. Darmont, “Data mining-based materialized view and index selection in data warehouses”, J. Intell. Inf. Syst., vol. 33, no. 1, pp. 65–93, 2009.
[14] K. Aouiche, P.-E. Jouve, and J. Darmont, “Clustering-Based Materialized View Selection in Data Warehouses”, Lect. Notes Comput. Sci. Incl. Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinforma., vol. 4152 LNCS, no. 1, pp. 81–95, 2007.
[15] A. Gosain and Heena, “Materialized Cube Selection Using Particle Swarm Optimization Algorithm” Procedia Comput. Sci., vol. 79, pp. 2–7, 2016.
[16] M. Ettaouil, “A 0-1 Quadratic Knapsack Problem for Modelizing and Solving the Constraint Satisfaction Problems”, Prog. Artif. Intell., vol. 1323, pp. 61–72, 1997.
[17] E.C. Freuder, “A Sufficient Condition for Backtrack-Free Search”, J. ACM, vol. 29, no. 1, pp. 24–32, 1982.
[18] S. Chakraborty, J. Doshi,"Deriving Aggregate Results with Incremental Data using Materialized Queries",International Journal of Computer Sciences and Engineering,Vol.-6, Issue-5, May 2018
[19] R. Barták, M.A. Salido, and F. Rossi, “Constraint satisfaction techniques in planning and scheduling”, J. Intell. Manuf., vol. 21, no. 1, pp. 5–15, 2010.
[20] K.S. Joo, T. Bose, and G.F. Xu, “Image Restoration Using a Conjugate Gradient-Based Adaptive Filtering Algorithm *”, vol. 16, no. 2, pp. 197–206, 1997.
[21] O. Lhomme, “Consistency techniques for numeric CSPs”, Ijcai, pp. 232–238, 1993.
[22] F. Manya and C. Gomes, “Solution Techniques for Constraint Satisfaction Problems”, Intel. Artif., vol. 7, no. 19, pp. 243–267, 2003.
[23] P.O. Neil, B.O. Neil, and X. Chen, “Star Schema Benchmark - Revision 3”, Tech. rep., 2009.
Citation
Mohammed El Alaoui, Karim El Moutaouakil, Mohamed Ettaouil, "A Hybrid Approach To Solving The View Selection Problem In Data Warehouse," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.270-275, 2018.
Improving the Performance of Solar Power Plants through IOT and Predictive Data Analytics
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.276-279, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.276279
Abstract
To increase the utilization and development of solar energy which is Eco friendly. Weather Predication is done in order to improve the performance and maintain its consistency for long term to deliver secure and reliable power while managing uncertainties. In order to enhance and improve the performance, preventive maintenance of solar power plant is done by implementing Operation & Maintenance (O&M)activities using predictive analytics and supervisory control and data acquisition (SCADA). With the help of internet(cloud)along with IOT devices, Operation and maintenance, Supervisory Control And Data Acquisition the preventive maintenance can be improved. Many industries in India are working towards increasing the performance ratio of solar power plants in large scale. This paper presents a comparative study to improve the performance of solar power plants through IOT and predictive analytics.
Key-Words / Index Term
IOT, solar energy, scada, O&M
References
[1] T.M. Razykov, ‘Solar photovoltaic electricity: Current status and future prospects’, Solar Energy 85
(2011) 1580–1608
[2] S. Chinnammai, ‘An Economic Analysis of Solar Energy’, Journal of Clean Energy Technologies, Vol. 1, No. 1, January 2013
[3] A. Garro, ‘Reliability Analysis of Residential Photovoltaic Systems’, International Conference on
Renewable Energies and Power Quality (ICREPQ’11)
[4] International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 7 (2016) pp 4803-4806 © Research India Publications. http://www.ripublication.com
[5] EMMVEE PV Pvt Ltd (EPPPL PVT LTD) New International Airport Road Bangalore.
[6] “Smart Grid Security Issues and Challenges for IOT”, NCRATCE-2016, National Conference at AIT Chickmangalore.
[7] “A Review on Biologically Inspired Approaches to Security of Internet of Things to ICEEOT 2016, International Conference at Chennai with IEEE catalog 978-1-4673-9939-/16/$31.00
[8] “Performance Comparison of ModRED AQM with Round Robin Scheduling”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)- ISSN: 2278 – 1323,2014.
[9] “Implementation of Mod RED AQM Technique for Wireless Networks with Strict Priority Scheduling”, International Journal of Advanced Research in Computer Engineering &Volume 3 Issue 8 Technology (IJARCET)- ISSN: 2278 –1323,2014
[10] “Analyzing Markin Mod RED Active Queue Management Scheme on TCP Applications”, 2012
International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) © (2012) IACSIT Press, Singapore-ISSN: 2010-460X, 2014.
[11] “Analyzing and Comparison of Marking Mod RED Active Queue Management Scheme on TCP
Applications”, International Conference on Communications and Signal Processing (ICCSP-2012)
Sponsored by AICTE- on 2nd- 4th April, 2012at QIS College of Engineering , Ongole,(A.P).
[12] “Performance Comparison of Active Queue Management Techniques”, IJCSNS International Journal of Computer Science and Network Security,2009
Citation
Shahida Begum, Reshma Banu , "Improving the Performance of Solar Power Plants through IOT and Predictive Data Analytics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.276-279, 2018.
Secure Approach To Data Transmission Using Steganography and RSA Technique Through TCP/IP Header
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.280-284, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.280284
Abstract
This is the time of web, in which whole world is associated with one another, thus significance of security builds step by step. To protect the data from unauthorized user, it is the new challenge for us so that we developed a very simple technique to transfer the data from one party to other by secure channel. As we know that Steganography is a digital technique for hiding information in some form of media, such as image, audio or video. Steganography has advanced routine with regards to hide information in bigger document so that others can`t associate the nearness with a shrouded message. In this paper, we outline a framework, which utilizes highlights of both cryptography and in addition steganography, where TCP/IP header is utilized as a steganographic transporter to hide encrypted data. [1] Steganography is a valuable apparatus that permits secretive transmission of data over the correspondences channel. [2] In this paper we have use the MKA algorithm [4] to embed the data inside the image so that capacity of data will be large.
Key-Words / Index Term
LSB,Steganography, Cryptography, Encryption, TCP/IP Header, Fragmentation, MKA algorithm
References
[1] R.M. Goudar, Prashant N. Patil, Aniket G.. “Secure Data Transmission by using Steganography” ISSN 2224- per) ISSN 2224-896X Vol 2, No.1, 2012
[2] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn,”Information hiding- Survey”, IEEE, (7):1062- 1078, 1999.
[3] G. J. Simmons, “The Prisoner’s problem and the subliminal channel in Advances in Cryptology”, Proc.crypto ’83:55–67, 1983.
[4] . H.B.Kekre, Archana Athawale, and Pallavi N.Halarnkar ,” Increased Capacity of Information Hiding in LSB’s Method for Text and Image” World Academy of Science, Engineering and Technology Vol:2 2008-05-22.
[5] Udit Budddia and Deepak Kundur, “Digital video steganalysis exploiting collusion Sensitivity”,IEEE, 1(4):502- 516, 2006.
[6] Furuta, T,.Noda, H., Niimi, M., Kawaguchi E,”Bit-plane decomposition steganography using wavelet compressed video”, Joint Conference of the Fourth International Conference, 2(5): 970 - 974, 2003.
[7] V.Karthekayani and kammalakan, “Conversion grayscale image to color image with and without texture synthesis”, International journal of computer science and network security, 7(4):11-16, 2007.
[8] Eiji Kawaguchi and Richard O. Eason, “Principle and applications of BPCS- Steganography”, Proc. SPIE ,3528: 464-473 , 1999.
[9] Nameer N. EL-Emam, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm” Jordan Journal of Science publications, 3 (4): 223-232, 2007.
[10] K B Raja, C R Chowdary K R Venugopal, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Images”, IEEE, 170-176, 2005.
[11] Naofumi,” Technique of lossless steganography”, IEICE Transactions on Communications, 90(11):1-4, 2007.
[12] .Nan jiang and wan jiang, “Random oracle model of information modeling”, World academy of science, 18:1307-6884, 2006
[13] Steganography [tG. Pulcini, Stegotif,"http://www.geocities.com/SiliconValley/ 9210/gfree. Html, 10/28/2008
[14] K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, “Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory," The International Society for Optical Engineering, Electronic Imaging, San Jose, CA, USA, 2005.
[15] G. Xuan, Y. Q. Shi, D. Zou, J. Gao, C. Yang, Z. Zhabg, P. Chai, W. Chen, C. Chen, “Steganalysis based on multiple features formed by statistical moments of wavelet characteristic Functions," IH 2005 LNCS 3727, pp. 262-277, Springer-Verlag Berlin Heidelberg 2005.
[16] H. Noda, J. Spaulding, M. Shirazi, M. Niimi and E. Kawaguchi, “BPCS Steganography Combined with JPEG2000 Compression”, Proceedings of Pacific Rim Workshop on Digital Steganography , pp. 98-107, 2002.
[17] J. Huang and Y. Shi, “Adaptive image watermarking scheme based on visual masking”, Elect. Lett., vol. 34, no. 8, pp. 748-750,1998.
[18] A. Piva, M. Barni, F. Bartolini and V. Capellini, “DCT-Based watermark recovering without restoring to the uncorrupted original image”, in Proc. of IEEE ICIP, pp. 520-523, 1997. 438
[19] Rahul Jain,Naresh kumar .” Efficient data hiding scheme using lossless data compression and image steganograpgy “, International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 4 No.08 August 2012
[20] Swami Vivekanand Mahavidhyalaya etl,” Information Security: A Review on Steganography with Cryptography for Secured Data Transaction “,Int. J. Sc. Res. in Network Security and Communication , ISSN: 2321-3256 , Volume-5, Issue-6, Dec 2017 .
[21] A. Sudha1, A. Basheer Ahamed, ” Img-Protect : Privacy Protection of Images in Online Social Networks Using Watermarking Scheme “, International Journal of Scientific Research in Computer Science, Engineering and Information Technology , Volume 3 | Issue 7 | ISSN : 2456-3307
Citation
Basant Sah, V .K Jha, "Secure Approach To Data Transmission Using Steganography and RSA Technique Through TCP/IP Header," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.280-284, 2018.
Effect of Electromagnetic Radiations On Human Body
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.285-288, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.285288
Abstract
Mobile phones has become the integral part of human life in today’s world. The data shows that the total number of mobile phone users has been increased to 4.68 billion and is expected to reach 5 billion mark in 2019.Indians are second highest user 1,183,408,611 in numbers after China in may 2018. But every coin has two sides similarly here also one negative side of mobile phones is on human brain. Radiation of electromagnetic waves created a negative impact on human’s brain and their immune system. In recent years numerous ways such as (earphones, bluetooth, headset) has been investigated to reduce this harmful effect of EM wave .These frequencies are reducing human health exponentially. In this paper effect of EM waves with or without devices has been discussed.
Key-Words / Index Term
GSM, CDMA, Electroencephalogram, EM waves
References
[1]. Aruna Tyagi, Manoj Duhan, Dinesh Bhatia (2011) Effect of Mobile Phone Radiation on Brain Activity GSM Vs CDMA. IJSTM.
[2]. Scarella O Clatz, Lanteri S, Beaume G, Oudot S, Piperno S, et al. (2006) Realistic numerical modeling of human head tissue exposure to electromagnetic waves from cellular phones.
[3]. Robert Leeb, Felix Lee, Claudia Keinrath, Reinhold Scherer, Horst Bisch, et al. (2007) Brain-Compute Communication: Motivation, Aim, and Impact of Exploring a Virtual Apartment Ieee Transactions On Neural Systems And Rehabilitation Engineering
[4]. Vijay Kr Garg (2000) IS-95 CDMA and cdma: Cellular/pcs system implementation
[5]. Riadh W Y Habash (2011) Non-Invasive microwave hyperthermia PhD Thesis, ECE Deptt, IISc, Bangalore, India.
[6]. Aruna Tyagi, Vaishali Jain, Dinesh Bhatia, Manoj Duhan (2010) Review of Effect of Electromagnetic Radiations of Mobile Phone on Human Health Proceeding of Control Instrumentation System Conference
[7]. Delgado JM, Leal J, Monteagudo JL, Gracia MG (1982) Embryological changes induced by weak, extremely low frequency electromagnetic fields. Journal of Anatomy.
[8]. Wikipedia. Mobile Phone [Online]
[9]. Rahim Mohammed AL-Imari, Muhammad Ali Imran, and Tafazolli “Low Density Spreading for Next Generation Multicarrier Cellular Systems”.
[10]. Muhammad Mokhlesur Rahman; Shalima Binta Manir “Performance Analysis of Sc-FDMA and OFDMA in LTE Frame Structure”2012.
Citation
Rahul Ohlan, "Effect of Electromagnetic Radiations On Human Body," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.285-288, 2018.
An Efficient Tweeter Sentiment Analysis Sfcetr: Selective Feature Based Case Content Extraction Using Maximum Entropy Classifier To Rank The Tweets
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.289-299, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.289299
Abstract
Real world analysis the data based on the realistic approach to deal any objectives in online environment. Specifically social remedies have various approach of projective comments to share the information about products, innovative technologies etc. in this thing tweeter is a main platform to provide communication mammon the sharable users. In this provision most used by the people have the onions to make sentimental key terms to notify the originality. The sentiments about specific data be pointed by the comments in content format with sort text opinions. The opinions are extracted from the comments statement to analyst the tweeter data. By the fact of analyzing tweets have the hidden sentimental approach the problem arise due to right choice of sentimental extraction to classification is difficult. To overcome the problematic issue to propose a selective feature based case content extraction using maximum entropy classifier (SFCETR) to rank the tweets. This initially preprocess the tweets data the content reason from the comments statement. to aim the case reasons of relational features observed from the tweet contents are key term as contents .the comment case sentimental relation keyword terms are extracted synonmically to classify the data base on the reference key variable . Finally the rank case resultant categorize the sentimental case reasoning onion s about the predicative approach are classifies as class. This improves the tweets case opinions extraction are carried with the high performance sentimental research.
Key-Words / Index Term
Opinion mining, rank analysis, tweeter analysis, sentiment classification, features election
References
[1]. Popescu, A. M., Etzioni, O, Extracting Product Features and Opinions from Reviews, In Proc. Conf. Human Language Technology and Empirical Methods in Natural Language Processing, Vancouver, British Columbia, 2005.
[2]. A.H.Huang, D.C. Yen, & X. Zhang, “Exploring the effects of emoticons,” Information & Management, 45(7), 466–473, 2008.
[3]. J. Spencer and G. Uchyigit, “Sentiment or: Sentiment Analysis of Twitter Data,” Second Joint Conference on Lexicon and Computational Semantics. Brighton:University of Brighton, 2008.
[4]. M. Annett, and G. Kondrak, “A Comparison of Sentiment Analysis Techniques: Polarizing Movie Blogs,” Conference on web search and web data mining (WSDM). University of Alberia: Department of Computing Science, 2009
[5]. Sang-Hyun Cho and Hang-Bong Kang, “Text Sentiment Classification for SNS-based Marketing Using Domain Sentiment Dictionary”, IEEE International Conference on Conference on consumer Electronics (ICCE), p.717-718, 2012.
[6]. Z. Kechaou, B. M. Ammar and A. M. Alimi, “Improving e-learning with sentiment analysis of users` opinions”, in Global Engineering Education Conference (EDUCON), pp. 1032-1038.2011.
[7]. A. Celikyilmaz, D. Hakkani-Tur and Junlan Feng, “Probabilistic modelbased sentiment analysis of twitter messages”, IEEE Spoken Language Technology Workshop (SLT), pp. 79-84.2010
[8]. A. Pak,and P. Paroubek, “Twitter as a Corpus for Sentiment Analysis and Opinion Mining,” Special Issue of International Journal of Computer Application, France:Universitede Paris-Sud, 2010.
[9]. S.Lohmann, M. Burch, H. Schmauder and D. Weiskopf, “Visual Analysis of Microblog Content Using Time-Varying Co-occurrence Highlighting in Tag Clouds,” Annual conference of VISVISUS. Germany: University of Stuttgart, 2012.
[10]. R. Batool, A. M. Khattak, J. Maqbool and S. Lee, “Precise tweet classification and sentiment analysis”, in 12th Int. Conf. on Computer and Information Science (ICIS),pp. 461-466.2013.
[11]. G.Vinodini and RM.Chandrashekaran, “Sentiment Analysis and Opinion Mining: A Survey”, International Journal of Advanced Research in Computer Science and Software Engineering, 283-294, Volume 2, Issue 6, June 2012.
[12]. A.Pak and P. Paroubek. „Twitter as a Corpus for Sentiment Analysis and Opinion Mining". In Proceedings of the Seventh Conference on International Language Resources and Evaluation, pp.1320-1326.1010
[13]. Po-Wei Liang, Bi-Ru Dai, “Opinion Mining on Social MediaData", IEEE 14th International Conference on Mobile Data Management,Milan, Italy, June 3- 6, pp 91-96, ISBN: 978-1- 494673-6068-5, 2013.
[14]. A. Sarlan, C. Nadam and S. Basri, “Twitter Sentiment Analysis”, in Int. Conf. on Information Technology and Multimedia,, pp. 213-216,2014
[15]. Pablo Gamallo and Marcos Garcia “A Naive-Bayes Strategy for Sentiment Analysis on English Tweets” Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014), pages 171–175, Dublin, Ireland, Aug 23-24 2014
[16]. Varsha Sahayak, Vijaya Shete and Apashabi Pathan, “Sentiment Analysis on Twitter Data”, (IJIRAE) ISSN: 2349-2163, January 2015.
[17]. Aliza Sarlan, Chayanit Nadam and Shuib Basri, “Twitter Sentiment Analysis”, 2014 International Conference on Information Technology and Multimedia (ICIMU), Putrajaya, Malaysia November 18 – 20, 2014.
[18]. Shi Yuan, Junjie Wu, Lihong Wang and Qing Wang, “A Hybrid Method for Multi-class Sentiment Analysis of Micro-blogs”, ISBN- 978-1-5090-2842-9, 2016.
[19]. Halima Banu S and S Chitrakala, “Trending Topic Analysis Using Novel Sub Topic Detection Model”, (IEEE) ISBN- 978-1-4673-9745-2, 2017.
[20]. David Zimbra, M. Ghiassi and Sean Lee, “Brand-Related Twitter Sentiment Analysis using Feature Engineering and the Dynamic Architecture for Artificial Neural Networks”, IEEE 1530-1605, 2016.
Citation
P. Kavitha, M. Prabakaran, "An Efficient Tweeter Sentiment Analysis Sfcetr: Selective Feature Based Case Content Extraction Using Maximum Entropy Classifier To Rank The Tweets," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.289-299, 2018.