Detection and correcting the wrong words from Hindi, English and Punjabi Text Documents
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.314-318, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.314318
Abstract
Spell checking is a very important phase of any document processing system and Natural Language Processing. Spell Checking is a process to find the incorrect spells in a text document and to correct that particular incorrect spelling. There are various spell checking systems for various languages Like Hindi, Punjabi, English, French, Germen that can detect and correct the spell from a particular document. In this paper, we proposed a hybrid algorithm to detect and correct misspelled words from a text document written in three languages Hindi, English and Punjabi. Hybrid approach is a combination of various approaches like Dictionary lookup approach, Edit Distance Approach, Rule based approach and N-Gram approach. Proposed system can detect and correct the misspelled words from three given languages. A collision detection and correction system for alternates for misspell words has been also provided. Performance of proposed system is checked on various inputs collected from various books, websites etc. Results of the proposed system are evaluated on these outputs which have accuracy values higher than that of existing system.
Key-Words / Index Term
Spell Checking; Hybrid approach for Spell Checking; N-Gram Approach; Rule Based Approach; Edit distance approach
References
[1] Ritika Mishra, Navjot Kaur, Design and Implementation of Online Punjabi Spell Checker Based on Dynamic Programming, Volume 3, Issue 8, August 2013, ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software Engineering
[2] Neha Gupta, Pratistha Mathur, Spell Checking Techniques in NLP: A Survey, Volume 2, Issue 12, December 2012 , ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software Engineering
[3] Baljeet Kaur, Review On Error Detection and Error Correction Techniques in NLP: Volume 4, Issue 6, June 2014 ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software Engineering.
[4] Rupinderdeep Kaur and Parteek Bhatia, “Design and Implementation of SUDHAAR-Punjabi Spell Checker,” International Journal of Information and Telecommunication Technology, Vol. 1, Issue 15 May, 2010.
[5] S. Dasgupta, C.H. Papadimitriou, and U.V. Vazirani, `Algorithms`, p173, available at http:/ / www.cs.berkeley.edu/ ~vazirani/ algorithms.html.
[6] Neha Gupta &PratisthaMathur,“Spell Checking Techniques in NLP: A Survey,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 12, December 2012.
[7] Gurpreet Singh Lehal, “Design and Implementation of Punjabi Spell Checker”, International Journal of Systemics, Cybemetics and Infomatics, 2007.
[8] Amit Sharma & Pulkit Jain, “Hindi Spell Checker”, Indian Institute of Technology Kanpur, April 17, 2013.
[9] MeenuBhagat, (2007), “Spelling Error Pattern Analysis of Punjabi Typed Text”, Thesis Report, Thapar University, Patiala.
[10] F.J. Damerau (1964), “A Technique for Error Detection and Correction of Spelling Errors”, Communication ACM, pp. 171-176.
[11] Monisha Das, S. Borgohain, JuliGogoi, S. B. Nair (2002), “Design and Implementation of a Spell Checker for Assamese”,lec, pp. 156, Language Engineering Conference (LEC’02).
[12] Morris, Robert & Cherry, Lorinda L, “Computer Detection of typographic errors”, IEEE Trans Professional Communications, vol. PC-18, no. 1, pp 54-64, March 1975.
[13] R.E. Gorin (1971), “SPELL: A spelling checking and correction program”, Online documentation for the DEC-10 computer.
[14] K. Kukich (1992) “Techniques for automatically correcting words in text”. ACM Computing Surveys. 24(4): 377-439.
[15] Peterson James (1980), “Computer Programs for Detecting and Correcting Spelling Errors”, Computing Practices, Communications of the ACM.
[16] G S Lehal & MeenuBhagat, “Spelling Error Pattern Analysis of Punjabi Typed Text”, In Proceedings of International Symposum on Machine Translation, NLP and TSS, pp. 128-141, 2007.
[17] Jesus Vilares& Manuel Vilares, “Managing Misspelled Queries in IR Application,” Issue 8, October 2010.
[18] Youssef Bassil& Mohammad Alwani, “Context-sensitive Spelling Correction using Google Web IT 5-Gram Information,” Department of Computer and Information Science, Vol. 5,No.3, May 2012.G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955.
Citation
Shaina, Naresh Kumar, "Detection and correcting the wrong words from Hindi, English and Punjabi Text Documents," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.314-318, 2019.
Comparison of Meta-heuristic Algorithms for Web Link Prioritization
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.319-324, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.319324
Abstract
Technological advancement in all the fields leads to the problem of information overload in front of internet user. It has become extremely difficult for them to reach to the information which is most relevant to their need. Information gigantic size makes the user to wander from one web page to another in order to reach to their target information. This leads to wastage of user time and also reduces the interest of user from the search engine, websites as well as internet. The problem of accessing user relevant web pages falls into the category of NP-Complete problems. Web Mining, an application of data mining is utilized to find the solution of this issue of information extraction. For retrieving the relevant data top T web links needs to be prioritized. Here we propose a memetic algorithm and simulated annealing algorithm for selecting the most relevant web document. Both the algorithms are compared on the basis of their performance experimentally and results shows the domination of one over another.
Key-Words / Index Term
Web Mining, NP-complete, Memetic algorithm, Simulated Annealing algorithm
References
[1] S. Sharma, and M. Rai, “Customer Behavior Analysis using Web Usage Mining,” International Journal of Scientific Research in Computer Science and Engineering, vol. 5, issue 6, pp. 47-50, 2017.
[2] A. Kashyap, I. Naseem, and D. Mandloi, "Web Mining an Approach to Evaluate Web", International Journal of Scientific Research in Computer Science and Engineering, vol. 5, issue 3, pp. 79-85, 2017.
[3] R. Cooley, B. Mobasher, and J. Srivastava, “Web mining: information and pattern discovery on the World Wide Web,” pp. 558–567, 2002.
[4] R. Kosala and H. Blockeel, “Web Mining Research: A Survey,” vol. 2, no. 1, 2000.
[5] O. R. Za, “10.1.1.21.799.Pdf.”
[6] S. Ajoudanian and M. D. Jazi, “Deep Web Content Mining,” vol. 3, no. 1, pp. 501–505, 2009.
[7] U. shi and M. R. Singh, “Page Content Rank: An Approach to the Web Content Mining,” Int. J. Eng. Trends Technol., vol. 22, no. 2, pp. 74–78, 2015.
[8] G. Poonkuzhali, K. Thiagarajan, K. Sarukesi, and G. V Uma, “Signed Approach for Mining Web Content Outliers,” vol. 3, no. 8, pp. 820–824, 2009.
[9] Cooley, R., Tan, P. N., & Srivastava, J. (1999, August). Websift: the web site information filter system. In Proceedings of the Web Usage Analysis and User Profiling Workshop (Vol. 8).
[10] A. Jimeno-Yepes, R. Berlanga-Llavori, and D. Rebholz-Schuhmann, “Ontology refinement for improved information retrieval,” Inf. Process. Manag., vol. 46, no. 4, pp. 426–435, 2010.
[11] F. M. Facca and P. L. Lanzi, “Recent Developments in Web Usage Mining Research,” pp. 140–150, 2003.
[12] C. C. Lin, “Optimal Web site reorganization considering information overload and search depth,” Eur. J. Oper. Res., vol. 173, no. 3, pp. 839–848, 2006.
[13] R. Fuller, R. John, R. B. Eds, P. Sincak, J. Vascak, and V. Kvasnicka, and Web Mining Advances in Soft Computing. .
[14] F. Neri and C. Cotta, “Memetic algorithms and memetic computing optimization: A literature review,” Swarm Evol. Comput., vol. 2, no. February, pp. 1–14, 2012.
[15] P. Moscato and C. Cotta, “A Modern Introduction to Memetic Algorithms,” no. January 2003, pp. 141–183, 2010.
[16] A. Orman, E. Aarts, and J. K. Lenstra, “Local Search in Combinatorial Optimisation.,” J. Oper. Res. Soc., vol. 50, no. 2, p. 191, 2006.
[17] S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization of Simulated Annealing,” Ann. Phys. (N. Y)., vol. 54, no. 2, pp. 671–680, 1969.
Citation
Kamika Chaudhary, Neena Gupta, "Comparison of Meta-heuristic Algorithms for Web Link Prioritization," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.319-324, 2019.
A Review of Model Based Slicing and Test Case Generation
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.325-329, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.325329
Abstract
To reduce error Software testing is important, upholding and overall software costs. To evaluate the feature or competency testing the software is an activity of system and determining that whether it meets required scenario. One way is program slicing to comfort, this method is to break down the large programs into smaller ones and further is model based slicing that split the large software architecture model into smaller models at the initial phase of SDLC (Software Development Life Cycle). To extract the sub model from a big model diagrams it is a completely new approach on the basis of slicing criteria. This planned procedure used the notion of model based slicing to segment the sequence diagram to extract the desired piece. An overview of Model based slicing is presented by this literature survey, including the different general methods and techniques used to compute slices. Our proposed test case generation technique can be used for integration and system testing accommodating the object message and condition information associated with the use case scenarios.
Key-Words / Index Term
Model Based Slicing, Quality Based Slicing, UML/OCL Model Verification, Model Revolution Verification Through Slicing, Dependency Graph, Model, Test Case Generation.
References
[1]. Blouin, B. Combemale, B. Baudry, O. Beaudoux, “Kompren Modeling and Generating Model Slicers,” Journal of Software and System Modeling, Springer, 2012.
[2]. Grady Booch, James Rumbaugh, Ivar Jacobson, “The Unified Modeling Language User Guide," 2nd Edition, May 2005, Publisher. Addison Wesley.
[3]. M. Weiser, Program slicing, IEEE Transactions on Soft. Eng., 10, July 1984, pp.352–357.
[4]. Jianjun Zhao, "Slicing Software Architecture," Technical Report 97-SE-117, pp.85-92, Information Processing Society of Japan, Nov 1997.
[5]. Jianjun Zhao, “Applying slicing technique to software architectures,” In Fourth IEEE International Conference on Engineering of Complex Computer Systems, ICECCS’98, pp 87 –98, 1998.
[6]. W. Fangjun and Y. Tong, “Dependence Analysis for UML Class Diagrams,” J. Electronics (China), vol. 21, no. 3, pp. 249-254, May 2004, doi 10.1007/BF02687879.
[7]. M. Harman, A. Mansouri, and Y. Zhang, “Search Based Software Engineering: A Comprehensive Analysis and Review of Trends Techniques and Applications,” Technical Report TR-09-03, Dept.of Computer Science, King’s College London, Apr. 2009.
[8]. H. Kagdi, J.I. Maletic, and A. Sutton, “Context- Free Slicing of UML Class Models,” Proc. 21st IEEE Int’l Conf. Software Maintenance, pp. 635-638, 2005.
[9]. S. Van Langehove, “Internal Broadcasting to Slice UML State Charts: As Rich as Needed,” Proc. Abstracts of the FNRS Contact Day: The Theory and Practice of Software Verification, Oct.2005.
[10]. J.H. Bae, K. Lee, and H.S. Chae, “Modularization of the UML Metamodel Using Model Slicing,” Proc. Fifth Int’l Conf. Information Technology: New Generations, pp. 1253-1254, 2008.
[11]. ANSI/IEEE Standard 1008-1987, “IEEE Standard for Software Unit Testing”, pp.1-23, IEEE Computer Society, 1997.
[12]. Sagar Sen, Naouel Moha, Benoit Baudry, and Jean Marc Jézéquel, "Meta-model Pruning," In 12th International Conference on Model Driven Engineering Languages and Systems (MODELS’09), 2009.
[13]. Jung Ho Bae and Heung Seok Chae, “UMLSlicer: A tool for modularizing the UML metamodel using slicing,” In 8th IEEE International Conference on Computer and Information Technology (CIT), pp.772–777, 2008.
[14]. Jaiprakash T. Lallchandani, R. Mall, "Static Slicing of UML Architectural Models," Journal of Object Technology, vol. 8, no. 1, pp. 159- 188, January-February 2009.
[15]. J. Lallchandani and R. Mall, “A Dynamic Slicing Technique for UML Architectural Models,” IEEE Transaction on Software Engineering, Vol. 37, No. 6, NOV/DEC 2011.
[16]. Philip Samuel, Rajib Mall, “Slicing-Based Test Case Generation from UML Activity Diagrams,” ACM SIGSOFT Software Engineering Notes, Vol. 34 No. 6, November 2013.
[17]. Philip Samuel, Rajib Mall, “A Novel Test Case Design Technique Using Dynamic Slicing of UML Sequence Diagrams,” e-Informatics Software Engineering Journal, Vol. 2, Issue 1, 2008.
[18]. Nisansala Yatapanage, KirstenWinter, and Saad Zafar, “Slicing behavior tree models for verification,” In IFIP Advances in Information and Communication Technology, Vol. 323, pp. 125–139, 2010.
[19].Philip Samuel , Rajib Mall, Pratyush Kanth, “Automatic test case generation from UML communication diagrams,” Information and Software Technology (ELSEVIER), 2007.
[20]. Asadullah Shaikh, Robert Clarisó, Uffe Kock Wiil, and Nasrullah Memon, “Verification-driven slicing of UML/OCL models,” In Proceedings of the IEEE/ACM international conference on Automated software engineering, pp. 185–194, ACM, 2010.
[21].Asadullah Shaikh, Uffe Kock Wiil, and Nasrullah Memon, "Evaluation of tools and slicing techniques for efficient verification of UML/OCL class diagrams," Advances in Software Engineering, vol.18, pp 173-192, 2011.
[22].Monalisa Sarma, Debasish Kundu, Rajib Mall, “Automatic Test Case Generation from UML Sequence Diagrams,” 15th IEEE International Conference on Advanced Computing and Communications, 2007.
[23]. Mathieu Acher, Philippe Collet, Philippe Lahire, and Robert France, “Slicing feature models,” In 26th IEEE/ACM International Conference On Automated Software Engineering (ASE’11), IEEE/ACM, 2015.
[24]. Mathieu Acher, Philippe Collet, Philippe Lahire, and Robert France, “Separation of Concerns in Feature Modeling: Support and Applications,” In Aspect- Oriented Software Development(AOSD’12), ACM Press, 2017.
[25]. Arnaud Hubaux, Patrick Heymans, Pierre-Yves Schobbens, Ebrahim Khalil Abbasi, and Dirk Deridder, “Supporting multiple perspectives in feature-based configuration,” Software and Systems Modeling, 2018.
[26]. T. Kim, Y.-T. Song, L. Chung, and D.T. Huynh, “Dynamic Software Architecture Slicing,” Proc. 23rd Int’l Computer Software and Applications Conf., pp. 61- 66, 1999.
[27].T. Kim, Y.-T. Song, L. Chung, and D.T. Huynh, “Software Architecture Analysis: A Dynamic Slicing Approach,” J. Computer and Information Science, vol. 1, no. 2, pp. 91-103, 2017.
[28]. Davide Falessi, Shiva Nejati, Mehrdad Sabetzadeh, Lionel Briand, and Antonio Messina, “SafeSlice: a model slicing and design safety inspection tool for SysML,” In SIGSOFT/FSE’11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC’11: 13rd European Software Engineering Conference (ESEC-13), ACM, 2018.
[29]. Zoltán Ujhelyi, Ákos Horváth, and Dániel Varró, “Towards dynamic backward slicing of model transformations,” In 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), pp.404–407, IEEE Computer Society, 2011.
[30]. Zoltán Ujhelyi, Ákos Horváth, and Dániel Varró, “Dynamic Backward Slicing of Model Transformations,” IEEE Fifth International Conference on Software Testing, Verification and Validation, 2016.
[31]. A. Blouin, B. Combemale, B. Baudry, O. Beaudoux, “Modeling model slicers,” Proceedings of the 14th international conference on Model driven engineering languages and systems, 2017.
[32]. A. Blouin, B. Combemale, B. Baudry, O. Beaudoux, “Kompren Modeling and Generating Model Slicers,” Journal of Software and System Modeling, Springer, 2017.
Citation
Venus Grover, Jitender Kumar, "A Review of Model Based Slicing and Test Case Generation," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.325-329, 2019.
Comparative Study of Classification Methods using Algorithms of Data Mining for Possibilities of Heart Diseases
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.330-336, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.330336
Abstract
Rate of heart-related diseases are growing day by day on a greater pace from the last 15 years, which is a major concern. Through the classification, we can understand the possibilities of such worst-case scenarios at an earlier stage which can help us in being cautious and moreover being prepared for it in the immediate future.
Key-Words / Index Term
Classification, possibilities of heart diseases, comparative analysis of algorithms using R
References
[1] C. S. Dangare, S S. Apte Improved Study of Heart Disease Prediction System using Data Mining Classification Techniques , International Journal of Computer Applications (0975 – 888) Volume 47– No.10, June 2012.
[2] J . Soni, U. Ansari, D. Sharma, S. Soni. Predictive data mining for medical diagnosis: An overview of heart disease prediction. International Journal of Computer Applications (0975 – 8887)Volume 17– No.8, March 2011
[3] K. Srinivas, B. Kavihta Rani, Dr A. Govrdhan. Application of data mining techniques in healthcare and prediction of heart attacks .
Citation
Bindu Trikha, Dhruv Dixit, "Comparative Study of Classification Methods using Algorithms of Data Mining for Possibilities of Heart Diseases," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.330-336, 2019.
Improving QoS Parameters for Cloud Data Centers Using Dynamic Particle Swarm Optimization Load Balancing Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.337-342, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.337342
Abstract
Due to popularity of Cloud computing environment, the cloud computing users are increasing day by day and that has become one of the important challenge for the cloud providers in terms of load balancing. Load balancing distributes the traffic evenly over multiple paths. In this research work, we have proposed the Dynamic Improved PSO Load balancing algorithm and implement it over CloudSim toolkit. This toolkit assisted the modeling and generation of virtual machines in a simulated manner such that datacenters, jobs and their mapping to VMs can be done on a same node whereas provide the desirable result. Therefore, the results are compared with the existing load balancing algorithms namely Modified Throttled, FCFS and Particle Swam Optimization based on their performance using CloudSim Simulator. Simulation outcomes are recorded in terms of the Response time and datacenter processing time of these algorithms along with its performance and cost details.
Key-Words / Index Term
Cloud Computing, Load Balancing, Virtual Machine, Scheduling, Particle Swarm Optimization, Modified Throttled, FCFS, CloudSim, Response time, Data Center Processing Time, Cost
References
[1] P. J. Angeline, "Using selection to improve Particle Swarm Optimization," Proc. IEEE Int. Conf. Computational Intelligence, pp.84-89, 1998
[2] W. Li, H. Shi, "Dynamic Load Balancing Algorithm Based on FCFS," IEEE (ICICIC) Fourth International Conference on Innovative Computing, Information and Control, pp.1528 - 1531, December 2009
[3] S. G. Domanal, G. R. Mohana Reddy, "Load Balancing in cloud computing Using Modified Throttled Algorithm," IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[4] S. Mohapatra, K. Smruti Rekha, S. Mohanty, "A comparison of Four Popular Heuristics for Load Balancing of Virtual Machines in Cloud Computing," IJCA Journal, vol. 68(6), pp. 34-38, April 2013.
[5] B. Mondal, K. Dasgupta, P. Dutta, "Load Balancing in Cloud computing using stochastic hill climbing-a soft computing approach," In Proceedings of 2nd International Conference on Computer, Communication, Control and Information Technology (C3IT), Elsevier, Procedia Technology, vol. 4, pp. 783 -789, February 2012.
[6] B. Mondal, K. Dasgupta, P. Dutta, "Load Balancing in Cloud computing using stochastic hill climbing-a soft computing Approach, “In Proceedings of 2nd International Conference on Computer, Communication, Control and Information Technology(C3IT), Elsevier, Procedia Technology, vol. 4, pp. 783 -789, February 2012.
[7] Q. Bai, "Analysis of Particle Swarm Optimization," Computer and Information Science (CCSE), IEEE, vol. 3(1), pp. 180-184, February 2010.
[8] Anju Baby, “Load Balancing In Cloud Computing Environment Using PSO Algorithm”, International Journal for Research in Applied Science and Engineering Technology, Vol 2 Issue IV, April 2014.
[9] Vidhi Tiwari1*, Pratibha Adkar2, Implementation of IoT in Home Automation using android application, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.2, pp.11-16, April (2019), E-ISSN: 2320-7639.
[10] Amogha A.K., Load Forecasting Algorithms with Simulation & Coding, International Journal of Scientific Research in Computer Science and Engineering, Vol.7 , Issue.2 , pp.16-21, Apr-2019, E-ISSN: 2320-7639.
Citation
Sanjay G. Patel, S.D. Panchal, "Improving QoS Parameters for Cloud Data Centers Using Dynamic Particle Swarm Optimization Load Balancing Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.337-342, 2019.
Human Activity Classification for Surveillance using Machine Learning and Image Processing Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.343-346, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.343346
Abstract
Today`s world surveillance system plays a major role in the security industry. In the video monitoring system, moving object detection was frequently used. Motion estimation is also an important part of video processing monitoring, such as video filtering and compression of video frames. Video Surveillance System is a powerful tool for tracking people and their public safety operations. The reason for having a monitoring system is not only to place cameras in the human eye place, but also to allow them to automatically acknowledge activities. This paper creates a smart recognition of the system of human activity. At each stage of the suggested system, image processing techniques are used A system was built based on the Caltech database of human activity features acquired from frame sequences. Relevance Vector classifier used in the dataset to classify the model of activity. Classification results show high effectiveness throughout the training, testing and validation stages.
Key-Words / Index Term
Human activity recognition, relevance vector classifier, histogram of gradients, Background subtraction
References
[1] Hossen, Muhammad Kamal, and Sabrina Hoque Tuli. "A surveillance system based on motion detection and motion estimation using optical flow." In Informatics, Electronics and Vision (ICIEV), 2016 5th International Conference on, pp. 646-651. IEEE, 2016.
[2] Htike, Kyaw Kyaw, Othman O. Khalifa, Huda Adibah Mohd Ramli, and Mohammad AM Abushariah. "Human activity recognition for video surveillance using sequences of postures." In e-Technologies and Networks for Development (ICeND), 2014 Third International Conference on, pp. 79-82. IEEE, 2014.
[3] M. Thida, Y. L. Yong, P. Climent-P´erez, H.-l. Eng, and P. Remagnino, “A literature review on video analytics of crowded scenes,” in Intelligent Multimedia Surveillance. Springer, 2013, pp. 17–36..
[4] Kaur, Rajvir, and Sonit Singh. "Background modelling, detection and tracking of human in video surveillance system." In Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of, pp. 54-58. IEEE, 2014.
[5] Meng, Binghao, Lu Zhang, Fan Jin, Lu Yang, Hong Cheng, and Qian Wang. "Abnormal Events Detection Using Deep Networks for Video Surveillance." In International Conference on Cognitive Systems and Signal Processing, pp. 197-204. Springer, Singapore, 2016.
[6] Peng, Qiwei, Gongyi Hong, Min Feng, Yuan Xia, Lei Yu, Xu Wang2and, and Yang Li. "Off-position detection based on convolutional neural network." (2016).
[7] Sapana, Miss, K Mishra, and K S Bhagat. 2015. “A Survey on Human Motion Detection and Surveillance.” International Journal of Advanced Research in Electronics and Communication Engineering 4 (4).
[8] Automated Daily Human Activity Recognition for Video Surveillance Using Neural Network Mohanad Babiker1, Othman O. khalifa1, Kyaw Kyaw Htike2, Aisha Hassan1, Muhamed Zaharadeen1 1Department of Electrical and Computer Engineering International Islamic University Malaysia 2Department of Information Technology UCSI University, Malaysia
[9] An Approach of Understanding Human Activity Recognition and Detection for Video Surveillance using HOG Descriptor and SVM Classifier Jagadesh B Assistant Professor, Department of ECE VVCE, Mysuru jagadeesh.b@vvce.ac.in Meghana M N Department of ECE VVCE, Mysuru.
Citation
Arvind Malge, Mallikarjuna Shastry P.M, "Human Activity Classification for Surveillance using Machine Learning and Image Processing Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.343-346, 2019.
RaitaSnehi - A Voice Based Farmer Information System
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.347-352, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.347352
Abstract
India is a nation with more than half of its citizens dependent on agriculture for its survival, but only uses 14 percent of its GDP contribution. The nation has divided portions of land, resulting in a significant number of individual farmers with a nearly stagnant productivity. Despite government actions at both the center and the state level, a gap between land and lab our continues. With over 80% of the entire land holdings of tiny and marginal landowners, Karnataka is no exception. The search engine researchers have focused their efforts for years and years on having search engines that are more accurate and faster. In the past, this was more than enough, But the concept of getting everything intelligent became with smart phone appearance. In this paper we attempted to implement a proposed model of a voice-based farmer information system called ("RaitaSnehi") that provides data on the various schemes that farmers can get from various websites. Based on choices that farmers need to know, the user is prompted to give voice input. The word recognition algorithm is then applied using the Python environment and the recognized word is searched from the website in the parsed data and the details of the required data are read out on demand to the farmer. The word recognition algorithm is implemented, which is the template-based comparative algorithm based on hidden markov model, and the results are checked for accuracy. The words are given in the language of Kannada and the results are obtained in the language of Kannada to make the farmers comfortable. Python translation tool is used to convert English to Kannada and when reading from web sources, these words are converted to text to voice in Kannada Language. Through the document we will explain each portion of the proposed model in detail.
Key-Words / Index Term
Speech Recognition, Hidden Markov Model, Natural Language Processing, Kannada Voice Output
References
[1] Cemal Hanilc¸et.al., (2013). “Speaker Identification From Shouted Speech: Analysis And Compensation”. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 8027 – 8031, 26-31 May 2013. Vancouver, BC, Canada.
[2] Janne Pylkkönen, (2013). “Towards Efficient and Robust Automatic Speech Recognition: Decoding Techniques and Discriminative Training”. In: Aalto University publication series Doctoral Dissertations, 44/2013. ISSN: 1799-4942 (electronic), 1799-4934 (printed), 1799-4934 (ISSN-L). Aalto University, Finland.
[3] Brahim Patel, Dr.Y.Srinivasa Rao “Speech recognition using Hidden Markov Model With MFCC-Subband Technique.” 2010 International Conference on Recent Trends in Information, Telecommunication and Computing
[4] Johan Schalkwyk,et.al.,(2010). “Google Search by Voice: A Case Study”. In: Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics, Springer, pp. 61-90.
[5] Manas A. Pathak, and Bhiksha Raj,(2013).” Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models” In IEEE Transactions on Audio, Speech & Language Processing, Vol.21,No.2,pp. 397-406.
[6] Qin Jin, (2007). “Robust Speaker Recognition”. In: partial fulfillment of the requirements for the degree of Doctor of Philosophy in Language and Information Technologies, Language Technologies Institute School of Computer Science, Carnegie Mellon University , 5000 Forbes Avenue, Pittsburgh, PA 15213.
[7] Shaikh Salleh, et.al.,(2000). “Speaker Recognition Based On Hidden Markov Model”. In: Natiaonal Conference on Telecommunication Technology 2000, 20th - 21st Nov. 2000, Hyatt Regency Hotel, Johor Bahru.
[8] Ciprian Chelba and Alex Acero, “Position specific posterior lattices for indexing speech”, in ACL, Ann Arbor, 2005, pp. 443-450.
[9] Lin-shan Lee and Berlin Chen, “Spoken Document Understanding and Organization”, IEEE Signal Processing Magazine, Special Issue on Speech Technology in Human-machine Communication, Vol. 22, No.5, Sept. 2005, pp.42-60.
[10] C. Chelba, J. Silva, and A. Acero, “Soft indexing of speech content for search in spoken documents computer speech and language”, Computer Speech and Language, vol. 21, no. 3, pp.458-478, July 2007. [11] Z.-Y. Zhou, P. Yu, C. Chelba, and F. Seide, “Towards spoken-document retrieval for the internet: Lattice indexing for large-scale web-search architectures”, in HLT, 2006, pp. 415–422.
[11] C. Chelba, T. J. Hazen, M. Saraclar, “Retrieval and Browsing of Spoken content”, IEEE Signal Processing Magazine, May 2008, pp.39-49.
[12] Y. Wang, D. Yu, Y.-C. Ju, A. Acero, “An Introduction to Voice Search”, IEEE Signal Processing Magazine, May 2008, pp. 29-38.
[13] A. Moreno-Daniel, B.-H. Juang, J. Wilpon, "A scalable method for voice search to nationwide business listings," icassp, pp.3945-3948, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, 2009.
[14] Y. Yaguchi, Y. Watanabe, K. Naruse, R. Oka, “Speech and Sound Search on the Web: System Design and Implementation”, IEEE International Conference on Computer and Information Technology 2007.
[15] J. Mamou, B. Ramabhadran, “Phonetic Query Expansion for Spoken Document Retrieval”, Interspeech 2008, pp. 2106-2109.
[16] Speech Recognition, available at: www.learnartificialneuralnetworks.com/speechrecognition.html.
[17] WikipediA: WWW.Wikipedia.org
Citation
Gourish Malage, Kiran Kumari Patil, "RaitaSnehi - A Voice Based Farmer Information System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.347-352, 2019.
Convolution Neural Network Based Enhanced Learning Classification Using Privileged Information
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.353-357, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.353357
Abstract
The accuracy of data-driven teaching methods is often unsatisfactory when training data are insufficient either in amount or quality. Usually incorporate privileged information (PI), tags, properties or attributes manually labeled to improve the learning of classification. The manual labeling process, however, takes time and works intensively. In addition, manually labeled privileged information may not be rich Sufficient due to personal knowledge limitations. In this approach, classifier learning is enhanced by exploring untagged corporate privileged information (PI), which can effectively eliminate reliance on manually labeled data and enhance privileged information. We treat each selected privileged information as a subcategory in detail and for each subcategory we learn one classifier independently. Classifiers are integrated for all sub-categories to form a more powerful category classifier. In this CNN classifier approach, in particular, to learn the optimum output based on the pictures chosen. The superiority of this proposed approach is demonstrated by extensive experiments on two benchmark data sets.
Key-Words / Index Term
Untagged corpora, Transfer learning, privileged Information, Neural network
References
[1] S. Andrews, I. Tsochantaridis, and T. Hofmann. Support vector machines for multiple-instance learning. Advances in Neural Information Processing Systems, 561–568, 2002.
[2] A. Bergamo and L. Torresani. Exploiting weakly-labeled web images to improve object classification: a domain adaptation approach. Advances in Neural Information Processing Systems, 181–189, 2010.
[3] L. Niu, W. Li, D. Xu, and J. Cai, “Visual recognition by learning from web data via weakly supervised domain generalization,” IEEE Transactions on neural networks and learning systems, 22(9), 1985–1999, 2017.
[4] R. C. Bunescu and R. J. Mooney. Multiple instance learning for sparse positive bags. International Conference on Machine Learning, 105–112, 2007.
[5] P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ramanan. Object detection with discriminatively trained part-based models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(9): 1627– 1645, 2010.
[6] X. Hua and J. Li. “Prajna: Towards recognizing whatever you want from images without image labeling,” AAAI International Conference on Artificial Intelligence, 137–144, 2015.
[7] M. Jager, C. Knoll, and F. Hamprecht, “Weakly supervised learning of a classifier for unusual event detection,” IEEE Transactions on Image Processing, 17(9): 1700–1708, 2008.
[8] J. Fan, Y. Shen, C. Yang, and N. Zhou, “Structured max-margin learning for inter-related classifier training and multilabel image annotation,” IEEE Transactions on Image Processing, 20(3): 837–854, 2011.
[9] Y. Li, S. Wang, Q. Tian, and X. Ding, “Learning cascaded shared-boost classifiers for part-based object detection,” IEEE Transactions on Image Processing, 23(4): 1858–1871, 2014.
[10] A. Coates, H. Lee, and A. Y. Ng. An analysis of single-layer networks in unsupervised feature learning. Ann Arbor, 1001(481): 2, 2010.
[11] S. Andrews, I. Tsochantaridis, and T. Hofmann. Support vector machines for multiple-instance learning. Advances in Neural Information Processing Systems, 561–568, 2002.
[12] F. R. Bach and Z. Harchaoui. Diffrac: a discriminative and flexible framework for clustering. Advances in Neural Information Processing Systems, 49–56, 2008.
[13] Z. Wang and Q. Ji, “Classifier learning with hidden information,” IEEE International Conference on Computer Vision and Pattern Recognition, 4969–4977, 2015
[14] W. Li, L. Niu, and D. Xu, “Exploiting privileged information from web data for image categorization,” European Conference on Computer Vision, 437–452, 2014.
[15] M. Hoai and A. Zisserman. Discriminative sub-categorization. IEEE International Conference on Computer Vision and Pattern Recognition, 1666–1673, 2013.
[16] X. Wang, B. Wang, X. Bai, W. Liu, and Z. Tu. Max-margin multipleinstance dictionary learning. International Conference on Machine Learning, 846–854, 2013.
[17] M. Ristin, J. Gall, M. Guillaumin, and L. Van Gool. From categories to subcategories: large-scale image classification with partial class label refinement. IEEE International Conference on Computer Vision and Pattern Recognition, 231–239, 2015.
[18] G. A. Miller. Wordnet: a lexical database for english. Communications of the ACM, 38(11): 39–41, 1995.
[19] Y. Luo, D. Tao, B. Geng, C. Xu, and S. Maybank, “Manifold regularized multitask learning for semi-supervised multilabel image classification,” IEEE Transactions on Image Processing, 22(2): 523–536, 2013.
[20] Y. Gao, R. Ji, W. Liu, Q. Dai, and G. Hua, “Weakly supervised visual dictionary learning by harnessing image attributes,” IEEE Transactions on Image Processing, 23(12): 5400–5411, 2014.
[21] N. Doulamis and A. Doulamis, “Semi-supervised deep learning for object tracking and classification,” IEEE International Conference on Image Processing, 848–852, 2014.
[22] G. Carneiro, A. Chan, P. Moreno, and N. Vasconcelos, “Supervised learning of semantic classes for image annotation and retrieval,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(3):394–410, 2007.
[23] Y. Gao, R. Ji, W. Liu, Q. Dai, and G. Hua, “Weakly supervised visual dictionary learning by harnessing image attributes,” IEEE Transactions on Image Processing, 23(12): 5400–5411, 2014.
Citation
Hardikkumar M. Dhaduk, Mallikarjuna Shastry P.M, "Convolution Neural Network Based Enhanced Learning Classification Using Privileged Information," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.353-357, 2019.
Effectiveness of Knowledge Management in Software Industries – An Empirical Study
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.358-363, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.358363
Abstract
The main aim of this study is to analyse the effectiveness of Knowledge Management in Software Industries. The Knowledge Management dimensions which could influence the organizational effectiveness have been identified. Metric to measure the relationship between these Knowledge Management dimensions has been developed. To test the hypotheses, a sample size of 254 software company employees has been collected and Partial Least Square technique of Structural Equation Modelling (SEM) has been used to investigate the empirical relationships between the different identified dimensions. Questionnaires were distributed to 300 employees of different software companies through Google Form. Response rate of 72% (254 employees responded) was achieved in the survey. The testing of hypotheses justified that in terms of organizational effectiveness, the identified dimensions of Knowledge Management are the critical success factors. Implications of the study would enable the Human Resource managers to make their Knowledge Management process more powerful for the enhancement of effectiveness of the organization. It may not be possible to generalize the results for the full extent, as the study limits itself to the number of software industries. All the limitations of statistical testing and modelling and simulation are applicable to this research.
Key-Words / Index Term
Knowledge Management, Software Industries, Employees, Questionnaire, Organizational Effectiveness, Structural Equation Modelling
References
[1]. Liebowitz, J. (1999). “Key ingredients to the success of an organization’s knowledge management strategy”, Knowledge and Process Management, 6(1), 37–40.
[2]. Asish O. Mathew, Lewlyn L. R. Rodrigues, Alapati Vittaleswar “Human Factors & Knowledge Management : A System Dynamics Based Analysis”, Journal of Knowledge Management Practice, Vol. 13, No. 2, 2012.
[3]. Kimiz Dalkir “Knowledge Management in Theory and Practice” McGill University, 2005.
[4]. Nonaka I., Byosiere P., Borucki, C. C., & Konno N. “Organizational knowledge creation theory: a first comprehensive test”. International Business Review, 3(4), 337-351, 1994.
[5]. Tracy A. Hurley, Carolyn W. Green “Knowledge Management And The Nonprofit Industry: A Within And Between Approach”. Journal of Knowledge Management Practice, 2005.
[6]. Aurum, A., Daneshgar, F., & Ward, J. “Investigating Knowledge Management practices in software development organisations” – An Australian experience. Information and Software Technology, 50(6), 511-533, 2008.
[7]. William R. King, “Knowledge Management and Organizational Learning”, University of Pittsburgh, 2009.
[8]. Maen Alhawari, Arab Academy for Financial and Banking Sciences, Jordan, “The Importance of The Four Knowledge Management Styles To Industry: Using The HSD Post Hoc Test” Journal of Knowledge Management Practice, Vol. 8, No. 3, September 2007.
[9]. Azad, N., & Mehrabi Majolan, E. “A study on effects of knowledge management on organizational entrepreneurship”: A case study of educational system. Management Science Letters, 2(8), 2711–2716, 2012.
[10]. Davenport, T.H, and Prusak, L. “Working Knowledge: How Organizations Manage What They Know”, Boston, Massachusetts: Harvard Business School Press, 1998.
[11]. Aybüke Aurum, Ross Jeffery, Claes Wohlin, Meliha Handzic, “Managing Software Engineering Knowledge” 2003.
[12]. Hung, Y. C., Huang, S. M., & Lin, Q. P. “Critical factors in adopting a knowledge management system for the pharmaceutical industry”. Industrial Management & Data Systems, 105(2), 164-183, 2005.
[13]. Sabry M. Abd-El-Fattah, Hessa Abdulrahman Fakhroo, “The Relationship among Paternal Psychological Control and Adolescents’ Perfectionism and Self-Esteem: A Partial Least Squares Path Analysis”, Psychology, Vol.3 No.5, May 24, 2012.
[14]. Barclay D.; Higgins, C.; Thompson, R. “The partial least squares (PLS) approach to casual modeling: Personal computer adoption and use as illustration”. Technol. Stud., 2, 285–309, 1995.
[15]. Diamantopoulos, A.; Siguaw, J.A. “Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration”. Br. J. Manag.,17, 263–282, 2006.
Citation
Rekha M, Lewlyn L R. Rodrigues, "Effectiveness of Knowledge Management in Software Industries – An Empirical Study," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.358-363, 2019.
Package Level Test Case Minimization for Bug Prediction using Linear Regression Machine Learning Approach
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.364-370, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.364370
Abstract
With the growing complexities in Object Oriented (OO) software, the number of bugs present in the software module is increased. In this paper, a technique has been presented for minimization of test cases for the OO systems. The Camel 1.6.1 open source software was used the evaluation of proposed technique. The mathematical model used in the proposed methodology was generated using the open source software WEKA by selecting effective Object Oriented (OO) metrics. Ineffective and effective Object Oriented metrics were recognized by using the techniques based on feature selection to generate test cases that cover fault proneness classes of the software. The defined methodology used only effective metrics for assigning weights to test paths for minimization. The results show the significant improvements.
Key-Words / Index Term
Camel 1.6.1, Test Case Minimization, WEKA
References
[1] P. Mandal and A. S. Ami, “Selecting Best Attributes for Software Defect Prediction,” no. December 2015, 2019.
[2] S. Puranik, P. Deshpande, and K. Chandrasekaran, “A Novel Machine Learning Approach for Bug Prediction,” Procedia Computer Science, vol. 93, pp. 924–930, 2016.
[3] S. Prateek, A. Pasala, and L. M. Aracena, “Evaluating Performance of Network Metrics for Bug Prediction in Software,” no. December 2013, 2017.
[4] “Promise repository,” 2014. [Online]. Available: http://openscience.us/repo/defect/ck/. [Accessed: 26-Mar-2018].
[5] A. Singh, R. Bhatia, and A. Singhrova, “Taxonomy of machine learning algorithms in software fault Taxonomy of machine learning algorithms in software fault prediction using object oriented metrics prediction using object oriented metrics,” Procedia Computer Science, vol. 132, pp. 993–1001, 2018.
[6] M. Akour and L. Abuwardih, “Test Case Minimization using Genetic Algorithm : Pilot Study,” 8th International Conference on Computer Science and Information Technology (CSIT), pp. 66–70, 2018.
[7] D. L. A. L. Gupta and K. Saxena, “Software bug prediction using object-oriented metrics,” vol. 42, no. 5, pp. 655–669, 2017.
[8] R. Ferenc, “Empirical Validation of Object-Oriented Metrics on Open Source Software for Fault Prediction,” vol. 31, no. 10, pp. 897–910, 2005.
[9] A. Boucher and M. Badri, "Predicting Fault-Prone Classes in Object-Oriented Software: An Adaptation of an Unsupervised Hybrid SOM Algorithm," IEEE International Conference on Software Quality, Reliability and Security (QRS), pp. 306-317, 2017.
[10] S. K. Mohapatra and S. Prasad, "Minimizing test cases to reduce the cost of regression testing," IEEE international Conference on Computing for Sustainable Global Development (INDIACom), pp. 505-509, 2014.
[11] S. Ali, Y. Li, T. Yue and M. Zhang, "An Empirical Evaluation of Mutation and Crossover Operators for Multi-Objective Uncertainty-Wise Test Minimization," IEEE/ACM 10th International Workshop on Search-Based Software Testing (SBST), Buenos Aires, 2017, pp. 21-27, 2017.
[12] A. S. A. Ansari, K. K. Devadkar and P. Gharpure, "Optimization of test suite-test case in regression test," IEEE International Conference on Computational Intelligence and Computing Research, Enathi, 2013, pp. 1-4, 2013.
[13] O. Banias, “Dynamic programming optimization algorithm applied in test case selection,” International Symposium on Electronics and Telecommunications (ISETC), pp. 1–4, 2018.
[14] K. Choudhary and G. N. Purohit, "A Multi-Objective optimization algorithm for uniformly distributed generation of test cases," IEEE International Conference on Computing for Sustainable Global Development (INDIACom), pp. 455-457, 2014.
[15] R. Khan, M. Amjad and A. K. Srivastava, "Optimization of Automatic Generated Test Cases for Path Testing Using Genetic Algorithm," 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), pp. 32-36, 2016.
[16] S. Sun, X. Hou, C. Gao and L. Sun, "Research on optimization scheme of regression testing," Ninth International Conference on Natural Computation (ICNC), pp. 1628-1632, 2013.
[17] P. A. Vikhar, "Evolutionary algorithms: A critical review and its future prospects," International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), pp. 261-265, 2017.
[18] V. Gupta, N. Ganeshan and Tarun K. Singhal, “Developing Software Bug Prediction Models Using Various Software Metrics as the Bug Indicators,” International Journal of Advanced Computer Science and Applications, Vol. 6, no. 2, 2015.
[19] R. Singh, A. Singhrova, and R. Bhatia, “Optimized Test Case Generation for Object Oriented Systems Using Weka Open Source Software,” International Journal of Open Source Software and Processes, vol. 9, no. 3, pp. 15–35, Jul. 2018.
[20] R. Singh, R. K. Bhatia, and A. Singhrova, “Demand Based Test Case Generation for Object Oriented Systems,” IET Software, 2019.
Citation
Divya Taneja, Rajvir Singh, Ajmer Singh, "Package Level Test Case Minimization for Bug Prediction using Linear Regression Machine Learning Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.364-370, 2019.