International Journal of Computer Sciences and Engineering
The Board set down various parameters of evaluating the potential parameters that each prospective manuscript is reviewed for best paper awards. We assign rating points with respect to variables such as Content Quality, the No of References, Manuscript scope, research outcomes and results and aggregate the score.
Deep Learning Feature Representation Applied to Cross Dataset Pedestrian Re-identification
Research Paper | Journal Paper
Vol.6 , Issue.2 , pp.1-11, Feb-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i2.111
Abstract
Pedestrian re-identification technology has become the current research focus due to its wide range of applications. This study conducted cross dataset pedestrian re-identification to solve the problem that the single dataset’s difficulty for simulating the actual situation and its poor generalization ability. Deep learning has made remarkable achievements in the fields of machine learning recently, so the deep learning technology is integrated into cross datasets pedestrian re-identification system. Here we improved the three-layer convolutional neural network (CNN) structure proposed by Yang Hu in Asia Conference on Computer Vision (ACCV), 2014. The Batch Normalization (BN) layer has been added to reduce the over-fitting degree during training period and the adjusted cosine similarity algorithm is used for pedestrian feature match to solve the defect of cosine similarity algorithm. Finally we implemented the entire cross dataset pedestrian re-identification system and got the experimental results. The Shinpuhkan2014dataset was chosen as training set. We compared the training results before and after adding BN layer and found that test accuracy increased, test loss decreased and over-fitting phenomenon eased. The VIPeR and i_LIDS datasets were chosen as test sets. We evaluated the effects on VIPeR and i_LIDS based on the CNN model that training on Shinpuhkan2014dataset. The cumulative matching rate rank5 increased by 1.7% on VIPeR dataset compared with the current level, the rank10 and rank20 also increased. And the cumulative matching rate rank1 increased by 1.8% on i_LIDS dataset compared with the current level, the rank5 and rank10 also increased.
Key-Words / Index Term
Cross dataset, Convolutional neural network, Batch normalization, Adjusted cosine similarity
References
[1] Tulsi Jain, Kushagra Agarwal, Ronil Pancholia, “Sentiment Analysis Based on a Deep Stochastic Network and Active Learning”, International Journal of Computer Sciences and Engineering (IJCSE), Vol.5, Issue.9, pp.1-6, 2017.
[2] Taigman, Y., Yang, M., Ranzato, M., Wolf, L, “DeepFace: Closing the Gap to Human-Level Performance in Face Verification”, IEEE Conference on Computer Vision and Pattern Recognition, pp.1701-1708, 2014.
[3] Krizhevsky A, Sutskever I, Hinton G E, “ImageNet classification with deep convolutional neural networks”, International Conference on Neural Information Processing Systems. Curran Associates Inc. pp.1097-1105, 2012.
[4] Kawanishi, Y., Yang, W., Mukunoki, M., Minoh, M., “Shinpuhkan2014: A Multi-Camera Pedestrian Dataset for Tracking People across Multiple Cameras”, The Korea-Japan Joint Workshop on Frontiers of Computer Vision, FCV, 2014.
[5] Gray D, Brennan S, Tao H, “Evaluating appearance models for recognition, reacquisition, and tracking”, Vol. 3, Issue. 5, pp.1-7, 2007.
[6] Zheng W S, Gong S, Xiang T, “Person re-identification by probabilistic relative distance comparison”, In Computer Vision and Pattern Recognition(CVPR), IEEE,Vol. 42, pp.649-656,2011.
[7] Weinberger, K., Blitzer, J., Saul, L., “Distance metric learning for large margin nearest neighbor classification”, Advances in neural information processing systems 18, pp.1473-1480, 2006.
[8] Dikmen, M., Akbas, E., Huang, T. S., Ahuja, N., “Pedestrian recognition with a learned metric”, Lecture Notes in Computer Science, 6495 pp.501-512, 2010.
[9] Davis J V, Kulis B, Jain P, Sra S, Dhillon IS, “Information-theoretic metric learning”, International Conference on Machine Learning, ACM, Vol. 227, pp.209-216, 2007.
[10] Zheng W S, Gong S, Xiang T, “Person re-identification by probabilistic relative distance comparison”, In Computer Vision and Pattern Recognition(CVPR), Vol. 42, pp.649-656, 2011.
[11] Köstinger M, Hirzer M, Wohlhart P, Roth PM, Bischof H, “Large scale metric learning from equivalence constraints”. IEEE Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, pp.2288-2295, 2012.
[12] Li, Z., Chang, S., Liang, F., Huang, T.S., Cao, L., Smith, J.R, “Learning locally adaptive decision functions for person verification”, In Computer Vision and Pattern Recognition (CVPR), IEEE Conference, pp.3610-3617, 2013.
[13] Hu, Yang, Liao, Shengcai, Lei, Zhen, Yi, Dong, Li, Stan, “Exploring Structural Information and Fusing Multiple Features for Person Re-identification”, Computer Vision and Pattern Recognition Workshops, IEEE, pp.794-799, 2013.
[14] Gheissari N, Sebastian T B, Hartley R, “Person Re-identification Using Spatiotemporal Appearance”, Computer Vision and Pattern Recognition, Computer Society Conference on IEEE, pp.1528-1535, 2006.
[15] Hamdoun O, Moutarde F, Stanciulescu B, Steux B, “Person re-identification in multi-camera system by signature based on interest point descriptors collected on short video sequences”, International Conference on Distributed Smart Cameras, IEEE, pp.1-6, 2008.
[16] Wang X, Doretto G, Sebastian T, Rittscher J, Tu P, “Shape and Appearance Context Modeling”, International Conference on Computer Vision, IEEE, pp.1-8, 2007.
[17] Farenzena, M., Bazzani, L., Perina, A., Murino, V., & Cristani, M., “Person re-identification by symmetry-driven accumulation of local features”, IEEE Computer Vision and Pattern Recognition, Vol.23, pp.2360-2367,2010.
[18] Ma B, Su Y, “Local descriptors encoded by fisher vectors for person re-identification”, International Conference on Computer Vision. Springer-Verlag, pp.413-422, 2012.
[19] Dong S C, Cristani M, Stoppa M, Bazzani L, Murino V, “Custom Pictorial Structures for Re-identification”, British Machine Vision Conference(BMVC), Vol. 68, pp.1-11, 2011.
[20] Zhao R, Ouyang W, Wang X, “Unsupervised Salience Learning for Person Re-identification”, Computer Vision and Pattern Recognition, IEEE, pp.3586-3593, 2013.
[21] Zhao R, Ouyang W, Wang X, “Person Re-identification by Salience Matching”, International Conference on Computer Vision, IEEE, pp.2528-2535, 2014.
[22] Liu Y, Shao Y, Sun F, “Person re-identification based on visual saliency”, Intelligent Systems Design and Applications (ISDA) , Vol. 13,Issue. 6, pp.884-889, 2012.
[23] Gray D, Tao H, “Viewpoint Invariant Pedestrian Recognition with an Ensemble of Localized Features”, Computer Vision - ECCV 2008, European Conference on Computer Vision, Marseille, France, Proceedings. DBLP, pp.262-275, October 12-18, 2008,.
[24] Prosser, B., Zheng, W.S., Gong, S., Xiang, T., Mary, Q., “Person re-identification by support vector ranking”, In British Machine Vision Conference (BMVC), Aberystwyth, UK:BMVA Press, Vol. 2, Issue. 5, pp.1-11, 2010.
[25] Li W, Wang X, “Locally Aligned Feature Transforms across Views”, Conference on Computer Vision and Pattern Recognition, IEEE Computer Society, pp.3594-3601, 2013.
[26] Liu C, Chen C L, Gong S, Wang G, “POP: Person Re-identification Post-rank Optimization”, IEEE International Conference on Computer Vision, IEEE Computer Society, pp.441-448, 2013.
[27] Ma A J, Yuen P C, Li J, “Domain Transfer Support Vector Ranking for Person Re-identification without Target Camera Label Information”, IEEE International Conference on Computer Vision, IEEE, pp.3567-3574, 2014.
[28] Yi D, Lei Z, Liao S, Li SZ, “Deep Metric Learning for Person Re-identification”. International Conference on Pattern Recognition, IEEE, pp.34-39, 2014.
[29] Yang Hu, Dong Yi, Shengcai Liao, Zhen Lei, Stan Z, “Cross Dataset Person Re-identification”, Institute of Automation, Chinese Academy of Sciences (CASIA), ACCV, 9010, pp.650-664, 2014.
[30] Ioffe S, Szegedy C, “Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift”, arXiv preprint arXiv:1502.03167, pp.448-456, 2015.
[31] Globerson A, Roweis S T, “Metric Learning by Collapsing Classes”, Advances in Neural Information Processing Systems, Vol. 18, pp.451-458, 2006.
[32] Gray D, Tao H, “Viewpoint Invariant Pedestrian Recognition with an Ensemble of Localized Features”, Computer Vision - ECCV 2008, European Conference on Computer Vision, Marseille, France , Proceedings. DBLP, pp.262-275, October 12-18, 2008.
[33] Xing E P, Ng A Y, Jordan M I, Russell S, “Distance metric learning, with application to clustering with side-information”, International Conference on Neural Information Processing Systems, MIT Press, pp.521-528, 2002.
Citation
Hongmei Xie,Yanggang Zhou, Qiang Liu, "Deep Learning Feature Representation Applied to Cross Dataset Pedestrian Re-identification", International Journal of Computer Sciences and Engineering, Vol.6, Issue.2, pp.1-11, 2018.
Applications of the Aboodh Transform and the Homotopy Perturbation Method to the Nonlinear Oscillators
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.1-10, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.110
Abstract
In this paper, the differential equation of motion of the classical Helmholtz-Duffing oscillator, Van der Pol, Duffing oscillator and Duffing-Van der Pol oscillator equations have been solved analytically with the help of a new integral transform named Aboodh transform and homotopy perturbation method. By recasting the governing equations as nonlinear eigenvalue problems, we have obtained the excellent approximate analytical solution of the displacement and the relation between amplitude and angular frequency. We have also compared our results with exact numerical results graphically for few cases. Here, we have also demonstrated the sophistication and simplicity of this technique.
Key-Words / Index Term
Aboodh Transform, Homotopy Perturbation Method, Helmholtz-Duffing Oscillator, Van der Pol, Duffing Oscillator, Duffing-Van der Pol Oscillator, Approximate Analytical Solution
References
[1] A.H. Nayfeh, D.T. Mook, “Nonlinear Oscillations”, John Willey and Sons., New York, 1979.
[2] N.N. Bogoliubov, Y.A. Mitropolsky, “Asymptotic Methods in the Theory of Nonlinear Oscillations” Hindustan Publishing Company, Delhi, Chap. I, 1961.
[3] V.P. Agrwal, H. Denman, “Weighted linearization technique for period approximation in large amplitude Nonlinear Oscillations”, J. Sound Vib., Vol.57, pp.463-473, 1985.
[4] S.H. Chen, Y.K. Cheung, S.L. Lau, “On perturbation procedure for limit cycle analysis”, Int. J. Nonlinera Mech., Vol.26, pp.125-133, 1991.
[5] Y.K. Cheung, S.H. Chen, S.L. Lau, “A modified Lindstedt-Pioncare method for certain strong nonlinear oscillations”, Int. J. Non-Linear Mech., Vol.26, pp.367-378, 1991.
[6] G. Adomain, “A review of the decomposition method in applied mathematics”, J. Math. Anal. and Appl., Vol.135, pp.501-544, 1998.
[7] G.L. Lau, “New research direction in singular perturbation theory, artificial parameter approach and inverse-perturbation technique”, In the proceedings of the 1997 National Conference on 7th Modern Mathematics and Mechanics, pp.47-53.
[8] A.F. Nikiforov, V.B. Uvarov, “Special functions of mathematical physics”, Birkhauser, Basel, 1988.
[9] P.K. Bera, T. Sil, “Exact solutions of Feinberg-Horodecki equation for Time dependent anharmonic oscillator”, Pramana-J. Phys., Vol.80, pp.31-39, 2013.
[10] J.H. He, “Homotopy perturbation technique”, Comp. Methods in Appl. Mech. and Engg., Vol.178, pp.257-262, 1999.
[11] J.H. He, “A coupling method of a homotopy technique and a perturbation technique for nonlinear problems”, Int. J. Non-Linear Mech., Vol.3, pp.37-43, 2000.
[12] J. Biazar, M. Eslami, “A new homotopy perturbation method for solving systems of partial differential equations”, Comp. and Math. with Appli., Vol.62, pp.225–234, 2011.
[13] A. Yildirim, “Homotopy perturbation method to obtain exact special solutions with solitary pattern for Boussinesq-like B(m,n) equations with fully nonlinear dispersion”, J. Math. Phys., Vol.50, pp.5–10, 2009.
[14] M. Gover, A.K. Tomer, “Comparison of Optimal Homotopy Asymptotic Method with Homotopy Perturbation Method of Twelfth Order Boundary Value Problems”, International Journal of Computer Sciences and Engineering, Vol.3, pp.2739-2747, 2011.
[15] P.K. Bera, T. Sil, “Homotopy perturbation method in quantum mechanical problems”, Applied Math. and Comp., Vol.219, pp. 3272–3278, 2012.
[16] K.S. Aboodh, “The New integral Transform Aboodh Transform”, Global Journal of Pure and Applied Mathematics, Vol.9, pp.35-43, 2013.
[17] K. Abdelilah, S. Hassan, M. Mohand, M. Abdelrahim, A.S.S. Muneer, “An application of the new integral transform in Cryptography”, Pure and Applied Mathematics Journal, Vol.5, pp.151-154, 2016.
[18] P.K. Bera, S.K. Das, P. Bera, “A Study of Nonlinear Vibration of Euler-Bernoulli Beams Using Coupling Between The Aboodh Transform And The Homotopy Perturbation Method”, International Journal of Computer Sciences and Engineering, Vol.5, pp.84-93, 2017.
[19] B. Bulbul, M. Sezer, “Numerical Solution of Duffing Equation by Using an Improved Taylor Matrix Method”, Article ID691614.
[20] M. Najafi, M. Moghimi, H. Massah, H. Khoramishad, M. Daemi, “On the Application of Adomian Decomposition Method and Oscillation Equations”, In the 9th International Conference on Applied Mathematics, Istanbul, Turkey, 2006.
[21] Gh. Asadi Cordshooli , A.R. Vahidi, “Silution of Duffing –Van der Pol Equation using Decomposition Method”, Adv. Studies Theor. Phys., Vol.5, pp.121-129, 2011.
[22] R.E. Mickens, “Iteration method solutions for conservative and limit-cycle x^(1/3) force oscillators”, Journal of Sound and Vibration, Vol.292, pp.964-968, 2006.
[23] I.S. Gradshteyn, I.S. Ryzhik, “Table of Integrals, Series and Products”, Academic Press, New York, 1980.
[24] H.Li Zhang, “Periodic solutions for some strongly nonlinear oscillations by He’s energy balance method”, Computer & Mathematics with Applications, Vol.58, pp.2480-2485, 2009.
[25] C.W. Lim, S.K. Lai, “Accrate higher order analytical approximate solutions to nonconservative nonlinear oscillators and applications to van der Pol damped oscillators”, International Journal of Mechanical Sciences, Vol.48, pp.483-892, 2006.
[26] J.J. Stoker, “Nonlinear Vibration in Mechanical and Electrical Systems”, Wiley, New York, 1992.
Citation
P.K. Bera, S.K. Das, P. Bera, "Applications of the Aboodh Transform and the Homotopy Perturbation Method to the Nonlinear Oscillators", International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.1-10, 2018.
Sentiment Analysis Based on a Deep Stochastic Network and Active Learning
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.1-6, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.16
Abstract
This paper proposes a novel approach for sentiment analysis. The growing importance of sentiment analysis commensurate with the use of social media such as reviews, forum discussions, blogs, microblogs like Twitter, and other social networks. We require efficient and higher accuracy algorithms in sentiment polarity classification as well as sentiment strength detection. In comparison to pure vocabulary based system, deep learning algorithms show significantly higher performance. The goal of this research is to modify a Recurrent Neural Network (RNN) with Gated Recurrent Unit (GRU) by introducing stochastic depth in a hidden layer and comparing it with baseline Naïve Bayes, vanilla RNN and GRU-RNN models. To improve our results, we also incorporated Active Learning with Uncertainty Sampling approach. Movie review dataset from Rotten Tomatoes was used, the dataset includes 215,154 fine grained labelled phrases in addition to 11,855 full sentences. We performed pre-processing on the data and used an embedding matrix with pre-trained word vectors as features for training our model. These word vectors were generated using character level n-grams with fasttext on Wikipedia data.
Key-Words / Index Term
Fasttext, Recurrent Neural Network, Gated Recurrent Unit, Active Learning
References
[1] Bojanowski, Piotr, et al, “Enriching word vectors with subword information”, arXiv preprint arXiv:1607.04606 (2016).
[2] Huang, Gao, et al, “Deep networks with stochastic depth”, European Conference on Computer Vision. Springer International Publishing, 2016.
[3] Socher, Richard, et al, “Recursive deep models for semantic compositionality over a sentiment treebank”, Proceedings of the 2013 conference on empirical methods in natural language processing. 2013.
[4] Lewis, David D., and William A. Gale, “A sequential algorithm for training text classifiers”, Proceedings of the 17th annual international ACM SIGIR conference on Research and development in information retrieval. Springer-Verlag New York, Inc., 1994.
[5] McCallum, Andrew, and Kamal Nigam, “A comparison of event models for naive bayes text classification”, AAAI-98 workshop on learning for text categorization. Vol. 752. 1998.
[6] Mikolov, Tomas, et al, “Efficient estimation of word representations in vector space”, arXiv preprint arXiv, pp.1301.3781 (2013).
[7] Mikolov, Tomas, et al, “Recurrent neural network based language model”, Interspeech. Vol. 2. 2010.
[8] Settles, Burr, “Active learning literature survey”, University of Wisconsin, Madison, Vol.52, pp.55-66, 2010.
Citation
Tulsi Jain, Kushagra Agarwal, Ronil Pancholia, "Sentiment Analysis Based on a Deep Stochastic Network and Active Learning", International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.1-6, 2017.
An Efficient Approach to Optimize the Performance of Massive Small Files in Hadoop MapReduce Framework
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.112-120, Jun-2017
Abstract
The most popular open source distributed computing framework called Hadoop was designed by Doug Cutting and his team, which involves thousands of nodes to process and analyze huge amounts of data called Big Data. The major core components of Hadoop are HDFS (Hadoop Distributed File System) and MapReduce. This framework is the most popular and powerful for store, manage and process Big Data applications. But drawback with this tool related to stability and performance issues for small file applications in storage, manage and processing the data. Existing approaches deals with small files problem are Hadoop archives and SequenceFile. However, existing approaches doesn’t give an optimized performance to solve small files problems on Hadoop. In order to improve the performance in storing, managing and processing small files on Hadoop, we proposed an approach for Hadoop MapReduce framework to handle the small files applications. Experimental result shows that proposed framework optimizes the performance of Hadoop in handling of massive small files as compared to existing approaches.
Key-Words / Index Term
Hadoop, Hadoop Distributed File System (HDFS), MapReduce, Hadoop Archives, Sequence File, Small Files
References
[1] Sagiroglu S, Sinanc, D, “Big Data: A Review”, IEEE,2013, pp. 42-47.
[2] Mukhtaj Khan , Yong Jin, Maozhen Li, Yang Xiang, and Changjun Jiang “Hadoop Performance Modeling for Job Estimation and Resource Provisioning” IEEE transactions on parallel and distributed systems, vol. 27, no. 2, february 2016, pp 441-454
[3] Fang Zhou, Hai Pham , Jianhui Yue, Hao Zou ,Weikuan Yu. "SFMapReduce: An Optimized MapReduce Framework for Small Files." IEEE ,2015, pp. 23-32.
[4] Xiaoyong Zhao, Yang Yang, Li-li Sun, Han Huang. "Metadata-Aware Small Files Storage Architecture on Hadoop." Springer ,2012, pp. 136–143.
[5] KunGao, Xuemin Mao. "Research on Massive Tile Data Management based on Hadoop." IEEE ,2016, pp. 01-05.
[6] Parth Gohil, Bakul Panchal,1. S. Dhobi. "A Novel Approach to Improve the Performance of Hadoop in Handling of Small Files." IEEE ,2015, pp. 1-5.
[7] Tanvi Gupta, SS Handa. "An Extended HDFS with an AVATAR NODE to handle both small files and to eliminate single point of failure." 2015 International Conference on Soft Computing Techniques and Implementations- (ICSCTI). Faridabad: IEEE, 2015. pp. 67-71.
[8] Aishwarya K, Arvind Ram A, Sreevatson M C, Chitra Babu, and Prabavathy B. "Efficient Prefetching Technique for Storage of Heterogeneous small files in Hadoop Distributed File System Federation." Fifth International Conference on Advanced Computing (ICoAC). IEEE, 2013. 523-530.
[9] Yanfei Guo et al “ iShuffle: Improving Hadoop Performance with Shuffle-on-Write” IEEE Transactions on Parallel and Distributed Systems, 2016, pp 1-12
[10] Guru Prasad M S, Nagesh H R and Swathi Prabhu “High Performance Computation of Big Data: Performance Optimization Approach towards a Parallel Frequent Item Set Mining Algorithm for Transaction Data based on Hadoop MapReduce Framework”, International Journal of Intelligent Systems and Applications,2017, pp75-84
[11] Guru Prasad M S, Raju K and Nagesh H R “Novel Approaches for Performance Optimization of Hadoop Multi Node Cluster Architecture”, Elsevier Publications, 2014, pp 391-399
[12] Katayoun Neshatpour, Maria Malik, Mohammad Ali Ghodrat, Avesta Sasan, and Houman Homayoun “ Energy-Efficient Acceleration of Big Data Analytics Applications Using FPGAs” , IEEE International Conference on Big Data, 2015,pp115-123
[13] Ran Zheng, Qing Liu, Hai Jin. "Memory Data Management System for Rendering Applications." Second International Conference on Mathematics and Computers in Sciences and in Industry. IEEE, 2015. 302-308.
[14] Yang Zhang, Dan Liu. "Improving the Efficiency of Storing for Small Files in HDFS." International Conference on Computer Science and Service System. IEEE, 2012. 2239-2242.
[15] Yizhi Zhang, Heng Chen, Zhengdong Zhu, Xiaoshe Dong, Honglin Cui. "Small Files Storing and Computing Optimization." 11th International Conference on Natural Computation (ICNC). IEEE, 2015. 1269-1274.
[16] Bo Dong, Jie Qiu, Qinghua Zheng, Xiao Zhong, Jingwei Li, Ying Li. "A Novel Approach to Improving the Efficiency of Storing and Accessing Small Files on Hadoop: a Case Study by PowerPoint Files." 2010 IEEE International Conference on Services Computing. IEEE, 2010. 65-72.
[17] Chandrasekar S, Dakshinamurthy R, Seshakumar P G, Prabavathy B, Chitra Babu. "A Novel Indexing Scheme for Efficient Handling of Small Files in Hadoop Distributed File System." International Conference on Computer Communication and Informatics (ICCCI -2013). Coimbatore, INDIA: IEEE, 2013. 01-08.
[18] ChatupornVorapongkitipun, Natawut Nupairoj. "Improving Performance of Small-File Accessing in Hadoop." 11th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 2014. 200-205.
[19] Neethu Mohandas, Sabu M. Thampi. "Improving Hadoop Performance in Handling Small Files." Springer (2011): 187-194.
[20] Grant Mackey, Saba Sehrish, Jun Wang. "Improving Metadata Management for Small Files in." IEEE, ,2009,pp.01- 04.
[21] J. W. Jiangling Yin, D. H. Jian Zhou, Tyler Lukasiewicz, and J. Zhang, “Opass: Analysis and optimization of parallel data access on distributed file systems,” in IEEE International Parallel & Distributed Processing Symposium (IPDPS), IEEE,2015.
[22] R. Din, Prabadevi B.,” Data Analyzing using Big Data (Hadoop) in Billing System ”, International Journal of Computer Sciences and Engineering, volume-5,Issue-5,2017,pp 84-88.
Citation
Guru Prasad M.S., Nagesh H.R., Swathi Prabhu, "An Efficient Approach to Optimize the Performance of Massive Small Files in Hadoop MapReduce Framework", International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.112-120, 2017.
A Quantum Inspired Evolutionary Computational Technique with Applications to Structural Engineering Design
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.20-33, May-2017
Abstract
A new Quantum Inspired Evolutionary Computational Technique (QIECT) is reported in this work. It is applied to a set of standard test bench problems and a few structural engineering design problems. The algorithm is a hybrid of quantum inspired evolution and real coded Genetic evolutionary simulated annealing strategies. It generates initial parents randomly and improves them using quantum rotation gate. Subsequently, Simulated Annealing (SA) is utilized in Genetic Algorithm (GA) for the selection process for child generation. The convergence of the successive generations is continuous and progresses towards the global optimum. Efficiency and effectiveness of the algorithm are demonstrated by solving a few unconstrained Benchmark Test functions, which are well-known numerical optimization problems. The algorithm is applied on engineering optimization problems like spring design, pressure vessel design and gear train design. The results compare favorably with other state of art algorithms, reported in the literature. The application of proposed heuristic technique in mechanical engineering design is a step towards agility in design.
Key-Words / Index Term
Constraint Optimization, Mechanical Engineering Design problems, Quantum Inspired Evolutionary Computational Technique, Unconstrained Optimization
References
[1] K. Deb, “An efficient constraint handling method for genetic algorithms”, Computer Methods in Applied Mechanics and Engineering, Vol.186, Issue. 2, pp.311, 2000.
[2] C.A.C. Coello, “Self adaptive penalties for GA based optimization”, In the Proceeding of the congress on Evolutionary Computation, IEEE service centre, D C Washington, pp.573-580, 1999.
[3] C.A.C. Coello, E.M. Montes, “Constraint- handling in genetic algorithms through the use of dominance-based tournament selection”, Advanced Enggineering Informatics, Vol. 16, Issue.3, pp.193-197, 2002.
[4] Z. Guo, S. Wang, X. Yue, D. Jiang, K. Li, “Elite opposition-based artificial bee colony algorithm for global optimization”, International Journal of Engineering Transaction C: Aspects, Vol.28, Issue.9, pp.1268-1275, 2015.
[5] A. Alfi, A. Khosravi, “Constrained nonlinear optimal control via a hybrid ba-sd”, International Journal of Engineering, Vol.25, Issue.3, pp.197-204, 2012.
[6] B. Akay, D. Karaboga, “Artificial bee colony algorithm for large scale problems and engineering design optimization”, Journal of Intelligent Manufacturing, Vol.23, Issue.4, pp.1001-1014, 2012.
[7] H. Garg, “Solving structural engineering design optimization problems using an artificial bee colony algorithm”, Journal of Industrial and Management Optimization, Vol.10, Issue.3, pp.777-794, 2014.
[8] H. Garg, “A hybrid PSO-GA algorithm for constrained optimization problems”, Applied Mathematics and Computation, Vol.274, Issue.C, pp.292-305, 2016.
[9] A. Kaveh, S. Talatahari, “An improved ant colony optimization for constrained engineering design problems”, Engineering Computer, Vol.27, Issue.1, pp.155-182, 2010.
[10] A. Askarzadeh, “A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm”, Computers and Structures, Vol.169, Issue.1, pp.1-12, 2016.
[11] K. Hans Raj, R.S. Sharma, G.S. Mishra, A. Dua, C. Patvardhan, “An Evolutionary Computational Technique for constrained optimization in engineering design”, Journal of Institutions of Engineers (India), Vol.86, Issue.2, pp.121-128, 2005.
[12] S. Yang, F. Liu, L. Jiao, “The quantum evolutionary strategies”, Acta Electron Sinica, Vol.29, Issue.12, pp.1873-1877, 2001.
[13] K.H. Han, J.H. Kim, “Quantum-inspired evolutionary algorithms with a new termination criterion H gate and two-phase scheme”, IEEE Transactions on Evolutionary Computation, Vol.8, Issue.2, pp.156-169, 2004.
[14] L.D.S. Coelho, “Gaussian quantum-behaved particle swarm optimization approaches for constrained engineering design problems”, Expert systems with Applications, Vol.37, Issue.2, pp.1676-1683, 2010.
[15] Y. Wang, J. Zhou, L. Mo, S. Ouyang, Y. Zhang, “A clonal real-coded quantum-inspired evolutionary algorithm with cauchy mutation for short-term hydrothermal generation scheduling”, Electrical Power and Energy Systems, Vol. 43, pp.1228-1240, 2012.
[16] K. Hans Raj, R. Setia, “Quantum seeded evolutionary computational technique for constrained optimization in engineering design and manufacturing”, Struct. Multidisc. Optimization, Vol.55, Issue.3, pp. 751-766, 2017.
[17] M. Lundy, A. Mees, “Convergence of an annealing algorithm”, Mathematical Programming, Vol.34, Issue.1, pp.111-124, 1986.
[18] S.E. Moumen, R. Ellaia, R. Aboulaich, “A new hybrid method for solving global optimization problem”, Applied Mathematics and Computation, Vol.218, Issue.7, pp.3265-3276, 2011.
[19] L. Idoumghar, N. Chérin, P. Siarry, R. Roche, A. Miraoui, “Hybrid ICA-PSO algorithm for continuous optimization”, Applied Mathematics and Computation, Vol.219, Issue.24, pp.11149-11170, 2013.
[20] P. Civicioglu, “Backtracking search optimization algorithm for numerical optimization problems”, Applied Mathematics Computation, Vol.219, Issue.15, pp.8121-8144, 2013.
[21] M. Gang, Z. Wei, C. Xiaolin, “A novel particle swarm optimization algorithm based on particle migration”, Applied Mathematics and Computation, Vol. 218, Issue.11, pp.6620-6626, 2012.
[22] G. Xu, “An adaptive parameter tuning of particle swarm optimization algorithm”, Applied Mathematics and Computation, Vol.219, Issue.9, pp.4560-4569, 2013.
[23] Y. Jiang, T. Hu, C.C. Huang, X. Wu, “An improved particle swarm optimization algorithm”, Applied Mathematics and Computation, Vol. 193, Issue.1, pp.231-239, 2007.
[24] M. Xi, J. Sun, W. Xu, “An improved quantum-behaved particle swarm optimization algorithm with weighted mean best position”, Applied Mathematics and Computation, Vol.205, Issue.2, pp.751-759, 2008.
[25] L.Y. Chuang, S.W. Tsai, C.H. Yang, “Chaotic catfish particle swarm optimization for solving global numerical optimization problems”, Applied Mathematics and Computation, Vol.217, Issue.16, pp.6900-6916, 2011.
[26] J. Li, Y. Tang, C. Hua, X. Guan, “An improved krill herd algorithm: Krill herd with linear decreasing step”, Applied Mathematics and Computation, Vol.234, Issue.C, pp.356-367, 2014.
[27] B.H.F. Hasan, I.A. Doush, E.A. Maghayreh, F. Alkhateeb, M. Hamdan, “Hybridizing Harmony Search algorithm with different mutation operators for continuous problems”, Applied Mathematics and Computation, Vol.23, Issue.2, pp.1166-1182, 2014.
[28] F. Zhoug, H. Li, S. Zhoug, “A modified ABC algorithm based on improved-global-best-guided approach and adaptive limit strategy for global optimization”, Applied Soft Computing, Vol.46, Issue.C, pp.469-486, 2016.
[29] X.S. Yang, “Test problems in optimization”, in Engineering Optimization: An Introduction with metaheuristic applications, John Wiley and Sons, USA, pp.1-23, 2010.
[30] J. Arora, “Introduction to optimum design, MGraw-Hill, New York, pp.1-728, 1989.
[31] S. He, E. Prempain, Q.H. Wu, “An improved particle swarm optimizer for mechanical design optimization problems”, Engineering Optimization, Vol.36, Issue.5, pp.585-605, 2004.
[32] L.C. Cagnina, S.C. Esquivel, C.A.C. Coello, “Solving engineering optimization problems with the simple constrained particle swarm optimizer”, Informatica, Vol.32, Issue.3, pp.319-326, 2008.
[33] A.D. Belegundu, “A study of mathematical programming methods for structural optimization”, Internal Report Department of Civil and Environmental Engineering (University of lowa), USA, pp.1-26, 1982.
[34] T. Ray, P. Saini, “Engineering design optimization using a swarm with intelligent information sharing among individuals”, Engineering Optimization, Vol.33, Issue.33, pp.735-748, 2001.
[35] Q. He, L. Wang, “An effective co-evolutionary particle swarm optimization for constrained engineering design problems”, Engineering Application with Artificial intelligence, Vol.20, Issue.1, pp.89-99, 2007.
[36] Y. Wang, Z.X. Cai, Y.R. Zhou, “Accelerating adaptive trade-off model using shrinking space technique for constrained evolutionary optimization”, International Journal for Numerical Methods in Engineering Vol.77, Issue.11, pp.1501-1534, 2009.
[37] H. Eskandar, A. Sadollah, A. Bahreininejad, M. Hamdi, “Water cycle algorithm- a noval metaheuristic optimaization method for solving constrained engineering optimization problems”, Computers and Structures, Vol.110, pp.151-166, 2012.
[38] W. Long, X. Liang, Y. Huang, Y. Chen, 2013. “A hybrid differential evolution augmented lagrangian method for constrained numerical and engineering optimization”, Computer-Aided Design, Vol.45, Issue.12, pp.1562-1574, 2013.
[39] E. Sandgren, “Nonlinear integer and discrete programming in mechanical design”, In the proceedings of the 1988 ASME design technology conference, USA, pp.95-105, 1988.
[40] C. Zhang, H.P. Wang, “Mixed-discrete nonlinear optimization with simulated annealing”, Engineering Optimization, Vol.17, Issue.3, pp.263-280, 1993.
[41] K. Deb, A.S. Gene, “A robust optimal design technique for mechanical component design”, In the proceeding of the D. Dasrupta and Z. Michalewicz (Eds.) Evolutionary algorithms in engineering applications, Berlin, pp. 497-514, 1997.
[42] A. Gandomi, A.H., Yang, X.S., A. Alavi, “Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems”, Engineering with Computers, Vol.29, Issue.1, pp.17-35, 2013.
[43] S.E. He, E. Prempain, Q.H. Wu, “An improved particle swarm optimizer for mechanical design optimization problems”, Engineering Optimization, Vol.36, Issue.5, pp.585-605, 2004.
[44] K.S. Lee, Z.W. Geem, “A new meta-heuristic algorithm for continuous engineering optimization: harmony search theory and practice”, Computer Methods in Applied Mechanics and Engineering, Vol.194, Issue.36-38, pp.3902-3933, 2005.
[45] E.M. Montes, C.A.C. Coello, J.V. Reyes, L.M. Davila, “Multiple trial vectors in differential evolution for engineering design”, Engineering Optimization, Vol.39, pp.567-589, 2007.
[46] E.M. Montes, C.A.C. Coello, “An empirical study about the usefulness of evolution strategies to solve constrained optimization problems”, International Journal of General Systems, Vol. 37, Issue.4, 443-473, 2008.
[47] A. Kaveh, S. Talatahari,. “Engineering optimization with hybrid particle swarm and ant colony optimization”, Asian journal of civil engineering (building and housing), Vol.10, pp.611-628, 2009.
[48] A.O. Youyun, C. Hongqin, “An adaptive differential evolution algorithm to solve constrained optimization problems in engineering design”, Engineering, Vol.2, Issue.C, pp.65-77, 2010.
[49] S.S. Rao, “Engineering optimization”, John Wiley and Sons, Greece, pp.56-82,1996.
[50] H.L. Li, P. Papalambros, “A production system for use of global optimization knowledge”, ASME Jounal of Mechanism, Transmission and Automation in Design, Vol. 107, Issue.2, pp.277-284, 1985.
[51] J.K. Kunag, S.S. Rao, L. Chen, “Taguchi-aided search method for design optimization of engineering systems”, Engineering Optimization, Vol. 30, Issue.1, pp.1-23, 1998.
Citation
Astuti. V., K. Hansraj, A. Srivastava, "A Quantum Inspired Evolutionary Computational Technique with Applications to Structural Engineering Design", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.20-33, 2017.
Automatic Detection of Liver Tumor in CT Image Using Region Growing and SVM Classifier
Research Paper | Journal Paper
Vol.4 , Issue.11 , pp.26-29, Nov-2016
Abstract
This paper presents an approach to automatic detection of liver tumor in CT images by using region-growing and Support Vector Machine (SVM) which is successfully classifies the liver cancer types such as hepatoma, hemangioma and carcinoma.The method rectifies the problem of manual segmentation and classification which is time consuming due to the variance in the characteristics of CT images.Our proposed method has been tested on a group of CT images obtained from hospitals in Kerala with a promising results both in liver and tumor segmentation. The average error rate and accuracy rate obtained from our proposed method is 0.02 and 0.9.
Key-Words / Index Term
Region-growing,preprocessing,feature extraction,Segmentation, SVM Classifier.
References
[1] Daniel, D. Arul Pon, K. Thangavel, and K. T. Rajakeerthana. "Empirical study on early detection of lung cancer using breath analysis." Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on. IEEE, 2015.
[2] Gao, Fei, and Yuanjin Zheng. "A correlated microwave-acoustic imaging method for early-stage cancer detection." 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, 2012.
[3] Zhang, Xing, et al. "Interactive liver tumor segmentation from ct scans using support vector classification with watershed." 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, 2011.
[4] Chen, Bin, et al. "Segmentation of liver tumor via nonlocal active contours."Image Processing (ICIP), 2015 IEEE International Conference on. IEEE, 2015.
[5] Meng, Lei, Changyun Wen, and Guoqi Li. "Support vector machine based liver cancer early detection using magnetic resonance images." Control Automation Robotics & Vision (ICARCV), 2014 13th International Conference on. IEEE, 2014.
[6] Zhou, Jiayin, et al. "Segmentation of hepatic tumor from abdominal CT data using an improved support vector machine framework." 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2013.
[7] Selvathi, D., C. Malini, and P. Shanmugavalli. "Automatic segmentation and classification of liver tumor in CT images using adaptive hybrid technique and Contourlet based ELM classifier." Recent Trends in Information Technology (ICRTIT), 2013 International Conference on. IEEE, 2013.
[8] Huang, Weimin, et al. "Liver tumor detection and segmentation using kernel-based extreme learning machine." 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2013.
[9] Huang, Weimin, et al. "Random feature subspace ensemble based Extreme Learning Machine for liver tumor detection and segmentation." 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, 2014.
[10] Lei Meng; Changyun Wen, Guoqi Li proposed in their journal �Support Vector Machine based Liver Cancer Early Detection using Magnetic Resonance Images� published in 2014.
[11] Abd-Elaziz, O. Fekry, M. Sharaf Sayed, and M. Ibrahim Abdullah. "Liver tumors segmentation from abdominal CT images using region growing and morphological processing." Engineering and Technology (ICET), 2014 International Conference on. IEEE, 2014.
[12]Javed, U., et al. "Detection of lung tumor in CE CT images by using weighted support vector machines." Applied Sciences and Technology (IBCAST), 2013 10th International Bhurban Conference on. IEEE, 2013.
[13] Lee, Seungchan. "Weighted Support Vector Machine for Data Classification.", term project
Citation
R. Sreeraj, G. Raju, "Automatic Detection of Liver Tumor in CT Image Using Region Growing and SVM Classifier", International Journal of Computer Sciences and Engineering, Vol.4, Issue.11, pp.26-29, 2016.
Towards Deriving an Optimal Approach for Denoising of RISAT-1 SAR Data Using Wavelet Transform
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.33-46, Oct-2016
Abstract
Synthetic Aperture Radar(SAR) image filtering has been of interest since its inception. A variety of denoising filters for SAR images have been proposed in the recent years, which are targeted at removing the speckle noise to increase the contrast of the image, and make it useful for further image interpretation and applications. Of late, Wavelet based SAR data denoising techniques have been gaining popularity due to its space-frequency localization capability and the capacity to analyse the data at different scales. In this paper, we have attempted to derive an optimal approach for wavelet based SAR image filtering based on the quality criteria which takes into account not only the radiometric quality but also the geometric quality using point target data of actual Corner Reflector. Different orders of Daubechies wavelet coefficients have been used in the DWT(Discrete Wavelet Transform) based approach. In this study all aspects of an image quality have been taken into consideration such as the geometric fidelity and the radiometric quality, and using a simple heuristic soft thresholding criteria, optimal basis has been arrived at.
Key-Words / Index Term
SAR, speckle, denoising, Wavelet based denoising, thresholding, decomposition, mother wavelets, radiometric resolution, geometric resolution, corner reflector.
References
[1] F T Ulaby, R K Moore and A K Fung, �Microwave Remote Sensing Active and Passive�, Artech House, Vol-II, 1986.
[2] J Reeves, �Manual of Remote Sensing, American Society Of Photogrammetry�, First Edition, Vol-1, 1975.
[3] R K Raney, �Radar Fundamentals: Technical Perspective, Principles and Applications of Imaging Radar: Manual of Remote Sensing�, 3rd Edition, New York: Wiley Interscience, Vol- 2, pp (9-130), 1998.
[4] G V E R Harvy, �Speckle Statistics in Four-Look Synthetic Aperture Radar Imagery�, Optical Engineering, Vol-30 Issue-4, pp (375-381), 1991.
[5] J Bruniquel and A Lopes, �Multivariate Optimal Speckle Reduction in SAR Imagery�, International Journal of Remote Sensing, Vol-18, Nos-3, pp(603-627), 1997.
[6] J S Lee, �Speckle Suppression and Analysis for Synthetic Aperture Radar Images�, Optical Engineering, 25(5), pp(636-643), 1986.
[7] J S Lee, �Digital image enhancement and noise filtering by use of local statistics�, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol-2, pp(165-168), 1980.
[8] V S Frost, J A Stiles, K S Shanmugan, J C Holtzman, �A model for radar images and its application to adaptive digital filtering of multiplicative noise�, IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol-4, pp(157-166), 1982.
[9] D T Kuan, A A Sawchuk, T C Strand, P Chavel, �Adaptive noise smoothing filter for images with signal dependant noise�, IEEE Transaction on PAMI-7, No-2, pp(165-177), 1985.
[10] A Baraldi, F Pannigiann, �A refined Gamma MAP SAR speckle filter with improved geometrical adaptivity�, IEEE Transactions on Geoscience and Remote Sensing, Vol-33, pp(1245-1257), 1995.
[11] S G Mallat, �Theory for Multiresolution Signal Decomposition: The Wavelet Representation�, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol-11, Issue-7, pp(674-693), 1989.
[12] F Argenti, L Alparone, �Speckle Removal from SAR Images in the Undecimated Wavelet Domain�, IEEE Transactions on Geoscience and Remote Sensing, Vol-40, pp( 2363-2374), 2002.
[13] L Gagnon, A Jouan, �Speckle filtering of SAR images - A comparative study between complex-wavelet based and standard filters�, SPIE Proceedings, Vol-3169, pp(80-91), 1997.
[14] Jia-Hua Hou, Xiang-Ming Liu, Cheng-Yi Xiong, He Xiang, �Speckle reduction algorithm for synthetic aperture radar images based on Bayesian Maximum a Posteriori estimation in wavelet domain�, Optical Engineering, 47_5_ 057004, pp(057004-1 � 057004-11), 2008.
[15] P U Fangling, X U Xin, �Wavelet-domain suppression of speckle in single-look SAR images�, Proceedings of SPIE Vol- 4552, doi:10.1117/12.441515, 2001.
[16] S Solbo, T Eltoft, �Homomorphic wavelet based statistical despeckling of SAR images�, IEEE Transactions on Geoscience and Remote Sensing, Vol-42, pp(711-721), 2004.
[17] Dusan Gleich, and Mihai Datchu, �Wavelet based SAR image despeckling and information extraction, using particle filter�, IEEE Transactions on Image Processing, Vol. 18, Issue-10, pp(2167-2184), 2009.
[18] S Parrilli, M Poderico, Vincenzo Angelino, C L Verdoliva, �A nonlocal SAR image denoising algorithm based on LMMSE wavelet shrinkage�, IEEE Transactions on Geoscience and Remote Sensing, Vol-50, Issue-2, pp(606-616), 2012.
[19] K Dabov, A Foi, V Katkovnik, K Egiazarian, �Image Denoising by Sparse 3D Transform-Domain Collaborative Filtering�, IEEE Transactions on Image Processing, Vol-16, (8), pp(2080-2095), 2007.
[20] H L Xie, E Pierce, F T Ulaby, �Statistical properties of logarithmically transformed speckle�, IEEE Transactions on Geoscience and Remote Sensing, Vol-40, pp(721-727), 2002.
[21] L Gagnon, �Wavelet Filtering of Speckle Noise - Some Numerical Results�, Vision Interface, Trois-Rivi�res, Canada,19-21, pp(336-343),1999.
[22] I Daubechies, �The wavelet transform time frequency localization and Signal Analysis�, IEEE Transactions on Information Theory, Vol-36, Issue-5, pp(961-1005),1990.
[23] D L Donoho, �Denoising by soft thresholding�, IEEE Transactions on Information Theory, Vol- 41, pp(613- 627), 1995.
[24] X P Zhang, M Desai, �Adaptive denoising based on SURE Risk�, IEEE Signal Processing Letters, Vol-5, Issue-10, pp. 265-267, 1998.
[25] Thierry Blu, Florian Luisier, �The SURE-LET Approach to Image Denoising�, IEEE Transactions on Image Processing, Vol-1, Issue-11, pp(2778-2786), 2007.
[26] S G Chang, B Yu, M Vetterli, �Adaptive Wavelet Thresholding for Image Denoising and Compression�, IEEE Transactions on Image Processing, Vol- 9, pp(1532-1546), 2000.
[27] H Xie, L E Pierce, F T Ulaby, �SAR Speckle reduction using wavelet denoising and Markov Random Field Modeling�, IEEE Transactions on Geoscience and Remote Sensing, Vol-40, No 10, pp(2196-2212), 2002.
[28] T Misra, S S Rana, N M Desai, D B Dave, RajeevJyoti, R K Arora, C V N Rao, B V Bakori, R Neelakantan, J G Vachchani, �Synthetic Aperture Radar Payload On-Board RISAT-1: Configuration, Technology and Performance�, Current Science (00113891) 104 (4), pp. (447-461), 2013,.
[29] SAC, RISAT-1-SAR Payload Detailed Design Review Document, Internal Document, SAC/RISAT/DDR/01/ 2009.
[30] Arundhati Misra, B Kartikeyan, S Garg, �Denoising Of SAR Imagery In The Wavelet Framework: Performance Analysis�, International Journal of Remote Sensing & Geoscience (IJRSG), Vol-3, Issue-2, ISSN No: 2319-3484, 2014.
[31] Arundhati Misra, B Kartikeyan, S Garg, �Towards Identifying Optimal Quality Indicators For Evaluating Denoising Algorithm Performance In SAR�, International Journal of Computer Science and Communication, Vol-7, No1, pp(1-10), 2016.
[32] Arundhati Ray and B Kartikeyan, �Denoising Techniques For Synthetic Aperture Radar Data � A Review�, International Journal of Computer Engineering and Technology , Vol-6, Issue-9, pp (01-11), 2015.
[33] V S Rathore & V S Kharsan, �Simulation of Hybrid Filter Model to Enhance the Quality of Noisy Images�, International Journal of Computer Sciences and Engineering, Vol-04, Issue-07, pp (18-23), July, 2016.
Citation
A. Ray, B. Kartikeyan, S. Garg, "Towards Deriving an Optimal Approach for Denoising of RISAT-1 SAR Data Using Wavelet Transform", International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.33-46, 2016.
Mining Association Rule of Frequent Itemsets Measures for an Educational Environment
Research Paper | Journal Paper
Vol.4 , Issue.7 , pp.8-17, Jul-2016
Abstract
This study deals with the design of an hostel inmate - informatics system, which addresses the issues to discover the fact likeness to stay. By using Data Mining (DM) techniques, the data stored in a Data Warehouse (DW) can be analyzed for the purpose of uncovering and predicting hidden patterns within the data. So far, different approaches have been proposed to accomplish the conceptual design of Data Warehouse by applying the multidimensional modeling paradigm. This paper presents a novel approach to integrating data mining model into multidimensional models in order to accomplish the conceptual design of Data Warehouse with Association Rules (AR). To this extent, the Association Rules for modeling in the conceptual level. The main advantage of our proposal is that the Association Rules rely on the goals and user requirements of the Data Warehouse, instead of the traditional method of specifying Association Rules by considering only the final database implementation structures such as tables, rows or columns. In this way to show the benefits of our approach, implementation of specified Association Rules would be created on a commercial database management server.
Key-Words / Index Term
SData Mining ; Data Warehousing; Multidimensional; Association rule
References
[1] Hamid Mohamadlou,”A method for mining association rules in quantitative and fuzzy data” ,978-1-4244-4136-5/09, IEEE, 2009, pp.453 – 458.
[2] Agrawal, R, and Srikant, R, “Fast algorithms for mining association rules” In: Proceedings of the 20th VLDB Int’l Conf., 1994, pp 487–499.
[3] Agrawal, R, and Srikant, R, “Fast algorithms for mining association rules in large database”, Technical report Fj9839, IBM Almaden Research Center, San jose, CA, jun.1994.
[4] Agrawal, R, and Imielinski, T, Swami, A, “Mining association rules between sets of items in large databases”, In Proc,ACM SIGMOD, May 1993,pp.207-216.
[5] XindongWu and et al, ” Top 10 algorithms in data mining”, Knowl Inf Syst ,Springer-Verlag London Limited , 2008, pp 14:1–37.
[6] Attila Gyenesei, "A Fuzzy approach for mining quantitative association rules", Technical Report: TUCS-TR-336, 2000.
[7] Zhu Ming, datamining, University of Science and Technology, china Press, Hefel, 2002, pp: 115 – 126.
[8] LI Pingxiang, CHEN Jiangping and BIAN Fuling, “A Developed Algorithm of Apriori Based on Association Analysis”, Geo-spatial Information Science ,Vol. 7, Issue 2, 2004, pp 108-112.
[9] HUANG Liusheng, CHEN Huaping, WANG Xun and CHEN Guoliang, “A Fast Algorithm for Mining Association Rules”, J. Comput. Sci. & Technol., Vol. 15 No. 6, 2000, pp 619-624,.
[10] Carlos Ordonez, Norberto Ezquerra and Cesar, A, Santana, “Constraining and summarizing association rules in medical data”, Knowl Inf Syst, 9(3), 2006, pp 259-283.
[11] Berry M.J.A and Linoff, G.S., “Data Mining Techniques for Marketing Sales and Customer Support”, John Wiley & Sons, Inc., 1997.
[12] Brin, S., Motwani, R., Ullman, J., and Tsur, S., “Dynamic itemset counting and implication rules for market basket data”,In Proc. of the ACM-SIGMOD Int’l Conf. on the Management of Data, 1997, PP. 255-264.
[13] Daniel Kunkle, Donghui Zhang, Gene Cooperman, “Mining Frequent Generalized Itemsets and Generalized Association Rules Without Redundancy”, J. Comput. Sci. & Technol., Vol. 23(1), 2008, pp. 77-102.
[14] Calvanesea, D., Dragoneb, L., Nardib, D., Rosatib, R., and Trisolinic, S.M., Enterprise modelling and data warehousing in TELECOM ITALIA. Information Systems 3, 2006.
[15] Comelli, M., Fe´nie` s, P., Gourgand, M., and Tchernev, N., “A generic evaluation model of logistic process for cash flow and activity based costing for a company supply chain”, In: International Conference on Industrial Engineering and Systems Management IESM 2005. Marrakech, Morocco, pp. 113–122, 2005.
[16] Caiyan Dai and Ling Chen, “An Algorithm for Mining Frequent Closed Itemsets with Density
from Data Streams”, IJCSE, pp. 40 – 48, 2016.
Citation
N. Balajiraja, "Mining Association Rule of Frequent Itemsets Measures for an Educational Environment", International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.8-17, 2016.
Facile Algebraic Representation of a Novel Quaternary Logic
Research Paper | Journal Paper
Vol.4 , Issue.5 , pp.1-15, May-2016
Abstract
In this work, a novel quaternary algebra has been proposed that can be used to implement an arbitrary quaternary logic function in more than one systematic ways. The proposed logic has evolved from and is closely related to the Boolean algebra for binary domain; yet it does not lack the benefits of a higher-radix system. It offers seamless integration of the binary logic functions and expressions through a set of transforms and allows any binary logic simplification technique to be applied in quaternary domain. Since physical realization of the operators defined in this logic has recently been reported, it has become very important to have a well-defined algebra that will facilitate the algebraic manipulation of the novel quaternary logic and aid in designing various complex logic circuits. Therefore, based on our earlier works, here we describe the complete algebraic representation of this logic for the first time. The efficacy of the logic has been shown by designing and comparing several common logic circuits with existing designs in both binary and quaternary domain.
Key-Words / Index Term
Propositional Logic, Quaternary algebra, Quaternary Transformation, Sum-of-products
References
[1] Hurst, S.L; “Multiple-Valued Logic; its Status and its Future”, Computers, IEEE Transactions on, 33 (12), 1160-1179, (1984)
[2] Miller, D.M.; Thornton, M.A.; “Multiple Valued Logic: Concepts and Representations”, Synthesis Lectures on Digital Circuits and Systems, Morgan & Claypool Publishers, (2007)
[3] Smith, K.C.; “The Prospects for Multivalued Logic- A Technology and Applications View”, Computers, IEEE Transactions on, 30, 619-634, (1981)
[4] Fijany, A.; Vatan, F.; Mojarradi, M.; Toomarian, B.; Blalock, B.; Akarvardar, K.; Cristoloveanu, S.; Gentil, P.; “The G4-FET- a universal and programmable logic gate”, Proceedings of the 15th ACM Great Lakes symposium on VLSI (GLSVLSI 2005), 349-352, (2005)
[5] Keshavarzian, A.P.; Navi, K.; “Optimum Quaternary Galois Field Circuit Design through Carbon Nano Tube Technology”, Proceedings, International Conference on Advanced Computing and Communications (ADCOM 2007), 214-219, (2007)
[6] Balaji, B.; Malik, S. S.; “Design of Dual Dynamic Flip-Flop with Featuring Efficient Embedded Logic for Low Power CMOS VLSI Circuits”, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, 2 (9), 75-77, (2014)
[7] Kahrari, Z.; Karimi, G.; “A Novel Low Power Fault Tolerant Full Adder for Deep Submicron Technology”, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, 4 (1), 14-16, (2016)
[8] Chattopadhyay, T.; Taraphdar, C.; Roy, J.N.; “Quaternary Galois field adder based all-optical multivalued logic circuits”, Applied Optics, 48 (22), E35-E44, (2009)
[9] Khan, M.H.A.; “Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits”, Engineering Letters, 15 (2), 203-207 (2007)
[10] Falkowski, B.J.; Rahardja, S.; “Generalised hybrid arithmetic canonical expansions for completely specified quaternary functions”, Electronics Letters, 37 (16), 1006-1007, (2001)
[11] Khan, M.H.A.; Siddika, N.K.; Perkowski, M.A.; “Minimization of Quaternary Galois Field Sum of Products Expression for Multi-Output Quaternary Logic Function Using Quaternary Galois Field Decision Diagram”, Proceedings, 38th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2008), 125-130, (2008)
[12] Khan, M.M.M.; Biswas, A.K.; Chowdhury, S.; Tanzid, M.; Mohsin, K.M.; Hasan, M.; Khan, A.I.; “Quantum realization of some quaternary circuits”, Proceedings, TENCON 2008, IEEE Region 10 Conference, (2008)
[13] Yasuda, Y.; Tokuda, Y.; Zaima, S.; Pak, K.; Nakamura, T.; Yoshida, A.; “Realization of quaternary logic circuits by n-channel MOS devices”, Solid-State Circuits, IEEE Journal of, 21 (1), 162-168, (1986)
[14] Park, S.J.; Yoon, B.H.; Yoon, K.S.; Kim, H.S.; “Design of quaternary logic gate using double pass-transistor logic with neuron MOS down literal circuit”, Proceedings, 34th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2004), 198-203, (2004)
[15] da Silva, R.C.G.; Boudinov, H.; Carro, L.; “A novel Voltage-mode CMOS quaternary logic design”, Electron Devices, IEEE Transactions on, 53 (6), 1480, (2006)
[16] Inaba, M.; Tanno, K.; Ishizuka, O.; “Realization of NMAX and NMIN functions with multi-valued voltage comparators”, Proceedings, 31st IEEE International Symposium on Multiple-Valued Logic (ISMVL 2001), 27-32, (2001)
[17] Datla, S.R.; Thornton, M.A.; “Quaternary Voltage-Mode Logic Cells and Fixed-Point Multiplication Circuits”, Proceedings, 40th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2010), 128-133, (2010)
[18] Chattopadhyay, T.; Roy, J.N.; “Polarization-encoded all-optical quaternary multiplexer and demultiplexer - A proposal”, Optik - International Journal for Light and Electron Optics, 120 (17), 941-946, (2009)
[19] Vranesic, Z. G.; Waliuzzaman, K. M.; “Functional transformation in simplification of multivalued switching functions”, IEEE Transactions on Computers, 21(1), 102-105 (1972)
[20] Jahangir, I.; Hasan, D.M.N.; Siddique, N.A.; Islam, S.; Hasan, M.M.; “Design of quaternary sequential circuits using a newly proposed quaternary algebra”, Proceedings, 12th International Conference on Computers and Information Technology (ICCIT 2009), 203, (2009)
[21] Das, A.; Jahangir, I.; Hasan, M.; Hossain, S.; “On the design and analysis of quaternary serial and parallel adders”, Proceedings, TENCON 2010, IEEE Region 10 Conference, 1691, (2010)
[22] Jahangir, I.; Das, A.; “On the design of quaternary comparators”, Proceedings, 13th International Conference on Computers and Information Technology (ICCIT 2010), 241, (2010)
[23] Jahangir, I.; Hasan, D.M.N.; Islam, S.; Siddique, N.A.; Hasan, M.M.; “Development of a novel quaternary algebra with the design of some useful logic blocks”, Proceedings, 12th International Conference on Computers and Information Technology (ICCIT 2009), 197, (2009)
[24] Jahangir, I.; Hasan, D.M.N.; Reza, M.S.; “Design of some quaternary combinational logic blocks using a new logic system”, Proceedings, TENCON 2009, IEEE Region 10 Conference, (2009)
[25] Das, A.; Jahangir, I.; Hasan, M.; “Optimization of sum of product expressions in a novel quaternary algebra”, Proceedings, International Conference on Informatics, Electronics & Vision (ICIEV), (2014)
[26] Jahangir, I.; Das, A.; Hasan, M.; “Design of novel quaternary encoders and decoders”, Proceedings, International Conference on Informatics, Electronics & Vision (ICIEV), (2012)
[27] Gogna, P.; Lingalugari, M.; Chandy, J.; Heller, E.; Hasaneen, E.S.; Jain, F.; “Quaternary logic and applications using multiple quantum well based SWSFETs”, International Journal of VLSI design & Communication Systems (VLSICS), 3(5), 27-42 (2012)
[28] Jain, F.C.; Chandy, J.; Miller, B.; Hasaneen, E.S.; Heller, E.; “Spatial wavefunction-switched (SWS)-FET: A novel device to process multiple bits simultaneously with sub-picosecond delays”, International Journal of High Speed Electronics and Systems, 20(03), 641-652 (2011)
[29] Gogna, P.; Suarez, E.; Lingalugari, M.; Chandy, J.; Heller, E.; Hasaneen, E.S.; Jain, F.C.; “Ge-ZnSSe Spatial Wavefunction Switched (SWS) FETs to Implement Multibit SRAMs and Novel Quaternary Logic”, Journal of electronic materials, 42(11), 3337-3343 (2013)
[30] Chattopadhyay, T.; Roy, J. N.; “All-optical quaternary computing and information processing: a promising path”, Journal of Optics, 42(3), 228-238 (2013)
[31] Huntington, E.V.; “Sets of Independent Postulates for the Algebra of Logic”, Transactions of the American Mathematical Society, 5 (3), 288-309, (1904)
[32] Khan, M.H.A.; “Quantum Realization of Quaternary Feynman and Toffoli Gates”, Proceedings, 4th International Conference on Electrical and Computer Engineering (ICECE 2006), 157–160, (2006)
[33] Khan, M.H.A.; Perkowski, M.A.; “GF(4) Based Synthesis of Quaternary Reversible-Quantum Logic Circuits”, Journal of Multiple-Valued Logic and Soft Computing, 13, 583-603, (2007)
Citation
Ifat Jahangir, Anindya Das, Masud Hasan, "Facile Algebraic Representation of a Novel Quaternary Logic", International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.1-15, 2016.
Scenario-based Evaluation of Software Architecture Styles from the Security Viewpoint
Research Paper | Journal Paper
Vol.4 , Issue.4 , pp.95-101, Apr-2016
Abstract
By increasing the use of distributed systems and increasing software attacks, software security is considered very important and treated as an active research area. Security is usually taken into account after design and implementation of the system, whereas like other quality attributes, it must be considered from the beginning of the process of building software, such as architectural design. Considering 1) the long-term effects of design stage decisions on final software product, 2) one of the important design decisions, is selection of suitable software architecture style, and 3) the quantitative impact of software architecture style on quality attributes, especially security, has not been investigated, the aim of this research is quantification of the impact of architectural styles on security quality attribute. This study aims at evaluating the software architectural styles from the viewpoint of the security quality attribute based on scenario-based evaluation method. In this study, by presenting security scenarios, the architectural styles are evaluated from the perspective of security. Then architectural styles are ranked based on the results of the evaluation and importance of scenarios using Analytical Hierarchy Process, in terms of supporting software security. The most important contribution of this paper is to propose an approach to select the software architecture style in which security attribute plays a major role.
Key-Words / Index Term
Security; Scenario-based Evaluation; Software Architecture Styles
References
[1] P. T. Devanabu and S. Stubblebine, Software engineering for security: a roadmap”, in ICSE ’00: Proceedings of the Conference on the Future of Software Engineering. ACM, 2000, pp. 227–239.
[2] J. Juerjens, Secure Systems Development with UML, Springer, 2005.
[3] D.G. Rosado, E. Fernández-Medina, and M. Piattini, Comparison of Security Patterns, International Journal of Computer Science and Network Security, Vol. 6. Issue 2B. pp. 139-146, 2006.
[4] Len. Bass, Paul. Clements P, Rick. Kazman, 2003, “Software Architecture in Practice”, Addison-Wesley Professional Publisher ,Second Edition, 2003, Addison-Wesley, ISBN: 0321154959
[5] Len. Bass, Paul. Clements, and Rick. Kazman, “Software Architecture in Practice”, Pearson Education Publisher, Third Edition, 2013, ISBN: 9332502307
[6] F.Losavio, et al, ISO Quality Standards for Measuring Architectures, The Journal of System and Software 72, Page No. 209-223, Elsevier, 2004.
[7] M. AlSharif, et al, "ding the Complexity of Software Architecture", ACM Southeast Regional Conference, Proc. of the 42nd annual southeast regional conference, Huntsville, Alabama, 2004.
[8] S. Jingqiu and H. Behrouz, “Development of an Intelligent System for Architecture Design and Analysis”, Canadian Electrical and Computer Engineering, Conference, pp. 539- 542, 2004.
[9] H. Koh, S. Kung, and J.Park, “The Method to Choose Architectural Approaches in the Software Architecture Design Phase”, ICITA (1), pp. 103-106, 2005.
[10] H. Reza, D. Jurgens, J. White, J. Anderson, and J. Peterson, “An architectural design selection tool based on design tactics, scenarios and nonfunctional requirements”, Electro Information Technology, 2005 IEEE Int. Conf. , pp: , 2005.
[11] G. Zayaraz, and P. Thambidurai, “Software Architecture Selection Framework Based on Quality Attributes”, Annual IEEE INDICON, pp. 167– 170, December 11-13, 2005, ISBN:0-7803-9503-4
[12] N.B. Harrison and P. Avgerinos, “Leveraging Architecture Patterns to Satisfy Quality Attributes”, 1th European Conf. on Software Architecture Springer, pp (263-270), ECSA 2007 Madrid, Spain, September 24-26,
[13] P. Avgeriou, U. Zdun, “Architectural patterns revisited: a pattern language”, Proc. of 10th European Conf. on Pattern Languages of Programs, pp.1-39, 2005 , Butterworth-Heinemann,
[14] G.R.Shahmohammadi, “Reliability Evaluation of Software Architecture Styles”, 5-th International Conference on Parallel, Distributed Computing Technologies and Applications (PDCTA-2016), pp. 117-129, January 2th-3th,,2016, ISBN: 978-1-921987-45-8.
[15] G.R.Shahmohammadi, 2014, “Evaluation of the Software Architecture Styles from Maintainability Viewpoint”, International Conference on Foundations of Computer Science & Technology, Zurich, Switzerland, pp. 183-197, January 2th-4th , 2014.
[16] F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, M. Stal, “Pattern-Oriented Software Architecture: A System of Patterns”, Vol. 1, Wiley, 1996, ISBN: 978-0-471-95869-7.
[17] M. Shaw, D. Garlan, 1996, “Software Architecture: Perspectives Discipline on an Emerging”, Prentice Hall.
[18] K. Jiwnani and M. Zelkowitz, 2002, “Maintaining Software with a Security Perspective”, Proc. of the International Conference on Software Maintenance, pp. 194 – 203, ISBN: 0-7695-1819-2
[19] Gholamreza. Shahmohammadi, and Saeed. Jalili, “Scenario-Based Quantitative Evaluation of Software Architecture Style from Maintainability Viewpoint”, 14st Annual of CSI Computer Conference (CSICC 2009), Iran, Amirkabir University, 2009.
Citation
Gholamreza Shahmohammadi, "Scenario-based Evaluation of Software Architecture Styles from the Security Viewpoint", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.95-101, 2016.