Pub Date : 2018-07-01DOI: 10.1109/ICRIEECE44171.2018.9008622
Rashi Jain, R. S. Sharma
Detection of cracks in concrete is highly recommended in early stages of construction to avoid potential hazards later. Need for automatic detection through image capturing and processing is rising. Till date only classifiers to detect cracks based on image processing have been designed. This paper presents an automatic system to detect severity of cracks. Every captured image of a crack is segmented through clustering. A fuzzy inference system is designed to output a risk prediction score based on the segments. This score can be helpful to decide any further actions to be taken once the crack is detected.
{"title":"Predicting Severity of Cracks in Concrete using Fuzzy Logic","authors":"Rashi Jain, R. S. Sharma","doi":"10.1109/ICRIEECE44171.2018.9008622","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9008622","url":null,"abstract":"Detection of cracks in concrete is highly recommended in early stages of construction to avoid potential hazards later. Need for automatic detection through image capturing and processing is rising. Till date only classifiers to detect cracks based on image processing have been designed. This paper presents an automatic system to detect severity of cracks. Every captured image of a crack is segmented through clustering. A fuzzy inference system is designed to output a risk prediction score based on the segments. This score can be helpful to decide any further actions to be taken once the crack is detected.","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"43 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115893794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICRIEECE44171.2018.9009413
Medha Gupta
Single sensor cameras for RGB color images using color filter array (CFA) in front of the sensor, captures only one color sample among three samples (red, green and blue) at each pixel location. Captured image, from single sensor camera, is called raw CFA image or mosaicked image, and the process of interpolating the missing color samples and reconstructing the full image from the CFA image is called CFA demosaicking. Without increasing cost and size of the camera, the idea of using single sensor and extension of color filter array (CFA) to multispectral filter array (MSFA) enable us to acquire the multispectral image in one shot. However, extension from CFA demosaicking to MSFA demosaicking is not straightforward because of a large number of spectral bands and very sparse sampling of each spectral band in MSFA. In this paper, we propose a generic gradient based multi-spectral image demosaicking method. MSFA patterns are designed using binary tree method. Band sequence arranges in this manner that middle band is set to be with the highest probability of appearance in MSFA pattern. A middle band is interpolated first and using this band, all other spectral bands interpolates with progressive bilinear spectral difference method. We compare our approach with conventional multispectral demosaicking method namely binary tree edge sensing (BTES) method, using CAVE dataset multispectral images. Experimental results show that our proposed approach outperforms BTES with respect to both peak-signal-to-noise-ratio (PSNR) and structure similarity (SSIM).
{"title":"Gradient based Multispectral Demosaicking Method using Single Sensor Array","authors":"Medha Gupta","doi":"10.1109/ICRIEECE44171.2018.9009413","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9009413","url":null,"abstract":"Single sensor cameras for RGB color images using color filter array (CFA) in front of the sensor, captures only one color sample among three samples (red, green and blue) at each pixel location. Captured image, from single sensor camera, is called raw CFA image or mosaicked image, and the process of interpolating the missing color samples and reconstructing the full image from the CFA image is called CFA demosaicking. Without increasing cost and size of the camera, the idea of using single sensor and extension of color filter array (CFA) to multispectral filter array (MSFA) enable us to acquire the multispectral image in one shot. However, extension from CFA demosaicking to MSFA demosaicking is not straightforward because of a large number of spectral bands and very sparse sampling of each spectral band in MSFA. In this paper, we propose a generic gradient based multi-spectral image demosaicking method. MSFA patterns are designed using binary tree method. Band sequence arranges in this manner that middle band is set to be with the highest probability of appearance in MSFA pattern. A middle band is interpolated first and using this band, all other spectral bands interpolates with progressive bilinear spectral difference method. We compare our approach with conventional multispectral demosaicking method namely binary tree edge sensing (BTES) method, using CAVE dataset multispectral images. Experimental results show that our proposed approach outperforms BTES with respect to both peak-signal-to-noise-ratio (PSNR) and structure similarity (SSIM).","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"279 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132071034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICRIEECE44171.2018.9008612
J. Mohan, A. S
Kinect is an advanced RGB-D camera developed by Microsoft back in 2010 for Xbox gaming console. Even though it was initially thought as a gaming device, its potential as a 3D depth sensing device grabbed the attention of computer vision and robotic researchers. With the introduction of the second generation of the device (Kinect v2) with improved specifications and technology than its predecessor, we began to see the device applications in robot navigation, producing high quality 3D scans, gesture recognition, virtual and augmented reality. In this paper we evaluate the application of Kinect v2 in robot workspace monitoring, more precisely human presence detection inside a three dimensional robotic workspace using colour and depth streams from Kinect v2.
{"title":"A Reliable Robot Workspace Monitoring System Using Kinect v2","authors":"J. Mohan, A. S","doi":"10.1109/ICRIEECE44171.2018.9008612","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9008612","url":null,"abstract":"Kinect is an advanced RGB-D camera developed by Microsoft back in 2010 for Xbox gaming console. Even though it was initially thought as a gaming device, its potential as a 3D depth sensing device grabbed the attention of computer vision and robotic researchers. With the introduction of the second generation of the device (Kinect v2) with improved specifications and technology than its predecessor, we began to see the device applications in robot navigation, producing high quality 3D scans, gesture recognition, virtual and augmented reality. In this paper we evaluate the application of Kinect v2 in robot workspace monitoring, more precisely human presence detection inside a three dimensional robotic workspace using colour and depth streams from Kinect v2.","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132278455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICRIEECE44171.2018.9009317
T. Padma, C. Kumari
An Epileptic Seizure is a sudden and uncontrolled symptom originated in brain. They could be due to abnormal electrical activity start in brain for very brief period and also recurring seizures due to a brain disorder. Therefore during the event there is an effect due to bumps, cuts /bruises are commonly observed occurrences. The effect of injuries are seriously caused due to falling and losing alertness or realization during or after a seizure, for instance a broken bone or injury. This project used an Arduino based airbag protection system for the people suffering from seizures by using an accelerometer, which will detect the fall of the person and triggers the airbag. A push pull solenoid is used to puncture a canister that is present in the airbag. A relay is used to operate the solenoid. When the fall is detected, the Arduino will trigger the airbag. This project helps the people who are suffering from epilepsy and protect them from injuries. This project objectives to design and development of precise system for fall detection based on Arduino technology through noticeable perfection in accuracy and specificity of system. Initial phase a close approximation and selection of its relevant threshold values and prototype design. Later Phase consist of application on test subjects to visualise the accuracy in system design.
{"title":"Sudden Fall Detection and Protection for Epileptic Seizures","authors":"T. Padma, C. Kumari","doi":"10.1109/ICRIEECE44171.2018.9009317","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9009317","url":null,"abstract":"An Epileptic Seizure is a sudden and uncontrolled symptom originated in brain. They could be due to abnormal electrical activity start in brain for very brief period and also recurring seizures due to a brain disorder. Therefore during the event there is an effect due to bumps, cuts /bruises are commonly observed occurrences. The effect of injuries are seriously caused due to falling and losing alertness or realization during or after a seizure, for instance a broken bone or injury. This project used an Arduino based airbag protection system for the people suffering from seizures by using an accelerometer, which will detect the fall of the person and triggers the airbag. A push pull solenoid is used to puncture a canister that is present in the airbag. A relay is used to operate the solenoid. When the fall is detected, the Arduino will trigger the airbag. This project helps the people who are suffering from epilepsy and protect them from injuries. This project objectives to design and development of precise system for fall detection based on Arduino technology through noticeable perfection in accuracy and specificity of system. Initial phase a close approximation and selection of its relevant threshold values and prototype design. Later Phase consist of application on test subjects to visualise the accuracy in system design.","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"2017 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132679656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICRIEECE44171.2018.9008517
Preeti Chauhan, Arjun Choudhary, Atul Gupta
The 21st century is all about data where the main producers are Social Networks, Smartphones, Personal Medical Reports etc. In earlier times data volume used to be in MegaBytes and GigaBytes but in the present scenario PettaBytes or ZettaBytes of data is coming with a very high speed with different varieties from the above sources. Data and Security in today’s time are complimentary in nature that needs to be addressed simultaneously and to provide security to such huge amount and variety of data, different encryption/decryption models are used. Multimedia data and its use have reached to gigantic level and as it belongs to the millions of user’s, the security of data is the primary concern. So, there should be the ways through which one can ensure the best possible practice to enhance the security of Data. This paper focuses on various techniques to secure the multimedia data which existed in various types like image, audio, chat, videos and text and also this paper provides an overview of available multiple encryption schemes to secure the different forms of multimedia data and critically analyse them.
{"title":"Multimedia Big Data Security","authors":"Preeti Chauhan, Arjun Choudhary, Atul Gupta","doi":"10.1109/ICRIEECE44171.2018.9008517","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9008517","url":null,"abstract":"The 21st century is all about data where the main producers are Social Networks, Smartphones, Personal Medical Reports etc. In earlier times data volume used to be in MegaBytes and GigaBytes but in the present scenario PettaBytes or ZettaBytes of data is coming with a very high speed with different varieties from the above sources. Data and Security in today’s time are complimentary in nature that needs to be addressed simultaneously and to provide security to such huge amount and variety of data, different encryption/decryption models are used. Multimedia data and its use have reached to gigantic level and as it belongs to the millions of user’s, the security of data is the primary concern. So, there should be the ways through which one can ensure the best possible practice to enhance the security of Data. This paper focuses on various techniques to secure the multimedia data which existed in various types like image, audio, chat, videos and text and also this paper provides an overview of available multiple encryption schemes to secure the different forms of multimedia data and critically analyse them.","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115236093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICRIEECE44171.2018.9008618
R. Shankar
The research attraction towards the renewable and green energy sources going to increases so PEV has great potential to participate in ancillary services. PEV has fast active power controllability and has large energy storage capacity makes PEV attractive. Large number of PEV has large energy storage capacity and has potential to participate in LFC. Due to less dependence on fossil fuel and less greenhouse gas emission makes attractive and the penetration of PEV in market is going to increases. In this paper discussed about the aggregation of PEV. Each PEV has different state of charge (SOC) and participation of PEV depending on its SOC. In this paper all the parameter of controller is tuned for LFC by the new optimization technique called lion optimization technique (LOA). LOA is nature inspired metaheuristic algorithm inspired by social hierarchy behaviour of lions from their birth till their death.
{"title":"Lion Algorithm based Load Frequency Control for Interconnected Power System Incoordination with UPFC and Electric Vehicle","authors":"R. Shankar","doi":"10.1109/ICRIEECE44171.2018.9008618","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9008618","url":null,"abstract":"The research attraction towards the renewable and green energy sources going to increases so PEV has great potential to participate in ancillary services. PEV has fast active power controllability and has large energy storage capacity makes PEV attractive. Large number of PEV has large energy storage capacity and has potential to participate in LFC. Due to less dependence on fossil fuel and less greenhouse gas emission makes attractive and the penetration of PEV in market is going to increases. In this paper discussed about the aggregation of PEV. Each PEV has different state of charge (SOC) and participation of PEV depending on its SOC. In this paper all the parameter of controller is tuned for LFC by the new optimization technique called lion optimization technique (LOA). LOA is nature inspired metaheuristic algorithm inspired by social hierarchy behaviour of lions from their birth till their death.","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICRIEECE44171.2018.9009202
Anushree S. Patil, S. M. Keshkamat, V. Desai, Tejas Arlimatti
Increase in the usage of multimedia applications has increased web security issues owing to attacks by hackers, crackers, trojans, etc. Cryptography provides confidentiality to the secret data by scrambling it and steganography hides the existence of the message from third party. The implemented system provides high security to the secret data being transmitted as it uses a combination of AES and LSB techniques where AES encryption is performed on text and then encrypted text is embedded in each segmented frame of cover video by LSB technique. Finally various experimental parameters such as Hamming Distance, MSE and PSNR have been documented which shows stego video is visually indistinguishable from the original cover video.
{"title":"Embedding of Advanced Encryption Standards Encoded Data in Video using Least Significant Bit Algorithm","authors":"Anushree S. Patil, S. M. Keshkamat, V. Desai, Tejas Arlimatti","doi":"10.1109/ICRIEECE44171.2018.9009202","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9009202","url":null,"abstract":"Increase in the usage of multimedia applications has increased web security issues owing to attacks by hackers, crackers, trojans, etc. Cryptography provides confidentiality to the secret data by scrambling it and steganography hides the existence of the message from third party. The implemented system provides high security to the secret data being transmitted as it uses a combination of AES and LSB techniques where AES encryption is performed on text and then encrypted text is embedded in each segmented frame of cover video by LSB technique. Finally various experimental parameters such as Hamming Distance, MSE and PSNR have been documented which shows stego video is visually indistinguishable from the original cover video.","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114592975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor networks (WSN) are growing in every aspects ranging from measuring temperature, humidity, rainfall to the battle field. In this type of application there are large numbers of sensors that has not been used and some are work independently. This paper put forward an analytical study of Stable Election Protocol and Modified Stable Election Protocol for heterogeneous wireless sensor networks (WSNs). The purpose of this comparative study is to analyze and identify the suitable platform for more stable and energy efficient heterogeneous WSNs platform. The study is supported by multiple simulations in a random distribution environment with different parameters like number of dead nodes, alive nodes, amount of data transmitted to the destination etc. from the simulation and result analysis we can say M-SEP is more stable and effective than SEP as well as M-SEP provides a longer stability period on an average of 9% extra than SEP.
{"title":"Analytical Study of SEP & M-SEP in Wireless Sensor Network with Heterogeneous Platform","authors":"Debabrata Singh, Shrabanee Swagatika, Nibedita Jagdev, Mitrabinda Khuntia, Rahul Kumar Ankit, Arup Kumar Mohanty","doi":"10.1109/ICRIEECE44171.2018.9008981","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9008981","url":null,"abstract":"Wireless sensor networks (WSN) are growing in every aspects ranging from measuring temperature, humidity, rainfall to the battle field. In this type of application there are large numbers of sensors that has not been used and some are work independently. This paper put forward an analytical study of Stable Election Protocol and Modified Stable Election Protocol for heterogeneous wireless sensor networks (WSNs). The purpose of this comparative study is to analyze and identify the suitable platform for more stable and energy efficient heterogeneous WSNs platform. The study is supported by multiple simulations in a random distribution environment with different parameters like number of dead nodes, alive nodes, amount of data transmitted to the destination etc. from the simulation and result analysis we can say M-SEP is more stable and effective than SEP as well as M-SEP provides a longer stability period on an average of 9% extra than SEP.","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"808 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117050807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICRIEECE44171.2018.9008425
Bikash Meher, S. Agrawal, P. Mishro
In the region based image fusion methods, the source images are partitioned into distinct regions using various segmentation techniques. The segmented regions are fused using different fusion approaches. This paper presents a region based multifocus image fusion scheme employing fuzzy c-means (FCM) clustering and optimal independent component bases. The bases are optimized using modified particle swarm optimization (MPSO). The different regions in the input images are obtained using FCM. The optimal bases are used to fuse the regions in the independent component analysis (ICA) based transform domain. The results found using the suggested method is compared with two other techniques. The simulation results reveal that the suggested procedure is better as compared to the other two techniques.
{"title":"A Region Based Optimal Multifocus Image Fusion Scheme","authors":"Bikash Meher, S. Agrawal, P. Mishro","doi":"10.1109/ICRIEECE44171.2018.9008425","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9008425","url":null,"abstract":"In the region based image fusion methods, the source images are partitioned into distinct regions using various segmentation techniques. The segmented regions are fused using different fusion approaches. This paper presents a region based multifocus image fusion scheme employing fuzzy c-means (FCM) clustering and optimal independent component bases. The bases are optimized using modified particle swarm optimization (MPSO). The different regions in the input images are obtained using FCM. The optimal bases are used to fuse the regions in the independent component analysis (ICA) based transform domain. The results found using the suggested method is compared with two other techniques. The simulation results reveal that the suggested procedure is better as compared to the other two techniques.","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128510706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICRIEECE44171.2018.9009244
Loveneet Kaur, Manmohan Sharma, Rajan Dharwal, A. Bakshi
Lung cancer is one of the most common disease in India. Reason behind this disease is unawareness among people and symptoms of disease are only recognized in their posterior stages. In this study, a lung cancer detection technique using Artificial Neural Networks has been investigated. Followed by image enhancement techniques, ANN has been used for classification of lung cancer stages. Lung cancer CT images have been taken from a private hospital. Accuracy of 93.3% has been achieved which is efficient enough as compared to existing systems. In Future, Ant colony optimization can be used with ANN for better results.
{"title":"Lung Cancer Detection Using CT Scan with Artificial Neural Netwok","authors":"Loveneet Kaur, Manmohan Sharma, Rajan Dharwal, A. Bakshi","doi":"10.1109/ICRIEECE44171.2018.9009244","DOIUrl":"https://doi.org/10.1109/ICRIEECE44171.2018.9009244","url":null,"abstract":"Lung cancer is one of the most common disease in India. Reason behind this disease is unawareness among people and symptoms of disease are only recognized in their posterior stages. In this study, a lung cancer detection technique using Artificial Neural Networks has been investigated. Followed by image enhancement techniques, ANN has been used for classification of lung cancer stages. Lung cancer CT images have been taken from a private hospital. Accuracy of 93.3% has been achieved which is efficient enough as compared to existing systems. In Future, Ant colony optimization can be used with ANN for better results.","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128728849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}