Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855956
Pradosh Ranjan Sahoo, Sandip Ghosh, A. K. Naskar
It is well known that the Decentralized Fixed Mode (DFM) are fixed w.r.t of Linear time-invariant (LTI) decentralized controller. But some modes which are very close to DFM but not exact DFM are called as approximate DFM (ADFM) and a huge control energy is required to shift these modes to a desirable region in complex plane which is not realizable practically. So characterization and determination of these modes are necessary. In this paper, a new quantitative characterization technique of ADFM is proposed by using fixed mode (FM) radius and old characterization techniques are reviewed. ADFM is computed by using proposed method with the help of some numerical examples.
{"title":"Characterization of approximate Decentralized Fixed Modes in terms of DFM radius","authors":"Pradosh Ranjan Sahoo, Sandip Ghosh, A. K. Naskar","doi":"10.1109/ISCO.2017.7855956","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855956","url":null,"abstract":"It is well known that the Decentralized Fixed Mode (DFM) are fixed w.r.t of Linear time-invariant (LTI) decentralized controller. But some modes which are very close to DFM but not exact DFM are called as approximate DFM (ADFM) and a huge control energy is required to shift these modes to a desirable region in complex plane which is not realizable practically. So characterization and determination of these modes are necessary. In this paper, a new quantitative characterization technique of ADFM is proposed by using fixed mode (FM) radius and old characterization techniques are reviewed. ADFM is computed by using proposed method with the help of some numerical examples.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856040
T. Mohanapriya, S. Ranganathan, S. Karthik
In mobile ad hoc networks (MANET), each node can move freely and communicate with each other in the network. The main challenges are to reduce the traffic that occurs when large amount of data is transmitted and to provide the high accuracy of transmitted data. To acquire only necessary data items, each mobile node can effectively retrieve data items using a top-k query. However, the transmission of query messages and replies from each mobile node will cause high traffic. Some techniques are provided to reduce the number of candidates in the top-k query. This paper deals with the process of top-k query, routing methods and the mechanisms that are proposed to overcome the challenges.
{"title":"A survey on top-k query processing in MANETs","authors":"T. Mohanapriya, S. Ranganathan, S. Karthik","doi":"10.1109/ISCO.2017.7856040","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856040","url":null,"abstract":"In mobile ad hoc networks (MANET), each node can move freely and communicate with each other in the network. The main challenges are to reduce the traffic that occurs when large amount of data is transmitted and to provide the high accuracy of transmitted data. To acquire only necessary data items, each mobile node can effectively retrieve data items using a top-k query. However, the transmission of query messages and replies from each mobile node will cause high traffic. Some techniques are provided to reduce the number of candidates in the top-k query. This paper deals with the process of top-k query, routing methods and the mechanisms that are proposed to overcome the challenges.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131222180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855992
Sugandha Agarwal, P. Ranjan, A. Ujlayan
On the basis of the evaluation of local properties of the data many nonlinear techniques have been suggested the field of computer vision. The application of the dimensionality reduction covers many fields like medical, geographical, simulation and many more. I have studied MDS, LLE and LTSA. Overall, the users are allowed to access the search-tools in linear system. A review and systematic comparison of all the existing techniques has been presented in this paper. The outputs have been explained through identification of current non-linear techniques, and suggestions pertaining to the way the performance of nonlinear dimensionality reduction techniques can be improved. The Purpose of this idea is based on the to implement it in manifold fields by analyzing the result of face detector and recognizer for multiple people in real time with Principal Component analysis on eigen face. According to the most recent research, some issues are confronted in the security at public places. The efficiency and accuracy of these problems can be improved with the range and intricacy of camera networks are booming and the audited surroundings have become more and more entangled and crowded. How these emerging challenges are faced is discussed in the paper.
{"title":"Comparative analysis of dimensionality reduction algorithms, case study: PCA","authors":"Sugandha Agarwal, P. Ranjan, A. Ujlayan","doi":"10.1109/ISCO.2017.7855992","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855992","url":null,"abstract":"On the basis of the evaluation of local properties of the data many nonlinear techniques have been suggested the field of computer vision. The application of the dimensionality reduction covers many fields like medical, geographical, simulation and many more. I have studied MDS, LLE and LTSA. Overall, the users are allowed to access the search-tools in linear system. A review and systematic comparison of all the existing techniques has been presented in this paper. The outputs have been explained through identification of current non-linear techniques, and suggestions pertaining to the way the performance of nonlinear dimensionality reduction techniques can be improved. The Purpose of this idea is based on the to implement it in manifold fields by analyzing the result of face detector and recognizer for multiple people in real time with Principal Component analysis on eigen face. According to the most recent research, some issues are confronted in the security at public places. The efficiency and accuracy of these problems can be improved with the range and intricacy of camera networks are booming and the audited surroundings have become more and more entangled and crowded. How these emerging challenges are faced is discussed in the paper.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855957
Y. Jamoussi, Ameni Youssfi Nouira
The recent viral growth of social network systems such as Twitter, Facebook and MySpace have created many interesting and challenging problems to the research community, which enable to perform context aware-reasoning. Social networking is a set of social actors (individuals or organizations) that are connected to provide a set of interaction. We consider, in this paper, the problem of information extraction from social networking specially Twitter and Facebook. To extract text from social networking, we need several lexical features and large scale word clustering. We attempt to expand existing tokenizer and to develop our own tagger in order to support the incorrect words currently in existence in Facebook and Twitter. Our goal in this work is to benefit of the lexical features developed for Twitter and online conversational text in previous works, and to develop an extraction model for constructing a huge knowledge based on actions.
{"title":"An extracting model for constructing actions with improved part-of-speech tagging from social networking texts","authors":"Y. Jamoussi, Ameni Youssfi Nouira","doi":"10.1109/ISCO.2017.7855957","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855957","url":null,"abstract":"The recent viral growth of social network systems such as Twitter, Facebook and MySpace have created many interesting and challenging problems to the research community, which enable to perform context aware-reasoning. Social networking is a set of social actors (individuals or organizations) that are connected to provide a set of interaction. We consider, in this paper, the problem of information extraction from social networking specially Twitter and Facebook. To extract text from social networking, we need several lexical features and large scale word clustering. We attempt to expand existing tokenizer and to develop our own tagger in order to support the incorrect words currently in existence in Facebook and Twitter. Our goal in this work is to benefit of the lexical features developed for Twitter and online conversational text in previous works, and to develop an extraction model for constructing a huge knowledge based on actions.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131294942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855979
Rajesh Sharma R, Akey Sungheetha
Over the years, the growth in medical image processing is increasing in a tremendous manner. The rate of increasing diseases with respect to various types of cancer and other related human problems paves the way for the development in biomedical research. Thus processing and analyzing these medical images is of high importance for clinical diagnosis. This work focuses on performing effective classification of brain tumor images and segmentation of live disease images employing the proposed hybrid intelligent techniques. The challenges and objectives on design of feature extraction, image classification and segmentation for medical images are discussed.
{"title":"Segmentation and classification techniques of medical images using innovated hybridized techniques — a study","authors":"Rajesh Sharma R, Akey Sungheetha","doi":"10.1109/ISCO.2017.7855979","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855979","url":null,"abstract":"Over the years, the growth in medical image processing is increasing in a tremendous manner. The rate of increasing diseases with respect to various types of cancer and other related human problems paves the way for the development in biomedical research. Thus processing and analyzing these medical images is of high importance for clinical diagnosis. This work focuses on performing effective classification of brain tumor images and segmentation of live disease images employing the proposed hybrid intelligent techniques. The challenges and objectives on design of feature extraction, image classification and segmentation for medical images are discussed.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115441142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856022
K. Raja, S. Saravanan, R. Anitha, S. Priya, R. Subhashini
The paper presents a low power ECG signal processing ASIC chip design to extract the ECG features for wearable health system. The new design is used for the diagnosis of ECG arrhythmia based on features. The design consists of an acquisition unit, analog to digital conversion, pre-processing stage and feature extraction stage. The proposed design is advantage as it acquires both analog and digital ECG data. In addition to that the power consumed is less and area occupied is optimum. The proposed ASIC is designed using 90nm Technology.
{"title":"Design of a low power ECG signal processor for wearable health system-review and implementation issues","authors":"K. Raja, S. Saravanan, R. Anitha, S. Priya, R. Subhashini","doi":"10.1109/ISCO.2017.7856022","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856022","url":null,"abstract":"The paper presents a low power ECG signal processing ASIC chip design to extract the ECG features for wearable health system. The new design is used for the diagnosis of ECG arrhythmia based on features. The design consists of an acquisition unit, analog to digital conversion, pre-processing stage and feature extraction stage. The proposed design is advantage as it acquires both analog and digital ECG data. In addition to that the power consumed is less and area occupied is optimum. The proposed ASIC is designed using 90nm Technology.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"320 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120880866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856034
R. Vignesh, R. Padmanaban
Friction stir welding (FSW) is a promising technique in which joints with high strength and minimal defects can be realized by adopting optimum process parameters. The prominent parameters are tool rotation speed, welding speed, shoulder diameter and pin diameter of the tool. In this study Mamdani fuzzy system was used to generate the model for predicting and exploring the influence of FSW process parameters on tensile strength of AA1100 joints. The FSW trials are conducted at various levels of process parameters according to central composite design. The study proved that the process parameters had significant effect on the tensile strength of friction stir welded joints. Crest parabolic variation trend was observed in tensile strength of the joints, with respect to the interaction effects of TRS, WS and SD. Increase in pin diameter had positive effect in increasing the tensile strength of the joints, for any change in TRS, WS and SD. Maximum tensile strength of 72.4 MPa was obtained at tool rotation speed of 1050 rpm, welding speed of 60 mm/min, shoulder diameter of 18 mm and pin diameter of 6 mm. The methodology given in this paper delivers a useful tool to assess the tensile strength of friction stir welded AA1100.
{"title":"Modelling tensile strength of friction stir welded aluminium alloy 1100 using fuzzy logic","authors":"R. Vignesh, R. Padmanaban","doi":"10.1109/ISCO.2017.7856034","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856034","url":null,"abstract":"Friction stir welding (FSW) is a promising technique in which joints with high strength and minimal defects can be realized by adopting optimum process parameters. The prominent parameters are tool rotation speed, welding speed, shoulder diameter and pin diameter of the tool. In this study Mamdani fuzzy system was used to generate the model for predicting and exploring the influence of FSW process parameters on tensile strength of AA1100 joints. The FSW trials are conducted at various levels of process parameters according to central composite design. The study proved that the process parameters had significant effect on the tensile strength of friction stir welded joints. Crest parabolic variation trend was observed in tensile strength of the joints, with respect to the interaction effects of TRS, WS and SD. Increase in pin diameter had positive effect in increasing the tensile strength of the joints, for any change in TRS, WS and SD. Maximum tensile strength of 72.4 MPa was obtained at tool rotation speed of 1050 rpm, welding speed of 60 mm/min, shoulder diameter of 18 mm and pin diameter of 6 mm. The methodology given in this paper delivers a useful tool to assess the tensile strength of friction stir welded AA1100.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130264398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855967
M. Kalaivani, M. Jeyalakshmi, M. Aarthy
Stress is a psychophysiological condition of the elderly people which leads to progressive mental illness and exacerbate health conditions. Though there are many antidepressants to suppress stress, it may also cause obnoxious effect in them. Neurofeedback [NFB] training is an alternative method to retain their independence by improving their cognitive performance. Our cognitive training aims in improving its flexibility and resilience by designing a in-house neurofeedback system. 12 participants competing with increased stress level in the age group of 50–70 years are taken into consideration based on the General Anxiety Disorder [GAD] score. Our NFB training protocol aims to enhance the beta activity and selectively decrease the theta activity. 40–45 sessions are carried out for substantial and efficient results. As the training progresses, the threshold level set in the training is increased. Though the threshold is augmented the participants are able to successfully complete the session.GAD score is also decreased which confirms the reduced stress level. The proposed NFB method paves a way to manage and reduce their stress in an effective way.
{"title":"Neurofeedback training for elderly with increased stress level","authors":"M. Kalaivani, M. Jeyalakshmi, M. Aarthy","doi":"10.1109/ISCO.2017.7855967","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855967","url":null,"abstract":"Stress is a psychophysiological condition of the elderly people which leads to progressive mental illness and exacerbate health conditions. Though there are many antidepressants to suppress stress, it may also cause obnoxious effect in them. Neurofeedback [NFB] training is an alternative method to retain their independence by improving their cognitive performance. Our cognitive training aims in improving its flexibility and resilience by designing a in-house neurofeedback system. 12 participants competing with increased stress level in the age group of 50–70 years are taken into consideration based on the General Anxiety Disorder [GAD] score. Our NFB training protocol aims to enhance the beta activity and selectively decrease the theta activity. 40–45 sessions are carried out for substantial and efficient results. As the training progresses, the threshold level set in the training is increased. Though the threshold is augmented the participants are able to successfully complete the session.GAD score is also decreased which confirms the reduced stress level. The proposed NFB method paves a way to manage and reduce their stress in an effective way.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855964
Sheikh Ahmed Saleh, S. Azam, Kheng Cher Yeo, Bharanidharan Shanmugam, K. Kannoorpatti
Security system based on biometrics is becoming more popular everyday as a part of safety and security measurement against all kind of crimes. Among several kinds of biometric security systems, face recognition is one of the most popular one. It is one of the most accurate, mostly used recognition methods in modern world. In this paper, two most popular face recognition methods have been discussed and compared using average image on Yale database. To reduce calculation complexity, all training and test images are converted into gray scale images. The whole face recognition process can be divided into two parts face detection and face identification. For face detection part, Viola Jones face detection method has been used out of several face detection methods. After face detection, face is cropped from the actual image to remove the background and the resolution is set as 150×150 pixels. Eigenfaces and fisherfaces methods have been used for face identification part. Average images of subjects have been used as training set to improve the accuracy of identification. Both methods are investigated using MATLAB to find the better performance under average image condition. Accuracy and time consumption has been calculated using MATLAB code on Yale image database. In future, this paper will be helpful for further research on comparison of different face recognition methods using average images on different database.
{"title":"An improved face recognition method using Local Binary Pattern method","authors":"Sheikh Ahmed Saleh, S. Azam, Kheng Cher Yeo, Bharanidharan Shanmugam, K. Kannoorpatti","doi":"10.1109/ISCO.2017.7855964","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855964","url":null,"abstract":"Security system based on biometrics is becoming more popular everyday as a part of safety and security measurement against all kind of crimes. Among several kinds of biometric security systems, face recognition is one of the most popular one. It is one of the most accurate, mostly used recognition methods in modern world. In this paper, two most popular face recognition methods have been discussed and compared using average image on Yale database. To reduce calculation complexity, all training and test images are converted into gray scale images. The whole face recognition process can be divided into two parts face detection and face identification. For face detection part, Viola Jones face detection method has been used out of several face detection methods. After face detection, face is cropped from the actual image to remove the background and the resolution is set as 150×150 pixels. Eigenfaces and fisherfaces methods have been used for face identification part. Average images of subjects have been used as training set to improve the accuracy of identification. Both methods are investigated using MATLAB to find the better performance under average image condition. Accuracy and time consumption has been calculated using MATLAB code on Yale image database. In future, this paper will be helpful for further research on comparison of different face recognition methods using average images on different database.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121046561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855963
Navpreet Kaur, S. Azam, K. Kannoorpatti, Kheng Cher Yeo, Bharanidharan Shanmugam
The Web has become an indispensable part of our society and is currently most commonly used mode of information delivery. Millions of users access the free services provided by the websites on daily basis and while providing these free services websites track and profile their web users. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies, yet very intrusive for the privacy of users. The objective of this paper is to study about the increasingly common yet hardly discussed technique of identifying individual Web users and tracking them across multiple websites known as “Browser Fingerprinting”. A unique browser fingerprint is derived by the unique pattern of information visible whenever a computer visits a website. The permutations thus collected are sufficiently distinct that they can be used as a tool for tracking. Unlike cookies, Fingerprints are generated on server side and are difficult for a user to influence. The main objective of this research is study about how the fingerprinting was evolved, its positives and negatives, what threat it poses to users' online privacy and what countermeasures could be used to prevent it. This paper will also analyse which different properties the browsers send to the server, allowing a unique fingerprint of those browsers to be created.
{"title":"Browser Fingerprinting as user tracking technology","authors":"Navpreet Kaur, S. Azam, K. Kannoorpatti, Kheng Cher Yeo, Bharanidharan Shanmugam","doi":"10.1109/ISCO.2017.7855963","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855963","url":null,"abstract":"The Web has become an indispensable part of our society and is currently most commonly used mode of information delivery. Millions of users access the free services provided by the websites on daily basis and while providing these free services websites track and profile their web users. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies, yet very intrusive for the privacy of users. The objective of this paper is to study about the increasingly common yet hardly discussed technique of identifying individual Web users and tracking them across multiple websites known as “Browser Fingerprinting”. A unique browser fingerprint is derived by the unique pattern of information visible whenever a computer visits a website. The permutations thus collected are sufficiently distinct that they can be used as a tool for tracking. Unlike cookies, Fingerprints are generated on server side and are difficult for a user to influence. The main objective of this research is study about how the fingerprinting was evolved, its positives and negatives, what threat it poses to users' online privacy and what countermeasures could be used to prevent it. This paper will also analyse which different properties the browsers send to the server, allowing a unique fingerprint of those browsers to be created.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121334516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}