Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297649
Akshat Jain, Kunal Bavikar, A. Sanjay, Manan Gupta, B. Ramesh Gupta, H. Dineshkumar
Urban Air Mobility (UAM) is a long-desired service which will revolutionize the present transportation facilities, by introducing air mobility for on-demand aviation. Due to the continuous increase in population, road traffic is increasing at alarming rates and the problem of congestion is also increasing in metro cities. These new services will provide improved ways for individuals to go around urban communities and urban territories while decreasing blockage. eVTOLs are aircraft that are capable of Vertical Take-off and Landing (VTOL) with no requirement of run-up space and are tremendously getting popular when it comes to UAM due to the important factor of clean propulsion with zero-emission. The industry is rapidly proposing and adopting new vehicle concepts to meet consumer demands and hence conceptually designing these vehicles with basic guidelines will set a preliminary foundation for more innovative technologies to come. This research work sets a baseline procedure and an initial iteration example for the industries and upcoming companies in this sector hence focuses on the Conceptual designing of eVTOLs. The novelty of the presented work lies in enhanced eVTOL configuration using coaxial ducted tilt rotors with wings.
{"title":"Baseline procedure for conceptual designing of an eVTOL for Urban Air Mobility","authors":"Akshat Jain, Kunal Bavikar, A. Sanjay, Manan Gupta, B. Ramesh Gupta, H. Dineshkumar","doi":"10.1109/ICECA49313.2020.9297649","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297649","url":null,"abstract":"Urban Air Mobility (UAM) is a long-desired service which will revolutionize the present transportation facilities, by introducing air mobility for on-demand aviation. Due to the continuous increase in population, road traffic is increasing at alarming rates and the problem of congestion is also increasing in metro cities. These new services will provide improved ways for individuals to go around urban communities and urban territories while decreasing blockage. eVTOLs are aircraft that are capable of Vertical Take-off and Landing (VTOL) with no requirement of run-up space and are tremendously getting popular when it comes to UAM due to the important factor of clean propulsion with zero-emission. The industry is rapidly proposing and adopting new vehicle concepts to meet consumer demands and hence conceptually designing these vehicles with basic guidelines will set a preliminary foundation for more innovative technologies to come. This research work sets a baseline procedure and an initial iteration example for the industries and upcoming companies in this sector hence focuses on the Conceptual designing of eVTOLs. The novelty of the presented work lies in enhanced eVTOL configuration using coaxial ducted tilt rotors with wings.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123964911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297371
Vivek Kuchibhotla, P. Harshitha, Divitha Elugoti
In this paper, the situation of long term non-availability of arms in combinatorial sleeping bandits problem is analyzed. The multi-arm sleeping bandit’s model along with fairness constraint is very widely used to model real world examples like a network switch. One common occurrence in such a scenario is long term non-availability. In such cases the queue length (in the Queuing techniques) grows rapidly causing system instability. The algorithm proposed in this paper deals with this problem and still maintain the regret bounds along with the queue fairness constraints. A better way of estimating the fairness that takes into account the long term non-availability of arms is also proposed. Extension of the UCB algorithm is used to deal with the exploration versus exploitation dilemma. Mathematical proofs for arriving at the regret bounds and feasibility optimality is given in the end.
{"title":"Combinatorial Sleeping Bandits with Fairness Constraints and Long-Term Non-Availability of Arms","authors":"Vivek Kuchibhotla, P. Harshitha, Divitha Elugoti","doi":"10.1109/ICECA49313.2020.9297371","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297371","url":null,"abstract":"In this paper, the situation of long term non-availability of arms in combinatorial sleeping bandits problem is analyzed. The multi-arm sleeping bandit’s model along with fairness constraint is very widely used to model real world examples like a network switch. One common occurrence in such a scenario is long term non-availability. In such cases the queue length (in the Queuing techniques) grows rapidly causing system instability. The algorithm proposed in this paper deals with this problem and still maintain the regret bounds along with the queue fairness constraints. A better way of estimating the fairness that takes into account the long term non-availability of arms is also proposed. Extension of the UCB algorithm is used to deal with the exploration versus exploitation dilemma. Mathematical proofs for arriving at the regret bounds and feasibility optimality is given in the end.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123353461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297610
Nitesh kumar Sharma, Deepesh Kumar Gautam, M. R. Khan
Innovative Students analyzing the applications of robots want to have each experimental and theoretical understanding in a selection of regions. Those regions embody perception sensors, three-d area, transforms among organize frames, and deciphering factor-cloud data. An outstanding device for them to acquire the critical factor is a collaborating show display screen. The human-system interface makes the challenge rely greater on the motion. At present, 3-D sensor is used typically via the robotics neighborhood (kinectv2). This sensor is positioned above the display and turned around with a purpose to experience human workout in the front of the display. A design proposal is detected in the nearest object interior to the front of the screen. To strive this, college students need to compute the extensively alternate of the coordinate body of the sensor and body of the display. Several strategies are applied to execute this process successfully. One in each and every usage of the aruco markers, they favor to devise and verify imperative mathematical technique and take a look at their answer. Subsequently, they look at to work with factor-cloud information. They choose to flip out to be conscious of the nearest man or female reputation subsequent in the front of the screen. They may additionally be capable to gain this through calculating the plane equation of the ground in mixture with inferring the records from the component of view of the coordinate body of the screen. The thresholding operations which are interior to the scanned factor-cloud are studied. Finally, an algorithm is developed for the interplay between the segmented character and the show screen. Completing this challenge represents university and college students can analyze data for higher modern robotics’ programs, on the whole inside the concern of the Human-Robotic Interaction (HRD.
{"title":"Computer Vision based use of Robotics for Teaching","authors":"Nitesh kumar Sharma, Deepesh Kumar Gautam, M. R. Khan","doi":"10.1109/ICECA49313.2020.9297610","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297610","url":null,"abstract":"Innovative Students analyzing the applications of robots want to have each experimental and theoretical understanding in a selection of regions. Those regions embody perception sensors, three-d area, transforms among organize frames, and deciphering factor-cloud data. An outstanding device for them to acquire the critical factor is a collaborating show display screen. The human-system interface makes the challenge rely greater on the motion. At present, 3-D sensor is used typically via the robotics neighborhood (kinectv2). This sensor is positioned above the display and turned around with a purpose to experience human workout in the front of the display. A design proposal is detected in the nearest object interior to the front of the screen. To strive this, college students need to compute the extensively alternate of the coordinate body of the sensor and body of the display. Several strategies are applied to execute this process successfully. One in each and every usage of the aruco markers, they favor to devise and verify imperative mathematical technique and take a look at their answer. Subsequently, they look at to work with factor-cloud information. They choose to flip out to be conscious of the nearest man or female reputation subsequent in the front of the screen. They may additionally be capable to gain this through calculating the plane equation of the ground in mixture with inferring the records from the component of view of the coordinate body of the screen. The thresholding operations which are interior to the scanned factor-cloud are studied. Finally, an algorithm is developed for the interplay between the segmented character and the show screen. Completing this challenge represents university and college students can analyze data for higher modern robotics’ programs, on the whole inside the concern of the Human-Robotic Interaction (HRD.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297578
S. Sheela, K. Radhika
Eye gaze has been depicted as one of the means for interaction with computer. The eye tracking systems perform feature extraction and determination on gaze direction. The feature based methods will estimate gaze direction based on the extracted features. The parameters of pupil, iris and eye corners will determine gaze direction. In this paper, two feature based gaze tracking methods are proposed. The first method is based on Fast Fourier Transform (FFT) and the second method is based on number of zeros in Z-domain. The search for template image in successive video frames tracks the pupil. The optical flow extracts the change in position. The velocity component determines displacement of template region, which helps in gaze direction estimation. The Fourier transform is computed by using the magnitude of velocity components, gives the frequency representation for each gaze direction. The number of zeros inside a specific range of circle in Z-domain aids in determining the gaze direction. The recognition rate of 98.5% and 99% are obtained for the methods based on FFT and zeros, respectively.
{"title":"Feature based Methods for Eye Gaze Tracking","authors":"S. Sheela, K. Radhika","doi":"10.1109/ICECA49313.2020.9297578","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297578","url":null,"abstract":"Eye gaze has been depicted as one of the means for interaction with computer. The eye tracking systems perform feature extraction and determination on gaze direction. The feature based methods will estimate gaze direction based on the extracted features. The parameters of pupil, iris and eye corners will determine gaze direction. In this paper, two feature based gaze tracking methods are proposed. The first method is based on Fast Fourier Transform (FFT) and the second method is based on number of zeros in Z-domain. The search for template image in successive video frames tracks the pupil. The optical flow extracts the change in position. The velocity component determines displacement of template region, which helps in gaze direction estimation. The Fourier transform is computed by using the magnitude of velocity components, gives the frequency representation for each gaze direction. The number of zeros inside a specific range of circle in Z-domain aids in determining the gaze direction. The recognition rate of 98.5% and 99% are obtained for the methods based on FFT and zeros, respectively.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116218512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297600
M. Islam, Tasfia Tabassum, M. Hossen, Shahed Hossain, Mosharof Hossain, Anik Hassan Jony
presently a day’s data dissemination over the world become progressively simpler because of quick web and advancement of various kind of technology, for this explanation individuals become increasingly stressed about their information security. For this nowadays people use steganography to make the information secure by hiding and blending the data that make them hard to perceive by hackers. For concealing mystery data in content and pictures, there exists a huge assortment of Steganography methods some are more mind-boggling than others and every one of them has particular solid and feeble focuses. We are looking for the calculation to discover the missing puzzle word which otherwise called mystery calculation by using seek algorithm. For improving the security of mystery message, the message is mixed utilizing onetime cushion plot before being covered and Figure content is at that point hidden in the spread. This is the most efficient data hiding security system and probably its increases the data security all over the world and maintain our privacy.
{"title":"A Digital Data Hiding Technique with Missing Puzzle and Seek Algorithm.","authors":"M. Islam, Tasfia Tabassum, M. Hossen, Shahed Hossain, Mosharof Hossain, Anik Hassan Jony","doi":"10.1109/ICECA49313.2020.9297600","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297600","url":null,"abstract":"presently a day’s data dissemination over the world become progressively simpler because of quick web and advancement of various kind of technology, for this explanation individuals become increasingly stressed about their information security. For this nowadays people use steganography to make the information secure by hiding and blending the data that make them hard to perceive by hackers. For concealing mystery data in content and pictures, there exists a huge assortment of Steganography methods some are more mind-boggling than others and every one of them has particular solid and feeble focuses. We are looking for the calculation to discover the missing puzzle word which otherwise called mystery calculation by using seek algorithm. For improving the security of mystery message, the message is mixed utilizing onetime cushion plot before being covered and Figure content is at that point hidden in the spread. This is the most efficient data hiding security system and probably its increases the data security all over the world and maintain our privacy.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114839144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In today’s world, due to the rapid growth in music tracks via both offline and online and give better access to automatically classify its genre and based on that the recommendation for another song will impact a great experience to the user. So, this paper has proposed a system that uses deep learning approach for performing genre classification on the song and based on that the song will be recommended by using word2vec. For classification, it is important to obtain a large collection and index the songs accordingly to their genre and with the help of skip gram model, it will identify the similar context song for recommendation. So, the proposed system works as a whole music recommendation system for delivering great experience at user side.
{"title":"Music2Vec: Music Genre Classification and Recommendation System","authors":"Aishwariya Budhrani, Akashkumar Patel, Shivam Ribadiya","doi":"10.1109/ICECA49313.2020.9297559","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297559","url":null,"abstract":"In today’s world, due to the rapid growth in music tracks via both offline and online and give better access to automatically classify its genre and based on that the recommendation for another song will impact a great experience to the user. So, this paper has proposed a system that uses deep learning approach for performing genre classification on the song and based on that the song will be recommended by using word2vec. For classification, it is important to obtain a large collection and index the songs accordingly to their genre and with the help of skip gram model, it will identify the similar context song for recommendation. So, the proposed system works as a whole music recommendation system for delivering great experience at user side.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126324475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297398
P. Deepika, S. Sasikala
Data mining is a set of algorithms that can be implemented by tools. It effectively addresses many real-time problems. This data mining focuses on various sectors and related problem. Healthcare is one of the important sector which require more advanced methodologies to predict the disease in an early stage in a more accurate manner. Data mining methods are effective in disease prediction. For making enhanced predictions and classification in Cardio Vascular Disease, the data mining model is proposed with the J48 algorithm with Particle Swarm Optimization (PSO). A Benchmark dataset is used for this research work that contains 14 attributes with two different classes. The experimental results highlight the performance efficiency in the Cardio Vascular Disease prediction and classification.
{"title":"Enhanced Model for Prediction and Classification of Cardiovascular Disease using Decision Tree with Particle Swarm Optimization","authors":"P. Deepika, S. Sasikala","doi":"10.1109/ICECA49313.2020.9297398","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297398","url":null,"abstract":"Data mining is a set of algorithms that can be implemented by tools. It effectively addresses many real-time problems. This data mining focuses on various sectors and related problem. Healthcare is one of the important sector which require more advanced methodologies to predict the disease in an early stage in a more accurate manner. Data mining methods are effective in disease prediction. For making enhanced predictions and classification in Cardio Vascular Disease, the data mining model is proposed with the J48 algorithm with Particle Swarm Optimization (PSO). A Benchmark dataset is used for this research work that contains 14 attributes with two different classes. The experimental results highlight the performance efficiency in the Cardio Vascular Disease prediction and classification.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127961114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297541
B. Jabber, K. Rajesh, D. Haritha, C. Z. Basha, Syed Nazia Parveen
Currently, technology has shown a lot of advancement in the field of medicine. Modalities available for capturing the brain images are Magnetic Resonance Imaging (MRIs), Positron Emission Tomography (PET) scan, and Computed Tomography (CT) scan. Among these MR is the most significantly used tool for judgment related to the anatomy of the brain. It is very essential for the classification of tumors in early-stage which supports avoiding the deaths due to brain tumors. Computerized classification of the tumor using MRI is proposed where features are extracted using the Gray Level Co-occurrence Matrices (GLCM) and classification using the BPNN. An accuracy of 94% is achieved with the proposed methodology.
{"title":"An Intelligent System for Classification of Brain Tumours With GLCM and Back Propagation Neural Network","authors":"B. Jabber, K. Rajesh, D. Haritha, C. Z. Basha, Syed Nazia Parveen","doi":"10.1109/ICECA49313.2020.9297541","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297541","url":null,"abstract":"Currently, technology has shown a lot of advancement in the field of medicine. Modalities available for capturing the brain images are Magnetic Resonance Imaging (MRIs), Positron Emission Tomography (PET) scan, and Computed Tomography (CT) scan. Among these MR is the most significantly used tool for judgment related to the anatomy of the brain. It is very essential for the classification of tumors in early-stage which supports avoiding the deaths due to brain tumors. Computerized classification of the tumor using MRI is proposed where features are extracted using the Gray Level Co-occurrence Matrices (GLCM) and classification using the BPNN. An accuracy of 94% is achieved with the proposed methodology.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115807744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297479
Nirdosh Kumar, Gaurav Sharma, Lava Bhargava
Breast Cancer is the most prevalent form of cancer and significant reason for high mortality rates among women. Manual diagnosis of this disease requires long hours & specialists. Therefore an Automated breast cancer diagnosis has been developed to reduce the time taken for diagnosis and decreases the spread of cancer. This paper presents a comparative study of four machine learning algorithms namely Logistic Regression, SVM, KNN and Naive Bayes by calculating their classification accuracy, sensitivity, specificity and other parameters. The different hyper-parameters used for different ML algorithms were manually assigned. Among all algorithms, SVM performed better with the accuracy of about 98.24%.
{"title":"The Machine Learning based Optimized Prediction Method for Breast Cancer Detection","authors":"Nirdosh Kumar, Gaurav Sharma, Lava Bhargava","doi":"10.1109/ICECA49313.2020.9297479","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297479","url":null,"abstract":"Breast Cancer is the most prevalent form of cancer and significant reason for high mortality rates among women. Manual diagnosis of this disease requires long hours & specialists. Therefore an Automated breast cancer diagnosis has been developed to reduce the time taken for diagnosis and decreases the spread of cancer. This paper presents a comparative study of four machine learning algorithms namely Logistic Regression, SVM, KNN and Naive Bayes by calculating their classification accuracy, sensitivity, specificity and other parameters. The different hyper-parameters used for different ML algorithms were manually assigned. Among all algorithms, SVM performed better with the accuracy of about 98.24%.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130086103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297622
G. Emayavaramban, A. Amudha, M. Ramkumar, S. Divyapriya, P. Nagaveni
Electromyography (EMG) performs an investigation on muscles work through the examination of electrical movement that is created from muscles. This electrical movement is shown in type of sign is the consequence of neuromuscular initiation related with muscle constriction. Highlight extraction is the change of the crude sign information into an applicable information structure by evacuating clamor, and featuring the significant information. This paper investigates three fundamental classes of highlights, for example: time area, recurrence space, and the time-recurrence area for the activity of an EMG based control framework.
{"title":"Surface Eletromyography Feature Extraction Techniques – A Review","authors":"G. Emayavaramban, A. Amudha, M. Ramkumar, S. Divyapriya, P. Nagaveni","doi":"10.1109/ICECA49313.2020.9297622","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297622","url":null,"abstract":"Electromyography (EMG) performs an investigation on muscles work through the examination of electrical movement that is created from muscles. This electrical movement is shown in type of sign is the consequence of neuromuscular initiation related with muscle constriction. Highlight extraction is the change of the crude sign information into an applicable information structure by evacuating clamor, and featuring the significant information. This paper investigates three fundamental classes of highlights, for example: time area, recurrence space, and the time-recurrence area for the activity of an EMG based control framework.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134180208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}