Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877399
S. Rana, Archana Singh
In the recent few years several efforts were dedicated for mining opinions and sentiment automatically from natural language in online networking messages, news and business product reviews. In this paper, we have explored sentiment orientation considering the positive and negative sentiments using film user reviews. We applied the technique Naive Bayes' classifier.). We have performed the sentiment analysis on the reviews using the algorithms like Naive Bayes, Linear SVM and Synthetic words. Our experimental results indicate that the Linear SVM has provided the best accuracy which is followed by the Synthetic words approach. The result also evaluate that the highest accuracy rate is of drama.
{"title":"Comparative analysis of sentiment orientation using SVM and Naive Bayes techniques","authors":"S. Rana, Archana Singh","doi":"10.1109/NGCT.2016.7877399","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877399","url":null,"abstract":"In the recent few years several efforts were dedicated for mining opinions and sentiment automatically from natural language in online networking messages, news and business product reviews. In this paper, we have explored sentiment orientation considering the positive and negative sentiments using film user reviews. We applied the technique Naive Bayes' classifier.). We have performed the sentiment analysis on the reviews using the algorithms like Naive Bayes, Linear SVM and Synthetic words. Our experimental results indicate that the Linear SVM has provided the best accuracy which is followed by the Synthetic words approach. The result also evaluate that the highest accuracy rate is of drama.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116773415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877523
Salim Istyaq, M. S. Umar
Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security such as textual password, biometric etc. are imposed. But there is some disadvantage i.e. textual password is easy to remember. On the other hand by using graphical approach, we can give the best alternative to the passwords as done in this paper. We presented a system based on the graphical scheme that uses QR code and the basic methodology is inside the levels of encryption in QR code. Our aim is to give the more complexity to the high yielding encryption in graphical passwords.
{"title":"Encoding passwords using QR image for authentication","authors":"Salim Istyaq, M. S. Umar","doi":"10.1109/NGCT.2016.7877523","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877523","url":null,"abstract":"Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security such as textual password, biometric etc. are imposed. But there is some disadvantage i.e. textual password is easy to remember. On the other hand by using graphical approach, we can give the best alternative to the passwords as done in this paper. We presented a system based on the graphical scheme that uses QR code and the basic methodology is inside the levels of encryption in QR code. Our aim is to give the more complexity to the high yielding encryption in graphical passwords.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125335725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877528
G. Sowmya, K. Meghana, B. Subbarayudu, R. Naidu, G. Keerthi
Steganography is a method of hiding a secret message within an ordinary message, where as the goal of cryptography is to make data unreadable by an unauthorized persons. Video steganography is expansion of image steganography where video files can simply viewed in a sequence of images. There are many difference between video and image steganography. As the video content is very dynamic and have less chances of detecting the hiding data compare to image steganography. So it is helpful than other existing stegnographic techniques because of it high security. It can also hold large amount of secret data. We introduced a technique called Discrete Wavelet Transformation (DWT) and Genetic algorithm to convert the data into a video file to make the video Steganography, which is an efficient method of embedding information into a carrier file. The DWT technique convert the cover image as 4 × 4 level of blocks in which each levels LL, LH, HL, and HH sub band images are developed. The current paper uses the DWT technique where the data is hidden in specific location of selected structure. Genetic algorithm is also introduced to minimize the selected frame and improve the security so that probability of detecting the hidden information into cover media is difficult. Boolean functions have been generated from different position arrays and measures the quality of the video indifferent byte streams by stego video.
{"title":"The video hiding technique based on DWT and genetic algorithm with boolean functions","authors":"G. Sowmya, K. Meghana, B. Subbarayudu, R. Naidu, G. Keerthi","doi":"10.1109/NGCT.2016.7877528","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877528","url":null,"abstract":"Steganography is a method of hiding a secret message within an ordinary message, where as the goal of cryptography is to make data unreadable by an unauthorized persons. Video steganography is expansion of image steganography where video files can simply viewed in a sequence of images. There are many difference between video and image steganography. As the video content is very dynamic and have less chances of detecting the hiding data compare to image steganography. So it is helpful than other existing stegnographic techniques because of it high security. It can also hold large amount of secret data. We introduced a technique called Discrete Wavelet Transformation (DWT) and Genetic algorithm to convert the data into a video file to make the video Steganography, which is an efficient method of embedding information into a carrier file. The DWT technique convert the cover image as 4 × 4 level of blocks in which each levels LL, LH, HL, and HH sub band images are developed. The current paper uses the DWT technique where the data is hidden in specific location of selected structure. Genetic algorithm is also introduced to minimize the selected frame and improve the security so that probability of detecting the hidden information into cover media is difficult. Boolean functions have been generated from different position arrays and measures the quality of the video indifferent byte streams by stego video.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877519
Swaleha Saeed, M. S. Umar
Information security is the rapidly rising area of concern in today's world of network technology. Traditionally, secure access to information is guarded by combination of username and password. The idea of graphical password as an alternative to text based approach was proposed by Blonder in 1996 motivated by the fact called as “picture superiority effect” i.e. tendency of human brain to memorize images far better than text. In this paper, we have proposed a new secure graphical password technique of authentication, which conceals information about the user's password without sacrificing the usability. The technique exploits indirect entry of password image by creating a delusion to select nearby neighbor which makes it difficult for a shoulder-surfer to identify the user's actual password. The simulation result and user study proved that the scheme is easier to use, faster, secure, reliable and can be easily adopted in various security applications like ATMs, mobile phones etc. without requiring any additional hardware.
{"title":"PassNeighbor: A shoulder surfing resistant scheme","authors":"Swaleha Saeed, M. S. Umar","doi":"10.1109/NGCT.2016.7877519","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877519","url":null,"abstract":"Information security is the rapidly rising area of concern in today's world of network technology. Traditionally, secure access to information is guarded by combination of username and password. The idea of graphical password as an alternative to text based approach was proposed by Blonder in 1996 motivated by the fact called as “picture superiority effect” i.e. tendency of human brain to memorize images far better than text. In this paper, we have proposed a new secure graphical password technique of authentication, which conceals information about the user's password without sacrificing the usability. The technique exploits indirect entry of password image by creating a delusion to select nearby neighbor which makes it difficult for a shoulder-surfer to identify the user's actual password. The simulation result and user study proved that the scheme is easier to use, faster, secure, reliable and can be easily adopted in various security applications like ATMs, mobile phones etc. without requiring any additional hardware.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128073773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877444
H. K. Boyapati, Rajeev Kumar Elubudi, Sailaja Ungati, Manoj Jain
The military wireless systems often have specific constraints such as achieving very good receiver sensitivity, very high tolerance to frequency shifts and best possible dynamic range. Direct spread spectrum (DSS) is the proven threat free technology in many militarized wireless systems, which will also gives the advantage of good receiver sensitivity because of spreading gain it offers. The RF dynamic range of the receiver is defined as the range of signal strength values for which receiver works without packet loss. Improving the RF dynamic range is one of the important challenges. Because of power variations, Doppler variation (or) any other wireless channel effect received signal power varies. In worst cases, the received signal power can vary with a dynamic range of 70 dB to 80 dB depending on the distance between a transmitter and a receiver. In this paper, we have implemented RSSI indexed Look Up Table (LUT) based approach of automatic gain control. The results show improvement in dynamic range with simplicity in implementation.
{"title":"Implementation of RSSI indexed look up table based AGC for improved dynamic range of DSSS based wireless rf transceivers","authors":"H. K. Boyapati, Rajeev Kumar Elubudi, Sailaja Ungati, Manoj Jain","doi":"10.1109/NGCT.2016.7877444","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877444","url":null,"abstract":"The military wireless systems often have specific constraints such as achieving very good receiver sensitivity, very high tolerance to frequency shifts and best possible dynamic range. Direct spread spectrum (DSS) is the proven threat free technology in many militarized wireless systems, which will also gives the advantage of good receiver sensitivity because of spreading gain it offers. The RF dynamic range of the receiver is defined as the range of signal strength values for which receiver works without packet loss. Improving the RF dynamic range is one of the important challenges. Because of power variations, Doppler variation (or) any other wireless channel effect received signal power varies. In worst cases, the received signal power can vary with a dynamic range of 70 dB to 80 dB depending on the distance between a transmitter and a receiver. In this paper, we have implemented RSSI indexed Look Up Table (LUT) based approach of automatic gain control. The results show improvement in dynamic range with simplicity in implementation.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877529
Ankita Shrivastava, S. Choudhary, Ashish Kumar
Cross site scripting (XSS) is a type of scripting attack on web pages and account as one of the unsafe vulnerability existed in web applications. Once the vulnerability is oppressed, an intruder advances intended access of the authenticate user's web-browser and may perform session-hijacking, cookie-stealing, malicious redirection and malware-spreading. As prevention against such attacks, it is essential to implement security measures that certainly block the third party intrusion. Recently the most dangerous attacks are reflected and DOM based cross-site scripting attacks because in both cases attacker attack using server side scripting and do forgery over the network, it is hard to detect and therefore it must be prevented. Vulnerabilities of websites are exploited over the network through web request using GET and POST method. In this paper, we are focusing on injection, detection, and prevention of stored based XSS reflected XSS and DOM based XSS.
{"title":"XSS vulnerability assessment and prevention in web application","authors":"Ankita Shrivastava, S. Choudhary, Ashish Kumar","doi":"10.1109/NGCT.2016.7877529","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877529","url":null,"abstract":"Cross site scripting (XSS) is a type of scripting attack on web pages and account as one of the unsafe vulnerability existed in web applications. Once the vulnerability is oppressed, an intruder advances intended access of the authenticate user's web-browser and may perform session-hijacking, cookie-stealing, malicious redirection and malware-spreading. As prevention against such attacks, it is essential to implement security measures that certainly block the third party intrusion. Recently the most dangerous attacks are reflected and DOM based cross-site scripting attacks because in both cases attacker attack using server side scripting and do forgery over the network, it is hard to detect and therefore it must be prevented. Vulnerabilities of websites are exploited over the network through web request using GET and POST method. In this paper, we are focusing on injection, detection, and prevention of stored based XSS reflected XSS and DOM based XSS.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877449
Ghriti Khanna, N. Sharma
The paper exhibits a novel design of stair cased shaped fractal antenna for multiband applications. The antenna is designed on FR4 glass epoxy substrate with parameters like thickness 1.6mm, dielectric constant 4.4 and resonant frequency 3.8GHz. Proposed antenna is simulated and coaxial feed is used to analyze its performance. Maximum value of gain observed is 7.51dB. The HFSS version 13 software is used for designing and simulating the antenna. Designed antenna can be used for several wireless communication applications like S-band (2.67–2.87GHz), WiMAX (4.5–4.6 GHz), WiMAX (5.2–5.5 GHz), C-band (6.95–7.4 GHz) and X-band (8.6–8.65 GHz).
{"title":"A novel design of stair cased shaped fractal antenna for wireless applications","authors":"Ghriti Khanna, N. Sharma","doi":"10.1109/NGCT.2016.7877449","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877449","url":null,"abstract":"The paper exhibits a novel design of stair cased shaped fractal antenna for multiband applications. The antenna is designed on FR4 glass epoxy substrate with parameters like thickness 1.6mm, dielectric constant 4.4 and resonant frequency 3.8GHz. Proposed antenna is simulated and coaxial feed is used to analyze its performance. Maximum value of gain observed is 7.51dB. The HFSS version 13 software is used for designing and simulating the antenna. Designed antenna can be used for several wireless communication applications like S-band (2.67–2.87GHz), WiMAX (4.5–4.6 GHz), WiMAX (5.2–5.5 GHz), C-band (6.95–7.4 GHz) and X-band (8.6–8.65 GHz).","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130537962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877391
Talwana Jonathan Charity, Gu Chun Hua
Cloud computing offers variety of services from software instance to resource provisioning. As the user demands increase, there is a necessity to enhance cloud offerings. But still in some cases fault-tolerance is the major challenge for cloud environment. Multiple request to access the same server sometime leads to server over loaded and may increase faults and cause unreliability for the server. Few fault-tolerance techniques like self-healing, job migration, static load balancing and replication are existed but they are not fully reliable and effective for cloud environment. In this paper, we propose pro-active approach for fault-tolerance based on Processing power, Memory and Network parameters to increase resource reliability. Through this approach, we first calculate the reliability of each Virtual Machine (VM) based on success rate of task execution and then schedule the task on highly reliable VM. This approach provides comparatively good results for the VM reliability and system stability.
{"title":"Resource reliability using fault tolerance in cloud computing","authors":"Talwana Jonathan Charity, Gu Chun Hua","doi":"10.1109/NGCT.2016.7877391","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877391","url":null,"abstract":"Cloud computing offers variety of services from software instance to resource provisioning. As the user demands increase, there is a necessity to enhance cloud offerings. But still in some cases fault-tolerance is the major challenge for cloud environment. Multiple request to access the same server sometime leads to server over loaded and may increase faults and cause unreliability for the server. Few fault-tolerance techniques like self-healing, job migration, static load balancing and replication are existed but they are not fully reliable and effective for cloud environment. In this paper, we propose pro-active approach for fault-tolerance based on Processing power, Memory and Network parameters to increase resource reliability. Through this approach, we first calculate the reliability of each Virtual Machine (VM) based on success rate of task execution and then schedule the task on highly reliable VM. This approach provides comparatively good results for the VM reliability and system stability.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124696218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877536
B. Dewangan, A. Agarwal, Venkatadri, Ashutosh Pasricha
Accessing of data from cloud storage is growing as many users are getting in to the internet use. Data are stored in at multiple locations and can access services of different layers. Hackers and malicious intruders are active always and confidential data can be using in other ways. This led to decrease the trust of users from Cloud Service Provider (CSP). Cloud storage security and efficient access of data are main concern of this paper. In current scenario, chunk calculation, distributed hash table and bloom filter has contributed to load balancing management are common techniques of cloud storage in cloud computing systems. To maintain the trust between CSP and user, removal of duplication of data is very essential. This paper reviews the existing model of data de-duplication in cloud computing research.
{"title":"Credential and security issues of cloud service models","authors":"B. Dewangan, A. Agarwal, Venkatadri, Ashutosh Pasricha","doi":"10.1109/NGCT.2016.7877536","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877536","url":null,"abstract":"Accessing of data from cloud storage is growing as many users are getting in to the internet use. Data are stored in at multiple locations and can access services of different layers. Hackers and malicious intruders are active always and confidential data can be using in other ways. This led to decrease the trust of users from Cloud Service Provider (CSP). Cloud storage security and efficient access of data are main concern of this paper. In current scenario, chunk calculation, distributed hash table and bloom filter has contributed to load balancing management are common techniques of cloud storage in cloud computing systems. To maintain the trust between CSP and user, removal of duplication of data is very essential. This paper reviews the existing model of data de-duplication in cloud computing research.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877405
Mustafa Aljshamee, R. Hassani, P. Luksch
Brain-computer interface (BCI) technology is communication system is rely a pathway to explore the brain activities to external world. The BCI technique make possible to monitor some physical processes that occur within the brain activity that correspond to certain forms of flickering light through stimuli. Observed a thousand of brain activities are firing instantaneous which allowed the BCI system to explicit one or more signals are controlled on computer command or dominance any other devices. Electroencephalogram (EEG) signal based BCI facing a serious challenge in online applications which are slower reaction and consume more time at computational analysis and extraction. Prosperous advance techniques based on EEG raw-data to extract feature with distributed computing system which are offered a promises result that overcomes these gaps. Therefore, have been developed a BCI prototype that realized by reliable capability which take decision in real time or predicted an inclination in real life application. In previous studies were employed a single CPU system, which is revealed decent performance for smaller dataset; in other hand the open multi-processing (OpenMP) platform provide a high performance computing in more accuracy and supplemental precisely outcome within a large datasets. The main concept of parallelize computing that can be separate the tasks individually which is allowed to parallelized process based on multiple cores. In this, work conclude two approaches which are utilized a high performance computing (HPC) to realize a faster analysis reaction of brain activities and recognition based on evoked SSVEP signal by exploring the Hilbert transform (HT) and quadrature amplitude demodulation (QAD) techniques depend on patterns detection; however have been employed a five frequencies to extract short-term Fourier transform (STFT) feature based on four type filters using windowing function. Both approaches were adapted into HPC technique to distinguish the extraction and execution time.
{"title":"Rapid computation and analysis using a multiple core to enhance SSVEP based system","authors":"Mustafa Aljshamee, R. Hassani, P. Luksch","doi":"10.1109/NGCT.2016.7877405","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877405","url":null,"abstract":"Brain-computer interface (BCI) technology is communication system is rely a pathway to explore the brain activities to external world. The BCI technique make possible to monitor some physical processes that occur within the brain activity that correspond to certain forms of flickering light through stimuli. Observed a thousand of brain activities are firing instantaneous which allowed the BCI system to explicit one or more signals are controlled on computer command or dominance any other devices. Electroencephalogram (EEG) signal based BCI facing a serious challenge in online applications which are slower reaction and consume more time at computational analysis and extraction. Prosperous advance techniques based on EEG raw-data to extract feature with distributed computing system which are offered a promises result that overcomes these gaps. Therefore, have been developed a BCI prototype that realized by reliable capability which take decision in real time or predicted an inclination in real life application. In previous studies were employed a single CPU system, which is revealed decent performance for smaller dataset; in other hand the open multi-processing (OpenMP) platform provide a high performance computing in more accuracy and supplemental precisely outcome within a large datasets. The main concept of parallelize computing that can be separate the tasks individually which is allowed to parallelized process based on multiple cores. In this, work conclude two approaches which are utilized a high performance computing (HPC) to realize a faster analysis reaction of brain activities and recognition based on evoked SSVEP signal by exploring the Hilbert transform (HT) and quadrature amplitude demodulation (QAD) techniques depend on patterns detection; however have been employed a five frequencies to extract short-term Fourier transform (STFT) feature based on four type filters using windowing function. Both approaches were adapted into HPC technique to distinguish the extraction and execution time.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}