A Framework for Reducing the Cost of the Firewall
Research Paper | Journal Paper
Vol.11 , Issue.4 , pp.1-6, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.16
Abstract
Today, the world has become like a small village, and the success of any institution has become closely related to communication with the outside world through the Internet. As each institution needs to exchange information from one place to another that exposes sensitive information to danger and spread. Such institutions require the existence of mechanisms to protect this information. The firewall plays an important role in protecting information from unauthorized access. However, the available firewalls are not suitable for all institutions due to their high cost. This paper proposes a micro-firewall for reducing the cost of firewall by avoiding the additional services while maintaining the security, and thus the proposed micro-firewall will suitable the small and medium institutions. The proposed micro-firewall uses two computers, one of them is connected with the internet and the other is connected with the local network, the communication between the two computers is done by using the server and client protocols. The role of the computer connected with the internet is to receive the request from the external user who want access the internal network and verify the identity of the user if he/she is an authorized user or not. If yes it sends the request to the computer connected with the internal network, unless the request is rejected. The role of internal computer is similar to external computer but for internal user. The proposed micro-firewall was compared with other firewalls in terms of the cost reduction. The results showed that the cost of proposed micro-firewall has reduced compared with the cost of the other firewalls.
Key-Words / Index Term
firewall, client, server, agent, proxy, packet filtering, user filtering, network security.
References
[1] N. Sultana, "A Framework of Wireless Network Security Threats: Solution for Various Information Security Problems," 2019.
[2] K. C. Patel and P. Sharma, "A Review paper on pfsense-an Open source firewall introducing with different capabilities & customization," IJARIIE, vol. 3, pp. 2395-4396, 2017.
[3] N. Rawindaran, A. Jayal, E. Prakash, and C. Hewage, "Cost benefits of using machine learning features in NIDS for cyber security in UK small medium enterprises (SME)," Future Internet, vol. 13, p. 186, 2021.
[4] C. Akturk and C. Cubukcu, "A Decision Making Model Proposal for Firewall Selection," KSII Transactions on Internet and Information Systems (TIIS), vol. 15, pp. 3588-3607, 2021.
[5] T. Jain and N. Jain, "Framework for Web application vulnerability discovery and mitigation by customizing rules through ModSecurity," in 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), 2019, pp. 643-648.
[6] M. Mihalos, S. Nalmpantis, and K. Ovaliadis, "Design and Implementation of Firewall Security Policies using Linux Iptables," Journal of Engineering Science & Technology Review, vol. 12, 2019.
[7] R. Datta, S. Choi, A. Chowdhary, and Y. Park, "P4guard: Designing p4 based firewall," in MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), pp. 1-6, 2018.
[8] A. Sujarwo and J. Tan, "Enterprise firewall virtualization design," in MATEC Web of Conferences, p. 03004, 2018.
[9] J. Surana, K. Singh, N. Bairagi, N. Mehto, and N. Jaiswal, "Survey on next generation firewall," International Journal of Engineering Research and Development, vol. 5, pp. 984-988, 2017.
[10] D. Sampaio and J. Bernardino, "Evaluation of Firewall Open Source Software," in WEBIST, pp. 356-362, 2017.
[11] J. Jeong, J. Seo, G. Cho, H. Kim, and J.-S. Park, "A framework for security services based on software-defined networking," in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp. 150-153, 2015.
[12] M. Liu, W. Dou, S. Yu, and Z. Zhang, "A decentralized cloud firewall framework with resources provisioning cost optimization," IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 621-631, 2014.
[13] M. Strebe and C. Perkins, Firewalls 24seven: Sybex, 2000.
[14] G. Bastien and C. Degu, CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide (CCSP Self-Study): Cisco Press, 2003.
[15] D. L. Shinder and M. Cross, Scene of the Cybercrime: Elsevier, 2008.
[16] J. R. Vacca, Network and system security: Elsevier, 2013.
[17] P. B. Ambhore and K. A. Wankhade, "Proxy Server FOR Intranet Security."
[18] C. L. Schuba, "On the modeling, design, and implementation of firewall technology," Purdue University, 1997.
[19] S. Pinzon, "Top 10 threats to SME data security," WatchGuard Technologies, 2008.
[20] A. Malmgren and S. Persson, "A comparative study of Palo Alto Networks and Juniper Networks next-generation firewalls for a small enterprise network," ed, 2016.
[21] K. Tam, M. H. H. Salvador, K. McAlpine, R. Basile, B. Matsugu, and J. More, UTM Security with Fortinet: Mastering FortiOS: Newnes, 2012.
[22] A. E.-M. A. El-Bawab, Untangle Network Security: Packt Publishing Ltd, 2014.
Citation
Mohammed Alwajeeh, Saleh Noman Alassali, Yasser Ali Alahmadi, "A Framework for Reducing the Cost of the Firewall," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.1-6, 2023.
Sign and Voice Translation using Machine Learning and Computer Vision
Research Paper | Journal Paper
Vol.11 , Issue.4 , pp.7-13, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.713
Abstract
Sign and voice translation is a critical tool for individuals who cannot hear or speak , or for those who speak different languages. Machine learning techniques have been increasingly used to find or improve the accuracy and efficiency of sign and voice translation systems. These systems make use of machine learning models to analyze and interpret sign language or speech and translate them into written or spoken language. Machine learning models can recognize patterns in sign language gestures or speech, and convert them into text or speech output. The model`s accuracy is dependent on the quality of its training data and the complexity of the model architecture. Recent improvisation in machine learning has increased the performance of sign and voice translation systems, enabling them to recognize more complex gestures and accents. Overall, the use of machine learning in sign and voice translation has the potential to improve the accessibility of information and communication for individuals who are deaf or hard of hearing, or for those who speak different languages. However, there is still much room for improvement, and ongoing research and development are needed to optimize the performance of these systems
Key-Words / Index Term
Computer Vision, Recognition of Sign Language, Hand Gesture Recognition, Features Extraction
References
[1]Baranwal N, Nandi GC.”An efficient gesture based humanoid learning using wavelet descriptor and MFCC techniques. Int J Mach Learn Cybern” 2017
[2] D. Bragg, O. Koller, M. Bellard, L. Berke, P. Boudreault, A. Braffort,N. Caselli, M. Huenerfauth, H. Kacorri, T. Verhoef et al., “Sign language recognition, generation, and translation: An interdisciplinary perspective,” arXiv preprint arXiv:1908.08597, 2019
[3] Desa, Hazry. “SIGN LANGUAGE INTO VOICE SIGNAL CONVERSION USING HEAD AND HAND GESTURES.” 2008
[4] F. Ronchetti, F. Quiroga, C. A. Estribou, L. C. Lanzarini, and A. Rosete,“Lsa64: an argentinian sign language dataset,” in XXII Congreso Argentino de Ciencias de la Computación (CACIC 2016)., 2016.
[5] G. T. Papadopoulos and P. Daras, “Human action recognition using 3d reconstruction data,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 8, pp. 1807–1823, 2016.
[6] H. Cooper, B. Holt, and R. Bowden, “Sign language recognition,” in Visual Analysis of Humans. Springer, 2011, pp. 539–562.
[7]Kshitij Bantupalli,Ying Xie,“American Sign Language Recognition using Deep Learning and Computer Vision”, IEEE International Conference on Big Data (Big Data),2018
[8] K.S, Tamilselvan & Balakumar, P & Rajalakshmi, B & Roshini, C & S., Suthagar. “ Translation of Sign Language for Deaf and Dumb People. International Journal of Recent Technology and Engineering. 8. 2277-3878. 10.35940/ijrte.E6555.018520”, 2020
[9]Kurdyumov R, Ho P, Ng J. “Sign language classification using webcam images”, pp 1–4, 2011.
[10]Lancaster, Glenn & Alkoby, Karen & Campen, Jeff & Carter, Roymieco & Davidson, Mary & Ethridge, Dan & Furst, Jacob & Hinkle, Damien & Kroll, Bret & Leyesa, Ryan & Loeding, Barbara & Mcdonald, John & Ougouag, Nedjla & Smallwood, Lori & Srinivasan, Prabhakar & Toro, Jorge & Wolfe, Rosalee. “Voice activated display of American Sign Language for airport security.”, 2003
[11] O. Koller, S. Zargaran, H. Ney, and R. Bowden, “Deep sign: Enabling robust statistical continuous sign language recognition via hybrid cnn hmms,” International Journal of Computer Vision, vol. 126, no. 12, pp. 1311–1325, 2018.
[12]P. Molchanov, X. Yang, S. Gupta, K. Kim, S. Tyree, and J. Kauz, “Online detection and classification of dynamic hand gestures with recurrent 3D convolutional neural network”, in Proc. IEEE Conf. Comput. Vis. Pattern Recog, 2016.
[13]Rekha J, Bhattacharya J, Majumder S. “Hand gesture recognition for sign language: a new hybrid approach. In: International Conference on ImageProcessing, Computer Vision, and Pattern Recognition” (IPCV), pp 80–86, 2011
[14]R. Sharma et al.” Recognition of Single Handed Sign Language Gestures using Contour Tracing descriptor. Proceedings of the World Congress on Engineering”Vol. II, WCE 2013, July 3 - 5, 2013, London, U.K.,
[15]R. Sharma, R. Khapra, N. Dahiya. June 2020. Sign Language Gesture Recognition, pp.14-19
[16]Sepp Hochreiter et al.,“Long Short-Term Memory,”, Neural Computation 9(8): 1735-1780,1997.
[17]S. Shahriar et al., "Real-Time American Sign Language Recognition Using Skin Segmentation and Image Category Classification with Convolutional Neural Network and Deep Learning," TENCON 2018 - 2018 IEEE Region 10 Conference, 2018, pp. 1168-1171, doi: 10.1109/TENCON.2018.8650524.
[18]Wang RY, Popovi? J. 2009. Real-time hand-tracking with a color glove. ACM Trans Graph 28(3):63
[19]Zhang, F., Bazarewsky, V., Vakunov, A., Tkachenka, A., Sung, G., Chang, C. L., & Grundmann, M. 2020. MediaPipe Hands: On-device Real-time Hand Tracking. arXiv preprint arXiv:2006.10214
[20]Z. Ren, J. Yuan, J. Meng, and Z. Zha,“Robust PartBased Hand Gesture Recognition Using Kinect Sensor”, ” IEEE Trans. Multimedia, vol. 15, no. 5, pp. 1110–1120,2013
Citation
Nandini, Avni Verma, Sandeep Kumar, "Sign and Voice Translation using Machine Learning and Computer Vision," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.7-13, 2023.
Hand Gesture Recognition for Human Computer Interaction through KNN Algorithm and Mediapipe
Research Paper | Journal Paper
Vol.11 , Issue.4 , pp.14-18, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.1418
Abstract
In our day to day life humans interact with computers or machines very frequently and these interactions result in completion of meaningful tasks or scheduled jobs. These interactions can involve a lot of applications like gaming, typing, scrolling, pointing, remote arm movement, etc. Out of all the ways of interacting such as mechanical movement like mouse, keyboard, joystick, etc., speech recognition, etc. The most effective one is thought to be through hand because the mechanical ones even include the movement of hand ultimately, so in order to make this interaction more convenient and efficient there was an idea of developing hand gesture recognition and it was later implemented but often it involved special instruments such as gloves with sensors or particular background. This proposed paper emphasizes the more effective way of human computer interaction which is hand gesture recognition. There are three main modules which are hand detection and hand tracking and hand gesture recognition. There are several applications of this way of interaction the user can customize to their own use. This model is fast and accurate and it can go up to 30fps and the main applications include the video game stimulation, virtual board and many other useful human computer interactions. The proposed model can detect hand even in strained backgrounds and without gloves in almost all of the cases and the model is robust and smooth. The hand gestures are one of the most natural ways of communication in humans rather than input through keyboards and mouse. This model can be used in VR and AR stimulations which would need a better way of human computer interaction than a keyboard and mouse. The main objective of this paper is to employ a new model to improve the human computer interaction. In the proposed model a menu will be displayed with the numbers representing the action desired by the user let us say 1. Represents the virtual mouse 2. Represents the virtual keyboard 3. Represents the other menu where a series of actions can be defined by the user. The proposed model uses the hand sign detection for the recognition of the numbers by the finger counting module and again using other hand sign detection module. The objective is to form a neural network to distinguish the hand signs in order recognize the hand sign to implement the desired action of the user. We have utilized Google`s Mediapipe Frame Work Arrangements has further developed hand recognition model and may understand 21 3D landmarks of Palm. Subsequently we`ll endeavor to know it and the method for utilizing this Library Python to understand our objective.
Key-Words / Index Term
Mediapipe, Sign language recognition [SLR], Human computer interaction, Gesture recognition
References
[1] Cristina Manresa, Javier Varona, Ramon Mas and Francisco J. Perales, “Hand Tracking and Gesture Recognition for Human-Computer Interaction” Electronic Letters on Computer Vision and Image Analysis 5(3):96-104, 2005
[2] Er. Aditi Kalsh, Dr. N.S. Garewal “Sign Language Recognition System`` International Journal of Computational Engineering Research 2013
[3] Hui-Shyong Yeo & Byung-Gook Lee & Hyotaek Lim, “Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware” Springer Science+Business Media New York 2013
[4] “survey on hand gesture techniques for sign language recognition.”IJTRS-V2-I7-005 Volume 2 Issue VII, August 2017
[5] Kai Li1,2,3, Jun Cheng2,3, Qieshi Zhang*,2,3, Jianming Liu1, “Hand Gesture Tracking and Recognition based Human-Computer Interaction System and Its Applications” Proceeding of the IEEE International Conference on Information and Automation Wuyi Mountain, China, August 2018
[6] Bhumika Gupta, Pushkar Shukla and Ankush Mittal “K-nearest correlated neighbour classification for Indian sign language gesture recognition using feature extraction”
[7] Mais Yasen and Shaidah Jusoh, “A systematic review on hand gesture recognition techniques, challenges and applications” PeerJ computer science
[8] M S Srividya, Anala M R, “Research trends in Hand Gesture Recognition techniques” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878 (Online), Volume-8 Issue-6, March 2020
[9] Munir Oudah , Ali Al-Naji , and Javaan Chahl, “Hand Gesture Recognition Based on Computer Vision: A Review of Techniques” Journal of Imaging July 2020
[10] Nguyen Dang Binh, Enokida Shuichi, Toshiaki Ejima, ” Real-Time Hand Tracking and Gesture Recognition System” GVIP 05 Conference, 19-21 December 2005, CICC, Cairo, Egypt.
[11] Alisha Pradhan andB.B.V.L. Deepak ,”Obtaining hand gesture parameters using Image Processing”,2015 International Conference on Smart Technology and Management(ICSTM).
[12] Prakash B Gaikwad, Dr. V.K.Bairagi,” Hand Gesture Recognition for Dumb People using Indian Sign Language”, International Journal of Advanced Research in computer Science and Software Engineering, pp:193-194, 2014.
[13] Tin Hninn Hninn Maung, ”Real-Time Hand Tracking and Gesture Recognition System Using Neural Networks” World Academy of Science, Engineering and Technology 26 2009.
[14] Umang Patel & Aarti G. Ambekar “Moment based sign language recognition for IndianLanguages “2017 Third International Conference on Computing, Communication, Control and Automation (ICCUBEA).
[15] Vikram Sharma M, “Virtual Talk for deaf, mute, blind and normal humans,” Texas instruments India Educator’s conference, 2013.
[16] Viraj Shinde, Tushar Bacchav, Jitendra Pawar, Mangesh Sanap, “Hand Gesture Recognition System Using Camera” International Journal of Engineering Research & Technology (IJERT) Vol. 3 Issue 1, January - 2014 IJERT ISSN: 2278-0181
[17] Yellapu Madhuri and Anburajan Mariamichael)”Vision based sign language translation device” conference paper: February 2013
Citation
Shaik Sai Rohit, Raunak Kandoi, Sandeep Kumar, "Hand Gesture Recognition for Human Computer Interaction through KNN Algorithm and Mediapipe," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.14-18, 2023.
Facial Emotion Recognition Based Prediction of Affective State Of Children with Autism Using Ml
Research Paper | Journal Paper
Vol.11 , Issue.4 , pp.19-25, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.1925
Abstract
Nonverbal communication is important in everyday interactions, and its contribution to communication can be as high as 93%. Video surveillance, expression analysis, paralinguistic communication, and detection all benefit from the application of facial emotion analysis. We provide a thorough description of FER (Facial Emotion Recognition), which is based on traditional machine learning (ML), in our suggested system. In-depth research is required to make learning problems detection simpler because it is still laborious and time-consuming. Dyscalculia is characterised by difficulties counting, comparing numbers, and adding mathematical operations. This learning disability is thought to affect between 3 and 6% of school-aged youngsters. One of the special learning disabilities (SLD) with a mathematical impairment is dyscalculia. As the results of these individual tests alone are insufficient for identification, a variety of tests must be administered and analysed manually in order to discover dyscalculia. When analysing complex medical data, artificial intelligence (AI) for healthcare uses Random Forest algorithms to simulate human cognition. The screening procedure for these particular learning problems makes use of machine learning techniques. Counting accuracy, time spent per question during the counting phase, number comparison accuracy, time spent per question during the number comparison phase, arithmetic addition accuracy, and time spent per question during the addition phase were the six inputs used to develop the model. The model, which categorises children as dyscalculic or not, was constructed using the Random Forest method.
Key-Words / Index Term
Facial emotion recognition (FER), Artificial intelligence, Random Forest, and dyscalculia.
References
[1]. T. Booth, A. L. Murray, K. McKenzie, R. Kuenssberg, M. O’Donnell, and H. Burnett, “An evaluation of the as a brief screening instrument for asd in adults”, 2020.
[2]. Sluban, B., Jursic, M., Cestnik, B., Lavrac, N. (2021). Exploring the power of outliers for cross-domain literature mining. In M. R. Berthold (Ed.), Bisociative knowledge discovery.
[3]. I. Petric, T. Urbancic, and B. Cestnik, “Discovering hidden knowledge from biomedical literature,” Informatica, 2022.
[4]. D. Liao and H. Lu, “Classify autism and control based on deep learning and community structure on resting-state fmri,” in 2018 Tenth Inter-national Conference on Advanced Computational Intelligence.
[5]. N. A. M. Yuzaidey, N. C. Din, M. Ahmad, N. Ibrahim, R. A. Razak, and D. Harun, ‘‘Interventions for children with dyslexia: A review on current intervention methods,’’ Med. J. Malaysia, Oct. 2019.
[6]. B. Sarah, C. Nicole, H. Ardag, M. Madelyn, S. K. Holland, and H. Tzipi, ‘‘An fMRI Study of a Dyslexia biomarker,’’ J. Young Investigators, 2019.
[7]. Association International Dyslexia, Baltimore, MD, USA. (2019). Dyslexia in the Classroom—What Every Teacher Needs to Know.
[8]. N. A. M. Yuzaidey, N. C. Din, M. Ahmad, N. Ibrahim, R. A. Razak, and D. Harun, ‘‘Interventions for children with dyslexia: A review on current intervention methods,’’ Med. J. Malaysia, 2020.
[9]. S. Kaisar, ‘‘Developmental dyslexia detection using machine learning techniques: A survey,’’ ICT Exp.
[10]. F. Ramus, I. Altarelli, K. Jednoróg, J. Zhao, and L. Scotto di Covella, ‘‘Neuroanatomy of developmental dyslexia: Pitfalls and promise,’’ Neurosci. Biobehav., Jan. 2018.
[11]. L. Danelli, M. Berlingeri, G. Bottini, F. Ferri, L. Vacchi, M. Sberna, and E. Paulesu, ‘‘Neural intersections of the phonological, visual magnocellular and motor/cerebellar systems in normal readers: Implications for imaging studies on dyslexia,’’ Hum. Brain Mapping, 2020.
[12]. U. Kuhl, N. E. Neef, I. Kraft, G. Schaadt, L. Dörr, J. Brauer, I. Czepezauer, B. Müller, A. Wilcke, H. Kirsten, F. Emmrich, J. Boltze, A. D. Friederici, and M. A. Skeide, ‘‘The emergence of dyslexia in the developing brain,’’ NeuroImage, vol. 211, May 2020, Art. no. 116633.
[13]. S. M. Irby and R. G. Floyd, ‘‘Test review: Wechsler abbreviated scale of intelligence, second edition,’’ Can. J. School Psychol., vol. 28, no. 3, pp. 295–299, Sep. 2013.
[14]. C. A. Dell, B. Harrold, and T. Dell, ‘‘Test Review: Wilkinson, G. S., & Robertson, G. J. (2006). wide range achievement Test-Fourth Edition. Lutz, FL:
Psychological Assessment Resources. WRAT4 Introductory Kit (includes manual, 25 test/response forms [blue and green], and accompanying test mat,’’ Rehabil. Couns. Bull.
[15]. B. J. Wending, F. A. Schrank, and A. J. Scmitt, ‘‘Educational interventions related to the Woodcock-Johnson III test of achievement,’’ in Woodcock Johnson III Assessment Service Bulletin Number, vol. 8, no. 8. Rolling Meadows IL, USA: Riverside Publishing, A Houghton Mifflin Company, 2019.
[16]. J.-J. Mitchell, ‘‘Comprehensive test of phonological processing,’’ Assessment Effective Intervent, vol. 26, no. 3, pp. 57–63, Apr. 2020.
[17]. R. M. Bruno and S. C. Walker, ‘‘Comprehensive test of phonological processing (CTOPP),’’ Diagnostique, vol. 24, nos. 1–4, pp. 69–82, Mar. 1999.
[18]. N. L. Bell, K. S. Lassiter, T. D. Matthews, and M. B. Hutchinson, ‘‘Comparison of the peabody picture vocabulary test—Third edition and Wechsler adult intelligence scale—Third edition with university students,’’ J. Clin. Psychol.,
[19]. B. Srivastava and M. T. U. Haider, ‘‘Personalized assessment model for alphabets learning with learning objects in e-learning environment for dyslexia,’’ J. King Saud Univ.-Computer.
[20]. A. Alsobhi, N. Khan, and H. Rahanu, ‘‘An empirical approach to validate the dyslexia adaptive E-learning (DAEL) framework,’’ in Proc. 10th Int. Conf. Comput. Sci. Educ. (ICCSE), Jul. 2015.
[21]. Aparna Shenoy, K.V. Viswanatha, Raju Ramakrishna Gondkar, "Early Sepsis Prediction in Intensive Care Patients using Random Forest Classifier", International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.17-22, 2020.
[22]. Rosy Mishra, Y. Sowjanya, Sushanta Meher, Mousumi Meher, "A Voice Signal Interpreter using Machine Learning Techniques," International Journal of Scientific Research in Network Security and Communication, Vol.8, Issue.2, pp.22-27, 2020.
Citation
Sujith Kumar R., Soundar Sriram J., Sridhar C., Fathima G., "Facial Emotion Recognition Based Prediction of Affective State Of Children with Autism Using Ml," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.19-25, 2023.
Simulation Based Exploration of Stock Market Using LSTM Model
Research Paper | Journal Paper
Vol.11 , Issue.4 , pp.26-29, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.2629
Abstract
In today’s world the stock market has a huge impact on the economy making it difficult for stock market investors to predict stock prices. Financial market investors cannot use simple models to more accurately predict stock prices to invest in stocks. Deep learning helps computer to solve complex problems which humans takes more time to solve. This paper is based on developing a model to predict inventory value using recurrent neural network (RNN) and long- short term memory model (LSTM).
Key-Words / Index Term
Stock Market, Predicting, LSTM Model, RNN Model, Prices, Complex Data, Density
References
[1]. A S Pradeep, Soren Goyal and M. Miller, “Detection of statistical arbitrage using machine learning techniques in Indian Stock market”, PhD Thesis, Computer Science Department, IIT Kanpur, 2019.
[2]. Dhiraj Mundada, Gaurav Chhaparwal, Sachin Chaudhari, Trupti Bhamare, “Stock Value Prediction System”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 3, Issue 4, pp. 2217 - 2219, 2015. https://doi.org/10.17762/ijritcc.v3i4.4214
[3]. Rakhi Mahant, Trilok Nath Pandey, Alok Kumar Jagadev and, Satchidananda Dehuri, “Optimized Radial Basis Functional Neural Network for Stock Index Prediction”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Vol. 7, Issue 11, pp. 1252 - 1257, 2016. Doi: 10.1109/ICEEOT.2016.7754884
[4]. S. Hochreiter and J. Schmid Huber, “Long Short- Term Memory”, Neural Computation, Vol.9, Issue 8, pp. 1735 - 1780, 1997. https://doi.org/10.1162/neco.1997.9.8.1735
[5]. S. Sarode, H. G. Tolani, P. Kak and C. S. Lifna, "Stock Price Prediction Using Machine Learning Techniques”, International Conference on Intelligent Sustainable Systems (ICISS), Vol 5, Issue 3, pp. 177 - 181, 2019. Doi: 10.1109/ISS1.2019.8907958.
Citation
Rohit Tetarwal, Rohit Tushir, "Simulation Based Exploration of Stock Market Using LSTM Model," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.26-29, 2023.
Seed Selection for Region-Growing Image Segmentation Based on Detected Keypoints
Research Paper | Journal Paper
Vol.11 , Issue.4 , pp.30-38, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.3038
Abstract
Seeded region growing (SRG) segmentation is utilized frequently in image processing, computer vision, and machine intelligence applications. The accuracy of the segmentation produced by the fundamental SRG algorithm relies on the proper seed selection. In this paper, seeds are allocated for each color component of the input image using a keypoint detector. Two methods for obtaining seeds are examined; the first method uses the keypoints as the seeds, while the second method uses the centers of the triangles constructed using the keypoints as the seeds for the SRG algorithm. After that, each color plane is subjected to the SRG algorithm, and the result is then concatenated. Subsequently, this segmentation is enhanced by employing a statistical region-merging algorithm. Several traditional keypoint detectors, such as SIFT, SURF, KAZE, and Harris, are compared and examined using the well-known Berkeley segmentation dataset (BSD) images. Finally, the provided technique is compared with two other approaches for image segmentation: K-means and mean shift.
Key-Words / Index Term
Region growing, seeds, image segmentation, keypoints detector, triangulations centers
References
[1]. H. Mittal, A.C. Pandey, M. Saraswat, et al. "A comprehensive survey of image segmentation: clustering methods, performance parameters, and benchmark datasets.” Multimedia Tools Appl., Vol. 81, pp. 35001–35026, 2022. https://doi.org/10.1007/s11042-021-10594-9
[2]. Shaik Salma Begum, D. Rajya Lakshmi, “A Review of Current Methods in Medical Image Segmentation,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.12, pp.67-73, 2019. https://doi.org/10.26438/ijcse/v7i12.6773
[3]. R. Yadav, M. Pandey, “Image Segmentation Techniques: A Survey." In: Gupta, D., Polkowski, Z., Khanna, A., Bhattacharyya, S., Castillo, O. (eds) Proceedings of Data Analytics and Management. Lecture Notes on Data Engineering and Communications Technologies, Vol 90., pp. 231-239, 2022, Springer, Singapore. https://doi.org/10.1007/978-981-16-6289-8_20
[4]. N. J. Wala`a, J. M. Rana, “A Survey on Segmentation Techniques for Image Processing," Iraqi Journal for Electrical and Electronic Engineering, Vol. 17, pp. 73-93, 2021, doi:10.37917/ijeee.17.2.10
[5]. N. Zeitoun, M. Aqel, “Survey on image segmentation techniques”, Procedia Computer. Sci., Vol.65, pp. 797-806, 2015. https://doi.org/10.1016/j.procs.2015.09.027.
[6]. R. Adams, L. Bischof, “Seeded Region Growing,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 16, No. 6, pp. 641-654, 1994. DOI:10.1109/34.295913
[7]. M. Mousavi, F. Shariaty, M. Orooji, E. Velichko, “The performance of active-contour and 445 region growing methods against noises in the segmentation of computed-tomography scans,” in International Youth Conference on Electronics, Telecommunications and Information Technologies. Springer, Vol. 255, pp. 573–582, 2021. https://doi.org/10.1007/978-3-030-58868-7_63
[8]. M. Mancas, B. Gosselin, B. Macq, "Segmentation using a region-growing thresholding," Image Processing: Algorithms and Systems IV, Proc. SPIE Vol. 5672, (1 March 2005); https://doi.org/10.1117/12.587995
[9]. J Borovec, J Kybic, A Sugimoto, “Region growing using superpixels with learned shape prior," Journal of Electronic Imaging, Vol.26, No. 6, 2017. https://doi.org/10.1117/1.JEI.26.6.061611
[10]. A. Callara, C. Magliaro, A. Ahluwalia, N. Vanello, “A Smart Region-Growing Algorithm for Single-Neuron Segmentation from Confocal and 2-Photon Datasets”, Front. Neuroinform,. Vol. 14:9, 2020. DOI: 10.3389/fninf.2020.00009
[11]. O. Al-Furaiji, V. Rabtsevich, V. Tsviatkou, T. Kuznetsova, S. Chizhik, "Segmentation of AFM-Images Based on Wave Region Growing of Local Maxima," Engineering Letters, Vol. 28, no.3, pp. 681-698, 2020.
[12]. N. Muhadi, A. Abdullah, S. Bejo, M. Mahadi, A. Mijic, “Image Segmentation Methods for Flood Monitoring System,” Water, Vol. 12, no. 6, pp. 1825, Jun. 2020, doi: 10.3390/w12061825.
[13]. H. Wang, Y. Chen, "A smoke image segmentation algorithm based on rough set and region growing," Journal of Forest Science, Vol. 65, pp. 321-329, 2019. doi: 10.17221/34/2019-JFS
[14]. X. Jiang, Y. Guo, H. Chen, Y. Zhang, Y. Lu, "An Adaptive Region Growing Based on Neutrosophic Set in Ultrasound Domain for Image Segmentation," IEEE Access, vol. 7, pp. 60584-60593, 2019, doi 10.1109/ACCESS.2019.2911560.
[15]. Y. Deng and B. S. Manjunath, “Unsupervised segmentation of color-texture regions in images and videos,” IEEE Trans. Pattern. Anal. Mach. Intell., vol. 23, no. 8, pp. 800-810, Aug. 2001.
[16]. F. Jing, M. Li, H. J. Zhang, and B. Zhang, “Unsupervised image segmentation using local homogeneity analysis,” in Proc. Int. Symp. Circ. Syst., 2003. DOI:10.1109/ISCAS.2003.1206008
[17]. J. Fan, D. K. Y. Yau, A. K. Elmagarmid, and W. G. Aref, “Automatic image segmentation by integrating color-edge extraction and seeded region growing,” IEEE Trans. Image Process., Vol. 10, no. 10, pp. 1454-1466, Oct. 2001.
[18]. I. Imtiaz, I. Ahmed, M. Ahmad, K. Ullah, A. Adnan, M. Ahmad, "Segmentation of Skin Lesion Using Harris Corner Detection and Region Growing," 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, pp. 0614-0619, 2019. DOI: 10.1109/UEMCON47517.2019.8993034.
[19]. F. Y. Shi, S. Cheng, “Automatic seeded region growing for color image segmentation,” Image Vis. Compt., vol. 23, pp. 877- 886, 2005.
[20]. J. Fan, G. Zeng, M. Body, M. Hacid, “Seeded region growing: an extensive and comparative study," Pattern Recognition Letters, Vol. 26, Issue 8, Pages 1139-1156, 2005. https://doi.org/10.1016/j.patrec.2004.10.010
[21]. L G. Ugarriza, E. Saber, S. R. Vantaram, V. Amuso, M. Shaw, R. Bhaskar, “Automatic image segmentation by dynamic region growth and multiresolution merging,” IEEE Trans. Image Process., Vol. 18, no. 10, pp. 2275-2288, Oct. 2009.
[22]. C. -C. Kang and W. -J. Wang, "Fuzzy based seeded region growing for image segmentation," NAFIPS 2009 - 2009 Annual Meeting of the North American Fuzzy Information Processing Society, Cincinnati, OH, USA, pp. 1-5, 2009. DOI: 10.1109/NAFIPS.2009.5156397.
[23]. A. Al-Faris, U. Ngah, N. Isa, I. Shuaib, “Breast MRI tumour segmentation using modified automatic seeded region growing based on particle swarm optimization image clustering.” In Proceedings of the Advances in Intelligent Systems and Computing; Springer Verlag, Vol. 223, pp. 49–60, 2014.
[24]. H. Tariq, T. Jilani, U. Amjad. S.M. Aqil Burney, “Novel Seed Selection and Conceptual Region Growing Framework for Medical Image Segmentation." BRAIN – Broad Research in Artificial Intelligence and Neuroscience, Vol. 10, Issue 1, 2019, ISSN 2067-3957.
[25]. N. Tuan, X. Dai, T. Yurevich, “Multiple Seeded Region Growing Algorithm for Image Segmentation Using Local Extrema," Minsk, Belarus, January 2021.
[26]. H. Shimodaira, "Automatic color image segmentation using a square elemental region-based seeded region growing and merging method." arXiv preprint, arXiv:1711.09352, 2017. https://doi.org/10.48550/arXiv.1711.09352
[27]. N. Jothiaruna, K. Joseph Abraham Sundar, B. Karthikeyan, “A segmentation method for disease spot images incorporating chrominance in Comprehensive Color Feature and Region Growing.” Computer. Electron. Agric. Vol 165, 2019. https://doi.org/10.1016/j.compag.2019.104934
[28]. J. Jiao, X. Wang, J. Zhang, Q. Wang, “Salient region growing based on Gaussian pyramid,” IET Image Process., Vol. 15, Issue 13, pp. 3142– 3152, 2021. https://doi.org/10.1049/ipr2.12307
[29]. D. G. Lowe, "Distinctive image features from scale invariant keypoints," International Journal of computer vision, Vol. 60, no. 2, pp. 91–110, 2004.
[30]. H. Bay, A. Ess, T. Tuytelaars, L. Van Gool, “Speeded-Up Robust Features (SURF),” Computer Vision and Image Understanding, Vol. 110, Issue 3, pp. 346-359, 2008. https://doi.org/10.1016/j.cviu.2007.09.014
[31]. P. F. Alcantarilla, A. Bartoli and A. J. Davison, “Kaze features,” European Conference on Computer Vision. Springer, In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds) Computer Vision – ECCV 2012. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, Vol 7577. pp. 214–227, 2012. https://doi.org/10.1007/978-3-642-33783-3_16
[32]. C. Harris, M. Stephens, "A Combined Corner and Edge Detector," Proceedings of the 4th Alvey Vision Conference, pp. 147-151, August 1988.
[33]. P. Arbeláez, M. Maire, C. Fowlkes, and J. Malik, "Contour Detection and Hierarchical Image Segmentation," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 33, no. 5, pp. 898-916, May 2011. DOI: 10.1109/TPAMI.2010.161.
[34]. T. Malisiewicz, A. Efros, “Improving Spatial Support for Objects via Multiple Segmentations,” Proceedings of the British Machine Vision Conference 2007, University of Warwick, UK, September 10-13, 2007. ISBN 1-901725-34-0.
[35]. Unnikrishnan, Ranjith, and Martial Hebert. “Measures of Similarity.” Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION`05) – Vol. 1, pp. 394-394, 2005.
[36]. R. Unnikrishnan, C. Pantofaru, M. Hebert, “Toward objective evaluation of image segmentation algorithms,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 29, no. 6, pp. 929–944, Jun. 2007.
[37]. S. K. Khan, A. Ahmad, “Cluster center initialization algorithm for k-means clustering," Pattern Recognition Letters, Vol. 25, Issue 11, pp.1293–1302, 2004. https://doi.org/10.1016/j.patrec.2004.04.007.
[38]. D. Comaniciu, P. Meer, "Mean shift: a robust approach toward feature space analysis," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 5, pp. 603-619, May 2002. doi: 10.1109/34.1000236.
Citation
Ibrahim El rube, "Seed Selection for Region-Growing Image Segmentation Based on Detected Keypoints," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.30-38, 2023.
Implementation of Virtual Mouse Using Pupil Detection for Physically Disabled
Review Paper | Journal Paper
Vol.11 , Issue.4 , pp.39-45, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.3945
Abstract
Current technology often uses the computer mouse or finger to move the cursor along the screen. A mouse or finger movement is detected by the system and mapped to the cursor movement. HCI (Human-Computer Interface) involves the use of computer technology to provide a human-computer interface. Communication between humans and computers needs to be made more effective through appropriate technology. Interaction between humans and computers is crucial. It is therefore important to find a method for enabling individuals with disabilities to communicate with computers and be part of the Information Society in an equal way. In this project, a virtual mouse is built that works based upon the movement of the pupil of an eye, where the detection takes place with the help of a webcam. Here, the system detects the face of the user using facial landmark detectors. Then using the Canny Edge detection algorithm, the pupil of the eye is detected. Then the mouse is calibrated to the pupil. Left click and right click are implemented by detecting left blink and right blink of eye using Eye Aspect Ratio algorithm. The system is expected to be easy to use, take fast input, and work as an alternative to a physical mouse.
Key-Words / Index Term
Pupil control system, Pupil tracking systems, Mouse cursor, Webcam, Eye movement, Virtual mouse
References
[1] Hafiz Hamza Ashraf, Syed Muhammad Tahir Saleem, Sammat Fareed, Farzana Bibi, Arsalan Khan, Shahzad Gohar, “IMouse: Eyes Gesture Control System,” International Journal of Advanced Computer Science and Applications, Vol. 9, Issue 9, pp.1-5, 2018.
[2] C. Sun and P. Vallotton, “Fast linear feature detection using multiple directional non maximum suppression,”,”Journal of Microscopy” ,Vol. 234, Issue 2, pp.147-157, 2009.
[3] Kalyani Ijardar,Palak Jaiswal, Mansi Dhakiter, Mayuri Kadke, Tushar Barai “Human eye based computer mouse.”, “International Research Journal of Modernization in Engineering Technology and Science”, Vol. 04, Issue 12, pp.1-5,2022
[4] Aleksei Bukhalov, Viktoriia Chafonova, "An Eye Tracking Algorithm based on Hough transform" IEEE COMPEL 2018, Padova, Italy, pp. 1-2, 2018
[5] Sunil Kumar Beemanapally, Chetan Kumar, Diksha Kumari “Eye Ball Based Cursor Movement”,” International Research Journal of Modernization in Engineering Technology and Science”, Vol. 02, Issue:09 ,2020
[6] Nitasha, Shammi Sharma, Reecha Sharma, " Comparison Between Circular Hough Transform and Modified Canny Edge Detection Algorithm for Circle Detection", International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 3, pp. 1-5, May – 2012
[7] Suzuki, M., Yamamoto, N., Yamamoto, O., Nakano, T., Yamamoto, S.: Measurement of driver’s consciousness by image processing - a method for presuming driver’s drowsiness by eye-blinks coping with individual differences. In: IEEE ICSMC. vol. 4, pp. 2891–2896, 2006
[8] Grauman, K., Betke, M., Gips, J., Bradski, G.: Communication via eye blinks - detection and duration analysis in real time. In: Computer Vision and Pattern Recognition. vol. 1, pp. 1010–1017, 2001
[9] A. George and A. Routray, “Fast and accurate algorithm for eye localisation for gaze tracking in low-resolution images,” IET Computer Vision, vol. 10, issue 7, 2016, pp. 660-669.
[10] M. Smereka and I. Duleba, “Circular object detection using a modified Hough transform,” International Journal of Applied Mathematics and Computer Science, vol. 18, no. 1, pp. 85–91, 2008.
[11] P. Yang, B. Du, S. Shan, and W. Gao, “A novel pupil localization method based on gaboreye model and radial symmetry operator,” in Image Processing, 2004. ICIP’04. 2004 International Conference on, vol. 1. IEEE, pp. 67–70, 2004.
[12] Vamsh i Krishna M Mane, Gopu Abhishek Reddy, B. Prashanthi, M. Sreevani “Green Virtual Mouse Using OpenCv”, , International Journal of Computer Sciences and Engineering(IJCSE),Vol.-7, Issue-4, April 2019.
[13] Aruna Kumar B, T.Hashmitha, Swathi S.G, Vineeth P, “Recognizing Mouse Events through Head/Hand Movement”, International Journal of Computer Sciences and Engineering(IJCSE), Vol.-7, Special Issue-14, May 2019.
[14] Robert Gabriel Lupu, Florina Ungureanu, Valentin Siriteanu, "Eye tracking mouse for human computer interaction", 2013 E-Health and Bioengineering Conference (EHB), Iasi, Romania, pp. 1-2, 2014
Citation
K. Gnana Prasuna, M. Harshitha, G. Chaitanya Deepti, K. Shalini, B. Baby, "Implementation of Virtual Mouse Using Pupil Detection for Physically Disabled," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.39-45, 2023.
Literature Review on Tools & Applications of Data Mining
Review Paper | Journal Paper
Vol.11 , Issue.4 , pp.46-54, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.4654
Abstract
There are many new disciplines that have emerged as a result of technological advancement. Every day, enormous amounts of data are produced in many different areas, including science, engineering, health, and business. Data mining is a technique for gathering data from various sources and organizing it to produce insightful conclusions. Companies’ today look to stay ahead of the competition by making it a priority to keep up with all new developments in data science and analytics. This paper explains data mining`s applications in various areas as well as its methods and tools. This study concentrated on different data mining tools that are beneficial and identified as key fields of data mining technology. We are aware of the numerous domestic and international businesses, as well as small and big organizations.
Key-Words / Index Term
Data mining, Data set, KDD, Tools & Techniques, Rapid Miner, Weka, KNIME
References
[1] Aarti Sharma, Rahul Sharma, Vivek Kr. Sharma, Vishal Shrivastava, ?Application of Data mining-A Survey Paper? in International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2023-2025 2014, ISSN: 0975-9646.
[2] Bharati M. Ramageri, ?Data Mining Techniques and Applications? in Indian Journal of Computer Science and Engineering, Vol. 1 No. 4 301-305, Dec 2014.
[3] Saima Anwar Lashari, Rosziati Ibrahim, Norhalina Senan, N. S. A. M. Taujuddin,? Application of Data Mining Techniques for Medical Data Classification: A Review? in MATEC Web of Conferences 150, 06003, (2018),UCET2017.
[4] D.Usha Rani, ?A Survey on Data Mining Tools and Techniques in Medical Field? in International Journal of Advanced Networking & Applications (IJANA), Volume: 08, Issue: 05 Pages: 51-54 (2017) Special Issue.
[5] Manpreet Kaura, Shivani Kanga, ?Market Basket Analysis: Identify the changing trends of market data using association rule mining? in International Conference on Computational Modeling and Security (CMS 2016), Procedia Computer Science 85 ( 2016 ) 78 – 85.
[6] Dr. M. Dhanabhakyam, Dr. M. Punithavalli, ?A Survey on Data Mining Algorithm for Market Basket Analysis? in Global Journal of Computer Science and Technology Volume 11 Issue 11 Version 1.0 July 2011, Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350.
[7] MohammadReza Keyvanpoura, Mostafa Javidehb, Mohammad Reza Ebrahimia,? Detecting and investigating crime by means of data mining: a general crime matching framework? in Procedia Computer Science 3 (2011) 872–880. Available:
[8] Chauhan, Dipti, Jay Kumar Jain, and Sanjay Sharma. "An end-to-end header compression for multihop IPv6 tunnels with varying bandwidth." 2016 Fifth international conference on eco-friendly computing and communication systems (ICECCS). IEEE, 2016.
[9] Jain, Jay Kumar, Devendra Kumar Jain, and Anuradha Gupta. "Performance analysis of node-disjoint multipath routing for mobile ad-hoc networks based on QOS." International Journal of Computer Science and Information Technologies 3.5 (2012): 5000-5004
[10] Pushpesh Pant, SriramPandey, ?Application of Data Mining Tools and Techniques in Material Selection? in International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017.
[11] V.K. Jha, R.K. Singh ?Application of Data Mining in Manufacturing Industry? in International Journal of Information Sciences and Application.. Seoul, Korea, Apr 8, 2014. In: PAPADOPOULOS, Symeon, ed. and others. Proceedings of the SNOW 2014 Data Challenge co-located with 23rd International World Wide Web Conference (WWW 2014), Seoul, Korea, pp. 57-63, April 8, 2014 ISSN 0974- 2255 Volume 3, Number 2 (2011), pp. 59-64.
[12] Ashish Dutti, Maizatul Akmar Ismaili, Tutut Herawan, ? A Systematic Review on Educational Data Mining? in Digital Object Identifier 10.1109/ACCESS.2017.2654247, Volume 5, 2017.
[13] Dr. S. Vijiyarani, Ms. E. Suganya, ?Research Issues in Web Mining? in International Journal of Computer- Aided Technologies (IJCAx) Vol.2, No.3, July 2015.Brijendra Singh, Hemant Kumar Singh, ?Web Data Mining Research: A Survey? in IEEE International conference.
[14] Abdullah H. Wahbeh, Qasem A. Al-Radaideh, Mohammed N. Al -Kabi, and Emad M. Al.
[15] Jain, Jay Kumar, and Sanjay Sharma. "Performance Evaluation of Hybrid Multipath Progressive Routing Protocol for MANETs." International Journal of Computer Applications 71.18 (2013).
[16] Smitha, T., & Kumar, V. S. (2013). Applications of big data in data mining. International journal of emerging technology and advanced engineering, 7(3).
Citation
Anshu Shrivastava, Jay Kumar Jain, Dipti Chauhan, "Literature Review on Tools & Applications of Data Mining," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.46-54, 2023.
Billing System Using Machine Learning Techniques
Research Paper | Journal Paper
Vol.11 , Issue.4 , pp.55-60, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.5560
Abstract
The Procedure for utilizing premade standardized tags to perceive a thing during charging process is drawn-out and work through .The most common way of checking the every single item takes additional time and charging the bill and giving it to the client requires greater investment . This requires part of handling the work on the items to prepare them for ID and grouping. This paper presents an elective framework that chips away at the standard of self-checking of items and computerization includes that consequently produces the bill to such an extent that there will be no wastage of time To execute this framework we want to create some distance from customary techniques for programming and utilize an alternate worldview for planning the scanner which should be able to connect it with data base which stores the information of the products .we use machine learning model implemented in-order to perform the data in libraries like cv, numpy, pyzbar and Front-end using Tkinter and a Database for Mysql and connection of the Mysql with python. This paper describes about the disengaged programming System from charging the process without worrying about the gear Environment. We pick python and Tkinter to design the qr or normalized ID scanner and the front end for the customized show and SQL for the capacity of the information of the items to execute the framework over a circulated network inside any Estabilishment that needs to integrate this cycle so every hub that needs to handle charging need that needs to deal with charging need not need to stick to the equipment prerequisite forced on them to run the different models dependent on the GPU-based tensor engineering of tensor Stream.
Key-Words / Index Term
python3, MySQL, Tkinter, QR scanner
References
[1]. K. Jain, and K. M. Mohiuddin "Artificial neural networks: a tutorial". in Computer (1996).
[2]. Low- suryaprasadJ, Kumar B P, Roopa D and Arjun Novel Cost Intelligent Shopping Cart. IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications 2011.
[3]. Ali Z and Reena RFID based Smart Shopping: An overview. International Conference on Advances in Communication and Computing Technologies. (2012).
[4]. Shiv Ram Dubey and Anand Singh Jalal Fruit and vegetable recognition by fusing color and texture features of the image using machine learning. International journal of applied pattern recognition. (2015).
[5]. Sowmya V and Deepika J Image Classification Using Convolutional Neural Networks. International Journal of Scientific & Engineering Research.(2014)
[6]. Jose E K and S YOLO classification with multiple object tracking for vacant parking iot detection in Journal of Advanced Research in Dynamical and Control Systems.(2018).
[7]. Hung C, Nieto J, Taylor Z, Underwood J and Orchard fruit segmentation using multi-spectral feature learning. IEEE/RSJ International Conference on Intelligent Robots and Systems. (2013).
[8]. Ajeet Ram Pathak, Manjusha Pandey, Siddharth Rautaray “Application of Deep Learning for Object Detection”. In Procedia Computer Science “NIST Big Data (2018).
[9]. S. Ren, K. He, R. , and J. Sun, “Faster RCNN: Towards real-time object detection with region proposal networks” (2017).
[10]. “NASFPN: Learning scalable feature pyramid architecture for object detection” (2019).
[11]. Jordan, M.I., Mitchel, T.M , “Machine learning: trends, perspectives, and prospects” (2015).
[12]. Redmon and Farhadi A YOLO9000: Better, Faster, Stronger. IEEE Conference on Computer Vision and Pattern Recognition .(2017) .
[13]. Li R, Song T Redmon and Farhadi A YOLO9000: Better, Faster, Stronger. IEEE Conference on Computer Vision and Pattern Recognition 2017.
[14]. Li R, Song T, N, Yu J, Couture J and Cheng X IoT Applications on Secure Smart Shopping System. IEEE Internet of Things Journal2017
[15]. N, Yu J, Couture J and Cheng X IoT Applications on Secure Smart Shopping System. IEEE Internet of Things Journal .(2017).
[16]. Hedyig “A Hierarchical Grocery Store Image Dataset with Visual and Semantic Labels”. In IEEE Winter Conference on Applications of Computer Vision, (2019).
[17]. Yan and Geoffrey Hinton , "Deep learning" In Nature (2015).
[18]. Wu and Li Chen , "Image recognition based on deep learning" Chinese Automation Congress(2015) .
Citation
Bongu Raviteja, Mohammad Adnan Zargar, Sandeep Kumar , "Billing System Using Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.55-60, 2023.
Plagiarism Checker Data Indexing Technology for Indian Regional Language
Case Study | Journal Paper
Vol.11 , Issue.4 , pp.61-62, Apr-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i4.6162
Abstract
Plagiarism is considered a serious academic and ethical offense, as it undermines the values of originality, honesty, and integrity in academic and creative work. India has a diverse linguistic landscape, with over 22 official languages and many more regional languages spoken across the country. Several Indian states have taken steps to promote regional language education in recent years. In this case study we are exposing a very accurate plagiarism checker for all indian regional languages. We are facing many challenges to develop this sort of software. So, mainly the data indexing methods are very interesting in this case. Here we are exposing how data indexing methodology works using ‘Taylor series’ formula in cloud-based storage for Indian regional languages.
Key-Words / Index Term
Indexing, Encryption, Data Sequence, Search Key.
References
[1] J. Li, Z. Xu, Y. Jiang, and R. Zhang, “The overview of big data storage and management. cognitive informatics cognitive computing” in IEEE 13th International Conference on, (pp. 510-513, 2014.
[2] C. Liu, Zhang, C. Yang, D. Georgakopoulos, and J. Chen, “Public auditing for big data storage indexing -,” in A Survey. Computational Science and Engineering (CSE), 2013 IEEE 17th International Conference on, (pp. 1121-1135)., 2015, Dec.
[3] H. Tan, W. Luo, and L. M. Ni, “Taylor series and its functions in data analytics.,” in Proceedings of the22nd ACM International Conference on Information and Knowledge Management (pp. 2149-2183). New York, NY, USA: ACM., 2012.
[4] W. Zhou, C. Yuan, R. Gu, and Y. Huang, “Large scale nearest neighbors search based on neighborhood graph,” in Advanced Cloud and Big Data (CBD), 2013 International Conference on, pp. 181–186, Dec 2013.
[5] H. Nakada, H. Ogawa, and T. Kudoh, “Stream processing with bigdata: Sss-mapreduce,” in Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on, pp. 618–621, Dec 2012.
[6] T. Chardonnens, “Big data analytics on high velocity streams,” Master’s thesis, University of Fribourg (Switzerland), June 2013.
[7] F. Amato, A. De Santo, F. Gargiulo, V. Moscato, F. Persia, A. Picariello, and S. Poccia, “Semtree: An index for supporting semantic retrieval of documents,” in Data Engineering Workshops (ICDEW), 2015 31st IEEE International Conference on, pp. 62–67, April 2015.
[8] Cambazoglu BB, Kayaaslan E, Jonassen S, Aykanat C (2013) “A term-based inverted index partitioning model for efficient distributed query processing”. ACM Trans Web 7(3):1–23. doi:10.1145/2516633.
[9] Bast H, CelikikM(2013) “Efficient fuzzy search in large text collections”. ACM Trans Inf Syst 31(2):1–59. doi:10.1145/2457465.2457470
Citation
Prashanth Kumar H.M., Subramanya Bhat S., "Plagiarism Checker Data Indexing Technology for Indian Regional Language," International Journal of Computer Sciences and Engineering, Vol.11, Issue.4, pp.61-62, 2023.