{"title":"Person re-identification using kNN classifier-based fusion approach","authors":"E. Poongothai, A. Suruliandi","doi":"10.1504/ijaip.2020.10027874","DOIUrl":"https://doi.org/10.1504/ijaip.2020.10027874","url":null,"abstract":"Re-identification is the process of identifying the same person from images or videos taken from different cameras. Although many methods have been proposed for re-identification, it is still challenging because of unsolved issues like variation in occlusions, viewpoint, pose and illumination changes. The objective of this paper is, to propose a fusion-based re-identification method to improve the identification accuracy. To meet the objective, texture and colour features are considered. In addition the proposed method employs Mahalanobis metric-based kNN classifier for classification. The performance of proposed method is compared with the existing feature-based re-identification methods. CAVIAR, VIPeR, 3DPes, PRID datasets is used for experiment analysis. Results show that the proposed method outperforms the existing methods. Further it is observed that Mahalanobis metric-based kNN classifier improves the recognition accuracy in re-identification process.","PeriodicalId":38797,"journal":{"name":"International Journal of Advanced Intelligence Paradigms","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43162388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Priority Based Trimmed Median Filter for Removal of High Density Salt and Pepper Noise","authors":"R. Sudhakar, V. Sudha","doi":"10.1504/IJAIP.2019.10019969","DOIUrl":"https://doi.org/10.1504/IJAIP.2019.10019969","url":null,"abstract":"This paper proposes an efficient and less complex priority-based trimmed median filter algorithm for restoring images corrupted by high density salt and pepper noise. Noisy pixel is replaced by trimmed median value of the horizontal and vertical adjacent four pixels, through this algorithm. If these four are 0's and 255's, then the next priority diagonal adjacent four pixels are used to calculate trimmed median for replacing noisy pixels. If these four are also found as 0's and 255's, then the noisy pixel is left unchanged until the next iteration. Experimental results on different greyscale and colour images show that the proposed algorithm outperforms the standard median filter, adaptive median filter, decision-based algorithm, modified progressive switching median filter and modified decision-based unsymmetric trimmed median filter.","PeriodicalId":38797,"journal":{"name":"International Journal of Advanced Intelligence Paradigms","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49208683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Recognition using combined Binary particle swarm optimization and Hidden layer of Artificial Neural Network","authors":"S. Charan","doi":"10.1504/IJAIP.2019.10010166","DOIUrl":"https://doi.org/10.1504/IJAIP.2019.10010166","url":null,"abstract":"Face recognition is one of the challenging domains. We have seen artificial neural network perform very well in both detection and recognition. In this paper, we propose a novel method of feature extraction where features obtained at the end of hidden layer of neural network is utilised. This hidden layer output is our first level of features. On these features, we apply binary particle swarm optimisation (BPSO) to remove the redundancy, the few hidden units in the network. BPSO over hidden layer outputs can be implemented in two ways: 1) to apply BPSO over hidden layer in the training stage so the network is better optimised; 2) to directly use the BPSO on an optimised neural network's hidden layer output. Both the techniques performed well over traditional neural network and conventional BPSO. Experiments on FERET and LFW datasets show promising results.","PeriodicalId":38797,"journal":{"name":"International Journal of Advanced Intelligence Paradigms","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45139624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GLCM-based detection and classification of microaneurysm in diabetic retinopathy fundus images","authors":"E. Dhiravidachelvi, V. Rajamani, C. Manimegalai","doi":"10.1504/ijaip.2019.10024482","DOIUrl":"https://doi.org/10.1504/ijaip.2019.10024482","url":null,"abstract":"Diabetic retinopathy is a major cause of blindness and it includes the lesions like microaneurysms, haemorrhages, and exudates. Microaneurysms are the first clinical sign of diabetic retinopathy and it is a small red dot on the retinopathy fundus images. The number of micro aneurysms is used to indicate the severity of the disease. The proposed algorithm detects and classifies the micro aneurysm from diabetic retinopathy fundus images in low resolution images also. Initially the image is processed by a median filter and enhanced by contrast limited adaptive histogram equalisation (CLAHE). Micro aneurysms are detected by extended minima method for candidate extraction. The statistical features are extracted by grey level coocurrence matrix (GLCM) and are given to the classifier to classify microaneurysms accurately. These detected MA are validated by comparing with expert ophthalmologists' hand-drawn ground-truth images. The simulation results show the performance of the proposed algorithm.","PeriodicalId":38797,"journal":{"name":"International Journal of Advanced Intelligence Paradigms","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45528341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure, fast insert and efficient search order preserving encryption scheme for outsourced databases","authors":"K. S. Reddy, S. Ramachandram","doi":"10.1504/IJAIP.2019.10021416","DOIUrl":"https://doi.org/10.1504/IJAIP.2019.10021416","url":null,"abstract":"Order preserving encryption (OPE) schemes have been studied to a great extent in the cryptography literature because of their potential application to database design. For the first time, a scheme called mutable order preserving encoding (mOPE) is introduced to achieve indistinguishability under ordered chosen plaintext attack (IND-OCPA) security. However, even mOPE scheme potentially leaks the distribution of repeated ciphertexts and is less efficient. In this paper, a new scheme is introduced called as a secure and cost efficient order preserving encryption (SCOPE), which is considerably more secure and efficient than mOPE scheme. A new form of strong security notion called as indistinguishability under ordered chosen repeated plaintext distribution attack (IND-OCRPDA) is proposed and we show that SCOPE scheme is IND-OCRPDA secure. Finally, the experimental results show that SCOPE achieves good performance in the context of an encrypted database and have a reasonable overhead which is 3.5× compared to plain data.","PeriodicalId":38797,"journal":{"name":"International Journal of Advanced Intelligence Paradigms","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48685499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perplexed Bayes Classifier based Secure & Intelligent Approach for Aspect Level Sentiment Analysis.","authors":"S. Yadav, D. Tayal, S. Shivhare","doi":"10.1504/IJAIP.2019.10007905","DOIUrl":"https://doi.org/10.1504/IJAIP.2019.10007905","url":null,"abstract":"In this work, we are using machine learning methods to classify a review document. We are using two machine learning methods - Naive Bayes classifier and perplexed Bayes classifier. First we will briefly introduce the Naive Bayes classifier, its shortcomings and perplexed Bayes classifier. Further, we will be training the classifiers using a small training set and will use a test set with reviews having dependency among its features. We will then show that how Naive Bayes classifier fails to classify such reviews and will be showing that perplexed Bayes classifier can be used to classify the given test set, having dependency among its features.","PeriodicalId":38797,"journal":{"name":"International Journal of Advanced Intelligence Paradigms","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47292125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Alsmirat, Ruba A. Al-Hussien, Walaa Al-Sarayrah, Y. Jararweh, Morad Etier
{"title":"Digital Video Forensics: A Comprehensive Survey","authors":"M. Alsmirat, Ruba A. Al-Hussien, Walaa Al-Sarayrah, Y. Jararweh, Morad Etier","doi":"10.1504/IJAIP.2019.10011566","DOIUrl":"https://doi.org/10.1504/IJAIP.2019.10011566","url":null,"abstract":"The wide spread of digital devices and tools causes the simplification of the manipulation of any digital multimedia content. As a result, digital videos and photos are not trusted to be used as evidence in courts. This fact raises the need for finding techniques to ensure the authenticity of digital multimedia contents. Experts in digital-signal processing conducted a huge number of researches to find new strategies, using digital forensics, to verify digital evidences and trace its origins. The aim of this paper is to collect and provide the definitions of the main concepts related to media forensics. Also, this paper gives an overview of the different techniques used in media forensics concentrating on video forensics. Furthermore, it classifies the work done in the field according to the main technique used in the proposed solution approach.","PeriodicalId":38797,"journal":{"name":"International Journal of Advanced Intelligence Paradigms","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83357036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Equilibrium estimation based on unreliable information in transport networks by adaptive simulation","authors":"Gabor Szecs","doi":"10.1504/IJAIP.2011.043431","DOIUrl":"https://doi.org/10.1504/IJAIP.2011.043431","url":null,"abstract":"The goal of this paper is to find Wardrop equilibrium in transport networks at case of uncertainty situations, where the uncertainty comes from lack of information. The uncertainty has been handled by Dempster-Shafer theory, an interval-based solution has been developed for handling the paths with cost. Adaptive simulation tool has been constructed in order to find the equilibrium, which gives only estimated solution, but this is sufficient for large networks as well. A new developed adaptive run length control algorithm helps for the reliability in the simulation run.","PeriodicalId":38797,"journal":{"name":"International Journal of Advanced Intelligence Paradigms","volume":"23 1","pages":"273-285"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77700835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}