首页 > 最新文献

2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)最新文献

英文 中文
Comparing the Access Control Mechanism in Database, Cloud and Femtocells 数据库、云和基站访问控制机制的比较
Harshita R. Jhurani, P. Chandana, Yarram Vijay Kumar Reddy, M. Sharada
Security has been a major issue since the evolution of mankind. Access control refers to providing access to data only to specified users. In the present time, various mechanisms are used and many policies have been implemented to secure the confidential data. These mechanisms are not always easy to be implemented. Many challenges are met during the execution and various devices have been designed in an ad-hoc fashion to meet the present day requirements. The deployment of these devices and methods in various fields has solved the protection issue to a large extent. This paper represents the SQLIA and XSS attacks, the techniques that are compared to few mechanisms used to restrict unethical access to database, cloud and femtocells that followed in day-to-day life, and the challenges met to obtain them.
自人类进化以来,安全一直是一个重大问题。访问控制是指只向指定用户提供对数据的访问权限。目前,使用了各种机制并实现了许多策略来保护机密数据。这些机制并不总是容易实现的。在执行过程中遇到了许多挑战,并且以特别的方式设计了各种设备以满足当前的需求。这些器件和方法在各个领域的应用,在很大程度上解决了保护问题。本文代表了SQLIA和XSS攻击,这些技术与用于限制对日常生活中随之而来的数据库,云和飞基站的不道德访问的几种机制进行了比较,以及获得它们所面临的挑战。
{"title":"Comparing the Access Control Mechanism in Database, Cloud and Femtocells","authors":"Harshita R. Jhurani, P. Chandana, Yarram Vijay Kumar Reddy, M. Sharada","doi":"10.1109/ICECA.2018.8474933","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474933","url":null,"abstract":"Security has been a major issue since the evolution of mankind. Access control refers to providing access to data only to specified users. In the present time, various mechanisms are used and many policies have been implemented to secure the confidential data. These mechanisms are not always easy to be implemented. Many challenges are met during the execution and various devices have been designed in an ad-hoc fashion to meet the present day requirements. The deployment of these devices and methods in various fields has solved the protection issue to a large extent. This paper represents the SQLIA and XSS attacks, the techniques that are compared to few mechanisms used to restrict unethical access to database, cloud and femtocells that followed in day-to-day life, and the challenges met to obtain them.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130791059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Petite Guide to Programming in 64bit X86 Assembly Language for Linux Linux 64位X86汇编语言编程指南
Vidya Pokale, Madhuri Chavan
since the invention of the personal computers, programmers have used assembly language to create innovative solution for a wide variety of algorithmic challenges. This paper introduces a subset of X64, including NASM (Netwide Assembler), LD-GNU linker, Linux system calls.
自从个人计算机发明以来,程序员已经使用汇编语言为各种各样的算法挑战创造了创新的解决方案。本文介绍了X64的一个子集,包括NASM(全网汇编器)、LD-GNU链接器、Linux系统调用。
{"title":"A Petite Guide to Programming in 64bit X86 Assembly Language for Linux","authors":"Vidya Pokale, Madhuri Chavan","doi":"10.1109/ICECA.2018.8474886","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474886","url":null,"abstract":"since the invention of the personal computers, programmers have used assembly language to create innovative solution for a wide variety of algorithmic challenges. This paper introduces a subset of X64, including NASM (Netwide Assembler), LD-GNU linker, Linux system calls.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure boot of Embedded Applications - A Review 嵌入式应用程序的安全启动综述
R. Rashmi, A. Karthikeyan
Trusted Computing focusses on the security of systems by using hardware-software combination to guarantee security. Although there are various techniques to enhance security, new technological advancements bring in new ways for attackers also to inject their malicious software and infections. The modern world uses all smart devices and systems which includes a network with embedded Operating System, sensors and so on. So security becomes a serious issue not only to system Operating System in personal computers but to all these smart devices. Secure boot is a technique which ensures the only the right Operating System gets booted. This paper analyses the process of secure boot done in each of the applications to protect OS kernel from attackers.
可信计算关注的是系统的安全性,通过软硬件组合来保证系统的安全性。虽然有各种各样的技术来增强安全性,但新的技术进步也为攻击者注入恶意软件和感染带来了新的途径。现代世界使用所有智能设备和系统,包括带有嵌入式操作系统、传感器等的网络。因此,无论是个人电脑的操作系统,还是所有智能设备,安全都是一个严重的问题。安全引导是一种确保只启动正确的操作系统的技术。本文分析了各个应用程序的安全启动过程,以保护操作系统内核免受攻击者的攻击。
{"title":"Secure boot of Embedded Applications - A Review","authors":"R. Rashmi, A. Karthikeyan","doi":"10.1109/ICECA.2018.8474730","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474730","url":null,"abstract":"Trusted Computing focusses on the security of systems by using hardware-software combination to guarantee security. Although there are various techniques to enhance security, new technological advancements bring in new ways for attackers also to inject their malicious software and infections. The modern world uses all smart devices and systems which includes a network with embedded Operating System, sensors and so on. So security becomes a serious issue not only to system Operating System in personal computers but to all these smart devices. Secure boot is a technique which ensures the only the right Operating System gets booted. This paper analyses the process of secure boot done in each of the applications to protect OS kernel from attackers.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127898026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transitions Between Amorphous and Crystalline States Using Electrical Pulse in Tellurium-Based Semiconductor 利用电脉冲在碲基半导体中实现非晶态和晶态的转换
T. Chakraborty
The phase transitions between amorphous and crystalline states by applying electrical pulses in tellurium-based semiconductor at room temperature has been studied in this paper. The memory device was fabricated by a semiconductor thin film of composition GelO Te90 sandwiched between two metal electrodes. Binary states ‘0’ and ‘1’ may be assigned to the high resistive amorphous state and the low resistive crystalline state, respectively. High-speed write and erase operations in the memory device were induced by applying short and long electrical pulses. It was found that for the given write and erase conditions, about 3500 write-erase cycles were attained by the application of electrical pulses. It is observed that the write and erase operations can not be performed for the given write and erase pulses after 3500 number of cycles. The resistivity drop of the amorphous state of the memory device after a number of write-erase cycles is also discussed in this paper.
本文研究了电脉冲作用下碲基半导体在室温下的非晶态和晶态相变。该存储装置是由夹在两个金属电极之间的GelO Te90组成的半导体薄膜制成的。二元态“0”和“1”可分别指定为高阻非晶态和低阻晶态。高速写入和擦除操作是通过施加短脉冲和长脉冲来实现的。结果表明,在给定的写入和擦除条件下,使用电脉冲可实现约3500个写入擦除周期。观察到,对于给定的写和擦除脉冲,在3500个周期后不能执行写和擦除操作。本文还讨论了在多次擦写循环后存储器非晶态电阻率的下降。
{"title":"Transitions Between Amorphous and Crystalline States Using Electrical Pulse in Tellurium-Based Semiconductor","authors":"T. Chakraborty","doi":"10.1109/ICECA.2018.8474622","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474622","url":null,"abstract":"The phase transitions between amorphous and crystalline states by applying electrical pulses in tellurium-based semiconductor at room temperature has been studied in this paper. The memory device was fabricated by a semiconductor thin film of composition GelO Te90 sandwiched between two metal electrodes. Binary states ‘0’ and ‘1’ may be assigned to the high resistive amorphous state and the low resistive crystalline state, respectively. High-speed write and erase operations in the memory device were induced by applying short and long electrical pulses. It was found that for the given write and erase conditions, about 3500 write-erase cycles were attained by the application of electrical pulses. It is observed that the write and erase operations can not be performed for the given write and erase pulses after 3500 number of cycles. The resistivity drop of the amorphous state of the memory device after a number of write-erase cycles is also discussed in this paper.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125610013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Distance Based Reactive Routing Clustering Protocol for Heterogeneous Wireless Sensor Networks 异构无线传感器网络中基于距离的响应路由聚类协议设计
P. Shailaja, A. Karthikeyan
A Wireless Sensor Network consists of sensor nodes which sense, accumulate data and transmit those to the base station. Since these remote sensor nodes in the network are battery constrained, it is important to choose a suitable energy efficient routing protocol to prolong the network lifetime. In this paper we propose a heterogeneous sensitive routing protocol with distance based efficient clustering. We assess the performance of our protocol using MATLAB and compare the results with other protocols namely SEP, ZSEP, TSEP and ETSEP. The simulation outcomes show that the suggested protocol is better than the existing ones as far as the lifetime of the network is concerned.
无线传感器网络由传感器节点组成,这些节点感知、积累数据并将这些数据传输到基站。由于网络中的这些远程传感器节点受到电池的限制,因此选择合适的节能路由协议以延长网络寿命非常重要。本文提出了一种基于距离的高效聚类异构敏感路由协议。我们使用MATLAB对协议的性能进行了评估,并将结果与其他协议(SEP, ZSEP, TSEP和ETSEP)进行了比较。仿真结果表明,就网络生存期而言,所提出的协议优于现有协议。
{"title":"Design of Distance Based Reactive Routing Clustering Protocol for Heterogeneous Wireless Sensor Networks","authors":"P. Shailaja, A. Karthikeyan","doi":"10.1109/ICECA.2018.8474795","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474795","url":null,"abstract":"A Wireless Sensor Network consists of sensor nodes which sense, accumulate data and transmit those to the base station. Since these remote sensor nodes in the network are battery constrained, it is important to choose a suitable energy efficient routing protocol to prolong the network lifetime. In this paper we propose a heterogeneous sensitive routing protocol with distance based efficient clustering. We assess the performance of our protocol using MATLAB and compare the results with other protocols namely SEP, ZSEP, TSEP and ETSEP. The simulation outcomes show that the suggested protocol is better than the existing ones as far as the lifetime of the network is concerned.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Maximum Power Point Algorithms for PV System 光伏系统最大功率点算法研究进展
V. Baghel
To extract the maximum power out of PV array, a low-cost maximum power point tracker (MPPT) introduced at MIT Lincoln Laboratory in 1980. Since then many MPPT algorithms, with many variants on implementation, have been reported. In addition to presenting a comprehensive review on the various MPPT techniques employed for different PV systems, this paper is also envisioned to act as a quick reference for a few popular MPPT algorithms.
为了从光伏阵列中提取最大功率,麻省理工学院林肯实验室于1980年推出了一种低成本的最大功率点跟踪器(MPPT)。从那时起,许多MPPT算法,与许多变体的实现,已被报道。除了对不同光伏系统中使用的各种MPPT技术进行全面回顾外,本文还设想为一些流行的MPPT算法提供快速参考。
{"title":"A Survey on Maximum Power Point Algorithms for PV System","authors":"V. Baghel","doi":"10.1109/ICECA.2018.8474644","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474644","url":null,"abstract":"To extract the maximum power out of PV array, a low-cost maximum power point tracker (MPPT) introduced at MIT Lincoln Laboratory in 1980. Since then many MPPT algorithms, with many variants on implementation, have been reported. In addition to presenting a comprehensive review on the various MPPT techniques employed for different PV systems, this paper is also envisioned to act as a quick reference for a few popular MPPT algorithms.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122277869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of VM Live Migration Strategies and Technologies 虚拟机热迁移策略和技术概述
Krushi Damania, Shraddha Holmukhe, Videet Singhai, P. Bhavathankar
Cloud computing is an effective technology in handling computation with dynamically scalable resources. With the growth of multimedia applications, mobile applications have become resource-intensive. To provide better connectivity with the cloud, cloudlets have been introduced, which in turns provide low latency and high bandwidth. Cloudlets also enable us to optimize Virtual Machine Migration amongst them. In this paper, we discuss the Live migration of Virtual machines, various types of live migration with respect to strategies supplemented with storage technologies; NFS and GlusterFS. An overview of migration in cloudlets and Fog computing architecture are elucidated.
云计算是处理具有动态可扩展资源的计算的一种有效技术。随着多媒体应用的发展,移动应用已经成为资源密集型应用。为了提供与云的更好连接,引入了cloudlets,它反过来提供低延迟和高带宽。Cloudlets还使我们能够在它们之间优化虚拟机迁移。在本文中,我们讨论了虚拟机的实时迁移,各种类型的实时迁移与存储技术相辅相成的策略;NFS和GlusterFS。概述了云环境中的迁移和雾计算体系结构。
{"title":"An Overview of VM Live Migration Strategies and Technologies","authors":"Krushi Damania, Shraddha Holmukhe, Videet Singhai, P. Bhavathankar","doi":"10.1109/ICECA.2018.8474910","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474910","url":null,"abstract":"Cloud computing is an effective technology in handling computation with dynamically scalable resources. With the growth of multimedia applications, mobile applications have become resource-intensive. To provide better connectivity with the cloud, cloudlets have been introduced, which in turns provide low latency and high bandwidth. Cloudlets also enable us to optimize Virtual Machine Migration amongst them. In this paper, we discuss the Live migration of Virtual machines, various types of live migration with respect to strategies supplemented with storage technologies; NFS and GlusterFS. An overview of migration in cloudlets and Fog computing architecture are elucidated.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116130460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Code Generator for Model- Driven Software Development Using UML Models 使用UML模型的模型驱动软件开发代码生成器
Molla Kindie Shiferaw, A. Jena
Models are the most important core of Science, Technology and Designing. Display based ways to deal with software advancement and system building utilize technology to incorporate graphical demonstrating languages. Model driven software development is an approach of using models to automatically create the source code implementation of a software structure. The Model Driven Architecture (MDA) approach has been getting position as the Model Driven Approach of an option since its use of Unified Modeling Language(UML). The MDA solution is to produce all code of a system from models and give attention to maintaining models merely in the software development. But, due to shortage of code production tools and the UML language itself, an accurate MDA does not understand by developers. The critical proposal is to identify system functionality with a Platform Independent Model and next to convert this model into Platform Specific Models and completely generate executable source code from model. Model conversion creates the most important component of MDA approach. Generating models and source code from other models by using MDA technology tools is the key standard of MDA approach. Therefore, manual conversion is an extremely time and other resource consuming work in software development. This paper describes not only generating code from model but also generates model from code or it also describes reverse engineering(Code-Model conversion). Keywords: Model-Driven, Code Generator, Model, Software Development, UML, MDA, platform, Model Transformation.
模型是科学、技术和设计最重要的核心。基于显示的方法处理软件开发和系统构建利用技术结合图形演示语言。模型驱动的软件开发是一种使用模型自动创建软件结构的源代码实现的方法。自从使用统一建模语言(UML)以来,模型驱动体系结构(MDA)方法已经成为模型驱动方法的一种选择。MDA解决方案是从模型中生成系统的所有代码,并且只在软件开发中关注模型的维护。但是,由于缺乏代码生产工具和UML语言本身,开发人员无法理解准确的MDA。关键的建议是使用平台独立模型来识别系统功能,然后将该模型转换为平台特定模型,并从模型中完全生成可执行的源代码。模型转换创建了MDA方法中最重要的组件。利用MDA技术工具从其他模型生成模型和源代码是MDA方法的关键标准。因此,在软件开发中,手工转换是一项极其耗时和消耗其他资源的工作。本文不仅描述了从模型生成代码,而且还描述了从代码生成模型或逆向工程(代码-模型转换)。关键词:模型驱动,代码生成器,模型,软件开发,UML, MDA,平台,模型转换。
{"title":"Code Generator for Model- Driven Software Development Using UML Models","authors":"Molla Kindie Shiferaw, A. Jena","doi":"10.1109/ICECA.2018.8474690","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474690","url":null,"abstract":"Models are the most important core of Science, Technology and Designing. Display based ways to deal with software advancement and system building utilize technology to incorporate graphical demonstrating languages. Model driven software development is an approach of using models to automatically create the source code implementation of a software structure. The Model Driven Architecture (MDA) approach has been getting position as the Model Driven Approach of an option since its use of Unified Modeling Language(UML). The MDA solution is to produce all code of a system from models and give attention to maintaining models merely in the software development. But, due to shortage of code production tools and the UML language itself, an accurate MDA does not understand by developers. The critical proposal is to identify system functionality with a Platform Independent Model and next to convert this model into Platform Specific Models and completely generate executable source code from model. Model conversion creates the most important component of MDA approach. Generating models and source code from other models by using MDA technology tools is the key standard of MDA approach. Therefore, manual conversion is an extremely time and other resource consuming work in software development. This paper describes not only generating code from model but also generates model from code or it also describes reverse engineering(Code-Model conversion). Keywords: Model-Driven, Code Generator, Model, Software Development, UML, MDA, platform, Model Transformation.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Approach for Segmentation and Detection of Brain Tumor in 3D Brain MR Imaging 三维脑磁共振成像中脑肿瘤分割与检测的新方法
Dr. A. Jagan
Segmentation of brain MR Images plays prime role for measuring and visualizing the brain anatomical structures, analyzing brain tumors, and surgical planning. In the comparable research, outcomes were demonstrated the segmentation and detection of tumor in 2D Brain MR Images by amalgamation of diverse methods and techniques. Conversely, the precise outcomes were not been exhibited in the related researches works for the segmentation and detection of tumor in 3D Brain MR Images. As a result, this proposed work focused on development of an automatic integrated segmentation Frameworkfor detection of tumor in brain 3D MR Images which incorporate the most established improved EM (Expectation Maximization) method and Fuzzy C Means Clustering method. The proposed framework optimally merges the segmentation results of most established method and it exhibits the improvement in brain MR image segmentation. The most popular an anisotropic filter is employed to the improved EM (Expectation Maximization), Fuzzy C Means Clustering Method and Proposed Augmentation Method to improve the quality brain MR image and to produce better segmentation and detection of tumor. The performance results of proposed framework is evaluated on simulated brain Fluid-Attenuated Inversion Recovery MRI images and real brain dataset. The performance results of the proposed research work present superior results than the state-of-the-art methods and the proposed work is quantified with segmentation accuracy, sensitivity and specificity.
脑磁共振图像分割在脑解剖结构测量和可视化、脑肿瘤分析和手术计划中起着重要作用。在比较研究中,通过多种方法和技术的融合,证明了二维脑MR图像中肿瘤的分割和检测结果。相反,在3D脑MR图像中对肿瘤的分割和检测的相关研究工作中,没有显示出精确的结果。因此,本研究的重点是开发一种用于脑三维磁共振图像中肿瘤检测的自动集成分割框架,该框架结合了最成熟的改进EM(期望最大化)方法和模糊C均值聚类方法。该框架最优地融合了大多数现有方法的分割结果,在脑磁共振图像分割方面有明显的提高。将最流行的各向异性滤波器应用于改进的期望最大化法、模糊C均值聚类法和提议增强法,以提高脑MR图像的质量,更好地对肿瘤进行分割和检测。在模拟脑液衰减反演恢复MRI图像和真实脑数据集上对该框架的性能结果进行了评估。所提出的研究工作的性能结果优于最先进的方法,所提出的工作是量化的分割准确性,灵敏度和特异性。
{"title":"A New Approach for Segmentation and Detection of Brain Tumor in 3D Brain MR Imaging","authors":"Dr. A. Jagan","doi":"10.1109/ICECA.2018.8474874","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474874","url":null,"abstract":"Segmentation of brain MR Images plays prime role for measuring and visualizing the brain anatomical structures, analyzing brain tumors, and surgical planning. In the comparable research, outcomes were demonstrated the segmentation and detection of tumor in 2D Brain MR Images by amalgamation of diverse methods and techniques. Conversely, the precise outcomes were not been exhibited in the related researches works for the segmentation and detection of tumor in 3D Brain MR Images. As a result, this proposed work focused on development of an automatic integrated segmentation Frameworkfor detection of tumor in brain 3D MR Images which incorporate the most established improved EM (Expectation Maximization) method and Fuzzy C Means Clustering method. The proposed framework optimally merges the segmentation results of most established method and it exhibits the improvement in brain MR image segmentation. The most popular an anisotropic filter is employed to the improved EM (Expectation Maximization), Fuzzy C Means Clustering Method and Proposed Augmentation Method to improve the quality brain MR image and to produce better segmentation and detection of tumor. The performance results of proposed framework is evaluated on simulated brain Fluid-Attenuated Inversion Recovery MRI images and real brain dataset. The performance results of the proposed research work present superior results than the state-of-the-art methods and the proposed work is quantified with segmentation accuracy, sensitivity and specificity.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124897000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Discover Cross-Modal Human Behavior Analysis 发现跨模式人类行为分析
Pravin Tripathi, Pratik P. Watwani, S. Thakur, A. Shaw, S. Sengupta
Job interviews are a predominant part of any hiring process to evaluate applicants. It is used to evaluate applicant's knowledge, skills, abilities, and behavior in order to select the most suited person for the job. Recruiters make their opinion, on the basis of both verbal and nonverbal communication of an interviewee. Our behavior and communication in daily life are cross-modal in nature. Facial expression, hand gestures and body postures are closely linked to speech and hence enrich the vocal content. Nonverbal communication plays an important role in what we are saying and what we actually mean to say. It carries relevant information that can reveal social construct of a person as diverse as his personality, state of mind, or job interview outcome; they convey information in parallel to our speech. In this paper, we present an automated, predictive expert system framework for the computational analysis of HR Job interviews. The system includes analysis of facial expression, language and prosodic details of the interviewees and thereby quantifies their verbal and nonverbal behavior. The system predicts the rating on the overall performance of the interviewee and on each behavior traits and hence predict their personality and hireability.
工作面试是任何招聘过程中评估应聘者的主要部分。它用来评估申请人的知识、技能、能力和行为,以便选择最适合工作的人。招聘人员根据面试者的语言和非语言交流来做出他们的意见。我们在日常生活中的行为和交流本质上是跨模式的。面部表情、手势和身体姿势与言语密切相关,从而丰富了言语的内容。非语言交际在我们所说的话和我们真正想说的话中起着重要的作用。它携带的相关信息可以揭示一个人的社会结构,如他的个性、心理状态或面试结果;它们在我们讲话的同时也传递着信息。在本文中,我们提出了一个自动化的预测专家系统框架,用于人力资源求职面试的计算分析。该系统包括对受访者面部表情、语言和韵律细节的分析,从而量化他们的语言和非语言行为。该系统预测对受访者的整体表现和每个行为特征的评级,从而预测他们的个性和可雇佣性。
{"title":"Discover Cross-Modal Human Behavior Analysis","authors":"Pravin Tripathi, Pratik P. Watwani, S. Thakur, A. Shaw, S. Sengupta","doi":"10.1109/ICECA.2018.8474611","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474611","url":null,"abstract":"Job interviews are a predominant part of any hiring process to evaluate applicants. It is used to evaluate applicant's knowledge, skills, abilities, and behavior in order to select the most suited person for the job. Recruiters make their opinion, on the basis of both verbal and nonverbal communication of an interviewee. Our behavior and communication in daily life are cross-modal in nature. Facial expression, hand gestures and body postures are closely linked to speech and hence enrich the vocal content. Nonverbal communication plays an important role in what we are saying and what we actually mean to say. It carries relevant information that can reveal social construct of a person as diverse as his personality, state of mind, or job interview outcome; they convey information in parallel to our speech. In this paper, we present an automated, predictive expert system framework for the computational analysis of HR Job interviews. The system includes analysis of facial expression, language and prosodic details of the interviewees and thereby quantifies their verbal and nonverbal behavior. The system predicts the rating on the overall performance of the interviewee and on each behavior traits and hence predict their personality and hireability.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116563931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1