Glaucoma Detection Using Fuzzy-C Means Clustering Algorithm and Thresholding
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.859-864, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.859864
Abstract
Glaucoma is a non-curable eye disease hence early detection is required to prevent the further progression of it. This disease leads to total blindness. To deal with the disease various automated systems have been designed. In this paper we are giving explanation for Cup to Disc ratio (CDR) measurement using fuzzy algorithm. The Cup to Disc ratio (CDR) is one of the important factor in glaucoma detection. In the proposed method, the optic disc and optic cup is segmented using fuzzy c-means clustering and thresholding. The Cup to Disc Ratio (CDR) of the color retinal fundus camera image is the primary identifier to confirm glaucoma for a patient. It classifies the given input image as normal or diseased and if it is recognized as diseased then classify the stage of glaucoma affected patient whether Moderate, Severe or normal based on the CDR ratio. In this paper we are giving a number of screenshots which shows results of different image processing techniques applied on input images.
Key-Words / Index Term
Fundus image, Optic disc, Optic cup, Cup-to-disc ratio, Fuzzy c-means clustering
References
[1] S. Kavitha,, S. Karthikeyan &, K. Duraiswamy “Early detection of glaucoma in retinal images using cup to disc ratio.” In the proceedings of International Conference on Computing Communication and Networking Technologies (ICCCNT), India, pp. 1-5, 2010.
[2] J. Cheng,, J. Liu,, Y. Xu, , F. Yin, D. W. K. Wong,, N. M. Tan &, T. Y. Wong “Super pixel classification based optic disc and optic cup segmentation for glaucoma screening.” In the IEEE transactions on Medical Imaging, Vol: 32, Issue: 6, pp:1019-1032, 2013.
[3] N. M. Noor,, N. E. A. Khalid & N. M. Ariff “Optic cup and disc color channel multi-thresholding segmentation”. In the proceedings of International Conference on Control System, Computing and Engineering, pp. 530-534., 2013.
[4] C. Burana-Anusorn, W. Kongprawechnon, T. Kondo, S. Sintuwong & K. Tungpimolrut. “Image processing techniques for glaucoma detection using the cup-to-disc ratio.” Thammasat International Journal of Science and Technology, Vol. 18, Issue. 1, 2013.
[5] Hafsah Ahmad, Abubakar Yamin, Aqsa Shakeel, Syed Omer Gillani, Umer Ansari, “Detection of glaucoma using Retinal Fundus images”, in the proceedings of International Conference on Robotics and Emerging Allied Technologies in Engineering (iCREATE) Islamabad, 2014
[6] M. Kankanala, & S. Kubakaddi, “Automatic segmentation of optic disc using modified multi-level thresholding.”, in the proceedings of IEEE International Symposium Signal Processing and Information Technology (ISSPIT), pp: 000125-000130, 2014.
[7] F. Khan, S. A. Khan, U. U. Yasin, I. ul Haq & U. Qamar, “Detection of glaucoma using retinal fundus images.” Biomedical Engineering International Conference (BMEiCON), 6th, pp. 1-5, 2013
[8] A. Yadav , V.K. Harit “Fault Identification in Sub-Station by Using Neuro-Fuzzy Technique”. International Journal of Scientific Research in Computer Science and Engineering Vol.4, Issue.6, pp.1-7, 2016.
[9] D. Dey “Image Encryption using Linear Cryptanalysis and different Fuzzy operations” , International Journal of Scientific Research in Computer Science and Engineering Vol. 6, Issue. 4, pp: 01-08, 2018
[10] N. E. A.Khalid, , N. M. Noor, & N. M. Ariff. “Fuzzy c-means (FCM) for optic cup and disc segmentation with morphological operation.”, Procedia Computer Science, 42, pp: 255-262, 2014.
Citation
Karabi Barman, Parismita Sarma, "Glaucoma Detection Using Fuzzy-C Means Clustering Algorithm and Thresholding," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.859-864, 2019.
Big Data Applications in Aadhar Card Fraud Detection
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.865-867, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.865867
Abstract
Big Data is playing a very significant role to take any industry forward. In the fraud detection, automated fraud detection tries to collect all information to reduce in aadhar card frauds by doing analysis and data mining of Big Data. This paper investigates the benefits of Big Data technology and main methods of analysis that can be applied to the particular case of fraud detection in aadhar card. This paper hereby addresses aadhar card fraud detection via the use of data-mining techniques in classification of, Naive Bayesian (NB), c4.5, and Back Propagation (BP) analyze the customer data. In order to identify the patterns that can lead to frauds. Upon identify all sectors, adding a Aadhaar card include Name, Age, Date of Birth, Aadhaar Number ,Gender ,Photograph ,Residential Address, that are stored in data base according to biometric data are Fingerprints and Iris scan. Representing the Aadhaar number Details stored in the database in Fingerprints, Iris scan. Finally Aadhar card frauds are identified and detected using data mining algorithms.
Key-Words / Index Term
Big Data Analytics, Big Data Applications, and Aadhar card fraud detection, Classification Algorithm
References
[1] Mark A. Beyer and Douglas Laney. “The Importance of `Big Data`: A Definition”. Gartner, 2012. For book
[2] D. Fisher, R. DeLine, M. Czerwinski, and S. Drucker, “Interactions with big data analytics,” interactions, vol. 19, no. 3, pp. 50–59, May 2012. For journal
[3]Pang -Ning Tan, Vipin Kumar,Micheal Steinbach, “Introduction to data mining”, First Edition, 2012 For book
[4] D. Fisher, R. DeLine, M. Czerwinski, and S. Drucker, “Interactions with big data analytics,” interactions, vol. 19, no. 3, pp. 50–59, May 2012 For journal
[5] Jiawei Han, Micheline Kambar, Jian Pei, “Data Mining Concepts and Techniques” Elsevier Second Edition. For book
[6] B. Thuraisingham, L. Khan, M. Awad, and L. Wang, Design and Implementation of Data Mining Tools. Florida, USA: Auerbach Publication, 2009 For book
Citation
K. Ramya, A.Sumathi, "Big Data Applications in Aadhar Card Fraud Detection," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.865-867, 2019.
Improvement in the Online Handwritten Kannada Numeral Recognition with the Difference Feature
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.868-870, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.868870
Abstract
The paper discusses the performance of the online handwritten recognition module designed for Kannada numerals. In the proposed system, there is an improvement in the recognition accuracy of the recognition module when compared to the previous ones. The difference feature has given the improved performance of the recognition module. The difference feature vector is formed by computing the difference of consecutive x- and y- coordinate values of online handwriting. The writer independent experiments are carried out by dividing the collected online handwritten Kannada numeral data into a disjoint set of training and testing data sets. Out of 1400 numeral data samples, 700 numeral data samples are used for training the recognition modules and the remaining 700 numeral data samples are used for testing. The collected online handwritten data are subjected to preprocessing and feature extraction. The difference feature is extracted from the preprocessed data. The extracted features are mapped to lower-dimensional feature space by using OLDA. The subspace features are used to train and test the recognition module. Classification of the test data is carried out by using the nearest neighbor classifier. The average recognition accuracy of 99.3% is achieved.
Key-Words / Index Term
Online Handwriting, Kannada Numerals; Handwriting Recognition Module; Difference Feature; Nearest Neighbor Classifier
References
[1] R O Duda, P E Hart, and D Stork, Pattern Classification, Second Edition, John Wiley and Sons (Asia) Pvt. Ltd., 2006.
[2] A.L. Blum, P. Langley, “Selection of relevant features and examples in machine learning,” Artificial Intelligence, Vol. 97, pp. 245–27, 1997.
[3] Claus Bahlmann, “Directional features in online handwriting recogntion,” Pattern Recognition, Vol. 39, pp. 115-125, 2006.
[4] S. Jaeger, S Manke, J Reichert, and Waibel, “Online handwriting recognition: the NPen++ recognizer,” Int. Jl. Of Document Analysis and Recogntion, Vol. 3, pp.169-80, 2001.
[5] Basabi Chakraborty, Goutam Chakraborty, “A new feature extraction technique for on-line recognition of handwritten alphanumeric characters,” Information Sciences, Vol. 148, pp. 55–70, 2002.
[6] Michael Blumenstein, XinYu Liu, Brijesh Verma, “An investigation of the modified direction feature for cursive character recognition,” Pattern Recognition, Vol. 40, pp. 376-388, 2007.
[7] Wei Zeng, XiangXu Meng, ChengLei Yang, Lei Huang, “Feature extraction for online handwritten characters using Delaunay triangulation,” Computers & Graphics, Vol. 30, pp. 779–786, 2006.
[8] Fengxi Song, Shuhai Liu, Jingyu Yang, “Orthogonilzed Fisher disriminant”, Pattern Recognition, Vol. 38, Issue 2, pp. 311-313, 2005.
[9] M. Mahadeva Prasad, M. Sukumar, A. G. Ramakrishnan, “Divide and conquer technique in online handwritten Kannada character recognition,” In the Proc. of Int. Workshop on Multilingual Optical Character Recognition Systems, 2009, Barcelona, Spain.
[10] M. Mahadeva Prasad, M. Sukumar and A.G. Ramakrishnan, “Orthogonal LDA in PCA transformed subspace,” In the Proc. of 12th Conf. on Frontiers in Handwriting Recognition, pp. 172-175, 2010.
[11] M. Mahadeva Prasad, M Sukumar, “HMM based Two-Stage Classification Scheme to Improve Online Handwritten Kannada Numeral Recognition,” Int. Jl. of Computer Science and Technology, Vol. 3, Issue 2, pp. 897-902, 2012.
[12] M. Mahadeva Prasad, “Writing Direction Feature based Online Handwritten Kannada Numeral Recognition,” Int. Jl. of Computational Engineering Research, Vol. 9, No. 2, pp. 65-68, 2019.
Citation
M. Mahadeva Prasad, "Improvement in the Online Handwritten Kannada Numeral Recognition with the Difference Feature," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.868-870, 2019.
Best Fit Resource Allocation in Cloud Computing
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.871-875, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.871875
Abstract
Cloud Computing is performing computing using the internet facility. Computing is performed as on demand of the user. The Cloud Computing Load Balancing algorithms can be applied in Static, Dynamic and Centralized environment. The paper compares and summarizes some of the load balancing strategies in cloud computing environment. The paper discusses some existing cloud load balancing algorithms and compares them according to the usage of resources and makespan at each Node. The paper proposes new improved algorithm for cloud resource allocation in cloud computing and compares its resource allocation with the existing algorithm.
Key-Words / Index Term
Cloud Computing, Load Balancing, Static Load Balancing
References
[1] Peter Mell and Timothy Grance (September 2011). The NIST Definition of Cloud Computing (Technical report). National Institute of Standards and Technology: U.S. Department of Commerce. doi:10.6028/NIST.SP.800-145. Special publication 800-145.
[2] Deepti Sharma, Vijay B. Aggarwal, "Dynamic Load Balancing Algorithms for Heterogeneous Web Server Clusters", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.56-59, 2017
[3] Raza Abbas Haidri, C.P. Katti, P.C. Saxena, “A Load Balancing Strategy for Cloud Computing Environment”, 2014 IEEE International Conference on Signal Propagation and Computer Technology (ICSPCT), Ajmer, India, pp. 636-641.
[4] A. Kumar and M. Kalra, "Load balancing in cloud data center using modified active monitoring load balancer," 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), Dehradun, 2016, pp.1-5
[5] Ren, X., R. Lin and H. Zou, "A dynamic load balancing strategy for cloud computing platform based on exponential smoothing forecast", International Conference on. Cloud Computing and Intelligent Systems (CCIS), IEEE sept. 2011, pp: 220-224
[6] A. Beloglazov, Jemal Abawajy, Rajkumar Buyya, “Energy Aware Resource Allocation heuristics for efficient management of data centers for Cloud Computing”, Future Generation Computer Systems 28 (2012) 755–768
[7] Mohammadreza Mesbahi, Amir Masoud Rahmani, “Load Balancing in Cloud Computing: State of art Survey, MECS, pp. 64-78, March 2016
[8] R. N. Carlheiros, Rajiv Ranjan et al., “CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms”, Wileyonlinelibrary.com, August 2010, DOI: 10.1002/spe.995
[9] M. Katyal, A. Mishra, “A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment”, International Journal of Distributed and Cloud Computing, Vol. 1, Issue 2, December 2013.
[10] S.B. Shaw, A.K. Singh, “A Survey on Scheduling and Load Balancing Technique in Cloud Computing Environment”, 2014 International Conference on Computer and Communication Technology (ICCCT), Allahabad, 2014, pp. 87-95.
[11] Geethu Gopinath P P, Shriram K Vasudevan “An in depth analysis of load balancing technique in cloud computing environment”, 2nd International Symposium on Big Data and Cloud Computing Challenges, VIT University, Chennai, India, ISBCC-2015, pp. 427-432, 2015.
[12] S.Domanal, G. Reddy, “Optimal Load Balancing in Cloud Computing by Efficient Utilization of Virtual Machines”, IJATES, Vol 3, issue 2, 2014, pp.122-129
[13] Sanyogita Manhas, Jawahar Thakur, “Comparison of Load Balancing Algorithm in Cloud Computing”, IJCST Vol. 3, issue 4, Dec. 2012
[14] S. Wang, K. Yan, W. Liao, and S. Wang, “Towards a Load Balancing in a Three-level Cloud Computing Network”, Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Chengdu, China, September 2010, pages 108-113.
[15] Jasmin James, Dr. Bhupendra Verma, “Efficient VM Load Balancing Algorithm for a Cloud Computing Environment”, International Journal on Computer Science and Engineering (IJCSE) , Vol. 4 No. 09 Sep 2012 , pp. 1658-1663.
[16] Boutaba, R., Zhang, Q., & Zhani, M. F. (n.d.). “Virtual Machine Migration in Cloud Computing Environments.” In Communication Infrastructures for Cloud Computing (pp. 383–408). IGI Global. https://doi.org/10.4018/978-1-4666-4522-6.ch017
[17] Harish C. Sharma, Himanshu Bahuguna, “A Survey of Load Balancing Algorithm in Cloud Computing”, International Journal of Computer Engineering and Applications, issn: 2321-3469, Vol. XI, Issue XII, December 2017, pp. 150-160
[18] Harish C. Sharma, Himanshu Bahuguna, “Comparative Study of Load Balancing in Cloud Computing”, International Journal of Scientific & Engineering Research, Vol. 7, Issue 12, Dec. 2016, pp. 12-17, ISSN 2229-5518
Citation
Harish C. Sharma, Meenakshi Bisht, "Best Fit Resource Allocation in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.871-875, 2019.
A Comparative Analysis of Emotion Recognition using DEAP Dataset
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.876-881, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.876881
Abstract
Emotions play a crucial role in human communication and the Brain-Computer Interfaces (BCI) aid in emotion-based communication, similar to the way a mobile device aids in text-based communication. Emotions are expressed in myriad ways, including verbal, non-verbal and physiological signals. Most BCI systems accomplish this by using electroencephalography (EEG) signals. Before BCI systems are employed to practical use, efficient algorithms need to be developed in order to maximize efficiency. This paper proposes a method to map several emotional states using EEG signals collected from the publicly available Dataset for Emotion Analysis using Physiological signals (DEAP). It presents a comparative analysis of two different classification algorithms along with two different dimensionality reduction techniques. Linear Discriminant Analysis (LDA) and Principal Component Analysis (PCA) are used in tandem with Support Vector Machine (SVM) and K-Nearest Neighbours (KNN). The objective of this paper is to weigh the results to find the most promising classifier and dimensionality reduction technique. The average accuracy of binary classification using KNN-LDA for each valence, arousal, dominance and liking was 97.98%, 96.21%, 98.24% and 96.19% respectively.
Key-Words / Index Term
Emotion classification, EEG, Physiological signals, Signal processing, Pattern classification, Affective computing, DEAP Dataset, Machine Learning, Brain-Computer Interfaces (BCI), Electroencephalogram (EEG), Linear Discriminant Analysis (LDA), K-Nearest Neighbours (KNN), Support Vector Machine (SVM), Principal Component Analysis (PCA).
References
[1] T. D. Kemper and R. S. Lazarus, “Emotion and Adaptation,” Contemporary Sociology, vol. 21, no. 4. p. 522, 1992.
[2] J. Posner, J. A. Russell, and B. S. Peterson, “The circumplex model of affect: An integrative approach to affective neuroscience, cognitive development, and psychopathology,” Development and Psychopathology, vol. 17, no. 03. 2005.
[3] Y. Liu, O. Sourina, and M. K. Nguyen, “Real-Time EEG-Based Human Emotion Recognition and Visualization,” 2010 International Conference on Cyberworlds. 2010.
[4] R. Plutchik, “The Nature of Emotions: Clinical Implications,” Emotions and Psychopathology. pp. 1–20, 1988.
[5] D. Garrett, D. A. Peterson, C. W. Anderson, and M. H. Thaut, “Comparison of linear, nonlinear, and feature selection methods for EEG signal classification,” IEEE Trans. Neural Syst. Rehabil. Eng., vol. 11, no. 2, pp. 141–144, Jun. 2003.
[6] M. Soleymani, M. Pantic, and T. Pun, “Multimodal emotion recognition in response to videos (Extended abstract),” 2015 International Conference on Affective Computing and Intelligent Interaction (ACII). 2015.
[7] R. Nivedha, M. Brinda, D. Vasanth, M. Anvitha, and K. V. Suma, “EEG based emotion recognition using SVM and PSO,” 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). 2017.
[8] A.S. Mali, A.A. Kenjale, P.M. Ghatage, A.G. Deshpande, "Mood based Music System", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.27-30, 2018
[9] Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali, "Review Paper on Predicting Mood Disorder Risk Using Machine Learning", International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.16-22, 2019
[10] S. Koelstra et al., “DEAP: A Database for Emotion Analysis; Using Physiological Signals,” IEEE Transactions on Affective Computing, vol. 3, no. 1. pp. 18–31, 2012.
[11] Russell, J. A. (1980), “A circumplex model of affect,” Journal of Personality and Social Psychology, 39, December, 1161-1178.
Citation
Piyush Bhardwaj, Pratyaksha Jha, Nishtha Chheda, Suvarna Gosavi, "A Comparative Analysis of Emotion Recognition using DEAP Dataset," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.876-881, 2019.
Flight Safety Detection Using Modified Zeror Approach with Nominal Data Conversion
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.882-887, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.882887
Abstract
The flight safety monitoring becomes critical and is core area of research focused upon by this literature. To this end, data mining mechanisms employed by existing literature are discussed. ZeroR classifiers shortcoming of handling string values are overcome by converting the attributes to nominal form. Overall process of improving classification process is divided into phases. First phase includes loading the dataset. The fetched dataset requires storage. The dataset is stored within local storage. Second phase is critical and requires additional storage for maintaining pre-processed dataset. Pre-processed dataset contains nominal data. ZeroR cannot handle string data hence pre-processing phase converts data in understandable format for ZeroR classifier. In the second phase, necessary fields required for result prediction are retained and rest of the fields are ignored using regression mechanism. Third phase is a classification phase indicating that the performance is above baseline or not. By accommodating, nominal value conversion process within ZeroR classifier, classification accuracy is improved by 15%.
Key-Words / Index Term
ZeroR, Classification accuracy, Nominal values, String data
References
[1] C. Li, L. Zhu, and Z. Luo, “Big Time-frequency Domain Data Mining for Underdetermined BSS Using Density Component Analysis,” IEEE Access, 2016.
[2] B. Li, X. Ming, and G. Li, “Big Data Analytics Platform for Flight Safety Monitoring,” IEEE 2017 pp. 350–353, 2017.
[3] G. Zhu, K. Song, and P. Zhang, “A Travel Time Prediction Method for Urban Road Traffic Sensors Data,” 2015 Int. Conf. Identification, Information, Knowl. Internet Things, pp. 29–32, 2015.
[4] S. Jasra, J. Gauci, A. Muscat, and G. Valentino, “Literature review of machine learning techniques to analyse flight data,” Res. Gate, no. October, 2018.
[5] G. Li, T. Yuan, S. J. Qin, and T. Chai, “Dynamic time warping based causality analysis for root-cause diagnosis of nonstationary fault processes,” Int. J. Autom. Control, pp. 1289–1294, 2015.
[6] V. M. Janakiraman and D. Nielsen, “Anomaly Detection in Aviation Data using Extreme Learning Machines,” 2016.
Citation
Aparpreet Singh, Sandeep Sharma, "Flight Safety Detection Using Modified Zeror Approach with Nominal Data Conversion," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.882-887, 2019.
Multilocation Shop Management System using Web Services
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.888-893, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.888893
Abstract
Web application is a program which utilizes web technology and web browsers to perform the task over internet. Eg:Google docs.Web service is a standard method of integrating web application using standards over an internet for sharing data and services among themselves. Eg : .NET application interacting with java.Shop management system have the following shortfalls such as rate of profit fall, difficulty in replacement of products, quality of the products are reduced,improper communication between the hierarchy of nodes. At times,Clients experience “out of stock”circumstances.To overcome this we presented “Multilocation shop management system”.It provides enmorous gain for both the client and retailer offerings and allows growing single store business to numerous plus loactions.The admin francise can manage and view their consolidated customer,inventor and sales information from any location and can sink customers data every two mins or as often as want.Data is stored on an admin franchise computer and not on a remote server used by master or sub franchise and hence they can only view their consolidated customers requirments.It is a hierachial process which not only communicates between its master or sub-franchise but also communicates with its neighbouring master-franchise where the order from the sub-franchise and forwards it to the admin franchise to process the corresponding stock which will be stored in the local host of sub-franchise by using WAMP serve and the periodic udation is also done. dynamic web application are created with Apache 2,php and MYSQL on windows. franchise. POS allows to moniitor the shops statics from anywhere in the world, when a product or a service is purchased and to complete the transaction. Multilocation shop managemnet system use AngularJS an open source frondend javascrpit framework.The efficiency of the MULTILOCATION SHOP MANAGEMENT SYSTEM USING WEB SERVICES over the existing system is the (1) Efficient communication between the master franchise,(2) Periodical report submission to the admin franchise (3) Javascript is replaced by Angular Js and Rest api (4)Third party people are not involved to maintain the originality of products(5)All datas are secured in cloud storage.
Key-Words / Index Term
store management, SOAP, POS,Rest api,cloud, Reports
References
[1] G.Divya Jyothi and K.Navya, Design and implementation of store management system, MLR institue of technology Hyderabad telangana.
[2] S.D.T. Kelly, N.K. Suryadevara, S.C. Mukhopadhyay, “Towards the Implementation of IoT for Environmental Condition Monitoring in Homes”, IEEE, Vol. 13, pp. 3846-3853, 2013.
[3] Shen Bin, Liu Yuan, and Wang Xiaoyi ,“Research on Data Mining Models for the Internet of Things”, International Conference on Image
[4] Prachi Deokar, Dr. M. S. Nagmode, “A Survey on Home Automation using Cloud Network and Mobile Devices”, IJLTET, Vol. 3 Issue 3,2014.
[5] RFID-GMA, “RFID: So near—And yet, for CPG, so far?,” in Proc.Grocery Manuf. America Forum, 2004, vol. 6, no. 6, pp. 28–40.
[6] R. Clarke, R. , and T. Kipp, “Matching radio frequency tags to readers,”Smart Packaging J., no. 12, Aug. 2003.
[7] P. Harrop, “An introduction to smart packaging,” Smart Packaging J., no. 27, Nov. 2004.
[8] H. Ramamurthy, S. B. Prabhu, R. Gadh, and A. M. Madni, “Wireless industrial monitoring and control using a smart sensor platform,” IEEE Sensors J., vol. 7, no. 5, pp. 611–618, May 2007.
[9] H. Ramamurthy, S. B. Prabhu, R. Gadh, and A. M. Madni, “Smart sensor platform for industrial monitoring and control,” presented at the IEEE Sensors Conf., Nov. 2005.
[10] S. Bollapragada, R. Akella, and R. Srinivasan, “Centralized ordering and allocation policies in a two-echelon system with non-identical warehouses,”Eur. J. Oper. Res., vol. 106, pp. 74–81, 1998.
[11] Q. Geng and S. Mallik, “Inventory competition and allocation in a multi-channel distribution system,” Eur. J. Oper. Res., vol. 182, no. 2, pp. 704–729, 2007.
[12] G. Eppen and L. Schrage, “Centralized ordering policies in a multiwarehouse system with lead times and random demand,” TIMS Stud Manage. Sci., vol. 16, pp. 51–67, 1981.
[13] S. Mahar, P. D. Wright, and K. M. Bretthauer, “Enterprise systems focused collection: Dual channel supply chains: Challenges and opportunities in e-fulfillment,” Prod. Inventory Manage. J., vol. 47, no. 2, pp. 14–30, 2011.
[14] E. Bendoly, J. D. Blocher, K. M. Bretthauer, S. Krishnan, and M. A.Venkataramanan, “Online/In-Store integration and customer retention,”J. Serv. Res., vol. 7, no. 4, pp. 313–327, 2005.
[15] In-Store Pickup and Returns for a Dual Channel Retailer Stephen Mahar and P. Daniel Wright
[16]Models for Cost-Benefit Analysis of RFID Implementations in Retail Stores Jayavel Sounderpandian, Rajendra V. Boppana, Senior Member, IEEE, Suresh Chalasani, Senior Member, IEEE, and Asad M. Madni, Fellow, IEEE
Citation
P.Bhavani, Preetha.S, Keerthana.D, Lokambal.V, "Multilocation Shop Management System using Web Services," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.888-893, 2019.
Impact of Asymmetric Encryption in Cloud Computing: A Study
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.894-897, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.894897
Abstract
“Cloud Computing” a form of On-demand computing used by business peoples, organizations and institutions on pay –as-you basis. The Cloud Computing paradigm have many advantages such as availability, scalability, automated updates on software, enhanced collaboration and easily manageable, that makes it as an efficent medium for use. Security threat to its data stored in shared medium is a major concern. To ensure the authentication of the data many mechanisms were in use. Over past decades Cryptography is one most widely used technique for concealing data from third party. Symmetric key cryptography uses the similar key for both the encryption and decryption of messages. Instead, Asymmetric key cryptography uses two different types of keys. This paper discussed about the brief overview of algorithms and mechanisms done by the researchers regarding authentication and authorization issues in the asymmetric key scenario.
Key-Words / Index Term
Cloud Computing, Authentication, Cryptography, Security
References
[1]. Scott Craver Stefan Katzen Beizzer et.al.,” Copyright protection protocols based on asymmetric watermarking”, IFIP International Federation for Information Processing 2001.
[2]. Emmanouil Magkos Panayiotis Kotzanikolaou et.al.,” An Asymmetric Traceability scheme for copyright protection without Trust Assumption”, K. Bauknecht, S.K. Madria, and G. Pernul (Eds.): EC-Web 2001, LNCS 2115, pp. 186–195, 2001. Springer-Verlag Berlin Heidelberg 2001.
[3]. Sung-Cheal Byun and Byung-Ha Aahn et.al.,” Symmetric and Asymmetric Cryptography based Watermarking Scheme for Secure Electronic Commerce via the internet”, W. Chung et al. (Eds.): HSI 2003, LNCS 2713, pp. 607-612, 2003. Springer-Verlag Berlin Heidelberg 2003.
[4]. Z.Zeghid,M.Machhout,L.Khriji,A.Baganne,R.Tourki et.al,” A modified AES based algorithm for image encryption”, World Academy of Science, Engineering and Technology 27 2007.
[5]. LAI Xvejia, Lu Mingxin,Qin Lei,Han Junsong,Fang Wimen et,al,.” Asymmetric Encryption and Signature method with DNA technology”, Science China Press and Springer-Verlag Berlin Heidelberg 2010.
[6]. Lei Zhang,Qianhong wu,Bo Qin,Josep Domingo-Fercer et.al.,” Identity based authenticated asymmetric group key agreement protocol”, M.T. Thai and S. Sahni (Eds.): COCOON 2010, LNCS 6196, pp. 510–519, 2010. Springer-Verlag Berlin Heidelberg 2010.
[7]. Tumpa Roy Kamlesh Dutta et.al.,” Mutual Authentication for mobile communication using symmetric and asymmetric key cryptography”, D.C. Wyld et al. (Eds.): NeCoM/WeST/WiMoN 2011, CCIS 197, pp. 88–99, 2011. Springer-Verlag Berlin Heidelberg 2011.
[8]. Niraj kumar pankaj kupta Monika sahu Dr.Marizvi et.al.,” Boolean Algebra based effective and efficient Asymmetric key cryptography”, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s) 978-1-4673-5090-7/13/$31.00 ,2013 IEEE.
[9]. Samiksha Shukla Dr.G.Sadashivappa et.al.,” Secure multi-party computation protocol using Asymmetric encryption”, 978-93-80544-12-0/14/$31.00,2014 IEEE, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).
[10]. Vahid Forutan Robert Fischer et.al.,” Security enhanced network coding through public key cryptography”, 2015 IEEE Conference on Communications and Network Security (CNS), 978-1-4673-7876-5/15/$31.00 ,2015 IEEE.
[11]. Pu Yue,Li Guodong Zhao Jing et.al.,” Based on the improved RSA keys and compound chaotic system and design of audio encryption algorithm”, 2016 International Conference on Smart City and Systems Engineering (ICSCSE) 978-1-5090-5530-2/16 $31.00 ,2016 IEEE.
[12]. Hsin-Te Wu,Gwo-jiun Homg et.al.,” Vehicular cloud network and information security mechanisms”, 2016 International Conference on Advanced Materials for Science and Engineering (ICAMSE) IEEE-ICAMSE 2016 - Meen, Prior & Lam (Eds).
[13]. Shilpa V Mahagonkar Nilma Dongre et.al.,” TEAC: Timed Efficient Asymmetric cryptography for enhancing security in VANET”, 2017 International Conference on Nascent Technologies in Engineering (ICNTE) 2017 IEEE.
[14]. Naveen Kumar Manisa J Nene et.al.,” Chip based asymmetric key generation in hierarchical wireless sensor networks”, 2017 2nd International Conference for Convergence in Technology (I2CT) 2017 IEEE.
[15]. Sauvik Bal Mrind Kanti Sarkar et.al.,” ACAFP: Asymmetric key based cryptography algorithm using four prime numbers to secure message communication”, 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON) 2017 IEEE.
[16]. Lakshika Singh, Anuj Kumar et.al.,” Secured Information Retrieval from cloud involving OTP and human voice”, 2017 IJSRST VoL.3 ,Issue.7 ,Print ISSN: 2395-6011,Online ISSN: 2395-602X, International Journal of Scientific Research in Science and Technology (www.ijsrst.com).
[17]. Archit Agarwal Satya Jeet Singh et.al.,” Mask ID’s based Asymmetric Session key exchange”, 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC) 2017 IEEE.
[18]. Bhaskar Marapelli et.al.,” Enhancement of cloud data security by multi cloud data encryption and decryption”, 2018 IJSRST VoL. 4 ,Issue.5, Print ISSN: 2395-6011 | Online ISSN: 2395-602X, International Journal of Scientific Research in Science and Technology (www.ijsrst.com).
[19]. Harshad R.Pawar Dr.Dinesh,G.Harkut et.al.,” Classical and Quantum cryptography for image encryption and decryption”, 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE), 2018 IEEE.
[20]. D.N.Wu,Q.Q.Gan X.M.Wang et.al.,” Verifiable public key encryption with keyword search based on homomorphic encryption in multiuser setting”, D. N. Wu et al.: Verifiable PEKS Based on Homomorphic Encryption in Multi-User Setting, VoL 6, 2018,IEEE Access.
[21]. C. Kaleeswari, P. Maheswari, Dr. K. Kuppusamy, Dr. Mahalakshmi Jeyabalu ,”A Brief Review on Cloud Security Scenarios “2018 IJSRST ,VoL.4 ,Issue.5.
[22]. Sebagenzi Jason, Suchithra. R, “Scheduling Reservations of Virtual Machines in Cloud Data Center for Energy Optimization”, in International Journal of scientific research in Computer Science and Engineering, Vol 6, Issue 2, pp:16-26, December 2018.
Citation
M. Ilakiya, R. Vijithra, K. Kuppusamy, J. Mahalakshmi, "Impact of Asymmetric Encryption in Cloud Computing: A Study," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.894-897, 2019.
A Study on Language Computations by preserving them as audio Documents
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.898-903, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.898903
Abstract
In this article, we made a study about the various aspects of the computing techniques such as acoustic, phonetics, phonetic-structures, language computation on linguistic perspective and so on. The study confines with the dimensions of the population ratio of languages, some phonetic structures of languages, acoustic devices and their specifications. It is important to study the languages as the spoken langauges are being lost at some rates and it is our resposibility to give stress on this topic so that human culture can be preserved and as well as the language.
Key-Words / Index Term
Acoustic, phonetics, phonetic-structures, language-computation, linguistic
References
[1] Gussenhoven, C. & Aarts, F. The dialect of Maastricht Journal of the International Association, 29, 1999, pp.55-56.
[2] Ladefoged, P. & Maddieson, I. The sounds of the world’s languages. Blackwells, 1996.
[3] B Choudhury, A Das. A Study on the Process of Supra segmental Preservation of IE Language and Computational Data Analysis of Acoustic Phonetics, August, 2018, pp.209-14, Journal of Emerging Technologies and Innovative Research.
[4] ARIANNA BERARDI-WILTSHIRE. ENDANGERED LANGUAGES IN THE HOME: THE ROLE OF FAMILY LANGUAGE IN THE REVITALISATION OF INDIGENOUS LANGUAGES, JANUARY, 2017.
[5] Ladefoged, Peter. Preserving the sounds of disappearing languages. California: Linguistics Department, University of California. 2009
[6] Delattre, P. The physiological interpretation of sound spectrogram. America: Modern Language Association Publication. 1951.
Citation
A. Das, B. Choudhury, "A Study on Language Computations by preserving them as audio Documents," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.898-903, 2019.
An Authenticated Face Recognition Application for e-Payment using Python
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.904-908, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.904908
Abstract
Now a day due to rapid technology growth theft over transactions is emerging at higher rate. Although passwords are used as a level of authentication, the problem is solved at a certain extent. Another level of authentication may be introduced to provide secure transactions. Many biometric security provisions are employed today and selection of approach varies from application to application. Face recognition is one of popular authentication especially in the transaction areas. The major advantage of face based identification over other biometrics is uniqueness and acceptance. This system compares the image of the user with already registered image in the repository based on feature extraction, if it matches then the system proceeds to further processing. Whenever the user provides credentials in the form of password, an OTP is generated and is send to the registered mobile number. Later the system dynamically captures the facial image of the user through webcam of the system, Search in the registered repository on feature extraction approach basis then goes for comparison. If it found match then permits for e-payment procedure. Biometric applications implementation mostly use python environment due to adequate python features. Python is open source, portable, objects oriented software.
Key-Words / Index Term
Face recognition, Biometric, Repository, Feature extraction, Pattern recognition, Webcam
References
[1] Kaushik S., Dubey R. B. and Madan A. “Study of Face Recognition Techniques”, International Journal of Advanced Computer Research, Vol.4(4), pp. 123-128, (2014).
[2] Kanti J. and Papola A. “Smart Online payment using FaceRecognition with Percentage Analyzer”, International Journal of Advanced Research in Computer and Communication Engineering, 19(08), 224-236 , (2014).
[3] Neelesh S Salian., Priyank Patel.,Shrenik S. and KavitaSonawane “Automated Online payment System using Fuzzy Logic and Content based Image Retrieval”, International Journal of Computer Applications, Vol. 37(12), pp. 0975 – 8887.
[4] Turk M. A. and Pentland A. P. “Face Recognition Using Eigenfaces” ,IEEE Conference on Computer Vision and Pattern Recognition, 35(01), pp. 581- 591, (1991), (2012).
[5] Srivastava S. and Jain D. C. “A Review on Face Recognition Online payment System”, International Journal of Computer Applications, Vol.143(8), pp. 0975-8884, (2016).
[6] Yang M., Kriegman D. J. and Ahuja N. “Detecting Faces in Images,”The IEEETransactions on Pattern Analysis and Machine Intelligence, Vol. 24(1), pp. 1-4., (2009).
[7] Pandya J. M., Rathod D. and Jadhav J “A Survey of Face Recognition approach”, International Journal of Engineering Research and Applications (IJERA), Vol. 3(1), pp. 632-635, (2013).
[8] Wiskott L., Fellous T. and Kriiger N. “Face Recognisation by Elastic Bunch GraphMatching”, IEEE Transactions on pattern analysis and machine intelligence,Vol. 7(01), pp. 775-779, (2014).
Citation
K. Nagaraju, Adepu Rajesh, S.V. Hemanth, "An Authenticated Face Recognition Application for e-Payment using Python," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.904-908, 2019.