Fast and Efficient Coin Recognition using 5 Hidden Layers BPNN
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.122-127, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.122127
Abstract
Coins have been integral a part of our day to day life. Coins are used nearly every place like in grocery stores, banks, trains, buses etc. Thus it`s a basic would like that coins may be recognized, counted, sorted mechanically. For this, it is necessary that coins can be recognized automatically and check whether it’s real or fake In this paper we have developed an ANN Fast and Efficient coin recognition using 5 hidden layers Back-Propagation Neural Networks Algorithm for the recognition of Indian Coins of denomination `1, `2, `5 and `10 using Canny Edge Detection. We have taken images from both sides of the coin. So this system is capable of recognizing coins from both sides. Features are extracted from images using techniques of Labeling, Canny Edge Detection, and Image Processing etc. Then, the extracted features are passed as input to a trained Neural Network 84.3% recognition rate has been achieved during the experiments.
Key-Words / Index Term
Canny edge detection, BP neural network, coin recognition, Labeling, Image Processing
References
[1] S. Umar, A. Praveen, S. Gouse, N. Deepthi, "Imminent accession of Artificial Intelligence based Forensic Exploratory with Data Mining Analysis", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.92-95, 2017.
[2] Gonzalez, Woods, “Digital image processing”, Prentice Hall, 2002, ISBN 0201180758.
[3] Bennamoun J, Mamic G.J, “Object Recognition- Fundamentals and Case Studies”, Springer, 2002, ISBN 185233-398-7.
[4] Marco Reisert, Olaf Ronneberger, Hans Burkhardt, “An Efficient Gradient-based Registration Technique for Coin Recognition”, Muscle Pattern Recognition and Image processing group competition on CIS, 2006, doi: 10.1.1.87.4375
[5] Chen Cai Ming, Zhang, Shi-qing, Chen, Yue-fen “A Coin Recognition System with Rotation invariance”, Machine Vision and Human-machine Interface School of Physics and Electronic Engineering, 2010 IEEE, China, Page(s):755-757.
[6] Suchika Malik, Parveen Bajaj, Mukhwinder Kaur “Sample Coin Recognition System using Artificial Neural Network on Static Image Dataset” International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 1, Page(s): 46-49, Jan. 2014.
[7] Nikita Shelgikar, Prof. L.M.R.J. Lobo “Indian Coin Recognition with Rotation Invariance using Radial Blur Technique” International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 3, Issue 1, Page(s): 287-289, Jan. 2014.
[8] Gabriel V. Iana “Coin recognition system based on a neural network” In the Proceedings of the April 2014 IEEE International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2014 6th International Conference, Bucharest, Romania Page(s):13 – 18.
[9] K. Arora, S. Suri, D. Arora, V. Pandey “Gesture Recognition Using Artificial Neural Network”, International Journal of Computer Science and Engineering(IJCSE) Volume-2, Issue-4, Page no. 185-189, Apr-2014.
[10] S. Roomi and R.B. Jayanthi Raje “Coin detection and Recognition using Neural Networks”, In the Proceedings of the July 2015 IEEE International Conference on Circuit, Power and Computing Technologies, Nagercoil, India, Page(s):1 – 6, 2015
Citation
Saloni Shrivastava, Bhupesh Gour, "Fast and Efficient Coin Recognition using 5 Hidden Layers BPNN," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.122-127, 2017.
Contribution of ‘Addak’and ‘Bindi’ in Non word Error Pattern analysis of Punjabi Typed Text
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.128-130, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.128130
Abstract
Error pattern analysis of a language is helpful in language related technology, such as creation of Natural Language Interfaces Spell Checker and Corrector, Machine Translation, Optical Character Recognition, Spell Checker and Corrector etc. It includes analysis of various types of errors (insertion, deletion, transposition, substitution, run-on, split word error) Positional analysis, Word length effects, Phonetic errors, First position error analysis, Keyboard effects etc. This paper mainly focuses on the contribution of ‘Addak’ and ‘Bindi’ in Statistical Error analysis of Punjabi typed text. It also compares results of insertion and deletion error results of ‘Addak’ and ‘Bindi’and its overall contribution in total number of errors. It also presents a brief overview of difficulties in automatic text error correction in Punjabi Typed Text. This paper is based on the analysis done on 20000 misspelled words generated by typists.
Key-Words / Index Term
Addak, Gurumukhi, Non-word, Bindi
References
[1] P. Kundu and B.B. Chaudhuri (1999) "Error Pattern in Bangla Text". International Journal of Dravidian Linguistics. 28(2): pp 49-88.
[2]Pollock, J. J., and Zamora, A. 1983. Collection and Characterization of spelling errors in scientific and scholarly text. J. Amer. Soc. Inf. Sci. 34, 1, pp 51-58.
[3] K.W. Church and W.A. Gale (1991) "Probability scoring for spelling correction". Statistical Computing. 1(1): pp 93-103.
[4] K. Kukich (1992) "Techniques for automatically correcting words in text". ACM Computing Surveys. 24(4): pp 377-439.
[5] F.J. Damerau (1964) "A technique for computer detection and correction of spelling errors".Commun. ACM. 7(3): pp 171-176.
[6] Morris, Robert & Cherry, Lorinda L, `Computer detection of typographical errors`, IEEE Trans Professional Communication, vol. PC-18, no.1, pp54-64, March 1975.
[7] Yannakoudakis, E. J., and Fawthrop, D. 1983a. “An intelligent spelling corrector”. Inf. Process. Manage. 19, 12, 101-108.
[8] Yannakoudakis, E. J., and Fawthrop, D. 1983b. “The rules of spelling errors”. Inf. Process. Manage. 19, 2, 87 99.
[9] Wagner, Robert A. & Fischer, Michael J, `The string-to-string correction problem`, Journal of the A.C.M., vol.21, no.1, pp168-173, January 1974.
[10] R.E. Gorin (1971) "SPELL: A spelling checking and correction program", Online documentation for the DEC-10 computer.
[11] Meenu Bhagat,“Difficulties in automatic text error correction in Punjabi”, In Proceedings of “International Conference on Control Communication and Computer Technology” 6-7 th Aug 2011, New Delhi.
Citation
Meenu Bhagat, "Contribution of ‘Addak’and ‘Bindi’ in Non word Error Pattern analysis of Punjabi Typed Text," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.128-130, 2017.
A Survey on Various Issues Big Data in Cloud Computing
Survey Paper | Journal Paper
Vol.5 , Issue.9 , pp.131-134, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.131134
Abstract
Big data is a key concept that cannot be over looked in the IT world considering the prominent increase in data, and data related services, it is important to explore this field and look at ways to improve data service delivery especially in the cloud. (CC) on the other hand helps in tackling the issue of storage and data service. This research focus on the two key concept big data and (CC) and some of the issues and challenges that are inherent with the deployment of cloud services and big data. The shows study that security challenges are among the most prominent issue in the cloud and big data services. The plumbing issue and some other issues such as the issue of the cost to run cloud services in handling big data were observed. Also the issues of service level agreement which gives an organization the assurance of enjoying all services rendered by the organization running the cloud services. After considering some of the issues associated with big data and (CC), some solution was suggested towards improving the two key concepts which will go a long way in increasing the adoption rate of (CC) by organizations. It is important for organizations to consider the nature of how their data will grow in the future before deploying any cloud service in their business.
Key-Words / Index Term
Big Data, Cloud Computing, Data Mining
References
[1] Muhammad Yasir Shabir, Asif Iqbal, Zahid Mahmood, AtaUllah Ghafoor, “Analysis of Classical Encryption Techniques in CC”, ISSN:ll1007-0214ll09/10ll, pp102-113 Volume 21, Number 1, February 2016.
[2] Rajarshi Roy Chowdhury, “Security in CC”, International Journal of Computer Applications (0975 – 8887) Volume 96– No.15, June 2014.
[3] Jawahar Thakur and Nagesh Kumar, ‘DES, AES, Blowfish: Symmetric Key Cryptography Algorithm Simulation Based Performance Analysis’, International Journal of Emerging Technologies and Advanced Engineering (IJETAE). December (2011), ISSN: 2250-2459 Vol. 1, Issue 2.
[4] Neha Jain and Gurpreet Kaur, ‘Implementing DES Algorithm in Cloud for Data Security’, VSRD International Journal of CS & IT. (2012), Vol.2 Issue 4, pp. 316-321
[5] Er. Ashima Pansotra1 and Er. Simar Preet Singh, “Cloud Security Algorithms”,Vol.9, No.10 (2015), pp.353-360 /ISSN: 1738-9976 IJSIA Copyright ⓒ 2015 SERSC.
[6] Rashmi Nigoti, Manoj Jhuria and Dr. Shailendra Singh, ‘A survey of Cryptographic Algorithm for (CC)’, International Journal of Emerging Technologies in Computational and Applied Science.(2013) ISSN(Print): 2279-0047, (Online): 2279-0055.
[7] B.Persis Urbana Ivy, Purshotam Mandiwa and Mukesh Kumar, ‘A Modified RSA Cryptosystem Based on ‘n’ Prime Number’, International Journal of Engineering and Computer Science. Nov (2012) ISSN: 2319-7242 Volume 1 Issue 2.
[8] Shakeeba S. Khan, Prof.R.R. Tuteja, “Security in CC using Cryptographic Algorithms”, ISSN(Online): 2320-9801 ISSN (Print): 2320-9798/Vol. 3, Issue 1, January 2015.
[9] Mr.V.Biksham, Dr. D.Vasumathi, “Query based computations on encrypted data through homomorphic encryption in CC security”,978-1-4673-9939-5/16©2016 IEEE.
[10] Peidong Sha, Zhixiang Zhu, “the Modification Of Rsa Algorithm To Adapt Fully Homomorphic Encryption Algorithm In CC”, 978-1-5090-1256-5/16©2016 ieee.
[11] Viney Pal Bansal, Sandeep Singh, “A Hybrid Data Encryption Technique using RSA and Blowfish for CC on FPGAs”, 978-1-4673-8253-3/15©2015 IEEE
[12] Adil Bouti, J¨org Keller, “Towards Practical Homomorphic Encryption in CC”,978-1-4673-7741-6/15©2015 IEEE
[13] Atewologun Olumide, Abeer Alsadoon, P.W.c. Prasad, Linh Pham, “A Hybrid Encryption model for Secure CC”, 978-1-4673-9190-0/15©20 15 IEEE
[14] Lt. Col. Jatinder Paul Singh1, Dr. Mamta2 and Sunil Kumar, “ Authentication and Encryption in CC”, 978-1-4799-9855-5/15©2015 IEEE
[15] D. Agrawal, A. El Abbadi, S. Antony, and S. Das. Data Management Challenges in (CC) Infrastructures. In DNIS, pages1–10, 2010.
[16] P. Agrawal, A. Silberstein, B. F. Cooper, U. Srivastava, and R. Ramakrishnan. Asynchronous view maintenance for vls databases. In SIGMOD Conference, pages 179–192, 2009.
[17] S. Aulbach, D. Jacobs, A. Kemper, and M. Seibold. A comparison of flexible schemas for software as a service. In SIGMOD, pages 881–888, 2009.
Citation
Gaurav Jain, Kunal Gupta, Arpit Kushwah, Abhishek Agrawal, "A Survey on Various Issues Big Data in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.131-134, 2017.
An Experimental Investigation on Effect of GFRP Sheets on Deep Beams
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.135-140, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.135140
Abstract
Reinforced concrete deep beams are widely used as transfer girders in offshore structures and foundations, walls of bunkers and load bearing walls in buildings. The presence of web openings in such beams is frequently required to provide accessibility such as doors and windows or to accommodate essential services such as ventilating and air conditioning ducts. Enlargement of such openings due to architectural/mechanical requirements and/or a change in the building’s function would reduce the element’s shear capacity, thus rendering a severe safety hazard. Limited studies have been reported in the literature on the behavior and strength of RC deep beams with openings. When such enlargement is unavoidable adequate measures should be taken to strengthen the beam and counteract the strength reduction.The present experimental investigation deals with the study of deep beams containing openings and the validation of results with FEM model using ANSYS. A total of 5 deep beams with openings are casted without shear reinforcements and are tested under three-point loading. Test specimen has a cross section of 150x460 mm and a total length of 1200 mm. Two circular openings, one in each shear span, are placed symmetrically about the mid-point of the beam. The structural response of RC deep beams with openings was primarily dependent on the degree of the interruption of the natural load path. Externally bonded GFRP shear strengthening around the openings was found very effective in upgrading the shear strength of RC deep beams. The strength gain caused by the GFRP sheets was in the range of 68–125%. Finite element modeling of RC deep beams containing openings strengthened with GFRP sheets is studied using ANSYS and the results are compared with experimental findings.
Key-Words / Index Term
Beam, GFRP, Laps and joints, FRP
References
[1] Aiello MA, Valente L, and Rizzo A, “Moment redistribution in continuous reinforced concrete beams strengthened with carbon fiber-reinforced polymer laminates”, Mechanics of Composite Materials, vol. 43, pp. 453-466, 2007.
[2] Aiello MA, and Ombres L, “Cracking and deformability analysis of reinforced concrete beams strengthened with externally bonded carbon fibre reinforced polymer sheet”, ASCE Journal of Materials in Civil Engineering, vol. 16, No. 5, pp.292-399,2004.
[3] Arduini M, and Nanni A, “Behaviour of pre-cracked R. C. beams strengthened with carbon FRP sheets”, ASCE Journal of Composites for Construction, vol. 1, No. 2, pp. 63-70, 1997.
Citation
Mohammed Ameeruddin Arafat, S Sunil Pratap Reddy, Syed Riyaz, "An Experimental Investigation on Effect of GFRP Sheets on Deep Beams," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.135-140, 2017.
Extraction of Tamil Characters from a Handwritten Document using Connected Component Labeling
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.141-146, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.141146
Abstract
Writer identification is a challenging task for the reason that it requires textural features and structural features. Textural features like grey-level co-occurrence matrices, Gabor filters can be extracted from entire page or a block of text. The structural features like slant and skew, character height, stroke width, frequency of loops or blobs etc. also characterize the handwriting style. Before extracting character level features it is a prerequisite to segment the document image into characters. This paper proposes a connected component oriented approach to segment an image of handwritten Tamil document into individual characters. The features extracted from these characters then can be used for writer identification.
Key-Words / Index Term
Writer Identification, Handwritten documents, Segmentation, Connected Component, Tamil Script
References
[1] Srihari, Sargur N., Sung-Hyuk Cha, Hina Arora, and Sangjik Lee. "Individuality of handwriting." Journal of Forensic Science, Vol.47, No. 4,pp.1-17,2002.
[2] Hertel, Caroline, and Horst Bunke. "A set of novel features for writer identification." International Conference on Audio-and Video-Based Biometric Person Authentication. Springer, Berlin, pp. 679-687, 2003.
[3] Bulacu, Marius, and Lambert Schomaker. "Combining multiple features for text-independent writer identification and verification." In Proc. of Tenth International Workshop on Frontiers in Handwriting Recognition, La Baule, pp. 281–286, 2006.
[4] H. Fujisawa, Y.Nakano and K.Kurino, “Segmentation methods for character recognition from segmentation to document structure analysis”, Proceedings of the IEEE, Vol.80, No.7, pp. 1079-1092, 1992.
[5] Richard G. Casey and Eric Lecolinet, “A Survey of Methods and Strategies in Character Segmentation”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.18, No. 7, pp. 690-706, 1996.
[6] Bansal V, Sinha R M K., “Segmentation of Touching and Fused Devanagari Characters.” Pattern Recognition.,Vol.35, No.4, pp. 875-893,2002.
[7] Munish Kumar, M. K. Jindal, and R. K. Sharma. "Segmentation of isolated and touching characters in offline handwritten Gurmukhi script recognition." International Journal of Information Technology and Computer Science (IJITCS),Vol.6,No.2,p.58, 2014.
[8] Saba, Tanzila, Ghazali Sulong, and Amjad Rehman. "A survey on methods and strategies on touched characters segmentation." International Journal of Research and Reviews in Computer Science,Vol. 1,No.2, pp. 103-114, 2010.
[9] Ye Xiangyun, Mohamed Cheriet, and Ching Y. Suen. "Stroke-model-based character extraction from gray-level document images." IEEE Transactions on Image Processing, Vol.10,No.8, pp.1152-1161,2001.
[10] Sridevi, N., and P. Subashini, "Segmentation of Text Lines and Characters in Ancient Tamil Script Documents using Computational Intelligence Techniques." International Journal of Computer Applications,Vol. 52, No.14,pp.7-12, 2012.
[11] Vassilis Papavassiliou, Themos Stafylakis, Vassilis Katsouros, and George Carayannis, “Handwritten document image segmentation into text lines and words”. Pattern Recognition, vol. 43, pp. 369 – 377, 2010.
[12] Dharmapryia C. Bandara,Vasile Palade, and Ruskan Batuwita, “A Customizable Fuzzy System for Offline Handwritten Character Recognition,” International Journal on Artificial Intelligence Tools, vol. 20, no. 3, pp. 425–455, 2011.
[13]Mamatha, H. R., and K. Srikantamurthy. "Morphological Operations and Projection Profiles based Segmentation of Handwritten Kannada Document." International Journal of Applied Information Systems (IJAIS), Vol. 4, No.5, pp.13-19,2012.
[14] Siddhartha Banerjee,Bibek Ranjan Ghosh,Arka Kundu ,"Handwritten Character Recognition from Bank Cheque",International Journal of Computer Sciences and Engineering ,Vol.4,No.1, pp.99-104,2016.
[15] He, L., Ren, X., Gao, Q., Zhao, X., Yao, B. and Chao, Y. "The connected-component labeling problem: A review of state-of-the-art algorithms". Pattern Recognition,Vol. 70,pp. 25-43, 2017.
[16] N. Otsu, “A threshold selection method from grey level histogram”. IEEE transactions on Systems, Man, and Cybernetics, Vol. 9, pp. 62-66, 1979.
[17] Rafael C.Gonzalez , Richard E.Woods, “Digital Image Processing”,Third Edition, Dorling Kindersley India Pvt. Ltd., India, pp. 645-647,2009.
[18] Gurpreet Kaur and Jaskaranjit Kaur, "A Comparative Study of Image Demosaicing", International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.98-102, 2015.
[19] D.Rajalakshmi,S.K.Jayanthi,"Collection of Offline Tamil Handwriting Samples and Database Creation", International Journal of Advanced Research in Computer and Communication Engineering,Vol. 5, Issue 8, pp. 196-199, 2016.
Citation
D. Rajalakshmi, S.K. Jayanthi, "Extraction of Tamil Characters from a Handwritten Document using Connected Component Labeling," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.141-146, 2017.
E – Governance and Rural Development of India
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.147-148, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.147148
Abstract
In spite of poverty, poor infrastructure India is moving smoothly and feasibly towards digital India. But due to unawareness and some other known and unknown reasons the policy-makers in India tend to justify the adoption and expansion of e-governance in India. Obviously and truly e-governance is the key factor for the Good Governance in developed and developing countries like India.
Key-Words / Index Term
Vikaspedia, Standardization, Unawareness, e-Governance
References
[1] Vandana Gupta and Ajay Sharma, “E-Governance in India-Problems”, Challenges and Prospects.
[2] Dr. Sanjay Kumar, Dr. Ajay Kumar Bharti, “E-Governance in India-Problems and Acceptability”.
[3] E-Governance Issues and Challenges. [www.egovernance2011.wordpress.com/2011/02/15/64/]
[4] Government of India [www.vikaspedia.com]
[5] Dr. J. S. Chouhan, “Prospects of E-Governance”.
[6] Prof. T. P. Rama Rao,” ICT and E-Governance”.
[7] Major E-Governance projects. [www.ogovindia.org/egovportals.html].
[8] Dr. Pradeep Mittal and Amandeep Kaur, “E - Governnace - A Challenge for India”, International Journal of Advanced Research in Computer Engineering & Technology, Volume 2, Issue, 3, March 2013.
Citation
Shafiqul Abidin, "E – Governance and Rural Development of India," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.147-148, 2017.
Experimental Behavior of Steel Slag in Concrete
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.149-155, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.149155
Abstract
Global warming and environmental destruction has come forward as a major issue in the recent years. Started alarming in engineers mind, especially in civil engineers mind. Looking forward for finding out the solution of these issues and also the use of more and more environmental- friendly materials in every Industry particularly construction industry is a paramount importance. Civil engineers start thinking about concrete, which is more dominant product to be used by civil engineers to make it environmental friendly. One of its part is natural aggregates which are becoming increasingly scarce, their production and shipment is becoming difficult for us. Concrete mixture contains supplementary cementitious material and admixtures which forms part of the cementitious component. These materials are majority byproducts from other processes, out of all these materials one of the useful byproduct material is Steel slag. Steel slag is previously used as aggregate in hot mix asphalt surface applications, but needs to update for additional work to determine the feasibility of utilizing this industrial by-product more wisely as a replacement for both fine and coarse aggregates in a conventional concrete mixture. The primary aim of study was to evaluate the Fresh, Hardened, Expansive and Durability properties of concrete made with steel slag aggregates. This study presents result of experimental investigations carried out to evaluate effects of replacing aggregate (coarse and fine) with that of slag on various concrete properties. In the present study M35 grade of concrete each having two types of concrete mixes C: S: A, C: S: SS, C: SS: SS (SS is steel slag), and the properties were determined adopting conventional testing procedure. From these results of the study we can say that as the percentage of steel slag as replacement is increased (0% to 55%) the strength of concrete increases. After 55% replacement of Coarse aggregate as steel slag slight decrease in strength is observe, but still it is higher than 0% replacement without any adverse effect on the strength of concrete.
Key-Words / Index Term
Steel Slag, Cement Properties, Sand, Length of concrete
References
[1]. Abdulaziz I. Al-Negheismish, Faisal H. Al-Sugair and Rajeh Z. Al-Zaid (June 1996).Utilization of Local Steelmaking Slag in concrete, 1996.
[2]. Caijun Shi," Steel Slag-Its Production, Processing, Characteristics and Cementitous Properties"-Journal of Materials in Civil Engineering ASCE 2004.
[3]. Donald W Lewis, (1982) "Properties and Uses of Iron and Steel Slag"-NSA Presented a Symposium 1982.
[4]. E.Anastasiou and I. Papayianni, (2006 Springer)" Criteria for the Use of Steel Slag Aggregates in Concrete" Measuring, Monitoring and Modeling Concrete Properties, 2006.
[5]. Ibrahim M. Asi, HishamY.Qasrawi, and Faisal L.Shalabi.(2007) . Use of steel slag aggregates in asphalt concrete mixes, 2007.
Citation
Medi Ram Charan, S Sunil Pratap Reddy, Syed Viqar Malik, "Experimental Behavior of Steel Slag in Concrete," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.149-155, 2017.
An Experimental Investigation on Effect of High Temperatures on Steel
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.156-163, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.156163
Abstract
The behaviour of RC beam and column members at elevated temperatures are being studied experimentally andanalytically widely. However, hardly any attention is given towards analyzing the behaviour of structures with SFRC, e.g. SFRC beams, columns, portal frame etc. exposed to fire. Herein, is a paper research to study the impact of fire on steel reinforcement in reinforce concrete structures at elevated temperature that analyzed by means of a three dimensional (3D) nonlinear transient thermo-mechanical finite element (FE) analysis and validated with commercially software ANSYS and SAFIR.
Key-Words / Index Term
High Temperature on Steel, Mechanical Loads, Safir, GFRP
References
[1]. Ali, F., Najdai, A., and Choi, S. (2010). “Numerical and Experimental Investigation of the Behavior of High Strength Concrete Columns in Fire.” EngineeringStructures, 32(5), 1236-1243.
[2]. Altun, F., Haktanir, T., and Ari, K. (2007). “Effects of Steel Fiber Addition on Mechanical Properties of Concrete and RC Beams.” Construction and BuildingMaterials, 21(3), 654-661.
[3]. Arioz, O. (2007). “Effects of Elevated Temperatures on Properties of Concrete.” Fire Safety Journal, 42(8), 516-522.
[4]. Balaguru, N., and Shah, S. P. (1992). “Fiber Reinforced Cement Composites.” McGraw-Hill, New York
[5]. Behbahani, H. P., Nematollahi, B., Sam, A. R. M., and Lai, F. C. (2012). “Flexural Behavior of Steel-Fiber-Added-RC (SFARC) Beams With C30 and C50 Classes of Concrete.” International Journal of Sustainable Construction Engineering & Technology, 3(1), 54-64.
Citation
Bolishetti Chaitanya, S Sunil Pratap Reddy, Muchakurthi Karthik, "An Experimental Investigation on Effect of High Temperatures on Steel," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.156-163, 2017.
A Study on Data Security and Privacy Protection Issues in Cloud Computing
Survey Paper | Journal Paper
Vol.5 , Issue.9 , pp.164-170, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.164170
Abstract
Data security has a vital issue in cloud enlisting condition; it transforms into a noteworthy issue due to the data which is secured diversely completed the cloud. Data protection and security are the two essential parts of customer`s stress in cloud information innovation. Different techniques as for these points of view are grabbing thought over the cloud preparing conditions and are investigated in both endeavors and scholastics. Data protection and security protection are transforming into the most enormous points of view for the future update and headway of cloud figuring innovation in the field of business and government parts. Thusly, in this paper, the cloud figuring security techniques are reviewed and its troubles as for data protection are discussed. The rule purpose of this proposed work is to update the data protection and security for the trustworthy cloud condition. This close research examination of the ebb and flow cloud security approach as for the data protection and security techniques utilized as a part of the cloud enrolling. It will be significant to enhance the security of data stockpiling in a cloud space.
Key-Words / Index Term
Cloud Computing, Security Issues and challenges, Cloud Architecture, Data Privacy
References
[1]SwapnaLia Anil, Roshni Thanka, "A Survey on Security of Data outsourcing in Cloud", International Journal of Scientific and Research Publications, Vol. 3, Issue 2, 2013.
[2] Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma, "Data Security and Service Overloading in Cloud Computing –An overview", International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.177-180, 2017.
[3] Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, "Information Security and Privacy in Cloud Computing", International Journal of Distributed Sensor Networks Volume 2014, Article ID 190903, 9 pages, 2014
[4] Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, "Security Issues with Possible Solutions in Cloud Computing-A Survey",International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), Vol.2, Issue 2, 2013.
[5] B.Tejaswi, L.V.Reddy, M.Leelavathi, "A Survey on Secure Storage Services in Cloud Computing", Global Journal of Computer Science and Technology Cloud and Distributed Volume 12 Issue, 0975-4172, 2012.
[6] Yinqian Zhang,Ari Juels, Michael K. Reiter, "CrossVM side channels and their utilization to remove private keys", ACM meeting on Computer and interchanges security,PP. 305-316,2012.
[7] BhruguSevak, "Security against Side Channel Attack in Cloud Computing", International Journal of Engineering and Advanced Technology (IJEAT), Vol-2, Issue-2, 2012.
[8] Aye Thu, "Incorporated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment",International Journal of Computer Applications,Vol. 67– No.4, 2013.
[9] Vineet Chaturvedi, Ashok Verma and Neha Agarwal, "A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.16-20, 2013.
[10] Mitchell Cochran,Paul D. Witman, "Administration And Service Level Agreement Issues In A Cloud Computing Environment",Journal of Information Technology Management, Vol. XXII, Number 2, 2011.
[11] Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, "Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
[12] Bijayalaxmi Purohit,PawanPrakash Singh, "Information spillage examination on cloud computing",International Journal of Engineering Research and Applications,Vol. 3, Issue 3, 2013.
[13] V. Shobana, M. Shanmugasundaram, "Information Leakage Detection Using Cloud Computing",International Journal of Emerging Technology and Advanced Engineering, Vol.3, Special Issue 1, 2013.
[14] Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma, "Data Security and Service Overloading in Cloud Computing –An overview", International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.177-180, 2017.
[15] Tomoyoshi Takebayashi, Hiroshi Tsuda, TakayukiHasebe, RyusukeMasuoka, "Information Loss Prevention Technologies", FUJITSU Sci. Tech, vol.46, No.1, PP 47-55, 2010.
Citation
N. Chandramouli, B. Manjula , "A Study on Data Security and Privacy Protection Issues in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.164-170, 2017.
Improving Existing Punjabi Morphological Analyzer using N-gram
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.171-174, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.171174
Abstract
Morphological analysis is an essential tool for almost all Natural Language Processes like POS tagging, Grammar checking, Sentence simplification, generation of Treebank and parsing. In this research article, author has used N-gram statistical technique to improve the existing morphological analyzer. The main factor that reduces the accuracy of morphological analyzer is presence of unknown words. In this research article author has used n-gram approach for detecting the POS tag of unknown word. The results shows an average precision of 82.34, recall 70.20 and F-measure 75.74.
Key-Words / Index Term
Morphological analyzer, Morph, N-gram approach
References
[1]. Bharati, Akshar, Amba P. Kulkarni, Vineet Chaitanya. (1998a).Challenges in Developing Word Analyzers for Indian Languages, Presented at Workshop on Morphology, CIEFL, Hyderabad, July 1998.
[2]. Bharati, Akshar, Rajeev Sangal and S.M. Bendre (1998b). Some Observations on Corpora of Some Indian Languages. Knowledge Based Computing Systems, Tata McGraw-Hill.
[3]. Goldsmith, John. (2001). Unsupervised Learning of the Morphology of a Natural Language. Computational Linguistics, Vol 27, No. 2, pp 153-198.
[4]. Daniel Jurafsky, James H. Martin. Speech and Language Processing:An introduction to speech recognition, Natural Language Processing, and Computational Linguistics. LTRC, IIIT Hyderabad http://ltrc.iiit.ac.in
[5]. Gill Mandeep Singh, Lehal Gurpreet Singh, Joshi S.S., A full form lexicon based Morphological Analysis and generation tool for Punjabi, International Journal of Cybernatics and Informatics, Hyderabad, India,October 2007, pp. 38-47
[6]. Brants, TnT – A statistical part-of-speech tagger. In Proc. Of the 6th Applied NLP Conference, pp. 224-231, 2000
[7]. Cutting, J. Kupiec, J. Pederson and P. Sibun, A practical part of-speech tagger. In Proc. of the 3rd Conference on Applied NLP, pp. 133-140, 1992
[8]. Dermatas and K. George, Automatic stochastic tagging of natural language texts. Computational Linguistics, 21(2): 137-163, 1995
[9]. Ekbal, Asif, and S. Bandyopadhyay,”Lexicon Development and POS tagging using a Tagged Bengali News Corpus”, In Proc. of FLAIRS-2007, Florida, 261-263, 2007
[10]. E. Dermatas and K. George, Automatic stochastic tagging of Natural language texts, Computational Linguistics, 21(2): 137-163, 1995
[11]. Ekbal Asif, et.al, “Bengali Part of Speech Tagging using Conditional Random Field” in Proceedings of the 7th International Symposium of Natural Language Processing (SNLP-2007), Pattaya, Thailand, 15 December 2007, pp.131-136
Citation
S. K. Sharma, "Improving Existing Punjabi Morphological Analyzer using N-gram," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.171-174, 2017.