首页 > 最新文献

2017 11th International Conference on Intelligent Systems and Control (ISCO)最新文献

英文 中文
Characterization of approximate Decentralized Fixed Modes in terms of DFM radius 基于DFM半径的近似分散固定模的表征
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855956
Pradosh Ranjan Sahoo, Sandip Ghosh, A. K. Naskar
It is well known that the Decentralized Fixed Mode (DFM) are fixed w.r.t of Linear time-invariant (LTI) decentralized controller. But some modes which are very close to DFM but not exact DFM are called as approximate DFM (ADFM) and a huge control energy is required to shift these modes to a desirable region in complex plane which is not realizable practically. So characterization and determination of these modes are necessary. In this paper, a new quantitative characterization technique of ADFM is proposed by using fixed mode (FM) radius and old characterization techniques are reviewed. ADFM is computed by using proposed method with the help of some numerical examples.
众所周知,线性时不变(LTI)分散控制器的分散固定模式(DFM)是固定的。但是一些非常接近DFM但不是精确DFM的模式被称为近似DFM (ADFM),需要巨大的控制能量将这些模式转移到复杂平面上的理想区域,这在实际中是无法实现的。因此,表征和确定这些模式是必要的。本文提出了一种利用固定模半径定量表征ADFM的新方法,并对现有的表征方法进行了综述。并结合数值算例,用该方法计算了ADFM。
{"title":"Characterization of approximate Decentralized Fixed Modes in terms of DFM radius","authors":"Pradosh Ranjan Sahoo, Sandip Ghosh, A. K. Naskar","doi":"10.1109/ISCO.2017.7855956","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855956","url":null,"abstract":"It is well known that the Decentralized Fixed Mode (DFM) are fixed w.r.t of Linear time-invariant (LTI) decentralized controller. But some modes which are very close to DFM but not exact DFM are called as approximate DFM (ADFM) and a huge control energy is required to shift these modes to a desirable region in complex plane which is not realizable practically. So characterization and determination of these modes are necessary. In this paper, a new quantitative characterization technique of ADFM is proposed by using fixed mode (FM) radius and old characterization techniques are reviewed. ADFM is computed by using proposed method with the help of some numerical examples.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey on top-k query processing in MANETs manet中top-k查询处理的研究
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856040
T. Mohanapriya, S. Ranganathan, S. Karthik
In mobile ad hoc networks (MANET), each node can move freely and communicate with each other in the network. The main challenges are to reduce the traffic that occurs when large amount of data is transmitted and to provide the high accuracy of transmitted data. To acquire only necessary data items, each mobile node can effectively retrieve data items using a top-k query. However, the transmission of query messages and replies from each mobile node will cause high traffic. Some techniques are provided to reduce the number of candidates in the top-k query. This paper deals with the process of top-k query, routing methods and the mechanisms that are proposed to overcome the challenges.
在移动自组织网络(MANET)中,每个节点都可以在网络中自由移动并相互通信。主要的挑战是减少在传输大量数据时发生的流量,并提供传输数据的高精度。为了只获取必要的数据项,每个移动节点可以使用top-k查询有效地检索数据项。但是,从每个移动节点发送查询消息和应答会造成很大的流量。提供了一些技术来减少top-k查询中的候选数。本文讨论了top-k查询的过程、路由方法和克服挑战的机制。
{"title":"A survey on top-k query processing in MANETs","authors":"T. Mohanapriya, S. Ranganathan, S. Karthik","doi":"10.1109/ISCO.2017.7856040","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856040","url":null,"abstract":"In mobile ad hoc networks (MANET), each node can move freely and communicate with each other in the network. The main challenges are to reduce the traffic that occurs when large amount of data is transmitted and to provide the high accuracy of transmitted data. To acquire only necessary data items, each mobile node can effectively retrieve data items using a top-k query. However, the transmission of query messages and replies from each mobile node will cause high traffic. Some techniques are provided to reduce the number of candidates in the top-k query. This paper deals with the process of top-k query, routing methods and the mechanisms that are proposed to overcome the challenges.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131222180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative analysis of dimensionality reduction algorithms, case study: PCA 降维算法的比较分析,案例研究:PCA
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855992
Sugandha Agarwal, P. Ranjan, A. Ujlayan
On the basis of the evaluation of local properties of the data many nonlinear techniques have been suggested the field of computer vision. The application of the dimensionality reduction covers many fields like medical, geographical, simulation and many more. I have studied MDS, LLE and LTSA. Overall, the users are allowed to access the search-tools in linear system. A review and systematic comparison of all the existing techniques has been presented in this paper. The outputs have been explained through identification of current non-linear techniques, and suggestions pertaining to the way the performance of nonlinear dimensionality reduction techniques can be improved. The Purpose of this idea is based on the to implement it in manifold fields by analyzing the result of face detector and recognizer for multiple people in real time with Principal Component analysis on eigen face. According to the most recent research, some issues are confronted in the security at public places. The efficiency and accuracy of these problems can be improved with the range and intricacy of camera networks are booming and the audited surroundings have become more and more entangled and crowded. How these emerging challenges are faced is discussed in the paper.
在对数据局部性质进行评价的基础上,计算机视觉领域提出了许多非线性技术。降维的应用涉及医学、地理、仿真等多个领域。我学习过MDS, LLE和LTSA。总的来说,用户可以使用线性系统中的搜索工具。本文对现有的各种技术进行了综述和系统的比较。通过识别当前的非线性技术来解释输出,并提出有关改进非线性降维技术性能的建议。该思想的目的是通过分析人脸检测器和人脸识别器对多人的实时检测结果,结合特征人脸的主成分分析,将其应用于多个领域。根据最近的研究,公共场所的安全面临着一些问题。随着摄像机网络范围和复杂性的不断扩大,以及审计环境的日益复杂和拥挤,这些问题的效率和准确性将得到提高。本文讨论了如何面对这些新出现的挑战。
{"title":"Comparative analysis of dimensionality reduction algorithms, case study: PCA","authors":"Sugandha Agarwal, P. Ranjan, A. Ujlayan","doi":"10.1109/ISCO.2017.7855992","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855992","url":null,"abstract":"On the basis of the evaluation of local properties of the data many nonlinear techniques have been suggested the field of computer vision. The application of the dimensionality reduction covers many fields like medical, geographical, simulation and many more. I have studied MDS, LLE and LTSA. Overall, the users are allowed to access the search-tools in linear system. A review and systematic comparison of all the existing techniques has been presented in this paper. The outputs have been explained through identification of current non-linear techniques, and suggestions pertaining to the way the performance of nonlinear dimensionality reduction techniques can be improved. The Purpose of this idea is based on the to implement it in manifold fields by analyzing the result of face detector and recognizer for multiple people in real time with Principal Component analysis on eigen face. According to the most recent research, some issues are confronted in the security at public places. The efficiency and accuracy of these problems can be improved with the range and intricacy of camera networks are booming and the audited surroundings have become more and more entangled and crowded. How these emerging challenges are faced is discussed in the paper.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An extracting model for constructing actions with improved part-of-speech tagging from social networking texts 基于改进词性标注的社交网络文本动作提取模型
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855957
Y. Jamoussi, Ameni Youssfi Nouira
The recent viral growth of social network systems such as Twitter, Facebook and MySpace have created many interesting and challenging problems to the research community, which enable to perform context aware-reasoning. Social networking is a set of social actors (individuals or organizations) that are connected to provide a set of interaction. We consider, in this paper, the problem of information extraction from social networking specially Twitter and Facebook. To extract text from social networking, we need several lexical features and large scale word clustering. We attempt to expand existing tokenizer and to develop our own tagger in order to support the incorrect words currently in existence in Facebook and Twitter. Our goal in this work is to benefit of the lexical features developed for Twitter and online conversational text in previous works, and to develop an extraction model for constructing a huge knowledge based on actions.
最近像Twitter、Facebook和MySpace这样的社交网络系统的病毒式增长,给研究界带来了许多有趣而具有挑战性的问题,这些问题使得能够进行上下文感知推理。社会网络是一组社会参与者(个人或组织),它们相互连接以提供一组交互。在本文中,我们考虑了从社交网络,特别是Twitter和Facebook中提取信息的问题。为了从社交网络中提取文本,我们需要几个词汇特征和大规模的词聚类。我们试图扩展现有的标记器,并开发我们自己的标记器,以支持目前在Facebook和Twitter中存在的不正确单词。我们在这项工作中的目标是利用之前的工作中为Twitter和在线会话文本开发的词汇特征,并开发一个基于动作构建巨大知识的提取模型。
{"title":"An extracting model for constructing actions with improved part-of-speech tagging from social networking texts","authors":"Y. Jamoussi, Ameni Youssfi Nouira","doi":"10.1109/ISCO.2017.7855957","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855957","url":null,"abstract":"The recent viral growth of social network systems such as Twitter, Facebook and MySpace have created many interesting and challenging problems to the research community, which enable to perform context aware-reasoning. Social networking is a set of social actors (individuals or organizations) that are connected to provide a set of interaction. We consider, in this paper, the problem of information extraction from social networking specially Twitter and Facebook. To extract text from social networking, we need several lexical features and large scale word clustering. We attempt to expand existing tokenizer and to develop our own tagger in order to support the incorrect words currently in existence in Facebook and Twitter. Our goal in this work is to benefit of the lexical features developed for Twitter and online conversational text in previous works, and to develop an extraction model for constructing a huge knowledge based on actions.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131294942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Segmentation and classification techniques of medical images using innovated hybridized techniques — a study 基于创新杂交技术的医学图像分割与分类技术研究
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855979
Rajesh Sharma R, Akey Sungheetha
Over the years, the growth in medical image processing is increasing in a tremendous manner. The rate of increasing diseases with respect to various types of cancer and other related human problems paves the way for the development in biomedical research. Thus processing and analyzing these medical images is of high importance for clinical diagnosis. This work focuses on performing effective classification of brain tumor images and segmentation of live disease images employing the proposed hybrid intelligent techniques. The challenges and objectives on design of feature extraction, image classification and segmentation for medical images are discussed.
多年来,医学图像处理的增长正在以惊人的方式增长。各类癌症和其他相关人类问题的发病率不断上升,为生物医学研究的发展铺平了道路。因此,对这些医学图像进行处理和分析对临床诊断具有重要意义。这项工作的重点是使用所提出的混合智能技术对脑肿瘤图像进行有效的分类和实时疾病图像的分割。讨论了医学图像的特征提取、图像分类和分割设计面临的挑战和目标。
{"title":"Segmentation and classification techniques of medical images using innovated hybridized techniques — a study","authors":"Rajesh Sharma R, Akey Sungheetha","doi":"10.1109/ISCO.2017.7855979","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855979","url":null,"abstract":"Over the years, the growth in medical image processing is increasing in a tremendous manner. The rate of increasing diseases with respect to various types of cancer and other related human problems paves the way for the development in biomedical research. Thus processing and analyzing these medical images is of high importance for clinical diagnosis. This work focuses on performing effective classification of brain tumor images and segmentation of live disease images employing the proposed hybrid intelligent techniques. The challenges and objectives on design of feature extraction, image classification and segmentation for medical images are discussed.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115441142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design of a low power ECG signal processor for wearable health system-review and implementation issues 一种用于可穿戴健康系统的低功耗心电信号处理器的设计——综述与实现问题
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856022
K. Raja, S. Saravanan, R. Anitha, S. Priya, R. Subhashini
The paper presents a low power ECG signal processing ASIC chip design to extract the ECG features for wearable health system. The new design is used for the diagnosis of ECG arrhythmia based on features. The design consists of an acquisition unit, analog to digital conversion, pre-processing stage and feature extraction stage. The proposed design is advantage as it acquires both analog and digital ECG data. In addition to that the power consumed is less and area occupied is optimum. The proposed ASIC is designed using 90nm Technology.
为提取可穿戴健康系统的心电特征,设计了一种低功耗心电信号处理专用集成电路芯片。新设计用于基于特征的心电心律失常诊断。该设计由采集单元、模数转换、预处理阶段和特征提取阶段组成。该设计的优点是可以同时采集模拟和数字心电数据。此外,功耗少,占地面积最佳。所提出的ASIC采用90nm技术设计。
{"title":"Design of a low power ECG signal processor for wearable health system-review and implementation issues","authors":"K. Raja, S. Saravanan, R. Anitha, S. Priya, R. Subhashini","doi":"10.1109/ISCO.2017.7856022","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856022","url":null,"abstract":"The paper presents a low power ECG signal processing ASIC chip design to extract the ECG features for wearable health system. The new design is used for the diagnosis of ECG arrhythmia based on features. The design consists of an acquisition unit, analog to digital conversion, pre-processing stage and feature extraction stage. The proposed design is advantage as it acquires both analog and digital ECG data. In addition to that the power consumed is less and area occupied is optimum. The proposed ASIC is designed using 90nm Technology.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"320 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120880866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Modelling tensile strength of friction stir welded aluminium alloy 1100 using fuzzy logic 用模糊逻辑对1100铝合金搅拌摩擦焊接抗拉强度进行建模
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856034
R. Vignesh, R. Padmanaban
Friction stir welding (FSW) is a promising technique in which joints with high strength and minimal defects can be realized by adopting optimum process parameters. The prominent parameters are tool rotation speed, welding speed, shoulder diameter and pin diameter of the tool. In this study Mamdani fuzzy system was used to generate the model for predicting and exploring the influence of FSW process parameters on tensile strength of AA1100 joints. The FSW trials are conducted at various levels of process parameters according to central composite design. The study proved that the process parameters had significant effect on the tensile strength of friction stir welded joints. Crest parabolic variation trend was observed in tensile strength of the joints, with respect to the interaction effects of TRS, WS and SD. Increase in pin diameter had positive effect in increasing the tensile strength of the joints, for any change in TRS, WS and SD. Maximum tensile strength of 72.4 MPa was obtained at tool rotation speed of 1050 rpm, welding speed of 60 mm/min, shoulder diameter of 18 mm and pin diameter of 6 mm. The methodology given in this paper delivers a useful tool to assess the tensile strength of friction stir welded AA1100.
搅拌摩擦焊是一种极具发展前景的焊接技术,采用最优的工艺参数可以实现高强度和最小缺陷的连接。突出的参数是刀具转速、焊接速度、刀具肩直径和销直径。本研究采用Mamdani模糊系统建立模型,用于预测和探讨搅拌摩擦焊工艺参数对AA1100接头抗拉强度的影响。根据中心组合设计,在不同工艺参数下进行了FSW试验。研究表明,工艺参数对搅拌摩擦焊接接头的抗拉强度有显著影响。在TRS、WS和SD的交互作用下,接头的抗拉强度呈波峰抛物线变化趋势。无论TRS、WS和SD的变化如何,增加销径对提高接头的抗拉强度都有积极的作用。当刀具转速为1050 rpm,焊接速度为60 mm/min,焊肩直径为18 mm,焊针直径为6 mm时,抗拉强度最大为72.4 MPa。本文给出的方法为评估AA1100搅拌摩擦焊的抗拉强度提供了一种有用的工具。
{"title":"Modelling tensile strength of friction stir welded aluminium alloy 1100 using fuzzy logic","authors":"R. Vignesh, R. Padmanaban","doi":"10.1109/ISCO.2017.7856034","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856034","url":null,"abstract":"Friction stir welding (FSW) is a promising technique in which joints with high strength and minimal defects can be realized by adopting optimum process parameters. The prominent parameters are tool rotation speed, welding speed, shoulder diameter and pin diameter of the tool. In this study Mamdani fuzzy system was used to generate the model for predicting and exploring the influence of FSW process parameters on tensile strength of AA1100 joints. The FSW trials are conducted at various levels of process parameters according to central composite design. The study proved that the process parameters had significant effect on the tensile strength of friction stir welded joints. Crest parabolic variation trend was observed in tensile strength of the joints, with respect to the interaction effects of TRS, WS and SD. Increase in pin diameter had positive effect in increasing the tensile strength of the joints, for any change in TRS, WS and SD. Maximum tensile strength of 72.4 MPa was obtained at tool rotation speed of 1050 rpm, welding speed of 60 mm/min, shoulder diameter of 18 mm and pin diameter of 6 mm. The methodology given in this paper delivers a useful tool to assess the tensile strength of friction stir welded AA1100.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130264398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Neurofeedback training for elderly with increased stress level 老年人压力水平增高的神经反馈训练
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855967
M. Kalaivani, M. Jeyalakshmi, M. Aarthy
Stress is a psychophysiological condition of the elderly people which leads to progressive mental illness and exacerbate health conditions. Though there are many antidepressants to suppress stress, it may also cause obnoxious effect in them. Neurofeedback [NFB] training is an alternative method to retain their independence by improving their cognitive performance. Our cognitive training aims in improving its flexibility and resilience by designing a in-house neurofeedback system. 12 participants competing with increased stress level in the age group of 50–70 years are taken into consideration based on the General Anxiety Disorder [GAD] score. Our NFB training protocol aims to enhance the beta activity and selectively decrease the theta activity. 40–45 sessions are carried out for substantial and efficient results. As the training progresses, the threshold level set in the training is increased. Though the threshold is augmented the participants are able to successfully complete the session.GAD score is also decreased which confirms the reduced stress level. The proposed NFB method paves a way to manage and reduce their stress in an effective way.
压力是老年人的一种心理生理状态,可导致精神疾病的进行性发展,使健康状况恶化。虽然有许多抗抑郁药可以抑制压力,但它也可能对他们产生令人讨厌的影响。神经反馈(NFB)训练是一种通过提高认知能力来保持他们独立性的替代方法。我们的认知训练旨在通过设计一个内部神经反馈系统来提高它的灵活性和弹性。根据一般焦虑障碍(GAD)得分,将50-70岁年龄组中12名压力水平增加的参与者纳入考虑范围。我们的NFB训练方案旨在增强β活动并选择性地降低θ活动。举办了40-45次会议,取得了实质性和高效率的成果。随着训练的进行,训练中设置的阈值水平会增加。虽然阈值增加了,但参与者能够成功地完成会话。GAD分数也下降了,这证实了压力水平的降低。提出的NFB方法为有效地管理和减轻他们的压力铺平了道路。
{"title":"Neurofeedback training for elderly with increased stress level","authors":"M. Kalaivani, M. Jeyalakshmi, M. Aarthy","doi":"10.1109/ISCO.2017.7855967","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855967","url":null,"abstract":"Stress is a psychophysiological condition of the elderly people which leads to progressive mental illness and exacerbate health conditions. Though there are many antidepressants to suppress stress, it may also cause obnoxious effect in them. Neurofeedback [NFB] training is an alternative method to retain their independence by improving their cognitive performance. Our cognitive training aims in improving its flexibility and resilience by designing a in-house neurofeedback system. 12 participants competing with increased stress level in the age group of 50–70 years are taken into consideration based on the General Anxiety Disorder [GAD] score. Our NFB training protocol aims to enhance the beta activity and selectively decrease the theta activity. 40–45 sessions are carried out for substantial and efficient results. As the training progresses, the threshold level set in the training is increased. Though the threshold is augmented the participants are able to successfully complete the session.GAD score is also decreased which confirms the reduced stress level. The proposed NFB method paves a way to manage and reduce their stress in an effective way.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved face recognition method using Local Binary Pattern method 一种改进的局部二值模式人脸识别方法
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855964
Sheikh Ahmed Saleh, S. Azam, Kheng Cher Yeo, Bharanidharan Shanmugam, K. Kannoorpatti
Security system based on biometrics is becoming more popular everyday as a part of safety and security measurement against all kind of crimes. Among several kinds of biometric security systems, face recognition is one of the most popular one. It is one of the most accurate, mostly used recognition methods in modern world. In this paper, two most popular face recognition methods have been discussed and compared using average image on Yale database. To reduce calculation complexity, all training and test images are converted into gray scale images. The whole face recognition process can be divided into two parts face detection and face identification. For face detection part, Viola Jones face detection method has been used out of several face detection methods. After face detection, face is cropped from the actual image to remove the background and the resolution is set as 150×150 pixels. Eigenfaces and fisherfaces methods have been used for face identification part. Average images of subjects have been used as training set to improve the accuracy of identification. Both methods are investigated using MATLAB to find the better performance under average image condition. Accuracy and time consumption has been calculated using MATLAB code on Yale image database. In future, this paper will be helpful for further research on comparison of different face recognition methods using average images on different database.
基于生物识别技术的安保系统作为防范各种犯罪的安全和安保措施的一部分,日益受到人们的欢迎。在众多的生物识别安全系统中,人脸识别是最受欢迎的一种。它是当今世界最准确、最常用的识别方法之一。本文利用耶鲁数据库的平均图像,对两种最流行的人脸识别方法进行了讨论和比较。为了降低计算复杂度,将所有训练和测试图像转换为灰度图像。整个人脸识别过程可以分为人脸检测和人脸识别两个部分。对于人脸检测部分,在几种人脸检测方法中采用了Viola Jones人脸检测方法。人脸检测后,从实际图像中裁剪人脸以去除背景,分辨率设置为150×150像素。人脸识别部分采用了特征脸和渔民脸方法。使用被试的平均图像作为训练集,以提高识别的准确性。利用MATLAB对这两种方法进行了研究,以寻找在平均图像条件下更好的性能。在耶鲁大学图像数据库上,用MATLAB编程计算了精度和耗时。今后,本文将有助于进一步研究不同数据库中使用平均图像的不同人脸识别方法的比较。
{"title":"An improved face recognition method using Local Binary Pattern method","authors":"Sheikh Ahmed Saleh, S. Azam, Kheng Cher Yeo, Bharanidharan Shanmugam, K. Kannoorpatti","doi":"10.1109/ISCO.2017.7855964","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855964","url":null,"abstract":"Security system based on biometrics is becoming more popular everyday as a part of safety and security measurement against all kind of crimes. Among several kinds of biometric security systems, face recognition is one of the most popular one. It is one of the most accurate, mostly used recognition methods in modern world. In this paper, two most popular face recognition methods have been discussed and compared using average image on Yale database. To reduce calculation complexity, all training and test images are converted into gray scale images. The whole face recognition process can be divided into two parts face detection and face identification. For face detection part, Viola Jones face detection method has been used out of several face detection methods. After face detection, face is cropped from the actual image to remove the background and the resolution is set as 150×150 pixels. Eigenfaces and fisherfaces methods have been used for face identification part. Average images of subjects have been used as training set to improve the accuracy of identification. Both methods are investigated using MATLAB to find the better performance under average image condition. Accuracy and time consumption has been calculated using MATLAB code on Yale image database. In future, this paper will be helpful for further research on comparison of different face recognition methods using average images on different database.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121046561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Browser Fingerprinting as user tracking technology 浏览器指纹作为用户跟踪技术
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855963
Navpreet Kaur, S. Azam, K. Kannoorpatti, Kheng Cher Yeo, Bharanidharan Shanmugam
The Web has become an indispensable part of our society and is currently most commonly used mode of information delivery. Millions of users access the free services provided by the websites on daily basis and while providing these free services websites track and profile their web users. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies, yet very intrusive for the privacy of users. The objective of this paper is to study about the increasingly common yet hardly discussed technique of identifying individual Web users and tracking them across multiple websites known as “Browser Fingerprinting”. A unique browser fingerprint is derived by the unique pattern of information visible whenever a computer visits a website. The permutations thus collected are sufficiently distinct that they can be used as a tool for tracking. Unlike cookies, Fingerprints are generated on server side and are difficult for a user to influence. The main objective of this research is study about how the fingerprinting was evolved, its positives and negatives, what threat it poses to users' online privacy and what countermeasures could be used to prevent it. This paper will also analyse which different properties the browsers send to the server, allowing a unique fingerprint of those browsers to be created.
网络已经成为我们社会不可缺少的一部分,是目前最常用的信息传递方式。数以百万计的用户每天访问网站提供的免费服务,同时提供这些免费服务的网站跟踪和配置他们的网络用户。在这种环境下,跟踪用户及其上网习惯的能力对广告公司来说是非常有利可图的,但对用户隐私的侵犯也是非常大的。本文的目的是研究一种越来越普遍但很少被讨论的技术,即识别个人网络用户并在多个网站上跟踪他们,即“浏览器指纹”。独特的浏览器指纹是由计算机访问网站时可见的独特信息模式派生的。这样收集的排列是足够明显的,它们可以用作跟踪的工具。与cookie不同,指纹是在服务器端生成的,用户很难影响。本研究的主要目的是研究指纹识别是如何演变的,它的积极和消极,它对用户的在线隐私构成了什么威胁,以及可以使用什么对策来防止它。本文还将分析浏览器向服务器发送的不同属性,从而创建这些浏览器的唯一指纹。
{"title":"Browser Fingerprinting as user tracking technology","authors":"Navpreet Kaur, S. Azam, K. Kannoorpatti, Kheng Cher Yeo, Bharanidharan Shanmugam","doi":"10.1109/ISCO.2017.7855963","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855963","url":null,"abstract":"The Web has become an indispensable part of our society and is currently most commonly used mode of information delivery. Millions of users access the free services provided by the websites on daily basis and while providing these free services websites track and profile their web users. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies, yet very intrusive for the privacy of users. The objective of this paper is to study about the increasingly common yet hardly discussed technique of identifying individual Web users and tracking them across multiple websites known as “Browser Fingerprinting”. A unique browser fingerprint is derived by the unique pattern of information visible whenever a computer visits a website. The permutations thus collected are sufficiently distinct that they can be used as a tool for tracking. Unlike cookies, Fingerprints are generated on server side and are difficult for a user to influence. The main objective of this research is study about how the fingerprinting was evolved, its positives and negatives, what threat it poses to users' online privacy and what countermeasures could be used to prevent it. This paper will also analyse which different properties the browsers send to the server, allowing a unique fingerprint of those browsers to be created.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121334516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2017 11th International Conference on Intelligent Systems and Control (ISCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1