Load Dividing and Reclustering technique to Improve the Reliability of Data In a Network
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.522-525, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.522525
Abstract
The organizing and scheduling of the network to conserve the energy of the node to accomplish better communication with the sink is the key challenge in a network. The numbers of techniques are established to cluster the network according to the distance of nodes from the sink. This paper presents a technique which allows the cluster to divide its load equally which helps to minimize the data loss. The cluster head selection takes place in two levels according to probability, threshold and its distance from sink. At level 0 cluster head selected will not take part in level 1 cluster head selection and aggregated data at level 0 is forwarded to level 1 cluster head according to their minimum distance concept. The data from cluster heads at level 1 is divided into two equal part so that to minimize the energy consumption and data loss
Key-Words / Index Term
Load Divide, Reclustering, Network levels, Stability period
References
[1] 1Jaswant Singh Raghuwanshi,2Neelesh Gupta,3Neetu Sharma, “ENERGY FFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS”, International Journal of Advanced Smart Sensor Network Systems (IJASSN), Vol 4, No.3, July 2014.
[2] Ashim Kumar Ghosh1, Anupam Kumar Bairagi2, Dr. M. Abul Kashem3, Md. Rezwan-ul-Islam1, A J M Asraf Uddin1, “ Energy Efficient Zone Division Multihop Hierarchical Clustering Algorithm for Load Balancing in Wireless Sensor Network”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 12, December 2011.
[3] I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, E. Cayirci,” Wireless sensor networks: a survey”, Elsevier, Computer Networks 38 (2002) 393–422.
[4] 1M. Shanmukhi, 2G. Nagasatish, “LOAD BALANCING USING CLUSTERING IN WSN WITH FUZZY LOGIC TECHNIQUES”, International Journal of Pure and Applied Mathematics Volume 119 No. 14 2018, 61-69.
[5] Koulin Yuan1, a, Lin Qiao1, b and Lei Han1, c, “Level and Cluster Based Routing for Wireless Sensor Network”, ISSN: 1662-7482, Vols. 321-324, pp 515-522, 2013.
[6] Veena Anand , Deepika Agrawal, Preety Tirkeyb, Sudhakar Pandey, “An energy efficient approach to extend network life time of wireless sensor networks”, Elsevier, Procedia Computer Science 92 ( 2016 ) 425 – 430.
[7] S. Rani and S.H. Ahmed, Multi-hop Routing in Wireless Sensor Networks, Springer Briefs in Electrical and Computer Engineering, DOI 10.1007/978-981-287-730-7_2.
[8] Shankar Sachdev1, Laxman Yalmar2, Nilesh Gaykhe3, “ Energy Efficient Cluster Based Routing Algorithm in Wireless Sensor Networks”, IJESC ISSN 2321 3361 © 2016.
[9] Shakshi Mehta et al “ Improved Multi-Hop Routing Protocol in Wireless Body Area Networks “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 7, July 2015.
[10] Li, Hongjuan, Kai Lin, and Keqiu Li. "Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks." Computer Communications 34.4 (2011): 591-597.
[11] Raju, G. T., D. K. Ghosh, T. Satish Kumar, S. Kavyashree, and V. Nagaveni. "Wireless sensor network lifetime optimization." (2011): 244-248.
[12] Dipak Wajgi1 and Dr. Nileshsingh V. Thakur2, “load balancing based approach to improve lifetime of wireless sensor network”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 4, August 2012.
[13] Manel Khelifi, Assia Djabelkhir,” LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks”, 2016.
[14] Dipak Wajgi et al,” Load Balancing Algorithms in Wireless Sensor Network : A Survey”, IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 Vol.2, No4, August 2012.
[15] R . Shantha Selva Kumari1*, A. Chithra2 and M. Balkis Devi3,” Efficient 2-level Energy Heterogeneity Clustering Protocols for Wireless Sensor Network”, Indian Journal of Science and Technology, Vol 9(8), DOI: 10.17485/ijst/2016/v9i8/87961, February 2016.
[16] Amarjeet Kaur1, T P Sharma2,” FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN”, Proc. of Int. Conf. on Advances in Computer Science 2010.
[17] Rahul K Ghotekar et al,” Load Balancing for Achieving the Network Lifetime in WSN-A Survey”, International Journal of Innovative Research in Advanced Engineering (IJIRAE), Volume 1 Issue 4 (May 2014).
[18] Emad Ibbini, Student Member, Kweh Yeah Lun, Mohamed Othman, Zurina Mohd Hanapi,” An Efficient Mechanism Protocol for Wireless Sensor Networks by using Grids”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 3, 2018.
Citation
Sonia Sethi, Deepak Kumar , "Load Dividing and Reclustering technique to Improve the Reliability of Data In a Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.522-525, 2018.
Revelation of Down Syndrome Using Artificial Neural Network
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.526-530, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.526530
Abstract
A disorder in genetic chromosome 21 is popularly known as the Down syndrome (trisomy 21). It results in development and intellectual delays, but if we are able to give the exact care early on, it can make a good difference. Studies show that we can detect the Down syndrome in the early stages of pregnancy by identifying the absence of the fetal nasal bone. The common method followed in this issue is the visual identification of the ‘absence’ using ultra sonogram image of the nasal bone region. However, the visual identification technique is inefficient and difficult to follow. Thus, image processing based visual extraction technique can play a role in this case. In this paper, we have the raw data, which is employed to train the Back Propagation Neural Network (BPNN). The ultrasonogram images can be analyzed using this feed forward trained neural network and the detection can be made with appreciably low error rates. MATLAB is the platform used in this work for training the Artificial Neural Network (ANN).
Key-Words / Index Term
Down syndrome, Back Propagation Neural Network, Feature extraction, chromosomal abnormalities
References
[1] ACOG Committee, “Screening for fetal chromosomal abnormalities”, Obstest Gynecol , No. 77, pp. 217-228, 2007.
[2] Jiri D.SonekMD et.al., “Prenatal ultrasonographic diagnosis of nasal bone abnormalities in three fetuses with Down syndrome”, American Journal of Obstetrics and Gynecology, Vol. 186, Issue 1, pp. 139-141, 2002.
[3] S. Cicero et.al., “Absence of nasal bone in fetuses with trisomy 21 at 11 – 14 weeks of gestation: an observational study”, Lancet , No. 358, pp. 1665–1667, 2001.
[4] Orlandi et.al., “Measurement of nasal bone length at 11–14 weeks of pregnancy and its potential role in Down syndrome risk assessment”, Ultrasound Obstet Gynecol, Vol. 22, pp. 36-39, 2003.
[5] J. Sonek and K.H Nicolaides, “Prenatal ultrasonographic diagnosis of nasal bone abnormalities in three fetuses with Down syndrome”, Am. J. Obstet Gynecol, Vol. 186, pp. 139–141, 2002.
[6] B. Bromley et.al., “Fetal nose bone length: a marker for Down syndrome in the second trimester”, J. Ultrasound Med, Vol. 21,: pp. 1387 –1394, 2002.
[7] S. Cicero et.al., “Nasal bone hypoplasia in trisomy 21 at 15 – 22 weeks gestation”, Ultrasound Obstet Gynecol, Vol. 21, pp. 15–18, 2003.
[8] J.D. Sonek. “Nasal bone assessment in prenatal screening for trisomy 21”, Am. J. Obstet Gynecol, Vol. 195, pp. 1219–1230, 2006.
[9] M.S Beksac et.al., “Assessment of antepartum fetal heart rate tracings using neural networks”, In: Van Geijn HP, Copra, FJA, eds, A Critical Appraisal of Fetal Surveillance. Amsterdam: Elsevier, pp. 354-362, 1994.
[10] M.S. Beksac et.al., “Development and application of a simple expert system for the interpretation of the antepartum fetal heart rate tracings”, Eur. J. Obstet Gynecol Reprod Biol, No. 37: pp. 133-141, 1990.
[11] D.R. Hush and B.G. Home, “Progress in supervised neural networks”, IEEE Signal Processing Magazine, pp. 8-39, 1993..
[12] N.J Wald et al., “Maternal serum screening for Down`s syndrome in early pregnancy”, BMJ, Vol. 297, pp. 883-887, 1988.
[13] Coppedè et.al., “Polymorphisms in folatemetabolizing genes, chromosome damage, and risk of Down syndrome in Italian women: identification of key factors using artificial neural networks”, BMC Medical Genomics, Vol. 42, No. 3, 2010.
[14] S. Penco, et.al., “Assessment of the Role of Genetic Polymorphism in Venous Thrombosis Through Artificial Neural Networks”, Annals of Human Genetics, Vol. 69, No. 693-706, 2005.
[15] P.J.C Lisboa, “A review of evidence of health benefit from artificial neural networks in medical intervention”, Neural Networks, Vol. 15, pp. 11-39, 2002.
[16] E. Grossi et.al., “International experience on the use of artificial neural networks in gastroenterology”, Dig Liver Dis, Vol. 39, pp. 278-85, 2007.
[17] M. Tabaton et.al., “Artificial Neural Networks Identify the Predictive Values of Risk Factors on the Conversion of Amnestic Mild Cognitive Impairment”, J Alzheimers Dis., Vol. 19, pp. 1035-1040, 2010.
[18] M.E Street et.al., “Placental determinants of fetal growth: identification of key factors in the insulinlike growth factor and cytokine systems using artificial neural networks”, BMC Pediatr, Vol. 8, No.24, 2008.
[19] E. Grossi, “Neuropathological findings processed by artificial neural networks (ANNs) can perfectly distinguish Alzheimer’s patients from controls in the Nun Study”, BMC Neurol, Vol. 7, No. 15, 2007.
[20] Mosbesh R.Kaloop and Jong Wan Hu, “Optimizing the De-Noise Neural Network Model for GPS Time Series Monitoring of Structures”, Sensors, Vol. 15, No. 9, pp. 24428-24444, 2015.
[21] Kayhan Gulez et.al., “Power Op-Amp Based Active Filter Design with Self Adjustable Gain Control by Neural Networks for EMI Noise Problem”. In: D.S Huang, X.P Zhang, G.B Huang (eds), Advances in Intelligent Computing. ICIC 2005. Lecture Notes in Computer Science, Vol. 3644. Springer, Berlin, Heidelberg Huang (Eds.): ICIC 2005, Part I, LNCS 3644, pp. 243 – 252, 2005.
[22] P Kaur et.al., “Accurate Prediction of Fetal Images for measuring growth of Fetus using Genetic Algorithm and Back -Propagation Technique of Neural Network”, Int. J. Sci. Res. in Computer Science and Engineering, Vol.5, Issue 3, pp. 30-41, 2017.
[23] V. Davis and S. Devane, “Diagnosis of Brain Hemorrhage Using Artificial Neural Network”, Int. J. Sci. Res. in Network Security and Communication, Vol. 5, Issue 1, pp. 20-23, 2017.
[24] Vijo M Joy and S. Krishnakumar, “ANN Based Load Scheduling Method for Power Management Systems”, IJEECS, Vol. 6, Issue 10, pp. 310-313, 2017.
[25] Vijo M Joy and S. Krishnakumar, “Optimal Design of Power Sheduling using Artificial Neural Network in An Isolated Power System”, International Journal of Pure and Applied Mathematics, Volume 118 No. 8, pp. 289-294, 2018.
[26] Vijo M Joy and S Krishnakumar, “Efficient Load Scheduling Method For Power Management,” IJSTR, vol.5, issue 1, January 2016.
[27] Divyansh Mathur, “Maximum Power Point Tracking with Artificial Neural Network”. International Journal of Emerging Science and Engineering, Vol. 2, No.3, 2014.
Citation
Vincy Devi V. K, Rajesh R, "Revelation of Down Syndrome Using Artificial Neural Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.526-530, 2018.
Video Generation using Still Images
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.531-534, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.531534
Abstract
A video is termed as the sequence of kinetic frames captured/ play backed into some sequences. The rapid development of video capturing systems changed the word from recording the still frames on tapes to the storing frame digitally through charge coupled devices. The Video recording system changes from past analog era to digital era which made editing and manipulation very easy. This paper explained how Matlab is used for making the video from the still images and its performance in the sense of storage and time. Different video generation tools are elaborated and compared with the Matlab generated tools.
Key-Words / Index Term
Matlab, frames, Video generation, Recording systems, CCD
References
[1] R. Cutler, "The distributed meetings system", Acoustics, Speech, and Signal Processing, Proceedings (ICASSP `03) on IEEE International Conference on signal processing, 2003, pp. IV-756-9 vol.4.
[2] H. Pan, P. van Beek and M. I. Sezan, "Detection of slow-motion replay segments in sports video for highlights generation" ,2001 IEEE International Conference on Acoustics, Speech, and Signal Processing, Proceedings (Cat. No.01CH37221), Salt Lake City, UT, 2001, pp. 1649-1652 vol.3.
[3] T. Meier and K. N. Ngan, "Automatic segmentation of moving objects for video object plane generation", in IEEE Transactions on Circuits and Systems for Video Technology, vol. 8, no. 5, pp. 525-538, Sep 1998.
[4] LiYaho, AtousaTorabi , “Video Description Generation Incorporating Spatio- Temporal Features and a Soft-Attention Mechanism”,Proceedings of the IEEE international conference on computer vision, 4507-4515, 2015
[5] Kenneth A. Paruiski, Lionel J. D`Luna. Brian L. Benamati,“High-performance digital color video camera”, Journal of electronic imaging, 1992
[6] SamanNaderiparizi, Pengyu Zhang, MatthaiPhilipose,“Glimpse: A Programmable Early-Discard Camera Architecture for Continuous Mobile Vision”, MobiSys, 2017, NY, USA
[7] Neetish Kumar, Dr Deepa Raj,“Video Processing and its Applications: A survey” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), ISSN 2278-6856.
[8] Neetish Kumar, Dr Deepa Raj,“A Study and Analysis of Images in Different Color Models”, International Journal Of Advanced Studies In Computer Science And Engineering IJASCSE Volume 7, Issue 1, 2018.
[9] Stephen J. Solari‘Architecture of a digital video recorder’2000
[10] Luming Zhang, Peiguang Jing, Yuting Su, “SnapVideo: Personalized Video Generation for a Sightseeing Trip”, IEEE transactions on cybernetics, 2016
Citation
Neetish Kumar, Deepa Raj, "Video Generation using Still Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.531-534, 2018.
Spectral Subtraction based Speech De-noising using Adapted Cascaded Median Filter
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.535-541, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.535541
Abstract
In this paper, a new method is proposed for improvement of speech which is distorted by acoustic noise. Acoustic noise reduction is done through a proposed post processed adapted cascaded median filter based on spectral subtraction technique. This method use two stages of filter, in which background noise is eliminated by first stage cascaded median filter and then output speech is post processed by second stage adaptive filter, to reduce musical and residual noise. Proposed post processing algorithm is compared to conventional single stage cascaded median filter based on subjective listening tests and perception evaluation of speech quality (PESQ) scores. Simulation is done in Matlab-15 and results show that enhanced speech generated by proposed algorithm has better quality than conventional cascaded median filter.
Key-Words / Index Term
Speech Enhancement, Noise Estimation, Spectral Subtraction, Cascaded Median Filter, Musical Noise
References
[1] S.F. Boll, “Suppression of acoustic noise in speech using spectral subtraction”, IEEE Transaction Acoustic, Speech, Signal Process., vol.27, no. 2, pp. 113-120, 1979.
[2] M. Berouti, R. Schwartz, and J. Makhoul, “Enhancement of speech corrupted by acoustic noise”, In the Processing of IEEE International Conference of Acoustic, Speech and Signal Processing, pp. 208-211, 1979.
[3] S. Kamath and P. Loizou, “A multiband spectral subtraction method for enhancing speech”, In the Processing of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Volume 4, pp IV-4164, 2002.
[4] Ekaterina Verteletskaya and Boris Simak, “Noise reduction based on modified spectral subtraction method”, IAENG International Journal of Computer Science, 38:1, IJCS_38_1_10, 2011.
[5] Martin, R, “Spectral subtraction based on minimum statistics”, In the Processing of Eur. Signal Process. Conf., pp. 1182-1185, 1994.
[6] V. Stahl, A. Fisher, and R. Bipus, “Quantile based noise estimation for spectral subtraction and wiener filtering”, In the Processing of ICASSP, pp. 1875-1878, 2000.
[7] S. Rangachari, and P. C. Loizou, “A noise-estimation algorithm for highly non-stationary environments”, Speech Communication., vol. 48, pp. 220-231, 2006.
[8] I. Cohen, “Noise spectrum estimation in adverse environments: improved minima controlled recursive averaging”, IEEE Trans. Speech Audio Process., vol. 11, no. 5, pp. 466-475, 2003.
[9] Santosh K. Waddi, Prem C. Pandey, and Nitya Tiwari, “Speech Enhancement Using Spectral Subtraction and Cascaded-Median Based Noise Estimation for Hearing Impaired Listeners”, NCC, Department of Electrical Engineering Indian Institute of Technology Bombay, pp 1 - 5 , 2013.
[10] Kun-Ching Wang, “Wavelet-based speech enhancement using time-frequency adaptation”, EURASIP Journal on Advances in Signal Processing, 2009.
[11] Y. Hu and P.C. Loizou, “Evaluation of objective quality measures for speech enhancement”, IEEE Transactions on Audio, Speech, and Language Processing, volume. 16, pp. 229-238, 2008.
[12] G. Doblinger, “Computationally efficient speech enhancement by spectral minima tracking in subbands”, In the Processing of IEEE International Conference on Eurospeech, vol 2, pp 1513–1516, 1995.
[13] H. Hirsch and C. Ehrlicher, “Noise estimation techniques for robust speech recognition”, In the Processing of IEEE International Conference of IEEE International Conf. on Acoustic, Speech Signal Process., pp 153–156, 1995.
[14] C. Ris and S. Dupont, “Assessing local noise level estimation methods: application to noise robust ASR”, IEEE Transaction on Speech Comm. Vol 34, pp 141–158, 2001.
[15] B. Widrow and S. D. Stream, Adaptive Signal processing, New York: Prentice-Hall, 1985.
Citation
Dhiraj Nitnaware, "Spectral Subtraction based Speech De-noising using Adapted Cascaded Median Filter," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.535-541, 2018.
Author Identification on Imbalanced Class Dataset of Indian Literature in Marathi
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.542-547, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.542547
Abstract
Author Identification is one of the application of text mining and is the task of investigating author of the anonymous text document. Application of author Identification includes in digital forensic, plagiarism detection, copyright issues, etc. The numerous amount of work is already done on English language perhaps Author identification of Indian regional languages is limited. This research paper presents Author identification on Indian regional Marathi Language. In this paper proposing a technique for identifying probabilistic authors via linguistic stylometry i.e. the statistical analysis of variations in literary style between one author or genre with another. In total 11 features are extracted with 8 lexical and syntactic features and 3 word N-gram features. Experimentation is performed with 8 features and machine learning algorithms, i.e. k-nearest neighbor, Naïve Bayes and Support Vector Machine. Moreover, result based on word n-gram i.e. unigram, bigram and trigram are also presented. Experimentation result shows better result with word N-gram method.
Key-Words / Index Term
Author Identification, Text Mining, Machine Learning, Marathi Language, Stylometry
References
[1] C. Qian, T. He, and R. Zhang, “Deep Learning based Authorship Identification.”
[2] Wikipedia contributors, “Languages with official status in India- Wikipedia,” Wikipedia, The Free Encyclopedia., 2018. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Languages_with_official_status_in_India&oldid=841744869. [Accessed: 21-May-2018].
[3] “Diversity of India – Geographical and Cultural contexts – Am an aspirant too,” Wikipedia, The Free Encyclopedia. [Online]. Available: https://tklvch.wordpress.com/2015/01/07/diversity-of-india-geographical-and-cultural-contexts/. [Accessed: 27-Apr-2018].
[4] T. C. Mendenhall, “The characteristic curves of composition.,” Science, vol. 9, no. 216, pp. 237–249, 1887.
[5] F. Mosteller and D. Wallace, “Inference and disputed authorship: The Federalist,” 1964.
[6] K. S. Digamberrao and R. S. Prasad, “Author Identification on Literature in Different Languages: A Systematic Survey,” in 2018 International Conference On Advances in Communication and Computing Technology (ICACCT), 2018, pp. 174–181.
[7] S. D. Kale and R. S. Prasad, “A Systematic Review on Author Identification Methods,” Int. J. Rough Sets Data Anal., vol. 4, no. 2, pp. 81–91, Apr. 2017.
[8] A. F. Otoom, E. E. Abdullah, S. Jaafer, A. Hamdallh, and D. Amer, “Towards author identification of Arabic text articles,” in 2014 5th International Conference on Information and Communication Systems (ICICS), 2014, pp. 1–4.
[9] B. Diri and M. Fatih Amasyali, “Automatic Author Detection for Turkish Texts.”
[10] H. Paci, E. Kajo, E. Trandafili, I. Tafa, and D. Salillari, “Author identification in Albanian language,” in Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011, 2011, pp. 425–430.
[11] S. D. Kale and R. S. Prasad, “Author Identification using Sequential Minimal Optimization with rule-based Decision Tree on Indian Literature in Marathi,” Procedia Comput. Sci., vol. 132, pp. 1086–1101, Jan. 2018.
[12] S. N. Prasad, V. B. Narsimha, P. V. Reddy, and A. V. Babu, “Influence of Lexical, Syntactic and Structural Features and their Combination on Authorship Attribution for Telugu Text,” Procedia Comput. Sci., vol. 48, no. C, pp. 58–64, 2015.
[13] S. Das and P. Mitra, “Author Identification in Bengali Literary Works,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6744 LNCS, springer, 2011, pp. 220–226.
[14] J. R. Prasad, U. V. Kulkarni, and R. S. Prasad, “Template Matching Algorithm for Gujrati Character Recognition,” in 2009 Second International Conference on Emerging Trends in Engineering & Technology, 2009, pp. 263–268.
[15] J. R. Prasad, U. V. Kulkarni, and R. S. Prasad, “Offline Handwritten Character Recognition of Gujrati script using Pattern Matching,” in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, 2009, pp. 611–615.
[16] F. Wikipedia, “Statistical classification Frequentist procedures.”
[17] E. Stamatatos, “A survey of modern authorship attribution methods,” J. Am. Soc. Inf. Sci. Technol., vol. 60, no. 3, pp. 538–556, 2009.
[18] M. W. Corney, “Analysing E-mail Text Authorship for Forensic Purposes by,” 2003.
[19] Chaitanya Singh, “HashMap in Java with Example.” [Online]. Available: https://beginnersbook.com/2013/12/hashmap-in-java-with-example/. [Accessed: 29-Oct-2018].
[20] “HashMap in Java - javatpoint.” [Online]. Available: https://www.javatpoint.com/java-hashmap. [Accessed: 29-Oct-2018].
[21] E. Table, R. External, C. Cat, and D. Rabbit, “Confusion matrix,” pp. 1–4, 2018.
Citation
Sunil D. Kale, Rajesh S. Prasad, "Author Identification on Imbalanced Class Dataset of Indian Literature in Marathi," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.542-547, 2018.
Empirical Studies on COTS Methodology
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.548-559, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.548559
Abstract
Commercial Off-The-Shelf (COTS) components are being used in increasing number to reduce cost and delivery time of software. A commercial Off-The-Shelf (COTS) component is becoming more and more important since it promotes reuse to higher levels of abstraction. As a consequence, many components are available either being open-source software (OSS) or commercial-off-the shelf (COTS). Component - Based Software Development has evolved as a popular software development technique since the introduction of Microsoft’s Component Object Model (COM) in the early 90s. This paper presents review literature that has been published on empirical research of COTS. We were interested to describe the empirical research on COTS to see that if there are any areas of CBSD that are yet to be touched in the research process. Empirical studies are the proofs of the hypothesis about the industry’s perception of CBSD process.
Key-Words / Index Term
CBSD, Component object model (COM), COTS
References
[1] Gao, J., Tsao, H. S., Wu, Y., “Testing and quality assurance for component-based software”, Artech House, 2003.
[2] Bhatt, P., Thaker, B., Shah, N., “A Survey on Developing Secure IOT Products”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol. 6(5), pp.41-44, 2018.
[3] Singha, P., Aditya, “Toolkit for Web Development Based on Web Based Information System”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol. 6(5), pp.1-5, 2018.
[4] Kitchenham, B., Brereton, O. P., Budgen, D., Turner, M., Bailey, J., Linkman, S., “Systematic literature reviews in software engineering–a systematic literature review: Information and software technology”, Vol. 51(1), pp.7-15, 2009.
[5] Clemens, S., D.G.S.M., “Component Software: Beyond Object-Oriented Programming”, 2nd ed. London: Addison-Wesley and ACM Press, 2002.
[6] Crnkovic, I., M. Chaudron, S. Larsson., “Component-Based Development Process and Component Lifecycle”, In International Conference on Software Engineering Advances (2006).
[7] Tekumalla, B., “Status of Empirical Research in Component Based Software Engineering-A Systematic Literature Review of empirical studies”, 2012.
[8] Ajila, S.A., D., Wu, “Empirical study of the effects of open source adoption on software development economics”, Journal of Systems and Software, Vol. 80(9): pp. 1517-1529, 2007.
[9] Höfer, A., W. Tichy, “Status of Empirical Research in Software Engineering Empirical Software Engineering Issues”, Critical Assessment and Future Directions, V. Basili, et al., Edit, Springer Berlin / Heidelberg, pp. 10-19, 2007.
[10] Mei, H., Zhang, L., Yang, F., “A component-based software configuration management model and its supporting system”, Journal of Computer Science and Technology, Vol. 17(4), pp.432-441, 2002.
[11] Shukla, R., Marwala, T., “Component Based Software Development Using Component Oriented Programming”, In Proceedings of International Conference on Advances in Computing, Springer India, pp. 1125-1133, 2013.
[12] Brodskiy, Y., Wilterdink, R., Stramigioli, S., Broenink, J., “Fault avoidance in development of robot motion-control software by modeling the computation”, In International Conference on Simulation, Modeling, and Programming for Autonomous Robots, Springer International Publishing, pp. 158-169, 2014.
[13] Pastor, J. A., Alonso, D., Sánchez, P., Álvarez, B., “Towards the definition of a pattern sequence for real-time applications using a model-driven engineering approach”, In International Conference on Reliable Software Technologies, Springer Berlin Heidelberg, pp. 167-180, 2010.
[14] Dubey, S. K., Jasra, B., “Reliability assessment of component based software systems using fuzzy and ANFIS techniques”, International Journal of System Assurance Engineering and Management, pp.1-8, 2017.
[15] Ayala, C., Hauge, Conradi, R., Franch, X., Li, J., Velle, K. S.,“Challenges of the open source component marketplace in the industry”, In IFIP International Conference on Open Source Systems, Springer Berlin Heidelberg, pp. 213-224, 2009.
[16] Jain, H., Reddy, B., “Layered architecture for assembling business applications from distributed components”, Journal of Systems Science and Systems Engineering, 13(1), pp.60-77, (2004).
[17] Tiwari, U. K., Kumar, S., “Components integration-effect graph: a black box testing and test case generation technique for component-based software”, International Journal of System Assurance Engineering and Management, pp.1-15, 2016.
[18] Mei, H., “A component model for perspective management of enterprise software reuse”, Annals of Software Engineering, Vol. 11(1), pp.219-236, (2001).
[19] Brown, A. W., “Model driven architecture: Principles and practice”, Software and Systems Modeling, 3(4), pp. 314-327, 2004.
[20] Tyagi, K., Sharma, A., “An adaptive neuro fuzzy model for estimating the reliability of component-based software systems”, applied Computing and informatics, Vol. 10(1), pp.38-51, 2014.
[21] Maldonado, C. D. A., Nieto, L. A. C., Cala, D. S. P., Diosa, H. A., “Methodological hybrid SOA+ CBSD for services oriented software development”, 10th Computing Colombian Conference (10CCC), pp. 86-92, IEEE, 2015.
[22] Ulkuniemi, P., Araujo, L., Tähtinen, J., “Purchasing as market-shaping: The case of component-based software engineering”, Industrial Marketing Management, Vol. 44, pp.54-62, 2015.
[23] Pham, T. T., Defago, X., “Reliability prediction for component-based software systems with architectural-level fault tolerance mechanisms”, Eighth International Conference on Availability, Reliability and Security (ARES), 2013, pp. 11-20, IEEE, 2013.
[24] de Carvalho Junior, F. H., Rezende, C. A., deCarvalho Silva, J., Al-Alam, W. G., de Alencar, J. M. U., “Contextual abstraction in a type system for component-based high performance computing platforms”, Science of Computer Programming, 132, pp.96-128, (2016).
[25] Tang, S., Liu, Q., “Supporting Integration of COTS Components from a Perspective of Self-Adaptive Software Architecture”, In Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual, pp. 706-713, IEEE, (July, 2013).
[26] Li, Y., Yin, J., Dong, J., “A component management system for mass customization”, First International Multi-Symposiums on Computer and Computational Sciences, IMSCCS`06, Vol. 2,pp. 398-404, IEEE, 2006.
[27] Yu, Z., Xiaoxing, M., Xianping, T., Jian, L., “Towards a component framework for architecture-based self-adaptive applications”, Wuhan University Journal of Natural Sciences, 11(5), pp.1227-1232, 2006.
[28] Hamlet, D.., “Test-Based Specifications of Components and Systems”, Seventh International Conference on Quality Software, QSIC`07, Seventh, pp. 388-395, IEEE, 2007.
[29] Okewu, E., Daramola, O., “Component-based software engineering approach to development of a university e-administration system”, 6th International Conference on Adaptive Science & Technology (ICAST), pp. 1-8., IEEE, 2014.
[30] Mguni, K., Ayalew, Y., “Improving maintainability of cots based system using aspect oriented programming: An empirical evaluation”, African Conference on Software Engineering and Applied Computing (ACSEAC), pp. 21-28, IEEE, 2012.
[31] Patikirikorala, T., Colman, A., Han, J.., “Can control-component libraries reduce the costs of developing control engineering-based self-adaptive systems”, 20th Asia-Pacific on Software Engineering Conference (APSEC), 2013 Vol. 1, pp. 42-49, IEEE, 2013.
[32] Vouillon, J., Cosmo, R. D., “On software component co-installability”, ACM Transactions on Software Engineering and Methodology (TOSEM), Vol. 22(4), pp. 34, 2013.
[33] Kumar, A., “A Design Based New Reusable Software Process Model for Component Based Development Environment”, Procedia Computer Science, Vol. 85, pp. 922-928, 2016.
[34] Chang, H., Mariani, L., Pezze, M., “Exception handlers for healing component-based systems”, ACM Transactions on Software Engineering and Methodology (TOSEM), Vol. 22(4), pp. 30, 2013.
[35] Kaur, R., Arora, S., Jha, P. C., Madan, S., “Fuzzy Multi-criteria Approach for Component Selection of Fault Tolerant Software System under Consensus Recovery Block Scheme”, Procedia Computer Science, 45, pp.842-851, 2015.
[36] Talukder, S. C., Rahman, M. M., “Customer requirements oriented component based software development life cycle model”, International Conference on Computers, Communications, and Systems (ICCCS), pp. 61-68, IEEE, 2015.
[37] Saadatmand, M., Leveque, T., “Modeling security aspects in distributed real-time component-based embedded systems”, Ninth International Conference on New Generations (ITNG), pp. 437-444, IEEE, 2012.
[38] Tomar, P., Gill, N. S., “Verification & Validation of Components with New X Component-Based Model”, 2nd International Conference on Software Technology and Engineering (ICSTE), Vol. 2, pp. V2-365, IEEE, 2010.
[39] Wang, D., Huang, N., “Reliability analysis of component-based software based on rewrite logic”, 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS`08, pp. 126-132, IEEE, 2008.
[40] Cho, E. S., Kim, M. S., Kim, S. D., “Component metrics to measure component quality”, Eighth Asia-Pacific Software Engineering Conference, APSEC 2001, pp. 419-426, IEEE, 2001.
[41] Pendharkar, P. C.., “An exploratory study of object-oriented software component size determinants and the application of regression tree forecasting models”, Information & management, Vol. 42(1), pp.61-73, 2004.
[42] Tang, J. F., Mu, L. F., Kwong, C. K., Luo, X. G., “An optimization model for software component selection under multiple applications development”, European Journal of Operational Research, 212(2), pp.301-311, 2011.
[43] Kumar, A., “A Design Based New Reusable Software Process Model for Component Based Development Environment”, Procedia Computer Science, 85, pp. 922-928, 2016.
[44] Bertoa, M. F., Troya, J. M., Vallecillo, A., “Measuring the usability of software components”, Journal of Systems and Software, Vol. 79(3), pp.427-439, 2006.
[45] Wijayasiriwardhane, T., Lai, R., “Component Point: A system-level size measure for component-based software systems”, Journal of Systems and Software, Vol. 83(12), pp.2456-2470, 2010.
[46] McArthur, K., Saiedian, H., Zand, M., “An evaluation of the impact of component-based architectures on software reusability”, Information and Software Technology, Vol. 44(6), pp.351-359, 2002.
[47] Becker, C., Rauber, A., “Improving component selection and monitoring with controlled experimentation and automated measurements”, Information and Software Technology, 52(6), pp.641-655, 2010.
[48] SáNchez, P., Alonso, D., Morales, J. M., Navarro, P. J.., “From Teleo-Reactive specifications to architectural components A model-driven approach”, Journal of Systems and Software, Vol. 85(11), pp.2504-2518, 2012.
[49] Hjertström, A., Nyström, D., Sjödin, M., “Data management for component-based embedded real-time systems: the database proxy approach”, Journal of Systems and Software, Vol. 85(4), pp.821-834, 2012.
[50] Bertoa, M. F., Vallecillo, A.,“Usability measures for software components”, IEEE Latin America Transactions, Vol. 4(2), pp.136-143, 2006.
Citation
Reena, Pradeep kumar Bhatia, "Empirical Studies on COTS Methodology," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.548-559, 2018.
A Rule based Fuzzy controlled Decision Support System for Intelligent Traffic Control System
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.560-564, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.560564
Abstract
Congestion of roads particularly at different junction points due to vehicular traffic has become a chronic problem all around. Right now in India, a static timer is used to control the timing of the traffic light which results in a lot of problems. This paper introduces a fuzzy logic (FL) based decision support system (DSS) for intelligent traffic control system. The primary focus of the paper is on the algorithm used to reduce the time spent extra on the traffic light junction so as to save the fuel, time and to reduce the possibility of accidents occurring at the traffic light junction. The proposed system uses three input parameters; namely maximum length of vehicles behind traffic light, left green time, and no. of vehicles reaching the traffic light in a short period of time and one output, extension time which is used to control the congestion at the traffic light junction. Through decision support system, the meaning of transferred data is translated into linguistic variables that can be understood by non-experts. Mamdani inference engine is used to deduce from the input parameters.
Key-Words / Index Term
Fuzzy Logic, Fuzzy Inference Systems (FIS), Decision support system, Traffic control system
References
[1] F. V. Webster, “Traffic signal settings,” Road Research Technical. London, U.K., 1958, Paper No. 39, Road Res. Lab.
[2] R. Akcelik,“Time-dependent expressions for delay, stop rate and queue length at traffic signals,” Australia, 1980, Australian Road Res. Board.
[3] R. Akcelik, “Traffic signals: Capacity and timing analysis,” Australia, 1981, Australian Road Res. Board.
[4] D. I. Robertson and R. D. Bretherton, “Optimizing networks of traffic signals in real-time: The SCOOT method,” IEEE Trans. Veh. Technol., vol. 40, no. 1, pp. 11–15, 1991.
[5] P. R. Lowrie, “The Sydney coordinated adaptive traffic system- principles, methodology, algorithms,” in Proc. Int. Conf. Road Traffic Signalling, London, UK, 1982, pp. 67–70, Inst. Elect. Eng..
[6] Prince Singha, Aditya, Kunal Dubey, Jagadeeswararao Palli, “Toolkit for Web Development Based on Web Based Information System,” Isroset-Journal (IJSRCSE), 6, no. 5, pp. 1-5. 2018.
[7] Shubham, Deepak Chahal, Latika Kharb, “Security for Digital Payments: An Update,” Journal (IJSRNSC), 6, no. 5, pp. 51-54. 2018.
[8] C. P. Pappis and E. H. Mamdani, “A fuzzy logic controller for a traffic junction,” IEEE Trans. Syst., Man, Cybern., vol. SMC-7, pp. 707–717, 1977.
[9] J. Horn, N. Nafpliotis, and D. E. Goldberg, “A niched pareto genetic algorithm for multi-objective optimization,” in Proc. First IEEE Conf. Evolutionary Computation, IEEE World Congr. Computational Intelligence, 1994, vol. 1, pp. 82–87.
Citation
Monika Varshney, Azad Kumar Srivastava, Alok Aggarwal, "A Rule based Fuzzy controlled Decision Support System for Intelligent Traffic Control System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.560-564, 2018.
A Comparative Case Study of Business Process Model with Petri Nets and Process Activity Diagram
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.565-570, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.565570
Abstract
Business with information technology has bought a revolutionary change in the digital world in terms of the huge amount of data available for processing. Mining techniques are playing a key role in enterprises as it is being used to search vast amounts of data for vital insight and knowledge. The sheer amount of data is posing challenges in terms of representation, analysis etc., which has given emphasis to pictorial representation of the same which for easy visualization and understanding. The mining tools are automated software tools used to achieve business intelligence by finding hidden relations, and predicting future events from vast amounts of data. This uncovered knowledge helps in gaining completive advantages, better customer relationships, etc. To process the data the techniques of process mining is used to discover and analyse the process. Process activity diagrams are often used to model business processes. One of the important modelling artefacts used is the activity diagrams which are further used to model the sequence of actions as part of the process flow. Process mining techniques use Petri nets which are best investigated process modelling language allowing for the modelling of concurrency. This paper emphasizes the comparison of the given process activity model to corresponding petri nets for analysis and verification. The process activity diagram and petri nets are used to demonstrate the applicability of process mining techniques.
Key-Words / Index Term
Business Processes, Process Mining, Process Activity Diagram, Petri Nets
References
[1]. Van der Aalst, W.M.P. “Business Process Management: A Comprehensive Survey”, ISRN Software Engineering, pp 1–37 (2013).
[2]. W. M. P. van der Aalst, “Process Mining - Data Science in Action”, Second Edition. Springer 2016, ISBN 978-3-662-49850-7, (2016), pp. 3-452.
[3]. W.M.P. van der Aalst, “The Application of Petri Nets to Workflow Management”, The Journal of Circuits, Systems and Computers, 8(1):21–66, 1998.
[4]. K. Salimifard and M. Wright, “Petri net-based modelling of workflow systems: An overview”, Eur. J. Oper. Res., vol. 134, pp. 664-676, (2001).
[5]. W. M. P. van der Aalst, “Formalization and verification of event driven process chains”, Information and Software Technology 41(10)639–650, (1999).
[6]. Mendling, J, “Metrics for Process Models”, Springer, Berlin Heidelberg, 2008.
[7]. Boleslaw Mikolajczak, Jian-Lun Chen, “Workflow Mining Alpha Algorithm –AComplexity Study”, Intelligent Information Processing and Web Mining dvances in Soft Computing, 451, 2005.
[8]. Arik Senderovich, Sander J.J. Leemans, Shahar Harel, Avigdor Gal, Avishai Mandelbaum, Wil M.P. van der Aalst, “Discovering Queues from Event Logs with Varying Levels of Information”, In Business Process Intelligence 2015, Innsbruck, Austria.
[9]. R. Eshuis and R. Wieringa, “A real-time execution semantics for UML activity diagrams”, In H. Hussmann, editor, Proc. Fundamental Approaches to Software Engineering (FASE 2001), LNCS 2029. Springer, 2001.
[10] A. Rozinat and W.M.P. van der Aalst, “Conformance Checking of Processes Based on Monitoring Real Behavior”, Information Systems, 33(1):64–95, (2008).
[11] W.M.P., van der Aalst, M., Song, “Mining Social Networks Uncovering interaction patterns in business processes”, In: Desel, J., Pernici, B., Weske, M. (eds.) BPM 2004. LNCS, vol. 3080, pp. 244–260. Springer, Heidelberg (2004).
[12] A. Teilans, A. Kleins, Y. Merkuryev, and A. Grinbergs, “Design of UML models and their simulation using Arena,” WSEAS Transactions on Computer Research, vol.3, no.1, pp.67–73, 2008.
Citation
Aruna Devi .T, Kumudavalli M.V, Sudhamani, "A Comparative Case Study of Business Process Model with Petri Nets and Process Activity Diagram," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.565-570, 2018.
Performance analysis of SPIHT codec on medical images using DWT and IWT
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.571-578, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.571578
Abstract
Image compression in medical image processing is a most significant technique which reduces the burden of storage and transmission time over the network with less degradation in the visual quality and without information loss. Image compression techniques are used to reduce the volume of data for effective storage and transmission. They are classified into lossy compression and lossless compression. In this work, Magnetic Resonance Imaging (MRI) of brain and Computer Tomography (CT) of lung images are used for analyzing compression. The images are compressed using Discrete Wavelet Transform (DWT)-Set Partitioning In Hierarchical Trees (SPIHT) and Integer Wavelet Transform (IWT)-SPIHT with three wavelets such as Haar, Sym4 and Coif1. DWT is used for lossy compression and IWT is used for lossless compression of images. The performance metrics such as Peak signal-to-noise ratio (PSNR), Bit Per Pixel (BPP) and Mean square error (MSE) are measured for lung and brain images. The comparative analyses for SPIHT with DWT and IWT are calculated based on the performance of wavelet. The dataset has been collected from various scan centers.
Key-Words / Index Term
Compression, SPIHT, DWT, IWT, BPP, PSNR, MSE
References
[1] T.N. Baraskar and V.R. Mankar, “A Survey and Analytical Approach on Image Compression for DICOM Images”, International Journal of Computer Sciences and Engineering, Volume-6, Issue-1, pp. 351-356, 2018.
[2] Reem A. Alotaibi and Lamiaa A. Elrefaei, “Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT)”, Applied Computing and Informatics, pp. 1-12, 2018.
[3] Bhagya Raju V, K. Jaya Sankar and C. D. Naidu, “Multispectral Image Compression with Discrete Wavelet Transformed Improved SPIHT using various Wavelets”, International Journal of Computer Sciences and Engineering, Vol.-6, Issue-6, pp. 100-106, June 2018.
[4] Punam Mahesh Ingale, “The Importance of Digital Image Processing and its applications”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol.06 , Special Issue.01 , pp.31-32, Jan-2018.
[5] S. Vimala1, P. Uma2 and S. Senbagam, “Adaptive Vector Quantization for Improved Coding Efficiency”, International Journal of Scientific Research in Network Security and Communication, Volume-6, Issue-3, pp. 18-22, June 2018.
[6] SD. Kasute and M. Kolhekar, “ROI Based Medical Image Compression”,International Journal of Scientific Research in Network Security and Communication, Volume-5, Issue-1,pp. 6-11, April- 2017.
[7] Panjavarnam.B and P.T.V.Bhuvaneswari, “Performance Analysis of SPIHT Algorithm for Biomedical Image Transmission”, IEEE, 978-1-5090-4740-6, 2017.
[8] Rania Boujelbene, Yousra Ben Jemaa and Mourad Zribi, “An efficient codec for image compression based on spline wavelet transform and improved SPIHT algorithm”, IEEE, 978-1-5386-3250-5, pp. 819-825 2017.
[9] Prerna Gupta and Girish Parmar, “A Comparative Study of DWT, DWT-SVD and IWT-SVD”, International Journal of Electronics, Electrical and Computational System IJEECS ISSN 2348-117X, Volume 6, Issue 7,pp. 410-415, July 2017.
[10] R.Punidha and M.Sivaram, “Integer Wavelet Transform Based Approach For High Robustness Of Audio Signal Transmission”, International Journal of Pure and Applied Mathematics, Volume 116 No. 23,pp. 295-304, 2017.
[11] Prerna Gupta and Girish Parmar ,“Hybrid Image Watermarking Using Iwt-Svd”, International Journal of Engineering Technology, Management and Applied Sciences, Volume 5 Issue 3, ISSN 2349-4476, pp. 129-133, March 2017.
[12] Revathi M and R.Shenbagavalli , “ A Recent Survey of Lossless Image Compression Techniques”, International Journal of Science, Engineering and Management (IJSEM) Vol 2, Issue 12, pp. 68-71,December 2017.
[13] Faiz Ahmed and Prabhash Chandra Pathak, “Medical Image Compression by using IWT & Linear Predictive Coding”, GADL Journal of Inventions in Computer Science and Communication Technology (JICSCT) ISSN(O): 2455-5738 Volume 2 – Issue 2,pp. 1-6, April - 2016.
[14] PA. Divya and S. Ganesan, “Efficient Lossless Image Compression Based on CWT”, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064, Volume 3 Issue 5, pp. 180-184, May 2014.
[15] Mr. T. G. Shirsat and Dr.V.K.Bairagi, “Lossless medical image compression by IWT and predictive coding”, IEEE, 978-1-4673-6150-7, 2013.
[16] Thumma.Ramadevi and Ms.s. Vaishali, “Design and Implementation of SPIHT Algorithm for DWT (Image Compression)”, IOSR Journal of VLSI and Signal Processing (IOSR-JVSP), Volume 3, Issue 5,pp. 18-22, Nov – Dec 2013.
[17] T.Vijayakumar and S Ramachandran, PhD, “Performance Analysis of DWT-SPIHT Algorithm for Medical Image Compression with Uniform Aspect Ratio”, International Journal of Computer Applications (0975 – 8887) Volume 67– No.13, pp. 33-43, April 2013.
[18] Gopi.P.C, Sharmila.R, Indhumathi.T and Savitha.S, “An Intelligent New Age Method of Image Compression and Enhancement with Denoising for Bio-Medical Application”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol.1, Issue-4,pp. 12-16, Aug-2013.
[19] Libao Zhang, and Xianchuan Yu, “Embedded Hybrid Coding for Lossy to Lossless Image Compression using Integer Wavelet Transform”, IEEE TRANSACTIONS ON IMAGE PROCESSING, pp. 664-668, November 2005.
[20] Marco Grangetto, Enrico Magli, Maurizio Martina, and Gabriella Olmo, “Optimization and Implementation of the Integer Wavelet Transform for Image Coding”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 11, NO. 6, pp. 596-604, JUNE 2002.
Citation
Revathi M., R. Shenbagavalli, "Performance analysis of SPIHT codec on medical images using DWT and IWT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.571-578, 2018.
Robust Analysis of Multimodal Biometric Verification System Under Various Spatial Noise Conditions
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.579-590, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.579590
Abstract
Instinctive person verification system still faces various challenges in desirable performance due to dependent and independent noise. Most of the physiological biometric modalities are 2-D images, which may have high probability to get affected from noise. This work proposes a comprehensive analysis of robustness of various unimodal and multimodal biometric systems in clean and noisy conditions. On each stage of biometric system we emphasize, feature extraction, level of fusion and suitable normalization schemes. For feature extraction, methods we have employed subspace, kernel and texture based methods and we have subjected the data on all four levels of fusion schemes- sensor, feature, match score and decision level. The objective of this paper is to analyze the robustness of unimodal systems with distinct modalities and evaluate the robustness of a multimodal system with combinations of two, three and four modalities at different levels. All the experiments were evaluated for both clean and noisy data with virtually generated noises of Gaussian and Salt & Pepper methods, and were applied on all biometrics modalities considered for experimentation. The synthetic multimodal database was prepared from standard database of Face, Palmprint, Finger knuckleprint and Handvein. The obtained results and observations in terms of GAR (Genuine Acceptance Rate) show that palmprint with LPQ features are most effective in unimodal systems. In case of multimodal systems, combination of Face (KICA) and Palmprint (LPQ) are most beneficial. This work also suggests some important guidelines on selection of suitable biometric modality, feature extraction algorithms and fusion scheme.
Key-Words / Index Term
Robustness, Noise, Subspace, Multimodal, Biometric
References
[1] M. Imran, S. Noushath, A. Abdesselam, K. Jetly and Karthikeyan, "Efficient multi-algorithmic approaches for face recognition using subspace methods," 2013 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Sharjah, 2013, pp. 1-6.
[2] Gomai, A. El-Zaart and H. Mathkour, ‘‘A new approach for pupil detection in iris recognition system,’’ in Proc. 2nd Int. Conf. Comput. Eng. Technol. (ICCET), Apr. 2010, pp. V4-415–V4-419.
[3] X. Wu and Q. Zhao, ‘‘Deformed palmprint matching based on stable regions,’’ IEEE Trans. Image Process., vol. 24, no. 12, pp. 4978–4989, Dec. 2015.
[4] Imran M., Rao A., Noushath S., Hemantha Kumar G. (2014) Some Issues on Choices of Modalities for Multimodal Biometric Systems. In: Babu B. et al. (eds) Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012. Advances in Intelligent Systems and Computing, vol 236. Springer, New Delhi.
[5] H. Al-Ghaib and R. Adhami, "On the digital image additive white Gaussian noise estimation," 2014 International Conference on Industrial Automation, Information and Communications Technology, Bali, 2014, pp. 90-96.
[6] C. Liu, R. Szeliski, S. Bing Kang, C. L. Zitnick and W. T. Freeman, "Automatic Estimation and Removal of Noise from a Single Image," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, no. 2, pp. 299-314, Feb. 2008.
[7] A. De Stefano, P. White, and W. Collis, “Training methods for image noise level estimation on wavelet components,” EURASIP J. Appl. Signal Process., vol. 2004, pp. 2400–2407, Jan. 2004
[8] T. Ojala, M. Pietikäinen, T. Mäenpää, Multiresolution gray-scale and rotation invariant texture classification with local binary patterns, IEEE Trans. Pattern Anal. Mach. Intell. 24 (7) (2002) 971–987
[9] D. Gabor, “Theory of Communication,” Journal of the Institution of Electrical Engineers, Vol. 93(26), 429-441, 1946
[10] S. Pyatykh, J. Hesser and L. Zheng, "Image Noise Level Estimation by Principal Component Analysis," in IEEE Transactions on Image Processing, vol. 22, no. 2, pp. 687-699, Feb. 2013.
[11] P. Kartik, R. V. S. S. Vara Prasad and S. R. Mahadeva Prasanna, "Noise robust multimodal biometric person authentication system using face, speech and signature features," 2008 Annual IEEE India Conference, Kanpur, 2008, pp. 23-27.
[12] José A. Sáez, Julián Luengo, and Francisco Herrera. Evaluating the classifier behavior with noisy data considering performance and robustness. Neurocomput. 176, C (February 2016), 26-35.
[13] Zhu, X. Wu, X. "Class Noise vs. Attribute Noise: A Quantitative Study", Artificial Intelligence Review (2004) 22: 177.
[14] Nettleton, D.F., Orriols-Puig, A. Fornells, "A study of the effect of different types of noise on the precision of supervised learning techniques" A. Artif Intell Rev (2010) 33:275
[15] M. S. Nair, K. Revathy and R. Tatavarti, "An Improved Decision-Based Algorithm for Impulse Noise Removal," 2008 Congress on Image and Signal Processing, Sanya, Hainan, 2008, pp. 426-431.
[16] S.Kother Mohideen, S. Arumuga Perumal, M.Mohamed Sathik, "Image De-noising using Discrete Wavelet transform ", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008.
[17] Ashok Rao, S. Noushath, Subspace methods for face recognition, Computer Science Review, Volume 4, Issue 1, February 2010, Pages 1-17, ISSN 1574-0137
[18] Hiew Moi Sim, Hishammuddin Asmuni, Rohayanti Hassan, Razib M. Othman, Multimodal biometrics: Weighted score level fusion based on non-ideal iris and face images, Expert Systems with Applications, Volume 41, Issue 11, 1 September 2014, Pages 5390-5404, ISSN 0957-4174.
Citation
Supreetha Gowda H D, G Hemantha Kumar, Mohammad Imran, "Robust Analysis of Multimodal Biometric Verification System Under Various Spatial Noise Conditions," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.579-590, 2018.