Data Mining and Phylogenetic Analysis of NifH Protein of Azospirillum strain among Nitrogen-fixing Bacteria using Bioinformatics Tools
Research Paper | Journal Paper
Vol.9 , Issue.1 , pp.1-10, Jan-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i1.110
Abstract
Development of prediction tools for computational identification of nitrogen fixation (nif) genes and categorization of potential diazotrophs using high throughput sequence data has accelerated the research in the area of biological nitrogen fixation. The computational tools are recently being used for the annotation and phylogenetic analysis of nifH gene or NifH protein sequences in nitrogen-fixing bacteria. In this study, phylogenetic analysis of NifH protein using Maximum Likelihood method showed that amino acid sequences of Azospirillum brasilense showed more relatedness to Rhodospirillum rubrum and Rhodobacter capsulatus. Further, the amino acid sequences also showed similarity to nodule-forming bacteria Rhizobium etli, Rhizobium leguminosarum bv. trifolii and Sinorhizobium meliloti. Azospirillum brasilense was placed on the same clade along with Rhodopseudomonas palustris, Methylobacterium nodulans, Gluconoacetobacter diazotrophicus and Zymomonas mobilis based on NifH aminoacid sequences. On another branch, NifH amino acid sequences of Azospirillum brasilense showed relatedness to Bradyrhizobium diazoefficiens, Azorhizobium claudinodans and Acidothiobacillus ferrooxidans. However, amino acid sequences of free-living nitrogen-fixing bacteria Klebsiella pneumoniae, Azotobacter vinelanii and Azotobacter chroococcum were also placed separately on other branch. Interestingly, sequences of anaerobic bacteria Clostridium pasteurianum, Desulfatomaculum reducens and Chlorobium limicola were placed far apart. Besides this, NifH amino acid sequences of Azospirillum brasilense showed quite divergence from the sequences observed in Paenibacillus durus and Roseiflexus castenholzii. Thus, NifH amino acid sequences classified various nitrogen-fixing bacteria into different phylogenetic clusters.
Key-Words / Index Term
NifH protein, Amino acids, Phylogenetic analysis, Azospirillum, Nitrogen fixation, Bioinformatics
References
[1] J. Raymond, J.L. Siefert, C.R. Staples et al., “Environmental history of nitrogen fixation”. Molecular Biology Evolution, Vol. 21, pp. 541-554, 2004.
[2] J. Kim, D.C. Rees, “Nitrogenase and biological nitrogen fixation”, Biochemistry, Vol. 33, pp. 389-397, 1994.
[3] J.P.W. Young, “Phylogenetic classification of nitrogen-fixing organisms”, in Biological Nitrogen Fixation, G. Stacey, R.H. Burris, H.J. Evans (eds.). New York: Chapman & Hall. pp. 43–86, 1992.
[4] P.M. Vitousek, J.D. Aber, R.W. Howarth, G.E. Likens, P.A. Matson, D.W. Schindler, W.H. Schlesinger, D.G. Tilman, “Human alteration of global nitrogen cycle: sources and consequences”. Ecology Applications, Vol. 7, pp. 737–750, 1997.
[5] C.C. Cleveland, A.R. Townsend, D. S. Schimel, et al., “Global patterns of terrestrial biological nitrogen (N2) fixation in environmental ecosystems”, Global Biogeochem. Cycles, Vol. 13, pp. 623-645, 1999.
[6] I.R. Kennedy, N. Islam, “Current and potential contribution of asymbiotic nitrogen fixation to nitrogen requirements on farms: review”, Australian Journal of Experimental Agriculture, Vol. 41, pp. 447-457, 2001.
[7] B.B. Bohlool, J.K. Ladha, D.P. Garrity, T. George, “Biological nitrogen fixation for sustainable agriculture: perspective”, Plant and Soil, Vol. 141, pp. 1-11, 1992.
[8] D.R. Dean, M.R. Jacobson, “Biochemical genetics of nitrogenase”, In: Biological Nitrogen Fixation, G. Stacey, R.H. Burris, H.J. Evans (eds.). Chapman-Hall, NewYork, pp. 763-831, 1992.
[9] Q. Li, X. Liu, H. Zhang, S. Chen, “Evolution and functional analysis of orf1 within nif gene cluster from Paenibacillus graminis RSA19”, International Journal of Molecular Sciences, Vol. 20, pp. 1145, 2019. doi:10.3390/ijms20051145
[10] T.L. Hamilton, M. Ludwig, R. Dixon, E.S. Boyd, P.C. Dos Santos, J. C. Setubal et al., “Transcriptional profiling of nitrogen fixation in Azotobacter vinelandii”, Journal of Bacteriology, Vol. 193, pp. 4477–4486, 2011. doi: 10.1128/JB.05099-11
[11] I. Frank, “Rapid classification of NifH protein sequences using classification and regression trees”, M. Sc. dissertation, University of California, Santacruz, 2014.
[12] I. Frank, K.A. Turk-Kubo, J. P. Zehr, “Rapid annotation of nifH gene sequences using classification and regression trees facilitates environmental functional gene analysis”, Environmental Microbiological Reports, Vol. 8, No. 5, pp. 905–916, 2016.
[13] U.K. Mondal, B. Das, T.C. Ghosh, A. Sen, A. K. Bothra, “Nucleotide triplet based molecular phylogeny of class I and class II aminoacyl t-RNA synthetase in three domain of life process: bacteria, archaea and eukarya”, Journal of Biomolecular Structure Dynamics, Vol. 26, article no. 321328, 2008. doi: 10.1080/07391102.2008.10507247
[14] P.K. Meher, T.K. Sahu, J. Mohanty, S. Gahoi, S. Purru, M. Grover, A.R. Rao, “nifPred: proteome-wide identification and categorization of nitrogen fixation proteins of diazotrophs based on composition-transition-distribution features using support vector machine”, Frontiers in Microbiology, Vol. 9, pp. 1-16, 2018.
[15]P.C. Dos Santos, Z. Fang, S. Mason, J.C. Setuba, R. Dixon, “Distribution of nitrogen fixation and nitrogenase-like sequences amongst microbial genomes”, BMC Genomics, Vol. 13, pp. 162, 2012.
[16] M.A. Marti-Renom, A.C. Stuart, A. Fiser, R. Sanchez, F. Melo, A. Sali, “Comparative protein structure modeling of genes and genomes”, Annuual Review of Biophysics and Biomolecular Structures, Vol. 29, pp. 291, 2000.
[17] J.P. Zehr, B.D. Jenkins, S.M. Short, G.F. Steward, “Nitrogenase gene diversity and microbial community structure: cross–system comparison”, Environonmental Microbiology, Vol. 5, pp. 539-554, 2003.
[18]L.F.W. Roesch, F.A.O. Camargo, F.M. Bento, et al., “Biodiversity of diazotrophic bacteria within the soil, root and stem of field-grown maize”, Plant and Soil, Vol. 302, pp. 91–104, 2008.
[19] J.C. Gaby, D.H. Buckley, “Global census of nitrogenase diversity”, Environmental Microbiology, Vol. 13, pp. 1790–1799, 2011.
[20] J.C. Gaby, D.H. Buckley, “Comprehensive aligned nifH gene database: multipurpose tool for studies of nitrogen-fixing bacteria”, Database 2014:bau001, 2014.
[21] P. Heller, H.J. Tripp, K. Turk-Kubo, J.P., Zehr, “ARBitrator: a software pipeline for on-demand retrieval of auto-curated nifH sequences from GenBank”, Bioinformatics, Vol. 30, pp. 2883–2890, 2014.
[22] M.C.Y. Lau, C. Cameron, C. Magnabosco, C.T. Brown, F. Schilkey, S. Grim, S. Hendrickson, M. Pullin et al., “Phylogeny and phylogeography of functional genes shared among seven terrestrial subsurface metagenomes reveal N-cycling and microbial evolutionary relationships”, Frontiers in Microbiology, Vol. 5, pp. 1-17, 2014.
[23]J.T.L. Wang, M.J. Zaki, H.T.T. Toivonen, D. Shasha, “Data Mining in Bioinformatics”, Springer, 2005.
[24]J. Felsenstein, “Evolutionary trees from DNA sequences: Maximum likelihood approach”, Journal of Molecular Biology, Vol. 17, pp. 368, 1981.
[25]B. Chor, T. Tuller, “Maximum likelihood of evolutionary trees: hardness and approximation”, Bioinformatics, Vol. 21 (Suppl 1), pp. 97-106, 2005.
[26]S.F. Altschul, T.L. Madden, A.A. Schaffer, J. Zhang, Z. Zhang, W. Miller, D. J. Lipman, “Gapped BLAST and PSI-BLAST: new generation of protein database search programs”, Nucleic Acids Research, Vol. 25, pp. 3389, 1997.
[27]Sayers, E.W., Barrett, T., Benson, D.A., Bryant, S.H., Canese, K., Chetvernin, V., Church, D.M., Dicuccio, M., Edgar, R., Federhen, S., et al., “Database resources of National Center for Biotechnology Information”, Nucleic Acids Research, Vol. 38, pp. D5–D16, 2010.
[28]Y. Okon, C.A. Labandera-Gonzalez, M. Lage, P. Lage, “Agronomic applications of Azospirillum and other PGPR”, In: Biological nitrogen fixation, F.J. de Brujin, (ed). Hoboken: Wiley, Chapter 90, 2015.
[29] Y. Okon, C.A. Labandera-Gonzalez, “Agronomic applications of Azospirillum: evaluation of 20 years worldwide field inoculation”, Soil Biology and Biochemistry, Vol. 26, pp. 1591–1601, 1994.
[30] A. Behar, B. Yuval, E. Jurkevitch, “Enterobacteria- mediated nitrogen fixation in natural populations of the fruit fly Ceratitis capitata”, Molecular Ecology, Vol. 14, 2637-2643, 2005.
[31] J.C. Gaby, L. Rishishwar, L.C. Valderrama-Aguirre, S.J. Green, A. Valderrama-Aguirre, K. Jordan, J.E. Kostkaa, “Diazotroph community characterization via high-throughput nifH amplicon sequencing and analysis pipeline”, Applied and Environmental Microbiology, Vol. 84, Issue 4, e01512-17, 2018.
[32] D. Higgins, J.D. Thompson, D.G. Higgins, T.J. Gibson, “CLUSTALW: Improving sensitivity of progressive multiple sequence alignment through sequence weighing, position-specific gap penalities and weight matrix choice”, Nucleic Acids Research, Vol. 22, pp. 4673-4680, 1994.
[33] Y. Bashan, G. Holguin, L.E. de-Bashan, “Azospirillum-plant relationships: physiological, molecular, agricultural and environmental advances (1997–2003)”, Canadian Journal of Microbiology, Vol. 50, pp. 521-577, 2004.
[34] L. Pereg, E. Luz, Y. Bashan, “Assessment of affinity and specificity of Azospirillum for plants”, Plant and Soil, Vol. 399, pp. 389–414, 2016.
[35] Q.-C. Choo, M.-R. Samian, N. Najimudin, “Phylogeny and characterization of three nifH-homologous genes from Paenibacillus azotofixans”, Applied and Environmental Microbiology, Vol. 69, No. 6, pp. 3658–3662, 2003.
[36] E.S. Boyd, A.M.G. Costas, T.L. Hamilton, F. Mus, J.W. Peters, “Evolution of molybdenum nitrogenase during transition from anaerobic to aerobic metabolism”, Journal of Bacteriology, Vol. 197, pp. 1690–1699, 2015.
[37] B. Reinhold-Hurek, T. Hurek “Life in grasses: diazotrophic endophytes”, Trends in Microbiology, Vol. 6, pp. 139–144, 1998.
[38] J.I. Baldani, V.L.D. Baldani, “History on biological nitrogen fixation research in graminaceous plants: special emphasis on Brazilian experience”, Annals of Academy Brasilean Ciênc, Vol. 77, pp. 549–579, 2005.
[39] L.S. Hartmann, S.R. Barnum, “Inferring evolutionary history of Mo-dependent nitrogen fixation from phylogenetic studies of nifK and nifDK”, Journal of Molecular Evolution, Vol. 71, pp. 70-85, 2010
[40]D. Sindhu, S. Sindhu, “Image processing technology application for early detection and classification of plant diseases”, International Journal of Computer Science and Engineering, Vol. 7, Issue 5, pp. 92-97, 2019
Citation
Saurabh Sindhu, Divya Sindhu, S.K. Yadav, "Data Mining and Phylogenetic Analysis of NifH Protein of Azospirillum strain among Nitrogen-fixing Bacteria using Bioinformatics Tools," International Journal of Computer Sciences and Engineering, Vol.9, Issue.1, pp.1-10, 2021.
Real Time Drowsy Driver Monitoring and Detection System Using Deep Learning Based Behavioural Approach
Research Paper | Journal Paper
Vol.9 , Issue.1 , pp.11-21, Jan-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i1.1121
Abstract
This work presents real time drowsy driver detection and monitoring system using deep learning based behavioral approach. The aim is to design and implement software which captures live driver’s behavior during driving and train using convolutional neural network (CNN) to predict the behavior’s of the driver. This was achieved developing a drowsy driver dataset; intelligent video based device and the CNN architecture and configurations. The designs were implemented using deep learning tool and MATHLAB. The system was tested and the result showed a detection accuracy of 99.8%. MATHLAB was used to develop a prototype model of the system.
Key-Words / Index Term
Drowsy behavior, Convolutional Neural Network, Training, Deep learning, MATHLAB
References
[1]. K. “The implementation of the Nigerian Road Strategy and Traffic Crashed”; Research project National Institute for policy and strategic Studies; NIPSS Kuku; FCILT,MNI, 2018.
[2]. Premium times news paper “Five dead in Lagos-Ibadan Expressway accident”; Thursday, August, 2020.
[3]. Z. Mardi, S.N. Ashtiani, M. Mikaili; EEG-based drowsiness detection for safe driving using chaotic features and statistical tests. Journal of Medical Signals and Sensors, 1(2): 130-137, 2016.
[4]. S.M. Noori, M. Mikaeili, “Driving drowsiness detection using fusion of electroencephalography, electrooculography, and driving quality signals. J Med Signals Sensors, 6: 39-46, 2016.
[5]. H. Parker “Distracted Driver” 3 seconds is all it takes for accident to happen; 2019.
[6]. K. Li, L. Jin, Y. Jiang, H. Xian, L. Gao, (2015). Effects of driver behavior style differences and individual differences on driver sleepiness detection. Adv. Mech. Eng, doi:1687814015578354.
[7]. L. Barr, H. Howrah, Popkin S., Carrol R.J., “ A review and evaluation of emerging driver fatigue detection, John A. Volpe National Transportation Systems Center,Cambridge, Massachusetts, 2019.
[8]. J.S. Gwak, M. Shino, A. Hirao, ”Early detection of driver drowsiness utilizing machine learning based on physiological signals, behavioral measures, and driving performance”. In Proceedings of the IEEE International Conference on Intelligent Transportation Systems, Maui, Hawaii, HI, USA; pp. 1794–1800, 2018.
[9]. T. Danisman, M. Bilasco, C. Djeraba, N. Ihaddadene “ Drowsy driver detection system using eye blink patterns”. Machine and Web Intelligence (ICMWI) IEEE; 230-233, 2010.
[10]. B.K. Savas, & Y. Becerikli, Real Time Driver Fatigue Detection Based on SVM Algorithm. 6th International Conference on Control Engineering & Information Technology (CEIT), 2018; doi:10.1109/ceit.8751886.
[11]. J. Rateb, A. Khalifa , K. Mohamed, A. Wael, J. Mohsen and J. Shan. “Real time driver drowsiness detection for android application using deep neural network techniques”; 9th international conference on ambient system network and technology (ANT 2018). Procedia Computer Science 00 (2018) 000–000
[12]. S. Park, F. Pan, S. Kang, C.D. Yoo “Driver Drowsiness Detection System Based on Feature Representation Learning Using Various Deep Networks”; Asian Conference on Computer Vision; Springer;154-164, 2016.
[13]. Manishi and N. Kumari ” a comprehensive study on behavioral parameters based drowsy detection techniques; international journal of computer science and engineering; Vol 8, issue 4, ISSN, 2347 – 2693. 2020.
[14]. J. Long, e. Shelhamer, T. Darrell. “Fully convolutional networks for semantic segmentation”; IEEE Conference on Computer Vision and Pattern Recognition (CVPR) ISBN: 978-1-4673-6964-0, 2015.
[15]. F. Friedrichs, B. Yang, “Drowsiness monitoring by steering and lane data based features under real driving conditions”. In: Proceedings of the European Signal Processing Conference. Aalborg, Denmark. pp. 23–27. 2010.
[16]. L. Zhao, W. Zenkai, W. Xiaojin, Q. Liu, "Driver drowsiness detection using facial dynamic fusion information and a DBN",IET Intell. Transp. Syst., 2018, Vol. 12 Iss. 2, pp. 127-133,2017.
[17]. F. You, L. Xiaolong, G. Yunbo, H. Wang, L. Hongyi, "A Real-time Driving Drowsiness Detection Algorithm With Individual Differences Consideration", IEEE Access, Vol.7, 2019.
[18]. A. Kumar and R. Patra, "Driver Drowsiness Monitoring System using Visual Behaviour and Machine Learning", IEEE Journal, pp: 339-344, 2018.
[19]. M.T. Khan, H. Anwar et al., "Smart Real-Time Video Surveillance Platform for Drowsiness Detection Based on Eyelid Closure", Wireless Communications and Mobile Computing, Hindawi, Vol. 2019, pp: 1-9, 2019.
[20]. O.Ri. Karim, C. Abdelmoula and M. Masmoudi, “A Fuzzy Based Method for Driver Drowsiness Detection”, In the Proceedings of 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications", pp: 143-147, 2017.
[21]. V. Jebasheeli, R. Vadivel ” Implementation of Automated Criminal Face Detection System Using Facial Recognition Approach” International Journal of Computer Sciences and Engineering; Vol.8, Issue.9, September 2020 E-ISSN: 2347-2693
[22]. C. Ituma and T.C. Asogwa “The Application of Machine Learning For Digital Recognition Of Identical Twins To Support Global Crime Investigation” International Journal of Computer Science and Engineering (IJCSE), Issues 12; Vol 4 pp. 427–433, 2018.
Citation
P.E. Kekong, I.A. Ajah, U. Chidiebere, "Real Time Drowsy Driver Monitoring and Detection System Using Deep Learning Based Behavioural Approach," International Journal of Computer Sciences and Engineering, Vol.9, Issue.1, pp.11-21, 2021.
Automatic Skin Cancer Detection using GLCM & Support Vector Machine in Digital Image Processing
Research Paper | Journal Paper
Vol.9 , Issue.1 , pp.22-26, Jan-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i1.2226
Abstract
Skin malignancy - an anomalous development of skin cells - frequently creates on uncovered skin. This basic type of malignant growth ordinarily happens on the skin without exposure of sunlight. There are three primary sorts of skin malignancy - basal cell carcinoma, squamous cell carcinoma and melanoma. It can be minimized the risk of skin disease by restricting or forestalling ultraviolet (UV) radiation. Testing the skin for dubious changes can help identify skin malignancy at a beginning phase. Automatic detection of skin cancer is a very effective tool, especially in the absence of specialists. Image processing has been practiced in various fields over the past decades, allowing to improve the interpretation, representation, and processing information of an image. Here the proposed system is based on Grey Level Co-occurrence Matrices (GLCM) and Support Vector Machine (SVM). A GLCM is a histogram of co-occurring greyscale values at a given counterbalance over an image. SVM kernel method has been used to classify the skin lesion and identify the type of skin cancer. System achieved 96.36 % of accuracy with minimal false alarm rate.
Key-Words / Index Term
Skin Cancer, GLCM, Basal Cell Carcinoma, Squamous Cell Carcinoma, Melanoma, Segmentation, Support Vector Machine
References
[1] Smaoui, N., & Derbel, N., Melanoma Skin Cancer Detection based on Image Processing. Current Medical Imaging Reviews, 2018.
[2] Palak Mehta, Bhumika Shah, Review on Techniques and Steps of Computer Aided Skin Cancer Diagnosis, Procedia Computer Science, Volume 85, Pages 309-316, 2016.
[3] “Gayle b. Mccombs”, 09 Jan. 2018. Accessed on: Dec. 13, 2020. [Online]. Available: https://decisionsindentistry.com/author/gmccombs/
[4] F. K. Nezhadian and S. Rashidi, "Melanoma skin cancer detection using color and new texture features," 2017 Artificial Intelligence and Signal Processing Conference (AISP), Shiraz, pp. 1-5, 2017. doi: 10.1109/AISP.2017.8324108.
[5] P. M. Amulya and T. V. Jayakumar, "A study on melanoma skin cancer detection techniques," 2017 International Conference on Intelligent Sustainable Systems (ICISS), Palladam, pp. 764-766, 2017, doi: 10.1109/ISS1.2017.8389278.
[6] P. Bumrungkun, K. Chamnongthai and W. Patchoo, "Detection skin cancer using SVM and snake model," 2018 International Workshop on Advanced Image Technology (IWAIT), Chiang Mai, pp. 1-4, 2018, doi: 10.1109/IWAIT.2018.8369708.
[7] S. Mane and S. Shinde, "A Method for Melanoma Skin Cancer Detection Using Dermoscopy Images," 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, pp. 1-6, 2018, doi: 10.1109/ICCUBEA.2018.8697804.
[8] N. B. Linsangan, J. J. Adtoon and J. L. Torres, "Geometric Analysis of Skin Lesion for Skin Cancer Using Image Processing," 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM), Baguio City, Philippines, pp. 1-5, 2018, doi: 10.1109/HNICEM.2018.8666296.
[9] M. Z. Hasan, S. Shoumik and N. Zahan, "Integrated Use of Rough Sets and Artificial Neural Network for Skin Cancer Disease Classification," 2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2), Rajshahi, Bangladesh, pp. 1-4, 2019, doi: 10.1109/IC4ME247184.2019.9036653.
[10] Shalu and A. Kamboj, "A Color-Based Approach for Melanoma Skin Cancer Detection," 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, pp. 508-513, 2018, doi: 10.1109/ICSCCC.2018.8703309.
[11] G. Mansutti, A. T. Mobashsher and A. Abbosh, "Design of a Millimeter-Wave Near-Field Probe for Early-Stage Skin Cancer Detection," 2019 13th European Conference on Antennas and Propagation (EuCAP), Krakow, Poland, pp. 1-4, 2019.
[12] Toet, Alexander & Wu, Tirui. (2014). Efficient contrast enhancement through log-power histogram modification. Journal of Electronic Imaging. 23. 063017. 10.1117/1.JEI.23.6.063017.
[13] H. Alquran et al., "The melanoma skin cancer detection and classification using support vector machine," 2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), Aqaba, pp. 1-5, 2017, doi: 10.1109/AEECT.2017.8257738.
[14] Neha and A. Kaur, "Wearable antenna for skin cancer detection," 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, pp. 197-201, 2016, doi: 10.1109/NGCT.2016.7877414.
[15] K. Roy, S. S. Chaudhuri, S. Ghosh, S. K. Dutta, P. Chakraborty and R. Sarkar, "Skin Disease detection based on different Segmentation Techniques," 2019 International Conference on Opto-Electronics and Applied Optics (Optronix), Kolkata, India, pp. 1-5, 2019, doi: 10.1109/OPTRONIX.2019.8862403.
Citation
Deepmala Sen, R.K. Chidar, "Automatic Skin Cancer Detection using GLCM & Support Vector Machine in Digital Image Processing," International Journal of Computer Sciences and Engineering, Vol.9, Issue.1, pp.22-26, 2021.
Performance of Machine Learning Techniques in the Prevention of Financial Frauds
Research Paper | Journal Paper
Vol.9 , Issue.1 , pp.27-29, Jan-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i1.2729
Abstract
Financial fraud presents more and more threat that has serious consequences in the financial sector. As a result, financial institutions are forced to continually improve their fraud detection systems. In recent years, several studies have used machine learning and data mining techniques to provide solutions to this problem. In this paper, we propose a state of art on various fraud techniques, as well as detection and prevention techniques proposed in the literature such as classification, clustering, And regression. The aim of this study is to identify the techniques and methods that give the best results that have been perfected so far. Financial fraud presents more and more threat that has serious consequences in the financial sector. As a result, financial institutions are forced to continually improve their fraud detection systems. In recent years, several studies have used machine learning and data mining techniques to provide solutions to this problem. In this paper, we propose a state of art on various fraud techniques, as well as detection and prevention techniques proposed in the literature such as classification, clustering, and regression. The aim of this study is to identify the techniques and methods that give the best results that have been perfected so far.
Key-Words / Index Term
Financial fraud, clustering, regression, machine learning
References
[1] Bolton, R. & Hand, D.. Statistical Fraud Detection: A Review (With Discussion). Statistical Science 17(3): 235–255.
[2] G.K. Palshikar, The Hidden Truth – Frauds and Their Control: A Critical Application for Business Intelligence, Intelligent Enterprise, vol. 5, no. 9, 28, pp. 46–51, May 2002.
[3] Mark. "Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations". Hoboken, NJ: John Wiley & Sons Inc. ISBN 978-0-47089046-2.
[4] Pang-Ning Tan, Micheal Steinbach, Vipin Kumar, “Introduction to Data Mining”, Pearson Education, ISBN: 81-317-1472-1, 2006.
[5] Heyer, L.J., Kruglyak, S. and Yooseph, S., “Exploring Expression Data: Identification and Analysis of Coexpressed Genes”, Genome Research 9: pp:1106-1115, 1999.
[6] Ayse Yasemin SEYDIM “Intelligent Agents: A Data Mining Perspective” Southern Methodist University, Dallas, 1999
[7] T.Dean, J.Allen, Y.Aloimonos, “Artificial Intelligence: heory and Practice”, The Benjamin/Cummings Publishing Co. Inc., 1995.
[8] Eleni Mangina, “Intelligent Agent-Based Monitoring Platform for Applications in Engineerings”, International Journal of Computer Science & applications Vol.2, No.1, pp. 38-48, 2005.
[9] L. Yang, R. Karim, V. Ganapathy, and R. Smith, “Improving NFA-based signature matching using ordered binary decision diagrams,” in Proc.13th Int. Symp. Recent Adv. Intrusion Detect., pp. 58–78, Sep. 2010.
[10] A. Z. Broder, “Identifying and filtering near-duplicate documents,” in Proc. 11th Annu. Symp. Combinat. Pattern Matching, pp. 1–10, 2000.
Citation
Saleha Farheen, Monika Raghuwanshi, "Performance of Machine Learning Techniques in the Prevention of Financial Frauds," International Journal of Computer Sciences and Engineering, Vol.9, Issue.1, pp.27-29, 2021.
Multi-Model Analysis of Mammograms
Research Paper | Journal Paper
Vol.9 , Issue.1 , pp.30-35, Jan-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i1.3035
Abstract
In this paper mammogram classification is introduced. The system takes mammogram, pre-processes it by applying Adaptive Histogram Equalization. The enhanced image is segmented using K Means Clustering algorithm. Statistical features such as standard deviation and mean of a segmented mammogram are extracted. SVM takes these features as input. DCT is applied on the segmented mammogram, these extracted features are fed as input to FFBPNN. These classify the mammogram as normal or abnormal. The training time of both the classifiers are compared to know which classifier takes less training time. The accuracy of the classifiers are determined by analyzing the results.
Key-Words / Index Term
Mammograms, pre-process, SVM, FFBPNN
References
[1] S. Shanthi, V. Murali Bhaskaran, “Computer aided detection and classification of mammogram using self-adaptive resource allocation network classifier”, Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering , March 21-23, 2012
[2] Vijaylaxmi Kochari “Feed Forward Back Propagation Neural Network for Detection of Breast Cancer” International Journal of Computer Science Trends and Technology (IJCST) – Volume 6 Issue 6, Nov-Dec 2018, ISSN : 2347-8578.
[3] K Menaka, S Karpagavalli , “Mammogram Classification using Extreme Learning Machine and Genetic Programming,” International Conference on Computer Communication and Informatics (ICCCI -2014), Jan. 03 – 05, 2014
[4] Digambar A Kulkarni, Vijaylaxmi K Kochari “Detection of Breast Cancer Using K Means Algorithm” International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 6, Issue 4, April 2016.
[5] S .Bhadra “Analysis of Tumor Detection Methods for Mammogram Images” International Journal Of Computer Science and Engineering Vol.- 7, Issue- 5, May 2019 E-ISSN : 2347-2693
[6] M Arfan Jaffar, Nawazish Naveed, Sultan Zia, Bilal Ahmed and Tae-Sun Choi, “DCT Features Based Malignancy and Abnormality Type Detection Method For Mammograms” International Journal of Innovative Computing, Information and Control Volume 7, No.9, September 2011.
[7] Leonardo de Oliveira Martins, Geraldo Braz Junior, Aristofanes Correa Silva,Anselmo Cardoso de Paiva, and Marcelo Gattass_, “Detection of Masses in Digital Mammograms using K-means and Support Vector Machine”, Electronic Letters on Computer Vision and Image Analysis 8(2):39-50, 2009
Citation
Vijaylaxmi K. Kochari, "Multi-Model Analysis of Mammograms," International Journal of Computer Sciences and Engineering, Vol.9, Issue.1, pp.30-35, 2021.
?-Graceful Labeling In the Perspective of Graph Operations on Bistar
Research Paper | Journal Paper
Vol.9 , Issue.1 , pp.36-39, Jan-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i1.3639
Abstract
A ?-graceful labelling of a graph G =(V,E) , if a function f:V(G)?{0,1,2,…,n-1} is an injective function and the induced function f^*:E(G)?N is defined by f^* (e=mn)=2{f(m)+f(n)};where ?mn?E(G), then the resultant edge labels are distinct[3]. Here we discuss about some basic graph like as splitting graph of bistarB_(n,m),degree splitting graph of bistarB_(n,m),shadow graph of bistarB_(n,m),restricted square graph of bistar B_(n,m), barycentric sub division of bistarB_(n,m)and corona product ofbistarB_(n,m)with K1 admits?- graceful labelling.
Key-Words / Index Term
Graceful labeling, Bistar Graph, Injective function
References
[1]. M.I.Bosamia, K.K.Kanani, “Divisor cordial labeling in the context of graph operations on Bistar”, Global Journal of Pure and Applied Mathematics, Volume 12, Number 3, pp.2605-2618, 2016.
[2]. I.Cahit, Cordial Graphs, “Aweakerversion of graceful and harmonious graphs”, Ars Combinatoria, 23, pp.201–207, 1987
[3]. M.Chaurasiya, M.Rupani, S.Khunti, “?-graceful labeling of merge graph,bistar graph,friendship graph,C_d^n relation graph”, International journal of Technical Innovation in Modern Engineering & Science,Vol.6, Issue 11, pp.7-14, Nov-2020.
[4]. J.A. Gallian, “A Dynamic Survey of graph labeling”, The Electronics Journal of Combinatorics, Dec 20, 2013.
[5]. J. Gross and J. Yellen, Handbook of Graph Theory, CRC Press, 2004.
[6]. R.Uma ,S.Divya , “Cube difference labeling of star related graphs”, International Journal Of Scientific Research In Computer Science, Engineering and Information Technology, 2(4), pp.298- 301, 2017.
[7]. R.Varatharajan, S.Navanaeethakrishnan, K.Nagarajan, “Divisor cordial graphs”, International Journal of Mathematical Combinatorics, 4, pp.15–25, 2011.
Citation
Mehul Chaurasiya, Mehul Rupani, "?-Graceful Labeling In the Perspective of Graph Operations on Bistar," International Journal of Computer Sciences and Engineering, Vol.9, Issue.1, pp.36-39, 2021.
Comparative Study of Existing Hierarchical Based Routing Protocols for WSN
Survey Paper | Journal Paper
Vol.9 , Issue.1 , pp.40-43, Jan-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i1.4043
Abstract
Wireless sensor network is a type of Ad hoc network but routing protocols for WSN are different from MANET because the factors like power, communication type, node deployment etc. are different in both. WSN protocols are classified on different parameters like Network Structure and Protocol Operation. On the basis of network structure there are three types of routing protocol flat routing, hierarchical routing, and location based routing. Flat routing protocols uses flooding and hierarchical routing protocol worked base on clusters resulting hierarchical protocols are energy efficient and easily scalable. The main aim of this paper is to evaluate, analyze and compare four existing hierarchical based routing protocols named Low Energy Adaptive Clustering Hierarchy (LEACH), Threshold Sensitive Energy Efficient Sensor Network (TEEN), Adaptive Threshold Sensitive Energy Efficient Sensor Network (APTEEN), and Distance Adaptive Threshold Sensitive Energy Efficient Sensor Network (DAPTEEN).
Key-Words / Index Term
WSN, MANET, LEACH, TEEN, APTEEN, DAPTEEN
References
[1]. Verdone, R.; Dardari, D.; Mazzini, G.; Conti, A., “Wireless Sensor and Actuator Networks,” Elsevier: London, UK, 2008.
[2]. Manjeshwar A, Grawal D.P. TEEN: A protocol for enhanced efficiency in wireless sensor networks[C].Proceeding of the 15th Parallel and Distributed Processing Symp. San francisoi, 2001:2009-2015.
[3]. R.Devika, B.Santhi, T.Sivasubramanian “Survey on Routing Protocol in Wireless Sensor Network” ISSN: 0975-4024 Vol 5 No 1 Feb- Mar 2013
[4]. Akyildiz I F,Su W,Sankarasubramaniam Y,et al. A Survey on Sensor Networks [J]. IEEE Communications Magazine, 40(8):102-114, 2002.
[5]. Wendi Rabiner Heinzelman , Anantha Chandrakasan , Hari Balakrislman, "Energy-efficient communication protocol for wireless microsensor networks" , Jan 2000
[6]. Heinzelman W,Chandrakasan A,Balakrishnan H.Energy-efficient Communication Protocol for Wireless Microsensor Networks[C].In Proceeding of the 33rd Annual Hawaii Int’l Conf.on System Sciences.Maui:IEEE Computer Society, 3005-3014, 2000.
[7]. DaWei Xu, Jing Gao, “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor Networks,” Procedia Environmental Sciences, Volume 10, Part A, 2011, Pages 595-600, ISSN 1878-0296
[8]. Manjeshwar, Arati & Agrawal, Dharma. APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks, 2002.
[9]. Anjali, Gaikwad et al. “Distance Adaptive Threshold Sensitive Energy Efficient Sensor Network (DAPTEEN) protocol in WSN.” 2015 International Conference on Signal Processing, Computing and Control (ISPCC): 114-119, 2015
Citation
Apurba Sinha, Smita Kishore, Pramod Kumar, "Comparative Study of Existing Hierarchical Based Routing Protocols for WSN," International Journal of Computer Sciences and Engineering, Vol.9, Issue.1, pp.40-43, 2021.
Real-Time Human Detection in Video Surveillance
Research Paper | Journal Paper
Vol.9 , Issue.1 , pp.44-50, Jan-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i1.4450
Abstract
The basic Fundamental to human-centric computer vision is to make the human motion see and understandable by machines. The hectic task is that the video containing enormous amount of information in the form of pixels, much of meaningless to a computer unless it can decode the data within the pixels. To make it possible, computer what is the mechanism behind which pixel go together and what it represents. The process of detecting and tracking the pixels representing the form of humans is to be notified as Human motion capture. Where there is a lacking of count of the people and we want to overcome. We plan to achieve this goal using intermediate level deep learning project on computer vision concepts, where deep learning is an AI method that imitate the functioning of human brain in processing data for use of object detection, speech recognition, translating languages, and making decisions. OpenCV is the place where it deals will all sorts of camera related things and make the detection easier. This work represents that how a human is detected and counted using SVM. The main idea is to detect the patterns of human motion, to a larger extent which is independent of differences in appearance. To do so, an HOG descriptor is used to detect the patterns of the frame captured, the greatest use of this descriptor is that it detects the patterns with the direction of the movement of the captured picture and hence it makes the job easy to train the pictures using the SVM and get the human detected.
Key-Words / Index Term
Computer Vision; OpenCV; Support Vector Machine; HOG descriptor; Video Surveillance: Human Detection
References
[1]. W Fernando et al., in Information and Automation for Sustainability (ICIAfS), 2014 7th International Conference on. Object identification, enhancement and tracking under dynamic background conditions, IEEE, 2014
[2]. Xu, R., Guan, Y., & Huang, Y., Multiple human detection and tracking based on head detection for real-time video surveillance. Multimedia Tools and Applications, 74(3), 729-742, 2015.
[3]. Dalal, N., Triggs, B., & Schmid, C., Human detection using oriented histograms of flow and appearance. In European conference on computer vision. Springer, Berlin, Heidelberg. pp. 428-441, May, 2006.
[4]. https://www.researchgate.net/publication/4215591_Real-Time_Human_Detection_Tracking_and_Verification_in_Uncontrolled_Camera_Motion_Environments
[5]. Sulman, N., Sanocki, T., Goldgof, D., & Kasturi, R., How effective is human video surveillance performance? In 2008 19th International Conference on Pattern Recognition, IEEE, pp. 1-3, December, 2008.
[6]. Murat EKINCI, Ey ?up GEDIKL "Silhouette Based Human Motion Detection and Analysis for Real-Time Automated Video Surveillance" Dept. of Computer Engineering, Karadeniz Technical University, Trabzon, TURKEY, 2005.
[7]. Pang, Y., Yuan, Y., Li, X., & Pan, J., Efficient HOG human detection. Signal Processing, 91(4), 773-781, 2011.
[8]. N. Cristianini and J. Shawe-Taylor. Support vector net [http://www.supportvector.net/]. Cambridge University, 2015.
[9]. Osuna, E., Freund, R., & Girosit, F., Training support vector machines: an application to face detection. In Proceedings of IEEE computer society conference on computer vision and pattern recognition. IEEE. pp. 130-136, June, 1997.
[10]. Smail Haritaoglu, David Harwood and Larry S. Davis “W4: Who? When? Where? What? A Real Time System for Detecting and Tracking People" Computer Vision Laboratory, University of Maryland College Park, 1998.
(PDF) Real-Time Human Motion Detection and Tracking. Available from: https://www.researchgate.net/publication/251852856_Real-Time_Human_Motion_Detection_and_Tracking
[11]. Kim, Y., & Ling, H., Human activity classification based on micro-Doppler signatures using a support vector machine. IEEE Transactions on Geoscience and Remote Sensing, 47(5), 1328-1337, 2009.
[12]. Foroughi, H., Rezvanian, A., & Paziraee, A., Robust fall detection using human shape and multi-class support vector machine. In 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing. IEEE. pp. 413-420, December, 2008.
[13]. Dadi, H. S., & Pillutla, G. M., Improved face recognition rate using HOG features and SVM classifier. IOSR Journal of Electronics and Communication Engineering, 11(4), 34-44, 2016.
[14]. Chen, P. Y., Huang, C. C., Lien, C. Y., & Tsai, Y. H., An efficient hardware implementation of HOG feature extraction for human detection. IEEE Transactions on Intelligent Transportation Systems, 15(2), 656-662, 2013.
[15]. Liang, Y., Reyes, M. L., & Lee, J. D., Real-time detection of driver cognitive distraction using support vector machines. IEEE transactions on intelligent transportation systems, 8(2), 340-350, 2007.
[16]. Vijayalakshmi, S., & Kumar, N. S., A Review on Fetal Brain Structure Extraction Techniques from Human MRI Images. 2008.
[17]. Vayadande, K. B., & Yadav, S., A Review paper on Detection of Moving Object in Dynamic Background, 2018.
Citation
Chalavadi Sravanth, Gadde Harshavardhan, Kamineni. Kavya, Shaik Mohammad Akbar, Ch.M.H. Sai Baba, "Real-Time Human Detection in Video Surveillance," International Journal of Computer Sciences and Engineering, Vol.9, Issue.1, pp.44-50, 2021.
eGovernment Integration Framework for Fragmented Systems
Review Paper | Journal Paper
Vol.9 , Issue.1 , pp.51-55, Jan-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i1.5155
Abstract
This paper proposes an integration framework for the Public Institutions / government entities wishing to integration fragmented applications and systems. The existing alternatives of integration falls short of attributes like performance, interoperability, and reliability. This paper proposed a Microservices Based Integration and API driven approach that will achieve the resiliance and scale. We propose a model based on API and microservices framework leveraging API Gateway, API Management, ESB, Orchestrator, and Rules engine. This paper intends to provide a comprehensive list of integration capabilities based on the underlying integration framework. This framework is an enabler to digitally transform in government enterprise and to provide sufficient impetus and acceleration for its digital future.
Key-Words / Index Term
e-Government, Service Orientation, API Management, Government Service Bus, Web Services, Integration Framework, Integraiton Platform
References
[1]. Suhail Madoukh, Rebhi Baraka, “A SOA-Based e-Government Data Integration”, International Arab Journal of e-Technology, Vol.3, Issue.3, pp.138-145, 2014.
[2]. Abswaidi Ramadhani, Anael Sam, Khamisi Kalegele, “Framework for integrating fragmented information systems: Case of livestock information systems”, International Journal of Computer Engineering Research, Vol.7, Issue.1, pp.1-10, 2017.
[3]. Abdulelah Awadh Al-Rashedi, “E-Government Based on Cloud Computing and Service-Oriented Architecture”, International Journal of Computer and Electrical Engineering, Vol.6, Issue.3, 2014.
[4]. Vojkan Nikoli?, Jelica Proti?, Predrag ?ikanovi?, “eGovernment interoperability in the context of European Interoperability Framework (EIF)”, ICIST, 2014.
[5]. Anu Paul, Varghese Paul, “A Framework for e-Government Interoperability in Indian Perspective”, International Journal of Computer Information Systems and Industrial Management Applications, Volume.6, pp.582-591, 2014.
[6]. Rashed Salem, Samah Abd Elrahman, Mohammed Hassan, “A Cloud-Based Data Integration Framework for eGovernmentService”, Journal of Computers, Vol.13, Issue.8, pp.913-923, 2018.
[7]. Abdullah AlHajri, Zuhoor Al-Khanjari, Naoufel Kraiem, and Yessine Al Jamoussi, “Enhanced e-Government Integration Framework for Higher Interoperability in e-Government Initiatives” IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES, India, 2017.
[8]. Iulian ILIE-NEMEDI, “Advanced eGovernment Information Service Bus (eGov-Bus)”, Informatica Economic?, Vol.0, Issue.1, pages 67-73, 2007.
[9]. Masethe HD, Olugbara OO, Ojo SO and Adewumi AO, “Integration of Health Data using Enterprise Service Bus”, Proceedings of the World Congress on Engineering and Computer Science, USA, 2013.
Citation
Sameer S. Paradkar, "eGovernment Integration Framework for Fragmented Systems," International Journal of Computer Sciences and Engineering, Vol.9, Issue.1, pp.51-55, 2021.