Analysis of Energy Efficiency using Novel Algorithm Hierarchical Clustering with Map Reduce in Wireless Sensor Network Environment
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.947-955, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.947955
Abstract
Wireless sensor networks consist of sensor nodes, which include huge application in disaster management, habitat monitoring, military, and security preference and so on. Wireless sensor nodes might be small in size and have less-processing capability by means of low battery power consumption. These are listed as the important constraints for many WSN applications such as network lifetime, node mobility, adaptability, scalability, energy efficient, load balancing and availability. Clustering method utilized the sensor nodes is an efficient technique to achieve these goals. The different clustering algorithms also differ in their objectives. In this paper, a new method is to achieve the proposed technique because it supports on MAPREDUCE programming model and EM (Expected Maximization) clustering algorithm. The key performances of the proposed algorithm HCM (Hierarchical Clustering with MapReduce) manage minimizing energy consumption, and take full advantage of network lifetime. The simulated performance of the results implement in the NS-2 platform, which exhibits the longer network lifetime of the proposed HCM algorithm and also it has performed better than the well-known clustering algorithms, DHAC (Distributed Hierarchical Agglomerative Clustering), HAC (Hierarchical Agglomerative Clustering), and K-Means with MapReduce.
Key-Words / Index Term
Wireless Sensor Network, Expectation-Maximization Clustering, Cluster-Based Data Aggregation, Energy Efficient Clustering Algorithm for Maximizing Lifetime, Hierarchical Agglomerative Clustering, Distributed Hierarchical Agglomerative Clustering, K-Means Clustering using Map-Reduce Technique
References
[1]. Foto N Afrati and Jeffrey D Ullman, “Optimizing joins in a map-reduce environment”, In Proceedings of the 13th International Conference on Extending Database Technology. ACM, 99–110, 2010.
[2]. Prajesh P Anchalia, Anjan K Koundinya, and NK Srinath, “MapReduce design of K-means clustering algorithm”, In Information Science and Applications (ICISA), 2013 International Conference on. IEEE, 1–5, 2013.
[3]. Xiaoli Cui, Pingfei Zhu, Xin Yang, Keqiu Li, and Changqing Ji, “Optimized big data K-means clustering using MapReduce”, The Journal of Supercomputing 70, 3 (2014), 1249–1259, 2014.
[4]. A. P. Dempster, N. M. Laird and D. B. Rubin, “Maximum Likelihood from Incomplete Data via the EM Algorithm”, Blackwell Publishing, Oxford, England, UK, 1977.
[5]. I. D. Dinov, “Expectation Maximization and Mixture Modeling Tutorial”, University of California, Los Angeles, USA, 2008
[6]. Liliana M Arboleda C, Nidal Nasser, “Cluster- based Routing Protocol for Mobile Sensor Networks”, In: 3rd International Conference on Quality of Service in Heterogeneous Wired/ Wireless Networks, Waterloo, Canada, 2006.
[7]. Ratish Agarwal, Mahesh Motwani, “Survey of Clustering Algorithm for MANET”, In: International Journal on Computer Science and Engineering, Vol.12, pp.98-104, 2009.
[8]. Celeux, G., Govaert, G, “A classification EM algorithm for clustering and two stochastic versions”, Comput. Stat. Data Anal. 14, 315–332 (1992)
[9]. Dempster, A., Laird, N., Rubin, “D.: Maximum likelihood for incomplete data via the EM algorithm”, J. Roy. Stat. Soc. 39(B), 1–38 (1977)
[10]. Sangho Yi, Junyoung Heo, Jiman Hong, “PEACH: Power-efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks”, Science Direct, Computer communications 30, pages 2842-2852, 2007.
[11]. Guo B, Li Z, “United voting dynamic cluster routing algorithm based on residual-energy in wireless sensor networks”, Journal of Electronics & Information Technology 29(12), pages 3006-3010,2007.
[12]. Yuan H-y, Yang S-q, Li X-l et al, “Time-controlled routing algorithm for sensor networks”, Journal of System Simulation 20(5), pages 11631166, 2008.
[13]. Li C-f, Cheng G-h, Ye M. et al, “An uneven cluster-based routing protocol for wireless sensor networks”, Chinese Journal of Computers 30(8), pages 2730, 2007.
[14]. M. Aslam, N. Javaid, A. Rahim, U. Nazir, A. Bibi, Z. A. Khan,“Survey of extended LEACH based clustering routing protocols for wireless sensor network”, IEEE transaction on Antennas and propagation, Vol. 50, N. 5 May 2012.
[15]. G.Karypis, E.H.Han and V.Kumar, “CHAMELEON: Hierarchical clustering using dynamic modeling”, IEEE Computer, 32, pp. 68-75, 1997.
[16]. J.A.S. Almeida, L.M.S. Barbosa, A.A.C.C. Pais and S.J. Formosinho, “Improving Hierarchical Cluster Analysis: A new method with outlier detection and automatic clustering”, Chemo metrics and Intelligent Laboratory Systems, 87, pp. 208-217, 2007.
[17]. C. H. Lung and C. Zhou, "Using hierarchical agglomerative clustering in wireless sensor networks: An energy-efficient and flexible approach," Ad Hoc Networks, vol. 8, pp. 328-344, 2010.
[18]. C. Zhou, "Application and Evaluation of Hierarchical Agglomerative Clustering in Wireless Sensor Networks," MASc Thesis, Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada, 2008.
[19]. C. Romesburg, “Cluster analysis for researchers: Lulu”, com, 2004.
[20]. Y. Zhao and G. Karypis, “Empirical and Theoretical Comparisons of Selected Criterion Functions for Document Clustering,” Machine Learning, vol. 55, no. 3, pp. 311-331, June 2004.
Citation
S. Aravindhan, D. Maruthanayagam, "Analysis of Energy Efficiency using Novel Algorithm Hierarchical Clustering with Map Reduce in Wireless Sensor Network Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.947-955, 2019.
Enhance the classification and Score level Fusion Multi-model Biometric System Based on Fingerprint and Speech Recognition
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.956-962, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.956962
Abstract
Biometric is the technique for the recognition of the physiological and biological features which are the face, iris, and fingerprint and pattern analysis. Biometric is the method of identifying the biometric features. Some issues in the uni-modal biometric scheme that reduced performance and accuracy. To overcome the effect in the uni-modal biometric, biometric fusion can be used through a multimodal biometric system. Biometric fusion is a method of using multiple biometric information and steps for the processing of the information to improve the biometric system. Multi-model biometric systems meet various security issues and sometimes un-acceptance false rejection errors, false rejection rate, and error rates. Some of these problems can be reduced by setting up multi-model biometric systems. It supports joining twice biometric traits in a verification system to enhance the accuracy rate and Specificity. However, features of different biometrics have to be independent. In this research work, proposes a multi-modal biometric recognized using fingerprint and speech recognition. In the proposed approach, a Novel, user authentication system, based on a combined acquisition of Fingerprint and Speech with high accuracy rate, Precision, false acceptance rate, and false rejection rate. In fingerprint using Minutiae method and Speech using MFCC method used for feature extraction method. In this research work, develop a project application in MATLAB 2016a simulation tool and has developed a score level fusion of various or multiple biometrics help to reduce the system error rates.
Key-Words / Index Term
Score Level Fusion, Multi-model Biometric System, Minutiae, and MFCC feature Extraction
References
[1] Ulery, B., Hicklin, A., Watson, C., Fellner, W., & Hallinan, P. (2006). Studies of biometric fusion. NIST Interagency Report, 7346.
[2] Jiang, Y., & Liu, X. (2018). Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid. Journal of Electrical and Computer Engineering, 2018.
[3] Mwaura, G. W., Mwangi, W., & Otieno, C. (2017). Multimodal Biometric System:-Fusion Of Face And Fingerprint Biometrics At Match Score Fusion Level. International Journal of Scientific & Technology Research, 6(4), 41-49..
[4] Phillips, P. J., McCabe, R. M., & Chellappa, R. (1998, September). Biometric image processing and recognition. In 9th European Signal Processing Conference (EUSIPCO 1998)(pp. 1-8). IEEE.
[5] Jain, A. K., Prabhakar, S., & Ross, A. (1998). Biometrics-based web access. Transactions of the Institute of British Geographers, ns, 7, 458-473.
[6] Podio, F. L. (2001). Biometrics—technologies for highly secure personal authentication. National Institute of Standards and Technology, http://whitepapers. , . com/search. aspx.
[7] Jain, A., & Pankanti, S. (2001). Biometrics systems: anatomy of performance. IEICE transactions on information and systems, 84(7), 788-799.
[8] Hopkins, R. (1999). An introduction to biometrics and large scale civilian identification. International Review of Law, Computers & Technology, 13(3), 337-363.
[9] Bhatnagar, N., Sinha, A., Samdaria, N., Gupta, A., Batra, S., Bhardwaj, M., & Thies, W. (2012, June). Biometric monitoring as a persuasive technology: ensuring patients visit health centers in India’s slums. In International Conference on Persuasive Technology (pp. 169-180). Springer, Berlin, Heidelberg.
[10] Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on circuits and systems for video technology, 14(1).
[11] Shubhangi, D. C., & Bali, M. (2012). Multi-biometric approaches to face and fingerprint biometrics. International Journal of Engineering Research & Technology, 1(5), 2278-0181.
[12] Singh, M., & Gupta, S. (2012). Correlation studies of PPG finger pulse profiles for Biometric system. Int. J. Inf. Technol. Knowl. Manage, 5, 1-3.
[13] Shunmugam, S., & Selvakumar, R. K. (2014, December). Electronic transaction authentication—A survey on multimodal biometrics. In 2014 IEEE International Conference on Computational Intelligence and Computing Research (pp. 1-4). IEEE.
[14] Garje, P. D., & Agrawal, S. S. (2012). Multibiometric identification system based on score level fusion. IOSR Journal of Electronics and Communication Engineering (IOSRJECE), 2(6), 07-11.
[15] Ghayoumi, M. (2015, June). A review of multimodal biometric systems: Fusion methods and their applications. In 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS) (pp. 131-136). IEEE.
[16] Bashar, K. (2018, October). ECG and EEG Based Multimodal Biometrics for Human Identification. In 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (pp. 4345-4350). IEEE.
[17] Dehzangi, O., & Williams, C. (2015, June). Towards multi-modal wearable driver monitoring: Impact of road condition on driver distraction. In 2015 IEEE 12th International Conference on Wearable and Implantable Body Sensor Networks (BSN)(pp. 1-6). IEEE.
[18] Evangelin, L. N., & Fred, A. L. (2017, March). Feature level fusion approach for personal authentication in multimodal biometrics. In 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM) (pp. 148-151). IEEE.
[19] Shunmugam, S., & Selvakumar, R. K. (2014, December). Electronic transaction authentication—A survey on multimodal biometrics. In 2014 IEEE International Conference on Computational Intelligence and Computing Research (pp. 1-4). IEEE.
[20] Biometrics.idealtest.org, 2019. [Online]. Available: http://biometrics.idealtest.org. [Accessed: 28- May- 2019].
[21] Marsyas.info, 2019. [Online]. Available: http://marsyas.info/downloads/datasets.html. [Accessed: 28- May- 2019].
Citation
Shubhleen Sharma, Dinesh Kumar, "Enhance the classification and Score level Fusion Multi-model Biometric System Based on Fingerprint and Speech Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.956-962, 2019.
Modified RSA Cryptosystem in a cloud based environment
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.963-966, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.963966
Abstract
A traditional RSA Cryptosystem is based on only two prime numbers which is an efficient algorithm for preventing an unauthorized access over the internet. But there are some drawbacks of RSA cryptosystem, such as its high computational time. The primary motivation of our work is to reduce average computational time and provide better data security compared to traditional RSA. In this work we are modifying basic RSA cryptosystem algorithm by using three prime numbers which provides better data security as compared to standard RSA algorithm. Instead of applying RSA over each data unit, multiple data units are merged together to form one merged unit. The modified RSA is applied on the merged unit to form a cipher text which is sent by the sender. For merging multiple data units into single data unit, Cantor’s pairing algorithm has been used. At the receiver’s end the cipher text sent is received. The cipher text is deciphered using our modified RSA algorithm. Then this merged data unit is separated (unpaired) using Cantor’s unpairing algorithm. The highlight of this work is that, it increases the efficacy of the asynchronous cryptography (as compared to traditional RSA). The proposed framework increases security and reduces the average time taken for sending the data from sender to receiver. We are showing all procedures in a cloud environment.
Key-Words / Index Term
Cloud Computing, Cryptography, RSA, public key, private key, pairing and unpairing algorithm
References
[1] IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 4 Issue 1, January 2017 written by HARSH SAHAY
[2] Atul Kahate, Cryptography and network Security
[3] Al-Hamami, A. H., & Aldariseh, I. A. (2012, November). Enhanced Method for RSA Cryptosystem Algorithm. In Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on (pp. 402-408). IEEE.
[4] Vivek Choudhary1 and Mr. N. praveen2 “Enhanced RSA Cryptosystem Based On Three Prime Numbers” 1 Post Graduate Scholar, Department of Computer Science & Engineering, SRM University, Chennai, Tamilnadu, India 2 Assistant Professor, Department of Computer Science & Engineering, SRM University, Chennai, Tamilnadu, India.
Citation
Harsh Sahay, "Modified RSA Cryptosystem in a cloud based environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.963-966, 2019.
Challenges, Opportunities and Status of E-Governance Implementation in Nepal after Federalism
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.967-970, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.967970
Abstract
Today e-governance becomes an important aspect in most of the developing countries, but most developing countries are still far behind it. Over the last one decade Nepal has seen tremendous political transformation. Nepal government has shown a clear vision on implementation of e-governance by deploying their master plan for e-governance (EGMP) in 2006 but still Nepal is far behind in e-governance development index (EGDI) by UN e-government survey. So, this paper will try to enlighten and appraise the e-governance system of Nepal and significant challenges, opportunities and current status of e-government.
Key-Words / Index Term
EGDI, EGMP, TII, HCI, OSI, ICT
References
[1] G. P. Adhikari, “Key issues in implementing e-governance in Nepal,” in Proceedings of the 1st international conference on Theory and practice of electronic governance - ICEGOV ’07, 2007, p. 243.
[2] P. Kharel and S. Shakya, “e-Government Implementation in Nepal : A Challenges,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no. 1, p. Online, 2012.
[3] D. B. Dhami and I. Futó, “Implementation Challenges of e-Governance in Nepal and Possible Steps,” in 8th International COnference on Applied Informatics , EGR, Hungary, 2010, vol. 1, pp. 433–445.
[4] S. Shakya, “the Challenges of E-Governance Implementation in Nepal,” Tallinn University of Technology, 2017.
[5] “Nepal profile - Timeline - BBC News,” 2017. [Online]. Available: https://www.bbc.com/news/world-south-asia-12499391 [Accessed: 27-Feb2019].
[6] United Nation, “UN E-Government Survey 2018,” 2018. [Accessed: 26-Feb2019].
[7] A. Paudel and B. Kafle, “Promoting E-Governance at Local Level,” 2016.
[8] M. A. Nour, A. A. AbdelRahman, and A. Fadlalla, “A context-based integrative framework for e-government initiatives,” Gov. Inf. Q., vol. 25, no. 3, pp. 448– 461, Jul. 2008.
[9] Government of Nepal, “E‐Governance Master Plan (eGMP),” 2015.
[10] M. A. Sarrayrih and B. Sriram, “Major challenges in developing a successful egovernment: A review on the Sultanate of Oman,” J. King Saud Univ. - Comput. Inf. Sci., vol. 27, no. 2, pp. 230–235, 2015.
[11] D. Dada, “The failure of e-government in developing countries: a lterature review,” Electron. J. Inf. Syst. Dev. Ctries., vol. 26, no. 7, pp. 1–10, 2006.
[12] T. Schuppan, “E-Government in developing countries: Experiences from subSaharan Africa,” Gov. Inf. Q., vol. 26, no. 1, pp. 118–127, Jan. 2009.
[13] Y. N. Chen, H. M. Chen, W. Huang, and R. K. H. Ching, “E-Government Strategies in Developed and Developing Countries: An Implementation Framework and Case Study,” J. Glob. Inf. Manag., vol. 14, no. 1, pp. 23–46, 2006.
[14] M. Nesterenko, “Master Thesis Implementation of E-Government services Analysis of factors in case of Ukraine,” 2014.
[15] M. Andrews, “Good government means different things in different countries,” Governance, vol. 23, no. 1, pp. 7–35, 2010.
Citation
Sant Kumar Verma, Ajay Kumar Bharti, "Challenges, Opportunities and Status of E-Governance Implementation in Nepal after Federalism," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.967-970, 2019.
Proposed Hybrid Cryptographic Technique To Secure Data In Web Application
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.971-975, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.971975
Abstract
Web applications are becoming a necessary part of modern life. Security is one of the most important non-functional requirements of every solution. Early days, security and data privacy was just luxury part of software development and it was an optional requirement but nowadays it plays a critical role in daily life. This research paper has been made to observe the need for security algorithms in web application. This work observes that the current security level of existing applications and also recommend improved security solutions to enhance the security level as well performance of proposed architecture. This work recommends that ECC (asymmetric key cryptography) and Blowfish algorithm (symmetric key cryptography) can be used to achieve confidentiality during communication. It also considers the MD5 algorithm to maintain the integrity and modified Kerberos algorithm to achieve authentication. The complete work will propose a security architecture having solution to achieve confidentiality, integrity with strong authentication policy for web application development.
Key-Words / Index Term
Web based application, RC6, ECC, Blowfish, Kerberos authentication
References
[1] K. M. Abdullah, E. H. Houssein, H. H. Zayed, “New Security Protocol using Hybrid Cryptography Algorithm for WSNs”, 1st International Conference on Computer Applications & Information Security (ICCAIS 2018) IEEE, Saudi Arabia, 2018.
[2] Milind Mathur, Ayush Kesarwani, “Comparison between DES, 3DES, RC2, RC6, BLOWFISH, and AES”. Proceedings of National Conference on New Horizons in IT -NCNHIT, 2013.
[3] M. Harini, K. Pushpa Gowri, C. Pavithra, M. Pradhiba Selvarani, “A Novel Security Mechanism using Hybrid Cryptography Algorithms”. International Conference on Electrical, Instrumentation, and Communication Engineering (ICEICE) IEEE, India, 2017.
[4] Jayraj Gondaliya, Jinisha Savani, Vivek Sheetal Dhaduvai, Gahangir Hossain, “Hybrid Security RSA Algorithm in Application of Web Service”. 1st International Conference on Data Intelligence and Security (ICDIS) IEEE, USA, 2018.
[5] Kalyani Ganesh Kadam, Prof. Vaishali Khairnar, “Hybrid RSA-AES Encryption for Web Services”. International Journal of Technical Research and Applications, Issue. 31, pp. 51-56, 2015
[6] Kirtiraj Bhatele, Prof Amit Sinhal, Prof Mayank Pathak, “A Novel Approach to the Design of a New Hybrid Security Protocol Architecture”. International Conference on Advanced Communication Control and Computing Technologies (ICACCCT) IEEE, India, 2012.
[7] S. Dubey, R. Jhaggar, R. Verma, D. Gaur, “Encryption and Decryption of Data by Genetic Algorithm”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 5, Issue. 3, pp.42-46, 2017.
[8] M. Amjad, “Security Enhancement of IPV6 using Advance Encryption Standard and Deffie Hellman”, International Journal of Scientific Research in Network Security and Communication, Vol. 5, Issue. 3, 2017.
[9] B. Hari Krishna, Dr. S. Kiran, G. Murali, R. Pradeep Kumar Reddy, “Security issues in Service Model of Cloud Computing Environment”, International Conference on Computational Science, Procedia Computer Science 87, India, pp.246-251, 2016.
[10] K. Ruth Ramya, T. Sasidhar, D. Naga Malleswari & M.T.V.S. Rahul, “A review on Security aspects of Data Storage in Cloud Computing”, International Journal of Applied Engineering Research, Vol 10, No. 5, pp.13383-13394, 2015.
[11] Rizk, Rawya, and Yasmin Alkady, "Two-phase hybrid cryptography algorithm for wireless sensor networks", Journal of Electrical Systems and Information Technology, Vol. 2, Issue. 3, pp.296-313, 2015.
[12] Trishna Panse, Vivek Kapoor, Prashant Panse, “A review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission”, International Journal of Information and Communication Technology Research, Vol. 2, No. 3, 2012.
[13] Dr. V Kapoor, R Yadav, “A Hybrid Cryptography Technique to support Cyber Security Infrastructure”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 4, Issue.11, 2015
[14] V Kapoor, R Yadav, “A Hybrid Cryptography Technique for improving Network Security.”, International Journal of Computer Applications, Vol. 141, No.11, pp.25-30, 2016
Citation
Neha Gupta, Vivek Kapoor, Jyoti Haweliya, "Proposed Hybrid Cryptographic Technique To Secure Data In Web Application," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.971-975, 2019.
Exudates Detection in Fundus Images
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.976-980, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.976980
Abstract
Diabetic retinopathy is the main cause of vision loss in diabetic patients. It is caused by the damage of retinal blood vessels due to prolonged diabetes. This paper investigates on some image processing operations to extract exudates for the analysis of diabetic retinopathy. The proposed method stands out prominent in terms of specificity and accuracy.
Key-Words / Index Term
diabetic retinopathy, sensitivity, specificity, accuracy, exudates
References
[1] K. Ram and J. Sivaswamy, “Multi-space clustering for segmentation of exudates in retinal color photographs,” in Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 1437–1440, Minneapolis, Minn, USA, September 2009.
[2] I. Soares, M. Castelo-Branco, and A. M. G. Pinheiro, “Exudates dynamic detection in retinal fundus images based on the noise map distribution,” in Proceedings of the 19th IEEE European Signal Processing Conference (EUSIPCO ’11), pp. 46–50, Barcelona, Spain, September 2011.
[3] C. Jayakumari and T. Santhanam, “An intelligent approach to detect hard and soft exudates using echo state neural network,” Information Technology Journal, vol. 7, no. 2, pp. 386–395, 2008.
[4] D. Kayal and S. Banerjee, “A new dynamic thresholding based technique for detection of hard exudates in digital retinal fundus image,” in Proceedings of the 1st International Conference on Signal Processing and Integrated Networks (SPIN ’14), pp. 141–144, February 2014.
[5] F. Amel, M. Mohammed, and B. Abdelhafid, “Improvement of the hard exudates detection method used for computer aided diagnosis of diabetic retinopathy,” International Journal of Image, Graphics and Signal Processing, vol. 4, no. 4, pp. 19–27, 2012.
[6] P. M. Rokade and R. R. Manza, “Automatic detection of hard exudates in retinal images using haar wavelet transform,” Eye, vol. 4, no. 5, pp. 402–410, 2015.
[7] T. Jaya, J. Dheeba, and N. A. Singh, “Detection of hard exudates in colour fundus images using fuzzy support vector machine based expert system,” Journal of Digital Imaging, vol. 28, no. 6, pp. 761–768, 2015.
[8] A. Z. Rozlan, H. Hashim, S. F. Syed Adnan, C. A. Hong, and M. Mahyudin, “A proposed diabetic retinopathy classification algorithm with statistical inference of exudates detection,” in Proceedings of the International Conference on Electrical, Electronics and System Engineering (ICEESE ’13), pp. 90–95, IEEE, Kuala Lumpur, Malaysia, December 2013.
[9] K. Soman and D.Ravi, “Detection of exudates in human fundus image with a comparative study on methods for the optic disk detection,” in Proceedings of the IEEE International Conference on Information Communication and Embedded Systems (ICICES 14), pp. 1–5, Chennai, India, February 2014.
[10] R. Annunziata, A. Garzelli, L. Ballerini, A. Mecocci, and E. Trucco, “Leveraging multiscale hessian-based enhancement with a novel exudate inpainting technique for retinal vessel segmentation,”IEEE Journal of Biomedical and Health Informatics, vol. 20, no. 4, pp. 1129–1138, 2016.
[11] M. J. J. P. Van Grinsven, A. Chakravarty, J. Sivaswamy, T. Theelen, B. Van Ginneken, and C. I. Sanchez, “A bag of words approach for discriminating between retinal images containing exudates or drusen,” in Proceedings of the IEEE 10th International Symposium on Biomedical Imaging: from Nano to Macro (ISBI ’13), pp. 1444–1447, San Francisco, Calif, USA, April 2013.
[12] S.K. Badugu , R.K. Kontham, V.K. Vakulabharanam , B. Prajna, “Calculation of Texture Features for Polluted Leaves,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.11-21, Feb (2018).
[13] A. Samant , S. Kadge, “Classification of a Retinal Disease based on Different Supervised Learning Techniques,” International Journal of Scientific Research in Network Security and Communication, Volume-5, Issue-3, June 2017.
Citation
Abhinandan Kalita, "Exudates Detection in Fundus Images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.976-980, 2019.
Secure Text Encryption in Intranet Using Elliptic Curve Cryptography
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.981-984, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.981984
Abstract
The intranet-based applications are safe and in-house applications hosted inside the internal network. Internet applications need internet to process client requests from the browser to web server instead they only need internal communication with an internal dedicated server. Most companies like to deploy such applications to keep their sensitive data inside the network. Army organizations are best examples instead to store data at the remote server through the internet, they prefer to use a local server with the intranet. This work observes the need for security inside intranet-based applications. It implies designing intranet application by mitigating issues evolved in existing work. This work proposed to use of Elliptic Curve Cryptography and RC6 algorithms to keep data safe and secure inside the intranet using double layer security mechanism. The complete work will be implemented using Java technology and a small application will be created to evaluate the performance of the proposed solution.
Key-Words / Index Term
Intranet application, Elliptic curve cryptography, Cryptographic technique, Data security
References
[1] Keerthi K, Dr. B. Surendiran, “Elliptic Curve Cryptography for Secured Text Encryption”. 2017 International Conference on circuits Power and Computing Technologies [ICCPCT], 2017 IEEE.
[2] S.M. C Vigila and Munseeswaran,” Implementation of Text based cryptosystem using elliptic curve cryptography”, 2009 1st International conference on advances computing, ICAC 2009, pp.82-85,2009.
[3] L. D. Singh and K. M. Singh,” Implementation of Text Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, vol.54, no.1, pp. 73-82,2015
[4] Akshita Bhandari, Ashutosh Gupta, Debasis Das, “A framework for Data Security and Storage in Cloud Computing”. International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 2016.
[5] Milind Mathur, Ayush Kesarwani, "Comparison between DES, 3DES, RC2, RC6, BLOWFISH, and AES”. Proceedings of National Conference on New Horizons in IT – NCNHIT 2013.
[6] A Arjuna Rao, K Sujatha, A Bhavana Deepthi, L V Rajesh, “Survey paper comparing ECC with RSA, AES and Blowfish Algorithms” International Journal on Recent and Innovation Trends in Computing and Communication Volume: 5, Issue: 1, IJRITCC, January 2017.
[7] Atul Kahate “Cryptography and Network Security”, Second Edition-2003, Tata McGraw Hill New Delhi, 10th reprint-2010.
[8] M. Wiesmann, F. Pedonet, A. Schiper, B. Kemmet, G. Alonso “Database Replication Techniques: a Three Parameter Classification” published in Reliable Distributed Systems, 2000. SRDS-2000. Proceedings. The 19th IEEE Symposium on at Lausanne PP. 206-215.
[9] DV Kapoor, R Yadav “A hybrid cryptography technique to support cyber security infrastructure” - Int. J. Adv. Res. Computer. Engg. Technology, 2015
[10] V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013
[11] G.L. Pavani, Ch.Ramesh, "Secure Data Retrieval using Cipher Text Policy-Attribute Based Encryption in Hybrid Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.45-48, 2017
[12] A hybrid cryptography technique for improving network security
V Kapoor, R Yadav - International Journal of Computer Applications,2016
[13] A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission 1 T Panse, V Kapoor, P Panse - 2012
Citation
Arpana Kumari, Vivek Kapoor, "Secure Text Encryption in Intranet Using Elliptic Curve Cryptography," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.981-984, 2019.
A Comparative Study of Machine Learning Models for Stock Market Rate Prediction
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.985-990, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.985990
Abstract
Predicting the direction of movement of the stock market index is important for the development of effective market trading strategies. It usually affects a financial trader’s decision to buy or sell a stock. Closing price is one of the important factors in effective stock trading. Successful prediction of closing stock prices may promise attractive benefits for investors. Machine learning techniques have potential capability to process the historical stock trends and predict near accurate closing prices.This study compares three diverse machine learning models - ARIMA time series forecasting model , Support Vector Regression and LSTM Neural Network in terms of complexity of analysis, predictive accuracy for closing prices and customization.
Key-Words / Index Term
Machine Learning, Stock, Prediction, ARIMA, Support Vector Regression, LSTM Neural Network
References
[1] A. A. Adebiyi, A. O. Adewumi , C. K. Ayo., “Stock Price Prediction Using the ARIMA Model”. AMSS 16th International Conference on Computer Modelling and Simulation, 2014.
[2] Tian Ye., “Stock Forecasting Method Based on Wavelet Analysis and ARIMA-SVR Model”, 3rd International Conference on Information Management , 2017.
[3] C. C. Aggarwal., “Neural Networks and Deep learning”, Springer Publication,India, 2018.
[4] Tom M. Mitchell., “Machine Learning”, McGraw Hill Education, India, 2017.
[5] P. Li, C. Jing, T. Liang, M. Liu, Z. Chen, L. Guo.,“Autoregressive Moving Average Modeling in the Financial Sector”, 2015.
[6] M. Usmani, S. H. Adil, Kamranraza , S. S. Ali., “Stock Market Predictions Using Machine Learning Techniques”., 3rd International Conference On Computer And Information Sciences (ICCOINS), 2016.
[7] Tiwari, S., Bharadwaj, A. and Gupta, S., Stock price prediction using data analytics. In International Conference on Advances in Computing, Communication and Control (ICAC3) (pp. 1-5). IEEE,2017.
[8] R.K. Dase, D. D. Pawar, D. S. Daspute, “Methodologies for Prediction of Stock Market: An Artificial Neural Network”, International Journal of Statistika and Mathematika, Vol 1, Issue 1, pp 08-15 , 2011.
[9] A. Greaves , B. Au, “Using the bitcoin transaction graph to predict the price of bitcoin,” No Data 2015.
[10] R. P. Schumaker., H. Chen., “Textual Analysis of Stock Market Prediction Using Financial News’’, Americas Conference on Information Systems, 2006.
[11] A Abraham, B Nath ,P.K Mahanti, “Hybrid intelligent systems for stock market analysis”, in: Computational Science-ICCS , Springer, pp. 337–345, 2007.
[12]S. McNally, J. Roche , S. Caton., “Predicting the Price of Bitcoin Using Machine Learning” 26th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing , 2018.
[13] P.C. Chang, C.H Liu, J.L Lin, “A neural network with a case based dynamic window for stock trading prediction”. Expert Systems with Applications Vol 36, pp.6889–6898, 2009.
[14] Q. Cao, K. B. Leggio , M. J. Schniederjans. “A comparison between Fama and French’s model and artificial neural networks in predicting the Chinese stock market” Computers Operations Research Vol 32, pp. 2499–2512, 2005.
[15] B. G. Malkiel, “A random walk down Wall Street: including a life-cycle guide to personal investing, Completely”,1999.
[16] Y. Hu, K. Liu, K. Zhang, L. Su , M. Liu, “Application of evolutionary computation for rule discovery in stock” , Algorithmic trading: A literature review. Applied Soft Computing Vol 36, pp. 534–551, 2016.
[17] S. B. Achelis. “Technical Analysis from A to Z”. McGraw Hill New York, 2001.
[18] Hussain, Sadiq, C. Akif, Josan D. Tamayo, and Aleeza Safdar. "Big data and learning analytics model." International Journal of Computer Sciences and Engineering Vol 6, Issue 7 pp: 654-663,2018.
[19] Fernandes, Marie. "Data Mining: A Comparative Study of its Various Techniques and its Process." International Journal of Scientific Research in Computer Science and Engineering Vol 5, Issue 1 ,pp. 19-23,2017.
Citation
Sreeraksha M S, Bhargavi M S, "A Comparative Study of Machine Learning Models for Stock Market Rate Prediction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.985-990, 2019.
A Detail Survey on Automatic Text Summarization
Survey Paper | Journal Paper
Vol.7 , Issue.6 , pp.991-998, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.991998
Abstract
the document summarization is becoming essential as lots of information getting generated every day. Instead of going through the entire text document, it is easy to understand the text document fast and easily by a relevant summary. Text summarization is the method of explicitly making a shorter version of one or more text documents. It is a significant method of detecting related material from huge text libraries or from the Internet. It is also essential to extract the information in such a way that the content should be of user’s interest. Text summarization is conducted using two main methods extractive summarization and abstractive summarization. When method select sentences from word document and rank them on basis of their weight to generate summary then that method is called extractive summarization. Abstractive summarization method focuses on main concepts of the document and then expresses those concepts in natural language. Many techniques have been developed for summarization on the basis of these two methods. There are many methods those only work for specific language. Here we discuss various techniques based on abstractive and extractive text summarization methods and shortcomings of different methods
Key-Words / Index Term
Text Summarization, extractive summary, information extraction
References
[1] HtetMyet Lynn 1 , Chang Choi 2 , Pankoo Kim “An improved method of automatic text summarization for web contents using lexical chain with semantic-related terms”, Springer-Verlag Berlin Heidelberg 2017
[2] Xiaojun Wan 1 , FuliLuo 2 , Xue Sun Songfang Huang3 , Jin-ge Yao “Cross-language document summarization via extraction and ranking of multiple summaries” Springer- Verlag London 2018
[3] Andrew Mackey and Israel Cuevas “AUTOMATIC TEXT SUMMARIZATION WITHIN BIG DATA FRAMEWORKS”, ACM 2018
[4] Yong Zhang, Jinzhi Liao, Jiyuyang Tang “Extractive Document Summarization based on hierarchical GRU”, International Conference on Robots & Intelligent System IEEE 2018
[5] Lili Wan “Extractive Algorithm of English Text Summarization for English Teaching” IEEE 2018
[6] Anurag Shandilya, Kripabandhu Ghosh, Saptarshi Ghosh “Fairness of Extractive Text Summarization”, ACM 2018
[7] P.Krishnaveni, Dr. S. R. Balasundaram “Automatic Text Summarization by Local Scoring and Ranking for Improving Coherence”, Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
[8] Bagalkotkar, A., Kandelwal, A., Pandey, S., &Kamath, S. S. (2013, August). “A Novel Technique for Efficient Text Document Summarization as a Service”, In Advances in Computing and Communications (ICACC), 2013 Third International Conference on (pp. 50-53). IEEE.
[9] Ferreira, Rafael, Luciano de Souza Cabral, Rafael DueireLins, Gabriel Pereira e Silva, Fred Freitas, George DC Cavalcanti, Rinaldo Lima, Steven J. Simske, and Luciano Favaro. "Assessing sentence scoring techniques for extractive text summarization." Expert systems with applications 40, no. 14 (2013): 5755-5764.
[10] Gupta, V. K., &Siddiqui, T. J. (2012, December). “Multi-document summarization using sentence clustering”, In Intelligent Human Computer Interaction (IHCI), 2012 4th International Conference on (pp. 1-5). IEEE.
[11] Min-Yuh Day Department of Information Management Tamkang University New Taipei City, Taiwan myday@mail.tku.edu.tw Chao-Yu Chen Department of Information Management Tamkang University New Taipei City, Taiwan susan.cy.chen@gmail.tw “Artificial Intelligence for Automatic Text Summarization”,2018 IEEE International Conference on Information Reuse and Integration for Data Science
[12] Xiaoping SunandHaiZhuge*, Senior Member, IEEE Laboratory of Cyber-Physical-Social Intelligence, Guangzhou University, China Key Laboratory of Intelligent Information Processing, Institute of Computing Technology, University of Chinese Academy of Sciences, Chinese Academy of Sciences, China System Analytics Research Institute, Aston University, UK “Summarization of Scientific Paper through Reinforcement Ranking on Semantic Link Network” ,IEEE 2018
[13] Ahmad T. Al-Taani (PhD, MSc, BSc) Professor of Computer Science (Artificial Intelligence) Faculty of Information Technology and Computer Sciences Yarmouk University, Jordan. ahmadta@yu.edu.jo “Automatic Text Summarization Approaches” ,IEEE 2017
[14] AlokRanjan Pal Dept. of Computer Science and Engineering College of Engineering and Management, KolaghatKolaghat, India chhaandasik@gmail.com DigantaSaha Dept. of Computer Science and Engineering Jadavpur University Kolkata, India neruda0101@yahoo.com “An Approach to Automatic Text Summarization using WordNet”, IEEE 2014
[15] Prakhar Sethi1, Sameer Sonawane2, Saumitra Khanwalker3, R. B. Keskar4 Department of Computer Science Engineering, Visvesvaraya National Institute of Technology, India 1 prakhar.sethi2@gmail.com, 2 sameer9311@gmail.com, 3 theapogee2011@gmail.com, 4 rbkeskar@cse.vnit.ac.in“Automatic Text Summarization of News Articles”, IEEE 2017
[16] Yue Hu and Xiaojun Wan “PPSGen: Learning-Based Presentation Slides Generation for Academic Papers” , IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 4, APRIL 2015
[17] Daan Van Britsom, AntoonBronselaer, and Guy De Tre “Using Data Merging Techniques for Generating Multidocument Summarizations” , IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 23, NO. 3, JUNE 2015
[18] NingZhong, Yuefeng Li, and Sheng-Tang Wu “Effective Pattern Discovery for Text Mining”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 1, JANUARY 2012
[19] Mohsen Pourvali and Mohammad SanieeAbadeh Department of Electrical & Computer Qazvin Branch Islamic Azad University Qazvin, Iran Department of Electrical and Computer Engineering at TarbiatModares University Tehran, Iran “Automated Text Summarization Base on Lexicales Chain and graph Using of WordNet and Wikipedia Knowledge Base” , IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012
[20] Daan Van Britsom, AntoonBronselaer, Guy De Tre´ Department of Telecommunications and Information Processing, Ghent University Sint-Pietersnieuwstraat 41, B-9000 Ghent, Belgium “Using data merging techniques for generating multi-document summarizations” ,IEEE TRANSACTIONS ON FUZZY SYSTEMS 2018
[21] Yang Gao,YueXu, Yuefengli, “Pattern-based Topics for Document Modeling in Information Filtering” in IEEE Transaction on Knoweledge and Data Engineering, vol.27,No.6,June 2015.
[22] Y. Bastide, R. Taouil, N. Pasquier, G. Stumme, and L. Lakhal, “Mining frequent patterns with counting inference,” ACM SIGKDD Explorations Newslett., vol. 2, no. 2, pp. 66–75, 2000.
[23] H. Cheng, X. Yan, J. Han, and C.-W. Hsu, “Discriminative frequent pattern analysis for effective classification,” in Proc. IEEE 23rd Int. Conf. Data Eng., 2007, pp. 716–725.
[24] R. J. BayardoJr, “Efficiently mining long patterns from databases,” in Proc. ACM Sigmod Record, 1998, vol. 27, no. 2, pp. 85–93.
[25] J. Han, H. Cheng, D. Xin, and X. Yan, “Frequent pattern mining: Current status and future directions,” Data Min. Knowledge. Discovery., vol. 15, no. 1, pp. 55–86, 2007.
[26] M. J. Zaki and C.-J. Hsiao, “CHARM: An efficient algorithm for closed itemset mining.” in Proc. SDM, vol. 2, 2002, pp. 457–473.
[27] Y. Xu, Y. Li, and G. Shaw, “Reliable representations for association rules,” Data Knowl. Eng., vol. 70, no. 6, pp. 555–575, 2011.
[28] X. Wei and W. B. Croft, “LDA-based document models for ad-hoc retrieval,” in Proc. 29th Annu. Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2006, pp. 178–185.
[29] C. Wang and D. M. Blei, “Collaborative topic modeling for recommending scientific articles,” in Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., 2011, pp. 448–456.
[30] D. M. Blei, A. Y. Ng, and M. I. Jordan, “Latent dirichlet allocation,” J. Mach. Learn. Res., vol. 3, pp. 993–1022, 2003.
[31] Vaibhav JainInstitute of Engineering& Technology, Devi Ahilya Vishwavidyalaya Indore, India “Evaluating and Summarizing Student’s Feedback Using Opinion Mining” International Journal of Scientific Research in Computer Science and Engineering, Volume-1, Issue-1, 2013
Citation
Rajani S. Sajjan, Meera G. Shinde, "A Detail Survey on Automatic Text Summarization," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.991-998, 2019.
Face Recognition Process : A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.6 , pp.999-1005, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.9991005
Abstract
Image identification plays an important role in various domains such as in bio-metrics for identification of a person, medical image processing, law enforcement and commercial application. In the field of bio-metrics, there are many reliable identification methods such as fingerprint, retina, iris scan and Face Recognition. These methods requires user cooperation whereas Face Recognition can work without user cooperation by taking image from camera. Face Recognition is a two step process, involving face detection and then recognition. In Face Detection process, face is located in a digital image or in a frame of video and in the Recognition process system identifies the face’s identity on the basis of stored images. For the Face Recognition various techniques are available such as Principal Component Analysis, Local Binary Pattern, Independent Component Analysis and many deep learning based techniques FaceNet, FaceID, DeepFace etc. These techniques have their own advantages and disadvantages for example many techniques suffer from head rotation, pose, makeup, hair style and image quality. In this paper, we present a review of the previous work done in this field. Also discussion about the process of recognition, preprocessing for Face Recognition techniques, classification of face detection and recognition techniques and an analysis of existing work has been presented.
Key-Words / Index Term
Face Recognition, Face Detection, Deep learning, Image pre-processing, Bio-metrics, Principal Component Analysis
References
[1] Bruner, I. S. and Tagiuri, R.. “The perception of people”, In Handbook of Social Psychology, Vol. 2, G. Lindzey, Ed., Addison-Wesley, Reading, MA, 634–654.1954.
[2] Bledsoe, W. W. “The model method in facial recognition.”, Tech. rep. PRI:15, Panoramic research Inc., Palo Alto, CA.1962
[3] Ekman, P. Ed., Charles Darwin’s “The Expression of the Emotions in Man and Animals” Third Edition, with Introduction, Afterwords and Commentaries by Paul Ekman. Harper- Collins/Oxford University Press, New York, NY/London, U.K.1998
[4] Kelly, M. D. “Visual identification of people by computer” Tech. rep. AI-130, Stanford AI Project, Stanford, CA. 1970
[5] W. Bledsoe, “The Model Method in Facial Recognition” Panoramic research Inc. Palo Alto CA, PRI:15 August 1966.
[6] A Jay Goldstein, Leon Harmon, Ann B Lesk, “Identification of human faces”, proceeding of the IEEE59(5), 748-760, 1971
[7] L. Sirovich and M. Kirby, “low-dimensional procedure for characterization of human faces”, J opt. Soc. Am. A vol. 4, no. 3, 519-524 1987
[8] L.Turk and A. Pentlant, “Eigenfaces for recognition”, jounral of cognitive Neuroscience, vol. 3, no. 1, 71-86 March 1991
[9] D.C. He and L.Wang(1990), “Texture Unit and Texture Spectrum and Texture Analysis”, IEEE Transactions on Geo-science and Remote Sensing,vol. 28, pp.509-512 1990
[10] Guodong Guo and Na Zhang “What is the Challenge for Deep Learning in Unconstrained Face Recognition?”, 13th IEEE International Conference on Automatic Face and Gesture Recognition, May 15-19, 2018
[11] Ms. G. Geetha, Ms. M Safa, Ms. C. Fancy and Ms. K. chital “3D Face Recognition using Hadoop”, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
[12] Armin Hasanzadeh, Morteza Valizadeh and Sina Mirzapour “Fusion of several preprocessing approaches for improving the accuracy of face recognition systems in poor lighting conditions”, IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI) Dec. 22QG, 2017
[13] Ahonen TˈHadid AˈPietikainen M “Face Description with Local Binary Patterns: Application to Face Recognition”, IEEE Trans on Pattern Analysis and Machine Intelligence.2006.28(12) 2037-2041
[14] Wiskott L, Fellous J-M, Krtiger N, et aL “Face Recognition by Elastic Bunch Graph Mathing”, IEEE Transaction on Pattern Analysis and Machine Intelligence, 19(7) 775-779,1997
[15] Weilin Huang, Hujun Yin, “Robust Face Recognition with Structural Binary Gradient Patterns” Pattern Recognition , doi: 10.1016/j.patcog.2017.03.010,1997.
[16] Belhumeur P N, Hespanha J P, Kriegman D J, “ Eigenfaees vs Fisherfaces : Recognition Using Class Specific Linear Projection”, IEEE Transaction on PAMI, 19(7) 711-720,1997
[17] Turk M, Pentland “A Eigenfaces for Recognition”, Journal of Congnitive Neuroscience, 3(1) 71-86,1991
[18] Comon P “ Independent Component Analysis, A New Concept” Signal Processing, 36(3) 287-314,1994
[19] Saket Karve, Vasisht Shende and Rizwan Ahmed “A comparative analysis of feature extraction techniques for face recognition”, 2018 International Conference on Communication, Information and Computing Technology (ICCICT), Feb. 2-3, Mumbai, India
[20] Paul Viola and Michael Jones “Rapid object detection using a boosted cascade of simple features” ,Computer Vision and Pattern recognition, 2001. Proceedings of the 2001 IEEE Computer Society Conference no. Vol. 1, 2001
[21] Y. LeCun, “Back propagation Applied to Handwritten Zip Code Recognition”, Neural Computation, vol. 1, no. 4, pp. 541–551, Dec. 1989
[22] Musab Coúkun, Ayúegül Uçar, Özal Yildirim and Yakup Demir “Face Recognition based on Convolution Neural Network”, 2017 IEEE
Citation
Kavita Lodhi, Vandan Tewari, Priyanka Bamne, "Face Recognition Process : A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.999-1005, 2019.