Texture based Ranking of Categories in a Natural Image
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.183-187, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.183187
Abstract
Natural scene images are captured at a larger distances to include details in scenery. It is much difficult to identify categories because of uncertain shapes & forms present inside these images. Such ambiguous form of nature, which lacks sharp boundaries, makes discrimination among the classes a complex task. This paper attempts to measure this ambiguity. A natural scene image also can belong to multiple categories at a time which makes a task of classification much more difficult and often leads to classification errors. Binary classification fails to capture this ambiguity while doing multi label classification of the image. This problem can be handled by using fuzzy membership function with assumption that class categories in a natural image are non-mutually exclusive. This work provides a ranking based class membership instead of binary classification.
Key-Words / Index Term
Fuzzy Membership Function, Multi-Label Classification, Ranking, Supervised Learning
References
[1] Janhavi Borse, N. M. Shahane, “Multi-Label Classification of A Scene Image using Fuzzy Logic”, IJCA Proceedings ETC 2016, ISBN : 973-93-80975-01-2, vol. 01, no. 2, pp. 4-10, March 18, 2017.
[2] Alex P. Pentland, “Fractal-Based Description Of Natural Scenes”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. Pami-6, No. 6, pp. 661-674, November 1984.
[3] G. Lemaitre and M. Rodojevi, “Texture segmentation: Co- occurrence matrix and Laws’ texture masks methods”, pp. 1-34.
[4] B.S. Manjunathi and W.Y. Ma, “Texture Features for Browsing and Retrieval of Image Data”, IEEE transactions on pattern analysis and machine intelligence, vol. 18, no. 8, pp. 837-842, august 1996.
[5] S. E. Grigorescu, N. Petkov, and P. Kruizinga , “A comparative study of filter based texture operators using Mahalanobis Distance”, 0-7695-0750-6/00, IEEE, pp. 1-4, 2000.
[6] M. Tuceryan and Jain , “Texture Analysis”, ResearchGate Article, pp. 1-42, September 2000.
[7] M. Lindenbaum and R. Sandler, “Gabor Filter Analysis for Texture Segmentation”, pp. 1-58, May 2005.
[8] J. Ilonen, J.-K. Kamarainen, H. Kalviainen, “Efficient computation of Gabor features”, pp. 1-29, 2005.
[9] Y. Alqasrawi, D. Neagu and P. I. Cowling, “Fusing integrated visual vocabularies-based bag of visual words and weighted colour moments on spatial pyramid layout for natural scene image classification”, research gate article in signal image and video processing, pp. 1-25, July 2011.
[10] G. Madjarov, DragiKocev, DejanGjorgjevikj and S. Dzeroski, “An extensive experimental comparison of methods for multi-label learning” , Elsevier publication on Pattern Recognition, pp. 3084- 3104, 2012.
[11] M. Pagola, C. Lopez-Molina, “Interval Type-2 Fuzzy Sets Constructed From Several Membership Functions: Application to the Fuzzy Thresholding Algorithm”, IEEE transactions on fuzzy systems, vol. 21, no. 2, pp. 230-244, April 2013.
[12] Min-Ling Zhang and Zhi-Hua Zhou, “A Review on Multi-Label Learning Algorithms”, IEEE transactions on knowledge and data engineering, vol. 26, no. 8, pp. 1819-1837, august 2014.
[13] J. Wu1, V. Sheng2, J. Zhang3, Peng peng Zhao1, Z. Cui, “Multi- label Active Learning for Image Classification”, ICIP, pp. 1-5, 2014.
[14] L. Jing and M. K. Ng , “Sparse Label-Indicator Optimization Methods for Image Classification”, IEEE transactions on image processing, vol. 23, no. 3, pp. 1002-1014, march 2014.
[15] M. Celuszak and D. Jabry, “ESGI100: Gabor Filter Selection and Computational Processing for Emotion Recognition”, pp. 1-23, 18 may 2014.
[16] C. H. Lim, A. Risnumawan, and C. S. Chan, “A Scene Image is Nonmutually Exclusive-A Fuzzy Qualitative Scene Understanding”, IEEE transactions on fuzzy systems, vol. 22, no. 6, pp. 1541- 1556, December 2014.
[17] Riddhi H.Shaparia, Narendra M.Patel, Zankhana H. Shah, “Flower Classification using Different Color Channel”, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.2, pp.1-6, 2019.
[18] N.S. Lele , “Image Classification Using Convolutional Neural Network”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.22-26, 2018.
Citation
Janhavi H. Borse, Dipti D. Patil, "Texture based Ranking of Categories in a Natural Image," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.183-187, 2019.
Classification of Customer to Upgrade Profits in Retail Market with Deep Learning Methodology
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.188-191, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.188191
Abstract
Capital investment in retail sector and competition in the market has changed the style of marketing. At the same time the enhancements in the field of information technology provided an upper hand to the marketer to know the exact need, preference and perches trend of the customer. By knowing the actual need, preference and purchase trend of customers the marketer can make a future business plan to increase the sale and earn more profit. This paper provides a framework to the retail marketer to find the potential customer by analyzing the previous purchase history of the customer. This task can be accomplished by the use of data mining technique. In this paper we have used k-mean clustering algorithm and Naive Bayes’ classifier for in identifying potential customer for a particular section of products of the retailer.
Key-Words / Index Term
Naive Bayes,Cluster, Centroid,Foreign Direct Investment(FDI)
References
[1] Revenue Management Through Dynamic Cross Selling in E-Commerce Retailing Operations Research 54(5 – Serguei Netessine,See Profile, Available from Serguei Netessine, Serguei Netessine -1997
[2] Insurance Databases for Effective Prediction of Customer Preferences over Life Insurance Products – S. Balaji, S. K. Srivatsa, PhD Senior Professor - A LITERATURE REVIEW – Olof Wahlberg, Christer Strandberg, Karl W. Sandberg
[3] Unsupervised Learning in Large Datasets for Intelligent Decision
Making – S. Balaji,Dr. S. K. Srivatsa.
[4] important influences on classification accuracy – Mohammad Saad Al-Ahmadi, Peter A. Rosen, Rick L. Wilson
[5] Decision Support System for A Customer Relationship Management Case Study – Ozge Kart, Alp Kut, Vladimir Radevski
[6] Proceedings of the 40th Hawaii International Conference on System Sciences- 2007 Synergies of Data Mining and Operations Research –Stephan Meisel, Dirk Chr Mattfeld
[7] Stakeholder Perceptions Regarding eCRM: A Franchise Case Study –unknown authors
[8] Xin Zhao, Yi Wang, and Hongwang Cha. “A New Prediction Model of Customer Churn Based on PCA Analysis”. In: Information Science and Engineering (ICISE), 2009 1st International Conference on. IEEE. 2009, pp. 4657–4661.
[9] Qing-an Cui et al. “Using PCA and ANN to identify significant factors and modeling customer satisfaction for the complex service processes”.In: Industrial Engineering and Engineering Management (IE&EM),2011 IEEE 18Th International Conference on. IEEE. 2011, pp. 1800–1804.
[10] Volodymyr Kuleshov. “Fast algorithms for sparse principal component analysis based on Rayleigh quotient iteration”. In: International Conference on Machine Learning. 2013, pp. 1418–1425.
[11] Zhexue Huang. “Extensions to the k-means algorithm for clustering large data sets with categorical values”. In: Data mining and knowledge discovery 2.3 (1998), pp. 283–304.
[12] Charu C. Aggarwal, Alexander Hinneburg, and Daniel A. Keim. “On the Surprising Behavior of Distance Metrics in High Dimensional Space”. In: Lecture Notes in Computer Science. Springer, 2001, pp. 420–434.
[13] James Bennett, Stan Lanning, et al. “The netflix prize”. In: Proceedings of KDD cup and workshop. Vol. 2007. New York, NY, USA. 2007, p. 35.
[14] James Bennett. “The Cinematch system: Operation, scale coverage, accuracy impact”. In: Summer School on the Present and Future of Recommender Systems (2006).
[15] Yehuda Koren. “The bellkor solution to the netflix grand prize”. In:Netflix prize documentation 81 (2009), pp. 1–10.
[16] Andreas T ̈oscher, Michael Jahrer, and Robert M Bell. “The bigchaos solution to the netflix grand prize”. In: Netflix prize documentation (2009), pp. 1–52.
[17] Martin Piotte and Martin Chabbert. “The pragmatic theory solution to the netflix grand prize”. In: Netflix prize documentation (2009).
[18] A Literature Review on Text Mining Techniques and Methods,IJCSE,Vol.06,Issue.02,pp.96-99,Mar-2018.
[19] Meteric for evaluating availability of an information system: A Quantitative approach based on component dependency,IJNSA,Vol-9,number-2,Mar-2017.
Citation
I.Gayathri Devi, G. Surya Kala Eswari, G. Kumari, "Classification of Customer to Upgrade Profits in Retail Market with Deep Learning Methodology," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.188-191, 2019.
Optimal Capacitor Placement using Fruit Fly Optimization
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.192-198, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.192198
Abstract
Installation of capacitors in primary and secondary networks of distribution systems is one of the efficient methods for power loss reduction and voltage profile improvement. The loss of energy mainly incurred in the distribution network. The objective is to minimize the cost function along with power loss reduction and voltage profile improvement. Now a day this multi-objective problem creates a lot of concentration of the researcher. In this paper, a study based on two-stage procedure is presented. In the first stage, the optimum bus location is done by using a sensitivity index and voltage norm. In the second stage, Fruit Fly algorithm is used to optimize the size of the capacitor as well as bus location, a comparative study is made between Particle swarm optimization (PSO) and Fruit Fly optimization for solving the optimal capacitor problem. The Fruit Fly gives a better result in comparison with PSO for this optimization problem in terms of power loss and cost.
Key-Words / Index Term
Backward sweep forward sweep, Radial distribution, Loss sensitivity Index, Voltage norm, Fruit Fly Optimization
References
[1] Adel Ali Abou El- Ela, Ragab A.El-Sehiemy, Abdel-Mohsen Kinawy, Mohamed Taha Mouwafi “Optimal capacitor placement in distribution systems for power loss reduction and voltage profile improvement”, IET Generation, Transmission & Distribution, vol. 10, no. 5, pp. 1209-1221, 2016.
[2] K. Prakash, M. Sydulu, “Particle swarm optimization based capacitor placement on radial distribution system”, in Proceedings of IEEE power engineering society general meeting, pp. 1-5, 2007.
[3] Srinivasan Sundararajan, Anil Pahwa “Optimal selection of capacitors for radial distribution systems using a genetic algorithm”, IEEE Transactions on Power Systems, vol. 9, no. 3, August 1994.
[4] K.R. Devabalaji, K. Ravi a, D.P. Kothari, “Optimal location and sizing of capacitor placement in radial distribution system using Bacterial Foraging Optimization Algorithm”, Electrical Power and Energy Systems, vol. 71, pp. 383-390, 2015.
[5] M. D. Reddy, V.C.V Reddy, “Optimal capacitor placement using a fuzzy and real-coded genetic algorithm for maximum savings”, Journal of Theoretical and Applied Information Technology, vol. 4, no. 3, 2008.
[6] El-Fergany, A. Attia, Almoataz Y. Abdelaziz, “Capacitor allocations in radial distribution networks using cuckoo search algorithm”, IET Generation, Transmission & Distribution, vol. 8, no. 2, pp. 223-232, 2014.
[7] A.Y. Abde-laziz , E.S. Ali, S.M. Abd Elazim, “Flower Pollination Algorithm and Loss Sensitivity Factors for optimal sizing and placement of capacitors in radial distribution systems”, Electrical Power and Energy Systems, vol. 78, 207-214, 2016.
[8] V.V.K. Reddy, M. Sydulu, “Index and GA based optimal location and sizing of distribution system capacitors”, IEEE Power Engineering Society General Meeting, pp. 1-4, 2007.
[9] Elsheikh Ahmed, Yahya Helmy, Yasmine Abouelseoud, Ahmed Elsherif, “Optimal capacitor placement and sizing in radial electric power systems”, Alexandria Engineering Journal, vol. 53, no. 4, pp 809-816, 2014.
[10] D. Das, D. P. Kothari, A. Kalam. “Simple and efficient method for load flow solution of radial distribution networks”, International Journal of Electrical Power & Energy Systems, vol. 17, no. 5, pp. 335-346, 1995.
[11] M. Gogoi, Ashim Jyoti Gogoi, S. A. Begum, “Optimizing error function of backpropagation neural network”, International Journal of Computer Science and Engineering, vol. 7, no. 4, 2019.
[12] Wen-Tsao Pan, "A new fruitfly optimization algorithm: taking the financial distress model as an example", Knowledge-Based systems vol. 26, pp. 69-74, February 2012.
Citation
Deepjyoti Talukdar, Pranobjyoti Lahon, Ashim Jyoti Gogoi, "Optimal Capacitor Placement using Fruit Fly Optimization," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.192-198, 2019.
An Enhanced Study on Predicting Heart Diseases Using Datamining Techniques
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.199-203, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.199203
Abstract
Data mining is a process of analyzing data from different perspective and gathering the knowledge from it. Heart disease and stroke prediction is a tough task in classifying and predicting the disease from the obesity, overweight, smoking affected persons. To control, we need an intelligent heart disease prediction system. To develop that system, medical terms such as sex, blood pressure, and cholesterol like 13 input parameters are used. To get more appropriate results, two more attributes i.e. obesity and smoking are used, as these attributes are considered as important attributes for heart disease[1]. The data mining classification techniques such as Neural Networks, Decision Trees, and Naive Bayes are used.
Key-Words / Index Term
Neural Networks, Decision trees, Naïve bayes, classification, prediction, data mining
References
[1] Chaitrali S. Dangare and Sulabha S. Apte, PhD, “Improved Study of Heart Disease Prediction System using Data Mining Classification Techniques” published by International Journal of Computer Applications(0975-888), vol. 47,issue no. 10, June 2012.
[2] Frawley and G. Piatetsky -Shapiro, “Knowledge Discovery in Databases: An Overview”. Published by the AAAI Press/ The MIT Press, Menlo Park, C.A 1996.
[3] Sellappan Palaniappan, Rafiah Awang, "Intelligent Heart Disease Prediction System Using Data Mining Techniques", IJCSNS International Journal of Computer Science and Network Security, Vol.8 No.8, August 2008
[4] Niti Guru, Anil Dahiya, Navin Rajpal, "Decision Support System for Heart Disease Diagnosis Using Neural Network", Delhi Business Review, Vol. 8, No. 1 (January - June 2007).
[5] Heon Gyu Lee, Ki Yong Noh, Keun Ho Ryu, “Mining Biosignal Data: Coronary Artery Disease Diagnosis using Linear and Nonlinear Features of HRV,” LNAI 4819: Emerging Technologies in Knowledge Discovery and Data Mining, pp. 56-66, May 2007.
[6] Shantakumar B.Patil, Y.S.Kumaraswamy “Intelligent and Effective Heart Attack Prediction System Using Data Mining and Artificial Neural Network”. ISSN 1450-216X Vol.31 No.4 (2009), pp.642-656.
[7] Carlos Ordonez, "Improving Heart Disease Prediction Using Constrained Association Rules," Seminar Presentation at University of Tokyo, 2004.
[8] Kiyong Noh, Heon Gyu Lee, Ho-Sun Shon, Bum Ju Lee, and Keun Ho Ryu, "Associative Classification Approach for Diagnosing Cardiovascular Disease", Springer, Vol:345, pp: 721- 727, 2006.
[9] Franck Le Duff, Cristian Munteanb, Marc Cuggiaa, Philippe Mabob, "Predicting Survival Causes After Out of Hospital Cardiac Arrest using Data Mining Method", Studies in health technology and informatics, Vol. 107, No. Pt 2, pp. 1256-9, 2004.
[10]Clevelanddatabase: http://archive.ics.uci.edu/ml/datasets/Heart+Disease
[11] Dr. Yashpal Singh, Alok Singh chauhan “Neural Networks in data mining” Journal of Theoretical and Applied Information Technology , 2005 - 2009 JATIT.
Citation
G. Venugopal, K. Vinay, B. Yasaswi, G. Mohan Sai, G. Trilok Chandra Nithin, "An Enhanced Study on Predicting Heart Diseases Using Datamining Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.199-203, 2019.
A Logical Approach Towards Effective Data Search using Ant Colony Optimization in Cloud Environment
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.204-210, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.204210
Abstract
The world has revolutionized over the years with the advent of various technologies and life of mankind has taken a significant turnaround in terms of getting the official problems solved in an effective and efficient manner in no time. One of the most powerful technologies that has come up in recent years is cloud computing. This technology has captured a special place in various Information Technology (IT) sectors and business organizations. Among all the aspects of this technology that are in existence, cloud data search optimization has become a key area of focus for the researchers. Various research works were conducted based on several fundamentals such as Gossip Protocol, Genetic Algorithm, Hybrid Algorithm, Multi-Keyword Synonym Query, Particle Swarm Optimization, Honey Bee Optimization, etc. and all these were put into practical purpose with the primary objective of optimizing the search technique in the cloud. In our paper, we have suggested the use of Ant Colony Optimization Algorithm for an effective data search in database and allocating them to the respective clients through shortest possible network path in no time. We have used the concept of pheromone values to conduct this procedure. Our suggested techniques ensure that our algorithm will achieve a higher degree of performance in terms of increased throughput and increased efficiency as compared to the traditional techniques which were carried out earlier.
Key-Words / Index Term
Database, Client machines, Data Carrier Equipment, Wires, Quadrilateral Obstruction, Pheromone value, Ant Colony Optimization Algorithm
References
[1] Elham Azhir, Nima Jafari Navimipour, Mehdi Hosseinzadeh, Arash Sharifi, Aso Darwesh, “Deterministic and non-deterministic query optimization techniques in the cloud computing”, Concurrency and Computation Practice and Experience, 5th March 2019, DOI: 10.1002/cpe.5240.
[2] YoungJu Moon, HeonChang Yu, Joon Min Gil and JongBeom Lim, “A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environments”, Human-centric Computing and Information Sciences, 9th October 2017, DOI: 10.1186/s13673-017-0109-2.
[3] Gurneet Kaur, “Role And Importance Of Search Engine Optimization”, International Journal Of Research-Granthaalayah, Volume 5, Issue 6, June 2017, DOI: 10.5281/zenodo.818213.
[4] Sudipta Sahana, Rajesh Bose, Debabrata Sarddar, “An Enhanced Search Optimization Protocol Based on Gossip Protocol for the Cloud”, International Journal of Applied Engineering Research, Volume 12, Number 19, pp. 8436-8442, ISSN 0973-4562, 2017.
[5] Li Liu, Miao Zhang, Rajkumar Buyya, Qi Fan, “Deadline-constrained coevolutionary genetic algorithm for scientific workflow scheduling in cloud computing”, Concurrency and Computation Practice and Experience, WILEY, 22nd July 2016, DOI: 10.1002/cpe.3942.
[6] Mohammed Abdullahi, Md Asri Ngadi, “Hybrid Symbiotic Organisms Search Optimization Algorithm for Scheduling of Tasks on Cloud Computing Environment”, PLOS One, 27th June 2016, DOI: 10.1371/journal.pone.0158229.
[7] Mohammed Abdullahi, Md Asri Ngadi, Shafi’i Muhammad Abdulhamid, “Symbiotic Organism Search optimization based task scheduling in cloud computing environment”, Future Generation Computer Systems, 24th August 2015, DOI: 10.1016/j.future.2015.08.006.
[8] Manish M. Pardeshi, R. L. Paikrao, “Enhanced and Efficient Search Multimedia Data by Using Multi-Keyword Synonym Query”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 4, Issue 6, June 2015.
[9] George Suciu, Ana Maria Sticlan, Cristina Butca, Alexandru Vulpe, Alexandru Stancu and Simona Halunga, “Cloud Search Based Applications for Big Data - Challenges and Methodologies for Acceleration”, ARMS-CC 2015, LNCS 9438, Springer International Publishing Switzerland 2015, pp. 177–185, 2015, DOI: 10.1007/978-3-319-28448-4_13.
[10] Qiang Xu, Zhengquan Xu, Tao Wang, “A Data-Placement Strategy Based on Genetic Algorithm in Cloud Computing”, International Journal of Intelligence Science, 2015, 5, 145-157, April 2015, DOI: 10.4236/ijis.2015.53013.
[11] Gunvir Kaur, IEr. Sugandha Sharma, “Research Paper on Optimized Utilization of Resources Using PSO and Improved Particle Swarm Optimization (IPSO) Algorithms in Cloud Computing”, International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014), Vol. 2, Issue 2, Ver. 3, April-June 2014.
[12] Medhat Tawfeek, Ashraf El-Sisi, Arabi Keshk and Fawzy Torkey, “Cloud Task Scheduling Based on Ant Colony Optimization”, The International Arab Journal of Information Technology, Vol. 12, No. 2, 23rd April 2014.
[13] Vimmi Makkar, Sandeep Dalal, “Ranked Keyword Search in Cloud Computing: An Innovative Approach”, International Journal of Computational Engineering Research, Volume 3, Issue 6, June 2013.
[14] Dr S. Saravanakumar, K Ramnath, R Ranjitha and V.G.Gokul, “A New Methodology for Search Engine Optimization without getting Sandboxed”, International Journal of Advanced Research in Computer and Communication Engineering, Volume 1, Issue 7, ISSN: 2278-1021, September 2012.
[15] Lizheng Guo, Shuguang Zhao, Shigen Shen, Changyuan Jiang, “Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm”, Journal of Networks, Volume 7, No. 3, March 2012, DOI: 10.4304/jnw.7.3.547-553.
Citation
Sudipta Sahana, Tanmoy Mukherjee, Debabrata Sarddar, "A Logical Approach Towards Effective Data Search using Ant Colony Optimization in Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.204-210, 2019.
Anomaly Detection and Categorization in Cloud Environment using Deep Learning Techniques
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.211-214, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.211214
Abstract
Cloud computing is a paradigm that allows on-demand network access to a shared pool of configurable and reliable computing resources to cloud customers in pay-per-use, fashion. Despite the existence of such merits, there are Security issues such as data integrity, users’ confidentiality, and service availability because of its open and distributed architecture that place restrictions on the use of cloud computing. A preventive approach is to identify such issues and eliminate before it can cause the serious impact to the cloud users. Nowadays, Intrusion Detection Systems (IDSs) are the most widely used method to detect attacks on cloud. Recently, learning-based techniques for security applications are gaining popularity in the literature with the emergence in machine learning. A deep learning is a novel approach to detect cloud threats. The existing Cloud IDSs suffer from low detection accuracy and a high false positive rate. In this research, proposed solution will use deep learning algorithm to improve the effectiveness of our proposed solution. Furthermore, the comparisons with other deep learning algorithm to demonstrate the effectiveness of our proposed solution are given.
Key-Words / Index Term
Cloud Security, Network Intrusion Detection System, Deep Learning
References
[1] Mehmood, Yasir, et al. "Intrusion detection system in cloud computing: challenges and opportunities." 2013, IEEE.
[2] Idhammad, Mohamed, Karim Afdel, and Mustapha Belouch. "Distributed intrusion detection system for cloud environments based on data mining techniques." Procedia Computer Science 127 (2018): 35-41.
[3] Hamid, Yasir, M. Sugumaran, and LudovicJournaux. "Machine learning techniques for intrusion detection: a comparative analysis." Proceedings of the International Conference on Informatics and Analytics. ACM, 2016.
[4] Haq, Nutan Farah, et al. "Application of machine learning approaches in intrusion detection system: a survey." IJARAI-International Journal of Advanced Research in Artificial Intelligence 4.3 (2015): 9-18.
[5] Dhanabal, L., and S. P. Shantharajah. "A study on NSL-KDD dataset for intrusion detection system based on classification algorithms." International Journal of Advanced Research in Computer and Communication Engineering 4.6 (2015): 446-452.
[6] Buczak, Anna L., and ErhanGuven. "A survey of data mining and machine learning methods for cyber security intrusion detection." IEEE Communications Surveys & Tutorials 18.2 (2016): 1153-1176.
[7] Nguyen, Khoi Khac, et al. "Cyberattack detection in mobile cloud computing: A deep learning approach." 2018 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2018.
[8] Van, Nguyen Thanh, Tran Ngoc Thinh, and Le Thanh Sach. "An anomaly-based network intrusion detection system using deep learning." 2017 International Conference on System Science and Engineering (ICSSE). IEEE, 2017.
[9] Feng, Fang, et al. "Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device." Ad Hoc Networks 84 (2019): 82-89.
[10] Shone, Nathan, et al. "A deep learning approach to network intrusion detection." IEEE Transactions on Emerging Topics in Computational Intelligence 2.1 (2018): 41-50.
[11] Kwon, Donghwoon, et al. "A survey of deep learning-based network anomaly detection." Cluster Computing (2017): 1-13.
[12] Aldwairi, Tamer, Dilina Perera, and Mark A. Novotny. "An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection." Computer Networks 144 (2018): 111-119.
[13] Almseidin, Mohammad, et al. "Evaluation of machine learning algorithms for intrusion detection system." Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium on. IEEE, 2017.
[14] Haque, MdEnamul, and Talal M. Alkharobi. "Adaptive hybrid model for network intrusion detection and comparison among machine learning algorithms." International Journal of Machine Learning and Computing 5.1 (2015): 17.
[15] Ahmed, Mohiuddin, AbdunNaser Mahmood, and Jiankun Hu. "A survey of network anomaly detection techniques." Journal of Network and Computer Applications 60 (2016): 19-31.
[16] Liu, Qiang, et al. "A survey on security threats and defensive techniques of machine learning: a data driven view." IEEE access 6 (2018): 12103-12117.
[17] Kwon, Donghwoon, et al. "A survey of deep learning-based network anomaly detection." Cluster Computing (2017): 1-13.
[18] Belavagi, Manjula C., and BalachandraMuniyal. "Performance evaluation of supervised machine learning algorithms for intrusion detection." Procedia Computer Science 89 (2016): 117-123.
[19] Shanmugavadivu, R., and N. Nagarajan. "Network intrusion detection system using fuzzy logic." Indian Journal of Computer Science and Engineering (IJCSE) 2.1 (2011): 101-111.
[20] Shone, Nathan, et al. "A deep learning approach to network intrusion detection." IEEE Transactions on Emerging Topics in Computational Intelligence 2.1 (2018): 41-50.
[21] Park, Kinam, Youngrok Song, and Yun-Gyung Cheong. "Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning Algorithm." 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (Big Data Service). IEEE, 2018.
[22] https://en.wikipedia.org/wiki/Deep_learning
Citation
Nidhi Thakkar, Miren Karamta, Seema Joshi, M. B. Potdar, "Anomaly Detection and Categorization in Cloud Environment using Deep Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.211-214, 2019.
Energy Demand Forecasting: A Review on Methodologies and Technique
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.215-218, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.215218
Abstract
Nowadays, a country’s economy development is estimated from tracking light from space at night. Therefore, electricity has become a major factor in determining national economy. Accurate models have become necessary to help electricity companies to forecast load in advance so that electricity is always present in every corner of a country. In this paper, we have made an attempt to review electricity load forecasting techniques. This review paper overviews the existing electricity demands prediction approaches such as traditional approaches, statistical approaches and machine learning based approaches. It further presents the pros and cons of various techniques. It also presents the challenges of this predictive analysis.
Key-Words / Index Term
Prediction, smart grid, artificial neural network, short-term load forecasting
References
[1] H. S. Hippert, C. E. Pedreira, and C. R. Souza, “Neural Networks for Short-Term Load Forecasting: A review and Evaluation”, IEEE Trans. Power Syst., vol. 16, no. 1, pp. 44-51, 2001.
[2] Box GEP, Jenkins GM, “Time series analysis, forecasting and control”, Holden-Day, San Francisco, CA, 1970.
[3] Hamid R. Khosravani, Maria Del Mar Castilla, Manuel Berenguel, Antonio E. Ruano and Pedro M. Ferreira, “A comparison of Energy Consumption Prediction model based on Neural Networks of a Bioclimatic Building”, Energies, 2016.
[4] Kangji Li, Chenglei Hu, Guohai Liu, Wenping Xue, “Building electricity consumption prediction using optimized artificial neural networks and principle component analysis”, Energy and Buildings, vol. 108, 2015 pp 106-113.
[5] Jihoon Moon, Jinwoong Park, Eenjun Hwang, Sanghoon Jun, “Forecasting power consumption for higher educational institutions based on machine learning”, Springer, 2017.
[6] S. Saravanan, S. Kannan and C. Thangaraj, “Forecasting India’s Electricity Demand Using Artificial Neural Network”, IEEE- International Conference on Advances in Engineering, Science And Management (ICAESM-2012), March 30, 31, 2012.
[7] Rodrigo F. Berriel, Andre Teixeira Lopes, Alexandre Rodrigues, Flavio Miguel Varejao, Thiago Oliveira-Santos, “Monthly Energy Consumption Forecast: A Deep Learning Approach”, International Joint Conference on Neural Networks, 2017.
[8] Wei Yu, Dou An David Griffith, Qingyu Yang and Guobin Xu, “Towards Statistical Modelling and Machine Learning Based Energy Usage Forecasting in Smart Grid”, ACM, 2015.
[9] Shu Fan and Rob J Hyndman, “Short-term load forecasting based on a semi-parametric additive model”, IEEE Transactions on Power Systems, 2010.
[10] Vincent Thouvenot, Audrey Pichavant, Yannig Goude, Anestis Antoniadis and Jean-Michel Poggi, “Electricity Forecasting using Multi-Stage Estimators of Nonlinear Additive Models”, IEEE Transactions on Power Systems, vol. 31, no. 5, September 2016.
Citation
Diksha Rai, Vandan Tewari, "Energy Demand Forecasting: A Review on Methodologies and Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.215-218, 2019.
A Review on Home Automation Using Smart Phone
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.219-222, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.219222
Abstract
Wireless technologies are becoming more popular around the world and the consumers appreciate this wireless lifestyle. Technology is a never ending process. To be able to design a product using the current technology that will be beneficial to the lives of others is a huge contribution to the community. This paper presents the design and implementation of a low cost but and secure mobile phone based home automation system. The design is based on a stand-alone Arduino BT board and the home appliances are connected to the input/ output ports of this board via relays. The communication between the cell phone and the Arduino BT board is wireless. This system is designed to be low cost and scalable allowing variety of devices to be controlled with minimum changes to its core. Protection can also used in this system so that only authorized user can access this system(like using password on your mobile phone).
Key-Words / Index Term
Smart Home; Automation System; Microcontroller; Wireless Communication; Arduino
References
[1] Bilal Ghazal and Khalid Al-Khatib, “Smart Home Automation System for Elderly, and Handicapped People using Xbee”, Vol. 9, No. 4, pp. 203-210, 2015.
[2] R. Piyare, M.Tazil, “Bluetooth Based Home Automation System Using Cell Phone”, IEEE 15th International Symposiumon Consumer Electronics, Vol. 4, pp. 192-195, 2011.
[3] Akbar Satria, Muhammad Luthfi Priadi Lili Ayu Wulandhari and Widodo Budiharto, “The Framework of Home Remote Automation System Based on Smartphone”, Vol. 9, No. 1, pp. 53-60, 2015.
[4] I. Kaur, ”Microcontroller based home automation system with security”, International journal of advanced computer science and applications, Vol. 1, No. 6, pp. 60-65, 2011.
[5] B.El-Basioni, S. Abd El-kader, and M. Fakhreldin. “Smart home design using wireless sensor network and biometric technologies”, International journal of application and innovation in Engineering & Management (IJAIEM), Vol. 2, Issue 3, pp. 413- 429, 2013.
[6] G.B. Pradeep, B. Santhi Chandra, M. Venkates-warao, “Protocol Based Automation System for Residence using Mobile Devices”, Ad-Hoc Low Powered 802.15.1,IJCST, 2, SP 1,2011.
[7] Sanchi Masheshwari, Setu Maheshwari, “Mobile Controlled Home Automation through DTMF Technology”, Vol. 3,Issue-6, pp. 63-65 2016.
[8] Archana N. Shewale1, Jyoti P. Bari2, “Renewable Energy Based Home Automation System Using ZigBee”, International Journal of Computer Technology and Electronics Engineering (IJCTEE), Vol. 5, Issue 3, ISSN 2249-6343, pp. 6-9 2011.
[9] Deepti G. Aggarwal, “Sentiment Analysis: An insight into Techniques, Application and Challenges”, International Journal of Computer Science and Engineering (IJCSE), Vol. 6, Issue 5, E-ISSN: 2347-2693, pp. 697-703 2018.
[10] U. Aggarwal and G. Aggarwal, “Sentiment Analysis : A Survey”, International Journal of Computer Sciences and Engineering , Volume-5, Issue-5, pp 222-225, May 2017.
Citation
Deepti Aggarwal, Sushmita Gupta, Sukirti Katheria, Bipin Kumar Verma, "A Review on Home Automation Using Smart Phone," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.219-222, 2019.
Review Paper on Face Recognition Techniques
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.223-229, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.223229
Abstract
With information and data collection in richness, there is a much need for high safety. The Face recognition (FR) is a firm growing and interesting vicinity in real time constituting of various aspects. For this a number of set of rules has been developed. The consideration made here is for studying a variety of methodologies or techniques used in for the face recognition (FR) aspect. This consist of the “Principle Component Analysis” concept, the “Linear Discriminant Analysis”, the “Independent Component Analysis”, the “Support Vector Machines”, the Gabor wavelet, also the soft computing tools like the ANN for recognition & some hybrid combination. The evaluation investigates some of these strategies with parameters and challenging situations of FR scenario like the illumination, pose variations and the facial expressions.
Key-Words / Index Term
FR, Principal Component Analysis (PCA), the Linear Discriminant Analysis (LDA), Independent Component Analysis (ICA), Artificial Neural Network (ANN)
References
[1] Bruner, I. S. and Tagiuri, R. The perception of people. In Handbook of Social Pschology, Vol. 2, G. Lindzey, Ed., Addison-Wesley, Reading, MA, 634–654.1954.
[2] Bledsoe, W. W. The model method in facial recognition. Tech. rep. PRI:15, Panoramic research Inc.,Palo Alto, CA.1964.
[3] Ekman, P. Ed., Charles Darwin’s The Expression of the Emotions in Man and Animals, Third Edition, with Introduction, Afterwords and Commentaries by Paul Ekman. Harper- Collins/Oxford University Press, New York, NY/London, U.K.1998.
[4] Kelly, M. D. Visual identification of people by computer. Tech. rep. AI-130, Stanford AI Project, Stanford, CA. 1970.
[5] Kanade, T. Computer recognition of human faces. Birkhauser, Basel, Switzerland, and Stuttgart, Germany 1973.
[6] Chellapa, R., Wilson, C. L., and Sirohey, S. Human and machine recognition of faces: A survey. Proc. IEEE, 83, 705–740.1995.
[7] Samal, A. and Iyengar, P. Automatic recognition and analysis of human faces and facial expressions: A survey. Patt. Recog. 25, 65–77.1992.
[8] M. Turk and A. Pentland, "Eigenfaces for recognition," J. Cognitive Neuroscience,vol. 3, 71-86., 1991.
[9] D. L. Swets and J. J. Weng, "Using discriminant eigenfeatures for image retrieval, IEEE Trans.PAMI., vol. 18, No. 8, 831-836, 1996.
[10] C.Magesh Kumar, R.Thiyagarajan , S.P.Natarajan, S.Arulselvi,G.Sainarayanan,‖ Gabor features and LDA based Face Recognition with ANN classifier‖,Procedings Of ICETECT 2011.
[11] Önsen TOYGAR Adnan ACAN ,‖Face recognition using PCA,LDA and ICA approaches on colored images‖, Journal Of Electrical and Electronics Engineering, vol-13,2003.
[12] Y. Cheng, C.L. Wang, Z.Y. Li, Y.K. Hou and C.X. Zhao,‖ Multiscale principal contour direction for varying lighting face recognition‖,Proceedings of IEEE 2010.
[13] F. Al-Osaimi•M. Bennamoun • A. Mian,‖ An Expression Deformation Approach to Non-rigid 3D Face Recognition, Springer Science+Business Media, LLC 2008.
[14] Issam Dagher,‖Incremental PCA-LDA algorithm‖, International Journal of Biometrics and Bioinformatics (IJBB), Volume (4): Issue (2)
[15] J. Shermina,V. Vasudevan,‖An Efficient Face recognition System Based on Fusion of MPCA and LPP‖, American Journal of Scientific Research ISSN 1450-223X Issue 11(2010), pp.6-19.
[16] Ishwar S. Jadhav, V. T. Gaikwad, Gajanan U.Patil,‖Human Identification Using Face and Voice Recognition‖, International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011.
[17] Yun-Hee Han,Keun-Chang Kwak,‖ Face Recognition and Representation by Tensor-based MPCA Approach‖, 2010 The 3rd International Conference on Machine Vision (ICMV 2010).
[18] Neerja,Ekta Walia,‖Face Recognition Using Improved Fast PCA Algorithm‖,Proceedings of IEEE 2008.
[19] S.Sakthivel,Dr.R.Lakshmipathi,‖Enhancing Face Recognition using Improved Dimensionality Reduction and feature extraction Algorithms_An Evaluation with ORL database‖, International Journal of Engineering Science and Technology Vol. 2(6), 2010.
[20] Lin Luo, M.N.S. Swamy, Eugene I. Plotkin, ―A Modified PCA algorithm for face recognition‖, Proceedings of IEEE 2003.
[21] A. Hossein Sahoolizadeh, B. Zargham Heidari, and C. Hamid Dehghani,‖ A New Face Recognition Method using PCA, LDA and Neural Network‖, International Journal of Electrical and Electronics Engineering 2:8 2008.
[22] Feroz Ahmed Siddiky, Mohammed Shamsul Alam,Tanveer Ahsan and Mohammed Saifur Rahim,‖An Efficient Approach to Rotation Invariant Face detection using PCA,Generalized Regression Neural network and Mahalanobis Distance by reducing Search space‖,Proceedings Of IEEE 2007.
[23] Vapnik. Statistical Learning Theory. JohnWiley and Sons, New York, 1998.
[24] E. Osuna, R. Freund, and F. Girosit. Training support vector machines: an application to face detection. Proc. of CVPR, pages 130–136, 1997.
[25] B. Heisele, T. Serre, and T. Poggio. A componentbased framework for face detection and identification. IJCV, 74(2):167–181, 2007.
[26] Q. Tao, D. Chu, and J. Wang. Recursive support vector machines for dimensionality reduction. IEEE Trans. NN, 19(1):189–193, 2008.
[27] Marian Stewart Bartlett, Javier R. Movellan, Terrence J. Sejonowski, ―Face Recognition by Independent Component Analysis‖, IEEE Transactions on Neural Networks, vol-13, No- 6,November 2002, PP 1450-1464.
[28] Pong C.Yuen, J.H.Lai, ―Face representation using independent component analysis‖, Pattern Recognition 35 (2002) 1247-1257.
[29] Tae-Kyun Kim, Hyunwoo Kim, Wonjum Hwang, Josef Kittler, ―Independent component analysis in a local facial residue space for face recognition‖, Pattern Recognition 37 (2004) 1873-1885.
[30] Aapo Hyvärinen and Erkki Oja ―Independent Component Analysis: Algorithms and Applications‖ Neural Networks Research Centre Helsinki University of Technology P.O. Box 5400, FIN-02015 HUT, Finland, Neural Networks, 13(4-5):411-430, 2000.
[31] Bruce A. Draper, Kyungim Baek, Marian Stewart Bartlett, ―Recognizing faces with PCA and ICA‖, Computer Vision and Image Understanding 91 (2003) 115-137.
[32] Jian Yang, David Zhang, Jing-yu Yang, ―Is ICA Significantly Better than PCA for Face Recognition?‖ Proceedings of the Tenth IEEE International Conference on Computer Vision (ICCV’05) 1550- 5499/05.
[33] Kailash J. Karande, Sanjay N.Talbar,‖ Face Recognition under Variation of Pose and Illumination using Independent Component Analysis‖, ICGST-GVIP, ISSN 1687-398X, Volume (8), Issue (IV), December 2008.
[34] Quanxue Gao , LeiZhang, DavidZhang,‖ Sequential row–column independent component analysis for face recognition‖, Elsevier 2008
[35] A. Alfalou and C. Brosseau,‖ A New Robust and Discriminating Method for Face Recognition Based on Correlation Technique and Independent Component Analysis Model, Optics Letters 36 (2011) 645-647.
[36] P. Comon, ―Independent component analysis: a new concept?‖, Signal Process. 3, 287-314 (1994).
[37] Issam Dagher and Rabih Nachar,‖Face Recognition Using IPCA-ICA algorithm‖, IEEE Transactions On Pattern Analysis and Machine Intelligence, VOL. 28, NO. 6, JUNE 2006.
[38] Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu,‖ High Performance Human Face Recognition using Independent High Intensity Gabor Wavelet Responses: A Statistical Approach‖, International Journal of Computer Science & Emerging Technologies 178 Volume 2, Issue 1, February 2011.
[39] Lades M, Vorbruggen J, Buhmann J, Lange J, Cvd Malsburg, Wurtz R, Konen W Distortion invariant object recognition in the dynamic link architecture. IEEE Trans Comput 42(3):300–311,1993.
[40] Wiskott L, Fellous JN, Kruger N, Cvd Malsburg Face recogniton by elastic bunch graph matching. IEEE Trans PAMI 19(7):775–779,1997.
[41] Shan S, Yang P, Chen X, Gao W AdaBoost Gabor Fisher classifier for face recognition. In Proceedings of international workshop on analysis and modeling of faces and gestures (AMFG 2005), LNCS 3723, pp 278– 291,2005.
[42] Shen L, Bai L,‖A review on Gabor wavelets for face recognition‖. Pattern Anal Appl 9(10):273–292,2006.
[43] Tao D, Li X, Wu X, Maybank SJ,‖General tensor discriminant analysis and Gabor features for gait recognition‖. IEEE Trans PAMI 29(10):1700–1715,2007.
[44] Li X, Maybank SJ, Yan S, Tao D, Xu D,‖Gait components and their application to gender recognition‖. IEEE Trans SMC-C 38(2):145–155,2008.
[45] Zhang W, Shan S, Gao W, Chen X, Zhang H,‖Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition‖.In Proceedings of the 10th IEEE international conference on computer vision (ICCV2005), pp 786–791,2005.
[46] Wenchao Zhang , Shiguang Shan,Laiyun Qing,Xilin Chen, Wen Gao,‖ Are Gabor phases really useless for face recognition?‖, Springer-Verlag London Limited 2008.
[47] Ahonen T, Hadid A, Pietika¨inen M,‖Face recognition with local binary patterns‖. In Proceeding of European conference on computer vision (ECCV2004), LNCS 3021, pp 469–481,2004.
[48] Hadjidemetriou E, Grossberg MD, Nayar SK,‖Multiresolution histograms and their use for recognition‖. IEEE Trans PAMI 26(7):831–84,2004.
[49] Vitomir ŠTRUC, Nikola PAVEŠI´C,‖ Gabor-Based Kernel Partial-Least-Squares Discrimination Features for Face Recognition‖,Informatica, , Vol. 20, No. 1, 115–138,2009.
[50] K. Messer, J. Mastas, J. Kittler, J. Luettin, and G. Maitre, ―XM2VTSDB:The extended M2VTS database,‖ in Proc. IEEE Int. Conf. AVBPA,pp. 72–77,1999.
[51] Olivetti & Oracle Research Laboratory, The Olivetti & Oracle Research Laboratory Face Database of Faces, http://www.cam-orl.co.uk/facedatabase.html.
[52] Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu,‖ High Performance Human Face ecognition using Independent High Intensity Gabor Wavelet Responses: A Statistical Approach‖, International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004) 178 Volume 2, Issue 1, February 2011.
[53] H. Deng, L. Jin, L. Zhen, and J. Huang. ―A new facial expression recognition method based on local gabor filter bank and pca plus lda‖. International Journal of Information Technology, vol.11, pp.86-96, 2005.
[54] L. Shen and L. Bai. ―Information theory for gabor feature selection for face recognition‖, Hindawi Publishing Corporation, EURASIP Journal on Applied Signal Processing, Article ID 30274, 2006.
[55] Z. Y. Mei, Z. Ming, and G. YuCong. ―Face recognition based on low dimensional gabor feature using direct fractional-step lda‖, In Proceedings of the Computer Graphics, Image and Vision: New Trends, IEEE Computer Society, 2005.
[56] B. Schiele, J. Crowley,‖Recognition without correspondence using mul-tidimensional receptive field histograms‖, International Journal on Computer Vision, 2000.
[57] A. Bouzalmat, A. Zarghili, J. Kharroubi, ―Facial Face Recognition Method Using Fourier Transform Filters Gabor and R_LDA‖, IJCA Special Issue on Intelligent Systems and Data Processing, pp.18-24, 2011.
[58] C.Sharma, ―face detection using gabor feature extraction technique‖, Journal of Global Research in Computer Science, vol.2 (4), pp.40-43, April 2011.
[59] A.Kaushal and J P S Raina, ―Face Detection using Neural Network & Gabor Wavelet Transform‖, International Journal of Computer Science and Technology, Vol. 1, Issue 1, September 2010.
[60] A.Khatun and Md.Al-Amin Bhuiyan, ―Neural Network based Face Recognition with Gabor Filters‖, IJCSNS International Journal of Computer Science and Network Security, vol.11 No.1, January 2011.
[61] P.Latha, L.Ganesan, N.Ramaraj, ―Gabor and Neural based Face Recognition‖, International Journal of Recent Trends in Engineering, Vol 2, No. 3, November 2009.
[62] Anissa Bouzalmat ,Naouar Belghini ,Arsalane Zarghili,Jamal Kharroubi,Aicha Majda,‖ Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Projection‖, International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (3), 2011.
[63] Rongbing Huang , Changming Su a, Fangnian Lang a, Minghui Du,‖ Kernel Discriminant Locality Preserving Projections for Human Face Recognition‖, Journal of Information & Computational Science 7: 4 (2010).
[64] Xiaohu Ma¤, Yanqi Tan, Yaying Zhao, Hongbo Tian,‖ Face Recognition Based on Maximizing Margin and Discriminant Locality Preserving Projection‖, Journal of Information & Computational Science 7: 7 (2010).
[65] Zhonghua Liu , Jingbo Zhou,Zhong Jin,‖ Face recognition based on illumination adaptive LDA‖, International Conference on Pattern Recognition,2010.
[66] T. Chen, W. Yin, X.S. Zhou, D. Comaniciu, T.S. Huang, Total variation models for variable lighting face recognition, IEEE Trans. Pattern Anal. Mach. Intell. 28 (9) (2006) 1519—1524.
[67] David Monzo, Alberto Albiol, Antonio Albiol, Jose M.Mossi,‖ A Comparative Study of facial landmark localization methods for Face Recognition using HOG descriptors‖, Proceedings of IEEE 2010.
[68] P. J. Phillips, P. J. Flynn, T. Scruggs, K. W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek, ―Overview of the face recognition grand challenges,‖ in Proc. IEEE Int. Conf. Comput. Vis Pattern Recognit., pp. 947–954,2005.
[69] K. Fukunaga. Introduction to Statistical Pattern Recognition, Second Edition (Computer Science and Scientific Computing Series). Academic Press, 1990.
[70] P. Belhumeur, J. Hespanha, and D. Kriegman. Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. In ECCV, pages 45–58, 1996.
[71] J. Ye. Characterization of a family of algorithms for generalized discriminant analysis on undersampled problems. Journal of Machine Learning Research, 6:483– 502, 2005.
[72] Li X. and Areibi S., ―A Hardware/Software co-design approach for Face Recognition‖, The 16th International Conference on Microelectronics, Tunisia 2004.
[73] Avinash Kaushal1, J P S Raina,‖ Face Detection using Neural Network & Gabor Wavelet Transform‖ IJCST Vol. 1, Issue 1, September 2010.
[74] F. Tivive and A. Bouzerdoum,‖A new class of convolutional neural network(siconnets)and their application to face detection,‖Proc. Of the International Joint Conference on neural Networks,vol. 3,pp. 2157- 2162,2003.
[75] A.Bouzerdoum,‖A new class of high order neural networks with non-linear decision boundaries‖,Proc. Of the sixth International Conference on neural Information Processing,vol.3,pp. 1004-1009,1999.
[76] A.Bouzerdoum,‖Classification and function approximation using feed-forward shunting inhibitory artificial neural networks,vol. 6,pp.613-618,2000.
[77] Steve Lawrence,C.Lee Giles,A.h Chung Tsoi, Andrew D. Back,‖ Face Recognition: A Convolutional Neural Network Approach.
[78] Lin-Lin Huang, Akinobu Shimizu, Yoshihiro Hagihara, Hidefumi Kobatake,‖ Face detection from cluttered images using a polynomial neural network‖, Elsevier Science 2002.
[79] U. KreQel, J. SchRurmann, Pattern classification techniques based on function approximation, in: H.Bunke, P.S.P. Wang (Eds.), Handbook of Character Recognition and Document Image Analysis, World Scienti5c, Singapore, 1997, pp. 49–78.
[80] J. SchRurmann, Pattern Classi5cation: A Unified View of Statistical Pattern Recognition and Neural Networks, Wiley Interscience, New York, 1996.
[81] D.Cai, X.He and J.Han, ―Efficient Kernel Discriminant Analysis via Spectral Regression‖, Technical report, Computer Science Department, UIUC, UIUCDCS-R-2007-2888, August 2007.
[82] Yue Ming, Qiuqi Ruan, Xiaoli Li, Meiru Mu,‖ Efficient Kernel Discriminate Spectral Regression for 3D Face Recognition‖, Proceedings Of ICSP 2010.
[83] Deng Cai, Xiaofei He and Jiawei Han, "Using Graph Model for Face Analysis", Technical Report, UIUCDCS-R- 2005-2636, UIUC, Sept.2005.
[84] Deng Cai, Xiaofei He, Jiawei Han and Hong-Jiang Zhang, "Orthogonal Laplacianfaces for Face Recognition", IEEE Transactions on Image Processing, vol. 15, no. 11, pp. 3608-3614, November, 2006.
[85] Dr.H.B.Kekre,Sudeep D. Thepade,AkshayMaloo,‖ Face Recognition using Texture Features Extracted form Haarlet Pyramid‖, International Journal of Computer Applications (0975 – 8887) Volume 12– No.5, December 2010.
[86] R.Singh, M.Vatsa; ―Effect of Plastic Surgery on Face Recognition: A Preliminary Study‖, West Virginia University,Morgantown, USA.
[87] A.Skowron, J. Stepaniuk; ―Tolerence approximation spaces‖, Fundamenta Informaticae, 27(2-3) pp: 245-253, 1996.
[88] J.F.Peters; ―Near Sets. Special Theory about Nearness of Objects‖, Fundamenta Informaticae, vol: 76, pp:1-27, 2006.
[89] K. R. Singh, Roshni S Khedgaonkar, Swati P Gawande,‖ A New Approach to Local Plastic Surgery Face Recognition Using Near Sets‖, International Journal of Engineering Science and Technology (IJEST) Feb 2011.
[90] Sujata G. Bhele, V. H. Mankar‖A Review Paper on Face Recognition Techniques|International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 1, Issue 8, October 2012.
[91] Suma S L , Sarika Raga|Real Time Face Recognition of Human Faces by using LBPH and Viola Jones AlgorithmReal Time Face Recognition of Human Faces by using LBPH and Viola Jones Algorithm|International Journal of Scientific Research in Computer Sciences and Engineering Vol.6 , Issue.5 , pp.6-10, Oct-2018.
[92] Md.T. Akhtar, S.T. Razi, K.N. Jaman, A. Azimusshan, Md.A. Sohel|Fast and Real Life Object Detection System Using Simple Webcam| International Journal of Scientific Research in Computer Sciences and Engineering Vol.6 , Issue.4 , pp.18-23, Aug-2018.
Citation
Rajendra Kumar, Papendra Kumar, Abhishek Gupta, "Review Paper on Face Recognition Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.223-229, 2019.
Review of Decision Tree Based Classification Algorithms in Medical Data
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.230-234, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.230234
Abstract
Classification problem in data mining is widely used to discover the potential information hidden in the data. Clinical, microarray data or image data related to medical field consists of high dimensions which pose difficulties for biomedical researchers in acquiring and analyzing data. Three principal challenges related to high dimensional data are Volume, Velocity and Variety. Various dimensionality reduction techniques are been used to remove irrelevant features to make the task easier and efficient. Also, using dimensionality techniques result in improved classification performance of the classifiers. This paper presents a review on the supervised machine learning algorithms for classification and prediction of various diseases. It also discusses various splitting criterion to determine the best attributes. Decision Tree algorithms are easy to understand and easy to use among all the classifiers.
Key-Words / Index Term
Classification, CART, C4.5, C5.0, Decision tree , Dimensionality Reduction, ID3
References
[1] M. Fernandes, “Data Mining: A Comparative Study of its Various Techniques and its Process”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.19- 23, 2017.
[2] Himanshi, K.K. Bhatia, “Prediction Model for UnderGraduate Student’s Salary Uisng Data Mining Techniques”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp. 50-53, 2018.
[3] B. Hssina, A. Merbouha, H. Ezzikouri, M. Zrritali, “A comparative study of decision tree ID3 and C4.5”, International Journal of Advanced Computer Science and Applications, Special Issue on Advances in Vehicular Ad Hoc Networking and Applications, pp.13-19, 2014.
[4] M. Sabitha, M. Mayilvahanan, “Application of dimensionality reduction techniques in real time dataset”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 5, Issue. 7, pp.2187-2189, 2016.
[5] R. Revathy, R. Lawrance, “Comparative Analysis of C4.5 and C5.0 algorithms on crop pest data”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue. 1, pp.50-58, 2017.
[6] J. Liang, J. Shi, “The information entropy, rough entropy and knowledge granulation in rough set theory”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 12, pp.37-46, 2014.
[7] T.P. Exarchos, M.G. Tsipouras, C.P. Exarchos, C. Papaloukas, D.I. Fotiadis, L.K. Michalis, “A methodology for the automated creation of fuzzy expert systems for ischaemic and arrhythemic beat classification based on a set of rules obtained by a decision tree”, Artificial Intelligence in Medicine, Vol. 40, pp.187-200, 2007.
[8] J.R. Quinlan, “Generating production rules from decision trees”, In Proceedings of the International Joint Conference on Artificial Intelligence, Milan, Italy, Vol. 1, pp.304-307, 1987.
[9] S. Singh, P. Gupta, “Comparative study id3, cart and c4.5 decision tree algorithm: A Survey”, International Journal of Advanced Information Science and Technology (IJAIST), Vol. 27, Issue. 27, pp.97-103, 2014.
[10] D. Ventura, T.R. Martinez, “An empirical comparison of discretization methods”, In Proceedings of the Tenth International Symposium on Computer and Information Sciences, pp. 443-450, 1995.
[11] R. Revathy, R. Lawrance, “Comparative analysis of c4.5 and c5.0 algorithms on crop pest data”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue. 1, pp.50-58, 2017.
[12] S. Kharya, “Using data mining techniques for diagnosis and prognosis of cancer disease”, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 2, Issue. 2, pp.55-66, 2012.
[13] M.C. Tu, D. Shin, “A comparative study of medical data classification methods based on decision tree and bagging algorithms”, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Washington, DC, USA, pp.183-187, 2009.
[14] C. Shah, A.G. Jivani, “Comparison of data mining classification algorithms for breast cancer prediction”, International Conference On Computing, Communication And Networking Technologies, Tiruchengode, Tamil Nadu, India, pp.1-4, 2013.
[15] L.J.P. Maaten, E.O. Postma, H.J. Herik, “Dimensionality reduction: A comparative review”, Online Preprint, Journal of Machine Learning, 2008.
[16] M.Z.F. Nasution, O.S. Sitompul, M. Ramli, “PCA based feature reduction to improve the accuracy of decision tree C4.5 classification”, 2nd International Conference on Computing and Applied Informatics Universitas Sumatera Utara (USU) Medan, Indonesia,pp.1-6, 2017.
[17] S. Sathya, S. Joshi, S. Padmavathi, “Classification of breast cancer dataset by different classification algorithms”, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, pp.1-4, 2017.
[18] Y.M.S. Al-Wesabi, A. Choudhury, D. Won, “Classification of cervical cancer dataset”, Proceedings of the 2018 IISE Annual Conference, Loews Royal Pacific Resort, Orlando, Florida, pp.1456-1461, 2018.
[19] P. Douangnoulack, V. Boonjing, “Building minimal classification rules for breast cancer diagnosis”, 2018 10th International Conference on Knowledge and Smart Technology (KST), Thailand, pp.278-281, 2018.
[20] M.I. Faisal, S. Bashir, Z.S. Khan, F.H. Khan, “An evaluation of machine learning classifiers and ensembles for early stage prediction of lung cancer”, 2018 3rd International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST), Karachi, Pakistan, pp.1-4, 2018.
[21] T-I. Tang, G. Zheng, Y. Huang, G. Shu, P. Wang, “A comparative study of medical data classification methods based on decision tree and system reconstruction analysis”, Industrial Engineering & Management Systems (IEMS), Vol. 4, Issue. 1, pp.102-108, 2005.
Citation
Diksha, D. Gupta, "Review of Decision Tree Based Classification Algorithms in Medical Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.230-234, 2019.