Optimization of Resource Allocation in Wireless Systems Based on Game Theory
Research Paper | Journal Paper
Vol.4 , Issue.1 , pp.1-13, Jan-2016
Abstract
The power allocation has for long been considered a major problem for communication between many users who share common resources. With the emergence of new paradigms such as ad hoc networks, unregulated frequency bands and cognitive radio, the study of power allocation distributed protocols becomes particularly relevant. In fact in such networks, terminals can freely choose their power allocation strategy without following the rules imposed by a central node. The terminals are considered to be independent actors and it is reasonable to consider that they are rational, that is to say, by regulating their transmission power levels, terminals wish to maximize their communication quality. In this context, it is natural to study the problem of power allocation of each terminal as part of game theory, considering the terminal as each players looking to maximize their own utility function by controlling their power emission. Game theory allows particularly to study the existence and multiplicity of balancing power allocation strategies that terminal has no interest to deviate unilaterally .In a multiple access channel, the signal from a terminal received by the other terminals as interference to their own signals. Each terminal of the transmission quality depends directly of the transmission power level of other terminals.
Key-Words / Index Term
Game Theory, Fairness Optimization, Access Methods, Resource Allocation, Power.
References
[1] Mohanakrishnan M.Azath ,’’Survey on Network and Device Aware QoS Approach for mobile Streaming ‘’,International Journal of Computer Sciences and Engineering,IJCSE ,Volume-3,Issue -1,Page No(76-79),2014.
[2] Apoorva Nayak and Rahul Sharma,’’Performance Evaluation of image transmission over Physical Layer of IEEE 802.16d with Antenna Diversity Scheme ‘’, International Journal of Computer Sciences and Engineering, IJCSE, Volume -2, Issue-12, Page No (132-136), 2014.
[3] Jaeok Park and Mihaela van der Schaar, ‘’ The Theory of Intervention Games for Resource Sharing in Wireless Communications’’, arXiv: 1101.3052v2 [cs.GT], Page No (1-29), 16 Jul 2011.
[4] Luiz A. DaSilva Hanna Bogucka Allen B. MacKenzie,’’ GAME THEORY IN WIRELESS NETWORKS’’, GUEST EDITORIAL, IEEE Communications Magazine, Page No (110-111), August 2011.
[5] Yingda Chen,’’ Interactive Networking: Exploiting Network Coding and Game Theory in multiuser wireless communications ’’, Lehigh University, ISBN 1109166796, 9781109166798, ProQuest, Page No (1-68), 2008.
[6] Dimitris E. Charilas, Athanasios D. Panagopoulos,’’ A survey on game theory applications in wireless networks’’, doi:10.1016/j.comnet.2010.06.020, Comput.Netw, Page No (1-10), (2010).
[7] Ashok M. Kanthe,’’ Power Control through Noncooperative Game Theory on Wireless Sensor Network’’, Faculty of Electrical Engineering and Computing, University of Zagreb, Croatia, Page No (1-5), 2012.
[8] Walid Saad, Zhu Han, Merouane Debbah, Are Hjørungnes , Tamer Basar,’’Coalitional Game Theory for Communication Networks: A Tutorial’’, IEEE Signal Processing Magazine, Special Issue on Game Theory, to appear, Page No(1-28) ,2009.
[9] Mark Felegyhazi, Jean-Pierre Hubaux,’’ Game Theory in Wireless Networks: A Tutorial’’, EPFL Technical report: LCA-REPORT, Page No (1-15), 2006.
[10] Roberta DELPIANO , Vito FRAGNELLI , Federica GARIN , Roberto TADEI , Isabella VARIO,’’ Game Theory and Wireless Communication Networks’’, Game Theory and Wireless Communication Networks, AIRO 2004,Lecce - 7/10 ,Page No(1-10),September 2004.
[11] Bo Liang,’’ POWER CONTROL AND SECURITY GAMES FOR WIRELESS COMMUNICATION NETWORKS’’, Lincoln, Nebraska, Page No (11-62), December 2011.
[12] BADR BENMAMMAR, FRANCINE KRIEF,’’ Game theory applications in wireless networks: A survey’’, Applications of Information Systems in Engineering and Bioscience, ISBN: 978-960-474-381-0,Page No(208-215) ,2013.
[13] Wei Huang,’’ Application of Game Theory in Wireless Communication Networks’’, the faculty of graduate studies,Electrical and Computer Engineering, The University of British Columbia (Vancouver), Page No(1-160),February 2012.
[14] Giacomo Bacci, Marco Luise,’’ Game Theory in Wireless Communications with an Application to Signal Synchronization’’, ADVANCES IN ELECTRONICS AND TELECOMMUNICATIONS, VOL. 1, NO. 1, Page No (86-97), APRIL 2010.
[15]Sara Riahi, Ali El Hore, Jamal El Kafi,” analysis and simulation of ofdm”, IJSR, ISSN Online: 2319-7064, volume 3, Issue 3, Page No (405-409), March 2014. .
[16]Sara Riahi, Ali El Hore, Jamal El Kafi,” Study and Analysis of a Noisy Signal by Viterbi
Decoding’’, IJSR, ISSN Online: 2319-7064, Volume 3 Issue 10, Page No (392-398), October 2014.
[17] Sara Riahi, Ali El Hore, Jamal El Kafi,’’ Performance study of the OFDM modulation for the use in Wireless communication Systems of the 4G ‘’, e-ISSN: 2395-0056, www.irjet.net p-ISSN: 2395-0072, Volume: 02 Issue: 06 | ,Page No(1219-1227),Sep-2015.
[18] Farshad Naghibi,’’ Uplink Resource Scheduling in Dynamic OFDMA Systems’’, Communication Systems,Department of Signals and Systems,CHALMERS UNIVERSITY OF TECHNOLOGY Göteborg, Sweden, Page No(1-64) ,2008.
[19] Chapter 9, ‘’Multiple Access Techniques for Wireless Communications’’,School of information science and Engineering, SDU, Page No(1-79)
[20] Hamed Ahmadi, Yong Huat Chew, Chin Choy Chai,’’ Multicell Multiuser OFDMA Dynamic Resource Allocation Using Ant Colony Optimization’’, Institute for Infocomm Research, Agency for Science, Technology and Research, Singapore,Electrical and Computer Engineering Department, National University of Singapore, Page No(1-5),2011.
[21] Norman Matloff,’’ Channelization of a Communications Medium’’, University of California at Davis 2001-2005, N. Matloff, Page No (1-7), September 27, 2005.
[22] Dr. Dharma P. Agrawal and Dr. Qing-An Zeng,’’ Chapter 7 Multiple Division Techniques’’, Page No (1-33), 2002.
[23] Chapter 8,’’Multiple Access Techniques’’,availble online : http://www.iitg.ernet.in /scifac/qip/public_html/cd_cell/chapters/a_mitra_mobile_communication/chapter8.pdf, Page No (157-167).
[24] James Gross, Jirka Klaue, Holger Karl, Adam Wolisz,’’ Subcarrier allocation for variable bit rate video streams in wireless OFDM systems’’, To appear in Proc. of Vehicular Technology Conference (VTC), Florida, USA, Page No(1-5) ,2003.
[25] Ahmed K. F. Khattab and Khaled M. F. Elsayed, Senior Member, IEEE,’’ Opportunistic Subcarrier Management for Delay Sensitive Traffic in OFDMA-based Wireless Multimedia Networks’’,availible online : http://kelsayed.tripod.com/Research/ist05.pdf, Page No(1-5).
[26] Hermann S.Lichte ,Stefan valentin ,Falk eitzen ,Matthias stege ,Carsten unger ,Holger karl ,’’Integrating multiuser dynamic OFDMA into IEEE 802.11 a and prototyping it on a real –time software –defined radio testbed ‘’,In Proc .3 rd Intl .Conf .on Testbeds and Research Infrastructures for the development of Networks and Communicaties (TridentCom),Page No(1-9),May 2007 .
[27] Er Liu,’’ Multiple Access Methods ‘’, Helsinki University of Technology, S-72.333 Postgraduate Seminar on Radio Communications, Communications Laboratory, Page No (1-32), 16.11.2004.
[28] S.Gayathri M.Tech, R.Sabitha,’’ A Survey on Resource Allocation in OFDMA Wireless Networks’’, International Journal of Computer Applications (0975 – 8887) 3rd National Conference on Future Computing ,Page No(18-22),February 2014.
[29] Ashraf Awad Elkarim, Widaa Ahmed, Ahmed Hamza, Ibrahim Makki,’’ Performance Evaluation of Uplink Multiple Access Techniques in LTE Mobile Communication System’’, Blekinge Institute of Technology, Page No(1-54) ,May 2010.
[30] Zukang Shen, Jeffrey G. Andrews, and Brian L. Evans,’’ Optimal Power Allocation in Multiuser OFDM Systems’’, Wireless Networking and Communications Group Department of Electrical and Computer Engineering The University of Texas at Austin, Austin, Texas 78712,Page No (1-5),2001.
[31] Sabareeshwar Natarajan,’’ CDMA versus TDMA’’, Term Paper: DTEC 6810, Communication Technology, Page No (1-9), 2006.
[32] Cedric Fung Lam,’’ Multi-wavelength Optical Code-Division-Multiple-Access Communication Systems, UNIVERSITY OF CALIFORNIA Los Angeles, Page No (1-130), 1999.
[33] Dharmendra Verma, Gaurav Sharma,’’ Power Allocation in OFDM-Based Cognitive Radio Systems’’, International Journal of Science and Research (IJSR), ISSN (Online): 2319-7064, Volume 3 Issue 12, Page No (755-760), December 2014.
[34] Pai-Han Huang, Yi Gai and Bhaskar Krishnamachari, Ashwin Sridharan,’’ Subcarrier Allocation in Multiuser OFDM Systems: Complexity and Approximability’’, IEEE Communications Society subject matter experts for publication in the WCNC, Page No (1-6), 2010.
[35] Wong Ngee Hui,’’ Comparison between CDMA and TDMA Air Interface for Cellular Systems’’, School of Electrical & Electronic Engineering ,Nanyang Technological University,Nanyang Avenue, Singapore 639798,Page No(1-5),2003.
[36] Swathy Surendran, Sreetha E.S and M.Azath,’’Study on Resource Allocation in Cloud’’, ‘’, International Journal of Computer Sciences and Engineering, IJCSE, Volume-2, Issue -12, Page No (121-124), 2014.
Citation
Sara Riahi, Ali El Hore, Jamal El Kafi, "Optimization of Resource Allocation in Wireless Systems Based on Game Theory," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.1-13, 2016.
A Novel Low Power Fault Tolerant Full Adder for Deep Submicron Technology
Research Paper | Journal Paper
Vol.4 , Issue.1 , pp.14-16, Jan-2016
Abstract
A low power and high speed Full adder circuit design using a new CMOS domino logic family is presented in this paper. Compared to static CMOS logic circuits, dynamic logic circuits are important as it provides better speed and has less transistor requirement. The proposed circuit has very low dynamic power consumption and less delay compared to the recently proposed circuit techniques for the dynamic logic styles. Moreover, it will be shown that the proposed circuit is extremely fault tolerant. The monte carlo simulation is performed to emphasis the fault tolerance of proposed full adder. The proposed full adder is simulated using standard 0.18 um CMOS technology.
Key-Words / Index Term
Trans-Impedance Amplifier, Resistive-Capacitive Feedback, Inductor Less, Low Noise, Low Power
References
[1] J.M. Rabaey, A. Chandrakasan and B. Nikolic, (2002) Digital Integrated Circuits: A Design perspective 2e NJ:Prentice-Hall, Upper saddle River,.
[2] S. Mathew, M. Anders, R. Krishnamurthy and S. Borkar, "A 4 GHz 130nm address generation unit with 32-bit sparse-tree adder core", IEEE J. Solid State Circuits Vol.38 (5) 2003, 689-695.
[3] R.K. Krishnamurthy, S. Hsu, M. Anders, B. Bloechel, B. Chatterjee, M. Sachdev and S. Borkar, "Dual Supply voltage clocking for 5GHz 130nm integer execution core", proceedings of IEEE VLSI Circuits Symposium, Honolulu Jun. 2002, 128-129.
[4] S. vangal, Y. Hoskote, D. Somasekhar, V. Erraguntla, J. Howard, G. Ruhl, V. Veeramachaneni, D. Finan, S. Mathew, and N. Borkar, "A 5-GHz floating point multiply accumulator in 90-nm dual VT CMOS", in Proc. IEEE Int. Solid-State Circuits Conf., San Francisco, CA, Feb.2003, 334–335.
[5] V. Navarro-Botello, J. A. Montiel-Nelson, and S. Nooshabadi, "Analysis of high performance fast feedthrough logic families in CMOS", IEEE Trans. Cir. & syst. II, vol. 54, no. 6, Jun. 2007, 489- 493.
[6] N. Srinivasa Gupta, M. Satyanarayana, “A Novel Domino Logic for Arithmetic Circuits” International Journal of Innovative Technology and Exploring Engineering, Volume-3, Issue-3, August 2013.
[7] Jehangir Rashid Dar, Sajad Ahmad Ganiee, “Novel Low-Power, Energy-Efficient Full Adder for Ultra Deep-Submicron Technology” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, Issue 3, March 2014.
[8] Chip-Hong Chang; Jiangmin Gu; Mingyan Zhang; , "A review of 0.18µm adder performance for tree structured arithmetic circuits” Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol.13no.6, pp. 686- 695, June 2005.
[10] Goel, S.; Kumar, A.; Bayoumi, M. A.; , "Design of Robust, Energy-Efficient Full Adders for Deep-Sub micrometer Design Using HybridCMOS Logic Style," Very Large Scale Integration (VLSI) Systems, IEEE Transactions
Citation
Zahra Kahrari, Gholamreza Karimi, "A Novel Low Power Fault Tolerant Full Adder for Deep Submicron Technology," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.14-16, 2016.
Survey on Securing data using Homomorphic Encryption in Cloud Computing.
Survey Paper | Journal Paper
Vol.4 , Issue.1 , pp.17-21, Jan-2016
Abstract
Cloud computing is technique which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s Internet world, it is most interesting and enticing technology which is offering the services to various users on demand over network from different location and using range of devices. Since Cloud Computing stores the data and propagate resources in the open environment, security has become the main obstacle which is hampering the deployment of Cloud environments. So To ensure the security of data, we proposed a method which uses Multilayer Security for securing Data using Homomorphic Encryption in Cloud Computing. Homomorphic encryption is a form of encryption that perform computations on ciphertext thus generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. This System helps to secure Data for various cloud users.
Key-Words / Index Term
Cloud Computing, Privacy Preservation, Homomorphic Encryption
References
[1] Craig Gentry,“A FULLY HOMOMORPHIC ENCRYPTION SCHEME ,” September 2009.
[2] Craig Gentry, Shai Halevi, “ Implementing Gentry’s Fully-Homomorphic Encryption Scheme,” IBM Research, February 4, 2011.
[3] Craig Gentry, “Computing Arbitrary Functions of Encrypted Data,” IBM T.J. Watson Research Center, ACM 2008.
[4] Ayantika Chatterjee, Indranil Sengupta, “Translating Algorithms to handle Fully Homomorphic Encrypted Data on the Cloud,” IEEE Transactions on Cloud Computing, 2015.
[5] Nitesh Aggarwal, Dr CP Gupta, “Fully Homomorphic Symmetric Scheme Without Bootstrapping,” International Conference on Cloud Computing and Internet of Things, 2014.
[6] Murat Kantarcioglu, Wei Jiang, “A Cryptographic Approach to Securely Share and Query Genomic Sequences,” IEEE Transactions,VOL. 12, NO. 5, Sep 2008.
[7] David W. Archer, Kurt Rohloff, ”Computing with Data Privacy:Steps toward Realization,” IEEE Computer and Reliability Societies jan/feb 2015.
[8] FENG Chao, XIN Yang, “Fast key generation for Gentry-style homomorphic encryption,” ScienceDirect, December 2014.
[9] Monique Ogburn, Claude Turner, “Homomorphic Encryption,” ScienceDirect, 2013.
[10] Mohamed Nabeel, Elisa Bertino, “Privacy Preserving Delegated Access Control in Public Clouds,” IEEE Transactions, Volume: 26, april 2013.
[11] Mohamed Nabeel, Ning Shang, “Privacy Preserving Policy-Based Content Sharing in Public Clouds,” IEEE Transactions, Volume. 25, NO. 11, November 2013.
[12] Jiadi Yu, Peng Lu, “Toward Secure Multikeyword Top-kk Retrieval over Encrypted Cloud Data,” IEEE Transactions, Volume. 10, NO. 4, July/August 2013.
[13] Zahir Tari, Xun Yi, Uthpala S. Premarathne, “Security and Privacy in Cloud Computing: Vision, Trends, and Challenges,” IEEE Cloud Computing, 2015.
[14] Payal V. Parmar, Shraddha B. Padhar, “Survey of Various Homomorphic Encryption algorithms and Schemes,” International Journal of Computer Applications,Volume 91. No.8, April 2014.
[15] Bharath K. Samanthula, Yousef Elmehdwi, “A secure data sharing and query processing framework via federation of cloud computing,” Information Systems, ScienceDirect, 2013.
[16] Shashank Bajpai, Padmija Srivastava, “A Fully Homomorphic Encryption Implementation on Cloud Computing,” IJICT, Volume 4, No.8, 2014.
[17] Jian Li, Danjie Song, Sicong Chen, “A simple fully Homomorphic encryption scheme available in cloud computing,” IEEE 2nd International Conference Volume:01, Oct 2012.
[18] https://mdn.mozillademos.org/files/10303/05scrypt2.png
[19] https://blog.malwarebytes.org/wpontent/uploads/2013/10/assemcrypto.gif
Citation
Suraj S. Gaikwad, Amar R. Buchade, "Survey on Securing data using Homomorphic Encryption in Cloud Computing.," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.17-21, 2016.
Inference of Gene Regulatory Network using Fuzzy Logic – A Review
Review Paper | Journal Paper
Vol.4 , Issue.1 , pp.22-29, Jan-2016
Abstract
Cellular processes like metabolism, responses to the actions or surroundings and reproduction of cells are controlled by proteins. Genes are responsible for the synthesis of a protein. Some genes synthesize proteins which control the rate at which other genes synthesize protein and form the network of interactions between the genes named as Gene Regulatory Networks (GRNs). GRNs are the control systems which represents the causal relationships between genes, protein-protein interactions, etc. They provide a very useful contribution to cellular biology, mechanics of various harmful diseases like cancer, help in drug discovery and impact of those drugs on the individuals. Large amount of microarray gene expression datasets are available that can be used to analyse the relationships between the genes. These datasets are imprecise and uncertain because of the noisy and missing values in gene expression datasets. Fuzzy logic based models are capable of handling uncertainty of data which provide the valuable contribution in the inference of GRNs. To address this most challenging area of cellular biology, this paper reviews various fuzzy logic based techniques to infer GRNs from microarray gene expression datasets. The main objective of this review paper is to present, analyse and compare contributions given by researchers in this field.
Key-Words / Index Term
Fuzzy Logic, Genetic Regulatory Networks, Microarray gene expression data, Clustering, GRN Inference
References
[1] T. Al-Quzlan, A. Hamdi-Cherif, and C. Kara-Mohamed, “Big data fuzzy management methods in gene regulatory networks inference: a review”, in Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, ACM, ISBN: 978-1-4503-2767-1, Page No (201-203), Sept 2014.
[2] S. Vineetha, C. Bhat, and S.M. Idicula, “Gene regulatory network from microarray data using dynamic neural fuzzy approach” in Proceedings of the International Symposium on Biocomputing, ACM, ISBN: 978-1-60558-722-6, Article No (17), Feb 2010.
[3] S. Mandai, G. Saha, and R.K. Pal "Neural network based gene regulatory network reconstruction." Computer, Communication, Control and Information Technology (C3IT), 2015 Third International Conference, IEEE, Page No. (1-5), Feb 2015.
[4] J.F. Al-Shobaili, and A. Hamdi-Cherif. "Gene regulatory networks estimation using uniting Bayesian subnetworks" Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystem, ACM, Page No(95-100) 2014.
[5] G.A. Ruz, T. Timmermann, and E. Goles, “Reconstruction of a GRN model of salt stress response in arabidopsis using genetic algorithms” in Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), 2015 IEEE Conference, Page No (1-8), Aug 2015.
[6] R. Duenas Jimenez, D. Correa Martins, and C. Silva Santos, “Gene networks inference through one genetic algorithm per gene” in Bioinformatics and Bioengineering (BIBE), 2014 IEEE International Conference, Page No. (1-8), Nov 2014.
[7] Y. Xiao, “A tutorial on analysis and simulation of boolean gene regulatory network models”. Current genomics, Volume-10, Issue-7, Page No (511-525), Nov 2009.
[8] R. Albert, “Boolean modelling of genetic regulatory networks”, in Complex networks, Springer Berlin Heidelberg, Page No. (459-481), Jan 2004.
[9] D.C. Nguyen, and F. Azadivar, “Application of Computer Simulation and Genetic Algorithms to Gene Interactive Rules for Early Detection and Prevention of Cancer” Systems Journal, IEEE, Volume-8, Issue-3, Page No (1005-1013), 2014.
[10] S. Marshall, and L. Yu, “A method for analysing gene expression data temporal sequence using Probabilistic Boolean Networks” in Signal Processing Conference, 2006 14th European, IEEE, Page No (1-5), Sept 2006.
[11] I. Shmulevich, E.R. Dougherty, S. Kim and W. Zhang, “Probabilistic Boolean networks: a rule-based uncertainty model for gene regulatory networks” Bioinformatics, Volume-18, Issue-2, Page No (261-274), 2002.
[12] I. Shmulevich, E.R. Dougherty, and W. Zhang, “From Boolean to probabilistic Boolean networks as models of genetic regulatory networks” Proceedings of the IEEE, Volume-90, Issue-11, Page No (1778-1792), 2002.
[13] H. Kim, and E. Gelenbe, “Reconstruction of large-scale gene regulatory networks using bayesian model averaging”, in Bioinformatics and Biomedicine (BIBM), 2011 IEEE International Conference, Page No (202-207), Nov 2011.
[14] G.F. Cooper, and E. Herskovits, “A Bayesian method for the induction of probabilistic networks from data”, Machine learning, Volume-9, Issue-4, Page No (309-347), 1992.
[15] Y. Watanabe, S. Seno, Y. Takenaka, and H. Matsuda, “An estimation method for inference of gene regulatory network using Bayesian network with uniting of partial problems”, BMC genomics, Volume-13, Suppl-1, p.S12, Jan 2012.
[16] K.P. Murphy, “Dynamic bayesian networks: representation, inference and learning “, Doctoral dissertation, University of California, Berkeley, 2002.
[17] A. Shermin, and M. Orgun, “A 2-stage approach for inferring gene regulatory networks using dynamic bayesian networks” in Bioinformatics and Biomedicine, 2009 BIBM'09, IEEE International Conference, Page No (166-169), Nov 2009.
[18] M. Zou, and S.D. Conzen, “A new dynamic Bayesian network (DBN) approach for identifying gene regulatory networks from time course microarray data” Bioinformatics, Volume-21, Issue-1, Page No (71-79), 2005.
[19] E. Keedwell, and A. Narayanan, “Discovering gene networks with a neural-genetic hybrid”, Computational Biology and Bioinformatics, IEEE/ACM Transactions, Volume-2, Issue-3, Page No (231-242), 2005.
[20] L. Liu, M. Liu, and M. Ma, “Construction of linear dynamic gene regulatory network based on feedforward neural network”, in Natural Computation (ICNC), 2014 10th International Conference, IEEE, Page No (99-107), Aug 2014.
[21] H.W. Ressom, Y. Zhang, J. Xuan, Y. Wang, and R. Clarke, “Inference of gene regulatory networks from time course gene expression data using neural networks and swarm intelligence”, in Computational Intelligence and Bioinformatics and Computational Biology, 2006. CIBCB'06. 2006 IEEE Symposium, Page No (1-8), Sept 2006.
[22] N. Kennedy, A. Mizeranschi, P. Thompson, H. Zheng, and W. Dubitzky, “Reverse engineering of gene regulation models from multi-condition experiments”, in Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), 2013 IEEE Symposium, Page No (112-119), April 2013.
[23] Y. Gao, and D. Wang, “Least squares identification method for differential equations of gene regulatory networks” in Proceedings of the 33rd Chinese Control Conference, July 2014.
[24] E. Sakamoto, and H. Iba, “Inferring a system of differential equations for a gene regulatory network by using genetic programming”, in Evolutionary Computation, Proceedings of the 2001 Congress, Volume-1, Page No (720-726), 2001.
[25] J. Gebert, N. Radde, and G.W. Weber, “Modeling gene regulatory networks with piecewise linear differential equations”, European Journal of Operational Research, Voulme-181, Issue-3, Page No (1148-1165), 2007.
[26] R. Ji, L. Ding, X. Yan, and M. Xin, “Modelling gene regulatory network by fractional order differential equations”, in Bio-Inspired Computing: Theories and Applications (BIC-TA), 2010 IEEE Fifth International Conference, Page No (431-434), Sept 2010.
[27] I. Chebil, R. Nicolle, G. Santini, C. Rouveirol, and M. Elati, “Hybrid method inference for the construction of cooperative regulatory network in human”, Nano Bioscience, IEEE Transactions, Voulme-13, Issue-2, Page No (97-103), 2014.
[28] Y. Lu, Q. Tian, M. Sanchez, and Y. Wang, “Hybrid PCA and LDA analysis of microarray gene expression data”, in Computational Intelligence in Bioinformatics and Computational Biology, CIBCB'05, Proceedings of the 2005 IEEE Symposium, Page No (1-6), Nov 2005.
[29] Y. Li, and A. Ngom, “The max-min high-order dynamic Bayesian network learning for identifying gene regulatory networks from time-series microarray data”, in Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), 2013 IEEE Symposium, Page No (83-90), April 2013.
[30] N. Vijesh, S.K. Chakrabarti, and J. Sreekumar, “Modeling of gene regulatory networks: A review”, Journal of Biomedical Science and Engineering, Volume-6, Issue-02, p.223, 2013.
[31] H. Xu, and S. Wang, “Fuzzy Logical on Boolean Networks as Model of Gene Regulatory Networks”, in 2009 International Joint Conference on Artificial Intelligence, Page No (501-505), April 2009.
[32] M.J. Heller, “DNA microarray technology: devices, systems, and applications”, Annual review of biomedical engineering, Volume-4, Issue-1, Page No (129-153), 2002.
[33] O. ElBakry, M.O. Ahmad, and M.N.S. Swamy, “Inference of gene regulatory networks from time-series microarray data”, in NEWCAS Conference (NEWCAS), 2010 8th IEEE International, Page No (141-144), June 2010.
[34] D. Ramot, M. Friedman, G. Langholz, and A. Kandel, “Complex fuzzy logic” Fuzzy Systems, IEEE Transactions, Volume-11, Issue-4, Page No (450-461), 2003.
[35] F.M. Alakwaa, “Modeling of Gene Regulatory Networks: A Literature Review”, Journal of Computational Systems Biology, Volume-1, Issue-1, p.1, 2014.
[36] J. Kacprzyk, “Studies in Fuzziness and Soft Computing”, Volume- 242, 2009.
[37] P.J. Woolf and Y. Wang, “A fuzzy logic approach to analyzing gene expression data”, Physiological Genomics, Volume-3, 2000.
[38] R. Ram, M. Chetty, and T. Dix, “Fuzzy model for gene regulatory network” in Evolutionary Computation, CEC 2006. IEEE Congress, Page No (1450-1455), July 2006.
[39] H. Ressom, D. Wang, R.S. Varghese, and R. Reynolds, “Fuzzy logic-based gene regulatory network”, in Fuzzy Systems, FUZZ'03, 12th IEEE International Conference, Volume-2, Page No (1210-1215), May 2003.
[40] J. Bordon, M. Moskon, N. Zimic, and M. Mraz, “Fuzzy Logic as a Computational Tool for Quantitative Modelling of Biological Systems with Uncertain Kinetic Data”, IEEE Computational Intelligence Society, Volume-12, Issue-5, Page No (1199-1205), April 2015.
[41] Sehgal, B. Muhammad Shoaib, I. Gondal, and L.S. Dooley, "CF-GeNe: Fuzzy Framework for Robust Gene Regulatory Network Inference", JCP, Voulme-1, Issue-7, Page No (1-8), 2006.
[42] B.A. Sokhansansanj, J.P. Fitch, J.N. Quong, and A.A. Quong, “Exhaustive search for fuzzy gene networks from microarray data” in Engineering in Medicine and Biology Society, Proceedings of the 25th Annual International Conference of the IEEE, Volume-4, Page No (3571-3574), Sept 2003.
Citation
Raviajot Kaur, Abhishek and Shailendra Singh, "Inference of Gene Regulatory Network using Fuzzy Logic – A Review," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.22-29, 2016.
A Study on Anti-Phishing Techniques
Survey Paper | Journal Paper
Vol.4 , Issue.1 , pp.30-36, Jan-2016
Abstract
Some customers avoid online banking as they perceive it as being too vulnerable to fraud. The security measures employed by most banks are never 100% safe; Credit card fraud, signature forgery and identity theft are far more widespread "offline" crimes than malicious hacking. An increasingly popular criminal practice to gain access to a user's finances is phishing, whereby the user is in some way persuaded to hand over their password(s) to the fraudster. To protect users against phishing, various anti-phishing techniques have been proposed that follows different strategies like client side and server side protection. In general anti-phishing techniques are Content Filtering, Black Listing, Symptom-Based Prevention, Domain binding, Character based Anti-Phishing, Content based Anti-Phishing. But they have got some drawbacks such as; Time Delay, Redundancy, Accuracy, Information Retrieval.The Proposed system will check the user’s existence in the database and provide the set of services with respect to the role of the user. The application is based on three-tier architecture. The cipher key will be used to find the fraud application. This approach is called Anti-Phishing. Anti-Phishing is nothing but “preventing the phishing”. This can be done by creating a cipher key (an encrypted code) in the customer’s username, password or in a/c no., which is not recognized in the hacker’s fake website. The objective of the project is to design and develop secure online Banking Application using Anti-phishing concept.
Key-Words / Index Term
Anti-Phishing, Trojan, Black List, Proxy, Spyware, Cipher Key, Spoofguard
References
[1] N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. C. Mitchell, "Client–side defense against web–based identity theft", In Proceedings of 11th Annual Network and Distributed System Security Symposium, 2004.
[2] Popup Window,
“http://www.w3.org/TR/WAI-WEBCONTENT/”, W3C Recommendation 5-May-1999
[3] Ollman, G. (2004), “The Phishing Guide – Understanding and Preventing Phishing Attacks”, IBM Internet Security Systems.
[4] Atkins, B. and Huang, W. (2013), “A Study of Social Engineering in Online Frauds”, Open Journal of Social Sciences, 1, 23-32. doi: 10.4236/jss.2013.13004.
[5] Trojan horse program,
“http://searchsecurity.techtarget.com/definition/Zeus-
Trojan-Zbot”, 2010
[6] DNS Cache Poisoning,
“http://www.ipa.go.jp/security/english/vuln/200809_DNS_en.html”, Sep 18, 2008
[7] M. Aburrous, M.A. Hossain, F. Thabatah and K. Dahal, "Intelligent phishing website detection system using fuzzy techniques", in 3rd International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA), pp. 1-6, 2008.
[8] Y. Pan and X. Ding, “Anomaly Based Web Phishing Page Detection", Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06), Computer Society, 2006.
Citation
V. Raghunatha Reddy, C. V. Madhusudan Reddy, M. Ebenezar, "A Study on Anti-Phishing Techniques," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.30-36, 2016.
Power Quality Issues in Railway Electrification
Survey Paper | Journal Paper
Vol.4 , Issue.1 , pp.37-39, Jan-2016
Abstract
This paper presents a perspective on power quality issues through railway electrification development and the necessity of power quality and system requirements for appropriate power quality. It has been a major problem in railway networks because of their special characteristics. The most important systems affected by railway electrification are upstream power supply networks railroad signaling and communication, and telecommunication systems. The most important problem is, in the case of three-phase systems, the imbalance of current because a railway load is nowadays always a single-phase load which causes a negative-sequence component (NSC) current equal to the positive-sequence component (PSC). In a high-speed train application, the modularized traction converter produces the significant harmonic currents caused from the switching behavior of a power converter. . One way to minimize the interference is to design the secondary windings of a power transformer decoupled magnetically as possible.
Key-Words / Index Term
Power quality, negative-sequence component, Harmonic current, modularized traction Behavior
References
[1] Power Quality Issues in Railway Electrification: A
Comprehensive Perspective Sayed Mohammad Mousavi Gazafrudi, Adel Tabakhpour Langerudy, Ewald F. Fuchs, Fellow, IEEE
[ 2] W. Yingdong, J. Qirong, and Z. Xiujuan, “A novel control strategy for optimization of power capacity based on railway power static conditioner,” in IEEE Appl. Power Electron. Conf. Expo., 2008, pp. 1669–1674
[3] N. Dai, K. Lao, and M. Wong, “A hybrid railway power conditioner for traction power supply system,” in IEEE Appl. Power Electron. Conf. Expo., 2013, pp. 1326–1331.
[4] ANSI C84.1-2006 Dugan, R., McGranaghan, M., Santoso, S., and Beaty, H.W. (2004). Electrical Power Systems Quality (2nd ed.) New York: McGraw-Hill.
[5] IEEE 1159-1995. Recommended Practice For Monitoring Electric Power Quality. National Electrical Manufacturers Association (NEMA) Publication No. MG 1-1998 Motors and Generators C. Broche, J. Lobry, P. Colignon, and A. Labart, “Harmonic reduction in dc link current of a PWM induction motor drive by active filtering,” IEEE Trans. Power Electron. vol. 7, no. 4, pp. 633–643, Oct. 1992.
[6] T. H. Chen and H. Y. Kuo, “Network modelling of traction substation transformers for studying unbalance effects,” IEE Proc.—Gen., Transmiss. Distrib., vol. 142, no. 2, pp. 103–108, Mar. 1995.
[7] K.W. Lao, M. C.Wong, N. Dai, C. K.Wong, and C. S. Lam, “A systematic approach to hybrid railway power conditioner design with harmonic compensation for high-speed railway,” IEEE Trans. Ind. Electron., vol. 62, no. 2, pp. 930–942, Feb. 2015.
[8] Z. Zhiwen,W. Bin, K. Jinsong, and L. Longfu, “A multi-purpose balanced transformer for railway traction applications,” IEEE Trans. Power Del., vol. 24, no. 2, pp. 711–718, Apr. 2009
Citation
Rajshree S Thorat, M. M. Deshpande, "Power Quality Issues in Railway Electrification," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.37-39, 2016.
Grid Computing Approach for Dynamic Load Balancing
Review Paper | Journal Paper
Vol.4 , Issue.1 , pp.40-42, Jan-2016
Abstract
Grid computing technology can be seen as a positive alternative for implementing high-performance distributed computing. The goal of Grid computing is to create the illusion of virtual computer out of a large collection of connected heterogeneous nodes sharing various resources. The Grid system needs competent load balancing algorithms for the distribution of tasks in order to increase performance and efficiency. The process of identifying requirements, matching resources to applications, allocating those resources, and scheduling and monitoring grid resources over time in order to run grid applications efficiently is known as Grid Resource Management. The first phase of resource management is resource discovery. The next step is monitoring and scheduling. Monitoring keeps the details of the resources and scheduling guides the job to appropriate resource. The resources which are heavily loaded act as server of task and the resources which are lightly loaded act as receiver of task. Task relocation takes place from the node which has high load towards the node which has fewer loads. The main aim of load balancing is to provide a distributed, low cost scheme that balances the load across all the processors. In this paper a dynamic load balancing algorithm is proposed in a simulated grid environment which fulfils the objective to achieve high performance computing by optimal usage of geographically distributed and heterogeneous resources in the grid environment.
Key-Words / Index Term
Load; Computing; Grid; Dynamic
References
[1] Goswami S, Das A, “Deadline stringency based job scheduling in computational grid environment”, Computing for Sustainable Global Development (INDIACom), 2nd International Conference, IEEE, ISBN: 978-9-3805-4415-1, Page No(531-536), March 2015,.
[2] Abhishek M. Kinhekar, Prof. Hitesh Gupta, “A Review of Load Balancing in Grid Computing”, International Journal of Advance Research in Computer Science and Management Studies, Vol. 2, Issue 8, Page No (102-108), August 2014.
[3] Goswami S, De Sarkar A, “A Comparative Study of Load Balancing Algorithms in Computational Grid Environment”, Computational Intelligence, Modelling and Simulation (CIMSim), Fifth International Conference, IEEE, Page No(99-104), September 2013.
[4] PawandeepKaur, Harshpreet Singh, “Adaptive dynamic load balancing in grid computing an approach,” International journal of engineering science & advanced technology, Volume-2, Issue-3, Page No(625 – 632, May-Jun 2012.
[5] Prabhat Srivastava, “Improving Performance in Load Balancing Problem on the Grid Computing System”, International Journal of Computer Applications, Volume 16– No.1, Page No(975– 8887), February 2011.
Citation
Kapil B. Morey, Sachin B. Jadhav, "Grid Computing Approach for Dynamic Load Balancing," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.40-42, 2016.
Performance analysis of PFI using FP-Growth algorithm for various data-sets
Research Paper | Journal Paper
Vol.4 , Issue.1 , pp.43-50, Jan-2016
Abstract
The data handled in appearing applications like placement or situation based services, sensor monitoring systems, and data integration, are often not exact in nature. In this article, we study the important problem of extracting frequent item sets[1] from a huge unsure database, illuminated under the Possible World Semantics (PWS)[2].This issue is technically challenging, since an unsure database consist an exponential number of possible worlds. By observing that the mining process can be show as a discrete probability distribution, we develop an FP Growth algorithm [4] which compress a large database into a dense, Frequent-Pattern tree (FP-tree) [4] structure also Develop an efficient, FP-tree-based frequent pattern mining method (FP-growth) and Apriori algorithm for frequent item set mining. We also study the important problem of maintaining the mining result for a database that is developing (e.g. by inserting a tuple). Specifically, we present incremental mining algorithms [13], which enable Probabilistic repeated Item set (PFI) results to be refreshed. This decrease the requirement of re-executing the whole mining algorithm on the new database, which is often more expensive and unnecessary. We observe how an existing algorithm that retrieves exact item sets, as well as our approximate algorithm, can support incremental mining. All our algorithms support both tuple and attribute uncertainty, which are two common uncertain database models. We also perform huge evaluation on real and synthetic data sets to validate our approaches.
Key-Words / Index Term
Frequent Item Sets, Uncertain Data Set, FP Growth Algorithm,Association Rule Mining,Apriori Algorithm
References
[1] Liang Wang, David Wai-Lok Cheung, Reynold Cheng, S Lee, X Yung,“Efficient Mining of Frequent Item Sets onLarge Uncertain Databases”,IEEE Trans Knowledge and Data Eng.,2012 pp.110-115.
[2] A. Veloso, W. Meira Jr., M. de Carvalho,S.Parthasarathy, and M.J. Zaki, “Mining Frequent Itemsets inEvolving Databases”,Proc. Second SIAM Int’l Conf. Data Mining(SDM), 2002 pp.210-215.
[3] C. Aggarwal, Y. Li, J. Wang, and J. Wang, “Frequent PatternMining with Uncertain Data”,Proc. 15th ACM SIGKDD Int’l Conf.Knowledge Discovery and Data Mining (KDD), 2009 pp.160-170.
[4] C. Aggarwal and P. Yu, “A Survey of Uncertain Data Algorithms and Applications”,IEEE Trans Knowledge and Data Eng., vol. 21,no. 5, May 2009,pp. 609-623.
[5] R. Aggrawal, T. Imieli_nski, and A. Swami, “Mining AssociationRules between Sets of Items in Large Databases”,Proc. ACMSIGMOD Int’l Conf. Management of Data, 1993 pp.348-255.
[6] O. Benjelloun, A.D. Sarma, A. Halevy, and J. Widom, “ULDBs:Databases with Uncertainty and Lineage”,Proc. 32nd Int’l Conf.Very Large Data Bases (VLDB), 2006 pp.440-445.
[7] T. Bernecker, H. Kriegel, M. Renz, F. Verhein, and A. Zuefle,“Probabilistic Frequent Itemset Mining in Uncertain Databases”,Proc. 15th ACM SIGKDD Int’l Conf. Knowledge Discovery and DataMining (KDD), 2009 pp.523-530
[8] L.L. Cam, “An Approximation Theorem for the Poisson Binomial Distribution”,Pacific J. Math., vol. 10, ,1990, pp. 1181-1197.
[9] H. Cheng, P. Yu, and J. Han, “Approximate Frequent ItemsetMining in the Presence of Random Noise”,Proc. Soft Computing forKnowledge Discovery and Data Mining, 2008,pp. 363-389.
[10] R. Cheng, D. Kalashnikov, and S. Prabhakar, “EvaluatingProbabilistic Queries over Imprecise Data”,Proc. ACM SIGMODInt’l Conf. Management of Data, 2003 pp.789-792.
[11] D. Cheung, J. Han, V. Ng, and C. Wong, “Maintenance ofDiscovered Association Rules in Large Databases: An IncrementalUpdating Technique”,Proc. 12th Int’l Conf. Data Eng. (ICDE), 1996 pp.890-892.
[12] D. Cheung, S.D. Lee, and B. Kao, “A General IncrementalTechnique for Maintaining Discovered Association Rules”,Proc.Fifth Int’l Conf. Database Systems for Advanced Applications(DASFAA), 1997 pp.267-270.
[13] W. Cheung and O.R. Zaiane, “Incremental Mining of FrequentPatterns with Candidate Generation or Support Constraint”,Proc. Seventh Int’l Database Eng. and Applications Symp. (IDEAS),2003 pp.300-345.
[14] C.K. Chui, B. Kao, and E. Hung, “Mining Frequent Itemsets fromUncertain Data”,Proc. 11th Pacific-Asia Conf. Advances in KnowledgeDiscovery and Data Mining (PAKDD), 2007 pp.867-870.
[15] G. Cormode and M. Garofalakis, “Sketching Probabilistic DataStreams”,Proc. ACM SIGMOD Int’l Conf. Management of Data,2007.
[16] M Adnan, R Alhajj, K Barker - Advances in Artificial Intelligence “Costructing complete FP tree for incremental mining of frequent patterns in dynamic database”, 2006 – Springer
[17] J. Han, M. Kamber, “Data Mining Concepts and Techniques”, 3rd edition, Morgan Kaufmann Publishers, San Francisco, USA, ISBN 9780123814791, 2012,pp. 243-262.
[18] Thomas Bernecker, Hans-Peter Kriegel, Matthias Renz,FlorianVerhein,AndreasZuefle,”Probabilisttc Frequent Itemset Mining in Uncertain Databases”
In Proc.11th Int. Conf. on Knowledge Discovery and Data Mining (KDD'09),Paris, France,pp.300-365,2009.
[19] Leung, C.K.-S., Carmichael, C.L., Hao, B.: Efficient mining of frequent patterns from uncer-tain data. In: Proc. IEEE ICDM Workshops, pp. 489–494 ,2007
[20] C.-K. Chui, B. Kao, E. Hung. Mining Frequent
Itemsets from Uncertain Data.PAKDD.pp.500-512, 2007
[21] H. Cheng, P. Yu, and J. Han.”Approximate frequent itemset mining in the presence of random noise”.Soft Computing for Knowledge Discovery and Data Mining, pp.612-615,2008
[22] Carson Kai-Sang Leung,Quamrul I. Khan ,Tariqul Hoque.” CanTree: A Tree Structure for Efficient Incremental Mining of Frequent Patterns”pp.700-712,2005
[23] Charu C. Aggarwal,Senior Member, and Philip S. Yu,Fellow “A Survey of Uncertain Data Algorithms and Applications“conf on ieee transactions on knowledge and data engineering, vol. 21,may 2005 pp.523-540.
[24] Jianxiong Luo, Susan M.Bridges”Mining fuzzy Association rules and fuzzy frequency episodes for intrusion detection”pp.812-816.August,2000.
[25] S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. The design of an acquisitional query processor for sensor networks. In ACM SIGMOD, pp.435-440,2003
Citation
Shital A. Patil, Amol Potgantwar, "Performance analysis of PFI using FP-Growth algorithm for various data-sets," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.43-50, 2016.
Enhancing M-Learning System Using Cloud Computing
Research Paper | Journal Paper
Vol.4 , Issue.1 , pp.51-55, Jan-2016
Abstract
The main aim of this paper is to study the concept of M-Learning system enhancement using Cloud computing technologies. M-Learning system can be enhanced by the new Cloud computing technologies. M-Learning system is flexible and it has some advantages than the traditional educational system. Furthermore, MCC-Mobile Cloud computing is the new technology which integrates Mobile Computing and Cloud computing which has many advantages than M-Learning. Storage space, processing speed and other services from the cloud environment are utilized in MCC to enhance the networked collaborative learning process. This paper discusses the concept of Mobile Learning and Cloud computing, Cloud architecture and its benefits. It also discusses the benefit of Cloud computing in Mobile Learning. Through Cloud computing and Cloud environment the learner’s mobile device is able to receive unbroken transmission signals which enhances the barrier free communication process. Mobile Cloud computing modifies the teacher’s role from lecturing to facilitating the learning process i.e. student centered learning.
Key-Words / Index Term
M-Learning system, Cloud computing, MCC (Mobile Cloud Computing), Cloud architecture, Cloud environment, Student centered learning
References
[1]. Chen, Shaoyong, Min Lin, Huanming Zhang. Research of mobile learning system based on cloud computing, e- Education, Entertainment and e-Management. International conference on IEEE,vol.,no.,pp.121-123,27-29 Dec.2011
[2]. Shuai,Qin,zhou Ming-quan. Cloud computing promotes the progress of m-learning, Uncertainty Reasoning and knowledge Engineering. International conference on IEEE, vol.2, no.,pp. 162-164,4-7 Aug.2011.
[3]. Wang, Minjuan Yong Chen and Muhammad Jahanzaib Khan. Mobile Cloud Learning for Higher Education: A Case Study of Moodle in the cloud. The International Review of Research in Open and Distance Learning. International Review of Research in Open and Distance Learning, v15 n2 p254-267 Apr 2014.
[4]. Hirsch, Benjamin, Jason WP Ng., “Education beyond the Cloud: Anytime-anywhere learning in a smart campus environment”, Internet Technology and Secured Transactions (ICITST), International conference on IEEE, vol., no., pp. 718-723, 11-14 Dec.2011.
[5]. Carsten Ullrich, Ruimin Shen, Ren Tong and Xiaohong Tan. A mobile live video learning system for large scale learning system design and Evaluation. IEEE Transactions on learning Technologies. Vol .3, No.1, January –March 2010.
[6]. N. Mallikharjuna Rao, C. Sasidhar, V. Satyendra Kumar. Cloud Computing Through Mobile – Learning.
[7]. Mohamed Osman M. EI-Hussein and Johannes C.Cronje. Defining Mobile Learning in the Higher Education Landscape. Educational Technology & Society.13 (3), 12-21.
[8]. Mrs. Bhuvana Raghvendra Bajpai. M- Learning & Mobile Knowledge Management: Emerging new stages of E-Learning & Knowledge Management. IEEE ICC 2011
[9]. Kritika Verma, Sonal Dubey, Dr.M.A.Rizvi. Mobile Cloud a New vehicle for Learning: M-Learning its issues and Challenges. International Journal of Science and Applied Information Technology, Volume 1, No. 3, July – August 2012.
[10]. Hoand T.Dinh, Chonho Lee, Dusit Niyato and Ping Wang. A Survey of Mobile Cloud Computing: Architecture, Applications and Approaches. Wireless Communication and Mobile Computing, 2013; 13: 1587-1611.
[11]. Meilian Chen, Yan Ma, Yikun Liu, Fan Jia, Yanhui Ran and Jie Wang. Mobile learning System Based on Cloud Computing. Journal of Networks, Volume 8, No. 11, November 2013.
[12]. Mohssen M. Alabbadi. Mobile Learning (m-Learning) Based on Cloud Computing: M-Learning as a Service (mLaaS). The Fifth International conference on mobile Ubiquitous Computing, Systems, Services and Technologies, 2011.
[13]. Pragaladan R, Leelavathi. M. A Study of Mobile Cloud Computing and Challenges. International Journal of Advanced Research in Computer and Communication Engineering. Volume 3, Issue 7, July 2014.
[14]. Anwar Hossain Masud, Xiaodi Huang. A Cloud Based M-Learning Architecture for Higher Education. http://www.researchgate.net/publications/235758554
[15]. Hossein Movafegh Ghadirli and Maryam Rastgarpour. A Paradigm for the Application of Cloud Computing in Mobile Intelligent Tutoring Systems. International Journal of Software Engineering & Applications (IJSEA), Volume 4, No.2, March 2013.
Citation
Sharmila, Nisha Jebaseeli, "Enhancing M-Learning System Using Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.51-55, 2016.
Development of Automatic Fracture Detection System using Image Processing and Classification Methods for Femur Bone X-Ray Images
Research Paper | Journal Paper
Vol.4 , Issue.1 , pp.56-60, Jan-2016
Abstract
Clinician and Practitioners suggest that detection of fractures from x-ray images is considered as an essential process in medical x- ray image analysis for diagnosis. Patients suffer in most cases seriously. So the study proposes a combined classification technique for automatic fracture detection from long bones, in particular the leg femur bones. The proposed system has following steps, preprocessing, segmentation, feature extraction and bone detection, which uses a combination of classification techniques of image processing for successful detection of fractures. The classifiers, Support Vector Machine Classifiers (SVM), feed forward Back Propagation Neural Networks (BPNN), and Naïve Bayes Classifiers (NB) are used during combination of classification. The results from various experiments showed that the proposed system is showing significant improvement in terms of detection rate of fractures.
Key-Words / Index Term
SVM, BPNN, Navie Base Calssification
References
[1] Luisier, F., Vonesch, C., Blu, T. and Unser, M., “Fast interscale wavelet denoising of Poisson-corrupted images”, Science Direct, Signal Processing, Elsevier, Volume 90, Issue 2, Pp.(415–427), Feb 2010.
[2] Kaur, A. and Singh, K., “Speckle noise reduction by using wavelets”, National Conference on Computational Instrumentation, CSIO Chandigarh, INDIA, Pp. (198-203), NCCI March 19-20, 2010.
[3] Sharma, N. and Aggarwal, L.M., “Automated medical image segmentation techniques”, Journal of Med Physics, Vol. 35 , Pp.3-14. Jan-March 2010.
[4] Sakata M, and Ogawa,K., “Noise reduction and contrast enhancement for small-dose X-Ray images in wavelet domain”, IEEE Nuclear Science Symposium Conference Record (NSS/MIC), Orlando, FL, Pp. 2924-3654, Oct, 2009.
[5] Donnelley, M., “Computer aided long-bone segmentation and fracture detection”, Computer and Information Science, Ph.D Thesis, flinders university, Jan 15, 2008.
[6] Tamisiea, D.F., “Radiologic aspects of orthopedic diseases”, Mercier LR, ed. Practical Orthopedics. 6th ed. Philadelphia, Pa: Mosby Elsevier; Chapter 16, 2008.
[7] Zhang B. Fadili, M J Starc, J L and Digel, S W, “Fast Poisson nose removal by bi orthogonal harr domain hypothesis testing, statistical methodology”, Journal of the International Indian statistical Association, Elsevier, Vol. 5, Pp. 387-396, Feb, 2008.
[8] Federico, A. and Kaufmann, G.H., “Denoising in digital speckle pattern interferometry using wave atoms”, Opt. Lett., Vol. 32, Pp.1232-1234, 2007.
[9] Rajan, J. and Kaimal, M.R., “Image Denoising using Wavelet Embedded Anisotropic Diffusion (WEAD)”, Proceedings of IET International Conference on Visual Information Engineering, Pp 589-593, Sept 26-28, 2006.
[10] Lim, V.L.F., Leow, L.W., Chen, T., Howe, T.S. and Png, M.A., “Combining classifiers for bone fracture detection in X-ray images”, IEEE International Conference on Image Processing, ICIP 2005, Vol. 1, Pp.I - 1149-1152, 2005.
[11] Marusic, S., Deng, G., Tay, D.B.H., “Image Denoising Using Over-complete Wavelet Representations”, Proceedings of the European Signal Processing Conference, EUSIPCO 2005, Pp.1-4, 2005.
[12] Chen, Y., Yap, W.H., Leow, W.K., Howe, T.S. and Png, M.A., “Detecting femur fractures by texture analysis of trabeculae”, Proc. Int. Conf. on Pattern Recognition., 2004.
[13] Lim, S.E., Xing, Y., Chen, Y., Leow, W.K., Howe, T.S. and Png, M.A.,” Detection of femur and radius fractures in x-ray images”, Proc. 2nd Int. Conf. on Advances in Medical Signal and Info. Proc., 2004.
[14] Tian, T.P., Chen, Y., Leow, W.K., Hsu, W., Howe, T.S. and Png, M.A., “Computing neck-shaft angle of femur for x-ray fracture detection”, Proc. Int. Conf on Computer Analysis of Images and Patterns (LNCS 2756), Pp. 82–89, 2003.
[15] Niijima, M., “Wavelet image analysis”, Kagaku Gijutsu Publishing (in Japanese), 2000.
[16] Tsukahara, M., Haseyama, M. and Kitajima, H., “Removal of additive white noise using an adaptive Wiener filter with edge retention”, Trans IEICE 1998, J81-DII: 623–631, 1998.
[17] Pisano, E.D., Zong, S., Hemminger, B.M., DeLuca, M., Johnston, R.E., Muller, K., Braeuning, P.M. and Pizer, S.M., “Contrast limited adaptive histogram equalization image processing to improve the detection of simulated speculations in dense mammograms”, Journal of Digital Imaging, Vol. 11, No. 4, Pp. 193-200, 1998.
[18] Najman, L. and Schmitt, M., “Geodesic saliency of watershed contours and hierarchical segmentation, Pattern Analysis and Machine Intelligence”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.18, No. 12, Pp.1163-1173, 1996.
[19] Duda, R. and Hart, P., “Use of the hough transformation to detect lines and curves in pictures”, Comm. ACM, Vol . 15, Pp. 11–15, 1972
Citation
M P Deshmukh, P D Deshmukh, "Development of Automatic Fracture Detection System using Image Processing and Classification Methods for Femur Bone X-Ray Images," International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.56-60, 2016.