Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122167
V. Musale, D. Chaudhari
In this era, the web usage mining plays one of the important role in analyzing and improving performance of web applications. Initially in this paper, the concept of web usage mining has been introduced along with Improved AprioriAll algorithm which is the base algorithm for the proposed tool along with its limitation. The improved approach is discussed which integrates sequential pattern mining with graph theory. In the next part, design of web usage mining tool with improved approach is discussed. Implementation details of the tool are discussed along with the results. The last part covers how the raw result from the proposed tool can be further visualized and analyzed using new technologies like D3.js and Neo4j. The future scope of the proposed tool is mentioned at the end of the paper.
{"title":"Web usage mining tool by integrating sequential pattern mining with graph theory","authors":"V. Musale, D. Chaudhari","doi":"10.1109/ICISIM.2017.8122167","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122167","url":null,"abstract":"In this era, the web usage mining plays one of the important role in analyzing and improving performance of web applications. Initially in this paper, the concept of web usage mining has been introduced along with Improved AprioriAll algorithm which is the base algorithm for the proposed tool along with its limitation. The improved approach is discussed which integrates sequential pattern mining with graph theory. In the next part, design of web usage mining tool with improved approach is discussed. Implementation details of the tool are discussed along with the results. The last part covers how the raw result from the proposed tool can be further visualized and analyzed using new technologies like D3.js and Neo4j. The future scope of the proposed tool is mentioned at the end of the paper.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127867677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122185
M. Pund, S. Athawale
The rapid growth of WLAN over past few years has increased immensely in academia as well as in every industry, but many weaknesses are there in ad hoc network, due to this many attackers are really passionate towards authorization. For the authentication defense mechanism and wireless monitoring has become a vital component of computer security to predict and prevent attacks. In this paper, we explain the practical intrusion prevention system which measures threat and take decision. Inline IPS and Passive IDS Model, we presented road map of next generation intrusion prevention system which satisfies need for future computing. At the end, we presented experimental results on the basis of real data setup which confirms the investigation on the basis of IP, MAC, SK.
{"title":"NGIPS: The road map of next generation intrusion prevention system for wireless LAN","authors":"M. Pund, S. Athawale","doi":"10.1109/ICISIM.2017.8122185","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122185","url":null,"abstract":"The rapid growth of WLAN over past few years has increased immensely in academia as well as in every industry, but many weaknesses are there in ad hoc network, due to this many attackers are really passionate towards authorization. For the authentication defense mechanism and wireless monitoring has become a vital component of computer security to predict and prevent attacks. In this paper, we explain the practical intrusion prevention system which measures threat and take decision. Inline IPS and Passive IDS Model, we presented road map of next generation intrusion prevention system which satisfies need for future computing. At the end, we presented experimental results on the basis of real data setup which confirms the investigation on the basis of IP, MAC, SK.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123467376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122171
Gandhi Priya Prashant, S. M. Jagdale
Image is a visual representation of object, or a scene which can be seen by human eyes. Image can be created and stored in electronic form. Image is a two dimensional function f(x, y) where, x and y are spatial co-ordinates and amplitude of images is defined in intensity level of each pixel. Image fusion means merging relevant information from different images to create one new image which is more informative. Field programmable Gate Array (FPGA) is most widespread technology with special features like low power consumption, real time application. FPGA is used to implement Image Fusion (IF).
{"title":"Information fusion for images on FPGA: Pixel level with pseudo color","authors":"Gandhi Priya Prashant, S. M. Jagdale","doi":"10.1109/ICISIM.2017.8122171","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122171","url":null,"abstract":"Image is a visual representation of object, or a scene which can be seen by human eyes. Image can be created and stored in electronic form. Image is a two dimensional function f(x, y) where, x and y are spatial co-ordinates and amplitude of images is defined in intensity level of each pixel. Image fusion means merging relevant information from different images to create one new image which is more informative. Field programmable Gate Array (FPGA) is most widespread technology with special features like low power consumption, real time application. FPGA is used to implement Image Fusion (IF).","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122151
A. More, Dipti P Rana
In this current age, numerous ranges of real word applications with imbalanced dataset is one of the foremost focal point of researcher's inattention. There is the enormous increment of data generation and imbalance within dataset. Processing and knowledge extraction of huge amount of imbalanced data becomes a challenge related with space and time necessities. Generally there is a list of an assortment of factual humanity applications which deals with unequal data sample division in to number of classes. Due to this division of data either of class goes into majority or minority with comparably less data count. This outnumbering of data sample in either of one class directs towards the handling of minority class and target on remarkable reduction in error rate. The standard learning methods do not directly focus on this type of classes. Random Forest Classification (RFC) is an ensemble approach that utilizes a number of classifiers to work together in order to identify the class label for unlabeled instances. This approach has proved its high accuracy and superiority with imbalanced datasets. This classifier provides various techniques to resolve class imbalance problem. This paper summarizes, the literature survey from 2000 to 2016 of various techniques related to RFC to resolve class imbalance. Specifically Weighted Random Forest (WRF), Balanced Random Forest (BRF), Sampling (Under Sampling (US)) and Down Sampling (DS), Cost Sensitive Methods have been adapted more to till date. The limitation of this numerous literature is researchers can focus on dynamic integration techniques to resolve class imbalance and increase robustness and versatility of classification.
{"title":"Review of random forest classification techniques to resolve data imbalance","authors":"A. More, Dipti P Rana","doi":"10.1109/ICISIM.2017.8122151","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122151","url":null,"abstract":"In this current age, numerous ranges of real word applications with imbalanced dataset is one of the foremost focal point of researcher's inattention. There is the enormous increment of data generation and imbalance within dataset. Processing and knowledge extraction of huge amount of imbalanced data becomes a challenge related with space and time necessities. Generally there is a list of an assortment of factual humanity applications which deals with unequal data sample division in to number of classes. Due to this division of data either of class goes into majority or minority with comparably less data count. This outnumbering of data sample in either of one class directs towards the handling of minority class and target on remarkable reduction in error rate. The standard learning methods do not directly focus on this type of classes. Random Forest Classification (RFC) is an ensemble approach that utilizes a number of classifiers to work together in order to identify the class label for unlabeled instances. This approach has proved its high accuracy and superiority with imbalanced datasets. This classifier provides various techniques to resolve class imbalance problem. This paper summarizes, the literature survey from 2000 to 2016 of various techniques related to RFC to resolve class imbalance. Specifically Weighted Random Forest (WRF), Balanced Random Forest (BRF), Sampling (Under Sampling (US)) and Down Sampling (DS), Cost Sensitive Methods have been adapted more to till date. The limitation of this numerous literature is researchers can focus on dynamic integration techniques to resolve class imbalance and increase robustness and versatility of classification.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122173
S. Powar, S. Shinde
Twitter is well known website famous for micro blogging where millions of users exchanging their opinions and thoughts. The tweets users are sharing has a error sum nature. The information available in tweets is insufficient. Because of character limitation tweets are short in nature many applications like Information Retrieval has problems in information retrieval. Here we are proposing a batch processing framework for tweet fragmentation called TweetSeg. TweetSeg combines information from Confined context with information from Universal context for achieving better results for Named Entity identification. Tweeter is used largely so we want to find public sentiment of tweet by segmenting the tweet into fragments where each fragment can be a named entity, we can find meaningful information from the part and analyzing the sentiments expressed in the tweets by using these fragments in Hadoop framework.
{"title":"Named entity recognition and tweet sentiment derived from tweet segmentation using hadoop","authors":"S. Powar, S. Shinde","doi":"10.1109/ICISIM.2017.8122173","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122173","url":null,"abstract":"Twitter is well known website famous for micro blogging where millions of users exchanging their opinions and thoughts. The tweets users are sharing has a error sum nature. The information available in tweets is insufficient. Because of character limitation tweets are short in nature many applications like Information Retrieval has problems in information retrieval. Here we are proposing a batch processing framework for tweet fragmentation called TweetSeg. TweetSeg combines information from Confined context with information from Universal context for achieving better results for Named Entity identification. Tweeter is used largely so we want to find public sentiment of tweet by segmenting the tweet into fragments where each fragment can be a named entity, we can find meaningful information from the part and analyzing the sentiments expressed in the tweets by using these fragments in Hadoop framework.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122174
J. S. Rauthan, K S Vaisla
These days each data moves toward becoming hard-ware and put away as Databases, which thusly may encase most levered private, monetary, and administration truths. As the information have important resources for the clients, it additionally most extreme foreseen to the mean adversaries and in this way, to secure in inconsistency of every single potential adversary activities is basic. These days the most recent provoke development in the convenience and engaging quality of cloud offices, various private and business and administration measurements are currently put away to the Cloud. Because of the capacity this various information which incorporate private and touchy information over cloud, the protection and security of those sort of information turn into a basic issue. For saving and giving classification of client's delicate information over cloud administrations and getting to productively and in secure way, a few techniques have been offered to understand these situations. For giving the defensive information classification while defensive secrecy and achievement of a run of the mill usual of SQL inquiries in a well-organized technique another approach CryptDB was proposed. CryptDB gives off an impression of being hands-on contrasted with different endeavors at taking care of the issue of putting away the information in distributed storage in encoded frame, that is the reason even the database director can't see the information and again the preparing of information is as scrambled, so center assailant additionally can't distinguish the information amid handling. So, this paper, exhibits a cryptographically examination of the CryptDB demonstrate. For that we first, describe the model CryptDB in supplementary fine focuses for solace of comprehension lastly, we highlighted the confinements of CryptDB concerning security and viability perspectives.
{"title":"Scrambled database with encrypted query processing: CryptDB a computational analysis","authors":"J. S. Rauthan, K S Vaisla","doi":"10.1109/ICISIM.2017.8122174","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122174","url":null,"abstract":"These days each data moves toward becoming hard-ware and put away as Databases, which thusly may encase most levered private, monetary, and administration truths. As the information have important resources for the clients, it additionally most extreme foreseen to the mean adversaries and in this way, to secure in inconsistency of every single potential adversary activities is basic. These days the most recent provoke development in the convenience and engaging quality of cloud offices, various private and business and administration measurements are currently put away to the Cloud. Because of the capacity this various information which incorporate private and touchy information over cloud, the protection and security of those sort of information turn into a basic issue. For saving and giving classification of client's delicate information over cloud administrations and getting to productively and in secure way, a few techniques have been offered to understand these situations. For giving the defensive information classification while defensive secrecy and achievement of a run of the mill usual of SQL inquiries in a well-organized technique another approach CryptDB was proposed. CryptDB gives off an impression of being hands-on contrasted with different endeavors at taking care of the issue of putting away the information in distributed storage in encoded frame, that is the reason even the database director can't see the information and again the preparing of information is as scrambled, so center assailant additionally can't distinguish the information amid handling. So, this paper, exhibits a cryptographically examination of the CryptDB demonstrate. For that we first, describe the model CryptDB in supplementary fine focuses for solace of comprehension lastly, we highlighted the confinements of CryptDB concerning security and viability perspectives.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122184
Jaydeepsinh Sarvaiya, M. Chudasama
DG penetration is continuously increased across distribution network not only to reduce carbon emission, but also to enhanced performance of the distribution network. In a restructured environment any distribution utility need to address DG placement and sizing problem to find a cost effective solution for the specific investment. Most of the authors have attempted to solve the problem based on real power loss reduction across the network. Some authors consider voltage stability based analysis for increased loadability of network with real power loss. However, optimal reactive power compensation also need to be incorporated for a cost effective solution. In this paper an attempt has been made to address various types of DG and RPC units citing and sizing problem with multi-objectives consists real power loss reduction, voltage stability improvement. A new approaches includes development of cost function to find cost-effective solution for distribution network. Evolutionary based Genetic Algorithm used to optimize objective function. Proposed algorithm is tested on IEEE-33 bus radial distribution system.
{"title":"Multi objective DG and RPC planning of radial type distribution network considering economic ViewPoints","authors":"Jaydeepsinh Sarvaiya, M. Chudasama","doi":"10.1109/ICISIM.2017.8122184","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122184","url":null,"abstract":"DG penetration is continuously increased across distribution network not only to reduce carbon emission, but also to enhanced performance of the distribution network. In a restructured environment any distribution utility need to address DG placement and sizing problem to find a cost effective solution for the specific investment. Most of the authors have attempted to solve the problem based on real power loss reduction across the network. Some authors consider voltage stability based analysis for increased loadability of network with real power loss. However, optimal reactive power compensation also need to be incorporated for a cost effective solution. In this paper an attempt has been made to address various types of DG and RPC units citing and sizing problem with multi-objectives consists real power loss reduction, voltage stability improvement. A new approaches includes development of cost function to find cost-effective solution for distribution network. Evolutionary based Genetic Algorithm used to optimize objective function. Proposed algorithm is tested on IEEE-33 bus radial distribution system.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121963947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122196
Neha R. Ghate, K. Kale
The Smart domestic protection monitoring gadget has been designed developed, examined and validated. It makes use of the RF (radio frequency) generation to monitor the reputation and security of the electrical device. The gadget has been used to store energy. The clever home is a complex era, on the equal time it is growing, the era that used in this research are Global System for virtual cellular verbal exchange (GSM), Frequency Hopping Method and PIC18F452 Microcontroller. The One Time Password (OTP) concept of clever houses offers reliable, efficient and safe surroundings for occupants. An OTP is applied as the communication tool among the hardware and the software. A GUI is developed and configured which permits the characteristic of generated OTP provider. The auto generated OTP is delivered to the house owners and if he tries to break security then OTP session time out will expire. We can outline Frequency Hopping as a communication scheme among a transmitter and a receiver. Frequency Hopping is the mechanism where in the machine adjustments the frequency (uplink and downlink) at some stage in transmission at normal periods. It allows the RF channel used for signaling channel (SDCCH) time slot or traffic channel (TCH) time slots, to trade frequency each TDMA frame (four.615 ms). The frequency is modified on an in line with burst basis, because of this that all the bits in a burst are transmitted on the equal frequency.
{"title":"Smart home safety device using frequency hopping approach based on GSM generation","authors":"Neha R. Ghate, K. Kale","doi":"10.1109/ICISIM.2017.8122196","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122196","url":null,"abstract":"The Smart domestic protection monitoring gadget has been designed developed, examined and validated. It makes use of the RF (radio frequency) generation to monitor the reputation and security of the electrical device. The gadget has been used to store energy. The clever home is a complex era, on the equal time it is growing, the era that used in this research are Global System for virtual cellular verbal exchange (GSM), Frequency Hopping Method and PIC18F452 Microcontroller. The One Time Password (OTP) concept of clever houses offers reliable, efficient and safe surroundings for occupants. An OTP is applied as the communication tool among the hardware and the software. A GUI is developed and configured which permits the characteristic of generated OTP provider. The auto generated OTP is delivered to the house owners and if he tries to break security then OTP session time out will expire. We can outline Frequency Hopping as a communication scheme among a transmitter and a receiver. Frequency Hopping is the mechanism where in the machine adjustments the frequency (uplink and downlink) at some stage in transmission at normal periods. It allows the RF channel used for signaling channel (SDCCH) time slot or traffic channel (TCH) time slots, to trade frequency each TDMA frame (four.615 ms). The frequency is modified on an in line with burst basis, because of this that all the bits in a burst are transmitted on the equal frequency.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125999775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122180
M. Bharati, S. Tamane
Cloud computing is an attention grabbing service model as a result of it reduces investment as its prices are in guide corresponding to use and request. Due to economic and technical edges it offers, Cloud computing has recently obtained major acceptance. However, as a result of the conveyed nature of distributed computing situations, its significant asset total, wide client get to, conservative and customized sharing of assets change gatecrashers to utilize cloud for his or her benefit. Crucial applications are getting additional associated with the web for cost-effectiveness and quantifiable causes; however this leaves them receptive attack. Most systems these days don't seem to be designed in contact up subtle attacks; an attacker who is ready to compromise one machine usually gains the facility to require down the complete system. To fight intruders, variety of security solution for cloud situations executes Intrusion Detection Systems (IDS). Be that as it may, most IDS arrangements are wrong for cloud conditions, because of numerous issues. During this paper, Intrusion Detection Systems (IDS) and also the varied associated difficulties of threats is given which supplies direction for future researchers in terms of IDS for Cloud computing setting.
{"title":"Intrusion detection systems (IDS) & future challenges in cloud based environment","authors":"M. Bharati, S. Tamane","doi":"10.1109/ICISIM.2017.8122180","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122180","url":null,"abstract":"Cloud computing is an attention grabbing service model as a result of it reduces investment as its prices are in guide corresponding to use and request. Due to economic and technical edges it offers, Cloud computing has recently obtained major acceptance. However, as a result of the conveyed nature of distributed computing situations, its significant asset total, wide client get to, conservative and customized sharing of assets change gatecrashers to utilize cloud for his or her benefit. Crucial applications are getting additional associated with the web for cost-effectiveness and quantifiable causes; however this leaves them receptive attack. Most systems these days don't seem to be designed in contact up subtle attacks; an attacker who is ready to compromise one machine usually gains the facility to require down the complete system. To fight intruders, variety of security solution for cloud situations executes Intrusion Detection Systems (IDS). Be that as it may, most IDS arrangements are wrong for cloud conditions, because of numerous issues. During this paper, Intrusion Detection Systems (IDS) and also the varied associated difficulties of threats is given which supplies direction for future researchers in terms of IDS for Cloud computing setting.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"1996 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117026341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICISIM.2017.8122139
R. P. Dudhmande, A. Rajurkar, V. G. Kottawar
Osteoarthritis has become a very rapidly spreading disorder of bones and joints among old people and young athletes indulging in sports such as soccer, hockey, etc. Injuries of the knee like tears in the meniscus can be seen very commonly in young athletes as well as the aged people. The Computer-Aided Diagnosis (CAD) systems help to a large extent and can play a major role in their detection. In this paper, we deal with the automatic region-of-interest location, extraction of the meniscus from the M.R.I. images of the knee joint and then assigning scores to the tears, if any, which can be used for quantification of the severity of tear. The proposed system was evaluated on a database of 34 individuals; and sensitivity and specificity were found to be 88% and 96% respectively. The results are encouraging and this system may prove to be a stepping stone in development of more sophisticated algorithms for detailed classification of the tears.
{"title":"Extraction of whole and torn meniscus in M.R.I. images and detection of meniscal tears","authors":"R. P. Dudhmande, A. Rajurkar, V. G. Kottawar","doi":"10.1109/ICISIM.2017.8122139","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122139","url":null,"abstract":"Osteoarthritis has become a very rapidly spreading disorder of bones and joints among old people and young athletes indulging in sports such as soccer, hockey, etc. Injuries of the knee like tears in the meniscus can be seen very commonly in young athletes as well as the aged people. The Computer-Aided Diagnosis (CAD) systems help to a large extent and can play a major role in their detection. In this paper, we deal with the automatic region-of-interest location, extraction of the meniscus from the M.R.I. images of the knee joint and then assigning scores to the tears, if any, which can be used for quantification of the severity of tear. The proposed system was evaluated on a database of 34 individuals; and sensitivity and specificity were found to be 88% and 96% respectively. The results are encouraging and this system may prove to be a stepping stone in development of more sophisticated algorithms for detailed classification of the tears.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"17 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}