A Review of Various Digital Image Preprocessing Methods for Medical Image Analysis
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.513-516, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.513516
Abstract
Image visibility improvement is a standout amongst the most vital assignments in digital image processing. It is a standout amongst the most mind-boggling and imperative undertakings in advanced image processing. Image visibility improvement procedures are utilized in enhancing the visual nature of images. Medicinal imaging is present as of late utilized in the greater part of the applications like Radiography, MRI, Ultrasound Imaging, Tomography, Cardiograph, and Fundus Imagery, etc. Contrast and Image quality are the serious issues in medicinal imaging. The image enhancement makes the image unmistakable for human discernment or machine vision. The procedure of image visibility improvement doesn`t raise the inbuilt data substance of the information, yet can feature the highlights important to recognize the protests in a basic and productive way.
Key-Words / Index Term
mammogram, medical image enhancement, image enhancement, X-ray, CT images.
References
[1] M. Tiwari, S.S. Lamba, B. Gupta, "A software-supported approach for improving visibility of backlight images", Advances in Computer Communication and Computational Sciences, Springer, pp. 299-308, 2019.
[2] S. Hosseinian, H. Arefi, "Assessment Of Restoration Methods Of X-Ray Images With Emphasis on Medical Photogrammetric Usage", The International Archives of the Photogrammetric, Remote Sensing and Spatial Information Sciences, 2016, XXIII ISPRS Congress, 12–19 July 2016.
[3] A.P. Reeves, Y. Xie, and S. Liu, "Large-scale image region documentation for fully automated image biomarker algorithm development and evaluation," Journal of Medical Imaging, 4(2): 024505, Jun. 2017.
[4] VOLCANO`09 available at http://www.via.cornell.edu/challenge/.
[5] LITFL(Radiology Image Databases) available at https://lifeinthefastlane.com/resources/image-database/
[6] Michael Heath et al., "The Digital Database for Screening Mammography," in Proceedings of the Fifth International Workshop on Digital Mammography, M.J. Yaffe, ed., 212-218, Medical Physics Publishing, 2001.
[7] A Hadjipanteli et al, "The effect of system geometry and dose on the threhold detectable calcification diameter in 2D-mammography and digital breast tomosynthesis". Phys Med Biol 62, pp. 858-877, 2017.
[8] J Suckling et al, "The Mammographic Image Analysis Society Digital Mammogram Database Exerpta Medica." International Congress Series 1069, pp. 375-378, 1994.
[9] M. Tiwari, B. Gupta, "Brightness preserving contrast enhancement of medical images using adaptive gamma correction and homomorphic filtering", Electrical, Electronics and Computer Science (SCEECS), 2016 IEEE Students` Conference on, pp. 1-4, 2016.
[10] T.K. Agarwal, M. Tiwari, S.S. Lamba, "Modified histogram based contrast enhancement using homomorphic filtering for medical images", Advance Computing Conference (IACC), IEEE International, pp. 964-968, 2014.
[11] B. Gupta, M. Tiwari, "A tool supported approach for brightness preserving contrast enhancement and mass segmentation of mammogram images using histogram modified grey relational analysis", Multidimensional Systems and Signal Processing, vol. 28 (4), pp. 1549-1567, 2017.
[12] M. Sundaram, K. Ramar, N. Arumugam and G. Prabin, "Histogram based contrast enhancement for mammogram images." International Conference on Signal Processing, Communication, Computing and Networking Technologies, pp. 842-846, 2011.
[13] M. Sundaram, K. Ramar, N. Arumugam and G. Prabin, "Histogram modified local contrast enhancement for mammogram images." Applied Soft Computing, pp. 5809-5816, 2011.
[14] S.K. Badugu, R.K. Kontham, V.K. Vakulabharanam, B. Prajna, "Calculation of Texture Features for Polluted Leaves", Isroset-Journal (IJSRCSE) Vol.6 , Issue.1 , pp.11-21, Feb-2018.
[15] P.M. Ingale, "The importance of Digital Image Processing and its applications", (IJSRCSE) Vol.06 , Special Issue.01, pp.31-32, Jan-2018.
[16] S. Mohan and M. Ravishankar, "Optimized histogram based contrast limited enhancement for mammogram images." Short Paper, ACEEE International Journal on Information Technology, vol. 3(1), 2014.
[17] K. Zuiderveld, “Contrast Limited Adaptive Histograph Equalization.” Graphic Gems IV. San Diego: Academic Press Professional. 474–485, 1994.
[18] J.J. Staal, M.D. Abramoff, M. Niemeijer, M.A. Viergever, B. van Ginneken, "Ridge based vessel segmentation in color images of the retina", IEEE Transactions on Medical Imaging, 2004, vol. 23, pp. 501-509.
[19] A. Hoover, V. Kouznetsova and M. Goldbaum, "Locating Blood Vessels in Retinal Images by Piece-wise Threhsold Probing of a Matched Filter Response", IEEE Transactions on Medical Imaging , vol. 19 no. 3, pp. 203-210, March 2000.
[20] Decencière et al., "Feedback on a publicly distributed database: the Messidor database." Image Analysis & Stereology, v. 33, n. 3, p. 231-234, aug. 2014. ISSN 1854-5165. available at: http://www.ias-iss.org/ojs/IAS/article/view/1155, http://dx.doi.org/10.5566/ias.1155.
[21] T. Kauppi et al., "DIARETDB0: Evaluation Database and Methodology for Diabetic Retinopathy Algorithms".
[22] T. Kauppi et al., "DIARETDB1 diabetic retinopathy database and evaluation protocol, In Proc of the 11th Conf. on Medical Image Understanding and Analysis (Aberystwyth, Wales, 2007).
[23] M. Zhou, K. Jin, S. Wang, J. Ye and D. Qian, "Color retinal image enhancement based on luminosity and contrast adjustment," in IEEE Transactions on Biomedical Engineering, vol. 65, no. 3, pp. 521-527, March 2018.
[24] B. Gupta, M. Tiwari, "Color retinal image enhancement using luminosity and quantile based contrast enhancement", Multidimensional Systems and Signal Processing, pp. 1-9, 2019.
Citation
K. Gangrade, "A Review of Various Digital Image Preprocessing Methods for Medical Image Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.513-516, 2019.
Knowledge Discovery Techniques in Human Talent Management: “A Knowledge Discovery Databases Approach to Conquer Employee Attrition Problem Using Data Mining Techniques”
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.517-522, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.517522
Abstract
Talent resource management is one of the complex tasks for human resource professionals to assign the right person for the right place at the right time in the organization. The sustainability of suitable employee in an organization is very crucial these days. In this competitive age, employees are switching the organization on some gain but the organization suffers a lot. This paper is mainly concerned with the application of the knowledge discovery technique in human resource management, particularly in talent resource management to conquer the employee attrition and predicting the possible attrition in future.
Key-Words / Index Term
Soft Computing, Fuzzy logic, Decision Tree, Talent Management, KDD, Knowledge Discovery
References
[1] A. S. Chang, & Leu, S.S., "Data mining model for identifying project profitablility variables," International Journal of Project Management, vol. 24, pp. 199-206, 2006.
[2] A TP Track Research Report "Talent Management: A State of the Art," Tower Perrin HR Services 2005.
[3] E. Frank, Hall, M., et al., "Data mining in bioinformatics using Weka," Bioinformatics Application Note, vol. 20, pp. 2479-2481, 2004.
[4] H. Jantan, A. R. Hamdan, Z. A. Othman, and M. Puteh, "Applying Data Mining Classification Techniques for Employee`s Performance Prediction," in Knowledge Management 5th International Conference (KMICe2010), Kuala Terengganu, Terengganu Malaysia, 2010, pp. 645-652.
[5] I. Bose, & Mahapatra, R.K., "Business data mining - a machine learning perspective " Information & Management, vol. 39, pp. 211-225, 2001.
[6] Jantan, H., Hamdan, A. R., & Othman, Z. A. (2010). Human talent prediction in HRM using C4. 5 classification algorithm, International Journal on Computer Science and Engineering, 2(08-2010), pp 2526-2534
[7] Jantan H., Hamdan A.R., Othman Z.A. (2009) Classification Techniques for Talent Forecasting in Human Resource Management. In: Huang R., Yang Q., Pei J., Gama J., Meng X., Li X. (eds) Advanced Data Mining and Applications. ADMA 2009. Lecture Notes in Computer Science, vol 5678. Springer, Berlin, Heidelberg
[8] J. Hamidah, H. Abdul Razak, and A. O. Zulaiha, "Classification for Talent Management using Decision Tree Induction Techniques," in 2nd Data Mining and Optimization Seminar (DMO’09), Bangi, Selangor, 2009, pp. 15-20.
[9] Kurgan, L.A., Musilek, P. (2006). A survey of knowledge discovery and Data Mining Models, The Knowledge Engineering Review, 21(1), pp 1 – 24
[10] Phyu, T.N., (2009). Survey of classification techniques in data mining, Proceedings of the International Multi Conference Of Engineers And Computer Scientists, IMECS 2009, Vol 1
[11] S. H. Liao, Chen, Y.N., & Tseng, Y.Y., "Mining demand chain knowledge of life insurance market for new product development," Expert Systems with Applications, vol. 36, pp. 9422-9437, 2009.
[12] V. Cho, & Ngai, E.W.T., "Data mining for selection of insurance sales agents," vol. 20, pp. 123-132, 2003
Citation
K. P. Tripathi, Ashutosh Gaur, "Knowledge Discovery Techniques in Human Talent Management: “A Knowledge Discovery Databases Approach to Conquer Employee Attrition Problem Using Data Mining Techniques”," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.517-522, 2019.
A Technique of Crossover and Mutation to solve School Time Table Problem using Genetic Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.523-525, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.523525
Abstract
Creating school time table lies under the category of NP hard problems. If we try to create a time table using exhaustive approach i.e applying all possible combinations, then it can take a huge amount of time to solve the problem. So Genetic Algorithm is a good way to solve such problems. Instead of using traditional techniques of Crossover and Mutation in genetic algorithm we have applied a better technique of crossover and mutation which reduces the search space by deducting invalid time tables from the search space. We have also done some experiments which show the variation of number of generations to solve the problem with mutation rate.
Key-Words / Index Term
NP hard problem,exhaustive approach
References
[1] Man, K. F., Tang, K. S., &Kwong, S. (1996). Genetic algorithms: concepts and applications [in engineering design]. IEEE Transactions on Industrial Electronics, 43(5), 519–534.doi:10.1109/41.538609
[2] E. Canth-Paz, “A summary of research on parallel genetic algorithms,” Illinois Genetic Algorithms Lab., Univ. Illinois at Urbana-Champaign, IlliGAL Rep. 95007, July 1995.
[3] Manoj Garg and Dinesh Kumar, "Simple GA & Hybrid GA for Basis Path Testing under BDFF", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.28-35, 2016
[4] S. Dubey, R. Jhaggar, R. Verma, D. Gaur, "Encryption and Decryption of Data by Genetic Algorithm", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.47-52, 2017
[5] https://en.wikipedia.org/wiki/Genetic_algorithm
Citation
Mohd. Irfan, "A Technique of Crossover and Mutation to solve School Time Table Problem using Genetic Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.523-525, 2019.
Mobile Edge Computing: Review and Analysis
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.525-532, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.525532
Abstract
These days with intense use of mobile applications and cloud computing, mobile cloud computing has been acquainted. The cloud computing deals with high latency, limited flexibility, platform dependency. The mobile edge computing(MEC) combines cloud computing and wireless communication to overpower the obstacles of delay, scalability and mobility. MEC helps to bring the various resources and cloud computing services nearer and accessible anywhere by the user with the use of mobile edge clouds(MEC). In this paper we provide an extensive survey of mobile edge computing research, while highlighting the specific concerns in mobile cloud computing. We present a taxonomy based on the key issues in this area, and discuss the different approaches taken to tackle these issues.
Key-Words / Index Term
Mobile Cloud Computing, Mobile Edge Clouds, Mobility, Internet of Things
References
[1] Lu, Gang, and Wen Hua Zeng. "Cloud computing survey." In Applied Mechanics and Materials, vol. 530, pp. 650-661. Trans Tech Publications, 2014.
[2] Zhang, Q., Cheng, L. &Boutaba, R. J Internet ServAppl (2010) 1: 7. https://doi.org/10.1007/s13174-010-0007-6
[3] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobilecloud computing: architecture, applications, and approaches,” WirelessCommunications and Mobile Computing, vol. 13, no. 18, pp. 1587-1611,2013.
[4] Bonomi, Flavio, Rodolfo Milito, Jiang Zhu, and SateeshAddepalli. "Fog computing and its role in the internet of things." In Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp. 13-16. ACM, 2012.
[5] Lei, Lei, ZhangduiZhong, Kan Zheng, Jiadi Chen, and HanlinMeng. "Challenges on wireless heterogeneous networks for mobile cloud computing." IEEE Wireless Communications 20, no. 3 (2013): 34-44.
[6] Hayes, Brian. "Cloud computing." Communications of the ACM 51, no. 7 (2008): 9-11.
[7] Kumar, Karthik, and Yung-Hsiang Lu. "Cloud computing for mobile users: Can offloading computation save energy?." Computer 43, no. 4 (2010): 51-56.
[8] White Paper. Mobile Cloud Computing SolutionBrief. AEPONA, 2010.
[9] http://www.etsi.org/technologies-clusters/technologies/multi-access-edge-computing
[10] T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, “Fog computing: Focusing on mobile users at the edge,” CoRR, abs/1502.01815, 2015.
[11] Li, I. Santos, F.C. Delicato, P.F. Pires, L. Pirmez, W. Wei, H. Song, A. Zomaya, S. Khan, System modelling and performance evaluation of a three-tier cloud of things, Future Gener. Comput. Syst. 70 (2016) 104–125.
[12] I. Farris, L. Militano, M. Nitti, L. Atzori, A. Iera, Mifaas: a mobile-iot-federationas-a-service model for dynamic cooperation of iot cloud providers, Future Gener. Comput. Syst. 70 (2016) 126–137.
[13] Wang, Chenmeng, Chengchao Liang, F. Richard Yu, Qianbin Chen, and Lun Tang. "Computation offloading and resource allocation in wireless cellular networks with mobile edge computing." IEEE Transactions on Wireless Communications16, no. 8 (2017): 4924-4938.
[14] Sun, Xiang, and Nirwan Ansari. "EdgeIoT: Mobile edge computing for the Internet of Things." IEEE Communications Magazine 54, no. 12 (2016): 22-29.
[15] Corcoran, Peter, and Soumya Kanti Datta. "Mobile-edge computing and the internet of things for consumers: Extending cloud computing and services to the edge of the network." IEEE Consumer Electronics Magazine 5, no. 4 (2016): 73-74.
[16] D. Satria, D. Park, and M. Jo, “Recovery for overloaded mobile edge computing,” Future Generation Computer Systems, 2016.
[17] M. Smara, M. Aliouat, A.-S. K. Pathan, and Z. Aliouat, “Acceptance test for fault detection in component-based cloud computing and systems,” Future Generation Computer Systems, 2016.
[18] W. Tarneberg, A. Mehta, E. Wadbro, J. Tordsson, J. Eker, M. Kihl, and E. Elmroth, “Dynamic application placement in the mobile cloud network,” Future Generation Computer Systems, 2016.
[19] R.N.S. Widodo, H. Lim, M. Atiquzzaman, Sdm: Smart deduplication for mobile cloud storage, Future Gener. Comput. Syst. 70 (2016) 64–73.
[20] A.S. Gomes, B. Sousa, D. Palma, V. Fonseca, Z. Zhao, E. Monteiro, T. Braun, P. Simoes, L. Cordeiro, Edge caching with mobility prediction in virtualized lte mobile networks, Future Gener. Comput. Syst. 70 (2016) 148–162.
[21] M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, “A review on remote data auditing in single cloud server: Taxonomy and open issues,” Journal of Network and Computer Applications, vol. 43, pp. 121–141, 2014.
[22] W. Zhang, Y. Wen, K. Guan, D. Kilper, H. Luo, and D. O. Wu, “Energyoptimal mobile cloud computing under stochastic wireless channel,” IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4569–4581, Sep. 2013.
[23] C. You, K. Huang, and H. Chae, “Energy efficient mobile cloud computing powered by wireless energy transfer,” IEEE J. Sel. Areas Commun., vol. 34, no. 5, pp. 1757–1771, May 2016.
[24] K. Kumar and Y. H. Lu, “Cloud computing for mobile users: Can offloading computation save energy?” Comput., vol. 43, no. 4, pp. 51– 56, Apr. 2010.
[25] Lu, Gang, and Wen Hua Zeng. "Cloud computing survey." In Applied Mechanics and Materials, vol. 530, pp. 650-661. Trans Tech Publications, 2014.
[26] Zhang, Q., Cheng, L. &Boutaba, R. J Internet ServAppl (2010) 1: 7. https://doi.org/10.1007/s13174-010-0007-6
[27] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobilecloud computing: architecture, applications, and approaches,” WirelessCommunications and Mobile Computing, vol. 13, no. 18, pp. 1587-1611,2013.
[28] Bonomi, Flavio, Rodolfo Milito, Jiang Zhu, and SateeshAddepalli. "Fog computing and its role in the internet of things." In Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp. 13-16. ACM, 2012.
[29] Lei, Lei, ZhangduiZhong, Kan Zheng, Jiadi Chen, and HanlinMeng. "Challenges on wireless heterogeneous networks for mobile cloud computing." IEEE Wireless Communications 20, no. 3 (2013): 34-44.
[30] Hayes, Brian. "Cloud computing." Communications of the ACM 51, no. 7 (2008): 9-11.
[31] Kumar, Karthik, and Yung-Hsiang Lu. "Cloud computing for mobile users: Can offloading computation save energy?." Computer 43, no. 4 (2010): 51-56.
[32] White Paper. Mobile Cloud Computing SolutionBrief. AEPONA, 2010.
[33] http://www.etsi.org/technologies-clusters/technologies/multi-access-edge-computing
[34] T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, “Fog computing: Focusing on mobile users at the edge,” CoRR, abs/1502.01815, 2015.
[35] Li, I. Santos, F.C. Delicato, P.F. Pires, L. Pirmez, W. Wei, H. Song, A. Zomaya, S. Khan, System modelling and performance evaluation of a three-tier cloud of things, Future Gener. Comput. Syst. 70 (2016) 104–125.
[36] J. Liu, E. Ahmed, M. Shiraz, A. Gani, R. Buyya, and A. Qureshi, “Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions,” Journal of Network and Computer Applications, vol. 48,pp. 99–117, 2015.
[37] ETSI White Paper No.11 - Mobile Edge Computing: A key technology towards 5G
[38] E. Ahmed, A. Gani, M. Sookhak, S. H. Ab Hamid, and F. Xia, “Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges,” Journal of Network and Computer Applications, vol. 52, pp.52–68, 2015.
[39] Ashutosh Gupta, Praveen Dhyani, O.P. Rishi, Vishwambhar Pathak, "A Novel Service Broker Policy for e-Governance using Federation of cloud", International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.515-521, 2018.
Citation
Komal Kharbanda, Kiranbir Kaur, "Mobile Edge Computing: Review and Analysis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.525-532, 2019.
Aspect Oriented Programming Tools for .Net Framework
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.533-538, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.533538
Abstract
Aspect oriented programming is a young concept in Computer science. It is succeeding from research projects towards commercial applications. Most of the current AOP tools suitable for commercial projects are proposed for Java platform only, which bounds their applicability. AspectJ is the leading tool for Java technology, the only way to implement a new programming paradigm such as Aspect Oriented Programming is either to extend the Java language or to develop Java API to support it. For .NET, the situation is different — it is a multilanguage programming environment. Today, Aspect Oriented Programming is supported in most languages and platforms. For Microsoft .NET, PostSharp is the most advanced and mature framework, and has been used commercially for several years. There are various known Aspect Oriented Programming tools for Microsoft.NET also. This paper present the analysis and overview of the all various popular AOP tools for .Net framework in detail.
Key-Words / Index Term
Aspect Oriented Programming, .Net, AOP tools, CLR, MSIL
References
[1] Jatin Arora, Jagandeep Singh Sidhu and Pavneet Kaur, "Applying Dependency Injection Through AOP Programming to Analyze the Performance of OS", International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.45-50, 2015.
[2] Geeta Bagade, Shashank Joshi, "Analysis of Aspect Oriented Systems: Refactorings using AspectJ", International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.76-80, 2016.
[3] Safonov, V. O. (Vladimir Olegovich) Using aspect-oriented programming for trustworthy software development /Vladimir O. Safonov. p. cm. ISBN 978-0-470-13817-5QA76. 64. S253 2008.
[4] Safonov V. Aspect.NET: a new approach to aspect - oriented programming, .NET Developer’s Journal 2003 ;( 4): 36 – 40.
[5] LOOM.NET Web pages. Available at http://www.rapier - loom.net/.
[6] Mono. Available at http://www.mono - project.com.
[7] AspectDNG Web pages. Available at http://sourceforge.net/projects/aspectdng/.
[8] Aspect# Web pages. Available at http://www.castleproject.org/aspectsharp/.
[9] PostSharp Web pages. Available at http://www.postsharp.org/.
[10] DotSpect Web pages. Available at http://dotspect.tigris.org/.
[11] Encase Web pages. Available at http://theagiledeveloper.com/articles/Encase.aspx.
[12] Compose* Web pages. Available at http://composestar.sourceforge.net/.
[13] Weave.NET. Available at http://www.dsg.cs.tcd.ie/dynamic/?category_id= - 26.
[14] Wicca and Phx.Morph Web site. Available at http://www.cs.columbia. edu/eaddy/wicca.
[15] Microsoft Phoenix. Available at http://research.microsoft.com/phoenix.
[16] Microsoft Managed Debugger (mdbg) Web pages. Available at http://msdn. microsoft.com/msdntv/episode.aspx?xml=episodes/en/20060302clrjs/manifest.xml.
[17] Seasar.Net Web pages available at http://s2container.net.seasar.org/en/index.html
[18] Spring.Net Framework for Aop Available at http://www.springframework.net/doc-latest/reference/html/aop.html.
[19] Angela Hantelmann, Cui Zhang: “Adding Aspect-Oriented Programming Features to C#.NET by using Multidimensional Separation of Concerns (MDSOC) Approach”, in Journal of Object Technology, vol. 5 no. 4 Mai-June 06, pp. 59-83.
[20] CrosscutterN Available at https://www.codeproject.com/Tips/CrossCutterN-A-Light-Weight-AOP-Tool-for-NET
Citation
P.R. Sarode, R.N. Jugele, "Aspect Oriented Programming Tools for .Net Framework," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.533-538, 2019.
Smart Mirror: A Journey to the new world
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.539-545, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.539545
Abstract
A Smart Mirror is the most recent in innovative home stylistic theme and in the market. In view of the client studies and model execution, we present the improvement of an enhancing machine that fuses intelligent administrations of data, offered through a UI on the surface of a mirror. Our work depends on the possibility that we as a whole take a gander at the mirror when we go out, so for what reason wouldn`t the mirror end up smart. It is a custom mirror establishment that is both a mirror and a display. It takes information from the web including time, climate, stock reports, quotes and more to stay up with the latest. The smart mirrors, which continue to work today and will take place in future technology, provide users with both mirror and computer-assisted information services to the user. These systems can be connected to the Web, and the information in certain locations on the mirror may transmit data. In the smart mirror system performed in the working scope, using the Raspberry Pi 3 micro-controller card, the weather, time and location information taken from the Web services, the activity calendar information of the user, the phone rings information and the camera image is included. Some enhancements can be controlled via the microphone in the smart mirror, with the help of the voice commands.
Key-Words / Index Term
Smart Mirror, Raspberry Pi, Node JS
References
[1] "Voice controlled automation system," in Multitopic Conference, 2008. INMIC 2008. IEEE International , vol., no., pp.508-512, 23-24 Dec. 2008 doi: 10.1109/ INMIC 2008.4777791
[2] Preeti Pannu Vaibhav Khanna, Yash Vardhan, Dhruva Nair, “Design and Development of a Smart Mirror Using Raspberry PI”, IJEEDC, Volume-5, Issue 1, January 2017
[3] D.K. Mittal, R. Rastogi, A Comparative Study and New Model for Smart Mirror, International Journal of Scientific Research in Research Paper. Computer Science and Engineering Vol.5, Issue.6, pp.58-61, December (2017)
[4] Jadhav, Gaurav, Kunal Jadhav, and Kavita Nadlamani. "Environment Monitoring System Using Raspberry-Pi". International Research Journal of Engineering and Technology (IRJET) Volume: 03.Issue: 04 (2016)
[5] Piyush Maheshwari, Maninder Jeet Kaur, Sarthak Anand, “Smart Mirror: A Reflective Interface to Maximize Productivity”, International Journal of Computer Applications (0975 – 8887), Year: May-2017.
[6] Biljana Cvetkoska, Ninoslav Marina, Dijana Capeska Bogatinoska, Zhanko Mitreski, "Smart mirror E-health assistant — Posture analyze algorithm proposed model for upright posture", Smart Technologies IEEE EUROCON 2017 -17th International Conference on, pp. 507-512, 2017.
[7] Jonathan Rodriguez, Zhenyu Zhou, “;An IoT-Based E-Health Monitoring System Using Rapsberry Pi” GLOBECOM 2017 - 2017 IEEE Global Communications Conference, pp. 1-6, 2017.
[8] John See and Sze-Wei Lee, “An Integrated Vision-based Architecture for Home Security System,”IEEE Transactions on Consumer Electronics, Vol. 53, pp: 489-498, No. 2, May 2007M. Young,
[9] Derreck y Otros GOLD, "SmartReflect: A Modular Smart Mirror Application Platform", 2016 IEEE 7th Annual Information Technology Electronics and Mobile Communication Conference (IEMCON), 2016.
[10] Jun-Ren Ding, Chien-Lin Huang, Jin-Kun Lin, Jar-Ferr Yang and Chung-Hsien Wu, “Magic Mirror”,Ninth IEEE International Symposium on Multimedia 2007.
Citation
Pratibha Jha, Prashant Jha, Mufeed Khan, Kajol Mittal, "Smart Mirror: A Journey to the new world," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.539-545, 2019.
An Extensive Survey on Text Detection and Recognition
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.546-551, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.546551
Abstract
This paper analyzes, compares, and contrasts the various methods in text detection and extraction. Existing techniques are categorized as either stepwise or integrated. Text detection and extraction can be categorized into sub-problems including text localization, verification, segmentation and recognition. It gives an elaborate view of the various methods applied for these sub problems. A number of benchmark datasets are discussed in details with their attributes.
Key-Words / Index Term
Text detection, text localization, text recognition, text segmentation, survey
References
[1] Y. Zhong, K. Karu, and A. K. Jain, “Locating text in complex color images,” Pattern Recognit., vol. 28, pp. 1523–1535, 1995.
[2] I Haritaoglu, “Scene text extraction and translation for handheld devices,” in Proc. IEEE Int. Conf. Comput. Vis. Pattern Recognit. 2001, pp. 408–413
[3] J. Liang, D. Doermann, and H. Li, “Camera-based analysis of text and documents: A survey,” Int. J. Doc. Anal. Recognit., vol. 7, pp. 84–104, 2005
[4] S L. Lin and C. L. Tan, “Text extraction fromname cards using neural network,” in Proc. Int. Joint Conf. Neural Netw., 2005, pp. 1818–1823.
[5] X. Chen, J. Yang, J. Zhang, and A. Waibel, “Automatic detection and recognition of signs from natural scenes,” IEEE Trans. Image Process., vol. 13, no. 1, pp. 87–99, Jan. 2004
[6] H. Li and D. Doermann, “Text enhancement in digital video using multiple frame integration,” in Proc. ACM Multimedia Conf., 1999, pp. 19–22
[7] Z. He, J. Liu, H. Ma, and P. Li, “A new automatic extraction method of container identity codes,” IEEE Trans. Intell. Transp. Syst., vol. 6, no. 1, pp. 72–78, Mar. 2005
[8] P. Sermanet, S. Chintala, and Y. LeCun, ”Convolutional neural networks applied to house numbers digit classification,” in Proc. IEEE Int. Conf. Pattern Recognit., 2012, vol. 4, pp. 3288–3291
[9] K. I. Kim, K. Jung, and H. Kim, “Texture-based approach for text detection in images using support vector machines and continuously adaptive mean shift algorithm,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 12, pp. 1631–1639, Dec. 2003
[10] X. Tang, X. Gao, J. Liu, H. Zhang, “A spatial-temporal approach for video caption detection and recognition,” IEEE Trans. Neural Netw., vol. 13, no. 4, pp. 961–971, Jul. 2002
[11] Q. Ye, W. Wang, W. Gao, and W. Zeng, “A robust text detection algorithm in images and video frames,” in Proc. Joint Conf. Inf., Commun. Signal Process. Pac. Rim Conf. Multimedia, 2003, pp. 802– 806
[12] C. Yi Y. Tian "Text string detection from natural scenes by structure-based partition and grouping" IEEE Trans. Image Process. vol. 20 no. 9 pp. 2594-2605 Sep. 2011.
[13] A. K. Jain B. Yu "Automatic text location in images and video frames" Pattern Recognit. vol. 31 no. 12 pp. 2055-2076 1998
[14] C. Garcia X. Apostolidis "Text detection and segmentation in complex color images" Proc. IEEE Int. Conf. Acoustics Speech Signal Process. pp. 2326-2330 2000
[15] X. Chen J. Yang J. Zhang A. Waibel "Automatic detection and recognition of signs from natural scenes" IEEE Trans. Image Process. vol. 13 no. 1 pp. 87-99 Jan. 2004
[16] R. Huang P. Shivakumara S. Uchida "Scene character detection by an edge-ray filter" Proc. IEEE Int. Conf. Doc. Anal. Recognit. pp. 462-466 2013
[17] M. Cai J. Song M. R. Lyu "A new approach for video text detection" Proc. IEEE Int. Conf. Image Process. pp. 117-120 2002
[18] X. Tang X. Gao J. Liu H. Zhang "A spatial-temporal approach for video caption detection and recognition" IEEE Trans. Neural Netw. vol. 13 no. 4 pp. 961-971 Jul. 2002
[19] S. M. Hanif L. Prevost P. A. Negri "A cascade detector for text detection in natural scene images" Proc. IEEE Int. Conf. Pattern Recognit. pp. 1-4 2008
[20] J. Gllavata R. Ewerth B. Freisleben "Text detection in images based on unsupervised classification of high-frequency wavelet coefficients" Proc. IEEE Int. Conf. Pattern Recognit. pp. 425-428 2004
[21] H. Li D. Doermann O. Kia "Automatic text detection and tracking in digital video" IEEE Trans. Image Process. vol. 9 no. 1 pp. 147-156 Jan. 2000
[22] A. Mosleh N. Bouguila A. Ben Hamza "Image text detection using a bandlet-based edge detector and stroke width transform" Proc. Brit. Mach. Vis. Conf. pp. 1-2 2012
[23] X. Zhao K. H. Lin Y. Fu Y. Hu Y. Liu T. S. Huang "Text from corners: A novel approach to detect text and caption in videos" IEEE Trans. Image Process. vol. 20 no. 3 2011
[24] F. Liu X. Peng T. Wang S. Lu "A density-based approach for text extraction in images" Proc. IEEE Int. Conf. Pattern Recognit. pp. 1-4 2008
[25] Z. Liu and S. Sarkar "Robust outdoor text detection using text intensity and shape features" Proc. IEEE Int. Conf. Pattern Recognit. pp. 1-4 2008
[26] R. Minetto N. Thome M. Cord N. J. Leite J. Stolfi "T-HOG: An effective gradient-based descriptor for single line text regions" Pattern Recognit. vol. 46 no. 3 pp. 1078-1090 2013
[27] C. Yi Y. Tian "Localizing text in scene images by boundary clustering stroke segmentation and string fragment classification" IEEE Trans. Image Process. vol. 21 no. 9 pp. 4256-4268 Sep. 2012
[28] Q. Ye Q. Huang W. Gao D. Zhao "Fast and robust text detection in images and video frames" Image Vis. Comput. vol. 23 pp. 565-576 2005
[29] K. Sheshadri S. K. Divvala "Exemplar driven character recognition in the wild" Proc. Brit. Mach. Vis. Conf. pp. 1-10 2012
[30] H. Koo D. H. Kim "Scene text detection via connected component clustering and non-text filtering" IEEE Trans. Image Process. vol. 22 no. 6 pp. 2296-2305 Jun. 2013
[31] L. Ahn, B. Maurer, C. McMillen, D. Abraham, and M. Blum, “reCAPTCHA: Human-Based character recognition via web security measures,” Science, vol. 321, no. 5895, pp. 1465–1468, 2008
[32] W. Kim and C. Kim "A new approach for overlay text detection and extraction from complex video scene" IEEE Trans. Image Process. vol. 18 no. 2 pp. 401-411 Feb. 2009
[33] J. J. Weinman Z. Butler D. Knoll J. Feild "Toward integrated scene text reading" IEEE Trans. Pattern Anal. Mach. Intell. vol. 3 no. 2 pp. 375-387 Feb. 2014
[34] P. Shivakumara W. Huang T. Phan C. Tan " For skewed or perspective distorted text, however, the projection profile analysis method is useless before estimating the text orientation. " Image Vis. Comput. vol. 43 no. 6 pp. 2165-2185 2010
[35] P. Shivakumara T. Q. Phan C. L. Tan "A Laplacian approach to multi-oriented text detection in video" IEEE Trans. Pattern Anal. Mach. Intell. vol. 33 no. 2 pp. 412-419 Feb. 2011
[36] T. Phan P. Shivakumara B. Su C. L. Tan "A gradient vector flow-based method for video character segmentation" Proc. IEEE Int. Conf. Doc. Anal. Recognit. pp. 1024-1028 2011
[37] M. J. Traxler M. A. Gernsbacher “Handbook of Psycholinguistics Amsterdam The Netherlands”:Elsevier 2006
[38] X. Chen J. Yang J. Zhang A. Waibel "Automatic detection and recognition of signs from natural scenes" IEEE Trans. Image Process. vol. 13 no. 1 pp. 87-99 Jan. 2004
[39] K. Sheshadri S. K. Divvala "Exemplar driven character recognition in the wild" Proc. Brit. Mach. Vis. Conf. pp. 1-10 2012
[40] L. Lin and C. L. Tan, “Text extraction fromname cards using neural network,” in Proc. Int. Joint Conf. Neural Netw., 2005, pp. 1818–1823
[41] J. J. Weinman, E. Learned-Miller, and A. Hanson, “Scene text recognition using similarity and a lexicon with sparse belief propagation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 10, pp. 1733–1746, Oct. 2009
Citation
Sheetal Garg, Akshatha P S., Kavyashree C., "An Extensive Survey on Text Detection and Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.546-551, 2019.
A Survey Paper On Credit Card Fraud Detection Using Different Classifiers
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.552-559, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.552559
Abstract
In this survey we will converse the classification algorithms which are useful on credit card datasets used for finding the scam detection of credit cards. The two major mechanisms to avoid frauds along with losses due to fraudulent actions are fraud avoidance and fraud discovery system. Fraud prevention is the practical mechanism with the objective of disable the incidence of fraud. Fraud discovery systems come interested in play when the fraudsters exceed the fraud prevention scheme and begin a fraudulent transaction. No one can recognize whether a fraudulent transaction has accepted the prevention method. Consequently, the objective of the fraud detection method is to ensure all transaction for the prospect of being fraudulent despite of the prevention method, along with to recognize fraudulent ones as rapidly as probable after the fraudster has begin to commit a fraudulent transaction.
Key-Words / Index Term
Credit card, classification, SVM, fraud, Naïve Bayes
References
[1] Avinash Ingole, Dr. R. C. Thool, “ Credit Card Fraud Detection Using Hidden Markov Model and Its Performance," International Journal of Advanced Research In Computer Science and Software Engineering (IJARCSSE), vol. 3, 6 June 2013.
[2] A. Agrawal, S. Kumar and A. K. Mishra, "Credit Card Fraud Detection: A case study," 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp 5-7, 2015.
[3] Clifton Phua, Member, IEEE, Kate Smith-Miles, Senior Member, IEEE, Vincent Cheng-Siong Lee, and Ross Gayler, “Resilient Identity Crime Detection”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 3, MARCH 2012.
[4] Dr R. Dhanapal, Gayathiri. P, “Credit Card Fraud Detection Using Decision Tree For Tracing Email And Ip," International Journal of Computer Science Issues (IJCSI) Vol. 9, Issue 5, No 2, September 2012.
[5] Hunt, E.B., Marin. and Stone,P.J., “Experiments in induction”, Academic Press, New York, 1996.
[6] Shafer, J., Agrawal, R., and Mehta, M., Sprint, “A scalable parallel classifier for data mining” Proceedings of the 22nd international conference on very large data base. Mumbai (Bombay), India, 1996.
[7] Ray-I Chang, Liang-Bin Lai, WenDe Su, Jen-Chieh Wang, Jen-Shiang Kouh “Intrusion Detection by Backpropagation Neural Networks with Sample-Query and Attribute-Query”. Research India Publications; 6-10, 2006.
[8] Raghavendra Patidar, Lokesh Sharma “Credit Card Fraud Detection Using Neural Network”. International Journal of Soft Computing and Engineering (IJSCE), Volume-1, Issue; pp 32-38, 2011.
[9] Siddhartha Bhattacharyya, Sanjeev Jha, Kurian Tharakunnel, J. Christopher Westland, “Data mining for credit card fraud: A comparative study”, Decision Support Systems 50 pp. 602–613,2011.
[10] Srivastava, Abhinav, Kundu, Amlan, Sural, Shamik and Majumdar, Arun K., “Credit Card Fraud Detection Using Hidden Markov Model”, IEEE Transactions on Dependable and Secure Computing, Vol. 5, No. 1, pp. 37-48, 2008.
[11] S. Ghosh and D.L. Reilly, “Credit Card Fraud Detection with a Neural-Network,” Proc. 27th Hawaii Int’l Conf. System Sciences: Information Systems: Decision Support and Knowledge Based Systems, vol. 3, pp. 621-630, 1994.
[12] V. Dheepa and R. Dhanapal, “Analysis of Credit Card Fraud Detection Methods,” international J. Recent Trends Eng., vol. 2, no. 3, pp. 126–128, 2009.
[13] R.S. Walse, G.D. Kurundkar, P. U. Bhalchandra, "A Review: Design and Development of Novel Techniques for Clustering and Classification of Data", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.19-22, 2018.
[14] A.K.Gupta, S.Gupta, "Neural Network through Face Recognition", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.38-40, 2018.
[15] Patel, Rinky D., and Dheeraj Kumar Singh. "Credit card fraud detection & prevention of fraud using genetic algorithm." International Journal of Soft Computing and Engineering (IJSCE) ISSN 2231-2307, 2013.
[16] Ingole, Avinash, and Dr RC Thool. "Credit card fraud detection using Hidden Markov Model and its performance." International Journal of Advanced Research in Computer Science and Software Engineering 3, pp 626-632, 2013.
[17]. Lawryshyn, Yuri. "Joseph Pun." Computing 5, no. 1 pp 37-48, 2008.
Citation
Ashish Kumar, Shivank Kumar Soni, Chetan Agrawal, "A Survey Paper On Credit Card Fraud Detection Using Different Classifiers," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.552-559, 2019.
Kernels in Mycielskian of a Digraph
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.560-562, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.560562
Abstract
A kernel J of a digraph D is an independent set of vertices of D such that for every vertex w∈V(D)J there exists an arc from w to a vertex in J. The Mycielskian μ(D) of a digraph D = (V,A) is the digraph with vertex set V ∪ V^`∪ {u}, where V` = {v`:v ∈ V}, and the arc set A ∪ {(x,y^` ):(x,y)∈ A}∪ {(x^`,y):(x,y)∈ A}∪ {(x`,u):x` ∈ V`} ∪ {(u,x`):x` ∈ V`}. In this paper, we have proved that, for any digraph D, the Mycielskian of D, μ(D), contains a kernel.
Key-Words / Index Term
Kernel, Mycielskian of a digraph
References
[1]. J. Bang-Jensen and G. Gutin, Digraphs: Theory, Algorithms and Applications, Second Edition, Springer-Verlag, 2009.
[2]. J. Von Neumann and O. Morgenstern, Theory of Games and Economic Behavior, Princeton University Press, Princeton, NJ, 1944.
[3]. M. R. Garey and D. S. Johnson, Computers and intractability, A Series of Books in the Mathematical Sciences, W. H. Freemann and Co., San Francisco, Calif., 1979.
[4]. E. Boros, V. Gurvich, Perfect graphs, kernels, and cores of cooperative games, Discrete Math. 306 (2006) 2336–2354.
[5]. M. Richardson, Solutions of irreflexive relations, Ann. Math. 58 (2) (1953) 573–580.
[6]. M. Richardson, Extensions theorems for solutions of irreflexive relations, Proc. Natl. Acad. Sci. USA 39 (1953) 649–651.
[7]. P. Duchet, H. Meyniel, A note on kernel–critical graphs, Discrete Math. 33 (1981) 103–105.
[8]. P. Duchet, Graphes Noyau-Parfaits, Ann. Discrete Math. 9 (1980) 93–101.
[9]. P. Duchet, A sufficient condition for a digraph to be kernel- perfect, J. Graph Theory 11 (1) (1987) 81–85.
[10]. H. Galeana-Sánchez, R. Rojas-Monroy, Kernels in quasi- transitive digraphs, Discrete Math. 306 (2006) 1969–1974.
[11]. H. Galeana-Sánchez, V. Neumann-Lara, On kernels and semikernels of digraphs, Discrete Math. 48 (1984) 67–76.
[12]. Litao Guo and Xiaofeng Guo, Connectivity of the Mycielskian of a digraph, Applied Mathematics Letters, 22 (2009) 1622-1625.
Citation
R. Lakshmi, S. Vidhyapriya, "Kernels in Mycielskian of a Digraph," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.560-562, 2019.
Content Based Image Retrivel on Non-Parametric Statistical Tests of Hypothesis
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.563-568, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.563568
Abstract
The field of image processing is addressed significantly by the role of CBIR. Peculiar query is the main feature on which the image retrieval of content based problems is dependent. Relevant information is required for the submission of sketches or drawing and similar type of features. Many algorithms are used for the extraction of features which are related to similar nature. The process can be optimized by the use of feedback from the retrieval step. Analysis of color and shape can be done by the visual contents of image. Here neural network, Relevance feedback techniques based on image retrieval are discussed.
Key-Words / Index Term
CBIR, Hypothesis, Image Retrival, Image Processing, Extraction
References
[1] J.Huang, S.R. Kunar, M.Mitra, W.J. Zhu, and R.Zabih, Image indexing using color correlogram, in: Proc. IEEE Comp. Soc. Conf. Comp. Vis. and Pattern Recognition, vol. 1, 1997, pp. 762-768.
[2] M.Stricker and M. Orengo, Similarity of color images, in: Storage and Retrieval for Image and Video Databases, Proc. SPIE 2420, vol. 1, 1995, pp. 381-392.
[3] A.Pentland, R.Picard, and S. Sclaroff, Photobook: Content-based manipulation of image databases, International Journal of Computer Vision 18(3) (1996) 233-254.
[4] Chiou-Shaan Fuh, Shun-Wen Cho, and Kai Essig, Hierarchical color image region segmentation for content-based image retrieval system, IEEE Transactions on Image Processing 9(1) (2000) 156-162.
[5] F. Jing, M. Li, H.J. Zhang, and B.Zhang, An efficient and effective region-based image retrieval framework, IEEE Transactions on Image Processing 13(5) (2004) 699-709.
[6] Jun-Wei Hsieh and W.Eric L. Grimson, Spatial template extraction for image retrieval by region matching, IEEE Transactions on Image Processing 12(11) (2003) 1404-1415.
[7] S. Belongie, C.Carson, H.Greenspan, and J.Malik, Recognition of images in large databases using color and texture, IEEE Transactions on Pattern Analysis and Machine Intelligence 24(8) (2002) 1026-1038.
[8] F. Jing, B.Zhang, F.Z.Lin, W.Y.Ma, and H.J.Zhang, A novel region-based image retrieval method using relevance feedback, in: Proc. 3rd ACM Int. Workshop on Multimedia Information Retrieval (MIR), 2001.
[9] Y.Deng and B.S.Manjunath, (1999) “An efficient low-dimensional color indexing scheme for regionbased image retrieval, in: Proc. IEEE Int. Conf. ASSP”, Vol.6, pp. 3017-3020.
[10] Ing-Sheen Hsieh and Huo-Chin Fan, (2001) “Multiple classifiers for color flag and trademark image retrieval”, IEEE Transactions on Image Processing, Vol. 10, No.6, pp. 938-950.
[11] J.R. Smith and C.S. Li, (1999), “Image classification and querying using composite region templates, Journal of Computer Vision and Image Understanding”, Vol. 75, No. 12, pp. 165-174. [12] J.Z. Wang and
[12] Y.P. Du, (2001) “Scalable integrated region-based image retrieval using IRM and statistical clustering”, in: Proc. ACM and IEEE Joint Conference on Digital Libraries, VA, 2001, pp. 268-277.
[13] Rahimi, M, M.H. Alizadeh, R. Rajabi and N. Mehrshad, The Comparison of Innovative Image Processing and Goniometer Methods in Q Angle Measurement ,World Applied Sciences Journal,18(2),2001,226-232.
[14] Rui, Yong. Relevance feedback a power tool for interactive content-based image retrieval, Circuits and Systems for Video Technology, IEEETransactions, 1998, 644-655.
[15] MacArthur, S. D, Brodley, C. E, Kak, A. C, & Broderick, L. S, Interactive content-based image retrieval using relevance feedback, Computer Vision and Image Understanding,88(2), 2002,55- 75 ,2002.
[16] Arevalillo-Herráez, Miguel, and Francesc J.Ferri, An improved distance-based relevance feedback strategy for image retrieval, Image and Vision Computing,31(10),2013,704-713.
[17] da Silva, André Tavares, Jefersson Alex dos Santos, Alexandre Xavier Falcao, Ricardo da S. Torres, and Léo Pini Magalhães, Incorporating multiple distance spaces in optimum-path forest classification to improve feedback-based learning, Computer Vision and Image Understanding ,116 (4),2012,510-523.
[18] Piras, Luca, and Giorgio Giacinto, Synthetic pattern generation for imbalanced learning in image retrieval, Pattern Recognition Letters ,33(16),2012,2198-2205.
[19] Metternich, Michael J, and Marcel Worring, Track based relevance feedback for tracing persons in surveillance videos, Computer Vision and Image Understanding ,117 (3),2013,229-237.
[20] Saneifar, Hassan, Stéphane Bonniol, Pascal Poncelet, and Mathieu Roche, Enhancing passage retrieval in log files by query expansion based on explicit and pseudo relevance feedback, Computers in Industry,2014,1-15.
[21] Wang, Xiang-Yang, Yong-Wei Li, Hong-Ying Yang, and Jing-Wei Chen, An image retrieval scheme with relevance feedback using feature reconstruction and SVM reclassification, Neurocomputing,(127),2014, 214- 230.
[22] Shyu, Mei-Ling, Shu-Ching Chen, Min Chen, and Chengcui Zhang, A unified framework for image database clustering and content-based retrieval, Proceedings. 2nd ACM international workshop. on Multimedia databases, 2004, 19-27.
[23] Quack, Till, Ullrich Mönich, Lars Thiele, and B. S. Manjunath, Cortina: a system for large-scale, content-based web image retrieval, Proceedings.12th annual ACM international .conference on Multimedia, 2004 ,508-511.
[24] Lin, Wei-Hao, Rong Jin, and Alexander Hauptmann, Web image retrieval re-ranking with
[25] relevance model , Proceedings. IEEE/WIC International Conference .on Web Intelligence, 2003,242-248.
[26] Wang, Xin-Jing, et al,Multi-model similarity propagation and its application for web image
[27] retrieval, Proceedings .12th annual ACM international conference. On Multimedia, 2004,944-951.
[28] Schaefer, Gerald, and Michal Stich, UCID: an uncompressed color image database, Proc. SPIE 5307 .on Storage and Retrieval Methods and Applications for Multimedia, 2004, 472-480.
[29] Yu, Hui, Mingjing Li, Hong-Jiang Zhang, and JufuFeng, Color texture moments for content-based image retrieval In Image Processing, Proceedings. International Conference on IEEE, (3), 2002,929- 932.
[30] Kekre, H. B, and Sudeep D. Thepade, Boosting Block Truncation Coding with Kekre`s LUV Color Space for Image Retrieval, International Journal of Electrical, Computer & Systems Engineering,2(3),2008.
[31] Gagaudakis, George, and Paul L. Rosin, Incorporating shape into histograms for CBIR,Pattern Recognition, 35 (1),2002,81-91.
[32] Zhang, Dengsheng, and GuojunLu, Content-Based Shape Retrieval Using Different Shape Descriptors: A Comparative Study, ICME, 2001, 1-4.
[33] Mussarat Yasmin, Muhammad Sharif, Sajjad Mohsin, Image Retrieval Techniques Using Shapes of Object: A Survey, Sci.Int (Lahore), 25(4), 2013, 723-729.
[34] Yasmin, Mussarat, Sajjad Mohsin, Isma Irum, and Muhammad Sharif, Content based image retrieval by shape, color and relevance feedback, Life Science Journal 10 (4s), 2013, 593-598.
[35] Prasad, B. G., K. K. Biswas, and S. K. Gupta,Region-based image retrieval using integrated color, shape, and location index, Computer vision and image understanding ,94 (1),2004,193-233.
[36] Singh, Chandan, Improving image retrieval using combined features of Hough transform and Zernike moments, Optics and Lasers in Engineering ,49(12),2011,1384-1396.
[37] Cheng, Heng-Da, X. H. Jiang, Ying Sun, and Jingli Wang, Color image segmentation advances and prospects, Pattern recognition, 34 (12), 2001,2259-2281.
[38] Qin, Chanchan, Guoping Zhang, Yicong Zhou, Wenbing Tao, and Zhiguo Cao, Integration of the saliency-based seed extraction and random walks for image segmentation, Neurocomputing, (129), 2013, 378–391.
[39] Zhang, Jun, and Lei Ye, Series feature aggregation for content-based image retrieval, Computers & electrical engineering ,36(4), 2010, 691-701.
[40] Seetharaman, K, and S. Sathiamoorthy,Color image retrieval using statistical model and radial basis function neural network, Egyptian Informatics Journal ,15 (1),2014,59-68.
[41] Sánchez-Cruz, Hermilo, and Ernesto Bribiesca, Polygonal approximation of contour shapes using corner detectors, Journal of applied research and technology, 7(3), 2009,275-290.
[42] Tao, Dacheng, Xiaoou Tang, Xuelong Li, and Yong Rui, Direct kernel biased discriminant analysis: a new content-based image retrieval relevance feedback algorithm, Multimedia IEEE Transactions ,8 (4) ,2006,716-727.
[43] Yasmin, Mussarat, Muhammad Sharif, and Sajjad Mohsin, Neural Networks in Medical Imaging Applications: A Survey, World Applied Sciences Journal, 22 (1) ,2013.
[44] Noda, Kuniaki, Hiroaki Arie, Yuki Suga, and Tetsuya Ogata, Multimodal integration learning of robot behavior using deep neural networks, Robotics and Autonomous Systems ,62 (6), 2014.721-736.
[45] Kurtz, Camille, Christopher F. Beaulieu, Sandy Napel, and Daniel L. Rubin, A hierarchical
[46] knowledge-based approach for retrieving similar medical images described with semantic annotations, Journal of biomedical informatics,2014,1-18.
[47] Gao, Chao, Dongguo Zhou, and YongcaiGuo, Automatic iterative algorithm for image segmentation using a modified pulse-coupled neural network, Neurocomputing,(119),2013,332-338.
[48] Son, Le Hoang, Nguyen Duy Linh, and Hoang Viet Long, A lossless DEM compression for fast retrieval method using fuzzy clustering and MANFIS neural network, Engineering Applications of Artificial Intelligence, 2013,33-42.
[49] Humberto Sossn, ElizabethGuevara, Efficient training for dendrite morphological neural networks, Neurocomputing, 2013, 132-142.
[50] Sudipta.Mukhopadhyay, A new content-based image retrieval technique using fuzzy class membership,NeuroComputing, 34(6), 2013,646– 654.
[51] Abrahams, Alan S. Eloise Coupey, Eva X. Zhong, Reza Barkhi, and Pete S. Manasantivongs, Audience targeting by B-to-B advertisement classification: A neural network approach, Expert Systems with Applications, 40,(8),2013,2777- 2791.
[52] Milanova, Mariofanna, Roumen Kountchev, Stuart Rubin, Vladimir Todorov, and Roumiana Kountcheva,Content Based Image Retrieval Using Adaptive Inverse Pyramid Representation, ,In (First Ed) ,Human Interface and the Management of Information and Interaction ,(Springer Berlin Heidelberg, 2009)304-314.
[53] Yasmin, Mussarat, Sajjad Mohsin, and Muhammad Sharif, Intelligent Image Retrieval Techniques A Survey, Journal of Applied Research and Technology,12 (1),2013,87-103.
[54] Seo, Kwang-Kyu , An application of one-class support vector machines in content-based image retrieval, Expert Systems with Applications, 33 (2), 2007,491-498.
[55] Su, Zhong, Hongjiang Zhang, Stan Li, and Shaoping Ma, Relevance feedback in content-based image retrieval Bayesian framework, feature subspaces and progressive learning, Image
[56] Processing IEEE Transactions, 12 (8),2003,924- 937.
[57] Lew, Michael S, Nicu Sebe, Chabane Djeraba, and Ramesh Jain, Content-based multimedia
[58] information retrieval State of the art and challenges, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 2 (1), 2006,1-19.
[59] K. Seetharaman, M. Jeyakarthic, Statistical distributional approach for scale and rotation invariant color image retrieval using multivariate parametric tests and orthogonality condition, Journal of Visual Communication Image Representation, 25(5), 2014, pp. 727- 739.
Citation
S. Selvaraj, K. Seetharaman, "Content Based Image Retrivel on Non-Parametric Statistical Tests of Hypothesis," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.563-568, 2019.