A Review on Intutive Prediction Of Heart Disease Using Data Mining Techniques
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.109-113, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.109113
Abstract
Healthcare evaluates clinical datasets regularly by specialist`s learning and action. In the clinical field, computer-supported with prediction system is used in the healthcare department. Data mining approach provides innovation and strategy to replace voluminous information into useful data for achieving a decision. By utilizing information mining systems it needs less investment for the forecast of the sickness with more accuracy and precision. This paper evaluates various classifiers and algorithms are used for the expectation of cardiovascular illness.
Key-Words / Index Term
WEKA tool, Data Mining techniques, Heart disease prediction, Computer Aided Support System
References
[1] R. Ansari, P. Azimi and M. R. Taghva, "Heart Disease Diagnosis Using Data Mining Techniques," 2017.
[2] M. A. Karaolis, "Assessment of the Risk Factors of Coronary Heart Events Based on Data Mining with Decision Trees," IEEE Transcations on Information Tehnology in Biomedicine., 2010.
[3] V. Cherian and B. M.S, "Heart Disease Prediction using Naive Bayes Algorithm & Laplace Smoothing technique," International Journal of Computer Science Trends & Technology, vol. II, no. 2, pp. 68-73, 2017.
[4] G. Purusothaman and P. Krishnakumari, "A Survey of Data Mining Techniques on Risk Prediction:Heart Prediction," Indian Journal of Science and Technology, vol. 8, no. 12, pp. 2-5, 2015.
[5] M. Mirmozaffari, A. Alinezhad and A. Gilanpour, "Data Mining Classification Algorithm for Heart Disease Prediction," International Journal of Computing,Communication & Instrumentation, vol. IV, no. 1, 2017.
[6] S. Kiruthika Devi, S. Krishnapriya and D. Kalita, "Prediction of Heart Disease using Data Mining Techniques," Indian Journal of Science and Technology, vol. 9, no. 39, pp. 1-5, 2016.
[7] S. I. Ansarullah, P. k. Sharma, A. Wahid and M. M. Kirmani, "Heart Disease Prediction System using Data Mining Techniques: A study," International Research Journal of Engineering and Technology, vol. III, no. 08, pp. 1375-1381, 2016.
[8] S. Manikandan, "Heart Attack Prediction System," International Conference on Energy,Communication,Data Analtics & Soft computing, pp. 817-820, 2017.
[9] H. B. F. David and S. A. Belcy, "Heart Disease Prediction Using Data Mining Technique," ICTACT, vol. IX, no. 1, pp. 1817-1823, 2018.
[10] S. Xu, Z. Zhang, D. Wang and J. Hu, "Cardiovascular Risk Prediction Method Based on CFS subset Evaluation & Random Forest Classification," IEEE 2nd International Conference on Big Data, pp. 228-232, 2017.
[11] M. N. Kumar, K. V. S. Koushik and K. Deepak, "Prediction of Heart Diseases Using Data Mining and Machine Learning Algorithms and Tools," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. III, no. 3, pp. 888-898, 2018.
[12] N. I. Patel and H. R. Patel, "A Survey on Prediction of Disease with Data Mining," International Journal of Computer Sciences and Engineering, vol. VII, no. 2, pp. 289-293, 2019.
[13] P. Singh, S. Singh and G. S. P. Jain, "Effective heart disease prediction system using data mining techniques," International Journal of Nanomedicine, 2018.
[14] V. Chaurasia and S. Pal, "Data Mining Approach to Detect Heart Disease," International Journal of Advanced Computer Science and Information Technology, 2014.
[15] J. Vijayashree and N. C. SrimanNarayanaIyengar, "Heart Disease Prediction System Using Data Mining and Hybrid Intelligent Techniques: A Review," International Journal of Bio-Science and Bio-Technology, vol. VIII, no. IV, pp. 139-148, 2016.
[16] V. Krishnaiah, G. Narsimha and N. S. Chandra, "Heart Disease Prediction System using Data Mining Techniques and Intelligent Fuzzy Approach: A Review," International Journal of Computer Applications, vol. 136, no. 2, pp. 43-51, 2016.
[17] R. Thakur , B. Gauri, D. Ashwini and . P. Shinde, "Heart Attack Prediction System Using Data Mining," International Journal of Innovative Research in Computer and Communication Engineering, vol. IV, no. 8, pp. 15582-15585, 2016.
[18] A. Hazra, S. K. Mandal, A. Gupta, A. Mukherjee and A. Mukherjee, "Heart Disease Diagnosis and Prediction Using Machine Learning and Data Mining Techniques:A Review," Advances in Computational Sciences and Technology, vol. X, no. 7, pp. 2137-2160, 2017.
[19] P. S. C. Reddy, P. Palagi and Jaya, "HEART DISEASE PREDICTION USING ANN ALGORITHM IN DATA MINING," International Journal of Computer Science and Mobile Computing, vol. VI, no. 4, pp. 168-172, 2017.
[20] K. T K, "Heart Disease Prediction System using Data Mining Method," International Journal of Engineering Trends and Technology, vol. 47, no. 6, pp. 361-363, 2017.
[21] E. S. Kajal, "Prediction of Heart Disease using Data Mining Techniques," International Journal of Advance Research , Ideas and Innovations in Technology, vol. II, no. 3, pp. 1-7, 2016.
[22] A. Kaur and J. Arora, "HEART DISEASE PREDICTION USING DATA MINING TECHNIQUES: A SURVEY," International Journal of Advanced Research in Computer Science, vol. XI, no. 2, pp. 569-572, 2018.
[23] M. Raihan, S. Mondal, a. More, P. K. Boni and M. O. F. Sagor, "Smartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches," Advances in Science, Technology and Engineering Systems Journal, vol. II, no. 3, pp. 1815-1822, 2017.
[24] K. Gomathi and D. Shanmugapriyaa, "Heart Disease Prediction Using Data Mining Classification," International Journal for Research in Applied Science & Engineering Technology, vol. IV, no. II, pp. 60-63, 2016.
[25] A. Hazra, S. K. Mandal, A. Gupta, A. Mukherjee and A. Mukherjee, "Heart Disease Diagnosis and Prediction Using Machine Learning and Data Mining Techniques:," Advances in Computational Sciences and Technology, vol. X, no. 7, pp. 2138-2158, 2017.
Citation
Akansha Jain, Manish Ahirwar, Rajeev Pandey, "A Review on Intutive Prediction Of Heart Disease Using Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.109-113, 2019.
Medical Image Segmentation: A Review of Recent Techniques, Advancements and a Comprehensive Comparison
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.114-124, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.114124
Abstract
Image segmentation is the most critical function in image analysis and processing. Results of segmentation fundamentally affect all subsequent image analysis processes such as representation and description of objects, measurement of features, and even higher-level tasks such as classification of objects. Image segmentation is therefore the most essential and crucial process for facilitating the delineation, characterization and visualization of regions of interest in any medical image. The radiologist`s manual segmentation of the medical image is not just a tedious and time-consuming technique, also not very accurate, especially with the increasing medical imaging modalities and the unmanageable quantity of medical images that need to be examined. It is therefore necessary to review current image segmentation methodologies using automated algorithms that are accurate and require as little user interaction as possible, especially for medical images. In the segmentation process, it is necessary to delineate and extract the anatomical structure or region of interest so that it can be viewed individually. In this paper, we are projecting the important place of image segmentation in decision-making information extraction and deliberating upon current techniques which are used in medical imaging and discussing about various advancements in this research field.
Key-Words / Index Term
Medical Imaging, Segmentation, Watershed Transform (WT), Expectation Maximization (EM), Level Set Method (LSM), Genetic Algorithms (GA), Artificial Neural Networks (ANN)
References
[1] Gonzalez RC, Woods RE. 1992. Digital Image Processing. Reading, MA: Addison-Wesley
[2] P. Soille, Morphological Image Analysis: Principles and Applications. Berlin, Germany: Springer-Verlag, 1999.
[3] L. Xie, R. Hong, B. Zhang, Q. Tian, "Image classification and retrieval are ONE", Proc. ACM Int. Conf. Multimedia Retrieval, pp. 3-10, 2015.
[4] Nameirakpam Dhanachandra, Yabem Jina Chanu and Kumathem Manglem Singh, “Image segmentation using k-means clustering algorithm and subtractive clustering algorithm,” Procedia Computer Science. 2015; 54; 764-771.
[5] N. K. Mishra and M. E. Celebi, “An overview of melanoma detection in dermoscopy images using image processing and machine learning,” arXiv preprint arXiv:1601.07843, 2016.
[6] X.Zhang et al., A multi-scale 3D Otsu thresholding algorithm for medical image segmentation, Digit. Signal Process. (2016), http://dx.doi.org/10.1016/j.dsp.2016.08.003
[7] Han Jie, Yang Chunhua, Zhou Xiaojun, Gui Weihua, A new multi-threshold image segmentation approach using state transition algorithm, Applied Mathematical Modelling (2017), doi: 10.1016/j.apm.2017.02.015
[8] Song, C. Yang, L. Fan, K. Wang, F. Yang, S. Liu, J. Tian, Lung lesion extraction using a toboggan based growing automatic segmentation approach, IEEETrans. Med. Imaging 99(2015)1, http://dx.doi.org/10.1109/TMI.2015.2474119.
[9] M.A. Mohammed, M.K.A. Ghani, R.I. Hamed,M.K. Abdullah, D.A. Ibrahim, Automatic Segmentation and Automatic Seed Point Selection of Nasopharyngeal Carcinoma from Microscopy Images Using Region Growing Based Approach, Journal of Computational Science (2017), http://dx.doi.org/10.1016/j.jocs.2017.03.009
[10] Y. Li, X. Bai, L. Jiao, Y. Xue, Partitioned-cooperative quantum-behaved particle swarm optimization based on multilevel thresholding applied to medical image segmentation, Appl. Soft Comput. J. 56 (2017) 345–356. doi:10.1016/j.asoc.2017.03.018.
[11] Rouhi, R., et al. Benign and malignant breast tumors classification based on region growing and CNN segmentation. Expert Systems with Applications (2014), http://dx.doi.org/10.1016/j.eswa.2014.09.020
[12] Tyan, Y-S.; Wu, M-C.; Chin, C-L.; Kuo, Y-L.; Lee, M-S.;Chang, H-Y.: Ischemic stroke detection system with a computer-aided diagnostic ability using an unsupervised feature perception enhancement method. Int. J. Biomed. Imaging2014, 12, Article ID947539 (2014). https://doi.org/10.1155/2014/947539
[13] M. Nikolic, E. Tuba, and M. Tuba, “Edge detection in medical ultra-sound images using adjusted Canny edge detection algorithm,” in24thTelecommunications Forum TELFOR. IEEE, 2016, pp. 691–694.
[14] W. S. Oliveira, J. V. Teixeira, T. I. Ren, G. D. Cavalcanti, J. Sijbers, Unsupervised retinal vessel segmentation using combined filters, PloS one 11 (2) (2016) e0149943
[15] X. Fan, X. Wang, S. Wang, A fuzzy edge-weighted centroidal Voronoi tessellation model for image segmentation, Comput. Math. Appl.(2015) http://dx.doi.org/10.1016/j.camwa.2015.11.003
[16] Aganj, M. G. Harisinghani, R. Weissleder, and B. Fischl, ‘‘Unsupervised medical image segmentation based on the local center of mass,’’Sci. Rep.,vol. 8, no. 1, Aug. 2018, Art. no. 13012.
[17] Lay Khoon Lee et, al.: A review of image segmentation methodologies in medical images. Springer international publishing Switzerland 2015
[18] Rouhi, R., Jafari, M., 2016. Classification of benign and malignant breast tumors based on hybrid level set segmentation. Expert Systems with Applications 46, 45–59.
[19] Jean-Baptiste Fasquel and Nicolas Delanoue. A graph-based image interpretation method using a priori qualitative inclusion and photometric relationships. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017.
[20] Ghosha, P., Mitchellb, M., Tanyid, J.A. and Hungd, A.Y., (2016) Incorporating Priors for Medical Image Segmentation Using a Genetic Algorithm, Neurocomputing, 195,181-194.
[21] Mohammed MA, Ghani MKA, Hamed RI, Ibrahim DA, Abdullah MK (2017) Artificial neural networks for automatic segmentation and identification of nasopharyngeal carcinoma. J Comput Sci 21:263–274
[22] Lee, L. K., Liew, S. C., & Thong, W. J. (2015). A review of image segmentation methodologies in medical image. Advanced computer and communication engineering technology (pp. 1069–1080). Springer International Publishing
[23] Ma Z, Tavares JMRS, Jorge RMN, Mascaranhas T. 2010. A review of algorithms for medical image segmentation and their applications to the female pelvic cavity. Comput Method Biomech Biomed Eng. 13(2):235–246.
[24] M. Rajchl, J. S. Baxter, A. J. McLeod, J. Yuan, W. Qiu, T. M. Peters, and A. R. Khan, “Hierarchical max-flow segmentation framework for multiatlas segmentation with kohonen self-organizing map based gaussian mixture modeling,” Medical image analysis, vol. 27, pp. 45–56, 2016.
[25] Y. Feng, H. Zhao, X. Li, X. Zhang, and H. Li, “A multi-scale 3D Otsu thresholding algorithm for medical image segmentation,” Digital Signal Processing, vol. 60, pp. 186-199, 2017.
[26] Zhou, C., Tian, L., Zhao, H., & Zhao, K. (2015). A method of two-dimensional Otsu image threshold segmentation based on improved firefly algorithm. In Proceeding of IEEE
[27] International conference on cyber technology in automation, control, and intelligent systems, 2015 (pp. 1420–1424). N. Greggio et al., “Fast estimation of Gaussian mixture models for image segmentation,” Mach. Vis. App., Special Issue: Microscopy Image Analysis for Biomedical Applications, 23(4), 773–789 (2012).
[28] Kumar, D.; Pramanik, A.; Kar, S.S.; Maity, S.P. Retinal blood vessel segmentation using matched filterand laplacian of gaussian. In Proceedings of the 2016 International Conference on Signal Processing and Communications (SPCOM), Bangalore, India, 12–15 June 2016; pp. 1–5.
[29] Hore, S.; Chakraborty, S.; Chatterjee, S.; Dey, N.; Ashour, A.S.;Chung, L.V.; Le, D.-N.: An integrated interactive technique for image segmentation using stack based seeded region growing and thresholding. Int. J. Electr. Comput. Eng. (IJECE)6(6), 2773–2780(2016)
[30] Abhishek M. Taori, A. K. Chaudhari, S. S. Patankar. Segmentation of macula in retinal images using automated seeding region growing technique. Inventive Computation Technologies (ICICT), International Conference on, Aug 2016, vol.2, pp.1-5
[31] Javadpour, A. and Mohammadi, A., 2016. Improving Brain Magnetic Resonance Image (MRI) Segmentation via a Novel Algorithm based on Genetic and Regional Growth. Journal of biomedical physics and engineering. 6, 95.
[32] E. Hancer, D. Karaboga, A comprehensive survey of traditional, merge-split and evolutionary approachs proposed for determination of cluster number, Swarm Evol. Comput, 32(2017) 49-67.
[33] Kelkar, D., Gupta, S., “Improved Quadtree Method for Split Merge Image Segmentation”, International Conference on Emerging Trends in Engineering and Technology, 2008, Page(s): 44 – 47.
[34] Sakamoto R, Yakami M, Fujimoto K, et al. Temporal subtraction of serial CT images with large deformation diffeomorphic metric mapping in the identification of bone metastases. Radiology 2017; 285:161942.
[35] A. Anand, S. S. Tripathy and R. S. Kumar, An improved edge detectionusing morphological Laplacian of Gaussian operator, Signal Processing and Integrated Networks (SPIN), 2015 2nd International Conference on,pp. 532-536, Feb. 2015
[36] Haple GN, Daruwala RD, Gofane MS (2015) Comparisions of Robert, Prewitt, Sobel operator-based edge detection methods for real time uses on FPGA. Int Conf Technol Sustain Dev (ICTSD), Mumbai, 1–4.doi: 10.1109/ICTSD.2015.70959
[37] 2016 International Conference on, A. Kalra, R.L. Chhokar, A hybrid approach using Sobel and Canny operator for digital image edge detection, In Micro-Electronics and Telecommunication Engineering (ICMETE), (2016), pp. 305–310 IEEE
[38] M. Nikolic, E. Tuba, and M. Tuba, “Edge detection in medical ultra-sound images using adjusted Canny edge detection algorithm,” in24thTelecommunications Forum TELFOR. IEEE, 2016, pp. 691–694.
[39] Y. Yang, S. Tong, S. Y. Huang, P. Lin, “Log-Gabor Energy Based Multimodal Medical Image Fusion in NSCT Domain,” Comput. Math. Method. M., vol. 2014, Article ID 835481, Aug. 2014.
[40] Kwon GR, Basukala D, Lee SW, Lee KH, Kang M. Brain image segmentation using a combination of expectation-maximization algorithm and watershed transform[J]. International Journal of Imaging Systems and Technology. 2016, 26(3): 225-232.
[41] Husain RA, Zayed AS, Ahmed WM, Elhaji HS. Image segmentation with improved watershed algorithm using radial bases function neural networks. In: 2015 16th International conference on sciences and techniques of automatic control and computer engineering (STA); 2015. p. 357–62. doi: 10.1109/STA.2015.7505175.
[42] E.Abdel-Maksoud,M.Elmogy,R.AlAwadi,Brain tumor segmentation based on a hybrid clustering technique, Egypt. Inform. J. 16 (1) (2015) 71–81, doi:10.1016/j.eij.2015.01.003.
[43] Funmilola A, Oke OA, Adedeji TO, Alade OM, Adewusi EA.Fuzzy K-C-means clustering algorithm for medical image seg-mentation. J Informat Eng Appl 2012;2(6):21–32.
[44] N. Dhanachandra, K. Manglem, Y.Jina Chanu, “Image Segmentation using K-means Clustering Algorithm and Subtractive Clustering Algorithm”, IMCIP-2015, Procedia Computer Science 54 ( 2015 ), pp.764 – 771.
[45] Sharma M, Purohit G and Mukherjee S. Information Retrieves from Brain MRI Images for Tumor Detection Using Hybrid Technique K-means and Artificial Neural Network (KMANN). Networking Communication and Data Knowledge Engineering. Springer, 2018, pp. 145-157.
[46] Prakash, R. M., & Kumari, R. S. S. (2017). Spatial fuzzy C means and expectation maximization algorithms with bias correction for segmentation of MR brain images. Journal of Medical Systems,41(1), 15.
[47] K.-W. Huang, Z.-Y. Zhao, Q. Gong, J. Zha, L. Chen, R. Yang, Nasopharyngeal carcinoma segmentation via HMRF-EMwith maximum entropy, in:2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), IEEE, 2015, pp. 2968–2972.
[48] Xie, S.P., Zhuang, W.Q., and Li, B.S., Blind deconvolution combined with level set method for correcting cup-ping artifacts in cone beam CT, Proc. SPIE 10133, Medical Imaging 2017: Image Processing, Florida, UnitedStates, 2017, pp. 1–4.
[49] Ian Goodfellow, et al. Deep learning. Book in preparation for MIT Press (www.deeplearningbook.org), 2016.
[50] V. Singh, A. Misra, Detection of plant leaf diseases using image segmentation and soft com-puting techniques, Information Processing in Agriculture 4 (1) (2017) 41–49.
[51] E. Iglesias and M. R. Sabuncu, ‘‘Multi-atlas segmentation of biomedical limages: A survey,’’Med. Image Anal., vol. 24, no. 1, pp. 205–219, 2015.
[52] Cabezas M, Oliver A, Llad ́o X, Freixenet J and Bach Cuadra M 2011 A review of atlas-based segmentation formagnetic resonance brain images Comput. Methods Programs Biomed.104 e158–77
[53] R. Phellan, A. Falc ̃ao, and J. Udupa, “Improving atlas-based medical image segmen-tation with a relaxed object search,” in Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications, 2014, vol. 8641, pp. 152–163.
[54] A. Ghaheri, S. Shoar,M. Naderan,andS. S. Hoseini," The Applications of Genetic Algorithms in Medicine", Oman Medical Journal, Vol. 30, Pages 406–416, 2015.
[55] Holzinger, K., Palade, V., Rabadan, R., Holzinger, A.: Darwin or Lamarck? Future Challenges in Evolutionary Algorithms for Knowledge Discovery and Data Mining. In: Holzinger, A., Jurisica, I. (eds.) Knowledge Discovery and Data Mining. LNCS, vol. 8401, pp. 35–56. Springer, Heidelberg (2014)
[56] Ghosha, P., Mitchellb, M., Tanyid, J.A. and Hungd, A.Y., (2016) Incorporating Priors for Medical Image Segmentation Using a Genetic Algorithm, Neurocomputing, 195,181-19
Citation
Aarish Shafi Dar, Devanand Padha, "Medical Image Segmentation: A Review of Recent Techniques, Advancements and a Comprehensive Comparison," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.114-124, 2019.
Improved Apriori Algorithm For Association Rules Using Pattern Matching
Survey Paper | Journal Paper
Vol.7 , Issue.7 , pp.125-128, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.125128
Abstract
Association rule mining is an exceptionally imperative and important part of data mining. It will be used to Figure the fascinating designs from transaction databases. Apriori calculation will be a standout amongst those practically established calculations from claiming association rules, yet all the it need the bottleneck Previously, effectiveness. In this article, we suggested a prefixed-itemset-based information structure to generate frequent itemset, with those assistance of the structure we figured out how to enhance the effectiveness of the traditional Apriori calculation.
Key-Words / Index Term
Apriori, Improved Apriori, Frequent itemset, Support, Candidate itemset, Time consuming
References
[1] Wu X, Kumar V, Ross Quinlan J, Ghosh J, Yang Q, Motoda H, McLachlan GJ, Ng A, Liu B, Yu PS, Zhou Z-H, Steinbach M, Hand DJ and Steinberg D, "Top 10 algorithms in data mining”, Knowledge and Information Systems, vol. 14, no. 1, pp. 1–37, Dec. 2007.
[2] Wang Feng, Li Yong-hua, “An Improved Apriori Algorithm Based on the Matrix”, International Seminar on Future BioMedical Information Engineering (FBIE), pp.152- 155, 2008 I .
[3] Agrawal R, Imieli ski T, and Swami A, “Mining association rules between sets of items in large databases,” in Acm Sig Mod Record, vol. 22, pp. 307–316, 1993.
[4] R. Agrawal and R. Srikant. Fast Algorithms for Mining Association Rules in Large Databases. In Proceeding of the 20th International Conference on VLDB, pp. 378-489, 1994. [19]. R.
[5] M. S. Chen, J. Han, P.S. Yu, “Data mining: an overview from a database perspective”, IEEE Transactions on Knowledge and Data Engineering, vol. 8, no.6, pp. 866– 883, 1997.
[6] Irena Tudor, Universitatea Petrol-Gaze din ploeiesti, (2008) “Association Rule Mining as a Data Mining Technique”, Bd.Bucuresti 39, ploeiesti,Catedra de Informatica, Vol-LX,No.1.
[7] X. Wu, V. Kumar, J. Ross Quinlan, J. Ghosh, Q. Yang, H. Motoda, G. J. McLachlan, A. Ng, B. Liu, P. S. Yu, Z.-H. Zhou, M. Steinbach, D. J. Hand, and D. Steinberg, “Top 10 algorithms in data mining ” Knowledge and Information Systems, vol. 14, no. 1, pp. 1–47, Dec. 2008.
Citation
S. Sahu, R.S. Bisht, "Improved Apriori Algorithm For Association Rules Using Pattern Matching," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.125-128, 2019.
A General Perspective of Big Data Analytics: Algorithms, Tools and Techniques
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.129-137, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.129137
Abstract
Big data is the term representing any collection of datasets so large and complex which is difficult to process using traditional data processing applications. The challenges comprise of analysis, capture, search, sharing, storage, transfer, visualization, and privacy violations. Big data is a set of techniques and technologies that need new forms of integration to uncover large hidden values from large datasets which is diverse, complex, and of a massive scale. Big data environment is used to acquire, organize and analyze a variety of data. The main objective of this paper is to give a general perspective of big data analytics, its process, tools and techniques used. There is an immense need for the construction of algorithms to handle Big Data. Many algorithms are defined in the analysis of large data set. A review of various techniques and algorithms are also discussed in this paper. The massive volume of both structured and unstructured data which is so large, it is difficult to gather and analyze for getting the required solution. It is better to have some tools which help in processing the complex data sets. This paper is also focused on various tools available to extract required data from big data.
Key-Words / Index Term
Big data, Data extraction, Data cleansing, Decision making, Visualization, Predictive analysis
References
[1] .CH.Chandra Sekhar, CH.Sekhar, ‘productivity Improvement in Agriculture Sector Using Big Data Tools’, publication a www.researchgate.net, 978-1-5090-6399-4/17/$31.00_c 2017 IEEEConference Paper • March 2017.
[2]. Mohammed K. Hassan, Ali I. El Desouky, Sally M. Elghamrawy, and Amany M. Sarhan, ‘Big Data Challenges and Opportunities in Healthcare Informatics and Smart Hospitals’, © Springer International Publishing AG 2017.
[3]. Ashish Bajpai, Dayanand, “Big Data Analytics in Cyber Security” International Journal of Computer Sciences and Engineering, Vol:6, Issue;7, 2018.
[4]. K. Sree Divya, P.Bhargavi2, “Machine Learning Algorithms in Big data Analytics”, International Journal of Computer Sciences and Engineering, Vol:6, Issue;1,2017.
[5]. Mohamed Abdel-Basset, Mai Mohamed, Florentin Smarandache, and Victor Chang,’ Neutrosophic Association Rule Mining Algorithm for Big Data Analysis’, Symmetry 2018, 10, 106; DOI: 10.3390/sym10040106
[6]. A Rytsarev, A V Kupriyanov, Clustering of social media content with the use of Big Data technology’ The IV International Conference on Information Technology and Nanotechnology.
[7]. Ajay Kumar Pal, Saurabh Pal, ‘Analysis and Mining of Educational Data for Predicting the Performance of Students’, International Journal of Electronics Communication and Computer Engineering Volume 4, Issue 5.
[8]. Brijesh Kumar Baradwaj, Saurabh Pal,’ Mining Educational Data to Analyze Students‟ Performance’, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 6, 2011.
[9]. Vinayak A. Bharadi, Prachi P.Abhyankar, ‘Analysis And Prediction in Agriculture Data using Data Mining Techniques’International Journal of Research In Science & Engineering Special Issue 7ICEMAN March 2017 IJRISE
[10]. Senthil Vadivu, Dr. Prasanna Devi, Vishnu Kiran, Manivannan,’ Modelling A Predictive Analytics Methodology For Forecasting Rice Variety And Quality On Yield On Farm And Farming Attributes Using Bigdata’, International Journal of Pure and Applied Mathematics Volume 116 No. 5 2017, 61-65.
[11]. Ashwani Kumar Kushwaha, SwetaBhattachrya,’ Crop yield prediction using Agro Algorithm in Hadoop’, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 5, No2, April 2015
[12]. Ekta Joshi1, Dr. D. A.Parikh, ‘An Improved K-Means Clustering Algorithm’, International Journal of Scientific Research in Science, Engineering and Technology, 2018IJSRSET, Volume 4, Issue 1.
. [13]. D Ramesh, B Vishnu Vardhan, ‘Analysis Of Crop Yield Prediction Using Data Mining Techniques’, IJRET: International Journal of Research in Engineering and Technology, Volume: 04, Issue: 01 Jan-2015.
[14]. Lean Yu, Yaqing Zhao, Ling Tang c, Zebin Yang d, ‘Online big data-driven oil consumption forecasting with Google trends ‘, International Journal of Forecasting 35 (2019) 213–223, 2017 Elsevier.
[15]. Gunasekaran Manogaran and DaphneLopez, ‘Health data analytics using scalable logistic regression with stochastic gradient descent’, Int. J. Advanced Intelligence Paradigms, Vol. 10, 2018.
[16]. Abdallah, V. Detriments, H. Mylonas, K. Tatsis & E. Chatzi,’ Fault diagnosis of wind turbine structures using decision tree learning algorithms with big data’,2018 Taylor & Francis Group, London.
[17]. Eka Sugiyarti, Kamarul Azmi Jasmi, Bushrah Basiron, Miftachul Huda,
Shankar K., Andino Maseleno,’ Decision Support System Of Scholarship Grantee Selection Using Data Mining ‘, International Journal of Pure and Applied Mathematics, Volume 119 No. 15 201,
[18]. Michelle Cristina Araujo Picolia, Gilberto Camara, Ieda Sanchez,’ Big earth observation time series analysis for monitoring Brazilian Agriculture ‘, ISPRS Journal of Photogrammetry and Remote Sensing • August 2018, isprsjprs.
[19]. Konstantinos G. Liakos, Patrizia Busato, Dimitrios Moshou, Simon Pearson and Dionysis Bochtis,` Machine Learning in Agriculture: A Review ‘, Sensors 2018, 18, 2674.
[20]. Miguel Molina-Solana, Mar´ıa Rosa,⇤, M. Dolores Ruiz, Juan Gomez-Romero, M.J. Martin-Bautista, ‘Data Science for Building Energy Management: a review’, Article in Renewable and Sustainable Energy Reviews, April 2017 DOI: 10.1016/j.rser.2016.11.132.
[21]. Nirbhey Singh Pahwa, Vidhi Soni, Neeha Khalfay, Deepali Vora, Stock Prediction using Machine Learning a Review Paper ‘International Journal of Computer Applications (0975 – 8887) Volume 163 – No 5, April 2017.
[22 ].Mansi Shinde, Kimaya Ekbote, Sonali Ghorpade, Sanket Pawar, Shubhada Mone, ‘Crop Recommendation and Fertilizer Purchase System’, Mansi Shinde et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2), 2016, 665-667.
[23]. Magdalena Cantabella, Raquel Martínez-España ∗, Belén Ayuso, Juan Antonio Yáñez, Andrés Muñoz,’ Analysis of student behavior in learning management systems through a Big Data framework’, Future Generation Computer Systems 90 (2019)262272,2 2018 Elsevier B.V.
[24]. Mohamed Abdel-Basset 1,* ID, Mai Mohamed 1, Florentin Smarandache 2,* ID and Victor Chang 3, ‘Neutrosophic Association Rule Mining Algorithm for Big Data Analysis’, Symmetry 2018, 10, 106; DOI:10.3390/sym10040106.
[25]. F. Padillo • J.M. Luna • S. Ventura, ‘A grammar-guided genetic programming algorithm for associative classification in Big Data’, Article in Cognitive Computation • November 2018.
[26]. J. Jenifer Nancy, Jhansi Rani, Dr. D. Devaraj, ‘Association Rule Mining in Big Data using MapReduce Approach in Hadoop’, GRD Journals | Global Research and Development Journal for Engineering | International Conference on Innovations in Engineering and Technology (ICIET) - 2016 | July 2016.
[27 ]. Daxin Tian, Yuki Zhu, Xuting Duan, Junjie Hu, Zhengguo Sheng, Min Chen, IEEE, Jian Wang, Yunpeng Wang,’ An Effective Fuel Level Data Cleaning And Repairing Method for Vehicle Monitor Platform’, - IEEE Transactions, 2019 - ieeexplore.ieee.org.
[28]. Mohamed Alleghany, Dhiya-Jumeily, Thar Baker, Abir Hussain, Jamila Mustafin, and Ahmed J. Aljaaf,’ Applications of Machine Learning Techniques for Software Engineering Learning and Early Prediction of Students’ Performance ‘,© Springer Nature Singapore Pte Ltd. 2019.
[29]. Shili Lian, Liangliang Wan, Ling Zhan, and Yansheng Wu, ‘Research on Recognition of Nine Kinds of Fine Gestures Based on Adaptive AdaBoost Algorithm and Multi-Feature Combination’, IEEE, VOLUME 7, 2019.
[30]. Rishabh Kapoor, Shiva Verma & M L Sharma,’ Multi-Lingual Comparative Sentiment Analysis Of Twitter Data Using Ann Algorithm’, R Kapoor, S Verma, ML Sharma -Digitalization,2018researchgate.net, ISBN: AR No.-3093/ISBN/2018/A.
[31]. A. Sankari Karthiga, M. Satish Mary, M. Yogini,’ Early Prediction of Heart Disease Using Decision Tree Algorithm’, International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Vol.3, Issue.3, March 2017.
Citation
P. Pandeeswary, M. Janaki, "A General Perspective of Big Data Analytics: Algorithms, Tools and Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.129-137, 2019.
A Survey on Offline Handwritten Text Recognition of Popular Indian Scripts
Survey Paper | Journal Paper
Vol.7 , Issue.7 , pp.138-149, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.138149
Abstract
Handwritten recognition is for all time a pioneering area of research in the field of pattern recognition and image processing and there is a huge demand for optical character recognition (OCR) on handwritten documents. Most of these systems work for Arabic, roman, Japanese and Chinese characters, but not as much of research on Indian languages, though there are 11 main scripts in India. This article provides a comprehensive survey of recent developments in popular Indian scripts for handwriting recognition by comparing the feature selection techniques, classifiers and the recognition accuracy for each technique. Finally, some future research directions on offline handwritten recognition techniques are discussed.
Key-Words / Index Term
handwritten recognition, optical character recognition, feature selection, pattern recognition, image processing
References
[1]. Impedovo S, Ottaviano L, and Occhinegro S,“Optical Character Recognition — A Survey. Character and Handwriting Recognition”,1-24,1991.
[2]. Setitra I, Hadjadj Z, and Meziane A,"A Tracking Approach for Text Line Segmentation in Handwritten Documents",In the Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, (2017).
[3]. Gattal A,Djeedi C, Siddqi I, Chibani Y,“Gender classification from offline multi-script handwriting images using oriented basic image features”, Expert Syst Appl, 99,155–167,2018.
[4]. Plamondon R. and Srihari S.N,“Online and Off-Line Handwriting Recognition: A Comprehensive Survey”, IEEE Transactions on Pattern Analysis and Machine Intelligence, 22, 63-84, 2000.
[5]. Pal U and Chaudhuri B. B,“Indian script character recognition: A survey”,Patt.Recog. 37, 9, 1887–1899,2004.
[6]. Pal U, Jayadevan, R, and Sharma, N,“Handwriting recognition in Indian regional scripts: A survey of offline techniques”, ACM Trans. Asian Lang. Inform. Process,11, 1, Article 1 (March 2012).
[7]. Roy K, And Majumder K,“Trilingual script separation of handwritten postal document”, In Proceedings of the Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP’08),693–700,2008.
[8]. Bhowmik T. K, Parui S. K, Bhattacharya U, and Shaw B,“An HMM based recognition scheme for handwritten Oriya numerals”, In Proceedings of the 9th Information Technology Conference (ICIT’06),105–110,2006.
[9]. Bhowmik T. K,Parui S. K, and Roy U,“Discriminative HMM Training with GA for Handwritten Word Recognition”, In Proceedings of the 19th International Conference on Pattern Recognition (ICPR’08),1–4,2008.
[10]. Bhowmik T. K, Ghanty P, Roy A, and Parui S. K,“SVM-based hierarchical architectures for handwritten Bangla character recognition”, Int. J. Document Analy.Recog.,12, 2, 97–108,2009.
[11]. 11.Liu C. L. and Suen C. Y,“A new benchmark on the recognition of handwritten Bangla and Farsi numeral characters”,Patt.Recog.,42, 12, 3287–3295,2009.
[12]. 12. Pal U, Wakabayashi T, and Kimura F, a.“Handwritten Bangla compound character recognition using gradient feature”, In Proceedings of the 10th Information Technology Conference (ICIT’07),208–213,2007.
[13]. 13. Pal U, Wakabayashi T, and Kimura F, b.“A system for off-line Oriya handwritten character recognition using curvature feature”, In Proceedings of the 10th Information Technology Conference (ICIT’07),227–229,2007.
[14]. 14.Pal U, Wakabayashi T, Sharma N, and Kimura F, c.“Handwritten Numeral Recognition of Six Popular Indian Scripts”,In Proceedings of 9th International Conference on Document Analysis and Recognition (ICDAR’07),749–753,2007.
[15]. 15. Pal U, Sharma N, Wakabayashi T, and Kimura F,“Handwritten character recognition of popular south Indian scripts”, Lecture Notes in Computer Science, vol. 4768, D. Doermann and S. Jaeger, Eds., Springer Verlag, 251–264,2008.
[16]. 16. Pal U, Roy K, and Kimura F,“A lexicon-driven handwritten city-name recognition scheme for Indian postal automation”, IEICE Trans. Inf. Syst. E92.D, 5, 1146–1158,2009.
[17]. 17. Sagheer M. W, He C. L., Nobile N, and Suen C. Y,“A new large Urdu database for offline handwriting recognition”, In Proceedings of the International Conference on Image Analysis and Processing (ICIAP’09),538–546,2009.
[18]. 18.http://lipitk.sourceforge.net/datasets/teluguchardata.html
[19]. 19. Hawkins W. (n.d.),“FFT interpolation for arbitrary factors: A comparison to cubic spline interpolation and linear interpolation”, Proceedings of 1994 IEEE Nuclear Science Symposium - NSS94.
[20]. 20. Kowalski M,“ThresholdingRulesand Iterative Shrinkage/ Thresholding Algorithm: A Convergence Study”,IEEE International Conference On Image Processing (ICIP),2014.
[21]. 21. Saha P. K, Borgefors G, and Baja G. S,“Skeletonization and its applications–a review”, Skeletonization,3-42,2017.
[22]. 22. Singh C, Bhatia N, and Kaur A,“Hough transform based fast skew detection and accurate skew correction methods”, PatternRecognition,41(12),3528-3546,2008.
[23]. 23. Ngoko Y, and Cerin C,“An Edge Computing Platform for the Detection of Acoustic Events”, IEEE International Conference on Edge Computing (EDGE),2017.
[24]. 24. A. Vaishnav and M. Mandot, "An Integrated Automatic Number Plate Recognition for Recognizing Multi Language Fonts," 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 2018, pp. 551-556.
[25]. 25. Feng W, and Boukir S,“Class noise removal and correction for image classification using ensemble margin”, IEEE International Conference on Image Processing (ICIP),2015.
[26]. 26. Sawant A. S, and Chougule D,“Script independent text pre-processing and segmentation for OCR”, International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO),2015.
[27]. 27. S. Senda and K. Yamada, "A maximum-likelihood approach to segmentation-based recognition of unconstrained handwriting text," Proceedings of Sixth International Conference on Document Analysis and Recognition, Seattle, WA, USA, 2001, pp. 184-188.
[28]. 28. C. J. Mathew, R. C. Shinde and C. Y. Patil, "Segmentation techniques for handwritten script recognition system," 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], Nagercoil, 2015, pp. 1-7.
[29]. 29. Joshi, A., & Bharadwaj, D. (2015). “A Survey on Word Segmentation Method for Handwritten Documents", International Journal of Science and Research (IJSR),4(11), 993-996,2015.
[30]. 31. R. Amarnath, and Nagabhushan, P,“Spotting Separator Points at Line Terminals in Compressed Document Images for Text-line Segmentation”, International Journal of Computer Applications,172(4), 40-47,2017.
[31]. 32. Bal A, and Saha R,“An Improved Method for Handwritten Document Analysis Using Segmentation, Baseline Recognition and Writing Pressure Detection”, Procedia Computer Science,93, 403-415,2016.
[32]. 33. Gupta J. D, and Chanda B,“An Efficient Slope and Slant Correction Technique for Off-Line Handwritten Text Word”, Fourth International Conference of Emerging Applications of Information Technology,2014
[33]. 34. Anwar K,Adiwijaya, and Nugroho H,“A segmentation scheme of Arabic words with harakat”. IEEE International Conference on Communication, Networks and Satellite (COMNESTAT),2015.
[34]. 35. Gonzalez J. D, and Kinsner W,“Zero-crossing analysis of Lévy walks for real-time feature extraction”, IEEE International Conference on Electro Information Technology (EIT),2016.
[35]. 36. Jangid M, and Srivastava S,“Gradient Local Auto-Correlation for handwritten Devanagari character recognition”, International Conference on High Performance Computing and Applications (ICHPCA),2014.
[36]. 37. Gao X, JinL, Yin J, and Huang J. (n.d.),“A new stroke-based directional feature extraction approach for handwritten Chinese character recognition”, Proceedings of Sixth International Conference on Document Analysis and Recognition.
[37]. 38. Arefin N, Hassan M, Khaliluzzaman M, and Chowdhury,S. A,“Bangla handwritten characters recognition by using distance-based segmentation and histogram-oriented gradients”, IEEE Region 10 Humanitarian Technology Conference (R10-HTC),2017.
[38]. 39. Soltanzadeh H, and Rahmati M, “Recognition of Persian handwritten digits using image profiles of multiple orientations”, Pattern Recognition Letters,25(14), 1569-1576.
[39]. 40. R. Li, H. Wang and K. Ji, "Feature Extraction and Identification of Handwritten Characters", 8th International Conference on IntelligentNetworks and Intelligent Systems (ICINIS), Tianjin, pp. 193-196,2015.
[40]. 41.A. R. Zarei and R. Safabakhsh, "A new approach for feature extraction with applications to Automatic Writer Recognition", 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, pp. 13-17,2014.
[41]. 42.Cheng-Lin Liu,“Handwritten Chinese character recognition: effects of shape normalization and feature extraction”, In Proceedings of the conference on Arabic and Chinese handwriting recognition (SACH`06), David Doermann and Stefan Jaeger (Eds.). Springer-Verlag, Berlin, Heidelberg, 104-128,2006.
[42]. 43. B. El qacimy, M. Aitkerroum and A. Hammouch, "Handwritten digit recognition based on DCT features and SVM classifier", Second World Conference on Complex Systems (WCCS), Agadir, pp. 13-16,2014.
[43]. 44.Hamood, Mounir&Boussakta, Said,“Fast Walsh–Hadamard–Fourier Transform Algorithm. Signal Processing”, IEEE Transactions on. 59. 5627-5631,2011.
[44]. 45.Su, Teng& Yu, Feng.,“A Family of Fast Hadamard-Fourier Transform Algorithms. IEEE Signal Processing Letters”,19. 583-586,2012.
[45]. 46.Nguyen, Vu & Blumenstein, Michael, “An Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification”, Proceedings of the International Conference on Document Analysis and Recognition, ICDAR. 339–343,2011.
[46]. 47. Dash K. S, Puhan N. B, and Panda G, “Odia character recognition:Adirectional review”, Artificial Intelligence Review, 48(4), 473-497,2016.
[47]. 48. Rushiraj I, Kundu S, and Ray B, “Handwritten character recognition of Odia script”, International Conference on Signal Processing, Communication, Power and Embedded System (SCOPUS),2016.
[48]. 49. A. Mowlaei, K. Faez and A. T. Haghighat, "Feature extraction with wavelet transform for recognition of isolated handwritten Farsi/Arabic characters and numerals", 14th International Conference on Digital Signal Processing Proceedings, DSP (Cat. No.02TH8628),Santorini, Greece, pp. 923-926,2002, vol.2.
[49]. 50.N. Rodrigues Gomes and Lee Luan Ling, "Feature extraction based on fuzzy set theory for handwriting recognition", Proceedings of Sixth International Conference on Document Analysis and Recognition, Seattle, WA, USA, pp. 655-659,2001.
[50]. 51.J. F. L. De Oliveira, G. V. Mendonca and R. J. Dias, "A modified fractal transformation to improve the quality of fractal coded images", Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), Chicago,IL,USA,pp.756-759,1998,vol.1.
[51]. 52. B.V.Dhandra, R.G.Benne, MallikarjunHangarge, “ Handwritten Kannada Numeral Recognition Based on Structural Features” , Int. conference on Computational Intelligence and multimedia Applications,2007.
[52]. 53. Rajput, Ganapatsingh& H. B. Anita,“Handwritten Script Recognition using DCT and Wavelet Features at Block Level”, International Journal of Computer Applications,2010.
[53]. 54. Hiremath, Prakash &Shivashankar, S & D. Pujari, Jagdeesh&Mouneswara, V, “Script identification in a handwritten document image using texture features”,2010 IEEE 2nd International Advance Computing Conference, IACC 2010. 110–114,2010.
[54]. 55. K. Roy, A. Alaei and U. Pal, "Word-Wise Handwritten Persian and Roman Script Identification", 12th International Conference on Frontiers in Handwriting Recognition, Kolkata, pp. 628-633,2010.
[55]. 56.Roy, Kaushik& Banerjee, A & Pal, Umapada,“A system for word-wise handwritten script identification for Indian postal automation”, Proceedings of the IEEE INDICON 2004 - 1st India Annual Conference,266–271,2005.
[56]. 57. Majumder M, Saha A.K,“Artificial Neural Network. In: Feasibility Model of Solar Energy Plants by ANN and MCDM Techniques”,SpringerBriefs in Energy, Springer, Singapore,2016.
[57]. 58.Acharyya, Ankush&Rakshit, Sandip& Sarkar, Ram &Basu, Subhadip&Nasipuri, Mita,“Handwritten Word Recognition Using MLP based Classifier: A Holistic Approach”,2013.
[58]. 59. V. Babu, L. Prasanth, R. Sharma, G. V. Rao and A. Bharath, "HMM-Based Online Handwriting Recognition System for Telugu Symbols", Ninth International Conference on Document Analysis and Recognition (ICDAR 2007), Parana,pp.63-67,2007.
[59]. 60. Yuan-Xiang Li and Chew Lim Tan, "Influence of language models and candidate set size on contextual post-processing for Chinese script recognition", Proceedings ofthe17th International Conference on Pattern Recognition, ICPR 2004, Cambridge, pp. 537-540,2004, Vol.2.
[60]. 61.Natarajan P., MacRostie E., Decerbo M. (2009) The BBN Byblos Hindi OCR System. In: Govindaraju V., Setlur S. (eds) Guide to OCR for Indic Scripts. Advances in Pattern Recognition. Springer, London
[61]. 62. A. Basu, C. Walters and M. Shepherd, "Support vector machines for text categorization," 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, Big Island, HI, USA, 2003, pp. 7 pp.-.
63.Pal, Umapada & Belaı̈d, A & Choisy, Christophe. (2003). "Touching Numeral Segmentation Using Water Reservoir Concept". Pattern Recognition Letters. 24. 261-272. 10.1016/S0167-8655(02)00240-4.
[62]. 64. B. B. Chaudhuri and S. Bera, "Handwritten Text Line Identification in Indian Scripts," 2009 10th International Conference on Document Analysis and Recognition, Barcelona, 2009, pp. 636-640
Citation
P. Sujatha, D. Lalitha Bhaskari, "A Survey on Offline Handwritten Text Recognition of Popular Indian Scripts," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.138-149, 2019.
Techniques of Parallelization : A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.7 , pp.150-153, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.150153
Abstract
Parallel computing enables us to utilize hardware resources efficiently and to solve computationally intensive problems by dividing them into sub-problem using a shared-memory approach and solving them simultaneously. Emerging technologies are based on parallel computing as it involves complex simulations of real-world situations which are extremely computation-intensive and time-taking as well. Parallel programming is gaining significance due to the limitations of the hardware. Researchers are trying to enhance memory and bus speed to match the processor`s speed. Generating parallel code requires skill and a particular technique of parallelization. There are several parallelization techniques amongst which one needs to be shrewdly chosen for a particular task and architecture. A brief survey of existing parallelization procedures is provided through this paper. New hybrid techniques are required to be developed combining technical and architectural benefits two or more parallel models. A thorough revision of traditional parallelization techniques is required to derive new techniques.
Key-Words / Index Term
Shared Memory; Parallel programming; Parallelization techniques
References
[1] Prema, S.,and R. Jehadeesan,"Analysis of Parallelization Techniques and Tools," International Journal of Information and Computation Technology 3 (2013): 471-478.
[2] Jin, Ruoming, and Gagan Agrawal,"Shared memory parallelization of data mining algorithms: Techniques, programming interface, and performance" Proceedings of the 2002 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, 2002.
[3] John L. Hennessy, and David A. Patterson, “Computer Architecture: A Quantitative Approach”Morgan Kaufmann,Inc.,San Francisco,2nd edition,1996.
[4] Yu, Hao, and Lawrence Rauchwerger, "Adaptive reduction parallelization techniques" ACM International Conference on Supercomputing 25th Anniversary Volume. ACM, 2014.
[5] Chapman, Barbara, and Hans Zima, “Supercompilers for parallel and vector computers” Addison-wesley, 1990.
[6] Zhang, Ye, Lawrence Rauchwerger, and Josep Torrellas,"Hardware for speculative run-time parallelization in distributed shared-memory multiprocessor." Proceedings 1998 Fourth International Symposium on High-Performance Computer Architecture. IEEE, 1998.
[7] Rauchwerger, Lawrence, and David A. Padua,"The LRPD test: Speculative run-time parallelization of loops with privatization and reduction parallelization" IEEE Transactions on Parallel and Distributed Systems 10.2 (1999): 160-180.
[8] Yu, Hao, and L. Rauchwerger, "Run-time parallelization overhead reduction techniques" Proc. of the 9th Int. Conf. on Compiler Construction, Berlin, Germany. 2000.
[9] Banerjee, Utpal, et al, "Automatic program parallelization" Proceedings of the IEEE 81.2 (1993): 211-243.
[10] P.M. Behr, W.K. Giloi and H. Mfihlenbein, “SUPRENUM: The German supercomputer architecture—Rationaleand concepts, Proc” 1986 International Conference on Parallel Processing (1986).
[11] MJ. Flynn, “Some computer organizations and their effectiveness”, IEEE Trans. Computer. 21 (9) (1972) 948-960.
[12] U. Trottenberg, “SUPRENUM--an MIMD multiprocessor system for multi-level scientific computing”, in: W. H~indler et al., eds., CONPAR 86. Conference on Algorithms and Hardware for Parallel Processing, Lecture Notes in Computer Science 237 (Springer, Berlin, 1986) 48-52.
[13] H.P. Zima, H.-J. Bast, M. Gemdt, P.J. Hoppen, “Semi-automatic parallelization of Fortran programs”, in: W. Hgmdler et al., eds., CONPAR 86. Conference on Algorithms and Hardware for Parallel Processing, Lecture Notes in Computer Science 237 (Springer, Berlin, 1986) 287-294.
[14] H.P. Zima, H.-J. Bast, M. Gerndt, PJ. Hoppen, “SUPERB: The SUPRENUM Parallelizer Bonn”, Research Report SUPRENUM 861203, Bonn University, (1986).
[15] Ruchkin, Vladimir, et al, "Frame model of a compiler of cluster parallelism for embedded computing systems",2017 6th Mediterranean Conference on Embedded Computing (MECO). IEEE, 2017.
[16] Shin, Wongyu, et al, "Rank-Level Parallelism in DRAM",IEEE Transactions on Computers 66.7 (2017): 1274-1280.
[17] Liu, De-feng, Guo-teng Pan, and Lun-guo Xie, "Understanding how memory-level parallelism affects the processors performance",2011 IEEE 3rd International Conference on Communication Software and Networks. IEEE, 2011.
[18] Cheng, Shaoyi, et al, "Exploiting memory-level parallelism in reconfigurable accelerators", 2012 IEEE 20th International Symposium on Field-Programmable Custom Computing Machines. IEEE, 2012.
[19] Kumar, K. Ashwin, et al, "Hybrid approach for parallelization of sequential code with function level and block level parallelization”, International Symposium on Parallel Computing in Electrical Engineering (PARELEC`06). IEEE, 2006.
[20] Gasper, Pete, et al, "Automatic parallelization of sequential C code”, Midwest Instruction and Computing Symposium, Duluth, MN, USA. 2003.
[21] Wall, D,"Limits of instruction level parallelism. David W. Wall, Limits of Instruction Level Parallelism" Proc. 4th ASPLOS. 1991.
Citation
Vijay Kumar, Alka Singh, "Techniques of Parallelization : A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.150-153, 2019.
Risk-Based Authentication using Autoencoders
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.155-160, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.155160
Abstract
Verification gives a way to check the authenticity of a client attempting to get to any classified or delicate data. The requirement for ensuring secure information facilitated on the web has been rising exponentially as associations are moving their applications on the web. Static techniques for validation can`t totally ensure the validity of a client. This has prompted the advancement of multifaceted validation frameworks. Risk-based validation; a type of multifaceted verification adjusts as per the risk profile of the clients. This paper advances the plan of risk motor incorporated with the framework to inspect the client`s past login records and produce an appropriate example utilizing AI calculations to figure the risk dimension of the client. The risk level further chooses the confirmation technique that the client will be tested with. In this manner the versatile verification model aides in giving a more elevated amount of security to its clients.
Key-Words / Index Term
User Metadata, Risk Metadata, Authentication System
References
[1] Kumar Abhishek, SahanaRoshan, Prabhat Kumar and Rajeev Ranjan. "A comprehensive study on Multifactor Authentication Schemes". Advances in Computing and Information Technology, 177, pp. 561-568,2013.
[2] Tubin G (2005) Emergence of risk-based authentication in online financial services: You Can’t Hide Your Lyin’ IP. Whitepaper #V43:15N, Tower Group, May
[3] Lian S, Chen X, Wang J (2012) Content distribution and copyright authentication based on combined indexing and watermarking. Multimedia Tools Appl 57(1):49–66
[4] Orozco M, Graydon M, Shirmohammadi S, El Saddik A (2012) Experiments in haptic-based authentication of humans, International Journal of Multimedia Tools and Applications - Springer Science + Business Media B.V.
[5] Issa Traore & Isaac Woungang & Mohammad S. Obaidat & Youssef Nakkabi & Iris La in Springer Science+Business Media New York 2013 DOI 10.1007/s11042-013-1518-5
[6] Dimmock N, Bacon J, Ingram D, Moody K (2005) Risk models for trust-based access control. In Proc. of the 3rd Annual Conference on Trust Management (iTrust’05),
[7] Mohan V. Pawar, Anuradha J. " Network Security and Types of Attacks in Network". Procedia Computer Science 48, pp. 503 – 506,2015.
[8] Oded Peer, Yedidya Dotan, Yael Villa and Marcelo Blatt. "USING BASELINE PROFILES IN ADAPTIVE AUTHENTICATION". US Patent 8,621,586 B1, December 31,2013.
[9] Misbahuddin, Dr Mohammed & Premchand, P & Govardhan, Dr. (2008). A user-friendly password authenticated key agreement For web based services. 10.1109/INNOVATIONS.2008.4781766.
[10] Environment", in International Conference on Advances in Computing, Communication and Control (ICAC3’09)
[11] DipankarDasgupta, Arunava Roy and Abhijit Nag. "Toward the design of adaptive selection strategies for multi-factor authentication". computers& security, pp. 85–116,2016.
Citation
Bharat Sharma, Sidharth Singh, "Risk-Based Authentication using Autoencoders," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.155-160, 2019.
A Review on Analysis of TPA model for Secure Information Retrieval in Cloud Computing
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.161-164, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.161164
Abstract
Today’s businesses are interested in secure data and their applications can be accessible from anywhere using any device. It is able to achieve using cloud technology, but there are implicit challenges to making it realism. What can enterprise businesses do to reap the benefits of cloud technology while ensuring a secure environment for sensitive information? Recognizing those challenges is the first process to finding solutions that work. Increasingly many companies plan to move their local data management systems to the cloud and store and manage their product details on cloud servers. An accompanying issue is how to protect the security of the commercially confidential data, while preserve the ability to search the data. In this paper we are analysis of different securities scheme for encryption of item information and also for data search scheme in cloud computing.
Key-Words / Index Term
Cloud Computing, Cloud Security, Security issues, Information Security
References
[1] YING-SI ZHAO “Secure and Efficient Product Information Retrieval in Cloud Computing” Received February 10, 2018, accepted March 11, 2018, date of publication March 19, 2018, date of current version April 4, 2018
[2] M. J. Atallah, K. Pantazopoulos, J. R. Rice, and E. ESpafford, “Secure outsourcing of scientific computations,” Trends in Software Engineering, vol. 54, pp. 215-272
[3] Cao et al. “Privacy-preserving multi-keyword ranked search over encrypted cloud data”. ieee infocom 2011
[4] Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, "Fine-grained Data Access Control Systems with User Accountability in Cloud Computing", IEEE International Conference on Cloud Computing Technology and Science, 2010.
[5] Younis A. Younis, Kashif Kifayat, Madjid Merabti, "An access control model for cloud computing", Elsevier journal of information security and applications, 2014.
[6] Rongzhi Wang “Research on Data Security Technology Based on Cloud Storage”.
[7] Akhilesh Yadav et al. “Securing Cloud Computing Environment using Quantum Key Distribution”
[8] C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou “Toward secure and dependable storage services in cloud computing” IEEE Trans. Services Comput., 5 (2) (2012), pp. 220-232
[9] Duncan, Adrian, Sadie Creese, and Michael Goldsmith . “Insider attacks in cloud computing.” Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE,2012.
Citation
Nitin Kumar Sahu, Anuj Kumar Pal, "A Review on Analysis of TPA model for Secure Information Retrieval in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.161-164, 2019.
Acoustic Vowel Parameters Based Dialect Classification for Punjabi Speech
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.165-175, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.165175
Abstract
In this paper, the Acoustic Vowel Parameters which is based upon the Dialect Classification for Punjabi Speech is provided. The information from the formant’s dynamics F1, F2, and F3 was analyzed and further used in the process. The sound was evaluated with open source software PRAAT for the acoustic assessment. Multilingual speakers having age between twenty to thirty years has been selected for recording from Malwai and Doaba dialects of Punjab. The data of the total 20 people from Doaba region and 20 from Malwai region in which 7 females and 13 males has been taken for each dialect. In the proposed work MATLAB platform is used. First all the training dataset for the Doabi and the Malwai sound files were collected. The total training set has 140 sound files and the testing file has 19 sound files. Various parameters were analyzed in the training process. These parameters are Duration of the Sound file, Pitch, and Formants (F1, F2, and F3). The Formants (F1, F2, and F3) values were analyzed through PRAAT also. The formants are evaluated using the LPC method in MATLAB. The classifier used in the work was LDA and has classified the input sound file as per Doabi and Malwai sound file. The overall accuracy achieved in the system is 94.44%.
Key-Words / Index Term
Acoustic, Punjabi, Formants, classification, training, testing, LDA (Linear Discriminant Analysis), and MATLAB
References
[1] C. Themistocleous, “Dialect classification using vowel acoustic parameters”, Elsevier Speech Commun., Vol. 92, Issue.5, pp. 13–22, 2017.
[2] S. Mittal and R. Kaur, “Implementation of Phonetic Level Speech Recognition System for Punjabi Language”, IEEE, 2016.
[3] D. Kaur and G.B. Kumar, “Vowel Analysis for Indian English”, In the Proceedings of the 2016 6th International Conference On Advances In Computing & Communications, ICACC, 6-8 September 2016, Cochin, India, Vol. 93, pp.533–538, 2016.
[4] Y. Liuxin, “The five main vowels acoustic analysis of Tibetan Lhasa dialect”, In the Proceedings of the 2015 Fifth Int. Conf. Instrum. Meas. Comput. Commun. Control, pp.0–4, 2015.
[5] Z. Yue and L. Wei, “Study of the formant and duration in Chinese whispered vowel speech”, Elsevier Applied Acoustics, Vol. 114, pp.240–243, 2016.
[6] H. Liu and J. Liang, “Vowels as acoustic cues for sub-dialect identification in Chinese”, IEEE, Vol. 1, pp.3–7, 2016.
[7] P. Singh “Formant Analysis of Punjabi non-nasalized Vowel Phonemes”, In the Proceedings of the International Conference on Computational Intelligence and Communication Systems, India, pp. 382–387, 2011.
[8] O. Kalasnhnik and J. Fletcher, “An acoustic study of vowel contrasts in North Indian English”,ICphS XVI, No.8, pp.953–956, 2007.
[9] P. Martiand and S. P. V. S. W. Beet, “Analysis of ten vowel sounds across gender and regional/cultural accent”, pp. 2231–2234, 2016.
[10] H. Kaur and R. Bhatia, “Speech Recognition System for Punjabi Language”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, Issue 8, August 2015.
[11] V. Gupta and G.S. Lehal, “Automatic Keywords Extraction for Punjabi Language”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 3, 2017.
[12] W. Ghai and N. Singh, “Continuous Speech Recognition for Punjabi Language”, International Journal of Computer Applications, Vol. 72, No.14, pp. 0975 – 8887, 2013.
Citation
H. Kaur, M. K. Gill, "Acoustic Vowel Parameters Based Dialect Classification for Punjabi Speech," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.165-175, 2019.
Independnt Component Analysis for Separation and Artifact Removal of Ballistocardiogram Signal
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.176-180, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.176180
Abstract
The fundamental problem in neural network research, as well as in many other disciplines, is finding a suitable representation of multivariate data, i.e. random vectors. For reasons of computational and conceptual simplicity, the representation is often sought as a linear transformation of the original data. In other words, each component of the representation is a linear combination of the original variables. Well-known linear transformation methods include principal component analysis, factor analysis, and projection pursuit. Independent component analysis (ICA) is a recently developed method in which the goal is to find a linear representation of non-Gaussian data so that the components are statistically independent, or as independent as possible. Such a representation seems to capture the essential structure of the data in many applications, including feature extraction and signal separation.In this paper, the author present the basic theory and applications of ICA, and our recent work focuses on separation of source signal and artefact removal using Independent Component Analysis.
Key-Words / Index Term
Ballistocardiogram ,Component, ICA,mixing,unmixing matrix
References
[1] Manjula B.M*, Chirag Sharma “BCG Artifact Removal Using Improved Independent Component Analysis Approach”Indonesian Journal of Electrical Engineering and Computer Science –Scopus and UGC approved journal,Vol 5, No 1: January 2017.
[2] Deuchar, D. C. Ballistocardiography. British Heart Journal 1967, vol. 29, no. 3, p. 285 – 288
[3] Manjula B.M*, Chirag Sharma”Ballistocardiogram Signal Denoising Using Independent Component Analysis”1st springer international conference on Emerging trends and Advances in Electrical Engineering and Renewable Energy 17th to 18th December 2016,ETAEERE-2016,sikkim
[4] KavyaRemesh, Job Chunkath “Comparison of HRV Indices of ECG and BCG Signals “International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 03, Issue 02, [February – 2016]
[5] G. Srivastava S. Crottaz-Herbette, K. M. Lau, G. H. Glover, and V Menon, “ICA-based procedures for removing Ballistocardiogram artifacts from EEG data acquired in the MRI scanner,” NeuroImage, vol. 24, pp. 50–60, 2005
[6] W. Nakamura, K. Anami, T. Mori, O. Saitoh, A. Cichocki and S. Amari, "Removal of Ballisto-cardiogram artifacts from simultaneously recorded EEG and fMRI data using independent component analysis" in IEEE Transactions on Biomedical Engineering, vol. 53, no. 7, pp. 1294-1308, July 2006
[7] Shireen Elhabian and Aly Farag,” A Tutorial on Data Reduction Independent Component Analysis (ICA)” University of Louisville, CVIP Lab, September 2009.
[8] AAapo Hyv¨arinen, Juha Karhunen, and Erkki Oja, IndependentComponent Analysis Final version of 7 March 2001
[9] Jonathon Shlens_google research, Mountain View, CA 94043
(Dated: April 14, 2014; Version 1.0),” A Tutorial on Independent Component Analysis”
Citation
Manjula B.M, Prashantha H.S, Goutham M.A, "Independnt Component Analysis for Separation and Artifact Removal of Ballistocardiogram Signal," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.176-180, 2019.