Recommendation System for Electronic Product
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.1-6, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.16
Abstract
Recommendation System(RS) is one of machine that uses in many fields of application like music, book, shopping, and etc. With an RS, it makes users easier to find items that are very likely to be searched for. Not only star rating, but testimonials are also one of the data that affects buyers or connoisseurs of a product. The challenge is testimonial is not in numerical data type such as star rating. In this study, the researchers tried to build an architecture to combine the results of the testimonial through sentiment analysis and star rating which are processed separately in an RS. The dataset is reviews of few items in Amazon. The sentiment analysis uses Lexicon-based Approach, which RE use Collaborative filtering with PySpark library. The sentiment analysis has positive, negative, stop words, product-does corpora with double negative or positive words handling, cross negative-positive corpus words handling, and negative of product workless handling. The result is the architecture can be implemented with the testimonial and star rating dataset with giving recommendation items for every user.
Key-Words / Index Term
Recommendation System, Sentiment Analysis, Collaborative Filtering, PySpark
References
[1] G. Zaccone. and R. Karim, “Deep Learning with TensorFlow”, 2nd ed. [S.l.]: Packt Publishing, 2018.
[2] C. Pan and W. Li, "Research paper recommendation with topic analysis", In the Proceedings of the 2010 International Conference On Computer Design and Applications (ICCDA, 2010)
[3] A. Ziani et al., “Recommender System Through Sentiment Analysis”, in 2nd International Conference on Automatic Control, Telecommunications, and Signals, Annaba, 2017.
[4] R. Guimaraes, D. Rodriguez, R. Rosa, and G. Bressan, "Recommendation system using sentiment analysis considering the polarity of the adverb", In the Proceedings of the 2016 IEEE International Symposium on Consumer Electronics (ISCE), Sao Paulo, Brazil, 2016. ISSN 2159-1423.
[5] Y. Wang, M. Wang and W. Xu, “A Sentiment-Enhanced Hybrid Recommender System for Movie Recommendation: A Big Data Analytics Framework”, Wireless Communications and Mobile Computing, Vol. 2018, pp. 1-9, 2018.
[6] G. Asrofi Buntoro, T. Bharata Adji and A. Erna Purnamasari, “Sentiment Analysis Twitter dengan Kombinasi Lexicon Based dan Double Propagation”, Conference on Information Technology and Electrical Engineering, pp. 39-43, 2014.
[7] G. Qiu, B. Liu, J. Bu, and C. Chen, “Expanding domain sentiment lexicon through double propagation”, In the Proceedings of the 2009 International Joint Conference on Artificial Intelligence, Pasadena, California, USA, 2009, pp. 1199-1204.
[8] Y. Koren, R. Bell, and C. Volinsky, “Matrix Factorization Techniques for Recommender Systems”, Computer (IEEE, 2009), vol. 42, no. 8, pp. 30-37, 2009.
[9] Y. Zhou, D. Wilkinson, R. Schreiber, and R. Pan, “Large-Scale Parallel Collaborative Filtering for the Netflix Prize”, Algorithmic Aspects in Information and Management, pp. 337-348.
[10] B. Liu, Sentiment Analysis and Opinion Mining. Morgan & Claypool, 2012.
[11] B. Verma, R. Thakur, and S. Jaloree, “Predicting Sentiment from Movie Reviews Using Lexicon Based Model”, International Journal of Computer Sciences and Engineering, Vol. 6, No. 10, pp. 28-34, 2018.
Citation
Dea Dania, Lily Wulandari, "Recommendation System for Electronic Product," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.1-6, 2019.
The Data Dissemination Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.7-13, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.713
Abstract
To increased safety and efficiency of road transportation system have promoted automobile manufacturers to integrate wireless communications and networking into vehicles. VANETs have the potential to transform the way people travel through the creation of a safe, interoperable wireless communications network that includes cars, buses, traffic signals, cell phones, and other devices. Due to increasing reliance on communication, computing, and control technologies have become vulnerable to security threats in VANET. To provide the security in VANET by developing the new mechanism which is integrity(data trust), confidentiality, non-repudiation, access control, real-time operational constraints/demands, availability, and data dissemination technique. In our proposed system propose the novel scheme which is called as trust management scheme data dissemination in order to eavesdroppers with threshold based malicious node detection algorithm (TMD) for VANETs that is able to accurately detect and cope with malicious attacks and also evaluate the trustworthiness of both data and mobile nodes in VANETs. At first the data trust is evaluated based on the data sensed and collected from multiple vehicles; after that we evaluate the node trust in two dimensions, i.e., functional trust and recommendation trust. The functional trust is indicating how likely a node can fulfill its functionality. The recommendation trust is indicating how trustworthy the recommendations from a node for other nodes will be, respectively. Finally our experimental result shows our proposed trust management theme is applicable to a wide range of VANET applications to improve traffic safety, mobility, and environmental protection with enhanced trustworthiness.
Key-Words / Index Term
Vehicular Ad-hoc Networks, Wireless Sensor Networks, Time Division Multiple Access
References
[1] Z. Fei, B. Li, S. Yang, C. Xing, H. Chen, and L. Hanzo, “A survey of multi-objective optimization in wireless sensor networks: Metrics, algorithms, and open problems,” IEEE Communications Surveys Tutorials, vol. 19, no. 1, pp. 550–586, Firstquarter 2017.
[2] L. M. Borges, F. J. Velez, and A. S. Lebres, “Survey on the characterization and classification of wireless sensor network applications,” IEEE Communications Surveys Tutorials, vol. 16, no. 4,pp. 1860–1890, Fourthquarter 2014.
[3] H. Karl and A. Willig, Protocols and architectures for wireless sensor networks. Hoboken, NJ: Wiley, May 2005.
[4] A. B. Noel, A. Abdaoui, T. Elfouly, M. H. Ahmed, A. Badawy, and M. S. Shehata, “Structural health monitoring using wireless sensor networks: A comprehensive survey,” IEEE Communications Surveys Tutorials, vol. 19, no. 3, pp. 1403–1423, third quarter 2017.
[5] D. N. Sandeep and V. Kumar, “Review on clustering, coverage and connectivity in underwater wireless sensor networks: A communication techniques perspective,” IEEE Access, vol. 5, pp.11 176–11 199, 2017.
[6] A. M. Abu-Mahfouz and G. P. Hancke, “Alwadha localization algorithm: Yet more energy efficient,” IEEE Access, vol. 5, pp.6661–6667, 2017.
[7] Y. S. Chen, D. J. Deng, and C. C. Teng, “Range-based localization algorithm for next generation wireless networks using radical centers,” IEEE Access, vol. 4, pp. 2139–2153, 2016.
[8] A. Alomari, W. Phillips, N. Aslam, and F. Comeau, “Dynamic fuzzy-logic based path planning for mobility-assisted localization in wireless sensor networks,” Sensors, vol. 17, no. 8, 2017.
[9] S. Halder and A. Ghosal, “A survey on mobile anchor assisted localization techniques in wireless sensor networks,” Wireless Networks, vol. 22, no. 7, pp. 2317–2336, 2016
[10] N. A. Alrajeh, M. Bashir, and B. Shams, “Localization techniques in wireless sensor networks,” International Journal of DistributedSensor Networks, vol. 9, no. 6, p. 304628, 2013.
[11] G. Han, J. Jiang, C. Zhang, T. Q. Duong, M. Guizani, and G. K. Karagiannidis, “A survey on mobile anchor node assisted localization in wireless sensor networks,” IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp. 2220–2243, thirdquarter 2016.
[12] S. Mirjalili, S. M. Mirjalili, and A. Lewis, “Grey wolf optimizer,” Advances in Engineering Software, vol. 69, pp. 46 – 61, 2014.
[13] S. Mirjalili and A. Lewis, “The whale optimization algorithm,” Advances in Engineering Software, vol. 95, pp. 51 – 67, 2016.
[14] A. Alomari, F. Comeau, W. Phillips, and N. Aslam, “New path planning model for mobile anchor-assisted localization in wireless sensor networks,” Wireless Networks, pp. 1–19, 2017.
[15] D. Koutsonikolas, S. M. Das, and Y. C. Hu, “Path planning of mobile landmarks for localization in wireless sensor networks,” Comput. Commun., vol. 30, no. 13, pp. 2577–2592, Sep. 2007.
[16] Yusuf Perwej “The Hadoop Security in Big Data: A Technological Viewpoint and Analysis”, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.3, pp.1-14, 2019.
[17] Rucha Pawar, “Wireless Mesh Network Link Failure Issues and Challenges: A Survey”, IJSRNSC, Vol -6, Issue-3, 2018.
Citation
K. Premkumar, R. Baskaran, "The Data Dissemination Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.7-13, 2019.
Emotion Identification between POMS and Multinomial Naive Bayes Algorithm Using Twitter API
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.14-19, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.1419
Abstract
The analysis of social networks is a very challenging research area while a fundamental aspect concerns the detection of user communities. The existing work of emotion recognition on Twitter specifically depends on the use of lexicons and simple classifiers on bag-of words models. The vital question of our observation is whether or not we will enhance their overall performance using machine learning algorithms. The novel algorithm a Profile of Mood States (POMS) represents twelve-dimensional mood state representation using 65 adjectives with combination of Ekman’s and Plutchik’s emotions categories like, anger, depression, fatigue, vigour, tension, confusion, joy, disgust, fear, trust, surprise and anticipation. These emotions classify with the help of text based bag-of-words and LSI algorithms. The contribution work is to apply machine learning algorithm for emotion classification, it takes less time for classification without interfere human labeling. The Multinomial Naïve Bayes classifier works on testing dataset with help of huge amount of training dataset. Measure the performance of POMS & Multinomial Naïve Bayes algorithms on Twitter API. The result shows with the help of Emojis for emotion recognition using tweet contents.
Key-Words / Index Term
Emotion Recognition, Text Mining, Twitter, Recurrent Neural Networks, Convolutional Neural Networks, Multinomial Naïve Bayes Classifier
References
[1] NikoColneric and Janez Demsar, “Emotion Recognition on Twitter: Comparative Study and Training a Unison Model” IEEE Transactions on Affective Computing. PP. 1-1.10.1109/TAFFC. 2018. 2807817.
[2] J. Bollen, H. Mao, and X.-J. Zeng, “Twitter mood predicts the stock market,” J. of Computational Science, vol. 2, no. 1, pp. 1–8, 2011.
[3] J. Bollen, H. Mao, and A. Pepe, “Modelling Public Mood and Emotion: Twitter Sentiment and Socio-Economic Phenomena”, in Proc. of the 5th Int. AAAI Conf. on Weblogs and Social Media Modelling, 2011, pp. 450-453.
[4] S. M. Mohammad, X. Zhu, S. Kiritchenko, and J. Martin, “Sentiment, emotion, purpose, and style in electoral tweets,” Information Processing and Management, vol. 51, no. 4, pp. 480–499, 2015.
[5] B. Plank and D. Hovy, “Personality Traits on Twitter or How to Get 1,500 Personality Tests in a Week,” in Proc. of the 6th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis, 2015, pp. 92–98.
[6] X. Liu, J. Gao, X. He, L. Deng, K. Duh, and Y.-Y. Wang, “Representation Learning Using Multi-Task Deep Neural Networks for Semantic Classification and Information Retrieval,” Proc. of the 2015 Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 912–921, 2015.
[7] O. Irsoy and C. Cardie, “Opinion Mining with Deep Recurrent Neural Networks,” in Proc. of the Conf. on Empirical Methods in Natural Language Processing. ACL, 2014, pp. 720–728.
[8] S. M. Mohammad and S. Kiritchenko, “Using Hashtags to Capture Fine Emotion Categories from Tweets,” Computational Intelligence, vol. 31, no. 2, pp. 301–326, 2015.
[9] B. Nejat, G. Carenini, and R. Ng, “Exploring Joint Neural Model for Sentence Level Discourse Parsing and Sentiment Analysis,” Proc. of the SIGDIAL 2017 Conf., no. August, pp. 289–298, 2017.
[10] S Kamble, SM Sangve, “Real time Detection of Drifted Twitter Spam Based On Features,” International Journal of General Science and Engineering Research (IJGSER), ISSN 2455-510X,Vol 4(1), 2018,21-23.
[11] Harshad Dattatray Markad, SMS angve, “Parallel Outlier Detection for Streamed Data Using Non-Parameterized Approach,” IJSE, Volume 8, Issue 2 July-December 2017.
[12] M. Farhoodi and A. Yari, “Applying machine learning algorithms for automatic Persian text classification,” 2010 6th International Conference on Advanced Information Management and Service (IMS), Seoul, 2010, pp. 318-323.
[13] E. Tromp and M. Pechenizkiy, “Rule-based Emotion Detection on Social Media:” Putting Tweets on Plutchik’s Wheel, arXiv preprint arXiv: 1412.4682, 2014.
[14] S. Chaffar and D. Inkpen, “Using a Heterogeneous Dataset for Emotion Analysis in Text”, in Canadian Conf. on Artificial Intelligence. Springer, 2011, pp. 6267.
[15] S. Aman and S. Szpakowicz, “Identifying Expressions of Emotion in Text, in Int. Conf. on Text, Speech and Dialogue”, vol. 4629. Springer, 2007, pp. 196205.
[16] G. Mishne, “Experiments with Mood Classification in Blog Posts”, in Proc. of ACM SIGIR 2005 Workshop on Stylistic Analysis of Text for Information Access, vol. 19, 2005, pp. 321327.
Citation
Asharani S Dandoti, Sunil M Sangve, "Emotion Identification between POMS and Multinomial Naive Bayes Algorithm Using Twitter API," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.14-19, 2019.
Punjabi Speech Syllable Segmentation Using Vowel Onset Point Identification
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.20-27, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.2027
Abstract
Speech Recognition has been a wide area of research for a long time now. Researchers have been putting a lot of efforts and devised different methods for the same. For Speech Recognition system, speech signal is divided or segmented into some acoustic units like phonemes, syllables and word which will reduces the search space for unwanted signal or noise. This research work aims at developing an Automatic Speech Segmentation algorithm for Punjabi language which segments the signal into syllabes. For Automatic Speech Syllable Segmentation, a proposed technique detects the syllable boundaries using gamma tone filter and oscillator. In this proposed technique, valley picking picks the valley of the signal and gives the onset of the speech signal. Results of proposed technique was compared with the existing method which takes less time. After that Automatic Speech Classification algorithm classifies the signal into two classes either native or non native. For this, system had been trained using Artificial Neural Network (ANN) for estimating the parameter of Native and Non-Native spekers using Mel Frequency Cepstrum Coefficients (MFCCs) for feature extraction. The whole work was performed in Matlab2016a and the results generated as output with high accuracy.
Key-Words / Index Term
MFCC, ANN, MATLAB, Punjabi language, gamma tone fiter bank and oscillator
References
[1] Y. Youhao," Research on Speech Recognition Technology and Its Application,"in the proceedings of the 2012 International Conference on Computer Science and Electronics Engineering Research, vol. 6, no. 12, pp. 306-309, 2012.
[2] K. Amino, T. Osanai, “Native vs. non-native accent identification using Japanese spoken telephone numbers,” Speech Communication, vol. 56, no. 1, pp. 70–81, 2014.
[3] M. Wester, C. Mayo, “Accent rating by native and non-native listeners,” in the proceedings of the 2014 ICASSP IEEE International Conference Acoustically Speech Signal Processing, no. i, pp. 7699–7703, 2014.
[4] D. B. Hanchate, M. Nalawade, M. Pawar, V. Pophale, P. K. Maurya,“Vocal Digit Recognition using Artificial Neural Network,” IEEE Journal, vol. 7, no. 10, pp. 88–91, 2010.
[5] L. Bouafif and K. Ouni, “A speech tool software for signal processing applications,” in the proceedings of the 2012 6th International Conference Science Electronics Technology Information Telecommunication SETIT, pp. 788–791, 2012.
[6] E. Sakran, S. M. Abdou, S. E. Hamid, M. Rashwan, “A Review : Automatic Speech Segmentation,” International Journal of Computer Science and Mobile Computing, vol. 6, no. 4, pp. 308–315, 2017.
[7] P. Kumari, D. Shakina Deiv, M. Bhattacharya, “Automatic speech recognition of accented Hindi data,” in the proceedings of the 2014 International Conference on Computation of Power, Energy, Information and Communication(ICCPEIC), pp. 68–76, 2014.
[8] A. Kaur, E. T. Singh, “Segmentation of Continuous Punjabi Speech Signal into Syllables,” World Congress on Engineering and Computer Science, vol. I, pp. 20–23, 2010.
[9] S. P. Panda, A. K. Nayak, “Automatic speech segmentation in syllable centric speech recognition system,” International Journal of Speech Technology, vol. 19, no. 1, pp. 9–18, 2016.
[10] K. Geetha, R. Vadivel, “Syllable Segmentation of Tamil Speech Signals Using Vowel Onset Point and Spectral Transition Measure,” Automatic Control and Computer Sciences, vol. 52, no. 1, pp. 21–25, 2018.
[11] L. Mary, A. P. Antony, “Automatic syllabification of speech signal using short time energy and vowel onset points,” International Journal of Speech Technology, pp. 571– 579, 2018.
[12] S. S. Tirumala, S. R. Shahmiri, A. S. Garhwal, “Speaker Identification feature extraction methods: A Systematic Review”, International Journal of Elsevier, Vol(90),pp. 250-271, 2017.
[13] T. Ozseven, M. Dugenci, “SPeech ACoustic (SPAC): A novel tool for speech feature extraction and classification”, International Journal of Elsevier, 136, pp. 1-8, 2018.
[14] M. R. Gamit, K. Dhameliya, Dr. N. S. Bhatt, “Classification Techniques for Speech Recognition”, International Journal of Emerging Technology and Advanced Engineering, vol. 5, no. 2, pp. 58-63, 2015.
[15] C. P. Bharat, A. A. Desai, “Segmentation of Gujarati words from Continuous spoken Gujarati Speech Signal,” VNSGU Journal of Science and Technology, vol. 4, no. 1, pp. 106-112, 2015.
[16] B. Barhate, D. Sisodiya, R. Deore, “Applications of Speech Recognition: For Programming Languages,” International Journal of Scientific Research in Computer Science and Engineering, vol. 6, no. 1, pp. 6-8, 2018.
[17] Madan, D. Gupta, “Speech Feature Extraction and Classification,” International Journal of Computer Applications, vol. 2, no. 1, pp. 10-15, 2014.
[18] H. K. Soni, “Machine Learning – A New Paradigm of AI,” International Journal Scientific Research in Network Security and Communication, vol. 7, no. 3, pp. 31- 32, 2019.
Citation
S. Kaur, M.K. Gill, "Punjabi Speech Syllable Segmentation Using Vowel Onset Point Identification," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.20-27, 2019.
Approach for Segmentation of Micro-calcification in Mammographic Images
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.28-32, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.2832
Abstract
Ductal Carcinoma (Breast Cancer) is still the most common type of cancer throughout the world and a frequent cause of cancer death among women. Mammography is the most effective and reliable method for accurate detection of breast cancer in recent years. Micro-calcification (MC) is the tiny specks of calcium which appears in the form of clusters in breast tissue. So the detection of MC cluster in breast tissue plays an important role in enhancing the breast cancer diagnosis. In this report, a knowledge-based approach for the automatic detection and segmentation of micro-calcifications in mammographic images is presented. Segmentation is done by using Adaptive Histogram Equalization (AHE) and by calculating range block and domain block of the image. To validate the efficacy of the suggested scheme, simulation has been carried out using Mammography Image Analysis Society (MIAS) database.
Key-Words / Index Term
Adaptive Histogram Equalization (AHE), Mammography Image Analysis Society (MIAS), Micro-calcification (MC), Region of interest (ROI)
References
[1] Motagi, A.C. & Malemath, Virendra. (2018). Detection of Brain Tumor using Expectation Maximization (EM) and Watershed. International Journal of Scientific Research in Computer Science and Engineering. 6. 76-80. 10.26438/ijsrcse/v6i3.7680.
[2] Rangayyan , R. M. and A. F. Ferrari, “Detection of asymmetry between left and right mammograms”, In the Proceedings of the 7 th international Workshop on Digital Mammography, Chapel Hill, NC. , USA. , pp: 651-658, 2004.
[3] S. Abhinaya, Dr.R.Sivakumar , Dr.M.Karnan, D.Murali Shankar , Dr.M.Karthikeyan, ” detection of breast cancer in mammograms - a survey ”, International Journal of Computer Application and Engineering Technology Volume 3-Issue 2, Apr 2014.Pp. 172-178.
[4] Bommeswari Barathi , Siva Kumar.R , Karnan.M. "Computer Aided Detection Algorithm for Digital Mammogram Images – A Survey ". International Journal of Computer Trends and Technology (IJCTT) V8(3):138-147, February 2014.
[5] Ciatto, S. , M. R. Del Turco, G. Risso, S. Catarzi et al.,”Comparison of standard reading and Computer Aided Detection(CAD)” on a national proficiency test of screening mammography.Europien Journal of Radiology,45:135-138,2003.
[6] Alaa Al-Nusirat 1 , Feras Hanandeh 2 , Mohammad Kharabsheh3 , Mahmoud Al-Ayyoub4 and Nahla Al-dhufairi5, ” Dynamic Detection of Software Defects Using Supervised Learning Techniques ”, International Journal of Communication Networks and Information Security (IJCNIS) Vol. 11, No. 1, April 2019.
[7] Joseph Peter V, Karn an M, “Medical Image Analysis Using Unsupervised and Supervised Classification Techniques“, International Journal of Innovative Technology and Exploring Engineering, Vol 3, Iss 5, Pp 40-45,2013.
[8] Dheeba.J, Wiselin Jiji.G,” Detection of Microcalcification Clusters in Mammograms using Neural Network”, International Journal of Advanced Science and Technology of Advanced Science and Technology of Advanced Science and Technology Vol. 19 Vol. 19, June, 2010
[9] Alam N., Oliver A., Denton E.R.E., Zwiggelaar R. “Automatic Segmentation of Microcalcification Clusters” Springer Nature Switzerland AG, M. Nixon et al. (Eds.): MIUA 2018, CCIS 894, pp. 251–261, 2018
[10] Tomasz Arod´z, Marcin Kurdziel , Tadeusz J. Popiela, Erik O.D. Sevre, David A. Yuen, “Detection of clustered microcalcifications in small field digital mammography”, computer methods and programs in biomedicine, Volume 81, Issue 1,Pages 56-65 January 2006.
[11] Arnau Oliver, Albert Torrent, Xavier Llado, Meritxell Tortajada, Lidia Tortajada, Melcior Sentis, Jordi Freixenet, Reyer Zwiggelaar, “Automatic microcalcification and cluster detection for digital and digitised mammograms”, Knowledge-Based Systems, Volume 28, Pages 68-75 , April 2012.
[12] Ait Ibachir I., Es-salhi R., Daoudi I., Tallal S., medromi H., “A survey on Segmentation Techhniques of mammogram Images” in Advances in Ubiquitous Networking 2, Springer, vol 397.,2017.
[13] X. Zhang, X. Li, Y. Feng, “A Medical Image Segmentation Algorithm Based on Bi-directional Region Growing”, Optik Volume 126, Issue 20, Pages 2398-2404, October 2015.
[14] Zhi Luz Gustavo Carneiroy Neeraj Dhungely Andrew P. Bradley,” automated detection of individual micro-calcifications from mammograms using a multi-stage cascade approach” Supported by the Australian Research Council Discovery Project, 2016.
[15] K. Kavitha, N. Kumaravel, "A comparitive study of various microCalcification cluster detection methods in digitized mammograms", IWSSIP and EC-SIPMCS - Proc. 2007 14th Int. Workshop on Systems Signals and Image Processing and 6th EURASIP Conf. Focused on Speech and Image Processing Multimedia Communications and Services, pp. 405-409, 2007.
Citation
Pooja Chaudhari, P. B. Bhalerao, "Approach for Segmentation of Micro-calcification in Mammographic Images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.28-32, 2019.
Deep Learning Technique for Cloud Detection using Satellite Data
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.33-39, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.3339
Abstract
Cloud detection is a crucial task and has varied ranges of implications in retrieving important parameters using satellite data. Identifying clouds from clear sky hold great importance in many satellite Imagery applications. Many approaches are used for performing cloud detection on satellite data products. Some of the well-known approaches are a threshold-based approach, a machine learning approach, and a few others, but these approaches lack robustness as these approaches require a profuse amount of time in performing feature-selection. Most of the algorithms fail in taking advantage of spatial arrangement and are time intensive. In tasks like image recognition and object detection, deep learning has outperformed compared to other approaches. In this paper, a deep learning model was proposed for performing cloud detection using INSAT 3D satellite data product which overcomes all the above-mentioned limitations. The proposed model architecture consists of encoder and decoder modules, which will perform sampling, feature extraction, and up-sampling. The proposed model takes five features consisting of SWIR, VIS, TIR1, TIR2, and MIR spectral band’s/channel’s data as input and generates cloud mask as output. Generated cloud mask performs better distinction between cloudy and non-cloudy pixels under different surface conditions, mostly over ice and snow. The proposed model will generate a day-time cloud mask as SWIR and VIS spectral bands data are available only during the day-time.
Key-Words / Index Term
Deep Learning, Cloud detection, Multispectral channels, Satellite data, INSAT 3D
References
[1] Jedlovec G., “Automated detection of clouds in satellite imagery”; In Advances in Geoscience and Remote Sensing, IntechOpen, 2009.
[2] Köhler C.; Steiner A.; Saint-Drenan YM.; Ernst D.; Bergmann-Dick A.; Zirkelbach M.; Bouallègue ZB.; Metzinger I.; Ritter B.; “Critical weather situations for renewable energies”–Part B: Low stratus risk for solar power. Renewable energy 2017, 101, 794-803.
[3] Drönner J.; Korfhage N.; Egli S.; Mühling M.; Thies B.; Bendix J.; Freisleben B.; Seeger B. “Fast cloud segmentation using convolutional neural networks”. Remote Sensing 2018, 10, 1782.
[4] Hughes M.; Hayes D.; “Automated detection of cloud and cloud shadow in single-date Landsat imagery using neural networks and spatial post-processing”. Remote Sensing, 2014, 6, 4907-26.
[5] Yuan Y.; Hu X.; “Bag-of-words and object-based classification for cloud extraction from satellite imagery”. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2015, 8, 4197-205.
[6] Bai T.; Li D.; Sun K.; Chen Y.; Li W.; “Cloud detection for high-resolution satellite imagery using machine learning and multi-feature fusion”. Remote Sensing, 2016, 8, 715.
[7] Ishida H.; Oishi Y.; Morita K.; Moriwaki K.; Nakajima TY.; “Development of a support vector machine based cloud detection method for MODIS with the adjustability to various conditions”. Remote Sensing of Environment, 2018, 205, 390-407.
[8] Mateo-García G.; Gómez-Chova L.; Camps-Valls G.; “Convolutional neural networks for multispectral image cloud masking”. In 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), 2017, pp. 2255-2258, IEEE.
[9] Xie F.; Shi M.; Shi Z.; Yin J.; Zhao D.; “Multilevel cloud detection in remote sensing images based on deep learning”. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2017, 10, 3631-40.
[10] Zhan Y.; Wang J.; Shi J.; Cheng G.; Yao L.; Sun W.; “Distinguishing cloud and snow in satellite images via deep convolutional network”. IEEE Geoscience and Remote Sensing Letters, 2017, 14, 1785-9.
Citation
Dhrupa Patel, Sonal Rami, "Deep Learning Technique for Cloud Detection using Satellite Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.33-39, 2019.
Automatic Detection of Fake Profiles in Online Social Networks
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.40-45, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.4045
Abstract
In the present generation, the social life of everyone has become associated with the online social networks. These sites have made a drastic change in the way we pursue our social life. Making friends and keeping in contact with them and their updates has become easier. But with their rapid growth, many problems like fake profiles, online impersonation have also grown. There are no feasible solution exist to control these problems. In this project, we came up with a framework with which automatic detection of fake profiles is possible and is efficient. This framework uses classification techniques like Support Vector Machine, Naive Bayes and Decision trees to classify the profiles into fake or genuine classes. As, this is an automatic detection method, it can be applied easily by online social networks which has millions of profile whose profiles cannot be examined manually.
Key-Words / Index Term
Threats, Facebook Immune System, Classification, Training Datasets, Profile Attributes
References
[1] T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS, volume 11, page 8, 2011.
[2] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93{102. ACM, 2011.
[3] C. Wagner, S. Mitter, C. Korner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW, volume 12, 2012.
[4] G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295{300. IEEE, 2011.
[5] A. Wang. Detecting spam bots in online social networking sites: a machine learning approach. Data and Applications Security and Privacy XXIV, pages 335{342, 2010.
[6] G.K. Gupta. Introduction to Data Mining with Case Studies. Prentice Hall India, 2008.
[7] Spies create fake facebook account in nato chief`s name to steal personal details, http://in. news.yahoo.com/spies-create-fake-facebook-account-nato-chiefs-name-114824955.html.
[8] Man arrested for uploading obscene images of woman colleague, http://www.ndtv.com/ article/andhra-pradesh/man-arrested-for-uploading-obscene-images-of-woman-colleague-173266.
[9] How obamas internet campaign changed politics, /bits.blogs.nytimes.com/2008/11/07/how-obamas internet-campaign-changed-politics.
[10] M. Huber, M. Mulazzani, and E. Weippl. Who on earth is mr. cypher: Automated friend injection attacks on social networking sites. Security and Privacy{Silver Linings in the Cloud, pages 80{89, 2010.
Citation
R.V. Kotawadekar, A.S. Kamble, S.A. Surve, "Automatic Detection of Fake Profiles in Online Social Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.40-45, 2019.
Performance Analysis of Convert a Gray Image to Color Image
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.46-49, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.4649
Abstract
A simple and efficient method for coloring the gray-scale images into the color images with the existing color map or with creating a new one. The conversion of grayscale images into the color images using different algorithm methods. This color matching technique helps in adding chromatic values to a colorless image and measure for color transfer. Moderately than choosing the entire color from the source to the target image transfer RGB colors from a palette to color gray scale components, by matching difference information between the images. The target image achieved high quality with higher PSNR and lower MSE metrics. It shows that this simple method can be successfully applied to a variety of gray scale images and it can be applicable in different applications.
Key-Words / Index Term
Gray scale image, RGB image, color map, lockup table, color matching
References
[1] Rafael C. Gonzalez (University of Tennessee), Richard E. Woods (MedData Interactive) and Steven L. Eddins (The MathWorks, Inc.), in „Digital Image Processing Using MATLAB‟ Second Edition,2009 by Gatesmark, LLC.
[2] Alasdair McAndrew, in „An Introduction to Digital Image Processing with Matlab, Notes for SCM2511 Image Processing 1‟, School of Computer Science and Mathematics ,Victoria University of Technology.
[3] Justyna Inglot, „Advanced Image Processing with Matlab‟, in Bachelor‟s Thesis Information Technology, May 2012, Date of the bachelor`s thesis.
[4] Miss. Apurva B. Parandekar, Prof. S.S.Dhande, Prof. H.R.Vhyawhare, A Review on Changing Image from Grayscale to Color, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 1, January 2014.
[5]MahmoudK. Quweider“AdaptivePseudocoloring of Medical Images Using Dynamic Optimal Partitioning and Space-FillingCurves” Biomedical Engineering and Informatics, 2009. BMEI `09. 2nd International Conference, PP. 1-6,17-19 Oct. 2009.
[6] Ye Ji, Yan Chen, “ Rendering Grayscale Image using Color Feature” IEEE Int. Conf. on Machine Learning and Cybernetics, Vol.5, pp. 3017-3021, [7] C.W.Kok, Y.Hui, T.Q.Nguyen, “Medical Image Pseudo Coloring by Wavelet Fusion” 18th Annual International Conference of theIEEE Engineering in Medicine and Biology Society. Amsterdam,1996.
[8] GovindHaldankar, AtulTikare and JayprabhaPatil, “Converting Gray-Scale Image to Color Image” Proceedings of SPIT-IEEEColloquium and International Conference, Vol. 1, pp. 189-192,Mumbai, India, June 2011
[9] Cheng-Hsiung Hsieh, Chih-Ming Lin, Fung-Jung Chang, “Pseudo coloring with Histogram Interpolation” Ninth InternationalConference on Hybrid Intelligent Systems 2009.
[10] TomihisaWelsh,MichaelAshikhmin and Klaus Mueller, “Transferring color to grayscale images”, Journal ACM Transactions on Graphics (TOG) - Proceedings of ACM SIGGRAPH 2002TOG, Volume 21 Issue 3, PP. 277-280 , July 2002.
[11] Rujuta R Mahambare “CONVERTING GRAY-SCALE IMAGE TOCOLOR IMAGE”, IJCITB ISSN: 2278-7593, Volume-1, Issue-4 IEEE & IEEE Computational Intelligence Society,PP.142-146, April-June 2013 Issue.
[12] Dr. AhlamFadhilMahmoodAbdulkreem Mohammad Salih, “Implementation of Multiplier less Architectures for Color Space Conversions on FPGA”,IEEE Transactions on Consume Electronics, Volume 53, Number 4, PP1490-1493,November 2004.
[13] Stephen J. Chapman, Second Edition Matlab Programming for Engineering,[2002].
[14] Ingmar Lissner, Jens Preiss,” Image-Difference Prediction:From Grayscale to Color”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 2, PP.435-446 FEB 2013.
[15] Sýkora, D. , Buriānek, J. and Žǎra, J. ,"Unsupervised Colorization ofBlack-and-White Cartoons" , Proceedings of NPAR, Annecy,ACM SIGGRAPH, 2004 .
Citation
P. Ravi, "Performance Analysis of Convert a Gray Image to Color Image," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.46-49, 2019.
Navigation Based on Distance and Speed Required on Road
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.50-53, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.5053
Abstract
Vehicle drivers uses Google Maps (Navigator) during their travelling to get exact road map with proper direction including distance in km and total time remaining to reach out destination. For that people need to have facility like, inbuilt GPS system in vehicle or cell phone with internet connectivity. GPS (Global Positioning System) basically works with satellite in orbit. It is used to determine location of user vehicle. For this user must require having GPS in hand set. Problem with existing navigator is, it is providing shortest path routes to traveller and that creates problem for traveller. Sometimes shortest path with slow speed road creates problem of delay in travelling also. So, solution with speed on road acknowledgement required. For that in this paper algorithm is provided for solving this problem.
Key-Words / Index Term
Navigator, Search Engine, GPS, Speed required on Road, Direction
References
[1] Vincent, Luc. "Taking online maps down to street level." Computer Vol. 40, Issue. 12 ,pp. 118-120, 2007
[2] Ramaswamy, Ashok B., and Randall T. Brunts. "Mapless GPS navigation system in vehicle entertainment system." U.S. Patent 5,627,547, issued May 6, 1997.
[3] Chen, Hsuan-Eng, Yi-Ying Lin, Chien-Hsing Chen, and I. Wang. "BlindNavi: A navigation app for the visually impaired smartphone user." In Proceedings of the 33rd annual ACM conference extended abstracts on human factors in computing systems, pp. 19-24. ACM, 2015.
[4] Hawkins, Bradford A., Marta Rueda, and Miguel Á. Rodríguez. "What do range maps and surveys tell us about diversity patterns?." Folia Geobotanica 43, no. 3, pp.345, (2008).
[5] Wang, Fahui, and Yanqing Xu. "Estimating O–D travel time matrix by Google Maps API: implementation, advantages, and implications." Annals of GIS 17, no. 4 ,pp.199-209, (2011).
Citation
Raina D. Gaharwar, Birajkumar V. Patel, "Navigation Based on Distance and Speed Required on Road," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.50-53, 2019.
A New Approach to Handling Erroneous Reviews in Opinion Mining
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.54-62, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.5462
Abstract
In the areas of marketing and electronic advertising, Opinion Mining has a broader domain. The advertiser must analyze the performance / popularity of the advertisements he has posted on the site. The mechanism based on the star rating can be fraudulent, due to robots or automatic responders. Therefore, it is necessary to analyze the current entity system or products using reviews (comments). Opinion Mining refers to the extraction of those lines or phrases in the huge raw data that express an opinion. On the other hand Sentimental Analysis is the analysis of feelings identifies the polarity (sentiment) of the opinion that is extracted from the review. Today, social networking sites and online shopping sites are used by users to express their opinion on products, events, peoples etc. Many users that express their opinion regarding any entity/Product, there may be chances that reviews are not written in correct form (Dictionary). Because of reviews available on these sites may contain noise such as spelling errors, typographical errors, standard abbreviations, and elegant writing. It is necessary to make data noise-free so that it can be used for opinion extraction. This paper describe a framework that was proposed to conduct opinion analysis of noisy reviews using techniques such as calculate similarity of terms and frequency of the document. The reviews of different products have been tested by this framework and the corresponding result is shown in negative (-ve) and positive (+ve ) form. The results are satisfactory for all the tested products.
Key-Words / Index Term
Opinion mining, Sentiment Analysis, Opinion extraction, Document Frequency
References
[1]. B. Pang, and L. Lee, “Opinion Mining and Sentiment Analysis,” Foundations and Trends in Information Retrieval, Volume. 2, 2008.
[2]. Anand Mahendran and Anjali Duraiswany, “Opinion Mining for text classification”, International Journal of Scientific Engineering and Technology , Volume No.2, 2013.
[3]. Deepali Virmani, Vikrant malhotra and Ridhi tyagi, ” Sentiment Analysis Using Collaborated Opinion Mining”, 2014.
[4]. B. Liu, “Sentiment Analysis and Subjectivity,” Handbook of Natural Language Processing, Second Edition, 2010.
[5]. M. Hu, and B. Liu, “Mining and Summarizing Customer Reviews”, KDD’ 04. USA, August 2004.
[6]. N. Jakob and I. Gurevych. Using anaphora resolution to improve opinion target identication in movie reviews. In Proceedings of the ACL 2010 Conference Short Papers, pages 263-268. Association for Computational Linguistics,2010.
[7]. J. S. Kessler and N. Nicolov. Targeting sentiment expressions through supervised ranking of linguistic configurations. In ICWSM. AAAI Press,2009.
[8]. Z. Toh and J. Su. Nlangp: supervised machine learning system for the classification of appearance categories and the extraction of opinion objectives. In the Proceedings of the 9th International SemEval Workshop.
[9]. M.Hu and B. Liu. Extraction and summary of customer reviews. In Proceedings of the 10th ACM SIGKDD International Conference on Discovering Knowledge and Data Mining, pages 168-177. ACM, 2004.
[10]. J. Jmal and R. Faiz. Customer review summary focus via twitter and sentwordnet. In Proceedings of the 3rd International Conference on Web Intelligence, Mining and Sementics , 2013.
[11]. L. Ferreira, N. Jakob and I. Gurevych. A comparative study of the characteristics extraction algorithms in customer reviews. In Semantic Computing, 2008 IEEE International Conference, in 2008.
[12]. A.M. Popescu and O. Etzion . “Extraction of product characteristics and review opinions. In the processing of natural language and text mining”, 2007.
[13]. Forman, B. Pang and L. Lee, “A Sentimental Education: Sentiment Analysis Using Subjectivity Summarization Based on Minimum Cuts,” Proc. 42nd Ann. Meeting on Assoc. for Computational Linguistics.
[14]. W. Jin and H.H. Ho, “A Novel Lexicalized HMM-Based Learning Framework for Web Opinion Mining,” Proc. 26th Ann. Int’l Conf. Machine Learning, pp. 465-472, 2009.
[15]. G. Qiu, B. Liu, J. Bu, and C. Chen, “Opinion Word Expansion and Target Extraction through Double Propagation,” Computational Linguistics, vol. 37, pp. 9-27, 2011.
[16]. B. Liu. Mining opinion and analysis of sentiment. In Web Data Mining, pages 459-526. Springer, 2011.
[17]. N. Jakob and I. Gurevych, “Extracting Opinion Targets in a Single and Cross-Domain Setting with Conditional Random Fields,” Proc. Conf. Empirical Methods in Natural Language Processing, pp. 1035-1045, 2010.
[18]. M. Hu, and B. Liu, “Mining and Summarizing Customer Reviews”, KDD’ 04. USA, August 2004.
[19]. Phani gadde, L.V. subramaniam, Tanveer A. Faruquie, “Adapting a WSJ trained Part-of-Speech tagger to Noisy Text” Joint Workshop on Multilingual OCR and Analytics for Noisy Unstructured Text Data (J-MOCR-AND), 17-September 2011.
[20]. P. Turney, “Thumbs Up. Thumbs Down, Semantic Orientation Applied To Unsupervised Classification of Reviews”, Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL), 2002.
[21]. L. Dey, and M. Haque, , “Opinion mining from noisy text data,” Springer IJDAR , 2009.
[22]. Shikha parashar , Dr.R.K. Gupta, “A Survey on “Citizen Opinion Mining Initiatives In Government Decision Making”, IJSART, ISSN 2395-1052, Volume -3, 7 –July 2017.
Citation
Kirti Kushwah, Rajendra Kumar Gupta, "A New Approach to Handling Erroneous Reviews in Opinion Mining," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.54-62, 2019.