首页 > 最新文献

2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies最新文献

英文 中文
Wearable messaging device for visually impaired person 为视障人士设计的可穿戴通讯设备
C. Suresh Kumar, A. Julian
Today's technology has innumerable wearable solutions to alleviate the problems of disabled persons. The solution presented here is for the visually impaired persons and proposes to develop a wearable device that uses embedded system technology for data input functionalities in a hand glove based keyboard. The hand mounted keypad is easily adaptable by the user and provides flexibility as no prior knowledge is required to handle the hand mounted wearable device. The key glove acts as a prototype which enables the user to have the total functionality of a keyboard in one hand. Key glove is attached with alpha numeric keypad buttons that are mounted on the gloves. The character or number is generated by using mode Selection. (Alpha/Num). The hand mounted keypad can be interfaced with any kind of display device. It can be used for the visually impaired person to send message/call from one person to another using GSM modem. The GSM modem is attached with the gloves. Reply Message from others can be converted into text to voice format using Robo voice shield. The efficiency of the proposed work is evaluated with reference to decreased error rate and increased speed of operation. Voice conversion is also added to this device.
今天的技术有无数的可穿戴解决方案来缓解残疾人的问题。本文提出的解决方案是针对视障人士的,并建议开发一种可穿戴设备,该设备使用嵌入式系统技术在基于手套的键盘中进行数据输入功能。手持键盘很容易被用户调整,并提供灵活性,因为不需要事先的知识来处理手持可穿戴设备。键盘手套作为一个原型,使用户能够在一只手上拥有键盘的全部功能。关键手套附有alpha数字键盘按钮,安装在手套上。使用模式选择生成字符或数字。(α/ Num)。手持键盘可以与任何类型的显示设备接口。视障人士可以使用GSM调制解调器从一个人向另一个人发送信息/电话。GSM modem的手套已连接。回复他人的消息可以通过Robo语音屏蔽转换为文本到语音格式。通过降低错误率和提高操作速度来评估所提出工作的效率。该设备还添加了语音转换功能。
{"title":"Wearable messaging device for visually impaired person","authors":"C. Suresh Kumar, A. Julian","doi":"10.1109/ICACCCT.2014.7019243","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019243","url":null,"abstract":"Today's technology has innumerable wearable solutions to alleviate the problems of disabled persons. The solution presented here is for the visually impaired persons and proposes to develop a wearable device that uses embedded system technology for data input functionalities in a hand glove based keyboard. The hand mounted keypad is easily adaptable by the user and provides flexibility as no prior knowledge is required to handle the hand mounted wearable device. The key glove acts as a prototype which enables the user to have the total functionality of a keyboard in one hand. Key glove is attached with alpha numeric keypad buttons that are mounted on the gloves. The character or number is generated by using mode Selection. (Alpha/Num). The hand mounted keypad can be interfaced with any kind of display device. It can be used for the visually impaired person to send message/call from one person to another using GSM modem. The GSM modem is attached with the gloves. Reply Message from others can be converted into text to voice format using Robo voice shield. The efficiency of the proposed work is evaluated with reference to decreased error rate and increased speed of operation. Voice conversion is also added to this device.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122834313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Layered storage architecture for health system using cloud 基于云的卫生系统分层存储架构
B. Balamurugan, P. Venkata krishna, Lakshmi G. V. Rajya, N. Saravana Kumar
Cloud computing is a paradigm shift from traditional computing offers services that can use ubiquitous internet to transmit data and other functionalities. The health care plays a vital role involved in mundane activities of human life. In proposed work, the efficient framework for health care system using Cloud is achieved through the segmentation algorithm and deployed. Albeit, the layered design of data storage is well-organized for huge critical data and developed with high level security and access control. The framework overcomes the impact created by attacks withstand along with security and privacy flaws of the Cloud. The integration and data sharing of hospital information is made possible using hybrid Cloud. Our framework utilizes the algebraic way of data possession for Cloud auditing those results is cost effective method for overall health care systems with high level of security standards.
云计算是传统计算的一种范式转变,它提供的服务可以使用无处不在的互联网来传输数据和其他功能。医疗保健在人的日常生活中起着至关重要的作用。在本文中,通过分割算法实现了基于云的医疗保健系统的高效框架并进行了部署。尽管如此,数据存储的分层设计对于庞大的关键数据来说是组织良好的,并且具有高级别的安全性和访问控制。该框架克服了攻击所带来的影响,以及云的安全和隐私缺陷。混合云使得医院信息的集成和数据共享成为可能。我们的框架利用数据占有的代数方式进行云审计,这些结果是具有高水平安全标准的整体医疗保健系统的成本效益方法。
{"title":"Layered storage architecture for health system using cloud","authors":"B. Balamurugan, P. Venkata krishna, Lakshmi G. V. Rajya, N. Saravana Kumar","doi":"10.1109/ICACCCT.2014.7019419","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019419","url":null,"abstract":"Cloud computing is a paradigm shift from traditional computing offers services that can use ubiquitous internet to transmit data and other functionalities. The health care plays a vital role involved in mundane activities of human life. In proposed work, the efficient framework for health care system using Cloud is achieved through the segmentation algorithm and deployed. Albeit, the layered design of data storage is well-organized for huge critical data and developed with high level security and access control. The framework overcomes the impact created by attacks withstand along with security and privacy flaws of the Cloud. The integration and data sharing of hospital information is made possible using hybrid Cloud. Our framework utilizes the algebraic way of data possession for Cloud auditing those results is cost effective method for overall health care systems with high level of security standards.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125570763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal placement and rating of FACTS devices for congestion management in power system without and with wind energy integration 无风能和有风能集成的电力系统拥塞管理中FACTS设备的最佳配置和评级
A. Prasanthi, Sindhu T.K
FACTS, is an effective means to enhance capacity of existing power transmission network to their maximum limits. This paper deals with an approach for the optimal allocation of FACTS devices in a power system network to improve line loadability and provide voltage support and thus minimize total generation cost. Minimizing total generation cost implies optimal scheduling of generation by different generator units to satisfy load demand. The same objective is analysed in a normal power system and to a system with the integration of wind energy. In the wind energy integrated system the objective function is to minimize the standard deviation of voltage in the system so as to reduce the voltage flicker. As FACTS devices are costly devices and improper placement leads to voltage instability, optimal allocation of FACTS devices is important. Particle Swarm Optimization method is used for optimization and is implemented using MATLAB programming.
FACTS是将现有输电网容量提升到最大限度的有效手段。本文研究了电网中FACTS设备的优化配置方法,以提高线路的负载性并提供电压支持,从而使总发电成本最小化。发电总成本最小化意味着不同发电机组之间的发电优化调度,以满足负荷需求。对普通电力系统和集成风能的系统进行了同样的分析。在风能集成系统中,目标函数是使系统电压的标准差最小,以减少电压闪变。由于FACTS器件价格昂贵且放置不当会导致电压不稳定,因此FACTS器件的优化配置非常重要。采用粒子群优化方法进行优化,并通过MATLAB编程实现。
{"title":"Optimal placement and rating of FACTS devices for congestion management in power system without and with wind energy integration","authors":"A. Prasanthi, Sindhu T.K","doi":"10.1109/ICACCCT.2014.7019434","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019434","url":null,"abstract":"FACTS, is an effective means to enhance capacity of existing power transmission network to their maximum limits. This paper deals with an approach for the optimal allocation of FACTS devices in a power system network to improve line loadability and provide voltage support and thus minimize total generation cost. Minimizing total generation cost implies optimal scheduling of generation by different generator units to satisfy load demand. The same objective is analysed in a normal power system and to a system with the integration of wind energy. In the wind energy integrated system the objective function is to minimize the standard deviation of voltage in the system so as to reduce the voltage flicker. As FACTS devices are costly devices and improper placement leads to voltage instability, optimal allocation of FACTS devices is important. Particle Swarm Optimization method is used for optimization and is implemented using MATLAB programming.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127140273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detecting software vulnerabilities in android using static analysis 使用静态分析检测android中的软件漏洞
R. Dhaya, M. Poongodi
Now a day's mobile devices like Smartphone, tablets and Personal Digital Assistants etc. were playing most essential part in our daily lives. A high-end mobile device performs the same functionality as computers. Android based smart phone has become more vulnerable, because of an open source operating system. Anyone can develop a new application and post it into android market. These types of applications were not verified by authorized company. So it may include malevolent applications it may be virus, spyware, worms, etc. which can cause system failure, wasting memory resources, corrupting data, stealing personal information and also increases the maintenance cost. Due to these reasons, the mobile phone security or mobile security is very essential one in mobile computing. In the existing system is not able to detect new viruses, due to the limitation of updated signatures. The proposed system aims to motivate static code analysis based malware detection using search based machine learning algorithm which is called N-gram analysis and it detects the unnoticed malicious characteristics or vulnerabilities in the mobile applications.
现在,像智能手机、平板电脑和个人数字助理等移动设备在我们的日常生活中扮演着最重要的角色。高端移动设备的功能与计算机相同。基于Android的智能手机变得更加脆弱,因为它是一个开源的操作系统。任何人都可以开发新的应用程序并将其发布到android市场。这些类型的申请未经授权公司核实。因此,它可能包括恶意应用程序,它可能是病毒,间谍软件,蠕虫等,这可能会导致系统故障,浪费内存资源,破坏数据,窃取个人信息,也增加了维护成本。由于这些原因,手机安全或移动安全是移动计算中非常重要的一个问题。在现有的系统中,由于更新签名的限制,无法检测到新的病毒。该系统旨在利用基于搜索的机器学习算法(称为N-gram分析)激发基于静态代码分析的恶意软件检测,并检测移动应用程序中未被注意的恶意特征或漏洞。
{"title":"Detecting software vulnerabilities in android using static analysis","authors":"R. Dhaya, M. Poongodi","doi":"10.1109/ICACCCT.2014.7019227","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019227","url":null,"abstract":"Now a day's mobile devices like Smartphone, tablets and Personal Digital Assistants etc. were playing most essential part in our daily lives. A high-end mobile device performs the same functionality as computers. Android based smart phone has become more vulnerable, because of an open source operating system. Anyone can develop a new application and post it into android market. These types of applications were not verified by authorized company. So it may include malevolent applications it may be virus, spyware, worms, etc. which can cause system failure, wasting memory resources, corrupting data, stealing personal information and also increases the maintenance cost. Due to these reasons, the mobile phone security or mobile security is very essential one in mobile computing. In the existing system is not able to detect new viruses, due to the limitation of updated signatures. The proposed system aims to motivate static code analysis based malware detection using search based machine learning algorithm which is called N-gram analysis and it detects the unnoticed malicious characteristics or vulnerabilities in the mobile applications.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Empirical investigation of introducing Aspect Oriented Programming across versions of an SOA application 跨SOA应用程序版本引入面向方面编程的实证研究
A. S. Deepiga, Senthil Velan S, C. Babu
Service Oriented Architecture (SOA) is an architectural style used to provide services to consumers that promotes loose coupling between services. The scattered and tangled functionalities modeled in an SOA application can be redesigned using Aspect Oriented Programming (AOP). This results in two sets of services, the first set having services for the base functionalities and the other modeling cross-cutting functionalities. During compilation, cross-cutting functionalities in the second set are woven to the functionalities modeled in the first set. By introducing AOP in SOA, the quality attributes such as re-usability, extendibility and maintainability can be improved. The objective of this paper is to perform an empirical investigation by quantitatively measuring the effect of introducing Aspect Orientation (AO) in SOA by developing with multiple versions of a given application. An AO based SOA application (University Automation System) for automating the functionalities of a typical University with multiple versions has been developed as an experimental test bed. An equivalent set of versions without introducing aspectization are also developed in parallel. The values of the AOP metrics are measured for the different versions of University Automation System both aspectized and unaspectized. The measured values show that the quality attributes namely maintainability, reusability and extendibility improve whereas the complexity of the application decreases during the evolution of the case study application.
面向服务的体系结构(SOA)是一种用于向消费者提供服务的体系结构风格,它促进了服务之间的松耦合。可以使用面向方面编程(AOP)重新设计SOA应用程序中建模的分散和纠缠的功能。这将产生两组服务,第一组具有用于基本功能和其他建模横切功能的服务。在编译期间,第二组中的横切功能被编织到第一组中建模的功能中。通过在SOA中引入AOP,可以提高可重用性、可扩展性和可维护性等质量属性。本文的目的是通过使用给定应用程序的多个版本进行开发,定量地度量在SOA中引入面向方面(AO)的效果,从而进行实证调查。开发了一个基于AO的SOA应用程序(大学自动化系统),用于自动化具有多个版本的典型大学的功能,并将其作为实验测试平台。没有引入方面化的等效版本集也被并行开发。AOP度量的值是针对不同版本的大学自动化系统进行度量的,包括aspect化的和非aspect化的。测量值表明,在案例研究应用程序的演进过程中,可维护性、可重用性和可扩展性等质量属性得到了提高,而应用程序的复杂性却降低了。
{"title":"Empirical investigation of introducing Aspect Oriented Programming across versions of an SOA application","authors":"A. S. Deepiga, Senthil Velan S, C. Babu","doi":"10.1109/ICACCCT.2014.7019405","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019405","url":null,"abstract":"Service Oriented Architecture (SOA) is an architectural style used to provide services to consumers that promotes loose coupling between services. The scattered and tangled functionalities modeled in an SOA application can be redesigned using Aspect Oriented Programming (AOP). This results in two sets of services, the first set having services for the base functionalities and the other modeling cross-cutting functionalities. During compilation, cross-cutting functionalities in the second set are woven to the functionalities modeled in the first set. By introducing AOP in SOA, the quality attributes such as re-usability, extendibility and maintainability can be improved. The objective of this paper is to perform an empirical investigation by quantitatively measuring the effect of introducing Aspect Orientation (AO) in SOA by developing with multiple versions of a given application. An AO based SOA application (University Automation System) for automating the functionalities of a typical University with multiple versions has been developed as an experimental test bed. An equivalent set of versions without introducing aspectization are also developed in parallel. The values of the AOP metrics are measured for the different versions of University Automation System both aspectized and unaspectized. The measured values show that the quality attributes namely maintainability, reusability and extendibility improve whereas the complexity of the application decreases during the evolution of the case study application.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122306530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MIMO ad hoc networks with CSIT in a Binomial field 二项域中具有CSIT的MIMO自组网
M. Anitha, G. Ananthi
This paper deals with performance analysis such as outage probability and transmission capacity of Multiple Input Multiple Output (MIMO) ad-hoc network with channel state information at transmitter (CSIT). Network formed by scattering a fixed and finite number of nodes in a given area. This type of nodal arrangement is a Binomial point process (BPP) where area or volume of deployment is finite and number of nodes in disjoint sets is dependent. In this paper, Transmit Beamforming is used at the transmitter, while the receiver uses partial zero forcing to cancel certain interferers using some of its spatial receive degrees of freedom (SRDOF) with CSIT case. The distribution of internode distance is characterized in a Binomial network where the number of nodes is independently distributed. Using this binomial distribution, the Euclidean distance is derived to design outage probability that provide the upper bound and lower bound on the transmission capacity of an ad-hoc network. The simulation results and theoretical results are presented in lieu of validating results.
本文研究了具有信道状态信息的多输入多输出(MIMO)自组织网络的中断概率和传输容量等性能分析问题。在给定区域内分散固定数量和有限数量的节点而形成的网络。这种类型的节点布置是一个二项式点过程(BPP),其中部署的面积或体积是有限的,不相交集中的节点数量是相关的。在本文中,发送端使用发射波束形成,而接收端使用部分零强迫来抵消某些干扰,利用其空间接收自由度(SRDOF)与CSIT情况。在二项网络中,节点间距离的分布是独立分布的。利用这一二项分布,导出欧氏距离来设计中断概率,从而给出自组网传输容量的上界和下界。给出了仿真结果和理论结果,代替了验证结果。
{"title":"MIMO ad hoc networks with CSIT in a Binomial field","authors":"M. Anitha, G. Ananthi","doi":"10.1109/ICACCCT.2014.7019287","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019287","url":null,"abstract":"This paper deals with performance analysis such as outage probability and transmission capacity of Multiple Input Multiple Output (MIMO) ad-hoc network with channel state information at transmitter (CSIT). Network formed by scattering a fixed and finite number of nodes in a given area. This type of nodal arrangement is a Binomial point process (BPP) where area or volume of deployment is finite and number of nodes in disjoint sets is dependent. In this paper, Transmit Beamforming is used at the transmitter, while the receiver uses partial zero forcing to cancel certain interferers using some of its spatial receive degrees of freedom (SRDOF) with CSIT case. The distribution of internode distance is characterized in a Binomial network where the number of nodes is independently distributed. Using this binomial distribution, the Euclidean distance is derived to design outage probability that provide the upper bound and lower bound on the transmission capacity of an ad-hoc network. The simulation results and theoretical results are presented in lieu of validating results.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122207314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Establishing trust in cloud computing security with the help of inter-clouds 借助云间建立云计算安全信任
Mukesh Kant Tripathi, V. Sehgal
Nowadays cloud computing receiving a great deal of attention. Cloud computing is a subscription based service which offers dynamic, scalable, shared and elastic resources like storage, softwares, computing power etc. from by remote cloud data centers to the customers like government authority, business organizations, individuals etc. Trust is an important factor in cloud computing. The facilities provide by cloud computing is too attractive for customers but it has a distributed and non-transparent nature due to this there may be some obstacles in using cloud computing services, because users lose their control over data and they are not sure about whether cloud providers can be trusted or not. They are confused with cloud providers regarding trust issue. This paper mainly focuses on inter-clouds for establishing trust in cloud computing environment. The aim is to promote the use of inter-clouds in cloud computing environment.
如今,云计算受到了极大的关注。云计算是一种基于订阅的服务,它从远程云数据中心向政府机构、商业组织、个人等客户提供动态的、可扩展的、共享的和弹性的资源,如存储、软件、计算能力等。信任是云计算中的一个重要因素。云计算提供的设施对客户来说太有吸引力了,但它具有分布式和不透明的性质,因此在使用云计算服务时可能会遇到一些障碍,因为用户失去了对数据的控制,他们不确定云提供商是否值得信任。在信任问题上,他们与云提供商混淆了。本文主要研究如何在云计算环境中建立云间信任。目的是促进云计算环境中云间的使用。
{"title":"Establishing trust in cloud computing security with the help of inter-clouds","authors":"Mukesh Kant Tripathi, V. Sehgal","doi":"10.1109/ICACCCT.2014.7019408","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019408","url":null,"abstract":"Nowadays cloud computing receiving a great deal of attention. Cloud computing is a subscription based service which offers dynamic, scalable, shared and elastic resources like storage, softwares, computing power etc. from by remote cloud data centers to the customers like government authority, business organizations, individuals etc. Trust is an important factor in cloud computing. The facilities provide by cloud computing is too attractive for customers but it has a distributed and non-transparent nature due to this there may be some obstacles in using cloud computing services, because users lose their control over data and they are not sure about whether cloud providers can be trusted or not. They are confused with cloud providers regarding trust issue. This paper mainly focuses on inter-clouds for establishing trust in cloud computing environment. The aim is to promote the use of inter-clouds in cloud computing environment.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
EEG signal and video analysis based depression indication 基于脑电信号和视频分析的抑郁症指征
Yashika Katyal, Suhas V. Alur, Shipra Dwivedi, R. Menaka
Depression is a common phenomenon in the present scenario. Due to the fast pace at which our lives move and immense pressure that we face adolescents, office goers and even the elders face depression. Diagnosing depression in the early curable stages is very important and may even save the life of a patient. EEG signal analysis has been used for medical research like epilepsy, sleep disorder, insomnia etc. Similarly, video signal analysis has been used for facial features detection, eye movement, emotion recognition etc. Collaborating both the methods accuracy of depression detection can be improved upon. This paper describes a novel method for combining both EEG signal analysis and facial emotion recognition through video analysis to successfully categorize depression into various levels. For this aim, power spectrum of three frequency bands (alpha, beta, and theta) and the whole bands of EEG are used as features along with standard deviation, mean and entropy.
在目前的情况下,抑郁是一种普遍现象。由于我们生活的快节奏和巨大的压力,我们面临着青少年,上班族甚至老年人面临抑郁症。在可治愈的早期阶段诊断抑郁症是非常重要的,甚至可能挽救病人的生命。脑电图信号分析已被用于癫痫、睡眠障碍、失眠等医学研究。同样,视频信号分析也被用于面部特征检测、眼动、情绪识别等。结合这两种方法,可以提高抑郁症检测的准确性。本文提出了一种结合脑电信号分析和面部情绪识别的方法,通过视频分析成功地将抑郁症划分为不同的等级。为此,将EEG的三个频带(alpha、beta和theta)的功率谱以及整个频带与标准差、均值和熵一起作为特征。
{"title":"EEG signal and video analysis based depression indication","authors":"Yashika Katyal, Suhas V. Alur, Shipra Dwivedi, R. Menaka","doi":"10.1109/ICACCCT.2014.7019320","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019320","url":null,"abstract":"Depression is a common phenomenon in the present scenario. Due to the fast pace at which our lives move and immense pressure that we face adolescents, office goers and even the elders face depression. Diagnosing depression in the early curable stages is very important and may even save the life of a patient. EEG signal analysis has been used for medical research like epilepsy, sleep disorder, insomnia etc. Similarly, video signal analysis has been used for facial features detection, eye movement, emotion recognition etc. Collaborating both the methods accuracy of depression detection can be improved upon. This paper describes a novel method for combining both EEG signal analysis and facial emotion recognition through video analysis to successfully categorize depression into various levels. For this aim, power spectrum of three frequency bands (alpha, beta, and theta) and the whole bands of EEG are used as features along with standard deviation, mean and entropy.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Automated detection of Polycystic Ovarian Syndrome using follicle recognition 利用卵泡识别技术自动检测多囊卵巢综合征
Sharvari S S Deshpande, A. Wakankar
Polycystic Ovarian Syndrome (PCOS) is one of the most common hormonal disorder present in females in reproductive age group. Early detection and treatment of PCOS is important since it is often associated with obesity, type 2 diabetes mellitus, and high cholesterol levels. In this paper, automated detection of PCOS is done by calculating no of follicles in ovarian ultrasound image and then incorporating clinical, biochemical and imaging parameters to classify patients in two groups i.e. normal and PCOS affected. Number of follicles are detected by ovarian ultrasound image processing using preprocessing which includes contrast enhancement and filtering, feature extraction using Multiscale morphological approach and segmentation. Support Vector Machine algorithm is used for classification which takes into account all the parameters such as body mass index (BMI), hormonal levels, menstrual cycle length and no of follicles detected in ovarian ultrasound image processing. The results obtained are verified by doctors and compared with manual detection. The accuracy obtained for the proposed method is 95%.
多囊卵巢综合征(PCOS)是育龄期女性最常见的激素失调之一。多囊卵巢综合征的早期发现和治疗是很重要的,因为它通常与肥胖、2型糖尿病和高胆固醇水平有关。本文通过计算卵巢超声图像中卵泡数目,结合临床、生化和影像学参数,将PCOS患者分为正常组和PCOS患者两组,实现PCOS的自动检测。对卵巢超声图像进行预处理,包括对比度增强和滤波、多尺度形态学特征提取和分割,检测卵泡数量。采用支持向量机(Support Vector Machine)算法进行分类,该算法综合考虑了卵巢超声图像处理中身体质量指数(BMI)、激素水平、月经周期长短、未检出卵泡等参数。所得结果经医生验证,并与人工检测进行对比。该方法的准确率为95%。
{"title":"Automated detection of Polycystic Ovarian Syndrome using follicle recognition","authors":"Sharvari S S Deshpande, A. Wakankar","doi":"10.1109/ICACCCT.2014.7019318","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019318","url":null,"abstract":"Polycystic Ovarian Syndrome (PCOS) is one of the most common hormonal disorder present in females in reproductive age group. Early detection and treatment of PCOS is important since it is often associated with obesity, type 2 diabetes mellitus, and high cholesterol levels. In this paper, automated detection of PCOS is done by calculating no of follicles in ovarian ultrasound image and then incorporating clinical, biochemical and imaging parameters to classify patients in two groups i.e. normal and PCOS affected. Number of follicles are detected by ovarian ultrasound image processing using preprocessing which includes contrast enhancement and filtering, feature extraction using Multiscale morphological approach and segmentation. Support Vector Machine algorithm is used for classification which takes into account all the parameters such as body mass index (BMI), hormonal levels, menstrual cycle length and no of follicles detected in ovarian ultrasound image processing. The results obtained are verified by doctors and compared with manual detection. The accuracy obtained for the proposed method is 95%.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127289710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An efficient folded pipelined architecture for Fast Fourier Transform using Cordic algorithm 基于Cordic算法的快速傅里叶变换的高效折叠流水线结构
N. S. Shymna Nizar, A. R. Krishna
Fast Fourier Transforms have become an integral part of any digital communication system and a wide variety of approaches have been tried in order to optimize the algorithm for a variety of parameters, primarily being memory and speed. Major problem in FFT calculation is the increased number of complex multiplication units. Folding transformations are used to design FFT architectures with reduced number of functional units. In the folding transformation, many butterflies in the same column can be mapped to one butterfly unit. A highly efficient pipelined folded FFT architecture for 8 point R2 FFT is presented here. When compared with the normal R2 FFT architecture, the pipelined architecture shows efficiency both in speed and area consumption. Futher reduction in the area can be obtained by using COordinate Rotation for DIgital Computer (CORDIC) algorithm, which is an add and shift algorithm that replaces complex twiddle factor multiplication. The FFT block is designed to be capable of computing 8 point FFT and employs R2 (Radix2) architecture which is simple, elegant and best suited for communication applications. VHDL coding is simulated and synthesized in Xilinx ISE Design Suite 12.1.
快速傅里叶变换已经成为任何数字通信系统的一个组成部分,并且已经尝试了各种各样的方法来优化各种参数的算法,主要是内存和速度。FFT计算的主要问题是复杂乘法单元数量的增加。折叠变换用于设计功能单元数量减少的FFT体系结构。在折叠变换中,同一列中的许多蝴蝶可以映射到一个蝴蝶单元。本文提出了一种用于8点R2 FFT的高效流水线折叠FFT架构。与普通的R2 FFT结构相比,流水线结构在速度和面积消耗方面都显示出效率。利用坐标旋转算法(COordinate Rotation for DIgital Computer, CORDIC)可以进一步缩小面积。CORDIC算法是一种取代复杂旋转因子乘法的加移位算法。FFT模块设计为能够计算8点FFT,采用简单,优雅,最适合通信应用的R2 (Radix2)架构。在Xilinx ISE Design Suite 12.1中模拟和合成了VHDL编码。
{"title":"An efficient folded pipelined architecture for Fast Fourier Transform using Cordic algorithm","authors":"N. S. Shymna Nizar, A. R. Krishna","doi":"10.1109/ICACCCT.2014.7019486","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019486","url":null,"abstract":"Fast Fourier Transforms have become an integral part of any digital communication system and a wide variety of approaches have been tried in order to optimize the algorithm for a variety of parameters, primarily being memory and speed. Major problem in FFT calculation is the increased number of complex multiplication units. Folding transformations are used to design FFT architectures with reduced number of functional units. In the folding transformation, many butterflies in the same column can be mapped to one butterfly unit. A highly efficient pipelined folded FFT architecture for 8 point R2 FFT is presented here. When compared with the normal R2 FFT architecture, the pipelined architecture shows efficiency both in speed and area consumption. Futher reduction in the area can be obtained by using COordinate Rotation for DIgital Computer (CORDIC) algorithm, which is an add and shift algorithm that replaces complex twiddle factor multiplication. The FFT block is designed to be capable of computing 8 point FFT and employs R2 (Radix2) architecture which is simple, elegant and best suited for communication applications. VHDL coding is simulated and synthesized in Xilinx ISE Design Suite 12.1.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1