Hand Gesture Recognition based on Real-time Indian Sign Language
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.181-185, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.181185
Abstract
Indian sign language (ISL) could be a language which is used to employ by hearing and speech impaired individuals to speak with other individuals. In this paper we present system which might recognise hand poses and gestures from the Indian sign language (ISL) in real-time mistreatment grid-based options. Here, we are introducing hand gesture recognition system to recognize the gestures and convert them to a natural language. Gesture recognition can be used to communicate merely through gestures without any physical link with the actual machine. Gesture is converted to text which helps deaf-dumb people to communicate with normal people. The system can be programmed in such a way that it can translate gesture to text. The proposed system involves taking the input through the in-built camera. One of the advantage of the system is that the individual can add new sentences based on their comfort and understanding. The output text is displayed on the screen based on the gesture showed to the camera.
Key-Words / Index Term
Hand guesture recognition, unicode, image processing, webcam
References
[1] Joyeeta Singha, Karen Das “Recognition of Indian Sign Language in Live Video”, IJCA Transaction, Vol.70,Issue.19,pp.17-22,2013.
[2] Sakshi Lahoti, Shaily Kayal, Sakshi Kumbhare, Ishani Suradkar, Vikul Pawar1 S. Willium, “Android based American Sign LanguageRecognition System with Skin Segmentation and SVM”, IEEE Transaction, IEEE Transaction,pp.1-6, 2018.
[3] Nico Zengeler, Thomas Kopinski, Uwe Handmann “Hand Gesture Recognition in Automotive Human–Machine Interaction Using Depth Cameras”, MDPI Transaction, pp.1-28, 2012.
[4] Anant Agarwal, Manish K Thakur “Sign Langauage Transaction using Microsoft Kinect “, IEEE Transaction, pp.181-185.
[5] Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan, Puteri Suhaiza Sulaiman, “Skin Segmentation Using YUV and
RGB Color Spaces”,KIPS Tranaction,pp.283-299.
[6] Houssem Lahiani, Mohamed Elleuch, Monji Kherallah, “Real Time Hand Gesture Recognition System forAndroid Devices”, IEEE Transaction,pp.591-596.
[7] Prajwal Paudyal, Ayan Banerjee, and Sandeep K.S. Gupta, “SCEPTRE: a Pervasive, Non-Invasive, and Programmable Gesture Recognition Technology”,Impact Transaction,pp.1-12.
[8] Dipali Rojasara, Nehal Chitaliya, “Real Time Visual Recognition of Indian Sign Language using Wavelet Transform and Principle Component Analysis”,IJSCE Transaction,Vol.4,Issue.3,pp.17-20.
[9] Pooja Kiranalli, Dr. S. R. Gengaje, “Real time Indian Sign Language Number Recognition System”,IJRTER Transaction,Vol.2, Issue.6;pp.200-205.
[10] Kumud Tripathi, Neha Baranwal and G. C. Nandi, “Continuous Indian Sign Language Gesture Recognition and Sentence Formation”,IMCIP Transaction, pp.523-529.
[11] Kartik Shenoy, Tejas Dastane, Varun Rao, Devendra Vyavaharkar, “Real-time Indian Sign Language (ISL) Recognition”, IEEE Transaction,2018
[12] Kartik Shenoy, Tejas Dastane, Varun Rao, Devendra Vyavaharkar, “Real-time Indian Sign Language (ISL) Recognition”,IEEE Transaction,2018,pp.1-9
Citation
Rakesh.B.S, Tamilarasan.S, Avinash N, "Hand Gesture Recognition based on Real-time Indian Sign Language," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.181-185, 2019.
Person Identification Based On Handwriting
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.186-189, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.186189
Abstract
This design, implementation, and evaluation of a research work for developing an automatic person identification system using hand written biometric. The developed automatic person identification system mainly used toolboxes provided by MATLAB environment. . In order to train and test the developed automatic person identification system, an in-house hand written database is created, which contains hand signatures of different persons . The collected hand data have gone through pre-processing steps such as producing a digitized version of the signatures using a scanner, converting input images type to a standard binary images type, cropping, normalizing images size, and reshaping in order to produce a ready-to-use hand signatures database for training and testing the automatic person identification system. Global features such as signature height, image area, pure width, and pure height are then selected to be used in the system. For features training and classification, the support vector machine(SVM) is used.
Key-Words / Index Term
SVM,handwritingrecognition,offline,online,static
References
[1].Naoya Wada ; “HMM Based Signature Identification System Robust to Changes of Signatures” with Time 2007 IEEE Workshop on Automatic Identification Advanced Technologies7-8 June 2007.
[2].A.A.M.Abushariah ; T.S. Gunawan ; J. Chebil ; M.A.M. Abushariah “Automatic person identification system using handwritten signatures” 2012 International Conference on Computer and Communication Engineering (ICCCE)3-5 July 2012.
[3].hifzan ahmed -shailjashukla ; hari mohan rai static “handwritten signature recognition using discrete random transform and combined projection based technique ”2014 fourth international conference on advanced computing & communication technologies.
[4].Parashuram- Chandrashekar Gudada Restoration of degraded “Kannada handwritten paper inscriptions (Hastaprati) using image enhancement techniques” 2017 International Conference on Computer Communication and Informatics (ICCCI).
[5]. Susana M. Vieira “Hybrid neural models for automatic handwritten digits recognition ”2018 International Joint Conference on Neural Networks (IJCNN).
Citation
Sushma sugandhi, Vinita Patil, "Person Identification Based On Handwriting," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.186-189, 2019.
The Cache Based Scheme To Increase Lifetime of Wireless Sensor Networks
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.190-194, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.190194
Abstract
The wireless sensor networks is the decentralized type of network in which sensor nodes join or leave the when they want. The energy consumption is the major issue of wireless sensor networks due to small size and far deployment of the sensor nodes. The whole network is divided into fixed size clusters and cluster heads are selected in each cluster based on distance and energy. The hierarchal routing is the efficient technique for the data aggregation which uses least network energy. The TH-leach is the improved version of LEACH protocol to increase lifetime of the sensor network. In this research work, the TH-leach routing protocol will be further improved to increase one level to improve lifetime of the network.
Key-Words / Index Term
EnergyEfficient,LEACH,LEACH-TLCH,TH-LEACH
References
[1] Fouad El Hajji, Cherkaoui Leghris, Khadija Douzi, “Adaptive Routing Protocol for Lifetime Maximization in Multi-Constraint Wireless Sensor Networks,” 2018, IEEE.
[2] Vandna Arya, “Energy Enhancement of NEAHC Protocol Wireless Sensor Network using Firefly Algorithm,” International Journal of Computer Science Engineering (IJCSE), 2018.
[3] Shahab Tayeb*, Miresmaeil Mirnabibaboli and Shahram Latifi, “Cluster Head Energy Optimization in Wireless Sensor Networks,” doi: 10.13052/jsn2445-9739.2016.008, 2018.
[4] Hajer Ben Fradj, Rajoua Anane, and Ridha Bouallegue, “Energy consumption for opportunistic routing algorithms in WSN,” 2018, IEEE.
[5] Huseyin Ugur Yildiz, Vehbi Cagri Gungor , and Bulent Tavli, “A Hybrid Energy Harvesting Framework for Energy Efficiency in Wireless Sensor Networks Based Smart Grid Applications,” 2018, IEEE.
[6] Satyasen Panda, Sweta Srivastava, Santosh Mohapatra and Priyaranjan Kumar, “Performance analysis of wireless sensor networks using Artificial Bee Colony algorithm,” 2018, IEEE.
[7] Madiha Razzaq, Devarani Devi Ningombam, Seokjoo Shin, “Energy Efficient K-means Clustering-based Routing Protocol for WSN Using Optimal Packet Size,” 2018, IEEE.
[8] Ramin Yarinezhada, Amir Sarabi, “Reducing delay and energy consumption in wireless sensor networks by making virtual grid infrastructure and using mobile sink”, 2018, Int. J. Electron. Commun. (AEÜ) 84,144–152.
[9] Hajer Ben Fradj, Rajoua Anane, and Ridha Bouallegue, “Energy consumption for opportunistic routing algorithms in WSN,” 2018, IEEE.
[10] Huseyin Ugur Yildiz, Vehbi Cagri Gungor , and Bulent Tavli, “A Hybrid Energy Harvesting Framework for Energy Efficiency in Wireless Sensor Networks Based Smart Grid Applications,” 2018, IEEE.
[11] Satyasen Panda, Sweta Srivastava, Santosh Mohapatra and Priyaranjan Kumar, “Performance analysis of wireless sensor networks using Artificial Bee Colony algorithm,” 2018, IEEE.
[12] Madiha Razzaq, Devarani Devi Ningombam, Seokjoo Shin, “Energy Efficient K-means Clustering-based Routing Protocol for WSN Using Optimal Packet Size,” 2018, IEEE.
[13] Nazia Suraia Usha, Monir Hossen, and Shuvashis Saha, “Efficient Duty Cycle Management for Reduction of Energy Consumption in Wireless Sensor Network,” 2017, IEEE.
Citation
Disha Verma, Er. Sandeep Kumar Rawat, "The Cache Based Scheme To Increase Lifetime of Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.190-194, 2019.
Deep Learning Algorithms and Applications in Computer Vision
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.195-201, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.195201
Abstract
Deep Learning is a system powered by huge amounts of data. With the generation of massive amounts of data, the data analysing keeps getting complex. Deep learning solves the problem of Traditional ML algorithms that fail to perform well when the amount of data is enormous. Deep learning can be applied to any type of data such as text, image and so on. Deep learning algorithms generally used and best suited for image data are DBN and CNN. Analysing Computer vision using CNN brings a lot of use cases such as detection, recognition from the images, which can be useful in many fields such as medical images to detect a tumour and recognize its type, or help a robot navigate by identifying obstacles. In this paper we discuss what is Artificial Intellignece(AI), Machine Learning(ML) and Deep Learning and explore some of the Deep learning algorithms. We also understand how CNN can be applied in different applications of Computer vision and study the three major applications of Computer vision which are Image captioning, Medical image analysis and Robots Navigation.
Key-Words / Index Term
AI, ML, Computer Vision, DBN, CNN, RNN
References
[1] T. M. Mitchell, “Machine Learning”, McGraw Hill Education; First edition, New York, USA
[2] S. Rajaraman, S. Candemir, Z. Xue, P. O. Alderson, M. Kohli, J. Abuya, G. R. Thoma, and S. Antani, “A novel stacked generalization of models for improved TB detection in chest radiographs”
[3] B. Xu, Y. Chai, C. M. Galarza, C. Q. Vu, B. Tamrazi, B. Gaonkar, L. Macyszyn, T. D. Coates, N. Lepore, and J. C. Wood, “Orchestral Fully Convolutional Networks forsmall lesion segmentation in Brain MRI”
[4] S. Shabir, S. Y. Arafat, “An image conveys a message: A brief survey on image description generation”
[5]I. Reda, B. O. Ayinde, M. Elmogy, A. Shalaby, M. El-Melegy, M. A. El-Ghar, A. A. El-fetouh, M. Ghazal, A. El-Baz, “A new CNN based system for early diagnosis of Prostate Cancer”
[6] C. C. Park, B. Kim, and G. Kim, “Towards Personalized Image Captioning via Multimodal Memory Networks”
[7] Q. Wu , C. Shen , P. Wang, A. Dick, and A. v. d. Hengel, “Captioning and Visual Question Answering Based on Attributes and External Knowledge”
[8] M. Vicky, G. Aziz, H. Hindersah, “Implementation of Vehicle Detection Algorithm for Self-Driving Car on Toll Road Cipularang using Python Language”
[9] C. Lin, J. Lu, J. Zhou, “Multi-Grained deep feature Learning for Pedestrian detection”
[10] S. Hussain, M. Abualkibash, S. Tout, “A of Traffic Sign Recognition Systems Based on Convolutional Neural Networks”
[11] C. Amritkar, V. Jabade, “Image Caption Generation using Deep Learning Technique”
[12] S. Shabir, S. Y. Arafat, “An image conveys a message: A brief survey on image description generation”
[13] Boya Akhila, Burgubai Jyothi, “Face Identification through Learned Image High Feature Video Frame Works”
[14] N.S. Lele, “Image Classification Using Convolutional Neural Network”
Citation
Savita K Shetty, Ayesha Siddiqa, "Deep Learning Algorithms and Applications in Computer Vision," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.195-201, 2019.
Landslide Detection of Using Ensemble Classifiers
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.202-206, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.202206
Abstract
Landslides play an important role in this world. The landslide affects hundreds and thousands of people and is economically vulnerable. The causes of landslides are mainly caused by rain, earthquake and so on. This paper helps to use the method for classification of landslide detection. Subsequently, the construction of the classification algorithm depends on the global-landslide dataset. The main purpose of this method to improve the performance of machine learning ensemble classifiers is to perform better in terms of classification accuracy and execution time based on multiboost, bagging, subspace discrimination and subspace KNN.
Key-Words / Index Term
landslide, clustering techniques, Machine Learning, k-means, ensemble classifiers
References
[1] Maneesha V. Ramesh, “Real-time Wireless Sensor Network for Landslide Detection”, 2009 Third International Conference on Sensor Technologies and Applications, 2009.
[2] Yang Hong, Robert F. Adler, and George Huffman,“An Experimental Global Prediction System for Rainfall-Triggered Landslides Using Satellite Remote Sensing and Geospatial Datasets”, IEEE Transactions On Geoscience And Remote Sensing, Vol. 45, No. 6, June 2007.
[3] S.Karthik, K.Yokesh, Y.M.Jagadeesh, R.K.Sathiendran, ”Smart Autonomous Self Powered Wireless Sensor Networks based Low-cost Landslide Detection System” 2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT], 2015.
[4] Deekshit V N, Maneesha Vinodoni Ramesh, Indukala P.K, and G. Jayachandran Nair, “Smart Geophone Sensor Network for Effective Detection of Landslide Induced Geophone Signals” International Conference on Communication and Signal Processing, India,2016.
[5] Paraskevas Tsangaratos, Ioanna K. Ilia, “A Supervised Machine Learning Spatial tool for detecting terrain deformation induced by landslide phenomena”, Proceedings of the International Congress of the Hellenic Geographic Society, Oct 2014, Greece.
[6] Dieu Tien Bui, Tien-Chung Ho, Biswajeet Pradhan, Binh-Thai Pham, Viet-Ha Nhu, Inge Revhaug, “GIS-based modeling of rainfall-induced landslides using data mining-based functional trees classifier with AdaBoost, Bagging, and MultiBoost ensemble frameworks”, Enviromental Earth Sciences 75(14), July 2016.
[7] Abdul Rahaman Wahab Sait, Dr.T.Meyappan, "Data Preprocessing and Transformation technique to Generate Pattern from the Web Log" International Journal of Computer Sciences and Information Systems (ICSIS 2014), Oct 17-18, 2014 Dubai (UAE).
[8] A. Sumathi,S. Santhoshkumar ,Dr. N. K. Sakthivel,"Development Of An Efficient Data Mining Classifier With Microarray Data Set For Gene Selection And Classification" Journal Of Theoretical And Applied Information Technology, Vol. 35 No.2,January 2012.
[9] S. Neelamegam, Dr. E. Ramaraj, “Classification Algorithm in Data Mining: An Overview”, International Journel of P2P Network Trends and Technology (IJPTT), Vol.3, Issue.5,Sep-Oct 2013.
[10] N. L. Ravi Teja1, V.K.R. Harish, D. Nayeem Muddin Khan ,R. Bhargava Krishna, Rajesh Singh, S Chaudhary, “Land Slide Detection and Monitoring System using Wireless Sensor Networks (WSN)”, IEEE 2014 IEEE International Advance Computing Conference (IACC), Gurgaon, India, 2014.
[11] Mohammad Zawad Ali, Md Nasmus Sakib Khan Shabbir, Xiaodong Liang, Yu Zhang, Ting Hu, ”Machine Learning based Fault Diagnosis for Single- and Multi-Faults in Induction Motors Using Measured Stator Currents and Vibration Signals”, IEEE Transaction, Vol.55, Issue.3, pp.2373-2391, 2019.
[12] Satishkumar Chavan, Shobha Pangotra, Sneha Nair, Vinayak More, Vineeth Nair, ”Effective and Efficient Landslide Detection System to Monitor Konkan Railway Tracks” 2015 International Conference on Technologies for Sustainable Development (ICTSD-2015), 2015, Mumbai, India.
[13] Huang Qingqing, Meng Yu, Chen Jingbo, Yue Anzhi, Lin Lei, “Landslide Change Detection Based On Spatio¬temporal Context”, IEEE International Geoscience and Remote Sensing Symposium (IGARSS), 2017.
[14] Siti Khairunniza-Bej, Siti Rusaniza Jusoh, ”Integrated change detection method for landslide monitoring”, International Conference on signal Acquisition and Processing, 2009.
[15] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.
[16] Gagandeep Kau , Harmanpreet Kaur, “Ensemble based J48 and random forest based C6H6 air pollution detection “, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.41-50, April (2018).
[17] Rohini M , Arsha P, “Detection of Microaneurysm using Machine Learning Techniques”, International Journal of Scientific Research in Network Security and Communication, Volume-7, Issue-3, Jun 2019.
[18] Hemant Kumar Soni, “Machine Learning-“A New Paradigm of AI”, International Journal of Scientific Research in Network Security and Communication, Volume-7, Issue-3, Jun 2019.
[19] Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali, “Review Paper on Predicting Mood Disorder Risk Using Machine Learning”, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.16-22, February (2019).
Citation
R.Sindhuja, A. Padmapriya, "Landslide Detection of Using Ensemble Classifiers," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.202-206, 2019.
An Overview of Biometric Technologies and Its Benefits
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.207-213, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.207213
Abstract
Biometric technology is becoming a standard security feature in large businesses. In the modern networked society, there is an ever growing need to determine or verify the identity of a person. Where authorization is necessary for any action, be it collecting a child from child-care facilities or boarding an aircraft, authorization is almost always vested in a single individual or a class of individuals. There are a number of existing methods, used by society or automated systems to verify identity. Traditional existing methods can be grouped into three classes: (i) possessions; (ii) knowledge and (iii) biometrics. Biometrics is the science of identifying or verifying the identity of a person based on physiological or behavioral characteristics. It provides additional layer of security via its strong authentication process. This innovation allows compromised premises to quickly identify intruders. As the technology world is evolving there are more and more trends and demand in the field of identity management. All these trends and demands are generated from one basic need – the need for a more accurate and secure way of identifying an individual. The intelligent ones are already learning to adopt with these trends in order to gain competitive advantage. This Paper brings about the recent trends in Biometric Technologies and its applications.
Key-Words / Index Term
Wi-Fi, SSO, Cryptography, Cloud-Biometrics etc
References
[1]. B.Miller, “Vital Signs of Identity”. IEEE Sectrum , 22-30, 1994.
[2]. D.Gayathri, R.Uma Rani, “A Prototype for Secure Web Access Model using Multimodal Biometric System based on Fingerprint and Face Recognition”, International Journal of Computer Science and Information Technologies ,vol. 3,issue. 3,pp. 3985-3988, 2012.
[3]. D.Gayathri, R.Uma Rani,” An Efficient Multimodal Biometric System Using Adaptive Gabor Filtering based Feature Extraction”, European Journal of Scientific Research ,vol. 141,issue. 4,pp. 463-475, 2016.
[4]. D.Gayathri, R.Uma Rani,” Multimodal Biometric System: An Overview”, International Journal of Advanced Research in Computer and Communication Engineering ,vol.2,issue 1,pp. 898-902, 2013.
[5]. K.Modi, S. “Biometrics in Identity Management Concepts to Applications”.
[6]. Meenakshi Gupta, Adti Grover, “Survey on Technique of Multimodal Biometric System”, International Journal of Innovative Research in Computer and Communication Engineering , 1-7, 2016..
[7]. Nalini K. Ratha, Andrew Senior and Ruud M.Bolle. “Automated Biometrics”, pp. 1-11.
[8]. S.Khellat-Kihel,” Finger Vein recognition using Gabor filter and support vector Machine in :IPAS”, 2014.
[9]. S.Khellat-Kihel, R.Abrishambaf,” Multimodal Fusion of the finger Vein, fingerprint and the finger-knuckle-print using kernel fisher analysis”, Elsevier,439-447,2016.
[10]. Amandeep Kaur Bhatia and Harjinder Kaur, “Security and Privacy in Biometrics: A Review”, International Journal of Scientific Research in Computer Science and Engineering ,vol 1, issue 2, pp. 33 – 35, 2013.
Citation
D. Gayathri, R. Uma Rani, "An Overview of Biometric Technologies and Its Benefits," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.207-213, 2019.
Solving Travelling Salesman Problem using an Enhanced Ant Colony Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.214-222, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.214222
Abstract
Complex Optimization problems are solved effectively by heuristic approaches. Bio-inspired algorithms play a vital role in solving various complex computational problems. Ant Colony Optimization is one such bio-inspired techniques that stand even after three decades in addressing such issues. Travelling Salesman Problem is taken as a case study and an enhanced ant colony algorithm is used to solve it using the best feature of ACO called as pheromone. The proposed technique involves a modified pheromone rule plays a key parameter in solving the TSP. The experimental medium takes a graph of cities and their distances, followed by solving it using the proposed approach. The data analytics of maximum, mean and minimum costs of the graph are analyzed using R tool. The experimental results prove that the proposed enhanced ant colony algorithm effectively solves Travelling Salesman Problem.
Key-Words / Index Term
Optimization, Travelling Salesman Problem, Bio-Inspired, Ant colony Algorithm, Pheromone
References
[1] Dorigo, M. and Stützle, T., 2019. Ant colony optimization: overview and recent advances. In Handbook of metaheuristics (pp. 311-351). Springer, Cham.
[2] Mirjalili, S., 2019. Ant Colony Optimisation. In Evolutionary Algorithms and Neural Networks (pp. 33-42). Springer, Cham.
[3] Chen, H., Tan, G., Qian, G. and Chen, R., 2018, July. Ant Colony Optimization With Tabu Table to Solve TSP Problem. In 2018 37th Chinese Control Conference (CCC) (pp. 2523-2527). IEEE.
[4] Lin, C., Wu, Y. and Lin, Y., 2018, July. The TSP Solution for the Supermarket Chains Supply Route Based on “Ant Colony–Particle Swarm” Algorithm. In 2018 37th Chinese Control Conference (CCC) (pp. 3133-3138). IEEE.
[5] Xiao, Y., Jiao, J., Pei, J., Zhou, K. and Yang, X., 2018, July. A Multi-strategy Improved Ant Colony Algorithm for Solving Traveling Salesman Problem. In IOP Conference Series: Materials Science and Engineering (Vol. 394, No. 4, p. 042101). IOP Publishing.
[6] Han, X.C., Ke, H.W., Gong, Y.J., Lin, Y., Liu, W.L. and Zhang, J., 2018, July. Multimodal optimization of traveling salesman problem: a niching ant colony system. In Proceedings of the Genetic and Evolutionary Computation Conference Companion (pp. 87-88). ACM.
[7] Li, J., Xia, Y., Li, B. and Zeng, Z., 2018, August. A Pseudo-dynamic Search Ant Colony Optimization Algorithm with Improved Negative Feedback Mechanism to Solve TSP. In International Conference on Intelligent Computing (pp. 19-24). Springer, Cham.
[8] de S Alves, D.R., Neto, M.T.R.S., Ferreira, F.D.S. and Teixeira, O.N., 2018, February. SIACO: a novel algorithm based on ant colony optimization and game theory for travelling salesman problem. In Proceedings of the 2nd International Conference on Machine Learning and Soft Computing (pp. 62-66). ACM.
[9] Oliveira, S., Hussin, M. S., Roli, A., Dorigo, M., & Stützle, T. , 2017, June, Analysis of the population-based ant colony optimization algorithm for the TSP and the QAP. In Evolutionary Computation (CEC), 2017 IEEE Congress on (pp. 1734-1741). IEEE. Dfg
[10] Zhou, Y., He, F., & Qiu, Y. (2017). Dynamic strategy based parallel ant colony optimization on GPUs for TSPs. Science China Information Sciences, 60(6), 068102.
[11] Liu, Y., Gao, C., Zhang, Z., Lu, Y., Chen, S., Liang, M., & Tao, L. (2017). Solving NP-hard problems with Physarum-based ant colony system. IEEE/ACM transactions on computational biology and bioinformatics, 14(1), 108-120.
[12] Suriya Sundaramoorthy, & Shantharajah, S. P. (2014). An Improved Ant Colony Algorithm for Effective Mining of Frequent Items. J. Web Eng., 13(3&4), 263-276.
[13] Saenphon, T., Phimoltares, S. and Lursinsap, C., 2014. Combining new fast opposite gradient search with ant colony optimization for solving travelling salesman problem. Engineering Applications of Artificial Intelligence, 35, pp.324-334.
[14] Elloumi, W., El Abed, H., Abraham, A. and Alimi, A.M., 2014. A comparative study of the improvement of performance using a PSO modified by ACO applied to TSP. Applied Soft Computing, 25, pp.234-241.
[15] Sahana, S.K. and Jain, A., 2014, October. High performance ant colony optimizer (HPACO) for travelling salesman problem (TSP). In International Conference in Swarm Intelligence (pp. 165-172). Springer, Cham.
[16] Mavrovouniotis, M. and Yang, S., 2013. Ant colony optimization with immigrants schemes for the dynamic travelling salesman problem with traffic factors. Applied Soft Computing, 13(10), pp.4023-4037.
[17] Bai, J., Yang, G.K., Chen, Y.W., Hu, L.S. and Pan, C.C., 2013. A model induced max-min ant colony optimization for asymmetric traveling salesman problem. Applied Soft Computing, 13(3), pp.1365-1375.
[18] Tuba, M. and Jovanovic, R., 2013. Improved ACO algorithm with pheromone correction strategy for the traveling salesman problem. International Journal of Computers Communications & Control, 8(3), pp.477-485.
[19] Yousefikhoshbakht, M., Didehvar, F. and Rahmati, F., 2013. Modification of the ant colony optimization for solving the multiple traveling salesman problem. Romanian Journal of Information Science and Technology, 16(1), pp.65-80.
[20] Peker, M., ŞEN, B. and Kumru, P.Y., 2013. An efficient solving of the traveling salesman problem: the ant colony system having parameters optimized by the Taguchi method. Turkish Journal of Electrical Engineering & Computer Sciences, 21(Sup. 1), pp.2015-2036.
[21] Neyoy, H., Castillo, O. and Soria, J., 2013. Dynamic fuzzy logic parameter tuning for ACO and its application in TSP problems. In Recent Advances on Hybrid Intelligent Systems (pp. 259-271). Springer, Berlin, Heidelberg.
[22] Jun-man, K. and Yi, Z., 2012. Application of an improved ant colony optimization on generalized traveling salesman problem. Energy Procedia, 17, pp.319-325.
[23] Mohan, B.C. and Baskaran, R., 2012. A survey: ant colony optimization based recent research and implementation on several engineering domain. Expert Systems with Applications, 39(4), pp.4618-4627.
[24] Gharehchopogh, F.S., Maleki, I. and Farahmandian, M., 2012. New approach for solving dynamic traveling salesman problem with hybrid genetic algorithms and ant colony optimization. International Journal of Computer Applications, 53(1).
[25] Dong, G., Guo, W.W. and Tickle, K., 2012. Solving the traveling salesman problem using cooperative genetic ant systems. Expert systems with applications, 39(5), pp.5006-5011.
[26] Chen, L., Sun, H.Y. and Wang, S., 2012. A parallel ant colony algorithm on massively parallel processors and its convergence analysis for the travelling salesman problem. Information Sciences, 199, pp.31-42.
[27] Cheng, J., Zhang, G., Li, Z. and Li, Y., 2012. Multi-objective ant colony optimization based on decomposition for bi-objective traveling salesman problems. Soft Computing, 16(4), pp.597-614.
[28] Liu, F., 2012. A dual population parallel ant colony optimization algorithm for solving the traveling salesman problem. Journal of Convergence Information Technology, 7(5), pp.66-74.
[29] Kötzing, T., Neumann, F., Röglin, H. and Witt, C., 2012. Theoretical analysis of two ACO approaches for the traveling salesman problem. Swarm Intelligence, 6(1), pp.1-21.
[30] Chen, S.M. and Chien, C.Y., 2011. Solving the traveling salesman problem based on the genetic simulated annealing ant colony system with particle swarm optimization techniques. Expert Systems with Applications, 38(12), pp.14439-14450.
[31] Pedemonte, M., Nesmachnow, S. and Cancela, H., 2011. A survey on parallel ant colony optimization. Applied Soft Computing, 11(8), pp.5181-5197.
[32] Ghafurian, S. and Javadian, N., 2011. An ant colony algorithm for solving fixed destination multi-depot multiple traveling salesmen problems. Applied Soft Computing, 11(1), pp.1256-1262.
[33] Chen, S.M. and Chien, C.Y., 2011. Parallelized genetic ant colony systems for solving the traveling salesman problem. Expert Systems with Applications, 38(4), pp.3873-3883.
[34] Hlaing, Z.C.S.S. and Khine, M.A., 2011. Solving traveling salesman problem by using improved ant colony optimization algorithm. International Journal of Information and Education Technology, 1(5), p.404.
[35] Mavrovouniotis, M. and Yang, S., 2011. A memetic ant colony optimization algorithm for the dynamic travelling salesman problem. Soft Computing, 15(7), pp.1405-1425.
[36] Brezina Jr, I. and Čičková, Z., 2011. Solving the travelling salesman problem using the ant colony optimization. Management Information Systems, 6(4), pp.10-14.
[37] Stützle, T., López-Ibánez, M., Dorigo, M., Cochran, J.J., Cox, L.A., Keskinocak, P., Kharoufeh, J.P. and Smith, J.C., 2011. A concise overview of applications of ant colony optimization. Wiley encyclopedia of operations research and management science, 2, pp.896-911.
[38] Gan, R., Guo, Q., Chang, H. and Yi, Y., 2010. Improved ant colony optimization algorithm for the traveling salesman problems. Journal of Systems Engineering and Electronics, 21(2), pp.329-333.
[39] Tseng, S.P., Tsai, C.W., Chiang, M.C. and Yang, C.S., 2010, July. A fast ant colony optimization for traveling salesman problem. In Evolutionary Computation (CEC), 2010 IEEE Congress on (pp. 1-6). IEEE.
[40] López-Ibáñez, M. and Blum, C., 2010. Beam-ACO for the travelling salesman problem with time windows. Computers & Operations Research, 37(9), pp.1570-1583.
[41] Ilie, S. and Bădică, C., 2010, October. Effectiveness of solving traveling salesman problem using ant colony optimization on distributed multi-agent middleware. In Computer Science and Information Technology (IMCSIT), Proceedings of the 2010 International Multiconference on (pp. 197-203). IEEE.
[42] Falcon, R., Li, X., Nayak, A. and Stojmenovic, I., 2010, July. The one-commodity traveling salesman problem with selective pickup and delivery: An ant colony approach. In Evolutionary Computation (CEC), 2010 IEEE Congress on (pp. 1-8). IEEE.
[43] S.Suriya, Dr.S.P.Shantharajah, “Selective Marketing for Retailers to promote stock using improved Ant Colony algorithm", International Journal of Engineering and Technology (IJET), Volume 5 Issue 5, Page No: 3715-3725, October- November 2013.
Citation
S. Suriya, M. Rahul Kumar, "Solving Travelling Salesman Problem using an Enhanced Ant Colony Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.214-222, 2019.
Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.223-229, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.223229
Abstract
As Cloud computing emerges as a dominant paradigm in distributed systems, it is important to fully understand the underlying technologies that make clouds possible. One technology, and perhaps the most important, is the virtualization. Recently virtualization, through the use of hypervisors, has become widely used and well understood by many. Distributed Denial of Service (DDoS) attacks typically focus high quantity of IP packets at specific network entry elements; usually any form of hardware that operates on a Blacklist pattern is quickly overrun. As in the cloud computing, a large number of tenants or VM clients share the common hardware, DDoS attacks have the potential of having much greater impact than against single tenanted architectures. In this paper, various secure virtualization schemes and preventions from DDoS flooding zombie attacks are analyzed. Security threats are discussed and preventive measures from DDoS attacks and protection solutions are presented so that the companies can take the appropriate action accordingly.
Key-Words / Index Term
DDoS, flooding, attack, Cloud, recovery, prevention, secure, virtualization
References
[1]. Andrew J. Younge, Robert Henschel, James T. Brown, Gregor von Laszewski, Judy Qiu, Geoffrey C. Fox, “Analysis of Virtualization Technologies for High Performance Computing Environments”, 2011 IEEE 4th International Conference on Cloud Computing, ISSN : 978-0-7695-4460-1/11, pp. 9-16.
[2]. Farzad Sabahi, “Secure Virtualization for Cloud Environment Using Hypervisor-based Technology”, International Journal of Machine Learning and Computing, Vol. 2, No. 1, February 2012, pp. 39-45
[3]. Durairaj. M, Kannan.P, “A Study On Virtualization Techniques And Challenges In Cloud Computing”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER 2014, ISSN 2277-8616, pp. 147-151
[4]. Ms Jayshri Damodar Pagare, Dr. Nitin A Koli, “A technical review on comparison of Xen and KVM hypervisors: An analysis of virtualization technologies”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 12, December 2014, ISSN (Online) : 2278-1021 , ISSN (Print) : 2319-5940, pp. 8828-8832
[5]. V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao, “Analysis on Virtualization Technologies in Cloud”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 7, July 2014, pp 2567-2574.
[6]. Gabriel Cephas Obasuyi, Arif Sari, “Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment”, Int. J. Communications, Network and System Sciences, 2015, Vol. 8, pp. 260-273, http://dx.doi.org/10.4236/ijcns.2015.87026
[7]. V. A. Meshram, V. V. Meshram, P. V. Khandare , Dr. S. R. Sakhare, “Cloud Computing and Virtualization Security: A Survey”, International Journal of Computer Trends and Technology (IJCTT) – volume 12 number 4 – Jun 2014, ISSN: 2231-5381, pp. 167-170
[8]. Kanika, Navjot Sidhu, “Analysis of Virtualization: Vulnerabilities and Attacks over the Virtualized Cloud Computing”, International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), Vol. 8(issue 5), March-May, 2014, pp. 391-396
[9]. Syed Asad Hussain, Mehwish Fatima, Atif Saeed, Imran Raza, Raja Khurram Shahzad, “Multilevel classification of security concerns in cloud computing”, Applied Computing and Informatics, 2016, ISSN: 2210-8327, pp.1-9
[10]. Theepan Moorthy and Sathish Gopalakrishnan, “IO and data management for infrastructure as a service FPGA accelerators”, Journal of Cloud Computing: Advances, Systems and Applications, 2017, pp. 1-23
[11]. Diego Perez-Botero, Jakub Szefer and Ruby B. Lee, “Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers”, in Proceedings of the Workshop on Security in Cloud Computing (SCC), May 2013.
[12]. Swati Pawar, Sarvesh Singh, “Performance Comparison of VMware and Xen Hypervisor on Guest OS”, International Journal of Innovative Computer Science & Engineering, Volume 2 Issue 3; July-August-2015; Page No. 56-60
Citation
Amit K. Chaturvedi, Punit Kumar, Kalpana Sharma, "Analyzing the Secure Virtualization schemes and preventions from DDoS flooding Zoombie attacks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.223-229, 2019.
ROI Based Pixel Segmentation for Human Blood Type Classification by Neural Network
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.230-234, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.230234
Abstract
In the modern times digital image processing technology used by the end users has been in the interest as it provides the easy solution to the complicated issues. Like face recognition, image classification etc. We have proposed the concept of blood group type detection using image processing techniques based on the input images. It will be very difficult to detect the type of the blood to any end user. The need of the accurate detection is high in disaster situation where no lab or expert persons are available to detect the type of it. Hence we have proposed a pixel cluster based analysis of the blood type based on the Region Adjacency Graphs (RAG) and Super Resolution Mapping (SRM) with pixel analysis and Region of interest (ROI) based image segmentation. Later the use of neural network will help to classify the image based on the pixel analysis features. The proposed system results were obtained by using MATLAB. Successful results were obtained and accuracy of the proposed system is most desirable.
Key-Words / Index Term
Blood type detection, Image segmentation, Pixel analysis, Neural Network
References
[1] Osareh, Alireza, “Automated identifaction of diabetic retinal exudates in digital color images”, British Journal of Ophthalmology 87.10, pp.1220-1223, 2013.
[2] Yun, Wong Li and Achary, U Rajendra and Venkatesh, YV and Chee, Caroline and Min, Lim Choo and Ng, EYK, “Identification of different stages of diabetic retinopathy using retinal otical images”, Information Sciences 178.1, pp.106-121, 2008.
[3] E. A. Henneman, G. S. Avrunin, L. A. Clarke, L. J. Osterweil, C. Jr. Andrzejewski, K. Merrgan, R. Cobleigh, K. Frederick, E. Katz-Bassett, P. L. Henneman, “Increasing patient safty and effiency in transfusion therpy using formal process defamations”, Transfuse Med Rev, Vol. 21, pp. 49-57, 2007.
[4] F. Ana, C. Vitor, S. Filomena and L. P. Celina, “Characterization of Blood Samples Using Image Processing Techniques”, Sensors & Actuators: A. Physical(impact factor: 1.674).
[5] Ferraz, Ana, “Automatic system for determination of blood types using image processing techniques”, Bioengineering (ENBENG), 2013 IEEE 3rd Portuguese Meeting in. IEEE, 2013
[6] Abubakar Yamin, Faisal Imran, Usman Akbar, Syed Hassan Tanvir, “Image Processing Based Detection and Classification of Blood Group Using Color Images”, Internatinal Conference on Communication, Computing and Digital Systems (C-CODE), pp. 293-298, 2017
[7] ]P. Sturgeon, "Automation: its introduction to tbe field of blood group serology", Immunohematology Journal of Blood Group Serology and Education, Vol. 17, . 4, 2001.
[8] A. Dada, D. Beck, G. Schmitz., "Automation and Data Processing in Blood Banking Using the Ortho Autocued In nova System", Transfusion Medicine Hemotherapy, Vol. 34, pp. 341-346, 2007.
[9] S. Y. Shin, K. C. Kwon, S. H. koo, J. W. Park, C. S. Ko,J. H. Song, J. Y. Sung, "Evaluation of two automated instruments for pre-transfusion testing: Auto VueInnova and Techno Twin Station", Korean j Lab Med., Vol. 3, pp. 214-220, Jun.2008.
[10] G. Wittmann, J. Frank, W. Schram, M. Spannagl,"Automation and Data Processing with tbe Immucor Galileo System in a University Blood Bank", Transfusion Medicine Hemotherapy. Vol. 34, pp. 347-352, 2007.
[11] A. Dada, D. Beck, G. Schmitz, "Automation and Data Processing in Blood Banking Using the Ortho AutoVue Innova System". Transfusion Medicine Hemotherapy, Vol. 34, pp. 341-346, 2007.
Citation
Bhavana R. Maale, Soumya, "ROI Based Pixel Segmentation for Human Blood Type Classification by Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.230-234, 2019.
A TOPSIS Approach for Ranking Warmth Service Providers
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.235-240, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.235240
Abstract
In the competitive situation, different methods of Multi-criteria decision support have been used to help decision maker select better alternatives for various decision problems. To an economic consideration, there are several criteria needed to be taken into account the temperatures in different cities in the World. According to that base we recorded the temperature in the different months in a city in the year 2018. In this paper, we presented the warmth temperature in the city and crisp temperature of the city by account of the decision making processes. To solve complex real-world decision making problems, multi-attribute decision making (MADM) methods have been developed. The TOPSIS is among the most widely used methods at present which provides valuable outputs in different application areas. With the above hypotheses, calculations involving Eigen vector, square rooting and summations are used for obtaining a relative closeness value of the criteria tested. TOPSIS ranks these values of relative closeness of the whole system by assigning the highest value of the relative closeness to the best attributes in the system. A numerical example given to illustrate the solution process of the suggested approach.
Key-Words / Index Term
Crisp, DM, MADM, MCDM, TOPSIS, Warmth
References
[1] M. R. Kirby. A Methodology for Technology Identification, Evaluation, and Selection in Conceptual and Preliminary Aircraft Design. PhD thesis, Aerospace Systems Design Laboratory, School of Aerospace Engineering, Georgia Institute of Technology, 2001.
[2] Y. Li. An Intelligent Knowledge-based Multiple Criteria Decision Making Advisor for Systems Design. PhD thesis, Aerospace Systems Design Laboratory, School of Aerospace Engineering, Georgia Institute of Technology, 2007.
[3] C.L. Hwang, K. Yoon, “Multiple attribute decision making: Methods and Applications”, Springer-Verlag , 1981.
[4] C.T. Chen, “Extensions of the TOPSIS for group decision-making under fuzzy environment”, Fuzzy Sets and Systems, Vol. 114, pp.01-09, 2010.
[5] D.L. Olson, “Comparison of Weights in TOPSIS Models”, Mathematical and Computer Modelling, Vol. 40, pp.721-727, 2004.
[6] I. Ertugrul, N. Karakasoglu, “Performance evaluation of Turkish cement firms with fuzzy analytic hierarchy process and TOPSIS methods”, Expert Systems with Applications, Vol. 36, pp.702-715, 2009.
[7] M. Ehrgott, J. Figueira, S. Greco, “Trends in Multiple Criteria Decision Analysis”, Springer, 2010.
[8] V. Belton, T. J. Stewart, Multiple Criteria Decision Analysis - An Integrated Approach, Kluwer Academic Publishers, 2002.
[9] J.-W. Wang, C.-H. Cheng, H.K. Cheng, “Fuzzy hierarchical TOPSIS for supplier selection”, Applied Soft Computing, Vol. 9, Issue 1, pp.377-386, 2009.
[10] L. Ferreira, D. Borenstein, M. B. Righi, A. T. de Almeida Filho, “A fuzzy hybrid integrated framework for portfolio optimization in private banking”, Expert Systems with Applications, Vol. 92, pp. 350–362, 2018.
[11] M. S. García-Cascales, M. T. Lamata, “On rank reversal and TOPSIS method”, Mathematical and Computer Modelling, Vol. 56(5–6), pp. 123–132, 2012.
[12] M. A. Senouci, M. S. Mushtaq, S. Hoceini, A. Mellouk, “TOPSIS-based dynamic approach for mobile network interface selection”, Computer Networks, Vol. 107, pp. 304–314, 2016.
[13] S. Mufazzal, S. Muzakkir, “A new multi-criterion decision-making (MCDM) method based on proximity indexed value for minimizing rank reversals”, Computers & Industrial Engineering, Vol. 119, pp. 427–438, 2018.
[14] E. Roszkowska, D. Kacprzak, “The fuzzy saw and fuzzy TOPSIS procedures based on ordered fuzzy numbers”, Information Sciences, Vol. 369, pp. 564–584, 2016.
[15] E. Cables, M. Lamata, J. Verdegay, “Rim-reference ideal method in multicriteria decision-making”, Information Sciences, pp. 1–10, 2016.
[16] M. Behzadian, S. Khanmohammadi Otaghsara, M. Yazdani, J. Ignatius, “A state-of the-art survey of TOPSIS applications”, Expert Systems with Applications, Vol. 39(17), pp. 13051–13069, 2012.
[17] F. Herrera, E. Herrera-Viedma, J.L. Verdegay, “A model of consensus in group decision making under linguistic assessments”, Fuzzy Sets and Systems, Vol. 78, pp. 73-87, 1996.
[18] J. Wang, S.Y. Liu, J. Zhang, “An extension of TOPSIS for MCDM based on vague set theory”, Journal of System Science and System Engineering, Vol. 14, pp. 73-84, 2005.
[19] M. Delgado, J.L. Verdegay, M.A. Vila, “Linguistic decision-making models”, International journal of Intelligent System, Vol. 7, Issue 5, pp. 479-492, 1992.
[20] P.K. Parida, S.K. Sahoo, B. Behera, “Multi-criteria decision making models using fuzzy TOPSIS technique”, Journal of Altra-Scientist of Physical Sciences, Vol. 28, Issue 5, pp. 286-293, 2016.
[21] P.K. Parida, D. Mishra, B. Behera, “Some generalised results on TOPSIS method involving Multi-attributes decision making problem”, International Journal of Computer Sciences and Engineering, Vol. 6, Issue 6, pp. 147-152, 2018.
[22] R.A. Krohling, G.C.P. Andre, “A-TOPSIS-An approach based on TOPSIS for ranking evolutionary algorithms”, Procedia Computer Science, Vol. 55, pp. 308-317, 2015.
[23] T.C. Chu, Y.C. Lin, “Improved extensions of the TOPSIS for group decision making under fuzzy environment”, Journal of Information and Optimization Sciences, Vol. 23, pp. 273-286, 2013.
Citation
P.K. Parida, "A TOPSIS Approach for Ranking Warmth Service Providers," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.235-240, 2019.