Pub Date : 2021-01-01DOI: 10.1504/ijcaet.2021.10024321
Raveendra Kudamala, V. Rajendran
Many government and private organisations represent themselves to the public using their own symbols or logo which is unique from others so that anyone can easily identify their products or belongings. This gives an ownership and source documentation to the owner by simply providing such logos. Using these logos for document retrieval in World Wide Web is a booming research in present era. Since usage of virtual documentation is increased day by day and handling this large data becomes a problem while searching for single data. In present research arena various document image retrieval models is available based on classification and clustering techniques. In this graph techniques are used to identify the issues in the automatic logo detection model using back propagation neural network along with the single value decomposition model. This proposed research model concerned about the document retrieval system based on the logo matching process to attain better efficiency and accuracy than the earlier detection models.
{"title":"A Novel Automatic System for Logo Based Document Image Retrieval Using Hybrid SVDM-DLNN","authors":"Raveendra Kudamala, V. Rajendran","doi":"10.1504/ijcaet.2021.10024321","DOIUrl":"https://doi.org/10.1504/ijcaet.2021.10024321","url":null,"abstract":"Many government and private organisations represent themselves to the public using their own symbols or logo which is unique from others so that anyone can easily identify their products or belongings. This gives an ownership and source documentation to the owner by simply providing such logos. Using these logos for document retrieval in World Wide Web is a booming research in present era. Since usage of virtual documentation is increased day by day and handling this large data becomes a problem while searching for single data. In present research arena various document image retrieval models is available based on classification and clustering techniques. In this graph techniques are used to identify the issues in the automatic logo detection model using back propagation neural network along with the single value decomposition model. This proposed research model concerned about the document retrieval system based on the logo matching process to attain better efficiency and accuracy than the earlier detection models.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"15 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66714565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-07DOI: 10.1504/ijcaet.2020.10029316
S. Prabu, G. Ganapathy
Steganography is the claim to fame of disguising how correspondence is happening, by hiding information in other information. As picture encryption is a quickly creating innovation in the field of picture preparing, it can be portrayed as the strategy for encoding messages and data especially to such an extent that it can be gotten to ensured elements as it were. The paper manages an overview which deals about delineation enigma, along with its applications as well as techniques. It moreover endeavours so that it can recognise the essentials of a respectable enigma figuring as well as swiftly considers the steganography procedures that are better suitable for specific applications. Information transmission crosswise over systems is a typical practice according to the advancement of internet and sight and sound advances that develops exponentially today. The paper displayed about the mystery sharing of message by concealing it in a picture utilising the most ordinarily utilised least significant bit (LSB) method. Here, steganography went for concealing the information imperceptibly inside any media (picture, sound and video) so it ought to be unnoticeable to the unintended individual and in this manner accomplishing secured applications.
{"title":"Steganographic approach to enhance the data security in public cloud","authors":"S. Prabu, G. Ganapathy","doi":"10.1504/ijcaet.2020.10029316","DOIUrl":"https://doi.org/10.1504/ijcaet.2020.10029316","url":null,"abstract":"Steganography is the claim to fame of disguising how correspondence is happening, by hiding information in other information. As picture encryption is a quickly creating innovation in the field of picture preparing, it can be portrayed as the strategy for encoding messages and data especially to such an extent that it can be gotten to ensured elements as it were. The paper manages an overview which deals about delineation enigma, along with its applications as well as techniques. It moreover endeavours so that it can recognise the essentials of a respectable enigma figuring as well as swiftly considers the steganography procedures that are better suitable for specific applications. Information transmission crosswise over systems is a typical practice according to the advancement of internet and sight and sound advances that develops exponentially today. The paper displayed about the mystery sharing of message by concealing it in a picture utilising the most ordinarily utilised least significant bit (LSB) method. Here, steganography went for concealing the information imperceptibly inside any media (picture, sound and video) so it ought to be unnoticeable to the unintended individual and in this manner accomplishing secured applications.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42838121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-07DOI: 10.1504/ijcaet.2021.10020685
G. Jeyaraman, Janakiraman Subbiah
Retinal blood vessel detection employs a vital role in finding of retinal diseases like diabetic retinopathy and glaucoma. This paper presents an innovative unsupervised retinal blood vessel detection technique. First step is to generate a vessel enhanced image, then using calibre fuzzy c-means (CFCM) technique, first cluster the retinal image; next the clustered image is passed to the canny edge operator and finally post process the retinal image. CFCM clustering method for blood vessel detection is based on the choice of the number of clusters value. By using CFCM clustering function, compute the cluster centre, which commonly divides the image into four clusters. The proposed technique is obviously forceful into the modification of fuzzy c-means with canny algorithm. The proposed algorithm accomplishes an accuracy of about 95% of retinal images from three datasets DRIVE, STARE, and CHASE_DB1.
{"title":"Caliber fuzzy c-means algorithm applied for retinal blood vessel detection","authors":"G. Jeyaraman, Janakiraman Subbiah","doi":"10.1504/ijcaet.2021.10020685","DOIUrl":"https://doi.org/10.1504/ijcaet.2021.10020685","url":null,"abstract":"Retinal blood vessel detection employs a vital role in finding of retinal diseases like diabetic retinopathy and glaucoma. This paper presents an innovative unsupervised retinal blood vessel detection technique. First step is to generate a vessel enhanced image, then using calibre fuzzy c-means (CFCM) technique, first cluster the retinal image; next the clustered image is passed to the canny edge operator and finally post process the retinal image. CFCM clustering method for blood vessel detection is based on the choice of the number of clusters value. By using CFCM clustering function, compute the cluster centre, which commonly divides the image into four clusters. The proposed technique is obviously forceful into the modification of fuzzy c-means with canny algorithm. The proposed algorithm accomplishes an accuracy of about 95% of retinal images from three datasets DRIVE, STARE, and CHASE_DB1.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"13 1","pages":"306-324"},"PeriodicalIF":0.0,"publicationDate":"2020-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45955838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-30DOI: 10.1504/ijcaet.2020.10028047
P. Senthilnathan, A. Sirajudeen, V. Ilayaraja, M. Iyapparaja
Location area optimisation is used to diminish the location update cost and paging cost in mobile wireless communication networks. Retaining heuristic optimisation technique, helps to diminish the location and paging cost, the problem occurs in this technique is combinational optimisation in nature. Handiness of mobile users growing day by day and many users will be allocated to various mobile subscribers and thus forecasting the ideal area is always a big job. Charged system search algorithm (CSSA) is employed to overwhelm the local and global minima that happened often during the peers of the run process. The variants introduced into the CSSA include the wavelet models and the gravitational search algorithm (GSA) models. The prominent features of both wavelet model and GSA model are obtained and are shared with the charged system search algorithm to minimise the total cost experienced for location area optimisation in mobile wireless communication networks (MWCN).
{"title":"Proposed Variants of Charged System Search Algorithm for Location Area Optimization in Mobile Wireless Communication Networks","authors":"P. Senthilnathan, A. Sirajudeen, V. Ilayaraja, M. Iyapparaja","doi":"10.1504/ijcaet.2020.10028047","DOIUrl":"https://doi.org/10.1504/ijcaet.2020.10028047","url":null,"abstract":"Location area optimisation is used to diminish the location update cost and paging cost in mobile wireless communication networks. Retaining heuristic optimisation technique, helps to diminish the location and paging cost, the problem occurs in this technique is combinational optimisation in nature. Handiness of mobile users growing day by day and many users will be allocated to various mobile subscribers and thus forecasting the ideal area is always a big job. Charged system search algorithm (CSSA) is employed to overwhelm the local and global minima that happened often during the peers of the run process. The variants introduced into the CSSA include the wavelet models and the gravitational search algorithm (GSA) models. The prominent features of both wavelet model and GSA model are obtained and are shared with the charged system search algorithm to minimise the total cost experienced for location area optimisation in mobile wireless communication networks (MWCN).","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"13 1","pages":"192-216"},"PeriodicalIF":0.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45224971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-30DOI: 10.1504/ijcaet.2020.10029099
R. Pitchai, G. Reshma, J. Raja
In surveillance, several algorithms are used to extract meaningful information from an image captured. In the presence of intrusion, cameras will transmit captured images to the sink node via other intermediate nodes. Since, WSNs operate with limited resources; utilisation of resource is needed while processing and transporting images. As the node doesn't need whole image, prioritisation is one of the methods to utilise the available resource. It will prioritise images from its macro-blocks dynamically. Here the camera is attached in sensor nodes, which forms wireless multimedia sensor networks (WMSN). It applies an encoding scheme at the source node by naming the blocks as 'important' or 'not-important' based on the information they contain. Here image texture and spectral feature is used as priority measures to weight importance of macro-blocks by their GLCM properties. Experimental result discloses that priority scheme adapts itself to the quality requirements while reducing the bandwidth comparatively.
{"title":"An efficient packet image transmission based on texture content for border side security using sensor networks","authors":"R. Pitchai, G. Reshma, J. Raja","doi":"10.1504/ijcaet.2020.10029099","DOIUrl":"https://doi.org/10.1504/ijcaet.2020.10029099","url":null,"abstract":"In surveillance, several algorithms are used to extract meaningful information from an image captured. In the presence of intrusion, cameras will transmit captured images to the sink node via other intermediate nodes. Since, WSNs operate with limited resources; utilisation of resource is needed while processing and transporting images. As the node doesn't need whole image, prioritisation is one of the methods to utilise the available resource. It will prioritise images from its macro-blocks dynamically. Here the camera is attached in sensor nodes, which forms wireless multimedia sensor networks (WMSN). It applies an encoding scheme at the source node by naming the blocks as 'important' or 'not-important' based on the information they contain. Here image texture and spectral feature is used as priority measures to weight importance of macro-blocks by their GLCM properties. Experimental result discloses that priority scheme adapts itself to the quality requirements while reducing the bandwidth comparatively.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44053734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-30DOI: 10.1504/IJCAET.2020.10019757
H. C. Kantharaju, K. N. N. Murthy
Wireless sensor networks (WSN) are infrastructure less and self-configured a wireless network that allows monitoring the physical conditions of an environment. Many researchers focus on enhancing the performance of WSN in order to provide effective delivery of data on the network, but still results in lower quality of services like energy consumption, delay and routing. We tackle this problem by introducing a new routing algorithm, QoS-based explicit routing algorithm which helps in transmitting the data from source node to destination node on WSN. We also involve clustering process in WSN based on genetic algorithm and particle swarm optimisation (GA and PSO) algorithm. We proposed identity-based digital signature (IBDS) and enhanced identity-based digital signature (EIBDS) that involves reduction of computation overhead and also increasing resilience on the WSN. We also use advanced encryption standard (AES), for ensuring the security between nodes and avoid hacking of data by other intruders.
{"title":"Enhancing Performance Of WSN By Utilizing Secure Qos Based Explicit Routing","authors":"H. C. Kantharaju, K. N. N. Murthy","doi":"10.1504/IJCAET.2020.10019757","DOIUrl":"https://doi.org/10.1504/IJCAET.2020.10019757","url":null,"abstract":"Wireless sensor networks (WSN) are infrastructure less and self-configured a wireless network that allows monitoring the physical conditions of an environment. Many researchers focus on enhancing the performance of WSN in order to provide effective delivery of data on the network, but still results in lower quality of services like energy consumption, delay and routing. We tackle this problem by introducing a new routing algorithm, QoS-based explicit routing algorithm which helps in transmitting the data from source node to destination node on WSN. We also involve clustering process in WSN based on genetic algorithm and particle swarm optimisation (GA and PSO) algorithm. We proposed identity-based digital signature (IBDS) and enhanced identity-based digital signature (EIBDS) that involves reduction of computation overhead and also increasing resilience on the WSN. We also use advanced encryption standard (AES), for ensuring the security between nodes and avoid hacking of data by other intruders.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"13 1","pages":"101-124"},"PeriodicalIF":0.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45525274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-05DOI: 10.1504/IJCAET.2020.10020251
Akara Thammastitkul, B. Uyyanonvara, S. Barman
Diabetic retinopathy usually does not presents symptoms in an early stage until it gets to a severe stage. An early stage of diabetic retinopathy is associated with the presence of microaneurysms (MAs). The occurrence of blindness can be reduced significantly if MAs are detected. This paper presented an approach to improve automatic MAs detection using feature optimisation. Candidate MAs are detected using mathematic morphological techniques. Originally 20 features are presented. To verify the relevance of all original features, a feature optimisation process is performed. The optimal feature set is searched by a machine learning approach, like naive Bayes and support vector machine classifier. Hand-drawn ground-truth images from expert ophthalmologists are used to measure the performance evaluation. The results showed that the proposed optimal feature set could significantly improve MA detection.
{"title":"Improving Microaneurysm Detection from Non-dilated Diabetic Retinopathy Retinal Images using Feature Optimization","authors":"Akara Thammastitkul, B. Uyyanonvara, S. Barman","doi":"10.1504/IJCAET.2020.10020251","DOIUrl":"https://doi.org/10.1504/IJCAET.2020.10020251","url":null,"abstract":"Diabetic retinopathy usually does not presents symptoms in an early stage until it gets to a severe stage. An early stage of diabetic retinopathy is associated with the presence of microaneurysms (MAs). The occurrence of blindness can be reduced significantly if MAs are detected. This paper presented an approach to improve automatic MAs detection using feature optimisation. Candidate MAs are detected using mathematic morphological techniques. Originally 20 features are presented. To verify the relevance of all original features, a feature optimisation process is performed. The optimal feature set is searched by a machine learning approach, like naive Bayes and support vector machine classifier. Hand-drawn ground-truth images from expert ophthalmologists are used to measure the performance evaluation. The results showed that the proposed optimal feature set could significantly improve MA detection.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45876630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-17DOI: 10.1504/ijcaet.2020.10026292
T. R. G. Babu, S. Nirmala, K. Vidhya
To image trabecolectomy blebs using anterior segment optical coherence tomography AS-OCT and to measure the blebs morphological features such as bleb height area and extend. In this paper fuzzy local information C-means clustering is used to segment the bleb boundary. A batch of 25 AS-OCT images are used to assess the performance of the determined parameters to the clinical parameters, and 91.43% accuracy is obtained in the determined parameters result. The mean value of bleb height, area and extend are 0.2 mm, 1.618 mm2, 0.343 mm respectively. The result shows the potential applicability of the method for automated and objective mass screening for detection of bleb boundary.
{"title":"Measurement of bleb height area and extent using anterior segment optical coherence tomography","authors":"T. R. G. Babu, S. Nirmala, K. Vidhya","doi":"10.1504/ijcaet.2020.10026292","DOIUrl":"https://doi.org/10.1504/ijcaet.2020.10026292","url":null,"abstract":"To image trabecolectomy blebs using anterior segment optical coherence tomography AS-OCT and to measure the blebs morphological features such as bleb height area and extend. In this paper fuzzy local information C-means clustering is used to segment the bleb boundary. A batch of 25 AS-OCT images are used to assess the performance of the determined parameters to the clinical parameters, and 91.43% accuracy is obtained in the determined parameters result. The mean value of bleb height, area and extend are 0.2 mm, 1.618 mm2, 0.343 mm respectively. The result shows the potential applicability of the method for automated and objective mass screening for detection of bleb boundary.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48656952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/ijcaet.2020.10029299
V. Srividya, R. Govindarajan
{"title":"On odd harmonious labelling of even cycles with parallel chords and dragons with parallel chords","authors":"V. Srividya, R. Govindarajan","doi":"10.1504/ijcaet.2020.10029299","DOIUrl":"https://doi.org/10.1504/ijcaet.2020.10029299","url":null,"abstract":"","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66714773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}