Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034118
Snehal B. Akhade, V. Deshmukh, S. Deosarkar
Optic disc (OD) is an important part of the eye. In developing systems, automatic OD detection is an important step for automated diagnosis of various serious ophthalmic diseases like Diabetic retinopathy, Glaucoma and hypertension, etc. The variation of intensity within the OD and intensities close to the OD boundary are the major hurdle in automated OD detection. General edge detection algorithms are frequently unsuccessful to segment the OD because of this. Complexity increases due to the presence of blood vessels. This paper presents a simple method for OD segmentation by using techniques like Principal Component Analysis (PCA), Mathematical Morphology and Circular Hough Transform. PCA used for good presentation of the input image and mathematical morphology is used to remove blood vessels from the image. Circular Hough Transform is used for boundary segmentation.
{"title":"Automatic optic disc detection in digital fundus images using image processing techniques","authors":"Snehal B. Akhade, V. Deshmukh, S. Deosarkar","doi":"10.1109/ICICES.2014.7034118","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034118","url":null,"abstract":"Optic disc (OD) is an important part of the eye. In developing systems, automatic OD detection is an important step for automated diagnosis of various serious ophthalmic diseases like Diabetic retinopathy, Glaucoma and hypertension, etc. The variation of intensity within the OD and intensities close to the OD boundary are the major hurdle in automated OD detection. General edge detection algorithms are frequently unsuccessful to segment the OD because of this. Complexity increases due to the presence of blood vessels. This paper presents a simple method for OD segmentation by using techniques like Principal Component Analysis (PCA), Mathematical Morphology and Circular Hough Transform. PCA used for good presentation of the input image and mathematical morphology is used to remove blood vessels from the image. Circular Hough Transform is used for boundary segmentation.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"133 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76289992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033746
S. Selvi, K. Satheesh
Interface intend issues relevant to this project which embrace the assimilation of media, annotation, use of descriptions, standards, accomplish the purpose of the multimedia system. Envisage a video in multimedia milieu with authoring is, serene a prickly way. In this dissertation we present a twofold of action, at initial arena annotate a video with text depiction and sketch generation using Sobel Edge Detection Algorithm. This approach is used to engender sketches using sobel operator which discover the spiky intensity variation of an image and it attain the edges of the objects enclosed on the image and then we found similiarity between sketch and original image. At the instant phase we recommend a scene structured graph to authorize a video.
{"title":"Envisage and authoring a video with sketch and text gloss SSG","authors":"S. Selvi, K. Satheesh","doi":"10.1109/ICICES.2014.7033746","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033746","url":null,"abstract":"Interface intend issues relevant to this project which embrace the assimilation of media, annotation, use of descriptions, standards, accomplish the purpose of the multimedia system. Envisage a video in multimedia milieu with authoring is, serene a prickly way. In this dissertation we present a twofold of action, at initial arena annotate a video with text depiction and sketch generation using Sobel Edge Detection Algorithm. This approach is used to engender sketches using sobel operator which discover the spiky intensity variation of an image and it attain the edges of the objects enclosed on the image and then we found similiarity between sketch and original image. At the instant phase we recommend a scene structured graph to authorize a video.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75737612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033862
V. Atchaya, R. Vanitha
An efficient Optimal Centroid-based Actionable 3D Subspace Clustering from continuous valued 3D data which is suitable for real world problems like discovery of profitable stocks, biologically significant protein residues etc. lt achieves actionability(ability to suggest profitable or beneficial actions to users), incorporation of domain knowledge which allows users to choose the preferred utility function, parameter insensitivity and excellent performance through a set of centroids generetaed by Single Pass Seed Selection and by the combination of singular value decomposition, numerical optimization and 3D closed frequent item set mining.
{"title":"An Optimal centroid based actionable 3D subspace clustering","authors":"V. Atchaya, R. Vanitha","doi":"10.1109/ICICES.2014.7033862","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033862","url":null,"abstract":"An efficient Optimal Centroid-based Actionable 3D Subspace Clustering from continuous valued 3D data which is suitable for real world problems like discovery of profitable stocks, biologically significant protein residues etc. lt achieves actionability(ability to suggest profitable or beneficial actions to users), incorporation of domain knowledge which allows users to choose the preferred utility function, parameter insensitivity and excellent performance through a set of centroids generetaed by Single Pass Seed Selection and by the combination of singular value decomposition, numerical optimization and 3D closed frequent item set mining.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"15 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74765026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033946
Hussain Ahmed Choudhury, M. Saikia
In video processing there is a huge demand of video compression. The basic of video compression requires a technique known as motion estimation (ME). There are many algorithms to find the motion estimation of current block in reference frame. In this paper we have proposed an algorithm of Block Matching for motion estimation named as Reduced Three Steps Logarithmic Search (RTSLS) which is computationally more efficient than many of the existing techniques. Simulation result shows that it performs better than that of Three Steps Search (TSS), New Three Step Search (NTSS) and reduces the checking points by almost 50% than that of TSS.
{"title":"Reduced three steps logarithmic search for motion estimation","authors":"Hussain Ahmed Choudhury, M. Saikia","doi":"10.1109/ICICES.2014.7033946","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033946","url":null,"abstract":"In video processing there is a huge demand of video compression. The basic of video compression requires a technique known as motion estimation (ME). There are many algorithms to find the motion estimation of current block in reference frame. In this paper we have proposed an algorithm of Block Matching for motion estimation named as Reduced Three Steps Logarithmic Search (RTSLS) which is computationally more efficient than many of the existing techniques. Simulation result shows that it performs better than that of Three Steps Search (TSS), New Three Step Search (NTSS) and reduces the checking points by almost 50% than that of TSS.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"16 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73191788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033935
M. Deiva Ragavi, S. Usharani
Twitter is a user-friendly social network which deserves its real-time nature. With the help of an algorithm, the investigation can be made with regard to some of the real-time events such as earthquake. The target event is assumed and classified based on the keywords, number of words and their context. The probabilistic spatiotemporal model is provided which can find the Centre of the event location. The Twitter users are regarded as sensors and apply particle filter, mainly used for detecting the location. Because of the numerous earthquakes and the large number of Twitter users throughout the country, we can detect an earthquake with high probability merely by monitoring tweets. Our system detects earthquakes promptly and notification much faster than JMA (Japan Meteorological Agency) broadcast announcements.
{"title":"Social data analysis for predicting next event","authors":"M. Deiva Ragavi, S. Usharani","doi":"10.1109/ICICES.2014.7033935","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033935","url":null,"abstract":"Twitter is a user-friendly social network which deserves its real-time nature. With the help of an algorithm, the investigation can be made with regard to some of the real-time events such as earthquake. The target event is assumed and classified based on the keywords, number of words and their context. The probabilistic spatiotemporal model is provided which can find the Centre of the event location. The Twitter users are regarded as sensors and apply particle filter, mainly used for detecting the location. Because of the numerous earthquakes and the large number of Twitter users throughout the country, we can detect an earthquake with high probability merely by monitoring tweets. Our system detects earthquakes promptly and notification much faster than JMA (Japan Meteorological Agency) broadcast announcements.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"46 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73280051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033951
D. Dhivyalakshmi, K. Kalaivani, V. Tamilarasi, P. Bhavani
In our proposed model we implement Rate Auditing Tool (RAT) to monitor each and every rating manipulation. It checks whether the time logged in and logged out matches the stipulated time for viewing any videos or messages and giving appropriate rating. It monitors either the video provided is fully or atleast partly viewed thus accordingly their ratings given. It also checks whether the login in network which is providing rating is either from same location or its location varies each and every time from vast geographical location. It also checks whether from same ip address multiple logins giving ratings continuously. Thus by doing this the attacker is also detected and given counter measure to their attacks.
{"title":"Ascertaining security in online reputation systems using Rate Auditing Tool (RAT)","authors":"D. Dhivyalakshmi, K. Kalaivani, V. Tamilarasi, P. Bhavani","doi":"10.1109/ICICES.2014.7033951","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033951","url":null,"abstract":"In our proposed model we implement Rate Auditing Tool (RAT) to monitor each and every rating manipulation. It checks whether the time logged in and logged out matches the stipulated time for viewing any videos or messages and giving appropriate rating. It monitors either the video provided is fully or atleast partly viewed thus accordingly their ratings given. It also checks whether the login in network which is providing rating is either from same location or its location varies each and every time from vast geographical location. It also checks whether from same ip address multiple logins giving ratings continuously. Thus by doing this the attacker is also detected and given counter measure to their attacks.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"13 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74254843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034098
V. Sivakumar, M. Malathi
This work evaluates the performance of Neuromorphic architecture for accessing Static Random Access Memory (SRAM) in an asynchronous manner. Spike-Timing Dependent Plasticity (STDP) learning algorithm for updating the synaptic weights values in the SRAM module. Input, output, and synaptic weight values are transmitted to/from the chip using a common communication protocol based on the Address Event Representation (AER). Memory array an important block in digital system. Bassically SRAM is used for increasing speed of the processor. Which is mostly connected between the DRAM and microprocessor. SRAM serves as cache memory which stores the information and losses its data without power. We may design the SRAM using 4T, 6T, 8T....for storing one bit. Sense amplifier is used to perform read and write operation. Instead of using sense amplifier we use the neural network concept. Synapse is connected between the SRAM and neuron. The minute gap across which nerve impulses pass from one neurone to the next, at the end of a nerve fiber. Each neurone has an enlarged portion the cell body, containing the nucleus; from the body extend several process through which impulses enter from their branches. A longer process, the nerve fiber, extends outwards and carries impulse away from the cell body. This is normally unbranched except at the nerve ending. This consumes less power than the normal memory circuit.
{"title":"Programmable synaptic memory with spiking neural network in VLSI","authors":"V. Sivakumar, M. Malathi","doi":"10.1109/ICICES.2014.7034098","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034098","url":null,"abstract":"This work evaluates the performance of Neuromorphic architecture for accessing Static Random Access Memory (SRAM) in an asynchronous manner. Spike-Timing Dependent Plasticity (STDP) learning algorithm for updating the synaptic weights values in the SRAM module. Input, output, and synaptic weight values are transmitted to/from the chip using a common communication protocol based on the Address Event Representation (AER). Memory array an important block in digital system. Bassically SRAM is used for increasing speed of the processor. Which is mostly connected between the DRAM and microprocessor. SRAM serves as cache memory which stores the information and losses its data without power. We may design the SRAM using 4T, 6T, 8T....for storing one bit. Sense amplifier is used to perform read and write operation. Instead of using sense amplifier we use the neural network concept. Synapse is connected between the SRAM and neuron. The minute gap across which nerve impulses pass from one neurone to the next, at the end of a nerve fiber. Each neurone has an enlarged portion the cell body, containing the nucleus; from the body extend several process through which impulses enter from their branches. A longer process, the nerve fiber, extends outwards and carries impulse away from the cell body. This is normally unbranched except at the nerve ending. This consumes less power than the normal memory circuit.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"99 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74564193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033989
V. Agilandeswari, J. Anuja, Elizabeth Dona George, R. Prasath
The main purpose of this paper is to identify the damaged cloth which may contain defective yarns, colour bleeding, and pores that may be mingled with the good cloth materials at areas such as textile fabric industries, garments, and weaving factories. Automated defect detection for fabrics based on filters is proposed to manage the problem of human visual inspection. The monitoring process is done by a web camera, to capture the details of the cloth. A pre-trained Gabor wavelet network is used to extract the important texture features in the textile fabric. In this defect detection, few specific filters are used to process each frames of the cloth which is being captured by the web camera.
{"title":"Fabric quality testing using image processing","authors":"V. Agilandeswari, J. Anuja, Elizabeth Dona George, R. Prasath","doi":"10.1109/ICICES.2014.7033989","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033989","url":null,"abstract":"The main purpose of this paper is to identify the damaged cloth which may contain defective yarns, colour bleeding, and pores that may be mingled with the good cloth materials at areas such as textile fabric industries, garments, and weaving factories. Automated defect detection for fabrics based on filters is proposed to manage the problem of human visual inspection. The monitoring process is done by a web camera, to capture the details of the cloth. A pre-trained Gabor wavelet network is used to extract the important texture features in the textile fabric. In this defect detection, few specific filters are used to process each frames of the cloth which is being captured by the web camera.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"69 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72655225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033769
Krunal K Patel, K. S. Sendhil Kumar, Navneet Singh, Kushang Parikh, N. Jaisankar
The Cloud Computing is a next generation platform, which provides virtualization with resource pool. There are three types of cloud service models, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This research paper proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.
{"title":"Data security and privacy using data partition and centric key management in cloud","authors":"Krunal K Patel, K. S. Sendhil Kumar, Navneet Singh, Kushang Parikh, N. Jaisankar","doi":"10.1109/ICICES.2014.7033769","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033769","url":null,"abstract":"The Cloud Computing is a next generation platform, which provides virtualization with resource pool. There are three types of cloud service models, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This research paper proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73400930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033952
D. S. D. Hepsiba, S. Prabhu
The intermittent connectivity between nodes to transfer data is exploited using Disruption tolerant networks (DTNs). DTNs are susceptible to flood attacks which limit the network resources. Various methods were used to defend these attacks based on distributed schemes with certain difficulties to count the packets or duplicates sent by a node. This is due to lack of communication infrastructure. Two limits are used to mitigate packet flood and replica flood attacks, respectively. Violation of both the limits can be easily noticed by claim-carry-and-check. The inconsistency check against full claims is trivial. This is designed to work in a distributed system. Moreover, it allows tolerating a little amount of attackers for collision. Proposed algorithm is learning automata. It uses the feedback mechanism. The feedback from the previous nodes is collected and thereby reduces the limitation for the successor nodes. The goal is to detect the attacker by approximate counting and discard the flooded packets.
{"title":"Enhanced techniques to strengthening DTN against flood attacks","authors":"D. S. D. Hepsiba, S. Prabhu","doi":"10.1109/ICICES.2014.7033952","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033952","url":null,"abstract":"The intermittent connectivity between nodes to transfer data is exploited using Disruption tolerant networks (DTNs). DTNs are susceptible to flood attacks which limit the network resources. Various methods were used to defend these attacks based on distributed schemes with certain difficulties to count the packets or duplicates sent by a node. This is due to lack of communication infrastructure. Two limits are used to mitigate packet flood and replica flood attacks, respectively. Violation of both the limits can be easily noticed by claim-carry-and-check. The inconsistency check against full claims is trivial. This is designed to work in a distributed system. Moreover, it allows tolerating a little amount of attackers for collision. Proposed algorithm is learning automata. It uses the feedback mechanism. The feedback from the previous nodes is collected and thereby reduces the limitation for the successor nodes. The goal is to detect the attacker by approximate counting and discard the flooded packets.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"92 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79429241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}