International Journal of Research in Computer & Information Technology
-
Upload
global-advanced-research-publication-house -
Category
Documents
-
view
232 -
download
0
Transcript of International Journal of Research in Computer & Information Technology
-
7/24/2019 International Journal of Research in Computer & Information Technology
1/104
-
7/24/2019 International Journal of Research in Computer & Information Technology
2/104
International Journal of Research in Computer & Information Technology (IJRCIT)http://www.garph.org
Aim & Scope:International Journal of Research in Computer & Information Technology (IJRCIT)is an online journal in English
published in annually for Academicians, scientist, Engineers, and Research scholars involved in Computer Scienceand Information Technology to publish high quality and refereed papers. Paper reporting original research andinnovative application from all parts of the world is invited. Papers for publication in the IJRCIT are selected throughpeer review to ensure originality, relevance and readability. The aim of IJRCIT is to publish peer reviewed research
and review articles rapidly developing field of Computer Science and Information Technology.
The core vision of IJRCIT is to publish new knowledge and technology from for the benefits of every one rangingfrom the academic and professional research communities to industry practioners in a range of topics in a ComputerScience and Information Technology. It also provides a venue for high caliber research scholars, PhD students,Professionals to submit on-going research and developments in these areas.
Frequency of Publication:One Volume with Four issues per year
Subject Category:all Computer Science and Information Technology
Submission of Manuscripts:
Authors are strongly urged to communicate to Editor-in-chief of the journal through [email protected] only.The final decision on publication is made by the Editor-in-chief upon recommendation of an Associate Editor and oran Editorial Board Member.
Regular Subscription Price:
Within India: Annual INR 2500Outside India:Annual 500 USD
Published by
Global Advanced Research Publication House
Meherbaba colony, Dastur nagar,
Chatri Talav road,
Amravati-444606
Maharashtra, India
2015 Global Advanced Research Publication House, India
No part of the material protected by this copyright may be reproduced or utilized in any form or by anymeans, electronic or mechanical including photo copying, recording or by any information storage andretrieval system, without prior written permission from the publisher.
-
7/24/2019 International Journal of Research in Computer & Information Technology
3/104
International Journal of Research in Computer & Information Technology (IJRCIT)
Editorial Board
Editor-in-Chief
Dr. Shrinivas P. Deshpande================================================================
Associate Editorial Board Members
Dr. V. M. Thakare
Department of Computer Science and Engineering,Sant Gadge Baba Amravati University, AmravatiMaharashtra, India.
Dr. D. N. Chaudhari
Department of Computer Science and Engineering,Jawaharlal Darda Institute of Engineering &Technology, YavatmalMaharashtra, India.
Dr. S. E. YedeyP. G. Department of Computer Science &Technology, D.C.P.E. H.V.P.M., Amravati,Maharashtra, India.
Prof. P. L. RamtekeDepartment of Information Technology,H.V.P.M College of Engineering & Technology,Amravati,Maharashtra, India
Prof. Anand B. Deshmukh
Department of Information Technology,Sipna College of Engineering & Technology,Amravati,Maharashtra, India.
Prof. Vinay A. RajgureDepartment of Computer Science & Engineering,Prof. Ram Meghe College of Engineering &Management, Bandera,Maharashtra, India
Prof. Bharat S. Kankate
Department of Computer Engineering,Pune District Education Associations College ofEngineering, Manjari, Hadapsar, Pune,Maharashtra, India
Dr. Sandeep R. Shirsat
Department of Computer Science,Shri Shivaji Science College Chikhali,Maharashtra, India.
Dr. Anjali B. Raut
Department of Computer Science & Engineering,H.V.P.M. College of Engineering & Technology,Amravati,Maharashtra, India.
Prof. Sachin DeshpandeDepartment of Computer Engineering,Vidyalankar Institute of Technology, Mumbai,Maharashtra, India.
Prof. Ritesh V. PatilDepartment of Computer Engineering,Pune District Education Associations College ofEngineering, Manjari, Hadapsar, Pune,Maharashtra, India
Prof. Ramanand S. Samdekar
Department of Computer Science & Engineering,S. B. Jain Institute of Technology Management &Research, Nagpur,Maharashtra, India
Prof. Amitkumar S. ManekarDepartment of Computer Science and Engineering,Shri Sant Gajanan Maharaj College of Engineering,Shegaon,Maharashtra, India
Prof. Pritam H. Gohatre
Department of Computer Technology,Laxminarayan Agrawal Memorial Institute ofTechnology, Dhamangoan,Maharashtra, India
-
7/24/2019 International Journal of Research in Computer & Information Technology
4/104
Editorial
Research is a creative work undertaken by applying systematic approach to establish newknowledge or increase the existing knowledge. Research activity includes confirmation ofexisting facts, verify and endorse the results, establish new theory, methods, and approaches. Theresearch undertaken by any individual or a group requires its publication and affirmation by thepeers. Publishing research work in journals and conferences authenticate the work done andefforts taken by the researcher.
There are several journals available in the areas of Computer Science and InformationTechnology having different strategy. IJRCIT aimed at providing an international forum for
scientists, researchers, engineers and developers from a wide range of information science areas
to exchange ideas and approaches in this evolving field. High quality papers in computer science
and information technology areas are solicited and original papers exploring research challenges
will receive especially careful interest from reviewers. Papers that had already been accepted or
currently under review for other conferences or journals were not considered for publications.
This journal publication would not have been possible without help of several individuals
who in one way or another contributed and extended their valuable assistance in the preparation
and completion of journal. My utmost gratitude is to the Editorial Board members and Reviewersfor their sincerity and encouragement. IJRCIT is strongly supported by a dedicated Editorial
Board consisting of renowned scientists. Thus, we ensure the highest quality standards of the
journal and provide prompt, detailed rigorous assessments that allow rapid editorial decisions
and result in significantly improved manuscripts.
We are requesting experts from academia, industry and research groups for active
participation in this publication activity as an editorial committee member, reviewer and
promoter.
IJRCIT Editorial Board
November 2015
www.garph.org
-
7/24/2019 International Journal of Research in Computer & Information Technology
5/104
INDEX
Sr. No Title & Author(s)Page
No
1An Approach For Prediction Of Driver Fatigue.Pritam H. Gohatre
1-7
2
An Improved Image Fusion Algorithm Based On Wavelet Transforms Using
Particle Of Swarm Optimization.Hrishikesh S. Holey
8-14
3SAP Hana Database With NetworkProf. Anup. P. Date , Miss. Namrata S. Mahajan
15-19
4Performance Evaluation Of Database Client Engine Using Modular ApproachProf. Ramanand Samadekar 20-22
5Implementation Image Mosaic Using Phase Correlation And Harris OperatorMs. Kanchan S.Tidke, Pritam H. Gohatre
23-28
6To Study The Types Of Open-Source Applications Of Routing SoftwareHemant Gadbail, Roshan Kalinkar
29-32
7
Universal Gate Application For Floating Point Arithmetic Logic Unit
Prof. Vishwajit K. Barbudhe 33-37
8Review Of Independent Component Analysis Algorithms And Its ApplicationNaresh Nimje
38-42
9A Review On Parallel Programming Models In High Performance ComputingAniket Yawalkar , Ashish Pawar, Amitkumar Manekar
43-47
10Automated Parking Slot Allotter Using Rfid And Nfc TechnologyHarshal Phuse, Sumit Bajare, Ranjit Joshi, Amitkumar Manekar
48-52
11Review Automated Students Attendance Management System Using Raspberry-PiAnd NfcNikhil P. Shegokar, Kaustubh S. Jaipuria,Amitkumar Manekar
53-56
12A Survey Of Biometric Authentication TechniquesAnkush Deshmukh, Poonam Hajare, Rajeshri Kachole, Amitkumar Manekar
57-65
13A Comprehensive Survey On Load Balancing Algorithms In IaasA Gawande, S Jain And K Raut
66-75
14Proposed Automated Students Attendance Management System Using RaspberryPi And NfcMahesh P. Sangewar, Shubham R. Waychol, Amitkumar Manekar
76-79
15My Moments An Android Based Diary ApplicationChetan Patil, Kavita Chaudhari, Snehal Deshmukh, Amitkumar Manekar
80-84
16Comparison Of Particle Swarm Optimization And Genetic Algorithm For LoadBalancing In Cloud Computing EnvironmentK Pathak, G Vahinde
85-96
17A Survey Paper On Tracking System By Using Smart PhonePoonam Hajare, Rajeshri Kachole, Ankush Deshmukh, Amitkumar Manekar
97-100
18Review On Security And Authentication System In Accessing DataMitali Lakade, Ruchi Kela, Ashwini, Amitkumar Manekar
101-105
-
7/24/2019 International Journal of Research in Computer & Information Technology
6/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 1
AN APPROACH FOR PREDICTION OF DRIVER FATIGUEPRITAM H. GOHATRE
Technocracts Institute of Technology, Bhopal
ABSTRACT:An Approach for Prediction of driver-fatigue monitor. It uses remotely located charge-coupled-device cameras
equipped with active infrared illuminators to acquire video images of the driver. Various visual cues that typically characterize
the level of alertness of a person are extracted in real time and systematically combined to infer the fatigue level of the driver.
The visual cues employed characterize eyelid movement, gaze movement, head movement, and facial expression. The eyes areone of the most salient features of the human face, playing a critical role in understanding a persons desires, needs and
emotional states. Robust eye detection and tracking is therefore essential not only for human-computer interaction, but also for
Attentive user interfaces (like driver assistance systems), since the eyes contain a lot of information about the drivers
condition: gaze, attention level, fatigue. Furthermore, due to their unique physical properties (shape, size, reflectivity), the eyes
represent very useful cues in more complex tasks, such as face detection and face recognition. A probabilistic model is
developed to model human fatigue and to predict fatigue based on the visual cues obtained. The simultaneous use of multiple
visual cues and their systematic combination yields a much more robust and accurate fatigue characterization than using a
single visual cue. This system was validated under real-life fatigue conditions with human subjects of different ethnicbackgrounds, genders, and ages; with/without glasses; and under different illumination conditions. It was found to be
reasonably robust, reliable, and accurate in fatigue characterization.
Keywordsdriver-fatigue, eyelid movement, gaze movement, head movement, visual cues . Fatigue characterization.
1. INTRODUCTION
Fatigue is a dormant physical condition that can bewitnessed right before one falls asleep. Fatigue affects onesreaction time, ability, concentration and generalunderstanding particularly while driving on road adversely.This thing is primarily based on the movement of human
eyelid which distinguished level of alertness. Various visualcauses that generally characterize the level of alertness of a
person are extracted systematically combined to check thefatigue level of the person. A probabilistic model isdeveloped to model human fatigue and to predict fatigue
based on the visual causes obtained. The simultaneous useof multiple visual causes and their systematic combinationyields a much more robust and accurate fatiguecharacterization than using a single visual cause.
The system uses a camera that points directlytowards the persons face and monitors the persons eyes informed to detect fatigue. In such a case when fatigue isdetected, a warning signal is issued to alert the driver. This
system describes how to detect the eyes, and also how todetermine if the eyes are open or closed. The system dealswith using information obtained for the binary version of theimage to find the edges of the face, which narrows the areaof where the eyes may exist. Once the face area is found,then eyes are found by computing the horizontal averages inthe area. After finding the eyes to monitor the eyemovement in the real time capacturing the video in thecamera is specific consecutive frame that gives 10 up to the200 frames. If the eyes are open, it shows eyes in the normalcondition mean Fatigue is not predicted. If the eyes are openand close in some consecutive way it shows the possiblefatigue detection. If the eyes are continuously close for a
while it predicted the fatigue is detected. It gives warning
signal given by the system so it alerts to the user to avoid anaccident.
Driver operation and vehicle behavior can beimplemented by monitoring the steering wheel movement,accelerator or brake patterns, vehicle speed, lateralacceleration, and lateral displacement. These too are non-
intrusive ways of detecting drowsiness, but are limited tovehicle type and driver conditions. The final technique fordetecting drowsiness is by monitoring the response of thedriver. This involves periodically requesting the driver tosend a response to the system to indicate alertness. The
problem with this technique is that it will eventually becometiresome and annoying to the driver.
2. LITERATURE SURVEY & BACKGROUND
[1] In this paper author developed the fatigue detectiontechniques based on computer vision. Fatigue is detected
from face and facial features of driver. By Hybrid method isused for face and facial feature detection. which not onlyincrease the accuracy of the system but also decrease the
processing time.[2]In this paper author proposed, real time machine vision
based system is design for the detection of driver fatiguewhich can be detect the driver fatigue and issue a warningearly enough to avoid an accident. Firstly the face is located
by machine vision based object detection algorithm anddetects eyes and eyebrows.
[3] In this paper author, developed the detect the driverfatigue based on the eye tracking which comes under an
active safety system using ordinary color web camera toinitialize the face detection and eye location and eyetracking.
-
7/24/2019 International Journal of Research in Computer & Information Technology
7/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 2
[4] In this paper author present the drivers fatigueapproach for real-time detection of driver fatigue. Thesystem consists of a sensors directly pointed towards thedrivers face. The input to the system is a continuous stream
of signals from the sensors.
[5] In this paper author, Developed a real-time driverfatigue detection system based on eye tracking and dynamictemplate matching. Using two new matching functions, theedge map overlapping (EMO) and the edge pixel count(EPC), to enhance matching accuracy.
[6] In this paper author is to developed artificial neuralnetwork has been used to detect the driver drowsiness level.Ever-increasing number of traffic accidents that are due to adiminished drivers vigilance level has become a problem ofserious concern to society. Drivers with a diminishedvigilance level suffer from a marked decline in their
perception, recognition, and vehicle-control abilities.
[7] In this paper author proposed the Eye tracking systemshave many potential applications such as learning emotionmonitoring and driver fatigue detection systems etc..So, howto use an eye tracking system to implement an eye mouse to
provide computer access for people with severe factors. Theeye mouse allows people with severe disabilities to use theireye movements to be manipulated by computers. It requiresonly one low-cost Web camera and a personal computer andfive stage algorithm is developed to estimate the directions
of eye movements and then use the direction information tomanipulate the computer. Several experiments wereconducted to test the performance of the eye trackingsystem.
[8] In this paper author proposed the system for skin, face,eyes detection which together can be used for detectinghuman presence in video. This system is build so that it canapplied to both real-time data although with lower detectionrate and static data i.e. .images and video for in processingwith higher detection rate.
[9] In this paper author proposed the face recognition
techniques (FRT) presented in face the issue and rarely statethe assumptions they make on their initialization; manysimply skip the feature extraction step, and assume perfectlocalization by relying upon manual annotations of the facialfeature positions.
3. PROPOSED METHODOLOGY AND
PROPOSED ARCHITECTRE
In this section discuss the proposed methodology inthis proposed work is to detect closed eyes simultaneouslyto observed and alert the driver on fatigue detection. This isdone with the help of mounting a camera in front of thedriver and continuously captured its real time video using
skin detection, eye detection and Hough Transformalgorithm.The conventional fatigue detectors are mostefficient and successful only on frontal images of faces. The
system can barely cope with 45 face rotation. The detectionarea is both around the vertical and horizontal axis. Anothershortcoming with these processes was that they were
perceptive to lighting conditions. For a few cases the
designed system detected multiple recognition of the sameface, due to overlapping sub-windows.
In this proposed design take test cases up to 200frames. This system describes a method to track the eyesand detect whether the eyes are closed or open. The nextitem to be considered in image acquisition is the videocamera. To demonstrate the project we have used the simpleLaptop camera. To create the video frames used ComputerVision System Toolbox.
The camera uses the functionvision.CascadeObjectDetector creates a Systemobject, detector that detects objects using the Viola-Jonesalgorithm. The Classification Model property controls the
type of object to detect. By default, the detector isconfigured to detect faces. Computer Vision SystemToolbox provides algorithms, functions, and apps for thedesign and simulation of computer vision and video
processing systems. Using this tool box the system canperform object detection and tracking, feature detection andextraction, feature matching, stereo vision, cameracalibration, and motion detection tasks. The system toolboxalso provides tools for video processing, including video fileI/O, video display, object annotation, drawing graphics, andcompositing. Algorithms are available asMATLAB functions, System objects, and Simulink blocks.
The MATLAB script is supposed to do the following:
Step 1.It captures the video and opens a facial view wherethe user has to point his face properly in front of the camera.
Step2. The MATLAB script detects the face and displaysthe image and lets the user place a bounding box around theface.
Step 3.Afterwards one the eye, mouth portions of the frameare recognized, it rescales the eye, mouth portions to 24*24
pixels.The camera uses Viola-Jones algorithm to scan a sub-window capable of detecting faces across a given inputframe. The standard image processing approach would be torescale the input image to different sizes and then run thefixed size detector through these frames.
-
7/24/2019 International Journal of Research in Computer & Information Technology
8/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 3
PROPOSED MODEL
Figure 1: Proposed model
4.
RESULT ANALYSIS
The system was tested on 15 people and wassuccessful with 12 people, resulting in 80% accuracy. Figure
below shows an example of the step-by-step result offinding the face, eyes and process to detect the fatigue levelof the person using eyelid movement.
I. Input video from camera for processing under theMATLAB when the eyes of the person are opened.
Figure 2: Figure shows the GUI implementation of theprocess when the eyes of the person are open and the eye
area are slice.Outputs:
i) Input video from camera for processing
under the MATLAB
Figure 3: Figure shows the Person place their face in frontof the camera as per location of Head Portion,EyeRegion,Nose Region and Mouth region for processing theoperation
ii)Input frames captured from camera for processingwhen the eyes of the person are opened and closed
-
7/24/2019 International Journal of Research in Computer & Information Technology
9/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 4
Figure 4: Figure shows eyes of the Person in NoormalCondition.so No Fatigue Predicted
iii) Recognition if the eyes of the person are open or
closed
Figure 5: Recognitising if the eyes of the person are open
or closed
Figure 6: Fatigue Detection process initiated when the eyesof the person are open and the eye area are sliced means itshows the possibale Fatigue Detection.
iv) Recognition if the eyes of the person are open or
closed.
Figure 7 : Recognitising if the eyes of the person are closethen shows the Fatigue is detected
5. COMPARISON WITH OTHER TECHNIQUES
The simplest method for driver fatigue detection isbased on applying a threshold on each extracted symptom.In the systems presented driver drowsiness was detected byapplying a constant threshold on PERCLOS. In the firststage was driver face identification and then an appropriate
threshold was chosen for the system based on physical andpsychological characteristics of the identified driver. Here,the list down a few techniques and make a comparison ofthem.
5.1 METHODS BASED ON THRESHOLD
In this system the fatigue detection was carried with 5different persons under the age group 30 to 35 years. For atotal of 200 frames, they had opened their eyes for 100frames and closed their eyes for 100 frames and monitoringtheir results is discussed in the table below.
For Open Eye:
No. of
Person
Total
Frames
Eyes
Open
Eyes
Open
Detected
Correct
Detection
Rate
Person1 200 94 94 100%
Person2 200 92 92 100%
Person3 200 91 91 100%
Person4 200 85 85 100%
Person5 200 86 86 100%
Table 1:Open eye detection Rate
-
7/24/2019 International Journal of Research in Computer & Information Technology
10/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 5
For Closed Eye:
No. of
Person
Total
Frames
Eyes
Close
Eyes
CloseDetected
Correct
DetectionRate
Person 1 200 91 91 100%
Person 2 200 83 83 100%
Person 3 200 88 88 100%
Person 4 200 92 92 100%
Person 5 200 85 85 100%
Table 2: Closed eye detection Rate
6. CONCLUSION
A noninvasive system to locate the eyes and face monitorfatigue when it occurred. The detectors have been testeddifferent faces and eyes under the same lighting situationsand have obtain the result very well considering the amountof parameter adjustment done during the testing. Themonitoring the fatigue if the eyes are opened or closed inseveral continuative way then warning signal is issued. Thesystem is able to automatically detect eyes localizing error
that might have occurred so in case of this type of error thensystem is able to recover and properly localize the eyes. Thefollowing conclusions were made:
Image processing achieves highly accurate andreliable detection of fatigue.
Image processing offers a non-invasiveapproach to detecting fatigue without theannoyance and interference.
A fatigue detection system developed around
the principle of image processingjudges thedrivers alertness level on the basis ofcontinuous eye closures.
7. LIMITATIONS
With 60% accuracy, it is observed that there arelimitations to the system.
The most significant limitation is that it will not
work with people who have very dark skin. This isapparent since the core of the algorithm behind thesystem is based on linearization. For dark skinned
people linearization doesnt work.
Any reflective objects behind the person. The more
uniform the background is, the more robust the
system becomes. For testing, rapid head movementwas not allowed. This may be acceptable, since it
can be equivalent to simulating a tired person. Forsmall head movements, the system rarely losestrack of the eyes. When the head is turned toomuch sideways there were some false alarms.
8. FUTURE WORK
The system does not work in dark skinned individuals. Thiscan be corrected by having an adaptive light source. Theadaptive light source would measure the amount of light
being reflected back. If little light is being reflected, theintensity of the light is increased. Darker skinned individualneed much more light, so that when the binary image isconstructed, the face is white, and the background is black.
Another big improvement would be to includeother salient features in the human face (i.e. the nose or the
mouth). This could introduce new geometrical constraints,but it might provide much better accuracy overall. In thelong run, properly adjusting the parameters, and using a
parallel implementation, this method could actually providegood results for real-time fatigue detection schemes.
9. REFERENCES
[1] Ijaz Khan, Hadi Abdullah, Mohd Shamian Zainal,Shipun Anuar,Hazwaj Mhd, Mohamad Md.VisionBased Composite Approach for LethargyDetection. Md, 2014 IEEE CSPA2014, 7-9
Mac.2014 kuala Lumpur, Malaysia.[2] Amandeep Singh, Jaspreet Kaur, Driver FatigueDetection Using Machine Vision Approach,Robotics and Autonomous Systems, Kaur,978-1-4673-4529-3/12/$31.00@2012 IEEE.
[3] D.J.M.Bomriver, Vision-based Real-time DriverFatigue Detection System for Efficient VehicleControl, nternational Journal of Engineering andAdvance Technology (IJEAT) ISSN: 2249-8958,Volume-2 Issue-1 Oct 2012.
[4] Narendra Kumar, Dr.N.C.Barwar Analysis of RealTime Driver Fatigue Detection Based on Eye andYawning, (IJCSIT) international Journal of
Computer Science and Information TechnologiesVol5 (6), 2014.7821-7826.[5] Narendra Kumar,Dr.N.C.Barwar, Detecting of Eye
Blinking and Yawning for Monitoring DriversDrowsiness in Real Time International journal ofApplication or Innovation in Engineering &Management(IJAIEM) Volume 3,Issue11,November 2014
[6] Mr. Swapnil V. Deshmukh #1, Ms.Dipeeka P.Radake*2, Mr. Kapil N. Hande#3, Driver fatigueDetection Using Sensor Network. InternationalJournal of Engineering Science and Technology(IJEST), NCICT Special Issue Feb 2011.
[7] Yang M. H., Kriegman J. and Ahuja N, DetectingFaces in Images: A Survey. IEEE Transaction on
-
7/24/2019 International Journal of Research in Computer & Information Technology
11/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 6
Pattern Analysis and Machine Intelligence, Vol. 24,pp. 34-58 (2008).
[8] WEN-BING HORNG, CHIH-YUAN CHEN, JIAN-WEN PENG, CHEN-HSIANG CHEN,
Improvements of Driver Fatigue Detection SystemBased on Eye Tracking and Dynamic TemplateMatching, Department of Computer Science andInformation Engineering Tamkang University, E-ISSN: 2224-3402, Issue 1, Volume 9, January2012.
[9] Er. Manoram Vats1and Er. Anil Garg DETECTIONAND SECURITY SYSTEM FOR DROWSY BYUSING ARTIFICIAL NEURAL NETWORKTECHNIQUE,International Journal of AppliedScience and Advance Technology January-June2012, Vol. 1, No. 1, pp. 39-43.
[10] MU-CHUN SU, KUO-CHUNG WANG, GWO-DONGCHENAn EYE TRACKING SYSTEM AND ITSAPPLICATION IN AIDS FOR PEOPLE WITHSEVERAL DISABILITIES, Department OfComputer Science And Information Engineering,
National Central University, Chung Li, Taiwan, Vol.18 No. 6 December 2006.
[11] Dmitry Golomidov Human detect ion in video,[email protected] Advisor: Jianbo Shi April18, 2008.
[12] Paola Campadelli, Raffaella Lanzarotti andGiuseppe Lipori,Automatic Facial FeatureExtraction for Face Recognition, ISBN 978-3-902613-03-5, pp.558, I-Tech, Vienna, Austria, June2007.
[13] Jung-Ming Wang,DETECTING DRIVERS EYESDURING DRIVING,18th IPPR Conference onComputer Vision, Graphics and Image Processing(CVGIP 2005)
[14] Qiang Ji,Zhiwei Zhu,and Peilin Lan, Real TimeNonintrusive Monitoring and Prediction Of DriverFatigue, IEEE Transaction on VehicularTechnology,VOL-53.No.4 Jul-2004.
[15] Yang M. H., Kriegman J. and Ahuja N., DetectingFaces in Images: A Survey, IEEE Transaction onPattern Analysis and Machine Intelligence, Vol. 24,
pp. 34-58 (2002).[16] FLECK M., FORSYTH D. A., AND BREGLER C.
2002. Finding nacked people. In Proceedingsofthe ECCV, vol. 2, 592602.
[17] BRAND J., AND MASON J. 2000. A comparativeassessment of three approaches to pixellevel humanskin-detection. In Proceeding of the InternationalConference on Pattern Recognition, vol. 1, 10561059.
[18] ZARIT B. D., SUPER B. J., AND QUEK, F.K. H.1999. Comparison of five color models in skin
pixel classification. In ICCV99 Intl Workshop
on recognition, analysis and tracking of faces andgestures in Real-Time systems, 5863.
[19] AHLBERG J. 1999. A system for face localizationand facial feature extraction Tech. Rep.LiTH-
ISY-R-2172, Linkoping University.[20] Z. Zhu, Q. Ji, K. Fujimura, and K. C. Lee, Combining
Kalman filtering and mean shift for real time eyetracking under active IR illumination, presented atthe Int. Conf. Pattern Recognition, Quebec, PQ,Canada, 2002.
[21]Mathworks http://www.mathworks.com[22] http://www.cse.iitk.ac.in/users[23] Duda, R.O. and P.E. Hart "Use of the Hough
Transformation to Detect Lines and Curves inPictures", Comm. ACM, Vol.15, pp.1115(January, 1972).
[24] The Hough Transform,
http://planetmath.org/encyclopedia/HoughTransform.html.
10. AUTHOR PROFILE
Pritam H. Gohatrereceived the Master ofTechonology in SystemSoftware from Rajiv GandhiTechnical UniversityBhopal. Currently he is an
Assistant. Professor inLAMIT, Dhamangoan,india. He has published two
papers in internationaljournals. He is having 7year teaching experienceand his field ofspecialization is softwaredevelopment, Image
processing, Networking.
-
7/24/2019 International Journal of Research in Computer & Information Technology
12/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 7
AN IMPROVED IMAGE FUSION ALGORITHM BASED ON WAVELET TRANSFORMS
USING PARTICLE OF SWARM OPTIMIZATIONHRISHIKESH S. HOLEY
Patel Institute of Technology, [email protected]
ABSTRACT:Feature based image fusion is new area of research in the field of image fusion. The image fusion used lower
content of image feature. The lower content of image feature such as color texture and dimension. The texture features are very
important component of image. The processing and extraction of texture feature used various transform function such as
wavelet transform function, Gabor transform function and many more signal based transform function. In the process of image
fusion involve two and more image for the process of fusion. The fused image still image pervious quality as well as new feature
and area of improved by new and adopted reference image. In this paper, we proposed a feature based image fusion technique.
The feature based optimization technique also used feature selection and feature optimization process. The feature selection
and feature optimization used particle of swarm optimization technique. The particle of swarm optimization technique selects
the optimal texture feature of both image original image and reference image. The original and reference image find the
optimal feature sub set for the estimation of feature correlation.
KeywordsImage fusion, wavelet transform function, swarm optimization technique, optimal texture.
1. INTRODUCTION
Computers have been widely used in our daily lives, sincethey can handle data and computation more efficiently andmore accurately than humans. Therefore, it is natural tofurther exploit their capabilities for more intelligent tasks,for example, analysis of visual scenes (images or videos) orspeeches (audios), which are followed by logical inferenceand reasoning. For we humans, such tasks are performedhundreds of times every day so easily from subconscious,
sometimes even without any awareness. In computer visionapplications, one of the challenging problems is thecombining of relevant information from various images ofthe same scene without introducing artifacts in the resultantimage. Since images are captured by the use of differentdevices which may have different sensors. Because of thedifferent types of sensors used in image capturing devicesand their principle of sensing and also, due to the limiteddepth of focus of optical lenses used in camera, it is possibleto get several images of the same scene producing differentinformation. Image registration is the process ofsystematically placing separate images in a common frameof reference so that the information they contain can be
optimally integrated or compared. This is becoming thecentral tool for image analysis, understanding, andvisualization in both medical and scientific applications.There are many image fusion methods that can be used to
produce high-resolution multispectral images from a high-resolution panchromatic image and low-resolutionmultispectral images. Starting from the physical principle ofimage formation, Neural network and fuzzy theory is thetwo main methods of intelligence, the image fusion system
based on these two methods of can simulate intelligenthuman behavior, do not need a lot of background
knowledge of research subjects and precise mathematicalmodel, But find the law to resolve complex and uncertaintyissues on the basis of input and output data of objects. Fromthese characteristics and the advantages, it can be seen thatthe use of the approach combined by neural networks andfuzzy theory can better complete the multi-sensor image
pervasive fusion.The goal of proposed system is , the object of
image fusion is to obtain a better visual understanding of
certain phenomena, and to introduce or enhance intelligenceand system control functions. Many advantages of multisensory data fusion such as improved system performance(improved detection, tracking and identification, improvedsituation assessment, and awareness), improved robustness(lessens or redundancy and graceful degradation), improvedspatial and temporal coverage, shorter response time, andreduced communication and computing, can be achieved.
2. LITERATURE SURVEY &
BACKGROUND
[1] In this paper, author proposed a pixel-level
image fusion scheme using multi resolution steerablepyramid wavelet transform. Wavelet coefficients at differentdecomposition levels are fused using absolute maximumfusion rule. Two important properties shift invariance andself reversibility of steerable pyramid wavelet transform areadvantageous for image fusion because they are capable to
preserve edge information and hence reducing the distortionin the fused image. Experimental results show that the
proposed method improves fusion quality by reducing lossof relevant information present in individual images. Forquantitative evaluation, we have used fusion metrics as
-
7/24/2019 International Journal of Research in Computer & Information Technology
13/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 8
fusion factor, fusion symmetry, entropy and standarddeviation. We proposed a pixel level image fusion schemeusing steerable pyramid wavelet transform. In the proposedmethod, two main steps have to be followed: one, the source
images are decomposed into low pass and high pass sub-bands of different scale using steerable pyramid, andsecondly, low pass sub band is divided into a set of oriented
band pass sub-bands and a low pass sub-band.Thesuitability of the proposed method is tested on multi focusand medical images. For this, we have presented two pair ofimages and their fusion results. The results are also testedon two different conditions; when images are free from anynoise and other when they are corrupted with zero meanwhite Gaussian noise. From experiments, we observed thatthe proposed method performs better in all of the cases. The
performance is evaluated on the basis of qualitative andquantitative criteria.
[2] In this paper, the fusion framework based on data assimilation and genetic algorithm for Multispectral imageand panchromatic image was presented. Data assimilationcan combine the advantage of model operator and observeoperator. Our proposed method can integrate the advantagesof DWT and HIS, construct object function according tosuccessive application to satisfy the aim of adaptivelyadjustment of fusion parameters. Standard deviation andaver-age gradient are chosen as object function. In general,the higher the value, the better the texture information. Andtwo experiments (Spot, Quick bird) validate this framework.The experiment results show that our proposed fusionframe-work is feasible.
[3] In this paper presents a comprehensive framework, thegeneral image fusion (GIF) method, which makes it possibleto categorize, compare, and evaluate the existing imagefusion methods. Using the GIF method, it is shown that the
pixel values of the high-resolution multi spectral images aredetermined by the corresponding pixel values of the low-resolution panchromatic image, the approximation of thehigh-resolution panchromatic image at the low-resolutionlevel.
This paper proposes a framework, the GIFmethod. Under different assumptions on how the LRPI iscomputed and how the modulation coefficients are set,many existing image fusion methods, including, but notlimited to, IHS, BT, HPF, HPM, PCA, ATW, and MRAIM,are shown to be particular cases of the GIF method. The
performance of each method is determined by two factors:how the LRPI is computed and how the modulationcoefficients are defined. If the LRPI is approximated fromthe LRMIs, it usually has a weak correlation with the HRPI,leading to color distortion in the fused image. If the LRPI isa low-pass filtered HRPI, it usually shows less spectraldistortion. If the modulation coefficient is set as a constantvalue, the reflectance differences between the panchromatic
bands and the multispectral bands are not taken intoconsideration, and the fused images bias the color of the
pixel toward the gray. Methods in which the modulationcoefficients are set following the GIF method can preservethe ratios between the respective bands, give more emphasis
to slight signature variations, and maintain the radio-metricintegrity of the data while increasing spatial resolution.[4] This paper addresses the image registration problemapplying genetic algorithms. The image registrations
objective is to define mapping that best match two set ofpoints or images. In this work the point matching problemwas addressed employing a method based on nearest-neighbor. The mapping was handled by affinetransformations. This paper presents a genetic algorithmapproach to the above stated problem of mis-registration.The genetic algorithm is an iterative process whichrepeatedly modifies a population of individual solutions. Ateach step, the genetic algorithm selects individual at randomfrom the current population to be parents and uses them to
produce the children for the next generation. In eachgeneration, the fitness of every individual in the populationis evaluated, multiple individuals are stochastically selected
from the current population (based on their fitness), andmodified (recombined and possibly randomly mutated) toform a new population. The new population is then used inthe next iteration of the algorithm. Over successivegenerations population evolves toward an optimalsolution. The algorithm terminates when either a maximumnumber of generations has been produced, or a satisfactoryfitness level has been reached for the population.
In this paper we have focused on geneticalgorithm for medical image registration. Genetic algorithmis an evolutionary algorithm. There are other methods likesimulated annealing, mutual information theory for image
registration. Apart from this, there are other algorithms likegraph algorithm and sequence algorithms. We canimplement these algorithms and show the comparative studyand get the most suitable for medical applications.
3. PROPOSED METHODOLOGY AND
ARCHITECTRE
In this section discuss the proposed methodology of featurebased image fusion technique based on wavelet transformfunction and particle of swarm optimization, the feature oftransform function passes through feature selection process.The feature selection process used particle of swarmoptimization technique.The particle of swarm optimizationselect the optimal feature of given texture feature matrix. Ifthe correlation coefficient factor estimate the value ofcorrelation is zero then fusion process is done. The processof proposed model divide into two section first section dealswith initially take host image and reference image passesthrough wavelet transform function for feature extractionafter the feature extraction applied optimization task done
by particle of swarm optimization.
-
7/24/2019 International Journal of Research in Computer & Information Technology
14/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 9
Step feature extraction
a. input the host image and reference image
b.
apply separately Wavelet transform functionfor feature extractionF(x) =I(x, y) is host image F1(x) =I1(x1, y1) isreference imageM (F) = F(x) G(x)The convolution is perform in host imagethrough transform function here M (F) storedthe texture feature matrix of host image.
Then a feature vector is constructed using mn and mn asfeature components:
f= [00 00 0101. mn mn] .. (1)We obtain a numerical vector of 60 dimensions for 10
orientations and 6 scales changes. This moment featurevalue stored in M (F) matrix.
N (F) =F1(x) G(x)
The convolution is perform in host image through transformfunction here (F) stored the texture feature matrix of hostimage.
Then a feature vector is constructed using 1mn and 1mn asfeature components:
f= [100 100 01101. 1mn 1mn] ..(2)
We obtain a numerical vector of 60 dimensions for 10orientations and 6 scales changes. This moment featurevalue stored in N (F) matrix.
1. Both the feature matrix convent into feature vectorand pass through particle of swarm optimization
2. step two used here particle of swarm optimizationfor classification of pattern Transform data to theformat of an SVM that is X is original data R is
transform data such that Xi d here d isdimension of data.
Conduct scaling on the data
here is scaling factor and m is total data point and k istotal number of instant and sim find close point of data.
Consider the RBF kernel K(x; y)
H(x) =
this is kernel equation of plane.Use cross-validation to 2nd the best parameter C andUse the best parameter C and to train the whole training set
Ro=
where Ro is learning parameterof kernel function.
Generate pattern of similar and dissimilar pattern of bothimage.3. Estimate the correlation coefficient of both patterns using
persons coefficient.
Estimate the feature correlation attribute as
Here a and b the pattern of host
image and reference image.
The estimated correlation coefficient data check the total
value of MSE
Create the relative feature difference value
If the relative pattern difference value is 0
4. Fusion process is done
5. Calculate PSNR value of fused image
6. Calculate IQI value of fused image
7. Calculate fusion MSER of fused image.
PROPOSED MODEL
Figure 1: Proposed model of image fusion technique basedon feature optimization
-
7/24/2019 International Journal of Research in Computer & Information Technology
15/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 10
DESCRIPTION OF MODEL
In this section describe the process of proposed model. Theproposed model contain with wavelet transform function
and particle of swarm optimization. The swarm optimizationused for the feature optimization process. Here discuss step
of proposed model.
Step 1.Initially put the original image and reference image
for the processing of feature extraction
Step 2. After processing of image discrete wavelettransform function are applied for the texture featureextraction
Step 3. After the texture feature extraction calculate themaximum value of feature using mean standard formula.
Step 4the maximum value of feature set is global value offitness constraints of particle of swarm optimization
Step 5. The particle of swarm optimization select the allfeature as particle and measure value of difference andmove according to feature direction for the processing ofoptimalStep 6. The selection of optimal feature in both imageestimate the correlation coefficient function of value R.Step 7.If the value of R is 0 image are going on process ofimage fusion.Step 8. If value of R not equal to 0 the processing going to
estimation function.
4. RESULT ANALYSIS
To investigate the effectiveness of the proposed method forimage fusion based on wavelet transform function and
particle of swarm optimization. We used MATLABsoftware 7.14.0 and some reputed image used forexperimental task such as the name given head image, headCT image, head MRI image, Heart image and Hand image.This all image is gray scale image size is 512 * 512. The
performance measuring parameter is MSER, PSNR and IQI.Here we are using various types of image fusion techniques
such as wavelet and Particle of swarm optimization.
IMAGE
NAME
Name of
methodMSER PSNR IQI
Head DWT 22.03 18.30 0.955
Head DWT-POS 26.18 20.17 0.947
Table 1:Shows that the comparative result analysis for theHead image with using DWT and DWT-POS method and
we find the value of MSER, PSNR and IQI.
IMAGE
NAME
Name of
Method
MSER PSNR IQI
Head CT DWT 17.38 15.82 1.96
Head CT DWT-
POS
23.67 18.29 0.953
Table 2:Shows that the comparative result analysis for theHead CT image with using DWT and DWT-POS methodand we find the value of MSER, PSNR and IQI.
IMAGE
NAME
Name of
Method
MSER PSNR IQI
Head MRI DWT 15.89 14.43 1.964
Head MRIDWT-
POS22.15 16.84 0.957
Table 3:Shows that the comparative result analysis for the
Head MRI image with using DWT and DWT-POS method
and we find the value of MSER, PSNR and IQI.
IMAGE
NAME
Name of
MethodMSER PSNR IQI
Heart DWT 22.17 18.43 0.954
HeartDWT-
POS26.53 21.01 0.943
Table 4:Shows that the comparative result analysis for the
Heart image with using DWT and DWT-POS method and
we find the value of MSER, PSNR and IQI.
IMAGE
NAME
Name of
Method
MSER PSNR IQI
Hand
image
DWT 24.76 20.86 0.948
Hand
image
DWT-
POS
29.06 23.41 0.940
-
7/24/2019 International Journal of Research in Computer & Information Technology
16/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 11
Table 5:Shows that the comparative result analysis for the
Hand image with using DWT and DWT-POS method and
we find the value of MSER, PSNR and IQI.
COMPARATIVE RESULT GRAPH
Figure 2: Shows that the comparative result graph for Head
image with using DWT and DWT-POS image fusion
method and find the value of MSER, PSNR and IQI.
Figure 3: Shows that the comparative result graph for Head
CT image with using DWT and DWT-POS image fusion
method and find the value of MSER, PSNR and IQI.
Figure 4: Shows that the comparative result graph for Head
MRI image with using DWT and DWT-POS image fusion
method and find the value of MSER, PSNR and IQI.
Figure 5: Shows that the comparative result graph for Heart
image with using DWT and DWT-POS image fusion
method and find the value of MSER, PSNR and IQI.
0
5
10
15
20
25
30
MSER PSNR IQI
Comparative result graph for Head image
with using DWT and DWT-POS image
fusion method and find the value of MSER,
PSNR and IQI
DWT
DWT-POS
0
5
10
15
20
25
MSER PSNR IQI
Comparative result graph for Head CT image
with using DWT and DWT-POS image fusion
method and find the value of MSER, PSNR
and IQI
DWT
DWT-POS
0
5
10
15
20
25
MSER PSNR IQI
Comparative result graph for Head MRI
image with using DWT and DWT-POS
image fusion method and find the value of
MSER, PSNR and IQI
DWT
DWT-POS
0
5
10
15
20
25
30
35
MSER PSNR IQI
Comparative result graph for Hand image
with using DWT and DWT-POS image
fusion method and find the value of MSER,
PSNR and IQI
DWT
DWT-POS
-
7/24/2019 International Journal of Research in Computer & Information Technology
17/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 12
Figure 6: Shows that the comparative result graph for Hand
image with using DWT and DWT-POS image fusion
method and find the value of MSER, PSNR and IQI.
5. CONCLUSIONIn this dissertation proposed a feature based image fusiontechnique for the improvement of quality of image ofdistorted and damage image. The process of proposedalgorithm used wavelet transform function for the featureextraction process. The wavelet transform function extractthe lower content of texture feature. The lower content oftexture feature used for the process of feature optimization
process. The feature optimization process done by particleof swarm optimization. Particle of swarm optimization isdynamic population based optimization technique. Thecorrelation coefficient factor estimate the relation oforiginal image and reference image. If the value ofcorrelation is 0 then image are fused. If the value ofrelation is not equal to zero the estimation factor recall.Measure the quality of fused image measures areconsidered. These measures play an important role invarious Image Processing applications. Goal of imagequality assessment is to supply quality metrics that can
predict perceived image quality automatically. Whilevisual inspection has limitation due to human
judgment, quantitative approach based on the evaluation ofdistortion in the resulting fused image is moredesirable for mathematical modeling. The goals of thequantitative measures are normally used for the result ofvisual inspection due to the limitations of human eyes. InMathematical modeling, quantitative measure is desirable.One can develop quantitative measure to predictperceivedimage quality. In this dissertation used PSNR, IQI andMSER for estimation of quality of image.
6. FUTURE WORK
The proposed method of image fusion is very efficient forthe process of image quality improvement. The process of
fusion produces good result in term of quantitative analysis.But it still need some improvement in IQI parameter. Themaximum value of IQI is 1. But in this dissertation onlyreached 97-98% for quality factor. In future improve thevalue of IQI up to 1. For this used two or more featurecombined with texture feature.
7. REFERENCES
[1] Om Prakash, Arvind Kumar, Ashish Khare, Pixel-levelimage fusion scheme based on steerable pyramid wavelettransform using absolute maximum selection fusion ruleIEEE, 2014. Pp 765-771.
[2] Liang HongKun YangXianchun Pan, Multispectral
and panchromatic image fusion Based On GeneticAlgorithm and Data Assimilation IEEE, 2011. Pp 156-160.[3] Zhijun Wang, Djemel Ziou, Costas Armenakis, DerenLi, and Qingquan Li, A Comparative Analysis of ImageFusion Methods IEEE TRANSACTIONS ONGEOSCIENCE AND REMOTE SENSING, VOL. 43, 2005.Pp 1391-1402.[4] V. T. Ingole, C. N. Deshmukh, Anjali Joshi, DeepakShete, MEDICAL IMAGE REGISTRATION USINGGENETIC ALGORITHM Second InternationalConference on Emerging Trends in Engineering and
Technology, 2009. Pp 63-67.[5] Won Hee Lee, Kyuha Choi, Jong Beom Ra, FrameRate Up Conversion Based on Variational Image FusionIEEE TRANSACTIONS ON IMAGE PROCESSING,VOL. 23, 2014. Pp 399-413.[6] De-gan Zhang, Chao Li, Dong Wang, Xiao-li Zhang, A
New Method of Image Data Fusion Based on FNN SixthInternational Conference on Natural Computation, 2010. Pp3729-3733.[7] Chaunt W. Lacewell, Mohamed Gebril, Ruben Buaba,and Abdollah Homaifar, Optimization of Image FusionUsing Genetic Algorithms and Discrete WaveletTransform IEEE, 2010. Pp 116-121.
[8] Ling Tao, Zhi-Yu Qian, An Improved Medical ImageFusion Algorithm Based on Wavelet Transform eventhInternational Conference on Natural Computation, IEEE2011. Pp 76-80.[9] LU Xiaoqi, ZHANG Baohua, GU Yong, MedicalImage Fusion Algorithm Based on clustering neuralnetwork IEEE, 2007. Pp 637-640.[10] Vikas Kumar Mishra, Shobhit Kumar, Ram KailashGupta, Design and Implementation of Image FusionSystem International journal of computer science &engineering, Vol-2, 2014. Pp 182-186.[11] S. Bedi, Rati Khandelwal, Comprehensive and
Comparative Study of Image Fusion TechniquesInternational Journal of Soft Computing and Engineering,Vol-3, 2013. Pp 300-304.
0
5
10
15
20
25
30
35
MSER PSNR IQI
Comparative result graph for Hand image
with using DWT and DWT-POS image fusion
method and find the value of MSER, PSNR
and IQI
DWT
DWT-POS
-
7/24/2019 International Journal of Research in Computer & Information Technology
18/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 13
[12] Jamal Saeedi, Karim Faez, Infrared and visible imagefusion using fuzzy logic and population-based optimizationApplied Soft Computing, Elsevier ltd. 2012. Pp 1041-1054.[13] P. Shah, S. N. Merchant, U. B. Desai, "Fusion of
surveillance Images in Infrared and visible band usingcurvelet wavelet and wavelet packet transform"International Journal of Wavelets, Multire solution andInformation Processing Vo1.8, No.2, 2010. Pp 271-292.[14] P. Shah, S. N. Merchant, U. B. Desai, "An efficientspatial domain fusion scheme for multi focus images usingstatistical properties of neighborhood" Multimedia and Expo(ICME), 2011, Pp 1-6.[15] V. P. S. Naidu, R. Raol, "Pixel-level image fusionusing wavelets and principal component analysis" DefenceScience Journal, Vo1.58, no.3, 2008, Pp 338-352.
8. AUTHOR PROFILE
Prof. Hrishikesh S. Holey
received the Master ofTechnology in SoftwareEngineering from RajivGandhi Technical University,Bhopal. Currently he is anAssistant Professor in HVPMCollege of Engineering &Technology, Amravati, India.He has published two papers in
international journals. He ishaving 6 year teachingexperience and his field ofspecialization is ImageProcessing, Digital SignalProcessing, SoftwareEngineering, Computer
Network and NetworkSecurity..
-
7/24/2019 International Journal of Research in Computer & Information Technology
19/104
I nternational Journal of Research in Computer & I nformation
Technology (I JRCIT) Vol. 1, I ssue 12015 ISSN:2455-3743
Page 14
SAP HANA DATABASE WITH NETWORK
PROF. ANUP. P. DATE1, MISS. NAMRATA S. MAHAJAN
2
1Assistant Professor, Department of CSE, KGIET Darapur,
Sant Gadge Baba Amravati University, Maharashtra, India.
[email protected],2Department of CSE. KGIET Darapur,
Sant Gadge Baba Amravati University, Maharashtra, India
ABSTRACT:SAP HANA Database is stand for system, application and processing on database with High performance AnalyticAppliance. SAP HANA core database can serve real-time, complex queries and multi structured data needs. Enterprise
Requirement may increase day by day. In SAP HANA database no of user operate same data simultaneously. The goal of the SAP
HANA database is the reduced the problem related with storage and workload within management system. By this reasons it
have modern hardware with multiple processor, large main memory, and caches. SAP HANA database have various method for
compression of database content [1].
Keywords:SAP HANA, real time, multiple processor, cache, main memory.
1. INTRODUCTION
It is a combination of hardware and software made to
handle both high transaction rate and complex query
processing. SAP HANA previously called SAP High-
Performance Analytic Appliance. In addition to database engine
HANA include an embedded web server, Trex search engine an
in memory column-oriented search engine [2]. SAP HANA has
the cloud platform for the data storage. And hence the data isstored in secure and efficient way [3].
The SAP HANA has two type of connection to network:
1) Inbound connection.
2) Outbound connection
Inbound connections: In inbound connection for database
clients and data provisioning it used the protocols SQLDBC by
using port no.3xx15, 3xx17 and SAP HANA Studio operate
administrative functions by using port no.5xx13, 5xx14, 1128,1129.for the web base access of SAP HANA us done by using
HTTP and HTTPS for this port no.80xx, 43xx is used[3].
Outbound connections:Outbound connection is used by the
solution manager for the purpose of diagnostics agent
installed on each system.
2.THE SAP HANA DATABASE WITH NETWORK
CONNECTIVITY
Network is defined as the set of two or more number of
computers that shared the information, resources to each
other.
An SAP HANA data centre database can running range
from the single host to a complex distributed system having
multiple hosts location.
2.1 High availability and disaster recovery in SAP
HANA: SAP HANA is fully designed have high
availability. It supports recovery used for the detection of
error related to the software and other fault. High
availability in SAP HANA IS derived from set of
techniques, practices of engineer and design principles that
fulfil the requirement of business continuity [4].
For achieved High availability in SAP HANA first it
eliminating single points of failure as quickly and
providing the ability to repair the fault. Fault recovery isthe method of detection and correction of the fault. In
disaster recovery it take a backup of data. The backup is
used at the time of data is loss due to some reasons like due
to viruses, power supply fault.
2.2 Connectivity to Network: SAP HANA database has
the client-server model of connectivity. SAP HANA is
transaction-oriented databases because it used the
replication services.
The setup of an SAP HANA depends on following things.
-
7/24/2019 International Journal of Research in Computer & Information Technology
20/104
I nternational Journal of Research in Computer & I nformation
Technology (I JRCIT) Vol. 1, I ssue 1, 2015 ISSN: 2455-3743
Page 15
It Support to traditional database clients, Web-baseduser, and admin.
The number of client used to the SAP HANA system,
ranging from a single-client system to a complexdistributed system is responsible for provides ainformational framework to use the most efficientchannels of transmission information with a low errorrate .with multiple client.
Support for high availability through the use of
multiple technique, and support for disaster recoverydatacenters with recovery methods.
SAP HANA has number of network communicationchannels with the different SAP HANA setups.
There is separate channels used for external access toSAP HANA function operate by end-user clients,administration clients, application servers, and for
data providing via SQL or HTTP protocols.For purpose of separate external and internal
communication, SAP HANA hosts use a separate network
adapter .network adapter means it is a board or PCMCLA
card that have RAM, DSP chips and link interface with a
separate logical address for each of the different networks.
In addition, SAP HANA can be configured to use SSL
(secure socket lock protocols for secure communication.
3. NETWORK ZONES
3.1 Client zone: In the simple means client is persons that
use the facility provides by server. The is used by SAPapplication servers, by clients used client zone by SAP
HANA studio or Web applications running With help of
SAP HANA Extended service server, and for the storing
historical data of user it used data warehouse[8].
3.2 Internal zone:This zone covers the inter host network
between hosts which are in a distributed system and the
SAP HANA system replication technique.
3.3 Storage zone: it is responsible data backup purpose.
Figure 1:Network Zone.
3.4 Connections used by Database Clients and Web Clients
to connect to the SAP HANA.
Connection is as follows
Administrative purposes connection.
Data provisioning (providing) connection.
Clients Connections from database that access thedatabase by using SQL/MDX interface.
4. PROTOCOLS USED BY DATABASE FOR
CONNECTING TO NETWORK
Protocols: A protocol is rules and regulation that governthe communication. Without protocols there is no
communication.For the database connectivity SAP HANA database usedfollowing protocols.4.1. SQLDBC: It stands for the SQL databaseconnectivity. By using this protocol we can connect thedatabase to the network. This protocol again has to typeJBDC and OBDC. This protocols used by client andadminister to database for connection.
JDBC: Stand for JAVA database connectivity. Thisprotocol is responsible for the client connects andaccess to the database. It used for the updating thedatabase contains. The stored procedures are invoked byJDBC connection.
ODBC: Stand for open database connectivity. Thisapplication which is written using the ODBC is portedto both client and server side. It used concept of DNSthat is data source names. DNS collect the additionalinformation about the particular source connection.
4.2 HTTP/HTTPS: HTTP is tends for hypertext transferprotocols and S is for the Secure. SAP HANA USED theseprotocols for connecting web application to the database.HTTP is reliable data transfer. HTTP used the portno.80xx.HTTP protocols used the TCP connection [9].4.3 SSL:SSL stand for the secure sockets layer protocols.This is used for the secure communication between SAPHANA database and client. This protocol provides theauthentication to server and data encryption. SSL used the
port no 5xx13 and 5xx14.
-
7/24/2019 International Journal of Research in Computer & Information Technology
21/104
I nternational Journal of Research in Computer & I nformation
Technology (I JRCIT) Vol. 1, I ssue 1, 2015 ISSN: 2455-3743
Page 16
Database Client Access:
Client Protocols used
by client
TCP port
number
1. Client used
the SAP HANA
database as
application.
Example:
Business
Warehouse.
2. The user used
SAP HANA
directly
Example:
Microsoft Excel.
3. SAP HANA
studio:
SAPHANA
studio is
administrative
block
The protocol
used for
database client
access is
SQLDBC.
3 xx 15
3 xx 17
Administrative Tasks:
Client Protocols and
other
information
Port no.
1)SAP support
2)SAP HANA
studio
The internal SAP
protocol is used.The protocols is
used by studio is
SQLDBC. here
the connection
agent play role
of administrator
3xx09
5xx13 5xx14
(SSL)
5. SAP HANA SERVER
Server: Server is the any computer program or
machines that accept the client request and give response.
Main motto of server is to share resources and hardware
between the clients.
The SAP HANA has the following server.
Index Server: It is responsible for the storing of actualdata and the engines for processing the data. It acts also as
main server. User all the other servers coordinate by the
server
Name Server: It is having responsibility to store the
topologyof Distributed SAP HANA database name server.
The SAP HANA used by distributed system by using the
instances number. Name server has information about the
running component of SAP HANA database.
Statistics Server: It has information about Status about the
Performance and Resource Consumption from all the other
server components. For the access the Statistics Serverthere is used of the SAP HANA Studio. It monitors the
entire server working.
Pre-processor Server: It is used for to find Text Data and
extracting the information on which the text search
capabilities are based [2].
6. NETWORK SECURITY
6.1 Authentication and Authorization: SAP HANA
supports an authentication method. Authentication is
method to provide a way of identifying a user. The most
basic is username/ password combinations for database
users created and maintained through the SAP HANA
Studio [4].
6.2Encryption: ENCRYPTION Is method of data hiding
in the network .The secure sockets layer (SSL) protocol be
used to encrypt client-server traffic and internal
communications in SAP HANA. SSL is not invulnerable
(not have any weakness). SSL proxies are widely available
and can be used to encrypt and decrypt packets passed
between endpoints within a network. Root encryption keys
are stored using the SAP Net Weaver secure storage file
system (SSFS). Keys should be periodically changed using
the sql command alter system persistence encryption create
new key followed by alter system persistence encryption
apply current key [5].
6.3Auditing And Logging: An audit also called audit log.
The meaning of audit means recording the log file. Once
enabled, audit policies should be configured to log actions
that include SELECT, INSERT, UPDATE, DELETE, And
EXECUTE and other quires when combined with specific
conditions. Policies can be configured for specific users,
tables, views and procedures. It is recommending auditingall actions performed by privileged users including the
-
7/24/2019 International Journal of Research in Computer & Information Technology
22/104
I nternational Journal of Research in Computer & I nformation
Technology (I JRCIT) Vol. 1, I ssue 1, 2015 ISSN: 2455-3743
Page 17
SYSTEM user and actions that impact sensitive database
objects. SAP HANA database supports to recovery. In it
database have one copy of original data if anyone make
changes in it then data is match with copy [5].
7. CONCLUSION
The requirement of every organization is to have the
powerful database for storage the SAP HANA provides all
things that make organization best. The SAP HANA has
one speciality that thousands of users may read or update
records of the same data. SAP HANA provides the best
security to data. As all organization give important to have
the powerful network of database the SAP HANA fulfill all
the requirement of organization. SAP HANA database with
network connectivity give benefits to the organization.
9. REFERENCES
[1]F Farber, N.May, W.Lehner, P.Grobe The SAP HANA
DATABASE ARCHITECTUCTURE OVERVIEW
IEEE Data Eng-Bull 35(1), 2012.
[2]Tusal patel, Priti Gupta, Nishant Khatri Distributed
SAP HANA DATABASE FOR EFFICIRNT
PROCESSING. International Journal of advanced
Research in computer communication Engineering, volume
2 issue 6 June 2013
[3] T. Benson, A. Akella, A. Shaikh, and S. Sahu.
Cloudnaas: a cloud networking platform for enterprise
applications. In SOCC, 2011.
4]H. Plattner. A common database approach for OLTP and
OLAP using an in-memory column database. In
Proceedings of the 35th SIGMOD international conference
on Management of data, SIGMOD '09.
[5] SUSE Linux Enterprise Server 11 SP3 Security and
Hardening, June 2013, SUSE LLC, SUSE Linux Enterprise
Server 11 SP3 Security Guide, July 2013, SUSE LLC.
[6] F. Farber, S. K. Cha, J. Primsch, C. Bornhovd, S.Sigg, and W. Lehner. SAP HANA Database - Data
Management for Modern Business Applications. SIGMOD
Record, 40(4):4551, 2011.
[7] T. Legler, W. Lehner, and A. Ross. Data mining with
the sap netweaver bi accelerator. In VLDB, pages 1059
1068, 2006.
[8]P. Costa, M. Migliavacca, P. Pietzuch, et al. NaaS:Network-as-a-Service in the cloud. In HotICE, 2012.
9]D. D. Clark, J. Romkey, and H. C. Salwe. An analysis of
TCP processing overhead. In LCN, 1988.
[10] SAP AG or an SAP affiliate company, SAP HANA
Introduction, Participant Handbook, 2013, pp. 2-18.
10. AUTHOR PROFILE
Prof. Anup. P. Date received
the MBA in ComputerManagement from Universityof Pune. Currently he is anAssistant Professor in KGIETDarapur, India. He has
published three papers ininternational journals and twonational conferences. He ishaving 6 year teachingexperience and his field ofspecialization is softwareEngineering, softwaremanagement, computer
networking, databasemanagement, artificialintelligence, web baseengineering, Image
processing.
Miss. Namrata S. MahajanCurrently pursing Bachelor ofEngineering in ComputerScience and Engineeringfrom Kamalatai GawaiInstitute of Engineering &Technology, Amravati, India.
-
7/24/2019 International Journal of Research in Computer & Information Technology
23/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 1, 2015 ISSN: 2455-3743
Page 18
PERFORMANCE EVALUATION OF DATABASE CLIENT ENGINE USING MODULAR
APPROACH
PROF. RAMANAND SAMDEKAR
S.B. Jain Institute of Technology Management & Research, Nagpur, India
ABSTRACT:Materialized view creation is an important aspect for large data centric applications. Materialized views create anabstraction over the actual database tables to the users. The MV view creation and selection is based on the various parameters
like access frequency, base update frequency etc. Database client engine use cluster base approach to create materializes view to
reduce query execution time.
Keywords:Database client engine, cluster base, Data Warehouse, Threshold, materialized views.
1.
INTRODUCTIONBy observing the use of heterogeneous data in
Data warehouses are designed to facilitate reporting andanalysis of data, focuses on data storage. The datawarehouse is intended to provide decisions support servicesfor large volumes of data. So how to rapidly respond toquery request is a great challenge in data warehouse. Quickresponse time and accuracy are important factors in thesuccess of any database.
This paper proposes an approach of grouping inbroader sense clustering the similar queries depending oncertain parameters like access frequency to find the resultfrom MV. The proposed work explores the area of a) query
clustering for the selection of materialized view to decreasethe response time and storage space deploymentenvironment b) Ease network goals c) Enabling data sub-setting d) Enabling disconnected computing. To achievethese benefits, a methodology is proposed in this paper toform a quantitative optimize total query response timeunder a disk space constraint for data warehouseapplications presented in [1] [3].
2. RELATED WORKS
Ordinary views are loaded with data every time it iscalled. Thus in real life applications materialized views arefound to be more suitable to reduce query execution time.
Materialized view creation involves several issues toconsider. However, the main concern is to ensureavailability of higher amount of user requested data directlyfrom materialized views. Automated selection [13] ofmaterialized views in large data oriented application isdesirable for dynamic changes. A very few research workhas been done about selection of materialized view usingclustering approach. A significant work about dynamicclustering of Materialized view is done by [1].Paper [5]
proposes a greedy algorithm BPUS based on the latticemodel. And paper [6] discusses the issue of materializedview selection with the B-tree index. Paper [7] proposesPBS algorithm which make the size of materialized view as
selection criteria. Paper [8] proposes preprocessor ofmaterialized view selection, which reduces the
Search space cost and time complexity of staticmaterialized view selection algorithm. These algorithms are
based on the known distribution of query, or uniformdistribution under the premise, which essentially are staticalgorithms. However, the query is random in actual OLAPsystem, so materialized view set which static algorithmgenerates cannot maximally enhance the query response
performance in data warehouse. In order to improve furtherquery response performance in data warehouse, paper [9]
proposes dynamic materialized view selection algorithm,FPUS algorithm, which is based on query frequency in unitspace. Relationship among several attributes in the form of a
Quantitative metric using a robust mathematical model, whichis implemented here using line fitting algorithm. Thisquantitative measure guides to construct the materializedviews.
3. PROPOSED METHODOLOGY
Our solution is an approach based on user behavior andtheir interactions with the system, particularly the distributionof their queries, to create the set of views to materialize.Materialized views are able to provide the better performancefor DW queries. However, these views have maintenancecost, so materialization of all views is not possible. Animportant challenge of DW environment is materialized view
selection because we have to realize the trade-off betweenperformance and view maintenance is needed to considerfollowing things.
1) Classification of queries: it is to determine thecategories of data which the user is interested.[11]
2) Classification of attribute groups:it is to determine thegroups of attributes for each class.
3) Merging classes: merge the data classes to make theclasses that are most compact.
A clustering method is suggested in which
similar queries will be clustered according to theirquery access frequency to select the materialized views
-
7/24/2019 International Journal of Research in Computer & Information Technology
24/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 1, 2015 ISSN: 2455-3743
Page 19
that will reduce the execution time and storage space.When the query is posed, it will be compared withalready clustered or existing query, and the
precomputed MV will be returned as a result whichwill reduce the execution time of the query. In thisapproach, a framework is created which will reduce theexecution time of query when posed to thisframework.[9]Algorithm for Database client view
The steps of the algorithm are as below.
I) Generation of random set of records for giventables in database by record generator.
II) Extraction or generation of all possible set ofqueries resolved by system on above createdrecords.III) Optimization of above set of queries according totheir access frequency.IV) Creation of MV according to query accessfrequency called as Threshold Value and according toMaximum Cluster Area Threshold % According toabove step a of MV creation, 3types of MV arecreated as follows.1) Single query to Multi table MV. In this responseof single query is obtained from multiple MV table.2) Single query to single table MV. In this responseof single query is obtained from single MV table.[10]3) Multiple queries to single table MV. In thisresponse of multiple similar queries will be obtainedfrom single MV table.4) After creation of these 3 different types of MV, wewill store these MV. Creating candidate views formaterialization in our approach, we assumed that adata pattern is present in user queries, i.e. certaincategories of data will be queried more frequentlythan others. Thus, it will be very useful to extractthese patterns given the basis of which we will createthe candidate views for materialization. Extracting theattributes of interest. Generally in a mediation system,a global schema representing the domain of use is
provided. It is in terms of the latter are expressed theuser queries. We analyze these queries to determine,among all the attributes of this schema, those inWhich users are interested, i.e. the most frequent
attributes.4. Algorithm Materialized_View_Creation
Begin
Step 1.
/* In this step, construct a (2m) matrix calledImportant Attribute and Affinity Matrix (IAAM) from
the array Total_Use and the matrix AAM to computethe degree of importance of attributes. */Call method IAAM_Computation. [6]
Step 2.
/* In this step, the views are created one after one by
taking the attributes from IAAM in descending orderof importance. It takes as input numbers of viewsuser want to create and also the corresponding sizeof each view. */
Call method Materialized_View_Creation.End
5. AN ILLUSTRATIVE EXAMPLE
Consider an example of a query set where 10 queriesare participating and 10 attributes are used in thesequeries. Say the name of the attributes is A1, A2, and
A10. Execution of the algorithmAttribute_Affinity_Scale is shown below.A. Attribute_Affinity_ Scale:Step 2.
/* In this step, the views are created one after one bytaking the attributes from IAAM in descending orderof importance. It takes as input numbers of views userwant to create and also the corresponding size of eachview. */Call method Materialized_View_Creation.End
6.
Selection of views to materialize
The views created in the first phase of our approachcannot be all materialized. Indeed, the space formaterialization, the frequency of update and the costof access to sources is critical.
The frequency of change: the views that rarelychange are good candidates for materialization.
The size of views: the views of small sizes arefavored
For materialization than large ones.
The availability of sources: The views, whose datare sides in sources that are rarely available, should bematerialized.
The cost of access: the materialization of viewswhose data resides in sources with a high cost ofaccess will improve the system performance. Thus, aview will be materialized, if it satisfies at least twocriteria. [7]
-
7/24/2019 International Journal of Research in Computer & Information Technology
25/104
I nternational Journal of Research in Computer & Information
Technology (I JRCIT) Vol. 1, I ssue 1, 2015 ISSN: 2455-3743
Page 20
7. CONCLUSIONS
Thus the paper proposes algorithm for the
materialized view design problem, e.g., how to selectthe set of views to be materialized so that the cost ofprocessing a set of queries and storage space requiredstoring the data for the materialized views isminimized. This approach realizes on analyzing thequeries so as to derive common intermediate resultswhich can be time and to eliminate the need forcreation of same MV for the query. The proposedalgorithm for determining a set of materialized viewsis based on the idea of reusing temporary results fromthe execution of the global queries. The cost modeltakes into consideration of both query accessfrequencies and % threshold. The work presented
here is the first stage research in selection of querieswith high access frequencies, clustering them andcreation of Materialized Views for the same. Thesehigh access frequency queries are further analyzed forrequired cluster area to create MV.
8. REFERENCES
[1] A Gong, Weijing Zhao, Clustering-basedDynamic Materialized View SelectionAlgorithmProceedings of Fifth InternationalConference on Fuzzy Systems and KnowledgeDiscovery, 2008, China, pp391- 395.
[2]
Jian Yang, Kamlakar Karlapalem, QuingLi,Algorithms for materialized view design indata warehousing environment. K. Aouiche,P.Emmanuel Jouve, and J.Darmont
[3] , Clustering-Based Materialized View Selectionin Data WarehousesTechnical Report, Universityof Lyon, 2007.
[4] Shukla A, Deshpande PM, Naughton JF,Materialized view selection for multidimensionaldatasets, Proceedings of the 24th International
[5] Conference on VLDB, Morgan KaufmannPublishers, San Francisco, 1996, pp. 51.
[6] Shukla A, Deshpande P M, Naughton JF,Materialized View Selection orMultidimensional Datasets, Proceedings of the
24th VLDB Conference, 1998, pp. 488-499.[7] Dynamic Materialized View Selection AlgorithmProceedings of Fifth International Conference onFuzzy Systems and Knowledge Discovery, 2008,China,pp391- 395
[8] Hadj Mahboubi, Kamel Aouiche and JrmDarmont, Materialized View Selection by QueryClustering in XML Data WarehousesFourthInternational Conference on ComputerScience and Information Technology-Jor dan.
[9] Gupta H, Harinarayan V, Rajaraman A, et al,Index Selection for OLAP, Proceeding of
International Conference on DataEngineering,1997, pp. 208-219.
[10]Mistry H, Roy P, Sudarshan S, et al, Materializedview selection and maintenance using multi-query
optimization, Proceedings of SIGMOD'01, 2001,pp. 307-3.S.Agarawal, S.Chaudhuri, V.NarasayyaAutomated Selection of Materialized Views andIndexes for SQL Databases Proceedings of 26thInternational Conference on Very LargeDatabases, Cairo, Egypt, 2000
[11]P.A.Larsen, Jingren Zhou Efficient Maintenanceof Materialized Outer-Join Views 23rdInternational Conference on Data Engineering(ICDE 2007), Istanbul, Turkey, April 2007.
[12]Xia Sun, Wang Ziqiang An Efficient MaterializedViews SelectionAlgorithm Based on PSO.Proceeding of the International Workshop onIntelligent Systems and Applications, ISA 2009,Wuhan, China, May 2009
[13]S.H. Talebian, S.A. Kareem Using Genetic
Algorithm to Select Materialized Views Subject toDual Constraints. InternationalConference onSignal Processing Systems, Singapore, May 2000
9. THOR PROFILE
Prof. Ramanand
Samdekar received theMaster of Technology inComputer Science andEngineering RastrasantTukodoji Maharaj Nagpuruniversity, Nagpur.
Currently he is anAssistant. Professor in S.B.Jain Institute ofTechnology Management& Research, Nagpur, India.He has published three
papers in internationaljournals, two papers innational journal and one innational conference. He ishaving 7 year teachingexperience and his field ofspecialization is Software
development, Data mining,Software System, and
Network Security.
-
7/24/2019 International Journal of Research in Computer & Information Technology
26/104
I nternational Journal of Research in Computer & I nformation
Technology (I JRCIT) Vol. 1, I ssue 1, 2015 ISSN: 2455-3743
Page 21
IMPLEMENTATION IMAGE MOSAI USING PHASE CORRELATION AND HARRIS
OPERATOR1MS. KANCHAN S.TIDKE,
2PRITAM H. GOHATRE
1GH Raisoni Amravati, [email protected]
2LAMIT, Dhamangoan (Rly), India
ABSTRACT:Image mosaic is a technique used to composite two or more overlapped images into a seamless wide-angleimage through a series of processing and it is widely used in remote sensing areas, military applications, etc. When taking these
photos, it's difficult to make a precise registration due to the differences in rotation, exposure and location. The image mosaic
techniques are widely used in remote sensing, medical imaging, and military purposes and so on. Now days, many smart phones
are equipped with the mosaicing application which helps user in many different ways. The image mosaicing technique can be
broadly classified into feature-based and frequency-based techniques. Feature-based method uses the most similarity principle
among images to get the parameters with the help of calculation cost function. Method based on the frequency domain
transforms the image from spatial domain to frequency domain, and get the relationships of translation, rotation and zoomfactor through Fourier transformation. In frequency domain there are methods like phase-correlation, Walsh transform, etc.
Keywords:Image mosaic, remote sensing, medical imaging, Feature-based method, frequency domain transforms, phase-correlation, Walsh transform.
1. INTRODUCTION