Volume-2 (International Conference on RECENT TRENDS IN ENGINEERING AND MANAGEMENT)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | SSD BASED LOCATION IDENTIFICATION USING FINGERPRINT BASED APPROACH |
Country | : | India |
Authors | : | Mr. M. Dinesh babu, Mr.V.Tamizhazhagan, Dr. R. Saminathan |
Abstract: Fingerprint-based methods are widely adopted for indoor localization purpose because of their cost-effectiveness compared to other infrastructure-based positioning systems. However, the popular location fingerprint, Received Signal Strength (RSS), is observed to differ significantly across different devices' hardware even under the same wireless conditions. We derive analytically a robust location fingerprint definition, the Signal Strength Difference (SSD), and verify its performance experimentally using a number of different mobile devices with heterogeneous hardware. Our experiments have also considered both Wi-Fi and Bluetooth devices, as well as both Access-Point (AP)-based localization and Mobile-Node (MN)-assisted localization. Also compare these SSD-based localization algorithms' performance against that of two other approaches in the literature that are designed to mitigate the effects of mobile node hardware variations, and show that SSD-based algorithms have better accuracy. To justify this we make a data transfer between the nodes using the SSD-based and it proves the accuracy.
[1]. P. Tao, A. Rudy's, A.M. Ladd, and D.S. Wallach, Wireless LAN Location-Sensing for Security Applications, Proc. Second ACM Workshop Wireless security, Wise 03, pp. 11-20, Sept. 2003.
[2]. M.B.Kjaergaard, Indoor Location Fingerprinting with Heterogeneous Clients, Pervasive and Mobile Computing, vol. 7, no. 1, pp. 31-43, Feb. 2011.
[3]. C.-T. Huang, C.-H.Wu, Y.-N. Lee and J.-T. Chen, A Novel Indoor RSS-Based Position Location Algorithm Using Factor Graphs, IEEE Trans. Wireless Comm., vol.8, no. 6, pp. 3050- 3058, June 2009.
[4]. M.B. Kjærgaard and C.V. Mink, Hyperbolic Location Fingerprinting: A Calibration-free Solution for Handling Differences in Signal Strength, Proc. IEEE Sixth Ann. Int'l Conf. Pervasive computing and Comm. (PerCom '08), Mar. 2008.
[5]. M. Hossain, W.S. Soh, A Comprehensive Study of Bluetooth Signal Parameters for Localization, Proc. IEEE 18th Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC), Sept. 2007.
[6]. M.B.Kjærgaard, Automatic Mitigation of Sensor Variations for Signal Strength Based Location Systems, Proc.Second Int'l Workshop Location and Context Awareness, Mar.2006.
[7]. K. Yedavalli, B. Krishnamachari, S. Ravula, and B. Srinivasan, Ecolocation: A Sequence Based Technique for RF Localization in Wireless Sensor Networks, Proc.Fourth Int'l Symp. Information Processing in Sensor Networks
[8]. (ISPN '05), Apr. 2005.
[9]. A. Haeberlen, E. Flannery, A.M. Ladd, A. Rudy's, D.S. Wallach, and L.E. Kavraki, Practical Robust Localization over Large-Scale 802.11 Wireless Networks, Proc. ACM MobiCom, pp. 70-84, 2004
[10]. R. Battiti, M. Brunato, and A. Villani, Statistical Learning Theory for Location Fingerprinting in Wireless LANs, Technical Report DIT-02-0086, Universita di Trento, Dipartimento di Informatica e Telecomunicazioni, Oct. 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | COMPARISON OF CLASSIFICATION TECHNIQUES FOR PAP SMEAR DIAGNOSIS |
Country | : | India |
Authors | : | P. Soorya praba, R.Priya |
Abstract:The Classification for Pap smear Diagnosis aims at classifying the Pap smear cells whether it is affected or not. The term "Pap-Smear" refers to samples of human cells stained by the so-called Papanicolaou method. The Papanicolaou method is a medical procedure to detect pre-cancerous cells in the uterine cervix. The median filter is used to remove the noises in the cell, and then the features are extracted using gray level co-occurrence matrix technique. k-NN classifier, Baye's classifier and ANN classifiers are used for the classification problem.. The classified cells are normal and abnormal.
Keywords:- Bayesian classifier, Genetic Algorithms, Nearest Neighbor based Classifiers, Neural Network, Pap-Smear Classification.
[1]. Aha D.W. and Bankert R.L., 1996, "A Comparative evaluation of sequential feature selection algorithms". In Artificial Intelligence and Statistics, Fisher D. and Lenx J.-H. (Eds.), Springer-Verlag, New York.
[2]. Al-Ani A., 2005a, "Feature subset selection using ant colony optimization". International Journal of Computational Intelligence, 2(1), pp. 53-58.
[3]. Al-Ani A., 2005b, "Ant colony optimization for feature subset selection". Transactions on Engineering, Computing and Technology, 4, pp. 35-38.
[4]. Byriel, J., 1999, "Neuro-fuzzy classification of cells in cervical smears". Master's Thesis, Technical University of Denmark: Oersted-DTU, Automation.
[5]. Cantu-Paz E., 2004, "Feature subset selection, class separability, and genetic algorithms". Genetic and Evolutionary Computation Conference, pp. 959-970.
[6]. Cantu-Paz E., Newsam S. and Kamath C., 2004, "Feature selection in scientific application". Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 788-793.
[7]. Dorigo M. and Stützle T., 2004, Ant Colony Optimization. A Bradford Book, The MIT Press Cambridge, Massachusetts, London, England.
[8]. Duda R.O. and Hart P. E., 1973, Pattern Classification and Scene Analysis. John Wiley and Sons, New York,.
[9]. Goldberg, D. E., 1989. Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley Publishing Company, INC, Massachussets.
[10]. Holland, J. H., 1975, Adaptation in Natural and Artificial Systems, University of Michigan Press, Ann Arbor, MI.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Intelligent boundary alert system using GPS |
Country | : | India |
Authors | : | C. Sheeba thangapushpam |
Abstract: The Tamil Nadu factor in India-Sri Lanka relations that had been quiet for long has come to the fore in the form of the fishermen issue. Frequent incidents of fishermen from Tamil Nadu getting shot in the Sri Lankan's maritime boundary have enraged all citizen of the state. From Tamil Nadu about 18,000 boats of different kinds conduct fishing along the India - Sri Lanka maritime border. Ever since violence broke out in Sri Lanka two decades ago, fishing activity has not been peaceful. Tamil Nadu fishermen are arrested, or shot, by the Sri Lankan Navy. In this problem will be solved by using An Intelligent Boundary Alert System (IBAS).An IBAS system induces the new methodology for saving the fishermen valuable life and their properties from the Sri Lankan's navy. The main objective of this system is used to help the fishermen to navigate inside our maritime country border.
Keywords - GPS, ARM7, WSN
[1] Keisha Wu, Lin Go, Lionel M. Ni, Zhanjiang Lou and Zhongwen Goo(2012) "Ship Detection with Wireless Sensor Networks" IEEE Trans. Vol. 23 No.7.
[2] Abid khan and Ravi Mishra (2012) , "GPS – GSM Based Tracking System" International Journal of Engineering Trends and Technology Volume3Issue2.
[3] Mohammad A. Al-Khedher and Al-Balqa (2011)," Hybrid GPS-GSM Localization of Automobile Tracking System"- International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6.
[4] Francis Enejo Idachaba (2011) , " Design of a gps/gsm based tracker for the location of stolen items and kidnapped or missing persons in nigeria"-ARPN Journal Of Engineering And Applied Sciences Vol. 6, No. 10.
[5] Kunal Maurya 1, Mandeep Singh 2, Neelu Jain 3 (2011) "Real Time Vehicle Tracking System using GSM and GPS Technology- An Anti-theft Tracking system" International Journal of Electronics and Computer Science Engineering ISSN., 2277-1956/V1N3-1103-1107
[6] M. Li, Y Liu and Z. Yang, (2007) "Sea Depth Measurement with Restricted Floating Sensors," Proc. IEEE 28th Int'l Real-Time Systems Symp. (RTSS '07), pp. 469-478.
[7] L. Gu et al., (2005) "Lightweight Detection and Classification for Wireless Sensor Networks
[8] Mohammad A. Al – Khedher, Montaser N. Ramadan and Sharaf A. Al – Kheder (2012), "Intelligent Anti-Theft and Tracking System for Automobiles"International Journal of Machine Learning and Computing, Vol. 2, No. 1
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Content Based Medical Image Retrieval System (CBMIRS) Using Patch Based Representation |
Country | : | India |
Authors | : | S.Malar Selvi and Mrs.C.Kavitha |
Abstract: This research work is to develop an efficient and powerful medical search engine to classify and search the radiographic medical images. It focuses on bag of visual words image representation and a similarity matching technique to represent match and retrieve the similar images. This work addresses the issues in content based image retrieval for medical images. In this system can handles different categories of medical images in organ level and the pathology level for chest X-ray images. This simple, efficient medical image categorization and retrieval system in large radiographic archives (IRMA database) is developed for a medicine physicians and researchers those who are interested in being able to retrieve medical images based on low level features. This would make these systems more helpful for radiologists in medical settings, researches in medical analysis and medical students as well as teachers in academic healthcare environments. The methodology presented is based on local patch representation of the image content using a bag of visual words approach with a kernel based SVM classifier. The system supports the classification of X-ray images and retrieval of similar medical images for given input query image.
Key terms: CBIR, IRMA, Picture archiving and Communication System, Bag of Visual Words, Computer Aided Diagnosis, Chest Radiography, image Patches.
[1] David G. Lowe (2004),"Distinctive Image Features from Scale-Invariant Key points", International Journal of Computer Vision, pp.125-137.
[2] H and Pinhas .A.T(2007), "Medical Image Categorization and Retrieval For PACS Using The GMM-KL framework", IEEE Trans. Inf. Technol. Biomed. vol. 11, Issue no. 2, pp. 190–202.
[3] Jialu Liu (2013), "Image Retrieval based on Bag-of-Words model", arXiv: 1304.5168 v1[cs.IR], pp. 1-10.
[4] Lehmann.T.M, Guld.M.O,Thies.C, Fischer.B, Spitzer.K, Keysers.B, Ney.H, ohnen.H, Schubert and Wein.B (2004)," Content Based Image Retrieval In Medical Applications", Methods Inf Med, 43(4):pp. 354-361.
[5] Mahalakshmi.S and Mr.Raghuraman.G (2012)," Medical Image Categorization and Retrieval System In Radiology Using Bag of Visual Words Framework", AJCST Vol.1, No. 1, pp.149-156.
[6] Mohammad Reza Zare and Ahmed Mueen (2013)," Automatic Classification of Medical X-Ray Images Using A Bag of Visual Words", IET Comput.Vis.,Vol. 7, Issue no. 2, pp. 105-114.
[7] Mohammad Reza Zare (2013)," Automatic Classification of Medical X-Ray Images", Malaysian Journal of Computer Science., Vol. 26(1), pp.9-22.
[8] Mohammad Reza Zare and Ahmed Mueen (2013), "Automatic Classification of Medical X-Ray Images: Hybrid Generative - Discriminative Approach", IET Image Process., Vol. 7, Issue no. 5, pp. 523–532.
[9] Pavani.S, Shivani , T.Venkat Narayana Rao and Deva Shekar (2013),"Similarity Analysis of Images Using Content Based Image Retrieval System", International Journal Of Engineering And Computer Science ISSN:2319-7242, Vol. 2, Issue no.1,pp. 251-258.
[10] Uri Avni, Hayit Greenspan, Eli Konen, Michal Sharon, and Jacob Goldberger (2011),"X-Ray Categorization and Retrieval on The Organ and Pathology Level, Using Patch-Based Visual Words", IEEE transactions on medical imaging, Vol. 30, Issue no. 3, pp. 733-745.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Visual Words for Human Activity Recognition in Surveillance Video |
Country | : | India |
Authors | : | S.Kiruthiga, M.Kalaiselvi Geetha, J.Arunnehru |
Abstract: Recognition and classification of human actions for the purpose of safety from video sequences is always a challenging problem because of the variations in its environment, different backgrounds used in videos, appearance of actors and their clothing, so in our work we propose a method for constructing effective and appropriate codebooks for action categorization. In the formation of codebook fuzzy C-means clustering algorithm and Pairwise Nearest Neighbor algorithm (PNN), is used and hence the performance of these methods are compared and analyzed on Weizmann dataset.
Keywords - Video Surveillance, Action Recognition, Bag of Visual Words (BoVW), frame differencing, feature extraction, Vector Quantization, fuzzy C-means clustering, Pairwise Nearest Neighbor (PNN),codewords, codebook.
[1] E. Shabaninia ,and Sh. Kasaei ," Codebook appearance representation for vehicle handover across disjoint-view multicameras", Scientia Iranica, Transactions D: Computer Science & Engineering ,Elsevier,(2011).
[2] Olli Virmajoki and Pasi Franti," Fast pairwise nearest neighbor based algorithm for multilevel thresholding", Journal of Electronic Imaging 12(4), 648–659 (October 2003).
[3] Makhalova Elena," Fuzzy C - Means Clustering In Matlab", The 7th International Days of Statistics and Economics, Prague, September 19-21, 2013.
[4] Lamberto Ballan, Lorenzo Seidenari, Giuseppe Serra, Marco Bertini and AlbertoDel Bimbo," Recognizing Human Actions by using Effective Codebooks and Tracking", IEEE Transactions on Multimedia [4],2013.
[5] Pasi Fränti, Timo Kaukoranta, Day-Fann Shen, and Kuo-Shu Chang ," Fast and Memory Efficient Implementation of the Exact PNN" IEEE Transactions On Image Processing, Vol. 9, No. 5, May 2000.
[6] Lingqiao Liu, Lei Wang, and Chunhua Shen, "A Generalized Probabilistic Framework for Compact Codebook Creation ", IEEE Conf.Comp.Vis.Pattern Recogn.2011.
[7] M. S. Ryoo, "Human Activity Prediction: Early Recognition of Ongoing Activities from Streaming Videos", IEEE International Conference on Computer Vision(ICCV),Nov 2011.
[8] Liu Yang Rong Jin, Rahul Sukthankar,and Frederic Jurie," "Unifying Discriminative Visual Codebook Generation with Classifier Training for Object Category Recognition" IJCV(International Journal of Computer Vision),2008.
[9] Yang Wang, Student Member IEEE, and Greg Mori, Member IEEE, "Human Action Recognition by Semi-Latent Topic Models", IEEE Transactions on Pattern Analysis and Machine Intelligence,2012.
[10] Mingyuan Jiu Christian Wolf , Christophe Garcia ,and Atilla Baskurt, "Supervised Learning and Codebook Optimization for Bag-of-Words Models", Springer Science+ business Media,LLC ,2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Computer- Aided Fracture Detection Of X-Ray Images |
Country | : | India |
Authors | : | R.Aishwariya, M.Kalaiselvi Geetha, M.Archana |
Abstract: The usage of medical images has been increasing tremendously due to a collection of thousands of medical images every day in medical institutions. Due to the increase in medical images there is a rising need of managing the data properly and accessing it accurately. Finding the correct boundary in noisy images is still a difficult task. It introduces a new edge following technique for boundary detection in noisy images. Use of the proposed technique demonstrates its application to diverse cases of medical images. The proposed technique can detect the boundaries of objects in noisy images using the information the fracture detection on the x-ray images is founded. The proposed technique for the canny edge detector in the x-ray image locates the edges and using the boundary detection, the system which detect the fracture automatically. The boundary detection techniques also implemented in the models are Active Contour Model, Geodesic Active Contour Model and compare the accuracy of detecting is analyzed and tested by using Mat lab 2013 version.
Keywords:- Boundary extraction, Edge vector field model, Edge mapping model, Edge following technique.
[1]. Tamisiea D.F. Radiologic aspects of orthopedic diseases, Mercier LR, ed. Practical Orthopedics, 6th ed. Philadelphia, Pa: Mosby Elsevier; Chap 16, 2008 .
[2]. Huertas and G. Medioni, "Detection of intensity changes with sub-pixel accuracy using Laplacian-Gaussianmasks" IEEE Transactionson Pattern Analysis and Machine Intelligence. PAMI-8(5):651-664, 1986.
[3]. H. Voorhees and T. Poggio," Detecting textons and texture boundaries in natural images" ICCV 87:250-25,1987.
[4]. E. Argyle. "Techniques for edge detection," Proc. IEEE, vol. 59, pp. 285-286, 1971.
[5]. J. R. Parker, Algorithms for Image Processing and Computer Vision. New York: Wiley, 1997.
[6]. R. C. Gonzalez and R. E. Woods, Digital Image Processing. Reading, MA: Addison-Wesley .
[7]. J. M. S. Prewitt, "Object enhancement and. extraction," in Picture Processing and Psychopictorics. B. S. Lipkin and A. Rosenfeld, Eds., NewYork: Academic Press, pp. 75–149, 1970.
[8]. G. S. Robinson, "Edge detection by compass gradient masks," Comput.Graph. Image Process., vol. 6, no. 5, pp. 492–501, Oct. 1970.
[9]. E. Argyle, "Techniques for edge detection," Proc. IEEE, vol. 59, no. 2,pp. 285–287, Feb. 1971.
[10]. J. F. Canny, "A computational approach to edge detection," IEEE Trans. Pattern Anal. Mach. Intell., vol. PAMI-8, no. 6, pp. 679–698, Nov. 1986.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | EMOSPARK-A Revolution in Human Emotion Through Artificial Intelligence |
Country | : | India |
Authors | : | Deepika.S, MadhuMidha.S, BanuMathi.I, PriyaDharsini.G |
Abstract: For as long as we've been imagining emotionally intelligent machines, we have pictured something at least mildly resembling human form. From George Lucas' C-3PO, to the recently-developed Robokind Zeno R25, our vision for robotic companionship has typically involved two arms and two legs. Taking a different approach is inventor of the Emo Spark console Patrick Levy Rosenthal, who aims to bring artificial intelligence to consumers in the form of a cube small enough to fit in the palm of your hand. Emo Spark is an Android powered Wi-Fi/Bluetooth cube that allows users to create and interact with an emotionally concise intelligence through conversation, music, and visual media. Emo Spark will take not only gaming, but also your TV, smart phone or computer to an entirely different level from anything ever experienced before. media. Over time, the cube creates a customized Emotional Profile Graph (EPG) which collects and measures a unique emotional input from the user. The EPG allows the cube to virtually "feel" senses such as pleasure and pain; and "expresses" those desires according to the user. The future of AI interactions is here. Emo Spark is a brand new innovation from Emo Shape, Ltd. that allows you to transfer your real life emotions and desires directly onto a digital platform using state of the art AI measurements and technology. The digital world will never be the same again. This is the world's first "Emotional Intelligence" device and its capabilities and benefits are unlimited. The Emo Spark uses emotion text and content analysis to measure the emotional responses of several people all at the same time.
Keywords:- Android powered Wi-Fi/Bluetooth cube, Artificial Intelligence, Emotional Profile Graph, Haywire, Webee Automation.
[1] http://photos.prnewswire.com/prnh/20140106/PH40168-b
[2] www.emospark.com
[3] www.emoshape.com.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | AFS: Privacy-Preserving Public Auditing With Data Freshness in the Cloud |
Country | : | India |
Authors | : | P. Maheswari, B. Sindhumathi |
Abstract: In Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services. The integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these existing mechanisms will supports public auditing on shared data stored in the cloud that exploit ring signature to compute verification metadata needed to audit the correctness of shared data.so that a third party auditor (TPA) is able to verify the integrity of shared data for users without retrieving the entire data. Meanwhile, the identity of the signer on each block inshared data is kept private from the TPAalso able to perform multiple auditing tasks simultaneously instead of verifying them one byone.In this paper, we proved the data freshness(proved the cloud possesses the latest version of shared data)while still preserving identity privacy.Our experimental result ensures that retrieved data always reflects the most recent updates and prevents rollback attacks.
Index terms - AFS (Authenticated File System); data freshness; public auditing; shared dat
[1] B. Wang, B. Li, and H. Li, ―Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,‖ in Proceedings of IEEE Cloud 2012, 2012, pp. 295–302.
[2] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, ―A View of Cloud Computing,‖ Communications of the ACM, vol. 53, no. 4, pp. 50–58, April 2010.
[3] K. Ren, C. Wang, and Q. Wang, ―Security challenges for the Public Cloud,‖ IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012.
[4] D. Song, E. Shi, I. Fischer, and U. Shankar, ―Cloud Data Protection for the Masses,‖ IEEE Computer, vol. 45, no. 1, pp. 39–45, 2012.
[5] C. Wang, Q. Wang, K. Ren, and W. Lou, ―Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,‖ in Proceedings of IEEE INFOCOM 2010, 2010, pp. 525–533.
[6] B. Wang, M. Li, S. S. Chow, and H. Li, ―Computing Encrypted Cloud Data Efficiently under Multiple Keys,‖ in Proc. of CNSSPCC' 13, 2013, pp. pp.90–99.
[7] R. Rivest, A. Shamir, and L. Adleman, ―A Method for Obtaining Digital Signatures and Public Key Cryptosystems,‖ vol. 21, no. 2, pp. 120–126, 1978.
[8] The MD5 Message-Digest Algorithm (RFC1321). [Online].Available: https://tools.ietf.org/html/rfc1321
[9] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable Data Possession at Untrusted Stores,‖ in Proceedings of ACM CCS'07, 2007, pp. 598–610.
[10] H. Shacham and B. Waters, ―Compact Proofs of Retrievability,‖ in Proceedings of ASIACRYPT'08. Springer-Verlag,2008,pp.90–107.