Multimedia Information Retrieval Using Content and Context Indexing
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.107-111, Feb-2019
Abstract
Multimedia understanding could be a quickrising analysis. Advances in multimedia system understanding area unit connected on to advances in signal knowledge base analysis space. there`s tremendous potential for effective use of multimedia system content through intelligent process, pc vision, pattern recognition, multimedia system databases, and sensible sensors. In reality, each content and context info area unit made sources of knowledge for mining, and therefore the full power of mining and process algorithms is completed solely with the utilization of a mixture of the 2. As digital libraries of pictures area unit speedily growing in size, content primarily based image retrieval has been spotlighted in many fields. During this paper we tend to make a case for content and context primarily based multimedia system retrieval, state of art techniques supported multimedia system retrieval. Then as a case study we tend to implement content primarily based image retrieval exploitation color feature.
Key-Words / Index Term
Information retrieval, Multimedia databases, Content and context links, State of art techniques, Content-based image retrieval
References
[1] Y. Alp Aslandogan and Clement T. Yu ― Techniques and Systems for Image and Video Retrieval‖ IEEE Transactions on knowedge and data engineering, vol. 11, no. 1, January/February 1999
[2] Guo-Jun Qi, Charu Aggarwal, Qi Tian, Heng Ji, and Thomas S. Huang, ―Exploring Context and Content Links in Social Media: A Latent Space Method ‖ IEEE Transactions on Pattern analysis and machine intelligence, vol. 34, no. 5, May 2012
[3] Nabil R. Adam, Rutgers University Aryya Gangopadhyay, University of Maryland, Baltimore County ― Content-Based Retrieval in Digital Libraries ‖ Technical Activities Forum January 1998
[4] Chih-Chin Lai, Member and Ying-Chuan Chen ―A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm‖ IEEE Transactions on Instrumentation and measurement, vol. 60, no. 10, October 2011
[5] Young Deok Chun, Nam Chul Kim and Ick Hoon Jang, ―Content-Based Image Retrieval Using Multiresolution Color and Texture Features‖ IEEE Transactions on multimedia, VOL. 10, NO. 6, OCTOBER 2008
[6] A.W.M. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jain, Content-Based Image Retrieval at the End of the Early Years,‖ IEEETrans. Pattern Analysis and Machine Intelligence, vol. 22, no. 12,pp. 1349-1380, Dec. 2000.
[7] Ja-Hwung Su, Wei-Jyun Huang, Philip S. Yu, Fellow, and Vincent S. Tseng ― Efficient Relevance Feedback for Content-Based Image Retrieval by Mining User Navigation Patterns‖ IEEE Transactions on knowedge and data engineering , vol. 23, no. 3, March2011
[8] D. Eck, P. Lamere, T. Bertin-Mahieux, and S. Green, ―Automatic generation of social tags for music recommendation,‖ in Proc. Advances in Neural Information Processing Systems, 2007.
[9] D. Turnbull, L. Barrington, D. Torres, and G. Lanckriet, ―Semantic annotation and retrieval of music and sound effects,‖ IEEE Trans. Audio, Speech, Lang. Process., vol. 16, pp. 467–476, 2008.
[10] Weiming Hu, Senior Member, IEEE, Nianhua Xie, Li Li, Xianglin Zeng, and Stephen Maybank‖ A Survey on Visual Content-Based Video Indexing and Retrieval‖ IEEE Transactions on Systems, man, and cybernetic—part C: Applications and reviews, vol. 41, no. 6, November 2011
[11] C. H. Hoi, L. S. Wong, and A. Lyu,Chinese university of Hong Kong at TRECVID 2006: ―Shot boundary detection and video search,‖ in Proc. TREC Video Retrieval Eval., 2006.
[12] H. Lu, Y.-P. Tan, X. Xue, and L. Wu, ―Shot boundary detection using unsupervised clustering and hypothesis testing,‖ in Proc. Int. Conf. Commun. Circuits Syst., Jun. 2004, vol. 2, pp. 932–936
Citation
N. Aarthi, "Multimedia Information Retrieval Using Content and Context Indexing", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.107-111, 2019.
Successive and Segmented Watermarking Techniques Based on DWT-SVD and Artificial Bee Colony Algorithm
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.112-118, Feb-2019
Abstract
Multiple watermarks is to convey multiple sets of information designed to suit differing objectives and is used to increase robustness and security with many different methods in which the embedded information is not easily lost. DWT-SVD based successive and segmented watermarking technique is proposed using Artificial Bee Colony Algorithm (ABC). The understanding between the transparency and robustness is considered as an optimization problem and is removed by applying the ABC algorithm. This algorithm is used to obtain the highest possible robustness without losing the transparency. The successive and segmented of multiple watermarking techniques makes the watermarks much more robust to more attacks. The optimization on successive and segmented watermarking achieves more imperceptibility and robustness.
Key-Words / Index Term
Successive and Segmented watermarking, Security, Artificial Bee Colony algorithm, Discrete Wavelet Transform, Singular value decomposition
References
[1]. Jacobson, Roberta Beach, 2001. Copyrights and Wrongs, e-zine focusing on European life and culture, Articles: Part 23.
[2]. Radharani, S. and Valarmathi, M.L., 2011. Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography, International Journal of Computer Applications, 23 (3), pp. 0975 – 8887.
[3]. Mintzer, F. and Braudaway, G. W., 1999, If One watermark is Good, are More Better?, Proceedings of the International Conference on Acoustics, Speech, and Signal Processing, 4, pp. 2067–2070.
[4]. Mascher–Kampfer, A. Stogner, H. and Uhl, A. (2006) “Multiple Re-Watermarking Scenarios”, Proceedings of the 13th International Conference on Systems, Signals, and Image Processing (IWSSIP), pp. 53–56.
[5]. Sheppard, N. P. Shafavi-Naini, R. and Ogunbona, P. (2001) On Multiple Watermarking, Proceedings of the ACM Multimedia and Security Workshop (MMSW), pp. 3–6.
[6]. Yuancheng Li. and Xiaolei Wang. (2009) A Novel Multiple Watermarking Algorithm Based on Bandelet Transform, IEEE Global Congress on Intelligent Systems, pp. 238–242.
[7]. Jagadeesh, B. Rajesh Kumar, P. and Chenna Reddy, P. (2012) Genetic Algorithm Approach for Singular Value Decomposition and Quantization based Digital Image Watermarking, International Journal of Engineering Research and Applications, 2 (2), pp. 1229–1235.
[8]. Mohananthini, N and Yamuna G. (2016) Comparison of Multiple Watermarking Techniques, Journal of Electrical Systems and Information Technology, 3, pp. 68-80.
[9]. Wheeler, GE. Sheppard, NP. andSafavi-Naini, R. 2004 Weighted Segmented Digital Watermarking, Third International Workshop on Digital Watermarking, pp. 89–100.
[10]. Ibrahim AlsonosiNasir and Ahmed b. Abdurrman, 2013 A Robust Color Image Watermarking Scheme based on Image Normalization, In Proceedings of the World Congress on Engineering, 3.
[11]. Mohananthini. N and Yamuna G. 2016 Performance Optimization of Multiple Watermarking Using Genetic Algorithms, International Journal of Enterprise Network Management, 7 (3), pp. 237- 249.
[12]. Mohananthini. N and Yamuna. G. 2015 Multiple Image Watermarking Technique Based on Hybrid DWT-SVD and Artificial Neural Network, International Journal of Applied Engineering Research, 10 (3), pp. 7275-7297.
[13]. Yongchang Chen, Weiyu Yu, and JiuchaoFeng. 2012 A Reliable SVD-DWT Based Watermarking Scheme with Artificial Bee Colony Algorithm, JDCTA, 6.(22), pp. 430 - 439.
Citation
C. Ananth, M. Karthikeyan, "Successive and Segmented Watermarking Techniques Based on DWT-SVD and Artificial Bee Colony Algorithm", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.112-118, 2019.
Emergency Data Transmission for Disaster Planning in MANETs
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.119-125, Feb-2019
Abstract
Wireless Ad-hoc Networks encompass variety of nodes that communicate with one another over a wireless channel that have numerous forms of networks, device networks, ad-hoc networks, and so on. The most drawback in these channels is expounded to security as a result of the secure communication, a very important side of any networking setting, is associate particularly vital challenge in spontaneous networks. A reliable system for such message exchanges is considered to be a particular strength for such organizations. Information security is a more general concern for officers of the armed forces and armed forces personnel is in constant pursuit of better procedures to ensure data protection and integrity. Privacy is needed in Ad-hoc networks. A secured on demand position based private routing algorithm is proposed for communication and which provides a security in Mobile Ad-hoc Network. This proposed is used for security to prevent message hacking information from internal & external attackers.
Key-Words / Index Term
Wireless Network, Ad-hoc Network, secure message transmission, secure message communication
References
[1] Papadimitratos, P. Haas, Z.J, “Secure data communication in mobile ad-hoc networks”, This paper appears in: Selected Areas in Communications, IEEE Journal on Publication Date: Feb. 2006, Volume: 24, Issue: 2, On page(s): 343- 356.
[2] Reza Curtmola Cristina Nita-Rotaru, “BSMR: Byzantine- Resilient Secure Multicast Routing in Multihop Wireless Networks”, IEEE Transactions on Mobile Computing, vol. 8, Issue. 4, pp. 445 - 459, February 2009.
[3] A.Tsirigos and Z.J.Hass (2004), “Analysis of multipath routing, Part 1: The effects on the packet delivery ratio” IEEE Transactions on Wireless Communication., vol.3, no.2, pp: 500-511
[4] Banner, R. Orda, A, “Multipath Routing Algorithms for Congestion Minimization”. This paper appears in: Networking, IEEE/ACM Transactions on Publication Date: April 2007 Volume: 15, Issue: 2, on page(s): 413-424.
[5] P.Papadimitratos and Z.J.Hass, “Secure Routing for Mobile Ad Hoc Networks”, in proceeding of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS-2002).
[6] Papadimitratos, P. Haas, Z.J and E.G.Sirer, “Path set selection in mobile ad hoc Networks”,in Proc 3rd ACM MobiHoc, Lausanne, Switzerland, Jun 2002 ,pp 1-11.
[7] J. G. Jetcheva and D. B. Johnson, “Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks.” In Proc. of MobiHoc, 2001, pp. 33–44.
[8] L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” in Advances in Ultra-Dependable Distributed Systems. IEEE Computer Society Press, 1995.
[9] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad-hoc networks,” in Proc. of CNDS, January 2002, pp. 27–31.
Citation
M.P. Virgin Mary , "Emergency Data Transmission for Disaster Planning in MANETs", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.119-125, 2019.
A Study on Deep Learning Techniques to Improve Bitcoin Price Prediction
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.126-129, Feb-2019
Abstract
Bitcoin is so far is been the most versatile form of the cryptocurrency we came across in recent times, and the one which is widely accepted as well. Its values are varying like anything as we can see the frequent variation in the market value. We can say that this variation is dependent on various factors which a simple linear form of an equation or the method may fail to predict. In such a condition, it is very important that we apply a more efficient way of prediction. Several methods were employed having mathematical models which didn’t give out the expected results. Deep learning methods are widely known to solve such conditions, due to which the Recurrent Neural Networks come into the picture with its ability to learn the problem with the previous literature data. It can analyze the previous value and variations in the bitcoin pricing and using it as its base of knowledge, it can make the predictions more accurate. Even more by restructuring the activation function inside the Recurrent Neural Networks, its prediction accuracy can be further improved.
Key-Words / Index Term
Activation Function, Bitcoin, Deep Learning,Prediction, Recurrent Neural Networks
References
[1] S. Karasu, A. Altan, Z. Sarac, and R. Hacioglu, “Prediction of Bitcoin prices with machine learning methods using time series data,” in 2018 26th Signal Processing and Communications Applications Conference (SIU), 2018, pp. 1–4.
[2] A. K. Jain, Jianchang Mao, and K. M. Mohiuddin, “Artificial neural networks: a tutorial,” Computer (Long. Beach. Calif)., vol. 29, no. 3, pp. 31–44, Mar. 1996.
[3] P. Giudici and I. Abu-Hashish, “What determines bitcoin exchange prices? A network VAR approach,” Financ. Res. Lett., no. February, pp. 0–1, 2018.
[4] T. Panagiotidis, T. Stengos, and O. Vravosinos, “On the determinants of bitcoin returns: A LASSO approach,” Financ. Res. Lett., vol. 27, no. February, pp. 235–240, 2018.
[5] H. A. Aalborg, P. Molnár, and J. E. de Vries, “What can explain the price, volatility and trading volume of Bitcoin?,” Financ. Res. Lett., no. July, pp. 1–11, 2018.
[6] E. Demir, G. Gozgor, C. K. M. Lau, and S. A. Vigne, “Does economic policy uncertainty predict the Bitcoin returns? An empirical investigation,” Financ. Res. Lett., vol. 26, no. January, pp. 145–149, 2018.
[7] G. S. Atsalakis, I. G. Atsalaki, F. Pasiouras, and C. Zopounidis, “Bitcoin price forecasting with neuro-fuzzy techniques,” Eur. J. Oper. Res., 2019.
[8] F. N. Zargar and D. Kumar, “Informational inefficiency of Bitcoin: A study based on high-frequency data,” Res. Int. Bus. Financ., vol. 47, no. April 2018, pp. 344–353, 2018.
[9] A. C. da Silva Filho, N. D. Maganini, and E. F. de Almeida, “Multifractal analysis of Bitcoin market,” Phys. A Stat. Mech. its Appl., vol. 512, pp. 954–967, 2018.
[10] M. El Alaoui, E. Bouri, and D. Roubaud, “Bitcoin price–volume: A multifractal cross-correlation approach,” Financ. Res. Lett., no. September, pp. 1–8, 2018.
[11] D. Stosic, D. Stosic, T. B. Ludermir, and T. Stosic, “Collective behavior of cryptocurrency price changes,” Phys. A Stat. Mech. its Appl., vol. 507, pp. 499–509, 2018.
[12] M. Nakano, A. Takahashi, and S. Takahashi, “Bitcoin technical trading with artificial neural network,” Phys. A Stat. Mech. its Appl., vol. 510, pp. 587–609, 2018.
[13] K. Cho et al., “Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation,” Jun. 2014.
[14] S. Bouktif et al., “Optimal Deep Learning LSTM Model for Electric Load Forecasting using Feature Selection and Genetic Algorithm: Comparison with Machine Learning Approaches †,” Energies, vol. 11, no. 7, p. 1636, Jun. 2018.
[15] A. Graves, A. Mohamed, and G. Hinton, “Speech recognition with deep recurrent neural networks,” in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013, pp. 6645–6649.
[16] S. Hochreiter and J. Urgen Schmidhuber, “Ltsm,” Neural Comput., vol. 9, no. 8, pp. 1735–1780, 1997.
[17] Xin Yao, “Evolving artificial neural networks,” Proc. IEEE, vol. 87, no. 9, pp. 1423–1447, 1999.
[18] L. O. Chua and T. Roska, “The CNN paradigm,” IEEE Trans. Circuits Syst. I Fundam. Theory Appl., vol. 40, no. 3, pp. 147–156, Mar. 1993.
[19] C.-Y. Zhang, C. L. P. Chen, M. Gan, and L. Chen, “Predictive Deep Boltzmann Machine for Multiperiod Wind Speed Forecasting,” IEEE Trans. Sustain. Energy, vol. 6, no. 4, pp. 1416–1425, Oct. 2015.
[20] G. Diakun, L. Fairall, and A. Klug, “© 1986 Nature Publishing Group,” Nature, vol. 324, pp. 698–699, 1986.
[21] “Top Research Papers On Recurrent Neural Networks For NLP Enthusiasts.” [Online]. Available: https://www.analyticsindiamag.com/top-research-papers-on-recurrent-neural-networks-for-nlp-enthusiasts/. [Accessed: 21-Jan-2019].
[22] Sin-Horng Chen, Shaw-Hwa Hwang, and Yih-Ru Wang, “An RNN-based prosodic information synthesizer for Mandarin text-to-speech,” IEEE Trans. Speech Audio Process., vol. 6, no. 3, pp. 226–239, May 1998.
Citation
V. Adarsh, A. Martin, "A Study on Deep Learning Techniques to Improve Bitcoin Price Prediction", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.126-129, 2019.
A Study on Image Restoration and Deconvolution Techniques
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.130-133, Feb-2019
Abstract
Image restoration is the operation of taking a corrupted/noisy image and estimating the clean original image. Corruption may come in many forms such as motion blur, noise and camera misfocus. Deconvolution is an example of image restoration method. The deconvolution tries to invert the blurring of an image that is modeled by the convolution g = f*h+n. Blind deconvolution tries to do this without knowledge of the point spread function h that blurred the image. In this paper, different methods for image restoration viz. Deterministic Filter, Bayesian Estimation and iterative distribution reweighting (IDR) are discussed in detail.
Key-Words / Index Term
Bayesian estimation, blind image deconvolution, Maximum A Posteriori (MAP) estimation, L1-Regularization, Iterative Distribution Reweighting (IDR).
References
[1] Chao Wang, Lifeng Sun, Peng Cui, Zhang, Yang, “Analyzing Image Deblurring Through Three Paradigms”, IEEE Transactions on Image Processing, Vol 21 No.1,2012
[2] Mariana S.C. Almeida and Luis B.Almeida, “Blind and Semi-Blind Deblurring of Natural Images”, IEEE Transactions on Image Processing, Vol 19 No.1,2010
[3] Taeg Sang Cho, C. Lawrence Zitnick, Neel Joshi, Sing Bing Kang, Richard Szeliski, and William T. Freeman, “Image Restoration by Matching Gradient Distributions”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 34, No. 4, April 2012
[4] Charu Khare, Kapil Kumar Nagwanshi, “Implementation and Analysis of Image Restoration Techniques”, International Journal of Computer Trends and Technology,May to June Issue 2011
[5] Mark R.Banham and Aggelos K.Katsaggelos, “Digital Image Restoration”, IEEE Signal Processing Magazine, 1997
[6] Anat Levin,Yair Weiss,Fredo Durand & William T.Freeman , “Understanding Blind Deconvolution Algorithms”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 33 No.1,2011
[7] Leah Bar,Nir Sochen and Nahum Kiryati, “Semi Blind Restoration via Mumford-Shah Regularization”, IEEE Transactions on Image Processing, Vol 15 No.2,2006
[8] Jian Feng Cai,Hui Ji,Zuowei Shen, “Framelet Based Blind Motion Deblurring from a single image”, IEEE Transactions on Image Processing, Vol 21 No.1,2011
[9] O. Milukova, V. Kober, V. Karnaukhov, and I. A. Ovseyevich, “Restoration of Blurred Images with Conditional Total Variation Method”, ISSN 1054_6618, Pattern Recognition and Image Analysis, Vol. 20, No. 2, 2010.
[10] Laura B. Montefusco and Damiana Lazzaro, “An Iterative L1-Based Image Restoration Algorithm With an Adaptive Parameter Estimation”, IEEE Transactions on Image Processing, Vol 21 No.4,2012
[11] Wangmeng Zuo and Zhouchen Lin ,”A Generalized Accelerated Proximal Gradient Approach for Total-Variation-Based Image Restoration”, IEEE Transactions on Image Processing, Vol 20 No.10,2011
Citation
S. Santhi, "A Study on Image Restoration and Deconvolution Techniques", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.130-133, 2019.
Image Resolution Enhancement Using Bayesian Inla Approximation
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.134-136, Feb-2019
Abstract
Super-resolution (SR) is a technique to enhance the resolution of an image without changing the camera resolution, through using software algorithms. In this context, this paper proposes a fully automatic SR algorithm, using a recent nonparametric Bayesian inference method based on numerical integration, known in the statistical literature as integrated nested Laplace approximation (INLA). By applying such inference method to the SR problem, this paper shows that all the equations needed to implement this technique can be written in closed form. Moreover, the results of several simulations show that the proposed algorithm performs better than other SR algorithms recently proposed.
Key-Words / Index Term
Bayesian inference, Closed form, Integrated Nested Laplace Approximation (INLA), Nonparametric, Super-resolution (SR)
References
[1] N. P. Galatsanos, V. Z. Mesarovic, R. Molina, and A. K. Katsaggelos, “Hierarchical Bayesian image restoration from partially-known blurs,” IEEE Trans. Image Process., vol. 9, no. 10, pp. 1784–1797, Oct. 2000.
[2] M. Tipping and C. Bishop, “Bayesian image super-resolution,” in Advances in Neural Information Processing Systems, Cambridge, MA: MIT Press, pp. 1303–1310, 2003.
[3] T. Pham, L. Van Vliet, and K. Schutte, “Robust fusion of irregularly sampled data using adaptive normalized convolution,” EURASIP J. Appl.Signal Process., vol. 2006, pp. 1–12, Jan. 2006.
[4] M. Vetterli, “Superresolution images reconstructed from aliased images,” in Proceedings of SPIE/IS&T Visual Communications and Image Processing Conference, T. Ebrahimi and T. Sikora, Eds., vol. 5150 of Proceedings of SPIE, Switzerland, 2003.
[5] P. Vandewalle, S. Süsstrunk, and M. Vetterli, “A frequency domain approach to registration of aliased images with application to superresolution,” EURASIP J. Appl. Signal Process, vol. 2006, pp. 1–14, Mar. 2006.
[6] M. Irani and S. Peleg, “Motion analysis for image enhancement: Resolution, occlusion, and transparency,” J. Visual Commun. Image Represent., vol. 4, no. 4, pp. 324–335, 1993.
[7] A. Patti, M. Sezan, and A. M. Tekalp, “Superresolution video reconstruction with arbitrary sampling lattices and nonzero aperture time,” IEEE Trans. Image Process., vol. 6, no. 8, pp. 1064–1076, Aug. 1997.
[8] B. Tom and A. Katsaggelos, “An iterative algorithm for improving the resolution of video sequences,” Proc. SPIE Int. Soc. Opt. Eng., vol. 2727, no. 3, pp. 1430–1438, 1996.
Citation
M. Hemalatha, "Image Resolution Enhancement Using Bayesian Inla Approximation", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.134-136, 2019.
Bilevel Feature Extraction-Based Text Mining for Fault Diagnosis of Railway Systems
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.137-139, Feb-2019
Abstract
A vast amount of text data is recorded in the forms of repair verbatim in railway maintenance sectors. Efficient text mining of such maintenance data plays an important role in detecting anomalies and improving fault diagnosis efficiency. However, unstructured verbatim, high-dimensional data, and imbalanced fault class distribution pose challenges for feature selections and fault diagnosis. We propose a bilevel feature extraction-based text mining that integrates features extracted at both syntax and semantic levels with the aim to improve the fault classification performance. We first perform an improved χ2 statistics-based feature selection at the syntax level to overcome the learning difficulty caused by an imbalanced data set. Then, we perform a prior latent Dirichlet allocation-based feature selection at the semantic level to reduce the data set into a low-dimensional topic space. Finally, we fuse fault features derived from both syntax and semantic levels via serial fusion. The proposed method uses fault features at different levels and enhances the precision of fault diagnosis for all fault classes, particularly minority ones. Its performance has been validated by using a railway maintenance data set collected from 2008 to 2014 by a railway corporation. It out performs traditional approaches.
Key-Words / Index Term
Bilevel, Feature Selection, Feature Extraction, Railway, Text Mining
References
[1] D. G. Rajpathak, “An ontology based text mining system for knowledge discovery from the diagnosis data in the automotive domain,” Comput.Ind., vol. 64, no. 5, pp. 565–580, Jun. 2013.
[2] W. Wang, H. Xu, and X. Huang, “Implicit feature detection via aconstrained topic model and SVM,” in Proc. Conf. Empirical Methods Natural Lang. Process., Seattle, WA, USA, 2013, pp. 903–907.
[3] L. Yin, Y. Ge, K. Xiao, X. Wang, and X. Quan, “Feature selection for high-dimensional imbalanced data,” Neuro computing, vol. 105, pp. 3–11,Apr. 2013.
[4] Z. Zhai, B. Liu, H. Xu, and P. Jia, “Constrained LDA for grouping productfeatures in opinion mining,” in Proc. 15th Pacific-Asia Conf. Adv. Knowl.Discov. Data Mining, Shenzhen, China, 2011, vol. 1, pp. 448–459.
[5] X. Ding, Q. He, and N. Luo, “A fusion feature and its improvementbased on locality preserving projections for rolling element bearingfault classification,” J. Sound Vibration, vol. 335, pp. 367–383,Jan. 2015.
[6] L. Huang and Y. L. Murphey, “Text mining with application to engineeringdiagnostics,” in Proc. 19th Int. Conf. IEA/AIE, Annecy, France, 2006,pp. 1309–1317.
[7] J. Silmon and C. Roberts, “Improving switch reliability with innovativecondition monitoring techniques,” Proc. IMechE, F C J. Rail RapidTransit, vol. 224, no. 4, pp. 293–302, 2010.
[8] D. Blei, A. Ng, and M. Jordan, “Latent Dirichlet allocation,” J. Mach.Learn. Res., vol. 3, pp. 993–1022, Jan. 2003.
[9] J. Chang, J. Boyd-Graber, C.Wang, S. Gerrish, and D. Blei, “Reading tealeaves: How humans interpret topic models,” Neural Inf. Process. Syst.,vol. 22, pp. 288–296, 2009.
[10] D. A. Cieslak and N. V. Chawla, “Learning decision trees for unbalanceddata,” in Proceedings of the 2008 European Conference on MachineLearning and Knowledge Discovery in Databases-Part I. Berlin,Germany: Springer-Verlag, 2008, pp. 241–256.
[11] T. Kailath, “The divergence and Bhattacharyya distance measures in signalselection,” IEEE Trans. Commun. Technol., vol. 15, no. 1, pp. 52–60,Feb. 1967.
[12] J. Yang, J. Yang, D. Zhang, and J. Lu, “Feature fusion: Parallel strategyvs. serial strategy,” Pattern Recognit., vol. 36, no. 6, pp. 1369–1381,Jun. 2003.
[13] C. Drummond and R. C. Holte, “C4. 5, class imbalanced, and cost sensitivity:Why under-sampling beats over-sampling,” in Proc. WorkshopLearn. Imbalanced Datasets II, ICML, Washington, DC, USA, 2003,pp. 1–8.
[14] X. Liu, J. Wu, and Z. Zhou, “Exploratory undersampling for classimbalancelearning,” IEEE Trans. Syst., Man Cybern., B, vol. 39, no. 2,pp. 539–550, Apr. 2009.
[15] D. Margineantu and T. G. Dietterich, “Learning decision trees for lossminimization in multi-class problems,” Dept. Comput. Sci., Oregon StateUniv., Corvallis, OR, USA, Tech. Rep., 1999.
[16] M. V. Joshi, R. Agarwal, and V. Kumar, “Predicting rare classes: Canboosting make any week learner strong?” in Proc. 8th ACM SIGKDDInt. Conf. Knowl. Discov. Data Mining, Edmonton, AB, Canada, 2002,pp. 297–306.
[17] Y. Tang, Y. Zhang, and N. V. Chawla, “SVMs modeling for highly imbalancedclassification,” IEEE Trans. Syst., Man Cybern., B, vol. 39, no. 1,pp. 281–288, Feb. 2009.
[18] G. Weiss, “Mining with rarity: A unifying framework,” ACM SIGKDDExplorations Newslett.—Spec. Issue Learn. Imbalanced Datasets, vol. 6,no. 1, pp. 7–19, Jun. 2004.
[19] D. Mladenic and M. Grobelnik, “Feature selection for unbalanced classdistribution and naive Bayes,” in Proc. 16th Int. Conf. Mach. Learn., Bled,Slovenia, 1999, pp. 258–267.
[20] Z. Zheng, X.Wu, and R. Srihari, “Feature selection for text categorizationon imbalanced data,” ACM SIGKDD Explorations Newslett.—Spec. IssueLearn. Imbalanced Datasets, vol. 6, no. 1, pp. 80–89, Jun. 2004.
Citation
D.Keerthanaa, C. Premila Rosy, "Bilevel Feature Extraction-Based Text Mining for Fault Diagnosis of Railway Systems", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.137-139, 2019.
Long Range Interpersonal Communication in Education
Survey Paper | Journal Paper
Vol.07 , Issue.04 , pp.140-150, Feb-2019
Abstract
Informal communication has turned out to be a standout amongst the most mainstream specialized instruments to have advanced over the past decade, making it a ground-breaking new data sharing asset in the public eye. To date understanding the capability of Long range informal communication Sites (Social Networking Sites SNSs) past their relaxation utilizes has been extremely confined in various regions. This paper centers around the utilization of SNSs in a learning domain and the effect this could have on scholastic practices. While without a doubt, because of the exceptionally easygoing nature of person to person communication, there are not kidding worries over how it could be incorporated in a learning situation; the potential positive results are numerous and shifted. As a specialized device, its viability is now showing in the millions who use these systems to impart once a day. So it is possible that instructors ought to have the capacity to make a learnscape - a situation for formal and casual learning - that holds fast to instructive rules, yet additionally outfits the social emotionally supportive network of these on-line networks. This paper looks at the dangers included in the production of this new learning nature, and investigates the difficulties looked by both innovation specialists also, educators in conveying a genuinely inventive and successful new way to deal with instruction.
Key-Words / Index Term
Web Platform, Social Learnig, Rich User Experiences
References
[1] Anderson, C. (2006). People power.Wired Magazine.
Retrieved from http://www.wired.com/wired/ archive/14.07/people.html
[2] Arnold, N., & Paulus, T. (2010). Using a social networking site for experiential learning: Appropriating, lurking, modeling and community building.The Internet and Higher Education, 13, 188–196. doi:10.1016/j.iheduc.2010.04.002
[3] Beldarrain, Y. (2006). Distance education trends: Integrating new technologies to foster student interaction and collaboration. Distance Education, 27(2), 139–153. doi:10.1080/01587910600789498
[4] Boettcher, J. (2007). Ten core principles for designing effective learning environments: Insights from brain research and pedagogical theory. Innovate Journal of Online Education, 3(3).
[5] Bowers-Campbell, J. (2008). Cyber ‘pokes’: Motivational anecdote for developmental college readers. Journal of College Reading and Learning, 39(1), 74–87.
[6] Bubas, G., Coric, A., &Orehovacki, T. (2011, May 23-27). The integration of students’ artifacts created with Web 2.0 tools into Moodle, blog, wiki, e-portfolio and Ning. In Proceedings of the 34th International Convention, Croatia (pp. 1084-1089).
[7] Conole, G., & Culver, J. (2010). The design of Cloudworks: Applying social networking practice to foster the exchange of learning and teaching ideas and designs. Computers & Education, 54, 679–692. doi:10.1016/j.compedu.2009.09.013
[8] Cramer, M., & Hayes, G. (2010). Acceptable use of technology in schools: Risks, policies, and promises. IEEE Pervasive Computing / IEEE Computer Society [and] IEEE Communications Society, 9(3), 37–44. doi:10.1109/MPRV.2010.42
[9] Johnson, D. W., & Johnson, R. T. (2004). Cooperation and the use of technology.In Jonassen, D. (Ed.), Handbook of research on educational communications and technology (2nd ed., pp. 785–811). Mahwah, NJ: Lawrence Erlbaum.
[10] Kapp, K. (2006). Gadgets, games and gizmos: Informal learning at Nick.com. Retrieved from http://www.kaplaneduneering.com/kappnotes/index.hp/2006/12/gadgets-games-and-gizmos-informal/
[11] Kussmaul, C. (2011, July 14-16). Wikis for education - helping students communicate and collaborate. In Proceedings of the IEEE International Conference on Technology for Education, Madras, Tamil Nadu (pp. 274-278).
[12] Mason, R., &Rennie, F. (2007). Using Web 2.0 for learning in the community.The Internet and Higher Education, 10, 196–203. doi:10.1016/j. iheduc.2007.06.003
[13] Mason, R., &Rennie, F. (2008). E-learning and social networking handbook: Resources for higher education (1st ed.). New York, NY: Routledge.
[14] Mazer, J. P., Murphy, R. E., & Simonds, C. J. (2007). I’ll see you on ‘Facebook’: The effects of computer mediated teacher self-disclosure on student motivation, affective learning, and classroom
climate. Communication Education, 56(1), 1–17. doi:10.1080/03634520601009710
[15] New Media Consortium. (2011). The Horizon report 2011 edition.Retrieved from http://www.nmc.org/ horizon-project/horizon-reports/horizon-report-k- 12-edition.
[16] O’Reilly, T. (2007). What is Web 2.0: Design patterns and business models for the next generation of software.Communications & Strategies, 65(1), 17–37.
[16] Oblinger, D., &Oblinger, J. (2005). Educating the net generation. Boulder, CO: Educause.
[17] Olson, G., Mark, G., Churchill, E., &Rotman, D. (2010). New missions for sociotechnical infrastructure.Computer, 43(11), 37–43. doi:10.1109/ MC.2010.321
[18] Prensky, M. (2001). Digital natives, digital immigrants.Horizon, 9(5), 1–6. doi:10.1108/10748120110424816
[19] Ryan, S. D., Magro, M. J., & Sharp, J. H. (2011). Exploring educational and cultural adaptation through social networking sites.Journal of Information Technology Education, 10, 1–16.
[20] Shuler, C. (2009). Pockets of potential: Using mobile technologies to promote children’s learning. New York, NY: Joan Ganz Cooney Centre. Retrieved from http://www.joanganzcooneycenter.org/upload_kits/ Pockets_of_potential_1_.pdf
[21] Tsai, W.-T., Li, W., Elston, J., & Chen, Y. (2011). Collaborative learning using wiki web sites for computer science undergraduate education: A case study. IEEE Transactions on Education, 54(1), 114–124. doi:10.1109/TE.2010.2046491
[22] Wang, C., & Turner, D. (2004, April 5-7). Extending the wiki paradigm for use in the classroom. In Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, NV (pp. 255-259).
Citation
S. Chitra, "Long Range Interpersonal Communication in Education", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.140-150, 2019.
Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm
Research Paper | Journal Paper
Vol.07 , Issue.04 , pp.151-152, Feb-2019
Abstract
Internet of Things is a new pattern which provides a set of new services for the next form of technological development. IOT in the sense, it is a “universal global neural network” in the cloud which connects various things. The form of communication that is either human-device, or human-human but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a future vision , IoT Architecture , Applications and its Challenges.
Key-Words / Index Term
Vision, Challenges, Applications, Architecture
References
[1] Y. Amir, Y.Kim, C. Nita-Rotaru, “Secure communication using contributory key agreement”, IEEE Transactions on Parallel and Distributed systems, pp. 468-480,2009.
[2] M. Bellare, D. Pointcheval, P. Rogaway, ” Authenticated Key exchange secure against dictionary attacks”, IN Proc. Of Eurocrypt, pp. 139-155.2010
[3] S. Blakke Wilson, A. Menezes, “ Entity authentication and authenticated transport protocols employing asymmetric techniques”, SPRINGER 1997.
Citation
V. Vinothini, C. Muthukumaran, "Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.151-152, 2019.
Comparison of Cloud Computing and Grid Computing: A Review
Review Paper | Journal Paper
Vol.07 , Issue.04 , pp.153-156, Feb-2019
Abstract
Cloud computing emerges as one of the hottest topic in field of information technology. Cloud computing is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. This topic discusses the grid and cloud computing in basics techniques. Typically, a grid works on various tasks within a network, but it is also capable of working on specialized applications. It is designed to solve problems that are too big for a supercomputer while maintaining the flexibility to process numerous smaller problems. Cloud computing is the delivery of computing services services–servers, storage, databases, networking, software, analytics, intelligence and more-over the Internet(“the cloud”) to offer faster innovation, flexible resources and economies of scale.
Key-Words / Index Term
Bandwidth, Software as a Service, Wide area Network, deployment, Middleware
References
[1] Randolph Barr, QualysInc, “How To Gain Comfort In Losing Control To The Cloud”.
[2] Voas.J, & Zhang, J. (March/April 2009) Cloud Computing: New Wine or Just a New Bottle? IEEE ITPro, pp.15–17.
[3] Radarnetworks&Novaspivak; http://radarnetworks.com
[4] Greg Boss, Padma Malladi, Dennis Quan, Linda Legregni, Harold Hall, HiPODS, www.ibm.com/developerworks/ websphere/zones/hipods/
[5] http://www.wampserver.com/en/ [accessed on 15 December 2012]
[6] H. Kargupta and C. Kamath and P. Chan, Distributed and Parallel Data Mining: Emergence, Growth, and Future Directions, In: Advances in Distributed and Parallel Knowledge Discovery.
[7] Ian Foster and Carl Kesselman (eds), The Grid: Blueprint for a New Computing Infrastructure, 1st edition, Morgan Kaufmann Publishers, San Francisco, USA (1 November 1998), ISBN: 1558604758.
[8] GlobalGrid Forum: http://www.ggf.org
[9] Kunszt, Peter Z. (April 2002).The Open Grid Services Architecture – A Summary and Evaluation, http://edms.cern.ch/file/350096/1/OGSAreview.pdf.
[10] Dialani, V., Miles, S., Moreau, L., Roure, D.D. and Luck, M. (August 2002). Transparent Fault Tolerance for Web Services Based Architectures. Proceedings of 8th International Europar Conference (EURO-PAR ’02), Paderborn,Germany. Lecture Notes in Computer Science, Springer-Verlag.
Citation
S. Razool Begum, S. Suganya, "Comparison of Cloud Computing and Grid Computing: A Review", International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.153-156, 2019.