Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319372
Dogukan Aksu, A. Aydin
There are a lot of disabled people who can't control some parts of their bodies such as ALS and real time human — computer interaction systems can help them. In this paper, a real time vision system is presented to provide a communication way to people has severe disabilities. Patients will be able to choose words on an alphabet tree which is designed on a binary tree by blinking right and left eye, thus they will make sentences.
{"title":"Human computer interaction by eye blinking on real time","authors":"Dogukan Aksu, A. Aydin","doi":"10.1109/CICN.2017.8319372","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319372","url":null,"abstract":"There are a lot of disabled people who can't control some parts of their bodies such as ALS and real time human — computer interaction systems can help them. In this paper, a real time vision system is presented to provide a communication way to people has severe disabilities. Patients will be able to choose words on an alphabet tree which is designed on a binary tree by blinking right and left eye, thus they will make sentences.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125005970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319362
C. Alexandre, Petru Bocsanean, J. Mangana, João Santos, David Monteiro, Patrick Santos
Nowadays, mobile wallets are widely used for payments. However, these applications have great potential to offer new services for the consumers, such as the presentation of marketing campaigns based on the consumers' preferences. On this paper is presented a data mining study for a novel mobile wallet ecosystem, where the behaviors and preferences of the consumers are analyzed in order to create targeted marketing campaigns through their mobile wallets. The CRISP-DM methodology was used to perform the data mining studies.
{"title":"Marketing behaviors analysis in a mobile wallet solution using data mining","authors":"C. Alexandre, Petru Bocsanean, J. Mangana, João Santos, David Monteiro, Patrick Santos","doi":"10.1109/CICN.2017.8319362","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319362","url":null,"abstract":"Nowadays, mobile wallets are widely used for payments. However, these applications have great potential to offer new services for the consumers, such as the presentation of marketing campaigns based on the consumers' preferences. On this paper is presented a data mining study for a novel mobile wallet ecosystem, where the behaviors and preferences of the consumers are analyzed in order to create targeted marketing campaigns through their mobile wallets. The CRISP-DM methodology was used to perform the data mining studies.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"531 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120979165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319379
Abdulhafis Abdulazeez Osuwa, E. Ekhoragbon, L. T. Fat
Artificial intelligence is the best solution to manage huge data flows and storage in the IoT network. IoT nowadays becoming more and more popular with the inventions of highspeed internet networks and many advanced sensors that can be integrated into a microcontroller. The data flows internets now will have sensors data and user data that send and receive from the workstations. With the increase in the number of workstation and more and more sensors, some data may be facing problems on the storage, delay, channels limitation and congestion in the networks. To avoid all these problems, there were many algorithms were proposed in the past of 10 years. Among all the algorithms, Artificial Intelligence still being the best solution to the data mining, manage and control of congestion in the network. The aim of this paper is to present the application of artificial intelligence system in the IoT. The importance of data mining and management will be highlighted in the paper. Also, the method used in the Artificial Intelligence like fuzzy logics and neural network also will be discussed in this paper in conjunction with IoT network. The self-optimizing network and software defined network are parts of the important parameters in the Artificial Intelligence IoT System.
{"title":"Application of artificial intelligence in Internet of Things","authors":"Abdulhafis Abdulazeez Osuwa, E. Ekhoragbon, L. T. Fat","doi":"10.1109/CICN.2017.8319379","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319379","url":null,"abstract":"Artificial intelligence is the best solution to manage huge data flows and storage in the IoT network. IoT nowadays becoming more and more popular with the inventions of highspeed internet networks and many advanced sensors that can be integrated into a microcontroller. The data flows internets now will have sensors data and user data that send and receive from the workstations. With the increase in the number of workstation and more and more sensors, some data may be facing problems on the storage, delay, channels limitation and congestion in the networks. To avoid all these problems, there were many algorithms were proposed in the past of 10 years. Among all the algorithms, Artificial Intelligence still being the best solution to the data mining, manage and control of congestion in the network. The aim of this paper is to present the application of artificial intelligence system in the IoT. The importance of data mining and management will be highlighted in the paper. Also, the method used in the Artificial Intelligence like fuzzy logics and neural network also will be discussed in this paper in conjunction with IoT network. The self-optimizing network and software defined network are parts of the important parameters in the Artificial Intelligence IoT System.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126775395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319388
Vandana Thind, N. Pandey, B. Pandey, D. Hussain
Stack memory is an approach in which information is entered and deleted from the memory segment in the pattern of last in the first out mechanism. In this work of analysis, the algorithm is implemented on a different type of FPGA platforms like Virtex-4, Virtex-5, Virtex-6, Virtex-6 low power and virtex7 low voltage where very detailed observations/investigations were made about timing constraint, memory utilization, and power dissipation. The main focus is to design and develop a system which is energy efficient. Therefore, VHDL programming is used to perform this investigation with the help of Xilinx ISE design suite which is synthesis tool. Basically, this software provides detailed information about various facets of a digital system that is important for the prior understanding of its real-time output, so that source used to realize the project should not be wasted and results to be the energy efficient design. Among these five type of FPGA, Virtex-4 and Virtex-7 low voltage were considered as the most energy efficient platforms. The developed system is energy efficient as the algorithm ensures less memory utilization, less power consumption and short time for signal travel.
{"title":"Stack memory implementation and analysis of timing constraint, power and memory using FPGA","authors":"Vandana Thind, N. Pandey, B. Pandey, D. Hussain","doi":"10.1109/CICN.2017.8319388","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319388","url":null,"abstract":"Stack memory is an approach in which information is entered and deleted from the memory segment in the pattern of last in the first out mechanism. In this work of analysis, the algorithm is implemented on a different type of FPGA platforms like Virtex-4, Virtex-5, Virtex-6, Virtex-6 low power and virtex7 low voltage where very detailed observations/investigations were made about timing constraint, memory utilization, and power dissipation. The main focus is to design and develop a system which is energy efficient. Therefore, VHDL programming is used to perform this investigation with the help of Xilinx ISE design suite which is synthesis tool. Basically, this software provides detailed information about various facets of a digital system that is important for the prior understanding of its real-time output, so that source used to realize the project should not be wasted and results to be the energy efficient design. Among these five type of FPGA, Virtex-4 and Virtex-7 low voltage were considered as the most energy efficient platforms. The developed system is energy efficient as the algorithm ensures less memory utilization, less power consumption and short time for signal travel.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132120869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319367
Sevcan Emek, Vedat Evren, Şebnem Bora
This paper describes the regulation of the body temperature using an agent-based control system which can be used to simulate and visualize the process of homeostatic control systems inside the human body. The goal is to observe and analyze model dynamics on the negative feedback control mechanism with the agent-based modeling approach of the intelligent system. Agent-based modeling and simulation is a computational modeling which offers researchers to solve complex and practical problems using algorithmic descriptions. In this study, we present the concepts and illustrate graphically how the thermoregulatory system achieves balance between heat production or heat loss. It considers that the control system developed with a different modeling approach could be a case study for learning, for researching and for exploring into other human homeostatic control system.
{"title":"An agent-based approach in homeostatic control systems: Thermoregulation","authors":"Sevcan Emek, Vedat Evren, Şebnem Bora","doi":"10.1109/CICN.2017.8319367","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319367","url":null,"abstract":"This paper describes the regulation of the body temperature using an agent-based control system which can be used to simulate and visualize the process of homeostatic control systems inside the human body. The goal is to observe and analyze model dynamics on the negative feedback control mechanism with the agent-based modeling approach of the intelligent system. Agent-based modeling and simulation is a computational modeling which offers researchers to solve complex and practical problems using algorithmic descriptions. In this study, we present the concepts and illustrate graphically how the thermoregulatory system achieves balance between heat production or heat loss. It considers that the control system developed with a different modeling approach could be a case study for learning, for researching and for exploring into other human homeostatic control system.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123027680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319376
João Santos, Marco Antunes, J. Mangana, David Monteiro, Patrick Santos, João Casal
Tasks related with payments, personal identification, and the usage of tickets and marketing items can be achieved through mobile wallets. Despite the advantages that these present, such as their ease of usage and great accessibility, some security concerns are still pointed out by consumers. On this paper are presented the main security issues existent on mobile wallet ecosystems nowadays, and the possible tests and security measures that can be adopted on those ecosystems. The tests that we describe on the paper are performed on a novel mobile wallet ecosystem named weWallet, and are segmented on three axes: mobile applications, cloud infrastructure, and physical communication technologies.
{"title":"Security testing framework for a novel mobile wallet ecosystem","authors":"João Santos, Marco Antunes, J. Mangana, David Monteiro, Patrick Santos, João Casal","doi":"10.1109/CICN.2017.8319376","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319376","url":null,"abstract":"Tasks related with payments, personal identification, and the usage of tickets and marketing items can be achieved through mobile wallets. Despite the advantages that these present, such as their ease of usage and great accessibility, some security concerns are still pointed out by consumers. On this paper are presented the main security issues existent on mobile wallet ecosystems nowadays, and the possible tests and security measures that can be adopted on those ecosystems. The tests that we describe on the paper are performed on a novel mobile wallet ecosystem named weWallet, and are segmented on three axes: mobile applications, cloud infrastructure, and physical communication technologies.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128528698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319377
Yasemin Bay, Meryem Erbilek, Ama Fosuah Gyasi Cyprus, Erbuğ Çelebi
The ubiquitous nature of our digital lifestyle raised many security issues including signature imitation and stealing of our identity. Therefore, there is a need for robust systems to verify or identify the signatory. In this paper, in contradistinction to other researchers working in signature biometrics, we investigate and explore the impact of blind and visual signing in signature biometrics for online signature identification. Experimental performance evaluation, using the publicly available SUSIG signature database, is carried out to provide some new and preliminary insights into the relationship between different practical factors, in particular clarifying the impact on identification performance of the blind and visual signing data collection protocols used to support the signature processing. Our results explored that adaption of the blind or visual signing data collection protocols has impact on the recognition performance less critical than hitherto expected.
{"title":"The impact of visual and blind signing on signature biometrics","authors":"Yasemin Bay, Meryem Erbilek, Ama Fosuah Gyasi Cyprus, Erbuğ Çelebi","doi":"10.1109/CICN.2017.8319377","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319377","url":null,"abstract":"The ubiquitous nature of our digital lifestyle raised many security issues including signature imitation and stealing of our identity. Therefore, there is a need for robust systems to verify or identify the signatory. In this paper, in contradistinction to other researchers working in signature biometrics, we investigate and explore the impact of blind and visual signing in signature biometrics for online signature identification. Experimental performance evaluation, using the publicly available SUSIG signature database, is carried out to provide some new and preliminary insights into the relationship between different practical factors, in particular clarifying the impact on identification performance of the blind and visual signing data collection protocols used to support the signature processing. Our results explored that adaption of the blind or visual signing data collection protocols has impact on the recognition performance less critical than hitherto expected.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319352
Abdoljalil Addeh, H. Demirel, Payam Zarbakhsh
Breast cancer is one of the widespread scourges amongst women worldwide. Breast cancer is the most prominent known killer of women between the ages of 35 and 54. Effective diagnosis of breast cancer remains a major challenge and early diagnosis is extremely important in helping prevent the most serious manifestations of the disease. In this paper a new method is presented for early detection of breast cancer based on adaptive neuro-fuzzy inference system (ANFIS) and feature selection. In this method, ANFIS is used as intelligent classifier and association rules (AR) technique is used as feature selection algorithm. In ANFIS, the value of radius has significant effect on system accuracy. Therefore, in the proposed method we used cuckoo optimization algorithm (COA) to find the optimal value of radius. The proposed method is applied on Wisconsin Breast Cancer Database (WBCD) and the results show that the proposed method has high detection accuracy.
{"title":"Early detection of breast cancer using optimized ANFIS and features selection","authors":"Abdoljalil Addeh, H. Demirel, Payam Zarbakhsh","doi":"10.1109/CICN.2017.8319352","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319352","url":null,"abstract":"Breast cancer is one of the widespread scourges amongst women worldwide. Breast cancer is the most prominent known killer of women between the ages of 35 and 54. Effective diagnosis of breast cancer remains a major challenge and early diagnosis is extremely important in helping prevent the most serious manifestations of the disease. In this paper a new method is presented for early detection of breast cancer based on adaptive neuro-fuzzy inference system (ANFIS) and feature selection. In this method, ANFIS is used as intelligent classifier and association rules (AR) technique is used as feature selection algorithm. In ANFIS, the value of radius has significant effect on system accuracy. Therefore, in the proposed method we used cuckoo optimization algorithm (COA) to find the optimal value of radius. The proposed method is applied on Wisconsin Breast Cancer Database (WBCD) and the results show that the proposed method has high detection accuracy.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127784281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319356
Anurag Garg, Viyangu Saini, Mohd Imran, M. Qadeer
Recent developments in information and communication technology domain, in particular social, mobile, cloud and big data are insisting computer networks for high bandwidth, ubiquitous accessibility and dynamic management. Also existing network approaches cannot completely utilize the capability of the physical network infrastructure and resources. In response to the preceding requirements of the computer networks, one of the solution is to make more investment in the network. In this paper, we survey the Software Defined Networking information and aim at presenting the definition of Software Defined Network and its architectural principle. Two sections describes the application of Software Defined Network in real world and its performance analysis based on some parameters. In the next sections, we present the key benefits and challenges of Software Defined Networking. Next we present a brief conclusion with some discussion on the current implementations of Software Defined Networking.
{"title":"Performance analysis of software defined networks","authors":"Anurag Garg, Viyangu Saini, Mohd Imran, M. Qadeer","doi":"10.1109/CICN.2017.8319356","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319356","url":null,"abstract":"Recent developments in information and communication technology domain, in particular social, mobile, cloud and big data are insisting computer networks for high bandwidth, ubiquitous accessibility and dynamic management. Also existing network approaches cannot completely utilize the capability of the physical network infrastructure and resources. In response to the preceding requirements of the computer networks, one of the solution is to make more investment in the network. In this paper, we survey the Software Defined Networking information and aim at presenting the definition of Software Defined Network and its architectural principle. Two sections describes the application of Software Defined Network in real world and its performance analysis based on some parameters. In the next sections, we present the key benefits and challenges of Software Defined Networking. Next we present a brief conclusion with some discussion on the current implementations of Software Defined Networking.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/CICN.2017.8319357
Milad Ghaffari, M. Ashourian, E. A. Ince, H. Demirel
In medical literature auscultation of heart sounds is an important skill for diagnosing cardiac cases, but is associated with many difficulties. In this study, a phonocardiography (PCG) based system is presented that could aid automatic analysis of heart sounds and diagnosis of ventricular septal defect (VSD) in newborns and children. Since the degree of the septal defect can be determined based on the diameter of defect (small > 3 mm to < 6 mm, moderate > 6 mm to < 12 mm, and large > 12 mm), our system would also report the septal defect's diameter. The proposed phonocardiography system for detecting and diagnosing the congenital heart diseases is simple, inexpensive and non-invasive which can be an alternative method for diagnosing VSD instead of echocardiography. In this study, recorded cardiac sounds of 22 newborns aged between 6 months to 2 years who were previously proved to have various cardiac diseases were used. Digital signal processing techniques such as short-time Fourier transform (STFT), segmentation and autocorrelation, Mel Frequency Cepstral Coefficients (MFCC) and their derivatives were used to extract features and these features were then classified using the K-Nearest Neighbors algorithm (KNN). A brief analysis of the results showed that for 93.2% of the test cases the proposed phonocardiography based system would correctly diagnose the recordings and the average defect diameter deviation was 6.79%.
{"title":"Phonocardiography signal processing for automatic diagnosis of ventricular septal defect in newborns and children","authors":"Milad Ghaffari, M. Ashourian, E. A. Ince, H. Demirel","doi":"10.1109/CICN.2017.8319357","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319357","url":null,"abstract":"In medical literature auscultation of heart sounds is an important skill for diagnosing cardiac cases, but is associated with many difficulties. In this study, a phonocardiography (PCG) based system is presented that could aid automatic analysis of heart sounds and diagnosis of ventricular septal defect (VSD) in newborns and children. Since the degree of the septal defect can be determined based on the diameter of defect (small > 3 mm to < 6 mm, moderate > 6 mm to < 12 mm, and large > 12 mm), our system would also report the septal defect's diameter. The proposed phonocardiography system for detecting and diagnosing the congenital heart diseases is simple, inexpensive and non-invasive which can be an alternative method for diagnosing VSD instead of echocardiography. In this study, recorded cardiac sounds of 22 newborns aged between 6 months to 2 years who were previously proved to have various cardiac diseases were used. Digital signal processing techniques such as short-time Fourier transform (STFT), segmentation and autocorrelation, Mel Frequency Cepstral Coefficients (MFCC) and their derivatives were used to extract features and these features were then classified using the K-Nearest Neighbors algorithm (KNN). A brief analysis of the results showed that for 93.2% of the test cases the proposed phonocardiography based system would correctly diagnose the recordings and the average defect diameter deviation was 6.79%.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132780513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}