A Model to Detect Heart Disease using Machine Learning Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.1-5, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.15
Abstract
Heart disease also refers to conditions that involve narrowed or blocked blood vessels that can lead to a heart attack, chest pain (angina) or stroke. This paper presents a model for detecting heart disease using machine learning algorithm. The methodology adopted in this research is Agile Methodology, which follows planning, requirements analysis, designing, coding, testing and documentation in parallel during the stage of production process. In this paper a Heart Dataset was trained using four different machine learning algorithms (K-Nearest Neighbours Classifier, Support Vector Classifier, Decision Tree Classifier and Random Forest Classifier). The algorithm with the best accurate result was used in making predictions. This model was deployed to the web using flask (a python framework), it takes 13 inputs from the user in order to make prediction. The model is implemented using python programming language and flask (a web base framework). This paper uses a Decision Tree Classifier Algorithm and the results obtained from the prediction shows an accuracy of about 98.83%, which is really encouraging.
Key-Words / Index Term
Heart Disease, Machine Learning, K-Nearest Neighbors, Support Vector machine, Decision Tree, Random Forest
References
[1]. K. Vanisree, S. Jyothi, “Decision Support System for Congenital Heart Disease Diagnosis based on Signs and Symptoms using Neural Networks”, International Journal of Computer Applications vol.19, issue.6, pp.6 – 12, 2011.
[2]. S.F. Weng, J. Reps, J. Kai, J.M. Garibaldi, N. Qureshi, “Can Machine-Learning Improve Cardiovascular Risk Prediction Using Routine Clinical Data”, vol.1, issue.12, pp. e0174944, 2017.
[3]. M. Thiyagaraj, G. Suseendran, “Survey on heart disease prediction system based on data mining techniques”, Indian Journal of Innovations and Developments vol.6 issue.1, pp.1-9, 2017.
[4]. C.S. Dangare, S.S. Apte, “Improved Study of Heart Disease Prediction System using Data Mining Classification Techniques”, International Journal of Computer Applications vol.47, issue.10, pp. 44-48, 2012.
[5]. S. Palaniappan, R. Awang, “Intelligent heart disease prediction system using data mining techniques”, In 2008 IEEE/ACS international conference on computer systems and applications, pp. 108-115, 2008.
[6]. C.B.C. Latha, S.C. Jeeva, “Improving the accuracy of prediction of heart disease risk based on ensemble classification techniques”, Informatics in Medicine, Unlocked 16, pp.100203, 2019.
Citation
O.E. Taylor, P. S. Ezekiel, F.B. Deedam Okuchaba, "A Model to Detect Heart Disease using Machine Learning Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.1-5, 2019.
A Novel Approach for Missing Value Replacement in MLP-RMSProp Based Classification Model
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.6-19, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.619
Abstract
Data Preprocessing has become a vital task to be carried out in the Data Mining process. The data becomes the most important resource due to its significance in various domains. However, it is hard to gather every data and saves it in real-time that lead to few missing data. It is not preferable to omit the missing data due to the fact that even a few amount of data acts as a significant part in the outcome. Missing value replacement acts as a main process to handle missing data prior to the prediction of hidden pattern, that exist in the dataset. This paper presents a new, Linear Regression based missing valve replacement in the MLP-RMSprop based classification model to handle missing data. Here, linear regression model is applied to predict the values to replace the missing data, which will help to improve the classification process. Then, multilayer perceptron (MLP) classifier is applied to classify the data which further tuned by the use of root mean square propagation (RMSProp) model. An extensive implementation takes place on three benchmark dataset to showcase the betterment of the presented model. The resultant values from simulation indicated that the projected model offered supreme performance over the other models.
Key-Words / Index Term
Missing value; Classification; RMSProp; Linear Regression
References
[1] Horton, N. J., Lipsitz, S. R., Orton, N. J. H., &Ipsitz, S. R. L. (2001). Multiple Imputation in Practice : Comparison of Software Packages for Regression Models With Missing Variables. The American Statistician, 55(3), 244–254.
[2] Batista, G. E. A. P. A., &Monard, M. C. (2002). A Study of K -Nearest Neighbour as an Imputation Method. In Soft Computing Systems: Design, Management and Applications (pp. 251–260).
[3] Malarvizhi, M. R., &Thanamani, A. S. (2012). K-Nearest Neighbor in Missing Data Imputation. International Journal of Engineering Research and Development, 5(1), 5–7.
[4] Soltanveis, F. (2016). Using Parametric Regression and KNN Algorithm With Missing Handling For Software Effort Prediction. In Artificial Intelligence and Robotics (IRANOPEN) (pp. 77–84).
[5] Chen, Q., Cho, M., Kim, M., & Wang, C. (2016). Using link-preserving imputation for logistic partially linear models with missing covariates. Computational Statistics and Data Analysis, 101, 174–185.
[6] Amiri, M., & Jensen, R. (2016). Missing data imputation using fuzzy-rough methods. Neurocomputing, 205, 152–164.
[7] Lee, K. J., & Carlin, J. B. (2010). Multiple Imputation for Missing Data : Fully Conditional Specification Versus Multivariate Normal Imputation. American Journal of Epidemiology, 171(5), 624–632.
[8] Sahri, Z., Yusof, R., &Watada, J. (2014). FINNIM : Iterative Imputation of Missing Values in Dissolved Gas Analysis Dataset. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 10(4), 2093–2102.
[9] Belanche, L. A., Kobayashi, V., &Aluja, T. (2014). Handling missing values in kernel methods with application to microbiology data. Neurocomputing, 141, 110–116.
[10] Burgette, L. F., & Reiter, J. P. (2010). Multiple Imputation for Missing Data via Sequential Regression Trees. American Journal of Epidemiology 172(9), 1070-1076.
[11] Kwon, T. Y., & Park, Y. (2015). A new multiple imputation method for bounded missing values. Statistics and Probability Letters, 107, 204–209.
[12] Deb, R., &Liew, A. W. (2016). Missing value imputation for the analysis of incomplete traffic accident data. Information Sciences, 339, 274–289.
[13] Sovilj, D., Eirola, E., Miche, Y., Björk, K., Nian, R., Akusok, A., &Lendasse, A. (2016). Extreme learning machine for missing data using multiple imputations. Neurocomputing, 174, 220–231.
[14] https://archive.ics.uci.edu/ml/datasets/Chronic_Kidney_Disease
[15] https://sci2s.ugr.es/keel/missing.php
[16] Tarkhaneh, O. and Shen, H., 2019. Training of feedforward neural networks for data classification using hybrid particle swarm optimization, Mantegna Lévy flight and neighborhood search. Heliyon, 5(4), p.e01275.
[17] Sartakhti, J.S., Zangooei, M.H. and Mozafari, K., 2012. Hepatitis disease diagnosis using a novel hybrid method based on support vector machine and simulated annealing (SVM-SA). Computer methods and programs in biomedicine, 108(2), pp. 570-579.
[18] K.D. Patel, "Review on Techniques in Natural Language Processing", International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.5, pp.1-4, 2019.
[19] Amin Rezaeipanah, Zahra Abshirini, Milad Boshkani Zade, "Solving University Course Timetabling Problem Using Parallel Genetic Algorithm", International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.5, pp.5-13, 2019.
Citation
G. Suresh, S. Saraswathi, "A Novel Approach for Missing Value Replacement in MLP-RMSProp Based Classification Model," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.6-19, 2019.
"Alexa, tell me …" - A forensic examination of the Amazon Echo Dot 3 rd Generation
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.20-29, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.2029
Abstract
In the recent past, smart speakers and personal assistants like Alexa have been used as evidence in different criminal cases. With more than 6 million Echo devices in 2019 worldwide, there is a good chance for the constantly active devices to record criminal behavior. That is reason enough to take a closer look at the subject. This article discusses different starting points for a forensic investigation of the latest generation of the Echo Dot smart speaker. Therefore, the paper examines three possible aspects for the forensic analysis of the Echo 3 the latest generation of this device. In hardware analysis, the focus is not only on the general examination of the extracted data but also on validating the existing methods for data extraction. A second focus is the cloud-side analysis. Since this type of analysis requires the knowledge of credential data, a client-side analysis will take place too. The last is done because the use of at least one Companion Client is necessary to operate and control Alexa-capable devices. The main findings of this study are presented in this article.
Key-Words / Index Term
Amazon Echo 3, digital forensics, hardware analysis, IoT, IPA
References
[1] L. French, “Virtual Case Notes: Not Only Can Alexa Eavesdrop - She Can Also Testify Against You“, Forensic Magazine, May 10, pp.1-3, 2019.
[2] S. Yadav, S. Srivastava, M. Singhal, “Smart Home Automation Using Voice Recognition”, International Journal of Computer Sciences and Engineering (IJCSE), Vol.7, Issue.2, pp.560-563, 2019.
[3] P. Naik, N. Telkar, A. Patil, ”Smart Home Automation Technique using IoT” , International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), Vol.2, Issue.3, pp.2456-3307, 2017.
[4] M. Chung, H. Iorga, J. Voas, “Alexa, can i trust you?” Computer, Vol.50, Issue.9, pp.100-104, 2017.
[5] G. López, L. Quesada, L.A. Guerrero, “Alexa vs. siri vs. cortana vs. google assistant: A comparison of speech-based natural user interfaces”. Springer International, Advances in Human Factors and System Interactions, Advances in Intelligent Systems and Computing Vol. 592, pp.241-250, 2018.
[6] H. Chung, J. Park, S. Lee, “Digital forensic approaches for amazon alexa ecosystem”, In Proceeding of the 17th Annual DFRWS, USA, pp.15-25, 2017.
[7] S. Li, K-K. Choo, W. Qindong, J. William, “IoT Forensics: Amazon Echo as a Use Case”, 2019. doi:10.1109/JIOT.2019.2906946
[8] M. Ford and W. Palmer, “Alexa, are you listening to me? an analysis of alexa voice service network trace”. Vol.23 Issue.1, pp. 67-79, 2019.
[9] B. Copos, K. Levitt, M. Bishop, and J. Rowe, “Is anybody home? inferring activity from smart home network traffic,” in Security and Privacy Workshops (SPW), 2016 IEEE, pp.245–251, 2016.
[10] S. Vasile, D. Oswald, T. Chothia, “Breaking all the things - a systematic survey of firmware extraction techniques for IoT devices”. Smart Card Research and Advanced Applications, Cham, pp.171-185, 2019.
[11] M. Kirmani, M.T. Banday, “Digital Forensics in the Context of the Internet of Things”, 2019. doi: 10.4018/978-1-5225-5742-5.ch011
[12] E. Oriwoh, D. Jazani, G. Epiphaniou, P. Sant, “Internet of things forensics: Challenges and approaches”. In Proceedings of the 9th IEEE Int. Conf. Collaborative Computing: Networking, USA, pp.608-615, 2013.
[13] J.R. Shackleton, “Alexa, amazon assistant or government infor-mant.”, U. Miami Bus. L. Rev., Vol.27, Issue.2, pp.301-227, 2019.
[14] S. Li, K.R. Choo, Q. Sun, W. Buchanan, J. Cao., “IoT forensics: Amazon Echo as a use case.” IEEE Internet of Things, Vol.6, Issue.4, pp.6487-6497, 2019.
[15] A. Nieto, R. Roman, and J. Lopez, “Digital witness: Safeguarding digital evidence by using secure architectures in personal devices,” IEEE Network, Vol.30, Issue.6, pp.34–41, 2016.
[16] Q. Do, B. Martini, K.-K. R. Choo, “Cyber-physical systems information gathering: A smart home case study,” Computer Networks, Vol.138, pp.1–12, 2018.
[17] N.-A. Goudbeek, R.C. Kim-Kwang, “A forensic investigation framework for smart home environment,” in In Proceedings of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2018). IEEE, , p. 1, 2018.
[18] D. Mishra, “Internet of Everything Advancement Study in Data Science and Knowledge Analytic Streams”: International Journal of Scientific Computer Science and Engineering Vol.6, Issue.1, pp.30-36, 2018.
Citation
D. Pawlaszczyk, J. Friese, C. Hummert, ""Alexa, tell me …" - A forensic examination of the Amazon Echo Dot 3 rd Generation," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.20-29, 2019.
Voice Enabled Smart Home Assistant for Elderly
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.30-37, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.3037
Abstract
In this paper we present our project that focuses on developing a Voice enabled Smart Home Assistant that will help find items in a home and also support natural and secure interaction using voice recognition.The software will be helpful for elderly people and those with Alzheimer`s disease to help find items at home. It can also be used by people who often forget where they keep their things as well as large organizations to manage complex inventory, without the friction and multiple steps of keeping inventory updated. The project will be relevant to society, as users will be able to communicate with the Smart Home Assistant in a natural way and security will also be ensured as no unknown users will have access to the software. The software can also be accessed through mobile application.The Voice enabled Smart Home Assistant will employ natural language processing techniques to understand the user’s request to identify the location of the object and report it to the user. The software will be integrated with Amazon Alexa which is a cloud-based voice service and the users can access the software using the Amazon Echo device.
Key-Words / Index Term
Personal Assistant, Natural Language Processing, Voice Recognition
References
[1] Hyunji Chung, Sangjin Lee , “Intelligent Virtual Assistant knows your Life”, Computers and Society, Vol. 42, pp. 201–213, 2017.
[2] Abhay Dekate, Chaitanya Kulkarni , Rohan Killedar , “Study of Voice Controlled Personal Assistant Device”, International Journal of Computer Trends and Technology(IJCTT),Vol.42, Issue.1, pp. 52–63, 2016.
[3] Veton Kepuska , “Comparing Speech Recognition Systems(Microsoft API,Google API and CMU Sphinx)”, International Journal of Engineering Research and Application, Vol.07, Issue.3(Part-2), pp. 20-24, 2017.
[4] Ashiq Anjum, “Video Stream Analysis in Clouds: An Object Detection and Classification Framework for High Performance Video Analytics”, Proceeding of Transactions on Cloud Computing, University of Derby, United Kingdom, pp. 125–218.
Citation
Sujitha Perumal, Mohammed Saqib Javid, "Voice Enabled Smart Home Assistant for Elderly," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.30-37, 2019.
Implementation of K-Means Clustering in Big Data Environment
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.38-44, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.3844
Abstract
In recent years the digital data is grown much frequently. Handling and processing of such bulky data are much complex and need the attention of a human. Moreover, the existing techniques and methods are not much suitable to deal with this complex nature of computation. To deal with such a complex nature of computation, the big data analytics played an essential role. In this presented work the unsupervised learning technique namely k-means clustering is implemented initially and their performance is measured. During this to enhance the performance of the system a new modified k-means clustering algorithm is proposed by improving the centroid selection technique and using the RBF kernel. The comparative performance analysis of both the versions of k-means clustering demonstrate the modified k-means clustering is efficient and has the low algorithm run time. Therefore it is a promising approach for analytics, thus it’s a future extension that is also presented in this work.
Key-Words / Index Term
Big Data, Big Data Analytics, Unsupervised learning, Clustering Algorithm, improvements
References
[1] R. H. Hariri, E. M. Fredericks, K. M. Bowers, “Uncertainty in big data analytics: survey, opportunities, and challenges”, J Big Data (2019) 6:44, https://doi.org/10.1186/s40537-019-0206-3
[2] A. Patel, M. Jaiswal, R. K. Chawda, “An Approach to Predict Train Delay Using Big Data Analytic Approaches”, International Journal of Advanced Research in Computer and Communication Engineering, ISO 3297:2007 Certified, Vol. 7, Issue 3, March 2018
[3] Z. P. Reddy, P.N.V.S. P. Kumar, “Comparing the Word count Execution Time in Hadoop & Spark”, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 3 Issue 10, October 2016, ISSN (Online) 2348 – 7968
[4] F. C. Yayah, K. I. Ghauth, C. Y. Ting, “Adopting Big Data Analytics Strategy in Telecommunication Industry”, Journal of Computer Science & Computational Mathematics, Volume 7, Issue 3, September 2017, DOI: 10.20967/jcscm.2017.03.002
[5] C. L. P. Chen, C. Y. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data”, Information Sciences 275 (2014) 314–347
[6] L. Xiangi, G. Zhao, Q. Li, W. Hao, F. Li, “TUMK-ELM: A Fast Unsupervised Heterogeneous Data Learning Approach”, VOLUME 6, 2018, 2169-3536, 2018 IEEE
[7] N. Hajj, Y. Rizk, M. Awad, “A MapReduce Cortical Algorithms Implementation for Unsupervised Learning of Big Data”, Procedia Computer Science, Volume 53, 2015, Pages 327–334, 2015 INNS Conference on Big Data
[8] L. Zhou, S. Pan, J. Wang, A. V. Vasilakos, “Machine learning on big data: Opportunities and challenges”, Neurocomputing 237 (2017) 350–361
[9] X. W. Chen, XIAOTONG LIN2, “Big Data Deep Learning: Challenges and Perspectives”, Vol. 2, 2014, 2169-3536, 2014 IEEE
[10] Y. Lei, F. Jia, J. Lin, S. Xing, S. X. Ding, “An Intelligent Fault Diagnosis Method Using Unsupervised Feature Learning Towards Mechanical Big Data”, 0278-0046 (c) 2015 IEEE.
[11] A. B. Ayed, M. B. Halima, A. M. Alimi, “Survey on clustering methods: Towards fuzzy clustering for big data”, 978-1-4799-5934-1/14/$31.00 ©2014 IEEE
[12] X. Cai, F. Nie, H. Huang, “Multi-View K-Means Clustering on Big Data”, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence,
[13] A. Fahad, N. Alshatri, Z. Tari, A. Alamri, I. Khalil, A. Y. Zomaya, S. Foufou, A. Bouras, “A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis”, Vol. 2, No. 3, Sep. 2014, 2168-6750 2014 IEEE
[14] S. S. Chouhan, R. Khatri, “Data Mining based Technique for Natural Event Prediction and Disaster Management”, International Journal of Computer Applications (0975 – 8887) Volume 139 – No.14, April 2016
[15] B. Feizizadeh, M. S. Roodposhti, T. Blaschke, J. Aryal, “Comparing GIS-based support vector machine kernel functions for landslide susceptibility mapping”, Arab J Geosci (2017) 10:122, DOI 10.1007/s12517-017-2918-z
Citation
Ayush Gupta, Pratik Gite, "Implementation of K-Means Clustering in Big Data Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.38-44, 2019.
Comparative Performance Analysis of Multilevel Image Watermarking Using Cryptographic Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.45-48, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.4548
Abstract
This paper presents the comparative performance analysis of multi-level image watermarking using cryptographic algorithm. The proposed technique has been implemented and compared with other image watermarking technique based on DWT-SVD. In both watermarking techniques, the cover image is decomposed into four sub bands (LL, LH, HL and HH) using DWT and thereafter SVD is applied to LL sub band. Both the watermarking techniques have also been compared. Performance of methodology is evaluated using different fidelity parameters .The experimental results show the effectiveness of hybrid image watermarking scheme.
Key-Words / Index Term
Digital Image Watermarking, DWT, SVD, cryptographic algorithm PSNR, NCC
References
[1] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding”, IBM System Journal, Vol. 35, NOS 3&4, pp. 313-336, 1996.
[2] E. T. Lin, and E. J. Delp, “A review of data hiding in digital images”, Proc. of the Image Processing, Image Quality, Image Capture Systems Conference, Vol. 299, pp. 274-278, April, 1999.
[3] R. Liu, and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership”, IEEE Transactions on Multimedia, Vol. 4, No. 1, pp. 121-128, March, 2002.
[4] Lena, G. Dayalin, and S. S. Dhayanithy, “Robust image watermarking in frequency domain”, International Journal of Innovation and Applied Studies, 2013.
[5] Kundur, Deepa, and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion”, Proc. IEEE International Conference on Image Processing, Vol. 1, pp. 544-547, October, 1997.
[6] E. Ganic, and A. M. Eskicioglu, “Robust DWT-SVD domain image watermarking: embedding data in all frequencies”, Proc. of the 2004 Workshop on Multimedia and Security, September, 2004.
[7] L. Hu, and F. Wan, “Analysis on wavelet coefficient for image watermarking”, IEEE International Conference on Multimedia Information Networking and Security (MINES), pp. 630-634, 2010.
[8] S. Lagzian, M. Soryani, and M. Fathy, “A new robust watermarking scheme based on RDWT-SVD”, International Journal Of Intelligent Information Processing, Vol. 2, No. 1, March, 2011.
[9] Kashyap, Nikita, and G. R. Sinha, “Image watermarking using 2-level DWT”, Advances in Computational Research 4.1, pp. 42-45, 2012.
[10] Navnidhi, “Various digital image watermarking techniques and wavelet transforms”, International Journal of Emerging Technology and Advanced Engineering 2.5, pp. 363-366, 2012.
[11] M. Ibrahim, M. M. Rahman, and M. Iqbal, “Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation”, arXiv preprint arXiv:1307.6328, 2013.
[12] N. Bisla, and P. Chaudhary, “Comparative study of DWT and DWT-SVD image watermarking techniques”, International Journal of Advanced Research in Computer Science and Software Engineering 3.6, June, 2013.
[13] Dr. J. Abdul Jaleel, Jisha Mary Thomas , “Guarding Images Using A Symmetric Key Cryptographic Technique: Blowfish Algorithm“, ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 2, August 2013
[14] S. Agarwal, Priyanka, and U. Pal, “Different types of attack in image watermarking including 2D, 3D images”, International Journal of Scientific & Engineering Research, Vol. 6, No. 1, January, 2015.
[15] P. Gupta, and G Parmar, “Image watermarking using IWT-SVD and its comparative analysis with DWT-SVD”, Proc. IEEE International Conference on Computer, Communications and Electronics (COMPTELIX-2017), pp. 527-531, Manipal University, Jaipur, July, 2017.
[16] R.Tyagi and M. K. Pandey “An adaptive second level hybrid image Watermarking Technique using DWT-SVD in low frequency band’’ Published in IJARCCE, Vol. 6, Issue 1, January 2017.
Citation
Pankaj Gautam, Mahendra Kumar Pandey, Sanjay Patsariya, "Comparative Performance Analysis of Multilevel Image Watermarking Using Cryptographic Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.45-48, 2019.
A Multi Factor Duplicate Image Deduplication System
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.49-51, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.4951
Abstract
With the invent of internet technology and increasing the use of digital technology, the storage system has been into a difficult mode of expansion as the growing data is a big concern for the storage system, typically the images which occupy large scale size of storage. Hence worldwide data Deduplication mechanism had been used enormously to improve the backup storage system. Lots of efforts had done worldwide for identifying the image Deduplication system to improve the storage utilization system. In spite of these continuous efforts the so-called existing system can only manage to remove the images which are the same in texture and size, but it fails to identify the Deduplication of images that may have the same visual perceptions but may have different effects. To solve the above issue of image Deduplication our thesis work proposed the mechanism to identify the duplicated images which are technically the same from the perspective of visual identification but different with some effects. With further improving to remove such duplicate images, we are contributing to improving storage space. Our proposed algorithm based on feature selection and extraction and accuracy optimization will not improve storage space but helps to perform such task quite efficiently and effectively.
Key-Words / Index Term
Image Deduplication, Feature Extraction, Centroid selection, Storage space, Optimization, DHash, Hamming, SIFT Algorithm
References
[1] NEMIROVSKIY V.B., STOYANOV A.K. Near duplicate image recognition based on the rank distribution of the brightness clusters cardinality, COMPUTER OPTICS. – 2014. – VOL. 38(4). – P. 811-817.
[2] Dynamic Data Deduplication in Cloud Storage by Waraporn Leesakul, Paul Townend, Jie Xu. IEEE 8th International Symposium on Service-Oriented System Engineering (SOSE 2014). IEEE 8th International Symposium on Service-Oriented System Engineering (SOSE 2014), 07-11 Apr 2014, Oxford, UK. IEEE, pp. 320-325. ISBN 9781479925049
[3] A study on data Deduplication techniques for optimized storage by E. Manogar, S. Abirami, 2014 Sixth International Conference on Advanced Computing(lCoAC),pp 161-165, 978-1-4 799-8159-5114
[4] Eunji Lee, Jee E. Jang, Taeseok Kim, Hyokyung Bahn, "On-Demand Snapshot: An Efficient Versioning File System for Phase-Change Memory," IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 12, December 2013.
[5] Q. He, Z. Li, X. Zhang, "Data deduplication techniques, "Future Information Technology and Management Engineering (FITME)," vol. I, pp. 430-433, 2010
[6] Maddodi.S, Attigeri G.V, Karunakar. A.K, "Data Deduplication Techniques and Analysis," Emerging Trends in Engineering and Technology (lCETET), pp 664 - 668, IEEE, 2010
[7] N. Mandagere, P. Zhou, M.A. Smith, and S. Uttamchandani."Demystifying data deduplication," In Proceedings of the ACM/IFlP/USENIX Middleware`08 Conference Companion, pages 12-17. ACM, 2008
Citation
Rounak A. Samdadia, Nitin Patil, "A Multi Factor Duplicate Image Deduplication System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.49-51, 2019.
Constructing the First Convolutional Neural Network for Determining Damaged Bones and Normal Bones in X-Ray Images
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.52-55, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.5255
Abstract
Deep learning technology applied to medical imaging may become the most disruptive technology radiology has seen since the advent of digital imaging. Most researchers believe that within next 15 years, deep learning based applications will take over human and not only most of the diagnosis will be performed by intelligent machines but will also help to predict disease, prescribe medicine and guide in treatment. In this case study, Convolutional Neural Network (CNN) has been constructed to determine the nature of bones i.e. whether it is broken or intact. Python is used as a basic language for coding purpose. It can be seen that after 50 epochs the validation accuracy is 96.39 %, it shows the ability of the model to generalize to new data.
Key-Words / Index Term
Convolutional Neural Network; X-Ray images, Broken bones; Intact bones
References
[1] Zhang, L., Yang, F., Zhang, Y.D. and Zhu, Y.J., 2016, September. Road crack detection using deep convolutional neural network. In 2016 IEEE international conference on image processing (ICIP) (pp. 3708-3712). IEEE.
[2] Sahiner, B., Chan, H.P., Petrick, N., Wei, D., Helvie, M.A., Adler, D.D. and Goodsitt, M.M., 1996. Classification of mass and normal breast tissue: a convolution neural network classifier with spatial domain and texture images. IEEE transactions on Medical Imaging, 15(5), pp.598-610.
[3] Lo, S.C., Lou, S.L., Lin, J.S., Freedman, M.T., Chien, M.V. and Mun, S.K., 1995. Artificial convolution neural network techniques and applications for lung nodule detection. IEEE Transactions on Medical Imaging, 14(4), pp.711-718.
Citation
Akshansh Mishra, Priyankan Datta, "Constructing the First Convolutional Neural Network for Determining Damaged Bones and Normal Bones in X-Ray Images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.52-55, 2019.
Study on Various Machine Learning Techniques for Pollution Forecasting
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.56-63, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.5663
Abstract
Because of a significant increment of pollution in the air, it is required to foresee the pollution of the following dates, months and years. Air pollution is quickly expanding because of different human factors and reasons, such as the generation of synthetic compounds, particulates, pollutants or in-organic materials and other substances which is even the reason for the loss of human lives and even additionally hurts the indigenous habitat like plants and animals, etc. Undoubtedly, air pollution is one of the significant natural problems in metropolitan and urban areas. In this way, Monitoring and safeguarding air quality is one of the most fundamental exercises in numerous modern and urban territories today. Consequently, air quality assessment, observing, and forecast has turned into significant research. The point of this paper is to explore different Machine Learning based strategies especially artificial neural network models for air quality determining in various conditions. This scheme for the future will elaborate on the distributed research results identifying with air quality index and forecast utilizing techniques predicting air quality of a particular area using Neural Networks. Therefore, as of now under this scheme, we will derive the comparative analyses of various neural network Algorithms from past researchers i.e. ANN, MLP, CNN, LSTM, CNN-LSTM, Encoder decoder, and Convolution LSTM. To find the efficiency and effectiveness in the area of air contamination and pollution.
Key-Words / Index Term
Machine Learning, Artificial Neural Network, Multilayer Perceptron, Convolutional Neural Network, Long Short-Term Memory, Recurrent Neural Network, Encoding and Decoding
References
[1] Weibo Liua, Zidong Wanga , Xiaohui Liua, Nianyin Zengb, Yurong Liuc,D And Fuad E. Alsaadid ,“A Survey Of Deep Neural Network Architectures And Their Applications”, Brunel University Research Archive(BURA), May 14 – 2018.
[2] Mohammed Kamel Benkaddour, Abdennacer Bounoua, “Feature Extraction And Classification Using Deep Convolutional Neural Networks, Feature Extraction And Classification Using Deep Convolutional Neural Networks”, Laboratory Communication Network & Architecture Multimedia RCAM & DJILLALILIABBES University Sidi Bel Abbes 22000, Algeria. University Kasdi Marbah, FNTIC Faculty, Ouargla 30000, Algeria June, 2019.
[3] Huang, Chiou-Jye & Kuo, Ping-Huan, “Deep CNN-LSTM Model For Particulate Matter (PM2.5) Forecasting In Smart Cities”, Sensors. 18. 2220. 10.3390/S18072220, 2018
[4] Vidushi Chaudhary, Anand Deshbhratar, Vijayanand Kumar, Dibyendu Paul, “Time Series Based LSTM Model To Predict Air Pollutant’s Concentration For Prominent Cities In India”, Harbin Institute Of Technology (Shenzhen) February, 2017
[5] Y. Tsai, Y. Zeng And Y. Chang, “Air Pollution Forecasting Using RNN With LSTM “, IEEE 16th Intl Conf On Dependable, Autonomic And Secure Computing, 16th Intl Conf On Pervasive Intelligence And Computing, 4th Intl Conf On Big Data Intelligence And Computing And Cyber Science AndTechnologyCongress(DASC/Picom/Datacom/Cyberscitech),Athens, 2018, Pp. 1074-1079
[6] S Geetha & L Prasika, “SMOG PREDICTION MODEL USING TIME SERIES WITH LONG-SHORT TERM MEMORY”, International Journal Of Mechanical Engineering And Technology (IJMET) Volume 10, Issue 01, January 2019
[7] Huang, Chiou-Jye & Kuo, Ping-Huan, “A Deep CNN-LSTM Model for Particulate Matter (PM2.5) Forecasting in Smart Cities” Sensors. 18. 2220. 10.3390/S18072220, 2018
[8] Muhammad, Salisu & Makhtar, Mokhairi & Rozaimee, Azilawati & Aziz, Azwa & Jamal, Azrul Amri, “Classification Model for Water Quality Using Machine Learning Techniques. International Journal of Software Engineering and Its Applications” 9. 45-52. 10.14257/Ijseia.2015.9.6.05, 2015
[9] Sarkar, Archana & Pandey, Prashant, “River Water Quality Modelling Using Artificial Neural Network Technique” Aquatic Procedia.4.1070-1077. 10.1016/J.Aqpro.2015.02.135, 2015
[10] V. M. Niharika And P. S. Rao, “A Survey on Air Quality Forecasting Techniques,” International Journal of Computer Science and Information Technologies, Vol. 5, No. 1, Pp.103-107, 2014
[11] Shubham Billus, Shivam Billus, Rishab Behl, “Weather Prediction through Sliding Window Algorithm and Deep Learning”, Isroset-Journal (IJSRCSE), Vol.6 , Issue.5 , pp.20-24, Oct-2018
[12] N.S. Lele, “Image Classification Using Convolutional Neural Network”, Vol.6 , Issue.3 , pp.22-26, Jun-2018
Citation
Ifshita Chaudhary, Shruti Sharma, Preeti Sethi, "Study on Various Machine Learning Techniques for Pollution Forecasting," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.56-63, 2019.
Image Encryption Using Image Division and Suffling Technique
Research Paper | Journal Paper
Vol.7 , Issue.11 , pp.64-67, Nov-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i11.6467
Abstract
Encryption is the most effective way to achieve data security and converting data to an unrecognizable or encrypted form. Its wide used to secure data sent over wireless networks and the internet. This paper aims at improving the protection and efficiency of image cryptography by employing a highly efficient shuffle based encryption rule and a comparable decryption rule supported random values obtained by using pseudo random number generator .In this paper, a image encryption is projected which has pixels shuffling image division technique. The planned algorithmic program has been examined using multiple analysis ways in and a PSNR value obtained is more than 35 in all cases which shows a good decryption.
Key-Words / Index Term
Transposition, Error free encryption, PSNR, Cryptography
References
[1]. A.J.Menezes ,P.C.Van Oorschot, and S.Vanstone , “Handbook of Applied cryptography”, CRC Press, Boca Ration,Florida, USA,1997.
[2] S. Maniccam and N. G. Bourbakis, “Lossless image compression and encryption using scan,” Pattern Recognition, vol. 34, no. 6, pp. 1229–1245, 2001.
[3] C.-C. Chang, M.-S. Hwang, and T.-S. Chen, “A new encryption algorithm for image cryptosystems,” Journal of Systems and Software, vol. 58, no. 2, pp. 83–91, 2001.
[4] C.-M. Shin, D.-H. Seo, K.-B. Cho, H.-W. Lee, and S.-J. Kim, “Multilevel image encryption by binary phase xor operations,” in Lasers and Electro-Optics, 2003. CLEO/Pacific Rim 2003. The 5th Pacific Rim Conferenceon, vol. 2. IEEE, 2003, pp. 426–vol.
[5] G. Gu and G. Han, “An enhanced chaos based image encryption algorithm,” in First International Conference on Innovative Computing, Information and Control-Volume I (ICICIC’06), vol. 1. IEEE, 2006,pp. 492–495.
[6] T. Shah, I. Hussain, M. A. Gondal, and H. Mahmood, “Statistical analysis of s-box in image encryption applications based on majority logic criterion,” International Journal of Physical Sciences, vol. 6,no. 16, pp. 4110–4127, 2011.
[7] M. A. S. Hassan and I. S. I. Abuhaiba, “Image encryption using differential evolution approach in frequency domain,” ar Xiv preprintarXiv:1103.5783, 2011.
[8] S. P. Indrakanti and P. Avadhani, “Permutation based image encryption technique,” International Journal of Computer Applications (0975–8887) Volume, 2011.
[9] A. Nag, J. P. Singh, S. Khan, S. Ghosh, S. Biswas, D. Sarkar, and P.P.Sarkar, “Image encryption using affine transform and xor operation,” in Signal Processing, Communication, Computing and Networking Technologies (ICSC).
[10] L. Liu, Q. Zhang, and X. Wei, “A RGB image encryption algorithm based on DNA encoding and chaos map,” Computers & Electrical Engineering, vol. 38, no. 5, pp. 1240–1248, 2012.
[11] Y. Liu, J. Tang, and T.Xie, “Cryptanalyzing a RGB image encryption algorithmbased on DNA encoding and chaosmap,” Optics and Laser Technology, vol. 60, pp. 111–115, 2014.
[12] X.-Y. Wang, Y.-Q. Zhang, and Y.-Y. Zhao, “A novel image encryption scheme based on 2-D logistic map and DNA sequence operations,” Nonlinear Dynamics. An InternationalJournal of Nonlinear Dynamics and Chaos in Engineering Systems,vol. 82, no. 3, pp. 1269–1280, 2015.
[13] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image encryption algorithm using DNA sequence operations,” Optics Lasers in Engineering, vol. 88, pp. 197–213, 2017.
[14] Y. Niu, X. Zhang, and F. Han, “Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database,” Computational Intelligence and Neuroscience, vol. 2017, Article ID 4079793, 9 pages, 2017.
[15] Jiancheng Zou , Rabab K. Ward , Dongxu Qi, “A New Digital Image Scrambling Method Based on Fibonacci Number, “Proceeding of the IEEE Inter Symposium On Circuits and Systems, Vancouver ,Canada ,Vol .03 , PP .965-968 , 2004.
[16] Nishith Sinha and Kishore Bhamidipati “Improving Security of Vigenère Cipher by Double Columnar Transposition”, International Journal of Computer Applications (0975 – 8887), Volume 100 – No.14, August 2014.
[17] Stallings W. “Pseudorandom Numbers “in Cryptography and Network Security- Principles and Practices, 5th edition.
[18]Zhang, GuoL, WeiXP .Image encryption using DNA addition combining with chaotic maps.MathComputModel2010;52:2028–35.
[19]Wang XY ,Zhang YQ ,Bao XM .A novel chaotic image encryption scheme using DNA sequence operations.OptLasersEng2015;73:53–61.
[20]ZhangYQ,WangXY,LiuJ,ChiZL. An image encryption scheme based on the MLNCML systemusingDNAsequences.OptLasersEng2016;82:95–103.
[21]. Quist-Aphetsi Kester,” Image Encryption based on the RGB PIXEL Transposition and Shuffling”, International Journal of Computer Network and Information Security, 2013, Vol 7, Pages:43-50.
[22]. Musheer Ahmad, M. Shamsher Alam,” A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journal on Computer Science and Engineering,Vol.2(1), 2009, 46-50.
[23].Varsha Bhatt, Gajendra Singh Chandel,”Implementaion of new advance image Encryption Algorithm to enhance the security of Multimedia Component” International Journal of Advanced Technology & Engineering Research (IJATER), ISSN No: 2250- 3536 Volume 2, Issue 4, July 2012.
[24]. Hiral Rathod, Mahendra Singh Sisodia, Sanjay Kumar Sharma,”Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm (Hyper image Encryption Algorithm)”, International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1, Issue 3, ISSN 2249-6343.
[25] F. Dufaux and T. Ebrahimi, ``Scrambling for privacy protection in video surveillance systems,`` IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 8, pp. 1168_1174, Aug. 2008.
[26] F. Dufaux and T. Ebrahimi, ``H. 264/AVC video scrambling for privacy protection,`` in Proc. IEEE Int. Conf. Image Process., Oct. 2008,pp. 1688_1691.
[27] P. Carrillo, H. Kalva, and S. Magliveras, ``Compression independent reversible encryption for privacy in video surveillance,`` Eurasip J. Inf.Secur., vol. 2009, no. 1, pp. 1_13, 2010.
[28] F. Dufaux, ``Video scrambling for privacy protection in video surveillance: Recent results and validation framework,`` Proc. SPIE, vol. 8063, pp. 307_314, May 2011.
Citation
Abhishek Kumar Saw, Yogesh Kumar Rathore, "Image Encryption Using Image Division and Suffling Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.11, pp.64-67, 2019.