An Effective Method for early Diagnosis of Alzheimer Disease using Angular Radial Transform and Orthogonal Fourier Mellin Moments
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.1-9, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.19
Abstract
Alzheimer’s disease (AD) is a progressive neurodegenerative disorder dementia. The main challenges for medical investigators have been the early diagnosis of patients with AD because an early diagnosis can provide greater opportunities for patients to be eligible for more clinical trials. The transitional state between healthy control (HC) and AD with mild memory problems is Mild cognitive impairment (MCI). A reliable diagnosis of MCI can be very effective for early diagnosis of AD. In this study, a fast and accurate method based on rotation invariant descriptors is proposed and moments are used to distinguish the patients with AD and MCI from normal participants (HC) using structural Magnetic Resonance Images (MRI). The rotation invariant descriptors are among the best region based shape descriptors which are used in many medical image processing applications. The angular radial transform (ART) is one such rotation invariant descriptors. This descriptor has two essential characteristics as compared to moment based descriptors, viz., it has low computation cost and provides a large number of numerically stable features. However, its kernel consists of the sinusoidal functions which still needs high computation time. In this paper, we developed fast and effective method to compute the radial & angular sinusoidal functions using 8-way symmetry and also used fast & recursive method to extract the features from MRI images using OFMMs. These methods are used not only for binary images but for gray level images also. The proposed method is not only fast but also more reliable and numerically stable.
Key-Words / Index Term
Alzheimer, Early Diagnosis, Rotation Invariant Descriptors, Angular Radial Transform, Mild cognitive impairment, Healthy control, Orthogonal Fourier Mellin Moments, Zernike Moments
References
[1] R.S. Wilson, E. Segawa, P.A. Boyle, S.E. Anagnos, L.P. Hizel, D.A. Bennett, “The natural history of cognitive decline in Alzheimer’s diseas”, Psychol Aging, Vol. 27, Issue 4, pp. 1008-1017, 2012.
[2] W.W. Barker, C.A. Luis, A. Kashuba, M. Luis, D.G. Harwood, D. Loewenstein, C. Waters, P. Jimison, E. Shepherd, S. Sevush, N. Graff-Radford, D. Newland, M. Todd, B. Miller, M. Gold, K. Heilman, L. Doty, G. Pearl, D. Dickson, R. Duara, “Relative frequencies of Alzheimer’s disease, Lewy body, vascular and frontotemporal dementia, and hippocampal sclerosis in the State of Florida Brain Bank”, Alzheimer Dis Assoc. Disorder, Vol. 16, Issue 4, pp. 203-212, 2002.
[3] M.M. Lopez, J. Ramierz, J.M. Gorriz, I. Alvarez, D. Salas-Gonzalez, F. Sequovia, R. Chaves, “SVM-based CAD system for early detection of the Alzheimer’s disease using kernel PCA and LD”, Neuroscience, Vol. 464, Issue 3, pp. 233-238, 2009.
[4] R. Brookmeyer, S. Gray, C. Kaeas, “Projections of Alzheimer’s disease in the 657 United States and the public health impact of delaying disease onset”, Am J Public Health, Vol. 88, Issue 9, pp. 1337–1342, 1998.
[5] N.C. Berchtold, C.W. Cotman, “Evolution in the conceptualization of dementia and Alzheimer’s disease: Greco-Roman period to the 1960s”, Neurobiology of Aging, Vol. 19, Issue 3, pp. 173–189, 1998.
[6] S.C. Johnson, T.W. Schmitz, C.H. Moritz, M.E. Meyerand, H.A. Rowley, A.L. Alexander, K.W. Hansen, C.E. Gleason, C.M. Carlsson, M.L. Ries, S. Asthana, K. Chen, G.E. Alexander, “Activation of brain regions vulnerable to Alzheimer’s disease: the effect of mild cognitive impairment”, Neurobiology of Aging, Vol. 27, Issue 11, pp. 1604–1612, 2006.
[7] P.M. Thompson, L.G. Apostolova, “Computational anatomical methods as applied to ageing and dementia”, Br J Radiol, Vol. 80, Issue 2, pp. S78–S91, 2007.
[8] J.L. Whitwell, S. Przybelski, S.D. Weigand, D.S. Knopman, B.F. Boeve, R.C. Petersen, C.R. Jack Jr., “3D maps from multiple MRI illustrate changing atrophy patterns as subject’s progress from mild cognitive impairment to Alzheimer’s disease”, Brain, Vol. 130, Issue 7, pp. 1777–1786, 2007.
[9] M. Grundman, R.C. Petersen, S.H. Ferris, “Mild cognitive impairment can be distinguished from Alzheimer’s disease and normal aging for clinical trials”, Arch Neurol., Vol. 61, Issue 1, pp. 59–66, 2004.
[10] J. Bischkopf, A. Busse, M.C. Angermeyer, “Mild cognitive impairment-a review of prevalence, incidence and outcome according to current approaches”, Acta Psychiatr Scand., Vol. 106, Issue 6, pp. 403–414, 2002.
[11] T. Erkinjuntti, R. Sulkava, J. Palo, L. Ketonen, “White matter low attenuation on CT in Alzheimer’s disease”, Arch Gerontol Geriatr, Vol. 8, Issue 1, pp. 95–104, 1989.
[12] H. Toyama, D. Ye, M. Ichise, “ PET imaging of brain with the b-amyloid probe,[11C] 6-OH-BTA-1, in a transgenic mouse model of Alzheimer’s disease”, Eur J Nucl Med Mol Imaging, Vol. 32, Issue 5, pp. 593–600, 2005.
[13] C. Davatzikos, Y. Fan, X. Wu, Dg. Shen, S.M. Resnick, “Detection of prodromal Alzheimer’s disease via pattern classification of magnetic resonance imaging”, Neurobiology of Aging, Vol. 29, Issue 4, pp. 514–523, 2008.
[14] R. Chaves, J. Ramirez, J.M. Gorriz, M. Lopez, D. Salas-Gonzalez, I. Alvarez, F. Segovia, “SVM-based computer-aided diagnosis of the Alzheimer’s disease using t-test NMSE feature selection with feature correlation weighting”, Neurosci. Lett., Vol. 461, Issue 3, pp. 293–297, 2009.
[15] R. Cuingnet, E. Gerardin, J. Tessieras, G. Auzias, S. Lehericy, M.O. Habert, M. Chupin, H. Benali, O. Colliot, “Automatic classification of patients with Alzheimer’s disease from structural MRI: a comparison of ten methods using the ADNI database”, Neuro Image, Vol. 56, Issue 2, pp.766–781, 2011.
[16] B. Magnin, L. Mesrob, S. Kinkingnehun, M. Pelegrini-Issac, O. Colliot, M. Sarazin,B. Dubois, S. Lehericy, H. Benali, “Support vector machine-based classification of Alzheimer’s disease from whole-brain anatomical MRI”, Neuroradiology, Vol. 51, Issue 2, pp. 73–83, 2009.
[17] S. Kloppel, C.M. Stonnington, C. Chu, B. Draganski, R.I. Schaijl, J.D. Rohrer, N.C. Fox, C.R. Jack, J. Jr, Ashburner, R.S Frackowiak, “Automatic classification of MR scans in Alzheimer’s disease”, Brain, Vol. 131, Issue 3, pp. 681–689, 2008.
[18] D. Shen, C.Y. Wee, D. Zhang, L. Zhou, P.T. Yap, “Machine Learning Techniques for AD/MCI Diagnosis and Prognosis”, Machine Learning in Healthcare Springer, Vol. 56, pp. 147–179, 2012.
[19] W. Yaping, “Kernel-based multi-task joint sparse classification for Alzheimer’s disease” ISBI, 10th International Symposium on Biomedical Imaging, IEEE, 2013.
[20] S.T. Yang, J.D. Lee, T.C. Chang, C.H. Huang, J.J. Wang, W.C. Hsu, H.L. Chan, Y.Y. Wai, K.Y. Li, “Discrimination between Alzheimer’s disease and Mild Cognitive Impairment Using SOM and PSO-SVM” Computational and mathematical methods in medicine, 2013.
[21] J. Escudero, J.P. Zalicek, E. Ifeachor, “Machine Learning classification of MRIfeatures of Alzheimer’s disease and mild cognitive impairment subjects to reduce the sample size in clinical trials”, Engineering in Medicine and Biology Society, EMBC, Annual International Conference of the IEEE, 2011.
[22] O. Colliot, G. Chetelat, M. Chupin, B. Desgranges, B. Maqnin, H. Benali, B. Dubois, L. Garnero, F. Eustache, S. Lehericy, “ Discrimination between Alzheimer Disease, Mild Cognitive Impairment, and Normal Aging by Using Automated Segmentation of the Hippocampus 1”, Radiology, Vol. 248 671, Issue 1, pp. 194–201, 2008.
[23] C. Vinitha, M. Azath, “Study on Image Authentication Techniques”, International Journal of Computer Sciences and Engineering, Vol. 2, Issue 12, pp. 87-89, 2014.
[24] H.T. Gorji, J. Haddadnia, “A novel method for early diagnosis of Alzheimer`s disease based on pseudo Zernike moment from structural MRI”, Neuroscience, Vol. 305, pp. 361-371, 2015.
[25] W. Kim, Y. Kim., “A new region-based shape descriptor: the ART (Angular Radial Transform) descriptor”, ISO/IEC JTC1/SC29/WG11/M5472, 2001.
[26] M. Bober, “MPEG-7 visual shape descriptors”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11, Issue 6, pp. 716–719, 2001.
[27] A. Amanatiadis, V.G. Kaburlasos, A. Gasteratos, S.E.Papadakis, “Evaluation of shape descriptors for shape-based image retrieval. Image Processing”, IET, Vol. 5, Issue 5, pp. 493-499, 2011.
[28] S.K. Hwang, W.Y. Kim, “Fast and efficient method for computing ART”, IEEE Transactions Image Processing, Vol. 15, Issue 1, pp. 112-117, 2006.
[29] L. Kotoules, I. Andreadis, “An efficient technique for the computation of ART”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 18, Issue 5, pp. 682-686, 2008.
[30] Y. Sheng, L. Shen, “Orthogonal Fourier-Mellin moments for invariant pattern recognition”, J. Opt. Soc. Am., Vol. 11, Issue 6, pp. 1748-1757, 1994.
[31] E. Walia, C. Singh, A. Goyal, “On the fast computation of orthogonal Fourier- Mellin moments with improved numerical stability”, J Real- Time Image Proc., Vol. 7, pp. 247-256, 2012.
[32] S.K. Hwang, W.Y. Kim, “A novel approach to the fast computation of Zernike moments”, Pattern Recognition, Vol. 39, pp. 2065–2076, 2006.
[33] C. Singh, R. Upneja, “Fast and accurate method for high order Zernike moments computation”, Applied Mathematics and Computation, Vol. 218, pp. 7759-7773, 2012.
[34] C. Singh, A. Kaur, “Fast computation of Polar Harmonic Transforms”, Journal of Real-Time image processing, Vol. 10, Issue 1, pp. 59-66, 2015.
[35] G.A. Papakostas, Y.S. Boutalis, D.A. Karras, B.G. Mertzio, “Fast numerically stable computation of orthogonal Fourier- Mellin moments”, IET Computer. Vis., Vol. 1, Issue 1, pp. 11-16, 2007.
Citation
R. Upneja, A. Prashar, "An Effective Method for early Diagnosis of Alzheimer Disease using Angular Radial Transform and Orthogonal Fourier Mellin Moments," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.1-9, 2017.
Minimum Free Energy-Based Amino Acid Sequence Permutation From Amino Acid
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.10-15, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.1015
Abstract
Computationally speaking, there are a few ways to tackle problems of rule-based permutations and iterations. This paper seeks to explore two algorithms and their possible application in the field of bioinformatics and biochemical engineering. We believe that accurately predicting RNA secondary structure formations can only be achieved by extensive analysis of specific RNA folds that have already been documented to occur in nature and others like them that have the same Amino acid sequence structure and similar minimal free energies. This paper focuses on algorithms to extract every single RNA sequence that fits a given amino acid sequence. We concern ourselves mainly with the computation intensive issue of the outputting various permutations of given protein sequences and their respective minimal free energies. Results: We present a way to computationally improve analysis of secondary structure minimization. Using C++, Sequence permutations of amino acids are extracted to be analyzed in terms of minimum free energies. ViennaRNA-2.1.6 is used to facilitate our computation of the RNA fold and the corresponding minimal free energy. The Odometer Weighted Counter (OWC) approach comes in second with its critical length of six amino acids and a computations time of 68 seconds. The Vector Permutation Mapping (VPM) approach comes in as the more desirable approach with a critical length of 10, and a computation time of 26896 seconds. All tests were made on critical path length of sequences. An output of importance to our paper is the minimal free energy of each RNA sequence that the ViennaRNA RNAfold function processes. Analysis of the resulting minimal free energies in comparison to already documented RNA strings in nature is the key to more effective secondary structure prediction.
Key-Words / Index Term
RNA, minimal free energy, amino acid, folding, ViennaRNA
References
[1] RF Gesteland, TR Cech, JF Atkins, “The RNA World, edn 3”, Cold Spring Harbor Laboratory Press, 2005.
[2] J. Li, J. Zhang, J. Wang, W Li, Wang , “Structure Prediction of RNA Loops with a Probabilistic Approach”, PLoS Comput Biol 12(8): e1005032. doi:10.1371/journal.pcbi.1005032 N,2016
[3] G.M Cooper; R.E Hausman. “The Cell A Molecular Approach (3rd ed.)”, Sinauer. pp. 261–76, 297, 339–44. ISBN 0-87893-214-3,2004
[4] H Lodish, A Berk, S L Zipursky, P. Matsudaira, D. Baltimore, J,. Darnell, “Molecular Cell Biology. 4th edition”.W. H. Freeman; 2000.
[5] J. S. Mattick; M. J. Gagen, "The evolution of controlled multitasked gene networks: the role of introns and other noncoding RNAs in the development of complex organisms", Mol. Biol. Evol. 18(9): 1611–30. doi: 10.1093 / oxfordjournals.molbev.a003951, September, 2001
[6] D. H. Mathews, “Predicting a set of minimal free energy RNA secondary structures common to two sequences”, Vol. 21 no. 10, pages 2246–2253, 2005.
[7] S. Chen, “RNA folding: conformational statistics, folding kinetics, and ion electrostatics”, Annu. Rev. Biophys. 37:199–214, 2008
[8] J. Yin, H. Tian, L.Bao, X. Dai. X. Gao, W.Yao, “An alternative method of enhancing the expression level of heterologous protein in Escherichia coli”,Biochemical and Biophysical Research Communications 455 (2014) 198–204, 2014
[9] S. R Eddy: “How do RNA folding algorithms work?”, Nat Biotechnol 22:1457-1458,2004
[10] D. H. Mathews, M Zuker, “Predictive methods using RNA sequences in Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins”, edn 3. Edited by Baxevenis A, Oullette F, John.Wiley and Sons:143-170, 2004
[11] Hajiaghayi et al., “Analysis of energy-based algorithms for RNA secondary structure prediction”. BMC Bioinformatics 13:22, 2012
[12] R. Lorenz, S. H. Bernhart, C. H. Siederdissen, H. Tafer, C. Flamm, P.F. Stadler,I.L. Hofacker, “ViennaRNA Package 2.0, Algorithms” Mol. Biol. 6, 2011
[13] J. S. Mattick. "The hidden genetic program of complex organisms". Scientific American. 291 (4): 60–7. PMID 15487671. doi:10.1038/scientificamerican1004-60, October 2004
[14] Khronos OpenCL Working Group,Aaftab Munshi."The OpenCL Specification".Version: 1.2. Revision: 19,2011
[15] Matthew Scarpino, “OpenCL in Action”, Manning Publications ISBN 9781617290176,2012
Citation
E. Lloyd-Yemoh, H.B. Shi, "Minimum Free Energy-Based Amino Acid Sequence Permutation From Amino Acid," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.10-15, 2017.
Energy Efficient Modified AODV for Wireless Sensor Network
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.16-19, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.1619
Abstract
Wireless sensor network are gathering of number of mobile nodes which are associated wirelessly with each other to carry out some tasks. Wireless sensor network are self-configured, infrastructure less network. In a WSN an effective utilization of resources is a vital issue because nodes in the network depend on limited resources like battery power. Hence, energy efficient routing for this network is essential which will provide better performance with the restricted resources. The purpose of this paper is to design energy aware routing protocol; here we consider classical AODV and Modified AODV (M-AODV). This protocol based on remaining energy of each node which will help to lengthen the life of network. Network Simulator NS-3.20 determined for simulation between AODV and M-AODV.
Key-Words / Index Term
Wireless Sensor Networks, AODV, M-AODV, Energy Efficiency
References
[1] Pallavi S. Katkar, Vijay R. Ghorpade, “A Survey on Energy Efficient Routing Protocol for Wireless Sensor Networks”, International Journal of Computer Science and Information Technology, Vol. 6(1), 2015.
[2] Annapurna P. Patil, Bathey Sharanya, M. P. Dinesh Kumar, Malavika J., “Design and Implementation of Combined Energy Metric AODV (CEM_AODV) Routing Protocol for MANETs”, International Journal of Computer and Electrical Engineering, Vol. 5, No. 1, February 2013.
[3] M. Pushpalatha, Revathi Venkataraman, and T.Ramarao, “Trust Based Energy Aware Reliable Reactive Protocol in Mobile Ad Hoc Networks”, World Academy of Science, Engineering and Technology, 2009.
[4] Hnin Yu Swe, “Modified AODV with Energy Metrics for Wireless Sensor Network”, International Journal of Scientific Engineering and Technology Research, Vol.03, Issue.35, Nov.2014.
[5] Akhilesh Tripathi, Rakesh Kumar, “MECB-AODV: A Modified Energy Constrained Based Protocol for Mobile Ad hoc Networks, International Journal of Distributed and Parallel System”, Vol.3, No.6, November 2012.
[6] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
[7] Pu Gong, Thomas M. Chen, and Quan Xu, “ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks, Journal of Sensors”, Hindawi Publishing Corporation, 2015.
[8] P. Samundiswary and Hemant Bharadwaj, “Performance Analysis of Energy Aware AODV Routing Protocol for IEEE 802.15.4 Enabled WSN”, International Journal of Computer Application, Volume 63, No. 19, February 2013.
[9] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[10] R. Kumar, S. Tripathi, R. Agrawal, "Energy Efficient Routing Protocol for Secure Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.1-4, 2017.
[11] Pallavi S. Katkar, Vijay R. Ghorpade, “Fuzzy Approach to Predict Mobility and Energy To Prolong the Life of Wireless Sensor Network”, IEEE International Conference on WIECON-ECE, December 2016.
[12] Ruchi Gupta, Akhilesh A. Waoo, Sanjay Sharma and P. S. Patheja, “A Research Paper on Comparison between Energy Efficient Routing Protocol with Energy and Location in MANET”, Journal of Computer Engineering, Vol. 9, Issue 4, 2013
[13] P.S. Hiremath, Shrihari M. Joshi, “Energy Efficient Routing Protocol with Adaptive Fuzzy Threshold Energy for MANETs”, International Journal of Computer Networks and Wireless Communications, Vol. 2, No. 3, June 2012
[14] R.Kumar, S.Tripathi, R.Agrawal, “Energy Efficient Routing Protocol for Secure Wireless Sensor Network”, International Journal of Computer Sciences and Engineering, Vol. 5, Issue. 4, pp.1-4, Apr-2017
Citation
Pallavi S. Katkar, Vijay R. Ghorpade, "Energy Efficient Modified AODV for Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.16-19, 2017.
Single Sampling Plan for Variable Indexed by AQL and AOQL with Known Coefficient of Variation
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.20-25, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.2025
Abstract
In this paper we have studies the effect of coefficient of variation (CV) on single sampling plan for variables indexed by acceptable quality level (AQL) and average outgoing quality limit (AOQL)based on the assumption of normality and independence are affected when the characteristic of an item possesses a normal distribution. Procedures and tables are given for the selection of single sampling plans for variables for given AQL and AOQL, whenever rejected lots are 100% inspected for replacement of nonconforming units. The operating characteristic (OC) function is described for different values of coefficient of variation. It is clear that the value of OC function with known CV shows higher values for the lot of bad quality. The values of n and k are also calculated with known coefficient of variation.
Key-Words / Index Term
CV, sampling plan, AQL, AOQL, OC
References
[1]. Brush, G. G., Hoadley, B., and Saperstein B., (1990), Estimating outgoing quality using the quality measurement plan, Technometrics, 32, 31-41.
[2]. Govindaraju, K., (1990), Single sampling plans for variables indexed by AQL and AOQL, Journal of Quality Technology, 22, 310-313.zzz\\
[3]. Govindaraju, K., and Soundararajan, V., (1986), Selection of single sampling plans for variables maching the Mil-Std 105 scheme, Journal of Quality Technology, 18, 234-238.
[4]. Hahn, G. J. (1986), Estimating the percent nonconforming in the accepted product after zero defect sampling. Journal of Quality Technology, 18, 182-188.
[5]. Martz, H. F., and Zimmer, W.J., (1990), A nonparametric Bayes empirical Bayes procedure for estimating the percent nonconforming in accepted lots, Journal of Quality Technology, 22, 95-104.
[6]. Sankle, R., and Singh, J.R., (2012a), Single Sampling Plans for Variables Indexed by AQL and AOQL with Measurement Error, Journal of Modern Applied Statistical Methods, 11, (2).
[7]. Sankle, R., and Singh, J.R., (2012b), Single Sampling Plans for Variables Indexed by AQL and AOQL with Measurement Error, Journal of Modern Applied Statistical Methods, 11, 396-406.
[8]. Soundararajan, V., (1981), Single sampling attributes inspection plans indexed by AQL and AOQL, Journal of Quality Technology, 13, 195-200.
[9]. Zaslavsky, A., (1988), Estimating nonconformity rates in C-defect sampling, Journal of Quality Technology, 20, 248-259.
Citation
J.R. Singh, A. Sanvalia, "Single Sampling Plan for Variable Indexed by AQL and AOQL with Known Coefficient of Variation," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.20-25, 2017.
Multi-Agent Based Context Aware Multicast Routing in VANET
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.26-37, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.2637
Abstract
Vehicular Ad-hoc Network (VANET) is a variant of Mobile Ad-hoc Network (MANET).The key goal of VANET is to facilitate communications among vehicles and also amongst vehicles and fixed infrastructure. Regardless of the fact that VANET is considered as a sub-class of MANET, it has distinctive features in terms of high mobility of vehicles, fabricating to recurrent topology changes, random node density and boundless network size. Hence most of the clustering algorithms considered for MANET are inappropriate for VANET. Much of the literature recently published focus on clustering in VANETs. However most of them are concentrated on diminishing network overhead value, number of clusters formed and do not consider the vehicles interests (viz. traffic congestion, looking for petrol pumps, free parking space, etc.). To decrease the complexity of transmissions, only context-aware data is required to be communicated to the intended recipients as needless information may cause a performance bottleneck in VANETs. Hence in this paper, we propose a context aware multicast/clustered routing algorithm based on agent technology which addresses above mentioned issues and improves the performance parameters associated with routing in VANET. The performance of the proposed scheme is tested with respect to bandwidth consumption, cluster formation time, multicast grouping time and communication overhead.
Key-Words / Index Term
VANETs, Cluster, Multicast, Context, Interest
References
[1] P. Gokulakrishnan, P. Ganesh Kumar. BEAM, “Bandwidth Efficient Acknowledgement based multicasting protocol for Sub-Urban scenario in VANET”, Journal of theoretical and Applied Information Technology (JATIT), Vol.67, Issue.1, pp. 201-211, 2014.
[2] Hamid Reza Arkian, Reza Ebrahimi Atani, Atefe Pourkhalili, Saman Kamali, “A Stable Clustering Scheme Based on Adaptive Multiple Metric in Vehicular Ad-hoc Networks”, Journal of Information Science and Engineering(J INF SCI ENG), Vol.31, Issue.2, pp.361-386, 2015.
[3] B. Hassanabadi, C. Shea, L. Zhang, S. Valaee, “ Clustering in Vehicular Ad Hoc Networks using Affinity Propagation”, Ad Hoc Networks, Part B, Vol.13, pp. 535-548, 2014.
[4] Shou-Chih Lo, Yi-Jen Lin, Jhih-Siao Gao, “A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks”, International Journal of Computer Theory and Engineering (IJCTE), Vol.5, Issue.2, pp. 242-247, 2013.
[5] Smitha Madhukar, "Challenging Issues of a Context-Aware Mobile Computing Framework", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.1-3, 2013.
[6] Celimuge Wu, Tsutomu Yoshinaga, Yusheng Ji, “ Context-aware Unified Routing for VANETs Based on Virtual Clustering”, In the Proceedings of 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Spain, pp.1-6, 2016.
[7] Francesco Chiti, Romano Fantacci, Enrico Dei, Zhu Han, “Context Aware Clustering in VANETs: A Game Theoretic Perspective”, In the Proceedings of IEEE International Conference on Communications (ICC), UK, pp.6584-6548, 2015.
[8] R. Kumar, S. Tripathi, R. Agrawal, "Energy Efficient Routing Protocol for Secure Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.1-4, 2017.
[9] Vaishali Jain, Rajendra Singh Kushwah, "Review of Various VANET Protocols Using NS-2 Simulator", International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.76-80, 2016.
[10] Waqar Farooq, Muazzam Ali Khan and Saad Rehman, “A cluster based multicast routing protocol for Autonomous Unmanned Military Vehicles (AUMVs) communication in VANET”, In the Proceedings of IEEE International Conference on Computing, Electronic and Electrical Engineering (ICE Cube), Pakistan, pp.42-48, 2016.
[11] Meysam Azizian, Soumaya Cherkaoui, Abdel hakim Senhaji Hafid, “A Distributed D-hop Cluster Formation for VANET”, In the Proceedings of Wireless Communications and Networking Conference (WCNC), Qatar, pp.1-6, 2016.
[12] Amit Dua, Neeraj Kumar, Seema Bawa, Joel J. P. C. Rodrigues, “An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks”, Mobile Networks and Applications (MOBILE NETW APPL), Vol. 20, Issue.2, pp.181-200, 2015.
[13] D.D. Shah, M.S. Selokar, "Introduction of Complex Laplacian to Multi-Agent Systems", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.2, pp.30-36, 2017.
[14] Seyhan Ucar, Sinem Coleri Ergen, Oznur Ozkasap, “VMaSC: Vehicular multi-hop algorithm for stable clustering in Vehicular Ad Hoc Networks”, In the Proceedings of Wireless Communications and Networking Conference (WCNC), China, pp. 2381-2386, 2013.
[15] Alvin Sebastian, Maolin Tang, Yanming Feng, Mark Looi, “Context-Aware Multicast Protocol for Emergency Message Dissemination in Vehicular Networks”, International Journal of Vehicular Technology (Int. J. Vehicular Technol.), 2012.
[16] B. Mukunthan, B. Radha, S. Govindaraju, "Probabilistic B-Tree Based Clustering Algorithm for Vehicular Ad-Hoc Network with Data Aggregation", International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.82-87, 2017.
[17] Sławomir Kuklinski, Grzegorz Wolny, “CARAVAN: A Context-AwaRe Architecture for VANET”, In Xin Wang (Ed.). Mobile Ad-Hoc Networks: Applications, InTech, pp. 125-148, 2011.
[18] S. S. Manvi, M. S. Kakkasageri, Jeremy Pittc, “Multiagent based information dissemination in vehicular ad hoc networks”, Mobile information Systems, 2009
[19] S. S. Manvi, A. V. Sutagundar, “Agent based Context Aware Image Fusion for Military Sensor Networks”, In the Proceedings of Fifth IEEE Conference on Wireless Communication and Sensor Networks (WCSN), India, pp. 1-6, 2009.
[20] Zhigang Wang, Lichuan Liu, MengChu Zho, Nirwan Ansari, “A position-Based Clustering Technique for Ad-Hoc Intervehicle Communication”, IEEE transactions on systems, Man, and Cybernetics-Part C: Applications and reviews, Vol. 38, Issue.2, pp. 201-208, 2008.
[21] Ching-Chuan Chiang, Mario Gerla, “Routing and Multicast in Multihop, Mobile Wireless Networks”, In the Proceedings of 6th International Conference on Universal Personal Communications (ICUPC), USA, pp.546-551, 1997.
[22] Samira Harrabi, Ines Ben Jaafar, Khaled Ghedira, “Message Dissemination in Vehicular Networks on the basis of Agent Technology”, Wireless Personal Communication (Wireless Pers Commun), Vol. 96, Issue.4, pp.6129-6146, 2017.
[23] Maria Kihl, Mihail Sichitiu, Ted Ekeroth, Michael Rozenberg, “Reliable Geographical Multicast Routing in Vehicular Ad-Hoc Networks”, In the Proceedings of Wired/Wireless Internet Communication (WWIC), USA, pp. 315-325, 2007.
[24] A. V. Sutagundar, S.S. Manvi, “Wheel Based Event triggered Data Aggregation and Routing in Wireless Sensor Networks: Agent Based Approach”, Wireless Personal Communications (Wireless Pers Commun), Vol.71, Issue.1, pp. 491-517, 2013.
[25] M. S. Kakkasageri, S. S. Manvi, “Connectivity and Mobility Aware Dynamic Clustering in VANETs”, International Journal of Future Computer and Communication (IJFCC), Vol.3, Issue.1, pp. 5-8, 2014
[26] Network simulator: ns-2, Available at: http://www.isi.edu/nsnam/ns [October 2010].
[27] Devipriya D., Muruganandan A., “Road based Routing Protocol for VANET Using SUMO and Move”, International Journal of Computer Sciences and Engineering (IJCSE), Vol. 4, Issue.2, 2016.
[28] Bangalore City Map, Available: www.mapofbangalore.com [November 2007].
Citation
A. D. Devangavi, Rajendra Gupta, "Multi-Agent Based Context Aware Multicast Routing in VANET," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.26-37, 2017.
Efficient Content Based Image Retrieval Using Fuzzy Approach
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.38-43, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.3843
Abstract
Content based image retrieval (CBIR) has been one of the significant research areas in computer science in the recent time. Various feature like Texture, color & shape are used in CBIR for image retrieval. Basically, color is the most striking feature in the content based image retrieval. Different extraction methods are used in content based image retrieval (CBIR). A retrieval method which is based on color histogram by using fuzzy inference system approach is proposed in this paper. We propose a fuzzy rule based approach with27 rules, for effective image retrieval. The experimental results show the robustness and the efficiency of the proposed system for CBIR.
Key-Words / Index Term
CBIR, Fuzzy, Fuzzy Inference System ,Color Histogram
References
[1] Nadira T., Rehna K., Fepslin Athish Mon, "A Study and Analysis on Feature Extraction in Content-Based Image Retrieval", International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.305-307, 2017.
[2] Sergyan, Szabolcs. "Color histogram features based image classification in content-based image retrieval systems”, Applied Machine Intelligence and Informatics, 2008. SAMI 2008. 6th International Symposium on. IEEE, 2008.
[3] P. Rachana, S. Ranjitha, H.N. Suresh, "Stride Towards Developing an CBIR System Based on Image Annotations and Extensive Multimodal Feature Set", International Journal of Computer Sciences and Engineering, Vol.2, Issue.1, pp.18-22, 2014.
[4] Raina, Nikita, et al. "A fused features approach on Content-Based Image Retrieval based on Fuzzy rule-set", Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on. IEEE, 2014.
[5] www.wikipedia.com
[6] Shraddha S.Katariya and Ulhas B.Shinde, "Review of Content Based Image Retrieval Using Low Level Features", International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.91-97, 2016.
[7] http://in.mathworks.com
[8] Alladi Ujwala, Nagaratna P. Hegd, “Image Retrieval Using Quadratic Distance Based On Color Feature And Pyramid Structure Wavelet Transform And Glcm Based On Texture Feature”, International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 4 (July-Aug 2014), PP. 169-172
[9] Zhang D, Lu G.,“Evaluation of similarity measurement for image retrieval”, International Conference on Neural Networks and Signal Processing, 2003. (Vol. 2, pp. 928-931)
[10] Mehtre BM, Kankanhalli MS, Narasimhalu AD, Man GC., “Color matching for image retrieval”, Pattern Recognition Letters, Vol.16, Issue.3, pp.325-31, 1995.
[11] Aasish Sipani, Phani Krishna and Sarath Chandra, "Content Based Image Retrieval Using Extended Local Tetra Patterns", International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.11-17, 2014.
[12] Shambharkar MS, Tirpude MS. “Content Based Image Retrieval Using Texture and Color Extraction and Binary Tree Structure”, International Journal of Computer Technology and Electronics Engineering (IJCTEE), Vol.5, Issue.6, pp.51-56, 2011.
[13] You FC, Zhang C., “The technique of color and shape-based multi-feature combination of trademark image retrieval”, IEEE 2010 International Conference on Multimedia Technology, pp. 1-5, 2010.
Citation
Dahale Sunil V., Thorat S.B., P.K. Butey, M.P. Dhore, "Efficient Content Based Image Retrieval Using Fuzzy Approach," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.38-43, 2017.
Parallel Job Scheduling Using Grey Wolf Optimization Algorithm for Heterogeneous Multi-Cluster Environment
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.44-53, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.4453
Abstract
Multi-cluster environment consists of computational nodes that allow computational problems with resource requirement more than those available resources in a cluster to be treated. Scheduling jobs in heterogeneous multi-cluster environments where each cluster has varied number of processors and each computational node has a varying speed is NP hard. Thus, we always search for sub-optimal solution for scheduling jobs. Various meta-heuristics have been proposed for scheduling jobs. The literature shows that the Genetic algorithm has been employed for parallel jobs scheduling in heterogeneous multi cluster environment. But it suffers from certain limitations like slow convergence speed, local optima problem. In this research work, a Grey Wolf Optimization algorithm (GWO) has been introduced in order to minimize makespan, flowtime and mean waiting time. The proposed methodology has shown quite significant improvement over available ones.
Key-Words / Index Term
Heterogeneous multi-cluster environment, Scheduling, Co-allocation, Grey wolf Optimization Algorithm(GWOA))
References
[1] Abawajy, Jemal H., and Sivarama P. Dandamudi. "Parallel Job Scheduling on Multicluster Computing Systems." CLUSTER. Vol. 3. 2003
[2] Abawajy, Jemal H. "Fault-tolerant scheduling policy for grid computing systems." Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International. IEEE, 2004
[3] Alkhanak, Ehab Nabiel, Sai Peck Lee, and Saif Ur Rehman Khan. "Cost-aware challenges for workflow scheduling approaches in cloud computing environments: Taxonomy and opportunities." Future Generation Computer Systems 50 (2015): 3-21.
[4] Arsuaga-Ríos, María, and Miguel A. Vega-Rodríguez. "Energy optimization for task scheduling in distributed systems by an Artificial Bee Colony approach." Nature and Biologically Inspired Computing (NaBIC), 2014 Sixth World Congress on. IEEE, 2014.
[5] .Barbosa, Jorge, and António P. Monteiro. "A list scheduling algorithm for scheduling multi-user jobs on clusters." International Conference on High Performance Computing for Computational Science. Springer Berlin Heidelberg, 2008.
[6] Bilgaiyan, Saurabh, Santwana Sagnika, and Madhabananda Das. "An analysis of task scheduling in cloud computing using evolutionary and swarm-based algorithms." International Journal of Computer Applications 89.2 (2014).
[7] Blanco, Héctor, et al. "Multiple job co-allocation strategy for heterogeneous multi-cluster systems based on linear programming." The Journal of Supercomputing 58.3 (2011): 394-402.
[8] Bokhari, M. U., Mahfooz Alam, and Faraz Hasan. "Performance analysis of dynamic load balancing algorithm for multiprocessor interconnection network." Perspectives in Science 8 (2016): 564-566.
[9] Civicioglu, Pinar, and Erkan Besdok. "A conceptual comparison of the Cuckoo-search, particle swarm optimization, differential evolution and artificial bee colony algorithms." Artificial intelligence review 39.4 (2013): 315-346.
[10] Dorronsoro, B., Nesmachnow, S., Taheri, J., Zomaya, A. Y., Talbi, E. G., & Bouvry, P. (2014). A hierarchical approach for energy-efficient scheduling of large workloads in multicore distributed systems. Sustainable Computing: Informatics and Systems, 4(4), 252-261.
[11] Farahnakian, F., Ashraf, A., Pahikkala, T., Liljeberg, P., Plosila, J., Porres, I., & Tenhunen, H. (2015). Using ant colony system to consolidate vms for green cloud computing. IEEE Transactions on Services Computing, 8(2), 187-198.
[12] Fang, Yiqiu, Fei Wang, and Junwei Ge. "A task scheduling algorithm based on load balancing in cloud computing." International Conference on Web Information Systems and Mining. Springer Berlin Heidelberg, 2010.
[13] Feng, Yu Jianjun Sun Shudong Zheng. "Job-shop scheduling study by dynamic evaluation based immune algorithm [J]." Chinese Journal of Mechanical Engineering 3 (2005): 004.
[14] Ferrandi, F., Lanzi, P. L., Pilato, C., Sciuto, D., & Tumeo, A. (2010). Ant colony heuristic for mapping and scheduling tasks and communications on heterogeneous embedded systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 29(6), 911-924.
[15] Gabaldon, Eloi, et al. "Blacklist muti-objective genetic algorithm for energy saving in heterogeneous environments." The Journal of Supercomputing 73.1 (2017): 354-369.
[16] Guzek, M., Pecero, J. E., Dorronsoro, B., Bouvry, P., & Khan, S. U. (2010, June). A cellular genetic algorithm for scheduling applications and energy-aware communication optimization. In High Performance Computing and Simulation (HPCS), 2010 International Conference on (pp. 241-248). IEEE.
[17] HOU, You-hua, et al. "Analysis on active power fluctuation characteristics of large-scale grid-connected wind farm and generation scheduling simulation under different capacity power injected from wind farms into power grid [J]." Power System Technology 5 (2010): 013.
[18] .Javadi, Bahman, Mohammad K. Akbari, and Jemal H. Abawajy. "Performance analysis of heterogeneous multi-cluster systems." Parallel Processing, 2005. ICPP 2005 Workshops. International Conference Workshops on. IEEE, 2005.
[19] Jia, H. Z., Nee, A. Y., Fuh, J. Y., & Zhang, Y. F. (2003). A modified genetic algorithm for distributed scheduling problems. Journal of Intelligent Manufacturing, 14(3-4), 351-362.
[20] Javanmardi, Saeed, et al. "Hybrid job scheduling algorithm for cloud computing environment." Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014. Springer International Publishing, 2014.
[21] Javanmardi, S., Shojafar, M., Amendola, D., Cordeschi, N., Liu, H., & Abraham, A. (2014). Hybrid job scheduling algorithm for cloud computing environment. In Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014 (pp. 43-52). Springer International Publishing.
[22] Liu, J., Luo, X. G., Zhang, X. M., Zhang, F., & Li, B. N. (2013). Job scheduling model for cloud computing based on multi-objective genetic algorithm. IJCSI International Journal of Computer Science Issues, 10(1), 134-139.
[23] Liu, S. L., Liu, Y. X., Zhang, F., Tang, G. F., & Jing, N. (2007). Dynamic web services selection algorithm with QoS global optimal in web services composition. Ruan Jian Xue Bao(Journal of Software), 18(3), 646-656.
[24] Li, Jun-Qing, Quan-Ke Pan, and Kai-Zhou Gao. "Pareto-based discrete artificial bee colony algorithm for multi-objective flexible job shop scheduling problems." The International Journal of Advanced Manufacturing Technology 55.9-12 (2011): 1159-1169.
[25] Li, S., Li, G., Wang, X., & Liu, Q. (2005). Minimizing makespan on a single batching machine with release times and non-identical job sizes. Operations Research Letters, 33(2), 157-164.
[26] Lorpunmanee, S., Sap, M. N., Abdullah, A. H., & Chompoo-inwai, C. (2007). An ant colony optimization for dynamic job scheduling in grid environment. International Journal of Computer and Information Science and Engineering, 1(4), 207-214.
[27] Masdari, M., ValiKardan, S., Shahi, Z., & Azar, S. I. (2016). Towards workflow scheduling in cloud computing: A comprehensive analysis. Journal of Network and Computer Applications, 66, 64-82.
[28] Makhlouf, Sid Ahmed, and Belabbas Yagoubi. "Resources Co-allocation Strategies in Grid Computing." CIIA. 2011.
[29] Mirjalili, Seyedali, Seyed Mohammad Mirjalili, and Andrew Lewis. "Grey wolf optimizer." Advances in Engineering Software 69 (2014): 46-61.
[30] Moganarangan, N., Babukarthik, R. G., Bhuvaneswari, S., Basha, M. S., & Dhavachelvan, P. (2016). A novel algorithm for reducing energy-consumption in cloud computing environment: Web service computing approach. Journal of King Saud University-Computer and Information Sciences, 28(1), 55-67.
[31] Pinel, F., Dorronsoro, B., Pecero, J. E., Bouvry, P., & Khan, S. U. (2013). A two-phase heuristic for the energy-efficient scheduling of independent tasks on computational grids. Cluster Computing, 16(3), 421-433.
[32] Priya, S. Baghavathi, M. Prakash, and K. K. Dhawan. "Fault tolerance-genetic algorithm for grid task scheduling using check point." Grid and Cooperative Computing, 2007. GCC 2007. Sixth International Conference on. IEEE, 2007.
[33] Qu, H., Mashayekhi, O., Terei, D., & Levis, P. (2016). Canary: A Scheduling Architecture for High Performance Cloud Computing. arXiv preprint arXiv:1602.01412.
[34] Sajedi, Hedieh, and Maryam Rabiee. "A metaheuristic algorithm for job scheduling in grid computing." International Journal of Modern Education and Computer Science 6.5 (2014): 52.
[35] Sheikhalishahi, M., Ebrahimipour, V., Shiri, H., Zaman, H., & Jeihoonian, M. (2013). A hybrid GA–PSO approach for reliability optimization in redundancy allocation problem. The International Journal of Advanced Manufacturing Technology, 68(1-4), 317-338.
[36] Singh, S., & Chana, I. (2015). QRSF: QoS-aware resource scheduling framework in cloud computing. The Journal of Supercomputing, 71(1), 241-292.
[37] Singh, Sukhpal, and Inderveer Chana. "Energy based efficient resource scheduling: a step towards green computing." Int J Energy Inf Commun 5.2 (2014): 35-52.
[38] Tao, F., Zhang, L., Venkatesh, V.C., Luo, Y. and Cheng, Y., 2011. Cloud manufacturing: a computing and service-oriented manufacturing model. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, 225(10), pp.1969-1976.
[39] Vigneswari, T., and Ma Maluk Mohamed. "Optimal GridScheduling Using Improved Artificial Bee Colony Algorithm." International Journal of Computer, Electrical, Automation, Control and Information Engineering 8 (2014).
[40] Wang, Lizhe, et al. "Energy-aware parallel task scheduling in a cluster." Future Generation Computer Systems 29.7 (2013): 1661-1670.
[41] Xu, Yuming, Kenli Li, Jingtong Hu, and Keqin Li. "A genetic algorithm for task scheduling on heterogeneous computing systems using multiple priority queues." Information Sciences 270 (2014): 255-287
[42] Yang, Chao-Tung, et al. "Well-balanced allocation strategy for multi-cluster computing environments." Future Trends of Distributed Computing Systems, 2008. FTDCS`08. 12th IEEE International Workshop on. IEEE, 2008.
[43] YING, Chang-tian, Jiong YU, and Xing-yao YANG. "Energy-aware task scheduling algorithms in cloud computing [J]." Microelectronics & Computer 5 (2012): 044.
[44] Zhao, Jianfeng, and Hongze Qiu. "Genetic algorithm and ant colony algorithm based Energy-Efficient Task Scheduling." Information Science and Technology (ICIST), 2013 International Conference on. IEEE, 2013.
Citation
Sapinderjit Kaur, Kirandeep Kaur, Amit.Chhabra, "Parallel Job Scheduling Using Grey Wolf Optimization Algorithm for Heterogeneous Multi-Cluster Environment," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.44-53, 2017.
Spanning Tree- Properties, Algorithms and Applications
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.54-58, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.5458
Abstract
In this paper, we present a survey of the spanning trees. The general properties of spanning trees, algorithms for generation of all possible spanning trees from a graph and minimum spanning tree algorithms are discussed in this paper. The purpose of this study is to give fundamental details on the spanning trees and related work done based on their application domains. The application domains include computer networks, bio-informatics, image processing etc. It is found that research related to spanning trees can be related to the area of graph mining.
Key-Words / Index Term
Graph, Spanning Tree, Minimum Spanning Tree
References
[1] Alexander K. Kelmans., On graphs with the maximum number of spanning trees 1996.
[2] AR. PonPeriasamy , E. Thenmozhi, A Brief survey of Data Mining Techniques Applied to Agricultural Data, International Journal of Computer Sciences and Engineering, 4(5), 2017.
[3] Burcu Bozkurt and Durmuş Bozkurt, “On the Number of Spanning Trees of Graphs,” The Scientific World Journal, Vol. 2014, Article ID 294038, 5 pages, 2014. doi:10.1155/2014/294038
[4] Chakraborty, Maumita & Hazra, Goutam & Pal, Rajat, Divide-and-Conquer: An Approach to Generate All Spanning Trees of a Connected and Undirected Simple Graph. 700-91,2017
[5] Chen , W. K., On directed trees and directed k-trees of a digraph and their generation, SIAM J. Appl. Math. 14 550–560, 1966
[6] Das et al., The number of spanning trees of a graph, Journal of Inequalities and Applications, 2013.
[7] Dr. T. Karthikeyan, S. John Peter, B. Praburaj (2012) Minimum Spanning Tree-based Clustering Applied to Protein Sequences in Early Cancer Diagnosis, International Journal of Computer Science And Technology, Vol. 3, Issue 1, Jan. - March 2012.
[8] Gabow, H.N., Two algorithms for generating weighted spanning trees in order. SIAM Journal on Computing, 6(1), 139-150., 1977.
[9] Gabow, H.N. & Myers, E.W., Finding all spanning trees of directed and undirected graphs. SIAM Journal on Computing, 7, 280-287. 1978.
[10] Hakimi, S.L., On trees of a graph and their generation. Journal of the Franklin Institute. 272. 347-359. 10.1016/0016-0032(61)90036-9.,1961
[11] Kapoor, S. & Ramesh, H., Algorithms for enumerating all spanning trees of undirected and weighted graphs. SIAM Journal on Computing, 24, 247-265.,1995
[12] Kapoor, S. & Ramesh, H. An algorithm for enumerating all spanning trees of a directed graph. Algorithmica, 27(2), 120-130.,1997.
[13] Kocay, William; Kreher, Donald L., "5.8 The matrix-tree
theorem", Graphs, Algorithms, and Optimization, Discrete Mathematics and Its Applications, CRC Press, pp. 111–116, ISBN 978-0-203-48905-5., 2004.
[14] Matsui, An algorithm for finding all the spanning trees in undirected graphs. Technical Report METR 93-08, Dept. of Mathematical Engineering and Information Physics, University of Tokyo, Tokyo, 1993.
[15] Matsui, T., A flexible algorithm for generating all the spanning trees in undirected graphs. Algorithmica, 18(4), 530-543., 1997.
[16] Matsui, Tomomi., An Algorithm for Finding All the Spanning Trees in Undirected Graphs., 1998.
[17] McDiarmid, Colin; Johnson, Theodore; Stone, Harold S., "On finding a minimum spanning tree in a network with random weights" , Random Structures & Algorithms, 10 (1-2): 187–204, MR 1611522.,1997.
[18] Minty, G.J., A simple algorithm for listing all the trees of a graph. IEEE Transactions on Circuit Theory, CT-12, 120, 1975.
[19] Naskar S., Basuli K., Sarma S.S., Generation of All Spanning Trees in the Limelight. In: Meghanathan N., Chaki N., Nagamalai D. (eds) Advances in Computer Science and Information Technology. Computer Science and Information Technology. CCSIT 2012.
[20] Shioura, A. & Tamura, A, . Efficiently scanning all spanning trees of an undirected graph. Journal of the Operations Research Society of Japan, 38(3), 331-344., 1995.
[21] S. Joshi , F.U. Khan , N. Thakur., Contrasting and Evaluating Different Clustering Algorithms: A Literature Review.,International Journal of Computer Sciences and Engineering., Volume-2 , Issue-4 , Page no. 87-91, Apr-2014.
[22] Winter, Pawel,. An Algorithm for the Enumeration of Spanning Trees.. BIT. 26. 44-62. 10.1007/BF01939361.1985.
[23] Wu, Bang Ye; Chao, Kun-Mao , Spanning Trees and Optimization Problems, CRC Press, ISBN 1-58488-436-3,2004.
Citation
K. Lakshmi, T. Meyyappan, "Spanning Tree- Properties, Algorithms and Applications," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.54-58, 2017.
A Study on Raise of Web Analytics and its Benefits
Survey Paper | Journal Paper
Vol.5 , Issue.10 , pp.59-64, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.5964
Abstract
Internet is expanding day by day in terms of its users and websites. Web Analytics is the process of measuring statistics of the website and analyzing the behaviour of traffic. 39 percent of the companies present now do not use any web analytics. This paper studies evolution of web analytics, the strategic methodologies that allows us to assess online activities, process, and the tools used. This paper also discusses the benefits obtained to small and large scale businesses if they incorporate web analytics to their websites.
Key-Words / Index Term
Web analytics, Java script, e-commerce, web usage, log file, page tagging
References
[1] WAA Standards Committee. "Web analytics definitions." Washington DC: Web Analytics Association (2008).
[2] D. Waisberg and A. Kaushik, "Web Analytics 2.0: Empowering Customer Centricity," The original Search Engine Marketing Journal 2 , vol. 2, no. 1, pp. 5– 11, 2009.
[3] Peterson, Eric. "What Is Web Analytics." Xml.com. N.p., 2017. Web. 17 Oct. 2017.
[4] Prasanthi, B. V., Prathyusha Kanakam, and S. Mahaboob Hussain. "Cyber Forensic Science to Diagnose Digital Crimes-A study."International Journal of Scientific Research in Network Security and communication (IJSRNSC),2017
[5] Jeremy Aube, Director of Engineering. "Collecting Web Data: A Look At Web Analytics Methodology - ROI Revolution." ROI Revolution. N.p., 2017. Web. 17 Oct. 2017.
[6] B.V.Prasanthi ,”Cyber Forensics Tools : A Review” International Journal of Engineering Trends and Technology (IJETT),vol 41 no 5(2016).
[7] "A Brief History Of Web Analytics & DCX Insights." Clicktale. N.p., 2017. Web. 17 Oct. 2017.
[8] "Web Analytics Basics | Usability.Gov." Usability.gov. N.p., 2017. Web. 17 Oct. 2017.
[9] Bonthu, S., S S R Murthy, Y., & Srilakshmi, M. (2014). Building an Object Cloud Storage Service System using OpenStack Swift. International Journal Of Computer Applications, 102(10), 39-42. http://dx.doi.org/10.5120/17854-8827
[10] T. Stewart, "Websites – Quality and Usability", Behaviour & Information Technology , vol. 31, no. 7, pp. 645-646, 2012.
[11] Sridevi Bonthu et al, (2017). Automation of Pre-processing of Students Data. Indian Journal of Computer Science and Engineering (IJCSE), 8(3), 241-245. ISSN : 0976-5166 Vol. 8 No. 3 Jun-Jul 2017.
[12] Mentes, S. Ahmet, and Aykut H. Turan. "Assessing the usability of university websites: an empirical study on Namik Kemal University." TOJET: The Turkish Online Journal of Educational Technology 1 1 .3 (2012).
Citation
U.Padma Jyothi, Sridevi Bonthu, B V Prasanthi, "A Study on Raise of Web Analytics and its Benefits," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.59-64, 2017.
Groundwater Pollution Source Identification Using Genetic Algorithm Based Optimization Model
Research Paper | Journal Paper
Vol.5 , Issue.10 , pp.65-72, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.6572
Abstract
Groundwater is an important natural resource available on the earth. Contamination of groundwater resources has become a major problem today due to some artificial and natural activities. Identification of groundwater pollution sources is a major step in groundwater pollution remediation. A pollution source is said to be known only when its source characteristics (location, strength and duration of pollution activity) are known. Identification of unknown groundwater pollution source is an inverse problem, which is generally ill posed due to existence of local minima. This problem becomes more complex for real field conditions, when the lag time (defined as the time difference between the first reading at the observation well and the time when source becomes active) is not known. Genetic Algorithm (GA) based simulation optimization methodology has been used in this study for complete identification of unknown groundwater pollution source. GA is non-gradient based search technique and it is capable of finding the global optimum. A contaminant transport model, which can simulate the concentrations at the observation well location, is combined with the GA based optimization simulation model. The performance of the developed methodology is evaluated for one and two dimensional cases with error free and erroneous concentration measurement data. Performance results show the capability and practical applicability of proposed methodology. Main advantage of the proposed methodology is that complete identification of unknown groundwater pollution source is possible with the help of only one observation well when the lag time is also not known.
Key-Words / Index Term
Groundwater Pollution, Genetic Algorithm, Inverse Problem, Optimization, Pollution source identification
References
[1] V. Batu, M.T. van Genuchten, “First and third type boundary conditions in two dimensional solute transport modeling”, Water Resourc. Res., Vol. 26, Issue.2, pp. 339-350, 1990.
[2] K. Deb, “Optimization for engineering design: Algorithms and examples”, Prentice-Hall Publisher, Delhi, 1995.
[3] R.A. Deninger, “System analysis of water supply systems”, Water Resourc. Bull., Vol. 6, Issue.4, pp. 573-579, 1970.
[4] S.M. Gorelick, “A review of distributed parameter groundwater modeling methods”, Water Resour. Res., Vol. 19, Issue.2, pp. 305-319, 1983.
[5] T. Maddock III, “Algebraic technological function from a simulation model”, Water Resourc. Res., Vol. 8, Issue.1, pp. 129-134, 1972.
[6] P.S. Mahar, B. Datta, “Optimal monitoring network and ground-water pollution source identification”, J. Water Resour. Plng. And Mgmt., ASCE, Vol. 123, Issue.4, pp. 199-207, 1997.
[7] P.S. Mahar, B. Datta, “Identification of pollution sources in transient groundwater systems”, Water Resour. Mgmt., Vol. 14, Issue.3, pp. 209-227, 2000.
[8] P.S. Mahar, B. Datta, “Optimal Identification of groundwater pollution sources and parameter estimation”, J. Water Resour. Plng. And Mgmt., ASCE, Vol. 127, Issue.1, pp. 20-29, 2001.
[9] A. Ogata, R.B. Banks, "A solution of the differential equation of longitudinal dispersion in porous media", U.S. Geol. Surv., Prof. Pap. No. 411-A, 1961.
[10] A. Peck, S.M. Gorelick, G. de Marsily, V. Kovalevsky, “Consequences of spatial variability in aquifer properties and data limitation for groundwater modeling practice”, J. Water Resour. Plng. And Mgmt., ASCE, Vol. 116, Issue.5, pp. 676-692, 1988.
[11] R.M. Singh, B. Datta, A. Jain, “Identification of unknown groundwater pollution sources using artificial neural networks”, J. Water Resour. Plng. & Mgmt, ASCE, Vol. 130, Issue.6, pp. 506-514, 2004.
[12] R.M. Singh, B. Datta, “Identification of groundwater pollution sources using GA-based linked simulation optimization model”, Journal of Hydrologic Engineering, ASCE, Vol. 11, Issue.2, pp. 101-109, 2006.
[13] Y. K. Tung, C. E. Kolterman, “Some computational experiments using embedding technique for groundwater management”, Groundwater, Vol. 23, Issue.4, pp. 455-464, 1985.
Citation
Md. Ayaz, "Groundwater Pollution Source Identification Using Genetic Algorithm Based Optimization Model," International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.65-72, 2017.