Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728467
S. Sunmathi, M. Sandhya, M. Sumitha, A. Kirthika
With the rapid increases in the usage of vehicles in recent years, finding a parking area is more difficult, which leads to practical conflicts such as traffic congestion. In this paper, a solid system is used to identify a free slot in a parking area and keep the record of vehicles which are parked. It is very useful for the drivers to find a free slot before they reach their destination and to calculate a parking charge while leaving the parking area. In this system, sensors identify the free slots, a vehicle is identified using image processing, and the parking charge for each vehicle is detected on the basis of the time that the vehicle is in the parking area.
{"title":"Smart Car Parking Using Image Processing","authors":"S. Sunmathi, M. Sandhya, M. Sumitha, A. Kirthika","doi":"10.1109/ICACCS.2019.8728467","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728467","url":null,"abstract":"With the rapid increases in the usage of vehicles in recent years, finding a parking area is more difficult, which leads to practical conflicts such as traffic congestion. In this paper, a solid system is used to identify a free slot in a parking area and keep the record of vehicles which are parked. It is very useful for the drivers to find a free slot before they reach their destination and to calculate a parking charge while leaving the parking area. In this system, sensors identify the free slots, a vehicle is identified using image processing, and the parking charge for each vehicle is detected on the basis of the time that the vehicle is in the parking area.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728414
S. Thenmozhi, J. Bala Ranjitha, S. Anu, A. Jasmine soniya
IoT comprises a complex network of smart devices. This complex network consists of large number of nodes. The traditional cryptographic techniques do not provide solution for energy dissipation for IoT nodes. Hence measure should be taken to make sure that the data is secured and efficiently received at the receiving end. The RSSI values are used to generate fingerprints. At the server link fingerprints are matched to compute the correlation coefficient. The RSSI values are taken from offline database and simulation are performed in MATLAB. The data can be easily forged hence proper security must be taken. A single change in data might cause big problems. Hence to secure the data light-weight protocols are used.
{"title":"Light Weight Security Framework for IoT","authors":"S. Thenmozhi, J. Bala Ranjitha, S. Anu, A. Jasmine soniya","doi":"10.1109/ICACCS.2019.8728414","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728414","url":null,"abstract":"IoT comprises a complex network of smart devices. This complex network consists of large number of nodes. The traditional cryptographic techniques do not provide solution for energy dissipation for IoT nodes. Hence measure should be taken to make sure that the data is secured and efficiently received at the receiving end. The RSSI values are used to generate fingerprints. At the server link fingerprints are matched to compute the correlation coefficient. The RSSI values are taken from offline database and simulation are performed in MATLAB. The data can be easily forged hence proper security must be taken. A single change in data might cause big problems. Hence to secure the data light-weight protocols are used.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124149239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728548
S. R, Punithavalli R, E. Nandakumar, P. R
This Project Proposes the Web Monitoring of Solar based Brushless Direct Current(BLDC)motor and its Speed control is done with Closed loop Technique. Brushless DC motor is an emerging trend in Industrial Applications due to its domination over the motors with Counterparts. The hardware setup is made with Solar Panel, a part of Controller board and a part of Inverter board, along with MPPT algorithm and MOSFET driver circuit and a Communication module. The BLDC motor speed can be controlled with low cost PIC microcontroller 16F877a. We have employed PIC microcontroller and programmed with Embedded C in order to vary the duty cycle of motor. The Communication module which is used in order to monitor the working state of the machine is done with Internet of Things (IoT). The Industrial Persons can monitor the parameters using IOT provided with Unique Login credentials which comes under the proposed system.
{"title":"Web Monitoring And Speed Control Of Solar Based Bldc Motor With Iot","authors":"S. R, Punithavalli R, E. Nandakumar, P. R","doi":"10.1109/ICACCS.2019.8728548","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728548","url":null,"abstract":"This Project Proposes the Web Monitoring of Solar based Brushless Direct Current(BLDC)motor and its Speed control is done with Closed loop Technique. Brushless DC motor is an emerging trend in Industrial Applications due to its domination over the motors with Counterparts. The hardware setup is made with Solar Panel, a part of Controller board and a part of Inverter board, along with MPPT algorithm and MOSFET driver circuit and a Communication module. The BLDC motor speed can be controlled with low cost PIC microcontroller 16F877a. We have employed PIC microcontroller and programmed with Embedded C in order to vary the duty cycle of motor. The Communication module which is used in order to monitor the working state of the machine is done with Internet of Things (IoT). The Industrial Persons can monitor the parameters using IOT provided with Unique Login credentials which comes under the proposed system.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114379078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728346
T. Lekhaa, S. Rajeshwari, J. Sequeira, S. Akshayaa
In the living world technology is evolving day by day in different fields like artificial intelligent, machine learning, virtual 1reality, touch commerce, internet of things and so on. The main motive of the paper is focus to the customer needs and purpose because time is more important to everyone in the real world. But the people spend the more time in the supermarket. For example, consumers purchase the number of items in the supermarket using trolley. After purchasing they can face some problems like waiting the long queue in billing section and without knowing about the calculation of purchased items. So, we can consider these problem to find the remedies called as "Intelligent shopping cart using BOLT based on IOT". Our IOT kit consists of barcode scanner, LCD display, Bolt ESP8266. The broad clarification of its process is, when consumer takes an item and put inside the trolley, that time barcode scanner scan the item barcode and value as well as gain to show into the digital display panel. Later than consumer concluded their purchasing and the bill is send to the counter section. It will save the time and consumer early itself knowing the calculation of purchased items.
{"title":"Intelligent Shopping Cart Using Bolt Esp8266 Based on Internet of Things","authors":"T. Lekhaa, S. Rajeshwari, J. Sequeira, S. Akshayaa","doi":"10.1109/ICACCS.2019.8728346","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728346","url":null,"abstract":"In the living world technology is evolving day by day in different fields like artificial intelligent, machine learning, virtual 1reality, touch commerce, internet of things and so on. The main motive of the paper is focus to the customer needs and purpose because time is more important to everyone in the real world. But the people spend the more time in the supermarket. For example, consumers purchase the number of items in the supermarket using trolley. After purchasing they can face some problems like waiting the long queue in billing section and without knowing about the calculation of purchased items. So, we can consider these problem to find the remedies called as \"Intelligent shopping cart using BOLT based on IOT\". Our IOT kit consists of barcode scanner, LCD display, Bolt ESP8266. The broad clarification of its process is, when consumer takes an item and put inside the trolley, that time barcode scanner scan the item barcode and value as well as gain to show into the digital display panel. Later than consumer concluded their purchasing and the bill is send to the counter section. It will save the time and consumer early itself knowing the calculation of purchased items.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114729321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728524
K. Ashritha, S. M, Lakshmy Kv
Immutability is a core principle of blockchain platforms that help all participants to have an exact global log of transactions. Immutability is easier to achieve in permissioned blockchain platforms where a trusted group are the validators. In public platforms, this vital property of blockchain can be achieved only through decentralized economic mechanisms like Proof-of-Work(PoW). Blockchain along with the concept of asset tokenization provides liquidity to markets like stock trading and exchange other intangible objects. With changes in regulatory policies and/or government laws, there could be a requisite to alter the contents in such markets. We propose an idea of using Chameleon hash functions that will enable modification of a block without changing other block contents. In our proposal, the trapdoor key used to redact a block is split among major validators and is reconstructed using Multi-Party Computation(MPC). Redaction happens when the major validators agree the suggested changes by digitally signing the proposal. This eliminates the need to rely on a trusted party. We also propose an idea of using second trapdoor key that will be with the creator of the block. This can be used in scenarios where the block redaction should not happen without the consent of the creator.
{"title":"Redactable Blockchain using Enhanced Chameleon Hash Function","authors":"K. Ashritha, S. M, Lakshmy Kv","doi":"10.1109/ICACCS.2019.8728524","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728524","url":null,"abstract":"Immutability is a core principle of blockchain platforms that help all participants to have an exact global log of transactions. Immutability is easier to achieve in permissioned blockchain platforms where a trusted group are the validators. In public platforms, this vital property of blockchain can be achieved only through decentralized economic mechanisms like Proof-of-Work(PoW). Blockchain along with the concept of asset tokenization provides liquidity to markets like stock trading and exchange other intangible objects. With changes in regulatory policies and/or government laws, there could be a requisite to alter the contents in such markets. We propose an idea of using Chameleon hash functions that will enable modification of a block without changing other block contents. In our proposal, the trapdoor key used to redact a block is split among major validators and is reconstructed using Multi-Party Computation(MPC). Redaction happens when the major validators agree the suggested changes by digitally signing the proposal. This eliminates the need to rely on a trusted party. We also propose an idea of using second trapdoor key that will be with the creator of the block. This can be used in scenarios where the block redaction should not happen without the consent of the creator.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"222 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116015992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728385
Souvik Ganguli, Gagandeep Kaur, P. Sarkar
This paper investigates the application of a firefly based hybrid algorithm, namely FAPS, integrating firefly algorithm (FA) with pattern search (PS), to identify linear dynamic systems in presence of static nonlinearities in the discrete-delta domain. The advantage of using delta operator is to provide unification of continuous-time systems with discrete domain results at a high sampling rate. Two popular identification models, viz. hammerstein and wiener are taken up in this work. The parameters of these models as well as the polynomial nonlinearities considered are calculated using FAPS algorithm, through the minimization of mean square error (MSE) occurring between the true and identified model outputs. Simulations illustrate the efficacy of the proposed technique.
{"title":"Identification in the delta domain: a unified approach using hybrid FAPS algorithm","authors":"Souvik Ganguli, Gagandeep Kaur, P. Sarkar","doi":"10.1109/ICACCS.2019.8728385","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728385","url":null,"abstract":"This paper investigates the application of a firefly based hybrid algorithm, namely FAPS, integrating firefly algorithm (FA) with pattern search (PS), to identify linear dynamic systems in presence of static nonlinearities in the discrete-delta domain. The advantage of using delta operator is to provide unification of continuous-time systems with discrete domain results at a high sampling rate. Two popular identification models, viz. hammerstein and wiener are taken up in this work. The parameters of these models as well as the polynomial nonlinearities considered are calculated using FAPS algorithm, through the minimization of mean square error (MSE) occurring between the true and identified model outputs. Simulations illustrate the efficacy of the proposed technique.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"479 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728322
J. S. Bhonsle, A. Junghare
Nowadays power grid are equipped with new technological devices, thereby becoming a Smart grid. Monitoring of electrical quantities by such smart device called PMU is performed to have a better situational awareness. Grid comprises of large number of buses and it is not possible for electric utility to place PMUs in each bus, that too, in a single stage. Therefore PMUs are placed at strategic location in phased manner. In this paper, algorithm is presented to place PMUs phase-wise ensuring the maximum grid observability at each stage. Placement strategy also incorporates any grid expansion scenario, if occurs during complete placement phases. Performance of algorithm is verified on IEEE 14 bus and IEEE 30 bus test system.
{"title":"Staged Placement of PMUs in a Power Grid","authors":"J. S. Bhonsle, A. Junghare","doi":"10.1109/ICACCS.2019.8728322","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728322","url":null,"abstract":"Nowadays power grid are equipped with new technological devices, thereby becoming a Smart grid. Monitoring of electrical quantities by such smart device called PMU is performed to have a better situational awareness. Grid comprises of large number of buses and it is not possible for electric utility to place PMUs in each bus, that too, in a single stage. Therefore PMUs are placed at strategic location in phased manner. In this paper, algorithm is presented to place PMUs phase-wise ensuring the maximum grid observability at each stage. Placement strategy also incorporates any grid expansion scenario, if occurs during complete placement phases. Performance of algorithm is verified on IEEE 14 bus and IEEE 30 bus test system.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123528466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728536
Madhu Nakerekanti, V. Narasimha
The Trendy social networking sites like LinkedIn, Facebook and Twitter form a good media to mingle socially worldwide. Because of a huge user database, and enormous quantity of information, these online social networking sites are becoming a probable channel for attackers and intruders to exploit the user’s information. A lot of social networking sites aim to prevent these exploitations; however several attackers are still able to conquer security countermeasures by using diverse techniques. The identity of the user can be stolen by the Intruder and that lead to a negative impact. Users of social networking sites may not be aware of such security issues. This paper addresses analysis on different types of malware issues that are possible in online social networks.
{"title":"Analysis on Malware Issues in Online Social Networking Sites (SNS)","authors":"Madhu Nakerekanti, V. Narasimha","doi":"10.1109/ICACCS.2019.8728536","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728536","url":null,"abstract":"The Trendy social networking sites like LinkedIn, Facebook and Twitter form a good media to mingle socially worldwide. Because of a huge user database, and enormous quantity of information, these online social networking sites are becoming a probable channel for attackers and intruders to exploit the user’s information. A lot of social networking sites aim to prevent these exploitations; however several attackers are still able to conquer security countermeasures by using diverse techniques. The identity of the user can be stolen by the Intruder and that lead to a negative impact. Users of social networking sites may not be aware of such security issues. This paper addresses analysis on different types of malware issues that are possible in online social networks.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728445
R. Katarya, Diksha Gautam
Online Social Network (OSN) is an online virtual community which helps people from anywhere to connect, share their views, ideas with each other and express themselves without any restrictions on social networks. Sometimes, in such kind of network one person’s view or idea can make an impact on another person. Hence OSNs plays a significant role in the behavior and decision making of a person. The person that can make an impact, help or influence another person in any kind of issue is we call an opinion leader (OL). It has become essential to identify an opinion leader for different benefits among society. In this paper, we have shown the need and features of an opinion leader. This study also shows the different methods to identify an opinion leader in and some recent research in the area of data mining techniques to find an opinion leader in the OSN.
Online Social Network (OSN)是一个在线的虚拟社区,它帮助来自任何地方的人们相互联系,分享他们的观点,想法和表达自己,而不受社交网络的任何限制。有时,在这样的网络中,一个人的观点或想法会对另一个人产生影响。因此,osn在人的行为和决策中起着重要的作用。在任何问题上能够产生影响、帮助或影响他人的人我们称之为意见领袖(OL)。为了社会的不同利益,确定意见领袖变得至关重要。在本文中,我们展示了意见领袖的需求和特征。本研究还展示了在OSN中识别意见领袖的不同方法和最近在数据挖掘技术领域的一些研究。
{"title":"Survey on Opinion Leader in Social Network using Data Mining","authors":"R. Katarya, Diksha Gautam","doi":"10.1109/ICACCS.2019.8728445","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728445","url":null,"abstract":"Online Social Network (OSN) is an online virtual community which helps people from anywhere to connect, share their views, ideas with each other and express themselves without any restrictions on social networks. Sometimes, in such kind of network one person’s view or idea can make an impact on another person. Hence OSNs plays a significant role in the behavior and decision making of a person. The person that can make an impact, help or influence another person in any kind of issue is we call an opinion leader (OL). It has become essential to identify an opinion leader for different benefits among society. In this paper, we have shown the need and features of an opinion leader. This study also shows the different methods to identify an opinion leader in and some recent research in the area of data mining techniques to find an opinion leader in the OSN.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127093538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728447
V. Bhanumathi, R. Sangeetha
Brain tumor is nothing but an abnormal growth caused by cells reproducing themselves in an uncontrolled manner. The treatment planning is a key stage to improve the quality of life of oncological patients. In recent years, deep learning has gained a huge fame in solving problems from various fields including Medical Image Analysis. Nowadays, CNN plays a major role in fine tuning and analyzing the brain tumors present in the Magnetic Resonance Imaging (MRI) images. In this paper, we introduced different classification techniques such as Alex Net, Vgg Net and Google Net, for pre-trained and fine tuning process of brain tumor images. For this analysis, the extracted features and the results of the classifiers such as Alex Net, Vgg Net and Google Net are compared the results of proposed technique are validated for its performance and quality for MRI brain images based on iteration, time elapsed and accuracy.
{"title":"CNN Based Training and Classification of MRI Brain Images","authors":"V. Bhanumathi, R. Sangeetha","doi":"10.1109/ICACCS.2019.8728447","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728447","url":null,"abstract":"Brain tumor is nothing but an abnormal growth caused by cells reproducing themselves in an uncontrolled manner. The treatment planning is a key stage to improve the quality of life of oncological patients. In recent years, deep learning has gained a huge fame in solving problems from various fields including Medical Image Analysis. Nowadays, CNN plays a major role in fine tuning and analyzing the brain tumors present in the Magnetic Resonance Imaging (MRI) images. In this paper, we introduced different classification techniques such as Alex Net, Vgg Net and Google Net, for pre-trained and fine tuning process of brain tumor images. For this analysis, the extracted features and the results of the classifiers such as Alex Net, Vgg Net and Google Net are compared the results of proposed technique are validated for its performance and quality for MRI brain images based on iteration, time elapsed and accuracy.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127041616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}