Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541163
K. Aditya, Praise Chacko, Deeksha Kumari, D. Kumari, Saurabh Bilgaiyan
The way humans interact with material objects around them has evolved a lot over the ages, with new technologies being added to the lot over the years. Same goes for the human computer interaction, the basic mode comprising of mouse and various buttons and keyboards etc. has become obsolete now. New emerging technologies and ideas from various companies are setting a benchmark for the way this interaction can take place, with utmost ease and precision. From visual based guidance systems to recognition based on retina scan, fingerprints or gesture recognition, the possibilities are virtually endless. Gone are the days of needing a GUI for interacting with a computer application, each replaced by motion tracking softwares and firmwares for the same. This paper deals with three emerging technologies for the same, LEAP motion controller, Microsoft Kinect and Data Glove. Gesture recognition using data glove is an efficient choice for HCI but it has poor interface and it lags as far as computational time is concerned. Microsofts Xbox Kinect uses a high definition camera and an active IR feature to help recognize the body features and skeletal tracking to track movements of multiple users. Leap motion with its state of the art depth sensing camera and ability to render hand gestures using palm and fingers orientation in 3D space is yet another choice for HCI. A detailed description and working principles of each of the devices, along with the applications and advantages of one over the other are discussed in brief in this paper, along with the future prospects discussed at the end.
{"title":"Recent Trends in HCI: A survey on Data Glove, LEAP Motion and Microsoft Kinect","authors":"K. Aditya, Praise Chacko, Deeksha Kumari, D. Kumari, Saurabh Bilgaiyan","doi":"10.1109/ICSCAN.2018.8541163","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541163","url":null,"abstract":"The way humans interact with material objects around them has evolved a lot over the ages, with new technologies being added to the lot over the years. Same goes for the human computer interaction, the basic mode comprising of mouse and various buttons and keyboards etc. has become obsolete now. New emerging technologies and ideas from various companies are setting a benchmark for the way this interaction can take place, with utmost ease and precision. From visual based guidance systems to recognition based on retina scan, fingerprints or gesture recognition, the possibilities are virtually endless. Gone are the days of needing a GUI for interacting with a computer application, each replaced by motion tracking softwares and firmwares for the same. This paper deals with three emerging technologies for the same, LEAP motion controller, Microsoft Kinect and Data Glove. Gesture recognition using data glove is an efficient choice for HCI but it has poor interface and it lags as far as computational time is concerned. Microsofts Xbox Kinect uses a high definition camera and an active IR feature to help recognize the body features and skeletal tracking to track movements of multiple users. Leap motion with its state of the art depth sensing camera and ability to render hand gestures using palm and fingers orientation in 3D space is yet another choice for HCI. A detailed description and working principles of each of the devices, along with the applications and advantages of one over the other are discussed in brief in this paper, along with the future prospects discussed at the end.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121518638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541201
S. Dhayabarasivam, K. Jayanthi
Full wave rectifier using diodes are commonly employed in energy harvestor. The conventional harvestor circuit consists of a full wave bridge AC/DC rectifier with significant voltage charges. These diode based rectifier circuit is not suitable for gaining a current. This paper focuses at designing a suitable single and double stage energy harvestor module using n-channel switches in the place of diodes in conventional circuit. In order to obtain an optimum voltage, the existing diode based rectifier circuit is modified with an n channel MOSFET. The proposed MOSFET rectifier circuit is considered to overcome the voltage drop and gaining a current. To double the voltage obtained at the output of the rectifier, boost converter has been used to the energy harvesting circuit. In this paper an energy harvesting circuit is simulated using MATLAB Simulink tool and constructed with an auto parameter from the MATLAB-simulation.
{"title":"Energy Harvesting Circuit Utilizing MOSFET Based Bridge Rectifier","authors":"S. Dhayabarasivam, K. Jayanthi","doi":"10.1109/ICSCAN.2018.8541201","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541201","url":null,"abstract":"Full wave rectifier using diodes are commonly employed in energy harvestor. The conventional harvestor circuit consists of a full wave bridge AC/DC rectifier with significant voltage charges. These diode based rectifier circuit is not suitable for gaining a current. This paper focuses at designing a suitable single and double stage energy harvestor module using n-channel switches in the place of diodes in conventional circuit. In order to obtain an optimum voltage, the existing diode based rectifier circuit is modified with an n channel MOSFET. The proposed MOSFET rectifier circuit is considered to overcome the voltage drop and gaining a current. To double the voltage obtained at the output of the rectifier, boost converter has been used to the energy harvesting circuit. In this paper an energy harvesting circuit is simulated using MATLAB Simulink tool and constructed with an auto parameter from the MATLAB-simulation.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129994752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541194
Ak Pandey, S. Shrivastava
Malignant and benign tumors of bone in the foot have traditionally been characterized as rare, or at least unusual. When these lesions do appear, mostly used methods, for foot and ankle tumors detection, are Ultrasound, Computed Tomography (CT) and Magnetic Resonance Imaging (MRI). There is a lot of image segmentation techniques are available. In this paper we are analyzing Computed Tomography images through Computer Aided Diagnosing (CAD) system. And for edge detection in image, canny edge detector is used. Canny edge detector has some limitations like it is not able to distinguish edges occurring around objects but still it is beneficial than other traditional edge detector methods.But to make the Canny edge detector better at identifying contours in natural images, in this paper some improved canny edge detector are analyzed.
{"title":"A Survey Paper on Calcaneus Bone Tumor Detection Using different Improved Canny Edge Detector","authors":"Ak Pandey, S. Shrivastava","doi":"10.1109/ICSCAN.2018.8541194","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541194","url":null,"abstract":"Malignant and benign tumors of bone in the foot have traditionally been characterized as rare, or at least unusual. When these lesions do appear, mostly used methods, for foot and ankle tumors detection, are Ultrasound, Computed Tomography (CT) and Magnetic Resonance Imaging (MRI). There is a lot of image segmentation techniques are available. In this paper we are analyzing Computed Tomography images through Computer Aided Diagnosing (CAD) system. And for edge detection in image, canny edge detector is used. Canny edge detector has some limitations like it is not able to distinguish edges occurring around objects but still it is beneficial than other traditional edge detector methods.But to make the Canny edge detector better at identifying contours in natural images, in this paper some improved canny edge detector are analyzed.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541192
V. Pugazhenthi, S. Gopalakannan, R. Rajappan
The simplified methods of the wing structures can be performed with enough confidence; as long as the simplified method based designs are analysts. The analysis result shows that the simplified method is applicable to used for performing the wing structure. During the analysis depending on the meshing is used from software package as MSC/PATRAN. Conclusions are also inferred with regard to the deficiency of certain element types in handling the true external load and internal load acting on the wing structure.
{"title":"Finite Element Analysis of Composite Shell Structure of Aircraft Wing Using Composite Structure","authors":"V. Pugazhenthi, S. Gopalakannan, R. Rajappan","doi":"10.1109/ICSCAN.2018.8541192","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541192","url":null,"abstract":"The simplified methods of the wing structures can be performed with enough confidence; as long as the simplified method based designs are analysts. The analysis result shows that the simplified method is applicable to used for performing the wing structure. During the analysis depending on the meshing is used from software package as MSC/PATRAN. Conclusions are also inferred with regard to the deficiency of certain element types in handling the true external load and internal load acting on the wing structure.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541256
Prafulkumar Kamble, S. Kamble
Modern power systems are highly complex and are expected to fulfill the growing demands of power wherever required, with acceptable quality and costs. In the Electrical power system area, an exciting opportunity called Custom Power enables at-the-fence solutions for delivery to industrial and commercial customers, value added reliable electric service distortions, and over-voltages. It is now well known that voltage reductions of greater than 15 or 20% and of duration greater than a few cycles lead to significant losses for the increasingly automated processing and manufacturing industry. Sudden increase in load always creates voltage fluctuation. This paper investigates the effect of sudden increase in load with and without STATCOM.
{"title":"Voltage Stability Using STATCOM During Sudden Increase in Load Demand","authors":"Prafulkumar Kamble, S. Kamble","doi":"10.1109/ICSCAN.2018.8541256","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541256","url":null,"abstract":"Modern power systems are highly complex and are expected to fulfill the growing demands of power wherever required, with acceptable quality and costs. In the Electrical power system area, an exciting opportunity called Custom Power enables at-the-fence solutions for delivery to industrial and commercial customers, value added reliable electric service distortions, and over-voltages. It is now well known that voltage reductions of greater than 15 or 20% and of duration greater than a few cycles lead to significant losses for the increasingly automated processing and manufacturing industry. Sudden increase in load always creates voltage fluctuation. This paper investigates the effect of sudden increase in load with and without STATCOM.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125425741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541195
V. V. Panicker, P. Arun
India accounts for only 2.4 percent of the world surface area and yet it supports and sustains 17.74 percent of the world population. This statistics always seems to be a barrier for successful growth of Healthcare systems in India. Even though ample number of new schemes is launched, still the public health system in the country continues to face formidable challenges. Development of efficient healthcare systems can improve the public health systems. This work aims to develop a simulation model for the Radio diagnosis department of a hospital. The model is developed to study the behavior of the Radio diagnosis department and perform a "what-if" analysis. Thus the simulation model is used as an efficient tool to understand the problem environment and suggesting possible improvements.
{"title":"Simulation model for the analysis of Patient Scheduling Process in Radio Diagnosis Department","authors":"V. V. Panicker, P. Arun","doi":"10.1109/ICSCAN.2018.8541195","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541195","url":null,"abstract":"India accounts for only 2.4 percent of the world surface area and yet it supports and sustains 17.74 percent of the world population. This statistics always seems to be a barrier for successful growth of Healthcare systems in India. Even though ample number of new schemes is launched, still the public health system in the country continues to face formidable challenges. Development of efficient healthcare systems can improve the public health systems. This work aims to develop a simulation model for the Radio diagnosis department of a hospital. The model is developed to study the behavior of the Radio diagnosis department and perform a \"what-if\" analysis. Thus the simulation model is used as an efficient tool to understand the problem environment and suggesting possible improvements.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128913343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541241
Remika Ngangbam, A. Hossain, A. Shukla
Wireless sensor networks play a vital role in present day world which are being used in different types of applications and occupy an important part in networking domain. It comprises of number of sensor nodes of limited battery power due to which saving power becomes the main factor to be considered in this finite energy wireless sensor networks to increase its lifetime. It is fact that in clustering protocol energy consumption by cluster head node (CHN) during communication with the BS is much higher than energy depletion by cluster member nodes (CMN) to transmit data to the associated cluster head (ACH). Therefore, energy consumption by cluster head and other member nodes become a crucial factor to be discussed for determining wireless sensor networks (WSNs) lifetime. This proposed protocol organises the cluster head selection efficiently to provide longer network lifetime and to provide balanced cluster head selection. The simulated output shows better performance comparing with traditional LEACH.
{"title":"An improved Clustering Based Hierarchical Protocol for extending Wireless Sensor Network Lifetime – EG LEACH","authors":"Remika Ngangbam, A. Hossain, A. Shukla","doi":"10.1109/ICSCAN.2018.8541241","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541241","url":null,"abstract":"Wireless sensor networks play a vital role in present day world which are being used in different types of applications and occupy an important part in networking domain. It comprises of number of sensor nodes of limited battery power due to which saving power becomes the main factor to be considered in this finite energy wireless sensor networks to increase its lifetime. It is fact that in clustering protocol energy consumption by cluster head node (CHN) during communication with the BS is much higher than energy depletion by cluster member nodes (CMN) to transmit data to the associated cluster head (ACH). Therefore, energy consumption by cluster head and other member nodes become a crucial factor to be discussed for determining wireless sensor networks (WSNs) lifetime. This proposed protocol organises the cluster head selection efficiently to provide longer network lifetime and to provide balanced cluster head selection. The simulated output shows better performance comparing with traditional LEACH.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122645758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541180
V. S. Narayanan, R. Elavarasan, C. Gnanaprakasam, N. S. Madhava Raja, R. Kiran Kumar
Condition of brain can be examined using the brain-signals and brain-images. Signal based evaluation is simple and offers essential information compared with the image based methods. This paper proposes an approach to evaluate the benchmark EEG signals. The implemented approach initially implements an amplitude based assessment to compute the peak-to-peak voltage value of the EEG signal. Later, it implements time-frequency conversation procedure to transfer the signal into image based on the wavelet transform. Further, the S-transform approach is considered to extract the essential signal features for the classifier system. Firefly-Algorithm (FA) based approach is also considered to choose leading signal features considered to train and test the classifier unit. In this work, classifiers, such as Support-Vector-Machine (SVM), Random-Forest (RF) and K-Nearest Neighbor (KNN) are implemented and the result of this work offered an average accuracy of 80.39%. The works confirms that, proposed procedure offers better result on the chosen EEG signals.
{"title":"Heuristic Algorithm based Approach to Classify EEG Signals into Normal and Focal","authors":"V. S. Narayanan, R. Elavarasan, C. Gnanaprakasam, N. S. Madhava Raja, R. Kiran Kumar","doi":"10.1109/ICSCAN.2018.8541180","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541180","url":null,"abstract":"Condition of brain can be examined using the brain-signals and brain-images. Signal based evaluation is simple and offers essential information compared with the image based methods. This paper proposes an approach to evaluate the benchmark EEG signals. The implemented approach initially implements an amplitude based assessment to compute the peak-to-peak voltage value of the EEG signal. Later, it implements time-frequency conversation procedure to transfer the signal into image based on the wavelet transform. Further, the S-transform approach is considered to extract the essential signal features for the classifier system. Firefly-Algorithm (FA) based approach is also considered to choose leading signal features considered to train and test the classifier unit. In this work, classifiers, such as Support-Vector-Machine (SVM), Random-Forest (RF) and K-Nearest Neighbor (KNN) are implemented and the result of this work offered an average accuracy of 80.39%. The works confirms that, proposed procedure offers better result on the chosen EEG signals.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541174
Ragav Venkatesan, D. Devi, R. Keerthana, A. Kumar
Across the globe, all the companies are marching towards data security and data protection. Prevention measures are taken to secure their database from an intruder. As the technology grows rapidly for information/data security, the intruders also use various techniques to exploit data on other side. Distributed Denial of Service (DDoS) attack is used to override the security of targeted system, where the attacker seeks to make a terminal unavailable to its authorized users temporarily by sending "n" number of packets over the network. The triggered DDoS attack interrupts any normal operation in a network and not letting the legitimate users to access the machine. Simply, the DDoS floods the targeted machine not to do any further actions. This examination is conveyed to distinguish DDoS attack in OSSEC HIDS, and successful measures to decrease false positive rate. "OSSEC (HIDS)"[1] has brought together, cross stage design enabling different frameworks to be effortlessly observed, overseen and simple to get the recorded logs. The extracted report was analyzed with "ASSOCIATION RULE" using Weka open source tool.
{"title":"A NOVEL APPROACH FOR DETECTING DDoS ATTACK IN H-IDS USING ASSOCIATION RULE","authors":"Ragav Venkatesan, D. Devi, R. Keerthana, A. Kumar","doi":"10.1109/ICSCAN.2018.8541174","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541174","url":null,"abstract":"Across the globe, all the companies are marching towards data security and data protection. Prevention measures are taken to secure their database from an intruder. As the technology grows rapidly for information/data security, the intruders also use various techniques to exploit data on other side. Distributed Denial of Service (DDoS) attack is used to override the security of targeted system, where the attacker seeks to make a terminal unavailable to its authorized users temporarily by sending \"n\" number of packets over the network. The triggered DDoS attack interrupts any normal operation in a network and not letting the legitimate users to access the machine. Simply, the DDoS floods the targeted machine not to do any further actions. This examination is conveyed to distinguish DDoS attack in OSSEC HIDS, and successful measures to decrease false positive rate. \"OSSEC (HIDS)\"[1] has brought together, cross stage design enabling different frameworks to be effortlessly observed, overseen and simple to get the recorded logs. The extracted report was analyzed with \"ASSOCIATION RULE\" using Weka open source tool.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115744802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541153
S. Dyaneshwar, K. Monica, G. Jaiyashri, R. Amutha
In recent times health problems like cardiac failure and respiratory issues are on the rise. With the explosion of Internet of Things and development of variety of low cost sensors, monitoring of health parameters remotely has been become a viable alternative to regular hospital visits. This paper proposes a novel remote health parameter monitoring system with compressed sensing mechanism to monitor patients remotely while simultaneously minimizing the amount of information sent over the network. In addition to remote monitoring this system also enables storage of the data on a remote server/cloud solution which can be used for future processing to study health conditions in a retrospective manner.
{"title":"Cloud Assisted Recovery Scheme for Compressively Sensed Medical Sensor Data","authors":"S. Dyaneshwar, K. Monica, G. Jaiyashri, R. Amutha","doi":"10.1109/ICSCAN.2018.8541153","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541153","url":null,"abstract":"In recent times health problems like cardiac failure and respiratory issues are on the rise. With the explosion of Internet of Things and development of variety of low cost sensors, monitoring of health parameters remotely has been become a viable alternative to regular hospital visits. This paper proposes a novel remote health parameter monitoring system with compressed sensing mechanism to monitor patients remotely while simultaneously minimizing the amount of information sent over the network. In addition to remote monitoring this system also enables storage of the data on a remote server/cloud solution which can be used for future processing to study health conditions in a retrospective manner.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115420248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}