Artificial Intelligence Powering Internet of Things
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.449-456, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.449456
Abstract
Abstract— The IOT concept came into existence in 1999 and from there it has grown into one of the most important parts of the new fields and technologies sector. Artificial Intelligence being included to the IOT systems is the next step and it is being used in daily life. This technology is used in various fields and it is a wide range concept which can be used anywhere. Artificial intelligence is the first and most popular option to manipulate huge data outflow and storage within the IOT community. Currently IOT is most popular with cutting edge sensors and high speed internet which are all included in a microcontroller. The streams of data flowing through Internet gather sensor and customer data which are sent and attain by terminals or workstations. With sudden popularity of cutting edge sensors and workstations, some data can have problems on storage, delays, routing problems with its network traffic etc. To avoid all these problems, many techniques have been recommended in the past 4 years and in that AI algorithms are the most accurate solution to the data mining, management and control in handling network traffic. When the Internet of Things is power-driven by AI, then it is known as Intelligent IOT. In this paper we will review the basic components of Intelligent IOT and some vital system fields where it is used. We examine the role of AI strategies to enable such networks with intelligent communication. This paper is targeted on evaluating current solutions for the intelligent IOT connected and communicating with each other. It conveys AI techniques and algorithms which are used to create such intelligent IOT, and network solutions to use the advantages given by such capabilities.
Key-Words / Index Term
IoT Applications, Smart Homes, Smart Buildings, Smart Manufacturing, Smart Healthcare, Intelligent IOT, Artificial Intelligence, Machine Learning
References
[1] Aneta Maranda, Daniel Kaczmarek, “Selected methods of artificial intelligence for Internet of Things conception”, 2015.
[2] Artur Arsenio, Fernando Nabais, “Internet of Intelligent Things: Bringing Artificial Intelligence into Things and Communication Networks”, August 2014.
[3] Bharti Nathani, Rekha Vijayvergia, “The Internet of Intelligent Things: An Overview”, Dec 2017.
[4] Zeinab Kamal Aldein Mohammed, Elmustafa Sayed Ali Ahmed, “Internet of Things Applications, Challenges and Related Future
Technologies”, Jan 2017.
[5] Pallavi Sethi, Smruti R. Sarangi, “Internet of Things: Architectures,
Protocols, and Applications”, Jan 2017.
[6] https://www.pwc.com/gx/en/industries/communications/assets/pwc-ai- and-iot.pdf
Citation
Suhasini Vijaykumar, Avinash Yadav, "Artificial Intelligence Powering Internet of Things," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.449-456, 2019.
EMD Based Speech Reconstruction for Different Assamese Dialect
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.457-461, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.457461
Abstract
In this paper, reconstruction of speech signal is performed using a novel technique Empirical Mode Decomposition (EMD). EMD is mainly applicable for non-linear and non –stationary signals and therefore applicable for speech which is non linear and non-stationary. EMD is applied for finding the glottal source signal of speech which provide us the source information and then vocal tract filter is found out and original speech is reconstructed. Speech samples are collected from different Assamese dialect and the experimental result derived establishes the effectiveness of the proposed method
Key-Words / Index Term
Speech, Empirical Mode Decomposition (EMD), Intrinsic Mode Function (IMF), Fourier Transform (FT)
References
[1] A. Bouzid, N. Ellouze, “ EMD Vocal Tract Frequency Analysis of Speech Signal”, 4th International Conference Sciences of Electronic, Technologies of Information and Telecommunications , PP TUNISIA
[2] S. S. Sheth ,“Extraction of Pitch from Speech Signals using Hilbert Huang Transform”.
[3] B. M. Battista, C. Knapp, T. McGee, and V. Goebel, Application of the empirical mode decomposition and Hilbert-Huang transform to seismic reflection data, Geophysics , vol72, PP 29-37, 2007.
[4] T. Hasan and Md. K. Hasan, “Suppression of Residual Noise From Speech Signals Using Empirical Mode Decomposition", IEEE Signal Processing Letters, vol 16, no. 1, Jan 2009.
[5] G. Schlotthauer, M. E. Torres and H. L. Rufiner, “A New Algorithm For Instantaneous F0 Speech Extraction Based On Ensemble Empirical Mode Decomposition”, 17th European Signal Processing Conference (EUSIPCO 2009), 2009.
[6] P. Heydarian and J. D. Reis , “Extraction Of Long-Term Structures In Musical Signals Using The Empirical Mode Decomposition", Proc. of the 8th Int. Conference on Digital Audio Effects (DAFX-05), Madrid, Spain, 2005.
[7] G. Schlotthauer, M. E. Torres and H. L. Rufiner, “Voice Fundamental Frequency Extraction Algorithm Based on Ensemble Empirical Mode Decomposition and Entropies”, Proc. of the World Congress on Medical Physics and Biomedical Engineering, Germany,2009
[8] J. W. Huang and B. Milkereit, “Empirical Mode Decomposition Based Instantaneous Spectral Analysis and its Applications to Heterogeneous Petrophysical Model Construction’’, joint convention of CSPG, CSEG and CWLS, 2009.
[9] G. Rilling , P. Flandrin ,P. Goncalves, “Empirical Mode Decomposition as a Filter Bank”, IEEE Signal Processing Letters, vol. 11, Issue 2, pp- 112 - 114, 2004.
[10] O. Douglas: “Speech communication Human and Machine", IEEE Press, 2nd Ed., , 2000
[11] L. R. Rabiner and and B. H. Juang: “Fundamentals of Speech Recognition", Prentice-Hall, 1993.
[12] N. Goswami, M. Sarma, K.K.Sarma, "Reconstruction of Speech Signal using Empirical Mode Decomposition Based Glottal Source Extraction", In Proceedings of 1st IEEE International Conference on Emerging Trends and Application in Computer Science, pp 27-32, Shillong, India, 2013.
[13] N. Goswami, M. Sarma and K.K.Sarma, "Empirical Mode Decomposition Based Reconstruction of Speech Signal in Noisy Environment", IEEE International Conference on Signal Processing and Integrated Network, Noida, India, 2014.
[14] N. Goswami, M. Sarma and K.K.Sarma,"Effective Speech Signal Reconstruction Technique using Empirical Mode Decomposition Under Various Conditions", Recent Trends in Intelligent and Emerging system Design, Springer, 2015.
Citation
Nisha Goswami , "EMD Based Speech Reconstruction for Different Assamese Dialect," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.457-461, 2019.
Context-Aware Local Binary Feature Learning : An Approach For Face Recognition
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.462-465, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.462465
Abstract
This system uses Context-Aware Local Binary Feature Learning (CA-LBFL) Method for face recognition. Learning based methods such as DFD and CBFD learn features representation from raw pixel and they are more susceptible to noise where existing local feature descriptors are hand crafted and they require strong prior knowledge and heuristic. Proposed system uses contextual information for face recognition because context provides strong prior knowledge. It helps to enhance the robustness and stableness of various visual analysis tasks. to jointly learn multiple projections matrices for mapping we make use of context-aware local binary multi-scale feature learning (CA-LBMFL), where each projection matrix corresponds to a specific scale of pixel difference vector (PDV). PDVs are extracted from image and stored in a text file in the binary form. Face recognition is performed on the basis of this extracted features. For heterogeneous face matching we implement coupled learning methods based on CA-LBFL and CA-LBMFL. Experimental result is based on two widely used datasets LWF and YTF.
Key-Words / Index Term
Face representation,Face recognition,Heterogenous face,Context-Aware,Binary feature learning
References
[1] Yueqi Duan, Jianjiang Feng, Jie Zhou “Context-Aware Local Binary Feature Learning for Face Recognition”, IEEE Transaction Pattern Analysis and Machine Intelligence, DOI 10.1109 / TPAMI. 2017.2710183
[2] T. Ahonen, A. Hadid, and M. Pietikainen. Face description with local binary patterns: Application to face recognition. TPAMI, 28(12):2037–2041, 2006.
[3] binary patterns: Application to face recognition. TPAMI, 28(12):2037– 2041, 2006.
[4] Y.Bengio,P.Lamblin,D.Popovici and H.Larochelle.Greedy Layerwise training of deep networks,In NIPS
[5] E.Meyers and L.Wolf .using biologically inspired feature for face processing.IJCV,76(1):93-104,2008.
[6] P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman. Eigenfaces vs.
Fisherfaces: Recognition using class specific linear projection. TPAMI, 19(7):711–720, 1997.
[7] Z. Lei, S. Z. Li, R. Chu, and X. Zhu. Face recognition with local Gabor textons. In ICB, pages 49–57. 2007.
[8] Q. V. Le, A. Karpenko, J. Ngiam, and A. Y. Ng. ICA with reconstruction cost for efficient overcomplete feature learning. In NIPS, pages 1017– 1025, 2011.
[9] Z. Cao, Q. Yin, X. Tang, and J. Sun. Face recognition with learning based descriptor. In CVPR, pages 2707–2714,2010.
[10] X. Cao, D. Wipf, F. Wen, G. Duan, and J. Sun. A practical transfer
learning algorithm for face verification. In ICCV, pages 3208–
3215,2013.
[11] C. Liu and H. Wechsler. Gabor feature based classification using the enhanced Fisher linear discriminant model for face recognition.TIP, 11(4):467–476, 2002.
[12] J. Lu, V. E. Liong, and J. Zhou. Simultaneous local binary feature learning and encoding for face recognition. In ICCV, pages 3721– 3729,2015
[13] D. Lin and X. Tang. Inter-modality face recognition. In ECCV,pages 13–26. 2006.
[14] A. Mignon and F. Jurie. CMML: a new metric learning approach for cross modal matching.In ACCV,pages 14–27, 2012.
[15] O. M. Parkhi, A. Vedaldi, and A. Zisserman. Deep face recognition.in BMVC, volume 1, pages 1–12, 2015.
[16] ] H. K. Galoogahi and T. Sim. Inter-modality face sketch recognitionin ICME , pages 224–229, 2012.
[17] X. Gao, J. Zhong, J. Li, and C. Tian. Face sketch synthesis algorithm based on E-HMM and selective ensemble. TCSVT, 18(4):487–496, 2008
[18] M. Turk and A. Pentland. Eigenfaces for recognition.Journal of CognitiveNeuroscience,3(1):71–86,1991.
[19] Z. Lei, M. Pietikainen, and S. Z. Li. Learning discriminant face descriptor. TPAMI, 36(2):289–302, 2013.
[20] G. E. Hinton, S. Osindero, and Y.-W. Teh. A fast learning algorithm for deep belief nets. Neural Computation, 18(7):1527–1554, 2006.
[21] D. G. Lowe. Distinctive image features from scale-invariant keypoints.IJCV, 60(2):91–110, 2004.
[22] H. Bay, T. Tuytelaars, and L. Van Gool. SURF: Speeded up robustfeatures. In ECCV, pages 404–417, 2006.
[23] G. Sharma, S. ul Hussain, and F. Jurie. Local higher-order statistics (LHS) for texture categorization and facial analysis. In ECCV, pages 1-12-2012.
[24] G. B. Huang, H. Lee, and E. Learned-Miller. Learning hierarchical representations for face verification with convolutional deep belief network. In CVPR, pages 2518–2525, 2012.
[25] S. Rifai, P. Vincent, X. Muller, X. Glorot, and Y. Bengio. Contractive auto-encoders : Explicit invariance during feature extraction. In ICML,pages 833–840, 2011.
[26] E. Rublee, V. Rabaud, K. Konolige, and G. Bradski. ORB: An efficient alternative to SIFT or SURF. In ICCV, pages 2564–2571, 2011.
[27] G. Huang, M. Ramesh, T. Berg, and E. Learned-Miller.Labeled faces in the wild: A database for studying face recognition in unconstrained environment . Technical report, 07-49, UMass Amherst, 2007.
[28] L. Wolf, T. Hassner, and I. Maoz. Face recognition in unconstrained video with matched background similarity. In CVPR, pages 529–534,201
[29] J. Lu, V. E. Liong, Z. Xiuzhuang, and J. Zhou. Learning compact binary face descriptor for face recognition. TPAMI, pages 2041–2056, 2015.
[30] M. Turk and A. Pentland. Eigenfaces for recognition. Journal of
Cognitive Neuroscience, 3(1):71–86, 1991.
[31] G.Sowmiya , V. Kumutha.Facial Expression Recognition Using Static Facial Image. Isroset-Journal Vol.6 , Issue.2 , pp.72-75, Apr-2018
[32] Takrim Ul Islam Laskar , Parismita Sarma.Facial Landmark Detection for Expression Analysis .IJCSE Journal,Volume-7 , Issue-5 , Page no. 1617-1622, May-2019.
Citation
Sushmitamai K. Ahire, Nilesh R. Wankhade, "Context-Aware Local Binary Feature Learning : An Approach For Face Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.462-465, 2019.
Person Re-identification with feature Aggregation
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.466-469, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.466469
Abstract
Person Re-identification (re-ID) is a critical problem in video analytics applications such as security and surveillance. Although many approaches have been proposed, it remains a challenging problem since persons appearance usually undergoes dramatic changes across camera views due to changes in view angle, body pose and background clutter. Person re-id aims to retrieve a person of interest across spatially disjoint cameras. The system focuses on tackling the person re-ID problem with the proposed metric learning scheme. There is a discriminant metric learning strategy for this testing issue. Most existing metric learning algorithms, it takes both original data and auxiliary data during training which is motivated by the new machine learning paradigm - Learning Using Privileged Information. This system is based on features aggregation. Image dataset is load and the basic operation is performing that is to convert those load images into gray scale. And also create the HOG (Histogram of oriented gradient) descriptor, in this features extraction task completed based on EHD (Edge of histogram descriptor), CLD (Color Layout descriptor), and SCD (Scale Color descriptor). The system aggregates all Features and Generate Train metric. After that an unknown image is load which is comes through gray scale process and HOG descriptor. Classify that images and identify the correct image. Such system is used in many sectors for security purpose
Key-Words / Index Term
Person Re-identification, Metric Learning, Feature Aggregation, HOG descriptor
References
[1] Xun Yang, Meng Wang, Dacheng Tao, “Person Re-identification with Metric Learning using Privileged Information”, IEEE transactions on Image processing, 2017.
[2] L. Zheng, Y. Yang, and A. G. Hauptmann, “Person re-identification: Past, present and future”, arXiv preprint arXiv: 1610.02984, 2016.
[3] T. Matsukawa, T. Okabe, E. Suzuki, and Y. Sato, “Hierarchical Gaussian descriptor for person re-identification”, in IEEE Conference on Computer Vision and Pattern Recognition, pp. 13631372,2016.
[4] S. Liao, Y. Hu, X. Zhu, and S. Z. Li, “Person re-identification by local maximal occurrence representation and metric learning”, in IEEE conference on Computer Vision and Pattern Recognition, pp. 21972206, 2015.
[5] A. Mignon and F. Jurie, Pcca, “A new approach for distance learning from sparse pairwise constraints”, in IEEE Conference on Computer Vision and Pattern Recognition, pp. 26662672, 2012.
[6] S. Liao and S. Z. Li, “Efficient psd constrained asymmetric metric learning for person re-identification”, in IEEE International Conference on Computer vision, pp. 36853693, 2015.
[7] L. Ma, X. Yang, and D. Tao, “Person re-identification over camera networks using multi-task distance metric learning”, IEEE Transactions on Image Processing.
[8] L. Zhang, T. Xiang, and S. Gong, “Learning a discriminative null space for person re-identification”, in IEEE Conference on Computer Vision and Pattern Recognition, 2016.
[9] M. Kstinger, M. Hirzer, P. Wohlhart, P. M. Roth, and H. Bischof, “Large scale metric learning from equivalence constraints”, in IEEE Conference on Computer Vision and Pattern Recognition, pp. 22882295, 2012.
[10] S. Paisitkriangkrai, C. Shen, and A. van den Hengel, “Learning to rank in person re-identification with metric ensembles”, in IEEE Conference on Computer Vision and Pattern Recognition, pp. 18461855, 2015.
[11] Z. Li, S. Chang, F. Liang, T. S. Huang, L. Cao, and J. R. Smith, “Learning locally-adaptive decision functions for person verification”, in IEEE Conference on Computer Vision and Pattern Recognition, pp. 36103617, 2013.
[12] Xiong, M. Gou, O. Camps, and M. Sznaier, “Person re-identification using kernel-based metric learning methods”, in European Conference on Computer Vision, pp. 116,2014.
[13] E. P. Xing, M. I. Jordan, S. Russell, and A. Y. Ng, “Distance metric learning with application to clustering with side-information”, in NIPS, pp. 505–512, 2002.
[14] A. Globerson and S. T. Roweis, “Metric learning by collapsing classes”, in NIPS, pp. 451–458, 2005.
[15] M. Schultz and T. Joachims, “Learning a distance metric from relative comparisons,” in NIPS, 2004.
[16] J. V. Davis, B. Kulis, P. Jain, S. Sra, and I. S. Dhillon, “Information theoretic metric learning,” in ICML, pp. 209–216, 2007.
[17] C. Jose and F. Fleuret, “Scalable metric learning via weighted
Approximate rank component analysis”, in European Conference
on Computer Vision. Springer, pp. 875–890, 2016.
[18] H. Liu, J. Feng, M. Qi, J. Jiang, and S. Yan, “End-to-end
Comparative attention networks for person re-identification”,
IEEE Transactions on Image Processing, 2017.
Citation
Madhavi Dayaram Bhamare, Nilesh R. Wankhade, "Person Re-identification with feature Aggregation," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.466-469, 2019.
Content Based Image Retrieval System
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.470-475, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.470475
Abstract
This paper proposes a new classifier named Extreme Learning Machine (ELM) on a hybrid framework for developing a Content Base Image Retrieval (CBIR) system to improve the accuracy problems faced with the earlier image retrieval system. This system mainly aims towards the accuracy with less consumption of time. In this system, Wang database is used with Local Binary Pattern (LBP), color moment, canny edge and region props for the extraction of texture, color, edge and shape feature respectively. After extracting all the features from the image, distance matrix will be determined to use it for further implementation. And then ELM classifier is used in this proposed CBIR to categorize all the images. Score Level Fusion is used as similarity measure for finding similar images. The obtained results proved that the accuracy and efficiency of CBIR system increased at a very high rate after using ELM classifier in terms of precision, recall, f-measure and retrieval time than just using similarity measure of the extraction features. The elapsed time and the average precision value is 0.277391 and 97.2500 respectively which is much accurate than the state-of-the-art techniques.
Key-Words / Index Term
CBIR, color moment, canny edge detection, Local Binary Pattern(LBP), Extreme Learning Machine (ELM), Score Level Fusion
References
[1] L. K. Pavithra and T. S. Sharmila, “An efficient framework for image retrieval using color , texture and edge features R,” Comput. Electr. Eng., vol. 70, pp. 580–593, 2018.
[2] Mahajan, A. D., & Chaudhary, S. (2018). International Journal of Computer Sciences and Engineering Open Access Hybrid Features For Content Based Image Retrieval System, (10), 11–15.
[3] Samraj, J., & Dhivya, R. (2019). A Survey on Local and Global Feature Extraction Techniques in Content Based Medical Image Retrieval, (March), 251–265.
[4] Chavda, S. M., & Goyani, M. M. (2019). Survey Paper Recent evaluation on Content Based Image Retrieval, (4).
[5] Jeyakumar, M. N., & Samraj, J. (2019). Performance Analysis of Various Classifiers with Effective Dimensionality Reduction in Content-Based Image Retrieval, (March), 172–180.
[6] C. Paper and K. Kumar, “CBIR : Content Based Image Retrieval CBIR : Content Based Image Retrieval,” no. June, 2014.
[7] S. L. Dudhe, “‘ An ABIR And CBIR Fusion Based Techniques For Associated Image Retrieval ,’” pp. 3–7, 2016.
[8] M. Kaipravan, “A Novel CBIR System Based on Combination of Color Moment and Gabor Filter,” 1990.
[9] K. Kumar and J. Li, “COMPLEMENTARY FEATURE EXTRACTION APPROACH IN CBIR,” pp. 2–7.
[10] I. Conference, “CBIR by Cascading Features & SVM,” 2017.
[11] J. Pradhan, S. Kumar, A. K. Pal, and H. Banka, “CO CO,” Digit. Signal Process., vol. 1, pp. 1–24, 2018.
[12] C. Celik and H. Sakir, “Content based image retrieval with sparse representations and local feature descriptors : A comparative study,” Pattern Recognit., vol. 68, pp. 1–13, 2017.
[13] S. Mazharul, M. Banerjee, and S. Bhattacharyya, “Content-based image retrieval based on multiple extended fuzzy-rough framework,” Appl. Soft Comput. J., vol. 57, pp. 102–117, 2017.
[14] Deole, Pragati Ashok, and R. U. S. H. I. Longadge. "Content-based image retrieval using color feature extraction with KNN classification." IJCSMC 3.5 (2014): 1274-80.
[15] Katare, A., S. K. Mitra, and A. Banerjee. "Content-based Image Retrieval System for Multi Object Images Using Combined Features." 2007 International Conference on Computing: Theory and Applications (ICCTA`07).
Citation
Kajol Dahiya, Gaurav Gautam, "Content Based Image Retrieval System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.470-475, 2019.
Review on Smart Drip Irrigation and Fertigation using IOT & WSN
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.476-478, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.476478
Abstract
In agriculture, despite large-scale funding with extension of irrigation services and it is a major concern that many sectors are facing deficits in management of water. Irrigation system is one of the major aspects to be enriched meeting the economic and sustainable challenges of the farmers. Recent trends in the area of Wireless Sensor Networks (WSN) have influenced a wide implementation of various applications in the area of precise agriculture. WSNs for environmental condition monitoring with defined knowledge are used for estimating crop growth and yield properties. The proposed system automates the irrigation and fertigation using WSN to make comparatively high yield than the traditional methods. Irrigation scheduling is estimated by use of WSNs real time monitoring of weather and soil properties. The exigent need for solving the constraints, Evapotranspiration (ET) system is integrated with irrigation module which uses Penman-Monteith FAO-56 model for calculating crop water need. The disadvantages of traditional agricultural systems remove by utilizing water resource efficiently. As a result, the proposed system helps in water conservation to a great extent and also reduces soil erosion as only the required fertilizers are injected via the drip system. The paper also includes the implementation and results of surface drip irrigation and sub-surface drip irrigation are implemented in maize and sugarcane field respectively.
Key-Words / Index Term
irrigation System, WSN, Crop Selection
References
[1] N Seenu Manju Mohan Jeevanath V S, “Android Based Intelligent Irrigation System”, International Journal of Pure and Applied Mathematics Volume 119 No. 7 2018, 67-71
[2] Akshay Atole, Apurva Asmar, Amar Biradar, Nikhil Kothawade, Sambhaji Sarode Rajendra G. Khope “Iot Based Smart Farming System” Journal of Emerging Technologies and Innovative Research (JETIR) April 2017, Volume 4, Issue 04.
[3] Nikesh Gondchawar1, Prof. Dr. R. S. Kawitkar “IoT based Smart Agriculture” International Journal of Advanced Research in Computer and Communication Engineering IJARCCE Vol. 5, Issue 6, June 2016.
[4] Drishti Kanjilal, Divyata Singh, Rakhi Reddy, and Prof Jimmy Mathew “Smart Farm: Extending Automation to The Farm Level” International Journal Of Scientific & Technology Research Volume 3, Issue 7, July 2014.
[5] 1 Dr.N.Suma,2 Sandra Rhea Samson,3 S.Saranya, 4 G.Shanmugapriya,5 R. Subhashri “IOT Based Smart Agriculture Monitoring System” International Journal on Recent and Innovation Trends in Computing and Communication IJRITCC | February 2017 Volume: 5 Issue: 2 177 – 181, 177.
[6] Vaishali S, Suraj S, Vignesh G, Dhivya S and Udhayakumar S “Mobile Integrated Smart Irrigation Management and Monitoring System Using IOT” International Conference on Communication and Signal Processing, April 6-8, 2017, India.
[7] Prathibha S R1, Anupama Hongal 2, Jyothi M P, “IOT BASED MONITORING SYSTEM IN SMART AGRICULTURE” 2017 International Conference on Recent Advances in Electronics and Communication Technology IEEE2017.
[8] Mrs.S.Devi Mahalakshmi, Rajalakshmi.P “IOT Based Crop-Field Monitoring and Irrigation Automation”.
[9] Jason Parmenter, Alex N. Jensen, and Steve Chiu “Smart Irrigation Controller” 978-1-4799-4774-4/14 ©2014 IEEE.
[10] Ramkumar.R#1 Kaliappan.S*2 Vignesh.L#3 “IoT Based Smart Irrigation System using Image Processing” SSRG International Journal of Electrical and Electronics Engineering (SSRG-IJEEE) – volume 4 Issue 3 – March 2017 Page 5.
[11] John A. Stankovic, Life Fellow, “Research direction for the Internet of Things”IEEE, 2014.
[12] C.Zhu, V.Leung, L. Shu and E. C. H Ngai, “Green Internet of Things for smart world”IEEE, 2015, vol. 3, pp.2151-2162.
[13] Prathibha S R1, Anupama Hongal 2, Jyothi M “Iot based monitoring system in Smart agriculture”, IEEE, 2017.
[14] Carlos cambra et al., “An IoT service oriented system for agriculture monitoring” IEEE ICC 2017. [20] R. Nageswara Rao et al., “Iot Based Smart Crop-Field Monitoring And Automation Irrigation System” IEEE, ICISC 2018.
Citation
M. M. Sardeshmukh, Vrushali Warkhedkar, "Review on Smart Drip Irrigation and Fertigation using IOT & WSN," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.476-478, 2019.
Performance Analysis of Dense Micro-block Difference and SURF Method for Texture Classification
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.479-482, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.479482
Abstract
The paper proposes a novel picture portrayal for surface characterization. The ongoing headways in the field of fix based highlights compressive detecting and highlight encoding are joined to plan a hearty picture descriptor. In our methodology, we initially propose the neighbourhood highlights, Dense Micro-square Difference (DMD), which catches the nearby structure from the picture patches at high scales. Rather than the pixel we process the little squares from pictures which catch the miniaturized scale structure from it. DMD can be figured productively utilizing vital pictures. The highlights are then encoded utilizing Fisher Vector strategy to get a picture descriptor which thinks about the higher request measurements. The proposed picture portrayal is joined with straight SVM classifier. The analyses are led on the standard surface datasets (KTH-TIPS-2a, Brodatz, and Curet). On KTH-TIPS-2a dataset the proposed strategy beats the best revealed outcomes by 5.5% and has a practically identical exhibition to the best in class techniques on the different datasets.
Key-Words / Index Term
Compressive Sensing, Descriptors,SURF, Texture classification
References
[1] Anastasia Dubrovina, Pavel Kisilev, Daniel Freedman, Sagi Schein, Ruth Bergman “Efficient and robust image descriptor for GUI object classification” Copyright 2011 Hewlett-Packard Development Company, L.P.
[2] Li Liu & Pawl W. Fiegnth, “Texture Classification from Random Features,” IEEE Transactions on Pattern Analysis & Machine Intelligence, vol. 34, no. 3, March, 2012.
[3] Anna Wojnar and Antonio M. G. Pinheiro, “Annotation of Medical Images Using the SURF descriptor”, 2012 IEEEMs.
[4] M. Mushrif and Y. Dubey, “Texture Classification using Cosine- modultaed Wavelet”, International Journal of Computer and Electrical Engineering, vol. 4, no. 3, June 2012.
[5] J. Sanchez, F. Perronnin, T. Mensink, and J. Verbeek, “Image Classification with the Fisher vector: Theory and Practice,” Int. J. Comput. Vis., vol. 105, no.3, pp. 222-245, 2013.
[6] D. Sanghai and Prof. S. Maniar, ‘Performance evolution of texture classification’, International Journal of Emerging Research in Management & Technology, ISSN: 2278-9359, vol. 2, Issue. 10, Oct. 2013
[7] Dr. Y. Venkateswarlu, Dr. U. Babu and Ch Kumar, “An Efficient Texture Classification Technique Based on Semi Uniform LBP”, IOSR Journal of Computer Engineering (IOSR- JCE), vol. 16, Issue 5, pp. 36-42, 2014.
[8] A. Vupputuri and S. Meher, “Facial Expression Recognition using Local Binary Patterns and Kulluback Leibler Divergence,” IEEE ICCSP conference, 2015.
[9] Parul Prashar and H. Kundra, “Hybrid Approach for Image Classification using SVM Classifier and SURF Descriptor”, International Journal of Computer Science and Information Technology, Vol. 6(1), 2015, 249-251.
[10] Dang Huu Nghi, Luong Chi Mai “Training Data Selection for Support Vector Machines Model” in International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) IACSIT Press, Singapore.
[11] Kessner, R. E. Thornhill, “Texture Analysis: A Review of Neurologic MR Imaging Applications,” A Journal of NeuroRadiology 31:809, May 2010.
Citation
Ankita Boni, Sagar Shinde, "Performance Analysis of Dense Micro-block Difference and SURF Method for Texture Classification," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.479-482, 2019.
World Wide Web - Cloud Boundaries
Survey Paper | Journal Paper
Vol.7 , Issue.6 , pp.483-490, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.483490
Abstract
In the present post-industrial information epoch where the regular changing environment is depend upon technological abbreviations. Early world was related information with only joining two computers to each other, upto this secure cloud computing policies. Present world races are in racing mode where everyone want to become a leader. Today’s world war is based on information. Information is based on privacy concern over Assess, Compliance, Storage, Monitoring and privacy breaches. Over this phenomena world decide many rules and regulations as per their feasibility to provide information over cloud that still world is in need of better policies over geographical boundaries and country based political issues. Many major rules and regulation are define in this paper to maintain worldwide cloud boundaries for use of fast safe and secure.
Key-Words / Index Term
Cloud, Rapid Adoption of cloud, Barriers to cloud, Legal and Political Issues[40]
References
[1] B Thompson, “Storm Warning for Cloud Computing” (2008)Available
athttp://news.bbc.co.uk/2/hi/technology/7421099.stm (accessed 23 Mar 2009).
[2] Gartner, Inc, “Gartner Highlights 27 Technologies in the 2008 Hype Cycle for Emerging Technologies” (2008) available at http://www.gartner.com/it/page.jsp?id=739613 (accessed 23 Mar 2009).
[3] D Gottfrid, “Self-service, Prorated Super Computing Fun!” (1 Nov 2007) available at http://open.blogs.nytimes.com/2007/11/01/self-service-prorated-super-computing-fun/ (accessed 23 Mar 2009).
[4] The New York Times, “The Hound of the Baskervilles. Did it Slay Sir Charles?”(29Mar1902) available at http://query.nytimes.com/mem/archivefree/pdf?res=9502E0D9103BE733A2575AC2A9659C946397D6CF (accessed 23 Mar 2009.
[5] A Conan Doyle, The Hound of the Baskervilles (London: Penguin Books, Red Classics edition,2007), at 187.
[6] Follorou, “La complainte du Blackberry dans les ministères” (2007), Le Monde, 20 Jun 2007.
[7] D Fraser, “The Canadian Response to the USA Patriot Act” (2007) 5 IEEE Security and Privacy no.5,66-68, availableat http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04336282 (accessed 23 Mar2009).
[8] Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept andObstruct Terrorism (USA PATRIOT ACT) Act 2001, Title V, s 505.
[9] Regulation of Investigatory Powers Act 2000, Part II, s 28.
[10] J Madelin, “Transformational Change – large converged networks come to life” (2008), Adaptive and Resilient Computing workshop, London, 30 Sept 2008.
[11] A Liptak, “A Wave of the Watch List, and Speech Disappears” New York Times, 4 Mar 2008 available at http://www.nytimes.com/2008/03/04/us/04bar.html (accessed 23 Mar 2009).
[12] Barr, Cloud Computing session, BarCamp Brighton 2, Falmouth, 13-15 Mar 2008.
[13] Fail Whale Fan Club, “The Fail Whale Fan Club: celebrating Twitter and our favourite error page cetacean” (2008-2009) available at http://failwhale.com/ (accessed 23 Mar 2009).
[14] Facebook, “FailWhale” (2009) available at http://www.facebook.com/pages/FailWhale/64467830480 (accessed 23 Mar 2009).
[15] Yahoo!, “flickr: Eve Whale” (2009) available at http://www.flickr.com/photos/crispy_chips/2622841707/#comment72157606109949329 (accessed 23Mar 2009).
[16] Google, “Welcome to Google Apps: Google terms of service”(2009)available at http://www.google.com/apps/intl/en/terms/user_terms.html (accessed 23 Mar 2009).
[17] Amazon Web Services LLC, “AWS Customer Agreement” (2009) available at http://aws.amazon.com/agreement/ (accessed 23 Mar 2009).
[18] P Massey, “Privacy, Regulation, Security and Cloud Computing”, Powered By Cloud, London, 2-3Feb 2009.
[19] United Nations Convention on Contracts for the International Sale of Goods (1980), art 35
[20] Salesforce.com, “Master Subscription Agreement” (2000-2009) available at http://www.salesforce.com/company/msa.jsp (accessed 23 Mar 2009).
[21] J Jones, “Data Diligence” (2005) ComputerWorld, 14 November 2005 available at http://www.computerworld.com/managementtopics/management/story/0,10801,106127,00.html(accessed 23 Mar 2009).
[22] Amazon Web Services LLC, “Amazon S3 Service Level Agreement” (2009) available at http://aws.amazon.com/s3-sla/ (accessed 23 Mar 2009).
[23] Amazon Web Services LLC, “Amazon EC2 Service Level Agreement” (2008) available at http://aws.amazon.com/ec2-sla/ (accessed 23 Mar 2009).
[24] J Brodkin, “More outages hit Amazon’s S3 storage service” NetworkWorld, 21 Jul 2008 available at http://www.networkworld.com/news/2008/072108-amazon-outages.html (accessed 23 Mar 2009).
[25] J Salmon, “Clouded in uncertainty – the legal pitfalls of cloud computing” (2008) Computing, 24Sept 2008 available at http://www.computing.co.uk/computing/features/222601/clouded-uncertainty-4229153 (accessed 23 Mar 2009).
[26] Google, “What does a Google Apps SAS70 Type II audit mean to me?” (27 Jan 2009) available at http://www.google.com/support/a/bin/answer.py?hl=en&answer=138340 (accessed 23 Mar 2009).
[27] K Greene, “Google’s Cloud Looms Large” (2007) MIT Technology Review, 3 Dec 2007 available at http://www.technologyreview.com/business/19785/page2/ (accessed 23 Mar 2009).
[28] M Crandell, “RightScale: the cloud management platform” (2009) Powered by Cloud, London, 2-3Feb 2009.
[29] D Lupafya, panel session at Powered by Cloud, London Feb 2-3 2008.
[30] J Vincent, “Prophet: a path out of the cloud” (2008), Open Source Convention (OSCON), Portland OR, 21-25 July 2008 available at http://assets.en.oreilly.com/1/event/12/Prophet,%20your%20path%20out%20of%20the%20cloud%20Presentation.pdf (accessed 23 Mar 2009).
[31] D Raywood, “Google admits that some of its Docs have been accidentally shared” (2009) S C Magazine, 10 Mar2009availableathttp://www.scmagazineuk.com/Google-admits-that-some-of-its-Docs-have-beenaccidentally-shared/article/128491 (accessed 23 Mar 2009.
[32] A Greenberg, “Cloud Computing’s Stormy Side” (19 Feb 2008) available at http://www.forbes.com/2008/02/17/web-application-cloud-tech-intel-cx_ag_0219cloud.html (accessed 22 Mar 2009).
[33] N Dhanjani, “Amazon’s Elastic Compute Cloud [EC2]: Initial Thoughts on Security Implications”(28 April 2008) available at http://www.dhanjani.com/blog/2008/04/index.html (accessed 23 Mar2009).
[34] V Pai et al, “The Dark side of the Web: An Open Proxy’s View” (2004) 34 ACM SIGCOMM Computer Communication Review issue 1, 55-62 available at http://portal.acm.org/citation.cfm?doid=972374.972385 (accessed 23 Mar 2009).
[35] A Narayanan and V Shmatikov, “Robust De-anonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset)” (2008) IEEE Symposium on Security and Privacy (S&P),Oakland CA, 18-21 May 2008, available at http://arxiv.org/PS_cache/cs/pdf/0610/0610105v2.pdf(accessed 23 Mar 2009).
Citation
Saroj Kumar, Santosh Kumar, "World Wide Web - Cloud Boundaries," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.483-490, 2019.
Video Face Recognization Using Autoencoder and Softmax Classifications
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.491-496, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.491496
Abstract
Abundance and obtainability of audiovisual capturing devices, like mobile phones and loop camera, have prompted analysis in videocassette face appearance perseption, that is extraordinarily relevant in impostion solicitations .While this methodologies are declared high precisions at equivalent error rates, enactment at lesser lying acceptance rates wants significant development. So, we tend to introduced a completely unique face verification rule, 1st the feature-rich frames are designated from a video sequence .Frame choice done by illustration learning-based feature extraction, is finished by using: 1) deep learning, combining of stacked demising distributed auto-encoder 2) deep Boltzmann classifier (DBC) 3) apprising the loss purpose of DBC by as well as distributed and short rank regularization. Finally, the results verified on 2 wide conferred databases, YouTube and little videos and Shoot Challenge.
Key-Words / Index Term
Face Verification, Neural Networks, DBC, YouTube, Tiny videos
References
[1] Facial recognition technology safeguards Beijing Olympics, accessed on Mar. 10, 2017 [Online]. Available: http://english.cas.cn/resources/archive/china_archive/cn2008/200909/t20090923_42959.shtml.
[2] L. Wolf, T. Hassner, and I. Maoz, “Face recognition in unconstrained videos with matched background similarity,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2011, pp. 529–534.
[3] L. Wolf and N. Levy, “The SVM-minus similarity score for video face recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2013, pp. 3523–3530.
[4] H. Li, G. Hua, Z. Lin, J. Brandt, and J. Yang, “Probabilistic elastic matching for pose variant face verification,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2013, pp. 3499–3506.
[5] Z. Cui, W. Li, D. Xu, S. Shan, and X. Chen, “Fusing robust face region descriptors via multiple metric learning for face recognition in the wild,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2013, pp. 3554–3561.
[6] H. Méndez-Vázquez, Y. Martínez-Díaz, and Z. Chai, “Volume structured ordinal features with background similarity measure for video face recognition,” in Proc. Int. Conf. Biometrics (ICB), Jun. 2013, pp. 1–6.
[7]H. S. Bhatt, R. Singh, and M. Vatsa, “On recognizing faces in videos using clustering-based re-ranking and fusion,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 7, pp. 1056–1068, Jul. 2014.
[8] J. Y. Junlin Hu, J. Lu, and Y.-P. Tan, “Large margin multi-metric learning for face and kinship verification in the wild,” in Proc. Asian Conf. Comput. Vis., 2014, pp. 252–267.
Citation
Sonika Koganti, Talluri Sunil Kumar, "Video Face Recognization Using Autoencoder and Softmax Classifications," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.491-496, 2019.
GUI for Continuous Integration and Automatic Bug Verification of Jenkins Server
Survey Paper | Journal Paper
Vol.7 , Issue.6 , pp.497-500, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.497500
Abstract
In software engineering, continuous integration (CI) is the routine with regards to blending all engineer working duplicates to a common mainline a few times each day. The principle point of CI is to avert coordination issues. Jenkins is a driving open source constant coordination server worked with Java. It is utilized to manufacture and test programming ventures constantly making it simpler to incorporate changes to the task. It provides more than 985 plugins to help to build and to test any project. Continuous Integration (CI) requires developers to integrate code into a shared repository several times a day. GUI will maintain all latest jobs with their build status and continuous notification referring to design issues, code, failures, etc. Once the project is configured in Jenkins then all future builds are automated. Hence GUI will help to represent basic reporting like run status (successful, failure, unstable) and weather reports (job health). GUI will also provide automatic continuous regression run which will give flag details of new relevant changes in build compared to last run and easy access for code change mapping and auto-selection. GUI will help to eliminate manual verification.
Key-Words / Index Term
Jenkins, Continuous Integration and Continuous Delivery, Auto Build Trigger, Python Django, Perforce
References
[1] W. y. PetroChina, Z. t. PetroChina and G. y. PetroChina, ”Design and implementation of continuous integration scheme based on Jenkins and Ansible”, In the Proceedings of the 2018 International Conference on Artificial Intelligence and Big Data (ICAIBD), Chengdu, pp. 245- 249, 2018.
[2] S. A. I. B. S. Arachchi and I. Perera, ”Continuous Integration and Continuous Delivery Pipeline Automation for Agile Software Project Management”, In the Proceedings of the 2018 Moratuwa Engineering Research Conference (MERCon), Moratuwa, pp. 156-161, 2018
[3] N. Seth and R. Khare, ”ACI (automated Continuous Integration) using Jenkins: Key for successful embedded Software development”, In the Proceedings of the 2015 2nd International Conference on Recent Advances in Engineering and Computational Sciences (RAECS), Chandigarh, pp. 1-6, 2015.
[4] P. Rai, Madhurima, S. Dhir, Madhulika and A. Garg, "A prologue of JENKINS with comparative scrutiny of various software integration tools", In the Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 201-205, 2015 .
[5] S. Puri-Jobi, "Test automation for NFC ICs using Jenkins and NUnit", In the Proceedings of the 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Graz, pp. 1-4, 2015.
[6] C. Mamatha, S C V S L S R. Kiran, “A Novel Approach for Cloud Computing Environment "Implementation of DevOps Architecture in the project development and deployment with help of tools”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.87-95, 2018.
[7] C. Sisodiya P. Sharma, "Scrutiny to Effectiveness of Various Software Process Model", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.88-93, 2017.
Citation
Vaishnavi R. Mali, Anil R. Surve, "GUI for Continuous Integration and Automatic Bug Verification of Jenkins Server," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.497-500, 2019.