Detection of Longest Common Sub Sequence in Normal DNA and Dengue Virus Affected Human DNA using Self Organizing Map
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.1-7, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.17
Abstract
Bioinformatics is an active research area which combines biological matter as well as computer science research. Detection of disease causing human Deoxyribo Nucleic Acid (DNA) sequence analysis is one of the major application areas under bioinformatics. Among the severe diseases, the number of Dengue cases and deaths are raised in Tamil Nadu. Identification of sequence motifs involved in Dengue virus is essential for early prediction and saving human life. It includes wide ranges of steps for disease diagnosing. The scope of this proposed work is to provide the longest common subsequence which present in a normal and Dengue virus affected human DNA sequence. The human DNA sequences are collected from National Center for Biotechnology Information (NCBI) database. Human DNA sequence is separated as k-mer using k-mer separation rule. From that, the separated k-mers are clustered using Self Organizing Map (SOM) algorithm. In which mean, median and standard deviation are used as features for clustering k-mers. Then obtained k-mers clusters are given to the Longest Common Subsequence (LCSS) algorithm to find common subsequence with higher length, which presents in every k-mers clusters. Time consumption for identification of LCSS is compared for both normal and Dengue virus affected DNA.
Key-Words / Index Term
Bioinformatics, K-mers, Longest Common Sub Sequence (LCSS), String pattern matching algorithms
References
[1] Vinayak Majki, Sudip Paul and Rachna Jain, “Bioinformatics for Healthcare Applictions”, IEEE Conference, pp.2014-207, 2019.
[2] Terasa K.Attwood, David J.Parry-Smith and Phukan, Introduction to bioinformatics, Noida(U.P), India: Pearson India Education Services Pvt. Ltd, pp.221, 2008.
[3] Izzat Alsmadi and Maryam Nuser, “String Matching Evaluation Methods for DNA Comparison”, International Journal of Advanced Science and Technology”, Vol.47, pp.13-32, 2012.
[4] Sasikala S, Ratha Jeyalakshmi T, “Extensive Review on Computational Predictions of Genomic Regulatory Sequences”, International Journal of Computer Sciences and Engineering, Vol.07, Issue.08, pp.91-94, 2019.
[5] Amit U Sinha and Raj Bhatnagar, “Efficient and Scalable Motif Discovery using Graph-based Search”, IEEE symposium on Computational Intelligence in Bioinformatics and Computational Biology, pp.197-204, 2007.
[6] Khumukcham Robindro, Ashoke Das, “Effectiveness of Ssaha Algorithm for Searching Motif in Large Databases of DNA Sequences” , International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.79-87, 2017.
[7] S.Rajesh, S.Prathima and Dr.L.S.S.Reddy, “Unusual Pattern Detection in DNA Database using KMP Algorithm”, International Journal of Computer Applications (0975-8887), Vol.1, Issue.22, pp.1-5, 2010.
[8] Benjamin Schuster-Bockler and Alex Bateman, “Protein interactions in human genetic diseases”, Genome Biology, Vol.9, Issue 1, Article R9, pp.R9.1-R9.12, 2008.
[9] Chein-Hung Huang, Huai Shun Peng and KA-Lok Ng, “Prediction of Cancer Proteins by Integrating Protein Interaction, Domain frequency and Domain Interaction Data using Machine Learning Algorithms”, BioMed Research International, Vol.2015,pp.1-10, 2015.
[10] Lei Yang, Xudong Zhao and Xianglong Tang, “Predicting Disease-Related Proteins Based on Clique Backbone in Protein-Protein Interaction Network”, International Journal of Biological Sciences, Vol.10, Issue.7, pp.677-688, 2014.
[11] Pankaj Bhanbri, O.P. Gupta, “Phylogenetic Tree Construction for Distance based Methods”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.142-149, 2017.
[12] Sumedha S.Gunawardena, “Optimum-time, Optimum-space, Algorithms for k-mer Analysis of Whole Genome Sequences”, Journal of Bioinformatics and Comparative Genomics, Vol.1, pp.1-12, 2014.
[13] Teuvo Kohonen and Panu Somervuo, “Self-organizing maps of symbol strings”, Elsevier, Neurocomputing 21, pp.19-30, 1998.
[14] Marghny Mohamed, Abeer A. Al-Mehdhar, Mohamed Bamatraf and Moheb R.Girgis, “Enhanced Self-Organizing Map Neural Network for DNA Sequence Classification”, Intelligent Information Management, Vol.5, pp.25-33, 2013.
[15] Dr.S.A.M.Rizvi and Pankaj Agarwal, “A New Bucket-Based Algorithm for Finding LCS from two given Molecular Sequences”, IEEE, Third International Conference on Information Technology: New Generations, 2006.
[16] Xuyu Xiang, Dafang Zhang and Jiaohua Qin, “A New Algorithm for the Longest Common Subsequence Problem”, IEEE, International Conference on Computational Intelligence and Security Workshops, pp.112-115, 2007.
[17] Coasts S. Iliopoulos and M. Sohel Rahman, “Algorithms for Computing Variants of the Longest Common Subsequence Problem”, Elsevier – Theoretical Computer Science, pp.255-267, 2008.
Citation
G. Tamilpavai, C. Vishnuppriya, "Detection of Longest Common Sub Sequence in Normal DNA and Dengue Virus Affected Human DNA using Self Organizing Map," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.1-7, 2020.
Watermarking Image Depending on Mojette Transform for Hiding Information
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.8-12, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.812
Abstract
This paper describes a new image watermarking method for which is suitable for both copyright protection and information hiding. The presented method is based upon the morphological mathematics properties of the Mojette Transform [1,2] and the Mojette Phantoms[3]. The main properties of the Mojette transform are briefly introduced and the concept of linked phantoms which depicts the null space of the operator is presented. In this paper the Mojette Phantoms can be used not only as the embedded watermark, but also can be used as the mark which is inscribed with some certain information, e.g. Chinese characters. Corresponding embedding and extractions of either the mark or the hidden message are then described. Finally, experimental results are presented in the last section.
Key-Words / Index Term
Mojette, Watermarking, Transform, Hiding, Image
References
[1] N. Normand, JP. Guédon, “La transformée Mojette: une représentation redondante pour l`image”, Comptes rendus Académie des sciences de Paris, theoretical computer science section, p. 124-127. January 1998.
[2] F. Autrusseau, J. V. Guedon, and Y. Bizais. Mojette cryptomarking scheme for medical images. Volume 5032, pages 958–965. SPIE, 2003.
[3] F Autrusseau, JV Guedon Image Watermarking for Copyright Protection and Data Hiding via the Mojette Transform Proceedings of SPIE, 2002
[4] J. RADON. Ober die Bestimmung von Funktio-nen durch ihre Integralwerte l¨angs gewisser Mannigfaltigkeiten. Computed Tomography, 27, 1983.
[5] F. Autrusseau, A. Saadane, D. Barba “ Psychovisual Approach for Watermarking", SPIE Electronic Imaging: Security and watermarking of multimedia contents, January 2001, San Jose, CA.
[6] M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems” , Proc. SPIE Electronic Imaging Security and watermarking of multimedia contents, San Jose, CA, Vol. 3657, p. 226-239, January 1999.
[7] JP. Guédon, B. Parrein, N. Normand, “Internet distributed image databases", Integrated Computer Aided Engineering, Vol.8, p. 205-214, 2001.
[8] M. Katz, “Questions of uniqueness and resolution in reconstruction from projections”, Springer Verlag, 1977.
[9] Hewa Majeed Zangana, “Watermarking System Using LSB”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 19, Issue 3, Ver. II, P. 75-79, (May.-June. 2017).
[10] Harshal V. Patil1, B. H. Barhate2, "A Review Paper on Data Hiding Techniques: Stegnography", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.64-67, 2018
[11] Manisha Verma, Hardeep Singh Saini, "Analysis of Various Techniques for Audio Steganography in Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.2, pp.1-5, 2019
Citation
Hewa Majeed Zangana, "Watermarking Image Depending on Mojette Transform for Hiding Information," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.8-12, 2020.
Implementation of Iris Recognition Using Circular Hough Transform and Template Generation
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.13-16, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.1316
Abstract
Iris recognition is considered as one of the reliable technique in biometric system to gain higher security. In this paper research is focusing on an efficient iris recognition technique. Iris of an eye image is segmented, unwrapped into a rectangular strip and normalized. Normalized iris is transformed into polar coordinate and filtered. A mask is applied for noise suppression and encoded using encoding technique. This encoded iris pattern features are extracted and template is generated. This final template is stored in the database and input image template pattern is matched using pattern matching technique. This experiment uses two standard database images CASIA V1.0 and IITD, the performance measure FAR and FRR for different threshold values is considered for the evaluation of the system.
Key-Words / Index Term
FAR, FRR, Feature Extraction, Wavelets Transform
References
[1] Sudha Gupta, Asst. Professor ,LMIETE, LMISTE, Viral Doshi, Abhinav Jain and Sreeram Iyer, K.J.S.C.E. Mumbai India,”Iris Recognition System using Biometric Template Matching Technology”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 12, pp. 3075-3083 2017© Research India Publications. http://www.ripublication.com
[2] Aditya Nigam, Lovish, Amit Bendale and Phalguni Gupta, “Efficient Iris Recognition System Using Relational Measures” Department of Computer Science and Engineering, Indian Institute of Technology Kanpur Kanpur 208016, INDIA fnaditya,lovishc,bendale,pgg@cse.iitk.ac.in
[3] Sunil Swamilingappa Harakannanavar1, C. R. Prashanth2, Vidyashree Kanabur3, Veena I. Puranikmath4 and K. B. Raja5,” An Extensive Study of Issues, Challenges and Achievements in Iris Recognition ” Asian Journal of Electrical Sciences ISSN: 2249-6297, Vol. 8, No. 1, pp. 25-35, 2019 © The Research Publication, www.trp.org.in
[4] Shailender Kumar1, Krishnanand Mishra2 and Rahul Vashisht3, ” Iris Recognition Based on Unique Iris Templates for Reliable Personal Authentication”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 12 pp. 3075-3083, 2017 © Research India Publications. http://www.ripublication.com
[5] Mohammed A. M. Abdullah, F. H. A. Al-Dulaimi, Waleed Al-Nuaimy & Ali Al-Aataby, “Efficient Small Template Iris Recognition System Using Wavelet Transform” International Journal of Biometrics and Bioinformatics (IJBB), Volume (5): Issue (1) 16.
[6] Sudha Gupta, Viral Doshi, Abhinav Jain and Sreeram Iyer,”Iris Recognition System using Biometric Template Matching Technology” © International Journal of Computer Applications (0975 – 8887) Volume 1 – No. 2, 2010
[7] Humayan Kabir Rana1, Md. Shafiul Azam2, Mst. Rashida Akhtar3 3 , Julian M.W. Quinn4, and Mohammad Ali Moni5, “A fast iris recognition system through 1 optimum feature extraction”, PeerJ Preprints | https://doi.org/10.7287/peerj.preprints.27363v3 | CC BY 4.0 Open Access | rec: 23 Feb 2019, publ: 23 Feb 2019.
[8] D. Woodward, M. Orlans, T. Higgins “Biometrics”, McGraw-Hill, Barkeley, California, pp. 15-21, 2002.
[9] H. Proença, A. Alexandre. “Towards noncooperative iris recognition: A classification approach using multiple signatures”. IEEE Transaction on Pattern Analysis, 29(4): 607-.612, 2007.
[10] J. Daugman, ”High confidence visual recognition of persons by a test of statistical independence”. IEEE Transaction on Pattern Analysis, 15(11): 1148-1161, 1993.
[11] W. Boles, B. Boashash. “A Human Identification Technique Using Images of the Iris and Wavelet Transform”. IEEE Transactions on Signal Processing, 46(4): 1085–1088, 1998.
[12] S. Hariprasath, V. Mohan. “Biometric Personal Identification Based On Iris Recognition Using Complex Wavelet Transforms”. Proceedings of the 2008 International Conference on Computing, Communication and Networking (ICCCN) IEEE, 2008.
[13] A. Kumar, A. Passi. “Comparison and Combination of Iris Matchers for Reliable Personal Identification”. Computer Vision and Pattern Recognition Workshops, IEEE, 2008.
[14] Daugman, J.: Biometric personal identi_cation system based on iris analysis (Mar 11994), uS Patent.
[15] Sun, Z., Tan, T.: Ordinal measures for iris recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(12), 2211{2226, 2009.
[16] Masek, L., et al.: Recognition of human iris patterns for biometric identifcation. M. Thesis, The University of Western Australia, 2003.
[17] R. Wildes, J. Asmuth, G. Green, S. Hsu, and S. Mcbride. “A System for Automated IrisRecognition”, Proceedings IEEE Workshop on Applications of Computer Vision, Sarasota,FL, USA, 1994.
[18] K. Dmitry “Iris Recognition: Unwrapping the Iris”. The Connexions Project and Licensed Under the Creative Commons Attribution License, Version 1.3., 2004.
[19] L. Yu, D. Zhang, K. Wang and W. Yang, “Coarse iris classification using box-counting to estimate fractal dimensions”, International Journal on Pattern Recognition, Vol. 38, No. 11, pp. 1791-1798, 2005.
[20] http://www.jiristech.com/download/jpc_series.pdf
[21] http://biometrics.idealtest.org/findTotalDbByMode.do?mode=Iris
Citation
A. A. Halder, S. R. Pande, "Implementation of Iris Recognition Using Circular Hough Transform and Template Generation," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.13-16, 2020.
Early Sepsis Prediction in Intensive Care Patients using Random Forest Classifier
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.17-22, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.1722
Abstract
Sepsis is one of the most common causes of morbidity and mortality in the Intensive Care Unit (ICU) patients. The lack of sensitive and specific clinical and laboratory variables for early identification of sepsis in critically ill patients is the causative factor for needless and delayed or untimely interruption of a proper antibiotic therapy. The current work developed a machine learning-based early sepsis prediction model in intensive care patients with vital parameters which evaluated the goodness of model fit and its accuracy. The predictors were extracted from combinations of vital sign measure and their changes over time. The dataset consisted of 20,336 patients (medical and surgical) who were admitted in ICU. Random Forest Classifier was used as the Machine learning algorithm for developing a predictive model. For the early prediction of sepsis in ICU patients, the Random Forest Classifier achieved an AUROC curve of 0.58 for the data collected from the patients within 24 hours. Sepsis is being the common cause of admission in ICU worldwide, a machine learning technique adopting statistical methods to conclude relationships between patient features and outcomes in large data set was successfully applied to predict adverse events.
Key-Words / Index Term
MachineLearning, EarlySepsisprediction, Random Forest Classifier, AUROC
References
[1] V. Ribas, A.Vellido, J. Rodriguez, J. Rello, “Severe sepsis mortality prediction with logistic regression over latent factors”, Expert Systems with Applications, pp. 1937-1943, 2012.
[2] S. Chatterjee, M. Bhattacharya, S. Todi, “Epidemiology of Adult population Sepsis in India: A single centre 5 year experience”, Indian Journal of Critical CareMedicine, pp. 35-39, 2017.
[3] A. Johnso, M. Ghassemi, S. Nemati, K. Niehaus, D. Clifton, G. Clifford, “Machine learning and Decision Support in Critical Care”, In the Proceedings of 2016 IEEE . Institute of Electrical and Electronics Engineers, no. 2 (vol. 104), pp. 444-466.
[4] S. Nemati, A. Holder, F. Razmi, M. Stanley, G. Clifford and T. Buchman, “An In- terpretable Machine Learning Model for Accurate Prediction of Sepsis in the ICU”, Critical Care Medicine, vol. 46, no. 4, pp. 547–553 ,2018.
[5] A.Vellido, F. Schleif and M. Biehl, ”Advances in machine learning and computational intelligence”, Neurocomputing, vol. 72, no. 7-9, pp. 1377-1378, 2009.
[6] K. Barajas, R. Akella, “Prediction of Pysiological Subsystem Failure and its Impact in the prediction of Patient Mortality”, In the Proceedings of IEEE, Internaltional Conference on Big Data, 2015.
[7] P. Thottakkara, T. Ozrazgat-Baslanti, B. Hupf, P. Rashidi, P. Pardalos, P. Momcilovic, A. Bihorac, “Application of Machine learning Techniques to High Dimensional Clinical to Forecast Postoperative Complications”, PLOS ONE, vol. 11, no. 5, 2016.
[8] S. Bhattacharya, V. Rajan, H. Shrivastava, “ICU Mortality Prediction: Classification Algorithm for Imbalanced Datasets”,In the Proceedings of the 31st AAAI Conference on Artificial Intelligence (AAAI-17), pp. 1228-1294, 2017.
[9] Soni, HK., “Machine Learning – A New Paradigm of AI”, International Journal of Scientific Rsearch in Network Security and Communication, pp. 31-32,2019
[10] Ghosh, S. & Waheed, Sajjad, “Strategic Analysis of classification algorithms for liver disease diagnosis”, Journal of Science Technology and Environment Informatics,pp. 361-370, 2017.
Citation
Aparna Shenoy, K.V. Viswanatha, Raju Ramakrishna Gondkar, "Early Sepsis Prediction in Intensive Care Patients using Random Forest Classifier," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.17-22, 2020.
PCNN - Firefly Based Segmentation and Analysis of Brain MRI
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.23-29, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.2329
Abstract
In this proposed method, the segmentation of brain Magnetic Resonance Images (MRI) has been carried out using Pulse Coupled Neural network (PCNN) and classification by Back Propogation Neural Network (BPNN) techniques. The proposed method includes five stages pre-processing, clustering, feature extraction, feature selection and classification. For extracting the features Non Sub-sampled Contourlet Transform (NSCT) method has been used. For feature selection optimized Fire-fly intelligence has been preferred. Finally, the selected features are given to BPNN to identify the input data either as normal or abnormal. The performance of the classifier was evaluated in terms of True Positive (TP), True Negative (TN), False Positive (FP), False Negative (FN) and the accuracy was found to be good.
Key-Words / Index Term
PCNN, NSCT, Feature extraction, feature selection. Fire-fly, MR Brain Image
References
[1] D.Selvaraj, R., Dhanasekaran, A Review on Tissue Segmentation and Feature Extraction of MRI Brain Images, International journal of computer science & Engineering Technology,Vol. 4,pp. 1313-1332, 2013
[2] Iztok Fister, Iztok Fister Jr., Xin-She Yang, Janez Brest, A Comprehensive review of Firefly Algorithms, Swarm and Evolutionary Computation, Vol.13, pp. 34–46, 2013.
[3] Susana M., Vieira, Luís, F., Mendonça, Gonçalo J., Farinha, João M.C., and Sousa, Modified Binary PSO for Feature Selection using SVM Applied to Mortality Prediction of Septic Patients, Applied Soft Computing, Vol. 13, No. 8, pp. 3494–3504, 2013
[4] Ashish Kumar Bhandari, Vineet Kumar Singh, Anil Kumar, Girish Kumar ingh, Cuckoo Search Algorithm and Wind Driven Optimization based Study of Satellite Image Segmentation for Multilevel Thresholding using Kapur’s Entropy, Expert Systems with Applications, Vol. 41, No. 7, pp.3538–3560, 2014.
[5] Amita Kumari and Rajesh Mehra, Hybridized Classification of Brain MRI using PSO & SVM, International Journal of Engineering and Advanced Technology (IJEAT), Vol. 3, No. 4, pp. 319-323, 2014.
[6] Abdenour, Mekhmoukhand Karim Mokrani, Improved Fuzzy C-Means Based Particle Swarm Optimization (PSO) Initialization and Outlier Rejection with Level Set Methods for MR Brain Image Segmentation,Computer Methods and Programs in Biomedicine,Vol. 122, No. 2, pp. 266-281, 2015.
[7] Nguyen Cong Long, Phayung Meesad, and Herwig Unger, A highly Accurate Firefly based Algorithm for Heart disease Prediction, Expert Systems with Applications, Vol. 42, No.21, pp.8221–8231, 2015.
[8] Kuntimad, G and Ranganath, H.S, Perfect Image Segmentation using Pulse Coupled Neural Networks, IEEE Transactions on neural networks, Vol. 10, No.3, pp. 591-598, 1999.
[9] Liu Xiaofang, ChengDansong, Tang Xianglong, Liu Jiafeng (2008), Image Segmentation based on Pulse Coupled Neural Network, IEEE Conference on information sciences,pp. 744-748.
[10] Jhon L. Johnson and Mary Lou Padgett, PCNN Models and Applications , IEEE Transactions on neural networks, Vol. 10,No. 3, pp. 480-498, 1999.
[11] B.Thamaraichelvi, G.Yamuna, Application of various segmentation techniques for brain mri –a comparative study, International Journal of Advances in Engineering & Technology, Vol. 7, Issue 5, pp. 1434-1442, 2014.
[12] He Xiaolan and Wu Yili, Texture Feature Extraction Method Combining Non- sub sampled Contour Transformation with Gray Level Co-Occurrence Matrix, Journal of multimedia, Vol. 8, No. 6, pp. 675-684, 2013.
[13] Xin-She Yang, Firefly Algorithms, Nature-Inspired Optimization Algorithms, Chapter 8, pp. 111-127, 2014.
[14] Vanita Jain, Aarushi Jain, Achin Jain, Arun Kumar Dubey, Comparative Study between FA, ACO, and PSO Algorithms for Optimizing Quadratic Assignment Problem, Research Paper | Isroset-Journal (IJSRCSE), Vol.6 , Issue.2 , pp.76-81, Apr-2018. doi: https://doi.org/10.26438/ijsrcse/v6i2.7681,
[15] G.R.Shahmohammadi, Kh.Mohammadi, Key Management in Hierarchical Sensor Networks Using Improved Evolutionary Algorithm, Research Paper | Journal (IJSRNSC), Vol.4 , Issue.2 , pp.5-14, Apr-2016.
Citation
B. Thamaraichelvi, "PCNN - Firefly Based Segmentation and Analysis of Brain MRI," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.23-29, 2020.
A Hybrid Classification Algorithm Using Landmark Based Spectral Clustering
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.30-39, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.3039
Abstract
Landmark-based Spectral Clustering (LSC) is used for large scale spectral clustering. The basic idea of the our approach is designing an efficient way for graph construction. K nearest neighbors is a simple algorithm that stores all available cases and classifies new cases based on a similarity measure like distance functions. k-NN is a type of instance-based learning, or lazy learning. In this field, the CRF approach is relatively novel and considered a prominent choice as compared to other methods. However, a lot of scope for further enhancement of the CRF(Conditional Random Field) with Knn optimization problem. The Performance of CRF-Knn has shown quite significant resultsand using different datasets in this paper.The proposed technique improves the selection process using KNN algorithm. The results obtained show that the CRF found to be better than that of LSC in terms of Accuracy, time, recall and precision.
Key-Words / Index Term
Landmark-based Spectral clustering, K nearest neighbors, CRF, Accuracy, time, precision and recall
References
[1] Smita,Priti Sharma,”Use of Data Mining in Various Field: A Survey Paper”,IOSR Journal of Computer Engineering (IOSR-JCE)7Volume 16,pp.18-21,2014.
[2] Dhara Patel, Ruchi Modi , Ketan Sarvakar “A Comparative Study of Clustering Data Mining: Techniques and Research Challenges”, IJLTEMAS, Volume 3, 2014.
[3] Amit Tate,Bajrangsingh Rajpurohit, Jayanand Pawar,UjwalaGavhance,”Comparative Analysis used for Disease Prediction in Data Mining”,International Journalof Engineering and Techniques, Volume 2, 2016.
[4] Thair Nu Phyu ,”Survey of Classification Techniques in Data Mining “,International MultiConference of Engineers and Computer Scientists,Volume 1, 2009.
[5] Neha Midha,Vikram Singh,“A Survey on Classification Techniques in Data Mining”, International Journal of Computer Science & Management Studies, Volume 16, 2015
[6] Deng, Zhenyun, Xiaoshu Zhu, Debo Cheng, Ming Zong,Shichao Zhang. "Efficient kNN classification algorithm for big data.",proceedings Neurocomputing 195 ,2016.
[7] Iyer, S. Jeyalatha,R. Sumbaly, “Diagnosis of Diabetes using Classification Mining Techniques”, IJDKP, Volume 5, pp. 1-14, 2015.
[8] Jasmina novakovic, “Experimental Study Of Using The K-Nearest Neighbour Classifier With Filter Methods,” in computer science and technology at varna, Bulgaria.
[9] Imandoust, Sadegh Bafandeh, Mohammad Bolandraftar. "Application of k-nearest neighbor (knn) approach for predicting economic events: Theoretical background." International Journal of Engineering Research and Applications 3.5 2013.
[10] Amir ali, “An Intuitive Guide of K-Nearest Neighbor with Practical”, Wavy AI Research Foundation in k-Nearest Neighbor.
[11] Arslan, Farrukh. "An Efficient K-Nearest Neighbor Algorithm to Determine SOP File System." ,2018.
[12] Shufeng chen , “K-Nearest Neighbor Algorithm Optimization in Text Categorization” IOP conference series, earth and environment sciences.
[13] Yun-lei cui , “A KNN Research Paper Classification Method Based on Shared Nearest Neighbor” , Proceedings of NTCIR-8 Workshop Meeting,Tokyo, Japan,2010.
[14] Khalid Alkhatib, “Stock price prediction using KNN algorithm” in International Journal of Business, Humanities and Technology Volume 3,2013.
[15] H.P. Channe ,Sayali.D.Jadhav ,“ Comparative Study of K-NN, Naive Bayes and Decision Tree Classification Techniques”, International Journal of Science and Research (IJSR),Volume 5, 2016
[16] Ramana, Bendi Venkata, M. Surendra Prasad Babu, N. B. Venkateswarlu. "A critical study of selected classification algorithms for liver disease diagnosis." International Journal of Database Management Systems , Volume 3,2011.
[17] Rajkumar ,G. S. Reena, “Diagnosis of Heart Disease Using Datamining Algorithm,” Global Journal of Computer Science and Technology, Volume 10, 2010.
[18] Fadl Mutaher Ba-Alwi ,Houzifa M. Hintaya,” Comparative Study for Analysis the Prognostic in Hepatitis Data: Data Mining Approach”, International Journal of Scientific & Enginerring Research, Volume 4, 2013..
[19] Rohit Arora,Suman“ comparative Analysis of Classification Algorithms on Different using WEKA”, International Journal of Computer Applications ,Volume 54,2012.
[20] Samir Kumar Sarangi , Dr. Vivek Jaglan, Yajnaseni Dash ,“ A Review of Clustering and Classification Techniques in Data Mining”,International Journal of Engineering, Business and Enterprise Applications,2015.
[21] Marie Fernandes,” Data Mining: A Comparative Study of its Various Techniques and its Process”, International Journal of Scientific Research in Computer Science and Engineering Volume-5, Issue-1, pp.19-23, 2017(E-ISSN: 2320-7639).
[22] Himanshi , Komal Kumar Bhatia,” Prediction Model for Under-Graduating Student’s Salary Using Data Mining Techniques”, International Journal Scentific Research in Network Security and Communication, Volume-6, Issue-2, April 2018(ISSN: 2321-3256).
Citation
Shivani Walia, P S Mann, "A Hybrid Classification Algorithm Using Landmark Based Spectral Clustering," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.30-39, 2020.
A Hybrid Data Clustering Technique in Big Data using Machine Learning
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.40-47, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.4047
Abstract
Big Data refers to a huge collection of data like the Banking data, social media data, repository data etc. These types of fields are responsible for day to day relevant data retrieval and processing. Clustering is one of major tasks which are done for data in order to minimize the time delay and efficient information retrieval. In this work we worked on similarity index in the form of cosine and soft cosine to count the total connection with respect to documents in the form of data. Then we use Cosine and Soft Cosine measures as hybrid Similarity algorithm to intakes the threshold policy of K means and co relation linkage property of Linkage clustering and forms new clusters. The cross-validation of the proposed work model has been done using Support Vector Machine followed by K-Mediod to improve the accuracy of clustering. This research work also focuses on different techniques of Clustering as well as classification. This research work mainly focuses on optimizing the clustering performance of the Big Data so that wealthy information can be retrieved with least cost.
Key-Words / Index Term
Data mining, Big data, Clustering, Classification, Support Vector Machine
References
[1] Dipti Shikha Singh and Garima Singh, “Big Data: A Review”, International Research Journal of Engineering and Technology (IRJET), Vol. 04, No. 04, pp. 822-824, 2017
[2] Richa Gupta, Sunny Gupta, and Anuradha Singhal, "Big data: overview" International Journal of Computer Trends and Technology (IJCTT), Vol. 9, No. 5, pp. 266-268, 2014
[3] S. Gnanapriya, R. Suganya, G. Sumithra Devi, and M. Suresh Kumar, "Data Mining Concepts and Techniques", Data Mining and Knowledge Engineering, Vol. 2, no. 9, pp: 256-263, 2010
[4] T. Sajana, CM Sheela Rani, and K. V. Narayana, “A survey on clustering techniques for big data mining”, Indian Journal of Science and Technology, Vol. 9, no. 3, 2016.
[5] V. W. Ajin, and Lekshmy D. Kumar, "Big data and clustering algorithms", In IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS), pp. 1-5, 2016.
[6] Raj Kumar, and Rajesh Verma, "Classification algorithms for data mining - A survey", In the International Journal of the Innovations in Engineering and Technology (IJIET), vol. 1, no. 2, pp: 7-14. 2012.
[7] Ahmed Oussous, Fatima-Zahra Benjelloun, Ayoub Ait Lahcen, and Samir Belfkih, “Big Data Technologies: A Survey”, Journal of King Saud University-Computer and Information Sciences, 2017.
[8] Adil Fahad, Najlaa Alshatri, Zahir Tari, Abdullah Alamri, Ibrahim Khalil, Albert Y. Zomaya, Sebti Foufou, and Abdelaziz Bouras, “A survey of clustering algorithms for big data: Taxonomy and empirical analysis”, IEEE transactions on emerging topics in computing, Vol. 2, no. 3, pp: 267-279, 2014
[9] G. Kesavaraj, and S. Sukumaran. "A study on classification techniques in data mining." In IEEE Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1-7. 2013.
[10] R. Tamilselvi and S. Kalaiselvi, "An Overview of Data Mining Techniques and Applications", International Journal of Science and Research (IJSR), Vol. 2, No. 2, pp. 506-509, 2013.
[11] Praful Koturwar, Sheetal Girase, and Debajyoti Mukhopadhyay, "A survey of classification techniques in the area of big data", arXiv preprint arXiv: 1503.07477, 2015.
[12] V. W. Ajin, and Lekshmy D. Kumar, "Big data and clustering algorithms", In IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS), pp. 1-5. 2016.
[13] Ahmed Oussous, Fatima-Zahra Benjelloun, Ayoub Ait Lahcen, and Samir Belfkih, “Big Data Technologies: A Survey”, Journal of King Saud University-Computer and Information Sciences, 2017.
Citation
K. Sharma, P. Rehan, "A Hybrid Data Clustering Technique in Big Data using Machine Learning," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.40-47, 2020.
Review of Best Teaching Methodologies in Rural Areas
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.48-52, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.4852
Abstract
This paper extracts and broadens rural teachers’ most effective proclaimed motivating strategies. From the data generated by 2 years of mixed method research in rural college, these strategies appeared as among the most victorious. Selection of best practices was formed on a synthesis of what both teachers and students reported as making the greatest positive impact on their colleges’ related motivation. Teaching strategies are illustrated by multiple exhaustive examples from teachers’ interviews. Strategies are i) start with your classroom set up, ii) make digital citizenship a priority, iii) teach mini-lessons before using devices, iv) use the power of choice, v) remember that sharing is caring, vi) conduct teacher check-ins etc. The teaching methodology is surveyed through the college. The surveyed data is plotted using histogram graph method using MATLAB platform. Histogram is a graphical display of data using bars of different heights. It is similar to a bar chart, but a histogram group’s number into ranges. The height of each bar shows how many fall into each range.
Key-Words / Index Term
MATLAB, histogram, rural colleges, teaching strategies, motivation
References
[1] Charles Stangor "Research Methods For The Behavioral Sciences". Wadsworth, Cengag Learning. ISBN 9780840031976. 2011
[2] David W. Scott (December). "Averaged shifted histogram". Wiley Interdisciplinary Reviews: Computational Statistics. 2:2 (2): 160–164. doi:10.1002/wics.54. 2009.
[3] Dean, S., & Illowsky, B. (February 19). Descriptive Statistics: Histogram. Retrieved from the Connexions Web site: http://cnx.org/content/m16298/1.11/, 2009.
[4] Freedman, D.; Pisani, R.; Purves, R. Statistics (Third ed.). W. W. Norton. ISBN 978-0-393-97083-8. 1998.
[5] Howitt, D.; Cramer, D. Introduction to Statistics in Psychology (Fourth ed.). Prentice Hall. ISBN 978-0-13-205161-3. 2008
[6] M. Eileen Magnello (December). "Karl Pearson and the Origins of Modern Statistics: An Elastician becomes a Statistician". The New Zealand Journal for the History and Philosophy of Science and Technology. 1 volume. OCLC 682200824. 2006
[7] Nancy R. Tague. "Seven Basic Quality Tools". The Quality Toolbox. Milwaukee, Wisconsin: American Society Quality. p. 15. Retrieved 2010-02-05, 2004
[8] Naomi, Robbins. "A Histogram is NOT a Bar Chart". Forbes.com. Forbes. Retrieved 31 July 2018.
[9] Nicholls, J.G. Achievement motivation: Conceptions of ability, subjective experience, task choice, and performance. Psychological review, 91, 328-346. 1984.
[10] Pearson, K."Contributions to the Mathematical Theory of Evolution. II. Skew Variation in Homogeneous Material" (PDF). Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences. 186: 343–414. Bibcode:1895RSPTA.186..343P. doi:10.1098/rsta.1895.0010. 1895
[11] Pintrich, P.R. A motivational science perspective on the role of student motivation in learning and teaching contexts. Journal of educational psychology, 95(4), 667-686, 2003.
[12] Quaglia, R. J., & Cobb, C. D. Toward a theory of student aspirations. Journal of research in rural education, 12(3), 127-132. 1996.
[13] Scott, David W. Multivariate Density Estimation: Theory, Practice, and Visualization. New York: John Wiley. 1992
Citation
A. Sumathi, P. Nithyashankari, "Review of Best Teaching Methodologies in Rural Areas," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.48-52, 2020.
An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.53-56, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.5356
Abstract
Cryptography is widely used technique to provide security in large networks like cloud environments. Classical cryptography and quantum cryptography are two widely used techniques. Classical cryptography uses simple mathematical methods to provide security. So it is more vulnerable to several attacks such as eaves dropping, man-in-the-middle attack etc. But in classical cryptography digital signatures are used to provide best authentication. Quantum cryptography uses quantum mechanical properties to provide security. It uses photons and polarization but it requires more communication rounds. So by combing classical and quantum cryptography to show a new combination. Here we can use implicit user authentication, explicit mutual authentication and we can digital signatures to provide best authentication. The main objectives of this article are design and develop an enhanced anonymity control scheme based on quantum cryptographic techniques. EANCTRL- an enhanced anonymity control scheme based on Quantum key distribution is presented in this article.
Key-Words / Index Term
Quantum Computing, Cryptography, cloud computing, Anonymity in cloud
References
[1] P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu “Optimal Blowfish Algorithm based Technique for Data Security in Cloud” Int. J. Business Intelligence and Data Mining, ISSN online 1743-8195, ISSN print 1743-8187, Vol. 11, No. 2, Pp.171–189.DOI: 10.1504/IJBIDM.2016.10001484. (Inder Science) (UGC Approved). Journal No: 1648, 2016.
[2] P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu “Tripartite partite key assignment scheme for security of cloud data classes” Journal of Theoretical and Applied Information Technology, Vol.95. No 13, ISSN: 1992-8645, E-ISSN: 1817-3195, Pg.No:3116-3126. (Scopus& UGC), Journal No: 23566, 15th July 2017.
[3]Tzonelih Hwang, Kuo-Chang Lee, and Chuan-Ming Li, "Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols," IEEE Transactions on Dependable and Secure Computing,pp. 71-80, Vol. 4, No. 1, March 2007
[4] C.H.Bennett, "Quantum Cryptography Using any Two symmetrical States, "Physical Rev. Letters, vol.68,no. 3121, 1992.
[5] N.Asokhan, V.Niemi, and K. Nyberg, ""Man-in-the-Middle in Tunneled Authentication Protocals," Proc. Int`l Workshop Security Protocols, 2003.
[6] Aysajan Abidin, "Shortcomings of Authentication in Quantum Cryptography and Strongly Universal Hash Functions," Linköping considers in science and innovation, 2010
[7] Tasleem et al., "Cross breed Approach: Combining Classical Cryptography and QKD for Password Authentication," International Journal of Computer Science and Communication Networks, Vol. 2, No. 4, pp. 512-515
[8] Dr.G.Ananda Rao et al., "Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography," Indian Journal of Computer Science and Engineering, pp.143-145, Vol. 2, No. 2, May 2011
[9] T.S.Thangavel and A. Krishnan, "Coordinated Quantum and Classical Key Scheme for Two Servers Password Authentication," Journal of Computer Science, Vol. 6, No. 12, pp. 1396-1405, 2010
[10] M. Bellare and P. Rogaway, "Provably Secure Session Key Distribution: The Three Party Case," Proc. 27th ACM Symposium Theory of Computing, pp. 57-66, 1995.
[11] Mr. P. Dileep Kumar Reddy, “Handover Key Management for Re-Authentication in Cloud Technology for Accessing Data Classes”, International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor:6.887, Volume 5 Issue IX, (UGC Approved)Journal No: 45842, Pg no 1951 to 1953, Doi. 10.22214/IJRASET, September 2017.
Citation
V. Sreenija Reddy, Revathi A., Phani kumar N., "An Enhanced Anonymity Control Scheme based on Quantum Cryptography in Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.53-56, 2020.
Study of Machine Learning vs Deep Learning Algorithms for Detection of Tumor in Human Brain
Research Paper | Journal Paper
Vol.8 , Issue.1 , pp.57-63, Jan-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i1.5763
Abstract
Modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Brain tumor is an abnormal mass of tissue in which some cells grow and multiply uncontrollably, apparently unregulated by the mechanisms that control normal cells. There are three types of tumor that are commonly observed viz. Benign, Pre-Malignant, and Malignant. Many supervised and unsupervised classification algorithms are used for detection of tumor as benign or malignant. Usually lighter datasets are used for image classification in application field where as comparatively larger and heavier datasets are used in case of medical field. Many parameters chosen during training play a very important role in measuring the performance and accuracy of the system. Thus an attempt has been made to clearly show how accuracy of the algorithm varies based on the parameters chosen for detection of brain tumor in human brain for an MRI image.
Key-Words / Index Term
CNN, Transfer Learning, Medical Imaging, Glioma, Image Classification, Machine Learning, Deep Learning
References
[1] V.P.Gladis Pushpa Rathi, Dr.S.Palani ―Brain Tumor Mri Image Classification With Feature Selection And Extraction Using Linear Discriminant Analysis, IEEE 2019.
[2] Toktam Hatami , Mohammad Hamghalam , Omid Reyhani-Galangashi, Sattar Mirzkuchaki , ― A Machine Learning Approach to Brain Tumors Segmentation Using Adaptive Random Forest Algorithm, IEEE 2019.
[3] Lina Chato , Shahram Latifi , Lina Saeed Chato , ― Machine Learning and Deep Learning Techniques to Predict Overall Survival of Brain Tumor Patients using MRI Image , IEEE 2017
[4] MuhammedTalo, UlasBaranBaloglu, OzalYildirim, U RajendraAcharya “Application Of Deep Transfer Learning For Automated Brain Abnormality Classification Using MR Images”, IEEE, 2017
[5] Heba Mohsen, El-Sayed A. El-Dahshan, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem , “Classification using deep learning neural networks for brain tumors “, IEEE, 2017
[6] Angel Cruz-Roa, John Arevalo, Alexander Judkins, AnantMadabhushi, Fabio Gonzalez “A method for Medulloblastoma Tumor Differentiation based on Convolutional Neural Networks and Transfer Learning”, IEEE, 2016
[7] Pankaj Sapra, Rupinderpal Singh, Shivani Khurana, "Brain Tumour Detection Using Neural Network" ,International Journal of Science and Modern Engineering, IJISME ,ISSN: 2319-6386, Volume-1, Issue-9, August 2013.
[8] S Suchita Goswami, Lalit Kumar P. Bhaiya, " Brain Tumour Detection Using Unsupervised Learning based Neural Network" , IEEE International Conference on Communication Systems and Network Technologies,2013.
[9] S. Rajeshwari, T. Sree Sharmila, "Efficient Quality Analysis of MRI Image Using Preprocessing Techniques" ,IEEE Conference on Information and Communication Technologies, ICT 2013.
[10] E. Ben George, M.Karnan, "MRI Brain Image Enhancement Using Filtering Techniques", International Journal of Computer Science & Engineering Technology ,IJCSET, 2012.
[11] Safaa E.Amin, M.A. Mageed," Brain Tumour Diagnosis Systems Based on Artificial Neural Networks and Segmentation Using MRI, IEEE International Conference on Informatics and Systems, INFOS 2012.
[12] Natarajan P, Krishnan.N, Natasha Sandeep Kenkre, Shraiya Nancy, Bhuvanesh Pratap Singh, "Tumour Detection using threshold operation in MRI Brain Images" , IEEE International Conference on Computational Intelligence and Computing Research, 2012.
[13] Stefan Bauer , Lutz-P.Nolte , Mauricio Reyes , ― Fully Automatic Segmentation of Brain Tumor Images Using Support Vector Machine Classification in Combination with Heierarchical Condition Random Field Regularizatio ,IEEE 2011
[14] Dipali M. Joshi, N. K. Rana, V. M. Misra, ―Classification of Brain Cancer Using Artificial Neural Network IEEE International Conference on Electronic Computer Technology, ICECT, 2010.
[15] Arno Klein and Et.al , ―Evaluation of 14 nonlinear deformation algorithms applied to human brain MRI registration Neuro Image IEEE Journals & Magazines,Elsevier Journal, vol 46, Issue 3, July, pg 786-802, 2009.
[16] Lamia Sallemi,Mohamed Ben Slima, Ines NJEH and Ahmed Ben Hamida, Stephane Lehericy and Damien Galanaud, ―A Computer Aided Diagnosis ’CAD’ for Brain Glioma Exploration‖, IEEE 1st International Conference on Advanced Technologies for Signal and Image Processing – ATSIP`2014, March 17-19, Sousse, Tunisia, 2009.
[17] El-Sayed A and et.al , ―Computer-aided diagnosis of human brain tumour through MRI: A survey and a new algorithm Expert Systems with Applications IEEE Journals & Magazines, Elsevier Journal, vol 41, pg 5526-5545, 2009.
[18] Arno Klein and Et.al , ―Evaluation of 14 nonlinear deformation algorithms applied to human brain MRI registration‖, Neuro Image IEEE Journals & Magazines,Elsevier Journal, vol 46, Issue 3, pg 786-802, July 2009.
[19] A.G. Ramakrishnan and Bhanu Prakash K.N, ― MR Image Enhancement by NonLinear Techniques‖, Indian Institute of Science, Dept of Electrical Engineering, Bangalore.
Citation
Dheeraj D., Prasantha H.S., "Study of Machine Learning vs Deep Learning Algorithms for Detection of Tumor in Human Brain," International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.57-63, 2020.