Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877473
Swati Pathak, N. Mishra
The advancement in the world of internet has made information retrieval an easy task. Search engines provide users the information they need but not in specific form, instead floods the user with lots of documents/web pages that contain the information required by user. User waste their time to scan all documents in order to retrieve the needed information. Question Answering System reduces this drawback by automating the whole process. In this paper a tourism domain Question Answering System is proposed that contains the information about the tourist places of five different cities of Rajasthan. The system follows the principles of information retrieval and natural language processing. The proposed system is experimented with the set of 300 questions and it is observed that the system showed 70% precision and 80% accuracy rate. Lastly, proposed QAS (Question Answering System) is compared with other three existing Question Answering systems: AnswerBus [29], START [4], and NaLURI [28].
{"title":"Context aware restricted tourism domain question answering system","authors":"Swati Pathak, N. Mishra","doi":"10.1109/NGCT.2016.7877473","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877473","url":null,"abstract":"The advancement in the world of internet has made information retrieval an easy task. Search engines provide users the information they need but not in specific form, instead floods the user with lots of documents/web pages that contain the information required by user. User waste their time to scan all documents in order to retrieve the needed information. Question Answering System reduces this drawback by automating the whole process. In this paper a tourism domain Question Answering System is proposed that contains the information about the tourist places of five different cities of Rajasthan. The system follows the principles of information retrieval and natural language processing. The proposed system is experimented with the set of 300 questions and it is observed that the system showed 70% precision and 80% accuracy rate. Lastly, proposed QAS (Question Answering System) is compared with other three existing Question Answering systems: AnswerBus [29], START [4], and NaLURI [28].","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134647636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877437
Radhika Patil, Anuradha Srinivasaraghavan
The heavy traffic congestion problem in major cities and towns is mainly attributed to the time spend across crowded traffic junctions especially during peak hours. The traffic across junctions is controlled by signaling patterns, where the signal duration is invariably static in nature. The traffic density across either sides of the road does not affect the duration of signal. For reducing the time taken in waiting across traffic junction, the proposed work aims at simulating a dynamic traffic signal using fuzzy logic which would change the timing of the green signal with respect to the intensity of traffic and feed this to an arduino microcontroller based fuzzy inference system which decides the duration of the green signal. The intensity of traffic is computed using two methods, feature detection and image subtraction methods. The feature detection method takes lot of processing time and image subtraction method along with fuzzy logic was found more suitable in dynamically controlling the duration of traffic signals.
{"title":"Smart traffic controller using fuzzy inference system(STCFIS)","authors":"Radhika Patil, Anuradha Srinivasaraghavan","doi":"10.1109/NGCT.2016.7877437","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877437","url":null,"abstract":"The heavy traffic congestion problem in major cities and towns is mainly attributed to the time spend across crowded traffic junctions especially during peak hours. The traffic across junctions is controlled by signaling patterns, where the signal duration is invariably static in nature. The traffic density across either sides of the road does not affect the duration of signal. For reducing the time taken in waiting across traffic junction, the proposed work aims at simulating a dynamic traffic signal using fuzzy logic which would change the timing of the green signal with respect to the intensity of traffic and feed this to an arduino microcontroller based fuzzy inference system which decides the duration of the green signal. The intensity of traffic is computed using two methods, feature detection and image subtraction methods. The feature detection method takes lot of processing time and image subtraction method along with fuzzy logic was found more suitable in dynamically controlling the duration of traffic signals.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133163785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877500
Manjinder Singh, H. Kaur
Filling dead pixels or eliminating unwanted things is typically preferred within the applications of remotely sensed images. In proposed article, a competent image inpainting technique is demonstrated to resolve this drawback, relied Nonlocal total variation. Initially remotely sensed images are effected by ill posed inverse problems i.e. image destripping, image denoising etc. So it is required to use regularization technique to makes these problems well posed i.e. NLTV method, which is the combination of nonlocal operators and total variation model. Actually this method can make use of the good features of non local operators for textured images and total variation method in edge preserving for color images. To optimize the proposed variation model, an Ant Colony Optimization algorithm is used in order to get similarity with the original image. And evaluate the outcomes of proposed technique with the existing technique i.e. MNLTV optimized by Bregmanized-operator-splitting algorithm which is a prediction based method. The investigation of all outcomes confirms the efficacy of this rule.
{"title":"Image inpainting in remotely sensed images by optimizing NLTV model by ant colony optimization","authors":"Manjinder Singh, H. Kaur","doi":"10.1109/NGCT.2016.7877500","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877500","url":null,"abstract":"Filling dead pixels or eliminating unwanted things is typically preferred within the applications of remotely sensed images. In proposed article, a competent image inpainting technique is demonstrated to resolve this drawback, relied Nonlocal total variation. Initially remotely sensed images are effected by ill posed inverse problems i.e. image destripping, image denoising etc. So it is required to use regularization technique to makes these problems well posed i.e. NLTV method, which is the combination of nonlocal operators and total variation model. Actually this method can make use of the good features of non local operators for textured images and total variation method in edge preserving for color images. To optimize the proposed variation model, an Ant Colony Optimization algorithm is used in order to get similarity with the original image. And evaluate the outcomes of proposed technique with the existing technique i.e. MNLTV optimized by Bregmanized-operator-splitting algorithm which is a prediction based method. The investigation of all outcomes confirms the efficacy of this rule.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133138692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877524
Pooja Sharma, Sanjeev Kumar, Neeraj Sharma
Botnet is a collection of infected computers i.e. collection of zombie PCs which are remotely controlled by a single person or a group so called botmaster. In the recent years, botnets are becoming stealthier in nature by implanting certain techniques to hide themselves such as fast flux or DGA algorithms to generate the domain names. Generally, the class of botnet can be categorized into two major class-one which exploiting the IP protocol and another is using the DNS protocol for communications. The bot malwares who are using the DNS protocol are designed to remain unaffected over a long period of time. Once they receive the commands from the botmaster, they start to response to execute further actionable commands to perform SPAMs or DDoS attacks. To address such issues, BotMAD-Botnet Malicious Activity Detection based on DNS traffic pattern analysis is presented to detect such class of botnet family which are not detected by IP protocol based exploiting technique because IP may be changed by the botmaster by using fast flux or other techniques to make them stealth in nature. BotMAD — an automated DNS traffic Analyzer and Detector is introduced which automatically detect the malicious IP/Domain pair by inspecting the DNS packets from the network traces. Further the feed of DNSBL database is integrated with the system by fetching the records of malicious domains through Intel critical-stack API to enrich the database. To validate the accuracy of the system, two data sets are used-one is network traces of bot malwares captured on honeypots and second one domain reputation engines for validation. In the end, we conclude that the developed framework is giving the promising results in the form of botnet domain detection.
{"title":"BotMAD: Botnet malicious activity detector based on DNS traffic analysis","authors":"Pooja Sharma, Sanjeev Kumar, Neeraj Sharma","doi":"10.1109/NGCT.2016.7877524","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877524","url":null,"abstract":"Botnet is a collection of infected computers i.e. collection of zombie PCs which are remotely controlled by a single person or a group so called botmaster. In the recent years, botnets are becoming stealthier in nature by implanting certain techniques to hide themselves such as fast flux or DGA algorithms to generate the domain names. Generally, the class of botnet can be categorized into two major class-one which exploiting the IP protocol and another is using the DNS protocol for communications. The bot malwares who are using the DNS protocol are designed to remain unaffected over a long period of time. Once they receive the commands from the botmaster, they start to response to execute further actionable commands to perform SPAMs or DDoS attacks. To address such issues, BotMAD-Botnet Malicious Activity Detection based on DNS traffic pattern analysis is presented to detect such class of botnet family which are not detected by IP protocol based exploiting technique because IP may be changed by the botmaster by using fast flux or other techniques to make them stealth in nature. BotMAD — an automated DNS traffic Analyzer and Detector is introduced which automatically detect the malicious IP/Domain pair by inspecting the DNS packets from the network traces. Further the feed of DNSBL database is integrated with the system by fetching the records of malicious domains through Intel critical-stack API to enrich the database. To validate the accuracy of the system, two data sets are used-one is network traces of bot malwares captured on honeypots and second one domain reputation engines for validation. In the end, we conclude that the developed framework is giving the promising results in the form of botnet domain detection.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121869968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877451
Vivek Kumar, R. Mehra, Shallu
Digital filters play a vital role in the era of digital communication system. Digital bandpass filter basically provide high attenuation to the unwanted frequency components in stop band and offer very low or ideally zero attenuation to desired signal components in passband when its impulse response is adjusted as per required specifications. The selection of an appropriate Field Programmable Gate Array(FPGA) device for implementation of an area efficient, cost effective and high speed Finite Impulse Response(FIR) bandpass filter is a challenging task. In this paper an FPGA based FIR band pass filter is designed with the help of Kaiser Window. The proposed filter is implemented on two FPGA devices Xilinx's Spartan-3E, xc3s500e-4fg320 and Virtex2p, xc2vp30-5ff896 and compared on the basis of Direct-form FIR and Direct-Form Symmetric FIR structure for hardware resource utilization as well as speed. The hardware result shows that the proposed FIR bandpass filter designed on virtex-2p with Direct Form Symmetric FIR structure uses 11.27% less LUTs, 7.35% less Slices as well as 13.44% faster than that designed on Spartan3E with Direct form FIR structure.
{"title":"Reconfigurable band pass filter using Kaiser window for satellite communication","authors":"Vivek Kumar, R. Mehra, Shallu","doi":"10.1109/NGCT.2016.7877451","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877451","url":null,"abstract":"Digital filters play a vital role in the era of digital communication system. Digital bandpass filter basically provide high attenuation to the unwanted frequency components in stop band and offer very low or ideally zero attenuation to desired signal components in passband when its impulse response is adjusted as per required specifications. The selection of an appropriate Field Programmable Gate Array(FPGA) device for implementation of an area efficient, cost effective and high speed Finite Impulse Response(FIR) bandpass filter is a challenging task. In this paper an FPGA based FIR band pass filter is designed with the help of Kaiser Window. The proposed filter is implemented on two FPGA devices Xilinx's Spartan-3E, xc3s500e-4fg320 and Virtex2p, xc2vp30-5ff896 and compared on the basis of Direct-form FIR and Direct-Form Symmetric FIR structure for hardware resource utilization as well as speed. The hardware result shows that the proposed FIR bandpass filter designed on virtex-2p with Direct Form Symmetric FIR structure uses 11.27% less LUTs, 7.35% less Slices as well as 13.44% faster than that designed on Spartan3E with Direct form FIR structure.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124983762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877413
Ranjit Kumar Bindal, I. Kaur
In this paper Direct torque control technique of induction motor is used with different controlling techniques. These techniques are Direct Torque Control with Proportional controller, Proportional Integral controller, Fuzzy Logic controller, Neural Network and Space Vector Modulation. In all the techniques by performing experiments, I have calculated the reading of electromagnetic torque, stator flux, stator current and motor speed of the induction motor. By comparing the above technique results with each other we find that the best technique. All the output are obtained by Matlab / Simulink software.
{"title":"Comparative analysis of different controlling techniques using direct torque control on induction motor","authors":"Ranjit Kumar Bindal, I. Kaur","doi":"10.1109/NGCT.2016.7877413","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877413","url":null,"abstract":"In this paper Direct torque control technique of induction motor is used with different controlling techniques. These techniques are Direct Torque Control with Proportional controller, Proportional Integral controller, Fuzzy Logic controller, Neural Network and Space Vector Modulation. In all the techniques by performing experiments, I have calculated the reading of electromagnetic torque, stator flux, stator current and motor speed of the induction motor. By comparing the above technique results with each other we find that the best technique. All the output are obtained by Matlab / Simulink software.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"26 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125045828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877517
A. A. Kumar, E. Rajan
The 3-D objects used in 3D video games and virtual reality are hollow polygon meshes with textures applied on them. On the other hand, volume data representation not only stores the outer surface features, but also the features inside the volume. For example, visualization of 3-D MRI/CT data is all about showing the inside parts too. Visualizing volumetric data requires more video memory. Most of the actual 3D volume data generated especially by MRI scanners are gray level images. This paper addresses a novel technique of monotone coloring the MRI data slides and its processing for extraction of superficial and volumetric features.
{"title":"Monotone coloring of 3D MR image slices and extraction of their superficial and volumetric features","authors":"A. A. Kumar, E. Rajan","doi":"10.1109/NGCT.2016.7877517","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877517","url":null,"abstract":"The 3-D objects used in 3D video games and virtual reality are hollow polygon meshes with textures applied on them. On the other hand, volume data representation not only stores the outer surface features, but also the features inside the volume. For example, visualization of 3-D MRI/CT data is all about showing the inside parts too. Visualizing volumetric data requires more video memory. Most of the actual 3D volume data generated especially by MRI scanners are gray level images. This paper addresses a novel technique of monotone coloring the MRI data slides and its processing for extraction of superficial and volumetric features.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129115859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877535
S. Munisankaraiah, A. A. Kumar
The fifth generation (5G) network would be a key facilitator to keeping up to the future wireless application demands such as ultra-high data rate, ultra-wide radio coverage, ultra — low latency, large number of devices connected etc. Security is a crucial issue in the 5G network as wireless transmissions have the innate quality of vulnerability towards unfriendly breach or hacks. In this paper, security issue in the 5G network, specifically the physical layer security, has been analyzed. The physical layer safeguards confidentiality of data by capitalizing on the inherent random nature of the communication medium. There are various technologies prevalent in 5G, the three most prominent ones-heterogeneous networks, massive multiple-input multiple-output, and millimeter wave have been considered and discussed. The potential areas for improvement and issues in each of the technologies have been identified and analyzed. This analysis would help in better understanding of physical layer security in the future.
{"title":"Physical layer security in 5G wireless networks for data protection","authors":"S. Munisankaraiah, A. A. Kumar","doi":"10.1109/NGCT.2016.7877535","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877535","url":null,"abstract":"The fifth generation (5G) network would be a key facilitator to keeping up to the future wireless application demands such as ultra-high data rate, ultra-wide radio coverage, ultra — low latency, large number of devices connected etc. Security is a crucial issue in the 5G network as wireless transmissions have the innate quality of vulnerability towards unfriendly breach or hacks. In this paper, security issue in the 5G network, specifically the physical layer security, has been analyzed. The physical layer safeguards confidentiality of data by capitalizing on the inherent random nature of the communication medium. There are various technologies prevalent in 5G, the three most prominent ones-heterogeneous networks, massive multiple-input multiple-output, and millimeter wave have been considered and discussed. The potential areas for improvement and issues in each of the technologies have been identified and analyzed. This analysis would help in better understanding of physical layer security in the future.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127931951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877463
Neha Gaur, Archana Singh
The long hours working style and excessive usage of media has caused various health related issues and wrong eating habits in youth. The intake of food decided the nutrition level and energy in our body. right food is something that can make one's life Healthy and cheerful and if the same intake is in wrong way then, that can ruin one's whole body system and leads to many health hazards. Healthy food leads to long life span and Happy life. This paper explores and recommends a model for systematic diet and healthy food. The proposed recommender system would help youth to maintain their healthy food habits which in turn would increase their energy and efficiency of work.
{"title":"Recommender system — Making lifestyle healthy using information retrieval","authors":"Neha Gaur, Archana Singh","doi":"10.1109/NGCT.2016.7877463","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877463","url":null,"abstract":"The long hours working style and excessive usage of media has caused various health related issues and wrong eating habits in youth. The intake of food decided the nutrition level and energy in our body. right food is something that can make one's life Healthy and cheerful and if the same intake is in wrong way then, that can ruin one's whole body system and leads to many health hazards. Healthy food leads to long life span and Happy life. This paper explores and recommends a model for systematic diet and healthy food. The proposed recommender system would help youth to maintain their healthy food habits which in turn would increase their energy and efficiency of work.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129664292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877493
Mukesh Kumar, V. Thakkar, H. Bhadauria, I. Kumar
Breast cancer is one of the most incurable diseases, which leads to the death of women globally every year. For early detection of a tumor in the breast, a basic technique called ‘Mammography’ is used, which is an x-ray analysis of breast. This work emphasizes on the proper selection of denoising techniques for the mammographic images. To achieve the objective of this work, exhaustive experiments are carried out using spatial domain filtering techniques as well as frequency domain filtering techniques on mammograms of the Mammographic Image Analysis Society (MIAS) data. The effectiveness of the techniques is evaluated in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Mean Structure Similarity Index (MSSIM), Maximum Difference (MD), Normalized Absolute Error (NAE), and Structural Content (SC). It is observed that Wavelet denoising and Median filter show better results than Adaptive Histogram Equalization (AHE), Butterworth and Frost filters.
{"title":"Mammogram's denoising in spatial and frequency domain","authors":"Mukesh Kumar, V. Thakkar, H. Bhadauria, I. Kumar","doi":"10.1109/NGCT.2016.7877493","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877493","url":null,"abstract":"Breast cancer is one of the most incurable diseases, which leads to the death of women globally every year. For early detection of a tumor in the breast, a basic technique called ‘Mammography’ is used, which is an x-ray analysis of breast. This work emphasizes on the proper selection of denoising techniques for the mammographic images. To achieve the objective of this work, exhaustive experiments are carried out using spatial domain filtering techniques as well as frequency domain filtering techniques on mammograms of the Mammographic Image Analysis Society (MIAS) data. The effectiveness of the techniques is evaluated in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Mean Structure Similarity Index (MSSIM), Maximum Difference (MD), Normalized Absolute Error (NAE), and Structural Content (SC). It is observed that Wavelet denoising and Median filter show better results than Adaptive Histogram Equalization (AHE), Butterworth and Frost filters.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}