Hadoop is one of the most popular technologies used in the big data landscape for evaluating the data through Hadoop Distributed File System and Map-Reduce. Problems which are larger in size are becoming tough to handle by a single system these days because the execution time for such problems will be very high in such platform. Instead of processing the tasks in a sequential approach, when the processing is done in parallel through the MapReduce method, then results with better efficiency can be expected. In the present method, firstly the Map task decomposes the input into the intermediate keys and then the intermediate keys are sent to the reduce function for processing of data. The algorithm used for performing matrix multiplication is cache oblivious in nature, for better utilization of the memory hierarchy. Processing with the cache oblivious approach increases the re-usability power of the elements and thus decreases the overall execution time. The proposed work for matrix multiplication shall be fault tolerant in nature as there is a replication of data at three places on three different data nodes.
{"title":"Hadoop Approach to Cluster Based Cache Oblivious Peano Curves","authors":"Gurpinder Kaur, Sachin Bagga, K. Mann","doi":"10.1109/IACC.2017.0037","DOIUrl":"https://doi.org/10.1109/IACC.2017.0037","url":null,"abstract":"Hadoop is one of the most popular technologies used in the big data landscape for evaluating the data through Hadoop Distributed File System and Map-Reduce. Problems which are larger in size are becoming tough to handle by a single system these days because the execution time for such problems will be very high in such platform. Instead of processing the tasks in a sequential approach, when the processing is done in parallel through the MapReduce method, then results with better efficiency can be expected. In the present method, firstly the Map task decomposes the input into the intermediate keys and then the intermediate keys are sent to the reduce function for processing of data. The algorithm used for performing matrix multiplication is cache oblivious in nature, for better utilization of the memory hierarchy. Processing with the cache oblivious approach increases the re-usability power of the elements and thus decreases the overall execution time. The proposed work for matrix multiplication shall be fault tolerant in nature as there is a replication of data at three places on three different data nodes.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":" 51","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neural Networks are one of the widely used Soft Computing Techniques. Neural Networks are adaptive and learn from past examples. Neural Networks are used successfully in extensive range of applications related to different areas particularly in Medical Domain. Neural Networks mimic human brain to solve problems concern to non-linear and complex data such as clinical samples. Cervical Cancer is a silent cancer which does not disclose any pain and symptoms. But it becomes dangerous silently with in a long period of 10-15 years. Hence early diagnosis is an essential action to prevent it in early stages. In this study most commonly used Neural Networks such as Multi Layer Perceptron (MLP), Probabilistic Neural Network (PNN), Radial Basic Function (RBF) and Linear Vector Quantization (LVQ) networks are used. Dimensionally reduced Cervical Pap smear Dataset using Fuzzy Edge Detection method is considered for classification. The Four Neural Networks are compared and the best suitable network to classify the dataset is evaluated.
{"title":"An Optimal Neural Network Classifier for Cervical Pap Smear Data","authors":"K. Hemalatha, K. U. Rani","doi":"10.1109/IACC.2017.0036","DOIUrl":"https://doi.org/10.1109/IACC.2017.0036","url":null,"abstract":"Neural Networks are one of the widely used Soft Computing Techniques. Neural Networks are adaptive and learn from past examples. Neural Networks are used successfully in extensive range of applications related to different areas particularly in Medical Domain. Neural Networks mimic human brain to solve problems concern to non-linear and complex data such as clinical samples. Cervical Cancer is a silent cancer which does not disclose any pain and symptoms. But it becomes dangerous silently with in a long period of 10-15 years. Hence early diagnosis is an essential action to prevent it in early stages. In this study most commonly used Neural Networks such as Multi Layer Perceptron (MLP), Probabilistic Neural Network (PNN), Radial Basic Function (RBF) and Linear Vector Quantization (LVQ) networks are used. Dimensionally reduced Cervical Pap smear Dataset using Fuzzy Edge Detection method is considered for classification. The Four Neural Networks are compared and the best suitable network to classify the dataset is evaluated.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122125594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this paper, we provide a concept of a time varying data analysis and present findings from a fire emergency serious game.
{"title":"Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation","authors":"Vimala Nunavath, A. Prinz","doi":"10.1109/IACC.2017.0068","DOIUrl":"https://doi.org/10.1109/IACC.2017.0068","url":null,"abstract":"To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this paper, we provide a concept of a time varying data analysis and present findings from a fire emergency serious game.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122198362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper 32 bit adders are designed usingexisting full adders and proposed adders. Average leakage andaverage power consumed in all 32 full adders is small comparedto all existing, proposed 15 transistor based 32 bit adder andproposed 13 transistor based 32 bit adder.
{"title":"Analysis of Leakage in 32-Bit Adders in 45 nm Technology","authors":"M. Ahmad, K. Manjunathachari, K. Lalkishore","doi":"10.1109/IACC.2017.0092","DOIUrl":"https://doi.org/10.1109/IACC.2017.0092","url":null,"abstract":"In this paper 32 bit adders are designed usingexisting full adders and proposed adders. Average leakage andaverage power consumed in all 32 full adders is small comparedto all existing, proposed 15 transistor based 32 bit adder andproposed 13 transistor based 32 bit adder.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. M. Sekhar, C. Kumar, K.Venkateswara Rao, N. S. Rao, M. Gopichand
Today people are more interconnected with Internet ever before. Internet not only brought advantages, it also brings security threats, cyberattacks, phishing, etc. To mitigate cybercrimes governments are enforcing cyberlaws. In this process authentication of digital objects are essential. To provide authentication many watermarking schemes are proposed. Among edge based watermarking schemes special category because of low distortion while watermarking. However, present edge based watermarking scheme are suffering from smoothing effect and also reversibility is an uncertain parameter. In this paper we are proposing a Reference Image and Edge (RIE) based watermarking scheme to overcome smoothing effect problem in existing edge based watermarking schemes. RIE watermarking scheme also consider cover content information while embedding watermark pattern. Compared to existing edge based data hiding schemes proposed RIE watermark scheme improves visual perception with more or less same embedding capacity.
{"title":"A Reversible RIE Based Watermarking Scheme","authors":"V. M. Sekhar, C. Kumar, K.Venkateswara Rao, N. S. Rao, M. Gopichand","doi":"10.1109/IACC.2017.0188","DOIUrl":"https://doi.org/10.1109/IACC.2017.0188","url":null,"abstract":"Today people are more interconnected with Internet ever before. Internet not only brought advantages, it also brings security threats, cyberattacks, phishing, etc. To mitigate cybercrimes governments are enforcing cyberlaws. In this process authentication of digital objects are essential. To provide authentication many watermarking schemes are proposed. Among edge based watermarking schemes special category because of low distortion while watermarking. However, present edge based watermarking scheme are suffering from smoothing effect and also reversibility is an uncertain parameter. In this paper we are proposing a Reference Image and Edge (RIE) based watermarking scheme to overcome smoothing effect problem in existing edge based watermarking schemes. RIE watermarking scheme also consider cover content information while embedding watermark pattern. Compared to existing edge based data hiding schemes proposed RIE watermark scheme improves visual perception with more or less same embedding capacity.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IP-BTS (Internet Protocol Based Base Transceiver Station) is a small computing hardware module designed for integration into an industry standard tower PC housing which provides a complete GSM Access Point. It is used to optimize cost of transmission line for high density multi-band base stations. This paper describes the detailed procedure to develop system level boot loader software (universal boot loader-u-boot) for IP-BTS which is a customized hardware with PowerPC based processor board running on RTLinux operating system. This paper also discusses the brief presentation of the customized hardware platform at system level and the boot loader software development procedure for embedded telecom application IP-BTS. Designing suitable boot software at system or boot level is a complex and challenging task which is included in development of an embedded system for telecom applications. The boot loader connects application software through customized hardware and Real-Time Operating System (RTOS). It is not only responsible for initialization of the processor board and other module of IP-BTS software also upgrades operating system images and IP-BTS software versions. The early initialization code is always developed in the processor's native assembly language. In this paper we presented detailed procedure to transplant boot loader (u-boot) on Power PC based customized board and tested successfully with results.
{"title":"Development of System Level Computational Platform for IP-BTS Telecom Application","authors":"M. Prasad, D. Reddy","doi":"10.1109/IACC.2017.0099","DOIUrl":"https://doi.org/10.1109/IACC.2017.0099","url":null,"abstract":"IP-BTS (Internet Protocol Based Base Transceiver Station) is a small computing hardware module designed for integration into an industry standard tower PC housing which provides a complete GSM Access Point. It is used to optimize cost of transmission line for high density multi-band base stations. This paper describes the detailed procedure to develop system level boot loader software (universal boot loader-u-boot) for IP-BTS which is a customized hardware with PowerPC based processor board running on RTLinux operating system. This paper also discusses the brief presentation of the customized hardware platform at system level and the boot loader software development procedure for embedded telecom application IP-BTS. Designing suitable boot software at system or boot level is a complex and challenging task which is included in development of an embedded system for telecom applications. The boot loader connects application software through customized hardware and Real-Time Operating System (RTOS). It is not only responsible for initialization of the processor board and other module of IP-BTS software also upgrades operating system images and IP-BTS software versions. The early initialization code is always developed in the processor's native assembly language. In this paper we presented detailed procedure to transplant boot loader (u-boot) on Power PC based customized board and tested successfully with results.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Along with the fast growing economy of a developing country as far as India is concerned, there has been reported an emerging number of crime and criminal offences. In many of the cases the suspects are quite freely escaped because of the insufficient testimonials and lack of communication links in time. As an instance, suppose a bank robbery takes place and right then no one is able to press the emergency buzzer or to dial up to nearest police station. Eventually, when the nearest police station is informed about the fact, the gang is beyond the reach leaving no clue behind. Same is observed in many cases as rash driving and hit and run, eve teasing and molestation of women at less crowded streets, pick pocketing and blackmailing at Automatic Teller Machines at roadside and many more. Where there is a crime involved, there has to be a quality surveillance and expert actuation to stand against all these activities with minimum human intervention. Our goal is to design an intelligent device that can continuously keep an eye on any activity happening around it and on administrator's request it can track any suspect, be it an object or a human being, with minimum power consumption and least human efforts. As an actuator it sends a signal to the nearest traffic control or police station intimating the state of crime along with its location and also tells about which direction it is heading to. In view of a real-time establishment of the concept, the flying device is designed to be a robot that looks and flies like a Bird, the processor is chosen to be ARDUINO UNO, the image processing is made by mat-lab tool and the communication link between the administrator and the device is via RFID system and between device and the police control is achieved by GPS/GSM technology.
{"title":"Artificial Intelligence to Impart Surveillance, Tracking, & Actuation on Suspicious Activities","authors":"Surajit Bhattacherjee, G. Somashekhar","doi":"10.1109/IACC.2017.0016","DOIUrl":"https://doi.org/10.1109/IACC.2017.0016","url":null,"abstract":"Along with the fast growing economy of a developing country as far as India is concerned, there has been reported an emerging number of crime and criminal offences. In many of the cases the suspects are quite freely escaped because of the insufficient testimonials and lack of communication links in time. As an instance, suppose a bank robbery takes place and right then no one is able to press the emergency buzzer or to dial up to nearest police station. Eventually, when the nearest police station is informed about the fact, the gang is beyond the reach leaving no clue behind. Same is observed in many cases as rash driving and hit and run, eve teasing and molestation of women at less crowded streets, pick pocketing and blackmailing at Automatic Teller Machines at roadside and many more. Where there is a crime involved, there has to be a quality surveillance and expert actuation to stand against all these activities with minimum human intervention. Our goal is to design an intelligent device that can continuously keep an eye on any activity happening around it and on administrator's request it can track any suspect, be it an object or a human being, with minimum power consumption and least human efforts. As an actuator it sends a signal to the nearest traffic control or police station intimating the state of crime along with its location and also tells about which direction it is heading to. In view of a real-time establishment of the concept, the flying device is designed to be a robot that looks and flies like a Bird, the processor is chosen to be ARDUINO UNO, the image processing is made by mat-lab tool and the communication link between the administrator and the device is via RFID system and between device and the police control is achieved by GPS/GSM technology.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123503452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Realization of an application using Wireless Sensor Networks (WSNs) using Sensor Nodes (SNs) brings in profound advantage of ad-hoc and flexible network deployment. Implementation of these networks face immense challenges due to short wireless range; along with limited power, storage & computational capabilities of SNs. Also, due to the tiny physical attributes of the SNs in WSNs, they are prone to physical attacks. In the context of WSNs, the physical attacks may range from destroying, lifting, replacing and adding new SNs. The work in this paper addresses the threats induced due to physical attacks and, further proposes a methodology to mitigate it. The methodology incorporates the use of newly proposed secured and efficient key distribution technique based on the additional commodity hardware Trusted Platform Module (TPM). Further, the paper demonstrates the merits of the proposed methodology. With some additional economical cost for the hardware, the proposed technique can fulfill the security requirement of WSNs, like confidentiality, integrity, authenticity, resilience to attack, key connectivity and data freshness
{"title":"Chip-Based Key Distribution Technique for Security Enhancement in Hierarchical Wireless Sensors Networks","authors":"Naveen Kumar K, M. Nene","doi":"10.1109/IACC.2017.0079","DOIUrl":"https://doi.org/10.1109/IACC.2017.0079","url":null,"abstract":"Realization of an application using Wireless Sensor Networks (WSNs) using Sensor Nodes (SNs) brings in profound advantage of ad-hoc and flexible network deployment. Implementation of these networks face immense challenges due to short wireless range; along with limited power, storage & computational capabilities of SNs. Also, due to the tiny physical attributes of the SNs in WSNs, they are prone to physical attacks. In the context of WSNs, the physical attacks may range from destroying, lifting, replacing and adding new SNs. The work in this paper addresses the threats induced due to physical attacks and, further proposes a methodology to mitigate it. The methodology incorporates the use of newly proposed secured and efficient key distribution technique based on the additional commodity hardware Trusted Platform Module (TPM). Further, the paper demonstrates the merits of the proposed methodology. With some additional economical cost for the hardware, the proposed technique can fulfill the security requirement of WSNs, like confidentiality, integrity, authenticity, resilience to attack, key connectivity and data freshness","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Subudhi, T. Veerakumar, Deepak Yadav, Amol P. Suryavanshi, S. N. Disha
In this article, we create a capsule of a lecture video using visual quality techniques which is a abstract of the lecture video. We first perform temporal segmentation to divide the video into number of shots. The activities of a lecture video can be divided into three categories: slide show, talking head, writing hand. We have developed a different and new approach for determining the quality of non-content and content frames crucial in the lecture video. Different features of the frame histogram are exploited to derive a quality factor for the detected frames. Hence we are able to extract high quality frames with high information content as well as few non content frames (talking head frames) for video clip selection. Finally in recreation of media to produce the capsule of the video, we select a video segments around these selected non content and content frames. Using this technique we are able to obtain a preview of the video which can be viewed in lesser time, hence it is beneficial to the viewers.
{"title":"Video Skimming for Lecture Video Sequences Using Histogram Based Low Level Features","authors":"B. Subudhi, T. Veerakumar, Deepak Yadav, Amol P. Suryavanshi, S. N. Disha","doi":"10.1109/IACC.2017.0143","DOIUrl":"https://doi.org/10.1109/IACC.2017.0143","url":null,"abstract":"In this article, we create a capsule of a lecture video using visual quality techniques which is a abstract of the lecture video. We first perform temporal segmentation to divide the video into number of shots. The activities of a lecture video can be divided into three categories: slide show, talking head, writing hand. We have developed a different and new approach for determining the quality of non-content and content frames crucial in the lecture video. Different features of the frame histogram are exploited to derive a quality factor for the detected frames. Hence we are able to extract high quality frames with high information content as well as few non content frames (talking head frames) for video clip selection. Finally in recreation of media to produce the capsule of the video, we select a video segments around these selected non content and content frames. Using this technique we are able to obtain a preview of the video which can be viewed in lesser time, hence it is beneficial to the viewers.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Independent mobility is an important aspectof self-esteem and plays a pivotal role in ”aging in place”.The smart wheelchair is an effort to provide an independentmobility to those persons who are unable to travel freely. Asmart wheelchair is an amalgamation of a standard powerdriving modules and a collection of sensors with an interfacingsection.Input control signal may be given by means of wirelessjoystick or touchpad that can be mounted on armrest also.Thisfeature makes it useful for the disabled persons who are ableto control the joystick and touchpad, and also it can be helpfulfor the caregiver like a nurse. Ultrasonic and infrared sensorsystems are going to be integrated into this wheelchair forproviding best possible and safe movement.
{"title":"Development of Intelligent Powerd Wheelchair","authors":"Ramachandra Kallam, Harish Sharma","doi":"10.1109/IACC.2017.0121","DOIUrl":"https://doi.org/10.1109/IACC.2017.0121","url":null,"abstract":"Independent mobility is an important aspectof self-esteem and plays a pivotal role in ”aging in place”.The smart wheelchair is an effort to provide an independentmobility to those persons who are unable to travel freely. Asmart wheelchair is an amalgamation of a standard powerdriving modules and a collection of sensors with an interfacingsection.Input control signal may be given by means of wirelessjoystick or touchpad that can be mounted on armrest also.Thisfeature makes it useful for the disabled persons who are ableto control the joystick and touchpad, and also it can be helpfulfor the caregiver like a nurse. Ultrasonic and infrared sensorsystems are going to be integrated into this wheelchair forproviding best possible and safe movement.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130196013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}