Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583909
Neha P. Pohankar, N. Wankhade
It is found that the blood vessels in retina are related to many eye diseases. Therefore it becomes necessary to identify the proper blood vessels. This proper identification can help to diagnose disorders. There is problem occur in the existing methodologies in the segmentation and identification of blood vessels due to complex structure of vessels such as overlapping, bifurcation and crossover of vessels. Here in this paper we do a survey of different methods of blood vessels segmentation. These methods to segment blood vessels due to which we can easily diagnose and do treatment of diseases.
{"title":"Different methods used for extraction of blood vessels from retinal images","authors":"Neha P. Pohankar, N. Wankhade","doi":"10.1109/STARTUP.2016.7583909","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583909","url":null,"abstract":"It is found that the blood vessels in retina are related to many eye diseases. Therefore it becomes necessary to identify the proper blood vessels. This proper identification can help to diagnose disorders. There is problem occur in the existing methodologies in the segmentation and identification of blood vessels due to complex structure of vessels such as overlapping, bifurcation and crossover of vessels. Here in this paper we do a survey of different methods of blood vessels segmentation. These methods to segment blood vessels due to which we can easily diagnose and do treatment of diseases.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123111743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583941
Dhanashri R Ingale, Y. Chavan
Nowadays, Internet is widely used by users to satisfy their various information needs. Whenever a user submits any query/topic/keyword to search engine, it provides a long list of results for same query. As a consequence of this, users have to spend a lot of time in searching information of his/her interest. Most of the time it has been seen that, search engine does not deliver most relevant information, and hence information need of user does not get satisfied. Hence to provide best results, an analysis of user search goal behind searching is essential. Inference and analysis of user search goals can help to get relevant and refined results from a search engine and to provide better user experience. In this paper, main focus is on survey of infer user search goal approaches in prior studies which would help researchers to retrieve efficient results and information.
{"title":"A review on an approach to infer user search goals for optimize result","authors":"Dhanashri R Ingale, Y. Chavan","doi":"10.1109/STARTUP.2016.7583941","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583941","url":null,"abstract":"Nowadays, Internet is widely used by users to satisfy their various information needs. Whenever a user submits any query/topic/keyword to search engine, it provides a long list of results for same query. As a consequence of this, users have to spend a lot of time in searching information of his/her interest. Most of the time it has been seen that, search engine does not deliver most relevant information, and hence information need of user does not get satisfied. Hence to provide best results, an analysis of user search goal behind searching is essential. Inference and analysis of user search goals can help to get relevant and refined results from a search engine and to provide better user experience. In this paper, main focus is on survey of infer user search goal approaches in prior studies which would help researchers to retrieve efficient results and information.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116849949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583945
S. Viveka, B. Kalaavathi
In the past years, human health care system has limited application and the flow of data was very minimal. But in recent years, health care systems produce huge volume data because the growth of medical science. We use technology to supervise the complex data produced by the health care system. Data mining is one of the technologies used to find the interesting knowledge from the vast data produced by the health care system and used to analysis the patterns in large sets of data. Association, clustering, and classification are the tools used to help better exploitation of the data. It helps the health care professional to confirm the quality of the discovered medicine, prescribed treatment and the adverse reaction of the drugs.
{"title":"Review on clinical data mining with psychiatric adverse drug reaction","authors":"S. Viveka, B. Kalaavathi","doi":"10.1109/STARTUP.2016.7583945","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583945","url":null,"abstract":"In the past years, human health care system has limited application and the flow of data was very minimal. But in recent years, health care systems produce huge volume data because the growth of medical science. We use technology to supervise the complex data produced by the health care system. Data mining is one of the technologies used to find the interesting knowledge from the vast data produced by the health care system and used to analysis the patterns in large sets of data. Association, clustering, and classification are the tools used to help better exploitation of the data. It helps the health care professional to confirm the quality of the discovered medicine, prescribed treatment and the adverse reaction of the drugs.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132921560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583984
A. S. Vairagade, R. Fadnavis
Online Social Networking (OSN) sites are always helpful for being socialized and to get exposed to a social environment. But, privacy and prevention of undesired posts on user wall is the only problem of biggest concern. User should have the ability to control the message posted on their own private wall to avoid undesirable contents to be displayed. The existing OSN sites have very little support regarding this problem. For example, Facebook filters messages on the basis of identity of sender i.e. only friend, friend of friend or group of friends can post any message; no content based preferences are supported. Taking this fact into consideration, the proposed work contributes to address such problem through a machine learning based soft classifier for labeling messages in support of contents of message. This work experimentally evaluates an automated scheme to filter out unwanted messages posted on Facebook walls by assigning a set of categories with each short text message based on its contents.
{"title":"Automated content based short text classification for filtering undesired posts on Facebook","authors":"A. S. Vairagade, R. Fadnavis","doi":"10.1109/STARTUP.2016.7583984","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583984","url":null,"abstract":"Online Social Networking (OSN) sites are always helpful for being socialized and to get exposed to a social environment. But, privacy and prevention of undesired posts on user wall is the only problem of biggest concern. User should have the ability to control the message posted on their own private wall to avoid undesirable contents to be displayed. The existing OSN sites have very little support regarding this problem. For example, Facebook filters messages on the basis of identity of sender i.e. only friend, friend of friend or group of friends can post any message; no content based preferences are supported. Taking this fact into consideration, the proposed work contributes to address such problem through a machine learning based soft classifier for labeling messages in support of contents of message. This work experimentally evaluates an automated scheme to filter out unwanted messages posted on Facebook walls by assigning a set of categories with each short text message based on its contents.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132978784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583956
Shalaka M. Ragit, Sagar S. Badhiye
Collaborative data publishing means the data are distributed among multiple data providers or data owners. In this main concern is while publishing data preserving individual's privacy. While publishing collaborative data to multiple data providers two types of problem occurs, first is outsider attack and second is insider attack. Outsider attack is performed by people who are not data providers where as insider attack is performed by colluding data provider who may use their own data records to get the data records shared by other data providers. Insider attack is performed by people who are data provider or data owner. In this paper to overcome the problem of such attacks in collaborative data publishing the encryption strategy can be used such as 3DES which provides individuals data protection by using three keys. And again performing encryption on key with MD5 algorithm and appending it to the block of data.
{"title":"Preserving privacy in collaborative data publishing from heterogeneity attack","authors":"Shalaka M. Ragit, Sagar S. Badhiye","doi":"10.1109/STARTUP.2016.7583956","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583956","url":null,"abstract":"Collaborative data publishing means the data are distributed among multiple data providers or data owners. In this main concern is while publishing data preserving individual's privacy. While publishing collaborative data to multiple data providers two types of problem occurs, first is outsider attack and second is insider attack. Outsider attack is performed by people who are not data providers where as insider attack is performed by colluding data provider who may use their own data records to get the data records shared by other data providers. Insider attack is performed by people who are data provider or data owner. In this paper to overcome the problem of such attacks in collaborative data publishing the encryption strategy can be used such as 3DES which provides individuals data protection by using three keys. And again performing encryption on key with MD5 algorithm and appending it to the block of data.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583937
G. Balamurugan, K. S. Joseph, V. Arulalan
To improve the security of medical data and also transfer the medical images and their information among, the radiologist and physicians for concerning is termed as Teleradiology. Maintaining a secure environment is a challenging for Teleradiology from various issues like malpractice liability and Image Retention etc. To overcome these issues and also to maintain secure transformation of medical data, we propose a combined novel system using Biometrics, encryption and watermarking method termed as, “An Iris Based Reversible Watermarking for the security of Teleradiology”. Here, we use CIA mechanism for medical information and also for medical image transformation. Enrollment and Embedding process is carried out for the addition of user's and their information. Verification and Extraction process is carried out for the authentication of information identity.
{"title":"An Iris Based Reversible Watermarking system for the security of teleradiology","authors":"G. Balamurugan, K. S. Joseph, V. Arulalan","doi":"10.1109/STARTUP.2016.7583937","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583937","url":null,"abstract":"To improve the security of medical data and also transfer the medical images and their information among, the radiologist and physicians for concerning is termed as Teleradiology. Maintaining a secure environment is a challenging for Teleradiology from various issues like malpractice liability and Image Retention etc. To overcome these issues and also to maintain secure transformation of medical data, we propose a combined novel system using Biometrics, encryption and watermarking method termed as, “An Iris Based Reversible Watermarking for the security of Teleradiology”. Here, we use CIA mechanism for medical information and also for medical image transformation. Enrollment and Embedding process is carried out for the addition of user's and their information. Verification and Extraction process is carried out for the authentication of information identity.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"2512 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131318992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583989
R. Dharmik, R. Bhanuse, A. D. Gaikwad
The syntax analysis phase of a Compiler is to check syntactic structure of Programming Language construct using Context Free Grammar. Either by using Top-Down or Bottom-Up parsing technique to parse string of a given language. The string of a Language is successfully parsed by parser of Context Free Grammar then that string is syntactically correct. In this paper CYK algorithm is membership algorithm which gives string is member of language generated by Context Free Grammar or not. We have found out the Context Free Grammar is ambiguous or not using CYK algorithm.
{"title":"Ambiguity of Context Free Grammar using the CYK algorithm","authors":"R. Dharmik, R. Bhanuse, A. D. Gaikwad","doi":"10.1109/STARTUP.2016.7583989","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583989","url":null,"abstract":"The syntax analysis phase of a Compiler is to check syntactic structure of Programming Language construct using Context Free Grammar. Either by using Top-Down or Bottom-Up parsing technique to parse string of a given language. The string of a Language is successfully parsed by parser of Context Free Grammar then that string is syntactically correct. In this paper CYK algorithm is membership algorithm which gives string is member of language generated by Context Free Grammar or not. We have found out the Context Free Grammar is ambiguous or not using CYK algorithm.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124492550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583965
S. Kala
Modern communication standards are constantly evolving. The main challenge in the wireless industry is to provide hardware requirements for supporting the various evolving standards and protocols to facilitate the services to end users. In such an environment, Software Defined Radio is gaining popularity. Most of the wireless standards are computationally complex and it is challenging to map them on to an architecture, with minimum resources and higher energy efficiency. This paper discusses the design of receiver structure for a software radio, using polyphase channelizer. The paper mainly focuses on the design of Frequency Modulation (FM) channelizer as a case study. Hardware complexity analysis and comparison of the channelizer for various polyphase filter structure implementations is also presented. Simulation results for polyphase channelizer are also discussed in this work.
{"title":"Design of a software defined radio receiver using FM channelizer — A case study","authors":"S. Kala","doi":"10.1109/STARTUP.2016.7583965","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583965","url":null,"abstract":"Modern communication standards are constantly evolving. The main challenge in the wireless industry is to provide hardware requirements for supporting the various evolving standards and protocols to facilitate the services to end users. In such an environment, Software Defined Radio is gaining popularity. Most of the wireless standards are computationally complex and it is challenging to map them on to an architecture, with minimum resources and higher energy efficiency. This paper discusses the design of receiver structure for a software radio, using polyphase channelizer. The paper mainly focuses on the design of Frequency Modulation (FM) channelizer as a case study. Hardware complexity analysis and comparison of the channelizer for various polyphase filter structure implementations is also presented. Simulation results for polyphase channelizer are also discussed in this work.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129702810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583906
V. Kodgirwar
E-purchase is being preferred by millions of consumers over traditional shop purchases, all over the world. So in this case we just focus on CBIR system that will be able to learn user's choices in clothing and help him or her to make the best choices of clothing during e-purchase. This work will emphasize on the images matching aspect of the system only to retrieve relevant clothing as per the user's liking. Now we are applying different texture features for detecting patterns. Texture features are Contrast, Coarsness, Entropy, Energy, Correlation.
{"title":"Application of content based image retrieval for E-commerce","authors":"V. Kodgirwar","doi":"10.1109/STARTUP.2016.7583906","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583906","url":null,"abstract":"E-purchase is being preferred by millions of consumers over traditional shop purchases, all over the world. So in this case we just focus on CBIR system that will be able to learn user's choices in clothing and help him or her to make the best choices of clothing during e-purchase. This work will emphasize on the images matching aspect of the system only to retrieve relevant clothing as per the user's liking. Now we are applying different texture features for detecting patterns. Texture features are Contrast, Coarsness, Entropy, Energy, Correlation.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583921
Shweta S. Dawley, Pradnya A. Gajbhiye
The project presents the design of high performance quaternary Combinational circuits for lower power dissipation. Most of the digital electronic systems are based on the binary logic design which is limited by the requirement of interconnections which increases the chip area. The solution to this problem can be achieved using multi valued logic (MVL)/Quaternary logic. Most of the authors used methods which required Quaternary to Binary and Binary to Quaternary conversion for any arithmetic and logic operation and achieved satisfactory performances. Our aim is to develop MVL/Quaternary logic for combinational circuits under case study without converting these levels into binary logic and vice-versa. It will reduce one additional step, and improve the performance offering less chip size, saving more power. The design is targeted for 0.18um CMOS technology and the design tool for simulation will be Advanced Design System tool (ADS).
{"title":"Design and comparative analysis of binary and quaternary logic circuits","authors":"Shweta S. Dawley, Pradnya A. Gajbhiye","doi":"10.1109/STARTUP.2016.7583921","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583921","url":null,"abstract":"The project presents the design of high performance quaternary Combinational circuits for lower power dissipation. Most of the digital electronic systems are based on the binary logic design which is limited by the requirement of interconnections which increases the chip area. The solution to this problem can be achieved using multi valued logic (MVL)/Quaternary logic. Most of the authors used methods which required Quaternary to Binary and Binary to Quaternary conversion for any arithmetic and logic operation and achieved satisfactory performances. Our aim is to develop MVL/Quaternary logic for combinational circuits under case study without converting these levels into binary logic and vice-versa. It will reduce one additional step, and improve the performance offering less chip size, saving more power. The design is targeted for 0.18um CMOS technology and the design tool for simulation will be Advanced Design System tool (ADS).","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114624042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}