A fuzzy-neural approach for interpretation and fusion of colour and texture features for CBIR systems
- Authors: Verma, Brijesh , Kulkarni, Siddhivinayak
- Date: 2004
- Type: Text , Journal article
- Relation: Journal of Applied Soft Computing Vol. 5, no. 1 (2004), p. 119-130
- Full Text:
- Reviewed:
- Description: This paper presents a fuzzy-neural approach for interpretation and fusion of colour and texture features for CBIR systems. The presented approach uses fuzzy logic to interpret queries expressed in natural language such as mostly red, many green, few red for colour feature. Tamura feature is used to represent the texture of an image in the database. A term set on each Tamura feature is generated using a fuzzy clustering algorithm to pose a query in terms of natural language. The query can be expressed as a logic combination of natural language terms and Tamura feature values. A fusion of multiple queries is incorporated into the proposed approach. The performance of the technique was evaluated on Brodatz texture benchmark database and it was noticed that there was a prominent increase in the confidence factor for the images. Fusion experiments were conducted using neurofuzzy, fuzzy AND and binary AND techniques. A comparative analysis showed that fuzzy-neural approach has significantly improved the performance of CBIR system.
- Description: C1
- Description: 2003002798
Fingerprint feature extraction and classification by learning the characteristics of fingerprint patterns
- Authors: Kulkarni, Siddhivinayak
- Date: 2012
- Type: Text , Journal article
- Relation: Neural Network World Vol. 21, no. 3 (2012), p. 219-226
- Full Text: false
- Reviewed:
- Description: This paper presents a two stage novel technique for fingerprint feature extraction and classification. Fingerprint images are considered as texture patterns and Multi Layer Perceptron (MLP) is proposed as a feature extractor. The same fingerprint patterns are applied as input and output of MLP. The characteristics output is taken from single hidden layer as the properties of the fingerprints. These features are applied as an input to the classifier to classify the-features into five broad classes. The preliminary experiments were conducted on small benchmark database and the found results were promising. The results were analyzed and compared with other similar existing techniques. © ICS AS CR 2011.
Natural language based fuzzy queries and fuzzy mapping of feature database for image retrieval
- Authors: Kulkarni, Siddhivinayak
- Date: 2010
- Type: Text , Journal article
- Relation: College of Computer Science & Informatics Vol. 4, no. 1 (2010), p. 11-19
- Full Text: false
- Reviewed:
- Description: Fuzzy logic has been extensively used at various stages of image retrieval such as region groupings within the images as a feature extraction technique, for measuring the Natural Language based Fuzzy Queries and Fuzzy Mapping of Feature Database for Image Retrieval
Challenges of Challenges of Deploying RFID Technology for Reducing Medical Identity Theft
- Authors: Leicester, Phillip , Kulkarni, Siddhivinayak
- Date: 2012
- Type: Text , Journal article
- Relation: International Journal of Infonomics Vol. 5, no. 3/4 (September/December 2012 2012), p. 597-602
- Full Text: false
- Reviewed:
- Description: The healthcare industry is the biggest user of RFID technology due to its mobility in delivering data, tracking and surveillance of every individual, pathology tests, medications and the management of patient data. Because this technology is so vital within the healthcare/hospital environment this paper investigates and analyses the challenges as well as the issues facing RFID technology in implementing and providing security in guarding against the occurrences of medical identity theft. This form of identity theft is life threating as it adds medical data to a patients file who didn’t receive treatment for whatever conditions the imposter obtained as a result of their criminal activity. In preventing medical identity theft requires specific proposals from a policy, social and technological perspective.
- Description: C1
Constructing an inter-post similarity measure to differentiate the psychological stages in offensive chats
- Authors: Miah, Md Waliur Rahman , Yearwood, John , Kulkarni, Siddhivinayak
- Date: 2015
- Type: Text , Journal article
- Relation: Journal of the Association for Information Science and Technology Vol. 66, no. 5 (2015), p. 1065-1081
- Full Text: false
- Reviewed:
- Description: Offensive Internet chats, particularly the child-exploiting type, tend to follow a documented psychological behavioral pattern. Researchers have identified some important stages in this pattern. The psychological stages broadly include befriending, information exchange, grooming, and approach. Similarities among the posts of a chat play an important role in differentiating as well as in identifying these stages. In this article a novel similarity measure is constructed which gives high Inter-post-similarity among the chat-posts within a particular behavioral stage and low inter-post-similarity across different behavioral stages. A psychological stage corpus-based dictionary is constructed from mining the terms associated with each stage. The dictionary works as a background knowledge-base to support the similarity measure. To find the inter-post similarity a modified sentence similarity measure is used. The proposed measure gives improved recognition of inter-stage and intra-stage similarity among the chat posts compared with other types of similarity measures. The pairwise inter-post similarity is used for clustering chat-posts into the psychological stages. Results of experiments demonstrate that the new clustering method gives better results than some current clustering methods.
Investigating the social implications of biometrics and the need for global biometric uniformity
- Authors: Leicester, Phillip , Kulkarni, Siddhivinayak
- Date: 2013
- Type: Text , Journal article
- Relation: International Journal for Infonomics Vol. 6, no. 3/4 (2013), p. 731-735
- Full Text: false
- Reviewed:
- Description: This research paper looks at the social implications of biometrics pertaining to the ethics of privacy and the ownership of individual biometric data, including how these issues can be resolved through the establishment of a Biometric Commission by introducing global standardised biometric uniformity and the guidelines that will ensure their technological foundations. Much of the distrust that engulfs society is due to the past performances and policy implementations that governments have initiated surrounding biometric technology and its miss use beyond the realms of individual identification for security purposes. There needs to be total transparency from governments and organisations that use biometric technology for security identification in how every individuals biometric data will be used, stored and the ethical standards provided in eliminating many of the implications that every society has towards on how their biometric data will be used.
A new reliability analysis method based on the conjugate gradient direction
- Authors: Ezzati, Ghasem , Mammadov, Musa , Kulkarni, Siddhivinayak
- Date: 2015
- Type: Text , Journal article
- Relation: Structural and Multidisciplinary Optimization Vol. 51, no. 1 (2015), p. 89-98
- Full Text: false
- Reviewed:
- Description: Reliability-based design optimization (RBDO) is an important area in structural optimization. A principal step of the RBDO process is to solve a reliability analysis problem. This problem has been considered in inner loop of double-loop RBDO approaches. Although many algorithms have been developed for solving this problem, there are still some challenges. Existing algorithms do not have good convergence rates and often diverge. There is a need to develop more efficient and stable algorithms that can be used for evaluating all performance functions sufficiently. In this paper, a new method, called “Conjugate Gradient Analysis (CGA) Method”, is proposed to apply in the reliability analysis problems. This method is based on the conjugate gradient method. Some mathematical problems are provided in order to demonstrate the advantages of the proposed method compared with the existing methods. © 2014, Springer-Verlag Berlin Heidelberg.
Visual character N-grams for classification and retrieval of radiological images
- Authors: Kulkarni, Pradnya , Stranieri, Andrew , Kulkarni, Siddhivinayak , Ugon, Julien , Mittal, Manish
- Date: 2014
- Type: Text , Journal article
- Relation: International Journal of Multimedia & Its Applications Vol. 6, no. 2 (April 2014), p. 35-49
- Full Text:
- Reviewed:
- Description: Diagnostic radiology struggles to maintain high interpretation accuracy. Retrieval of past similar cases would help the inexperienced radiologist in the interpretation process. Character n-gram model has been effective in text retrieval context in languages such as Chinese where there are no clear word boundaries. We propose the use of visual character n-gram model for representation of image for classification and retrieval purposes. Regions of interests in mammographic images are represented with the character n-gram features. These features are then used as input to back-propagation neural network for classification of regions into normal and abnormal categories. Experiments on miniMIAS database show that character n-gram features are useful in classifying the regions into normal and abnormal categories. Promising classification accuracies are observed (83.33%) for fatty background tissue warranting further investigation. We argue that Classifying regions of interests would reduce the number of comparisons necessary for finding similar images from the database and hence would reduce the time required for retrieval of past similar cases.