Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00057
Akhilesh Kumar Singh, Shantanu Mittal, P. Malhotra, Yash Srivastava
Cereals grains have been used as a principle ingredient of human diet for hundreds of years. Indian cereal crops provide vital nutrients and energy to the human diet. The motivation behind this research paper is to distribute the research discoveries of applying K-Means clustering, on a cereal dataset and to differentiate the outcomes found on the number of bunches to identify whether the ideal or best number of groups to be 3 or 5. This speculation is achieved by applying distinctive clustering tests (likewise reordered in the paper), and visualizations. The aforementioned resolution by doing exploratory analysis, at that point modeled fitting followed by result testing, driving us to a definite end. The language utilized for our exploration is R.
{"title":"Clustering Evaluation by Davies-Bouldin Index(DBI) in Cereal data using K-Means","authors":"Akhilesh Kumar Singh, Shantanu Mittal, P. Malhotra, Yash Srivastava","doi":"10.1109/ICCMC48092.2020.ICCMC-00057","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00057","url":null,"abstract":"Cereals grains have been used as a principle ingredient of human diet for hundreds of years. Indian cereal crops provide vital nutrients and energy to the human diet. The motivation behind this research paper is to distribute the research discoveries of applying K-Means clustering, on a cereal dataset and to differentiate the outcomes found on the number of bunches to identify whether the ideal or best number of groups to be 3 or 5. This speculation is achieved by applying distinctive clustering tests (likewise reordered in the paper), and visualizations. The aforementioned resolution by doing exploratory analysis, at that point modeled fitting followed by result testing, driving us to a definite end. The language utilized for our exploration is R.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126552238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00044
Shinde Swapnil, V. Girish
A human brain contains number of tissues that relate to achieving proper functioning of brain. Meanwhile, any abnormal growth in these tissues may change the functioning and this is generally referred as brain tumor. Brain tumor is mainly of two types low grade or benign (Grade 1 and Grade 2) and high grade or malignant (Grade 3 and Grade 4). Brain tumor can be detected with MRI images by applying image processing steps and some machine learning algorithms. Brain MRI images undergo processing by using different techniques such as image enhancement, clustering and classification for detecting the level of brain tumor. The study shows that the filtering operations, edge detection algorithms, morphological operations and clustering are some of the important steps employed for detecting the various levels of brain tumor. This paper mainly focuses on preparing the comparison review on the basis of the referenced proposed methodology, feature extraction and classification methods with its results, future scope along with the advantages and disadvantages of the research done by different professionals and compiling it into one paper. This helps to provide scope for future research directions in brain tumor classification.
{"title":"Image Mining Methodology for Detection of Brain Tumor: A Review","authors":"Shinde Swapnil, V. Girish","doi":"10.1109/ICCMC48092.2020.ICCMC-00044","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00044","url":null,"abstract":"A human brain contains number of tissues that relate to achieving proper functioning of brain. Meanwhile, any abnormal growth in these tissues may change the functioning and this is generally referred as brain tumor. Brain tumor is mainly of two types low grade or benign (Grade 1 and Grade 2) and high grade or malignant (Grade 3 and Grade 4). Brain tumor can be detected with MRI images by applying image processing steps and some machine learning algorithms. Brain MRI images undergo processing by using different techniques such as image enhancement, clustering and classification for detecting the level of brain tumor. The study shows that the filtering operations, edge detection algorithms, morphological operations and clustering are some of the important steps employed for detecting the various levels of brain tumor. This paper mainly focuses on preparing the comparison review on the basis of the referenced proposed methodology, feature extraction and classification methods with its results, future scope along with the advantages and disadvantages of the research done by different professionals and compiling it into one paper. This helps to provide scope for future research directions in brain tumor classification.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126818230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000156
D. Suresha, N. Jagadisha, H. Shrisha, K. Kaushik
Brain tumor is an accumulation of anomalous tissue in the brain. Tumors are primarily classified into malignant and benign when they develop. It can be life threatening hence it is important to recognize and identify the presence of tumors in brain image. This paper proposes a system to decide whether the brain has tumor or is it tumor-free from the MR image using combined technique of K-Means and support vector machine. In the first stage the input image is converted to grey scale using binary thresholding and the spots are detected. The recognized spots are represented in terms of their intensities to distinguish between the normal and tumor brain. The set of feature extracted are later characterized by using K-Means algorithm, then the tumor recognition is done using support vector machine.
{"title":"Detection of Brain Tumor Using Image Processing","authors":"D. Suresha, N. Jagadisha, H. Shrisha, K. Kaushik","doi":"10.1109/ICCMC48092.2020.ICCMC-000156","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000156","url":null,"abstract":"Brain tumor is an accumulation of anomalous tissue in the brain. Tumors are primarily classified into malignant and benign when they develop. It can be life threatening hence it is important to recognize and identify the presence of tumors in brain image. This paper proposes a system to decide whether the brain has tumor or is it tumor-free from the MR image using combined technique of K-Means and support vector machine. In the first stage the input image is converted to grey scale using binary thresholding and the spots are detected. The recognized spots are represented in terms of their intensities to distinguish between the normal and tumor brain. The set of feature extracted are later characterized by using K-Means algorithm, then the tumor recognition is done using support vector machine.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122697071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00031
Shivani Patel, S. Degadwala, A. Mahajan
leukemia region unit ordered likewise whichever myelogenous (also called myeloid) or white platelet contingent upon that sorts for the influenced white platelets region unit. Leukemia happens when that bone marrow produces adolescent white cells, Furthermore leukemia happen when the marrow produces full grown phones. Intense lymphocytic leukemia (ALL) might additionally make a structure of cancellous around that those bone marrow makes excessively awful huge numbers adolescent lymphocytes (a sensibly white blood cell). Threatening Growth ailment might potentially might want an impact looking into RBC, WBC, and platelets. Every last bit is the greater part commonplace clinched alongside childhood, with a top frequency at 2–5 a considerable length of time outdated and in turn top over adulthood. The arranged approach is assessed around 3public picture databases for totally completely different aspects. The further execution measures: accuracy, specificity, and affectability. Division will furthermore order about intense lymphocytic leukemia that is frequently completed by utilizing “manage taking in” methodology.
{"title":"A Review on Acute Lymphoblastic Leukemia Classification Based on Hybrid Low Level Features","authors":"Shivani Patel, S. Degadwala, A. Mahajan","doi":"10.1109/ICCMC48092.2020.ICCMC-00031","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00031","url":null,"abstract":"leukemia region unit ordered likewise whichever myelogenous (also called myeloid) or white platelet contingent upon that sorts for the influenced white platelets region unit. Leukemia happens when that bone marrow produces adolescent white cells, Furthermore leukemia happen when the marrow produces full grown phones. Intense lymphocytic leukemia (ALL) might additionally make a structure of cancellous around that those bone marrow makes excessively awful huge numbers adolescent lymphocytes (a sensibly white blood cell). Threatening Growth ailment might potentially might want an impact looking into RBC, WBC, and platelets. Every last bit is the greater part commonplace clinched alongside childhood, with a top frequency at 2–5 a considerable length of time outdated and in turn top over adulthood. The arranged approach is assessed around 3public picture databases for totally completely different aspects. The further execution measures: accuracy, specificity, and affectability. Division will furthermore order about intense lymphocytic leukemia that is frequently completed by utilizing “manage taking in” methodology.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123037861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00046
Sudeepthi Komatineni, Gowtham Lingala
Building a secure voting system that offers privacy of conventional voting system with proper voter authentication & transparency has been a challenge for a due course of time. The research work proposes a secured and robust electronic voting system based on popular machine learning based facial recognition algorithms and biometric authentication methodologies for the purpose of building a secure voting system. In particular, it focuses on the potential working of face detection and recognition and bio-metric authentication namely bio-metric scan, and the implementation procedure, which improves the security and decreases the duplicate vote and fraudulent to make the system as more efficient and user friendly in nature.
{"title":"Secured E-voting System Using Two-factor Biometric Authentication","authors":"Sudeepthi Komatineni, Gowtham Lingala","doi":"10.1109/ICCMC48092.2020.ICCMC-00046","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00046","url":null,"abstract":"Building a secure voting system that offers privacy of conventional voting system with proper voter authentication & transparency has been a challenge for a due course of time. The research work proposes a secured and robust electronic voting system based on popular machine learning based facial recognition algorithms and biometric authentication methodologies for the purpose of building a secure voting system. In particular, it focuses on the potential working of face detection and recognition and bio-metric authentication namely bio-metric scan, and the implementation procedure, which improves the security and decreases the duplicate vote and fraudulent to make the system as more efficient and user friendly in nature.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"495 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127584441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000131
M. T. Banday, Shafiya Afzal Sheikh
The resistance to attacks aimed to break CAPTCHA challenges and the effectiveness, efficiency and satisfaction of human users in solving them called usability are the two major concerns while designing CAPTCHA schemes. User-friendliness, universality, and accessibility are related dimensions of usability, which must also be addressed adequately. With recent advances in segmentation and optical character recognition techniques, complex distortions, degradations and transformations are added to text-based CAPTCHA challenges resulting in their reduced usability. The extent of these deformations can be decreased if some additional security mechanism is incorporated in such challenges. This paper proposes an additional security mechanism that can add an extra layer of protection to any text-based CAPTCHA challenge, making it more challenging for bots and scripts that might be used to attack websites and web applications. It proposes the use of hidden text-boxes for user entry of CAPTCHA string which serves as honeypots for bots and automated scripts. The honeypot technique is used to trick bots and automated scripts into filling up input fields which legitimate human users cannot fill in. The paper reports implementation of honeypot technique and results of tests carried out over three months during which form submissions were logged for analysis. The results demonstrated great effectiveness of honeypots technique to improve security control and usability of text-based CAPTCHA challenges.
{"title":"Improving Security Control of Text-Based CAPTCHA Challenges using Honeypot and Timestamping","authors":"M. T. Banday, Shafiya Afzal Sheikh","doi":"10.1109/ICCMC48092.2020.ICCMC-000131","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000131","url":null,"abstract":"The resistance to attacks aimed to break CAPTCHA challenges and the effectiveness, efficiency and satisfaction of human users in solving them called usability are the two major concerns while designing CAPTCHA schemes. User-friendliness, universality, and accessibility are related dimensions of usability, which must also be addressed adequately. With recent advances in segmentation and optical character recognition techniques, complex distortions, degradations and transformations are added to text-based CAPTCHA challenges resulting in their reduced usability. The extent of these deformations can be decreased if some additional security mechanism is incorporated in such challenges. This paper proposes an additional security mechanism that can add an extra layer of protection to any text-based CAPTCHA challenge, making it more challenging for bots and scripts that might be used to attack websites and web applications. It proposes the use of hidden text-boxes for user entry of CAPTCHA string which serves as honeypots for bots and automated scripts. The honeypot technique is used to trick bots and automated scripts into filling up input fields which legitimate human users cannot fill in. The paper reports implementation of honeypot technique and results of tests carried out over three months during which form submissions were logged for analysis. The results demonstrated great effectiveness of honeypots technique to improve security control and usability of text-based CAPTCHA challenges.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00037
P. Kaur
A fist size muscle occupies an important in the human body by supplying oxygen to all the body organs. According to study of demography from WHO (World Health organization), the main cause of increasing death rate is due to the cardiac failure of human being. The main challenge for data analysis is to predict and prevent the heart disease. Machine learning has been developed to perform impressive predictions and make appropriate decision from abundant data originated by healthcare centres. In this paper numerous machine learning techniques are surveyed by using the knowledge collected from preprocessing data (clinical knowledge), which comprises many medical features to perform heart disease detection. The comparative study states that the prediction of heart disease has been improved by combining various machine learning algorithms to perform early disease investigation in a cost effective manner. The proposed research work primarily focuses on preparing a review of the research done by different professionals and compiling it into one paper and creating a direction for future research in this domain. In this paper many techniques are surveyed where best predictions are performed for heart disease.
{"title":"A Study on Role of Machine Learning in Detectin Heart Diseas.","authors":"P. Kaur","doi":"10.1109/ICCMC48092.2020.ICCMC-00037","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00037","url":null,"abstract":"A fist size muscle occupies an important in the human body by supplying oxygen to all the body organs. According to study of demography from WHO (World Health organization), the main cause of increasing death rate is due to the cardiac failure of human being. The main challenge for data analysis is to predict and prevent the heart disease. Machine learning has been developed to perform impressive predictions and make appropriate decision from abundant data originated by healthcare centres. In this paper numerous machine learning techniques are surveyed by using the knowledge collected from preprocessing data (clinical knowledge), which comprises many medical features to perform heart disease detection. The comparative study states that the prediction of heart disease has been improved by combining various machine learning algorithms to perform early disease investigation in a cost effective manner. The proposed research work primarily focuses on preparing a review of the research done by different professionals and compiling it into one paper and creating a direction for future research in this domain. In this paper many techniques are surveyed where best predictions are performed for heart disease.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133996321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00086
Vidhi Gupta, R. Asthana
The wavelength division multiplexed (WDM) networks can be efficiently protected with high speed using preconfigured protection cycles (p-cycles). p-Cycles can be introduced in any network with or without wavelength converters. As wavelength converters are costlier devices, fully equipping the networks with wavelength converters make it highly expensive. Thus we have compared the spare capacity, in terms of route km of fiber length required, for providing p-cycle protection by placing wavelength converters at some node positions. We have also introduced optimum position for placement of converters at high traversing (HT) nodes. By placing converters at these nodes the required spare capacity is least among all the cases studied.
{"title":"Study of Wavelength Converter Placement in p(pre-configured)-Cycle Protection","authors":"Vidhi Gupta, R. Asthana","doi":"10.1109/ICCMC48092.2020.ICCMC-00086","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00086","url":null,"abstract":"The wavelength division multiplexed (WDM) networks can be efficiently protected with high speed using preconfigured protection cycles (p-cycles). p-Cycles can be introduced in any network with or without wavelength converters. As wavelength converters are costlier devices, fully equipping the networks with wavelength converters make it highly expensive. Thus we have compared the spare capacity, in terms of route km of fiber length required, for providing p-cycle protection by placing wavelength converters at some node positions. We have also introduced optimum position for placement of converters at high traversing (HT) nodes. By placing converters at these nodes the required spare capacity is least among all the cases studied.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132132673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-0003
Aathira M, G. Jeyakumar
The Differential Evolution (DE) algorithm, under the family of Evolutionary Algorithms (EAs), is one of the powerful algorithms used for solving continuous parameter optimization challenges. The simplistic nature and robustness of the classical DE algorithm have drawn researchers’ attention towards its progressive enhancement. This work reports on an investigation of the behavioral changes of the classical DE algorithm, evoked when its mutation and crossover components are fine tuned for enhancement of DE’s performance. The scope of this study covers the implementation of a mutation level enhancement and a crossover level enhancement, followed by their integration. The mutation and the crossover components are augmented by incorporation of Centroid DE and Superior-Superior & Superior-Inferior DE logics, respectively. The algorithms appraised in this inquiry were classical DE, Centroid based DE(cDE), Superior-Superior based DE (ssDE), Superior-Inferior DE (siDE), Centroid Superior-Superior DE (cssDE) and Centroid Superior-Inferior DE (csiDE). These algorithms were evaluated by comparison of the values of their mean objective function (MOV), and their speed, at solving the global optimization problems in a simple benchmarking function suite with 4 functions of different categories. The study concludes that the DE algorithm shows enhancement performance with modified mutation and crossover components. However, with a trend for inconsistency for varying values of its control parameters and benchmarking problems.
差分进化算法(DE)是进化算法家族中的一种,是解决连续参数优化问题的强大算法之一。经典DE算法的简单性和鲁棒性引起了研究人员对其逐步增强的关注。这项工作报告了经典DE算法的行为变化的研究,当它的突变和交叉成分被微调以提高DE的性能时,会引起行为变化。本研究的范围涵盖了突变水平增强和交叉水平增强的实施,随后是它们的整合。通过引入质心DE和Superior-Superior & superior -劣DE逻辑分别增强了突变分量和交叉分量。本研究评价的算法有经典DE、基于质心的DE(cDE)、基于优-优的DE(ssDE)、优-劣DE(siDE)、质心优-劣DE(cssDE)和质心优-劣DE(csiDE)。通过比较这些算法的平均目标函数(MOV)值,以及它们在一个包含4个不同类别函数的简单基准函数套件中解决全局优化问题的速度,对这些算法进行了评估。研究表明,改进变异和交叉分量后,DE算法具有较好的增强性能。然而,随着其控制参数值的变化而出现不一致的趋势和基准测试问题。
{"title":"Performance Enhancement of Mutation and Crossover Components by using Differential Evolution Algorithm","authors":"Aathira M, G. Jeyakumar","doi":"10.1109/ICCMC48092.2020.ICCMC-0003","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-0003","url":null,"abstract":"The Differential Evolution (DE) algorithm, under the family of Evolutionary Algorithms (EAs), is one of the powerful algorithms used for solving continuous parameter optimization challenges. The simplistic nature and robustness of the classical DE algorithm have drawn researchers’ attention towards its progressive enhancement. This work reports on an investigation of the behavioral changes of the classical DE algorithm, evoked when its mutation and crossover components are fine tuned for enhancement of DE’s performance. The scope of this study covers the implementation of a mutation level enhancement and a crossover level enhancement, followed by their integration. The mutation and the crossover components are augmented by incorporation of Centroid DE and Superior-Superior & Superior-Inferior DE logics, respectively. The algorithms appraised in this inquiry were classical DE, Centroid based DE(cDE), Superior-Superior based DE (ssDE), Superior-Inferior DE (siDE), Centroid Superior-Superior DE (cssDE) and Centroid Superior-Inferior DE (csiDE). These algorithms were evaluated by comparison of the values of their mean objective function (MOV), and their speed, at solving the global optimization problems in a simple benchmarking function suite with 4 functions of different categories. The study concludes that the DE algorithm shows enhancement performance with modified mutation and crossover components. However, with a trend for inconsistency for varying values of its control parameters and benchmarking problems.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000184
C. Z. Basha, M. Reddy, K. Nikhil, P. M. Venkatesh, A. Asish
Rapidly creative innovations are emerging day by day in various fields, particularly in restorative condition. Bone fracture is one of the most common human problem and happens when the high pressure is applied to the bones, or simply because of accidents. High precision diagnosis of bone fracture is an important feature in the medical profession. Owing to fewer physicians, remotely based hospitals cannot have any of the equipment to diagnose fractures. X-ray scans are used to assess the fractures. These X-rays are one of the less expensive techniques for identification of fractures. Harris corner based detection algorithm is proposed to extract features from the image and the extracted features from this algorithm can identify edges, fractures and corners present in the image.300 different X-ray images are collected from Osmania hospital, Hyderabad. Proposed method gives an accuracy of 92% which is better in recognizing fracture compared to the existing methods.
{"title":"Enhanced Computer Aided Bone Fracture Detection Employing X-Ray Images by Harris Corner Technique","authors":"C. Z. Basha, M. Reddy, K. Nikhil, P. M. Venkatesh, A. Asish","doi":"10.1109/ICCMC48092.2020.ICCMC-000184","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000184","url":null,"abstract":"Rapidly creative innovations are emerging day by day in various fields, particularly in restorative condition. Bone fracture is one of the most common human problem and happens when the high pressure is applied to the bones, or simply because of accidents. High precision diagnosis of bone fracture is an important feature in the medical profession. Owing to fewer physicians, remotely based hospitals cannot have any of the equipment to diagnose fractures. X-ray scans are used to assess the fractures. These X-rays are one of the less expensive techniques for identification of fractures. Harris corner based detection algorithm is proposed to extract features from the image and the extracted features from this algorithm can identify edges, fractures and corners present in the image.300 different X-ray images are collected from Osmania hospital, Hyderabad. Proposed method gives an accuracy of 92% which is better in recognizing fracture compared to the existing methods.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}