The Role of Internet of Things in the Healthcare Industry
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.730-733, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.730733
Abstract
Internet of Things is an innovative computerized system which is used for several applications across industries through their flexibility and capabilities. Independently living old age population is increasing now a days. They are requiring medical assistance in time, really it is a big issue. Continuous monitoring is an essential process to solve this issue. Medical devices have been enriched by incorporating cyber and physical capabilities to provide better health care services. With the help of wireless communication protocols, the IoT provide the interconnection facilities between the medical devices and other monitoring hardware. Supporting with the technology and smart devices, the IoT applications perform data collection, automation, and operations. IoT play a vital role in improving the health, safety and care of patients through healthcare monitoring system. Through the healthcare monitoring system the patient getting immediate help from the medical persons. In addition they may get medical assistance and recommendations also. This paper presents the strengths, weaknesses, challenges and overall suitability for a wearable IoT health care system.
Key-Words / Index Term
Internet of Things, Healthcare monitoring system, Wearable devices, Wireless sensor networks
References
[1]. J. Höller, V. Tsiatsis, C. Mulligan, S. Karnouskos, S. Avesand, and D. Boyle, “From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence. Amsterdam, The Netherlands”: Elsevier, 2014.
[2]. Sapna Tyagi,Amit Agarwal,Piyush Maheshwari from “A conceptual framework for IoT-based healthcare system using cloud computing”,2016 IEEE
[3]. P. Middleton , P. Kjeldsen and J. Tully, "Forecast: The Internet of Things, Worldwide," Gartner, 2013
[4]. Dr. M.Umashankar “Privacy Preserving Healthcare System using secured cloud environment “ International Journal Of Engineering And Computer Science ISSN:2319- 7242 Volume 6 Issue 6 June 2017, Page No. 21814-21817
[5]. Adithkiran Bandarkavte, Jagadeesh Sai. D, “NFC Based Secure HealthCare Monitoring System” , International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 4, April 2016
[6]. Ahmed E. Youssef, “A Framework For Secure Healthcare Systems Based On Big Data Analytics In Mobile Cloud Computing Environments”, International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.2, June 2014 .
[7]. Mrs. Ramya.R, Mrs.Shruthi.G, “Privacy Preserving Of Health Monitoring Services In Cloud”, International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.3, Issue No.6, June 2014
[8]. D. Miorandi, S. Sicari, F. D. Pellegrini, I. Chlamtac, “Internet of things: Vision, applications and research challenges”, Ad Hoc Networks 10 (7) (2012) 1497.
[9]. S. Gusmeroli, S. Piccione, D. Rotondi, “A capability-based security approach to manage access control in the internet of things”, Mathematical and Computer Modelling 58 (5) (2013) 1189 .
[10]. Annlin JebaS.V., 2Gnana KingD.R, “Combining Trust with Authentication Information for Routing in Wireless Sensor Networks”, International Journal od Scientific Research inNetwork Security and Communication, Vol.6, Issue.5, pp.38-46, Oct-2018.
[11]. Bhanudas Suresh Panchabhai, Anand Jayantilal Maheshwari, Sunil DhonduMone ,“ The Road Map of Cloud Computing to Internet of Things”, Vol.06 , Special Issue.01 , pp.37-42, Jan-2018
Citation
M. Umashankar , "The Role of Internet of Things in the Healthcare Industry," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.730-733, 2019.
A Survey on Human Stress Monitoring Technique using Electrodermal Analysis
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.734-737, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.734737
Abstract
Stress management systems play a vital role in detecting the stress levels that disrupts an individual socioeconomic lifestyle. According to the World Health Organization (WHO), stress refers the mental health problem that affects the life of an individual. The stress levels can be measured based on the questionnaire by medical and physiological experts. This method fully depends on the answers given by individuals to detect whether they are stressed or not. During the past decades, Electrodermal Activity (EDA) analysis has been performed to measure the changes in the electrical conductivity of the skin. The changes in EDA may be produced by different physical and emotional stimuli that trigger variations in sweat-gland activity. To measure the changes in EDA, different sensors were also designed and many techniques have been developed to analyze the human stress. This paper presents a detailed survey of human stress detection based on EDA analysis to detect their stress levels. Initially, different stress detection methods using EDA analysis are studied in brief. Then, a comparative analysis is conducted to understand the drawbacks in those methods and suggest a new solution to enhance the stress and emotional monitoring system with high accuracy
Key-Words / Index Term
Stress management, Electrodermal activity, Skin conductance response, Skin conductance level, Electrodermal level
References
[1] R. Sioni, L. Chittaro, “Stress detection using physiological sensors”, Computer, Vol.48, Issue.10, pp.26-33, 2015.
[2] C. Setz, B. Arnrich, J. Schumm, R. La Marca, G. Tröster, U. Ehlert, “Discriminating stress from cognitive load using a wearable EDA device”, IEEE Transactions on Information Technology in Biomedicine, Vol.14, Issue.2, pp.410-417, 2010.
[3] Chaitanya Gupte, Shruti Gadewar, "Diagnosis of Parkinson’s Disease using Acoustic Analysis of Voice", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.14-18, 2017.
[4] A. Finset, T. L. Stensrud, E. Holt, W. Verheul, J. Bensing, “Electrodermal activity in response to empathic statements in clinical interviews with fibromyalgia patients”, Patient Education and Counseling, Vol.82, Issue.3, pp.355-360, 2011.
[5] C. Kappeler-Setz, F. Gravenhorst, J. Schumm, B. Arnrich, G. Tröster, “Towards long term monitoring of electrodermal activity in daily life”, Personal and Ubiquitous Computing, Vol.17, Issue.2, pp.261-271, 2013.
[6] I. V. Bornoiu, O. Grigore, “Kohonen Neural Network Stress Detection Using Only Electrodermal Activity Features”, Advances in Electrical and Computer Engineering, Vol.14, Issue.3, pp.71-78, 2014.
[7] A. Greco, A. Lanata, G. Valenza, E. P. Scilingo, L. Citi, “Electrodermal activity processing: A convex optimization approach”, In 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp.2290-2293, 2014.
[8] A. Sano, R. W. Picard, R. Stickgold, “Quantitative analysis of wrist electrodermal activity during sleep”, International Journal of Psychophysiology, Vol.94, Issue.3, pp.382-389, 2014.
[9] T. Chaspari, A. Tsiartas, L. I. Stein, S. A. Cermak, S. S. Narayanan, “Sparse representation of electrodermal activity with knowledge-driven dictionaries”, IEEE Transactions on Biomedical Engineering, Vol.62, Issue.3, pp.960-971, 2015.
[10] P. Ghaderyan, A. Abbasi, “An efficient automatic workload estimation method based on electrodermal activity using pattern classifier combinations”, International Journal of Psychophysiology, Vol.110, pp.91-101, 2016.
[11] Sumitra Das, Deepak Gupta, "Perfomance Analysics of Human Gait Recognition Based on Principal Component", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.12-15, 2016.
[12] L. Giromini, R. Morese, A. Salatino, M. Di Girolamo, D. J. Viglione, A. Zennaro, “Rorschach Performance Assessment System (R-PAS) and vulnerability to stress: A preliminary study on electrodermal activity during stress”, Psychiatry Research, Vol.246, pp.166-172, 2016.
[13] R. Zangróniz, A. Martínez-Rodrigo, J. M. Pastor, M. T. López, A. Fernández-Caballero, “Electrodermal Activity Sensor for Classification of Calm/Distress Condition”, Sensors, Vol.17, Issue.10, p.2324, 2017.
[14] S. Jain, U. Oswal, K. S. Xu, B. Eriksson, J. Haupt, “A compressed sensing based decomposition of electrodermal activity signals”, IEEE Transactions on Biomedical Engineering, Vol.64, Issue.9, pp.2142-2151, 2017.
Citation
P. Sudarsan, A. Niranjil Kumar, "A Survey on Human Stress Monitoring Technique using Electrodermal Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.734-737, 2019.
A Survey on Different Data Mining Techniques for Crop Yield Prediction
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.738-744, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.738744
Abstract
Crop growing is measured as the stamina of India, is the improvement of plant for foodstuff, bio-fuel, counteractive plants and other harvest for behind and enhancing human life. Farming is an unique business crop creation which is contingent on different attributes such as soil, climate, irrigation, precipitation, insect killer weeds, fertilizers, nurturing, temperature, harvesting and other factors. An accurate crop yield prediction helps support decision makers in the agriculture sector to envisage the yield effectively. Data mining techniques play a vital role in the study of data for crop yield prediction. Data mining is the computing method of discovering patterns in hefty datasets involving methods at the connection of machine learning, artificial intelligence, record and system database. This piece of writing presents a detailed examination of various techniques planned for crop yield prediction. At first, dissimilar techniques developed by previous researchers are calculated in detail. Then, a relative analysis is carried out to know the precincts of each technique and afford a suggestion for further enhancement in crop yield prediction successfully.
Key-Words / Index Term
Agriculture, crop yield prediction, data mining, machine learning technique
References
[1] Bhanose, S. S., Bogawar, K. A., Dhotre, A. G., & Gaidhani, B. R. “Crop and Yield Prediction Model”, International Journal of Advance Scientific Research and Engineering Trends, 1(1), pp.23-28, 2016.
[2] Ramesh, D., & Vardhan, B. V. “Analysis of crop yield prediction using data mining techniques”, International Journal of Research in Engineering and Technology, 4(1), pp.47-473, 2015
[3] Gandhi, N., Armstrong, L. J., & Petkar, O. “Predicting Rice crop yield using Bayesian networks”, In Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on pp. 795-799, 2016.
[4] Shastry, K. A., Sanjay, H. A., & Deshmukh, A. “A Parameter Based Customized Artificial Neural Network Model for Crop Yield Prediction”, Journal of Artificial Intelligence, vol,9, pp. 23-32, 2016.
[5] Pantazi, X. E., Moshou, D., Alexandridis, T., Whetton, R. L., & Mouazen, A. M. “Wheat yield prediction using machine learning and advanced sensing techniques”, Computers and Electronics in Agriculture, 121, pp.57-65, 2016.
[6] Wang, J., Li, Z., Qin, X., Yang, X., Gao, Z., & Qin, Q. (2014, July). “Hyperspectral predicting model of soil salinity in Tianjin costal area using partial least square regression”, In Geoscience and Remote Sensing Symposium (IGARSS), 2014 IEEE International pp. 3251-3254, 2014.
[7] Liu, H. L., Liu, H. B., Lei, Q. L., Zhai, L. M., Wang, H. Y., Zhang, J. Z., ... & Liu, X. X. “Using the DSSAT model to simulate wheat yield and soil organic carbon under a wheat-maize cropping system in the North China Plain” Journal of Integrative Agriculture, 16(10), pp. 2300-2307, 2017.
[8] Garg, B., Aggarwal, S., & Sokhal, J. “Crop yield forecasting using fuzzy logic and regression model”. Computers & Electrical Engineering, 2017.
[9] Jeong, J. H., Resop, J. P., Mueller, N. D., Fleisher, D. H., Yun, K., Butler, E. E., ... & Kim, S. H. “Random forests for global and regional crop yield predictions”, PLoS One, 11(6), e0156571. 2016.
[10] Villanueva, M. B., & Salenga, M. L. M. “Bitter Melon Crop Yield Prediction using Machine Learning Algorithm”, International Journal of Advanced Computer Science and Applications (IJACSA), 9 (3), pp.1-6, 2018
[11] Brdar, S., Culibrk, D., Marinkovic, B., Crnobarac, J., & Crnojevic, V. (2011, “Support vector machines with features contribution analysis for agricultural yield prediction. In Second International Workshop on Sensing Technologies in Agriculture”, Forestry and Environment (EcoSense 2011), Belgrade, Serbia pp. pp.43-47, 2011.
[12] Huang, X., Huang, G., Yu, C., Ni, S., & Yu, L. “A multiple crop model ensemble for improving broad-scale yield prediction using Bayesian model averaging”, Field Crops Research, 211, pp.114-124, 2017.
[13] Asha Patil, Kalyani Patil, Kalpesh Lad, “Leaf Disease detection using Image Processing Techniques”, International Journal of Scientific Research in Computer Science and Engineering” Vol:6 pp.33-36, 2018.
Citation
R. Beulah , "A Survey on Different Data Mining Techniques for Crop Yield Prediction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.738-744, 2019.
An Approach to Quantify the Productivity of Software Developers towards the Perceived Productivity
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.745-748, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.745748
Abstract
Many software improvement agencies attempt to beautify the productivity of their builders. All too regularly, efforts geared towards increasing developer productiveness are undertaken without a proper knowledge of how exactly builders spend their time at their work and how it impacts their own belief of productivity. Verifying earlier findings, we try to found that developers pay their time on a good type of tasks and switch frequently among them, succeeding in particularly fragmented work. Our findings enlarge past existing studies therein we tend to correlate builders’ work conduct with perceived fecundity. Although productiveness is based on individuals, developers may be roughly gathered in morning sessions, low at lunch and afternoon. A continuous linear regression per participant found that greater grade persons usually use a high-quality, and emails, deliberate meetings and unrelated web sites with a terrible belief of productivity. We discuss opportunities of our findings, the capability to expect high and occasional productiveness and endorse layout tactics to create higher tool guide for planning builders’ workdays and enhancing their work productivity.
Key-Words / Index Term
quantification, perceived productivity, regression
References
[1] T. DeMarco and T. Lister, “Programmer performance and the effects of the workplace,” in Proceedings of the 8th international conference on Software engineering. IEEE Computer Society Press, 1985, pp. 268–272.
[2] D. E. Perry, N. A. Staudenmayer, and L. G. Votta, “People, organizations, and process improvement,” IEEE Software, vol. 11, no. 4, pp. 36–45, 1994.
[3] J. Singer, T. Lethbridge, N. Vinson, and N. Anquetil, “An examination of software engineering work practices,” in CASCON First Decade High Impact Papers, ser. CASCON ’10. IBM Corporation, 2010, pp. 174–188.
[4] B. W. Boehm, “Improving software productivity,” vol. 20, no. 9. IEEE, 1987, pp. 43–57.
[5] A. N. Meyer, T. Fritz, G. C. Murphy, and T. Zimmermann, “Software developers’ perceptions of productivity,” in Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, ser. FSE 2014. ACM, 2014, pp. 19–29.
[6] R. Van Solingen, E. Berghout, and F. Van Latum, “Interrupts: just a minute never is,” IEEE software, no. 5, pp. 97–103, 1998.
[7] S. T. Iqbal and E. Horvitz, “Disruption and recovery of computing tasks: Field study, analysis, and directions,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI ’07. ACM, 2007, pp. 677–686.
[8] M. Czerwinski, E. Horvitz, and S. Wilhite, “A diary study of task switching and interruptions,” in Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 2004, pp. 175–182.
[9] C. Parnin and S. Rugaber, “Resumption strategies for interrupted programming tasks,” Software Quality Journal, vol. 19, no. 1, pp. 5–34, 2011.
[10] V. M. Gonz´alez and G. Mark, “Constant, constant, multi-tasking craziness: Managing multiple working spheres,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI ’04. ACM, 2004, pp. 113–120.
[11] A. J. Ko, R. DeLine, and G. Venolia, “Information needs in collocated software development teams,” in Proceedings of the 29th International Conference on Software Engineering, ser. ICSE ’07. IEEE Computer Society, 2007, pp. 344–353.
[12] R. Minelli, A. Mocci, and M. Lanza, “I Know What You Did Last Summer – An Investigation of How Developers Spend Their Time,” Proceedings of ICPC 2015 (23rd IEEE International Conference on Program Comprehension), pp. 25—-35, 2015.
[13] S. Amann, S. Proksch, S. Nadi, and M. Mezini, “A study of visual studio usage in practice,” in Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER ’16), 2016.
[14] M. Zhou and A. Mockus, “Developer fluency: Achieving true mastery in software projects,” in Proceedings of the Eighteenth ACM SIGSOFT International Symposium on Foundations of Software Engineering, ser. FSE ’10. ACM, 2010, pp. 137–146.
Citation
J Rajeshwar, "An Approach to Quantify the Productivity of Software Developers towards the Perceived Productivity," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.745-748, 2019.
Live Assistance And Tracking System(LATS) using Cloud and IoT
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.749-751, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.749751
Abstract
Current socio-economic situations around the world have seen a drastic rise in crime rate all over the world, which proves difficult to control for any type of authorities and most of the resources are wasted on crimes which have been already committed. The emphasis of our system is to stop the crime before it is even anticipated ensuring safety of a loved individual and also saving the extra resources the authorities may encounter. Our system proposes an immediate live assistance in case of an emergency by special armed task force designed to encounter dangerous situations and kill the crime in the cradle.
Key-Words / Index Term
IoT, Arduino, GPS, GSM, Safety, Live Assistance, Tracking, Cloud, Police alert
References
[1] G C Harikiran, “Smart Security Solution for women based on IoT”, IEEE, 978-1-4673-9939-5/16/31.00, 2016.
[2] B Chougula, “Smart Girls Security System”, International Journal of Application or Innovation in Engineering Management, Volume 3, Issue 4, April 2014.
[3] A Helen , “A smart watch for women security basd on IOT concept watch me”, IEEE, 978-1-5090-6221-8/17/31.00c , 2017.
[4] K S Hasan,, “ Cost Effective GPS-GPRS based Object tracking system”, IEEE, 978-988-17012-2-0, 2015.
[5] S N Gadhave “Electronic jacket for Women Safety” , International Journal of Application Innovation in Engineering in Engineering Management, Volume: 04 Issue: 05 May 2017.
[6] E M Abd, “GIS based Decision support system for criminal tracking”, Institute of Electrical and Electronics Engineers, 978-1-4673-2824-1/12/31.00 , 2012.
[7] M Verman, “Service gap analysis of the public buses in Bangalore with respect to women safety”, Transportation Research Procedia, Volume 25, Pages 4322-4329, 2017.
[8] S P Purnachandran, “Context Aware Public Safety in Pervasive Environment Wireless Public Safety Networks”, International Journal of Application or Innovation in Engineering Management, Pages 99-111, 2017.
Citation
P. V. Katkhede, V. Todmal, D. Pandey, A. Saini, B.A. Patil, "Live Assistance And Tracking System(LATS) using Cloud and IoT," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.749-751, 2019.
A Survey on Different Decision Tree Methods for Solving Classification Issues
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.752-756, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.752756
Abstract
Data mining has effectively and tremendously enhanced the service in diverse areas, such as health care, business analysis, and social media. It is used to extract useful information from a huge volume of data by using various techniques like pre-processing, feature extraction, feature selection, and classification. One of the important research issues of the data mining and machine learning is a classification model. This model is to learn a classifier from a given trained dataset to predict the class of test dataset. Decision trees have become one of the most well-known classification methods for extracting classification rules from data, on account of their excellent learning capability. This especially focuses on to examine the various decision tree techniques to support data mining environments. The main objective of this survey is to study different decision tree methods used for detecting and solving classification issues. Finally, comparisons are made for different decision tree techniques in data mining
Key-Words / Index Term
Data mining, Decision tree, Classification, Knowledge extraction, Machine learning
References
[1] R. Hettiarachchi, J. F. Peters, “Multi-manifold LLE learning in pattern recognition”, Pattern Recognition, Vol.48, Issue.9, pp.2947-2960, 2015.
[2] A. Rosenfeld, H. Wechsler, “Pattern recognition: Historical perspective and future directions”, International Journal of Imaging Systems and Technology, Vol.11, Issue.2, pp.101-116, 2000.
[3] Marie Fernandes, “Data Mining: A Comparative Study of its Various Techniques and its Process”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.19-23, 2017.
[4] P.N. Tan, “Introduction to data mining”, Pearson Education India, 2007.
[5] F. Saqib, A. Dutta, J. Plusquellic, P. Ortiz, M. S. Pattichis, “Pipelined Decision Tree Classification Accelerator Implementation in FPGA (DT-CAIF)”, IEEE Trans. Computers, Vol.64, Issue.1, pp.280-285, 2015.
[6] P. Breheny, “Classification and regression trees”, 1984.
[7] J.R. Quinlan, “Induction of decision trees”, Machine learning,Vol.1,Issue.1, pp.81-106, 1986.
[8] G.V. Kass, “An exploratory technique for investigating large quantities of categorical data”, Applied statistics, pp.119-127, 1980.
[9] T. Hothorn, K. Hornik, A. Zeileis, “Unbiased recursive partitioning: A conditional inference framework”, Journal of Computational and Graphical statistics, Vol.15, Issue.3, pp.651-674, 2006.
[10] Himanshi, Komal Kumar Bhatia, “Prediction Model for Under-Graduate Student’s Salary Uisng Data Mining Techniques”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp. 50-53, 2018.
[11] G.L. Agrawal, H. Gupta, “Optimization of C4. 5 decision tree algorithm for data mining application”, International Journal of Emerging Technology and Advanced Engineering, Vol.3, Issue.3, pp.341-345, 2013.
[12] N. Patel, D. Singh, “An Algorithm to Construct Decision Tree for Machine Learning based on Similarity Factor”, International Journal of Computer Applications, Vol.111,Issue.10, 2015.
[13] L. Deng, Y. Hu, J.P.Y. Cheung, K.D.K. Luk, “A data-driven decision support system for scoliosis prognosis”,IEEE Access, Vol.5, pp.7874-7884, 2017.
[14] J. Vaidya, B. Shafiq, W. Fan, D. Mehmood, D. Lorenzi, “A random decision tree framework for privacy-preserving data mining”, IEEE transactions on dependable and secure computing, Vol.11, Issue.5, pp.399-411, 2014.
[15] P. Melillo, N. De Luca, M. Bracale, L. Pecchia, “Classification tree for risk assessment in patients suffering from congestive heart failure via long-term heart rate variability”, IEEE journal of biomedical and health informatics, Vol.17, Issue.3, pp.727-733, 2013.
[16] H. Xu, W. Wang, Y. Qian, “Fusing complete monotonic decision trees”, IEEE Transactions on Knowledge and Data Engineering, Vol.29, Issue.10, pp.2223-2235, 2017.
[17] Y.C. Cheng, P.C. Wang, “Packet classification using dynamically generated decision trees”, IEEE Transactions on Computers, Vol.64, Issue.2, pp.582-586, 2015.
[18] Z. Jiang, S. Shekhar, X. Zhou, J. Knight, J. Corcoran, “Focal-test-based spatial decision tree learning”, IEEE Transactions on Knowledge and Data Engineering, Vol.27, Issue.6, pp.1547-1559, 2015.
[19] Y. Qian, H. Xu, J. Liang, B. Liu, J. Wang, “Fusing monotonic decision trees”, IEEE Transactions on Knowledge and Data Engineering, Vol.27, Issue.10, pp.2717-2728, 2015.
[20] Y. Song, S. Yao, D. Yu, Y. Shen, Y. Hu, “A New K-Ary Crisp Decision Tree Induction with Continuous Valued Attributes”, Chinese Journal of Electronics, Vol.26, Issue.5, pp.999-1007, 2017.
[21] A. Cherfi, K. Nouira, A. Ferchichi, “Very Fast C4. 5 Decision Tree Algorithms”, Applied Artificial Intelligence, Vol.32, Issue.2, pp.119-137, 2018.
[22] Y. Cai, H. Zhang, Q. He, S. Sun, “New classification technique: fuzzy oblique decision tree”, Transactions of the Institute of Measurement and Control, 0142331218774614, 2018.
[23] P. Arumugam, P. Jose, “Efficient Decision Tree Based Data Selection and Support Vector Machine Classification”, Materials Today: Proceedings, Vol.5, Issue.1, pp.1679-1685, 2018.
[24] X. Liu, Q. Li, T. Li, D. Chen, “Differentially private classification with decision tree ensemble”, Applied Soft Computing, Vol.62, pp.807-816, 2018.
[25] J. Li, S. Ma, T. Le, L. Liu, J. Liu, “Causal decision trees”, IEEE Transactions on Knowledge and Data Engineering, Vol.29, Issue.2, pp.257-271, 2017.
Citation
V. Nirmala, A. Nithya, "A Survey on Different Decision Tree Methods for Solving Classification Issues," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.752-756, 2019.
A Review of Keyword Spotting as an Audio Mining Technique
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.757-769, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.757769
Abstract
Speech is that the essential and therefore the most profitable ways for correspondence between people. Speech is an emerging technology and automatic speech recognition has created advances in recent years. It provides the flexibility to a machine for responding properly to spoken language. Keyword Spotting could be a very important strategy in audio mining that is employed to recover of all occurrences of a given keyword within the knowledge talked expressions. It has transformed into a fascinating and testing zone as the proportion of an audio substance in the web, telephone and diverse sources growing rapidly. It can be viewed as a subproblem of automatic speech recognition where only partial information has got to be extracted from speech utterances. KWS is closely associated with the task of speech transcription and offers several advantages for certain applications. The main aim of this study is to understand the various approaches used for keyword spotting of speech in order that we can find out the methods that provide better accuracy and performance. Additionally, we have quickly examined the Keyword spotting framework and Audio mining system in this paper
Key-Words / Index Term
Audio Mining, Keyword Spotting, Automatic Speech Recognition, Audio Indexing
References
[1] G. Hemakumar, P. Punitha, “Speech Recognition Technology: A survey on Indian Languages”, International Journal of Information Science and Intelligent System, Vol. 2, No.4, 2013.
[2] A. Katyal, A. Kaur, J. Gill, “Automatic Speech Recognition : A Review”, IJCST, Vol. 4, No.3, pp.71–74, 2014.
[3] M.M. Kumar, E. Sherly, W.S. Varghese, “Isolated Word Recognition System for Malayalam using Machine Learning”, In the Proceedings of the 12th International Conference on Natural Language Processing, 2015.
[4] A. Jansen, P. Niyogi, “Point process models for spotting keywords in continuous speech”, IEEE Transactions on Audio, Speech and Language Processing, Vol. 17, No.8, pp.1457–1470, 2009.
[5] K. A. Senthildevi, E. Chandra, “Keyword Spotting System for Tamil Isolated Words using Multidimensional MFCC and DTW Algorithm”, IEEE International Conference on Communication and Signal Processing (ICCSP 2015), pp. 550–554, 2015.
[6] E. Chandra, K.A. Senthildevi, “Keyword Spotting: An Audio Mining Technique in Speech Processing – A Survey”, IOSR Journal of VLSI and Signal Processing, Vol. 5, No.4, Ver. II, pp.22–27, 2015.
[7] A.J.K. Thambiratnam, “Acoustic Keyword Spotting in speech with applications to data mining”, PhD Thesis Published in Queensland University of Technology, 2005.
[8] M.K. Mand, D. Nagpal, “An Analytical Approach for Mining Audio Signals”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, No.9, pp.3645–3647, 2013.
[9] V. Franken, A. Fischer, R. Manmatha, H. Bunke, “A novel word spotting method based on recurrent neural networks”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 34, No.2, pp. 211–224, 2012.
[10] S. Irtza, K. Rehman, S. Hussain, “Urdu Keyword Spotting System using HMM”, Conference on Language and Technology, Karachi, Pakistan, 2014.
[11] K. Thambiratnam, T. Martin and S. Sridharan, “A study on the effects of limited training data for English, Spanish and Indonesian keyword spotting”, Proceedings of the 10th Australian International Conference on Speech, Science and Technology, 2014.
[12] N. Zhao, H. Yang, “Realizing Speech to Gesture Conversion by Keyword Spotting”, IEEE Transactions, 2016.
[13] K. Gopalan, T. Chu, X. Miao, “An Utterance Recognition Technique for Keyword Spotting by Fusion of Bark Energy and MFCC Features”, Proceedings of the 9th World Scientific and Engineering Academy and Society (WSEAS) International Conference on Signal, Speech & Image Processing and 9th WSEAS International Conference on Multimedia, Internet & Video technologies, 2009.
[14] K.S. Kavya, “Automatic Recognition and Detection of Words in Speech- A Review”, International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), 2017.
[15] J.S.R. Alex, N. Venkatesan, “Spoken Utterance Detection Using Dynamic Time Warping Method Along With a Hashing Technique”, International Journal of Engineering and Technology (IJET), Vol. 6, No.2, 2014.
[16] P. Karmacharya, “Design of Keyword Spotting System Based on Segmental Time Warping of Quantized Features”, MS Thesis, Temple University.
[17] R. P. Ramachandran, R. J. Mammone, “Modern Methods of Speech Processing”, Vol. 327, Springer, 1995.
[18] C. Kurian, K. Balakrishnan, “Automated Transcription System for Malayalam Language”, International Journal of Computer Application, Vol. 19, No.5, pp.5–10, 2011.
[19] C. Vimla, V. Radha, “Speaker-Independent Isolated Speech Recognition System for Tamil Language using HMM”, Procedia Engineering, Vol. 30, pp.1097–1102, 2012.
[20] J. Patel, K. S. Maurya, S. Kulkarni, V. Sakore, S. Khonde, “Multimedia Keyword Spotting (MKWS) Using Training and Template-Based Techniques”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4, Issue.2, 2014.
[21] S. Das, P.C Ching, “Speaker Dependent Bengali Keyword spotting in unconstrained English Speech”, A Project report, Indian Institute of Technology Guwahati, India, 2005.
[22] M. Lindasalwa, M. Begam, I. Elamvazuthi, “Voice Recognition Algorithm using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques”, Journal Of Computing, Vol. 2, Issue.3, pp. 138-143, 2010.
[23] K. Dhameliya, “Feature Extraction And Classification Techniques for Speaker Recognition: A Review”, IEEE International Conference on Electrical, Electronics, Signal, Communication and Optimization, pp.1-4, 2015.
[24] P. Mahana, G. Singh, “Comparative Analysis of Machine Learning Algorithms for Audio Signals Classification”, IJCSNS International Journal of Computer Science and Network Security, Vol. 15, No.6, 2015.
[25] Z. Chen, Y. Qin, K Yu, “Sequence Discriminative Training for Deep Learning based Acoustic Keyword Spotting”, arXiv:1808.00639v1 [cs.CL], 2018.
[26] A. Kadan, P. Vivek, V.L. Lajish, “A Keyword Spotting Approach for Content-Based Indexing and Retrieval of Malayalam News Videos”, Conference Paper NSA-2015, 2015.
[27] C. Zhu, Q.J. Kong, L. Zhou, G. Xiong, F. Zhu, “Sensitive Keyword Spotting for Voice Alarm Systems”, In the Proceedings of 2013 IEEE International Conference on Service Operations and Logistics, and Informatics, pp.350–353, 2013.
[28] V. Karjigi, B. Patel, P. Rao, “Identification of stop consonants for acoustic keyword spotting in continuous speech”, Journal of Intelligent Systems, Vol. 22, No.3, pp.215-228, 2013.
[29] H. Bahi, N. Benati, “A New Keyword Spotting Approach”, IEEE transactions, 2009.
[30] M. Weintraub, “LVCSR Log Likelihood Ratio Scoring For Keyword Spotting”, IEEE International Conference on Acoustics, Speech and Signal Processing, 2002.
[31] S. Shetty, K.K. Achary, “Audio Data Mining Using Multi-perceptron Artificial Neural Network”, IJCSNS International Journal of Computer Science and Network Security, Vol. 8, No.10, pp.224–229, 2008.
[32] Y. Zhang, J.R. Glass, “Unsupervised Spoken Keyword Spotting via Segmental DTW on Gaussian Posterior grams”, IEEE Automatic Speech Recognition and Understanding Workshop, 2009.
[33] C. Weng, B. Juang, “Discriminative Training Using Non-Uniform Criteria for Keyword Spotting on Spontaneous Speech”, IEEE/ACM Transactions on Audio, Speech and Language Processing, 2015.
[34] J. Junkawitsch, L. Neubauer, H. Höge, G. Ruske, “A New Keyword Spotting Algorithm with Pre-Calculated Optimal threshold”, IEEE Conference Paper, 2002.
[35] K. Thambiratnam, S. Sridharan, “Isolated Word Verification Using Cohort Word Level Verification”, EUROSPEECH, 2003.
[36] M. Awaid, A.H. Kandil, S.A. Fawzi, “Audio Search Based on Keyword Spotting in Arabic Language”, International Journal of Advanced Computer Science and Applications, 2014.
[37] S. Tabibian, A. Shokri, A. Akbari, B. Nasersharif, “Performance Evaluation for an HMM-based Keyword Spotter and a Large-margin based one in Noisy Environments”, In Proceeding of the Computer Science, (ELSEVIER), 2011.
[38] T. Nitta, S. Iseji, T. Fukuda, H. Yamada, K. Katsurada, “Key-word Spotting Using Phonetic Distinctive Features Extracted from Output of an LVCSR Engine”, ISCA & IEEE Workshop on Spontaneous Speech Processing and Recognition, 2003.
[39] Y. Wang, P. Getreuer, T. Hughes, R.F. Lyon, R.A. Saurous, “Trainable Fronted for Robust and Far-Field Keyword Spotting”, IEEE transactions, 2017.
[40] G. Retsinas, G. Sfikas, B. Gatos, “Transferable Deep Features for Keyword Spotting”, Multidisciplinary Digital Publishing Institute Proceedings, Vol. 2, No.89, 2018.
[41] V. Smirnov, D. Ignatov, M. Gusev, M. Farkhadov, N. Rumyantseva, M. Farkhadova, “A Russian Keyword Spotting System Based on Large Vocabulary Continuous Speech Recognition and Linguistic Knowledge”, Journal of Electrical and Computer Engineering, 2016.
[42] W. Amelia, N.U. Maulidevi, “Dominant Emotion Recognition in Short Story Using Keyword Spotting Technique and Learning-based Method”, IEEE Transaction, 2016.
[43] W. Li, A. Billard, H. Bourlard, “Keyword Detection for Spontaneous Speech”, Conference Paper of IEEE 2nd International Congress on Image and Signal Processing, 2009.
[44] J. Tejedor, J. Colás, “Spanish Keyword Spotting System Based on Filler Models, Pseudo N-Gram Language Model and a Confidence Measure”, IV Jornadas en Tecnologia del Habla, 2006.
[45] A.S. Park, J.R. Glass, “Unsupervised Pattern Discovery in Speech”, IEEE Transactions on Audio, Speech and Language Processing, Vol. 16, No.1, 2008.
[46] G. Chen, C. Parada, G. Heigold, “Small-Footprint Keyword Spotting Using Deep Neural Networks”, IEEE International Conference on Acoustics, Speech and Signal Processing, 2014.
[47] Lin, Hui, A. Stupakov, J.A. Bilmes, “Spoken keyword spotting via multi-lattice alignment”, INTERSPEECH, 2008.
[48] A.H. Mansour, G.Z.A. Salh, H.H.Z. Alabdeen, “Voice recognition Using Back Propagation Algorithm in Neural Networks”, International Journal of Computer Trends and Technology, Vol. 23, No.3, 2015.
[49] M. Limkar, R. Rao, V. Sagvekar, “Isolated Digit Recognition Using MFCC and DTW”, International Journal on Advanced Electrical and Electronics Engineering, Vol. 1, Issue.1, pp.2278-8948, 2012.
[50] A. Zehetner, M. Hagmuller, F. Pernkopf, “Wake-Up-Word Spotting or Mobile Systems”, Proceedings of the 22nd European Signal Processing Conference, IEEE, 2014.
[51] J. Nouza, J. Silovsky, “Fast Keyword Spotting in Telephone Speech”, Radio Engineering, Vol. 18, No.4, 2009.
[52] B. Varghese, S. Govilkar, “A Survey on Various Word Spotting Techniques for Content-Based Document Image Retrieval”, International Journal of Computer Science and Information Technologies, Vol. 6, No.3, pp.2682-2686, 2015.
[53] Wshah, Safwan, G. Kumar, V. Govindaraju, “Script Independent Word Spotting in Offline Handwritten Documents Based on Hidden Markov Models”, IEEE International Conference on Frontiers in Handwriting Recognition, 2012.
[54] A. Bhardwaj, S. Setlur, V. Govindaraju, “Keyword Spotting Techniques for Sanskrit Documents”, Sanskrit Computational Linguistics, Springer, Berlin Heidelberg, 2009.
[55] Q. Chen, W. Zhang, X. Xu, X. Xing, “Improved Keyword Spotting based on Keyword/Garbage Models”, IEEE Transactions, 2017.
[56] L. Pandey, K. Chaudhary, R.M. Hegde, “Fusion of Spectral and Prosodic Information using Combined Error Optimization for Keyword Spotting”, IEEE Conference on Communication, 2017.
[57] I. Chen, C. Lee, “A Hybrid HMM/DNN Approach to Keyword Spotting of Short Words”, INTERSPEECH, 2013.
[58] S. Lubos, T. Jan, “Keyword Spotting Result Post-processing to Reduce False Alarms”, Proceeding of Recent Advances in Signals and Systems, 2009.
[59] G. Williams, S. Renals, “Confidence Measures for Hybrid HMM/ANN Speech Recognition”, In Proceedings of Eurospeech, pp.1955-1958, 1997.
[60] J.G. Wilpon, L.R. Rabiner, C.H. Lee, E.R. Goldman, “Automatic Recognition of Keywords in Unconstrained Speech Using Hidden Markov Models”, IEEE Transactions on Acoustics, Speech and Signal Processing (ASSP), Vol. 38, No.11, pp.1870-1878, 1990.
[61] M.G. Rahim, C.H. Lee, B.H. Juang, “Discriminative Utterance Verification for Connected Digits Recognition”, IEEE Transactions on Speech and Audio Processing, Vol. 5, No.3, 1997.
[62] V.K. Jain, S. Tripathi, “Speech Features Analysis and Biometric Person Identification in Multilingual Environment”, Int. J. Sc. Res. in Network Security and Communication, Vol. 6, Issue.1, 2018.
[63] Ketan Sarvakar, Urvashi K Kuchara, “Sentiment Analysis of movie reviews: A new feature-based sentiment classification”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 6, Issue.3, pp. 8-12, 2018.
Citation
B.K. Deka, P. Das, "A Review of Keyword Spotting as an Audio Mining Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.757-769, 2019.
Transcripter-Generation of the transcript from audio to text using Deep Learning
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.770-773, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.770773
Abstract
A video is the most powerful medium in the propagation of information and important part of the video for exchanging the information is audio, which is an important aspect of the video on which the whole message depends and as it is used in all field like Teaching, Entertainment, Conference Meeting, News Broadcast. So converting the Audio into Text in Documented format make easy for referring purpose as it is difficult to search the said word in the video as compared to the transcript. The main objective of developing this system is to present an automated way to generate the transcript for audio and video. As it is not possible to make the same informative video in all Languages. So this the place where our System plays an important role. It will extract the audio from the given video and transcript is generated based on which it can be translated into any desired language. It can be very useful for people who speak the language which is not used by the majority of the population. In this way, it has much application in all field where information exchange is happening based on Video
Key-Words / Index Term
Neural Network, Audio extraction, Speech recognition, Time synchronization, Automatic Transcript generation, Natural language processing, Connectionist Temporal Classification (CTC), Hidden Markov Model (HMM).
References
[1]Houssem chamber, Marlon Oliveira, Kevin McGuinness, Suzanne Little, Keisuke Kameyama
“Educational video classification by using a transcript to image transform and supervised learning.”
[2] Tatsuya Kawahara, Yusuke Nemoto, Yuka Akita. “Automatic lecture Transcription by exploiting presentation slide information for Language Model Adaption.”May 2008 IEEE
[3] Wai Fong Chua, “Teaching and learning only the language of numbers—monolingualism in a multilingual world, ” Critical Perspectives on Accounting, Vol. 7, No. 1, pp. 129-156 February 1996, ISSN 1045-2354, http://dx.doi.org/10.1006/cpac.1996.0019.
[4] G. Nowak, S. Grabowski, C. Draus, D. Zarebski and W. Bieniecki, “Designing a computer-assisted translation system for multi-lingual catalog and advertising brochure translations,” in Proc. of Sixth International Conference on Perspective Technologies and Methods in MEMS Design pp.175- 180, 20-23 April 2010.
[5] Houssem chamber, Marlon Oliveira, Kevin McGuinness, Suzanne Little, Keisuke Kameyama, Paul Kwan, Alistair Sutherland, “Educational video classification by using a transcript to image transform and supervised learning.” 13-15 July 2016
[6] J. Santos and J. Nombela, “Text-to-speech conversion in Spanish a complete rule-based synthesis system,” in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.7, pp.1593-1596, May 1982.
[7] F. Y. Sadeque, S. Yasar and M. M. Islam, “Bangla text to speech conversion: A syllabic unit selection approach,” in Proc. of International Conference on Informatics, Electronics & Vision (ICIEV), pp.1-6, 17-18 May 2013.
[8] Xia Linsi, N. Yamashita and Toru Ishida, “Analysis on Multilingual Discussion for Wikipedia Translation,” in Proc. of Second International Conference on Culture and Computing, pp.104-109, 20-22 Oct. 2011.
[9] Tatsuya Kawahara, Yusuke Nemoto, Yuka Akita, “Automatic lecture Transcription by exploiting presentation slide information for Language Model Adaption.” August 2008.
[10] Nikolas Lee, Jia Wern Yong,”Automated Transcript Generation for the video conferences” 11-Nov 2017
[11] S. Peitz, M. Freitag, A. Mauser, and H. Ney, “Modeling punctuation prediction as machine translation,” in Proceedings of the International Workshop on Spoken Language Translation, 2011.
[12] F. Batista, H. Moniz, I. Trancoso, and N. Mamede, “Bilingual experiments on automatic recovery of capitalization and punctuation of automatic speech transcripts,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 20, pp. 474–485, 2012.
Citation
Fatima Ansari,Ramsakal Gupta, Uday Singh, Fahimur Shaikh, "Transcripter-Generation of the transcript from audio to text using Deep Learning," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.770-773, 2019.
Brain Tumor Detection and Segmentation Using Conditional Random Field
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.774-779, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.774779
Abstract
Medical image processing is a highly challenging field. Medical imaging techniques are used to image the inner portions of the human body for medical diagnosis. MR images are widely used in the diagnosis of brain tumor. In this paper, we present an automated method to detect and segment the brain tumor regions. The proposed method consists of three main steps: initial segmentation, modeling of energy functions and optimize the energy function. To make our segmentation more reliable we use the information present in the T1 and FLAIR MRI images. We use Conditional random field (CRF) based framework to combined the information present in T1 and FLAIR in probabilistic domain. A main advantage of CRF based framework is we can model complex shapes easily and we incorporate the observations in energy function
Key-Words / Index Term
Conditional random field (CRF), Fuzzy-C-Means algorithm, Fuzzy C Means Clustering Algorithm
References
[1]. B. Thiagarajan, R. Bremananth “Brain Image Segmentation Using Conditional Random Field Based On Modified Artificial Bee ColonyOptimization Algorithm” International Journal of Biomedical and Biological Engineering vol ., Vol:8, No:9, 2014
[2]. M. Stella Atkins and Blair T. Mackiewich “Fully Automatic Segmentation of the Brain in MRI” IEEE Trans.on medical imaging vol .17, No .1,Feb 1998
[3]. B. Johnston, M. S. Atkins, B. Mackiewich, and M. Anderson, “Segmentation of multiple sclerosis lesions in intensity corrected multispectral MRI,” IEEE Trans. Med. Imag., vol. 15. pp. 154–169, Apr. 1996.
[4]. W. M. Wells,W. E. L. Grimson, R. Kikinis, and F. A. Jolesz, “Adaptive segmentation of MRI data,” IEEE Trans. Med. Imag., vol. 15, pp. 429–443, Aug. 1996.
[5]. D. R. Thedens, D. J. Skorton, and S. R. Fleagle, “Methods of graph searching for border detection in image sequences with applications to cardiac MRI,” IEEE Trans. Med. Imag., vol. 14, pp. 42–55, Mar. 1995
[6]. L. H. Staib and J. S. Duncan, “Boundary finding with parametrically deformale models,” IEEE Trans, Pattern Anal. Machine Intell., Nov. 1992.
[7]. S. Lobregt and M. Viergever, “A discrete dynamic contour model,” IEEE Trans. Med. Imag., vol. 14, pp. 12–24, Mar. 1995.
[8]. M. E. Brummer, R. M. Mersereau, R. L. Eisner, and R. R. J. Lewine, “Automatic detection of brain contours in MRI data sets,” IEEE Trans. Med. Imag., vol. 12, pp. 153–166, June 1993.
[9]. Dr. Saravana Kumar Ganesan and Dr. Ravi Sundaram3 et.al “An Automated Image Segmentation Scheme for MRI” International Journal of Advance Research in Computer Science and Management Studies vol .1,Issue .6, pp . 149-157, Nov 2013.
[10]. Alex P. Zijdenbos and Benoit M. Dawant et.al “Morphometric Analysis of White Matter Lesions in MR Images: Method and Validation” IEEE Trans on Medical imaging, vol .13, No .4, December 1994.
[11]. N. Senthilkumaran and R. Rajesh, “Edge Detection Techniques for Image Segmentation-A Survey of Soft Computing Approaches”, International Journal of Recent Trends in Engineering, Vol.1, No.2, pp.250-254, May 2009.
[12]. Fauzia Khan, Shoaib A. Khan and Ubaid Ullah Yasin et.al” Detection of Glaucoma Using Retinal Fundus Images” IEEE Biomedical Engineering International Conference (BMEiCON-2013).
[13]. Saeid Fazli,, Parisa Nadirkhanlou” A Novel Method for Automatic Segmentation of Brain Tumors in MRI Images”
[14]. Rupinder Kaur and Er. Garima Malik “An Image Segmentation Using Improved FCM Watershed Algorithm and DBMF” Journal of Image and Graphics, vol .2, No .2, Dec 2014.
[15]. Samir Kumar Bandhyopadhyay, Tuhin Utsab Paul “Automatic Segmentation of Brain Tumour from Multiple Images of Brain MRI”(IJAIEM), vol .2, Issue 1, Jan 2013.
[16]. C. A. Davatzikos and J. L. Prince, “An active contour model for mapping the cortex,” IEEE Trans. Med. Imag., vol. 14, pp. 65–80, Mar. 1995.
[17]. Rehna Kalam, M. Abdul Rahman “Tumor and Edema Segmentation Using Efficient MFCM and MRG Algorithm” (IJRIIT), vol .3, Issue .3,pp .615, 2017.
[18]. Ajala Funmilola A, Oke O.A, Adedeji T.O, Alade O.M, and Adewusi E.A”Fuzzy k-c-means Clustering Algorithm for Medical Image Segmentation” Journal of Information Engineering and Applications. Vol .2, No .6, 2012.
[19]. V. Janani, P. Meena”Image Segmentation For Tumor Detection Using Fuzzy Inference System”, (IJCSMC), vol .2, Issue 5,pp.no .244- 248, May 2013.
[20]. Jibi Belghese, Sheeja Agustin “Brain Tumor Segmentation using Pattern Neural Networks with MRI Images”, IJSTE, vol .3, Issue .9, March2017
[21]. Nikhita Biradar, Prakash H. Unki “Brain Tumor Detection Using Clustering Algorithms in MRI Images”, (IRJET), vol .4, Issue 6, June 2016.
[22]. Priyadharsini.B “A Novel Noise Filtering Technique for Denoising MRI Images”, (IJIRCCE), vol .2, Issue 1, March 2014.
[23]. Guido Gerig,Olafkubler et.al “Nonliner Anisotropic Filtering of MRI Data” IEEE Trans.on Medical imaging, vol .11,No.2,pp .221-232 June 1992.
[24]. P.D.Yadav, Y.M.Patil “A Brain Tumor Detection Using K-Means, Fuzzy C Means and Watershed”(ICLTESHM-17), pp. 23,04 Feb 2017.
[25]. Silky Narang, Madan Lal and Navdeep Kanwal A Comparitive Survey Of Various Segmentation Techniques , (IJIRD), vol .2 Issue 5, May 2013
Citation
Vulavabeti Raghunath Reddy, Shaik Anusha, K Ravindra Reddy, "Brain Tumor Detection and Segmentation Using Conditional Random Field," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.774-779, 2019.
Exploration of Keystroke Dynamics Based Authentication on Fixed-Text and on Free-Text
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.780-785, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.780785
Abstract
Computer security is the protection of computing systems and the data that is stored or accessed. It is very important to ensure that the information remains confidential and only those who should access that information can. Username and password alone are insufficient in complex applications. Hence, a strong authentication method such as Biometric authentication method is required to verify one’s identity using the unique biological characteristics of an individual. Existing security approaches can be strengthened by one of the behavioral biometric based technique known as Keystroke Dynamics. The main objective of this paper is to explore particularly on Keystroke Dynamics based Authentication (KDA). This technique can be applied in different domains like intrusion detection, online learning and assessment, e-banking etc., to authenticate the users. This paper presents a review of its applications using fixed-text (static passwords) and free-text (continuous). Comparing these two types of keystroke authentication methods, Free-text kind of authentication process was found to be better as it is not limited with username and password during the log-in session; it is continued until the end of the log-on session.
Key-Words / Index Term
Authentication, Keystroke dynamics, Behavioral Biometrics, Fixed Text, Free text, Biometric authentication
References
[1] M. L. Ali, J. V. Monaco, C. C. Tappert, and M. Qiu, “Keystroke Biometric Systems for User Authentication,” Journal of Signal Processing Systems, vol. 86, no. 2–3, pp. 175–190, 2017.
[2] A. Alsultan and K. Warwick, “Keystroke Dynamics Authentication: A Survey of Free-text Methods,” International Journal of Computer Science, vol. 10, no. 4, pp. 1–10, 2013.
[3] M. Karnan, M. Akila, and N. Krishnaraj, “Biometric personal authentication using keystroke dynamics : A review,” Applied Soft Computing, vol. 11, no. 2, pp. 1565–1573, 2011.
[4] A. Alshehri, F. Coenen, and D. Bollegala, “Iterative Keystroke Continuous Authentication: A Time Series Based Approach,” KI - Künstliche Intelligenz, pp. 1–13, 2018.
[5] J. Kim, H. Kim, and P. Kang, “Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection,” Applied Soft Computing Journal, vol. 62, pp. 1077–1087, 2018.
[6] I. Tsimperidis, A. Arampatzis, and A. Karakos, “Keystroke dynamics features for gender recognition,” Digital Investigation, vol. 24, pp. 4–10, 2018.
[7] A. Goodkind, D. G. Brizan, and A. Rosenberg, “Utilizing overt and latent linguistic structure to improve keystroke-based authentication,” Image and Vision Computing, vol. 58, pp. 230–238, Feb. 2017.
[8] S. Mondal and P. Bours, “A study on continuous authentication using a combination of keystroke and mouse biometrics,” Neurocomputing, vol. 230, no. October 2016, pp. 1–22, 2017.
[9] P. Kang and S. Cho, “Keystroke Dynamics-based User Authentication Using Long and Free Text Strings From Various Input Devices Keystroke Dynamics-based User Authentication Using Long and Free Text Strings From Various Input Devices,” Journal of Information Sciences, vol. 308, pp. 72–93, 2015.
[10] Y. Matsubara, T. Samura, and H. Nishimura, “Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing,” Journal of Information Security, no. July, pp. 229–240, 2015.
[11] A. A. Ahmed and I. Traore, “Biometric recognition based on free-text keystroke dynamics,” IEEE Transactions on Cybernetics, vol. 44, no. 4, pp. 458–472, 2014.
[12] P. Bours, “Continuous keystroke dynamics: A different perspective towards biometric evaluation,” Information Security Technical Report, vol. 17, no. 1–2, pp. 36–43, 2012.
[13] D. Gunetti and C. Picardi, “Keystroke Analysis of Free Text,” ACM Transactions on Information and System Security (TISSEC), vol. 8, no. 3, pp. 312–347, 2005.
[14] O. Alpar, “Frequency Spectrograms for Biometric Keystroke Authentication Using Neural Network Based Classifier,” Knowledge-Based Systems, vol. 116, pp. 163–171, 2017.
[15] J. Hu, D. Gingrich, and A. Sentosa, “Authentication through Biometric Keystroke Dynamics,” IEEE International Conference on Communications, pp. 1556–1560, 2008.
[16] S. Z. Syed Idrus, E. Cherrier, C. Rosenberger, and P. Bours, “Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords,” Computers and Security, vol. 45, pp. 147–155, 2014.
[17] F. Bergadano, D. Gunetti, and C. Picardi, “User authentication through keystroke dynamics,” ACM Transactions on Information and System Security, vol. 5, no. 4, pp. 367–397, 2002.
[18] C. H. Jiang, S. Shieh, and J. C. Liu, “Keystroke statistical learning model for web authentication,” ASIACCS ’07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp. 359–361, 2007.
[19] R. K. Das, S. Mukhopadhyay, and P. Bhattacharya, “User authentication based on keystroke dynamics,” IETE Journal of Research, vol. 60, no. 3, pp. 229–239, 2014.
[20] M. Karnan, M. Akila, and A. Kalamani, “Feature subset selection in keystroke dynamics using ant colony optimization,” Journal of Engineering and Technology Research, vol. 1, no. 5, pp. 72–80, 2009.
[21] A. Bhatia and M. Hanmandlu, “Keystroke Dynamics Based Authentication Using Information Sets,” Journal of Modern Physics, vol. 8, no. 09, p. 1557, 2017.
[22] J. Roth, X. Liu, A. Ross, and D. Metaxas, “Biometric authentication via keystroke sound,” Proceedings - 2013 International Conference on Biometrics, ICB 2013.
[23] A. Bhatia and M. Hanmandlu, “Keystroke Dynamics Based Authentication Using Information Sets,” Journal of Modern Physics, vol. 8, no. 09, p. 1557, 2017.
[24] J. Roth, X. Liu, A. Ross, and D. Metaxas, “Biometric authentication via keystroke sound,” Proceedings - 2013 International Conference on Biometrics, ICB 2013, 2013.
Citation
M. Rathi, A. V. Senthil Kumar, "Exploration of Keystroke Dynamics Based Authentication on Fixed-Text and on Free-Text," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.780-785, 2019.