Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479432
Sritha Bandla, Sagar Basavaraju, Nidhi Gangrade
Street Lights are absolutely important and without them, people would be risking their life every minute they spend on the roads. The main problem involved in street light hardware system is excessive consumption of power. This amount of power consumption can be minimized by designing smart street lighting systems in order to have smart cities. To enable the growth of smart cities and help them shape into self-sustaining, energy harvesting, green hubs, the energy must be conserved. To solve this problem there are many smart street lighting methods which discussed efficient ways to conserve power. To support the financial needs of some of the proposed methods, a struggling economy like India would not be able to afford the costs. However, to make it truly smart and affordable, the number of sensors involved in the street lighting system can be reduced strategically to account for driver’s visibility range as well as power consumed by the lights. The algorithm discussed in this paper, takes advantage of Cellular Automata [CA], to simulate the traffic similar to real-time traffic and utilized Bernoulli’s probability distribution to analyze the randomized the traffic present on the roads. This helped to visualize the situation as aptly as possible. According to the statistics street lights use up nearly 38% of the electricity produced. If this energy is saved using an energy saving scheme such as the one discussed in this paper, that energy can be utilized elsewhere – where there is an absolute and immediate need, for instance smart cities. According to the results obtained through the utilization of the method discussed in this paper, nearly 50 percent of the energy consumed by the existing smart street lighting systems can be saved. If the energy thus saved is transferred to the development of the smart cities, more than 100 of them can achieve full transition from an urban city into a smart city.
{"title":"Smart Street Lighting with Reduced Sensors for Sustainable and Efficient Smart Cities","authors":"Sritha Bandla, Sagar Basavaraju, Nidhi Gangrade","doi":"10.1109/ICAECC.2018.8479432","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479432","url":null,"abstract":"Street Lights are absolutely important and without them, people would be risking their life every minute they spend on the roads. The main problem involved in street light hardware system is excessive consumption of power. This amount of power consumption can be minimized by designing smart street lighting systems in order to have smart cities. To enable the growth of smart cities and help them shape into self-sustaining, energy harvesting, green hubs, the energy must be conserved. To solve this problem there are many smart street lighting methods which discussed efficient ways to conserve power. To support the financial needs of some of the proposed methods, a struggling economy like India would not be able to afford the costs. However, to make it truly smart and affordable, the number of sensors involved in the street lighting system can be reduced strategically to account for driver’s visibility range as well as power consumed by the lights. The algorithm discussed in this paper, takes advantage of Cellular Automata [CA], to simulate the traffic similar to real-time traffic and utilized Bernoulli’s probability distribution to analyze the randomized the traffic present on the roads. This helped to visualize the situation as aptly as possible. According to the statistics street lights use up nearly 38% of the electricity produced. If this energy is saved using an energy saving scheme such as the one discussed in this paper, that energy can be utilized elsewhere – where there is an absolute and immediate need, for instance smart cities. According to the results obtained through the utilization of the method discussed in this paper, nearly 50 percent of the energy consumed by the existing smart street lighting systems can be saved. If the energy thus saved is transferred to the development of the smart cities, more than 100 of them can achieve full transition from an urban city into a smart city.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"12 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126027131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479514
Poornima Mohan, S. Devi
A transmultiplexer (TMUX) is a system which allow various users to share a common channel. A TMUX system capable of handling users belonging to different communication standards is called as a multi-mode TMUX. A method for implementation of such a TMUX of variable nature using fixed minimum hardware units is presented in this paper. The hardware reduction is achieved in two ways. First is by implementing variable bandwidth filters in the filter bank of TMUX using fixed filters and the other is by representing the filter coefficients in canonic signed digit (CSD) representation. The CSD representation is obtained by rounding the maximum precision coefficients to the finite precision coefficients with a limited number of signed power of two terms.
{"title":"Low Complexity Multi-Mode Transmultiplexer","authors":"Poornima Mohan, S. Devi","doi":"10.1109/ICAECC.2018.8479514","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479514","url":null,"abstract":"A transmultiplexer (TMUX) is a system which allow various users to share a common channel. A TMUX system capable of handling users belonging to different communication standards is called as a multi-mode TMUX. A method for implementation of such a TMUX of variable nature using fixed minimum hardware units is presented in this paper. The hardware reduction is achieved in two ways. First is by implementing variable bandwidth filters in the filter bank of TMUX using fixed filters and the other is by representing the filter coefficients in canonic signed digit (CSD) representation. The CSD representation is obtained by rounding the maximum precision coefficients to the finite precision coefficients with a limited number of signed power of two terms.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133683822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479437
Suresh Kumar Balam, P. Siddaiah, S. Nallagonda
In this paper, a cooperative spectrum sensing system (CSSS) based on energy detection method and hard-decision fusion is proposed. The performance through complementary receiver operating characteristics (CROC), total error rate (TER), and throughput is analytically investigated under the influence of noise and generalized κ – μ fading. More precisely, each cognitive radio (CR) senses the PU through erroneous sensing (S) channels and reports the sensing information in the form of binary-decision obtained using energy detector (ED) to fusion center (FC) through erroneous reporting (R) channels. Next, the hard-decision is performed at FC to obtain a global decision on the status (active or inactive) of the PU. Towards that, we derive a novel-analytic expression of detection probability subject to noise and κ – μ fading is derived. The analytical frame works based on derived expression for evaluating TER and throughput performance for any network and channel conditions are developed. Further, the CSSS performance for differen network parameters such as channel error probability, time bandwidth product, signal to noise ratio (SNR), number of CRs, detection threshold under various fusion rules is investigated. Finally, an optimal detection threshold, an optimal number of CRs, and maximum throughput for several network parameters subject fusion rule are also determined.
{"title":"Throughput Analysis of Cooperative Spectrum Sensing with Hard-decision Fusion over Generalized κ – μ Fading Channel","authors":"Suresh Kumar Balam, P. Siddaiah, S. Nallagonda","doi":"10.1109/ICAECC.2018.8479437","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479437","url":null,"abstract":"In this paper, a cooperative spectrum sensing system (CSSS) based on energy detection method and hard-decision fusion is proposed. The performance through complementary receiver operating characteristics (CROC), total error rate (TER), and throughput is analytically investigated under the influence of noise and generalized κ – μ fading. More precisely, each cognitive radio (CR) senses the PU through erroneous sensing (S) channels and reports the sensing information in the form of binary-decision obtained using energy detector (ED) to fusion center (FC) through erroneous reporting (R) channels. Next, the hard-decision is performed at FC to obtain a global decision on the status (active or inactive) of the PU. Towards that, we derive a novel-analytic expression of detection probability subject to noise and κ – μ fading is derived. The analytical frame works based on derived expression for evaluating TER and throughput performance for any network and channel conditions are developed. Further, the CSSS performance for differen network parameters such as channel error probability, time bandwidth product, signal to noise ratio (SNR), number of CRs, detection threshold under various fusion rules is investigated. Finally, an optimal detection threshold, an optimal number of CRs, and maximum throughput for several network parameters subject fusion rule are also determined.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134153126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479509
Sadanand Inamdar, B. Sathish Babu, R. Yadahalli
Mobile Ad hoc Networks (MANETs) envisioned as battlefield application of wireless networks build cooperation in a multi-hop fashion between limited powered mobile nodes to prove inter-communication with one another. In self-configuring and self-organizing nature MANETs, designing adaptive protocols is a great challenge. Remarkably flexible natured bio-inspired algorithms and new design approach of cross layer interactions meet the needs of adaptability in MANET’s protocols. The adaptable protocol’s performance depends on accuracy of calculation and acquisition of network conditions. This paper proposes ant based technique to estimate the network conditions. Cross layer interactions enable optimization in end- to-end delay using network conditions like node density and traffic intensity parameters. Simulation study shows that adaptive management of protocols in MANETs has improved performance even at high data transmission rates, and for larger number of nodes.
{"title":"ACO and CLD Techniques in MANETs to Design Adaptable Protocols","authors":"Sadanand Inamdar, B. Sathish Babu, R. Yadahalli","doi":"10.1109/ICAECC.2018.8479509","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479509","url":null,"abstract":"Mobile Ad hoc Networks (MANETs) envisioned as battlefield application of wireless networks build cooperation in a multi-hop fashion between limited powered mobile nodes to prove inter-communication with one another. In self-configuring and self-organizing nature MANETs, designing adaptive protocols is a great challenge. Remarkably flexible natured bio-inspired algorithms and new design approach of cross layer interactions meet the needs of adaptability in MANET’s protocols. The adaptable protocol’s performance depends on accuracy of calculation and acquisition of network conditions. This paper proposes ant based technique to estimate the network conditions. Cross layer interactions enable optimization in end- to-end delay using network conditions like node density and traffic intensity parameters. Simulation study shows that adaptive management of protocols in MANETs has improved performance even at high data transmission rates, and for larger number of nodes.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133041217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479478
Sanu Thomas, T. Mathew
In-network data compression is achieved in a wireless sensor network using Block Truncation Coding technique. This provides data compression and the consequent energy saving. In Block Truncation Coding, binarization and fixing of quantization levels are the two major steps. By shifting the binarization pre-processing to the sensor nodes, in-network compression is realized.
{"title":"In-network Data Compression in Wireless Sensor Networks Using Distributed Block Truncation Coding","authors":"Sanu Thomas, T. Mathew","doi":"10.1109/ICAECC.2018.8479478","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479478","url":null,"abstract":"In-network data compression is achieved in a wireless sensor network using Block Truncation Coding technique. This provides data compression and the consequent energy saving. In Block Truncation Coding, binarization and fixing of quantization levels are the two major steps. By shifting the binarization pre-processing to the sensor nodes, in-network compression is realized.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479493
.. Purushotham, .. Suresh
Most of the new generation mobile phones are equipped with smart and unique features that provide a great experience in music, internet, capturing videos and many more applications. But the same experience is not achieved in voice communication when the surrounding environment is too noisy. Hence development of algorithms for processing complex voice is very much essential for speedy and correct estimation of speech signals. This skill, demand processing of voice signal digitally for feature extraction and remove the undesired noise sources. In this paper, the degraded signal is pre processed before passing through Mel-filter bank further Mel frequency Cepstral coefficients are found and feature extraction is carried out. Since the voice signals tend to have variation in temporal rate, adaptive equalization is used for feature matching techniques. The test pattern in this paper presents an improvement in speech index by a factor of 20-30%.
{"title":"Cepstral Domain Approach To Enhance Noisy Speech and Increase Intelligibility for Mobile Communication","authors":".. Purushotham, .. Suresh","doi":"10.1109/ICAECC.2018.8479493","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479493","url":null,"abstract":"Most of the new generation mobile phones are equipped with smart and unique features that provide a great experience in music, internet, capturing videos and many more applications. But the same experience is not achieved in voice communication when the surrounding environment is too noisy. Hence development of algorithms for processing complex voice is very much essential for speedy and correct estimation of speech signals. This skill, demand processing of voice signal digitally for feature extraction and remove the undesired noise sources. In this paper, the degraded signal is pre processed before passing through Mel-filter bank further Mel frequency Cepstral coefficients are found and feature extraction is carried out. Since the voice signals tend to have variation in temporal rate, adaptive equalization is used for feature matching techniques. The test pattern in this paper presents an improvement in speech index by a factor of 20-30%.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116872482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479533
H. Swathi, Suraj Joshi, M. Kiran Kumar
In contrast to the past, Automatic Teller Machines (ATMs) are widely used due to their simplicity and extensive availability. Presently, ATM systems use no more than an access card which usually has a magnetic stripe (magstripe) and a fixed Personal Identification Number (PIN) for identity verification. Some other cases utilize a chip and a PIN which sometimes has a magstripe in case the chip fails as a backup for identification purposes. This method is not very secure and prone to increase in criminal activities. The need for a novel, simple as well as secure method of access is thus imperative. In the present work, a PIN is generated by the user and this PIN is made available to the ATM system by the means of a Subscriber Identity Module(SIM) in the user’s Mobile Phone. This information is communicated to a Global System for Mobile Communications (GSM) module embedded into the ATM’s functional framework. This method of security is more stable than the traditional methods presently in use. The method presented is dynamic due to the possibility of changing the User Defined PIN(UDPIN) in each and every transaction. Losing the access card no longer becomes a big problem to the user and the need for immediate deactivation is also eliminated. It can also be enhanced by including other security features without large number of modifications. A simple prototype employing this security function has been implemented and the results are verified. The proposed system has been tested extensively and proves to be a simpler and better security measure.
{"title":"A Novel ATM Security System using a User Defined Personal Identification Number With the Aid of GSM Technology","authors":"H. Swathi, Suraj Joshi, M. Kiran Kumar","doi":"10.1109/ICAECC.2018.8479533","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479533","url":null,"abstract":"In contrast to the past, Automatic Teller Machines (ATMs) are widely used due to their simplicity and extensive availability. Presently, ATM systems use no more than an access card which usually has a magnetic stripe (magstripe) and a fixed Personal Identification Number (PIN) for identity verification. Some other cases utilize a chip and a PIN which sometimes has a magstripe in case the chip fails as a backup for identification purposes. This method is not very secure and prone to increase in criminal activities. The need for a novel, simple as well as secure method of access is thus imperative. In the present work, a PIN is generated by the user and this PIN is made available to the ATM system by the means of a Subscriber Identity Module(SIM) in the user’s Mobile Phone. This information is communicated to a Global System for Mobile Communications (GSM) module embedded into the ATM’s functional framework. This method of security is more stable than the traditional methods presently in use. The method presented is dynamic due to the possibility of changing the User Defined PIN(UDPIN) in each and every transaction. Losing the access card no longer becomes a big problem to the user and the need for immediate deactivation is also eliminated. It can also be enhanced by including other security features without large number of modifications. A simple prototype employing this security function has been implemented and the results are verified. The proposed system has been tested extensively and proves to be a simpler and better security measure.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116873524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479515
I. Pandey, Jai Deo Tiwari
Quantum dots based supercapacitors created a dramatic improvement in energy storage system. Herein, we reports a novel member of fluorescent supercapacitor has been fabricated from rhodamine b dye. In this work, Potassium ferrocyanide doped in the polymeric rhodamine b nanodots which were directly grown at the surface of graphite electrodes using cyclic voltammetry. Potassium ferrocyanide doped polymeric rhodamine b nanodots enhanced the specific conductance (320.0 F/g), and better long term cycling stability which are 2 to 3 times higher than individual polymeric rhodamine b nanodots as well as potassium ferrocyanide modified graphite electrodes. Interestingly, the electrochemical activity of the fluorescent Potassium ferrocyanide doped in the polymeric rhodamine b nanodots could be easily monitored by photoluminescence as well as voltammetric methods. These unique features of proposed hybrid fluorescent nanodots makes it smart nanomaterial to enhance the performance of supercapacitors. This organicinorganic composite nanodots material based electrode shows a promising future for energy storage with high energy density, high power density and excellent cycle life.
{"title":"Electrochemically Grown Potassium Ferrocyanide Doped Conducting Polymeric Rhodamine b Nanodots Modified Graphite Based Fluorescence Supercapacitors","authors":"I. Pandey, Jai Deo Tiwari","doi":"10.1109/ICAECC.2018.8479515","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479515","url":null,"abstract":"Quantum dots based supercapacitors created a dramatic improvement in energy storage system. Herein, we reports a novel member of fluorescent supercapacitor has been fabricated from rhodamine b dye. In this work, Potassium ferrocyanide doped in the polymeric rhodamine b nanodots which were directly grown at the surface of graphite electrodes using cyclic voltammetry. Potassium ferrocyanide doped polymeric rhodamine b nanodots enhanced the specific conductance (320.0 F/g), and better long term cycling stability which are 2 to 3 times higher than individual polymeric rhodamine b nanodots as well as potassium ferrocyanide modified graphite electrodes. Interestingly, the electrochemical activity of the fluorescent Potassium ferrocyanide doped in the polymeric rhodamine b nanodots could be easily monitored by photoluminescence as well as voltammetric methods. These unique features of proposed hybrid fluorescent nanodots makes it smart nanomaterial to enhance the performance of supercapacitors. This organicinorganic composite nanodots material based electrode shows a promising future for energy storage with high energy density, high power density and excellent cycle life.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124728116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479466
H B Sharanabasaveshwara, Santosh M. Herur
The compressive sampling technique is an emerging sampling technique that reconstructs a sparse signal at sub-Nyquist rate. One of the concerns in compression sensing is design of sensing matrix. While random sensing matrix are widely in use, they have many disadvantages. In this paper a novel Deterministic Random Sensing Matrix is designed and tested on image of size 256 × 256. The result shows 24% improvement in reconstruction time over Random Sensing Matrix. Since the matrix is deterministic the storage requirement is less than the Random Sensing Matrix.
{"title":"Designing of Sensing Matrix for Compressive Sensing and Reconstruction","authors":"H B Sharanabasaveshwara, Santosh M. Herur","doi":"10.1109/ICAECC.2018.8479466","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479466","url":null,"abstract":"The compressive sampling technique is an emerging sampling technique that reconstructs a sparse signal at sub-Nyquist rate. One of the concerns in compression sensing is design of sensing matrix. While random sensing matrix are widely in use, they have many disadvantages. In this paper a novel Deterministic Random Sensing Matrix is designed and tested on image of size 256 × 256. The result shows 24% improvement in reconstruction time over Random Sensing Matrix. Since the matrix is deterministic the storage requirement is less than the Random Sensing Matrix.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICAECC.2018.8479458
Renuka Patnaik, M. Chandran, Seung-Cheol Lee, Anurag Gupta, Chansoo Kim, Chansoo Kim
Essential or primary hypertension is one of the major diseases affecting health in most societies. Hypertension can be controlled if its propensity can be forecasted for an individual, allowing necessary changes to be made in life-style. In this paper, we have used the data of subjects who had no prior history of hypertension for 2 or more consecutive years and applied various classifiers to predict occurrence of essential hypertension. For experimentation, we have used medical check-up data of Korean population between 2002-2013 and achieved 80% accuracy.
{"title":"Predicting the occurrence of essential hypertension using annual health records","authors":"Renuka Patnaik, M. Chandran, Seung-Cheol Lee, Anurag Gupta, Chansoo Kim, Chansoo Kim","doi":"10.1109/ICAECC.2018.8479458","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479458","url":null,"abstract":"Essential or primary hypertension is one of the major diseases affecting health in most societies. Hypertension can be controlled if its propensity can be forecasted for an individual, allowing necessary changes to be made in life-style. In this paper, we have used the data of subjects who had no prior history of hypertension for 2 or more consecutive years and applied various classifiers to predict occurrence of essential hypertension. For experimentation, we have used medical check-up data of Korean population between 2002-2013 and achieved 80% accuracy.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128237014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}