Robust PID controller Design using Particle Swarm Optimization for Magnetic Levitation System
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.52-55, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.5255
Abstract
The PID controller is widely used in industries due to its simple design and stable operation. Though PID controller produces a controlled output for stable and unstable systems, the performance of the system under disturbance is poor. To make the PID controller robust under various environments, Particle Swarm Optimization (PSO) algorithm is used to design the controller. The simulation is carried out for a test system of magnetic levitation. The robust in terms of Integral Square Error (ISE) are poor The control of a magnetic levitation system using PSO based PID controller is proposed in this paper. To solve this problem PSO based tuning of PID controller is demonstrated. The results are compared with classical PID controller.
Key-Words / Index Term
PID controller, PSO, Magnetic Levitation system
References
[1]. K.H Ang, , G. Chang, Yun, Li. “PID control system Analysis, Design and Technology”, IEEE trans. on Contr. Syst. Tech., Vol. 13, No. 4, pp. 559-577, 2005.
[2]. S.Sivananaithaperumal, S. Miruna Joe Amali, S. Baskar, P.N.Suganthan, “Constrained self-adaptive differential evolution based design of robust optimal fixed structure controller”, Engineering Applications of Artificial Intelligence, Vol.24, No.6, pp.1084-1093, 2011.
[3]. S. Sivananaithaperumal, S.Baskar, “Design of multivariable fractional order PID controller using covariance matrix adaptation matrix evolution strategy”, Archives of control sciences vol 24(LX) pp 235-251, 2014.
[4]. K.J Astrom, T. Hagglund, “PID Controllers: Theory, design, and tuning”, Instrument society of America, 2nd Edition, 1995.
[5]. B.S. Chen, Y.M. Cheng, C.H. Lee, “A genetic approach to mixed H2/ H∞ optimal PID control”, IEEE Control system Magazine , Vol. 15,No.5, pp. 51 – 60,1995.
[6]. J. Kennedy, R.C.Eberhart, “ Particle Swarm Optimization” , IEEE International Conference on Neural Networks, Piscataway, NJ, Vol. 4,pp. 1942-1948, 1995.
[7]. G.Kaur, J.S. Saini, “Enhancement of Channel Assignment Based on BPSO Algorithm in Multi-Radio Multi-Channel Wireless Mesh Networks”, International Journal of Computer Sciences and Engineering, vol 6, Issue 9. pp 933-939, Sep 2018.
[8]. T.H.Kim, I.Maruta, T.Sugie, “Robust PID controller tuning based on the constrained particle swarm optimization”, Automatica, Vol.44, No.4, pp.1104 – 1110, 2008.
Citation
S. Sivananaithaperumal, "Robust PID controller Design using Particle Swarm Optimization for Magnetic Levitation System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.52-55, 2019.
A Survey in Data Mining Prospective for handling Uncertainty and Vagueness
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.56-61, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.5661
Abstract
Statistical analysis is used in traditional data mining techniques. But this analysis is less prone to real world scenario. The latest innovations in technology databases contain imprecise & vague data. In the field of data mining, handling such data is always a tedious task. During important decision making task the use of imprecise data causes the inconsistency & vagueness. In this paper to handle uncertain data in data mining various mathematical models like fuzzy set, soft set, rough set & vague set are projected. Various productive approaches have already renewed the Association rule mining. Comparative study of various models defines the idea for using particular set theory. To deal with commercial management & business decision making problem, for generating profitable patterns here we are trying to explore the concept of different set theory. These are also the main benefits of this paper.
Key-Words / Index Term
Data mining, Vagueness, uncertainty, fuzzy set, vague set, Gray set, rough set & association rule mining
References
[1] AgrawalR., Imielinski T., Swami A.N.“Mining association rules between sets of items in large databases”. In Buneman, P., Jajodia, S., eds.: SIGMOD Conference, ACM Press (1993) 207–216.
[2] Gau W.L., Buehrer, D.J. “Vague sets”. IEEE Transactions on Systems, Man, and Cybernetics 23 (1993) Pages-610–614.
[3] Zadeh, L.A. “Fuzzy sets”. Information and Control 8 (1965) Pages-338–353.
[4] Pawlak, Zdzislaw. “Rough sets.” International Journal of Computer & Information sciences 11.5(1982): 341-356.
[5] J. Deng. “The control problems of grey systems” Systems & Control Letters, 1982.
[6] An Lu and Wilfred Ng ”Maintaining consistency of vague databases using data dependencies ”Data and Knowledge Engineering, Volume 68,2009,Pages 622-641.
[7] Lu A., Ng W. “Managing merged data by vague functional dependencies”. In: Atzeni P., Chu W., Lu H., Zhou S., Ling T.-W. (eds.) ER 2004. LNCS, vol. 3288, pp. 259–272. Springer, Heidelberg.
[8] An Lu and Wilfred Ng “Mining Hesitation Information by Vague Association Rules” Lecture Notes in Computer Science ,Springer Volume 4801/,2008,pg 39-55.
[9] Lu A.,Ng W. “Vague sets or intuitionistic fuzzy sets for handling vague data”: Which one is better? In: Delcambre L.M.L., Kop C., Mayr H.C., Mylopoulos J., Pastor, O. (eds.) ER 2005. LNCS, vol. 3716, pp. 401–416. Springer, Heidelberg
[10] Lu. A., Ng. W: Handling Inconsistency of vague relations with functional dependencies. In: ER (2007). LNCS Vol 4321 pp 301-312.
[11] Lu,A., Ke,Y., Cheng ,J., Ng,W.: Mining Vague association rules.In:DASFAA,pp.891-897(2007)
[12] Atanassov, K.T.: Intuitionistic Fuzzy Sets: Theory and Applications (Studies in Fuzziness and Soft Computing). Springer-VerlagTelos (1999).
[13] Pardasani K.R., Anajan Pandey “A Model for Vague association rule Mining in Temporal Database” in Journal of Information and Computing Science, Vol.8, 2013, ISSN 1746-7659, pp. 063-074.
[14] Pardasani K.R., Anajan Pandey “ A Model for Mining Course Information Using Vague Association Rule “ in International Journal of Computer Applications , Vol 58, ISSN 0975-8887, November 2012.
[15] D.Molodtsov “Soft Set Theory-First Result” An International Journal Computers & Mathematics with Application, Elsevier, Vol. 37,pp. 19-31,1999.
[16] Vivek Badhe, Arvind T.S. “ Comparative Analysis of Fuzzy, Rough, Vague and Soft set Theories in Association Rule Mining” in International Journal of Scientific Progress and Research (IJSPR) , Vol-2, ISSN 2349-4689, November 2014.
[17] A. Tiwari, R.K. Gupta and D.P. Agrawal “A survey on Frequent Pattern Mining: Current Status and Challenging issues” Information Technology Journal 9(7) 1278-1293, 2010.
[18] W. Wang, J. Yang and P. Yu “Efficient mining of weighted association rules (WAR)”, Proc. Of the ACM SIGKDD Conf. on knowledge Discovery and Data Mining. 270-274,2000.
[19] Eyke Hullermeier “Fuzzy sets in machine learning & data mining” Applied Soft Computing, Science Direct, Elsevier, Vol. 11, pp. 1493-1505, 2008.
[20] Feng Tao, “Mining Binary Relationships from transaction data in weighted Setting” PhD Thesis, School of Computer science, Queen’s University Belfast, UK, 2003.
[21] G.D. Ramkumar, Sanjay Ranka, and Shalom Tsur, “Weighted Association Rules: Model and Algorithm” KDD1998, 1998.
[22] N.Pasquier, Y.Bastide, R. Taouil, and L.Lakhal, “Efficient mining of association rules using closed itemset lattices,” Information Systems, Vol 24, No. 1, 1999, pp. 25-46.
[23] Bing Liu, Wynne Hsu, and Yiming Ma, “Mining Association Rules with Multiple Supports”, Proc. Of the ACM SIGKDD Int’1 Conf. On Knowledge Discovery and Data Mining (KDD-99), SanDiego, CA, USA, 1999.
[24] Jiawei Han and Yongjian Fu. “Discovery of Multiple-Level Association Rules from Large Databases” in the Proceedings of the 1995 Int’1 Conf. on Very Large Data Bases (VLDB’95), Zurich, Switzerland, 2002, pp. 420-431.
[25] F. Tao, F. Murtagh and M.Farid, “Weighted Association Rule Mining Using Weighted Support and Significance Framework, “Proc, ACM SIGMOD ’03, pp. 661-666, 2003.
[26] Yanhong Li, David L.Olson, Zheng Qin “Similarity measures between intuitionistic fuzzy (vague) sets: A comparative analysis” Elsevier, Pattern Recognition Letters 28 (2007) pp. 278-285.
Citation
Monika Dandotiya, Mahesh Parmar, "A Survey in Data Mining Prospective for handling Uncertainty and Vagueness," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.56-61, 2019.
Rise of Fluid Computing: A Collective Effort Of Mist, Fog and Cloud
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.62-69, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.6269
Abstract
Every device including the state-of-the-art technologies heavily rely on computers to store and process information. Such a feat was achieved with the evolution of cloud computing. It gave consumers the ability of remote execution as well as reducing the complexity of managing the resources. The introduction of Edge computing consisting of Fog and Mist addressed the real-time application-oriented problems and provided with quick onsite solutions. Both Cloud and Edge are quite different and address different problem statements. This paper merges both the computing architectures to form a hybrid computing architecture named Fluid Computing. Fluid Computing is a combination of Mist, Fog and Cloud computing. The Fluid takes advantage of Edge by collaborating it with Cloud where the need for real-time solution provider was much needed. The paper discusses the interoperability between the three computing paradigms and solves their individual flaws by a collective effort, eventually giving rise to fluid computing. This is done by considering a use-case scenario, comparing and contrasting various feature aspects and visualizing the implementation of the technology behind it. The paper also paves the way for implementing machine learning, artificial intelligence in existing models to build smarter devices.
Key-Words / Index Term
Fluid Computing, IoT, Mist Computing, Fog Computing, Cloud Computing, Edge Computing, Gateway, Thinnect
References
[1] W. Shi and S. Dustdar, "The Promise of Edge Computing," in Computer, vol. 49, no. 5, pp. 78-81, May 2016.,doi: 10.1109/MC.2016.145.
[2] W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, "Edge Computing: Vision and Challenges," in IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637-646, Oct. 2016. doi: 10.1109/JIOT.2016.2579198
[3] V.S. Varnika, “Cloud Computing Advantages and Challenges for Developing Nations”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.51-55, 2018.
[4] Bonomi, Flavio & Milito, Rodolfo. (2012). “Fog Computing and its Role in the Internet of Things”. Proceedings of the MCC workshop on Mobile Cloud Computing. 10.1145/2342509.2342513.
[5] Flavio Bonomi, Rodolfo Milito, Jiang Zhu, Sateesh Addepalli Cisco Systems Inc., “Fog computing and its role in the internet of things”, Helsinki, Finland — August 17 - 17, 2012.
[6] Prakash, P & Darshaun, K.G. & Yaazhlene, P & Venkata Ganesh, Medidhi & Vasudha, B. (2017). “Fog Computing: Issues, Challenges and Future Directions”. International Journal of Electrical and Computer Engineering.
7.3669- 3673.10.11591/ijece.v7i6.pp3669-3673.
[7] J. S. Preden, K. Tammemäe, A. Jantsch, M. Leier, A. Riid and E. Calis, "The Benefits of Self-Awareness and Attention in Fog and Mist Computing," in Computer, vol. 48, no. 7, pp. 37-45, July 2015.
doi: 10.1109/MC.2015.207
[8] Kumar Yogi, Manas & Chandrasekhar, K & Vijay Kumar, G. (2017). “Mist Computing: Principles, Trends and Future Direction”. International Journal of Computer Science and Engineering. 4. 10.14445/23488387/IJCSE-V4I7P104.
[9] Manas Kumar Yogi, Lakkamsani Yamuna, K.Chandrasekhar ,”Fluid computing: Principles, Applications, Future Directions”. ISBN:978-93-86171-54-2 (ICETETSM-17)
[10] Yogesh Malik, “Internet of Things Bringing Fog, Edge & Mist Computing”, Published Sep 21, 2017, https://medium.com/@YogeshMalik/fog-computing-edge-computing-mist-computing-cloud-computing-fluid-computing-ed965617d8f3
[11] H. Li, K. Ota and M. Dong, "Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing," in IEEE Network, vol. 32, no. 1, pp. 96-101, Jan.-Feb. 2018.
[12] Bhanudas Suresh Panchabhai, Anand Jayantilal Maheshwari, Sunil DhonduMone, “The Road Map of Cloud Computing to Internet of Things”, International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.37-42, 2018.
Citation
Bishal Ranjan Swain, Jeevan Jyoti Sahoo, Ashutosh Prasad, D. Thamizh Selvam, "Rise of Fluid Computing: A Collective Effort Of Mist, Fog and Cloud," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.62-69, 2019.
Deep Learning Techniques for Naskh and Nastalique Writing Style Text Recognition
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.70-76, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.7076
Abstract
Naskh and Nastalique text recognition are a challenging task in the Pattern Recognition field because of the cursive and context sensitive nature of the script. Many languages use Naskh or/and Nastalique style for writing. Due to the complexities associated with these writing styles, not much effort has been done for the development of real-time recognition systems for Naskh and Nastalique writing style languages. Traditional recognition process segments the text image into characters for subsequent OCR phases which is less accurate for Naskh/Nastalique text and reduces the accuracy of the recognition system. Recently, Recurrent Neural Network (RNN) based Long Short Term Memory (LSTM) architecture with Connectionist Temporal Classification (CTC) has shown a remarkable result in text image recognition. This paper presents the recognition challenges in the Naskh and Nastalique writing style text and a study of different deep learning techniques applied for the recognition of Naskh Arabic and Nastalique Urdu text.
Key-Words / Index Term
Naskh, Nastalique, Recognition Challenges, RNN, LSTM
References
[1] G.S. Lehal, “Choice of recognizable units for urdu OCR”, In Proceedings of the Workshop on Document Analysis and Recognition (DAR`12), pp.79–85, 2012.
[2] S. Garg, A.P. S, K. C, “An Extensive Survey on Text Detection and Recognition”, International Journal of Computer Sciences and Engineering, Vol.7, No.1, pp.546-551, 2019.
[3] A. Ul-Hasan, S.B. Ahmed, F. Shafait, T.M. Breuel, “Offine printed Urdu Nastaleeq script recognition with bidirectional LSTM networks”, In Proc. 12th Int. Conf. Document Analysis Recognition (ICDAR), pp.1061-1065, 2013.
[4] A. Ul-Hasan, M.Z. Afzal, F. Shafait, M. Liwicki, T.M. Breuel, “A sequence learning approach for multiple script identification”, In Document Analysis and Recognition (ICDAR),pp.1046-1050, 2015.
[5] A. Graves, S. Fern´andez, F. Gomez, and J. Schmidhuber, “Connectionist temporal classification: labelling unsegmented sequence data with recurrent neural networks”, In Proceedings of the 23rd International Conference on Machine learning, pp.369–376, 2006.
[6] S.B. Ahmed, S. Naz, M.I. Razzak, S.F. Rashid, M.Z. Afzal, T.M. Breuel, “Evaluation of cursive and non-cursive scripts using recurrent neural networks”, Neural Comput. Appl. vol. 27, no. 3, pp.603-613, 2016.
[7] R. Ahmad, Z. Afzal, S.F. Rashid, “KPTI: Katib`s Pashto Text Imagebase and Deep Learning Benchmark”, 15th International Conference on Frontiers in Handwriting Recognition (ICFHR), 2016.
[8] A. Graves, M. Liwicki, S. Fernandez, R. Bertolami, H. Bunke, J. Schmidhuber, “A Novel Connectionist System for Unconstrained Handwriting Recognition”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, No. 5, pp.855–868,2009.
[9] S.F. Rashid, M. Schambach, J. Rottland, S. Nll, “Low resolution arabic recognition with multidimensional recurrent neural networks”, In Proceedings of the 4th International Workshop on Multilingual OCR, 2013.
[10] R. Ahmad, Z. Afzal, S.F. Rashid, M. Liwicki, T.M. Breuel, “Scale and rotation invariant ocr for Pashto cursive script using mdlstm network”, In Document Analysis and Recognition (ICDAR), pp.1101-1105, 2015.
[11] R. Ahmad, S. Naz, Z. Afzal, S.F. Rashid, M. Liwicki, A. Dengel, “Deepkhatt: A deep learning benchmark on arabic script”, Document Analysis and Recognition (ICDAR). 14th International Conference on IEEE, 2017.
[12] R. Maalej, N. Tagougui, and K. Kherallah, “Recognition of Handwritten Arabic Words with Dropout Applied in MDLSTM” ICIAR, pp.746–752, 2016.
[13] S. Naz, A. I. Umar, R. Ahmed, M.I. Razzak, S.F. Rashid, F. Shafait, “Urdu Nasta`liq text recognition using implicit segmentation based on multi-dimensional long short term memory neural networks”, Springer-Plus, vol. 5, no. 1, pp.1-16, 2016.
[14] S. Naz, A.I. Umar, R. Ahmad, S.B. Ahmed, S.H. Shirazi, I. Siddiqi, and M.I. Razzak, “Offline cursive Urdu-Nastaliq script recognition using multidimensional recurrent neural networks” Neurocomputing, vol. 177, pp. 228-241, 2016.
[15] S. Naz, A. I. Umar, R. Ahmad, S.B. Ahmed, S.H. Shirazi, M.I. Razzak, “Urdu Nasta`liq text recognition system based on multidimensional recurrent neural network and statistical features”, Neural Comput. Appl. vol. 28, no. 2, pp. 219-231, 2016.
[16] S. Naz, S.B. Ahmed, R. Ahmad, M.I. Razzak, “Zoning features and 2DLSTM for Urdu text-line recognition”, Procedia Computer Science Vol. 96, No. 1, pp.16-22, 2016.
[17] S. Naz, A. I. Umar, R. Ahmad, I. Siddiqi, S.B. Ahmed, M.I. Razzak, F. Shafait, “Urdu Nastaliq recognition using convolutional recursive deep learning” Neurocomputing, vol. 243, pp. 80-87, 2017.
Citation
Shanky Goel, Gurpreet Singh Lehal, "Deep Learning Techniques for Naskh and Nastalique Writing Style Text Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.70-76, 2019.
A Survey on Feature Extraction Methods in Retinal Fundus Images for Diabetic Retinopathy
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.77-87, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.7787
Abstract
The uniqueness of retinal microvasculature is that it is the only part of human circulation that can be directly visualised non-invasively in vivo and readily photographed. Developments in fundus image processing over the past 20 years includes advancement being made towards developing automated detection for conditions, such as diabetic retinopathy, age-related macular degeneration and retinopathy of prematurity. Features of retinal blood vessels, microaneurysms, exudates and the hemorrhages are extracted to detect the Diabetic Retinopathy (DR) in the early stages. Diabetic Retinopathy results fluid leaks from retinal blood vessels leading to vision loss. Microaneurysms appear as small circular dark spots on the surface of the retina. The appearance of red and yellow lesions on retina is exudates and hemorrhages. Image processing algorithms can be used to reduce the workload of ophthalmologist and play a vital role in quality assurance tasks. Feature extraction is the first step in developing these automated algorithms for detecting retinal pathologies. Here we review numerous early studies that used for automatic detection of these features. Most of the literature has differences in the method used to evaluate their algorithms or the dataset used, which makes it difficult to compare any two algorithms together. Our study reveals that even though a large number of feature extraction technique are available there is still scope for more accurate algorithms which will work with High Resolution Fundus (HRF) images also.
Key-Words / Index Term
Diabetic retinopathy, Exudates, Hemorrhages, Micro aneurysms
References
[1] O. Faust, R. Acharya, E. Y.-K. Ng, K.-H. Ng, and J. S. Suri, “Algorithms for the automated detection of diabetic retinopathy using digital fundus images: a review”, Journal of medical systems, vol. 36, no. 1, pp. 145–157, 2012.
[2] T. Spencer, J . A .Olson, K. C. McHardy, P. F. Sharp, and J. V. Forrester, “An image processing strategy for the segmentation and quantification of microaneurysms in fluorescein angiograms of the ocular fundus,” Computers and biomedical research, vol. 29, no. 4, pp. 284–302, 1996.
[3] M. J. Cree, J. A. Olson, K. C. McHardy, P. F.Sharp, and J. V. Forrester, “A fully automated comparative microaneurysm digital detection system,” Eye, vol. 11, no. 5, p. 622, 1997.
[4] A. Sopharak, B. Uyyanonvara, and S. Barman, “Simple hybrid method for fine microaneurysm detection from non-dilated diabetic retinopathy retinal images,” Computerized Medical Imaging and Graphics, vol. 37, no. 5-6, pp. 394–402, 2013.
[5] M. U. Akram, S. Khalid, and S. A. Khan, “Identification and classification of microaneurysms for early detection of diabetic retinopathy,” Pattern Recognition, vol. 46, no.1, pp. 107–116,2013.
[6] M.Niemeijer, B. Van Ginneken, J. Staal, M. S. A. Suttorp-Schulten, and M. D. Abramoff, “Automatic detection of red lesions in digital color fundus photographs,” IEEE Transactions on Medical Imaging, vol. 24, no. 5, pp. 584–592, May 2005.
[7] A. Mizutani, C. Muramatsu, Y. Hatanaka, S. Suemori, T. Hara, and H. Fujita, “Automated microaneurysm detection method based on double ring filter in retinal fundus images,” in Medical Imaging 2009: Computer-Aided Diagnosis, vol. 7260. International Society for Optics and Photonics, 2009, p. 72601N.
[8] G. Quellec, M. Lamard, P. M. Josselin, G. Cazuguel, B. Cochener, and C. Roux, “Optimal wavelet transform for the detectionof microaneurysms in retina photographs.” IEEE Transactions on Medical Imaging, vol. 27, no. 9, pp. 1230–41, 2008.
[9] B. Zhang, X. Wu, J. You, Q. Li, and F. Karray, “Detection of microaneurysms using multiscale correlation coefficients,” Pattern Recognition, vol. 43, no. 6, pp. 2237–2248, 2010.
[10] C. Sinthanayothin, J. F. Boyce, T. H. Williamson, H. L. Cook, E. Mensah, S. Lal, and D. Usher, “Automated detection of diabetic retinopathy on digital fundus images,” Diabetic medicine, vol. 19, no. 2, pp. 105–112, 2002.
[11] A. D. Fleming, S. Philip, K. A. Goatman, J. A.Olson, and P. F. Sharp, “Automated microaneurysm detection using local contrast normalization and local vessel detection,” IEEE transactions on medical imaging, vol. 25, no. 9, pp.1223–1232, 2006.
[12] M. Habib, R. Welikala, A. Hoppe, C. Owen, A.Rudnicka, and S. Barman, “Detection of microaneurysms in retinal images using an ensemble classifier,” Informatics in Medicine Unlocked, vol. 9, pp. 44–57, 2017.
[13] M. P. Bala and S. Vijayachitra, “Early detection and classification of microaneurysms in retinal fundus images using sequential learning methods,” International Journal of Biomedical Engineering and Technology, vol. 15, no. 2, pp. 128– 143, 2014.
[14] I. Lazar and A. Hajdu, “Microaneurysm detection in retinal images using a rotating cross section based model,” in Biomedical Imaging: From Nano to Macro, 2011 IEEE International Symposium on. IEEE, 2011, pp. 1405–1409.
[15] P. Subbuthai and S. Muruganand, “Roc curve analysis for automatic detection of microaneurysms in the retinal fundus image,” International Journal of ChemTech Research, vol. 10, no. 13, pp. 190–194, 2017.
[16] U. R. Acharya, C. M. Lim, E. Y. K. Ng, C. Chee, and T. Tamura, “Computer-based detection of diabetes retinopathy stages using digital fundus images,” Proceedings of the institution of mechanical engineers, part H: journal of engineering in medicine, vol. 223, no. 5, pp. 545–553, 2009.
[17] H. Wang, W. Hsu, K. G. Goh, and M. L. Lee,“An effective approach to detect lesions in colour retinal images,” in Computer Vision and Pattern Recognition, 2000. Proceedings. IEEE Conference on, vol. 2. IEEE, 2000, pp. 181–186.
[18] D. Kavitha and S. S. Devi, “Automatic detection of optic disc and exudates in retinal images,” in Intelligent Sensing and Information Processing, 2005. Proceedings of 2005 International Conference on. IEEE, 2005, pp. 501–506.
[19] M. Garcia, C. I. S´anchez, J. Poza, M. I. L´opez, and R. Hornero, “Detection of hard exudates in retinal images using a radial basis function classifier,” Annals of biomedical engineering, vol. 37, no. 7, pp. 1448–1463, 2009.
[20] S. Sreng, J.-i Takada, N. Maneerat, D. Isarakorn, R. Varakulsiripunth, B. Pasaya, and M R. Panjaphongse, “Feature extraction from retinal fundus image for early detection of diabetic retinopathy,” in Humanitarian Technology Conference (R10-HTC), 2013 IEEE Region 10.IEEE, 2013, pp. 63–66.
[21] K. Y. Win and S. Choomchuay, “Automated detection of exudates using histogram analysis for digital retinal images,” in Intelligent Signal Processing and Communication Systems (ISPACS),2016 International Symposium on. IEEE, 2016, pp. 1–6.
[22] D. T. Susetianingtias and S. Madenda, “An approach to exudates detection using color reference segmentation in retinal fundus image,” International Journal of Computer Applications, vol. 146, no. 2, 2016.
[23] C. Sinthanayothin, V. Kongbunkiat, S. Phoo jaruenchanachai, and A. Singalavanija, “Automated screening system for diabetic retinopathy,” in Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the 3rd International Symposium on, vol. 2.IEEE, 2003,pp. 915–920.
[24] H. Li and O. Chutatape, “Automated feature extraction in colour retinal images by a model based approach,” IEEE Transactions on biomedical engineering, vol. 51, no.2,pp.246–254,2004.
[25] S. Joshi and P. Karule, “A review on exudates detection methods for diabetic retinopathy,” Biomedicine & Pharmacotherapy, vol. 97, pp. 1454–1460, 2018.
[26] J. C. Dunn, “A fuzzy relative of the isodata process and its use in detecting compact well separated clusters,” 1973.
[27] J. C. Bezdek, J. Keller, R. Krisnapuram, and N. Pal, Fuzzy models and algorithms for pattern recognition and image processing. Springer Science & Business Media, 1999, vol. 4.
[28] A.Osareh, M. Mirmehdi, B. Thomas, and R. Markham, “Automated identification of diabetic retinal exudates in digital colour images,” British Journal of Ophthalmology, vol. 87,no. 10, pp. 1220–1223, 2003.
[29] A. Osareh, B. Shadgar, and R. Markham, “A computational-intelligence-based approach for detection of exudates in diabetic retinopathy images,” IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 4, pp. 535–545, 2009.
[30] P. H. Princye and V. Vijayakumari, “Detection of exudates and feature extraction of retinal images using fuzzy clustering method,” Computational Intelligence and Information Technology, 2013.
[31] T. Walter, J.-C. Klein, P. Massin, and A. Erginay, “A contribution of image processing to the diagnosis of diabetic retinopathy detection of exudates in color fundus images of the human retina,” IEEE transactions on medical imaging, vol. 21, no. 10, pp. 1236–1243, 2002.
[32] A. Sopharak, B. Uyyanonvara, S. Barman, and T. H. Williamson, “Automatic detection of diabetic retinopathy exudates from non dilated retinal images using mathematical morphology methods,” Computerized medical imaging and graphics, vol. 32, no. 8, pp. 720–727, 2008.
[33] D. Welfer, J. Scharcanski, and D. R. Marinho, “A morphologic two-stage approach for automated optic disk detection in color eye fundus images,” Pattern Recognition Letters, vol. 34, no. 5, pp. 476–485, 2013.
[34] G. Gardner, D. Keating, T. H. Williamson, and A. T. Elliott, “Automatic detection of diabetic retinopathy using an artificial neural network: a screening tool.” British journal of Ophthalmology, vol. 80, no. 11, pp. 940–944, 1996.
[35] S. K. Mitra, T.-W. Lee, and M. Goldbaum, “A Bayesian network based sequential inference for diagnosis of diseases from retinal images,” Pattern recognition letters, vol. 26, no. 4, pp. 459–470, 2005.
[36] A. Osareh, M. Mirmehdi, B. Thomas, and R. Markham, “Comparative exudate classification using support vector machines and neural networks,” in International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, 2002, pp. 413–420.
[37] A. Hunter, J. Lowell, J. Owens, L. Kennedy, and D. Steele, “Quantification of diabetic retinopathy using neural networks and sensitivity analysis,” in Artificial Neural Networks in Medicine and Biology. Springer, 2000, pp. 81–86.
[38] L. Xu and S. Luo, “Support vector machine based method for identifying hard exudates in retinal images,” in Information, Computing and Telecommunication, 2009. YC-ICT’09.IEEE Youth Conference on. IEEE, 2009, pp. 138–141.
[39] V. V. Kumari and N. SuriyaNarayanan, “Diabetic retinopathy-early detection using image processing techniques,” International Journal on Computer Science and Engineering, vol. 2, no. 02, pp. 357–361, 2010.
[40] S. Roychowdhury, D. D. Koozekanani, and K. K.Parhi, “Dream: diabetic retinopathy analysis using machine learning,” IEEE journal of biomedical and health informatics, vol. 18, no. 5, pp. 1717–1728, 2014.
[41] M. Niemeijer, B. van Ginneken, S. R. Russell, M. S. Suttorp-Schulten, and M. D. Abramoff, “Automated detection and differentiation of drusen, exudates, and cotton-wool spots in digital colour fundus photographs for diabetic retinopathy diagnosis,” Investigative ophthalmology & visual science, vol. 48, no. 5, pp. 2260–2267, 2007.
[42] K. Adem, “Exudate detection for diabetic retinopathy with circular hough transformation and convolutional neural networks,” Expert Systems with Applications, vol. 114, pp.289–295, 2018.
[43] R. Phillips, J. Forrester, and P. Sharp, “Automated detection and quantification of retinal exudates,” Graefe’s archive for clinical and experimental ophthalmology, vol. 231, no. 2, pp. 90–94,1993.
[44] E. B, H. O, L. O, M. K, J. B, K. D, and C. DA, “Screening for diabetic retinopathy using computer based image analysis and statistical classification.”Comput.Meth. Programs Biomed. vol. 62, p. 165, 2000.
[45] X. Zhang and O. Chutatape, “Top-down and bottom-up strategies in lesion detection of background diabetic retinopathy,” in Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on, vol. 2. IEEE, 2005, pp. 422–428.
[46] M. Larsen, J. Godt, N. Larsen, H Lund Andersen, A. K. Sjolie, E. Agardh, H. Kalm, M. Grunkin, and D. R. Owens, “Automated detection of fundus photographic red lesions in diabetic retinopathy,” Investigative ophthalmology & visual science, vol. 44, no. 2, pp. 761–766, 2003.
[47] M. Niemeijer, B. Van Ginneken, J. Staal, M. S. Suttorp-Schulten, and M. D. Abramoff, “Automatic detection of red lesions in digital colour fundus photographs,” IEEE Transactions on medical imaging, vol. 24, no. 5, pp. 584–592, 2005.
Citation
Noushira K I, Anil Kumar K.R, Meenakshy K, "A Survey on Feature Extraction Methods in Retinal Fundus Images for Diabetic Retinopathy," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.77-87, 2019.
A Survey on Cloud Data Security
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.88-95, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.8895
Abstract
Dispersed processing is pool of organizations that are provided for customer. Conveyed stockpiling data may be gotten to from wherever at whatever point due to cloud works in remote zone. It manhandles the organizations given by the cloud supplier. There are shifting sorts of cloud benefits particularly, PC code as a Service, Platform as an organization, Infrastructure as an organization, Network as a Service, Identity as an organization. Getting ready models of cloud encapsulate Intra cloud, lay cloud, arrange Cloud and lay cross cloud. By virtue of the organizations of disseminated registering, there`s a gigantic measure of learning hold tight cloud .Hence it`s required to supply the acceptable security to the information in Clouds. Consequently the conveyed stockpiling has expanded additional thought from each the teachers and mechanical shared attributes. It likewise gets new troubles keeping up learning genuineness and unwavering quality in data accumulating .Deviating the cloud from single to multi-cloud is imperative to accomplish the information security. Multi cloud is very proposed appreciation to the soundness that fragile data shouldn`t be dispatched to one cloud, to avoid oppression on only one cloud supplier. Data to be held tight is part into varied squares and scattered among absolutely extraordinary disseminated stockpiling suppliers. To deal with all the outline we will when all is said in done gift an audit paper. This diagram paper relies upon the propelled examination related with single and multi-cloud esteem, security and handiness based generally describe. This work mean to drive crafted by multi spread over single cloud to decrease the vulnerability demanding inside the cloud
Key-Words / Index Term
Cloud Computing, Data Privacy, Multi-Clouds, Security, Confidential Data, Cloud Service Provider
References
[1] Emir Erdem and Mehmet Tahir Sandıkkaya , Member, IEEE,” OTPaaS—One Time Password as a Service”, IEEE Transactions On Information Forensics And Security, Vol. 14, No. 3, March 2019.
[2] Yucai Zhou ; Kejun Long ; Peng Xu ; Wang Liu, ,” Design of a Cloud Platform for Digital Highway”, International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), March,2019.
[3] Himel Dey , Rifat Islam ,Hossain Arif,” An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure”, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST), February,2019.
[4] Yucai Zhou, Kejun Long ,Peng Xu , Wang Liu, ,” Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage”, IEEE Journals & Magazines, volume 7, Page s: 25409 – 25421, February,2019.
[5] Andrei Tchernykh ,Mikhail Babenko , Vanessa Miranda-López, Alexander Yu. Drozdov , Arutyun Avetisyan,” WA-RRNS: Reliable Data Storage System Based on Multi-cloud 2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW),August,2019.
[6] Prof. Amit R. Gadekar, Dr. M V. Sarode, Dr. V M. Thakare,” Cloud Security and Storage Space Management using DCACrypt”, International Conference on Information, Communication, Engineering and Technology (ICICET),August,2018
[7] Jayachander Surbiryala, Bikash Agrawaly, Chunming Rong,” Improve Security over Multiple Cloud Service Providers for Resource Allocation”, 1st International Conference on Data Intelligence and Security,2018
[8] Talal Halabi, Martine Bellaiche, and Adel Abusitta,” Online Allocation of Cloud Resources based onSecurity Satisfaction, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering”,2018
[9] D. N. WU, Q. Q. GAN, AND X. M. WANG,” Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting,IEEE Translations,Vol.6,August,2018.
[10] Jianyi Zhang, Chenggen Song, Zhiqiang Wang, Tao Yang And Wenming Ma, “Efficient And Provable Security Searchable Asymmetric Encryption In The Cloud”,IEEE Translations,vol.6,December,2018
[11] Mohd. Aman Kalyankar, CRS Kumar, “Aadhaar Enabled Secure Private Cloud with Digital Signature as a Service”, 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018) IEEE Conference Record # 42487,2018.
[12] Mu Yang, Andrea Margheri, Runshan Hu, and Vladimiro Sassone, “Differentially Private Data Sharing in a Cloud Federation with Blockchain”, Copublished by the IEEE CS and IEEE ComSoc,November/December 2018.
[13] Mohamad Reza Khayyambashi,Sayed Mohammad Hossein, Mirshahjafari, EhsanShahrokhi, , “Design And Implement A New Cloud Security Method Based On MultiClouds On Open Stack Platform” ,David C. Wyld et al. (Eds) : CCSEA, CLOUD, DKMP, SEA, SIPRO – 2016.
[14] C. Divya Shaly, R. Anbuselvi, ” Multi-Cloud Data Hosting for Protection Optimization and Security”-International Journal of Computer Science and Mobile Computing. April 2016.
[15] A. Manimaran and K. Somasundaram.”An efficient Data Security Mechanismin Cloud Computing Using Anonymous ID algorithm. 2016.
[16] Ms Vrushali K Gaikwadl, Prof. Ramesh Kagalkar. “Data Security & Availability in Multi-clouds Storage with Cooperative Provable Data Posession”.–IJES February 2015.
[17] Yun Tian, Xiao Qin, Yafei Jia.” Secure Replica Allocation in Cloud Storage with Heterogeneous Vulnerabilities”,IEEE
[18] Tara Salman. “On Securing Multi-Clouds: Survey on Advances and Current Challenges”, Nov 2015.
[19] Ms Vrushali K Gaikwadl, Prof. Ramesh Kagalkar. “Data Security & Availability in Multi-clouds Storage with Cooperative Provable Data Posession”.–IJES February 2015.
[20] Maha Tebaa, Said El Hajji, ” From Single to Multi-Clouds Computing Privacy and Fault Tolerance”. Elsevier 2014.
[21] P. Raja Kaushik1 , G. Praveen Bab,” Data Security Issues in Distributed Cloud System”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.9, September- 2014, pg. 357-360.
[22] Farrukh Shahzad, ” State–Of–the–art Survey on Cloud Computing Security Challenges, Approaches and Solutions”. Elsevier 2014.International Journal of Pure and Applied Mathematics Special Issue.
[23] He Kai, Huang Chuanhe, Wang Jinhai, Zhou Hao, Chen Xi, LuYilong ZhangLianzhen, Wang Bin, Computer School, Wuhan University, Wuhan, China “AnEfficient Public Batch Auditing Protocol for Data Security in Multi-CloudStorage”-IEEE/978–0-7695–5058-9/13 2013
[24]Cong Wang,student member,ieee,Qian Wang,student member,ieee, Kui Ren,member,ieee,Ning Cao,student member,ieee and Wenjing Lou,senior member,ieee,”Towared secure and dependable storage in cloud computing” 2012.
[25]Maha Tebaa ; Said El Hajji ; Abdellatif El Ghazi,” Homomorphic encryption method applied to Cloud Computing, National Days of Network Security and Systems,2012.
[26] Yashaswi Singh,Farah Kandah,Weiyi Zhang,” secure cost effective multi cloud storage in cloud computing”2011.
[27] A.Bessani, M. Correia, B.Quaresma, F.Andre and P.Soura “Depsky:dependable and secure storage in cloud computing.”2011.
[28] E.Grosse, J.Howie, J.Ransome, J Reavis and S.Schmidt, “ Cloud computing roundtable”, IEEE Security & Privacy,8(6),2010.
[29]W.Itani, A.Kayssi, A.Chehab, “Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures” Eight IEEE International Conference on Dependable, Autonomic ans Secure Computing,Dec 2009.
[30] R.Gellman, “Privacy in the cloud: Risks to privacy and confidentiality from cloud computing”,Prepared for theWorld Privacy Forum Feb 2009.
[31] B.R.Kandukuri, R.V.Paturi and A.Rakshit, “Cloud Security Issues,” 2009 IEEE International Conference on Service Computing, 2009.
[32] Scalable Security Solutions, Check Point Open Performance Architecture, Quad-Core Intel Xeon Processors,”Delivering Application-Levels Security at Data Centre Performance Levels,”Intel Corporation, 2008.
Citation
S. Renuka, N. Suresh Kumar, "A Survey on Cloud Data Security," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.88-95, 2019.
An Image Processing Algorithm to Detect Exudates in Fundus Images
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.96-99, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.9699
Abstract
Diabetes often leads to several secondary ailments related to different parts of the body. One such medical disorder is Diabetic Retinopathy. In this condition, the lipids accumulate in the retinal areas of the eye due to fragile blood vessels. These depositions are called Exudates. If exudates are not detected and treated well within the time, they can cause permanent blindness. This paper focuses on a method that can detect the presence of exudates.
Key-Words / Index Term
Diabetic Retinopathy, Exudates, Image Processing, Contrast Adjustment
References
[1] Nathan Congdon, Yingfeng Zheng “The WorldWide Epidemic of Diabetic Retinopathy”, Indian Journal of Ophthalmology, Vol.60, Issue.5, pp.428-431, 2012.
[2] Kristen Harris, Nidhi Talwar, William H. Herman, “Predicting Development of Proliferative Diabetic Retinopathy”, American Diabetes Association Diabetes Care, America, pp. 562-568, 2013.
[3] Ravitej Singh Rekhi, Ashish Isaac, Malay Kishore Dutta, Carlos M. Travieso, “Automated Classification of Exudates from Digital Fundus Images”, In the Proceedings of the 2017 IEEE International Conference, India, 2017.
[4] Narendra P. Datti, Ashwini Mahajan, Shalini, Rashmi N. R., “Diabetic Retinopathy: How Aware are the Physicians?”, Journal of Evolution of Medical and Dental Science, Vol.3, Issue.20, 2014.
[5] P. R. Asha, S. Karpagavalli, “Diabetic Retinal Exudates Detection using Machine Learning Techniques”, In the Proceedings of the 2015 International Conference on Advanced Computing and Communication Systems ICACCS, Coimbatore, India, 2015.
[6] Mohammed Shafeeq Ahmed, Baddam Indira, “Detection of Exudates from RGB Fundus Images using 3-Sigma Control Method”, In the Proceedings of the 2017 IEEE WiSPNET Conference, 2017.
[7] Priyadarshini Patil, Pooja Shettar, Prashant Narayankar, Mayur Patil, “An Efficient Method of Detecting Exudates in Diabetic Retinopathy: using Texture Edge Features”, In the Proceedings of the 2016 International Conference on Advances in Computing Communications and Informatics ICACCI, Jaipur, India, 2016.
[8] S R Rupanagudi, “A Novel Video Processing based Cost Effective Smart Trolley Systems for Super Markets using FPGA”, In the Proceedings of the 2015 International Conference on Communication Information and Computing Technology ICCICT, Mumbai, pp.1-6, 2015.
[9] S R Rupanagudi, “A High Speed Algorithm for Identifying Hand Gestures For an ATM Input System for the Blind,” In the Proceedings of the 2015 IEEE, Mumbai, pp.1-6, 2015.
[10] C R Prashant, T Sagar, N Bhat, D Naveen, S R Rupanagudi, R A Kumar, “Obstacle Detection and Amp: Elimination of Shadows for an Image Processing Based Automated Vehicle”, In the Proceedings of the 2013 International Conference on Advances in Computing Communication and Informatics, Mysore, pp.367-372, 2013.
[11] S R Rupanagudi, “A Novel Video Processing based Smart Helmet for Rear Vehicle Intimation and Collision Avoidance”, In the Proceedings of the 2015 International Conference on Computing and Network Communications, Trivandrum, pp.799-805, 2015.
Citation
Srujani J, K. Pramilarani, "An Image Processing Algorithm to Detect Exudates in Fundus Images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.96-99, 2019.
Role Identification in Movie using ECGM
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.100-104, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.100104
Abstract
Automatic identification of human face has done a significant research interest and lead to many interesting applications. Identifying faces of human is a challenging problem due to the huge variation in the appearance of each character. In this paper, we are representing the problem of identifying characters in movies or TV serials using video and film script. We are attempting to extract frames from videos and clustering the faces from frames. System will extract names from script using HTML parser. A graph structure of character name and face get generated and matching between names and clustered face tracks under the some circumstances. In complex movie scenes, during the face tracking and face clustering process, noise gets generated and due to this, the performance of the system may get limited. This paper focuses on implementation of graph structure for movie script and movie character, generating a relationship also matching this graph for identification of movie characters role.
Key-Words / Index Term
Character Identification,K-means Clustering, ECGM, graph edit, graph matching
References
[1] Jitao Sang, C. Xu, “Robust face-name graph matching for movie character identification”, IEEE Transaction on Multimedia, Vol. X, NO. X, 2012.
[2] S. Satoh and T. Kanade, “Name-it: Association of face and name in video Pro-ceding’s of CVPR”, 1997, pp. 368373.
[3] C. Liang, C. Xu, J. Cheng, and H. Lu, “TV parser: An automatic tv video parsing method”, in CVPR, 2011, pp. 33773384
[4] Paulo Menezes ,Jos ́e Carlos Barreto et al.,”Face Tracking Based On Haar-Like Features And Eigen faces”, ISR-University of Coimbra, Portugal.
[5] J. Yang and A. Hauptmann, “Multiple instance learning for labelling faces in broad-casting news video”, in ACM International Conference on Multimedia, 2005, pp. 3140.
[6] Y. Zhang, C. Xu, H. Lu, and Y. Huang, “Character identification in feature-length films using global face-name matching,” IEEE Transaction on Multimedia , vol. 11, no. 7, pp. 1276–1288, November 2009.
[7] M. Everingham, J. Sivic, and A. Zissserman, “Taking the bite out of automated naming of characters in TV video”, in Journal of Image and Vision Computing, 2009, pp. 545559.
Citation
S. S. Deore , "Role Identification in Movie using ECGM," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.100-104, 2019.
A Study on Capsule Networks with the Comparative Analysis of Capsule Networks and CNN
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.105-108, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.105108
Abstract
Artificial intelligence, with the emergence of machine learning and deep learning techniques, is growing up with breath neck speed. With the evaluation of the deep convolutional neural network, applications like image classification, object recognition and detection become easier. Recently, a new network deep learning architecture named Capsule Network is introduced to overcome some spatial and rotational limitations of CNN by using the concepts of capsules and the dynamic routing algorithm. Capsules are a group of neurons that generates activity vector whose length predicts the class of image and the orientation defines the pose parameters related to the image. Capsule networks have resulted in state of the art performance on various dataset such as MNIST. The paper defines the architecture and working of the capsule network, along with the comparative analysis of CNN and Capsule network on the various dataset. Along with this, the paper specifies the hands-on experiments done on capsule networks and the future scope with capsule networks.
Key-Words / Index Term
Capsule networks, convolutional neural networks, deep learning, dynamic routing algorithm, image classification
References
[1] K. O`Shea, R. Nash. "An introduction to convolutional neural networks." arXiv preprint arXiv:1511.08458 (2015).
[2] S. Sabour, N. Frosst, and GE. Hinton. "Dynamic routing between capsules." In the Proceedings of 2017 NIPS Conference on Advances in neural information processing systems, pp. 3856-3866. 2017.
[3] GE. Hinton, A. Krizhevsky, SD. Wang. "Transforming auto-encoders." In International Conference on Artificial Neural Networks, Springer, Berlin, Heidelberg, pp. 44-51, 2011.
[4] GE. Hinton, S. Sabour, N. Frosst. "Matrix capsules with EM routing." Open review (2018).
[5] P. Nair, R. Doshi, S. Keselj. "Pushing the limits of capsule networks." Technical note (2018).
[6] R. LaLonde, U. Bagci. "Capsules for object segmentation." arXiv preprint arXiv:1804.04241 (2018).
[7] M. Engelin. "CapsNet Comprehension of Objects in Different Rotational Views: A comparative study of capsule and convolutional networks." (2018).
[8] A. Gulli, and S.Pal. “Deep Learning with Keras”. Packt Publishing Ltd, Birmingham - Mumbai, pp. 71-105, 2017.
Citation
Anusha Mehta, V. D. Parmar, "A Study on Capsule Networks with the Comparative Analysis of Capsule Networks and CNN," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.105-108, 2019.
Piecewise Linear Transformation Function Using Histogram Processing for Image Enhancement
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.109-112, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.109112
Abstract
Our goal is to enhance the images so that output is better than original image. We used digital image enhancement technique that offers choices for enhancing the vision of images. We will describe a summary of existing concepts with multiple algorithms for image enhancement. In this paper we emphases on many techniques such as Piecewise Linear Transformation Function, Histogram Equalization and Histogram Matching with Statistical approach that completely enhanced our images with good contrast and matching. We use local enhancement method to obtain the histogram of the image with various intensities. In this method we can easily compare pixel values of previous histogram to obtain new histogram. We are not getting good results with our previous techniques, so that we are proposing our new approach Piecewise Linear Transformation Using Histogram Processing. In this approach we are applying many functions randomly with histogram processing for contrast enhancement so that we achieve a good or enhanced image.
Key-Words / Index Term
DigitalImage processing, gray scale operation, image enhancement, Piecewise Linear Transformation Function, Histogram processing
References
[1] A. De Luca, S. Termini, “A definition of a non-probabilistic entropy in the setting of fuzzy set theory”, Information and Control, Vol. 20, 301 - 312, 1972.
[2] A. K. Jain, “Fundamentals of Digital Image Processing”. Englewood Cliffs, NJ: Prentice Hall, 1989.
[3] A. N. Netraveli, B. G. Haskell, “Digital Pictures: Representation and Compression,” New York: Plenum, 1988.
[4] A.C. Bovik, “Digital Image Processing Course Notes”, Dept. of Electrical Engineering, U. of Texas at Austin, 1995.
[5] BhabatoshChanda,,DwijestDutta, “Digital Image Processing and Analysis”, Majumder, 2002
[6] J. C. Bezdek, J. Keller, K. Raghu and N. RPal, “Fuzzy models and algorithms for pattern recognition and image processing”, The Handbooks of Fuzzy Sets Series, Kluwer Academic Publishers, Boston/London/Dordrecht, 1999.
[7] J.C. Russ, “The Image Processing Handbook”, CRC Press, Boca Raton, FL., 1992.
[8] Kaufmann, “Introduction to the Theory of Fuzzy Subsets - Fundamental Theoretical Elements”, Vol. 1, Academic Press, New York, 1975.
[9] L. A. Zadeh, “Fuzzy Sets, Information Control”, Vol. 8, 338 - 353, 1965
[10] L.K. Huang, M.J. Wang, “Image thresholding by minimizing the measure of fuzziness”, Pattern Recognition, Vol. 28, No. 1, 41 - 51, 1995.
[11] N. Otsu, “A threshold selection method from gray-level histogram”, IEEE Transactions on Systems, Man and Cybernetics, Vol. 9, No. 1, 62 - 66, 1979.
[12] R Hummel, “Histogram modification techniques“, Computer Graphics and Image Processing, Vol. 4, pp. 209-224, 1975.
[13] R. Jain, R. Kasturi and B.G.Schunck, “Machine Vision”, McGraw-Hill International Edition, 1995.
[14] R. R. Yager, “On the measure of fuzziness and negation, Part - 1: Membership in the unit interval”, International Journal of General Systems, Vol. 5, 221 - 229, 1979.
[15] W.Jr., “Fundamental of Electronic Image Processing”. Bellingham: SPIE Press, Weeks, (1996).
[16] S. E. Umbaugh, “Computer Vision & Image Processing,” Prentice Hall PTR, 1998
[17] S. M. Pizer, et al., “Adaptive Histogram Equalization and its Variations,” Computer Vision, Graphics and Image Processing, Vol. 39, pp. 355-368, 1987.
[18] W. K. Pratt, “Digital image processing”, Prentice Hall, 1989.
[19] Y. Qiao, Q. Hu, G. Qian, S. Luo and W. L. Nowinski, “Thresholding based on variance and intensity contrast”, Pattern Recognition, Vol. 40, Issue. 2, 596 - 608, 2007
Citation
Indu Sharma, V.K Panchal, "Piecewise Linear Transformation Function Using Histogram Processing for Image Enhancement," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.109-112, 2019.