Survey on Feature Selection Techniques towards Text Mining in Cloud
Survey Paper | Journal Paper
Vol.07 , Issue.05 , pp.101-105, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.101105
Abstract
Cloud computing is a technology that provides efficient services to the users over internet. Users stores volumes of data in cloud which is rendered as data as a service (DaaS) on demand and charged as per usage. Text mining is a technology that is used to retrieve data from a massive set of database. Cloud uses Text mining to retrieve data efficiently from various cloud data centres. Text classification is a technique used for discovering classes of indefinite data. Prior to applying any mining technique, trivial features should be filtered. Feature selection is capable of improving learning process, lesser computational complexity, organizes better general models, and decreasing required storage. We analyses towards effectiveness of the clustering based feature selection method. This paper is to analysis on different techniques used for feature selection. Further survey on Feature selection and Feature extraction technique has been extract the features from the documents, which results in single and multi-label document classification. Based on the extracted features the survey is done on multiple-feature based projective nonnegative matrix factorization technique to cluster the documents.
Key-Words / Index Term
Data mining, Feature selection, Text mining, Filtering, factorization
References
[1] Lin Yue, Wanli Zuo , TaoPeng , YingWang, Xuming Han A fuzzy document clustering approach based on domain-specified ontology, “ Data & Knowledge Engineering”, 100 (2015) 148-166.
[2] Malik Tahir Hassana, Asim Karim, Jeong-Bae Kim, Moongu Jeon CDIM: Document Clustering by Discrimination Information Maximization, ”Information Sciences”, 316 (2015) 87–106.
[3] Charlotte Laclau, Mohamed Nadif "Hard and fuzzy diagonal co-clustering for document-term partitioning "Neurocomputing”, 193 (2016) 133–147
[4] Vıctor Mijangos, Gerardo Sierra, Azucena Montes Sentence level matrix representation for document spectral clustering "Pattern Recognition Letters, Elsevier”, 20 November 2016.
[5] Mei Lua, Xiang-Jun Zhao, Li Zhang, Fan-Zhang Li, Semi-supervised concept factorization for document clustering, “Information Sciences”, 331 (2016) 86–98.
[6] Tingting Wei, Yonghe Lu, Huiyou Chang, Qiang Zhou, Xianyu Bao, A semantic approach for text clustering using WordNet and lexical chains, “Expert Systems with Applications”, 42 (2015) 2264–2275.
[7] Sourav Dutta, Gerhard Weikum, Cross-Document Co-Reference Resolution using Sample-Based Clustering with Knowledge Enrichment, “Transactions of the Association for Computational Linguistics”, 3(2015)15–28.
[8] Yong-Il Kim, Yoo-Kang Jiand Sun Park, Big Text Data Clustering using Class Labels and Semantic Feature Based on Hadoop of Cloud Computing, “International Journal of Software Engineering and Its Applications”, 8(2014),1-10.
Citation
Balavinothini, Gnanambigai, "Survey on Feature Selection Techniques towards Text Mining in Cloud", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.101-105, 2019.
Liar’s Domination in Sun Graphs
Survey Paper | Journal Paper
Vol.07 , Issue.05 , pp.106-108, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.106108
Abstract
Liar`s dominating set is one that identifies an intruder`s location even if one device in the neighborhood of the intruder vertex becomes faulty, that is, any one device in the neighborhood of the intruder vertex can misidentify any vertex in its closed neighborhood as the location of the intruder. The liar’s domination number is the minimum cardinality of a liar’s dominating set. In this paper, we determine the liar’s domination number for sun graphs, sun let graphs, line graphs of sun let graphs and wheel graphs.
Key-Words / Index Term
Domination, Liar’s domination, Sun graphs, Sun let graphs, Wheel graphs
References
[1] A. Alimadadi, M. Chellali, and Doost Ali Mojdeh, “Liar’s dominating sets in graphs” Discrete Applied Mathematics, Vol. 211, pp. 204-210, 2016.
[2] A. Brandstӓdt, V. B. Le and J. P. Spinrad, “Graph Classes: A Survey”, PA: SIAM, Philadelphia, pp. 112, 1987.
[3] D. D Durgan, F. N. Altundag, Liar’s Domination in Graphs, Bulletin of International Mathematical Virtual Institute, Vol. 7, pp. 407-15, 2017.
[4] R. J. Faudree, M. D. Brendan, “A conjecture of Erdös and the Ramsey number r(W)”, J. Combinatorial Math., and Combinatorial Comput., Vol. 13: pp. 23-31, 1993.
[5] F. Harary and T.W. Haynes, “Double domination in graphs”, Ars Combin., Vol. 55, pp. 201-213, 2000.
[6] M. Jakovac, S. Klavazar, “Vertex-, Edge-, and Total-Colorings of Sierpinski-like Graphs”, Discrete Mathematics Vol. 309, pp. 1548-1556, 2009.
[7] S. Klavzar, “Coloring Sierpinski Graphs and Sierpinski Gasket Graphs” Taiwanese J. Math. Vol. 12, pp. 513-522, 2008.
[8] S. Klavzar and U. Milutinovic, “Graphs S(n; k) and a variant of the Tower of Hanoi problem”, Czechoslovak Math. J., Vol. 47, pp. 95-104, 1997.
[9] P. Manuel, “Location and Liar Domination of Circulant Networks”, Ars Combinatoria Waterloo then Winnipeg, Vol. 101, pp. 309-320, 2011.
[10] B.S. Panda and S. Paul, “Liar’s domination in graphs: Complexity and algorithm”, Discrete Applied Mathematics, Vol. 161, pp. 1085-1092, 2013.
[11] B. S. Panda and S. Paul, “Connected Liar’s domination in graphs: Complexity and algorithms”, Discrete Mathematics, Algorithms and Applications, Vol. 4, pp. 1-16, 2013.
[12] B. S. Panda and S. Paul, “Hardness results and approximation algorithm for total liar’s domination in graphs”, Journal of Combinatorial Optimization, Vol. 27, pp. 643-662, 2014.
[13] B. S. Panda and D. Pradhan, “A linear time algorithm to compute a minimum restrained dominating set in proper interval graphs”, Discrete Mathematics, Algorithms and Applications, Vol. 7, No. 2 ID: 1550020, 2015.
[14] B. S. Panda, S. Paul, and D. Pradhan, “Hardness Results, Approximation and Exact Algorithms for Liars Domination Problem in Graphs”, Theoretical Computer Science Vol. 573, pp. 26-42, 2015.
[15] Ponraj, Raja and Narayanan, S. Sathish, “Difference cordiality of some snake graphs”, Journal of applied mathematics and informatics, Vol. 32, pp. 377-387, 2014.
[16] I. Rajasingh, B. Rajan, A. S. Shanthi, and Albert Muthumalai, “Induced matching partition of sierpinski and honeycomb networks”, in International Conference on Informatics Engineering and Information Science, Vol. 253, pp. 390-399, 2011.
[17] M. L. Roden and P. J. Slater, “Liar’s domination in graphs”, Discrete Math., Vol. 309, pp. 5884-5890, 2008.
[18] P. J. Slater, “Liar’s Domination”, Networks, Vol. 54, pp. 70-74, 2009.
[19] A. M. Teguia, A. P. Godbole, “Sierpinski Gasket Graphs and Some of their Properties”, Australasian Journal of Combinatorics, Vol. 35, pp. 181-192, 2006.
[20] J. Vernold Vivin and M. Venkatachalam, “On b-chromatic number of Sun let graph and wheel graph families”, Journal of the Egyptian Mathematical Society, Vol. 23, pp. 215-218, 2014.
Citation
A. S. Shanthi, Diana Grace Thomas, "Liar’s Domination in Sun Graphs", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.106-108, 2019.
Multi-Featured Extraction and Convolution Neural Network Based SVM for Automatic Facial Emotion Recognition
Research Paper | Journal Paper
Vol.07 , Issue.05 , pp.109-117, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.109117
Abstract
Human emotions are mental states of feelings that are exposed unconsciously and followed by physical changes in their facial muscles which entail the expressions on the face. Certain emotions commonly expressed by human are happiness, sadness, anger, fear, disgust, surprise, and neutral. For a non-verbal communication, facial expression plays a vital role since it appears because of inner core feelings of a person that reflects on the faces. For the automatic recognition of facial emotions, many methods are used such as Artificial Neural networks, Neuro-fuzzy, Wavelet transformation, etc. However, the existing methods take more time for data classification, low accuracy in the optimization process and high level of error rate. To overcome these concerns, this paper depicts an amphibious operation of Multi Support Vector Machine (SVM) with the Convolutional Neural Networks (CNN). Initially, the characteristics of the pre-processed face image are efficiently extracted by using Local Binary Pattern (LBP), Principal Component Analysis (PCA) and Gray Level Occurrence Matrix (GLCM). In this model, CNN works as a trainable feature extractor, and Multi-SVM performs as a recognizer. The proposed system`s performance is analyzed with various human faces using the MATLAB tool. The results prove that the proposed method surpasses the earlier methods regarding high accuracy with low computation time and low error rate.
Key-Words / Index Term
Convolutional Neural Networks, Face recognition, Local Binary Pattern, Principal Component Analysis
References
[1] C. Darwin, The Expression of the Emotions in Man and Animals. D. Appleton and Company, 1899.
[2] D. Keltner and P. Ekman, Handbook of Emotions, ch. 15 - Facial Expression of Emotion, pp. 151–249. Guilford Publications, Inc., 2nd ed., 2000.
[3] E. M. Provost, Y. Shangguan, and C. Busso, "Umeme: University of Michigan emotional McGurk effect data set," IEEE Transactions on Affective Computing, vol. 6, pp. 395–409, Oct 2015.
[4] R. E. Jack, O. G. Garrod, and P. G. Schyns, “Dynamic facial expressions of emotion transmit an evolving hierarchy of signals over time,” Current Biology, vol. 24, no. 2, pp. 187 – 192, 2014.
[5] Lopes, A. T., de Aguiar, E., De Souza, A. F., & Oliveira-Santos, T. (2017). Facial expression recognition with convolutional neural networks: coping with few data and the training sample order. Pattern Recognition, 61, 610-628.
[6] R. E. Jack, O. G. Garrod, and P. G. Schyns, “Dynamic facial expressions of emotion transmit an evolving hierarchy of signals over time,” Current Biology, vol. 24, no. 2, pp. 187 – 192, 2014.
[7] M. W. Schurgin, J. Nelson, S. Iida, H. Ohira, J. Y. Chiao, and S. L. Franconeri, “Eye movements during emotion recognition in faces,” Journal of Visualization, vol. 14, no. 13, 2014.
[8] I. Goodfellow, Y. Bengio, and A. Courville, “Deep learning.” Book in preparation for MIT Press, 2016.
[9] Pilla Jr, V., Zanellato, A., Bortolini, C., Gamba, H. R., Borba, G. B., & Medeiros, H. Facial Expression Classification Using Convolutional Neural Network and Support Vector Machine.
[10] Azcarate, A., Hageloh, F., Van de Sande, K., & Valenti, R. (2005). Automatic facial emotion recognition. Universiteit van Amsterdam, 1-6.
[11] Cohen, I., Garg, A., & Huang, T. S. (2000, November). Emotion recognition from facial expressions using multilevel HMM. In Neural information processing systems (Vol. 2).
[12] Bartlett, M. S., Littlewort, G., Frank, M., Lainscsek, C., Fasel, I., & Movellan, J. (2006, April). Fully automatic facial action recognition in spontaneous behavior. In Automatic Face and Gesture Recognition, 2006. FGR 2006. 7th International Conference on (pp. 223-230). IEEE.
[13] Shan, C., Gong, S., & McOwan, P. W. (2009). Facial expression recognition based on local binary patterns: A comprehensive study. Image and Vision Computing, 27(6), 803-816.
[14] Walecki, R.; Rudovic, O. Deep structured learning for facial expression intensity estimation. Image Vis. Comput. 2017, 259, 143–154.
[15] Al-Shabi, M., Cheah, W. P., & Connie, T. (2016). Facial Expression Recognition Using a Hybrid CNN-SIFT Aggregator. arXiv preprint arXiv:1608.02833.
[16] Hasani, B., & Mahoor, M. H. (2017, May). Spatio-temporal facial expression recognition using convolutional neural networks and conditional random fields. In Automatic Face & Gesture Recognition (FG 2017), 2017 12th IEEE International Conference on (pp. 790-795). IEEE.
[17] Yang, B., & Chen, S. (2013). A comparative study on the local binary pattern (LBP) based face recognition: LBP histogram versus LBP image. Neurocomputing, 120, 365-379.
[18] Chamasemani, F. F., & Singh, Y. P. (2011, September). Multi-class support vector machine (SVM) classifiers--an application in hypothyroid detection and classification. In Bio-Inspired Computing: Theories and Applications (BIC-TA), 2011 Sixth International Conference on (pp. 351-356). IEEE.
Citation
M.Regina, M.S. Josephine, V. Jeyabalraja, "Multi-Featured Extraction and Convolution Neural Network Based SVM for Automatic Facial Emotion Recognition", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.109-117, 2019.
Contour based Character Segmentation and Nguyen-Widrow Weight Generation for Classification of Tamil Palm Leaf Script Characters - Machine Learning Approach
Research Paper | Journal Paper
Vol.07 , Issue.05 , pp.118-123, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.118123
Abstract
The main aim of this work is the classification of Tamil palm leaf manuscript segmented characters using Machine Learning approach. For the segmentation of characters, first the images of the palm leaf manuscripts were allowed to preprocessing which includes filtering and thresholding. After the preprocessing stage, the preprocessed images were allowed for character segmentation using contour based bounding box segmentation. Then the segmented Tamil palm leaf manuscript characters were labelled with different classes for classification. To classify the characters Adaptive Backpropagation Neural Network (ABPN) with Shannon activation function was used with Nguyen Widrow weight initialization. For neural network, normally we use random initialization to generate the weights. Rather than random initialization here Nguyen-Widrow weight initialization technique was implemented. For comparison ABPN with Shannon activation function (method 1) and ABPN with Shannon activation function using Nguyen-Widrow initialization was used, from this ABPN with Shannon activation function using Nguyen-Widrow gives 96% of accuracy for Tamil palm leaf character classification.
Key-Words / Index Term
ABPN, Bounding box, Convex hull, Contour, Shannon, Machine Learning
References
[1] Amit Choudhary, Rahul Rishi, Savita Ahlawat, “Off-Line Handwritten Character Recognition using Features Extracted from Binarization Techniques”, AARSI Procedia, , Vol.4, pp.306-312, 2013.
[2] Dino Neinhold, Kilian Schwab, Rolf Dornberger and Thomas Hanne, “Effects of Weight Initialization in a Feedforward Neural Network for Classification Using a Modified Genetic Algorithm”, IEEE, pp.6-12, 2015.
[3] Hossin. M., Sulaiman. M.N, “A Review on Evaluation Metrics for Data Classification Evaluations”, International Journal Of Data Mining & Knowledge Management Process, Vol.5, No.2, pp.1-11, 2015.
[4] JeyaseeliSubavathi S, Kathirvalavakumar T, “Adaptive modified backpropagation algorithm based on differential errors”, International Journal of Computer Science, Engineering and Applications (IJCSEA),; Vol.1, pp. 21-34, 2011.
[5] Karthigaiselvi. M, Kathirvalavakumar. T, “Structural Run Based Feature Vector to Classify Printed Tamil Characters using Neural Network”, International Journal of Engineering Research and Application, Vol.7, Issue.7, pp.44-63, 2017.
[6] KavithaSubramani, Murugavalli. S, “A Novel Binarization Method for Degraded Tamil Palm Leaf Images”, IEEE, pp.176-181, 2016.
[7] Kiruba. B, Nivethitha. A, Vimaladevi. M, “Segmentation of Handwritten Tamil Character from Palm Script using Histogram Approach”, International Journal of Informative and Futuristic Research, Vol.4,Issue.5, pp.6418-6424,2017.
[8] NarahariSastryPanyam, Vijaya Lakshmi. T.R, Ramakrishnan Krishnan, Koteswara Rao. N.V, “Modeling of Palm Leaf Character Recognition System using Transform based Techniques”, Pattern Recognition Letters, Vol.84, pp.29-34,2016.
[9] Nibaran Das, Jagan Mohan Reddy, Ram Sarkar, SubhadipBasu, MahantapasKundu, MitaNasipuri, Dipak Kumar Basu, “A Statistical-Topological Feature Combination for Recognition of Handwritten Numerals”, Applied Soft Computing ,Vol.12, pp.2486-2495 , 2012.
[10] Sornam.M, Muthu SubashKavitha, Poornima Devi.M, “An Efficient Morlet Function based Adaptive Method for Faster Backpropagation for Handwritten Character Recognition”, IEEE, pp.135-139, 2016.
[11] Sornam.M, Poornima Devi. M, “Tamil Palm Leaf Manuscript Character Segmentation using GLCM Feature Extraction”, International Journal of Computer Science and Engineering, Vol.6, Issue.4,pp.167-173,2018.
[12] Sornam. M, C. Vishnu Priya, “Deep Convolutional Neural Network for Handwritten Tamil Character Recognition Using Principal Component Analysis”, Smart and Innovative Trends in Next Generation Computing Technologies, pp. 778-787, 2018.
[13] Tien-Chien Chang and Shu-Yuan Chen, “Character Segmentation using Convex hull Techniques”, International Journal of Pattern Recognition and Artificial Intelligence, Vol.13, No.6, pp.833-858,1999.
[14] Vellingiriraj. E.K, Balasubramanie. P, “Recognition of Ancient Tamil Handwritten Characters in Historical Documents by Boolean Matrix and BFS Graph”, International Journal of Computer Science and Technology, Vol.5, pp.65-68,2014.
[15] Vijaya Lakshmi. T.R, “Reduction of Features to Identify Characters from Degraded Historical Manuscripts”, Alexandria Engineering Journal, pp.1-7, 2017.
[16] YapingZang, Shan Liang, ShuaiNie, Wenju Liu, Shouye Peng, “Robust Offline Handwritten Character Recognition through Exploring Writer-Independent features under the guidance of Printed data”, Pattern Recognition Letters, Vol.106, pp.20-26,2018.
[17] Yi-Chou Wu, Fei-Yin, Cheng-Lin Liu, “Improving Handwritten Chinese Text Recognition using Neural Network Language Models and Convolutional Neural Network Shape Models”, Pattern Recognition, Vol.65,pp.251-264, 2017.
Citation
Poornima Devi. M, M. Sornam, "Contour based Character Segmentation and Nguyen-Widrow Weight Generation for Classification of Tamil Palm Leaf Script Characters - Machine Learning Approach", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.118-123, 2019.
Type 2 diabetes mellitus prediction model based on ensemble boosting method with Principal Component Analysis
Research Paper | Journal Paper
Vol.07 , Issue.05 , pp.124-130, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.124130
Abstract
In the recent years, data mining has been employed in the medical field for extracting and manipulating information, and aids within the higher process. There is a growing want for the medical establishments to be extra suggested and knowledgeable concerning the diseases and to understand the risk factors before diagnosis. Predicting the results of a process with a high level of accuracy is a difficult task. In this study we took the advantage of the data mining models to predict the Type – 2 Diabetes mellitus. The benchmark dataset, “Pima Indian Diabetes” dataset is used for this study. The main objective of this study is to propose the extensive data pre-processing such as imputation of missing values and a feature engineering technique namely ‘Principal Component Analysis’ are used to transform the dataset into a compressed form. Ensemble or classifier combination method called boosting method such as Gradient boosting machine and Random Forest are used. The most downside that’s attempting to be resolved isn’t solely to extend the accuracy however additionally to retain all the information in the data set while not removing the missing data. The missing data are imputed by a method called ‘predictive mean matching’. The results show that the ensemble learners, once used alongside PCA attained 100% accuracy of prediction. Moreover, it ensures that no missing information must be removed and might be imputed to confirm the data quality is enough. As a result, the model is shown to be helpful for the real time prediction of Diabetes Mellitus.
Key-Words / Index Term
Ensembles,Gradient boosting machine,Random Forest,Principal Component Analysis
References
[1] Ndisang, Joseph Fomusi, Alfredo Vannacci, and Sharad Rastogi. "Insulin Resistance, Type 1 and Type 2 Diabetes, and Related Complications 2017." Journal of diabetes research2017 ,2017
[2] Anjana, R.M., Deepa, M., Pradeepa, R., Mahanta, J., Narain, K., Das, H.K., Adhikari, P., Rao, P.V., Saboo, B., Kumar, A. and Bhansali, A., 2017. Prevalence of diabetes and prediabetes in 15 states of India: results from the ICMR–INDIAB population-based cross-sectional study. The Lancet Diabetes & Endocrinology,Vol. 5, Issue . 8, pp.585-596.
[3] Zimmet, P.Z., Magliano, D.J., Herman, W.H. and Shaw, J.E., 2014. Diabetes: a 21st century challenge. The lancet Diabetes & endocrinology,Vol. 2, Issue 1, pp.56-64.
[4] Ahmad, A., Mustapha, A., Zahadi, E.D., Masah, N. and Yahaya, N.Y., 2011. Comparison between Neural Networks against Decision Tree in Improving Prediction Accuracy for Diabetes Mellitus. In Digital Information Processing and Communications ,Springer, Berlin, Heidelberg. pp. 537-545
[5] Chen, W., Chen, S., Zhang, H. and Wu, T., November. A hybrid prediction model for type 2 diabetes using K-means and decision tree. 8th IEEE International Conference on Software Engineering and Service Science, (ICSESS). pp. 386-390,2017
[6] Wu, H., Yang, S., Huang, Z., He, J. and Wang, X., 2018. Type 2 diabetes mellitus prediction model based on data mining. Informatics in Medicine Unlocked,Vol. 10, pp.100-107.
[7] Kavakiotis, I., Tsave, O., Salifoglou, A., Maglaveras, N., Vlahavas, I. and Chouvarda, I., Machine learning and data mining methods in diabetes research. Computational and structural biotechnology journal,Vol. 15, pp.104-116,2017
[8] Choubey, D.K., Paul, S., Kumar, S. and Kumar, S., 2017, February. Classification of Pima indian diabetes dataset using naive bayes with genetic algorithm as an attribute selection. In Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing System (ICCCS 2016) pp. 451-455, 2017
[9] kumar Dewangan, A. and Agrawal, P., Classification of diabetes mellitus using machine learning techniques. International Journal of Engineering Appled Science, Vol.2, Issue.5, pp.145-148, 2015.
[10] Amatul, Z., Asmawaty, T., Kadir, A. and MAM, A., A Comparative Study on the Pre-Processing and Mining of Pima Indian Diabetes Dataset, 2013.
[11] Vijayan, V.V. and Anjali, C.,Decision support systems for predicting diabetes mellitus—A Review. Global Conference in Communication Technologies, IEEE, pp. 98-103,April 2015 .
[12] Sowjanya, K., Singhal, A. and Choudhary, C., 2015, June. MobDBTest: A machine learning based system for predicting diabetes risk using mobile devices. IEEE International In Advance Computing Conference (IACC), pp. 397-402, 2015
[13] Gang, S., Shanshan, L. and Ding, Y., 2015, November. Design and Implementation of Diabetes Risk Assessment Model Based on Mobile Things. In,7th International Conference on Information Technology in Medicine and Education (ITME) pp.425-428, 2015.
[14] Choudhary, D., Suthar, O. P., Bhatia, P. K., & Biyani, G. “Zero” diastolic blood pressure. In The Indian Anaesthetists’ Forum . Medknow Publications and Media Pvt. Ltd, Vol. 17, No. 1, pp. 32-32, January 2016.
[15] Vitral, G. L. N., Aguiar, R. A. P. L., de Souza, I. M. F., Rego, M. A. S., Guimarães, R. N., & Reis, Z. S. N. (2018). Skin thickness as a potential marker of gestational age at birth despite different fetal growth profiles: A feasibility study. PloS one, Vol. 13, Issue 4, e0196542, 2018.
[16] Gisela Wilcox, Insulin and Insulin Resistance , Clinic Biochem Rev ,Vol 26, pp 19-39, 2005.
[17] Buuren, S. van, and Karin Groothuis-Oudshoorn. "mice: Multivariate imputation by chained equations in R." Journal of statistical software pp. 1-68, 2015.
[18] Breiman, Leo. "Bagging predictors." Machine learning 24.2 (1996): 123-140.
[19] Valentini, G. and Masulli, F.,. Ensembles of learning machines,In Italian Workshop on Neural Nets Springer, Berlin, Heidelberg, pp. 3-20, May 2002.
[20] Freund, Y., & Schapire, R. E. A decision-theoretic generalization of on-line learning and an application to boosting. Journal of computer and system sciences, Vol. 55,Issue 1,pp. 119-139,1997
[21] Breiman, L. Random forests. Machine learning, Vol.45,Issue 1, pp. 5-32,2001.
[22] Chaurasia, V., Pal, S., & Tiwari, B. B. (2018). Prediction of benign and malignant breast cancer using data mining techniques. Journal of Algorithms & Computational Technology, Vol.12, Issue 2, pp. 119-126.
[23] Singh, K., Lilhore, U. K., & Agrawal, N. An Efficient Supervised Learning Technique for Tumour Detection and Analysis from MR Image Data Set,2018
[24] Zhu, X. F., Zhu, B. S., Wu, F. M., & Hu, H. B. DNA methylation biomarkers for the occurrence of lung adenocarcinoma from TCGA data mining. Journal of cellular physiology, 2018.
Citation
M.Sornam, M.Meharunnisa, "Type 2 diabetes mellitus prediction model based on ensemble boosting method with Principal Component Analysis", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.124-130, 2019.
Fruits Classification Using Image Processing Techniques
Research Paper | Journal Paper
Vol.07 , Issue.05 , pp.131-135, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.131135
Abstract
A new method for classifying fruits using image processing technique is proposed in this paper. The data set used had 70 apple images and 70 banana images for training and 25 images of apple and 25 images of bananas for testing. RGB image was first converted to HSI image. Then by using Otsu’s thresholding method region of interest was segmented by taking into account only the HUE component image of the HSI image. Later, after background subtraction, a total of 36 statistical and texture features were extracted with the help of the coefficients obtained by applying wavelet transformation on the segmented image using Haar filter. Extracted features were given as inputs to a SVM classifier to classify the test images as apples and bananas. As KNN classification method did not give 100% accuracy while classification SVM classification method was used. 140 sample images of apples and bananas were used for training and 25 images of banana and 25 images of apples were used for testing the proposed algorithm. The proposed algorithm gave 100% accuracy rate.
Key-Words / Index Term
RGB, HSI, Region of interest, Wavelet domain, Haar filter, SVM classification
References
[1] Sahu, Dameshwari, and Chitesh Dewangan. "Identification and Classification of Mango Fruits Using Image Processing." Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol 2.2 (2017): 203-210.
[2] Tarale, Ketki, and Anil Bavaskar. "Fruit Detection Using Image Processing Technique." National Conference on Advances in Engineering and Applied Science (NCAEAS). 2017,(3)2: 178-183
[3] Seng, Woo Chaw, and Seyed Hadi Mirisaee. "A new method for fruits recognition system." Electrical Engineering and Informatics 2009. ICEEI`09. International Conference on. Vol. 1. IEEE, 2009.
[4] Prabha, D. Surya, and J. Satheesh Kumar. "A study on image processing methods for fruit classification." Proc. Int. Conf. on Computational Intelligence and Information Technology, CIIT 2012.
[5] Zawbaa, Hossam M., Maryam Hazman, Mona Abbass, and Aboul Ella Hassanien. "Automatic fruit classification using random forest algorithm." In Hybrid Intelligent Systems (HIS), 2014 14th International Conference on, pp. 164-168. IEEE, 2014.
[6] Kumar, C., Chauhan, S., & Alla, R. N. (2015, April). “Classifications of citrus fruit using image processing-GLCM parameters”. In Communications and Signal Processing (ICCSP), 2015 International Conference on (pp. 1743-1747). IEEE.
[7] Zawbaa, Hossam M., Mona Abbass, Maryam Hazman, and Aboul Ella Hassenian. "Automatic fruit image recognition system based on shape and color features." In International Conference on Advanced Machine Learning Technologies and Applications, pp. 278-290 Springer, Cham, 2014.
[8] Dubey, Shiv Ram, and A. S. Jalal. "Robust approach for fruit and vegetable classification." Procedia Engineering 38 (2012): 3449-3453.
[9] Gongal, A., M. Karkee, and S. Amatya. "Apple fruit size estimation using a 3D machine vision system." Information Processing in Agriculture 5, no. 4 (2018): 498-503.
[10] Wang, Weizu, Zhou Yang, Huazhong Lu, and Han Fu. "Mechanical damage caused by fruit-to-fruit impact of litchis." IFAC- PapersOnLine 51, no. 17 (2018): 532-535.
[11] Momin, M. A., et al. "Geometry-based mass grading of mango fruits using image processing." Information Processing in Agriculture, 4.2 (2017): 150-160.
Citation
PL.Chithra, M.Henila, "Fruits Classification Using Image Processing Techniques", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.131-135, 2019.
Automatic Renal Defect Classification Using Inception
Research Paper | Journal Paper
Vol.07 , Issue.05 , pp.136-139, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.136139
Abstract
Deep feature representation is more effective to perform classification of renal ultrasound images. Increases in distance of the features would suppresses the classification accuracy, conventional methods for categorization of renal diseases using medical ultrasound have the lack of accuracy due to restricted way of feature extraction. The main objective of this work is to classify the different renal diseases using ultrasound brightness mode images. Inception is derived with multiple convolutions and down sampling of input image elements in order to produce the deep features for classification. The projection of average pooling with convolution layer makes exacts reduction of unwanted invariants on the input image. The activation function rectified linear units are used for fast computation of the network architecture. The performance metrics for the classification of renal diseases have analyzed using confusion matrix. Inception produces better results than traditional convolution networks. The performance accuracy for the classification of renal diseases are given by 87.43%.
Key-Words / Index Term
Confusion matrix, Deep learning, Inception, Rectified linear units, Renal diseases, Ultrasound B-mode
References
[1] John D. Peipert, Peter M. Bentler, Kristi Klicko, and Ron D. Hays, “Psychometric Properties of the Kidney Disease Quality of Life 36-Item Short-Form Survey (KDQOL-36) in the United States”Elsevier transaction on American Journal of Kidney Diseases vol 71 issue 4 pp 1-9. April 2018.
[2] Tariq Shafi Eliseo Guallar, “Mapping Progress in Reducing Cardiovascular Risk with Kidney Disease”, American society of Nephrology vol 13. Issue 1. pp.1-3. jul, 2018.
[3] Rahul Roy, Susmitha gosh, Ashis gosh, “Speckle Denoising of Clinical Ultrasound Images Based on Fuzzy Spel Conformity in its Adjacency”|, Elsevier transaction on journal of applied soft computing, vol 73, pp. 394-417, dec 2018
[4] Prabha Sathees, Sujatha C. Manoharan “Proposal of index to estimate breast similarities in thermograms using fuzzy C means and anisotropic diffusion filter based fuzzy C means clustering”, Elsevier transaction on Infrared Physics & Technology vol 93. 316-325, Sep 2018.
[5] Morgan P. McBee, MD, Omer A. Awan, MD, MPH, CIIP, Andrew T. Colucci, MD, Comeron W. Ghobadi, MD, Nadja Kadom, MD, Akash P. Kansagr’, MD, MS, Srini Tridandapani, MD, PhD, MSEE, MSCR, MBA, William F. Auffermann, MD, PhD, “Deep Learning in Radiology” vol 25 issue 11 pp 12-14 Jan 2016.
[6] R. Vasanthselvakumar, M. Balasubramanian, S. Palanivel, “Pattern Analysis of Kidney Diseases for Detection and Classification Using Ultrasound B - Mode Images”, International Journal of Pure and Applied Mathematics, Volume 117 No. 15, pp. 635-653, 2017.
[7] Ladislav Rampasek1,2 and Anna Goldenberg, ” TensorFlow: Biology’s Gateway to Deep Learning?”, Elsevier transaction on cell system, vol 2 issue 1 pp. 12-14, Jan 2016.
[8] Christian Szegedy , Vincent Vanhoucke, Sergey Ioffe, Jon Shlens “Rethinking the Inception Architecture for Computer Vision”, In the proceedings IEEE Inetrnational Conference on Computer Vision and Foundation (ICVF 2016). pp. 2818-2826, 2016.
[9] Pietro Perona, Jitendra Malik, “Scale-Space and Edge Detection Using AnisotropicDiffusion”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12. no. 7, pp 629-639, July 1990.
[10] Yin Zhu , Yuqiang Chen , Zhongqi Lu , Sinno Jialin Pan, Gui-Rong Xue, Yong Yu , and Qiang Yang, “Heterogeneous Transfer Learning for Image Classification, In the proceedings AAAI Conference on Artificial Intelligence (2011)”
[11] Xiaoling Xia, Cui Xu”inception-v3 for Flower Classifcation” In proc Image, Vision and Computing, pp 783-787. Jan 2017.
Citation
R. Vasanthselvakumar, M. Balasubramanian, S. Sathiya, "Automatic Renal Defect Classification Using Inception", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.136-139, 2019.
Face Recognition System using Modular Principal Component Analysis
Research Paper | Journal Paper
Vol.07 , Issue.05 , pp.140-145, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.140145
Abstract
This paper aims to present face recognition based on Principal Component Analysis (PCA) and Modular Principal Component Analysis (MPCA) approach. The PCA based face recognition method is not very effective under the conditions of varying poses and expressions rather than the proposed MPCA method. In the MPCA method the original face image was partitioned into tiny sub-images and then PCA technique is applied for each sub-image. Since a few of the normal facial features of an individual do not differ even when the pose and expression may differ, the proposed method manages these variations and takes only a few numbers of principal components for matching the faces for similarity. The proposed method improves the recognition rates with less number of principal components when compared with the conventional PCA method. This present system is tested with two standard face databases and results are presented.
Key-Words / Index Term
Eigen faces; Euclidean Distance; Face Recognition; MPCA; Principal Component Analysis
References
[1] Muge Carikci, Figen Ozen, “A face recognition method based on eigenface method”, Prcedia Techonology 1 (2012) 118-123.
[2] H. Wang, S. Chen, Z. Hu, B. Luo , “Probabilistic two-dimensional principal component analysis and its mixture model for face recognition”, Neural Comput & Applic (2008) 17: 541-547
[3] M. Turk, A. Pentland, “Eigenfaces for recognition”, J. Cognitive Neurosci. 3 (1) (1991) 71-85
[4] M. Turk, A. Pentland, “Face recognition using eigenfaces”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition 1991, pp. 586-591
[5] P.N Belhumeur, J. P. Hespanha, and D. J. Kriegman, “ Eigenfaces vs Fisherfaces:Recognition using class specific linear projection”, IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 711-720, Jul. 1997.
[6] R.O.Duda, P. E. Hart, and D. G. Stork,” Pattern classification”, 2nd ed.. USA: John Wiley & Sons, 2001.
[7] L. Sirovich , M. Kirby, “Low-Dimensional Procedure for Characterization of Human Faces,” J. Optical Soc. Am., vol. 4, pp. 519-524, 1987.
[8] M. Kirby, L. Sirovich, “Application of the KL Procedure for the Characterization of Human Faces”, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 12, no. 1, pp. 103-108, Jan. 1990.
[9] S.Chen, Y.Zhu, “Subpattern-based principal component analysis”, Pattern Recognition 37 (2004) 1081-1083.
[10] K. Tan, S.Chen, “Adaptively weighted sub-pattern PCA for face recognition”, Neurocomputing 64 (2005) 505-511.
[11] Hussein Rady, “Face recognition using Principle Component Analysis with different distance classifiers”, International Journal of Computer Science and Network Security, Volume 11, No.10, October 2011.
[12] Minkook Cho, Hyeyoung Park,” A feature analysis for dimension reduction based on a data generation model with class factors and environment factors”, Computer Vision and Image Understanding, 113 (2009) 1005-1016.
[13] R. Gottumukkal, V. K. Asari,” An improved face recognition technique based on modular PCA approach”, Pattern Recognition Lett. 25 (4) (2004) 429-436.
[14] Rajesh Kumar Gupta, Umesh Kumar Sahu,” Real time face recognition under different conditions”, International Journal of Advance Research in Computer Science and Software Engineeirng, Volume 3,Issue 1, January 2013.
[15] Jie Wang, K. N. Plataniotis, A. N. “Venetsanopoluos, Select discriminant for face recognition”, Pattern Recognition Letters 26 (2005) 1470-1482.
[16] Xiaoyang Tan, Bill Triggs, “Enhanced Local Texture Feature Sets for Face Recognition Under Difficult Lighting Conditions”, IEEE Transactions on Image Processing, Vol. 19, No .6, June 2010.
[17] Javier Ruiz-del-Solar, Pablo Navarrete, “Eigenspace – Based Face Recognition: A Comparative Study of Different Approches”, IEEE Transcations On Systems, Man, And Cybernetics – PART C: Applications and Reviews, Vol., 35, No. 3, August 2005.
[18]http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html
[19]http://see.xidian.edu.cn/vipsl/database_Face.html#UMIST
Citation
S.P. Sundarsingh, C.D. Daniel Dharamaraj, "Face Recognition System using Modular Principal Component Analysis", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.140-145, 2019.
Information Extraction from Unstructured Documents
Research Paper | Journal Paper
Vol.07 , Issue.05 , pp.146-151, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.146151
Abstract
In todays scenario the organization of textual information has become a necessity due to the availability of various digital information. The purpose of Text Mining is to process unstructured (textual) information, extract meaningful numeric indices from the text, and, thus, makes the information contained in the text accessible to the various data mining (statistical and machine learning) algorithm. Information Extraction is the technique of automatically extracting information from unstructured and/or semi-structured machine-readable documents. An Information Extraction system target a specific topic or domain based on the user’s interest and searches for information that has more reliance to the domain. Information Extraction tools make it possible to pull information from text document, database, websites or multiple sources. Information Extraction depends on named entity recognition, a sub-tool used to find targets information to extract. This paper presents the review of various Information Extraction techniques such as Supervised, Unsupervised and Semi-supervised Information Extraction and its application.
Key-Words / Index Term
Text Mining, Information Extraction, Machine Learning, Supervised, Unsupervised, Semi-supervised
References
[1] K. Thilagavathi, V. Shanmuga Priya, “A SURVEY ON TEXT MINING TECHNIQUES”, International Journal of Research in Computer Applications and Robotics, ISSN 2320-7345.
[2] Vishal Gupta, Gurpreet S. Lehal, “A SURVEY OF TEXT MINING TECHNIQUES AND APPLICATION”, Journal of Emerging technologies in web intelligence, Vol.1, No. 1 August 2009.
[3] R. Sagayam, S. Srinivasan, S. Roshni, “A Survey of Text Mining: Retrieval, Extraction and Techniques, “International Journal of Computational Engineering Research (ijceronline.com) Vol.2 Issue.5, ISSN 2250-3005(online), September|2012.
[4] R. Janani, Dr. S. Vijayarani, “TEXT MINING RESEARCH: A SURVEY”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 4, April 2016.
[5] Gabriel Stanovsky, Julian Michael, Luke Zettlemoyer, and Ido Dagan, “Supervised Open Information Extraction”.
[6] Doug Downeva, Oren Etzionib, Stephen Soderlandb, “Analysis of a Probabilistic Model of Redudancy in Unsupervised Information Extraction”
[7] O. Etzioni, M. Cafarella, D. Downey, S. Kok, A. Popescu, T. Shaked, S. Soderland, D. Weld, and A. Yates. “Unsupervised named-entity extraction from the web: An experimental study. Artificial Intelligence, 165(1):91-134, 2005.
[8] O. Etzioni, M. Cafarella, D. Downey, A. Popescu, T. Shaked, S. Soderland, D. Weld, and A. Yates. “Methods for domain-independent information extraction from the web: An experimental comparison.”, In Procs. Of the 19th National Conference on Artificial Intelligence (AAAI-04), pages 391- 398, San Jose, California, 2004.
[9] D. Freitag and A. McCallum, “Information Extraction with HMMs and shrinkage”, In proceedings of the AAAI-99 workshop on machine learning for information Extraction, Orlando, Florida, 1999.
[10] M. Banko, M. Cafarello, S. Soderland, M. Breadhead and O. Etzioni, “Open information extraction from the web, In procs, of IJCAI, 2007.
[11] M. Banko and O. Etzioni, “the tradeofits between traditional and open relation extraction”, In proceedings of ACL, 2008.
[12] Xiao Li, Ye-Yi Wang, Alex Acero, “Extracting Structure Information from User Queries with Semi-Supervised Conditional Random Fields”.
[13] C. Barr, R. Jones, and M. Regelson, “The linguistic structure of English web-search queries”, In proceedings of the 2008 conference on Empirical marhods in Natural Language Processing, page 1021-1030, 2008.
[14] P. Viola and M. Narasimhand, “Learning to extract information from semi-supervised text, using a discriminative context free grammer, In SIGIR’05: proceedings of the 28th annual International ACM SIGIR conference on Research and development in information retrieval, page 330-337, 2005.
[15] J. Zhu, B. Zhang, Z. Nie, J-R, wen, and H.W. Hon, ”Webpage understanding: an intergrated approach”, In proceeding of the 13th ACM SIGKDD international conference on knowledge Discovery and Data Mining, pages 903-912, 2007.
[16] T.-L. Wong, W. Lam, and T.-S. wong, “An unsupervised framework for extracting and normalizing product attributes from multiple websites”, In proceedings of the 31st annual International ACM SIGIR conference on Research and development in Information Retrieval, pages 35-42, 2008.
[17] Jinxiu Chen, Donghong Ji, Chew Lim Tan, Zhengyu Niu, “Relation Extraction Using Label Propagation Based Semi-Supervised Learning”.
[18] Jie Tang, Mingcal Hong, Duo Zhang, Bangyong Liang, and Juanzi Li, “Information Extraction: Methodologies and Applications”.
[19] Andrew Kehler, Jerry R. Hobbs, Douglas Applet, John Bear, Matthew Caywood, David Israel, Megumi Kameyama, David Martin, and Claire Monteleoni, “Information Extraction Research and applications: current progress and future directions”.
Citation
R.Jayanthi, D.Nirmala, "Information Extraction from Unstructured Documents", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.146-151, 2019.
Heavy-Vehicle Detection Using SVM and HOG Features
Research Paper | Journal Paper
Vol.07 , Issue.05 , pp.152-155, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si5.152155
Abstract
Traffic monitoring is important in every country to cope up with the increasing population. Tracking and vehicle monitoring is always a challenging task as they are used for surveillance control and traffic planning. In earlier method, the detection of vehicles is classified using Artificial Neural Network with Histograms of Oriented Gradients. The major challenge due to advent of computer is to choose appropriate algorithms for real time dataset. Therefore, the entire work in this study is carried out by using Python with OpenCV method. A vehicle detection and classification algorithm that works in real time is proposed in this work. Further, the heavy vehicles detection is classified using the Support Vector Machine with a new set of features, Histograms of Oriented Gradients. The results show that the proposed method with Support Vector Machine training parameters is better than earlier method.
Key-Words / Index Term
Vehicle detection, Classification, Python, OpenCV, Support Vector Machine, Histograms of Oriented Gradients, Traffic Surveillance
References
[1] N. Buch, S. A. Velastin, and J. Orwell, “A review of computer vision techniques for the analysis of urban traffic,” IEEE Trans. on IntelligentTransportation Systems, vol. 12, no. 3, pp. 920–939, 2011.
[2] G. Wang, D. Xiao, and J. Gu, “Review on vehicle detection based on video for traffic surveillance,” IEEE Int. Conf. on Automation and Logistics, pp. 2961–2966, 2008.
[3A.I. Awad and M. Hassaballah (eds.), Image Feature Detectors and Descriptors,Studies in Computational Intelligence.Springer 2016.
[4] K. B. Saran and G. Sreelekha, Traffic video surveillance: Vehicle detection and Classification. In International Conference on Control Communication & computing India (ICCC) IEEE, pp.516-521, November 2015
[5] B. Morris and M. Trivedi, “Robust classification and tracking of vehicles in traffic video streams,” Intelligent Transportation Systems Conference,ITSC’06, p. 10781083, 2006.
[6] ] N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,” IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, vol. 1, pp. 886–893, June 2005.
[7] Michael Beyeler Machine Learning for OpenCV, OpenCV library function. Retrived October 12, 2011
[8] David Beazley and Brian K. Jones, Python cookbook, 3rd edition,2013
[9] R. Wang, L. Zhang, K. Xiao, R. Sun, and L. Cui, “Easisee: Real-time vehicle classification and counting via low-cost collaborative sensing,” IEEE Trans. on Intelligent Transportation Systems, vol. 15, pp. 414–424, February 2014.
[10] Berkant Başa Implementation of hog edge detection algorithm onfpga’s, Procedia - Social and Behavioral Sciences 174 ( 2015 ) 1567 – 1575.
[11] H. Bay, T. Tuytelaars, and L. Van Gool, “Surf: Speeded up robust features,” Computer vision-ECCV 2006, pp. 404–417, 2006.
[12] G. Wang, D. Xiao, and J. Gu, “Review on vehicle detection based on video for traffic surveillance,” IEEE Int. Conf. on Automation and Logistics, vol. 2961, pp. 1–3, September 2008.
[13] M. F. Zezhi Chen, Nick Pears and J. Austin, “A gaussian mixture model and support vector machine approach to vehicle type and colour classification,” IET Intelligent Transport Systems, February 2012.
[14] B. Morris and M. Trivedi, “Improved vehicle classification in long traffic video by cooperating tracker and classifier modules,” IEEE Int. Conf. on Video and Signal Based Surveillance, vol. 9, p. 9, November 2006.
[15] M. Daigavane, and P. R. Bajaj, “Real Time Vehicle Detection and Counting Method for Unsupervised Traffic Video on Highways,” International Journal of Computer Science and Network Security, vol.10, no. 8, pp. 112-117, 2014.
[16] A. Ambardekar and M. Nicolescu, “Vehicle classification framework: a comparative study,” EURASIP Journal on Image and Video Processing,
January 2014.
[17] S Aslani, H Mahdavi-Nasab Optical flow based moving object detection and tracking for traffic surveillance” In the proceedings of World Academy of Science, Engineering and Technology International Journal of Electrical and Computer Engineering Vol:7, No:9, 2013
[18] Yong Tang, Congzhe Zhang, Renshu Gu, Peng Li, Bin Yang, “Vehicle detection and recognition for intelligent traffic surveillance system” In the proceedings of Multimedia tools and Applications, Springer, February 2017, Volume 76, Issue 4, pp 5817–5832 [19]Mahdi Moghimi, Mohammad; Nayeri, Maryam; Pourahmadi, Majid; Kazem Moghimi, Mohammad, Moving Vehicle Detection Using AdaBoost and Haar-Like Feature in Surveillance Videos International Journal of Imaging and Robotics, vol. 18, no. 1, pp. 94-106 (2018)
Citation
V.Sowmya, R.Radha, "Heavy-Vehicle Detection Using SVM and HOG Features", International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.152-155, 2019.