{"title":"Indic script identification from handwritten document images","authors":"P. Singh, R. Sarkar, M. Nasipuri","doi":"10.1504/IJISTA.2019.099341","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.099341","url":null,"abstract":"Script identification plays an important role in document image processing especially for multilingual environment. This paper hires two conventional textural methods for recognition of the scripts of the handwritten documents inscribed in different Indic scripts. The first method extracts well-known Haralick features from spatial grey-level dependence matrix (SGLDM) and the second method computes fractal dimension by using segmentation-based fractal texture analysis (SFTA). Finally, a 104-element feature vector is constructed from each page image by these two methods. The proposed technique is then evaluated on a total dataset comprising 360 handwritten document pages written in 12 Indian official scripts namely Bangla, Devanagari, Gujarati, Gurumukhi, Kannada, Malayalam, Manipuri, Oriya, Tamil, Telugu, Urdu and Roman. Experimentations using multiple classifiers reveal that multilayer perceptron (MLP) shows the highest identification accuracy of 96.94%. The encouraging outcome confirms the efficacy of customary textural features to handwritten Indic script identification.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129055631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient medical image watermarking technique using integer wavelet transform and quick/fast response codes","authors":"K. Kavitha, B. Shan","doi":"10.1504/IJISTA.2019.099344","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.099344","url":null,"abstract":"Securing the medical images to make it tamper free is a terribly difficult task. With the advanced digital watermarking (DWM) technique, we are able to protect the medical images by evaluating validation, dependability, privacy and integrity. The DWM is implemented in two main domains: transform and spatial. The DWM is mostly implemented using the transform techniques such as singular valued decomposition (SVD), discrete cosine transform (DCT), discrete wavelet transform (DWT), integer wavelet transform (IWT) and combination of these techniques. One of the foremost challenges in these technologies is information embedding capability and this parameter is considered for evaluation of the system. One of the possible ways to reduce the number of embedding bits in information is to use quick response code (QR). The proposed DWM system uses: IWT, bit plane and QR code.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124873974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement-based background separation techniques for fruit grading and sorting","authors":"Jasmeen Gill, A. Girdhar, Tejwant Singh","doi":"10.1504/IJISTA.2019.099342","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.099342","url":null,"abstract":"Image processing plays a remarkable role in the automation of fruit grading and sorting. While grading the fruit, accurate extraction of fruit object from the image (background separation) is the chief concern. For extraction of fruit, appropriate segmentation technique is employed; and to accomplish it accurately, enhancement must be performed prior to segmentation. However, majority of the researchers emphasised over fruit segmentation alone. This communication is intended to show the potential of enhancement techniques when combined with fruit image segmentation. Besides, it presents a comparative analysis of enhancement-based background separation techniques for fruit grading and sorting. For this purpose, four main techniques, namely, contrast limited adaptive histogram equalisation (CLAHE) method, Gaussian filter, median filter and Wiener filter were utilised for enhancement and basic global thresholding, adaptive thresholding, Otsu thresholding and Otsu-HSV thresholding were applied for segmentation. 16 sub-models were developed by combining each enhancement method with every segmentation technique. Afterwards, the image quality of the sub-models was validated using quantitative as well as qualitative analyses. Test results demonstrate that CLAHE/Otsu-HSV model outperformed the others for fruit grading and sorting.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126725267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Soft neural network-based block chain risk estimation","authors":"Ganglong Duan, Wenxiu Hu, Yu Tian","doi":"10.1504/IJISTA.2019.099343","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.099343","url":null,"abstract":"Financial risk refers to the uncertainty caused by the change of the economic and financial conditions. As a kind of economic phenomenon, the financial risk is objective and can not be eliminated. At present, there are still some imperfect aspects in the research of financial risk assessment. In order to achieve the purpose of comprehensive evaluation of financial risks, the paper analyses the methodology of soft computing and neural networks. The basic function of financial risk monitoring and evaluation system is to forecast the trend of financial activities and risk status, and this is also the fundamental function and objectives of the assessment system. We use BP neural network theory to establish the logistics finance risk evaluation model, using BP neural network structure and training principles to train sample data. The soft computing method is based on the factors of uncertainty and irrationality, which breaks through the limitation of traditional hard computing. There is a consistency between the fuzzy thinking principle of soft computing method and the attribute and structure of the objective world and therefore, soft computing can be used in field of financial risk assessment.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130461132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samira Lagrini, Nabiha Azizi, M. Redjimi, M. Aldwairi
{"title":"Automatic identification of rhetorical relations among intra-sentence discourse segments in Arabic","authors":"Samira Lagrini, Nabiha Azizi, M. Redjimi, M. Aldwairi","doi":"10.1504/IJISTA.2019.099345","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.099345","url":null,"abstract":"Identifying discourse relations, whether implicit or explicit, has seen renewed interest and remains an open challenge. We present the first model that automatically identifies both explicit and implicit rhetorical relations among intra-sentence discourse segments in Arabic text. We build a large discourse annotated corpora following the rhetorical structure theory framework. Our list of rhetorical relations is organised into three level hierarchies of 23 fine-grained relations, grouped into seven classes. To automatically learn these relations, we evaluate and reuse features from literature, and contribute three additional features: accusative of purpose, specific connectives and the number of antonym words. We perform experiments on identifying fine-grained and coarse-grained relations. The results show that compared with all the baselines, our model achieves the best performance in most cases, with an accuracy of 91.05%.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mixed integer programming for vehicle routing problem with time windows","authors":"Divyam Aggarwal, Vijay Kumar","doi":"10.1504/IJISTA.2019.097744","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.097744","url":null,"abstract":"Being a key element in logistics distribution, vehicle routing problem becomes an importance research topic in management and computation science. Vehicle routing problem (VRP) with time windows is a specialisation of VRP. In this paper, a brief description of VRP is presented. A mixed integer programming (MIP) is utilised to solve the vehicle routing problem with time windows (VRPTW). A novel mathematical model of MIP is formulated and implemented using IBM CPLEX. A novel constraint is designed to optimise the number of vehicle used. The proposed model is used to optimise both transportation cost and number of vehicle used simultaneously. The proposed model is tested on two well-known instances of Solomon's benchmark test problem. Experimental results illustrate that the proposed formulation provides promising solutions in reasonable computation time. The sensitivity analysis of customer nodes is also studied.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115177489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lagrangian relaxation for distribution networks with cross-docking centre","authors":"M. Bhangu, R. Anand, Vijay Kumar","doi":"10.1504/IJISTA.2019.097747","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.097747","url":null,"abstract":"This paper proposes a cross-docking in logistics network that aims to reduce the transportation costs. The proposed strategy eliminates need of inventory for storing commodities. It consists of two main stages. During first echelon, the number and location of cross-dock warehouses are determined. In second echelon, the allocation of warehouse as cross-dock to distribution centres is determined. Each warehouse has limited capacity and distribution centre can supplied by only one cross-dock. In this paper, the problem is mathematical formulated using a mixed-integer programming model. This formulation is used the concept of cross-docking allocation and commodities distribution. The Lagrangian relaxation approach is proposed to solve logistics network problem. Experimental results reveal that the proposed approach provides optimal solution in a reasonable time.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125976591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of magnetising core on impedance and induced EMF of two coils wound on single iron core","authors":"V. N. Reddy, S. K. Rao, S. N. Kumar","doi":"10.1504/IJISTA.2019.097770","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.097770","url":null,"abstract":"A copper wire wound on a iron rod is called as iron cored inductor. Basically iron cored inductor having two components resistance and inductance. These two parameters depend up on the permeability of the core. In this paper variation of induced elecctro motive force (EMF) in the secondary coil placed on the same core at different magnetic fields are presented. A detailed study of dependence of resistance and inductance is also presented in this paper.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors influencing regression testing on cloud and on-premises: an analysis","authors":"M. S. N. Murthy, V. Suma","doi":"10.1504/IJISTA.2019.097748","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.097748","url":null,"abstract":"Since the evolution of software, it has laid its impact in all domains of operations. Therefore, one of most important criteria for software industries to survive is development of high-quality software, which can completely satisfy customers. To achieve this goal, it becomes mandatory for the software organisations to adopt themselves to the market dynamics. The objective of this paper is to analyse the effectiveness and efficiency of testing applications in cloud. This paper puts forth a case study through a comprehensive analysis conducted on sampled data from healthcare and telecom domain. Investigation indicates that testing applications in cloud model is good practice against conventional mode of software testing. The results also depict that testing applications in cloud environment improves performance of various parameters of testing process. Furthermore, this inference paves way to carry out further research to formulate effective strategies to test applications in cloud.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134319779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent inventive system for personalised webpage recommendation based on ontology semantics","authors":"G. Deepak, Ansaf Ahmed, B. Skanda","doi":"10.1504/IJISTA.2019.097751","DOIUrl":"https://doi.org/10.1504/IJISTA.2019.097751","url":null,"abstract":"Owing to the information diversity in the web and its dynamically changing contents, extraction of relevant information from the web is a huge challenge. With the World Wide Web transforming into a more organised semantic web, the incorporation of semantic techniques to retrieve relevant information is highly necessary. In this paper, a dynamic ontology alignment technique for recommending relevant webpages is proposed. The strategy focuses on knowledge tree construction by computing the semantic similarity between the query terms as well as the ontological entities. Furthermore, the semantic similarity is again computed between nodes of the constructed knowledge tree and URLs in the URL repository to recommend relevant webpages. The dynamic ontology alignment by computing their respective semantic similarity constitutes Ontology Semantics. Personalisation is achieved by prioritisation of webpages by content-based analysis of the users' web usage data. An overall accuracy of 87.73% is achieved by the proposed approach.","PeriodicalId":420808,"journal":{"name":"Int. J. Intell. Syst. Technol. Appl.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133392047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}