A Novel way to Reprioritize Cloud Computing Process Requests with Extended Parameters using ANN
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.365-370, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.365370
Abstract
Cloud computing is one of the most promising technology. When using hybrid cloud we all don’t know in which order the processes will be submitted to the private and public cloud. As some processes need to be more secure than other processes. Private Cloud is meant for security and privacy than public cloud. They need some mechanism that how these processes will be executed on private cloud or public cloud. So better is to prioritize the processes. A novel way is presented where an Artificial Neural Network model is designed to reprioritize the cloud computing processes with extended parameters. ANN being an Artificial Intelligence Technique is meant for accuracy. The results shows that the proposed technique helps in improving accuracy
Key-Words / Index Term
Cloud Computing, Hybrid Cloud, Resource Provisioning, Artificial Neural Network
References
[1]. MI Alam, M Pandey, SS Rautaray, “A Comprehensive Survey on Cloud Computing”, International Journal of Information Technology and Computer Science (IJITCS), 8; 7(2):68, 2015.
[2]. JE.Geelan “Twenty one experts define cloud computing” Virtualization, Electronic Magazine.
[3]. PT.Endo, M.Rodrigues, GE Gonçalves, J Kelner, DH Sadok, C Curescu “High availability in clouds: systematic review and research challenges” Journal of Cloud Computing 1; 5(1):16, 2016
[4]. Z Jian, WX Wu“The Application of Feed-Forward Neural Network for the X-Ray Image Fusion” In Journal of Physics: Conference Series, Vol. 312, No. 6, p. 062005, IOP Publishing, 2011
[5]. SO Arik, M Chrzanowski, A Coates, G Diamos, A Gibiansky, Y Kang, X Li, J Miller, A Ng, J Raiman,S Sengupta “ Deep voice: Real-time Neural Text-To-Speech” ArXiv preprint arXiv:1702.07825. 2017
[6]. I Sadeghkhani, A Ketabi, R Feuillet “Radial Basis Function Neural Network Application to Power System Restoration Studies” Computational Intelligence and Neuroscience 1; 2012:3, 2012
[7]. Ramadonisyahputra “Application of Neuro-Fuzzy Method for Prediction of Vehicle Fuel Consumption” Journal of Theoretical and Applied Information Technology, 86:2016:1, 2016
[8]. G Auda, M Kamel “Modular Neural Networks: A Survey”, International Journal of Neural Systems. 9(02):129-51, 1999.
[9]. R Kaur , P Bajaj “ A Review on Software Defect Prediction Models based on different data mining techniques” International Journal of Computer Science and Mobile Computing;3(5):879-86,2014
[10]. M Singh, DS Salaria “Software Defect Prediction Tool Based on Neural Network. International Journal of Computer Applications. , 70(22), 2013
[11]. AH Omran, YM Abid, H Kadhim “Design of Artificial Neural Networks System for Intelligent Chessboard” In Engineering Technologies and Applied Sciences (ICETAS), 4th IEEE International Conference on 2017 Nov 29 (pp. 1-7). IEEE, 2017
[12]. A Qayyum, SM Anwar, M Awais, M Majid “Medical Image Retrieval Using Deep Convolution Neural Network” Neurocomputing. 266:8-20, 2017
[13]. BK Bose “Neural network applications in power electronics and motor drives—An introduction and perspective” IEEE Transactions on Industrial Electronics.54 (1):14-33, 2017
[14]. V.V.Kumar, and K.Dinesh, “Job Scheduling using Fuzzy Neural network algorithm in cloud environment” Bonfring International Journal of Man Machine Interface, 2(1), p.1.2012
[15]. Md. Toukir Imam, Sheikh Faisal Miskhat, Rashedur M Rahman “Neural network and Regression based Processor Load Prediction for Efficient Scaling of Grid and Cloud Resources”, 14th International Conference on Computer and Information Technology (ICCIT 2011).
[16]. JJ Prevost, K Nagothu, B Kelley, M Jamshidi, Prediction of cloud data center networks loads using stochastic and neural models. “In System of Systems Engineering (SoSE)” 6th International Conference on 2011 Jun 27 (pp. 276-281). IEEE, 2011
[17]. AA Bankole ,SA Ajila “ Cloud client prediction models for cloud resource provisioning in a multitier web application environment” InService Oriented System Engineering (SOSE), IEEE 7th International Symposium on 2013 Mar 25 (pp. 156-161). IEEE, 2013
[18]. SM Nirmanik, AB Salimath “Neural Networks Error Recovery using Cloud Operations” Neural Networks. 5(02), 2018.
[19]. C Zhao, S Zhang, Q Liu, J Xie, J Hu, “Independent Tasks Scheduling Based on Genetic Algorithm in Cloud Computing. In Wireless Communications, Networking and Mobile Computing, WiCom’09. 5th International Conference on 2009 Sep 24 (pp. 1-4). IEEE, 2009
[20]. J Yuan, S Yu “Privacy Preserving Back-Propagation Neural Network Learning made Practical with Cloud Computing. IEEE Transactions on Parallel and Distributed Systems. 25(1):212-21, 2014
Citation
Pooja Chopra, R.P.S. Bedi, "A Novel way to Reprioritize Cloud Computing Process Requests with Extended Parameters using ANN," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.365-370, 2018.
Development of Snag Discovery Robot utilizing Arduino and Ultrasonic Sensor
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.371-373, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.371373
Abstract
Snag discovery and evasion can be considered as the focal issue in planning portable robots. In this paper, a snag maintaining a strategic distance from the robot is outlined which can distinguish snags in its way and move around them without making any crash. It is a robot vehicle that chips away at Arduino Microcontroller and utilizes an ultrasonic sensor to distinguish impediments. The Arduino board was chosen as the microcontroller and Arduino software to complete the programming. The ultrasonic sensor gives higher exactness in identifying encompassing hindrances. Being a completely independent robot, it effectively moved in obscure situations with no crash. The equipment utilized in this undertaking is broadly accessible and reasonable which makes the robot effortlessly replicable.
Key-Words / Index Term
Snag, Arduino Microcontroller, Ultrasonic sensor, Arduino software
References
[1] A.Saraswathi, A A. Abbas, S I Mathi, A. Eswaran, “OBSTACLE DETECTING ROBOT USING ARDUINO AND SENSOR”, International Journal of Soft Computing and Artificial Intelligence, ISSN: 2321-404X, Volume-3, Issue-2, Nov-2015.
[2] N A. Latha, B R. Murthy, K B. Kumar, “Distance Sensing with Ultrasonic Sensor and Arduino”, International Journal of Advance Research, Ideas and Innovations in Technology, ISSN: 2454-132X, Volume2,issue5, 2016.
[3] F. Tabassum, S. Lopa, M M. Tarek, Dr. B J. Ferdosi, “Obstacle Avoiding Robot”, Global Journal of Researches in Engineering (H), Volume XVII, Issue I, Version I, Year 2017
[4] S V P K. Maddukuri, U K. Renduchintala, A. Visvakumar, C. Pang, S K. Mittapally, “A Low Cost Sensor Based Autonomous and Semi-Autonomous Fire-Fighting Squad Robot”, 2016 Sixth International Symposium on Embedded Computing and System Design (ISED).
[5] J S. Lamancusa, “Sensors, Ultrasonic’’, The Encyclopedia of Robotics., Wiley, New York, 1988.
[6] D. Marioli, C. Narduzzi, C. Offelli, D. Petri, E. Sardini, A. Taroni, “Digital Time-of-flight Measurement for Ultrasonic Sensors”, On Instrumentation and Measurentent, Vo1.41, No. 1, Feb. 1992, pp.88-92.
[7] V. Agarwal, “A Cost-Effective Ultrasonic Sensor-Based Driver-Assistance System for Congested Traffic Conditions”, IEEE transactions on intelligent transportation systems, vol. 10, no. 3, september 2009.
[8] S. Parkar, V. Paradkar, A. Parmar, D. Panchal, Dr. B. Shah, “Obstacle Detection Using Ultrasonic Sensor For Amphibious Surveillance Robot”, IOSR Journal of Engineering (IOSRJEN), ISSN (e): 2250-3021, ISSN (p): 2278-8719, Volume 4, PP 28-33
Citation
P.P. Bhatt, J.A. Trivedi, "Development of Snag Discovery Robot utilizing Arduino and Ultrasonic Sensor," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.371-373, 2018.
A Survey on Various Techniques to Minimize Routing Overhead in MANET
Survey Paper | Journal Paper
Vol.6 , Issue.9 , pp.374-379, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.374379
Abstract
Wireless ad-hoc network (or) Mobile Ad Hoc Network is a set of mobile nodes in the combination of some computing contrivances which could be placed randomly everywhere in the network to do a specific task inclusive of dispensing and transferring of messages for sundry applications. The nodes can broadcast information in meticulous range and the host is capable of changing their position very repeatedly. If the information is not transferred within a scrupulous moment, retransmission of data packets is done by the protocols, which enhance the communication overhead in MANET. Broadcasting is playing a vital role for path discovery. Most probably, four types of broadcasting methods are used. They are simple flooding, location-predicated methods, probability predicated strategies and Neighbour cognizance predicated. This article exposes a widespread learning and investigation of various routing overhead reducing techniques proposed by many researchers. This paper additionally reveals the routing overhead percentage achieved using the prominent techniques proposed by contemporary researchers.
Key-Words / Index Term
MANET, Routing Overhead, Flooding, Broadcasting, Probability based, Area based, Neighbor Knowledge
References
[1] R.Thiyagarajan and Dr.M.Moorthi, “Efficient Routing Protocols for Mobile Ad Hoc Network”, In the proceedings of the 2017 IEEE International Conference on advances in Electrical,Electronics, Information and Bio –informatics., pp:427 - 431 2017.
[2] Quang-My Tran and Arek Dadej, “Proactive Routing Overhead in Mobile Ad-hoc Networks”.Proceedings of IEEE international Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.pp.no: 1-6.
[3] K.Mariyappan, and Dr.M.Karnan, “Gossip Based Node Residual Energy AODV routing protocol or Ad-hoc Network (GBNRE-AODV)”. International journal of Advanced Research in Computer Science, Vol.8,Number 8, Sep-Oct 2017,pp.no;193-202.
[4] Kamalaesh chandravanshi and D.K.Mishra, “Minimization of Routing Overhead on the basis Multipath and Destination Distance Estimation Mechanism under MANET”, In the proceedings of 2016 IEEE International Conference on ICT in Business Industry and Government,pp.no:1-6, 2017 .
[5] Taku Noguchi and Takahiko Kobayashi, “Adaptive Location-Aware Routing with Directional Antenna in Mobile AdHoc Networks”,In the Proceedings of 2017 IEEE International Conference on computing, Networking and Communications(ICNC), pp.no:1006 – 1011,2017
[6] S.Chandia and Dr.M.DevaPriya, “Loyalty Pair Neighbors Selection Based Adaptive Retransmission Reduction Routing in MANET”, In the Proceeding of 2016 IEEE International Conference on Communication and Electronics Systems (ICCES), pp:1-6, March 2017.
[7] Ashwini sable and Ashwini bhople, “ Reducing Routing Overhead in Mobile Ad Hoc Network by Using NCPR Protocol Along with Clustering Technique”,International Journal of Emerging Technologies in Engineering Research, Vol.4, Issue 7, July 2016.
[8] M.Anandhi, T.N.Ravi, A.Bhuvaneswari , “ A Reactive Protocol for Data Communication in MANET”,Springer Nature CSI 2016, CCIS 679, pp. 208–222.
[9] A.Geetha and A.G.Sareeka, “Prediction Based Topology Reconfiguration using clustering for power Efficient operation in Mobile Ad Hoc Netowks”, In the proceeding of IEEE 2017 Fourth International Conference on Signal Processing,Communication and Networking (ICSCN),pp:1-7,2017
[10] Radhu.R.Nair and T.K.Parani, “A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks”, International Journal of Engineering Trends and Technology(IJETT), vol:7 Number (3),pp:110-118 Jan 2014.
[11] S.Gowrisankar, T.G.Basavaraju and SubirKumarSarkar,“Analysis of Overhead Control Mechanism in Mobile Ad Hoc Networks”, SPRINGER,Advances in Electrical Engineering and Computational Science, Chapter 28.
[12] Pathini V.Patel and Bintu Kadhiwala, “Broadcating Techniques for Route Discovery in Mobile Adhoc Network- A survey”,In the proceedings of IEEE 2016 3rd International conference on computing for sustainable Globol Developmnet, pp:671-674
[13] Tarikuzzaman Emon and Tarin Kazi and Nazia Hossain, “A Comparative Analysis On Routing protocols of Mobile Ad Hoc Network”, International Journal of Computer Science, Engineering and Informatiion Technology vol.4, No.4, August 2014.
[14] Neha S. Brahmankar and Dr.Hitendra D.Patil, “Effective Usage of Rebroadcast Delay to Minimize Routing Overhead in MANET”, International Journal of IT and Knowledge Management, Vol.8,Number 2, Jan-June 2015,pp.no;115-120.
[15] A Neighbor Coverage Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Network,Xing Ming Zhang,
En Bo Wang ,IEEE Transaction on Mobile Computing,vol:12, Number 3,2013
[16] P.Rajeswari and, T.N.Ravi “He-SERIeS: An inventive communication model for data offloading in MANET” Egyptian Informatics Journal 19 (2018) ,pp:11–19.
[17] Kannan Shanmugam, Karthik Subburathinam, “ A Dynamic Probabilistic Based Broadcasting scheme for MANETs” Scientific World Journal, V.2016, 2016.
[18] N.Sivapriya and T.N.Ravi “QOS Routing Protocols in MANET:
A Survey”,International Journal of Pure and Applied Mathematics” volume 119 No.12 2018.
Citation
P.Tamilselvi, T.N.Ravi, "A Survey on Various Techniques to Minimize Routing Overhead in MANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.374-379, 2018.
Fuzzy Morphology Based JPEG compression for Image Quality Enhancement of Noisy Images
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.380-384, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.380384
Abstract
The extent of communicated information through internet has augmented speedily over the past few years. Image compression is the preeminent way to lessen the size of the image. JPEG is the one the best technique related to lossy image compression. In this paper a novel JPEG compression algorithm with Fuzzy-Morphology techniques was proposed. The efficacy of the proposed algorithm compared to JPEG is presented with metrics like PSNR, MSE, No of bits transmitted. The proposed approaches lessen the number of encoded bits as a result tumbling the quantity of memory needed. The Planned approaches are best appropriate for the images corrupted with Gaussian, Speckle, Poisson, Salt & Pepper noises.
Key-Words / Index Term
Compression, Morphology, PSNR, MSE, RMS
References
[1] Olivier Egger and Wei Li, “VERY LOW BIT RATE IMAGE CODING USING MORPHOLOGICAL OPERATORS AND ADAPTIVE DECOMPOSITIONS” IEEE International Conference on Image Processing Vol-3, PP No.326-330, Nov 1994.
[2] Ricardo L. de Queiroz, Member IEEE, “Processing JPEG-Compressed Images and Documents” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 7, NO. 12, PPNo: 1661-1672, DECEMBER 1998.
[3] Ravi Prakash, IEEE Member, Joan L. Mitchell, IEEE Fellow, and David A. Stepneski, “Enhanced JPEG Compression of Documents” IEEE International Conference on Image Processing Vol-3, PP No: 494-497, Oct-2001.
[4] Bai Xiangzhi, Zhou Fugen, “Edge Detection Based on Mathematical Morphology and Iterative Thresholding” IEEE International Conference on Image Processing Vol-2, PP No: 1849-1852, Nov-2006.
[5] Sreelekha G and P.S.Sathidevi, “An Improved JPEG Compression Scheme Using Human Visual System Model” IEEE, PP No: 98-101, June 2007.
[6] Ch. Ramesh, N.B.Venkateswarlu and J.V.R Murthy, “Filter Augmented JPEG Compressions” IJCA, Vol-60, No-17, PP No: 1-5, Dec-2012.
[7] Marlapalli Krishna, G.Srinivas and Prasad Reddy PVGD” Image Smoothening and Morphological operators Based JPEG Compression”, JATIT+, Vol.85, No.3, PPNo: 252-259, March 2016.
[8] Marlapalli Krishna, Prasad Reddy PVGD and G.Srinivas “ A Smoothening based JPEG Compression for an Objective Image Quality Enhancement of Regular and Noisy Images, IJAER, Vol.11, No.6, PPNo:3799-3804, 2016.
[9] G.Srinivas,P.Naga Srinivasu, T.Srinivasa rao and Ch.Ramesh “Harmonic and Contra Harmonic Mean Centric JPEG Compression for an Objective Image Quality Enhancement of Noisy Images”, Springer , International conference on smart computing and its application PP No143-152, 2017.
[10] G.Srinivas, Prof Prasad Reddy P.V.G.D, and K.ramya “An N-Square Approach for Reduced Complexity Non-Binary Encoding”, GJCST, PP No: 36-39, Vol: XI Issue XI, 2010.
[11] Dillip Ranjan Nayak, Ashutosh Bhoi” Image Enhancement Using Fuzzy Morphology”, Journal of Engineering, Computers & Applied Sciences”, Vol.3,NO.3, pp no:22-24, March 2014.
[12] G. Srinivas, Prasad Reddy P.V.G.D and K. Gayatri Devi, ”N-Square Approach For Lossless Image Compression And Decompression”, GJCST, Vol:10, Issue:9, pp no: 47-49, 2010.
Citation
Vanitha Kakollu, P Chandrasekhar reddy, "Fuzzy Morphology Based JPEG compression for Image Quality Enhancement of Noisy Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.380-384, 2018.
Optimized Machine Learning Approach for Software Defect Prediction using K-means with Genetic Algorithms
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.385-390, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.385390
Abstract
Software defect prediction is one of the most active research areas in software engineering. Machine learning approaches are good in solving these. A predictive model is constructed by using machine learning approaches and classified them into defective and non-defective modules. Clustering is an unsupervised classification method aims at creating groups of objects, or clusters, in such a way that objects in the same cluster are very similar and objects in different clusters are quite distinct. In this paper we proposed a new hybrid approach of K-means clustering algorithm combined with Genetic Algorithm to get the optimum no of clusters. From the present studies it is shown that the performance of the proposed optimized hybrid algorithm is better than the conventional k-means algorithm without optimization.
Key-Words / Index Term
Unsupervised classifier, Clustering, K-means, Genetic Algorithm, Software Defect Prediction
References
[1] M. D’Ambros, M. Lanza, and R. Robbes. An extensive comparison of bug prediction approaches. In Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on, pages 31 –41, May 2010.
[2] T. Lee, J. Nam, D. Han, S. Kim, and I. P. Hoh. Micro interaction metrics for defect prediction. In SIGSOFT ’11/FSE-19: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, 2011.
[3] T. Menzies, J. Greenwald, and A. Frank. Data mining static code attributes to learn defect predictors. IEEE Trans. Softw. Eng., 33:2–13, January 2007
[4]J. Nam, S. J. Pan, and S. Kim. Transfer defect learning. In Proceedings of the 2013 International Conference on Software Engineering, ICSE ’13, pages 382–391, Piscataway, NJ, USA, 2013. IEEE Press.
[5] F. Rahman, D. Posnett, A. Hindle, E. Barr, and P. Devanbu. Bugcache for inspections: Hit or miss? In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ESEC/FSE ’11, pages 322–331, New York, NY, USA, 2011. ACM.
[6] T. Zimmermann and N. Nagappan. Predicting defects using network analysis on dependency graphs. In Proceedings of the 30th international conference on Software engineering, ICSE ’08, pages 531–540, 2008.
[7] F. Akiyama. An Example of Software System Debugging. In Proceedings of the International Federation of Information Processing Societies Congress, pages 353–359, 1971.
[8] R. Spiewak & K. McRitchie (2008) “Using software quality methods to reduce cost and prevent
defects”, Journal of Software Engineering and Technology, pp. 23-27.
[9] D. Shiwei (2009) “Defect prevention and detection of DSP-Software”, World Academy of Science, Engineering and Technology, Vol. 3, Issue 10, pp. 406-409.
[10] P. Trivedi & S. Pachori (2010) “Modelling and analyzing of software defect prevention using ODC”, International Journal of Advanced Computer Science and Applications, Vol. 1, No. 3, pp. 75- 77.
[11] T. R. G. Nair & V. Suma (2010) “The pattern of software defects spanning across size complexity”, International Journal of Software Engineering, Vol. 3, Issue 2, pp. 53- 70.
[12]Lloyd, S. (1982). Least squares quantization in PCM. Information Theory, IEEE Transactions on 28(2): 129-137.
[13] Forgy, E. W. (1965). Cluster analysis of multivariate data: efficiency versus interpretability of classifications. Biometrics 21: 768-769
[14]Pal, Sankar K., Dinabandhu Bhandari, and Malay K. Kundu. "Genetic algorithms for optimal image enhancement." Pattern Recognition Letters, Vol.15 (3), pp. 261-271, 1994
[15] Zheyun Feng “Data Clustering using Genetic Algorithm” Evolutionary Computation: Project Report, CSE484, 2012.
[16] Dash, B., Mishra, D., Rath, A., & Acharya, M., “A hybridized K-means clustering approach for high dimensional dataset”, International Journal of Engineering, Science and Technology, Vol.2 (2), pp.59-66, 2010.
[17]D.E. Goldberg “Genetic Algorithms in Search Optimization and Machine Learning”, Addison-wesley, New York-1989.
[18]L. Davis (Ed.), Handbook of Genetic Algorithms, Van Nostrand Reinhold, New York, 1991.
[19]Z. Michalewicz “Genetic Algorithms Data Structure” Evolution Programs, Springer, New York, 1992.
[20]Ribeiro Filho, José L., Philip C. Treleaven, and Cesare Alippi. "Genetic- algorithm programming environments." Computer 27, Vol. 6, pp. 28-43. 1994.
[21] Pal, Sankar K., Dinabandhu Bhandari, and Malay K. Kundu. "Genetic algorithms for optimal image enhancement." Pattern Recognition Letters, Vol.15 (3), pp. 261-271, 1994.
[22]Maulik, Ujjwal, and Sanghamitra Bandyopadhyay. "Genetic algorithm- based clustering technique." Pattern recognition, Vol.33 (9), pp.1455- 1465, 2000.
[23] J. Han, M. Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann Publisher, San Francisco, USA,2001.
[24] Chiou, Yu-Chiun, and Lawrence W. Lan. "Genetic clustering algorithms." European journal of operational research, Vol.135 (2), pp. 413-427, 2001.
[25] Xu, Rui, and Donald Wunsch. "Survey of clustering algorithms." IEEE Transactions on neural networks, Vol.16(3), pp. 645-678, 2005
[26] Maulik, Ujjwal, and Sanghamitra Bandyopadhyay. "Genetic algorithm- based clustering technique." Pattern recognition, Vol.33 (9), pp.1455- 1465, 2000.
[27] Dash, Rajashree, and Rasmita Dash. "Comparative analysis of k-means and genetic algorith based data clustering." International Journal of Advanced Computer and Mathematical Sciences, Vol.3 (2), pp.257-265, 2012.
[28] Anon., Investigating the Performance of Parallel Genetic Algorithms.
[29] Wu, F.-X., W. Zhang, and A. Kusalik, A genetic k-means clustering algorithm applied to gene expression data. Advances in Artificial Intelligence, 2003: p. 994-994.
[30] Graña, M., et al., International Joint Conference SOCO’16-CISIS’16-ICEUTE’16: San Sebastián, Spain, October 19th-21st, 2016 Proceedings. Vol. 527. 2016: Springer
[31] Lu, Z., et al. Applying K-means Clustering and Genetic Algorithm for Solving MTSP. in Bio-Inspired Computing-Theories and Applications. 2016. Springer.
[32] G. Gan, C. Ma, J. Wu, “Data clustering: theory, algorithms, and applications”, Society for Industrial and Applied Mathematics,
Philadelphia, 2007
[33] D. Goldberg, Genetic Algorithm in Search , Optimization and Machine Learning, Addison Wesley, 1989.
[34] Z. Michalewicz, Genetic Algorithms + Data Structures =Evolution Programs, 3rd ed., Springer-Verlag, 1999.
[35] M. D’Ambros, M. Lanza, and R. Robbes, “An extensive comparison of bug prediction approaches,” 2010 7th IEEEWorking Conference on Mining Software Repositories (MSR 2010), pp.31–41, IEEE, 2010.
Citation
Manjula C, Lilly Florence, "Optimized Machine Learning Approach for Software Defect Prediction using K-means with Genetic Algorithms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.385-390, 2018.
Automatic Segmentation and Categorization of the Brain Tumors
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.391-397, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.391397
Abstract
Brain tumor detection and extraction within the time frame to offer better healthcare is vital and very important, but a time-consuming task performed by clinical supervisors or radiologists. Its accuracy for the brain tumor detection from modern imaging modalities also depends on their experience only. So the use of computer-aided methodology is very important to overcome these limitations. Generally, Cerebrum a tumor begins in the glial cells called Gliomas. Gliomas can be moderate developing (slow rate) or quickly developing (high rate). Doctors utilize the review of a mind tumor in light of gliomas to choose which treatment a patient needs. The state of the tumor is of indispensable significance for the treatment. In this paper, we propose a mechanized framework to separate between typical mind and strange cerebrum with tumor in the MRI pictures and furthermore additionally arrange the anomalous cerebrum tumors into High Rate or Low Rate tumors. The proposed framework utilizes KMFCM as the division strategy for grouping while Discrete Wavelet Transform (DWT) Principal Component Analysis (PCA) and Support Vector Machine (SVM)are the primary algorithms used. The calculated values of Cho/Cr and Cho/NAA of 15 different patients of different ages of both genders data is extracted from Brats-2017dataset are used classify into tumor grades.
Key-Words / Index Term
Tumors, Cho/Cr,Cho/NAA, DWT, PCA, High rate, Low rate, Gliomas
References
[1] E.-S. A. El-Dahshan, H. M. Mohsen, K. Revett, and A.-B. M. Salem, “Computer-aided diagnosis of human brain tumor through MRI: A survey and a new algorithm,” Expert Systems with Applications, vol. 41, no. 11, pp. 5526–5545, 2014.
[2] Wang, P., & Wang, H. L. (2008). A modified FCM algorithm for MRI brain image segmentation. In International seminar on Proceedings of future biomedical information engineering, 2008. FBIE’08 (pp. 26–29).
[3] Kim, JiHoon, et al. "Using a method based on a modified K-means clustering and mean shift segmentation to reduce file sizes and detect brain tumors from magnetic resonance (MRI) images." Wireless Personal Communications89.3 (2016): 993-1008.
[4] Beucher S., & Lantuejoul, C. (1979) Use of watershed in contour detection. In Proceedings of international workshop on image processing. CCETT/IRISA, Rennes, France.
[5] Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. stat. 1189–1232 (2001).
[6] P. Katti, V. R. Marathe, “Implementation of Classification System for Brain Tumor using Probabilistic Neural Network,” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, no. 10, pp. 188-192, October 2015.
[7] C. L. Devasena and M. Hemalatha, “Efficient computer aided diagnosis of abnormal parts detection in magnetic resonance images using hybrid abnormality detection algorithm,”Central European Journal of Computer Science, vol. 3, no. 3, pp. 117–128, 2013.
[8] J. Cheng, X. Chen, H. Yang, and M. Leng, “An enhanced kmeans algorithm using agglomerative hierarchical clustering strategy,” International Conference on Automatic Control and Artificial Intelligence (ACAI 2012). pp. 407–410, 2012.
[9] E. Dandil, M. Cakiroglu, Z. Eksi, “Computer-aided diagnosis of malign and benign brain tumors on MR images,” ICT Innovations 2014, pp. 157–166, 2015.
[10] A. Batra, Dr. G. Kaushik, “SECTUBIM: Automatic Segmentation And Classification of Tumeric Brain MRI Images using FHS (FCM, HWT and SVM),” International Journal of Engineering Science and Computing, Vol. 7, no.6, pp. 13190-13194, June 2017.
[11] M. B. M. Amien, A. Abd-elrehman, and W. Ibrahim, “An intelligent model for automatic brain-tumor diagnosis basedon MRI images,” International Journal of Computer Applications, vol. 72, no. 23, pp. 21– 24, June 2013.
[12] Mohana Priya K, Kavitha S, bharathi B, “Brain Tumor Types and Grades Classification Based on Statistical Feature set using Support Vector Machine”, 10th International Conference on Intelligent Systems and Control (ISCO), Nov 2016.
[13] Ahmed Kharrat, Karim gasmi, Mohamed Ben Messaoud, Nacra Benamrane and Mohamed Abid, “A Hybrid Approach for Automatic Classification of brain MRI using Genetic Algorithm and Support Vector Machine”, Lenardo Journal of Sciences, vol.17,pp.71-82,2010.
[14] Sonali B Gaikwad, madhuri S Joshi, “Brain Tumor Classification Using Principal Component Analysis and Probabilistic Neural Network”, International Journal for Computer Applications, Vol-120, no:3,pp.5-9, June 2015
[15] K.B.Vaishnavee, K.Amshakala, “An automated MRI Brain Image Segmentation and Tumor Detection using SOM-Clustering and Proximal Support Vector Machine Classifier”, ICETECH, 20 March 2015.
[16] S. K. Shrivastava and S. S. Gharde, “Support vector machine for handwritten devanagari numeral recognition,” International Journal of Computer Applications, vol. 07, no. 11, pp. 09–14, October 2010
Citation
B Nandan, Kunjam Nageswara Rao, "Automatic Segmentation and Categorization of the Brain Tumors," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.391-397, 2018.
Comparative Assessment of Color Models for Multi-Focus Image Fusion With Optimal Cluster Size
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.398-403, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.398403
Abstract
This paper assesses comparatively the performance of image fusion in different color channels using an image matting based multi focus image fusion technique, the JR method. This is a solely vicinity-based image matting algorithm that relies on the close pixel clusters in the input images. Color spaces provide powerful information for image processing by means of color variants, color histogram, color texture etc.. In our assessment, firstly we transform RGB color model of multi focus source images in to 6 different color spaces that are HSV, L*a*b, YUV, YIQ, YCbCr and XYZ. Next, each color channel of input images (RGB-R, RGB-G, RGB-B, LAB-L, LAB-A, LAB-B, HSV-H, HSV-S, HSV-V, YUV-Y,YUV-U, YUV-V, XYZ-X, XYZ-Y,XYZ-Z, YCbCr-Y, YCbCr-Cb, YCbCr –Cr, YIQ-Y, YIQ-I, YIQ-Q) are used in fusion process using the image matting based multi focus image fusion with optimal cluster size (the JR method). Finally the fused images are assessed with standard image quality metrics. The results certainly show better results in LAB-L and YIQ-Q color channals.
Key-Words / Index Term
Color spaces, Multi focus image fusion, image color models, color image fusion
References
[1] H.B. Kekre, Dhirendra Mishra, Rakhee Saboo, "Review on Image Fusion Techniques and Performance Evaluation Parameters", International Journal Of Engineering Science and Technology, Vol.5, Issue.4, April 2013.
[2] S.Li, Bin Yang, Jianwen Hu, "Performance comparison of different multi-resolution transforms for image fusion", Information Fusion, Vol. 12, Issue.2, pp. 74-84, 2011.
[3] J.Hu, S.Li, "The multiscale directional bilateral filter and its application to multisensor image fusion", Information Fusion, Vol.13, Issue.3, pp. 196-206, 2012.
[4] R.Dharmaraj, C.Durairaj, "Image Matting Based Multi-Focus Image Fusion With Optimal Cluster Size", International Journal of Computer Vision and Image Processing (IJCVIP), Vol. 8, Issue.3, 2018.
[5] P.Shih, C. Liu, "Comparative Assessment of Content-Based Faced Image Retrieval in Different Color spaces", International Journal of Pattern Recognition and Artificial Intelligence, Vol. 19, Issue. 07, pp. 873-893, 2005.
[6] J. Wang, M.F. Cohen, "Image and Video Matting: A Survey", Foundations and Trends® in Computer Graphics and Vision, Vol. 3, Issue. 2, pp 97-175, 2007.
[7] Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, "Image quality assessment:from error visibility to structural similarity", IEEE Transactions on Image Processing, Vol.13, Issue. 4, pp.600–612, 2004.
[8] C.S. Xydeas, V. Petrovic, "Objective image fusion performance measure",Electronic Letters, Vol. 36, Issue. 4, pp.308–309, 2000.
[9] Zhou Wang, Alan C Bovik, "A Universal Image Quality Index", IEEE Signal Processing Letters, Vol. 9, No.3, March 2002.
Citation
J.R.Dharmaraj, D.C.Durairaj, J.J.Melodina, "Comparative Assessment of Color Models for Multi-Focus Image Fusion With Optimal Cluster Size," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.398-403, 2018.
Development of an Efficient Clustering Technique for Brain Tumor Detection for MR Images
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.404-409, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.404409
Abstract
The brain tumor detection is the approach which can detect the tumor portion from the MRI image. To detect tumor from the image various techniques has been proposed in the previous times. The major challenge of robust brain tumor nuclei/cell detection is to handle significant variations in cell appearance and to split touching cells. The technique which is proposed in this research paper is based on morphological scanning and naïve bayes classification. The morphological scanning will scan the input image and naïve bayes classifier mark the tumor portion from the MRI image. The proposed algorithm is implemented in MATLAB and results are analyzed in terms of qualitatively and quantitatively in various parameters like false positive rate, false negative rate, execution time, PSNR, MSE, Accuracy and Fault Detection and also calculate overlapping area with dice coef. The proposed method has been tested on data set with more than 25 slide scanned images. This proposed method achieved accuracy with 86% best cell detection.
Key-Words / Index Term
MRI, Naïve Bayes, Morphological Scanning, Brain Tumor, Clustering
References
[1] Deepak C. Dhanwani, Mahip M. Bartere, “Survey on various techniques of brain tumour detection from MRI images”, IJCER, Vol.04, issue.1, Issn 2250- 3005, January 2014, pg. 24-26.
[2] Megha A joshi, D. H. Shah, “Survey of brain tumor detection techniques through MRI images”, AIJRFANS, ISSN: 2328-3785, March-May 2015, pp.09
[3] Poonam, Jyotika Pruthi, “Review of image processing techniques for automatic detection of tumor in human brain”, IJCSMC, Vol.2, Issue.11, November 2013, pg.117-122.
[4] Manoj K Kowear and Sourabh Yadev, “Brain tumor detection and segmentation using histogram thresholding”, International Journal of engineering and Advanced Technology, April 2012.
[5] Rajesh C. patil, A.S. Bhalchandra, “Brain tumor extraction from MRI images Using MAT Lab”, IJECSCSE, ISSN: 2277-9477, Volume 2, issue1.
[6] Vinay Parmeshwarappa, Nandish S, “A segmented morphological approach to detect tumor in brain images”, IJARCSSE, ISSN: 2277 128X , volume 4, issue 1, January 2014
[7] M.Karuna, Ankita Joshi, “Automatic detection and severity analysis of brain tumors using gui in matlab” IJRET: International Journal of Research in Engineering and Technology, ISSN: 2319-1163, Volume: 02 Issue: 10, Oct-2013
[8] Mohammed Y. Kamil, “Brain Tumor Area Calculation in CT-scan image using Morphological Operations”, IOSR Journal of Computer Engineering (IOSR-JCE) ISSN: 2278-8727, Volume 17, Issue 2, Ver.-V, PP 125-128, Mar – Apr. 2015.
[9] E.W. Wan, “Neural Network Classification: A Bayesian Interpretation”; IEEE Transactions on Neural Networks, vol. 1, no. 4, 1990.
[10] Kim Mey Chew, Ching Yee Yong , Rubita Sudirman , Syvester Tan Chiang Wei, “Bio-Signal Processing and 2D Representation for Brain Tumor Detection Using Microwave Signal Analysis”, 2018, IEEE
[11] Navpreet Kaur (Student), Manvinder Sharma (Assistant Professor), “Brain Tumor Detection using Self-Adaptive K-Means Clustering”, 2018, IEEE
[12] Animesh Hazra , Ankit Dey , Sujit Kumar Gupta , Md. Abid Ansari, “Brain Tumor Detection Based on Segmentation using MATLAB”, 2017, IEEE
[13] Saumya Chauhan, Aayushi More, Ritumbhra Uikey, Pooja Malviya, Asmita Moghe, “Brain Tumor Detection and Classification in MRI Images using Image and Data Mining”, 2017, IEEE
[14] Reema Mathew, A Dr. Ba bu Anto P, “Tumor detection and classification of MRI Brain image using Wavelet Transform and SVM”, 2017,IEEE
[15] S. Willium, “Network Security and Communication”, IEEE Transaction, Vol.31, Issue.4, pp.123-141, 2012.
[16] S.K. Sharma, “Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.1, No.5, pp.1-4, 2013.
Citation
Gurkarandesh Kaur, Ashish Oberoi, "Development of an Efficient Clustering Technique for Brain Tumor Detection for MR Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.404-409, 2018.
Face Recognition under Variation in Resolution Using Enhanced Local Ternary Pattern
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.410-415, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.410415
Abstract
Face is an important biometric trait that has been used for various application of today’s technology. Face recognition comprises recognition of an individual identity to others on the basis of facial features. Facial features provide low accuracy due to variation in illumination and resolution of the images. In this paper an approach has been proposed that overcomes the issue of low recognition accuracy under low resolution captured images. In this paper texture features based approach that has been developed from the local ternary pattern by using two different groups of neighbour pixel values. On the basis of these two different groups texture features have been computed by comparing these values with centre pixel value of particular regions. By using local codes developed from the particular region whole image features have been computed using different codes from different regions. In this paper an approach that is combination of filtering and feature extraction has been proposed so that better face recognition can be achieved. On the basis of parameters analysis proposed work outperforms as compare to exiting approaches.
Key-Words / Index Term
Face recognition, DCT, DWT, LDA, LTP, LBP and PCA
References
[1] Georghiades, A.S. and Belhumeur, P.N. and Kriegman, D. J.“From Few too Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose” IEEE Trans. Pattern Anal. Mach. Intelligence, vol. 23, 6, pp. 643-660, 2001.
[2] Sena, Bima, Bayu D. and Miura, Jun“Fuzzy-Based Illumination Normalization for Face Recognition” IEEE Workshop on Advanced Robotics and its Social Impacts, Pp. 131-136, DOI 10.1109/ARSO.2013.6705518, 2013.
[3] W.Jin, Bin Li and Ming You“Feature Extraction Based on Equalized ULBP for Face Recognition” IEEE Trans. Pattern Anal. Mach. Intelligence, vol. 25, 6, pp. 643-660,2013.
[4] S. Nazari, M.ShahramMoin “Face Recognition Using Global and Local Gabor Features” International Journal of Security and Its Applications, pp-754-759,2013.
[5] B.Yuan, H.Cao, J.Chu “Combining Local Binary Pattern and Local Phase Quantization for Face Recognition” IEEE international conference on face reorganization, pp-764-770 ,2013.
[6] Rashid, R.D., Jassim, S.A. and Sellahewa, H.“LBP Based on Multi Wavelet Sub-Bands Feature Extraction Used for Face Recognition”, IEEE International Workshop on Machine Learning for Signal Processing, pp. 1-6, ISSN 1551-2541, 2013.
[7] Mohamed, Abdallah A. , Yampolskiy, Roman V. “Adaptive Extended Local Ternary Pattern (AELTP) for Recognizing Avatar Faces”, International Conference on Machine Learning and Applications, ISSN. 978-0-7695-4913-2/12 , 2012.
[8] J.Sun, C.Zhang and H.Yan “Low-Resolution Face Recognition with Variable Illumination Based on Differential Images” International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 146-149, ISBN 978-1-4673-1741-2 , 2012.
[9] Khoukhi, A. and Ahmed, S.F. “Fuzzy LDA for Face Recognition with GA Based Optimization” Fuzzy Information Processing Society (NAFIPS) Annual Meeting of the North American, pp. 1-6, ISBN 978-1-4244-7859-0, 2010.
[10] Prabhjot Singh and Anjana Sharma, "Face Recognition Using Principal Component Analysis in MATLAB", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.1-5, 2015
[11] Ratnesh Kumar Shukla, Ajay Agarwal, Anil Kumar Malviya, "An Introduction of Face Recognition and Face Detection for Blurred and Noisy Images", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.39-43, 2018
Citation
Alka Rani, Narinder Kumar, "Face Recognition under Variation in Resolution Using Enhanced Local Ternary Pattern," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.410-415, 2018.
Online Handwritten Gujarati Numeral Recognition Using Support Vector Machine
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.416-421, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.416421
Abstract
In this paper, online handwritten numeral recognition for Gujarati is proposed. Online handwritten character recognition is in trend for research due to a rapid growth of handheld devices. The authors have compared Support Vector Machine (SVM) with linear, polynomial, and radial basis function kernels. The authors have used hybrid feature set. The authors have used zoning and chain code directional features which are extracted from each stroke. The dataset of the system is of 2000 samples and was collected by 200 writers and tested by 50 writers. The authors have achieved an accuracy of 92.60%, 95%, and 93.80% for linear, polynomial, RBF kernel and an average processing time of 0.13 seconds, 0.15seconds, and 0.18 seconds per stroke for linear, polynomial, RBF kernel.
Key-Words / Index Term
Online Handwritten Character Recognition (OHCR), Handwritten Character Recognition (HCR), Optical Character Recognition (OCR), Support Vector Machine (SVM), Gujarati Numeral, Gujarati Digits
References
[1] C. Patel and A. Desai, “Segmentation of text lines into words for Gujarati handwritten text,” Proc. 2010 Int. Conf. Signal Image Process. ICSIP 2010, pp. 130–134, 2010.
[2] C. Patel and A. Desai, “Zone identification for Gujarati handwritten word,” Proc. - 2nd Int. Conf. Emerg. Appl. Inf. Technol. EAIT 2011, pp. 194–197, 2011.
[3] C. Patel and A. Desai, “Gujarati Handwritten Character Recognition Using Hybrid Method Based on Binary Tree-Classifier And K-Nearest Neighbour,” Int. J. Eng. Res. Technol., vol. 2, no. 6, pp. 2337–2345, 2013.
[4] A. Desai, “Segmentation of Characters from old Typewritten Documents using Radon Transform,” Int. J. Comput. Appl., vol. 37, no. 9, pp. 10–15, 2012.
[5] A. A. Desai, “Handwritten Gujarati Numeral Optical Character Recognition using Hybrid Feature Extraction Technique,” Int. Conf. Image Process. Comput. Vision, Pattern Recognition, IPCV, 2010.
[6] A. A. Desai, “Gujarati handwritten numeral optical character reorganization through neural network,” J. Pattern Recognit., vol. 43, no. 7, pp. 2582–2589, 2010.
[7] A. a. Desai, “Support vector machine for identification of handwritten Gujarati alphabets using hybrid feature space,” CSI Trans. ICT, vol. 2, no. January, pp. 235–241, 2015.
[8] M. Maloo, K. V Kale, and I. Technology, “Support Vector Machine Based Gujarati Numeral Recognition,” Int. J. Comput. Sci. Eng. ({IJCSE}), {ISSN} 0975-3397, vol. 3, no. 7, pp. 2595–2600, 2011.
[9] M. B. Mendapara and M. M. Goswami, “Stroke identification in Gujarati text using directional feature,” Proceeding IEEE Int. Conf. Green Comput. Commun. Electr. Eng. ICGCCEE 2014, 2014.
[10] N. Rave and S. K. Mitra, “Feature extraction based on stroke orientation estimation technique for handwritten numeral,” in Eighth International Conference on Advances in Pattern Recognition (ICAPR), 2015.
[11] A. N. Vyas and M. M. Goswami, “Classification of handwritten Gujarati numerals,” 2015 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2015, pp. 1231–1237, 2015.
[12] Y. M. Prutha and S. G. Anuradha, “Morphological Image Processing Approach of Vehicle Detection for Real-Time Traffic Analysis,” Int. J. Comput. Sci. Int. J. Comput. Sci. Eng., vol. 3, no. 5, pp. 88–92, 2014.
[13] M. A. Abuzaraida, A. M. Zeki, and A. M. Zeki, “Online recognition system for handwritten hindi digits based on matching alignment algorithm,” in International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014, 2014, pp. 168–171.
[14] S. Belhe, C. Paulzagade, A. Deshmukh, S. Jetley, and K. Mehrotra, “Hindi handwritten word recognition using HMM and symbol tree,” Proceeding Work. Doc. Anal. Recognit. - DAR ’12, p. 9, 2012.
[15] S. Joseph and A. Hameed, “Online handwritten malayalam character recognition using LIBSVM in matlab,” in National Conference on Communication, Signal Processing and Networking, NCCSN 2014, 2015, pp. 1–5.
[16] A. Arora and A. M. Namboodiri, “A hybrid model for recognition of online handwriting in Indian scripts,” in International Conference on Frontiers in Handwriting Recognition, ICFHR 2010, 2010, pp. 433–438.
[17] K. P. Primekumar and S. M. Idiculla, “On-line Malayalam Handwritten Character Recognition using HMM and SVM,” Int. Conf. Signal Process. , Image Process. Pattern Recognit. [ ICSIPR], pp. 1–5, 2013.
[18] A. Sampath, C. Tripti, and V. Govindaru, “Online Handwritten Character Recognition for Malayalam,” ACM Int. Conf. Proceeding Ser., pp. 661–664, 2012.
[19] G. S. Reddy, P. Sharma, S. R. M. Prasanna, C. Mahanta, and L. N. Sharma, “Combined online and offline assamese handwritten numeral recognizer,” in National Conference on Communications, NCC 2012, 2012.
[20] A. Bharath and S. Madhvanath, “HMM-based lexicon-driven and lexicon-free word recognition for online handwritten indic scripts,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 34, no. 4, pp. 670–682, 2012.
[21] K. H. Aparna, V. Subramanian, M. Kasirajan, G. V. Prakash, and V. S. Chakravarthy, “Online Handwriting Recognition for Tamil,” Ninth Int. Work. Front. Handwrit. Recognit., pp. 438–443, 2004.
[22] H. Swethalakshmi, “Online handwritten character recognition of Devanagari and Telugu Characters using support vector machines,” Tenth Int. Work. Front. Handwrit. Recognit., pp. 1–6, 2006.
[23] A. Sharma and K. Dahiya, “Online Handwriting Recognition of Gurmukhi and Devanagari Characters in Mobile Phone Devices,” in International Journal of Computer Applications, 2012, pp. 37–41.
[24] N. Bhattacharya, U. Pal, and F. Kimura, “A System for Bangla Online Handwritten Text,” in 12th International Conference on Document Analysis and Recognition, 2013, pp. 1335–1339.
[25] S. K. Parui, K. Guin, U. Bhattacharya, and B. B. Chaudhuri, “Online handwritten Bangla character recognition using HMM,” in 19th International Conference on Pattern Recognition, 2008.
[26] C. Biswas, U. Bhattacharya, and S. K. Parui, “HMM based online handwritten Bangla character recognition using Dirichlet distributions,” in International Workshop on Frontiers in Handwriting Recognition, IWFHR, 2012, pp. 600–605.
[27] G. Keerthi Prasad, I. Khan, N. R. Chanukotimath, and F. Khan, “On-line handwritten character recognition system for Kannada using Principal Component Analysis Approach: For handheld devices,” in 2012 World Congress on Information and Communication Technologies, 2012, pp. 675–678.
[28] J. Rajkumar, K. Mariraja, K. Kanakapriya, S. Nishanthini, and V. S. Chakravarthy, “Two schemas for online character recognition of Telugu script based on Support Vector Machines,” in International Workshop on Frontiers in Handwriting Recognition, IWFHR, 2012, no. 2004, pp. 565–570.
[29] D. N. Lohare, R. Telgade, and R. R. Manza, “Review Brain Tumor Detection Using Image Processing Techniques,” Int. J. Comput. Sci. Eng., vol. 6, no. 5, pp. 735–740, 2018.
[30] K. P. Wu and S. De Wang, “Choosing the kernel parameters for support vector machines by the inter-cluster distance in the feature space,” Pattern Recognit., vol. 42, no. 5, pp. 710–717, 2009.
Citation
V. A. Naik, A. A. Desai, "Online Handwritten Gujarati Numeral Recognition Using Support Vector Machine," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.416-421, 2018.