Computational Study on Association Rule Mining Using Microarray Data
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.299-303, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.299303
Abstract
Data mining is used to bring out the unknown information from known large data set. In data mining Association Rule Mining (ARM) is a technique which discovers the frequent relation between the patterns by using the terms support and confidence. Apriori, Partition, Border and Incremental algorithms are some of the algorithms in ARM. In this work microarray dataset for psychological disorders is extracted from GEO data base, applied Apriori algorithm, implemented using R tool and recognized the relationship between the diseases in psychological disorder.
Key-Words / Index Term
Association Rule Mining, Apriori, Microarray dataset, Psychological Disorder, Occurrences
References
[1]. Doddi S, Marathe A, Ravi SS, and Torney DC, “Discovery of association rules in medical data.”, Med. Inform. Internet. Med.,vol. 26 (2001): 25–33.
[2]. Arockiam L, Baskar SS, and Jeyasimman L, “Importance of Association Rules in Data Mining: A Review, International Journal of Soft Computing.” 7(3), (2012): 135-140.
[3]. Tuzhilin A, Adomavicius G, Zatane O, Goebel R, Hand D, Keim D, NgR, “Handling very large numbers of association rules in the analysis of microarray data”, Proc. of the 8th ACM SIGKDD international conference on knowledge discovery and data mining, (2002): 396-404.
[4]. Anandhavalli M, Ghose MK, and Gauthaman K, “Association Rule Mining in Genomics.” International Journal of Computer Theory and Engineering, Vol. 2. No. 2 (2010):1793-8201.
[5]. RakeshAgrawal and RamakrishnanSrikant, “Mining Sequential Patterns.” In Proc. of the 11th International Conference on Data Engineering, Taipei, Taiwan, (1995).
[6]. Tanya Barrett and Ron Edgar, “Mining Microarray Data at NCBI’s Gene Expression Omnibus (GEO).” National Institute of Health Public Access (NIH PA), Methods Mol Biol. (2006); 338: 175–190.
[7]. Ron Edgar and Alex Lash, “The Gene Expression Omnibus (GEO): A Gene Expression and Hybridization Repository.” The NCBI Handbook (2015): 6-17, https://www.researchgate.net.
[8]. Rashmi Jain, “Machine Learning”, (2017). Available at https://www.hackerearth.com/blog/machine-learning/beginners-tutorial-apriori-algorithm-data-mining-r-implementation/
[9]. Trupti A Kumbhare and Santosh V Chobe, “An Overview of Association Rule Mining Algorithms.” International Journal of Computer Science and Information Technologies, Vol. 5 (1) (2014): 927-930.
Citation
K. Mohan Kumar, S. Devi, "Computational Study on Association Rule Mining Using Microarray Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.299-303, 2018.
Comprehensive Survey on Underwater Object Detection and Tracking
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.304-313, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.304313
Abstract
The recent developments in underwater video monitoring system makes automatic object detection and object tracking a significant and challenging task. In such processing, the method involves preprocessing, feature extraction, object classification, object detection and tracking. Detecting moving objects from the underwater video has many potential applications for Remotely Operated Vehicles (ROVs) or Autonomous Underwater Vehicles (AUVs), such as tracking fish, recognizing underwater objects etc. Underwater object recognition is a cumbersome due to the change in water structure, seasonal, climatic changes, temperature variation and further degraded by a poor non-uniform source of artificial light. Diverse approaches using image processing and pattern recognition have been proposed by numerous scientists and marine engineers to tackle these problems using methods such as neural network, contour matching, and statistical analysis. In this article, we provide a comprehensive overview of different methods and techniques of object detection and object tracking in general and underwater scenario in particular. We have been successful in highlighting the several key features and aspects of underwater object detection and tracking which will take the work in this domain further.
Key-Words / Index Term
Underwater image enhancement, Object Detection, Tracking, Recognition and Machine Learning
References
[1] B. Saumya, K. Mondal and H. Salma, "A Review on Present Status, Potentials, and Threats of Freshwater Fish Biodiversity of Nadia District, West Bengal, India," International Journal of Scientific Research and Reviews, vol. 7, no. 3, pp. 1209-1220, 2018.
[2] L. M. Wolff and S. Badri-Hoeher, "Imaging sonar-based fish detection in shallow water," Oceans IEEE, 2014.
[3] Chen, L. Z., Hu, Z., W. Wenzhi, Tianji, Z., &. Le and T., “Instrumentation for underwater acoustic intenstiy measurement," IEEE/OES China Ocean Acoustics (COA), 2016.
[4] Dawkins, M., L. Sherrill, A. H. B. R. K. Fieldhouse, D. Zhang, L. Prasad, K. Williams, N. Lauffenburger and G. Wang, "An open-source platform for underwater image and video analytics" IEEE Winter conference application of computer vision, pp. 898-906, 2017.
[5] S. Borkar and S. V. Bonde, "A fusion based visibility enhancement of single underwater hazy image," International Journal of Advances in Applied Sciences (IJAAS), vol. 7, pp. 38-45, 2018.
[6] S. Borkar and S. V. Bonde, "Underwater image restoration using single color channel prior," IEEE International Conference on Signal and Information Processing (IConSIP), Nanded - India., 2016.
[7] I. Kumar, A. Fred and C. S. Christoph, "Underwater image restoration based on illumination normalization and deblurring," International Journal of Computer Sciences and Engineering, vol. 6, no. 5, 2018.
[8] K. Kumar and P. Rao, "A Survey on Enhanced Routing Protocol for Underwater Sensor Networks," International Journal of Computer Sciences and Engineering, vol- 6, no 1 pp. 395-401, 2018.
[9] F. Jalled, "Object detection using image processing," CoRR, Moscow Institute of Physics & Technology, Department of radio engineering & cybernetics ilia voronkov, moscow institute of physics & technology, department of radio engineering & cybernetics, 2016.
[10] Amandeep and E. Goyal, "Moving object detection using background subtraction techniques," International Journal Of Engineering Sciences & Research Technology, vol. 5, pp. 1-9, 2016.
[11] Z. Ming, Q. Han-ming, R. Ying-jiao, C. Guo, “Robust object tracking via sparse representation based on compressive collaborative haar-like feature space,” ICALIP 2016, pp. 274-278,2016.
[12] F. Setyawan, J. Tan, H. Kim and S. Ishikawa, "Detecting moving objects from a video taken by a moving camera using sequential inference of background images," Artif life Robotics, vol. 19, pp. 291-298, 2014.
[13] F. Setyawan, J. Tan, H. Kim and S. Ishikawa, "Moving objects detection employing iterative update of the background," Artif life Robotics, vol. 22, pp. 168-174, 2017.
[14] F. Setyawan, J. Tan, H. Kim and S. Ishikawa, "Detecting foreground objects by sequential background inference in a video captured by a moving camera.," Proceedings of the SICE Annual Conference, Nagoya - Japan, pp. 1699-1702, 2013.
[15] A. Vishwakarma1, A. Khare, "Moving Object Tracking System Using Morphological Image Processing," International Journal of Computer Sciences and Engineering (IJCSE), vol- 6, no 7 pp. 88-92, 2018.
[16] K. P. Indulekha, R. and C. Kumar A., "Novel method of detecting moving object in video," International Conference on Emerging Trends in Engineering, Science and Technology, pp. 1055-1060, 2015.
[17] M. Prabowo, N. Hudayani, S. Purwiyanti, S. Sulistiyanti and F. Setyawan, "A moving objects detection in underwater video using subtraction of the background model," EECSI, pp. 19-21, 2017.
[18] R. Sharma, S. Agarwal, S. Gupta and A. Prejapati, "Optimized dynamic background subtraction technique for moving object detection and tracking," 2nd International Conference on Telecommunication and Networks, pp.1-11, 2017.
[19] H. Liu, J. Dai, R. Wang, H. Zheng and B. Zheng, "Combining background subtraction and three-frame difference to detect moving object from underwater video," IEEE, pp. 1-5, 2016.
[20] N. Singla, "Motion detection based on frame difference method," International journal of information and computation technology, pp. 1559-1565, 2014.
[21] T. Horprasert, D. Harwood and L. Davis, "A robust background subtraction and shadow detection," Asian Conference on Computer Vision (ACCV), vol. 10, no. 4, pp. 983-988, 2000.
[22] C. Spampinato, D. Giordano and R. Salvo, "Automatic fish classification for underwater species behaviour understanding," ARTEMIS, 2010.
[23] K. Nummiaro, E. Koller-Meier and L. Gool, "A Color-based Particle Filter," First International Workshop on Generative- Model- Based Vision, 2002.
[24] F. Kaelin, "An adaptive color-based particle filter," ECSE. 2015
[25] J. Tony and K. Risi, "Bhattacharyya Expected Likelihood Kernels," 2003.
[26] S. Khobahi, "Object tracking using kalman filter".
[27] Y. Kim and K. Cho, "Robust multi-object tracking to acquire object oriented videos in indoor sports," International Conference on Information and Communication Technology Convergence (ICTC), pp. 1104-1107, 2016.
[28] M. Chuang, J. Hwang, J. Ye, S. Huang and K. Williams, "Underwater fish tracking for moving cameras based on deformable multiple kernels," IEEE transactions on systems, MAN, and cybernetics: systems, vol. 47, no. 9, 2017.
[29] P. Felzenszwalb, R. Girshick, D. McAllester and D. Ramanan, "Object detection with discriminatively trained part-based models," IEEE Trans. Pattern Anal. Mach. Intell, vol. 29, no. 5, pp. 1627-1645, 2010.
[30] B. Boom, P. Huang, C. Beyan, C. Spampinato, S. Palazzo, J. He, E. Beauxis-Aussalet and R. Fisher, "Long-term underwater camera surveillance for monitoring and analysis of fish populations," Conference: Int. Workshop on Visual observation and Analysis of Animal and Insect Behavior (VAIB), 2012.
[31] W. Grimson and C. Stauffer, "Adaptive Background Mixture Models for Real- Time Tracking," IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 246-252, 1999.
[32] R. Faragher, "Understanding the Basis of the Kalman Filter Via a Simple and Intuitive Derivation," IEEE Signal Processing Magazine , vol. 29, no. 5, pp. 128-132, 2012.
[33] H. Kirchner, O. Munkelt and C. Ridder, "Adaptive background estimation and foreground detection using kalman filtering," ICAM, pp. 195-199, 1995.
[34] C. Wu, J. Ning, D. Zhang and L. Zhang, "Robust Mean Shift Tracking with Corrected Background-Weighted Histogram," IEEE Conference Computer Vision and Pattern Recognition, pp. 142-149, 2010.
[35] K. Nummiaro, E. Koller-Meier and L. Gool, "A Color-based Particle Filter," First International Workshop on Generative- Model- Based Vision., 2002.
[36] N. Nguyen, K. Huynh, N. Vo and T. Pham, "Fish detection and movement tracking," International Conference on Advanced Technologies for Communications (ATC), pp. 484-489, 2015.
[37] C. Spampinato, "Detection, tracking and counting fish in low quality uncontrained underwater videos," 3rd Int. Conference on Computer Vision Theory and Applications (VISAPP), vol. 2, pp. 514-519, 2008.
[38] s. Moon, J. Lee, D. Nam, H. Kim and W. Kim, "A comparative study on multi-object tracking methods for sports events," ICACT, pp. 19-22, 2017.
[39] Z. Kalal, K. Mikolajczyk and J. Matas, "Forward-backward error: Automatic detection of tracking failures," IEEE, Pattern Recognition (ICPR) International Conference, pp. 2756-2759, 2010.
[40] H. Grabner, M. Grabner and H. Bischof, "Real-time tracking via on-line boosting," BMVC, vol. 1, no. 6, 2006.
[41] B. Babenko, M. Yang and S. Belongie, "Visual tracking with online multiple instance learning," Computer Vision and Pattern Recognition, pp. 983-990, 2009.
[42] J. F. Henriques, R. Caseiro, P. Martins and J. Batisa, "High-speed tracking with kernelized correlation filters," Pattern Analysis and Machine Intelligence, vol. 37, no. 3, pp. 583-596, 2014.
[43] B. Lee and M. Hedley, "Background estimation for video surveillance," Image and vision computing New Zeland, pp. 315-320, 2002.
[44] P. M., "Background subtraction techniques: a review," System, man and cybernetics, vol. 4, pp. 3099-3104, 2004.
[45] M. Abadi, A. Agarwal and P. Barham, "TemsorFlow: Large-scale machine learning on heterogeneous system," 2015.
[46] F. Bourgeois and J. C. Lassalle, "An extension of the munkres algorithm for the assignment problem to rectangular matrices.," Communications of the ACM, vol. 7, no. 1, pp. 802-804, 1971.
[47] X. Wang, E. Cheng, I. S. Burnett, R. Wilkinson and M. Lech, "Automatic tracking of multiple zebrafish larvae with resilience against segmentation errors," IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018), pp. 1157-1160, 2018.
[48] A. Perez-Escudero, P. J. Vicente and R. Hinz, "Idtracker:Tracking individuals in a group by automatic identification of unmarked animal.," Natural Methods, vol. 11, no. 7, pp. 734-748, 2014.
[49] L. Zavorka, B. Koeck and J. Cucherousset, "Co-existence with non-native brook trout breaks down the integration of phenotypic traits in brown trout parr," Functional Ecology, vol. 31, pp. 1582-1591, 2017.
[50] G. Shen, "Road crack detection based on video image processing," 3rd International Conference on Systems and Informatics (ICSAI 2016), pp. 912-917, 2016.
[51] L. Dominguez, J. D`Amato, A. Perez, A. Rubiales and R. Barbuza. “Running license plate recognition (LPR) algorithms on smart survillance cameras. A feasibility analysis.” 13th Iberian Conference on Information Systems and Technologies (CISTI), 2018.
[52] M. Prabowo, N. Hudayani, S. Purwiyanti, S. Sulistiyanti and F. Setyawan, "A moving objects detection in underwater video using subtraction of the background model," International Conference on Electrical Engineering, Computer Science and Informations (EECSI), pp. 19-21, 2017.
[53] R. Sharma, S. Agarwal, S. Gupta and A. Prejapati.”Optimized dynamic background subtraction technique for moving object detection and tracking”. 2nd International Conference on Telecommunication and Networks (TEL-NET 2017), 2017.
[54] C. Spampinato, "Detection, tracking and counting fish in low quality uncontrained underwater videos," Proc. 3rd Int. Conf. on Computer Vision Theory and Applications (VISAPP), vol. 2, pp. 514-519, 2008.
[55] C. Spampinato, S. Palazzo, D. Giordano, I. Kavasidis, F. Lin and Y. Lin, "Covariance based fish tracking in real-life underwater environment".
[56] S. H. Park, K. Lee and K. J. Yoon, "Robust online multiple object tracking based on the confidence-based realtive motion network and correlation filter," IEEE-ICIP, pp. 3484-3488, 2016.
[57] S. Nandhini and S. Radha, "Compressed sensing based object detection and tracking system using measyrement selection process for wireless visual sensor network," IEEE WiSPNET, pp. 1117-1122, 2016.
[58] M. Chihaoui, A. Elkefi, W. Bellil and C. B. Amar, "Detection and tracking of the moving objects in a video sequence by geoesic active model," 13th International Conference Computer Graphics, Imaging and Visualization., 2016.
[59] K. X. Yang and M. Sheu, "Edge-based moving object tracking algorithm for an embedded system," APCCAS, pp. 153-155, 2016.
[60] A. Keivani, J. R. Tapamo and F. Ghayoor, "Motion-based moving object detection and tracking using K-means", IEEE Africon , pp. 32-37, 2017.
[61] S. Kumar, S. Kumar, S. Mahapatra and B. Swain, “Simulation based algorithm for tracking fish populaton in unconstrained underwater", InternationalConference on Microwave, Optical and Communcation Engineering, IIT Bhubaneswar, pp. 361-364, 2015.
Citation
Girish Gaude, Samarth Borkar, "Comprehensive Survey on Underwater Object Detection and Tracking," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.304-313, 2018.
Energy-Efficient Heuristics Job Scheduling Algorithm using DVFS Technique for Green Cloud Data Centers
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.314-322, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.314322
Abstract
Cloud computing provides unlimited on-demand resources and services through remote servers based on pay-per-use model. It includes Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS). Cloud computing facilitates efficient utilization of computing resources in large-scale cloud data centers. Day-by-day, increasing usage of cloud computing services leads to increasing energy consumption and operational cost. Moreover, it produces high amount of Co2, causing huge environmental damage. Heavy usage of cloud data centers has also become a problem to sacrifice system performance and Quality of Services (QoS). In order to overcome these problems, an efficient job-scheduling algorithm is required to reduce energy consumption and execution time without diminishing performance of the system. Apart from this, a green cloud data center plays a significant role in cloud computing to reduce Co2 emissions. Energy-efficient heuristics model is used to find an optimal solution for executing jobs of varying sizes and timings. In this paper, using Dynamic Voltage Frequency Scaling (DVFS), we introduce Energy-Efficient Job Scheduling (EEJS) algorithm to green cloud data centers. Our proposed algorithm is compared to Energy-Conscious Scheduling algorithm (ECS) and Green Energy-Efficient Scheduling algorithm (Green-EES). Experimental results are evaluated using CloudSim 3.0.3 toolkit and simulation results are validated in low-, medium-, and high-workload conditions. Compared to other two algorithms, EEJS demonstrates reduced energy consumption and execution time without violating Service Level Agreements (SLA).
Key-Words / Index Term
Cloud Computing, Job Scheduling, Heuristics Model, DVFS, Energy Consumption, SLA Violation
References
[1] Mohammad Masdari, Sima ValiKardan, Zahra Shahi, Sonay Imani Azar, Towards workflow scheduling in cloud computing: A comprehensive analysis, Journal of Network and Computer Applications, Vol. 66, pp. 64-82, May 2016.
[2] Ali Vafamehr, Mohammad E. Khodayar, Energy-aware cloud computing, The Electricity Journal, Vol. 31, No. 2, pp. 40-49, March 2018.
[3] Capturing the Multiple Benefits of Energy Efficiency, International Energy Agency (IEA), OECD/IEA, 2014.
[4] Thandar Thein, Myint Myat Myo, Sazia Parvin, Amjad Gawanmeh, Reinforcement Learning based Methodology for Energy-efficient Resource Allocation in Cloud Data Centers, Journal of King Saud University - Computer and Information Sciences, November 2018. doi: https://doi.org/10.1016/j.jksuci.2018.11.005
[5] Ali Naghash Asadi, Mohammad Abdollahi Azgomi, Reza Entezari-Maleki, Evaluation of the impacts of failures and resource heterogeneity on the power consumption and performance of IaaS clouds, The Journal of Supercomputing, Springer Science+Business Media, LLC, part of Springer Nature, November 2018. https://doi.org/10.1007/s11227-018-2699-5
[6] Ning Liu, Ziqian Dong, Roberto Rojas-Cessa, Task Scheduling and Server Provisioning for Energy-Efficient Cloud-Computing Data Centers, IEEE 33rd International Conference on Distributed Computing Systems Workshops, Philadelphia, PA, USA, pp. 226-231, July 2013.
[7] Xingjian Lu, Fanxin Kong, Jianwei Yin, Xue Liu, Huiqun Yu, Guisheng Fan, Geographical Job Scheduling in Data Centers with Heterogeneous Demands and Servers, IEEE 8th International Conference on Cloud Computing, New York, NY, USA, pp. 413-420, July 2015.
[8] K Sutha and G M Kadhar Nawaz, Research Perspective of Job Scheduling in Cloud Computing, IEEE Eighth International Conference on Advanced Computing (ICoAC), Chennai, India, pp. 61-66, January 2017.
[9] A V.Karthick, Dr.E.Ramaraj, R.Ganapathy Subramanian, An Efficient Multi Queue Job Scheduling for Cloud Computing, World Congress on Computing and Communication Technologies, Trichirappalli, India, pp. 164-166, March 2014.
[10] Chien-Hung Chen, Jenn-Wei Lin, and Sy-Yen Kuo, MapReduce Scheduling for Deadline-Constrained Jobs in Heterogeneous Cloud Computing Systems, IEEE Transactions on Cloud Computing, Vol. 6, No. 1, pp. 1-14, August 2015.
[11] Sindhu S, Mukherjee S, Efficient Task Scheduling Algorithms for Cloud Computing Environment, International Conference on High Performance Architecture and Grid Computing, Chandigarh, India, pp. 79-83, July 2011
[12] Anton Beloglazov, Rajkumar Buyya, Young Choon Lee, and Albert Zomaya, A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems, Advances in Computers, Vol. 82, No. 2, pp. 47-111, 2011.
[13] Bin Hu, Ning Xie, Tingting Zhao and Xiaotong Zhang, Dynamic Task Scheduling Via Policy Iteration Scheduling Approach for Cloud Computing, KSII Transactions on Internet and Information Systems, Vol. 11, No. 3, pp. 1265-1278, March 2017.
[14] Auday Al-Dulaimy, Wassim Itani, Rached Zantout, Ahmed Zekri, Type-Aware Virtual Machine Management for Energy Efficient Cloud Data Centers, Sustainable Computing: Informatics and Systems, May 2018.
[15] Ziqian Dong, Ning Liu and Roberto Rojas-Cessa, Greedy scheduling of tasks with time constraints for energy-efficient cloud-computing data centers, Journal of Cloud Computing: Advances, Systems and Applications, pp. 2-14, March 2015.
[16] Mateusz Zotkiewicz, Mateusz Guzek, Dzmitry Kliazovich, Minimum Dependencies Energy-Efficient Scheduling in Data Centers, IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 12, pp. 1-14, December 2016.
[17] Marco Polverini, Antonio Cianfrani, Shaolei Ren, Athanasios V. Vasilakos, Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers, IEEE Transactions on Cloud Computing, Vol. 2, No. 1, pp. 71-84, January-March 2014.
[18] P. Wieder, J.M Butler, W. Theilmann, R. Yahyapour, Service Level Agreements for Cloud Computing, Springer Science+Business Media, LLC. pp. 43–68, 2011. ISBN 978-1-4614-1614-2.
[19] Anton Beloglazov, Jemal Abawajy, Rajkumar Buyya., Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing, Future Generation Computer Systems, Vol. 28, No. 5, pp. 755–768, May 2012.
[20] Y C Lee, A Y Zomaya., Energy Conscious Scheduling for Distributed Computing Systems under Different Operating Conditions, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 8, pp. 1374-1381, 2011.
[21] Chia-Ming Wu, Ruay-Shiung Chang, Hsin-Yu Chan, A green energy-efficient scheduling algorithm using the DVFS technique for cloud datacenters, Future Generation Computer Systems, Vol. 37, pp. 141-147, July 2014.
[22] Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, Cesar A. F. De Rose and Rajkumar Buyya, CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, Software – Practice and Experience, Volume 41, Issue 1, pp. 23-50, January 2011.
Citation
K. Sutha, G. M. Kadhar Nawaz, "Energy-Efficient Heuristics Job Scheduling Algorithm using DVFS Technique for Green Cloud Data Centers," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.314-322, 2018.
Denoising of skull stripped brain tumor MR images
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.323-329, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.323329
Abstract
To improve the accuracy in segmenting the brain tumor from Magnetic resonance images (MR), pre-processing of raw MR images plays significant importance, is required for proper visualization and detection of the tumor part, to increase the quality of the image affected by the noise. The paper is mainly focused on skull removal and denoising techniques. Inclusion of skull may lead to misclassification of tumour tissues and might increase the time complexity. In this study T1, T1contrast, T2, Flair MR images is analysed in axial, sagittal and coronal planes. Mathematical morphology operation with histogram thresholding is performed to remove the skull region. Denoising the images with various filters and evaluation of filters in terms of mean square error (MSE), signal to noise ratio (SNR) and peak signal to noise ratio (PSNR) are considered for the study. The Algorithm developed provides better results for skull stripping and high PSNR is obtained for wiener filter reducing the Gaussian noise by preserving the edges.
Key-Words / Index Term
Denoising, MR Image, Morphology, , MSE, PSNR, Skull removal
References
[1] P.Narendran, V. K. Narendra Kumar and K.Somasundaram, “3D Brain Tumors and Internal Brain Structures Segmentation in MR Images”, International Journal of Image, Graphics and Signal Processing, 2012,1, 35-43.
[2] S.cha, “Update on Brain tumor imaging: From anatomy to physiology, American journal of neuroradiology”, March 2006, 27(3), 475-487.
[3] Ayse Demirhan, Mustafa Toru, and Inan Guler, “Segmentation of Tumor and Edema along with healthy tiassues of brain using wavelets and Neural Networks”, IEEE Journal of biomedical and health informatics, vol. 19, no. 4, July 2015.
[4] Horst K. Hahn and Heinz-Otto Peitgen, “The Skull Stripping Problem in MRI Solved by a Single 3D Watershed Transform”, Proc. MICCAI, LNCS, 1935, 2000, 134-143, Springer.
[5] El Sayed A, El dashan, Heba M Mohsen, kenett revett, Abdel-Badeeh M salem, “Computer aided diagnosis of human brain tumor- A survey”, Elsevier-2014.
[6] F. Segonne, A.M. Dale, E. Busa, M. Glessner, D. Salat, H.K. Hahn, and B. Fischl, “ A hybrid approach to the skull stripping problem in MRI”, NeuroImage, 22, 2004, 1060– 1075.
[7] Andre G.R. Balan, AgmaJ.M.Traina, Marcela X. Ribeiro, Paulo M. A. Marques and Caetano Traina Jr., “Smart histogram analysis applied to the skull-stripping problem in T1-weighted MRI, Computers in Biology and Medicine”, 42, 2012, 509-522.
[8] Juan Eugenio Iglesias, Cheng-Yi Liu, Paul Thompson and Zhuowen Tu, “Robust Brain Extraction across Datasets and Comparison with Publicly Available Methods”, IEEE Transactions on Medical Imaging, 2011.
[9] Francisco J. Galdames, Fabrice Jaillet and Claudio A. Perez, “An Accurate Skull Stripping Method Based on Simplex Meshes and Histogram Analysis in Magnetic Resonance Images”, Elsevier, Journal of Neuroscience Methods, 206, 2012, 103–119.
[10] Audrey H. Zhuang, Daniel J. Valentino and Arthur W. Toga, “Skull-stripping Magnetic Resonance Brain Images Using a Model-based Level Set”, Neuro Image, 32, 2006, 79-92.
[11] Orazio Gambino, Enrico Daidone, Matteo Sciortino, Roberto Pirrone and Edoardo Ardizzone, “Automatic Skull Stripping in MRI based on Morphological Filters and Fuzzy C-means Segmentation”, 33rd Annual International Conference of the IEEE EMBS Boston, Massachusetts USA, 2011.
[12] Dwarikanath Mahapatra, “Skull Stripping of Neonatal Brain MRI: Using Prior Shape Information with Graph Cuts”, Springer, J Digit Imaging, 25, 2012, 802–814.
[13] Rosniza Roslan, Nursuriati Jamil and Rozi Mahmud, “Skull Stripping of MRI Brain Images using Mathematical Morphology”, 2010 IEEE EMBS Conference on Biomedical Engineering & Sciences (IECBES 2010), 2010.
[14] John Chivertona, Kevin Wells, Emma Lewis, Chao Chen, Barbara Podda and Declan Johnson, “Statistical Morphological Skull Stripping of Adult and Infant MRI Data”, Computers in Biology and Medicine, 37, 2007, 342-357.
[15] Selvaraj. D and Dhanasekaran. R, “MRI Brain Tumor Detection by Histogram and Segmentation by Modified GVF Model”, International Journal of Electronics and Communication Engineering & Technology (IJECET), 4(1), 2013, 55-68.
[16] Sajjad Mohsin, Sadaf Sajjad, Zeeshan Malik, and Abdul Hanan Abdullah, “Efficient Way of Skull Stripping in MRI to Detect Brain Tumor by Applying Morphological Operations, after Detection of False Background”, International Journal of Information and Education Technology, 2(4), 2012.
[17] Saritha Saladi, N Amrutha Prabha, “Analysis of denoising filters on MRI brain images”, volume 27, 2017.
[18] Anchal A, Budhiraja S, Goyal B, Dogra A, Agarwal S, “An efficient image denoising scheme for higher noise levels using spatial domain filters”, Biomedical and pharmacology journal,11(2), June 2018, 625-634.
[19] Iza Sazanita Isa, Siti Noraini Sulaiman, Muzaimi Mustapha, Sailudin Darus, “Evaluating Denoising performances of Fundamental filters for T2-Weighted MRI Images”, Elsevier, International conference on Knowledge based and intelligent information and engineering systems, 60(2015),760-768.
[20] Ahmed faisal, Sharmin parveen, Shahriar badsha, “An Improved image denoising and segmentation approach for detecting tumor from 2-D MRI Brain images”, Advanced computer science applictions and technologies, 2012.
[21] R. Balachander, R. Rajkumar, “Efficient and robust denoising of magnetic resonance brain images based on wavelet based nonlocal means algorithm”, International journal of engineering and science, 84-89, 2015.
[22] P. Perona, J. Malik, “Scale space and edge detection using anisotropic diffusion”, IEEE Transactions on Image Processing 12 (8) (1990) 629–639.
[23] Jian Yang, Jingfan Fan, Yongtian Wang, “Brain MR image denoising for rician noise using pre-smooth non-local means filter”, Biomedical Engineering online, 2015.
[24] Virendra Kumar, Sonia Saini, Sanjeev Dhiman, “Quality Improvement on MRI Corrupted with Rician Noise using Wave Atom Transform”, International Journal of Computer Applications, Vol. 37, No. 8, Jan. 2012.
[25] Pei-Eng Ng and Kai-Kuang Ma, “A Switching Median Filter with BDND for Extremely Corrupted Images”, IEEE Trans Image Processing, Vol. 15, No. 6, pp. 1506-1516, June 2006.
[26] A.C. Motagi and V.S. Malemath, “Detection of brain tumor using Expectation maximization and watershed”, International journal of scientific research in computer science and engineering, Vol. 6, Issue. 3, pp. 76-80, June 2018.
[27] S.D. Kasute, M Kohlekar, “ROI based Medical image compression”, International journal of scientific research in network security and communication, vol.5, Issue.1, pp-6-11, January 2011.
Citation
Akshath M J, H S Sheshadri, "Denoising of skull stripped brain tumor MR images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.323-329, 2018.
Library Management Software Packages: A Case Study of Central University of Jammu and SMVDU-Katra.
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.330-335, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.330335
Abstract
Due to the changing scenario of the 21st century and because of the rapid advancement in the information technology, the role of university librarian has become very vital and significant. Automation and digitization of the libraries have become an essential factor for achieving the objectives of the users of the present and future generations. During the past decade we have seen many changes around the world in the library and information field. Various libraries and information centers are managed to improve their efficiency, capability, services and productivity by using the latest technologies. This study has been presented with the types of library management software packages being used in the Central University of Jammu and Shri Mata Vaishno Devi University (SMVDU) - Katra. The main purpose of the study is to provide some basic idea to librarians which help them in selecting the suitable library management software package for their respective libraries.
Key-Words / Index Term
Software, Automation, Libsys, Koha, Etc
References
[1] Sanjay, Kataria. “Emerging Technologies and changing dimensions of Libraries and information services” KBD publications, New Delhi 2010.
[2] A.P. Khan & Others. Automated Library Data Tracking System By Smartphone. International Journal of Computer Sciences and Engineering. Vol.6, Issue. 4, pp. 379-382.2018
[3] Vikash Kumar Shukla & Others. “Android Based Management System for Library”, International Journal of Computer Sciences and Engineering. Vol.4, Issue. 4, pp. 102-105, 2016
[4] www.shodhganga.inflibnet.ac.in
[5] www.doaj.org
[6] www.emeraldinsight.com
[7] www.iosrjournals.org
[8] www.scholar.google.co.in
Citation
Sudesh Kumar, Sangita Gupta, "Library Management Software Packages: A Case Study of Central University of Jammu and SMVDU-Katra.," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.330-335, 2018.
Recognise the Degraded Devnagari Script by Dimensionality Reduction Linear and quadratic Classifiers using Fisher Linear Discriminant
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.336-340, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.336340
Abstract
In this paper we are implementing parametric classifier Linear and quadratics using fisher linear discriminant for find the misclassification rate using cross validation, useful in recognizing the degraded devnagari script scan document.Dimensionality reduction is the process of transforming input data into a lower dimensional space where a more efficient classifier can be built are divided in two groups: Feature extraction, which map input data using linear transformation i.e. a transformation matrix and feature selection, which performs the mapping by selecting a subset of the original features.Feature extraction methods are supported by fisher’s linear discriminant function.Feature selection is use to choose an optimal subset according to some criterion of cardinality m among the d input features. In feature ranking each Feature is evaluated individually according to the chosen criterion, and the values are then sorted the m features with the best value of the criterion are retained for classification. Also we focus on learning machine stages which consists of two stages: dimensionality reduction and classification.
Key-Words / Index Term
Linear, Quadratic, Fisher Linear Discriminant, Cross validation, Feature Extraction, Dimensionality
References
[1] Duda, R.O., Hart, P.E. & Stork, D.G. (2001). Pattern Classification, 2nd Edition, John Wiley & Sons, New York.
[2] Jain, A.K., Duin, R.P.W. & Mao, I. (2000). Statistical pattern recognition: a review, IEEE Transactions on Pattern Analysis and Machine Intelligence 22(1), 4–37.
[3] , “Any discrimination rule can have an arbitrarily bad probability of error for finite sample size,” IEEE Trans. Pattern Anal. Machine Intell., vol. PAMI-4, pp. 154–157, 1982.
[4] “Automatic pattern recognition: A study of the probability of error,” IEEE Trans. Pattern Anal. Machine Intell., vol. 10, pp. 530–543, 1988.
[5] L. Devroye, L. Gy¨orfi, and G. Lugosi, A Probabilistic Theory of Pattern Recognition. New York: Springer-Verlag, 1996.
[6] C.R. Rao, The utilization of multiple measurements in problems of biological classification, Journal of the Royal Statistical Society, Series B 10 (1948) 159–203.
[7] O.S. Hamsici, A.M. Martinez, Bayes optimality in linear discriminant analysis, IEEE Transactions on Pattern Analysis and Machine Intelligence 30 (2008) 647–657.
[8] A.M. Martinez, M. Zhu, Where are linear feature extraction methods applicable, IEEE Transactions on Pattern Analysis and Machine Intelligence 27 (2005) 1934–1944.
[9] S. Petridis, S.J. Perantonis, On the relation between discriminant analysis and mutual information for supervised linear feature extraction, Pattern Recognition 37 (2004) 857–874.
[10] K. Fukunaga, J.M. Mantock, Nonparametric discriminant analysis, IEEE Transactions on Pattern Analysis and Machine Intelligence 5 (1983) 671–678.
[11] M. Loog, R.P.W. Duin, R. Haeb-Umbach, Multiclass linear dimension reduction by weighted pairwise fisher criteria, IEEE Transactions on Pattern Analysis and Machine Intelligence 23 (2001) 762–766.
[12] R. Lotlikar, R. Kothari, Fractional-step dimensionality reduction, IEEE Transactions on Pattern Analysis and Machine Intelligence 22 (2000) 623–627.
[13] N. Kumar, A.G. Andreou, Heteroscedastic discriminant analysis and reduced rank HMMs for improved speech recognition, Speech Communication 26 (1998) 283–297.
[14] R.P.W. Duin, M. Loog, Linear dimensionality reduction via a heteroscedastic extension of LDA: the Chernoff criterion, IEEE Transactions on Pattern Analysis and Machine Intelligence 26 (2004) 732–739.
[15] T.M. Cover, J.A. Thomas, Elements of Information Theory, second ed., Wiley,New York, 2006.
[16] M. Ben-Bassat, User of distance measures, in: P. Krishnaiah, L. Kanal (Eds.), Handbook of Statistics, North-Holland, Amsterdam, 1982, pp. 773–791.
[17] P.A. Estevez, M. Tesmer, C.A. Perez, J.M. Zurada, Normalized mutual information feature selection, IEEE Transactions on Neural Networks 20 (2009) 189–201.
[18] N. Kwak, C.-H. Choi, Input feature selection by mutual information based on Parzen window, IEEE Transactions on Pattern Analysis and Machine Intelligence 24 (2002) 1667–1671.
[19] K.E. Hild, D. Erdogmus, K. Torkkola, J.C. Principe, Feature extraction using information-theoretic learning, IEEE Transactions on Pattern Analysis and Machine Intelligence 28 (2006) 1385–1392.
[20] K.E. Hild, D. Erdogmus, J.C. Principe, An analysis of entropy estimators for blind source separation, Signal Processing 86 (2006) 182–194.
[21] D. Erdogmus, J.C. Principe, Generalized information potential criterion for adaptive system training, IEEE Transactions on Neural Networks 13 (2002) 1035–1044.
[22] P. Viola, W.M. Wells III, Alignment by maximization of mutual information, International Journal of Computer Vision 24 (1997) 137–154.
[23] D.W. Scott, Multivariate Density Estimation: Theory, Practice, and Visualization, Wiley, 1992.
[24] A.W. Bowman, A. Azzalini, Applied Smoothing Techniques for Data Analysis: The Kernel Approach with S-Plus Illustrations, Oxford University Press, New York, 1997.
[25] M. Loog, On the equivalence of linear dimensionality-reducing transformations, Journal of Machine Learning Research 9 (2009) 2489–2490.
[26] C.-C. Chang, C.-J. Lin, LIBSVM: a library for support vector machines, 2001. /http://www.csie.ntu.edu.tw/+cjlin/libsvmS.
[27] J. Li, X. Li, D. Tao, KPCA for semantic object extraction in images, Pattern Recognition 41 (2008) 3244–3250.
[28] Y. Xu, D. Zhang, J.-Y. Yang, A feature extraction method for use with bimodal biometrics, Pattern Recognition 43 (2010) 1106–1115.
[29]Senhadji, L., Carrault, G., Bellanger, J. J., & Passariello, G., "Comparing wavelet transforms for recognizing cardiac patterns", IEEE Engineering in Medicine and Biology Magazine, vol. 14, p. 167-173, 1995.
[30]Gautam, Mayank Kumar, "Performance Analysis of ECG Signal Using by Wavelet Transform, Independent Component Analysis and Fast Fourier Transform", IJSRCSEIT, vol. 1, pp. 95-98, Sept-Oct.2016.
[31] Amirtharajan R and Rayappan JBB ,‖ An intelligent chaotic embedding approach to enhance stego image quality‖,Inform Science, vol. 193, pp. 115-124, June 2012. [32] Bassam Jamil Mohd, Saed Abed, Thaier Al- Hayajneh and Sahel Alouneh, ―FPGA Hardware of the LSB Steganography Method,‖ IEEE Transaction on consumer Electronics, vol. 978, no. 1, pp. 4673– 1550,2012.
Citation
Sushilkumar N. Holambe, Ulhas B Shinde, "Recognise the Degraded Devnagari Script by Dimensionality Reduction Linear and quadratic Classifiers using Fisher Linear Discriminant," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.336-340, 2018.
Analysis of Criminal Behavior through Clustering Approach
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.341-344, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.341344
Abstract
The spatio-temporal modeling of a social system play an important role in forecasting the future trend of that system. In this paper, we present an approach to model the past crime behavior for future crime prediction. The study considered major crime event from Haryana state and used clustering approach to predict future crime trend. The analysis results obtained on ‘R’ tool for the past few years are found inconformity with that of real time trend, which envisage the success of our model proposed in this paper.
Key-Words / Index Term
crime location, criminal, crime prediction, clustering
References
[1] J. Xu Jennifer and Chen Hsinchun, “Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks”, Decision Support Systems Elsevier, pp. 473-487, 2004.
[2] L. Buczak Anna and M. Gifford Christopher, “Fuzzy Association Rule Mining for Community Crime Pattern Discovery”, ACM, 2010.
[3] Vadivel A. and G. Shaila S. , “Event Pattern Analysis and Prediction at Sentence Level using Neuro-Fuzzy Model for Crime Event Detection”, Pattern Anal Applic Springer, 2014.
[4] Zeleznikow John et al, “A Methodology for Constructing Decision Support Systems for Crime Detection”, Springer, pp. 823-829, 2005.
[5] J. Schreck Christopher et al, “Examining What Makes Violent Crime Victims Unique: Extending Statistical Methods for Studying Specialization to the Analysis of Crime Victims”, J Quant Criminol Springer, pp. 651-671, 2012.
[6] S. Albanese Jay, “The prediction and control of organized crime: a risk assessment instrument for targeting law enforcement efforts”, Trends in Organized Crime, pp. 4-29, 2001.
[7] Bogomolov Andrey et al, “Once Upon a Crime: Towards Crime Prediction from Demographics and Mobile Data”, ACM, pp. 427-434, 2014.
[8] Zhang Chao et al, “Keeping Pace with Criminals: Designing Patrol Allocation against Adaptive Opportunistic Criminals”, International Foundation for Autonomous Agents and Multiagent Systems, pp. 1351-1359, 2015.
[9] Poolsappasit Nayot and Ray Indrakshi, “TowardsAchieving Personalized Privacy for Location-Based Services”, Transactions on data privacy, pp. 77-99, 2009.
[10] Keppensa Jeroen and Schafer Burkhard, “Knowledge based crime scenario modelling”, Expert Systems with Applications Elsevier, pp. 203-222, 2006.
[11] Adderley Richard and Bond John, “Predicting crime scene attendance”, Policing: An International Journal of Police Strategies & Management, Emerald Group Publishing Limited, pp. 292-305, 2008.
[12] M. Arietta Sean et al, “City Forensics: Using Visual Elements to Predict Non-Visual City Attributes”, IEEE transactions on visualization and computer graphics, pp. 2624 – 2633, 2014.
[13] Maurushat Alana et al, “Using ‘Big’ Metadata for Criminal Intelligence: Understanding Limitations and Appropriate Safeguards”, ACM, pp. 196-200, 2015.
[14] J. Xu Jennifer and Chen Hsinchun, “CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery”, ACM Transactions on Information Systems, pp. 201-226, 2005.
[15] Kadar Cristina and Pletikosa Cvijikj Irena, “City Watch: The Personalized Crime Prevention Assistant”, ACM, pp. 260-261, 2014.
[16] Yu Chung-Hsien et al, “Crime Forecasting Using Data Mining Techniques”, Proceedings 11th IEEE International Conference on Data Mining Workshops, pp. 779-786, 2011.
[17] Calders Toon and Verwer Sicco, “Three naive Bayes approaches for discrimination-free classification”, Data Min Knowl Disc Springer, pp. 277-292, 2010.
[18] Jaitman Laura and Machin Stephen, “Crime and immigration: new evidence from England and Wales”, IZA Journal of Migration Springer, pp. 2 – 19, 2013.
[19] Farrell Graham et al, “Debuts and legacies: the crime drop and the role of adolescence‑limited and persistent offending”, Crime Science a Springer Open Journal, pp. 4-16, 2015.
[20] Murray Joseph et al, “Childhood behaviour problems predict crime and violence in late adolescence: Brazilian and British birth cohort studies”, Soc Psychiatry PsychiatrEpidemiol Springer, pp. 579-589, 2015.
[21] Wan Lee Sang et al, “A Non supervised Learning Framework of Human Behavior Patterns Based on Sequential Actions”, IEEE transactions on knowledge and data engineering, pp. 479-492, 2010.
[22] J. Agarwal et al, “Crime analysis using k-means clustering”, International Journal of Computer Applications, pp 1 - 4, 2013.
[23] P. Gera, and R. Vohra, “Predicting Future Trends in City Crime Using Linear Regression”, IJCSMS, pp 58 – 64, 2014.
Citation
Romika Yadav, Savita Kumari Sheoran, "Analysis of Criminal Behavior through Clustering Approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.341-344, 2018.
Cross Validation Of Supervised Machine Learning Models Based On Random Forest and Support Vector Machine Techniques for 12S rRNA Molecular Marker: Implementation, Comparison and Utility
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.345-349, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.345349
Abstract
Folding plays imperative role in the cross validation studies of machine learning based models. The folding divides the original sample into training and test sets, which evaluate performance of the machine learning based models and present scenarios for optimising the efficacy of such models. The present study discusses about the computational approaches applied for preparing training and test sets at different folds from 12S rRNA molecular marker sequence dataset of fish and application of these sets to estimate the performance of the proposed models based on machine learning techniques viz. Random Forest and Support Vector Machine. Additionally, the study presents the comparative accounts on efficacies of these models estimated at different folding. The findings from the study showed that folding has linear relationship with the efficacy of the model. The model with random forest was found better for solving the classification problems of the molecular marker sequence data. This study provides understanding on utility of the folding level in increasing the efficacy of the machine learning based methods and suggests for suitable machine learning method for solving the multiclass problem data especially where the identification using the molecular markers sequence data is involved.
Key-Words / Index Term
Machine learning method, Random forest, Support vector machine, Folding level, 12S rRNA, Cross validation
References
[1] T. Mitchell, “Machine Learning, McGraw Hill Publisher, New York, NY,” pp-441, 1997.
[2] S.U. Bohra, P.V. Ingole , “Review on Neural Network Based Approach Towards English Handwritten Alphanumeric Characters Recognition”, International Journal of Computer Sciences and Engineering, Vol.1, Issue.3, pp.22-25, 2013.
[3] V. Bhambri, “Data Mining as a Solution for Data Management in Banking Sector”, International Journal of Computer Sciences and Engineering, Vol.1, Issue.1, pp.20-25, 2013.
[4] P. Yang, , Hwa Y. Yang, B. Zhou, and Y. Zomaya, et al., “A review of ensemble methods in bioinformatics,” Current Bioinformatics, vol. 5(4), pp. 296–308, 2010.
[5] A.E. Dahlberg, “The functional role of ribosomal RNA in protein synthesis,” Cell, vol. 57, pp. 525–529, 1989.
[6] H.F. Noller, “Structure of ribosomal RNA,” Annual Review Biochemistry, vol. 53, pp. 119–162, 1984.
[7] K.M. Kjer, “Use of rRNA secondary structure in phylogenetic studies to identify homologous positions: an example of alignment and data presentation from the frogs,” Molecular Phylogenetics and Evolution, vol. 4, pp. 314–330, 1995.
[8] A.M. Simons and R.L. Mayden, “Phylogenetic relationships of the western North American phoxinins (Actinopterygii: Cyprinidae) as inferred from mitochondrial 12S and 16S ribosomal RNA sequences,” Molecular Phylogenetics and Evolution, vol. 9, pp. 308–329, 1998.
[9] J. Alves-Gomes, G. Orti, M. Haygood, W. Heiligenberg, and A. Meyer, “Phylogenetic analysis of South American electric fishes (order: Gymnotiformes) and the evolution of their electrogenic system: a synthesis based on morphology, electrophysiology, and mitochondrial sequence data,” Molecular Biology and Evolution, vol. 12, pp. 298-318, 1995.
[10] J.C.I. Lee and J.G. Chang, “Random amplified polymorphic DNA polymerase chain reaction (RAPD PCR) fingerprints in forensic species identification,” Forensic Science International, vol. 67(2), pp. 103–107, 1994.
[11] R.S. Blackett and P. Keim, “Big game species identification by deoxyribonucleic acid (DNA) probes,” Journal of Forensic Sciences, vol. 37(2), pp. 590–596, 1992.
[12] R. Meyer, C. Höfelein, J. Lüthy and U. Candrian, “Polymerase chain reaction-restriction fragment length polymorphism analysis: a simple method for species identification in food,” Journal of AOAC International, vol. 78(6), pp. 1542–1551, 1995.
[13] M.L. López-Andreo, Lugo, A. Garrido-Pertierra, M.I. Prieto and A. Puyet, “Identification and quantitation of species in complex DNA mixtures by real-time polymerase chain reaction,” Analytical Biochemistry, vol. 339(1), pp. 73–82, 2005.
[14] NCBI Resource Coordinators, “Database resources of the National Center for Biotechnology Information,” Nucleic Acids Research, vol. 44, pp. D7–D19, 2016.
[15] X. Zhang, J. Lee, and L.A. Chasin, “The effect of nonsense codons on splicing: a genomic analysis,” RNA,vol. 9, pp. 637–639, 2006.
[16] C.M. Vander Walt and E. Barnard, “Data characteristics that determine classifier performance,” Proceedings of the 17th Annual Symposium of the Pattern Recognition Association of South Africa, pp. 166-171, 2006.
[17] Li. Yang, Z. Tan, D. Wang, L. Xue, M. Guan, T. Huang, and R. Li, “Species identification through mitochondrial rRNA genetic analysis,” Scientific Reports, vol. 4, pp. 4089, 2014.
[18] P.K. Meher, T.K. Sahu and A.R. Rao, “Identification of species based on DNA barcode using kmer feature vector and Random forest classifier,” Gene, vol. 592(2), pp. 316-24, 2016.
[19] C. Guisande, A. Manjarrés-Hernández, P. Pelayo-Villamil, C. Granado-Lorencio, I. Riveiro, A. Acu˜na, E. Prieto-Piraquive, E. Janeiro, J.M. Matías, C. Patti, B. Patti, S. Mazzola, S. Jiménez, V. Duqueg and F. Salmerón, “IPez: An expert system for the taxonomic identification of fishes based on machine learning techniques,” Fisheries Research, vol. 102, pp. 240–247, 2010.
[20] Satoh P. Takashi, Miya Masaki, Mabuchi Kohji and Nishida Mutsumi, “Structure and variation of the mitochondrial genome of fishes,” BMC Genomics. Vol. 17,pp. 719, 2016.
[21] E. Weitschek, Iulia G. Fiscon and G. Felici “Supervised DNA Barcodes species classification: analysis, comparisons, and results,” BioData Mining, 7, pp. 4, 2014.
Citation
Rameshwar Pati, Ajey Kumar Pathak,, Navita Srivastava, "Cross Validation Of Supervised Machine Learning Models Based On Random Forest and Support Vector Machine Techniques for 12S rRNA Molecular Marker: Implementation, Comparison and Utility," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.345-349, 2018.
Multiclass Classification of fMRI using Linear Collaborative Discriminant Regression Classifier
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.350-353, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.350353
Abstract
In this paper, a hybrid GA-LCDRC model is proposed to address multiclass functional MRI classification problem. KNN based genetic algorithm is used as the feature selector and linear collaborative discriminant regression classifier (LCDRC) is used as the classifier. The effectiveness and usefulness of this model is assessed based on its classification specificity, sensitivity and accuracy. This approach is tested to Haxby’s 2001 functional MRI dataset with eight different classes. The result indicates that the proposed hybrid model can be used for multiclass cognitive state classification.
Key-Words / Index Term
fMRI, multiclass, linear collaborative discriminant regression classifier (LCDRC), genetic algorithm
References
[1] F. Pereira, T. Mitchell, and M. Botvinick, “Machine learning classifiers and fMRI: A tutorial overview,” NeuroImage, Vol. 45, no. 1, pp. S199–S209, 2009.
[2] K. A. Norman, A. M. Polyn, G. J. Detre, and J. V. Haxby, “Beyond mind-reading: Multi-voxel pattern analysis of fMRI data”, Trends Cogn. Sci., Vol. 10, pp. 424–430, 2006.
[3] X. Qu, S. Kim, R. Cui, and H. J. Kim, “Linear collaborative discriminant regression classification for face recognition”, Journal of Visual Communication and Image Representation, Vol. 31, pp. 312-319, 2015.
[4] J.V. Haxby, M.I. Gobbini, M.L. Furey, A. Ishai, J.L. Schouten, and P. Pietrini, “Distributed and overlapping representations of faces and objects in ventral temporal cortex” Science, vol. 293, no. 5539, pp. 2425–2430, 2001.
[5] Yousefnezhad, Muhammad, and Daoqiang Zhang. "Decoding visual stimuli in human brain by using Anatomical Pattern Analysis on fMRI images" In International Conference on Brain Inspired Cognitive Systems, pp. 47-57. Springer, Cham, 2016.
[6] Kuncheva, Ludmila I., Juan J. Rodríguez, Catrin O. Plumpton, David EJ Linden, and Stephen J. Johnston. "Random subspace ensembles for fMRI classification" IEEE transactions on medical imaging 29, no. 2, pp 531-542, 2010.
[7] Halthor, A., & Kumar, K. A., “Prediction of visual perception from BOLD fMRI”, In Communication Systems, Computing and IT Applications (CSCITA), 2nd International Conference on (pp. 78-83). IEEE. 2017.
[8] Loula, J., Varoquaux, G., & Thirion, B, “Decoding fMRI activity in the time domain improves classification performance” NeuroImage, Vol 180, pp 203-210, 2017.
[9] Sun, X., Park, J., Kang, K., & Hur, J., “Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images”, In Systems, Man, and Cybernetics (SMC), IEEE International Conference on (pp. 1001-1006). IEEE 2017.
[10] Shailaja K., Anuradha B., “Deep Learning Based Adaptive Linear Collaborative Discriminant Regression Classification for Face Recognition”. Smart and Innovative Trends in Next Generation Computing Technologies. NGCT 2017.
Citation
K. O. Gupta, P. N. Chatur, "Multiclass Classification of fMRI using Linear Collaborative Discriminant Regression Classifier," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.350-353, 2018.
Face Recognition using Symbolic Data with Texture Features
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.354-358, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.354358
Abstract
Face recognition is a type of biometric identification method, it is challenging and one of the active research area in the field of Computer Vision. Variations in face image is due to changes in expression, presence of occlusion, geographical variations and illumination along with aging are some of the challenges to face recognition technique. In this paper, we attempt to solve illumination challenge for face recognition. Here, we propose a novel symbolic face recognition technique using Logarithm Gradient Histogram (LGH). Experimental results are carried out on standard benchmark databases like Extended YaleB, ORL. The performance of the proposed face recognition technique turns out to be 94.35 to 100% for the mentioned databases.
Key-Words / Index Term
Face recognition, Illumination invariant feature, Logarithm Gradient Histogram (LGH)
References
[1] Hiremath, P. S., and C. J. Prabhakar. "Face recognition technique using symbolic PCA method." International Conference on Pattern Recognition and Machine Intelligence. Springer, Berlin, Heidelberg, 2005.
[2] Hiremath, P. S., and C. J. Prabhakar. "Acquiring non linear subspace for face recognition using symbolic kernel PCA method." Journal of Symbolic Data Analysis 4.1 (2006): 15-26.
[3] Hiremath, P. S., and Manjunatha Hiremath. "Depth and intensity Gabor features based 3D face recognition using symbolic LDA and AdaBoost." International Journal of Image, Graphics and Signal Processing (IJIGSP) ISSN (2014): 2074-9074.
[4] Jolliffe, Ian. "Principal component analysis." International encyclopedia of statistical science. Springer, Berlin, Heidelberg, 2011. 1094-1096.
[5] Roweis, Sam T., and Lawrence K. Saul. "Nonlinear dimensionality reduction by locally linear embedding." science290.5500 (2000): 2323-2326.
[6] Chien, Jen-Tzung, and Chia-Chen Wu. "Linear Discriminant Analysis (LDA)." (2005).
[7] Delorme, Arnaud, and Scott Makeig. "EEGLAB: an open source toolbox for analysis of single-trial EEG dynamics including independent component analysis." Journal of neuroscience methods 134.1 (2004): 9-21.
[8] He, Xiaofei, and Partha Niyogi. "Locality preserving projections." Advances in neural information processing systems. 2004.
[9] Gais, Steffen, et al. "Sleep transforms the cerebral trace of declarative memories." Proceedings of the National Academy of Sciences 104.47 (2007): 18778-18783.
[10] Krogh, Anders, et al. "Predicting transmembrane protein topology with a hidden Markov model: application to complete genomes." Journal of molecular biology 305.3 (2001): 567-580.
[11] T. Ojala, M. Pietik¨ainen, D. Harwood, A comparative study of texture 420 measures with classification based on featured distributions, Pattern recognition 29 (1) (1996) 51–59.
[12] T. Ojala, M. Pietikainen, T. Maenpaa, Multiresolution gray-scale and rotation invariant texture classification with local binary patterns, IEEE Transactions on pattern analysis and machine intelligence 24 (7) (2002) 971–987.
[13] Z. Guo, L. Zhang, D. Zhang, A completed modeling of local binary pattern operator for texture classification, IEEE Transactions on Image Processing 19 (6) (2010) 1657–1663.
[14] T. Ahonen, E. Rahtu, V. Ojansivu, J. Heikkila, Recognition of blurred faces using local phase quantization, in: Pattern Recognition, 2008. ICPR 2008. 430 19th International Conference on, IEEE, 2008, pp. 1–4.
[15] S. Liao, X. Zhu, Z. Lei, L. Zhang, S. Li, Learning multi-scale block local binary patterns for face recognition, Advances in Biometrics (2007) 828– 837
[16] Zhu, Jun-Yong, et al. "Illumination invariant single face image recognition under heterogeneous lighting condition." Pattern Recognition 66 (2017): 313-327.
Citation
Yogish Naik G.R., Arun Kumar H.D., Prabhakar C.J., "Face Recognition using Symbolic Data with Texture Features," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.354-358, 2018.