Pub Date : 2016-12-01DOI: 10.1007/978-981-13-1951-8_53
Sajib Chatterjee, Resheta Ahmed Smrity, Md. Rafiqul Islam
{"title":"Protein structure prediction using chemical reaction optimization","authors":"Sajib Chatterjee, Resheta Ahmed Smrity, Md. Rafiqul Islam","doi":"10.1007/978-981-13-1951-8_53","DOIUrl":"https://doi.org/10.1007/978-981-13-1951-8_53","url":null,"abstract":"","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860179
B. Barua, S. Majumder, A. Melloni
In recent years, silicon photonics has attracted attention as an emerging technology for optical telecommunications and for optical interconnects in microelectronics. The refractive index contrast plays a fundamental role in determining the characteristics of an optical dielectric waveguide and a higher index contrast permits to move towards larger scales of integration and to access new devices and functionalities. But high contrast waveguides are more difficult to realize and more critical but there are no serious impediments in their use. The aim of this contribution is to investigate the dependence of the waveguide characteristics with respect to the index contrast and explore the difficulties. In this paper, the impact of the index contrast on the characteristics of dielectric waveguides such as single mode regime, losses, fiber to waveguide coupling, technological constraints and available materials are investigated. The investigation shows that the dependence of the sensitivity in optical waveguide sensors on the polarization of guided modes is less in small refractive index difference waveguide compare than the silicon on silica waveguides but it provide flexibility to the design engineers.
{"title":"Characterization of low index Si waveguides","authors":"B. Barua, S. Majumder, A. Melloni","doi":"10.1109/ICCITECHN.2016.7860179","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860179","url":null,"abstract":"In recent years, silicon photonics has attracted attention as an emerging technology for optical telecommunications and for optical interconnects in microelectronics. The refractive index contrast plays a fundamental role in determining the characteristics of an optical dielectric waveguide and a higher index contrast permits to move towards larger scales of integration and to access new devices and functionalities. But high contrast waveguides are more difficult to realize and more critical but there are no serious impediments in their use. The aim of this contribution is to investigate the dependence of the waveguide characteristics with respect to the index contrast and explore the difficulties. In this paper, the impact of the index contrast on the characteristics of dielectric waveguides such as single mode regime, losses, fiber to waveguide coupling, technological constraints and available materials are investigated. The investigation shows that the dependence of the sensitivity in optical waveguide sensors on the polarization of guided modes is less in small refractive index difference waveguide compare than the silicon on silica waveguides but it provide flexibility to the design engineers.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129492574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860265
Afrina Khatun, K. Sakib
Automatic bug assignment is an essential activity aiming at assigning bugs to appropriate developers. Existing approaches consider either recent commits or previous bug fixes of developers, leading to recommendation of inexperienced or inactive developers respectively. Considering only one information source leads these approaches to low prediction accuracy. An approach called ERBA is proposed, which considers both expertise and recent activities of developers. ERBA first processes source code and commit logs to construct an index connecting the source entities with developer recent activities. Next, it takes fixed bug reports and builds another index, mapping the bug report keywords with developer bug fixing expertise. On arrival of new bug reports, the final module queries the two indexes using the new bug report terms, and applies tf-idf technique on the query result to calculate an ERBA score for developers. Finally, an ascending ordered list on ERBA score is suggested. For assessment of competency, a case study has been conducted on Eclipse JDT. It depicts that ERBA outperforms existing approach by improving prediction accuracy from 33.8% upto 44%. The result also represents that ERBA shows the first correct developer on average near 4.04 ranks, whereas existing approach shows in 7.27.
{"title":"A bug assignment technique based on bug fixing expertise and source commit recency of developers","authors":"Afrina Khatun, K. Sakib","doi":"10.1109/ICCITECHN.2016.7860265","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860265","url":null,"abstract":"Automatic bug assignment is an essential activity aiming at assigning bugs to appropriate developers. Existing approaches consider either recent commits or previous bug fixes of developers, leading to recommendation of inexperienced or inactive developers respectively. Considering only one information source leads these approaches to low prediction accuracy. An approach called ERBA is proposed, which considers both expertise and recent activities of developers. ERBA first processes source code and commit logs to construct an index connecting the source entities with developer recent activities. Next, it takes fixed bug reports and builds another index, mapping the bug report keywords with developer bug fixing expertise. On arrival of new bug reports, the final module queries the two indexes using the new bug report terms, and applies tf-idf technique on the query result to calculate an ERBA score for developers. Finally, an ascending ordered list on ERBA score is suggested. For assessment of competency, a case study has been conducted on Eclipse JDT. It depicts that ERBA outperforms existing approach by improving prediction accuracy from 33.8% upto 44%. The result also represents that ERBA shows the first correct developer on average near 4.04 ranks, whereas existing approach shows in 7.27.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860169
Md. Jubaer Alam, M. Faruque, Md. Moinul Islam
A fictional design of a compact microstrip patch antenna for multiband frequency has been depicted in this paper. The proposed design presents a slit P-shaped antenna that operates at 3.5 GHz, 5.9 GHz, 9.2 GHz and 13.1 GHz. FR-4 (lossy) is used as substrate to design the recommended antenna which has a firm dimension of 18 × 20 mm2. This antenna operates at S, C, X and Ku band with moderate bandwidth because of its design and feedline. This P-shaped multiband antenna has directive gain of 3.3dBi, 4.9 dBi, 6.5 dBi and 7.1 dBi at resonating frequencies and is suitable for a modern communication system. Regarding this antenna, the results are obtained in terms of Return Loss, Voltage Standing Wave ratio, Gain and Radiation Pattern which have admissible values of return loss less than −10 dB, VSWR less than 2 at each resonant frequencies and Gain more than 3 dB.
{"title":"Design of a split P-shaped multiband microstrip patch antenna for modern communication system","authors":"Md. Jubaer Alam, M. Faruque, Md. Moinul Islam","doi":"10.1109/ICCITECHN.2016.7860169","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860169","url":null,"abstract":"A fictional design of a compact microstrip patch antenna for multiband frequency has been depicted in this paper. The proposed design presents a slit P-shaped antenna that operates at 3.5 GHz, 5.9 GHz, 9.2 GHz and 13.1 GHz. FR-4 (lossy) is used as substrate to design the recommended antenna which has a firm dimension of 18 × 20 mm2. This antenna operates at S, C, X and Ku band with moderate bandwidth because of its design and feedline. This P-shaped multiband antenna has directive gain of 3.3dBi, 4.9 dBi, 6.5 dBi and 7.1 dBi at resonating frequencies and is suitable for a modern communication system. Regarding this antenna, the results are obtained in terms of Return Loss, Voltage Standing Wave ratio, Gain and Radiation Pattern which have admissible values of return loss less than −10 dB, VSWR less than 2 at each resonant frequencies and Gain more than 3 dB.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123621644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860211
M. Sarkar, T. K. Roy, M. Sarkar, J. R. Mou
In this paper, a dual hop diversity communication system which is highly confidential for wireless applications is proposed to transmit the secret information from the source to receiver in the presence of interferences. In this proposed wireless communication system, the receiver is equipped with multiple antennas whereas the relays and interference are equipped with single antenna. The output signal is combined with a maximum ratio combiner (MRC) and then process it by the weighting vector and finally amplifying the receive signal by the relays. To do that the amplify-and-forward (AF) as well as decode-and forward (DF) strategies of the relays are used to increase the signal strength of the receive diversity and relay gain. Moreover, moment generating function (MGF) is used to maximize the diversity order for increasing the capacity of the receive signal and symbol error probability (SEP). Finally, the Monte Carlo simulation model is used to show the effectiveness of the proposed technique. From the simulation results, it is clear that the receive signal capacity can be significantly optimized in terms of SEP by using the AF, and DF strategies.
{"title":"Security enhancement in the receive diversity with co-operative relay for wireless networks","authors":"M. Sarkar, T. K. Roy, M. Sarkar, J. R. Mou","doi":"10.1109/ICCITECHN.2016.7860211","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860211","url":null,"abstract":"In this paper, a dual hop diversity communication system which is highly confidential for wireless applications is proposed to transmit the secret information from the source to receiver in the presence of interferences. In this proposed wireless communication system, the receiver is equipped with multiple antennas whereas the relays and interference are equipped with single antenna. The output signal is combined with a maximum ratio combiner (MRC) and then process it by the weighting vector and finally amplifying the receive signal by the relays. To do that the amplify-and-forward (AF) as well as decode-and forward (DF) strategies of the relays are used to increase the signal strength of the receive diversity and relay gain. Moreover, moment generating function (MGF) is used to maximize the diversity order for increasing the capacity of the receive signal and symbol error probability (SEP). Finally, the Monte Carlo simulation model is used to show the effectiveness of the proposed technique. From the simulation results, it is clear that the receive signal capacity can be significantly optimized in terms of SEP by using the AF, and DF strategies.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860230
B. Pal, Boshir Ahmed
Pattern classification in domains that follow dissimilar distribution and where target domain has insufficient labelled samples, requires transfer of knowledge across domains through a process called domain adaption. Deep learning research demonstrates the transferability of deep convolutional features that are activations of intermediate layers of convolutional neural networks for domain adaption. Traditional clustering based domain adaption approaches are practical to handle knowledge transfer scenario. This paper presents a scheme that uses local neighborhoods based consistency analysis of one supervised and another unsupervised model to effectively transfer knowledge using deep features. Contrasting conventional models this approach uses only two models to classify patterns except hard ones. Neighbourhood consistency analysis identifies the hard samples, and is classified using a third model. Experimental analysis has been carried out focusing change on category variation of different samples for train and test cases. The proposed approach yields encouraging experimental result on benchmark domain adaption dataset compared to a deep feature based single support vector machine classifier in terms of state of the art metrics demonstrating effective generalization of source domain information.
{"title":"Neighbourhood consistency based deep domain adaption analysis for multi category object detection","authors":"B. Pal, Boshir Ahmed","doi":"10.1109/ICCITECHN.2016.7860230","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860230","url":null,"abstract":"Pattern classification in domains that follow dissimilar distribution and where target domain has insufficient labelled samples, requires transfer of knowledge across domains through a process called domain adaption. Deep learning research demonstrates the transferability of deep convolutional features that are activations of intermediate layers of convolutional neural networks for domain adaption. Traditional clustering based domain adaption approaches are practical to handle knowledge transfer scenario. This paper presents a scheme that uses local neighborhoods based consistency analysis of one supervised and another unsupervised model to effectively transfer knowledge using deep features. Contrasting conventional models this approach uses only two models to classify patterns except hard ones. Neighbourhood consistency analysis identifies the hard samples, and is classified using a third model. Experimental analysis has been carried out focusing change on category variation of different samples for train and test cases. The proposed approach yields encouraging experimental result on benchmark domain adaption dataset compared to a deep feature based single support vector machine classifier in terms of state of the art metrics demonstrating effective generalization of source domain information.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125148143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860255
P. Mondal, Rupam Deb, M. N. Huda
Financial services through the internet are running under various threats like phishing, pharming (cyber attack intended to redirect a website's traffic to another fake site), malware, and evolving sophistication of compromise techniques. Multi-factor authentication (MFA) financial service system alleviates the risk and makes it secure. Various methods of MFA run in troubles like the authentication device lost or stolen, false sense of security (if used on login device), compromised answer of the generic question, higher implementation costs, unambiguous movement profile, calculated hash value stolen (there is no chance to replace it), etc. Compliance with Anti-Money Laundering (AML), Know Your Customer (KYC) and sanction requirements continue to be a key focus area for Financial Institutions' (FIs) management; firms must ensure that they are following appropriate compliance procedures to meet the increasing regulatory demands [1,2]. By addressing existing limitation of MFA, this paper proposes dynamic KYC based MFA authentication method to ensure the secured access of the financial services through the internet. Analysis and simulation results show that the proposed method provides control same as existing MFA/2FA techniques, but customers will get relief from holding additional security devices that incur huge cost.
{"title":"Know your customer (KYC) based authentication method for financial services through the internet","authors":"P. Mondal, Rupam Deb, M. N. Huda","doi":"10.1109/ICCITECHN.2016.7860255","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860255","url":null,"abstract":"Financial services through the internet are running under various threats like phishing, pharming (cyber attack intended to redirect a website's traffic to another fake site), malware, and evolving sophistication of compromise techniques. Multi-factor authentication (MFA) financial service system alleviates the risk and makes it secure. Various methods of MFA run in troubles like the authentication device lost or stolen, false sense of security (if used on login device), compromised answer of the generic question, higher implementation costs, unambiguous movement profile, calculated hash value stolen (there is no chance to replace it), etc. Compliance with Anti-Money Laundering (AML), Know Your Customer (KYC) and sanction requirements continue to be a key focus area for Financial Institutions' (FIs) management; firms must ensure that they are following appropriate compliance procedures to meet the increasing regulatory demands [1,2]. By addressing existing limitation of MFA, this paper proposes dynamic KYC based MFA authentication method to ensure the secured access of the financial services through the internet. Analysis and simulation results show that the proposed method provides control same as existing MFA/2FA techniques, but customers will get relief from holding additional security devices that incur huge cost.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116077005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860224
Md Saiful Islam, Md Al Amin, Shapan Das Uzzal
The sentiment of a sentence or a comment can be detected more accurately by applying Word Embeddings. This article presents the idea of word co-occurrence matrix and Skip-Gram to determine the actual contexts of the words, Hellinger PCA to determine the most similar words and generate a sliding window of most probable context words around each word. It is shown that, by applying Word Embeddings to classify the sentiment of a comment achieves higher accuracy with larger corpus. For our corpus of 2500 comments, the accuracy achieved is 70%, which is rapidly increasing with the size of the corpus.
{"title":"Word embedding with hellinger PCA to detect the sentiment of bengali text","authors":"Md Saiful Islam, Md Al Amin, Shapan Das Uzzal","doi":"10.1109/ICCITECHN.2016.7860224","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860224","url":null,"abstract":"The sentiment of a sentence or a comment can be detected more accurately by applying Word Embeddings. This article presents the idea of word co-occurrence matrix and Skip-Gram to determine the actual contexts of the words, Hellinger PCA to determine the most similar words and generate a sliding window of most probable context words around each word. It is shown that, by applying Word Embeddings to classify the sentiment of a comment achieves higher accuracy with larger corpus. For our corpus of 2500 comments, the accuracy achieved is 70%, which is rapidly increasing with the size of the corpus.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124015336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860190
A. Habib, Muhidul Islam Khan, J. Uddin
Success of any supply chain highly depends on the appropriate use of transportation. It is always a tough decision to select an optimal route in the stages of a supply chain that will balance the reverse condition of cost and time. Q-learning is already getting implied to optimize routes, but it greatly lacks in designing a complete Markov Decision Process (MDP) with enough number of states and actions sets. In this paper, we propose an MDP that can fit the design of a proper multi-stage supply chain network and intend to solve the MDP with SARSA (X) algorithm. The algorithm was simulated in a java based environment and experimental results show that Q-learning produced higher chunks of rewards but SARSA (X) was faster in case of convergence speed.
{"title":"Optimal route selection in complex multi-stage supply chain networks using SARSA(λ)","authors":"A. Habib, Muhidul Islam Khan, J. Uddin","doi":"10.1109/ICCITECHN.2016.7860190","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860190","url":null,"abstract":"Success of any supply chain highly depends on the appropriate use of transportation. It is always a tough decision to select an optimal route in the stages of a supply chain that will balance the reverse condition of cost and time. Q-learning is already getting implied to optimize routes, but it greatly lacks in designing a complete Markov Decision Process (MDP) with enough number of states and actions sets. In this paper, we propose an MDP that can fit the design of a proper multi-stage supply chain network and intend to solve the MDP with SARSA (X) algorithm. The algorithm was simulated in a java based environment and experimental results show that Q-learning produced higher chunks of rewards but SARSA (X) was faster in case of convergence speed.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115824165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCITECHN.2016.7860205
M. Aktar, M. Mamun, M. Hossain, M. S. R. Shuvo
Change detection from remote sensing images is getting more interest now a days because of abrupt changes in earth surface due to natural disasters or man-made activities. So it's an important research question of how to extract relevant information about the changes due to rainfall, droughts, flooding, destroying land cover areas and so on. This problem has been studied in some research however many of these did not consider the nonlinear relationship while detecting the changes. In this research, above limitation has been addressed and Weighted Normalized Mutual Information (WNMI) is utilized for the improvement. The WNMI technique has been applied between the reference and target images to find out the changes. Thus the changes between every object of the given dataset have been identified and able to observe the damage of any specific area as well as its subsequent recovery. Weighting has been done to count significance at the pixel level. The proposed technique can detect the changes more effectively than the traditional mutual information approach. Experimental analysis is carried on real remote sensing images and it is found that the proposed method can detect more than 96% of changes which is much better than the standard benchmark techniques.
{"title":"Weighted normalized mutual information based change detection in remote sensing images","authors":"M. Aktar, M. Mamun, M. Hossain, M. S. R. Shuvo","doi":"10.1109/ICCITECHN.2016.7860205","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2016.7860205","url":null,"abstract":"Change detection from remote sensing images is getting more interest now a days because of abrupt changes in earth surface due to natural disasters or man-made activities. So it's an important research question of how to extract relevant information about the changes due to rainfall, droughts, flooding, destroying land cover areas and so on. This problem has been studied in some research however many of these did not consider the nonlinear relationship while detecting the changes. In this research, above limitation has been addressed and Weighted Normalized Mutual Information (WNMI) is utilized for the improvement. The WNMI technique has been applied between the reference and target images to find out the changes. Thus the changes between every object of the given dataset have been identified and able to observe the damage of any specific area as well as its subsequent recovery. Weighting has been done to count significance at the pixel level. The proposed technique can detect the changes more effectively than the traditional mutual information approach. Experimental analysis is carried on real remote sensing images and it is found that the proposed method can detect more than 96% of changes which is much better than the standard benchmark techniques.","PeriodicalId":287635,"journal":{"name":"2016 19th International Conference on Computer and Information Technology (ICCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129016590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}