Volume-11 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Features |
| Country | : | India |
| Authors | : | Edwin Jayasingh.M, Allwin.S |
| : | 10.9790/0661-1110107 ![]() |
|
Abstract: We present a visual dictionary based method for content based image retrieval in cervical microscopy images using texture features. The nucleus region in each image is identified by a simple and reliable segmentation algorithm and texture features are extracted from blocks of the region. These features from the entire database are clustered to build a visual dictionary. The histogram of the visual words present in an image is used as the representation of the image. Histogram intersection serves as the distance measure to do content based image retrieval. Experiments were conducted for various block sizes and number of clusters and the results are presented. The task was to identify images of cancerous cells from normal ones. The method offers encouraging results to utmost 90% accuracy. A brief discussion of the results and possible future directions are given
Keywords - Cervical Images, Visual Dictionary, Bag of Features, Tamura Features.
[1] Hamakim AA, Lin PS, Wilczynski S, Nguyen K, Lynes B, Wakabayashi MT, Indications and Efficiency of the Human Papillomavirus Vaccine
[2] http://www.cervicalcanceraction.org/whynow/about.php, Accessed on 12th March 2013.
[3] H. R. Myler, and A. R. Weeks, "Computer Imaging Recipes in C.," 1993: Prentice Hall.
[4] Stephen O Hara, Bruce A. Draper, Introduction to the bag of features paradigm for Image Classification and Retrieval, Jan 2011
[5] H. P. Cai, F. Yan, and K. Mikolajczyk, "Learning weights for codebook in image classification and retrieval," in 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2010, pp. 2320– 2327.
[6] Lewis DD. Naive (bayes) at forty: The independence assumption in information retrieval. In: Nédellec C, Rouveirol C, editors. Proceedings of ECML-98, 10th European conference on machine learning, No. 1398. 1998. p. 4–15.
[7] Diamond J, Anderson NH, Bartels PH, Montironi R, Hamilton PW. The use of morphological characteristics and texture analysis in the identification tissue composition in prostatic neoplasia. Human Pathology 2004;35(9):1121–31.
[8] Kong J, Sertel O, Shimada H, Boyer KL, Saltz JH, Gurcan MN.Computer-aided evaluation of neuroblastoma on whole-slide histology images: classifying grade of neuroblastic differentiation. Pattern Recognition 2009;42(6):1080–92
[9] Orlov N, Shamir L, Macura T, Johnston J, Eckley DM, Goldberg IG. Wnd-charm:multi-purpose image classification using compound image transforms.Pattern Recognition Letters 2008;29(11):1684–93.
[10] Tang H, Hanka R, Ip H. Histological image retrieval based on semantic content analysis. IEEE Transactions on Information Technology in Biomedicine 2003;7(1):26–36.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Real Time Services for Cloud Computing Enabled Vehicle Networks |
| Country | : | India |
| Authors | : | G.sasikala, Dr.A.R. Deepti |
| : | 10.9790/0661-1110814 ![]() |
|
Abstract: Cloud computing technique is gaining more and more popularity recently. It can be applied to the vehicle applications to ensure real time performance as well as to improve accuracy and comfort degree for drivers. In this paper, we propose our novel vehicle cloud architecture which includes device level, communication level and service level. Each of these levels is explained in further detail with flow chart and taxonomy definition. Some innovative and real time vehicle cloud services are introduced to show the wide potential applications of vehicles and some discussion about research challenges, context classification is also provided.
Keywords- Vehicle cloud; Cloud computing, Real time service, Body area network, Healthcare
[1] "Urban Mobility Report, Texas Transportation Institute, Texas A&M University," 2007.
[2] Intelligent Transportation Systems. http://www.its.dot.gov/.
[3] Francisco J. Martinez, Chai-Keong Toh, JJuan-Carlos Cano, Carlos T.Calafate, and Pietro Manzoni, Emergency Services in Future Intelligent Transportation Systems Based on Vehicular Communication Networks, IEEE Intelligent Transportation Systems Magazine, 2010, 2 (2), .
[4] Panos Papadimitratos, Knut Evenssen,Vehicular Communication Systems: Enabling Technologies, Applications, and Future Outlook on Intelligent Transportation, IEEE Communications Magazine, Nov. 2009, pp.84-95. [5] W. Kim, Cloud Computing: Today and Tomorrow, Journal of Object Technology, 8(1), January-February 2009, pp.65-72.
[6] A. Thiagarajan, L. Ravindranath, K. LaCurts, S. Madden, H.Balakrishnan, S. Toledo, J. Eriksson, Vtrack: accurate, energy-aware road traffic delay estimation using mobile phones, in: Int'l Conf. Embedded Networked Sensor Systems, 2009, 85-98
. [7] A. Thiagarajan, J. Biagioni, T. Gerlich, J. Eriksson, Cooperative transit tracking using smart-phones, in: Int'l Conf. Embedded Networked Sensor Systems, 2010, pp.85-98.
[8] Ivan Corredor, Ana-B Garcia, Jose-F Martinez, Pedro Lopez, Wireless Sensor Network-based system for measuring and monitoring road traffic, the 10th IEEE International Conference on Computer and Information Technology (CIT 2010), pp.13-19.
[9] S.B. Eisenman, E. Miluzzo, N.D. Lane, R.A. Peterson, G.S. Ahn, A.T. Campbell, The BikeNet mobile sensing system for cyclist experience mapping, in: Int'l Conf. Embedded Networked Sensor Systems, 2007, pp. 87-101.
[10] S. Mathur, T. Jin, N. Kasturirangan, J. Chandrashekharan, W. Xue, M. Gruteser, W. Trappe, ParkNet: drive-by sensing of road-side parking statistics, in: Int'l Conf. on Mobile Systems, Applications, and Services, 2010, pp.123-136.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | An Overview of Steganography |
| Country | : | India |
| Authors | : | Sheelu , Babita Ahuja |
| : | 10.9790/0661-1111519 ![]() |
|
Abstract: The paper explore about an overview of steganography, different methods of steganography, its applications and how it is different from cryptography Digital communication has become an essential part of infrastructure. Nowadays, a lot of applications are Internet-based and demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So different techniques like cryptography and steganography are used to secure the communication. Steganography is the scheme of hiding the existence of secret information in the cover file.
Keywords : Steganography, Cryptography, Cover file, Stego file, key
[1] Jayaram P, Ranganatha H R, Anupama H S, " Information Hiding Using Audio Steganography – A Survey" in The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011
[2] Jammi Ashok, Y. Raju, S. Munishankaraiah, K. Srinivas "Steganography: An Overview" in International Journal of Engineering Science and Technology Vol. 2(10), 2010
[3] K.P.Adhiya and Swati A. Patil, " Hiding Text in Audio Using LSB Based Steganography" in Information and Knowledge Management Vol. 2, No.3, 2012
[4] Pratap Chandra Mandal Modern "Steganographic technique: A survey" in International Journal of Computer Science & Engineering Technology (IJCSET)
[5] Prof. Samir Kumar Bandyopadhyay and Barnali Gupta Banik "Multi-Level Steganographic Algorithm for Audio Steganography using LSB Modification and Parity Encoding Technique" in International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 1, Issue 2, July – August 2012
[6] R Sridevi, Dr. A Damodaram, DR. Svl. Narasimham "Efficient Method Of Audio Steganography By Modified LSB Algorithm And Strong Encryption Key With Enhanced Security" in Journal of Theoretical and Applied Information Technology
[7] Vivek Jain , Lokesh Kumar, Madhur Mohan Sharma, Mohd Sadiq, Kshitiz Rastogi "Public-Key Steganography Based On Modified LSB Method" in Journal of Global Research in Computer Science Volume 3, No. 4, April 2012
