Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416805
S. Thirukumaran, A. Sumathi
Missing data in Medical database is an issue which makes lose of data integrity, solution for missing value is imputing the relevant value for every missing value(here data and value takes same meaning) it is the scope of imputation and it gives the data integrity. According to the title so many imputation Techniques available. This paper aims to describe the depth survey of types of imputation techniques and which is categorized in the form of table with the attributes like Technique, Description, when to be used, Advantages, disadvantages, Almost different imputation Techniques ideas were exposed in this paper after detailed study. After feasible study here we exposed the concept to improve the imputation technique more worthy than other techniques that Clustering imputation Algorithm proposed which reduce the error rate of imputed value for missing data into Medical database and makes the imputation perfect to the maximum level. And the results elaborates the reduced error rate for dataset of 786 samples with 8 features.
{"title":"Missing value imputation techniques depth survey and an imputation Algorithm to improve the efficiency of imputation","authors":"S. Thirukumaran, A. Sumathi","doi":"10.1109/ICOAC.2012.6416805","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416805","url":null,"abstract":"Missing data in Medical database is an issue which makes lose of data integrity, solution for missing value is imputing the relevant value for every missing value(here data and value takes same meaning) it is the scope of imputation and it gives the data integrity. According to the title so many imputation Techniques available. This paper aims to describe the depth survey of types of imputation techniques and which is categorized in the form of table with the attributes like Technique, Description, when to be used, Advantages, disadvantages, Almost different imputation Techniques ideas were exposed in this paper after detailed study. After feasible study here we exposed the concept to improve the imputation technique more worthy than other techniques that Clustering imputation Algorithm proposed which reduce the error rate of imputed value for missing data into Medical database and makes the imputation perfect to the maximum level. And the results elaborates the reduced error rate for dataset of 786 samples with 8 features.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121605094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416796
S. Nirmala, R. Nallusamy
The development of a reliable and energy-efficient protocol stack is important for supporting various WSNs applications. The penalty is increased complexity of the central node. This is a major problem because the central node is expected to have significantly more power and processing resources. On the distributed case, the coordinator (Distributed Coordination Function) only sends the active nodes to the sensors to keep the reliability and consumes less energy. As a result of this analysis, distributed mechanisms for QoS in WSNs built which extend wide area applications. This paper presents an energy-efficient aware of MAC application specific protocol with enhanced, integrated type in the distributed environment. Let to study the significant procedures for energy reduction compared to the available MAC protocols by cluster head election schemes as per the coverage issues. Most specifically, the cross-layer effects of routing, medium access, physical layers are considered. The proposal concentrates to point out and identifies the key problems of distributed MAC algorithm such as SLCH and MLCH election schemes focus towards the energy-efficiency designed for Wireless Sensor Networks (WSNs) with lemmas and theorems along with coverage strategies.
{"title":"“An energy-efficient and enhanced QoS aware of MAC application specific protocol in the distributed Wireless Sensor Networks”","authors":"S. Nirmala, R. Nallusamy","doi":"10.1109/ICOAC.2012.6416796","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416796","url":null,"abstract":"The development of a reliable and energy-efficient protocol stack is important for supporting various WSNs applications. The penalty is increased complexity of the central node. This is a major problem because the central node is expected to have significantly more power and processing resources. On the distributed case, the coordinator (Distributed Coordination Function) only sends the active nodes to the sensors to keep the reliability and consumes less energy. As a result of this analysis, distributed mechanisms for QoS in WSNs built which extend wide area applications. This paper presents an energy-efficient aware of MAC application specific protocol with enhanced, integrated type in the distributed environment. Let to study the significant procedures for energy reduction compared to the available MAC protocols by cluster head election schemes as per the coverage issues. Most specifically, the cross-layer effects of routing, medium access, physical layers are considered. The proposal concentrates to point out and identifies the key problems of distributed MAC algorithm such as SLCH and MLCH election schemes focus towards the energy-efficiency designed for Wireless Sensor Networks (WSNs) with lemmas and theorems along with coverage strategies.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416863
C. Arunachalaperumal, S. D. Kumar, C. Arun
Spatial modulation is a transmission technique that uses multiple antennas. It involves mapping of a block of information bits to two information carrying units, as a symbol chosen from constellation diagram and a unique transmit antenna number. The importance of Spatial modulation is that it increases overall spectral efficiency. In this paper we show the performance comparison of MIMO using Trellis Coded Spatial modulation, Space Time Block Coded Spatial modulation and New Trellis Coded Spatial modulation. And performance of each coding systems yields slightly different values. TCM concept is utilized to combat performance degradation of Spatial modulation in correlated channel conditions. Whereas the STBC-SM scheme is useful for high-rate, low complexity, emerging wireless communication systems such as LTE and WiMAX. The New SM-TC scheme offers significant error performance improvements over alternatives while having a lower decoding complexity for 2, 3, and 4 bits/s/Hz transmissions.
{"title":"A comparative study of the performance of precoded MIMO using Trellis and STBC","authors":"C. Arunachalaperumal, S. D. Kumar, C. Arun","doi":"10.1109/ICOAC.2012.6416863","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416863","url":null,"abstract":"Spatial modulation is a transmission technique that uses multiple antennas. It involves mapping of a block of information bits to two information carrying units, as a symbol chosen from constellation diagram and a unique transmit antenna number. The importance of Spatial modulation is that it increases overall spectral efficiency. In this paper we show the performance comparison of MIMO using Trellis Coded Spatial modulation, Space Time Block Coded Spatial modulation and New Trellis Coded Spatial modulation. And performance of each coding systems yields slightly different values. TCM concept is utilized to combat performance degradation of Spatial modulation in correlated channel conditions. Whereas the STBC-SM scheme is useful for high-rate, low complexity, emerging wireless communication systems such as LTE and WiMAX. The New SM-TC scheme offers significant error performance improvements over alternatives while having a lower decoding complexity for 2, 3, and 4 bits/s/Hz transmissions.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416835
Shanmugam Sridevi
A novel method for managing and treating physical and psychological pain is the need of the hour. Although cybertherapy is at its development stage, a great potential can be reaped when it is moulded in the right way. Clinical virtual reality is found to be a promising way of distracting the patients from sensing the pain during medical procedures, physical rehabilitation or post-traumatic stress. There exists no single pain management methodology that is good for everyone, or even the majority of people. Research findings prove that pain has many causes and courses, and can impact individuals in a multitude of ways including the behavioral, physiological, emotional, psychological, social and spiritual levels. Though distraction through audio visual aids has a significant effect in decreasing the intensity of pain signals in the brain, the analgesic efficacy has to be well researched and improved. The perception of pain varies with factors such as age, ethnicity, sex and genetics. Increased nervousness of patients in virtual world, patients' confidentiality, subjectivity in effectiveness on individuals, array of pains to be handled with a single virtual platform and cost are the major barriers to be tackled. This paper discusses ways of providing such generic, acceptable and proven methods of cybertherapy. Such virtually painless world shall be greatly achieved only with close cooperation between technologists and medical experts.
{"title":"Immersive virtual reality for pain distraction methodologies and barriers","authors":"Shanmugam Sridevi","doi":"10.1109/ICOAC.2012.6416835","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416835","url":null,"abstract":"A novel method for managing and treating physical and psychological pain is the need of the hour. Although cybertherapy is at its development stage, a great potential can be reaped when it is moulded in the right way. Clinical virtual reality is found to be a promising way of distracting the patients from sensing the pain during medical procedures, physical rehabilitation or post-traumatic stress. There exists no single pain management methodology that is good for everyone, or even the majority of people. Research findings prove that pain has many causes and courses, and can impact individuals in a multitude of ways including the behavioral, physiological, emotional, psychological, social and spiritual levels. Though distraction through audio visual aids has a significant effect in decreasing the intensity of pain signals in the brain, the analgesic efficacy has to be well researched and improved. The perception of pain varies with factors such as age, ethnicity, sex and genetics. Increased nervousness of patients in virtual world, patients' confidentiality, subjectivity in effectiveness on individuals, array of pains to be handled with a single virtual platform and cost are the major barriers to be tackled. This paper discusses ways of providing such generic, acceptable and proven methods of cybertherapy. Such virtually painless world shall be greatly achieved only with close cooperation between technologists and medical experts.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416823
P. Vijayalakshmi, M. Sumathi
Design of an algorithm for vehicle identification by recognizing the number plate is presented. This new vehicle identification technique consists of vehicle detection, plate localization and character recognition. Here, Genetic algorithm (GA) is employed at two levels: for detecting vehicle from traffic image and recognizing character from the number plate. Detection is based on contour and shape information. GA controls the window size to capture each vehicle in a separate widow. Connectivity and adjacency concepts are used to locate and extract number plate and its characters. A digital board (DB) with window panes is introduced to recognize each character uniquely. GA is adopted at the second level to map character pixels into the window panes as lines. For each character in the number plate, distinct feature vector is computed. Finally, a feature based matching is adopted for character recognition. Experiments have been conducted with images taken from various scenes and conditions and the detection rate is found to be 92.5 %. Experiments have conducted for recognition with LPR images taken at different conditions and the recognition rate is found to be 91 %. Detection time is linear function of number of objects in the input image. Potential applications include provisioning of vehicle parking facilities and campus security system for permitting authorized vehicles into the premises.
{"title":"Design of algorithm for vehicle identification by number plate recognition","authors":"P. Vijayalakshmi, M. Sumathi","doi":"10.1109/ICOAC.2012.6416823","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416823","url":null,"abstract":"Design of an algorithm for vehicle identification by recognizing the number plate is presented. This new vehicle identification technique consists of vehicle detection, plate localization and character recognition. Here, Genetic algorithm (GA) is employed at two levels: for detecting vehicle from traffic image and recognizing character from the number plate. Detection is based on contour and shape information. GA controls the window size to capture each vehicle in a separate widow. Connectivity and adjacency concepts are used to locate and extract number plate and its characters. A digital board (DB) with window panes is introduced to recognize each character uniquely. GA is adopted at the second level to map character pixels into the window panes as lines. For each character in the number plate, distinct feature vector is computed. Finally, a feature based matching is adopted for character recognition. Experiments have been conducted with images taken from various scenes and conditions and the detection rate is found to be 92.5 %. Experiments have conducted for recognition with LPR images taken at different conditions and the recognition rate is found to be 91 %. Detection time is linear function of number of objects in the input image. Potential applications include provisioning of vehicle parking facilities and campus security system for permitting authorized vehicles into the premises.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129459387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416802
B. T. Krishna, S. S. Rao
This paper deals with the design and applications of digital differentiators. For real time applications it is mandatory that a differentiator should have as small an order as possible. Different procedures available for the design of FIR and IIR type digital differentiators are presented. The IIR Type digital differentiators are obtained by inversion and magnitude stabilization of the existing digital integrators. In some applications like controls, waveshaping, oscillators and communications require a constant 90° phase for differentiators. In this paper an attempt is made to study about the variation of phase angle of digital differentiators with the application of fractional delay. The use of digital differentiators for the detection of edges in an image, QRS detection in an ECG signal is illustrated. It has been observed that the digital differentiators have shown superior performance compared to the well known gradient method. With the proven efficiency of the differentiators in various applications, they have been implemented in hardware using Verilog.
{"title":"On design and applications of digital differentiators","authors":"B. T. Krishna, S. S. Rao","doi":"10.1109/ICOAC.2012.6416802","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416802","url":null,"abstract":"This paper deals with the design and applications of digital differentiators. For real time applications it is mandatory that a differentiator should have as small an order as possible. Different procedures available for the design of FIR and IIR type digital differentiators are presented. The IIR Type digital differentiators are obtained by inversion and magnitude stabilization of the existing digital integrators. In some applications like controls, waveshaping, oscillators and communications require a constant 90° phase for differentiators. In this paper an attempt is made to study about the variation of phase angle of digital differentiators with the application of fractional delay. The use of digital differentiators for the detection of edges in an image, QRS detection in an ECG signal is illustrated. It has been observed that the digital differentiators have shown superior performance compared to the well known gradient method. With the proven efficiency of the differentiators in various applications, they have been implemented in hardware using Verilog.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416836
M. L. Kantham
In order to provide the user's quality of service, the service level agreement between the customers and providers should be satisfied. However the resources available in a single datacenter are limited. Thus if a large demand is observed in a given time, a cloud provider is not able to deliver a uniform QoS. To avoid this scenario, I enable the application to scale it across multiple independent cloud datacenters by forming federated clouds. In such a case, from the customer's point of view it is always difficult to decide whose resources they should use. To handle this case a ranking mechanism is proposed which measures the quality and prioritize the cloud resources. In this work I propose a framework and mechanism for coordinator based advance reservation and ranking of cloud resources which allows the users to book resource in advance. Advance reservation provides guaranteed delivery of resources to the right customers at the right time.
{"title":"Coordinator based advanced reservation and ranking for cloud resources","authors":"M. L. Kantham","doi":"10.1109/ICOAC.2012.6416836","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416836","url":null,"abstract":"In order to provide the user's quality of service, the service level agreement between the customers and providers should be satisfied. However the resources available in a single datacenter are limited. Thus if a large demand is observed in a given time, a cloud provider is not able to deliver a uniform QoS. To avoid this scenario, I enable the application to scale it across multiple independent cloud datacenters by forming federated clouds. In such a case, from the customer's point of view it is always difficult to decide whose resources they should use. To handle this case a ranking mechanism is proposed which measures the quality and prioritize the cloud resources. In this work I propose a framework and mechanism for coordinator based advance reservation and ranking of cloud resources which allows the users to book resource in advance. Advance reservation provides guaranteed delivery of resources to the right customers at the right time.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124641485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416837
A. Pravin, S. Srinivasan
The larger size and complexity of software source code builds many challenges in bug detection. Data mining based bug detection methods eliminate the bugs present in software source code effectively. Rule violation and copy paste related defects are the most concerns for bug detection system. Traditional data mining approaches such as frequent Itemset mining and frequent sequence mining are relatively good but they are lacking in accuracy and pattern recognition. Neural networks have emerged as advanced data mining tools in cases where other techniques may not produce satisfactory predictive models. The neural network is trained for possible set of errors that could be present in software source code. From the training data the neural network learns how to predict the correct output. The processing elements of neural networks are associated with weights which are adjusted during the training period.
{"title":"An efficient programming rule extraction and detection of violations in software source code using neural networks","authors":"A. Pravin, S. Srinivasan","doi":"10.1109/ICOAC.2012.6416837","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416837","url":null,"abstract":"The larger size and complexity of software source code builds many challenges in bug detection. Data mining based bug detection methods eliminate the bugs present in software source code effectively. Rule violation and copy paste related defects are the most concerns for bug detection system. Traditional data mining approaches such as frequent Itemset mining and frequent sequence mining are relatively good but they are lacking in accuracy and pattern recognition. Neural networks have emerged as advanced data mining tools in cases where other techniques may not produce satisfactory predictive models. The neural network is trained for possible set of errors that could be present in software source code. From the training data the neural network learns how to predict the correct output. The processing elements of neural networks are associated with weights which are adjusted during the training period.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416865
T. Somasundaram, V. Prabha, M. Arumugam
The following topics are dealt with: ad hoc & sensor networks; agent based systems; autonomous computing; body area network; cloud computing; cluster computing; compiler optimizations; data mining; digital image computing; distributed databases; e-learning; e-commerce; e-governance; green IT; grid computing; image processing; intelligent agents; knowledge management; theoretical computer science; virtualization; machine learning; mobile computing; multicore architecture; multimedia streaming; natural language processing; network security; network management; neural networks; parallel computing; pattern recognition; pervasive computing; power aware computing; semantic Web; service oriented architecture; soft computing; software architecture; social computing; storage management; ubiquitous computing; and Web intelligence.
处理以下主题:ad hoc &传感器网络;基于代理的系统;自主计算;体域网络;云计算;集群计算;编译器优化;数据挖掘;数字图像计算;分布式数据库;在线学习;电子商务;电子政务;绿色;网格计算;图像处理;智能代理;知识管理;理论计算机科学;虚拟化;机器学习;移动计算;多核架构;多媒体流;自然语言处理;网络安全;网络管理;神经网络;并行计算;模式识别;普适计算;功率感知计算;语义网;面向服务的体系结构;软计算;软件架构;社会计算;存储管理;无处不在的计算;以及网络智能。
{"title":"Scalability issues in cloud computing","authors":"T. Somasundaram, V. Prabha, M. Arumugam","doi":"10.1109/ICOAC.2012.6416865","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416865","url":null,"abstract":"The following topics are dealt with: ad hoc & sensor networks; agent based systems; autonomous computing; body area network; cloud computing; cluster computing; compiler optimizations; data mining; digital image computing; distributed databases; e-learning; e-commerce; e-governance; green IT; grid computing; image processing; intelligent agents; knowledge management; theoretical computer science; virtualization; machine learning; mobile computing; multicore architecture; multimedia streaming; natural language processing; network security; network management; neural networks; parallel computing; pattern recognition; pervasive computing; power aware computing; semantic Web; service oriented architecture; soft computing; software architecture; social computing; storage management; ubiquitous computing; and Web intelligence.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127557307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416814
J. A. Rubella, M. Suganya, K. Senathipathi, B. Kumar, K. R. Gowdham, M. Ranjithkumar
Driving license system is a very difficult task for the government to monitor. In this project, all the citizens' images will scan and recorded. Whenever a citizen crosses the traffic rules, the police can scan his image and can collect penalty / fine from the defaulter. Using this method, the police can track the history of the driver. This biometric based driving license monitoring system is very easy and convenient to monitor. According ancient Greek scripts BIOMETRICS means study of life. Biometrics studies commonly include fingerprint, face, iris, voice, signature, and hand geometry recognition and verification. Many other modalities are in various stages of development and assessment. Among these available biometric traits Finger Print proves to be one of the best traits providing good mismatch ratio and also reliable. Registering the attendances of students has become a hectic work as sometimes their attendance may be registered or missed. To overcome this problem i.e. to get the attendances registered perfectly we are taking the help of two different technologies viz. EMBEDDED SYSTEMS and BIOMETRICS.
{"title":"Fingerprint based license checking for auto-mobiles","authors":"J. A. Rubella, M. Suganya, K. Senathipathi, B. Kumar, K. R. Gowdham, M. Ranjithkumar","doi":"10.1109/ICOAC.2012.6416814","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416814","url":null,"abstract":"Driving license system is a very difficult task for the government to monitor. In this project, all the citizens' images will scan and recorded. Whenever a citizen crosses the traffic rules, the police can scan his image and can collect penalty / fine from the defaulter. Using this method, the police can track the history of the driver. This biometric based driving license monitoring system is very easy and convenient to monitor. According ancient Greek scripts BIOMETRICS means study of life. Biometrics studies commonly include fingerprint, face, iris, voice, signature, and hand geometry recognition and verification. Many other modalities are in various stages of development and assessment. Among these available biometric traits Finger Print proves to be one of the best traits providing good mismatch ratio and also reliable. Registering the attendances of students has become a hectic work as sometimes their attendance may be registered or missed. To overcome this problem i.e. to get the attendances registered perfectly we are taking the help of two different technologies viz. EMBEDDED SYSTEMS and BIOMETRICS.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133602712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}