International Journal of Computer Sciences and Engineering
The Board set down various parameters of evaluating the potential parameters that each prospective manuscript is reviewed for best paper awards. We assign rating points with respect to variables such as Content Quality, the No of References, Manuscript scope, research outcomes and results and aggregate the score.
Unlocking the Power of Data: An Introduction to Data Analysis in Healthcare
Research Paper | Journal Paper
Vol.11 , Issue.3 , pp.1-9, Mar-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i3.19
Abstract
Healthcare data [1] is becoming more complex and voluminous, which makes it difficult to extract valuable insights and improve healthcare services. Data analysis can help solve this challenge by providing a powerful solution. In this paper, the authors introduce the concept of data analysis in healthcare and explain its significance in enhancing patient outcomes, reducing healthcare costs, and improving the quality of care. The authors also discuss the different types of healthcare data, including electronic health records, claims data, medical imaging data, and patient-generated data, and explain the techniques used in data preprocessing, including data cleaning, transformation, and integration. Moreover, the authors describe the techniques used in exploratory data analysis (EDA), such as data visualization, summary statistics, and correlation analysis, which can help identify patterns and trends in healthcare data. They also explain the various predictive modeling techniques used in healthcare data analysis, including regression analysis, decision trees, and neural networks, which can be used for predicting patient outcomes and identifying risk factors. Additionally, the authors discuss the development of clinical decision support systems using data analysis, which can assist healthcare professionals in making informed decisions about patient care. The paper provides real-world examples of how data analysis has been used in healthcare, such as predicting hospital readmissions, identifying high-risk patients, and improving medication adherence. Finally, the authors discuss emerging trends in data analysis in healthcare, such as the use of artificial intelligence and machine learning, and their potential impact on healthcare. Overall, this paper highlights the importance of data analysis in healthcare and its potential to revolutionize the industry.
Key-Words / Index Term
Data Analysis, Healthcare Data, EHR, Claims Data, Medical Imaging Data, Data Preprocessing, Data Cleaning, Data transformation, Data Integration, EDA, Data Visualization, Clinical Decision Support, AI, ML.
References
[1]. Thacker SB: Historical development. In Principles and Practice of Public Health Surveillance. Edited by: Teutsch SM, Churchill RE. 2000, New York: Oxford University Press, Inc, pp.1-16, 2000.
[2]. Supporting Medical Research in Healthcare: A Systematic Review of Current Practices and Future Directions by L. H. Green et al. 2019.
[3]. J. Peifer, A. Hopper and B. Sudduth, "A patient-centric approach to telemedicine database development", _Proc. Medicine Meets Virtual Reality 6_, pp.67-73, 1998.
[4]. Kruse CS, Mileski M, Vijaykumar AG, Viswanathan SV, Suskandla U, Chidambaram Y. Impact of electronic health records on long-term care facilities: systematic review. _JMIR Med Inform_. 5:e35, 2017.
[5]. R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules", _Proc. 20th int. conf. very large data bases VLDB_, vol.1215, pp.487-499, 1994.
[6]. K. Nakayama, "Data analysis by the correspondence analysis", _Kansei Gakuin University bulletin society department bulletin_, no.108, pp.133-145, 2009.
[7]. A. Mcafee and E. Brynjolfsson, "Spotlight on Big Data Big Data: The Management Revolution", _Harv. Bus. Rev._, no. October, pp.1-9, 2012.
[8]. C. Castaneda, K. Nalley, C. Mannion et al., "Clinical decision support systems for improving diagnostic accuracy and achieving precision medicine", _Journal of Clinical Bioinformatics_, vol.5, pp.4, 2015.
[9]. Applications of Data Analysis in Healthcare: A Systematic Review of Current Literature" by A. M. Abdel-Aziz et al. 2021.
[10]. Chidanand Apte, Leora. Morgenstern and Se Hong, "AI at IBM Research", _IEEE Intelligent Systems and their Applications_, vol.15, no.6, pp. 51-57, Nov. 2000.
[11]. J. Reiling, B. L. Knutzen, T. K. Wallen, S. McCullough, R. Miller and S. Chernos, "Enhancing the traditional hospital design process: a focus on patient safety", The Joint Commission Journal on Quality and Patient Safety, vol.30, no.3, pp.115-124, 2004.
[12]. I. A. Walker, S. Reshamwalla and I. H. Wilson, "Surgical safety checklists: do they improve outcomes?", _Br. J. Anaesth._, vol.109, no.1, pp.47-54, 2012.
[13]. S. Goldwasser, "Multi party computations: past and present," in PODC`97, Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing. New York: ACM, pp.1-6, 1997.
[14]. T. Alshugran, J. Dichter and M. Faezipour, "Formally expressing HIPAA privacy policies for web services", _IEEE Int. Conf Electro Inf Technol._, vol. 201S-June, pp.295-299, 2015.
[15]. W. Moore and S. Frye, "Review of HIPAA part 2: Limitations rights violations and role for the imaging technologist", J. Nucl. Med. Technol., vol.48, no.1, pp.17-23, Mar. 2020.
[16]. X. Du, M. Guizani, Y. Xiao and H. H. Chen, "a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks", _IEEE Transactions on Wireless Communications_, vol.8, no.3, pp.1223-1229, 2009.
[17]. D.K. Vawdrey, T.L. Sundelin, K.E. Seamons and C.D. Knustson, "Trust negotiation for authentication and authorization in health care information system," 25th Annual International Conference of IEEE, vol. 2, issue, pp.1406-1409, 17-21 September 2003.
[18]. U. Strandbygaard, S. F. Thomsen, and V. Backer, ‘‘A daily SMS reminder increases adherence to asthma treatment: A three-month follow-up study,’’ Respiratory Med., vol.104, no.2, pp.166–171, 2010.
[19]. B. G. Celler, N. H. Lovell, and D. Chan, "The Potential Impact of Home Telecare on Clinical Practice," Medical Journal of Australia, vol.171, pp.512-521, 1999.
[20]. M. Rahimpour, N. H. Lovell, B. G. Celler, and J. McCormick, "Patients` perceptions of a home telecare system," International Journal of Medical Informatics, 2008.
[21]. S. J. Strath and T. W. Rowley, "Wearables for Promoting Physical Activity", _Clinical chemistry_, vol.64, no.1, pp.53-63, 2018.
Y Zhou and R Deng, "Goal-oriented system design for home medication management products [J]", _Packaging Engineering_, vol.39, no.02, pp.202-208, 2018.
Citation
Sameer Shukla, "Unlocking the Power of Data: An Introduction to Data Analysis in Healthcare", International Journal of Computer Sciences and Engineering, Vol.11, Issue.3, pp.1-9, 2023.
Developing Pragmatic Data Pipelines using Apache Airflow on Google Cloud Platform
Research Paper | Journal Paper
Vol.10 , Issue.8 , pp.1-8, Aug-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i8.18
Abstract
Data Pipeline[1][2] is a series of actions which moves data from the one source to the destination, the complexity of Data Pipeline varies from use-case to use-case. The traditional data pipeline cleanups the data, aggregates the data and move it from one place to another, it sounds simple but it’s very complex as the organization deals with huge and complex data and the expectation from pipeline is that it should be robust, fast, notify about the status and it should do the same task repeatedly without failing. The modern data pipelines are slightly different in nature they are supposed to deal with Petabytes of data, they stores the data in various flavors of the cloud, should provide real-time data analysis. Apache Airflow is one such tool which simplifies the entire Data Pipeline creation to a great extent and the only pre-requisite is the basic Python Knowledge. This paper focuses on the stock-exchange data pipeline creation by using the Airflow concepts such as DAGs and Operators.
Key-Words / Index Term
Data-Pipeline, Python, Pandas, Seaborn, Apache-Airflow, GCP, Kaggle.
References
[1] P. Covington, J. Adams and E. Sargin, "Deep neural networks for youtube recommendations", Proceedings of the 10th ACM conference on recommender systems, pp. 191-198, 2016.
[2] H. H. Olsson and J. Bosch, "From opinions to data-driven software r&d: a multi-case study on how to close the’open loop’problem", 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications, pp. 9-16, 2014.
[3] Panos Vassiliadis, ‘A Survey of Extract-Transform-Load Technology.,’ July 2009 International Journal of Data Warehousing and Mining 5:1-27
[4] Tziovara, V., Vassiliadis, P., & Simitsis, A. (2007). Deciding the Physical Implementation of ETL Work-?ows. Proceedings ACM 10th International Workshop on Data Warehousing and OLAP (DOLAP 2007), pp. 49-56, Lisbon, Portugal, 9 November 2007.
[5] Vassiliadis, P., & Simitsis, A. (2009). Extraction-Transformation-Loading. In Encyclopedia of Da-tabase Systems, L. Liu, T.M. Özsu (eds), Springer, 2009.
[6] Florian Waa, Tobias Freudenreich, Robert Wrembel, Maik Thiele, Christian Koncilia, Pedro Furtado, ‘OnDemand ELT Architecture for Right-Time BI: Extending the Vision’, International Journal of Data Warehousing and Mining 9(2):21-38 · April 2013
[7] FabianPrasser, HelmutSpengler, RaffaelBild, JohannaEicher, Klaus A.Kuhn, ‘Privacy-enhancing ETLprocesses for biomedical data’, International Journal of Medical Informatics, Vol.126, pp.72- 81, June 2019.
[8] Ibrahim Burak Ozyurt and Jeffrey S Grethe, ‘Foundry: a message-oriented, horizontally scalable ETL system for scientific data integration and enhancement’, Database (Oxford). 2018; 2018: bay130.C. Wohlin, P. Runeson, M. Host, M. Ohlsson, B. Regnell, ¨ and A. Wesslen. ´ Experimentation in Software Engineering. Computer Science. Springer, 2012.
[9] Venters, W., Whitley, E.A.: A Critical Review of Cloud Computing: Researching Desires and Realities. J. Inf. Technol. 27, 179–197, 2012.
[10] Justin, C., Ivan, B., Arvind, K. and Tom, A. “Seattle: A Platform for Educational Cloud Computing”SIGCSE09, March 37, 2009, Chattanooga, Tennessee, USA. 2009.
[11] Google Apps Education Edition: communication, collaboration, and security in the cloud.http://www.google.com/a/edu/
[12] Matei Zaharia, Reynold S Xin, Patrick Wendell, Tathagata Das, Michael Armbrust,Ankur Dave, Xiangrui Meng, Josh Rosen, Shivaram Venkataraman, Michael JFranklin, et al. Apache spark: a uni?ed engine for big data processing. Commu-nications of the ACM, 59(11):56–65, 2016.
[13] Creating Data Pipelines using Apache Airflow "Sameer Shukla" Volume 9 - Issue 4 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
[14] S. Fortune, J. Hopcroft, J. Wyllie The directed subgraph homeomorphism problem Theoret. Comput. Sci., 10, pp. 111-121, 1980.
[15] C.L. Lucchesi, M.C.M.T. Giglio, On the irrelevance of edge orientations on the acyclic directed two disjoint paths problem, IC Technical Report DCC-92-03, Universidade Estadual de Campinas, Instituto de Computação, 1992.
[16] Y. Perl, Y. Shiloach Finding two disjoint paths between two pairs of vertices in a graph J. ACM, 25, pp. 1-9, 1978.
[17] R. Agrawal and R. Srikant, "Mining Sequential Patterns", Proc. Int`l Conf. Data Eng. (ICDE `95), pp. 3-14, 1995.
[18] J. Chen and K. Xiao, "BISC: A Binary Itemset Support Counting Approach Towards Efficient Frequent Itemset Mining", ACM Trans. Knowledge Discovery in Data..
[19] Vassiliadis, P., Simitsis, A., Georgantas, P., Ter-rovitis, M., & Skiadopoulos, S. (2005). A generic and customizable framework for the design of ETL scenarios. Information Systems, 30, 7, 492-525, 2005.
[20] P. Merle, O. Barais, J. Parpaillon, N. Plouzeau and S. Tata, "A Precise Metamodel for Open Cloud Computing Interface", the 8th International Conference on Cloud Computing (CLOUD). IEEE, pp. 852-859, 2015.
[21] D. C. Schmidt, "Model-Driven Engineering", COMPUTER-IEEE COMPUTER SOCIETY-, vol. 39, no. 2, pp. 25, 2006.
[22] Bryant, P. G. and Smith, M (1995) Practical Data Analysis: Case Studies in Business Statistics. Homewood, IL: Richard D. Irwin Publishing.
[23] Zimmermann, O. (2009). An architectural decision modeling framework for service oriented architecture design. PhD thesis, Universitat Stuttgart.
[24] Badidi, E. (2013) “A Framework for Software-As-A-Service Selection and Provisioning”. In: International Journal of Computer Networks & Communications (IJCNC), 5(3): 189-200, 2013.
[25] F. Montesi and J. Weber, “Circuit Breakers, Discovery, and API Gateways in Microservices,” ArXiv160905830 Cs, Sep. 2016
[26] G. Grahne and J. Zhu, "Efficiently Using Prefix-Trees in Mining Frequent Itemsets", Proc. Workshop Frequent Itemset Mining Implementations (FIMI `03), 2003.
[27] Z. Zhang and M. Kitsuregawa, "LAPIN-SPAM: An Improved Algorithm for Mining Sequential Pattern", Proc. Int`l Special Workshop Databases for Next Generation Researchers, pp. 8-11, 2005.
Citation
Sameer Shukla, "Developing Pragmatic Data Pipelines using Apache Airflow on Google Cloud Platform", International Journal of Computer Sciences and Engineering, Vol.10, Issue.8, pp.1-8, 2022.
Hybrid Features For Content Based Image Retrieval System
Research Paper | Journal Paper
Vol.6 , Issue.10 , pp.11-15, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.1115
Abstract
The “speedy progress in multimedia and imaging technology, the numbers of images uploaded and shared on the internet have increased. It leads to develop the highly effective image retrieval system to satisfy the human needs. The content-Based image retrieval (CBIR) system which retrieves the image based on the Low level features such as color, texture and shape which are not sufficient to describe the user’s high level perception for images. Therefore reducing this semantic gap problem of image retrieval is challenging task. Some of the most important notions in image retrieval are keywords, terms or concepts. Terms are used by humans to describe their information need and it also used by system as a way to represent images. Here in this paper different types of features their advantage and disadvantages are described. We have carried out comparative analysis of different techniques used in our system to determine best suitable technique to be used for our proposed system. We have analyze the our proposed system on large image dataset and our approach gives high precision and required less computations which proves efficiency of our system. In our proposed system we have evaluated the performance of our feature extraction techniques i.e. FCH and GWT using precision and recall metric and compared the result with existing feature extraction approaches i.e. color moment and GWT. Implementation results show that the feature extraction techniques for the proposed system are better than the existing techniques. SVM Classifier also gives good accuracy using these feature extraction” techniques.
Key-Words / Index Term
CBIR, Color Moment, Fuzzy Color Histrogram, Gabor Wavelate, Support Vector Machine
References
[1] ElAlami, M.E."A new matching strategy for content based image retrieval system." Applied Soft Computing 14 (2014): 407-418.
[2] Murala, Subrahmanyam, Anil Balaji Gonde, and Rudra Prakash Maheshwari. "Color and texture features for image indexing and retrieval." In Advance Computing Conference, 2009. IACC 2009. IEEE International, pp. 1411-1416. IEEE, 2009.
[3] Zhang, Dengsheng, Aylwin Wong, Maria Indrawan, and Guojun Lu. "Content-based image retrieval using Gabor texture features." In IEEE Pacific-Rim Conference on Multimedia, University of Sydney, Australia. 2000.
[4] Howarth, Peter, and Stefan Rüger. "Evaluation of texture features for content-based image retrieval." In Image and Video Retrieval, pp. 326-334. Springer Berlin Heidelberg, 2004.
[5] Lin, Chuen-Horng, Rong-Tai Chen, and Yung-Kuan Chan. "A smart content-based image retrieval system based on color and texture feature." Image and Vision Computing 27, no. 6 (2009): 658-665.
[6] Saad, Michele. "Low-level color and texture feature extraction for content-based image retrieval." Final Project Report, EE K 381 (2008): 20-28.
[7] Jhanwar, N., Subhasis Chaudhuri, Guna Seetharaman, and Bertrand Zavidovique. "Content based image retrieval using motif cooccurrence matrix."Image and Vision Computing 22, no. 14 (2004): 1211-1220.
[8] Yue, Jun, Zhenbo Li, Lu Liu, and Zetian Fu. "Content-based image retrieval using color and texture fused features." Mathematical and Computer Modelling54, no.3 (2011): 1121-1127.
[9] Xianzhe Cao and Shimin Wang, “Research about Image Mining Technique,” in proc. Springer ICCIP,2012, pp.127-134.
[10] Ahmad Alzu’bi, Abbes Amira and Naeem Ramzan, “Semantic content-based image retrieval: A comprehensive study,” in Elseveir Journal of Visual Communication and Image Representation, Vol. 32, pp. 20-54 ,2015
[11] V. Franzoni, A. Milani, S. Pallottelli, C. H. C. Leung and Yuanxi Li, "Context-based image semantic similarity," in proc. IEEE twelveth international conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2015, pp. 1280-1284.
[12] Valentina Franzoni, Clement H.C. Leung, Yuanxi Li,Paolo Mengoni and Alfredo Milani,” Set Similarity Measures for Images Based on Collective Knowledge,” in proc. Springer ICCSA,2015,pp.408-417
[13] Elalami,“A New Matching Strategy for Content Based Image Retrieval System,” in ACM Appl. Soft Comput., vol. 14,pp. 407-418,2014
[14] Mohsen Sardari Zarchi, Amirhasan Monadjemi and Kamal Jamshidi, ” A concept- based model for image retrieval systems,” in Elsevier Computers & Electrical Engineering, vol. 46 , pp. 303-313, 2015
[15] N. Goel and P. Sehgal, "Weighted semantic fusion of text and content for image retrieval," in proc. IEEE International Conference Advances in Computing, Communications and Informatics (ICACCI), 2013 , pp. 681-687.
[16] K. Singh, K. J. Singh and D. S. Kapoor, "Image Retrieval for Medical Imaging Using Combined Feature Fuzzy Approach," in proc. IEEE International Conference on Devices, Circuits and Communications (ICDCCom), 2014, pp. 1-5
[17] N. Goel and P. Sehgal,” Image Retrieval Using Fuzzy Color Histogram and Fuzzy String Matching: A Correlation-Based Scheme to Reduce the Semantic Gap", in proc. Springer Intelligent Computing, Networking, and Informatics,2014, pp. 327- 341.
[18] C.-H. Lin, R.-T. Chen and Y.-K. Chan, “A smart content-based image retrieval system based on color and texture feature”, in Elsevier Image and Vision Computing, Vol. 27 , pp. 658–665,2009.
[19] Zhi-chun huang, Patrick P. K. Chan, Wing W. Y. Ng, D aniel s. Yeung" Content- based image retrieval using color moment and Gabor texture feature", Proc. IEEE Ninth international Conference on Machine Learning and Cybernetics, 2010, pp 719-724.
[20] Nizampatnam Neelima and E. Sreenivasa Reddy, “An Efficient Multi Object Image Retrieval System Using Multiple Features and SVM”, in proc. Springer Advances in Intelligent Systems and Computing, Vol. 425,2015, pp 257-265.
[21] Subrahmanyam Murala, Anil Balaji Gonde and R.P. Maheshwari, “Color and Texture Features for Image Indexing and Retrieval”, in proc. IEEE international advanced computing conference , 2009, pp. 1411-1416.
[22] L. Wu, X. Hua, N. Yu, W. Ma, and S. Li, ‘‘Flickr distance: A relationship measure for visual concepts,’’ in IEEE Trans. Pattern Anal. Mach. Intell., vol. 34, pp. 863– 875, 2012.
[23] L. Wu, X.-S. Hua, N. Yu, W.-Y. Ma, and S. Li, “Flickr Distance,” in Proc. 16th ACM International Conf. Multimedia, 2008, pp. 31-40
[24] G. A. Miller, “Wordnet: a lexical database for english”, in ACM Communications of the, 38(11):39–41, 1995.
[25] A. Budanitsky and G. Hirst, “Semantic Distance in Wordnet: An Experimental, Application-Oriented Evaluation of Five Measures,” Proc. WordNet and Other Lexical Resources, 2001
[26] S. S. Hiwale, D. Dhotre and G. R. Bamnote, "Quick interactive image search in huge databases using Content-Based image retrieval," in proc. IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015, pp. 1-5.
[27] K. Konstantinidis, A. Gasteratos, I. Andreadis, “Image Retrieval Based on Fuzzy Color Histogram Processing”, in Elsevier Optics Communications, Vol. 248, pp. 375-386, 2005.
[28] J. Liu, Z. Li, J. Tang, Y. Jiang and H. Lu, "Personalized Geo-Specific Tag Recommendation for Photos on Social Websites," in IEEE Transactions on Multimedia, vol. 16, pp. 588-600, 2014.
[29] Oliva and A. Torralba. Modeling the shape of the scene: a holistic representation of the spatial envelope. Int. Journal of Computer Vision., 42, 2001.
[30] X. Li, T. Uricchio, L. Ballan, M. Bertini, C. Snoek, and A. Del Bimbo, “Socializing the semantic gap: A comparative survey on image tag assignment, refinement and retrieval,” in ACM Computing Surveys, 2016, in press.
[31] Cinemast,”Semantic Gap in image analysis”,
[32] Internet: https://en.wikipedia.org/wiki/Semantic_gap, Apr. 2016.
[33] Dong-Chul Park, “Image Classification Using Naïve Bayes Classifier”, in International Journal of Computer Science and Electronics Engineering, vol. 4 , pp. 135-139, 2016
[34] MATLAB and Statistics Toolbox Release 2013a, The MathWorks, Inc., Natick, Massachusetts, United States
[35] Finlayson and Mark Alan “Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation” in Proceedings of the 7th International Global WordNet Conference, 2014, pp. 78-85 .
[36] Ted Pedersen, WordNet::Similarity. [Online]
[37] Available at: http://wn- similarity.sourceforge.net/ [Accessed on 15 may 2017].
Citation
A.D. Mahajan, S. Chaudhary, "Hybrid Features For Content Based Image Retrieval System", International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.11-15, 2018.
Predicting the Characteristics of a Human from Facial Features by Using SURF
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.9-16, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.916
Abstract
In the modern society everybody wants to be familiar with people’s characteristics to predict and be aware of their reaction to diverse situation, though it’s hard to understand psychological nature and characteristics of a person. For this reason, researches have been carried out in this direction to predict the characteristics of a person such as maturity, warmth, intelligence, sociality, dominance, as well as the trustworthiness. Here aim is to identify person’s characteristics based on the facial features by using techniques such as SURF, which is going to be used for the extraction of the facial features and K-nearest neighbor classifier for identification of the characteristics of the human being. With the various features mentioned and by using the appropriate techniques, the characteristics of a person can be predicted. The overall performance of the proposed work has been estimated by well established dataset and results show that the proposed work has performed well.
Key-Words / Index Term
Speed-Up Robust Features, Interest points,Character recognition
References
[1] Gonzalo Martinez Munoz and Alberto Suarez, “Switching Class Labels to Generate Classification Ensembles”, Elsevier Science, 2005.
[2] Sheryl Brahnam, “A computational Model of the Trait Impressions of Face for Agent Perception and Face Synthesis”, SSAISB, 2005.
[3] Loris Nanni, Dario Maio, “Weighted Sub-Gabor for Face Recognition”, Elsevier, 2006
[4] Sheryl Brahnam and Loris Nanni, “Predicting Trait Impressions of faces using Classifier Ensembles”, Springer, 2009.
[5] Sheryl Brahnam, Loris Nanni, “Predicting Trait Impressions of Faces using Local Face Recognition Techniques”,Elsevier, 2010.
[6] Mario Rojas, Jordi Vitria, “Predicting Dominance Judgments Automatically: A Machine Learning Approach”, IEEE, 2010.
[7] Alexander Todorov and Jordi Vitria, “Automatic Prediction of Facial Trait Judgments: Appearance vs. Structural Models”, PLoS ONE, 2011.
[8] Lucas Assirati, Nubia R. da Silva, Lilian Berton, Alneu de A. Lopes, and Odemir M. Bruno, “Performing edge detection by difference of Gaussians using q- Gaussian Kernels”, arXiv, 2013.
[9] Lucas Assirati, Nubia Rosa da Silva, Odemir Martinez Bruno, “Improving texture classification with non extensive statistical mechanics”, X Workshop de Vis ao Computational WVC, 2014.
[10] Oya C¸ eliktutan and Hatice Gunes “Continuous prediction of perceived traits and social dimensions in space and time”, ICIP, 2014.
[11] C. N. Ravi Kumar, P.Girish Chandra, R.Narayana, “Future path way to Biometrics”, IJBB Volume(5), Issue(3), 2011.
[12] Ekaterina Kamenskaya, Georgy Kukharev, “Recognition of Psychological characteristics from Face”, www.researchgate.net, 2010.
[13] Herbert Bay, Andreas Ess,Tinne Tuytelaar, Luc Van Gool,”Speed-Up Robust features(SURF)”,ScienceDirect(Elsevier),15-Decemebr-2007.
[14] P. Simard, L. Bottou, P. Haffner, Y. LeCun, Boxlets”A fast convolution algorithm for signal processing and neural networks, in” NIPS, 1998.
[15] P.A. Viola, M.J. Jones, “Rapid object detection using a boosted cascade of simple feature”, in CVPR, issue 1, pp. 511–518, 2001.
[16] K. Mikolajczyk, C. Schmid, “Indexing based on scale invariant interest points” in ICCV, vol. 1, pp. 525–531, 2001.
[17] T. Lindeberg, “Feature detection with automatic scale selection” IJCV 30 (2) 79–116, 1998.
[18] J.J. Koenderink, “The structure of images” Biological Cybernetics 50 363–370, 1984.
[19] T. Lindeberg, “Scale-space for discrete signal”, PAMI 12 (3) 234–254, 1990.
[20] Hrishikesh Dubey, “Mysteries of Vedic face reading”,2014.
[21] Komal D. Khawale,D.R. Dhotre “To Recognize Human Emotions Based on Facial Expression Recognition : A Literature Survey”, IJSRCSEIT , Vol 2 , Issue 1 , ISSN : 2456-3307, 2017.
[22] Er. Navleen Kour, Dr. Naveen Kumar Gondhi “Facial Expressions Detection and Recognition Using Neural Networks”, IJSRCSEIT , Vol 2 , Issue 7 , ISSN : 2456-3307, 2017.
Citation
Mahesh U Nagaral, T. Hanumantha Reddy, "Predicting the Characteristics of a Human from Facial Features by Using SURF", International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.9-16, 2018.
Performance Analysis of Channel Allocation Scheme for A System Model Based On Urban Structure
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.1-5, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.15
Abstract
Frequency channels are scarce resource and available in a limit. Due to this limitation user may experience call termination and call blocking as the traffic increases. We can limit call termination and call blocking by allocating permanent channel to home (apartment) and office user due to very limited movement. They are almost fixed if they communicate with each other frequently and this is the normal scenario in urban areas. By using this strategy these users will not feel any disconnection due to inaccessibility of frequency channel in cell. To achieve this we have proposed a scheme based on fixed channel and analyze the performance for both normal channel allocation and preserved channel allocation for home and office users. We have performed and compared the results of call blocking probability, handover failure probability, call termination due to successful handover probability and probability for not completed calls.
Key-Words / Index Term
Channel allocation, handover, call blocking, call termination
References
[1] Theodore S. Rappaport, “Wireless Communications Principles and Practice” Second Edition, Chapter 3, Eastern Economy Edition.
[2] Katzela, M. Naghshineh, “Channel assignment schemes for cellular mobile telecommunication systems: a comprehensive survey,” IEEE Personal Communications, Volume 3, Issue 3, June 1996, pp. 10 – 31.
[3] M. Zhang and T. S. P. Yum, “Comparison of channel-assignment strategies in cellular mobile telephone systems,” IEEE Trans. on Vehicular Technology, vol. 38, no. 4, pp.211-215, 1989.
[4] Yong Zhang, Anfeng Mao, Guo Ping, Ning Hong, Xu Guang, “Quality of Service Guarantee Mechanism in WiMAX Mesh Networks,” Third International Conference on Pervasive Computing and Applications, Volume 2, 6-8 Oct. 2008, pp. 882 – 886.
[5] R. Prakash and M. Singhal, “Distributed dynamic channel allocation for mobile computing: lessons from load sharing in distributed systems,” Mobile Computing, 2009
[6] G. K. Audhya, K. Sinha, S. C. Ghosh and B. P. Sinha, “A survey on the channel assignment problem in wireless networks,” Wireless Communications and Mobile Computing, vol. 11, no. 5, pp.583-609, 2011.
[7] M.P. Mishra, P. C. Saxena, “Survey of Channel Allocation Algorithms Research for Cellular System”, International Journal of Networks and Communications 2012, 2(5): 75-104
[8] D. Sarddar, T. Jana, and U. Biswas, “Reducing handoff call blocking probability by hybrid channel allocation,” in ACM Proc. International Conference on Communication, Computing and Security, pp 7-10, 2011.
[9] S.H. Oh et. al., “Prioritized channel assignment in a cellular radio network,” IEEE Trans. on Communication, vol. 40, pp. 1259–1269, 1992.
[10] Aggelikisgora and Dimitrios D. Vergados, “Handoff prioritization and decision schemes in wireless cellular networks: a Survey,” IEEE Communications Surveys and Tutorials, vol. 11, pp. 57-77, 2009.
[11] Suyash Kumar, P.V. Suresh, “GeneralizedReduction Approach from 3-SAT to K-Colorability” in International Journal of Emerging Technology & Advanced Engineering (ISSN 2250-2459, ISO 9001:2008 Certified Journal), Volume 7, Issue 10, October, 2017.
[12]Pooja saini and Meenakshi Sharma, "Impact of Multimedia Traffic on Routing Protocols in MANET", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.3, pp.1-5, 2015.
[13] Samya Bhattacharya, Hari Mohan Gupta, Subrat Kar, “ Traffic model and performance analysis of cellular mobile systems for general distributed handoff traffic and dynamic channel allocation”, IEEE Transactions on Vehicular Technology, Volume 57, Issue 6,3629-3640, 2008.
[14] L. O. Guerrero, A. H. Aghvami, “A Prioritized Handoff Dynamic Channel Allocation Strategy for PCS,” IEEE Transactions on Vehicular Technology, Volume 48, No. 4, JULY 1999.
Citation
Suyash Kumar, P.V. Suresh, "Performance Analysis of Channel Allocation Scheme for A System Model Based On Urban Structure", International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.1-5, 2018.
Analysis of Regular-Frequent Patterns in Large Transactional Databases
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1-5, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.15
Abstract
Regular-frequent patterns are an important type of regularities that exist in transactional, time-series and any other types of databases. A frequent pattern can be said regular-frequent if it appears at a regular interval given by the user specified threshold in the transactional database. The regularity calculation for every candidate pattern is a computationally expensive process, especially when there exist long patterns. Currently the FP-growth algorithm is one of the most popular and fastest approaches to mining periodic frequent item sets. Therefore, in this paper we introduce a novel concept of mining regular-frequent patterns (RFP) in transactional databases. We introduce two mining techniques based on transaction number and also based on products or itemsets on the vertical data format. The efficiency is achieved by eliminating aperiodic or irregular patterns during execution based on suboptimal solutions. Our tree based structure helps to captures the database contents in highly compact manner. Our experimental results are highly efficient and scalable as well as improve the overall response time.
Key-Words / Index Term
Frequent patterns, regular patterns, transactional databases, vertical data format
References
[1] R. Agrawal, T. Imielinski, A.N. Swami “Mining Association Rules Between Sets of Items in Large Databases”, International Conference on Management of Data(ACM SIGMOD), pp. 207–216, 1993.
[2] R.U. Kiran, P.K. Reddy “Towards efficient mining of periodic frequent patterns in transactional databases”, DEXA, pp. 194-208, 2010.
[3] J. Han, J. Pei, Y.Yin “Mining Frequent Patterns without Candidate Generation”, International Conference on Management of Data(ACM SIGMOD), pp. 1–12, 2000.
[4] K. Amphawan, P. Lenca, A. Surarerks “Mining top-k periodicfrequent pattern from transactional databases without support threshold”, Advances in Information Technology, pp. 18–29, 2009.
[5] J.N. Venkatesh, R.U. Kiran, K, Reddy, M. Kitsuregawa “Discovering Periodic-Frequent Patterns in Transactional Databases Using All-Confidence and Periodic-All-Confidence”, Springer International Publishing,Switzerland, pp. 55-70, 2016.
[6] S.K. Tanbeer, C.F. Ahmed, B.-S. Jeong, Y.-K. Lee, “Discovering periodic frequent patterns in transactional databases” Theeramunkong, T., Kijsirikul, B., Cercone, N., Ho, T.-B. (eds.) , Springer, Heidelberg, PAKDD, LNCS, Vol. 5476, pp. 242–253,2009.
[7] J. Pei, J. Han “Constrained Frequent Pattern Mining: A Pattern-Growth View*”, SIGKDD Explorations, Vol.4, Issue.1, pp.31-39.
[8] R.U. Kiran, M. Kitsuregawa, P.K. Reddy, “Efficient Discovery of Periodic-Frequent Patterns in Very Large Databases” Journal of Systems and Software, 2015.
[9] A. Surana, R.U. Kiran, P.K. Reddy “An efficient approach to mine periodic frequent patterns in transactional databases” Cao, L., Huang, J.Z., Bailey, J., Koh, Y.S., Luo, J. (eds.) PAKDD Workshops 2011, Springer, Heidelberg (2012), LNCS, Vol.7104, pp.254–266, 2012.
[10] V.M. Nofong “Discovering Productive Periodic Frequent Patterns in Transactional Databases”, Springer-Verlag Berlin Heidelberg, 2016.
[11] R.U. Kiran, M. Kitsuregawa “Discovering quasi-periodic-frequent patterns in transactional databases” Bhatnagar V, Srinivasa S (eds) BDA 2013, LNCS, Springer International Publishing, Heidelberg, pp97–115, 2013.
[12] V. Kumar, V. Kumari “Incremental mining for regular frequent patterns in vertical format” International Journal of Engineering Technology, Vol.5, Issue.2, pp.1506–1511, 2013.
[13] M.J. Zaki “Parallel and distributed association mining: A survey” IEEE concurrency, pp. 14-25, 1999.
[14] T. Hu, S.Y. Sung, H. Xiong, Q. Fu “Discovery of Maximum Length Frequent Itemsets” Information Sciences, pp.69–87, 2008.
[15] N.Sethi, P.Sharma “Mining Frequent Pattern from lLarge Dynamic Database Using Compacting Data Sets” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.31–34, 2013.
Citation
S. Rana, "Analysis of Regular-Frequent Patterns in Large Transactional Databases", International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1-5, 2018.
Modeling of Probe-Drogue Docking Success Probability for UAV Autonomous Refuelling
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1-6, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.16
Abstract
Docking process of UAV Autonomous Refueling is a critical issue during the docking phase of autonomous aerial refueling (AAR), and the successful docking between the probe and drogue need higher probability for an aerial refueling system. To cope with this issue, a novel and effective model based on the theory of stochastic process crossing target area is proposed. In order to ensure its accurate and easy application, according to prior information and assumptions for the movements of the probe related to the drogue, the probe-drogue docking success probability is converted to the probability of the probe located in the circle area of drogue. The temporal and spatial characteristics of the pointing error have been considered which makes the model of the docking success probability more accord with the actual situation. simulations were conducted to demonstrate the effectiveness of the proposed method. This model provides theoretical support for the design and verification of AAR’s control system.
Key-Words / Index Term
Autonomous aerial refueling, UAV, stochastic process, docking success probability
References
[1] J. L. Hansen, J. E. Murray, N. V. Campos, “The NASA Dryden AAR project: a flight test approach to an aerial refueling system” , Proceedings of the Collection of Technical Papers - AIAA Atmospheric Flight Mechanics Conference, pp. 477–495, Reston, Virginia, USA, August 2004.
[2] M. Q. Hu, P. Liu, X. Nie, R. X. Zhou, “Influence of air turbulence on the movement of hose-drogue”, Flight Dynamics, vol. 28, No. 5, pp. 20–23, 2010.
[3] M.B. Giri, P. kulkarni, S. Bullock, and A.Doshi, “Agricultural Environmental Sensing Application Using Wireless Sensor Network for Automated Drip Irrigation”, International Journalof Computer Sciences and Engineering, vol. 8(6), pp. 14–35, 2016.
[4] A.Omanakuttan,D. Sreedhar,A. Manoj and A. Achankunju, “GPS and GSM Based Engine Locking System Using Smart Password”, International Journalof Computer Sciences and Engineering, vol. 5(4), pp. 57–61, 2017
[5] L. Y. Zhang, H. Zhang, Y. Yang, L. Huang, “Dynamics modeling and simulation of docking process in aerial refueling”, Acta Aeronautica et Astronautica Sinica, vol. 33, No. 7, pp. 1347– 1354, 2012.
[6] J. Zhang, S. Z. Yuan, Q. Q. Gong, “Modeling and control of shaking motion of aerial refueling hose-drogue”, Journal of System Simulation, vol. 28, No. 2, pp. 388–395, 2016.
[7] J. P. Nalepka and J. L. Hinchman, “Automated aerial refueling: extending the effectiveness of UAVs”, Proceedings of the AIAA Modeling and Simulation Technologies Conference and Exhibit, San Francisco, Calif, USA, pp. 2005–6005.2005
[8] H. T. Wang, X. M. Dong, H. F. Dou, J. P. Xue, “Dynamic modeling and characteristics analysis of hose-paradrogue aerial refueling system”, Journal of Beijing University of Aeronautics and Astronautics, vol. 40, No. 1, pp. 92–98, 2014.
[9] P. R. Thomas, U. Bhandari, S. Bullock, T. S. Richardson, “Advances in air to air refuelling”, Progress in Aerospace Sciences, vol. 71, No. 3,pp. 14–35, 2014.
[10] K. Ro , J. W. Kamman, “Modeling and simulation of hose-paradrogue aerial refueling systems” ,Journal of Guidance, Control, and Dynamics, vol. 33, No. 1, pp. 53–63, 2010.
[11] H Wang, X Dong, J Xue, J Liu, “Dynamic modeling of a hose-drogue aerial refueling system and integral sliding mode backstepping control for the hose whipping phenomenon”, Chinese journal of aeronautics, Vol.42, No.6, pp.61-70, 2014.
[12] Z Liu, J Liu, W He, “Modeling and vibration control of a flexible aerial refueling hose with variable lengths and input constraint”, Automatica, Vol.77, Issue.3, pp.302-310, 2017.
[13] Rachita Dahama, Kevin W. Sowerby, Gerard B. Rowe, “Outage Probability Estimation for Licensed Systems”, IEEE 69th Vehicular Technology Conference, Barcelona, Spain ,2009
[14] A. Dogan, W. Blake, C. Haag, “Bow wave effect in aerial refueling: computational analysis and modeling”, Journal of Aircraft, vol. 50, no. 6, pp. 1856–1868, 2013.
[15] X. H. Dai, Z. B. Wei, Q. Quan, “Modeling and simulation of bow wave effect in probe and drogue aerial refueling”, Chinese Journal of Aeronautics, vol. 29, no. 2, pp. 448–461, 2016..
[16] John Valasek, Kiran Gunnam, Jennifer Kimmett, John L. Junkins, Declan Hughes, Monish D. Tandale. "Vision-Based Sensor and Navigation System for Autonomous Air Refueling", Journal of Guidance, Control, and Dynamics, Vol. 28, No. 5, pp. 979-989. 2005.
[17] Xufeng Wang, Jianmin Li, Xingwei Kong, Xinmin Dong, Bo Zhang, “An Approach to Mathematical Modeling and Estimation of Probe-Drogue Docking Success Probability for UAV Autonomous Aerial Refuelin”, International Journal of Aerospace Engineering, Vol.2017, pp.1-14, 2017.
[18] X. F. Wang, X. M. Dong, X. W. Kong, J. M. Li, B. Zhang, “Drogue detection for autonomous aerial refueling based on convolutional neural networks”, Chinese Journal of Aeronautics, vol. 30, no. 1, pp. 380–390, 2017.
[19] H. W. Xie, H. L. Wang, “Binocular vision-based short-range navigation method for autonomous aerial refueling”, Journal of Beijing University of Aeronautics and Astronautics, vol. 37, no. 2, pp. 206–209, 2011.
[20] P.R. Thomas, U. Bhandari, S. Bullock, T. S. Richardson, and J. L. Du Bois, “Advances in air to air refuelling”, Progress in Aerospace Sciences, vol. 71, pp. 14–35, 2014.
Citation
Xiangmin Wang, Jun Wang, "Modeling of Probe-Drogue Docking Success Probability for UAV Autonomous Refuelling", International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1-6, 2018.
A Combinational Approach of Feature Extraction for Offline Handwritten Hindi Numeral Recognition
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.1-8, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.18
Abstract
Offline Handwritten Character Recognition is a very challenging field to work upon, as the handwriting of an individual differs very much from another individual, even the handwriting of an individual may differ on different times. Studies have shown that recognition efficiency of characters depends on the ways the features are extracted and formulated as the feature vector. A lot of techniques have been proposed by the various research scholars for feature extraction. In this paper, a combinational approach of feature extraction is proposed as combinational feature vectors (Gradient features, Zernike complex moment features, and Wave based features) may contribute to improved recognition rate. For training and testing purpose, samples of Hindi numerals from 0 to 9 are taken. A feature vector of directional gradient histogram (DGH), a feature vector of Zernike complex moments (ZCM) and a feature vector of Wave features (WF) are feed to the Back-propagation based Neural Network classifiers for training and recognition rate of approx. 79.7%, 92.7% and 73% are attained respectively. By combining the feature vectors DGH, CZM, and WF, a higher recognition rate of 96.4% is obtained for isolated Hindi Numerals.
Key-Words / Index Term
Character Recognition, Gradient features, Zernike Moments, Wave features, Backpropagation Neural Network
References
[1] M.B. Mendapara and M.M. Goswami, “Stroke Identification in Gujarati Text using Directional Feature”, International Conference on Green Computing Communication and Electrical Engineering, IEEE 2014.
[2] Anitha Mary, M.O. Chacko and P.M. Dhanya, “A Comparative Study of Different Feature Extraction Techniques for Offline Malayalam Character Recognition”, International Conference on Computational Intelligence in Data Mining, Springer, Vol. 2, pp.9-18, 2014.
[3] Ravindra S. Hegadi and Parshuram M. Kamble, “Recognition of Marathi Handwritten Numerals Using Multi-layer Feed-Forward Neural Network”, World Congress on Computing and Communication Technologies, IEEE, pp. 21-24, 2014.
[4] Hetal R. Thaker and Dr C. K. Kumbharana, “Analysis of structural features and classification of Gujarati consonants for offline character recognition”, International Journal of Scientific and Research Publications, Vol. 4, Issue 8, pp. 1-5, August 2014.
[5] Muhammad Arif Mohamad, Dewi Nasien, Haswadi Hassan, Habibollah Haron, “A Review on Feature Extraction and Feature Selection for Handwritten Character Recognition”, International Journal of Advanced Computer Science and Applications, Vol. 6, No. 2, 2015.
[6] U. Pal, T. Wakabayashi, F. Kimura, “Comparative Study of Devnagari Handwritten Character Recognition using Different Feature and Classifiers”, IEEE, 10th International Conference on Document Analysis and Recognition, pp. 1111-1115, 2009.
[7] Sandhya Arora, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu, “Multiple Classifier Combination for Offline Handwritten Devanagari Character Recognition”, arxiv.org/pdf/1006.5913, pp. 01-06, June 2010.
[8] Xianjing Wang and Atul Sajjanhar, “Using a Circular grid for Offline Handwritten Character Recognition”, 4th International Congress on Image and Signal Processing, pp. 945-949, 2011.
[9] Ashutosh Aggarwal, Karamjeet Singh and Kamalpreet Singh, “Use of Gradient Technique for extracting features from Handwritten Gurumukhi Characters and Numerals”, International Conference of Information and Communication Technologies, Elsevier, pp. 1716-1723, 2014.
[10] Karbhari V. Kale, Prapti D. Deshmukh, Shriniwas V. Chavan, Majharoddin M. Kazi, Yogesh S. Rode, “Zernike Moment Feature Extraction for Handwritten Devanagari (Marathi) Compound Character Recognition”, International Journal of Advanced Research in Artificial Intelligence, Vol. 3, No.1, pp. 68-76, 2014.
[11] Kulkarni Sadanand A., Borde Prashant L., Manza Ramesh R., Yannawar Pravin L. “Offline MODI Character Recognition Using Complex Moments”, Second International Symposium on Computer Vision and the Internet (VisionNet’15), Procedia Computer Science -58 516–523, pp.516-523, 2015.
[12] Dayashankar Singh, Dr J.P. Saini and Prof. D.S. Chauhan, “Hindi Character Recognition Using RBF Neural Network and Directional Group Feature Extraction Technique”, International Conference on Cognitive Computing and Information Processing, IEEE 2015.
[13] Dayashankar Singh, Maitreyee Dutta and Sarvpal H. Singh, “Neural Network based Handwritten Hindi Character Recognition System”, 2nd Bangalore Annual Computer Conference, Article No. 15, ISBN 978-1-60558-476-8.
[14] Ajay Indian, Karamjit Bhatia, “Offline Handwritten Hindi ‘SWARs’ Recognition Using A Novel Wave Based Feature Extraction Method”, International Journal of Computer Science Issues, Volume 14, Issue 4, ISSN: 1694-0814, pp.08-14, July 2017.
[15] K. Radha Revathi1, A.N.L Kumar, Andey Krishnaji, “Neuro Recognizer: Neural Network Based Hand-Written Character Recognition”, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, Volume-3, Issue-9, pp.28-33, Sep.2015.
[16] Siddhartha Banerjee, Bibek Ranjan Ghosh, Arka Kundu, “Handwritten Character Recognition from Bank Cheque”, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, Vol.-4(1), pp.99-104, Feb 2016.
[17] Shen-Wei Lee and Hsien-Chu Wu, “Effective Multiple-features Extraction for Off-line SVM-Based Handwritten Numeral Recognition”, International Conference on Information Security and Intelligence Control, IEEE, pp. 194-197, 2012.
[18] G Raju, Bindu S Moni and Madhu S. Nair, "A Novel Handwritten Character Recognition System using Gradient-based Features and Run Length Count", Indian Academy of Sciences, Vol. 39, Issue 6, pp. 1333–1355, December 2014.
[19] L. Heutte, J. V. Moreau, T. Paquet, Y. Lecourtier, and C. Olivier, “Combining Structural and Statistical Features for the Recognition of Handwritten Characters,” Proceedings of 13th International Conference on Pattern Recognition, Vienna, Austria, Vol. 2, pp. 210-214, 1996.
[20] S. Arora, D. Bhattacharjee, M. Nasipuri, D. K. Basu and M. Kundu, "Combining multiple feature extraction techniques for handwritten Devanagari character recognition," IEEE Region 10 Colloquium and 3rd International Conference on Industrial and Information Systems, Dec. 2008.
[21] Y. Kimura, A. Suzuki, K. Odaka, “Feature Selection for Character Recognition using Genetic Algorithm,” IEEE Fourth International Conference on Innovative Computing, Information and Control (ICICIC), Kaohsiung , pp. 401-404, Dec. 2009.
Citation
Ajay Indian, Karamjit Bhatia, "A Combinational Approach of Feature Extraction for Offline Handwritten Hindi Numeral Recognition", International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1-8, 2018.
Mutual Exclusive Sleep Awake Distributive Clustering (MESADC): An Energy Efficient Protocol for Prolonging Lifetime of Wireless Sensor Network
Research Paper | Journal Paper
Vol.6 , Issue.4 , pp.1-7, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.17
Abstract
Energy awareness is idiopathic task in wireless sensor network. For prolonging lifetime of wireless sensor network, the use of sensors plays a prerequisite role. Saving sensors energy is the main outfit so that network lifetime will improve. So keeping in mind the sensor remaining energy; a new clustering protocol which will work in sleep awake mode is proposed. Along with this mutual exclusion is used in sleep awake mode to fetch cluster head over communication range. In modernistic stint none of the protocol uses mutual exclusion algorithm in sleep awake mode. The proposed protocol Mutual Exclusive Sleep Awake Distributive Clustering (MESADC) chooses a cluster head in such a manner so that sensor lifetime will improve. If sensor lifetime improves then network’s lifetime automatically improve. The performance of MESADC protocol is compared with HEED protocol. Experimental results were obtained with the help of MATLAB. On the groundwork of the comparison between two protocols one finds that the performance of MESADC protocol is prominent in prolonging lifetime of wireless sensor network as compared with HEED protocol.
Key-Words / Index Term
Sleep Awake, Distributive, Clustering, Sensor, Network
References
[1] Noritaka S, Hiromi M, Hiroki M, Michiharu M, Centralized and Distributed clustering methods for energy efficient wireless sensor Networks. In Proceedings of the International Multi Conference of Engineers and Computer Scientists IMECS, March 2009.
[2] Christophe J. Merlin, Wendi B. Heinzelman, Schedule Adaptation of Low-Power-Listening Protocols for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, vol. 9, no. 5, pp. 672-685, May 2010 .
[3] C.-F. Hein, M. Liu, “Network coverage using low duty-cycled sensors: random and coordinated sleep algorithms” in: Proceedings of the IPSN’04, 2004, pp.
[4] Wendi BH, Anantha PC, Hari B. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. In IEEE transactions on Wireless Communications 2002; 1(4).
[5] Ossama Y, Sonia F. HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks. In IEEE transaction on Mobile Computing 2004; 3(4).
[6] Gaurav G, Mohamed Y. Performance evaluation of load-balanced clustering of wireless sensor networks. In 10th International Conference on Telecommunications, ICT 2003.
[7] Arati M, Dharma PA. TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks. In IEEE 15th international conference on parallel on 2001.
[8] Sangho Y, Junyoung H, Yookun C, Jiman H. PEACH: Power efficient and adaptive clustering hierarchy protocol for wireless sensor networks. In Elsevier International Journal of Computer Communication Network Coverage and Routing Schemes for Wireless Sensor Networks. 2007; 30(14-15): 2842-52.
[9] Yang Y, Wu HH, Chen HH. Short: Shortest hop routing tree for wireless sensor networks. In Proceedings of IEEE ICC, 2006.
[10] Li C, Ye M, Chen G, Wu J. An energy-efficient unequal clustering mechanism for wireless sensor networks, in Proceedings of the 2nd IEEE International conference on Mobile Ad-hoc and Sensor Systems, 2005.
[11] Loscrì V, Morabito G, Marano S. A Two-Levels Hierarchy for Low-Energy Adaptive Clustering Hierarchy (TL-LEACH). In IEEE international conference on Vehicular Technology 2005;
[12]. G. N. S. Abhishek Varma*, G. Aswani Kumar Reddy, Y. Ravi Theja and T.Arunkumar.: Cluster Based Multipath Dynamic Routing (CBDR) Protocol for Wireless Sensor Networks Indian Journal of Science and Technology, Vol 8(S2),17-22, January (2015).
[13]. Stefanos A. Nikolidakis, Dionisis Kandris, Dimitrios D. Vergados, Christos Douligeris.: Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering. Algorithms, 6, 29-42; doi:10.3390/a6010029 (2013).
[14] U. Cetintemel, A. Flinders, Y. Sun, “Power-efficient data dissemination in wireless sensor networks”, in: Proceedings of the ACMMobiDE’03, 2003.
[15] A. Manjeshwar, D. Agrawal, “TEEN: a routing protocol for enhanced efficiency in wireless sensor networks”, in: Proceedings of the IEEE IPDPS 2001, pp. 2009–2012.
[16] J. Sen.: A survey on wireless sensor network security. CoRR, vol. abs/1011.1529, (2010).
[17] C-Y Chong, S.P. Kumar, “Sensor networks: evolution, opportunities and challenges” Proc IEEE 91 (8) (2003) 1247-1256.
[18] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “A survey on wireless sensor networks”, IEEE Common. Mag. 41 (8) (2003) 102-114.
[19] Ameer AA, Mohamed Y. A survey on clustering algorithms for wireless sensor networks. In international journal Elsevier computer communication 2007; 30(14-15).
[20] Jawad, H.M.; Nordin, R.; Gharghan, S.K.; Jawad, A.M.; Ismail, M. Energy-Efficient wireless sensor networks for precision agriculture: A review. Sensors 2017, 17, 1781.
[21] Yashwant Singh, Urvashi Chugh.: Mutual Exclusive Distributive Clustering (MEDC) Protocol for Wireless Sensors Networks. International Journal of Sensors, Wireless Communications and Control Bentham Science Press, Vol. 3 No. 2, (2013)
Citation
B. Gupta, S. Rana, "Mutual Exclusive Sleep Awake Distributive Clustering (MESADC): An Energy Efficient Protocol for Prolonging Lifetime of Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.1-7, 2018.
A Moving Window Search Method for Detection of Pole Like Objects Using Mobile Laser Scanner Data
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.1-6, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.16
Abstract
Pole-Like Objects (PLOs) in the road environment located nearby the road boundary are important roadway assets. They play vital role in the road safety inspection and road planning. In present study a novel automated method for the detection of PLOs from Mobile Laser Scanner (MLS) point cloud data has been proposed. Proposed method includes four basic steps. Initially ground points are roughly filtered out from the input dataset to reduce the processing of un-necessary points; formerly local window search is performed at non-ground points to find out the concentrated point distribution. Principal Component Analysis (PCA) has been implemented at such concentrated distributed points for the identification of PLOs. In last step of proposed method knowledge based information are used for suppressing the false positives and rectifying the output. Proposed method has been tested on a MLS point cloud data of complex road environment and corresponding PLOs are detected having completeness and correctness of 91.48 % and 86.00 % respectively.
Key-Words / Index Term
LiDAR, Pole Like Objects, PCA
References
[1] K.S. Yen, B. Ravani, T.A. Lasky, “LiDAR for Data Efficiency”, WSDOT Research Report, WA-RD 778.1, 2011.
[2] S.I. El-Halawany, D.D. Lichti, “Detection of road poles from mobile terrestrial laser scanner point cloud”, International Workshop on Multi-Platform/Multi-Sensor Remote Sensing and Mapping (M2RSM), pp.1–6, 2011.
[3] C. Brenner, “Extraction of features from mobile laser scanning data for future driver assistance systems”, Advances in GIScience, Lecture Notes in Geoinformation and Cartography, Springer, pp.25-42, 2009.
[4] H. Yokoyama, H. Date, S. Kanai, H. Takeda, “Detection and Classification of Pole-like Objects from Mobile Laser Scanning Data of Urban Environments”, International Journal of CAD/CAM, Vol. 13, No. 2, pp.31-40, 2013.
[5] S. Pu, M. Rutzinger, G. Vosselman, S.O. Elberink, “Recognizing basic structures from mobile laser scanning data for road inventory studies”, ISPRS Journal of Photogrammetry and Remote Sensing 6(66), S28–S39, 2011.
[6] D. Li, S.O. Elberink, “Optimizing Detection of Road Furniture (Pole-Like Objects) in
Mobile Laser Scanner Data”, ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial
Information Sciences II-5/W2: pp. 163–168, 2013.
[7] Y.Z. Chen, H.J. Zhao, R. Shibasaki, “A mobile system combining laser scanners and cameras for urban spatial objects extraction”, Proceedings of the Sixth International Conference on Machine Learning and Cybernetics 2, pp.1729-1733, 2007.
[8] A. Kukko, A. Jaakkola, M. Lehtomki, H. Kaartinen, Y. Chen, “Mobile mapping system and computing methods for modeling of road environment” Proceeding of the Urban Remote Sensing Joint Event , pp.331–338, 2009.
[9] M. Lehtomäki, A. Jaakkola, J. Hyyppa, A. Kukko, H. Kaartinen, “Detection of vertical pole-like objects in a road environment using vehicle-based laser scanning data”, Remote Sensing 2 (3), pp.641–664, 2010.
[10] K. Ishikawa, F. Tonomura, Y. Amano, T. Hashizume, “Recognition of Road Objects from 3D Mobile Mapping Data”, Proc. International Journal of CAD/CAM, vol. 13, No.2, pp.41-48, 2013.
[11] A. Golovinskiy, V. Kim, A. Funkhouser, “Shape-based recognition of 3D point clouds in urban environments”, Proceedings of the international conference on computer vision (ICCV), pp.2154–2161, 2009.
[12] S. Pu, M. Rutzinger, G. Vosselman, S.O. Elberink, “Recognizing basic structures from mobile laser scanning data for road inventory studies”, ISPRS Journal of Photogrammetry and Remote Sensing 6(66), S28–S39, 2011.
Citation
A. Husain, R.C. Vaishya, Md. Omar Sarif, "A Moving Window Search Method for Detection of Pole Like Objects Using Mobile Laser Scanner Data", International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.1-6, 2018.