Version-1 (Sep-Oct 2017)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Open Environment System: Rainfall Prediction Using Naïve Bayesian Algorithm |
Country | : | India |
Authors | : | Anik Pait || Venkatesan M |
: | 10.9790/0661-1905010110 |
Abstract: There has been a tremendous growth in data over the years. The question often lies in how the data is being used on a daily basis to predict the uncertainties. If we look at it from a climatic change perspective, though we have a lot of sources of data to be informed about the weather prediction and what if, a cost effective, simple and portable method is also available for the same. Hence the idea of "Open Environment System" is being proposed which is a prototype that will predict the possibility of the rainfall on a given day as well as can predict the minimum & maximum rainfall possible in that region on the particular month, based on the factors that cause rain along with the availability of the historical data .
[1] Tarun Agarwal,Temperature Sensor -Types, Working & Operation, EL-PRO-CUS (The Budding Electronic Engineers Knowledge
Space)
[2] SYHITECH SY-HS-220, Humidity Sensors, Electronic components Journal Papers:
[3] Ivan Simeonov, Hristo Killifarev and Raycho Ilarionov, Embedded System for Short Term Weather Forecasting", International
Conference on Computer Systems and Technologies,2006.
News Articles:
[4] Express News Service, Agency makes model to forecast for 20 days in advance every 5 days, Indianexpress.com,2015.
[5] Sakaal Times,New Weather forecasting system launched, Sakaaltimes.com,2013.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Current flood mitigation approaches consist of responding aptly to flooding events with either upstream or downstream measures. Upstream factors such as precipitation and other hydrological factors are the major triggers of flooding events within our environments. In order to address this issue, a conceptual framework will be introduced in this paper to identify various spatio-temporal data required for an enhanced flooding analysis as well as the pertinent processes involved which are needed........
Keywords: Flood Analysis, Long-lead flood Analysis, Spatio-temporal Data, Upstream Flooding
[1] Barredo, J. I., De Roo, A., & Lavalle, C. (2007). Flood risk mapping at European scale. Water Science and Technology, 56(4), 11-17.
[2] King, D. A. (2004). Climate change science: adapt, mitigate, or ignore?. Science, 303(5655), 176-177.
[3] Sang, J., Allen, P., Dunbar, J., & Hanson, G. (2014). Development of semi-physically based model to predict erosion rate of kaolinite clay under different moisture content. Canadian Geotechnical Journal, 52(5), 577-586.
[4] Wanders, N., Karssenberg, D., Roo, A. D., De Jong, S. M., & Bierkens, M. F. P. (2014). The suitability of remotely sensed soil moisture for improving operational flood forecasting. Hydrology and Earth System Sciences, 18(6), 2343-2357.
[5] Youssef, A. M., Pradhan, B., & Hassan, A. M. (2011). Flash flood risk estimation along the St. Katherine road, southern Sinai, Egypt using GIS based morphometry and satellite imagery. Environmental Earth Sciences, 62(3), 611-623..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Speech Synthesis for Punjabi Language Using Festival |
Country | : | India |
Authors | : | Pansy Nandwani || Dr. Dharam Veer Sharma |
: | 10.9790/0661-1905011421 |
Abstract: Processing of digital speech plays an important role in modern speech communication research and applications. The main propose of digital speech is communication which means transmission of messages between human and computer systems. The process of converting the written text into speech is called Text-to-Speech (TTS) and the generation of "synthetic" speech is known as Speech Synthesis. This paper discusses the development of Text-to-Speech system using festival framework for Punjabi language which is in Gurumukhi script. Since festival uses concatenation approach, diphone...............
Keywords: Concatenation Synthesis, Diphone, Festival, Punjabi, Speech synthesis.
[1] Mache Suhas R., Manasi R. Baheti, and C. Namrata Mahender, Review on Text-To-Speech Synthesizer, International Journal of Advanced Research in Computer and Communication Engineering,4(8), 2015, 54-59.
[2] Gupta Shruti and Parteek Kumar, Comparative study of text to speech system for Indian Language, International Journal of Advances in Computing and Information Technology, 1(2), 2012, 199-209.
[3] Mark Tatham and Katherine Morton, Developments in Speech Synthesis (United Kingdom, John Wiley & Sons, Ltd., 2005).
[4] Paul Taylor, Text-to-Speech Synthesis, (University of Cambridge, Cambridge University Press, 2009).
[5] Andrea Lynn Bowden, Punjabi Tonemics and the Gurmukhi Script: A Preliminary Study, Brigham Young University, United States of America, 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure and Practical Outsourcing of Linear Programming in Cloud Computing |
Country | : | India |
Authors | : | Naveen M || G Hemanth Kumar |
: | 10.9790/0661-1905012226 |
Abstract: Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. On the one hand, the outsourced computation workloads often contain...........
[1] M. Atallah and K. Frikken, "Securely outsourcing linear algebra computations," in Proc. of ASIACCS, 2010, pp. 48–59.g," in Proc.
Of ICDCS, 2004, pp. 4–11.
[2] Sun Microsystems, Inc., "Building customer trust in cloud computing with transparent security," 2009, online at
https://www.sun.com/offers/details/sun transparency.xml.
[3] Cong Wang, Kui Ren and Jia Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing", IEEE
INFOCOM 2011.
[4] M.A. Shah, R. Swaminathan, and M. Baker, "Privacy-PreservingAudit and Extraction of Digital Contents," Cryptology ePrint
Archive, Report 2008/186, 2008.
[5] G. Ateniese, S. Kamara, and J. Katz, "Proofs of Storage fromHomomorphic Identification Protocols,"Proc. 15th Int'l Conf.Theory and
Application of Cryptology and Information Security..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Privacy Preserving Public-Auditing for secure cloud Storage |
Country | : | India |
Authors | : | Naveena M || Bharath S Chetty || G hemantha Kumar |
: | 10.9790/0661-1905012730 |
Abstract: This privacy preserving public auditing for secure cloud storage will be carried out to design and develop Cloud computing technology which makes long dreamed vision of computing as a utility, where users can remotely store their data into the cloud. Thus, enabling public audit-ability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. For that purpose we securely introduce an effective third party auditor, TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. our contribution............
Keywords: Data integrity, Storage auditing, dynamic auditing, privacy-preserving auditing, cloud computing, zero knowledge.
[1] C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Storage Security in computing,"Proc. IEEE INFOCOM '10,Mar. 2010.
[2] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling PublicAuditability and Data Dynamics for Storage Security in Cloud Computing,"IEEE Trans. Parallel and Distributed Systems, vol. 22,no. 5, pp. 847-859, May 2011.
[3] Cloud Security Alliance, "Top Threats to Cloud Computing,"http://www.cloudsecurityalliance.org, 2010.
[4] M.A. Shah, R. Swaminathan, and M. Baker, "Privacy-PreservingAudit and Extraction of Digital Contents," Cryptology ePrint Archive, Report 2008/186, 2008.
[5] G. Ateniese, S. Kamara, and J. Katz, "Proofs of Storage fromHomomorphic Identification Protocols,"Proc. 15th Int'l Conf.Theory and Application of Cryptology and Information Security.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Genetic algorithm (GA) is a heuristic search algorithm based on the idea of natural selection that occurs in the process of evolution and genetic operations. One of the critical stages in the genetic algorithm is a crossover process. In the crossover, phase occurs the gene mix between the parent that it will determine the diversity in the population. This paper will describe the effects of the alpha parameter in the crossover process which includes arithmetic crossover and heuristic crossover. The Case studies that used in this study is the Traveling Salesman Problem (TSP). The influence of parameters on the performance of genetic algorithm alpha is associated with gene diversity resulting from the crossover..........
Keywords : Genetic Algorithm, Alpha Parameter, Arithmetic Crossover, Heuristic Crossover
[1] Biggs, N.L., Lloyd, E.K. and Wilson, R.J. 1976. Graph Theory 1736-1936. Clarendon Press: Oxford Eiben, A.E. & Smith, J.E.
2007. Introduction to Evolutionary Computing Genetic Algorithms. Springer: New York
[2] Gupta, Deepti, Ghafir, Shabina. 2012. An Overview of Methods Maintaining Diversity in Genetic Algorithms.International Journal
of Emerging Technology and Advanced Engineering (IJETAE)2(5): 56-60
[3] Gupta, Saloni, Panwar, Poonam. 2013. Solving Travelling Salesman Problem Using Genetic Algorithm. International Journal of
Advanced Research in Computer Science and Software Engineering 3(6): 376-380
[4] Hole, Komal R, Gulhane, Vijay S, Shellokar, Nitin D. 2013. Application of Genetic Algorithm for Image Enhancement and
Segmentation. International Journal of Advanced Research in Computer Engineering & Technology 2(4): 1342-1346
[5] Holland JH. 1975. Adaptation in Natural and Artificial Systems. The University of MichiganPress: Ann Arbor.
[6] Kasim, Nurhayati, Majid, Hairudin Abdul, Samah, Azurah A. 2012. Parameter Estimation of Warranty Cost Model Using Genetic
Algorithm. International Journal of Soft Computing and Engineering2(5): 163-166
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Social Network is one of the most popular interactive medium to share, communicate and distribute information. Social Network is the platform to build social relations among people. Users have the ability to keep in touch with friends by exchanging different types of information or messages. Sometimes people post messages which cause a serious problem like harassing or blackmailing to users. The message content may be impolite. The words like offensive, hate, vulgar etc are available in the message. Those messages are detect as spam using information filtering. The Summarization...........
Keywords : Back Propagation Neural Network, Inverse Document Frequency, Neural Text Classifier, Support Vector Machine , Term Frequency
[1]. M. Vanetti, E. Binaghi, E. Ferrari, B. Carminati, and M. Carullo, "A system to filter unwanted messages from OSN user walls,"IEEE Transactions on Knowledge and data Engineering, vol. 25, no. 2, pp.285-297, 2013.
[2]. P. Salunkhe, S. Bharne, and P. Padiya, "Filtering unwanted messages from OSN walls," in 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) IEEE, pp. 261-264.
[3]. P.-y. Zhang and C.-h. Li, "Automatic text summarization based on sentences clustering and extraction," IEEE International Conference on Computer Science and Information Technology. IEEE, 2009, pp. 167-170.
[4]. M. K. Dalal and M. A. Zaveri, "Automatic text classification: a technical review," International Journal of Computer Applications, vol. 28, no. 2, pp. 37-40, 2011.
[5]. A. R. Pal and D. Saha, "An approach to automatic text summarization using wordnet," Advance Computing Conference (IACC), 2014 IEEE International. IEEE, 2014, pp. 1169-1173..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Use Intelligent Techniques in Detecting Straight Lines in Digital Images |
Country | : | India |
Authors | : | Ahmed H. Zaker |
: | 10.9790/0661-1905014247 |
Abstract: Knowledge about the lines in an image is useful in many applications, e.g. in Computer vision. If the equations of the same line in several 2D images are known, then it is possible to get the coordinates of the 3D object giving rise to the 2D images. To manually extract the line information from an image can be very tiring and time-consuming especially if there are many lines in the image. An automatic method is preferable, but is not as trivial as edge detection since one has to determine which edge point belongs to which line, if any. The Hough-transform makes this separation possible and is the method we have used in our program for automatic line detection.For better results we will Hybrid hough method with genetic algorithm will reach perfect results.
[1]. Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins , "Digital image processing using matlab", Prentice-Hall, Inc. Upper Saddle River ,2007.
[2]. R. Fisher, S. Perkins, A. Walker and E. Wolfart, "image processing Learning resources",2003. http:// homepages.inf.ed.ac.uk/ rbf / HIPR2/ gsmooth.htm.
[3]. Scott E.Umbaugh, Ph.D., "computer vision and image processing", Prentice-Hall, Inc. A Simon & Schuster Company, Upper Saddle River, 1998.
[4]. Roger L. Wainwright, "Introduction to Genetic Algorithms Theory and Applications", University of Tulsa, 1993.
[5]. Tang W. &Hiu W. "genetic Algorithms", Surprise 96 Journal,http://www.Doc.ic.ac.uk/~nd/surprise_96/journal/vo14/tcw2/report.html#Introduction
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper provides an overview of projection, partitioning and segmentation of big data using HP vertica. The main aim is to summarize the benefits and restrictions in utilizing HP vertica for big data analysis. We provide an example of projection, partitioning and segmentation that relies on big data analysis.
Keywords: Projection, big data, partition, segmentation, vertica.
[1]. Gartner. Gartner says solving 'big data' challenge involves more than just managing volumes of data. USA: Gartner. [Online] Available from: http://www.gartner.com/newsroom/id/1731916
[2]. Hewlett Packard Enterprise on 2/8/2017 at 8:08 AM released https://my.vertica.com/docs/7.2.x/ for 7.2 HP vertica enterprise/community edition release notes
[3]. http://vertica.tips/resources/development/
[4]. https://my.vertica.com/docs/7.2.x/HTML/index.htm#Authoring/AdministratorsGuide/Partitions/PartitioningAndSegmentingData
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Solid Transportation Problem is formulated as a profit maximization problem under a budget constraint and fixed charge at each destination. The items are transported to different destinations from different origins using different vehicles. It is assumed that transported units are integer multiple of packets. Selling prices and purchase costs are different at different destinations and origins respectively. So the problem is formulated as constraint optimization integer programming problem. To solve the problem a sequence of different cell of transportation problem is taken as a coded solution of the problem and from this coded solution actual allocation is made by a proposed rule............
Keywords: Solid Transportation Problem, Variable Search Strategy, Swap Operator, Swap Sequence
[1]. Michalewicz, Z. (1992). Genetic algorithm + data Structure = evolution programs.
[2]. M.S.Kiran, H.Hakli, M.Gunduz, H. Uguz; Artificial bee colony algorithm with variable search strategy for continuous optimization; Information Science 300 (2015) 140-157
[3]. C.DeBao, Z. ChunXia; Particle swarm optimization with adaptive population size and its application; Applied Soft Computing XXX (2008) XXX-XXX
[4]. P. K..Giri, M. K. Maiti & M. Maiti, Profit Maximization Solid Transportation Problem under Budget Constraint Using Fuzzy Measures, Iranian Journal of Fuzzy Systems Vol.13, No. 5, (2016) pp. 35-63
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Heterogeneous Feature Fusion-Based Recognition Framework with LBP |
Country | : | India |
Authors | : | P. Kiran Kumar Reddy |
: | 10.9790/0661-1905015861 |
Abstract: A technique is proposed to extract system requirements for a maritime area surveillance system, based on an activity recognition framework originally intended for the characterization, prediction and recognition of intentional actions for threat recognition. To illustrate its utility, a single use case is used in conjunction with the framework to solicit surveillance system requirements. Face recognition has received a great deal of attention from the scientific and industrial communities over the past several decades owing to its wide range of applications in information security and access control, law enforcement, surveillance and more generally image understanding. In this paper we combine KLDA (combination of LBP and GABOR features) with gradient face features(which are more resistive............
Keywords: GABOR features, Local Ternary Patterns, LBP, face features..
[ 1] S. Shan, W. Gao, B. Cao, and D. Zhao, "Illumination normalization for robust face recognition against varying lighting conditions," in Proc.AMFG, Washington, DC, 2003, p. 157.
[ 2] Y. Adini, Y. Moses, and S. Ullman, "Face recognition: The problem of compensating for changes in illumination direction," IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 721–732, Jul. 1997.
[ 3] T. Ahonen, A. Hadid, and M. Pietikainen, "Face recognition with local binary patterns," in Eur. Conf. Comput. Vis., Prague, Czech Republic, 2005, pp. 469–481.
[ 4] R. Gross and V. Brajovic, "An image preprocessing algorithm for illumination invariant face recognition," in Proc. AVBPA, 2003, pp. 10–18.
[ 5] G.Borgefors, "Distance transformations in digital images,"Comput.Vis., Graphics Image Process., vol. 34, no. 3, pp. 344–371, 1986.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Diabetic Retinopathy (DR) is one of the leading retinal eye disease. In this disease, blood vessels of retina get damaged due to the leakage of blood and fluid in the surface of retina. The progression of disease will lead to the blindness or complete vision loss. Blood vessel extraction is very necessary for detection of diabetic retinopathy, as blood vessels get affected in DR. In this work, we have proposed a new method for blood vessel extraction. From the extracted vessels various features of blood vessels such as area, mean, standard deviation, energy, entropy, correlation, and homogeneity are calculated............
Keywords: Diabetic Retinopathy (DR), Field of View (FOV), Fundoscopy, Graphical User Interface (GUI), Non-proliferative diabetic retinopathy (NPDR), Proliferative diabetic retinopathy (PDR).
[1] "Eye health, Anatomy of eye" available on-line at http://www.visionaware.org/info/youreye- condition/eyehealth/anatomy-of-the-eye/125.
[2] Md.Jahiruzzaman, A. B. M. Aowlad Hossain, Detection and Classification of Diabetic Retinopathy Using K-Means Clustering and Fuzzy Logic, 18th International conference on Computer and Information technology (ICCIT), pp. 534-538, 21-23 December, 2015.
[3] https://medlineplus.gov/retinaldisorders.html
[4] R. Vidyasari, I. Sovani, T.L.R. Mengko, H. Zakaria, Vessel Enhancement Algorithm in Digital Retinal Fundus Microaneurysms Filter for Nonproliferative Diabetic Retinopathy Classification, International Conference on Instrumentation, Communication, Information Technology and Biomedical Engineering, Bandung, Indonesia, 8-9 November 2011.
[5] DU Ning, LI Yafen, Automated Identification of Diabetic Retinopathy Stages Using Support Vector Machine, Proceedings of the 32nd Chinese Control Conference, China, pp. 3882-3886, July 26-28, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The detrimental effects of high temperature on poultry production have been investigated by several researchers due to common occurrence of environmental stressors worldwide. It has been shown that high temperature negatively affects the welfare and significantly influence the survivability and performance of the poultry production. Hence, controlling the temperature of the poultry house within thermal neutral zone of poultry birds is indispensable in order to reduce their mortality and increase production. Most of the existing techniques utilized to control poultry house temperature within the thermal neutral zone of the bird were time consuming, tedious and require a continuous monitoring...........
Keywords: Metaheuristic, Particle Swamp Optimization, Poultry House Temperature, Thermal Regulation
[1] Z. Fuzhang. Optimized Algorithm for Particle Swarm Optimization. World Academy of Science, Engineering and Technology International Journal of Physical and Mathematical Sciences, 3(3), 2016,
[2] D. O Aborisade, S. Oladipo. Poultry House Temperature Control Using Fuzzy-PID Controller. International Journal of Engineering Trends and Technology (IJETT), 11(6), 2014,310-314.
[3] H. A. Olanrewaju, J. L. Purswell, S. D. Collier and S. L. Branton. Effect of Ambient Temperature and Light Intensity on Growth Performance and Carcass Characteristics of Heavy Broiler Chickens at 56 Days of Age. International Journal of Poultry Science, 9(8), 2010, 720-725.
[4] M. Czarick and L. Michael. Poultry Housing Tips: Environmental Controllers. University of Georgia Cooperative Extension Service. College of Agricultural and Environmental Sciences, Athen, Georgia 30602, USA. 1994.
[5] Liu Yi. Study on an Improved PSO Algorithm and its Application for Solving Function Problem. International Journal of Smart Home 10 (3) 2016), 51-62.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Redundancy is the root of several problems in a relational schema. Redundancy simply means repetition of information. In minimizing the set of Functional Dependencies (FDs), database will be made consistent and correct. This paper focuses on solving redundancy problem of Functional Dependencies in a relational schema using the closure of Functional dependency and minimal cover algorithm. An algorithm was designed using the three Armstrong's axioms which are reflexivity, augmentation and transitivity and implemented to generate closure of functional dependencies (FDs) called F+. Other rules used are decomposition, union and pseudo-transitivity............
Keywords: Functional Dependency, Minimal Cover, Database redundancy, Relational schema, Closure
[1]. Anupama A, Vijak K "Mining Functional Dependency in Relational Databases using FUN and Dep-Miner: A comparative study" in Proceedings of IJCA, September 2013.
[2]. Jalal A, Dojanah B, Arafat A "Mining Functional Dependency from Relational Databases Using Equivalent Classes and Minimal Cover" in Proceedings of Journal of Computer Science, 2008.
[3]. Maier D. (1983). "The Theory of Relational Databases". New York, NY: Computer Science Press Management Systems. Interim Report, FDT. ACM SIGMOD Bulletin, 7(2)
[4]. American National Standards Institute (1975). "ANSI/X3/SPARC Study Group on Database"
[5]. Armstrong, W. W. (1974). "Dependence Structures of Database Relationships". Pages 580-583 of: IFIP World Congress 1974. North-Holland.
[6]. CODASYL Database Task Group Report (1971). ACM, New York, April 1971
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Development of GIS database and Web application for Aurangabad Tourism |
Country | : | India |
Authors | : | Monali Rajendra Baviskar |
: | 10.9790/0661-1905018291 |
Abstract: Tourism has been noted to be one of the important and growing sectors of the Aurangabad economy. Tourism is a highly complex activity which requires tools that aid in an effective decision-making to come to terms with the better economic, social and environmental demands of sustainable development. Geographic Information System (GIS) is one of such tools for tourism. GIS being Associate in Nursing system that's capable of responsive questions about wherever facilities and resources are placed represents monumental edges to the commercial enterprise sector of any economy. The power of GIS lies not solely examine spatial relationships, however additionally...........
Keywords: Geographic information systems (GIS), Aurangabad, CMS, XAMPP.
[1] Dogru, A. G., Selcuk, T., Ozener, H., Gurkan, O. & Toz, G. Developing a web-based gis application for earthquake information. At http: // cartesianos. Com / geodoc / isprs2004/yf/papers/954.pdf
[2] Duran, E., Seker, D. Z. & Shrestha, M. Web based information system for tourism resort: A case study for side/Manavgat. roceedings for XXth International Society for Photogrammetry and Remote Sensing, Istanbul, Turkey: 2 July 12–23 (2004).
[3] Singh, S.P., Sharma, J., Singh, P., "A GeoReferenced Information System for Tourism (GeoRIST)". International journal ofgeomatics and geosciences, Volume 2, No 2, (2011)
[4] Zografos, K. G. and Madas, M. A. "A Travel & tourism information system providing real-time, value-added logisticalservices on the move," in Proc. First International Conference on Mobile Business, 2002.
[5] Tyagi., N., "Web GIS application for customized tourist information system for Eastern U. P., India". Journal ofGeomatics, Vol 8 No. 1 April (2014).