Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Hemalatha, M.
- A Genetic Algorithm Based Intuitionistic Fuzzification Technique for Attribute Selection
Abstract Views :656 |
PDF Views:130
Authors
Affiliations
1 Department of Computer Science, Karpagam University, Coimbatore-21, TN, IN
1 Department of Computer Science, Karpagam University, Coimbatore-21, TN, IN
Source
Indian Journal of Science and Technology, Vol 6, No 4 (2013), Pagination: 4336-4346Abstract
This paper initiates perceptions and algorithms of feature selection, survey of existing feature selection algorithms and assesses diverse algorithms with a classifying frame based on search approaches, valuation criteria, and provides strategy in selecting feature selection algorithms. A unifying platform is projected to continue our efforts headed for building an incorporated system for intelligent feature selection. Feature selection intends to reduce the dimensionality of patterns for classification by choosing the most informative instead of irrelevant and/or redundant features. In this proposed work Intuitionistic fuzzy based feature clustering is proposed for grouping features based on the degree of membership and degree of indeterminacy among the attributes and clusters. In this proposed work a novel approach which uses an Intuitionistic fuzzy version of k-means has been introduced for grouping interdependent features. Genetic algorithm reinstating which is the variation of traditional genetic algorithm is then applied to appraise whether the measured feature is independent of class labels; hence, it leads to eliminate unrelated clusters to classification process and progress the selection of features. The proposed method achieves improvement on classification accuracy and perhaps to select less number of features which show the way to simplification of learning task to a big extent. The Experiment results have been demonstrated by the good performance and also find good enough subset features of this method on using UCI benchmark datasets that are for data mining methods such as Breast Cancer, Sensor and Iris Records.Keywords
Feature Selection, Cluster, Genetic, K-means, Fuzzy, IntuitionisticReferences
- Masud M M, Chen O et al. (2012). Classification and adaptive novel class detection of feature evolving data streams, IEEE Transactions on Knowledge and Data Engineering, vol PP(99).
- Wu X, Yu K et al. (2012). Online feature selection with streaming features, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 35(99), 1178-1192.
- Dai B, Huang J et al. (2006). Adaptive clustering for multiple evolving streams, IEEE Transactions on Knowledge and Data Engineering, vol 18(9), 1166-1180.
- Song O, Ni J et al. (2013). A fast clustering-based feature subset selection algorithm for high-dimensional data, IEEE Transactions on Knowledge and Data Engineering, vol 25 (1), 1-14.
- Chouaib H, Terrades O R et al. (2008). Feature selection combining genetic algorithm and Adaboost classifiers, 19th International Conference on Pattern Recognition, 2008. ICPR 2008, 1-4.
- Wasikowski M, and Chen X (2010). Combating the small sample class imbalance problem using feature selection, IEEE Transactions on Knowledge and Data Engineering, vol 22(10), 1388-1400.
- Guyon I, and Elisseeff A (2003). An introduction to variable and feature selection, Journal of Machine Learning Research, vol 3, 1157-1182.
- Dash M, and Liu H (1997). Feature selection for classification, Intelligent Data Analysis, vol 1(1-4), 131-156.
- Jain A K, and Zongker D E (1997). Feature selection: evaluation, application, and small sample performance, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 19(2), 153-158.
- Koller D, and Sahami M (1996). Toward optimal feature selection, Proceedings 13th International Conference Machine Learning, 284-292.
- Yu L, and Liu H (2004). Efficient feature selection via analysis of relevance and redundancy, Journal of Machine Learning Research, vol 5, 1205-1224.
- Dash M, and Liu H (1997). Feature selection for classification, Intelligent Data Analysis, Elsevier Science B.V., vol. 1(3), 131-156.
- Zhu Z, Ong Y et al. (2007). Wrapper filter feature selection algorithm using a memetic framework, IEEE Transactions on Systems, Man and Cybernetics, vol.37 (1), 70-76.
- Au W H, Chan K C C et al. (2005). Attribute clustering for grouping, selection, and classification of gene expression Data, IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 2(2), 83-101.
- Wei H L, and Billings S A (2007). Feature subset selection and ranking for data dimensionality reduction. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29(1), 162-166.
- Tan K C, Teoh E J et al. (2008). A hybrid evolutionary algorithm for attribute selection in data mining, Expert Systems with Applications, vol 36(4), 8616-8630.
- Maji P (2012). Mutual information-based supervised attribute clustering for microarray sample classification, IEEE Transactions on Knowledge and Data Engineering, vol. 24(1), 127-140.
- Javed K, Babri H A et al. (2012). Feature selection based on class-dependent densities for high-dimensional binary data, IEEE Transactions on Knowledge and Data Engineering, vol 24(3), 465-477.
- Zhang S, Wong H et al. (2012). A new unsupervised feature ranking method for gene expression data based on consensus affinity, IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol 9(4), 1257-1263.
- Yang S H and Hu B G (2012). Discriminative feature selection by nonparametric bayes error minimization, IEEE Transactions on Knowledge and Data Engineering, vol 24(8), 1422-1434.
- Esmaeili M, and Gabor F (2011). Feature selection as an improving step for decision tree construction, Proceedings of International Conference on Machine Learning and Computing, vol 3, 35-39.
- Tsai D, and Lin C (2011). Fuzzy C-means based clustering for linearly and nonlinearly separable data, Pattern Recognition, vol 44 (8), 1750-1760.
- Gonzalez A, and Pérez R (2001). Selection of relevant features in a fuzzy genetic learning algorithm, IEEE Transactions on Systems, Man and Cybernetics, vol 31(3), 417-425.
- Huang C L, and Wang C (2006). A GA-based feature selection and parameters optimization for support vector machines, Expert Systems with Applications, vol 31(2), 231-240.
- Tan F, Fu X (2008). A genetic algorithm-based method for feature subset selection, Soft Computing, vol 12 (2).111-120.
- Hoi C H S, Wang J et al. (2012). Online feature selection for mining big data, BigMine’12, 93-100.
- Chitsaz E, Taheri M et al. (2008). A Fuzzy approach to clustering and selecting features for classification of gene expression data, Proceedings of the World Congress on Engineering, vol II.
- Chang C T, Lai J Z C et al. (2011). A Fuzzy K-means clustering algorithm using cluster center displacement, Journal of Information Science and Engineering, vol 27, 995-1009.
- Atanassov K T (1986). Intuitionistic fuzzy sets, Fuzzy Sets and Systems, vol20, 87-96.
- Al-Harbi S H, and Rayward-Smith V J (2006). Adapting k-means for supervised clustering, Applied Intelligence, vol 24 (3), 219-226.
- Chitsa Z E, Taheri M et al. (2009). An improved fuzzy feature clustering and selection based on Chi-Squared-Test, Proceeding of the International Multi Conference of Engineers and Computer Scientists.
- Tsang E C C, Yeung D S et al. (2003). OFFSS: Optimal fuzzy-valued feature subset selection, IEEE Transactions on Fuzzy Systems, vol11 (2), 202-213.
- Pizzileo B, Li K et al. (2012). Improved structure optimization for fuzzy-neural networks, IEEE Transactions on Fuzzy Systems, vol 20(6), 1076-1089.
- Arima C, Hanai T et al. (2003). Gene expression analysis using fuzzy k-means clustering, Genome Informatics, vol 14(1), 334-335.
- Deng Z, Chung F L et al. (2010). Robust relief-feature weighting, margin maximization and fuzzy optimization, IEEE Transactions on Fuzzy Systems, vol 18(4), 726-744.
- Yager R R (2009). Some aspects of Intuitionistic Fuzzy sets, Fuzzy Optimization and Decision Making, vol 8(1), 67-90.
- Hu O, Pan W et al. (2012). Feature selection for monotonic classification, IEEE Transactions on Fuzzy Systems, vol 20(1), 69-81.
- Maji P (2011). Fuzzy rough supervised attribute clustering algorithm and classification of microarray data, IEEE Transactions on Systems, Man, and Cybernetics, vol 41(1), 222-233.
- Categorization of Respiratory Signal using ANN and SVM based on Feature Extraction Algorithm
Abstract Views :410 |
PDF Views:0
Authors
T. Jayasri
1,
M. Hemalatha
2
Affiliations
1 Embedded Systems, School of Computing, SASTRA University, Thanjavur, TamilNadu,, IN
2 School of Computing, SASTRA University, Thanjavur, TamilNadu, IN
1 Embedded Systems, School of Computing, SASTRA University, Thanjavur, TamilNadu,, IN
2 School of Computing, SASTRA University, Thanjavur, TamilNadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 9 (2013), Pagination: 5195-5200Abstract
Sleep apnea is a dishevelment that causes interruption in breath or shoal of the respiration. The respiratory signal is classified into three states such as normal respiration, motion artifacts, and sleep apnea and it is obtained from a physionet. Firstly, using a second order auto regressive modeling, an algorithm is developed to attain the energy and frequency parameters of the signal and then the signal is classified with threshold based manual classification into any of the above taxonomy. In addition to this dataset, MLP is trained with a back propagation learning algorithm that results in reduced time, iterations and errors. Consequently, the training of SVM, a binary classifier used to solve multiple class problems is done with the same data set and classification is made to reduce overall errors. The overall efficiency of the above techniques is compared.Keywords
Feature Extraction, Autoregressive Model, Burgs Method, Multilayer Perceptron, Back Propagation Learning Algorithm, Support Vector MachineReferences
- Guyton C, and John E H (1998). Text book of medical Physiology, 9th Edn., Saunders, Company publications.
- Marinkovic B, Gillete M et al. (2005). FPGA implementation of respiration signal classification using a soft-core processor.
- Bronzino J D, and Ning T (1989). Automatic classification of respiratory signals, Conference of the IEEE Engineering in Proceedings of the Annual International, vol 2, 669–670.
- Nepal K, Trinity Coll et al. (2002). Apnea detection and respiration rate estimation through parametric modeling, Proceedings of the IEEE 28th Annual Northeast Bioengineering Conference, 277–278.
- Braunwald J, Fauci A et al. (2008). Harrisons Principles of Internal Medicine, 17th Edn., Disease of respiratory system, Tata McGraw Hill Publications, 2186–2188.
- Tortora G J, and Anagnostakos N P (1990). Principles of Anatomy and Physiology, 6th Edn., The respiratory system, New York: Harper-Collins, 874–920.
- Claerbout J (1997). Burg Spectral Estimation, Available from: http://sepwww.stanford.edu/sep/prof/fgdp/c7/paper_html/node3.html
- Hayes M H (2002). Statistical Digital Signal Processing and Modelling, Signal modelling, Wileys and Sons, 188–198.
- Cybenko C (1989). Approximations by superpositions of a sigmoidal Function, Mathematics of Control, Signals and Systems, vol 5(4), 455.
- A brief history of Neural Networks, Available from: www.dtreg.com
- Brijeshverma (1997). Fast Training of Multilayer Perceptron, IEEE Transactions on Neural Networks, vol 8(6), 1314–1320.
- Gunn S R (1998). Support vector machine for classification and regression, Technical Report, University of South-ampton.
- Attacks in Cognitive Radio Networks (CRN) - a Survey
Abstract Views :255 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu-613401, IN
2 School of Computing, SASTRA University, Thanjavur, Tamil Nadu-613401
3 School of EEE, SASTRA University, Thanjavur, Tamil Nadu-613401, IN
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu-613401, IN
2 School of Computing, SASTRA University, Thanjavur, Tamil Nadu-613401
3 School of EEE, SASTRA University, Thanjavur, Tamil Nadu-613401, IN
Source
Indian Journal of Science and Technology, Vol 7, No 4 (2014), Pagination: 530-536Abstract
As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services and their application leads to the spectrum scarcity. In order to utilize the available spectrum efficiently, "cognitive radio"- The demanding technology is introduced. It is a dynamic technology that can sense the medium, utilizes the available white spaces, for transmission by detecting its neighboring devices. The cognitive radio targets to increase the efficiency of the spectrum changes without causing any intervention to the licensed users. Since cognitive radio works in the open network space, it increases the chance of the attacker to show intervene on the spectral medium. So, the security becomes the key factor. This leads to the realization of various security threats in the cognitive radio. There are various papers covering the security issues over the threats in cognitive radio, but this paper provides an advanced survey over attacks and common threats and the possibility of securing the available spectrum from the attackers. In addition to that future scope and challenges are also addressed. This survey will help the researchers to identify the space left out and the problems to be attached related to security issues on cognitive radio.Keywords
Attacks, Digital Signatures, Cognitive-radio, Security, Spread Spectrum Modulation- Path Loss Prediction in Wireless Communication System Using Fuzzy Logic
Abstract Views :234 |
PDF Views:0
Authors
Affiliations
1 School Of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
1 School Of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 7, No 5 (2014), Pagination: 642-647Abstract
The portable wireless technology with wide accessibility facilitates the people to enter into a new dynamic environment for optimizing the overall productivity. Establishing reliable communication is a challenging aspect, because the signal propagation is heavily subjected to interference and fading effects resulting in severe path loss. In the field of telecommunication system, the effect of Path Loss in the signal is used to analyze and design the link budget system. Previously, many path loss prediction models like HATA, and Okumura are proposed where the path loss is determined with the help of experimental field values and verified with the help of the model graph. In this work, BPSK modulated signal is used to determine the path loss using HATA empirical formula derived with the help of the Okumura curve for various urban, suburban and rural areas. The identified values are given to triangular membership function and defuzzification is performed using faster and flexible center of sum method. The inferred results show maximum loss in case of urban and increases at an average rate of 10dB per decade with distance. The proposed technique optimizes signal transmission by determining the path loss accurately.Keywords
Binary Phase Shift Keying, Fuzzy Logic, HATA Model, Okumura Model, Path Lossa- Charging an Electronic Gadget Using Piezoelectricity
Abstract Views :274 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 7, No 7 (2014), Pagination: 945-948Abstract
The method of generating electrical voltage for charging an electronic gadget from the piezoelectric sensor that is fixed to the sole of the footwear is illustrated in this paper.Keywords
Energy Harvesting, Piezoelectricity, Piezoelectric Sensor, Portable Electric Power- Epidemic Dynamics of Malicious Code Detection Architecture in Critical Environment
Abstract Views :365 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Karpagam University, Coimbatore, IN
1 Department of Computer Science, Karpagam University, Coimbatore, IN
Source
Indian Journal of Science and Technology, Vol 7, No 6 (2014), Pagination: 770-775Abstract
In present world applications of software in other domains have their own privileges and their own control over other application also fulfilling their own testing methods acting as a tool in solving the given problem. Application integrity is highlighted in existing work but in our proposed approach MCBA (Malicious Code Behavior Analysis). In our proposed study the method of MCBA approach error correcting codes in the kernel is incorporated. Our objective is to incorporate a protection mechanism that saves the application even though the system’s memory gets corrupted. In exploring the trusted MCBA Server to identify and monitor the portion of the system where corruption occurs and the server segregates the reason for various malicious impacts. Therefore, two approaches have been simulated: one is authenticated check and the next is unauthenticated check. In an authenticated check, a matching schema (e.g., the MCBA) applies dataset pattern recognition techniques to check malicious pattern by comparing it to the incoming applications during execution, if malicious packet is found it protects the system, in an unauthenticated check, the malicious packet from the guest OS for example ischolar_main kits enters into our local system and it securely stores a cloned image of the guest OS memory at boot time, this method incorporates a VMM (Virtual Memory Monitor) and it allows only the instructions to read from the cloned copy of memory but never execute the instruction, though it is so, sometimes the instructions are malicious and it is unsecured. This paper emphasizes the MCBA architecture, incorporates monitoring, detecting and healing process which are so feasible to apply in real time environment ,it is very economically used for the technical programmers who are designing source code for various domains in Software market.Keywords
Dataset, Error Correcting, Malicious, Matching, Privileges- Face Recognition on Biometrics using Optimization Algorithms
Abstract Views :136 |
PDF Views:0
Authors
Affiliations
1 Bharathiyar University, Coimbatore – 641046, Tamil Nadu, IN
1 Bharathiyar University, Coimbatore – 641046, Tamil Nadu, IN