A Chemical-Based Pipeline Maintenance Decision Support System
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.1-6, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.16
Abstract
Pipeline Corrosion Management System is the process of analyzing corrosion status in a crude pipeline by extracting data from a Linear Polarization Resistance (Probe) to monitor corrosion behavior. Petroleum pipelines are prone to corrosion due to the sea water injection into the wells to increased pressure required to force crude from the reservoir. Petroleum pipelines maintenance therefore becomes very necessary so that imminent growth of bacteria and corrosion are eliminated. Many researchers has done tremendous work in detection and treatment corrosion caused mainly by microbial growth but these systems does not recommend appropriate chemicals and quantities for treatment of different types of corrosion discovered. Hence to solve these problems stated we develop a Chemical-Based Pipeline Maintenance Decision Support System. This system offers an online management technique which reads the Probe, extracts corrosion details and proffer chemical treatment if corrosion is found. An Object Oriented Analysis and Design (OOAD) methodology was adopted, while we used PHP programming language at the front end, and MySQL relational database at the backend to achieve this goal. Our findings reveal that corrosion inhibitors and biocides are good treatments for corrosion and bacteria growths in oil pipelines. The Linear Probe is faster for pipeline corrosion detection, treatment and recommendation when compared to the existing Coupon method. This system will give confidence to pipeline operator when handling corrosion detection and treatment and make them deliver their work timely and less expensive
Key-Words / Index Term
Pipeline, Decision Support System, Microbes, Corrosion, Biocides, Inhibitors
References
[1] G.A. Soyode “ Deregulation of the Downstream Sector” Matters Arising. NESG Economic Indicators. Vol.7, Issue.2, pp.55-60, 2001.
[2] C.A. Laurentys, C.H. Bomfim, B. R. Menezes, and W.M. Caminhas “Design of a Pipeline Leakage Detection Using Expert System”, Chronology.1-3. Applied Soft Computing Journal, Vol.11.2, Issue.1, pp.248-256, 2011.
[3] D. F. Aloko and A.D. Mohammed “Biocide Injection as a means of Internal Corrosion Control of Oil Pipelines”, Indian Journal of Chemical Technology, Vol.14, Issue.5, pp.536-538, 2007.
[4] A. A. Abdel-Khalek, E. S. Hassan and H M. Hassan “Kinetics and Mechanism of the Hydroxylation of some Naphthalene Sulphonic Acid Derivatives by Peroxodisulphate”, Indian Journal of Chemical Technology. Vol.5, Issue.1, pp.466-472, 2007.
[5] O. Thaddeus, I.Chinagolum, M. Shedrack “The Development of Expert System for Corrosion Protection of Concrete Structures(Coated Systems) Using Mass Transfer Heuristics” International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 8, Issue.11, pp.5-10, 2018.
[6] N. Mohamed, I. Jawhar and K. Shuaib “Reliability Challenges and enhancement approaches for pipeline sensor and actor networks”, In Proc. of The International Conference on Wireless Networks (ICWN 2008), Las Vegas, Nevada, USA, July 2008.
[7] K.D.Prasanta “Decision support system for inspection and maintenance, A Case study of oil pipelines”, IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT. Vol. 51, Issue. 1, pp.48-56,2004.
[8] P.Laya,A.Senouci,T. Zayed,F,M.Seyed & S.Mohammed “Condition-based maintenance decision support system for oil and gas pipeline”, Structure and Infrastructure Engineering Maintenance, Management, Life-Cycle Design and Performance. Vol. 11, Issue 10, pp. 1323-1337,2015.
[9] S.Nataraj “Analytic Hierarchy Process as a Decision Support System in the Petroleum Pipeline Industry”. Issues in Information Systems, Vol.6, Issue.2, pp.16–21, 2005.
[10] M.Moglia, S.Burn,S. Meddings “Decision Support System for Water Pipeline Renewal Prioritisation”. (J. D. Vanier, Ed.) ITcon, pp.237–256, 2006.
[11] K.P.Tripathi “Decision Support System Is A Tool For Making Better Decisions In The Organization”, Indian journal of computer science and engineering (ijcse) . Vol.2, Issue.1, pp.112-117, 2011.
Citation
W. Anyoku, E.O. Nwachukwu, B.O. Eke, "A Chemical-Based Pipeline Maintenance Decision Support System," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.1-6, 2020.
An Efficient Feature Selection scheme based on Genetic Algorithm for Finger Vein Recognition
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.7-15, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.715
Abstract
Any Biometric system comprises five modules which are data acquisition, Pre-processing, feature extraction, matching and decision. Finger vein is another biometric innovation that contends with other ground-breaking biometrics modalities, for example, the face, palm print, fingerprint, iris and voice. Finger vein recognition is a biometric method used to analyze finger vein patterns of people for appropriate verification. The feature extraction module is very important in a biometric system. The extracted features perhaps include irrelevant and redundant features that can drive to the retreat of the performance of the biometric system. To solve this problem, an efficient feature selection scheme based on the Genetic Algorithm (GA) for Finger vein recognition is proposed. While feature extraction the work was divided into four scenarios based on the full feature, Principal Components Analysis (PCA) method for feature reduction, a hybrid of GA and PCA for feature reduction and selection, and GA for feature selection. The proposed method tested on two standard finger vein biometrics databases (SDUMLA-HMT and UTFV). The experimental results show that the proposed method gives the best results with high accuracy reached to 99.95% and 99.89595%
Key-Words / Index Term
Finger-Vein, Biometrics, Genetic Algorithm, Feature Extraction, Gabor Filter, PCA, Correlation Coefficients, FAR, FRR
References
[ 1] Anil, K.J., Arun, A.R., Nandakumar K., “Introduction to Biometric”; Springer: Berlin, Germany, 2011.
[ 2] K. N. Mishra, K. N. Mishra, and A. Agrawal, “Veins based personal identification systems: A review,” Int. J. Intell. Syst. Appl., vol. 8, no. 10, pp. 68–85, 2016.
[ 3] W. Dahea, H. S. Fadewar, “MULTIMODAL BIOMETRIC SYSTEMS: A REVIEW,” Int. J. Adv. Res. Comput. Sci., vol. 9, no. 2, pp. 361–365, Apr. 2018.
[ 4] Qin, H., He, X., Yao, X., Li, H.,” Finger-vein verification based on the curvature in Radon space”. Expert Syst. Appl., vol.82, pp.151–161,2017.
[ 5] D. P. Wagh, H. S. Fadewar, and G. N. Shinde, “Biometric Finger Vein Recognition Methods for Authentication,” Adv. Intell. Syst. Comput., vol. 1025, pp. 45–53, 2020.
[ 6] K. Syazana-Itqan, A. R. Syafeeza, N. M. Saad, N. A. Hamid, and W. H. Bin Mohd Saad, “A Review of Finger-Vein Biometrics Identification Approaches,” Indian J. Sci. Technol., vol. 9, no. 32, 2016.
[ 7] Lu, Y.; Wu, S.; Fang, Z.; Xiong, N., Yoon, S., Park, D.S. “Exploring finger vein based personal authentication for secure IoT”, Future Gener. Comput. Syst., vol.77,pp. 149–160, 2017.
[ 8] Kono, M. “A new method for the identification of individuals by using of vein pattern matching of a finger”. In Proceedings of the 5th Symposium on Pattern Measurement, Yamaguchi, Japan, pp. 9–12,2000.
[ 9] Tagkalakis, F.; Vlachakis, D.; Megalooikonomou, V.; Skodras, A. A Novel Approach to Finger Vein Authentication. In Proceedings of the IEEE 14th International Symposium on Biomedical Imaging (ISBI 2017), Melbourne, Australia, 18–21 April 2017.
[ 10] Rao R. Raghavendra, B. Dorizzi and G.H. Kumar. Designing efficient fusion schemes for multimodal biometric systems using face and palmprint. Pattern Recognition, 44:10761088, 2011.
[ 11] N. Miura, A. Nagasaka, and T. Miyatake, “Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification,” Mach. Vis. Appl., vol. 15, no. 4, pp. 194–203, Oct. 2004.
[ 12] Xi, X., Yang, L., Yin, Y. “Learning discriminative binary codes for finger vein recognition.”, Pattern Recognit, vol.66, pp. 26–33,2017.
[ 13] Zheng, H., Xu, Q., Ye, Y., Li, W. “Effects of meteorological factors on finger vein recognition.”, In Proceedings of the 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), New Delhi, India, pp. 1–8, 22–24 February 2017.
[ 14] H. Ding, “Anti-spoofing a Finger Vascular Recognition Device with Pulse Detection,” 2016.
[ 15] A. M. Al-juboori, W. Bu, X. Wu, and Q. Zhao, “Palm Vein Verification Using Gabor Filter,” IJCSI Int. J. Comput. Sci. Issues, vol. 10, no. 1, pp. 678–684, 2013.
[ 16] C. Lu, D. Liu, J. Wang, and S. Wang, “Multimodal biometrics recognition by dimensionality reduction method,” in 2nd International Symposium on Electronic Commerce and Security, ISECS 2009, vol. 2, pp. 113–116, 2009.
[ 17] M. M. Tantawi, K. Revett, A. Salem, and M. F. Tolba, “Fiducial feature reduction analysis for electrocardiogram (ECG) based biometric recognition,” J. Intell. Inf. Syst., vol. 40, no. 1, pp. 17–39, Feb. 2013.
[ 18] A. A. Altun, H. E. Kocer, and N. Allahverdi, “Genetic algorithm based feature selection level fusion using fingerprint and iris biometrics,” Int. J. Pattern Recognit. Artif. Intell., vol. 22, no. 3, pp. 585–600, May 2008.
[ 19] W. Dahea, H. S. Fadewar, “Feature Selection Based On Hybrid Genetic Algorithm With Support Vector Machine (GA-SVM),” Int. J. Sci. Technol. Res., vol. 8, no. 12, pp. 190–198,2019.
[ 20] R. Abel-Kader W. Almayyan, H. Own and H. Zedan. A multimodal biometric fusion approach based on binary particle optimization. Proceedings of the International Conference on Innovative Techniques and Applications of Artificial Intelligence, pp. 139–152, 2011.
[ 21] R. Raghavendra and B. Dorizzi, “A novel Adaptive Inertia Particle Swarm Optimization (AIPSO) algorithm for improving multimodal biometric recognition,” in 2011 International Conference on Hand-Based Biometrics, ICHB 2011 - Proceedings, pp. 68–73,2011.
[ 22] Z. Liu and S. Song, “An embedded real-time finger-vein recognition system for mobile devices,” IEEE Trans. Consum. Electron., vol. 58, no. 2, pp. 522–527, 2012.
[ 23] J. Peng, N. Wang, A. A. A. El-Latif, Q. Li, and X. Niu, “Finger-vein verification using gabor filter and SIFT feature matching,” in Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012, pp. 45–48,2012.
[ 24] M. Khalil-Hani, V. P. Nambiar, and M. N. Marsono, “GA-based parameter tuning in finger-vein biometric embedded systems for information security,” in 2012 1st IEEE International Conference on Communications in China, ICCC 2012, 2012, pp. 236–241.
[ 25] S. Khellat-Kihel, R. Abrishambaf, N. Cardoso, J. Monteiro, and M. Benyettou, “Finger vein recognition using Gabor filter and Support Vector Machine,” in International Image Processing, Applications and Systems Conference, IPAS 2014, p. 1,2014.
[ 26] W. Song, T. Kim, H. C. Kim, J. H. Choi, H. J. Kong, and S. R. Lee, “A finger-vein verification system using mean curvature,” Pattern Recognit. Lett., vol. 32, no. 11, pp. 1541–1547, 2011.
[ 27] Z. Liu, Y. Yin, H. Wang, S. Song, and Q. Li, “Finger vein recognition with manifold learning,” J. Netw. Comput. Appl., vol. 33, no. 3, pp. 275–282, 2010.
[ 28] H. C. Lee, B. J. Kang, E. C. Lee, and K. R. Park, “Finger vein recognition using weighted local binary pattern code based on a support vector machine,” J. Zhejiang Univ. Sci. C, vol. 11, no. 7, pp. 514–524, Jul. 2010.
[ 29] G. Fengxu, W. Kejun, M. Hongwei, M. Hui, and L. Jingyu, “Research of finger vein recognition based on fusion of wavelet moment and horizontal and vertical 2DPCA,” in Proceedings of the 2009 2nd International Congress on Image and Signal Processing, CISP’09, 2009.
[ 30] G. Yang, R. Xiao, Y. Yin, and L. Yang, “Finger vein recognition based on personalized weight maps,” Sensors (Switzerland), vol. 13, no. 9, pp. 12093–12112, 2013.
[ 31] H. Jiang and Q. Cao, “The finger vein image acquisition method and vein pattern extraction study based on near infrared,” in World Automation Congress Proceedings, 2012.
[ 32] J. Hashimoto, “Finger vein authentication technology and its future,” in IEEE Symposium on VLSI Circuits, Digest of Technical Papers, pp. 5–8,2006.
[ 33] Y. Yin, L. Liu, and X. Sun, “SDUMLA-HMT: A multimodal biometric database,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7098 LNCS, pp. 260–268.2011.
[ 34] B. T. Ton and R. N. J. Veldhuis, “A high quality finger vascular pattern dataset collected using a custom designed capturing device,” in Proceedings - 2013 International Conference on Biometrics, ICB 2013, 2013.
[ 35] M. Choraś, “Ear biometrics based on geometrical method of feature extraction,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 3179, pp. 51–61, 2004.
[ 36] W. Y. Han and J. C. Lee, “Palm vein recognition using adaptive Gabor filter,” Expert Syst. Appl., vol. 39, no. 18, pp. 13225–13234, 2012.
[ 37] J. Yang, Y. Shi, and G. Jia, “Finger-vein image matching based on adaptive curve transformation,” Pattern Recognit., vol. 66, pp. 34–43, 2017.
[ 38] J. Holland, Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. 1992.
[ 39] K. S. Tang, K. F. Man, S. Kwong, and Q. He, “Genetic algorithms and their applications,” IEEE Signal Process. Mag., vol. 13, no. 6, pp. 22–37, 1996.
[ 40] A. Shukla, J. Dhar, C. Prakash, D. Sharma, R. K. Anand, and S. Sharma, “Intelligent biometric system using PCA and R-LDA,” in Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009, vol. 1, pp. 267–272,2009.
[ 41] T. Chen, Y. J. Hsu, X. Liu, and W. Zhang, “Principle component analysis and its variants for biometrics,” in IEEE International Conference on Image Processing, vol. 1, pp.61-64, 2002.
[ 42] Press, W.H., Teukolsky, S.A., Vetterling, W.T., and Flannery, B.P. Numerical Recipes in C, 2nd Ed., Cambridge University Press, 1992.
[ 43] Rattani A, Kisku D R, Bicego M, Tistarelli M, “Feature level fusion of face and fingerprint biometrics.”, In: First international conference on biometric: theory, applications and systems, pp 1–6, 2007.
[ 44] E. M. Hameed, N. Abbood, and A. A. Alani, “Fuzzy logic decision fusion in a fingerprints based multimodal biometric system,” J. Eng. Appl. Sci., vol. 14, no. 3, pp. 920–926, 2019.
[ 45] V. Conti, C. Militello, F. Sorbello, and S. Vitabile, “A frequency-based approach for features fusion in fingerprint and iris multimodal biometric identification systems,” IEEE Trans. Syst. Man Cybern. Part C Appl. Rev., vol. 40, no. 4, pp. 384–395, 2010.
[ 46] M. Heenaye-Mamode Khan, N. Mamode Khan, and R. K. Subramanian, “Feature extraction of dorsal hand vein pattern using a fast modified PCA algorithm based on Cholesky decomposition and Lanczos technique,” World Acad. Sci. Eng. Technol., vol. 61, pp. 279–282, 2010.
[ 47] A. Kumar and K. V. Prathyusha, “Personal authentication using hand vein triangulation and knuckle shape,” IEEE Trans. Image Process., vol. 18, no. 9, pp. 2127–2136, 2009.
[ 48] C. L. Lin and K. C. Fan, “Biometric verification using thermal images of palm-dorsa vein patterns,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 2, pp. 199–213, 2004.
[ 49] S. Bharathi and R. Sudhakar, “Biometric recognition using finger and palm vein images,” Soft Comput., vol. 23, no. 6, pp. 1843–1855, 2019.
[ 50] X. Sun, C. Y. Lin, M. Z. Li, H. W. Lin, and Q. W. Chen, “A DSP-based finger vein authentication system,” in Proceedings - 4th International Conference on Intelligent Computation Technology and Automation, ICICTA 2011, vol. 2, pp. 333–336,2011.
[ 51] J. Yang and X. Zhang, “Feature-level fusion of fingerprint and finger-vein for personal identification,” Pattern Recognit. Lett., vol. 33, no. 5, pp. 623–628, 2012.
[ 52] Z. Li, D. Sun, L. Di, and L. Hao, “Two modality-based bi-finger vein verification system,” in International Conference on Signal Processing Proceedings, ICSP, pp. 1690–1693,2010.
Citation
Waleed Dahea, H.S. Fadewar, "An Efficient Feature Selection scheme based on Genetic Algorithm for Finger Vein Recognition," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.7-15, 2020.
VANET Data Dissemination an Emerging Technology: A Survey
Survey Paper | Journal Paper
Vol.8 , Issue.5 , pp.16-22, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.1622
Abstract
Vehicular Ad hoc Networks (VANET) is an emerging technology and is type of an ad hoc mobile network which offered facilities like security, traffic proficiency, driving ease, traffic management services etc. with the help of vehicles communications. Traffic information is especially useful for the driver during driving, such as an accident alert or else traffic jam alert. In ad hoc vehicle networks, data transmission is usually performed by multi hop communication in which high-speed vehicles act as a data carrier. Vehicles are forced to navigate a defined route, depending on the route layout and traffic conditions. In an ad hoc vehicle network, delivering data to multiple stores is a very complicated job because of the high mobility and frequent disconnections that occur in vehicle networks. The biggest challenge in ad hoc vehicle networks is to gather information such as accidents, speed limits, road obstacles, road conditions, traffic conditions, commercial advertising, etc. for safety and convenience. In many diffusion techniques, the vehicle transports the package until it finds another vehicle heading towards destination and at that point passes the package to that vehicle. In this article we surveyed some research paper based on predictive data dissemination and try to put forward their research work. The surveyed research papers are based on different techniques and tools for data dissemination protocols.
Key-Words / Index Term
Multi-beam adaptive array (MBAA), Distributed low-redundancy information sharing algorithm (DLRA), Road Side Units (RSUs), Receiver-oriented multiple access (ROMA)
References
[1] Ali, G. G. M. N., Rahman, M. A., Chong, P. H. J., & Samantha, S. K. “On Efficient Data Dissemination Using Network Coding in Multi-RSU Vehicular Ad Hoc Networks” . IEEE 83rd Vehicular Technology Conference (VTC Spring), 2016.
[2] Felipe Domingos da Cunha, Leandro Villas, Azzedine Boukerche, Guilherme Maia, Aline CarneiroViana. “Data Communication in VANETs: Survey, Applications and Challenges”, Ad Hoc Networks, Elsevier, 44 (C), pp. 90-103, 2016.
[3] Zhang, Y., Peng, L., Xu, R., & Li, J. “A Distributed Low-Redundancy Information Sharing Algorithm in Ad Hoc Networks with Directional Antennas”, Procedia Computer Science, 131, pp. 1142–1149, 2018,
[4] Liu, L., Chen, C., Qiu, T., Zhang, M., Li, S., & Zhou, B. “A data dissemination scheme based on clustering and probabilistic broadcasting in VANETs”, Vehicular Communications, Volume 13, pp. 78–88, 2018.
[5] WU, C., OHZAHATA, S., & KATO, T. “VANET Broadcast Protocol Based on Fuzzy Logic and Lightweight Retransmission Mechanism”, IEICE Transactions on Communications, E95-B(2), pp. 415–425, , 2012.
[6] Akhtar, N., Ergen, S. C., & Ozkasap, O. “Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation”, IEEE Transactions on Vehicular Technology, 64(1), 248–262, 2015.
[7] Nikolovski, T., & Pazzi, R. W. “Delay Tolerant and Predictive Data Dissemination Protocol (DTP-DDP) for urban and highway vehicular ad hoc networks (VANETs)”, Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications - DIVANet ’16, pp 67–74, 2016.
[8] Dubey, Brij & Naveen, Chauhan & Kumar, Prashant. “A Survey on Data Dissemination Techniques used in VANETs”, International Journal of Computer Applications, Vol 10, No-7, pp 5-10, 2010.
[9] Liu, L., & Chen, D. “A Data Dissemination Method Based on Region Type Correlations for Mobile Opportunistic Networks”, Wireless Communications and Mobile Computing, pp.1–10 , 2018.
[10] Rakesh Shrestha and Seung Yeob Nam. “Trustworthy Event Information Dissemination in Vehicular Ad Hoc Networks”, Hindawi Mobile Information Systems Volume 2017, Article ID 9050787, pp.1-17, 2017.
[11] Ansari, S., Sánchez, M., Boutaleb, T., Sinanovic, S., Gamio, C., & Krikidis, I. “SAI: Safety Application Identifier Algorithm at MAC Layer for Vehicular Safety Message Dissemination Over LTE VANET Networks”, Wireless Communications and Mobile Computing, pp.1–17, 2018.
[12] Crawford, P. S., Al-Zarrad, M. A., Graettinger, A. J., Hainen, A. M., Back, E., & Powell, L. “Rapid Disaster Data Dissemination and Vulnerability Assessment through Synthesis of a Web-Based Extreme Event Viewer and Deep Learning”, Advances in Civil Engineering, pp. 1–13, 2018.
[13] Ghaleb, F. A., Aizaini Maarof, M., Zainal, A., Rassam, M., Saeed, F., & Alsaedi, M. “Context-Aware Data-Centric Misbehaviour Detection Scheme for Vehicular Ad Hoc Networks using Sequential Analysis of the Temporal and Spatial Correlation of the Consistency between the Cooperative Awareness Messages”, Vehicular Communications, 100186, pp 1-17, 2019.
[14] Prabhjot Singh and Rasmeet Singh Bali. “Secure Data Dissemination Scheme for Vehicular Relay Network based on Predictive Clustering”, Indian Journal of Science and Technology, Vol9(27), 2016.
[15] Cooper, C., Franklin, D., Ros, M., Safaei, F., & Abolhasan, M. “A Comparative Survey of VANET Clustering Techniques”, IEEE Communications Surveys & Tutorials, 19(1), 657–681, 2017.
Citation
Deepak Gupta, Rakesh Rathi, Shikha Gupta, Neetu Sharma, "VANET Data Dissemination an Emerging Technology: A Survey," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.16-22, 2020.
Study of Plant Phenotype using Image Segmentation Techniques
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.23-30, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.2330
Abstract
The study of plant phenotype using segmentation techniques is one the leading research area in the field of agricultural technology. Plant phenotype is a technical term which is used to describe the observable characteristics of the plant like width, height, biomass, plant, leaf shape and so on. It is required in order to study about the physical characteristics of the plant like finding the area, height, width, structure of the plant and skeleton generation of the plant root etc. It is used in the field of agricultural technology to carry out various types of research. This paper explores the use of different segmentation methods in order to get efficient segmented images for the plant`s shoot and root systems. The segmentation methods used are threshold segmentation, edge detection, and followed by contour segmentation on PlantCV platform. The proposed work partitions the segmentation process in four steps, where the output of each step is given as input to the next step. We use the thresholding method as a first step in plant image segmentation process to remove the background and noise in the image. This step is followed by edge detection method to remove the unwanted regions and to detect false edges in a segmented plant image. Next, the contour segmentation is used to identify the complete structure of the plant. Then from the output image obtained, features are extracted in JSON format and the segmented images acquired are stored in an output folder.
Key-Words / Index Term
Segmentation, Phenotype, Sobel operator, PlantCV platform, Shoot module, Root module, Contour Segmentation, Edge Detection, threshold Segmentation, Gaussian Blur, Median Blur, Region of Interest(ROI)
References
[1] H. Al-Hiary, S. Bani-Ahmad, M. Reyalat, M. Braik and Z. ALRahamneh,“ Fast and Accurate Detection and Classification of Plant Diseases“, International Journal of Computer Applications , Vol. 17,No.1, pp. 0975 – 8887, 2011.
[2] Andrade-Sanchez P., Gore M.A., Heun J.T., Thorp K.R., Carmo-Silva A.E., French A.N., Salvucci M.E.,White J.W. “Development and evaluation of a field-based high-throughput phenotyping platform”.Funct. Plant Biol. 41: 68-79; 2014.
[3] V. Sivakumar and V. Murugesh for “Segmentation of a digital image using Thresholding Technique on a Noisy Image”, ISBN No.978-1-4799-3834-6/14/$31.00©2014 IEEE, 2014.
[4] Sheetal Israni and Swapnil Jain, “Edge Detection of License Plate Using Sobel Operator”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) – 2016.
[5] Fari Muhammad Abubakar, “A Study of Region- Based and Contour based Image Segmentation”, Signal & Image Processing: An International Journal (SIPIJ) Vol.3, No.6, December 2012.
[6] S. Inderpal and K. Dinesh, “A Review on Different Image Segmentation Techniques”, IJAR, Vol.. 4, April, 2014.
[7] S. Saleh, N. V. Kalyankar and S. Khamitkar, “Image segmentation by using edge detection”, (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010.
[8] K. H. Knuth, “Optimal data-based binning for histograms,” Ar Xiv Physics e-prints, May 2006.
[9] N.Valliammal and Dr.S.N.Geethalakshmi, “Plant Leaf Segmentation Using Non Linear K means Clustering“, IJCSI International Journal of Computer Science, Vol 9, Issues9, Issue ISSN (Online): 1694-0814, 2016.
[10] Chupin M., Hasboun D., Poupon F., Baillet S., Garnero L. Segmentation of the amygdalo – hippocampal complex by competitive region growing [MRI analysis], IEEE International Symposium, 2002.
Citation
Althaf S., Suresha N., Pooja K.S., Jeelani H. Muddebihal, Poonam Ghuli, Ramakanth Kumar P., "Study of Plant Phenotype using Image Segmentation Techniques," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.23-30, 2020.
Predicting Autism Spectrum Disorder Using Machine Learning Algorithms: A Review
Review Paper | Journal Paper
Vol.8 , Issue.5 , pp.31-36, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.3136
Abstract
Among many psychiatric disorders, Autism Spectrum Disorder (ASD) affects people in diverse ways. Nowadays the prevalence of Autism spectrum disorder has increased gradually worldwide. Difficulty in social interaction, trouble with speech and nonverbal communication, repetitive actions, avoidance of eye contact and abnormal facial expressions are the primary symptoms of ASD. Predicting ASD at an early stage is important to provide necessary developmental support. Machine Learning algorithms play a vital role in prediction of ASD. In this study, Machine Learning algorithms like Linear Discriminant Analysis (LDA), K-Nearest Neighbor (KNN), Decision trees, Random forest –CART and merging of Random Forest-CART and Random forest - Iterative Dichotomiser 3 (ID3) are compared for ASD prediction.
Key-Words / Index Term
Autism Spectrum Disorder, Autistic Spectrum Disorders in Children and Adults, Machine Learning, Linear Discriminant Analysis, K-Nearest Neighbour, SVM, K-NN, Decision Trees, Random Forest CART & ID3
References
[1] Louridas P and Ebert C., “Machine Learning,” IEEE Softw., vol. 33, no. 5, pp. 110–115, 2016.
[2] Jordan, M. I., & Mitchell, T. M. “Machine learning: Trends, perspectives, and prospects”. Science, 349(6245), 255–260. doi:10.1126/science.aaa8415, 2015.
[3] Lichman, M “UCI Machine Learning Repository Irvine”, CA: University of California, School of Information and Computer Science, 2013.
[4] Stevens, E., Atchison, A., Stevens, L., Hong, E., Granpeesheh, D., Dixon, D., & Linstead, E., “A Cluster Analysis of Challenging Behaviors in Autism Spectrum Disorder”. 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). doi:10.1109/icmla.2017.00-85, 2017.
[5] Maenner MJ, Shaw KA, Baio J, et al., “Prevalence of Autism Spectrum Disorder Among Children Aged 8 Years — Autism and Developmental Disabilities Monitoring Network”, 11 Sites, United States, 2016. MMWR Surveill Summ 2020;69(No. SS-4):1–12. DOI: http://dx.doi.org/10.15585/mmwr.ss6904a1, 2016.
[6] Omar, K. S., Mondal, P., Khan, N. S., Rizvi, M. R. K., & Islam, M. N., “ A Machine Learning Approach to Predict Autism Spectrum Disorder”. 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE). doi:10.1109/ecace.2019.8679454, 2019.
[7] Satu, M. S., Farida Sathi, F., Arifen, M. S., Hanif Ali, M., & Moni, M. A. “Early Detection of Autism by Extracting Features: A Case Study in Bangladesh”. 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST). doi:10.1109/icrest.2019.8644357, 2019.
[8] Pal, R., Poray, J., & Sen, M, “Application of machine learning algorithms on diabetic retinopathy”. 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). doi:10.1109/rteict.2017.8256959, 2017.
[9] Liu, W., Yu, X., Raj, B., Yi, L., Zou, X., & Li, M., “ Efficient autism spectrum disorder prediction with eye movement: A machine learning framework”. 2015 International Conference on Affective Computing and Intelligent Interaction (ACII). doi:10.1109/acii.2015.7344638, 2015.
[10] Ecker, C., Rocha-Rego, V., Johnston, P., Mourao-Miranda, J., Marquand, A., Daly, E. M. Murphy, D. G., “Investigating the predictive value of whole-brain structural MR scans in autism: A pattern classification approach”. NeuroImage, 49(1), 44–56.
[11] Altay, O., & Ulas, M., “Prediction of the autism spectrum disorder diagnosis with linear discriminant analysis classifier and K-nearest neighbor in children”. 2018 6th International Symposium on Digital Forensic and Security (ISDFS). doi:10.1109/isdfs.2018.8355354, 2018.
[12] Chorianopoulou, A., Tzinis, E., Iosif, E., Papoulidi, A., Papailiou, C., & Potamianos, A., “Engagement detection for children with Autism Spectrum Disorder”. 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). doi:10.1109/icassp.2017.7953119, 2017.
[13] Mitsumoto, D., Hori, T., Sagayama, S., Yamasue, H., Owada, K., Kojima, MOno, N., “Autism Spectrum Disorder Discrimination Based on Voice Activities Related to Fillers and Laughter”. 2019 53rd Annual Conference on Information Sciences and Systems (CISS). doi:10.1109/ciss.2019.8692794,2019.
[14] Satu, M. S., Farida Sathi, F., Arifen, M. S., Hanif Ali, M., & Moni, M. A., “Early Detection of Autism by Extracting Features: A Case Study in Bangladesh”. 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST). doi:10.1109/icrest.2019.8644357, 2019.
[15] Hyde, K. K., Novack, M. N., LaHaye, N., Parlett-Pelleriti, C., Anden, R., Dixon, D. R., & Linstead, E., “ Applications of Supervised Machine Learning in Autism Spectrum Disorder Research: a Review”. Review Journal of Autism and Developmental Disorders. doi:10.1007/s40489-019-00158-x, 2019
[16] Dutta, S. R., Datta, S., & Roy, M., “ Using Cogency and Machine Learning for Autism Detection from a Preliminary Symptom”. 2019 9th International Conference on Cloud Computing, Data Science & Engineering ,2019.
[17] Tyagi, B., Mishra, R., & Bajpai, N., “ Machine Learning Techniques to Predict Autism Spectrum Disorder”. 2018 IEEE Punecon. doi:10.1109/punecon.2018.8745405, 2018.
[18] Wall, D. P., Dally, R., Luyster, R., Jung, J.-Y., & DeLuca, T. F., “Use of Artificial Intelligence to Shorten the Behavioral Diagnosis of Autism”. PLoS ONE, 7(8), e43855. doi:10.1371/journal.pone.0043855, 2012.
[19] Allison, C., Auyeung, B., & Baron-Cohen, S. “ Toward Brief “Red Flags” for Autism Screening: The Short Autism Spectrum Quotient and the Short Quantitative Checklist in 1,000 Cases and 3,000 Controls”. Journal of the American Academy of Child & Adolescent Psychiatry, 51(2), 202–212.e7. doi:10.1016/j.jaac.2011.11.003, 2012.
[20] Sonar, P., & JayaMalini, K., “ Diabetes Prediction Using Different Machine Learning Approaches”. 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC). doi:10.1109/iccmc.2019.8819841, 2019.
[21] Granpeesheh, Dennis Dixon and Erik Linstead.,” A cluster Analysis of challenging Behaviors in Autism Spectrum Disorder”. 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), 2017.
[22] Omar, K. S., Mondal, P., Khan, N. S., Rizvi, M. R. K., & Islam, M. N.,“A Machine Learning Approach to Predict Autism Spectrum Disorder. 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE). doi:10.1109/ecace.2019.8679454, 2019
[23] Heinsfeld, A. S., Franco, A. R., Craddock, R. C., Buchweitz, A., & Meneguzzi, F. “ Identification of autism spectrum disorder using deep learning and the ABIDE dataset. NeuroImage”: Clinical, 17, 16–23. doi:10.1016/j.nicl.2017.08.017, 2018.
[24] Duda, M., Kosmicki, J. A., & Wall, D. P., “ Testing the accuracy of an observation-based classifier for rapid detection of autism risk”. Translational Psychiatry, 4(8), e424–e424. doi:10.1038/tp.2014.65, 2014.
[25] Kosmicki, J. A., Sochat, V., Duda, M., & Wall, D. P. “Searching for a minimal set of behaviors for autism detection through feature selection-based machine learning”. Translational Psychiatry, 5(2), e514–e514. doi:10.1038/tp.2015.7, 2015.
[26] Jain, A., & Huang, J., “ Integrating independent components and linear discriminant analysis for gender classification”. Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings. doi:10.1109/afgr.2004.1301524, 2004.
[27] Aparna Shenoy, K.V. Viswanatha, Raju Ramakrishna Gondkar, "Early Sepsis Prediction in Intensive Care Patients using Random Forest Classifier", International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.17-22, 2020.
[28] Rosy Mishra, Y. Sowjanya, Sushanta Meher, Mousumi Meher, "A Voice Signal Interpreter using Machine Learning Techniques," International Journal of Scientific Research in Network Security and Communication, Vol.8, Issue.2, pp.22-27, 2020.
Citation
Kalpana C., Anitha Kumari K., "Predicting Autism Spectrum Disorder Using Machine Learning Algorithms: A Review," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.31-36, 2020.
Quantum Computing:A possibility to find COVID-19 antidote
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.37-42, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.3742
Abstract
Today, the whole world is suffering from pandemic of Covid-19 diseases. Corona virus disease 2019 (COVID-19) is an illness caused by a novel coronavirus now called as severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; formerly called 2019-nCoV), which was first identified amid an outbreak of respiratory illness cases in Wuhan City, Hubei Province, China. Today, every country in the world is trying to find the antidote of COVID-19. Meanwhile, a hope to find the medicine of Covid-19, can be seen through Quantum Computing. For the readers who are not familiar with quantum computation, a brief introduction to it is provided. Classical computers that are used today can encode information only in binary format that take the values of 1 or 0. This restricts the ability of classical computers. On the opposite hand, Quantum computing is a region of computing that deals with developing engineering supported the principles of scientific theory, that explains the behavior of energy and material at the atomic and subatomic levels. Quantum computing uses quantum bits or qubits. it`s the distinctive ability of subatomic participles that enables them to exist in additional than one states i.e. one and zero at an equivalent time. These supercomputers area unit supported by Superposition and entanglement, 2 vital options of physics. Quantum computing relies on the principles of scientific theory and uses the quantum-mechanical phenomena like superposition and entanglement to perform computations
Key-Words / Index Term
Quantum computing, COVID-19, Quantum Computers, Superposition, Entanglement, Qubits
References
[1] Mr. Vishal Ramchandra Gotarane, Mr. Sushant Savita Madhukar Gandhi, “Quantum Computing: Future Computing”, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056, Vol. 03, Issue. 02, pp.1024-1026, 2016
[2] Phillip Kaye , Raymond Laflamme , and Michele Mosca , “An Introduction to Quantum Computing” Oxford U. Press, New York, pp 274, 2007. ISBN 978-0-19-857000-4, ISBN 978-0-19-857049-3 paper
[3] Robert S. Sutor, “Dancing with Qubits:How quantum computing works and how it can change the world ”, Packt publishing Ltd., UK, pp.2-21, 2019
[4] Bertels, K., "Quantum computing: How far away is it?," in High Performance Computing & Simulation (HPCS), 2015 International Conference on , vol., no., pp.557-558, 20-24 July 2015
[5] Morimae, T., "Basics and applications of measurement-base quantum computing," in Information Theory and its Applications (ISITA), 2014 International Symposium on , vol., no., pp.327-330, 26-29 Oct. 2014
[6] Yousuf Mohammed Faroukh, “ Quantum Computers Vs Conventional Computers: A Study on the Larger Scale “,pp. 7-8, 24 march, 2018.
[7] Heni Bouhamed, “Covid-19 Cases and Recovery Previsions with Deep Learning Nested Sequence Prediction Models with Long Short-Term Memory (LSTM) Architecture”, International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.2, pp.10-15, April (2020)
Citation
Deepa Sonal, "Quantum Computing:A possibility to find COVID-19 antidote," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.37-42, 2020.
Review of Contrast Enhancement Techniques Based on Histogram Processing
Review Paper | Journal Paper
Vol.8 , Issue.5 , pp.43-47, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.4347
Abstract
Image enhancement is one of the basic steps used in digital image processing. Here the image is manipulated to make it more suitable than the original image for specific purposes. It is used to modify the contrast of an image. Here the intensity of the input image is manipulated to make the best use of available grayscale values. A wide range of contrast enhancement methods available work upon the histogram of an image to make the image visually suitable for either viewing or further development. We need to study and review different contrast enhancement techniques primarily operating on the histogram of an image. Depending on the nature of the technique these are classified into global and local contrast enhancement techniques. This paper focuses on a comparative study of contrast enhancement techniques and draws conclusions considering their pros and cons
Key-Words / Index Term
Contrast enhancement, histogram equalization
References
[1] K.S. Song, M.G. Kang, “Optimized Tone Mapping Function for Contrast Enhancement considering Human Visual Perception System”, IEEE Transactions on Circuits and Systems for Video Technology, 2018.
[2] R.C. Gonzalez, R.E. Woods, “Digital Image Processing second edition”, Pearson Education. ISBN: 81-7808-629-8
[3] R.C. Gonzalez, R.E. Woods, S.L. Eddins, “Digital Image Processing Using MATLAB”, Pearson-Prentice-Hall, Upper Saddle River, NJ, USA, 2004.
[4] Y.-T. Kim, “Contrast enhancement using brightness preserving bi-histogram equalization”, IEEE Transaction on Consumer Electronics, Vol. 43, No. 1, pp.1-8, 1997.
[5] Y. Wang, Q. Chen, B. Zhang, “Image enhancement based on equal area dualistic sub-image histogram equalization method”, IEEE Transaction on Consumer Electronics, Vol. 45, pp.68-75, 1999.
[6] S.D. Chen, R. Ramli, “Minimum Mean Brightness Error Bi-Histogram Equalization in Contrast Enhancement”, IEEE Transactions on Consumer Electronics, Vol. 49, No. 4, pp.1310-1319, 2003.
[7] S.-D. Chen, A.R. Ramli, “Contrast enhancement using recursive mean separate histogram equalization for scalable brightness preservation”, IEEE Transaction on Consumer Electronics, Vol. 49, pp.1301-1309, 2003.
[8] D. Menotti, L. Najman, J. Facon, A. Araujo, “Multi-Histogram Equalization Methods for Contrast Enhancement and Brightness Preserving”, IEEE Transactions on Consumer Electronics, Vol. 53, No. 3, pp.1186-1194, 2007.
[9] Nicholas SiaPik Kong and Haidi Ibrahim, “Color Image Enhancement using Brightness Preserving Dynamic Histogram Equalization”, IEEE Transactions on Consumer Electronics, Vol. 54, No. 4, pp.1962-1968, 2008.
[10] V.E. Vickers, “Plateau equalization algorithm for real-time display of high-quality infrared imagery”, OPTICE, Vol. 35, pp.1921-1927, 1996.
[11] B.-J. Wang, S.-Q. Liu, Q. Li, H.-X. Zhou, “A real-time contrast enhancement algorithm for infrared images based on plateau histogram”, Infrared Physics & Technology, Vol. 48, pp.77-82, 2006.
[12] K. Liang, Y. Ma, Y. Xie, B. Zhou, R. Wang, “A new adaptive contrast enhancement algorithm for infrared images based on double plateaus histogram equalization”, Infrared Physics & Technology, Vol. 55, pp.309-315, 2012.
[13] S. Li, W. Jin, L. Li, Y. Li, “An improved contrast enhancement algorithm for infrared images based on adaptive double plateaus histogram equalization”, Infrared Physics & Technology, Vol. 90, pp.164-174, 2018.
[14] K. Zuiderveld, “Contrast Limited Adaptive Histogram Equalization”, In Graphics Gems, Elsevier, Amsterdam, The Netherlands, pp.474-485, 1994. ISBN: 0-12-336155-9
[15] J.-Y. Kim, L.-S. Kim, S.-H. Hwang, “An advanced contrast enhancement using partially overlapped sub-block histogram equalization”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11, pp.475-484, 2001.
[16] F. Branchitta, M. Diani, G. Corsini, A. Porta, “Dynamic- range compression and contrast enhancement in infrared imaging systems”, OPTICE, Vol. 47, 2008.
[17] Y. Wang, Z. Pan, “Image contrast enhancement using adjacent-block-based modification for local histogram equalization”, Infrared Physics, Technol
Citation
Satyajit Ray Pradhan, Chandra Sekhar Panda, "Review of Contrast Enhancement Techniques Based on Histogram Processing," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.43-47, 2020.
Simulation and Designing of Network Signal Booster at 900 MHz
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.48-52, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.4852
Abstract
The primary aim of this paper is to present simulation findings and design network signal booster at a frequency of 900 MHz RF. The booster is designed to work on GSM system bandwidth. The gain given by the amplifier circuit was 12dB at the middle frequency with a difference of +-1.3 dB to normalize. The monopole antennas used for signal reception and transmission that have 0.9141-1315i input impedance and -18.18dB return loss. The study includes detailed graphical and tabular view of the results at each design level, simulation
Key-Words / Index Term
Amplifier, noise figure, Low noise Stability, Impedance matching
References
[1] Adegoke, A. S., Babalola, I. T., & Balogun, W. A. (2008). Performance evaluation of GSM mobile system in Nigeria. Pacific Journal of Science and Technology, 9(2), 436–441.
[2] Bhole, Y., Chaugule, S., Damankar, B., & Yadav, V. (2015). ENERGY HARVESTING FROM RF SIGNAL, 4(3), 985–989.
[3] Domine Leenaerts, Jos Bergervoet, Jan-Willem Lobeek,MarekSchmidtSzalowski“900MHz/1800MHz GSM BaseStation LNA with Sub-1dB Noise Figure and +36dBm OIP3”NXP Semiconductors, Eindhoven, 5656AE, the Netherlands
[4] J. Millman and A. Grabel, Microelectronics, 2nd ed. New York: Mc Graw-Hill, 1988.
[5] Guolin Sun; Rolf H. Jansen. Broadband Doherty Power Amplifier via Real Frequency Technique. IEEE Transactions on Microwave Theory and Techniques. 2012, 60, pp.99-111.
[5] Haiying Huang. Broadband electrical impedance matching for piezoelectric ultrasound transducers, IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 2011, 58,
pp.2699-2707.
[6] Jianfei An and shuangxi Zhang”A New Method of designing electrical impedance matching network for Piezo elctric ultrasound transducer”, Journal of Engineering science and technology review7 (1)(2004)71-75
[7] Mayank B. Thacker, Shrikant S. Bhoyar , Praveen Kumar Rahangdale” Broadband CMOS LNA Design and Performance Evaluation”, pp. (14-19) Sept. 2013
[8] Khatri R, Mishra D. K. and Jain P., “A Low Power Low Noise Amplifier for Ultra Wideband Applications”, IEEE conference on Communication systems and Network Technologies, pp 600-605, May 2012.
[9] Youming Zhang, Xusheng Tang and Dawei Zhao, “A 0.7–9GHz CMOS broadband high amplifier for multi-band use”, IEEE inter conference on Microwave and Millimeter technology, May 2012.
[10] Khatri R, Mishra D. K. and Jain P., “A Low Power Low Noise Amplifier for Ultra Wideband Applications”, IEEE conference on Communication systems and Network Technologies, pp 600-605, May 2012.
[11] S. Jing,, Y. Yin, A. Sun, , Y. Wei,, & Y. Yang,.” Compact E-shaped monopole antenna for dual-band WLAN applications”. IEEE International Conference (ICMTCE), pp. 305-308, May. 2011
[12] K. P. Ray and Y. Ranga, “Printed Rectangular Monopole Antennas,” Proc. IEEE Antennas and Propagation Society International Symposium, July 2006, pp.1693-1696.
[13]Aleksandar Tasić."Performance Parameters of RF Circuits", Analog Circuits and Signal Processing Series, 2006
Citation
Saksham Jain, Vikrant Saini, Brajlata Chauhan, "Simulation and Designing of Network Signal Booster at 900 MHz," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.48-52, 2020.
Detection of Cyberbullying using Voting Classifier
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.53-60, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.5360
Abstract
The advent of social media has changed the ways of human communication. It has brought people around the world closer to each other. Despite its innumerable benefits, social media is considered to be one of the harmful elements of society. Cyberbullying and online harassment are the most common negative effects of social media. Cyberbullying is a way of bullying someone with the use of technology and it can take place through many forms such as SMS, Apps, online gaming, social networking sites online forums, etc. The project aims at detecting cyberbullying content based on textual features. The system detects various language patterns often used by bullies. This is accomplished using machine learning. The proposed system uses voting classifier to classify the input text as ‘Bullying’ or ‘Non-Bullying’. It also compares the accuracies of various classifiers and introduces a framework of supervised machine learning to detect cyberbullying in textual data. It is observed that a voting classifier i.e. a combination of the Logistic Regression, Random Forest, Support Vector Machine, SGD classifier gives the highest accuracy and precision i.e. 74% and 77% respectively. This trained model is deployed on a webpage which makes the system user intuitive and user-friendly
Key-Words / Index Term
Cyberbullying, Machine Learning, Classification, Voting classifier, Social Media
References
[1] L. Cheng, J. Li, Y. N. Silva, D. L. Hall, and H. Liu, "XBully: Cyberbullying Detection within a Multi-Modal Context.", WSDM 2019, pp. 339-347, 2019.
[2] R. I. Rafiq, H. Hosseinmardi, R. Han, Q. Lv, and S. Mishra, "Scalable and timely detection of cyberbullying in online social networks", In Proceedings of the 33rd Annual ACM Symposium on Applied Computing, ACM, pp. 1738-1747, 2018.
[3] R. Zhao, and K. Mao, "Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder.", IEEE Transactions on Affective Computing , Vol.8, Issue.3, pp. 328-339, 2016.
[4] M. A. Al-garadi, K. D. Varathan, and S. D. Ravana, "Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network.", Computers in Human Behavior, Vol.63, pp. 433-443, 2016.
[5] A. Mangaonkar, A. Hayrapetian, and R. Raje, "Collaborative detection of cyberbullying behavior in Twitter data.”, 2015 IEEE International Conference on Electro/Information Technology (EIT), pp. 611-616, 2015.
[6] V. Nahar, X. Li, H. L. Zhang, and C. Pang, "Detecting cyberbullying in social networks using multi-agent system." Web Intelligence and Agent Systems: An International Journal, Vol.12, Issue.4, pp. 375-388, 2014.
[7] K. Reynolds, A. Kontostathis, and L. Edwards, "Using machine learning to detect cyberbullying.”, In 2011 10th International Conference on Machine learning and applications and workshops, IEEE, Vol.2, pp. 241-244, 2011.
[8] K. Dinakar, R. Reichart, and H. Lieberman, "Modeling the detection of textual cyberbullying.", In fifth international AAAI conference on weblogs and social media, 2011.
Citation
R. Kaur, M.S. Sagar, "Detection of Cyberbullying using Voting Classifier," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.53-60, 2020.
Multi-Class Cancer Classification Using Dimensionally-Reduced Breast Cancer Data
Research Paper | Journal Paper
Vol.8 , Issue.5 , pp.61-69, May-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i5.6169
Abstract
Breast cancer is an uncontrolled growth of breast cells and the most common invasive cancer in women, the second leading cause of cancer death in women next to lung cancer. Cancer starts from breast and spreads to other parts of the body. People are unable to identify the disease before it becomes dangerous. It can be cured if the disease is identified at an earlier stage. Awareness of breast cancer, public attentiveness, and advancement in breast imaging has made a positive impact on the identification and screening of breast cancer. The interpretation of a tumor image is taken from patients and stored in datasets. This study suggests a feature extraction method such as PCA (Principal Component Analysis) which is used for pre-processing the data and extracting the most relevant features. Several classifiers like K-Nearest Neighbour (KNN), Naïve Bayes(NB), Linear Support Vector Machine(L-SVM), Gaussian Kernel Support Vector Machine(K-SVM), Logistic Regression(LR) are used to build machine learning model, among these classifiers Linear kernel Support Vector Machine (L-SVM) gives better accuracy. The proposed system uses a Linear kernel Support vector machine(L-SVM) to perform staging. The objective of the project is to carry out dimensionality reduction on cancer datasets and to build a predictive model for multi-class cancer stage classification using a linear kernel SVM classifier
Key-Words / Index Term
Classification Techniques, Feature extraction, Principal Component Analysis(PCA) k-Nearest Neighbor (KNN), Linear Support Vector Machine (L-SVM), Gaussian Kernel Support Vector Machine(K-SVM) , Naïve Bayes (NB), Decision Tree (DT), Logistic Regression (LR)
References
[1] MadhuKumari and Vijendra Singh, “Breast Cancer Prediction system “. In the proceedings of the 2018 International Conference on Computational Intelligence and Data Science (IJCSES), India, Vol.132, p.371-376, 2018.
[2] David A. Omondiagbe, Shanmugam Veeramani and Amandeep S. Sidhu,”Machine Learning Classification Techniques for Breast Cancer Diagnosis”. In the proceedings of the 2019 IOP Conference series on Materials Science and Engineering , Vol .495, 2019.
[3] J. Taveira De Souza, A. Carlos De Francisco and D. Carla De Macedo, "Dimensionality Reduction in Gene Expression Data Sets," in IEEE Access, vol. 7, pp. 61136-61144, 2019, doi: 10.1109/ACCESS.2019.2915519.
[4] Ajay Kumar, R. Sushil, A. K. Tiwari, “Comparative Study of Classification Techniques for Breast Cancer Diagnosis,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.234-240, 2019.
[5] Pritom AI, Munshi MAR, Sabab SA, Shihab S. “Predicting breast cancer recurrence using effective classification and feature selection technique”. In 19th international conference on computer and information technology (ICCIT). New York: IEEE; 2016. p. 310–4.
[6] Lu J, Keech M. “Emerging technologies for health data analytics research: a conceptual architecture”. In 26th international workshop on database and expert systems applications (DEXA). IEEE; 2015. p. 225–9.
[7] Chaurasia V, Pal S. “A novel approach for breast cancer detection using data mining techniques”. In International journal of innovative research in computer and communication engineering (an ISO 3297: 2007 certified organization), vol. 2; 2017.
[8] Kumar UK, Nikhil MS, Sumangali K.” Prediction of breast cancer using voting classifier technique”. In IEEE international conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM).NewYork:IEEE;2017.p.108–14.
[9] Ajay Kumar, R. Sushil , A. K. Tiwari.” Comparative Study of Classification Techniques for Breast Cancer Diagnosis”. International Journal of Computer Science and Engineering(IJCSE), Vol.-7, Issue-1, p.234-240 Jan 2019.
[10] Vikas S, Thimmaraju S N. “Breast Cancer Diagnosis and Classification Using Support vector machines With Diverse Datasets”. International Journal of Computer Science and Engineering(IJCSE), Vol.-7, Issue-4, p.442-446,April 2019.
Citation
Jency Gracy Bai A., Lathikaa Sri M., Jayalakshmi M., Harinii M., K. Amshakala, "Multi-Class Cancer Classification Using Dimensionally-Reduced Breast Cancer Data," International Journal of Computer Sciences and Engineering, Vol.8, Issue.5, pp.61-69, 2020.