Improving Overall usage of Servers by Measuring Uneven Utiliztion of a Server and allocating the Applications in the Face of Multidimensional Resource Constraints
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.300-307, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.300307
Abstract
Major objective of cloud provider is to maximize the resource utilization of cloud servers as well as to reduce the energy consumption and operative cost of the datacenter. However, the servers in many existing datacenters are underutilized in practice due to over-provisioning of peak demand. Many times, the datacenter come across situations wherein large number of application requests simultaneously demand multidimensional resources such as CPU, memory, bandwidth. In such situations it is highly impractical for the cloud service provider to satisfy the application requests of all the users within stipulated time, especially when sufficient resources are not available with them. In order to address this problem, we designed a system which measures the resource utilization of all servers before allocating the application requests to server and then dynamically allocate the application requests to the server which is underutilized. This yields in improving the overall utilization of servers. Our system initially checks the server utilization in terms of CPU, Memory and Bandwidth resource utilization against predefined threshold value. If resource of any server goes beyond its threshold value, then application request will not be allocated to that server to avoid the server overloading. That means our system redirect the application request to the underutilized server so as to improve the server resource utilization in the face of multidimensional resource constraints. The experimental results demonstrate that our system improves the overall server resource utilization by 10%.
Key-Words / Index Term
Cloud Service Provider, User Request, Resource utilization, Resource constraints
References
[1] Abhinandan S. Prasad, and Shrisha Rao,”A Mechanism Design Approach to Resource Procurement in Cloud Computing”, IEEE Transactions on Computers, Vol. 63, No. 1, Pp.17-30, January 2014.
[2] Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Member, IEEE ,Luigi Lo Iacono, and Ninja Marnau,” Security and Privacy-Enhancing Multicloud Architectures” IEEE Transactions On Dependable & Secure Computing, Vol. 10, No. 4, July/August 2013.
[3] En-Hao Chang, Chen-Chieh Wang, Chien-Te Liu, Kuan-Chung Chen, Student Member, Ieee, And Chung-Ho Chen, Member, IEEE,” Virtualization Technology For Tcp/Ip Offload Engine”, IEEE Transactions On Cloud Computing, Vol. 2, No. 2, April-June 2014.
[4] Zhen Xiao, Senior Member, Ieee, Qi Chen, And Haipeng Luo,” Automatic Scaling Of Internet Applications For Cloud Computing Services”, IEEE Transactions On Computers, Vol. 63, No. 5, May 2014.
[5] Hui Zhang, Guofei Jiang, Kenji Yoshihira, And Haifeng Chen,”Proactive Workload Management In Hybrid Cloud Computing IEEE Transactions On Network And Service Management”, Vol. 11, No. 1, March 2014
[6] S.K.Sonkar, .M.U.Kharat,” A Review on Resource Allocation and VM Scheduling Techniques and a Model for Efficient Resource Management in Cloud Computing Environment”, IEEE International conference on ICTBIG), ISBN: 978-1-5090-5519-9. Nov. 2016, DOI: 10.1109/ICTBIG.2016.7892646.
[7] Shi J.Y., Taifi M., Khreishah A., “Resource Planning for Parallel Processing in the Cloud,” in IEEE 13th International Conference on High Performance and Computing, Nov. 2011, pp. 828-833.
[8] S.K.Sonkar, Dr.M.U.Kharat,” A Survey on Resource Management in Cloud Computing Environment”, International Journal of Advanced Trends in Computer Science and Engineering, vol4 (issue4), Pages: 48 – 51, July - August 2015, ISSN: 2278-3091.
[9] Zhen Xiao, Senior Member, IEEE, Weijia Song, and Qi Chen, “Dynamic resource allocation using virtual machine in cloud computing environment,” IEEE Transaction on Parallel and Distributed Systems, vol.24, no.6, pp.1107-1117, June 2013.
[10] J. Hu, J. GU, G. Sun, and T. Zhao, “A scheduling strategy on load balancing of virtual machine resources in cloud computing environment,” in 3rd IEEE Int. Symp. On Parallel Architectures, Algorithms and Programming (PAAP), 2010, 18-20 Dec. 2010, pp.89-96.
[11] Xin Li; Zhuzhong Qian; Ruiqing Chi; Bolei Zhang; Sanglu Lu,” Balancing Resource Utilization for Continuous Virtual machine Requests in Clouds”, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS),IEEE Conference Publication 2012 ,Pages: 266 - 273, DOI: 10.1109/IMIS.2012.72
[12] Sonali L. Vidhate, M. U. Kharat “Resource Aware Monitoring in Distributed System using Tabu Search Algorithm”, International journal of Computer Applications, Vol no.96, issue 23, June 2014, ISSN:0975-8887
[13] Daochao Huang, Peng Du, Chunge Zhu, Hong Zhang, Xinran Liu“Multi-resource Packing for Job Scheduling in Virtual Machine Based Cloud Environment”, IEEE symposium on Service Oriented System Engineering, Catalogue number: 978-1-4799-8365, DOI: 10.1109/SOSE.2015.30.
[14] Ryan Jansen, Paul R. Brenner, “Energy Efficient Virtual Machine Allocation in the Cloud an Analysis of Cloud Allocation Policies”, 2nd IEEE conference on Green computing, Catalogue number: 978-1-4577-1221-0/11.
[15] Jun Nie, “Research on Task Scheduling Strategy Based on Cloud Computing Environment,” Journal of Applied Science and Engineering Innovation, Vol.5 No.1, 2018, pp. 9-12,ISSN:2331-9070
[16] Hsin-Yu Shih, Jenq-Shiou Leu, “Improving Resource Utilization in a Heterogeneous Cloud Environment,” IEEE 18th Asia-Pacific Conference on Communications (APCC) 2012, pp. 185-189, 2012, DOI: 10.1109/APCC.2012.6388127.
[17] Preeti Abrol, Dr. Savita Gupta, Karanpreet Kaur, “Analysis of Resource Management and Placement Policies using a new Nature Inspired Meta Heuristic SSCWA avoiding Premature Convergence in Cloud”, IEEE International Conference on Computational Techniques in Information and Communication Technologies(ICCTICT),2016,DOI: 10.1109/ICCTICT.2016.7514659
[18] Gema Ramadhan, Tito Waluyo Purboyo, Roswan Latuconsina, “Experimental Model for Load Balancing in Cloud Computing Using Throttled Algorithm”, International Journal of Applied Engineering Research, Volume 13, Number 2 (2018) pp. 1139-1143, ISSN 0973-4562
[19] Rohit Nagar, Deepak K. Gupta and Raj M. Singh , “Time Effective Workflow Scheduling using Genetic Algorithm in Cloud Computing,” I.J. Information Technology and Computer Science, 2018, 1, 68-75 Published Online January 2018 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2018.01.08
[20] Neha Sethi, Dr.Surjit Singh, Dr.Gurvinder Singh, “ Multiobjective Artificial Bee Colony based Job Scheduling for Cloud Computing Environment”, International Journal of Mathematical Sciences and Computing, 2018, 1, 41-55 Published Online January 2018 in MECS (http://www.mecs-press.net/ijmsc) DOI: 10.5815/ijmsc.2018.01.03
[21] Zahra Amini, Mehrdad Maeen, Mohammad Reza Jahangir, “Providing a load balancing method based on dragonfly optimization algorithm for resource allocation in cloud computing,” International Journal of Networked and Distributed Computing, Vol. 6, No. 1, Jan 2018 pp.35-42.
[22] Ojasvee Kaneria, R K Banyal , “Analysis and Improvement of Load Balancing in Cloud Computing,” IEEE International Conference on ICT in Business Industry & Government (ICTBIG), 2016, DOI: 10.1109/ICTBIG.2016.7892711
[23] Zhang Jiadong, Liu Qiongxin, Chen Jiayu, “An Advanced Load Balancing Strategy For Cloud Environment,” 17th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies, 2016, DOI 10.1109/PDCAT.2016.58
[24] P.Geetha, Dr.C.R.Rene Robin, “A Comparative-Study of Load-Cloud Balancing Algorithms in Cloud Environments”, IEEE International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017), DOI: 10.1109/ICECDS.2017.8389549.
[25] Sajeeb Saha, Mohammad S. Hasan, “Effective Task Migration to Reduce Execution Time in Mobile Cloud Computing”, Proceedings of the 23rd International Conference on Automation & Computing, University of Huddersfield, Huddersfield, UK, 7-8 September 2017.
[26] M. Kumar, Sumar, S. Singh, ”A survery on Virtual Machine Scheduling Algorithms in Cloud Computing”, IJCSE, Vol.6,issue3,pp.485-490, March 2018,.E-ISSN-2347-2693.
[27] Bhupesh Kumar Devgan, Amit Agarwal, Venkatadri M, Ashutosh Pasricha, “Resource Scheduling in Cloud: A Comparative Study”, IJCSE, Vol.6, issue8, pp.168-173, Aug 2018. E-ISSN-2347-2693
Citation
S.K. Sonkar, M. U. Kharat, "Improving Overall usage of Servers by Measuring Uneven Utiliztion of a Server and allocating the Applications in the Face of Multidimensional Resource Constraints," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.300-307, 2018.
A Study on Different Web Service Discovery Approaches
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.311-314, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.311314
Abstract
A web service is a software system designed to support interoperable machine-to-machine interaction over a network. In today’s date, web services are becoming widespread to utilize the web as a business opportunity for offering their own services and using existing services from others. A web service is a service offered by an electronic device to another electronic device, communicating with each other via the World Wide Web. A web service registry UDDI (Universal Description, Discovery, and Integration) provides interoperable, standards based approach for methodically documenting and publishing web services. Since various services are available, it becomes difficult to find the most appropriate service for an exact application. Faced with the increasing numbers of Web services and service users, researchers in the services computing field have attempted to address a challenging issue, i.e. how to quickly find the suitable ones according to user queries. Many previous studies have been reported towards this direction. This paper presents a study on different web service discovery approaches.
Key-Words / Index Term
Web Mining, Web Service Discovery
References
[1] G. Senthil Kumar, Dr. C. Lakshmi, “A Literature Survey on Web Service Discovery”, International Journal of Engineering and Technology (IJET), May 2016
[2] M. Suchithra and M. Ramakrishnan, “A Survey on Different Web Service Discovery Techniques”, Indian Journal of Science and Technology, July 2015
[3] M Ma C, Song M, Xu K, Zhang X., “Web Service Discovery Research and Implementation Based on Semantic Search Engine”, IEEE 2nd Symposium on Web Society, Beijing. 2010 Aug 16-17, pp .672-77
[4] S Ourania H, Georgios B, Mara N, Dimosthenis A, “A Specialized Search Engine for Web Service Discovery” IEEE 19th International Conference on Web Services, USA. 2012 June 24-29, pp. 448-55
[5] Raj R J R, Sasipraba T., “Web Service Recommendation Framework Using QoS Based Discovery and Ranking Process” 3rd International Conference on Advanced Computing, ICoAC. Chennai. 2011Dec 14-16, pp .371-77
[6] Jaber K Walid C Khaled G, “Binding Web Services: an Optimizing Approach” Proceedings of the 2012 International Conference on Cloud Computing and Service Computing, CSC. Shanghai. 2012 Nov 22-24, pp .64-71
[7] Zhou J, Zhang T, Meng H, Xiao L , Chen G, Li D, “Web Service Discovery based on Keyword clustering and ontology” , IEEE International Conference on Granular Computing, Hangzhou . 2008 Aug 26-28, pp. 844-48.
[8] Dmytro S. Pukhkaiev, Oleksii Oleksenko, Tetiana M. Kot, Larysa S. Globa Alexander Schill, “Advanced Approach To Web Service Discovery And Selection”, Information and Telecommunication Sciences, 2014
[9] Debajyoti Mukhopadhyay, Archana Chougule, “A Survey on Web Service Discovery Approaches”
[10] Rajendran and Dr. P. Balasubramanie, “Analysis on the Study of QoS-Aware Web Services Discovery”, JOURNAL OF COMPUTING, Dec 2009
[11] Jian Wang, Member, IEEE, Panpan Gao, Yutao Ma, Member, IEEE, Kequing He, Senior Member, IEEE and Patrick C.K. Hung, Member, IEEE “A Web Service Discovery Approach Based on Common Topic Groups Extraction” 2016
[12] Shrija Madhu, Deptof CSE, GIET “An Approach to Analyze suicidal tendancy in blogs and tweets using Sentimental Analysis”, Internationa Journal of Scientific Research in Computer Science and Engineering, Vol 6, Issue 4, pp-34-36, 2018
[13] Yogesh Pant, Dept of CIS, HSET, SRHU, “A Novel Approcah to Minimize DFA State Machine Using Linked List”, Internationa Journal of Scientific Research in Computer Science and Engineering, Vol 6, Issue 4, pp-41-55, 2018
[14] S.G. Kamble, K.T. Jadhao, Dept. of ETE, ARIET, “CSI Based Key Generation Technique”, Internationa Journal of Scientific Research in Network Security and Communication, Vol 5, Issue 2, 2017
[15] G. Kant, V. Gogate, V. Kotak, Dept. of Electronics, SAKEC, Mumbai, “Li-Fi Need of 21st Century”, Internationa Journal of Scientific Research in Network Security and Communication, Vol 5, Issue 2, 2017
Citation
Rahul P. Mirajkar, Nikhil D. Karande, Surendra Yadav, "A Study on Different Web Service Discovery Approaches," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.311-314, 2018.
Hybrid Image Segmentation Model using KM, FCM, Wavelet KM and Wavelet FCM Techniques
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.315-323, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.315323
Abstract
An attempt has been made to study the DWT (Discrete Wavelet Transform) based K-Means (KM) clustering and DWT based Fuzzy C-Means (FCM) clustering methods for the segmentation of digital images. The segmentation results of Wavelet KM clustering and Wavelet FCM clustering are compared with the conventional KM clustering and FCM clustering techniques used for the segmentation. The images are split-up into identical areas using KM, FCM, wavelet KM and wavelet FCM algorithms. The algorithms are tested on different image formats available in the literature. The proposed methods are analyzed using discrete wavelet transform (DWT) for enhancing the digital images and various image features like regions, colors and shapes are considered to validate the proposed work. The segmentation results exhibit that the objects in various image clusters of wavelet KM and wavelet FCM performs better as compared to traditional KM and FCM clustering algorithm with respect to CPU execution time, sensitivity analysis, segmentation accuracy and PSNR(Peak Signal to Noise Ratio).
Key-Words / Index Term
Image segmentation, Clustering, K-Means (KM), Fuzzy C-Means (FCM), Wavelet KM, Wavelet FCM, Discrete Wavelet Transform (DWT), CPU execution time, sensitivity analysis and segmentation accuracy
References
[1] S. Nassir. “Image segmentation based on watershed and edge detection techniques”. Int. Arab J. Inf. Technol., vol. 3, no. 2, pp.104-110, April, 2006.
[2] H.S. Kumar, K.B. Raja, K.R. Venugopal, LM. Patnaik. “Automatic image segmentation using wavelets”. International Journal of Computer Science and Network Security, Vol. 9, Issue 2, pp.305-313, Feb , 28, 2009.
[3] F.U Siddiqui, N.A Isa. “Enhanced moving K-means (EMKM) algorithm for image segmentation”. IEEE Transactions on Consumer Electronics, Vol.57, Issue. 2, May, 2011.
[4] S. Dalmiya, A. Dasgupta, S.K. Datta. “Application of wavelet based K-means algorithm in mammogram segmentation”. International Journal of Computer Applications, Vol. 52, No. 15, Jan, 2012.
[5] Y. Shi, Z . Chen, Z. Qi, F. Meng, L. Cui. “A novel clustering-based image segmentation via density peaks algorithm with mid-level feature”. Neural Computing and Applications. Vol.28, Issue.1, pp. 29-39, Dec, 2017.
[6] D. L. Pham, J. L. Prince. “An adaptive fuzzy C-means algorithm for image segmentation in the presence of intensity inhomogeneities”. Pattern recognition letters, Vol. 20, Issue.1, pp.57-68, 1999.
[7] S. L. Jui, , C. Lin, H. Guan, A. Abraham, A. E. Hassanien, K. Xiao. “Fuzzy c-means with wavelet filtration for MR image segmentation”. In NaBIC , pp. 12-16, July, 2014.
[8] R. Sammouda, H. Aboalsamh, F. Saeed. “Comparison between K mean and fuzzy C-mean methods for segmentation of near infrared fluorescent image for diagnosing prostate cancer”. 2015 International Conference on In Computer Vision and Image Analysis Applications (ICCVIA) , pp. 1-6, IEEE, January, 2015.
[9] N. Sibini, Raj. Vimal. “Image Segmentation Using Fuzzy Based Clustering Algorithm And Its Application For Denoising The Digital Images”. International Journal of Emerging Trends in Science and Technology (IJETST),Vol. 5, Issue. 3, pp. 681-688, 2016.
[10] D. Liu, L. Ma, H. Chen, K. Meng,. “Medical Image Segmentation Based on Improved Fuzzy C-means Clustering”. 2017 International Conference In Smart Grid and Electrical Automation (ICSGEA), pp. 406-410, IEEE. May, 2017.
[11] S. ShanmugaPriya, A. Valarmathi. “Efficient fuzzy c-means based multilevel image segmentation for brain tumor detection in MR images”. Design Automation for Embedded Systems, pp. 1-13, 2018.
[12] R. Shanker, M. Bhattacharya. “Brain Tumor Segmentation of Normal and Pathological Tissues Using K-mean Clustering with Fuzzy C-mean Clustering”. In European Congress on Computational Methods in Applied Sciences and Engineering, pp. 286-296, Springer, Cham. October, 2017.
[13] J. MacQueen. “Some methods for classification and analysis of multivariate observations”. In Proceedings of the fifth Berkeley symposium on mathematical statistics and probability Vol. 1, No. 14, pp. 281-297, June ,1967.
[14] A. K. Jain. “Data clustering: 50 years beyond K-means”. Pattern recognition letters, Vol. 31, Issue. 8, pp. 651-666, 2010.
[15] C. Chandhok, S. Chaturvedi, A. A. Khurshid. “An approach to image segmentation using K-means clustering algorithm”. International Journal of Information Technology (IJIT), Vol. 1, Issue. 1, pp.11-17, 2012.
[16] H. Yao, Q. Duan, D. Li, J. Wang. An improved K-means clustering algorithm for fish image segmentation. Mathematical and Computer Modelling, Vol. 58 Issue 3-4, pp. 790-798. 2013.
[17] V. Jumb, M. Sohani, A. Shrivas. “Color image segmentation using K-means clustering and Otsu’s adaptive thresholding”. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3 Issue 9, pp. 72-76, 2014.
[18] N. Dhanachandra, K. Manglem, Y. J. Chanu. “Image segmentation using K-means clustering algorithm and subtractive clustering algorithm”. Procedia Computer Science, Issue 54, 764-771.2015.
[19] M. W. Ayech, D. Ziou. “Terahertz image segmentation using k-means clustering based on weighted feature learning and random pixel sampling”. Neurocomputing, Issue. 175, pp. 243-264, 2016.
[20] N. Dhanachandra, Y. J. Chanu. “A New Approach of Image Segmentation Method Using K-Means and Kernel Based Subtractive Clustering Methods”. International Journal of Applied Engineering Research, Vol. 12, Issue. 20, pp. 10458-10464, 2017.
[21] Z. Khan, J. Ni, X. Fan, P. Shi. “AN IMPROVED K-MEANS CLUSTERING ALGORITHM BASED ON AN ADAPTIVE INITIAL PARAMETER ESTIMATION PROCEDURE FOR IMAGE SEGMENTATION”. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, Vol. 13, Issue. 5, pp. 1509-1525, 2017.
[22] A.S.A. Nasir, M.Y. Mashor, Z. Mohamed. “Enhanced k-Means Clustering Algorithm for Malaria Image Segmentation”. Journal of Advanced Research in Fluid Mechanics and Thermal Sciences, Vol. 42, Issue 1, pp. 1-15, 2018.
[23] W. Q. Deng, X. M. Li, X. Gao, C. M. Zhang. “A modified fuzzy C-means algorithm for brain MR image segmentation and bias field correction”. Journal of Computer Science and Technology, Vol. 31, Issue 3, pp.501-511, 2016.
[24] J. C. Dunn. “A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters”. 1973.
[25] J. C. Bezdek. “Objective function clustering”. In Pattern recognition with fuzzy objective function algorithms, pp. 43-93. Springer, Boston, MA. 1981.
[26] R. Suganya, R. Shanthi. “Fuzzy c-means algorithm-a review”. International Journal of Scientific and Research Publications, Vol. 2, Issue. 11, 2012.
[27] N. R. Pal, K. Pal, J. M. Keller, J. C. Bezdek. “A possibilistic fuzzy c-means clustering algorithm”. IEEE transactions on fuzzy systems, Vol. 13, Issue 4, pp. 517-530, 2005.
[28] L. C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, A. L. Yuille. “Semantic image segmentation with deep convolutional nets and fully connected crfs”. arXiv preprint arXiv:1412.7062, 2014.
[29] S. Naz, H. Majeed, H. Irshad. “Image segmentation using fuzzy clustering: A survey”. In International Conference on ICET , pp. 181-186, October, 2010.
[30] J. H. Song, W. Cong, J. Li. “A Fuzzy C-means Clustering Algorithm for Image Segmentation Using Nonlinear Weighted Local Information”. Journal of Information Hiding and Multimedia Signal Processing, Vol. 8, Issue. 9, pp. 1-11, 2017.
[31] M. G. Mostafa, M. F. Tolba, T. F. Gharib, M. A. Megeed. “Medical image segmentation using a wavelet-based multiresolution EM algorithm”. In IEEE International Conference of Electronics Technology and Application, IETA, December, 2001.
[32] A. Gavlasová, A. Procházka, M. Mudrová,. “Wavelet based image segmentation”. In Proc. of the 14th Annual Conference Technical Computing, Prague, 2006.
[33] Z. Shi, Y. Liu, Q. Li,. “Medical Image Segmentation Based on FCM and Wavelets”. In International Conference on Intelligent Science and Big Data Engineering, pp. 279-286, Springer, Berlin, Heidelberg, July 2013.
[34] Y. Shi, Z. Chen, Z. Qi, F. Meng, L. Cui. “A novel clustering-based image segmentation via density peaks algorithm with mid-level feature”. Neural Computing and Applications, Vol.28, Issue 1, pp. 29-39, 2017.
[35] M. Sharma, G. N. Purohit, S. Mukherjee. “Information Retrieves from Brain MRI Images for Tumor Detection Using Hybrid Technique K-means and Artificial Neural Network (KMANN)”. In Networking Communication and Data Knowledge Engineering , pp. 145-157, Springer, Singapore, 2018.
[36] H. Castillejos, V. Ponomaryov, R. Peralta. “Image segmentation in wavelet domain using fuzzy logic”. In Electrical Engineering Computing Science and Automatic Control (CCE), 2011 8th International Conference, pp. 1-6, Oct 26, 2011. IEEE.
Citation
A.H.M. Jaffar Iqbal Barbhuiya, K. Hemachandran, "Hybrid Image Segmentation Model using KM, FCM, Wavelet KM and Wavelet FCM Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.315-323, 2018.
Markov Random Field Based Model In Spatial Domain for Denoising of Microarray Images
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.324-328, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.324328
Abstract
Bioinformatics research is an active area of research that employs DNA microarray technology as a very important tool. Microarray gene expression is acquired through microarray technology in order to monitor the expression of genes under different conditions. Denoising is a major pre-processing step in DNA microarray images. This paper proposes a new spatial denoising technique in spatial domain for DNA microarray image. The method exploits Markov Random Field (MRF) model to reduce the noise in microarray images. Two algorithms developed in this work are Denoising using MRF (DMRF) and Determination of Optimized Values (DOV).Different experimental results and analysis demonstrate the performance of the proposed method with existing methods using various performance metrics.
Key-Words / Index Term
Spatial Filtering, Markov Random Field, Energy function, Non-linear Optimization, Performance Metrics
References
[1] Y. F. Leung and D.Cavalieri, “Fundamentals of cdna microarray data analysis, “Trends Genet., vol. 19, no. 11, pp. 649–659, 2003.
[2] Y.H. Yang., M.I. Buckley, S.Dudoit, and T.P. Speed, “Comparison of methods for image analysis on cDNA microarray data,” in J.Computational and Graphical Stat, vol. 11, no. 1, pp. 108-136, 2002.
[3] Mastrogianni Aikaterini, Dermatas Evangelos and Bezerianos Anastasios, "Robust pre-processing and noise reduction in microarray images", Proceedings of the fifth International Conference: biomedical engineering, pp.360-364, 2007.
[4] B.Smolka, R.Lukac, K.N.Plataniotis, "Fast noise reduction in cDNA microarray images", 23rd Biennial Symposium on Communications, pp. 348-351, 2006.
[5] Sachin singh et. Al,”Performance Evaluation of Different Adaptive Filters ECG Signal Processing”, (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, 1880-1883.
[6] Zinat Afrose, “Relaxed Median Filter: A Better Noise Removal Filter for Compound Images”, International Journal on Computer Science and Engineering (IJCSE), ISSN: 0975-3397 Vol. 4 No. 07 July 2012.
[7] Ross Kindermann and J. Laurie Snell. “Markov Random Fields and Applications,” (Contemporary Mathematics v.1) American mathematical society, Providence, Rhode Island.
[8] S. Cheung, Proof of Hammersley–Clifford Theorem, Technical Report, Technical Report, 2008.
[9] Bouman, C.A.& Shapiro, M. (1994) A Multiscale Random Field Model for Bayesian Image Segmentation.IEEE Trans. Image Proc,pp.162-167.
[10] A.Bouman, “Markov random fields and stochastic image models,” in IEEE Int. Conf. Image Processing Tutorial, Oct. 1995.
[11] Rafael C. Gonzalez and Richard E.Woods, “Digital Image Processing”, Third Edition, PHI Learning Private Ltd., 2008.
[12] Swann, W.H.ScienceDirect, “A Survey on Nonlinear Optimization Techniques”, FEBS Letters, vol 2, supplement 1, pp. 39-55, 1969.
[13] A.Forsgren, P. E. Gill, and M. H. Wright, “Interior methods for nonlinear optimization”, SIAM Review 44,pp. 525–597,2002
[14] Coleman, T.F. and Y. Li, "An Interior, Trust Region Approach for Nonlinear Minimization Subject to Bounds", SIAM, Journal on Optimization, Vol. 6, pp. 418-445, 1996.
[15] Shanno, D.F., "Conditioning of Quasi-Newton Methods for Function Minimization," Mathematics of Computing, Vol. 24, pp. 647-656, 1970.
[16] Nelder, J. A., and Mead, R., "A simplex method for function minimization," The Computer Journal, vol. 7, pp. 308-313, 1965.
[17] Lagarias, J. C., Reeds, J. A., Wright, M. H., and Wright, P. E., "Convergence properties of the Nelder-Mead simplex method in low dimensions," SIAM Journal on Optimization, vol. 9, pp. 112- 147, 1998.
[18] Rafael C. Gonzalez and Richard E. Woods, “DigitalImage Processing”, Third Edition, PHI Learning PrivateLtd., 2008.
[19] David L.Donoho and Iain M. Johnstone. “Adapting to unknown smoothness via waveletshrinkage”, Journal of the American Statistical Association, pages 1200–1224, 1995.
[20] Donoho, D.L. "De-noising by soft-thresholding," IEEE Trans. on Inf. Theory, 41, 3, pp. 613–627. 1995.
[21] S.M. Smith, J.M. Brady, SUSAN—a new approach to low level image processing, International Journal of Computer Vision 23, pp. 45–78, 1997.
Citation
Priya Nandihal, Vandana S.Bhat, Jagadeesh D. Pujari, "Markov Random Field Based Model In Spatial Domain for Denoising of Microarray Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.324-328, 2018.
Color Image Retrieval Based on Chernoff Distance Measure
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.329-333, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.329333
Abstract
This paper proposes a novel technique, based on distributional approaches with distance measure, i.e. Chernoff distance measure. Since the proposed system is automatic retrieval, it is difficult to understand the nature of the query and target images and which distribution they follow. The Chernoff distance measure overcome this problem, because it adapts itself accordingly the nature of the images, viz. the Chernoff distance could be adapted though the query and target images do no distributed to Gaussian or mixed or even if they are distribution free. This is the main advantage of the proposed technique. In order to examine the proposed technique, an image database is constructed, which contains variety of images such as texture, structure, blurred, noise, artifacts images and their features.
Key-Words / Index Term
Color Image, Retrival, Chernoff Distance Measure
References
[1] Yap, K.-H., & Wu, K. (2005). A soft relevance framework in content-based image retrieval systems. IEEE Transactions on Circuits and Systems, 15(2), 1557–1568.
[2] J.Huang, S.R. Kunar, M.Mitra, W.J. Zhu, and R.Zabih, “Image indexing using color correlogram,” in Proc. IEEE Comp. Soc. Conf. Comp. Vis. And Patt. Recog., 1997, pp. 762-768.
[3] M.Stricker and M. Orengo, “Similarity of color images,” in Storage and Retrieval for Image and Video Databases, Proc. SPIE 2420, 1995, pp.381-392.
[4] A.Pentland, R.Picard, and S. Sclaroff, “Photobook: Content-based manipulation of image databases,” SPIE Storage and Retrieval for Image and Video Databases II, no. 2185, pp. 34-47, 1994.
[5] Chiou-Shaan Fuh, Shun-Wen Cho, and Kai Essig, “Hierarchical color image region segmentation for content-based image retrieval system,” IEEE Transactions on Image Processing, vol.9, no.1, 2000.
[6] F. Jing, M. Li, H.J. Zhang, and B.Zhang, “An efficient and effective region-based image retrieval framework,” IEEE Transactions on Image Processing, vol.13, no.5, 2004.
[7] Jun-Wei Hsieh and W.Eric L. Grimson, “Spatial template extraction for image retrieval by region matching,” IEEE Transactions on Image Processing, vol.12, no.11, 2003.
[8] F.Jing, M.Li, H.J.Zhang, and B.Zhang, “An efficient and effective region-based image retrieval framework,” IEEE Transactions on Image Processing, vol.13, no.5, 2004.
[9] S. Belongie, C.Carson, H.Greenspan, and J.Malik, “Recognition of images in large databases using color and texture,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, no.8, pp. 1026-1038, 2002.
[10] F. Jing, B.Zhang, F.Z.Lin, W.Y.Ma, and H.J.Zhang, “A novel region-based image retrieval method using relevance feedback,” in Proc. 3rd ACM Int. Workshop on Multimedia Information Retrieval (MIR), 2001.
[11] Y.Deng and B.S.Manjunath, “An efficient low-dimensional color indexing scheme for region-based image retrieval,” in Proc. IEEE Int. Conf. ASSP, vol.6, 1999, pp.3017-3020.
[12] Ing-Sheen Hsieh and Huo-Chin Fan, “Multiple classifiers for color flag and trademark image retrieval,” IEEE Transactions on Image Processing, vol.10, no.6, 2001.
[13] J.R. Smith and C.S. Li, “Image classification and querying using composite region templates,” Journal of Computer Vision and Image Understanding, vol.75, no.12, pp. 165-174, 1999.
[14] J.Z. Wang and Y.P. Du, “Scalable integrated region-based image retrieval using IRM and statistical clustering,” in Proc. ACM and IEEE Joint Conference on Digital Libraries, VA, June 2001, pp.268-277.
[15] F.Kimura and M.Shridhar, “Handwritten numerical recognition based on multiple algorithm,” Pattern Recognition, vol.24, no.10, pp. 969-983, 1991.
[16] T.K.Ho, J.J.Hull, and S.N.Srihari, “Decision combination in multiple classifier systems,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.16, 66-75, 1994.
[17] Chiou-Shaan Fuh, Shun-Wen Cho, and Kai Essig, “Hierarchical color image region segmentation for content-based image retrieval system,” IEEE Transactions on Image Processing, vol.9, no.1, 2000.
[18] T. Kailath, "The divergence and Bhattacharyya distance measures in signal selection" IEEE Trans. Comm. Techn. , COM–15 (1967) pp. 52–60
[19] Ray, S., "On a theoretical property of the Bhattacharyya coefficient as a feature evaluation criterion" Pattern Recognition Letters , 9 (1989) pp. 315–319.
[20] Euisun Choi, Chulhee Lee, Feature extraction based on the Bhattacharyya distance, Pattern Recognition 36 (2003) 1703 – 1709.
[21] Sfikas, G., Constantinopoulos, C., Likas, A., Galatsanos, N.P., An Analystic Distance Metric for Gaussian Mixture Models with Applications in Image Retrieval, ICANN’05 Proceedings of the 15-th international conference on Artificial Neural Networks: formal models and their application, volume part II, pp. 835-840, 2005.
[22] K. Seetharaman and M. Jaikarthic, Statistical Distributional Approach for Scale and Rotation Invariant Color Image Retrieval Using Multivariate Parametric tests and Orthogonality Condition, Journal of Visual Communication and Image Representation, DOI: 10.1016/j.jvcir.2014.01.004.
[23] R. Duda, P. Hart, and D. Stork. Pattern Classification. John Wiley and Sons, Inc., New York, NY, 2nd edition, 2000.
Citation
S.Selvaraj, K. Seetharaman, "Color Image Retrieval Based on Chernoff Distance Measure," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.329-333, 2018.
An Efficient Jamming Node Avoid Secure Routing In Internet of Things
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.334-341, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.334341
Abstract
The shared wireless medium, wireless networks are vulnerable to jamming attacks. These types of attacks can easily be accomplished by an adversary by either bypassing MAC layer protocol or by emitting RF signals. The failure of data transmission in internet of things is due to corruption of packets by jammers. In existing no of defense techniques have been proposed in recent years to deal with these jammer attacks. However, each defense technique is suitable for only a limited network range and consumption energy. The propose jamming detection algorithm based on two problem solving, first one is to improve the energy efficient routing based on power allocation and second one avoids the jamming node using ecliptic curve cryptography to route the secure packet between source to destination. The simulation result shows the better throughput and delay minimization compare with existing routing algorithms.
Key-Words / Index Term
IoT, Wi-Fi Sensor devices, Energy routing, Security, Jamming node, Power allocation
References
[1] L. Hu, H. Wen, B. Wu, J. Tang, and F. Pan, “Adaptive secure transmission for physical layer security in cooperative wireless networks,” IEEE Commun. Lett., vol. 21, no. 3, pp. 524–527, Mar. 2017.
[2] A. Behnad, M. B. Shahbaz, T. J. Willink, and X. Wang, “Statistical analysis and minimization of security vulnerability region in amplify-and-forward cooperative systems,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2534–2547, Apr. 2017.
[3] Q. Xu, P. Ren, H. Song, and Q. Du, “Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations,” IEEE Access, vol. 4, pp. 2840–2853, 2016
[4] X. Hu, P. Mu, B. Wang, and Z. Li, “On the secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers,” IEEE Trans. Veh. Technol., vol. 66, no. 5, pp. 4457–4462, May 2017.
[5] P. Mu, X. Hu, B. Wang, and Z. Li, “Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint,” IEEE Commun. Lett., vol. 19,no. 12, pp. 2174–2177, Dec. 2015.
[6] L. Hu, B. Wu, J. Tang, F. Pan, and H. Wen, “Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming,” in Proc. IEEE ICC, Kuala Lumpur, Malaysia, May 2016, pp. 1–5.
[7] H.-M. Wang, F. Liu, and M. Yang, “Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems,” IEEE Trans. Veh. Technol., vol. 64, no. 10, pp. 4893–4898, Oct. 2015.
[8] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, “On secure wireless communications for IoT under eavesdropper collusion,” IEEE Trans. Autom. Sci. Eng., vol. 13, no. 3, pp. 1281–1293, Jul. 2016.
[9] J. Mo, M. Tao, and Y. Liu, “Relay placement for physical layer security: A secure connection perspective,” IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
[10] J. Li, A. P. Petropulu, and S. Weber, “On cooperative relaying schemes for wireless physical layer security,” IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
[11] J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
[12] I. Krikidis, J. S. Thompson, and S. Mclaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun.,vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
[13] Y. Zou, X.Wang, andW. Shen, “Optimal relay selection for physical-layer security in cooperative wireless networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
[14] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Aug. 2014.
[15] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, “On secure wireless communications for IoT under eavesdropper collusion,” IEEE Trans. Autom. Sci. Eng., vol. PP, no. 99, pp. 1-13, Dec. 2015.
Citation
E. Selvi, K. Renuka, "An Efficient Jamming Node Avoid Secure Routing In Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.334-341, 2018.
Literature Output on Gout: A Bibliographic Study
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.342-348, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.342348
Abstract
This study evaluates research output on Gout carried out in different parts of the world during 1970–2017 using different bibliometric indicators. Data have been downloaded from Scopus database for the period 1970–2017 using the keywords Gout in the title and abstract fields. The study examined the pattern of growth of the output, its geographical distribution. The study Gout research output is gradually increasing. The USA, followed by the UK and German contributed the highest number of papers. The majority of the prolific institutions were located in the USA, the UK, France and Australia. The last two decades have witnessed considerable growth in research output in this field. Interestingly, the countries like the USA, the UK and Australia
Key-Words / Index Term
Gout research, Bibliometric analysis, Research output on Gout, Gout Disease
References
[1]. Almind, T.C. and Ingwersen, P. (1997). Informatic analysis on the World Wide Web, Methodological approaches to “Webometrics”. Journal of Documentation, 53(4): 404-426.
[2]. Cronin,B.(2001).Bibliometrics and beyond: some thoughts on web-based citation analysis, Journal of Information Science,27(1): 1-7.
[3]. Pritchard, A. (1969). Statistical Bibliography or Bibliometrics? Journal of Documentation, 25(4), 348-349.
[4]. Rahman, M., Haque, T.L., and Fukui, T. (2005). Research articles published in clinical radiology journals: Trend of contribution from different countries, Academic Radiology, 12(7), 825-829.
[5]. Rajendran, P., Ramesh Babu, B, and Gopalakrishnan, S. (2005). Bibliometric analysis of “Fiber Optics” literature. Annals of Library and Information Studies, 52(3), 82-85
[6]. Nagarajan, M (2016) ‘Scientrometric Analysis of Research output in Science in Tamil Nadu Universities’. Journal of Advances in Library and Information Science, Vol.5, No.4, 348-352.
Citation
S. Manimekalai, M. Nagarajan, "Literature Output on Gout: A Bibliographic Study," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.342-348, 2018.
Image Training and LBPH Based Algorithm for Face Tracking in Different Background Video Sequence
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.349-354, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.349354
Abstract
Video and video types are changing day by day; due to which, video processing is becoming complex time to time. There is a lack of particular algorithm for automatic detection and tracking of human faces in video, to overcome the challenges that are being faced nowadays. This paper describes a model for detection and tracking of human faces in different background video sequence using OpenCV platform. Both positive and negative image samples are trained and saved as xml file. With the help of trained samples, LBPH algorithm clarifies whether the video frame contain faces or not. Further, HOG descriptor is fed to SVM detector to compute the coefficients that are stored in the xml file. Based on this, face regions are tracked until the last frame is reached. We have tested our proposed algorithm on the videos of a technically challenging dataset. Standard metrics helped to judge the success of the proposed algorithm. Test results indicate the superiority of our proposed model, compared to other similar algorithms.
Key-Words / Index Term
Detection, Tracking of human faces, Different background, Video sequence, OpenCV, LBPH, HOG, SVM
References
[1] Ranganatha S, Dr. Y P Gowramma, “Face Recognition Techniques: A Survey”, International Journal for Research in Applied Science and Engineering Technology, Vol.3, Issue.4, pp.630-635, 2015.
[2] P. Viola, M. Jones, “Robust Real-Time Face Detection”, International Journal of Computer Vision, Vol.57, pp.137-154, 2004.
[3] P. Viola, M. Jones, “Rapid Object Detection Using a Boosted Cascade of Simple Features”, in the Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), Kauai, USA, pp.511-518, 2001.
[4] Md. Abdur Rahim, Md. Najmul Hossain, Tanzillah Wahid, Md. Shafiul Azam, “Face Recognition using Local Binary Patterns (LBP)”, Global Journal of Computer Science and Technology, Vol.13, Issue.4, pp.1-8, 2013.
[5] N. Dalal, B. Triggs, “Histograms of Oriented Gradients for Human Detection”, in the Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), pp.886-893, 2005.
[6] Shantala Giraddi, Jagadeesh Pujari, Shivanand Seeri, “Identifying Abnormalities in the Retinal Images using SVM Classifiers”, International Journal of Computer Applications, Vol.111, Issue.6, pp.5-8, 2015.
[7] G. Bradski, “The OpenCV Library”, Dr. Dobbs Journal of Software Tools, 2000.
[8] G. Bradski, A.Kaebler, “Learning OpenCV”, China: Southeast Univ. Press, 2009.
[9] K. Fukunaga, L. D. Hostetler, “The Estimation of the Gradient of a Density Function, with Applications in Pattern Recognition”, IEEE Transactions on Information Theory, Vol.21, Issue.1, pp.32-40, 1975.
[10] Yizong Cheng, “Mean Shift, Mode Seeking, and Clustering”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.17, Issue.8, pp.790-799, 1995.
[11] G. Bradski, “Computer Vision Face Tracking for Use in a Perceptual User Interface”, Intel Technology Journal, pp.12-21, 1998.
[12] Bruce D. Lucas, Takeo Kanade, “An Iterative Image Registration Technique with an Application to Stereo Vision”, in the Proceedings of the International Joint Conference on Artificial Intelligence, pp. 674-679, 1981.
[13] Carlo Tomasi, Takeo Kanade, “Detection and Tracking of Point Features”, Carnegie Mellon University Technical Report CMU-CS-91-132, 1991.
[14] Jianbo Shi, Carlo Tomasi, “Good Features to Track”, in the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.593-600, 1994.
[15] Ranganatha S, Y P Gowramma, “A Novel Fused Algorithm for Human Face Tracking in Video Sequences”, in the Proceedings of the IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bengaluru, India, pp.1-6, 2016.
[16] C. Harris, M. Stephens, “A Combined Corner and Edge Detector”, in the Proceedings of the 4th Alvey Vision Conference, Manchester, UK, pp.147-151, 1988.
[17] Ranganatha S, Y P Gowramma, “An Integrated Robust Approach for Fast Face Tracking in Noisy Real-World Videos with Visual Constraints”, in the Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, pp.772-776, 2017.
[18] Douglas Decarlo, Dimitris N. Metaxas, “Optical Flow Constraints on Deformable Models with Applications to Face Tracking”, International Journal of Computer Vision, Vol.38, Issue.2, pp.99-127, 2000.
[19] M. Kim, S. Kumar, V. Pavlovic, H. Rowley, “Face Tracking and Recognition with Visual Constraints in Real-World Videos”, in the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.1-8, 2008.
[20] Ranganatha S, Y P Gowramma, “Development of Robust Multiple Face Tracking Algorithm and Novel Performance Evaluation Metrics for Different Background Video Sequences”, International Journal of Intelligent Systems and Applications, Vol.10, Issue.8, pp.19-35, 2018.
[21] Stefan Leutenegger, Margarita Chli, Roland Y. Siegwart, “BRISK: Binary Robust Invariant Scalable Keypoints”, in the Proceedings of the IEEE International Conference on Computer Vision, pp.2548-2555, 2011.
[22] Ranganatha S, Y P Gowramma, “Eigen and HOG Features Algorithm for Face Tracking in Different Background Challenging Video Sequences”, International Journal of Computing, in press.
[23] Ranganatha S, Y P Gowramma, “Image Training, Corner and FAST Features based Algorithm for Face Tracking in Low Resolution Different Background Challenging Video Sequences”, International Journal of Image, Graphics and Signal Processing Vol.10, Issue.8, pp.39-53, 2018.
[24] E. Rosten, T. Drummond, “Fusing Points and Lines for High Performance Tracking”, in the Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp.1508-1515, 2005.
[25] Yongkang Wong, Shaokang Chen, Sandra Mau, Conrad Sanderson, Brian C. Lovell, “Patch-Based Probabilistic Image Quality Assessment for Face Selection and Improved Video-Based Face Recognition”, in the proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp.74-81, 2011.
[26] Ivan Laptev, Marcin Marszalek, Cordelia Schmid, Benjamin Rozenfeld, “Learning Realistic Human Actions from Movies”, in the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.1-8, 2008.
[27] C. Sanderson, B.C. Lovell, “Multi-Region Probabilistic Histograms for Robust and Scalable Identity Inference,” in the Proceedings of the International Conference of Biometrics, Alghero, Italy, pp.199-208, 2009.
[28] Ranganatha S, Y P Gowramma, “Selected Single Face Tracking in Technically Challenging Different Background Video Sequences Using Combined Features”, ICTACT Journal on Image and Video Processing, in press.
[29] Ranganatha S, Y P Gowramma, “Color Based New Algorithm for Detection and Single/Multiple Person Face Tracking in Different Background Video Sequence”, International Journal of Information Technology and Computer Science, in press.
[30] D. M. W. Powers, “Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness & Correlation”, Journal of Machine Learning Technologies, Vol.2, Issue.1, pp.37-63, 2011.
[31] T. Fawcett, “An Introduction to ROC Analysis”, Pattern Recognition Letters, Vol.27, Issue.8, pp.861-874, 2006.
[32] Keni Bernardin, Rainer Stiefelhagen, “Evaluating Multiple Object Tracking Performance: The CLEAR MOT Metrics”, EURASIP Journal on Image and Video Processing, pp.1-10, 2008.
[33] Anelia Angelova, Yaser Abu-Mostafa, Pietro Perona, “Pruning Training Sets for Learning of Object Categories”, in the Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), pp.494-501, 2005.
[34] “Face Database from Robotics Lab of National Cheng Kung University, Taiwan”, URL: http://robotics.csie.ncku.edu.tw/Databases/FaceDetect_PoseEstimate.htm.
[35] Li Fei-Fei, R. Fergus, P. Perona, “Learning Generative Visual Models from Few Training Examples: An Incremental Bayesian Approach Tested on 101 Object Categories”, in the Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshop (CVPRW), 2004.
[36] Li Fei-Fei, R. Fergus, P. Perona, “One-Shot Learning of Object Categories”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.28, Issue.4, pp.594-611, 2006.
[37] G. Griffin, A. Holub, P.Perona, “Caltech-256 Object Category Dataset”, Technical Report 7694, California Institute of Technology, pp.1-20, 2007.
Citation
Ranganatha S, Y P Gowramma, "Image Training and LBPH Based Algorithm for Face Tracking in Different Background Video Sequence," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.349-354, 2018.
Implementation of Sandhi Viccheda for Sanskrit Words/Sentences/Paragraphs
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.355-360, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.355360
Abstract
Sandhi is a technique in which joining of two or more words happens. Sandhi viccheda means splitting of word or sentences into its constituents. Languages like Hindi, Urdu, Marathi, Kannada, and Malayalam are used to implement the sandhi viccheda concept. Sanskrit is a language in which rules are used to form a word. These rules play an important role in sandhi viccheda process. So, to split the word or sentence rules are used in the system. As everyone knows BHAGWAT GEETA is a religious book which contains more complex words, sentences, which user can’t understand. The proposed system uses those words, sentences from BHAGWAT GEETA for splitting purpose. For this, rules of sandhi viccheda like (vowels, consonant, and visarga) are used. The representation of the splits is shown using the directed acyclic graph to get a number of possible outputs.
Key-Words / Index Term
Sandhi splitting, lexical analysis, rules, sandhi viccheda algorithm, DAG
References
[1] Rupali Deshmukh and Varunakshi Bhojane, “Building Vowel Sandhi Viccheda System for Sanskrit”, International Journal of Innovations and Advancement in Computer Science, Vol. 4, December 2015.
[2] Mrs. Namrata Tapaswi, Dr. Suresh Jain and Mrs. Vaishali Chourey, “Parsing Sanskrit Sentences Using Lexical Functional Grammar”, Proceedings of the International Conference on Systems and Informatics, IEEE, pp 2636-2640, 2012.
[3] Priyanka Gupta, Vishal Goyal, “Implementation of Rule-Based Algorithm for Sandhi-Viccheda of Compound Hindi Words”, IJCSI International Journal of Computer Science Issues, Vol. 3, 2009.
[4] Joshi Shripad S., “Sandhi Splitting of Marathi Compound Words”, International Journal on Advanced Computer Theory and Engineering (IJACTE), Vol. 2, no. 02, 2012.
[5] Latha R. Nair, S. David Peter, “Development of a Rule-Based Learning System for Splitting Compound Words in Malayalam Language”, Proceedings of the Recent Advances in Intelligent Computational Systems, IEEE, pp 751-755, 2011.
[6] Devadath V V, Litton J Kurisinkel, Dipti Misra Sharma, and Vasudeva Varma, “A Sandhi Splitter for Malayalam”, Proceedings of the 11th International Conference on Natural Language Processing, 2014.
[7] M. Rajani Shree, Sowmya Lakshmi, “A novel approach to Sandhi splitting at Character level for Kannada Language”, Proceedings of the 2016 International Conference on Computational Systems and Information Systems for Sustainable Solutions, IEEE, pp 17-20, 2016.
[8] Sachin Kumar, “Sandhi Splitter and Analyzer for Sanskrit”, With Special Reference to aC Sandhi, Special Centre for Sanskrit Studies, Jawaharlal Nehru University, New Delhi, 2007.
[9] Shubham Bhardwaj, Neelamadhav Gantayat, Nikhil Chaturvedi, Rahul Garg, Sumeet Agarwal, “SandhiKosh: A Benchmark Corpus for Evaluating Sanskrit Sandhi Tools”, Language Resources and Evaluation Conference, 2018.
[10] Amba Kulkarni, Sheetal Pokar and Devanand Shukl, “Designing a Constraint-Based Parser for Sanskrit”, Proceedings of the International Sanskrit Computational Linguistics Symposium, SpringerLink, vol. 6465, pp 70-90, 2010.
[11] Vaishali Gupta, Nisheeth Joshi, Iti Mathur, “Rule-Based Stemmer in Urdu”, Proceedings of the 2013 4th International Conference on Computer and Communication Technology, IEEE, pp 129-132, 2013.
[12] Anil Kumar, V.Sheebasudheer, Amba Kulkarni, “Sanskrit Compound Paraphrase Generator”, Proceedings of the ICON, 2009.
[13] Pawan Goyal, Vipul Arora, and Laxmidhar Behera, “Analysis of Sanskrit Text: parsing and Semantic Nets”, Springerlink, Proceedings of the Sanskrit Computational Linguistics, Vol. 5402, pp 200-218, 2009.
[14] Bhagyashree D. Patil and Manoj E. Patil, “A Review on Implementation of Sandhi Viccheda for Sanskrit Words”, Proceedings of the International Conference in ICGTETM, IJCRT, vol.5, no. 12, pp 489-493, December 2017.
Citation
Bhagyashree Patil, Manoj Patil, "Implementation of Sandhi Viccheda for Sanskrit Words/Sentences/Paragraphs," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.355-360, 2018.
Back tracking with exclusion: A solution for local maxima problem in greedy location based packet forwarding for MANETs
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.361-364, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.361364
Abstract
Location aided routing is an emerging approach in mobile ad-hoc networks. Location based routing propagates the packet toward the destination on the basis of location information of transmitting node and destination node. Many algorithms are devised to forward the packet in location based environment among them greedy forwarding is simplest one. In this a transmitting node forwards the packet to next node which is closer to destination than itself. Most forwarding within r and nearest within forwarding progress are the examples of greedy forwarding. With the simple and straight forward method greedy forwarding may suffers from local maxima problem where a node itself is closest to destination, therefore unable to construct the path nevertheless it exist. Many solutions were made to encounter the local maxima problem but suffers with other problem such as packet looping. In this work an efficient solution to local maxima “back tracking with exclusion” is proposed and compared with existing solutions.
Key-Words / Index Term
local maxima, Greedy forwarding, adhoc network, Styling, mobile node
References
[1] C. Prehofer, C. Bettstetter. “Self organization in communication networks: Principles and design paradigms”. IEEE Communications Magazine. Vol. 43. Issue 7. 2005. pp. 78-85.
[2] C. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance-vector Routing (dsdv) for Mobile Computers,” Comp. Commun. Rev., Oct. 1994, pp. 234–44.
[3] C. Perkins and E. Royer, “Ad-hoc on-demand Distance Vector Routing,” Proc.2nd IEEE Wksp. Mobile Comp. Sys. App., Feb. 1999, pp. 90–100.
[4] Z. Haas and M. Pearlman, “The Performance of Query Control Schemes for the Zone Routing Protocol,” ACM/IEEE Trans. Net., vol. 9, no. 4, Aug. 2001, pp. 427–38.
[5] Y.-B. Ko and N. H. Vaidya, “Location-Aided Routing (LAR) in Mobile Ad Hoc Networks,” ACM/Baltzer WINET J., vol. 6, no. 4, 2000, pp. 307–21.
[6] H. Takagi and L. Kleinrock, “Optimal Transmission Ranges for RandomlyDistributed Packet Radio Terminals,” IEEE Trans. Commun., vol. 32, no. 3,Mar. 1984, pp. 246–57.
[7] T.-C. Hou and V. O.K. Li, “Transmission Range Control in Multihop PacketRadio Networks,” IEEE Trans. Commun., vol. 34, no. 1, Jan. 1986, pp.38–44.
[8] B. Karp and H. T. Kung, “Greedy Perimeter Stateless Routing for Wireless Networks,” Proc. 6th Annual ACM/IEEE Int’l. Conf. Mobile Comp. Net., Boston, MA, Aug. 2000, pp. 243–54.
[9] B. N. Karp, “Geographic Routing for Wireless Networks,” Ph.D. thesis, Harvard Univ., 2000.
Citation
Prashant Dixit, Anuradha Pillai, Rahul Rishi, "Back tracking with exclusion: A solution for local maxima problem in greedy location based packet forwarding for MANETs," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.361-364, 2018.