Pub Date : 2021-09-30DOI: 10.51682/jiscom.00202003.2021
Ashutosh Kumara, Neha Janu
Digital images are important part of our life. Copy and Move forgery detection techniques are designed to detect edited part of the image. The copy and move forgery techniques are based on the feature detection and matching. The techniques which are designed so far use the Euclidean distance concept for feature matching. The feature detection techniques which are much popular like Haar transformation are used for feature extraction. In this research, the PCA algorithm is used for the simplification of features which are extracted with Haar transformation. The GLCM algorithm is used for texture feature analysis of input image. In the end, Euclidean distance is used for feature matching and mismatched features are marked as forgery. The proposed approach is implemented in MALTAB and results are analyzed in terms of accuracy.
{"title":"Copy-Move Forgery Detection Based on Euclidean Distance and Texture Feature Analysis","authors":"Ashutosh Kumara, Neha Janu","doi":"10.51682/jiscom.00202003.2021","DOIUrl":"https://doi.org/10.51682/jiscom.00202003.2021","url":null,"abstract":"Digital images are important part of our life. Copy and Move forgery detection techniques are designed to detect edited part of the image. The copy and move forgery techniques are based on the feature detection and matching. The techniques which are designed so far use the Euclidean distance concept for feature matching. The feature detection techniques which are much popular like Haar transformation are used for feature extraction. In this research, the PCA algorithm is used for the simplification of features which are extracted with Haar transformation. The GLCM algorithm is used for texture feature analysis of input image. In the end, Euclidean distance is used for feature matching and mismatched features are marked as forgery. The proposed approach is implemented in MALTAB and results are analyzed in terms of accuracy.","PeriodicalId":296783,"journal":{"name":"Journal of Intelligent Systems and Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126212283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-30DOI: 10.51682/jiscom.00202002.2021
Ashutosh Kumar, G. Sharma
IEEE standard 802.15.4 defines two layers for low rate WPANs, which are physical layer and media access control layer, which restrict the data rate to 250 kbps. This alliance took low level PHY and MAC layers as the base for the development of the network protocol, security and application for the Zigbee. To solve the Problem of reduce cost and power consumption to make this technology easily available for common crowd. This system shows the total working details of the network, i.e., wireless voice communication. This work has been done to reduce the cost of entire production of such devices that contributes in home automation system and similar projects. The main objective of the research was to transfer voice over low-power micro-controller such as 8-bit micro-controller by the implementation of Zigbee.
{"title":"A Zigbee Based Framework for Low Power Voice Communication System","authors":"Ashutosh Kumar, G. Sharma","doi":"10.51682/jiscom.00202002.2021","DOIUrl":"https://doi.org/10.51682/jiscom.00202002.2021","url":null,"abstract":"IEEE standard 802.15.4 defines two layers for low rate WPANs, which are physical layer and media access control layer, which restrict the data rate to 250 kbps. This alliance took low level PHY and MAC layers as the base for the development of the network protocol, security and application for the Zigbee. To solve the Problem of reduce cost and power consumption to make this technology easily available for common crowd. This system shows the total working details of the network, i.e., wireless voice communication. This work has been done to reduce the cost of entire production of such devices that contributes in home automation system and similar projects. The main objective of the research was to transfer voice over low-power micro-controller such as 8-bit micro-controller by the implementation of Zigbee.","PeriodicalId":296783,"journal":{"name":"Journal of Intelligent Systems and Computing","volume":"1869 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128658444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-30DOI: 10.51682/jiscom.00202001.2021
Ankit Kumar, Neha Janu
Now a day’s image plays an important role to extract the information about the object in various industries. Many traditional methods have been employed to retrieve images. It interactively determines the user’s query by asking the user whether the image is relevant or not. In this information tech age, graphics have become a major portion of information processing. In the Image registration processing, the image plays an important part to extract the information regarding the item in a variety of fields including in tourism, medical and geological, weather systems calling. There are lots of Approaches individuals who are used to recover images. It interactively determines an individual's query by requesting the users whether the image will be relevant (similar) or maybe not. In content-based image retrieval (CBIR) system, effective company of this image database used to improve the functioning of the procedure. The research of content-based image retrieval (CBIR) technique has become a significant research topic. Being an individual, we've Studied and done investigation of various features in this manner or in mixes. We found that image Registration processing (IRP) is the key area in above mentioned industries. Various research papers through color feature and texture feature extraction were studied and concluded that point cloud data structure is best for image registration process using Iterative Closest Point (ICP) algorithm.
{"title":"Query-Based Image Retrieval using SVM","authors":"Ankit Kumar, Neha Janu","doi":"10.51682/jiscom.00202001.2021","DOIUrl":"https://doi.org/10.51682/jiscom.00202001.2021","url":null,"abstract":"Now a day’s image plays an important role to extract the information about the object in various industries. Many traditional methods have been employed to retrieve images. It interactively determines the user’s query by asking the user whether the image is relevant or not. In this information tech age, graphics have become a major portion of information processing. In the Image registration processing, the image plays an important part to extract the information regarding the item in a variety of fields including in tourism, medical and geological, weather systems calling. There are lots of Approaches individuals who are used to recover images. It interactively determines an individual's query by requesting the users whether the image will be relevant (similar) or maybe not. In content-based image retrieval (CBIR) system, effective company of this image database used to improve the functioning of the procedure. The research of content-based image retrieval (CBIR) technique has become a significant research topic. Being an individual, we've Studied and done investigation of various features in this manner or in mixes. We found that image Registration processing (IRP) is the key area in above mentioned industries. Various research papers through color feature and texture feature extraction were studied and concluded that point cloud data structure is best for image registration process using Iterative Closest Point (ICP) algorithm.","PeriodicalId":296783,"journal":{"name":"Journal of Intelligent Systems and Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-30DOI: 10.51682/jiscom.00202004.2021
Sarthak Maggu, Vijander Singh
The world was stuck by a deadly virus last year, which stopped the world and changed it completely. The virus was given the name “Corona.” It has had an everlasting effect on human lives which has caused a lot of people to study about it, following the trend we have chosen “Prediction and analysis of Covid - 19 with different ML algorithms and comparative analysis” as the title of this paper. The title of the paper is self-explanatory to explain what the paper is about and what technology will be used in the paper. The paper will use data cleaning and plotting techniques to analyse the impact and effect of Covid on human lives and various algorithms to predict how vulnerable the person is to the virus / predict whether a person suffered from Covid or not based on various parameters. The main ingredient of the paper will be the data on which the model will be built, will be collected through various Google forms or through open source data websites such as Kaggle. The paper would be divided into various parts, which will include data collection, data cleaning, data plotting etc. After cleaning of data and building of models using various ML algorithms, findings will be reported in a form of report using various plots to favour the findings of the various models.
{"title":"Prediction and Analysis of Covid-19 with various Machine Learning algorithms","authors":"Sarthak Maggu, Vijander Singh","doi":"10.51682/jiscom.00202004.2021","DOIUrl":"https://doi.org/10.51682/jiscom.00202004.2021","url":null,"abstract":"The world was stuck by a deadly virus last year, which stopped the world and changed it completely. The virus was given the name “Corona.” It has had an everlasting effect on human lives which has caused a lot of people to study about it, following the trend we have chosen “Prediction and analysis of Covid - 19 with different ML algorithms and comparative analysis” as the title of this paper. The title of the paper is self-explanatory to explain what the paper is about and what technology will be used in the paper. The paper will use data cleaning and plotting techniques to analyse the impact and effect of Covid on human lives and various algorithms to predict how vulnerable the person is to the virus / predict whether a person suffered from Covid or not based on various parameters. The main ingredient of the paper will be the data on which the model will be built, will be collected through various Google forms or through open source data websites such as Kaggle. The paper would be divided into various parts, which will include data collection, data cleaning, data plotting etc. After cleaning of data and building of models using various ML algorithms, findings will be reported in a form of report using various plots to favour the findings of the various models.","PeriodicalId":296783,"journal":{"name":"Journal of Intelligent Systems and Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-30DOI: 10.51682/jiscom.00202005.2021
Sunil Kumar, Vaibhav Bhatnagar
Machine learning is one of the active fields and technologies to realize artificial intelligence (AI). The complexity of machine learning algorithms creates problems to predict the best algorithm. There are many complex algorithms in machine learning (ML) to determine the appropriate method for finding regression trends, thereby establishing the correlation association in the middle of variables is very difficult, we are going to review different types of regressions used in Machine Learning. There are mainly six types of regression model Linear, Logistic, Polynomial, Ridge, Bayesian Linear and Lasso. This paper overview the above-mentioned regression model and will try to find the comparison and suitability for Machine Learning. A data analysis prerequisite to launch an association amongst the innumerable considerations in a data set, association is essential for forecast and exploration of data. Regression Analysis is such a procedure to establish association among the datasets. The effort on this paper predominantly emphases on the diverse regression analysis model, how they binning to custom in context of different data sets in machine learning. Selection the accurate model for exploration is the most challenging assignment and hence, these models considered thoroughly in this study. In machine learning by these models in the perfect way and thru accurate data set, data exploration and forecast can provide the maximum exact outcomes.
{"title":"A Review of Regression Models in Machine Learning","authors":"Sunil Kumar, Vaibhav Bhatnagar","doi":"10.51682/jiscom.00202005.2021","DOIUrl":"https://doi.org/10.51682/jiscom.00202005.2021","url":null,"abstract":"Machine learning is one of the active fields and technologies to realize artificial intelligence (AI). The complexity of machine learning algorithms creates problems to predict the best algorithm. There are many complex algorithms in machine learning (ML) to determine the appropriate method for finding regression trends, thereby establishing the correlation association in the middle of variables is very difficult, we are going to review different types of regressions used in Machine Learning. There are mainly six types of regression model Linear, Logistic, Polynomial, Ridge, Bayesian Linear and Lasso. This paper overview the above-mentioned regression model and will try to find the comparison and suitability for Machine Learning. A data analysis prerequisite to launch an association amongst the innumerable considerations in a data set, association is essential for forecast and exploration of data. Regression Analysis is such a procedure to establish association among the datasets. The effort on this paper predominantly emphases on the diverse regression analysis model, how they binning to custom in context of different data sets in machine learning. Selection the accurate model for exploration is the most challenging assignment and hence, these models considered thoroughly in this study. In machine learning by these models in the perfect way and thru accurate data set, data exploration and forecast can provide the maximum exact outcomes.","PeriodicalId":296783,"journal":{"name":"Journal of Intelligent Systems and Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114809278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-31DOI: 10.51682/JISCOM.00101002.2020
Fatima Khalique, M. Hamdani, Sabeen Masood, Bushra Bashir Chaudhry, Abdul Rauf
Social networking sites and micro blogs provide tremendous amount of real time data every day. Sentiment analysis or opinion mining aims to automate the process of sentiment extraction from the user content available online. Twitter in recent years due to its high subscriber rate and diverse audience, has become increasingly powerful in representing and changing user opinions over an object or event. This paper focuses on research conducted within the field of twitter sentiment analysis. The objective is to comprehensively investigate the task of sentiment analysis and its sub processes and identify the different tools, techniques or other resources used or applied on twitter data during the process. A Systematic Literature Review (SLR) has been conducted to identify 40 researches, relevant to sentiment identification and analysis. The work presented covers major tools and techniques used during sentiment mining process and maybe utilized by researchers or practitioners for identifying potential research directions as well as suggest possible software development areas that need to be explored.
{"title":"A Compendium of Classification Techniques, Tools and Evaluation Datasets for Twitter Sentiment Analysis","authors":"Fatima Khalique, M. Hamdani, Sabeen Masood, Bushra Bashir Chaudhry, Abdul Rauf","doi":"10.51682/JISCOM.00101002.2020","DOIUrl":"https://doi.org/10.51682/JISCOM.00101002.2020","url":null,"abstract":"Social networking sites and micro blogs provide tremendous amount of real time data every day. Sentiment analysis or opinion mining aims to automate the process of sentiment extraction from the user content available online. Twitter in recent years due to its high subscriber rate and diverse audience, has become increasingly powerful in representing and changing user opinions over an object or event. This paper focuses on research conducted within the field of twitter sentiment analysis. The objective is to comprehensively investigate the task of sentiment analysis and its sub processes and identify the different tools, techniques or other resources used or applied on twitter data during the process. A Systematic Literature Review (SLR) has been conducted to identify 40 researches, relevant to sentiment identification and analysis. The work presented covers major tools and techniques used during sentiment mining process and maybe utilized by researchers or practitioners for identifying potential research directions as well as suggest possible software development areas that need to be explored.","PeriodicalId":296783,"journal":{"name":"Journal of Intelligent Systems and Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124849953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-31DOI: 10.51682/JISCOM.00101001.2020
A. Kaur, Srinidhi Ayyagari, Manasi Mishra, Rachit Thukral
Internet of Things (IoT) has emerged as a disruptive innovation that not only promises to transform every aspect of human activity but is driving revolutions in many fields, including but not limited to: healthcare, finance, agriculture, quality control and retail. For communicating data between connected devices in IoT ecosystem, various data exchange formats are presently in use. Determining the appropriate data format for an application plays a pivotal role in order to ensure efficient communication and reducing overheads. The intent of this literature review is to document and analyse literature relating to data exchange formats. The paper contains a systematic review of several academic research papers focused on performance evaluation and comparison of data formats. We reviewed the predominant data formats used for the purpose of data interchange and discussed the strengths, weaknesses and suitable application areas for the same.
{"title":"A Literature Review on Device-to-Device Data Exchange Formats for IoT Applications","authors":"A. Kaur, Srinidhi Ayyagari, Manasi Mishra, Rachit Thukral","doi":"10.51682/JISCOM.00101001.2020","DOIUrl":"https://doi.org/10.51682/JISCOM.00101001.2020","url":null,"abstract":"Internet of Things (IoT) has emerged as a disruptive innovation that not only promises to transform every aspect of human activity but is driving revolutions in many fields, including but not limited to: healthcare, finance, agriculture, quality control and retail. For communicating data between connected devices in IoT ecosystem, various data exchange formats are presently in use. Determining the appropriate data format for an application plays a pivotal role in order to ensure efficient communication and reducing overheads. The intent of this literature review is to document and analyse literature relating to data exchange formats. The paper contains a systematic review of several academic research papers focused on performance evaluation and comparison of data formats. We reviewed the predominant data formats used for the purpose of data interchange and discussed the strengths, weaknesses and suitable application areas for the same.","PeriodicalId":296783,"journal":{"name":"Journal of Intelligent Systems and Computing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131775997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-31DOI: 10.51682/JISCOM.00101005.2020
Sabeen Masood, Fatima Khalique, Bushra Bashir Chaudhry, Abdul Rauf
Cloud computing has emerged as a powerful new technology. The processing and computation power embedded in the cloud technology is not only flexible but also infinitely scalable and cost effective. Service oriented architecture (SOA) is a perfect stage for cloud computing. SOA has allowed customers and organizations to achieve cloud computing and reap its benefits that would not have been possible through any other architecture. This paper discusses the concept and importance of service oriented cloud computing by highlighting possible architectures, their benefits and critical success factors.
{"title":"Service Oriented Cloud Computing- The State of the Art","authors":"Sabeen Masood, Fatima Khalique, Bushra Bashir Chaudhry, Abdul Rauf","doi":"10.51682/JISCOM.00101005.2020","DOIUrl":"https://doi.org/10.51682/JISCOM.00101005.2020","url":null,"abstract":"Cloud computing has emerged as a powerful new technology. The processing and computation power embedded in the cloud technology is not only flexible but also infinitely scalable and cost effective. Service oriented architecture (SOA) is a perfect stage for cloud computing. SOA has allowed customers and organizations to achieve cloud computing and reap its benefits that would not have been possible through any other architecture. This paper discusses the concept and importance of service oriented cloud computing by highlighting possible architectures, their benefits and critical success factors.","PeriodicalId":296783,"journal":{"name":"Journal of Intelligent Systems and Computing","volume":"15 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120911160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}